@unkey/api 2.0.3 → 2.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (245) hide show
  1. package/README.md +6 -3
  2. package/bin/mcp-server.js +461 -157
  3. package/bin/mcp-server.js.map +31 -23
  4. package/dist/commonjs/funcs/identitiesListIdentities.js +3 -0
  5. package/dist/commonjs/funcs/identitiesListIdentities.js.map +1 -1
  6. package/dist/commonjs/funcs/keysRerollKey.d.ts +49 -0
  7. package/dist/commonjs/funcs/keysRerollKey.d.ts.map +1 -0
  8. package/dist/commonjs/funcs/keysRerollKey.js +159 -0
  9. package/dist/commonjs/funcs/keysRerollKey.js.map +1 -0
  10. package/dist/commonjs/funcs/permissionsListPermissions.d.ts +2 -1
  11. package/dist/commonjs/funcs/permissionsListPermissions.d.ts.map +1 -1
  12. package/dist/commonjs/funcs/permissionsListPermissions.js +2 -1
  13. package/dist/commonjs/funcs/permissionsListPermissions.js.map +1 -1
  14. package/dist/commonjs/funcs/permissionsListRoles.d.ts +2 -1
  15. package/dist/commonjs/funcs/permissionsListRoles.d.ts.map +1 -1
  16. package/dist/commonjs/funcs/permissionsListRoles.js +2 -1
  17. package/dist/commonjs/funcs/permissionsListRoles.js.map +1 -1
  18. package/dist/commonjs/funcs/ratelimitLimit.d.ts +2 -2
  19. package/dist/commonjs/funcs/ratelimitLimit.d.ts.map +1 -1
  20. package/dist/commonjs/funcs/ratelimitLimit.js +3 -3
  21. package/dist/commonjs/funcs/ratelimitLimit.js.map +1 -1
  22. package/dist/commonjs/lib/config.d.ts +3 -3
  23. package/dist/commonjs/lib/config.js +3 -3
  24. package/dist/commonjs/lib/security.d.ts.map +1 -1
  25. package/dist/commonjs/lib/security.js.map +1 -1
  26. package/dist/commonjs/mcp-server/mcp-server.js +1 -1
  27. package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
  28. package/dist/commonjs/mcp-server/server.js +3 -1
  29. package/dist/commonjs/mcp-server/server.js.map +1 -1
  30. package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts +8 -0
  31. package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
  32. package/dist/commonjs/mcp-server/tools/keysRerollKey.js +96 -0
  33. package/dist/commonjs/mcp-server/tools/keysRerollKey.js.map +1 -0
  34. package/dist/commonjs/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
  35. package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js +2 -1
  36. package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js.map +1 -1
  37. package/dist/commonjs/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
  38. package/dist/commonjs/mcp-server/tools/permissionsListRoles.js +2 -1
  39. package/dist/commonjs/mcp-server/tools/permissionsListRoles.js.map +1 -1
  40. package/dist/commonjs/mcp-server/tools/ratelimitLimit.js +1 -1
  41. package/dist/commonjs/models/components/index.d.ts +5 -0
  42. package/dist/commonjs/models/components/index.d.ts.map +1 -1
  43. package/dist/commonjs/models/components/index.js +5 -0
  44. package/dist/commonjs/models/components/index.js.map +1 -1
  45. package/dist/commonjs/models/components/keycreditsrefill.d.ts +8 -8
  46. package/dist/commonjs/models/components/keycreditsrefill.d.ts.map +1 -1
  47. package/dist/commonjs/models/components/keycreditsrefill.js +13 -14
  48. package/dist/commonjs/models/components/keycreditsrefill.js.map +1 -1
  49. package/dist/commonjs/models/components/updatekeycreditsdata.d.ts +41 -0
  50. package/dist/commonjs/models/components/updatekeycreditsdata.d.ts.map +1 -0
  51. package/dist/commonjs/models/components/updatekeycreditsdata.js +72 -0
  52. package/dist/commonjs/models/components/updatekeycreditsdata.js.map +1 -0
  53. package/dist/commonjs/models/components/updatekeycreditsrefill.d.ts +81 -0
  54. package/dist/commonjs/models/components/updatekeycreditsrefill.d.ts.map +1 -0
  55. package/dist/commonjs/models/components/updatekeycreditsrefill.js +95 -0
  56. package/dist/commonjs/models/components/updatekeycreditsrefill.js.map +1 -0
  57. package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
  58. package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
  59. package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
  60. package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
  61. package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
  62. package/dist/commonjs/models/components/v2keysaddrolesresponsebody.js.map +1 -1
  63. package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
  64. package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
  65. package/dist/commonjs/models/components/v2keysremoverolesresponsebody.js.map +1 -1
  66. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
  67. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
  68. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js +71 -0
  69. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
  70. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
  71. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
  72. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js +73 -0
  73. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
  74. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
  75. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
  76. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js +71 -0
  77. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
  78. package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
  79. package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
  80. package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
  81. package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
  82. package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
  83. package/dist/commonjs/models/components/v2keyssetrolesresponsebody.js.map +1 -1
  84. package/dist/commonjs/models/components/v2keysupdatekeyrequestbody.d.ts +3 -3
  85. package/dist/commonjs/models/components/v2keysupdatekeyrequestbody.d.ts.map +1 -1
  86. package/dist/commonjs/models/components/v2keysupdatekeyrequestbody.js +3 -3
  87. package/dist/commonjs/models/components/v2keysupdatekeyrequestbody.js.map +1 -1
  88. package/dist/commonjs/models/errors/goneerrorresponse.d.ts +72 -0
  89. package/dist/commonjs/models/errors/goneerrorresponse.d.ts.map +1 -0
  90. package/dist/commonjs/models/errors/goneerrorresponse.js +99 -0
  91. package/dist/commonjs/models/errors/goneerrorresponse.js.map +1 -0
  92. package/dist/commonjs/models/errors/index.d.ts +1 -0
  93. package/dist/commonjs/models/errors/index.d.ts.map +1 -1
  94. package/dist/commonjs/models/errors/index.js +1 -0
  95. package/dist/commonjs/models/errors/index.js.map +1 -1
  96. package/dist/commonjs/sdk/keys.d.ts +38 -0
  97. package/dist/commonjs/sdk/keys.d.ts.map +1 -1
  98. package/dist/commonjs/sdk/keys.js +41 -0
  99. package/dist/commonjs/sdk/keys.js.map +1 -1
  100. package/dist/commonjs/sdk/permissions.d.ts +4 -2
  101. package/dist/commonjs/sdk/permissions.d.ts.map +1 -1
  102. package/dist/commonjs/sdk/permissions.js +4 -2
  103. package/dist/commonjs/sdk/permissions.js.map +1 -1
  104. package/dist/commonjs/sdk/ratelimit.d.ts +1 -1
  105. package/dist/commonjs/sdk/ratelimit.js +1 -1
  106. package/dist/esm/funcs/identitiesListIdentities.js +3 -0
  107. package/dist/esm/funcs/identitiesListIdentities.js.map +1 -1
  108. package/dist/esm/funcs/keysRerollKey.d.ts +49 -0
  109. package/dist/esm/funcs/keysRerollKey.d.ts.map +1 -0
  110. package/dist/esm/funcs/keysRerollKey.js +123 -0
  111. package/dist/esm/funcs/keysRerollKey.js.map +1 -0
  112. package/dist/esm/funcs/permissionsListPermissions.d.ts +2 -1
  113. package/dist/esm/funcs/permissionsListPermissions.d.ts.map +1 -1
  114. package/dist/esm/funcs/permissionsListPermissions.js +2 -1
  115. package/dist/esm/funcs/permissionsListPermissions.js.map +1 -1
  116. package/dist/esm/funcs/permissionsListRoles.d.ts +2 -1
  117. package/dist/esm/funcs/permissionsListRoles.d.ts.map +1 -1
  118. package/dist/esm/funcs/permissionsListRoles.js +2 -1
  119. package/dist/esm/funcs/permissionsListRoles.js.map +1 -1
  120. package/dist/esm/funcs/ratelimitLimit.d.ts +2 -2
  121. package/dist/esm/funcs/ratelimitLimit.d.ts.map +1 -1
  122. package/dist/esm/funcs/ratelimitLimit.js +3 -3
  123. package/dist/esm/funcs/ratelimitLimit.js.map +1 -1
  124. package/dist/esm/lib/config.d.ts +3 -3
  125. package/dist/esm/lib/config.js +3 -3
  126. package/dist/esm/lib/security.d.ts.map +1 -1
  127. package/dist/esm/lib/security.js.map +1 -1
  128. package/dist/esm/mcp-server/mcp-server.js +1 -1
  129. package/dist/esm/mcp-server/server.d.ts.map +1 -1
  130. package/dist/esm/mcp-server/server.js +3 -1
  131. package/dist/esm/mcp-server/server.js.map +1 -1
  132. package/dist/esm/mcp-server/tools/keysRerollKey.d.ts +8 -0
  133. package/dist/esm/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
  134. package/dist/esm/mcp-server/tools/keysRerollKey.js +60 -0
  135. package/dist/esm/mcp-server/tools/keysRerollKey.js.map +1 -0
  136. package/dist/esm/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
  137. package/dist/esm/mcp-server/tools/permissionsListPermissions.js +2 -1
  138. package/dist/esm/mcp-server/tools/permissionsListPermissions.js.map +1 -1
  139. package/dist/esm/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
  140. package/dist/esm/mcp-server/tools/permissionsListRoles.js +2 -1
  141. package/dist/esm/mcp-server/tools/permissionsListRoles.js.map +1 -1
  142. package/dist/esm/mcp-server/tools/ratelimitLimit.js +1 -1
  143. package/dist/esm/models/components/index.d.ts +5 -0
  144. package/dist/esm/models/components/index.d.ts.map +1 -1
  145. package/dist/esm/models/components/index.js +5 -0
  146. package/dist/esm/models/components/index.js.map +1 -1
  147. package/dist/esm/models/components/keycreditsrefill.d.ts +8 -8
  148. package/dist/esm/models/components/keycreditsrefill.d.ts.map +1 -1
  149. package/dist/esm/models/components/keycreditsrefill.js +12 -13
  150. package/dist/esm/models/components/keycreditsrefill.js.map +1 -1
  151. package/dist/esm/models/components/updatekeycreditsdata.d.ts +41 -0
  152. package/dist/esm/models/components/updatekeycreditsdata.d.ts.map +1 -0
  153. package/dist/esm/models/components/updatekeycreditsdata.js +34 -0
  154. package/dist/esm/models/components/updatekeycreditsdata.js.map +1 -0
  155. package/dist/esm/models/components/updatekeycreditsrefill.d.ts +81 -0
  156. package/dist/esm/models/components/updatekeycreditsrefill.d.ts.map +1 -0
  157. package/dist/esm/models/components/updatekeycreditsrefill.js +57 -0
  158. package/dist/esm/models/components/updatekeycreditsrefill.js.map +1 -0
  159. package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
  160. package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
  161. package/dist/esm/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
  162. package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
  163. package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
  164. package/dist/esm/models/components/v2keysaddrolesresponsebody.js.map +1 -1
  165. package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
  166. package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
  167. package/dist/esm/models/components/v2keysremoverolesresponsebody.js.map +1 -1
  168. package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
  169. package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
  170. package/dist/esm/models/components/v2keysrerollkeyrequestbody.js +33 -0
  171. package/dist/esm/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
  172. package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
  173. package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
  174. package/dist/esm/models/components/v2keysrerollkeyresponsebody.js +35 -0
  175. package/dist/esm/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
  176. package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
  177. package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
  178. package/dist/esm/models/components/v2keysrerollkeyresponsedata.js +33 -0
  179. package/dist/esm/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
  180. package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
  181. package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
  182. package/dist/esm/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
  183. package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
  184. package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
  185. package/dist/esm/models/components/v2keyssetrolesresponsebody.js.map +1 -1
  186. package/dist/esm/models/components/v2keysupdatekeyrequestbody.d.ts +3 -3
  187. package/dist/esm/models/components/v2keysupdatekeyrequestbody.d.ts.map +1 -1
  188. package/dist/esm/models/components/v2keysupdatekeyrequestbody.js +3 -3
  189. package/dist/esm/models/components/v2keysupdatekeyrequestbody.js.map +1 -1
  190. package/dist/esm/models/errors/goneerrorresponse.d.ts +72 -0
  191. package/dist/esm/models/errors/goneerrorresponse.d.ts.map +1 -0
  192. package/dist/esm/models/errors/goneerrorresponse.js +62 -0
  193. package/dist/esm/models/errors/goneerrorresponse.js.map +1 -0
  194. package/dist/esm/models/errors/index.d.ts +1 -0
  195. package/dist/esm/models/errors/index.d.ts.map +1 -1
  196. package/dist/esm/models/errors/index.js +1 -0
  197. package/dist/esm/models/errors/index.js.map +1 -1
  198. package/dist/esm/sdk/keys.d.ts +38 -0
  199. package/dist/esm/sdk/keys.d.ts.map +1 -1
  200. package/dist/esm/sdk/keys.js +41 -0
  201. package/dist/esm/sdk/keys.js.map +1 -1
  202. package/dist/esm/sdk/permissions.d.ts +4 -2
  203. package/dist/esm/sdk/permissions.d.ts.map +1 -1
  204. package/dist/esm/sdk/permissions.js +4 -2
  205. package/dist/esm/sdk/permissions.js.map +1 -1
  206. package/dist/esm/sdk/ratelimit.d.ts +1 -1
  207. package/dist/esm/sdk/ratelimit.js +1 -1
  208. package/docs/sdks/keys/README.md +113 -0
  209. package/docs/sdks/permissions/README.md +4 -2
  210. package/docs/sdks/ratelimit/README.md +2 -1
  211. package/examples/apisCreateApi.example.ts +2 -2
  212. package/examples/package-lock.json +3 -3
  213. package/jsr.json +1 -1
  214. package/package.json +3 -3
  215. package/src/funcs/identitiesListIdentities.ts +3 -0
  216. package/src/funcs/keysRerollKey.ts +227 -0
  217. package/src/funcs/permissionsListPermissions.ts +2 -1
  218. package/src/funcs/permissionsListRoles.ts +2 -1
  219. package/src/funcs/ratelimitLimit.ts +6 -2
  220. package/src/lib/config.ts +3 -3
  221. package/src/lib/security.ts +4 -1
  222. package/src/mcp-server/mcp-server.ts +1 -1
  223. package/src/mcp-server/server.ts +3 -1
  224. package/src/mcp-server/tools/keysRerollKey.ts +69 -0
  225. package/src/mcp-server/tools/permissionsListPermissions.ts +2 -1
  226. package/src/mcp-server/tools/permissionsListRoles.ts +2 -1
  227. package/src/mcp-server/tools/ratelimitLimit.ts +1 -1
  228. package/src/models/components/index.ts +5 -0
  229. package/src/models/components/keycreditsrefill.ts +18 -14
  230. package/src/models/components/updatekeycreditsdata.ts +85 -0
  231. package/src/models/components/updatekeycreditsrefill.ts +126 -0
  232. package/src/models/components/v2keysaddpermissionsresponsebody.ts +0 -1
  233. package/src/models/components/v2keysaddrolesresponsebody.ts +0 -1
  234. package/src/models/components/v2keysremoverolesresponsebody.ts +0 -1
  235. package/src/models/components/v2keysrerollkeyrequestbody.ts +99 -0
  236. package/src/models/components/v2keysrerollkeyresponsebody.ts +87 -0
  237. package/src/models/components/v2keysrerollkeyresponsedata.ts +103 -0
  238. package/src/models/components/v2keyssetpermissionsresponsebody.ts +0 -1
  239. package/src/models/components/v2keyssetrolesresponsebody.ts +0 -1
  240. package/src/models/components/v2keysupdatekeyrequestbody.ts +10 -10
  241. package/src/models/errors/goneerrorresponse.ts +118 -0
  242. package/src/models/errors/index.ts +1 -0
  243. package/src/sdk/keys.ts +49 -0
  244. package/src/sdk/permissions.ts +4 -2
  245. package/src/sdk/ratelimit.ts +1 -1
package/bin/mcp-server.js CHANGED
@@ -34269,9 +34269,9 @@ var init_config = __esm(() => {
34269
34269
  SDK_METADATA = {
34270
34270
  language: "typescript",
34271
34271
  openapiDocVersion: "2.0.0",
34272
- sdkVersion: "2.0.3",
34273
- genVersion: "2.672.0",
34274
- userAgent: "speakeasy-sdk/typescript 2.0.3 2.672.0 2.0.0 @unkey/api"
34272
+ sdkVersion: "2.0.5",
34273
+ genVersion: "2.698.4",
34274
+ userAgent: "speakeasy-sdk/typescript 2.0.5 2.698.4 2.0.0 @unkey/api"
34275
34275
  };
34276
34276
  });
34277
34277
 
@@ -35837,26 +35837,26 @@ var init_identity = __esm(() => {
35837
35837
  });
35838
35838
 
35839
35839
  // src/models/components/keycreditsrefill.ts
35840
- var Interval, Interval$inboundSchema, Interval$outboundSchema, Interval$, KeyCreditsRefill$inboundSchema, KeyCreditsRefill$outboundSchema, KeyCreditsRefill$;
35840
+ var KeyCreditsRefillInterval, KeyCreditsRefillInterval$inboundSchema, KeyCreditsRefillInterval$outboundSchema, KeyCreditsRefillInterval$, KeyCreditsRefill$inboundSchema, KeyCreditsRefill$outboundSchema, KeyCreditsRefill$;
35841
35841
  var init_keycreditsrefill = __esm(() => {
35842
35842
  init_zod();
35843
- Interval = {
35843
+ KeyCreditsRefillInterval = {
35844
35844
  Daily: "daily",
35845
35845
  Monthly: "monthly"
35846
35846
  };
35847
- Interval$inboundSchema = nativeEnumType(Interval);
35848
- Interval$outboundSchema = Interval$inboundSchema;
35849
- ((Interval$) => {
35850
- Interval$.inboundSchema = Interval$inboundSchema;
35851
- Interval$.outboundSchema = Interval$outboundSchema;
35852
- })(Interval$ ||= {});
35847
+ KeyCreditsRefillInterval$inboundSchema = nativeEnumType(KeyCreditsRefillInterval);
35848
+ KeyCreditsRefillInterval$outboundSchema = KeyCreditsRefillInterval$inboundSchema;
35849
+ ((KeyCreditsRefillInterval$) => {
35850
+ KeyCreditsRefillInterval$.inboundSchema = KeyCreditsRefillInterval$inboundSchema;
35851
+ KeyCreditsRefillInterval$.outboundSchema = KeyCreditsRefillInterval$outboundSchema;
35852
+ })(KeyCreditsRefillInterval$ ||= {});
35853
35853
  KeyCreditsRefill$inboundSchema = objectType({
35854
- interval: Interval$inboundSchema,
35854
+ interval: KeyCreditsRefillInterval$inboundSchema,
35855
35855
  amount: numberType().int(),
35856
35856
  refillDay: numberType().int().optional()
35857
35857
  });
35858
35858
  KeyCreditsRefill$outboundSchema = objectType({
35859
- interval: Interval$outboundSchema,
35859
+ interval: KeyCreditsRefillInterval$outboundSchema,
35860
35860
  amount: numberType().int(),
35861
35861
  refillDay: numberType().int().optional()
35862
35862
  });
@@ -36107,6 +36107,55 @@ var init_security2 = __esm(() => {
36107
36107
  })(Security$ ||= {});
36108
36108
  });
36109
36109
 
36110
+ // src/models/components/updatekeycreditsrefill.ts
36111
+ var UpdateKeyCreditsRefillInterval, UpdateKeyCreditsRefillInterval$inboundSchema, UpdateKeyCreditsRefillInterval$outboundSchema, UpdateKeyCreditsRefillInterval$, UpdateKeyCreditsRefill$inboundSchema, UpdateKeyCreditsRefill$outboundSchema, UpdateKeyCreditsRefill$;
36112
+ var init_updatekeycreditsrefill = __esm(() => {
36113
+ init_zod();
36114
+ UpdateKeyCreditsRefillInterval = {
36115
+ Daily: "daily",
36116
+ Monthly: "monthly"
36117
+ };
36118
+ UpdateKeyCreditsRefillInterval$inboundSchema = nativeEnumType(UpdateKeyCreditsRefillInterval);
36119
+ UpdateKeyCreditsRefillInterval$outboundSchema = UpdateKeyCreditsRefillInterval$inboundSchema;
36120
+ ((UpdateKeyCreditsRefillInterval$) => {
36121
+ UpdateKeyCreditsRefillInterval$.inboundSchema = UpdateKeyCreditsRefillInterval$inboundSchema;
36122
+ UpdateKeyCreditsRefillInterval$.outboundSchema = UpdateKeyCreditsRefillInterval$outboundSchema;
36123
+ })(UpdateKeyCreditsRefillInterval$ ||= {});
36124
+ UpdateKeyCreditsRefill$inboundSchema = objectType({
36125
+ interval: UpdateKeyCreditsRefillInterval$inboundSchema,
36126
+ amount: numberType().int(),
36127
+ refillDay: numberType().int().optional()
36128
+ });
36129
+ UpdateKeyCreditsRefill$outboundSchema = objectType({
36130
+ interval: UpdateKeyCreditsRefillInterval$outboundSchema,
36131
+ amount: numberType().int(),
36132
+ refillDay: numberType().int().optional()
36133
+ });
36134
+ ((UpdateKeyCreditsRefill$) => {
36135
+ UpdateKeyCreditsRefill$.inboundSchema = UpdateKeyCreditsRefill$inboundSchema;
36136
+ UpdateKeyCreditsRefill$.outboundSchema = UpdateKeyCreditsRefill$outboundSchema;
36137
+ })(UpdateKeyCreditsRefill$ ||= {});
36138
+ });
36139
+
36140
+ // src/models/components/updatekeycreditsdata.ts
36141
+ var UpdateKeyCreditsData$inboundSchema, UpdateKeyCreditsData$outboundSchema, UpdateKeyCreditsData$;
36142
+ var init_updatekeycreditsdata = __esm(() => {
36143
+ init_zod();
36144
+ init_updatekeycreditsrefill();
36145
+ UpdateKeyCreditsData$inboundSchema = objectType({
36146
+ remaining: nullableType(numberType().int()).optional(),
36147
+ refill: nullableType(UpdateKeyCreditsRefill$inboundSchema).optional()
36148
+ });
36149
+ UpdateKeyCreditsData$outboundSchema = objectType({
36150
+ remaining: nullableType(numberType().int()).optional(),
36151
+ refill: nullableType(UpdateKeyCreditsRefill$outboundSchema).optional()
36152
+ });
36153
+ ((UpdateKeyCreditsData$) => {
36154
+ UpdateKeyCreditsData$.inboundSchema = UpdateKeyCreditsData$inboundSchema;
36155
+ UpdateKeyCreditsData$.outboundSchema = UpdateKeyCreditsData$outboundSchema;
36156
+ })(UpdateKeyCreditsData$ ||= {});
36157
+ });
36158
+
36110
36159
  // src/models/components/v2apiscreateapirequestbody.ts
36111
36160
  var V2ApisCreateApiRequestBody$inboundSchema, V2ApisCreateApiRequestBody$outboundSchema, V2ApisCreateApiRequestBody$;
36112
36161
  var init_v2apiscreateapirequestbody = __esm(() => {
@@ -36814,6 +36863,62 @@ var init_v2keysremoverolesresponsebody = __esm(() => {
36814
36863
  })(V2KeysRemoveRolesResponseBody$ ||= {});
36815
36864
  });
36816
36865
 
36866
+ // src/models/components/v2keysrerollkeyrequestbody.ts
36867
+ var V2KeysRerollKeyRequestBody$inboundSchema, V2KeysRerollKeyRequestBody$outboundSchema, V2KeysRerollKeyRequestBody$;
36868
+ var init_v2keysrerollkeyrequestbody = __esm(() => {
36869
+ init_zod();
36870
+ V2KeysRerollKeyRequestBody$inboundSchema = objectType({
36871
+ keyId: stringType(),
36872
+ expiration: numberType().int()
36873
+ });
36874
+ V2KeysRerollKeyRequestBody$outboundSchema = objectType({
36875
+ keyId: stringType(),
36876
+ expiration: numberType().int()
36877
+ });
36878
+ ((V2KeysRerollKeyRequestBody$) => {
36879
+ V2KeysRerollKeyRequestBody$.inboundSchema = V2KeysRerollKeyRequestBody$inboundSchema;
36880
+ V2KeysRerollKeyRequestBody$.outboundSchema = V2KeysRerollKeyRequestBody$outboundSchema;
36881
+ })(V2KeysRerollKeyRequestBody$ ||= {});
36882
+ });
36883
+
36884
+ // src/models/components/v2keysrerollkeyresponsedata.ts
36885
+ var V2KeysRerollKeyResponseData$inboundSchema, V2KeysRerollKeyResponseData$outboundSchema, V2KeysRerollKeyResponseData$;
36886
+ var init_v2keysrerollkeyresponsedata = __esm(() => {
36887
+ init_zod();
36888
+ V2KeysRerollKeyResponseData$inboundSchema = objectType({
36889
+ keyId: stringType(),
36890
+ key: stringType()
36891
+ });
36892
+ V2KeysRerollKeyResponseData$outboundSchema = objectType({
36893
+ keyId: stringType(),
36894
+ key: stringType()
36895
+ });
36896
+ ((V2KeysRerollKeyResponseData$) => {
36897
+ V2KeysRerollKeyResponseData$.inboundSchema = V2KeysRerollKeyResponseData$inboundSchema;
36898
+ V2KeysRerollKeyResponseData$.outboundSchema = V2KeysRerollKeyResponseData$outboundSchema;
36899
+ })(V2KeysRerollKeyResponseData$ ||= {});
36900
+ });
36901
+
36902
+ // src/models/components/v2keysrerollkeyresponsebody.ts
36903
+ var V2KeysRerollKeyResponseBody$inboundSchema, V2KeysRerollKeyResponseBody$outboundSchema, V2KeysRerollKeyResponseBody$;
36904
+ var init_v2keysrerollkeyresponsebody = __esm(() => {
36905
+ init_zod();
36906
+ init_meta();
36907
+ init_v2keysrerollkeyresponsedata();
36908
+ V2KeysRerollKeyResponseBody$inboundSchema = objectType({
36909
+ meta: Meta$inboundSchema,
36910
+ data: V2KeysRerollKeyResponseData$inboundSchema
36911
+ });
36912
+ V2KeysRerollKeyResponseBody$outboundSchema = objectType({
36913
+ meta: Meta$outboundSchema,
36914
+ data: V2KeysRerollKeyResponseData$outboundSchema
36915
+ });
36916
+ ((V2KeysRerollKeyResponseBody$) => {
36917
+ V2KeysRerollKeyResponseBody$.inboundSchema = V2KeysRerollKeyResponseBody$inboundSchema;
36918
+ V2KeysRerollKeyResponseBody$.outboundSchema = V2KeysRerollKeyResponseBody$outboundSchema;
36919
+ })(V2KeysRerollKeyResponseBody$ ||= {});
36920
+ });
36921
+
36817
36922
  // src/models/components/v2keyssetpermissionsrequestbody.ts
36818
36923
  var V2KeysSetPermissionsRequestBody$inboundSchema, V2KeysSetPermissionsRequestBody$outboundSchema, V2KeysSetPermissionsRequestBody$;
36819
36924
  var init_v2keyssetpermissionsrequestbody = __esm(() => {
@@ -36945,15 +37050,15 @@ var init_v2keysupdatecreditsresponsebody = __esm(() => {
36945
37050
  var V2KeysUpdateKeyRequestBody$inboundSchema, V2KeysUpdateKeyRequestBody$outboundSchema, V2KeysUpdateKeyRequestBody$;
36946
37051
  var init_v2keysupdatekeyrequestbody = __esm(() => {
36947
37052
  init_zod();
36948
- init_keycreditsdata();
36949
37053
  init_ratelimitrequest();
37054
+ init_updatekeycreditsdata();
36950
37055
  V2KeysUpdateKeyRequestBody$inboundSchema = objectType({
36951
37056
  keyId: stringType(),
36952
37057
  name: nullableType(stringType()).optional(),
36953
37058
  externalId: nullableType(stringType()).optional(),
36954
37059
  meta: nullableType(recordType(anyType())).optional(),
36955
37060
  expires: nullableType(numberType().int()).optional(),
36956
- credits: KeyCreditsData$inboundSchema.optional(),
37061
+ credits: nullableType(UpdateKeyCreditsData$inboundSchema).optional(),
36957
37062
  ratelimits: arrayType(RatelimitRequest$inboundSchema).optional(),
36958
37063
  enabled: booleanType().optional(),
36959
37064
  roles: arrayType(stringType()).optional(),
@@ -36965,7 +37070,7 @@ var init_v2keysupdatekeyrequestbody = __esm(() => {
36965
37070
  externalId: nullableType(stringType()).optional(),
36966
37071
  meta: nullableType(recordType(anyType())).optional(),
36967
37072
  expires: nullableType(numberType().int()).optional(),
36968
- credits: KeyCreditsData$outboundSchema.optional(),
37073
+ credits: nullableType(UpdateKeyCreditsData$outboundSchema).optional(),
36969
37074
  ratelimits: arrayType(RatelimitRequest$outboundSchema).optional(),
36970
37075
  enabled: booleanType().optional(),
36971
37076
  roles: arrayType(stringType()).optional(),
@@ -37778,6 +37883,8 @@ var init_components = __esm(() => {
37778
37883
  init_ratelimitresponse();
37779
37884
  init_role();
37780
37885
  init_security2();
37886
+ init_updatekeycreditsdata();
37887
+ init_updatekeycreditsrefill();
37781
37888
  init_v2apiscreateapirequestbody();
37782
37889
  init_v2apiscreateapiresponsebody();
37783
37890
  init_v2apiscreateapiresponsedata();
@@ -37814,6 +37921,9 @@ var init_components = __esm(() => {
37814
37921
  init_v2keysremovepermissionsresponsebody();
37815
37922
  init_v2keysremoverolesrequestbody();
37816
37923
  init_v2keysremoverolesresponsebody();
37924
+ init_v2keysrerollkeyrequestbody();
37925
+ init_v2keysrerollkeyresponsebody();
37926
+ init_v2keysrerollkeyresponsedata();
37817
37927
  init_v2keyssetpermissionsrequestbody();
37818
37928
  init_v2keyssetpermissionsresponsebody();
37819
37929
  init_v2keyssetrolesrequestbody();
@@ -37988,6 +38098,48 @@ var init_forbiddenerrorresponse = __esm(() => {
37988
38098
  })(ForbiddenErrorResponse$ ||= {});
37989
38099
  });
37990
38100
 
38101
+ // src/models/errors/goneerrorresponse.ts
38102
+ var GoneErrorResponse, GoneErrorResponse$inboundSchema, GoneErrorResponse$outboundSchema, GoneErrorResponse$;
38103
+ var init_goneerrorresponse = __esm(() => {
38104
+ init_zod();
38105
+ init_components();
38106
+ init_unkeyerror();
38107
+ GoneErrorResponse = class GoneErrorResponse extends UnkeyError {
38108
+ meta;
38109
+ error;
38110
+ data$;
38111
+ constructor(err, httpMeta) {
38112
+ const message = "message" in err && typeof err.message === "string" ? err.message : `API error occurred: ${JSON.stringify(err)}`;
38113
+ super(message, httpMeta);
38114
+ this.data$ = err;
38115
+ this.meta = err.meta;
38116
+ this.error = err.error;
38117
+ this.name = "GoneErrorResponse";
38118
+ }
38119
+ };
38120
+ GoneErrorResponse$inboundSchema = objectType({
38121
+ meta: Meta$inboundSchema,
38122
+ error: BaseError$inboundSchema,
38123
+ request$: instanceOfType(Request),
38124
+ response$: instanceOfType(Response),
38125
+ body$: stringType()
38126
+ }).transform((v2) => {
38127
+ return new GoneErrorResponse(v2, {
38128
+ request: v2.request$,
38129
+ response: v2.response$,
38130
+ body: v2.body$
38131
+ });
38132
+ });
38133
+ GoneErrorResponse$outboundSchema = instanceOfType(GoneErrorResponse).transform((v2) => v2.data$).pipe(objectType({
38134
+ meta: Meta$outboundSchema,
38135
+ error: BaseError$outboundSchema
38136
+ }));
38137
+ ((GoneErrorResponse$) => {
38138
+ GoneErrorResponse$.inboundSchema = GoneErrorResponse$inboundSchema;
38139
+ GoneErrorResponse$.outboundSchema = GoneErrorResponse$outboundSchema;
38140
+ })(GoneErrorResponse$ ||= {});
38141
+ });
38142
+
37991
38143
  // src/models/errors/internalservererrorresponse.ts
37992
38144
  var InternalServerErrorResponse, InternalServerErrorResponse$inboundSchema, InternalServerErrorResponse$outboundSchema, InternalServerErrorResponse$;
37993
38145
  var init_internalservererrorresponse = __esm(() => {
@@ -38162,6 +38314,7 @@ var init_errors2 = __esm(() => {
38162
38314
  init_badrequesterrorresponse();
38163
38315
  init_conflicterrorresponse();
38164
38316
  init_forbiddenerrorresponse();
38317
+ init_goneerrorresponse();
38165
38318
  init_httpclienterrors();
38166
38319
  init_internalservererrorresponse();
38167
38320
  init_notfounderrorresponse();
@@ -39203,6 +39356,9 @@ async function $do8(client, request, options) {
39203
39356
  if (typeof nextCursor !== "string") {
39204
39357
  return { next: () => null };
39205
39358
  }
39359
+ if (nextCursor.trim() === "") {
39360
+ return { next: () => null };
39361
+ }
39206
39362
  const nextVal = () => identitiesListIdentities(client, {
39207
39363
  ...request,
39208
39364
  cursor: nextCursor
@@ -40269,11 +40425,155 @@ Invalidates the key cache for immediate effect, and makes role changes available
40269
40425
  };
40270
40426
  });
40271
40427
 
40272
- // src/funcs/keysSetPermissions.ts
40273
- function keysSetPermissions(client, request, options) {
40428
+ // src/funcs/keysRerollKey.ts
40429
+ function keysRerollKey(client, request, options) {
40274
40430
  return new APIPromise($do17(client, request, options));
40275
40431
  }
40276
40432
  async function $do17(client, request, options) {
40433
+ const parsed = safeParse(request, (value) => V2KeysRerollKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40434
+ if (!parsed.ok) {
40435
+ return [parsed, { status: "invalid" }];
40436
+ }
40437
+ const payload = parsed.value;
40438
+ const body = encodeJSON("body", payload, { explode: true });
40439
+ const path = pathToFunc("/v2/keys.rerollKey")();
40440
+ const headers = new Headers(compactMap({
40441
+ "Content-Type": "application/json",
40442
+ Accept: "application/json"
40443
+ }));
40444
+ const secConfig = await extractSecurity(client._options.rootKey);
40445
+ const securityInput = secConfig == null ? {} : { rootKey: secConfig };
40446
+ const requestSecurity = resolveGlobalSecurity(securityInput);
40447
+ const context = {
40448
+ options: client._options,
40449
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
40450
+ operationID: "rerollKey",
40451
+ oAuth2Scopes: [],
40452
+ resolvedSecurity: requestSecurity,
40453
+ securitySource: client._options.rootKey,
40454
+ retryConfig: options?.retries || client._options.retryConfig || {
40455
+ strategy: "backoff",
40456
+ backoff: {
40457
+ initialInterval: 50,
40458
+ maxInterval: 1000,
40459
+ exponent: 1.5,
40460
+ maxElapsedTime: 1e4
40461
+ },
40462
+ retryConnectionErrors: true
40463
+ },
40464
+ retryCodes: options?.retryCodes || ["5XX"]
40465
+ };
40466
+ const requestRes = client._createRequest(context, {
40467
+ security: requestSecurity,
40468
+ method: "POST",
40469
+ baseURL: options?.serverURL,
40470
+ path,
40471
+ headers,
40472
+ body,
40473
+ userAgent: client._options.userAgent,
40474
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
40475
+ }, options);
40476
+ if (!requestRes.ok) {
40477
+ return [requestRes, { status: "invalid" }];
40478
+ }
40479
+ const req = requestRes.value;
40480
+ const doResult = await client._do(req, {
40481
+ context,
40482
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
40483
+ retryConfig: context.retryConfig,
40484
+ retryCodes: context.retryCodes
40485
+ });
40486
+ if (!doResult.ok) {
40487
+ return [doResult, { status: "request-error", request: req }];
40488
+ }
40489
+ const response = doResult.value;
40490
+ const responseFields = {
40491
+ HttpMeta: { Response: response, Request: req }
40492
+ };
40493
+ const [result] = await match(json(200, V2KeysRerollKeyResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
40494
+ if (!result.ok) {
40495
+ return [result, { status: "complete", request: req, response }];
40496
+ }
40497
+ return [result, { status: "complete", request: req, response }];
40498
+ }
40499
+ var init_keysRerollKey = __esm(() => {
40500
+ init_encodings();
40501
+ init_matchers();
40502
+ init_primitives();
40503
+ init_schemas();
40504
+ init_security();
40505
+ init_url();
40506
+ init_components();
40507
+ init_errors2();
40508
+ init_async();
40509
+ });
40510
+
40511
+ // src/mcp-server/tools/keysRerollKey.ts
40512
+ var args17, tool$keysRerollKey;
40513
+ var init_keysRerollKey2 = __esm(() => {
40514
+ init_keysRerollKey();
40515
+ init_components();
40516
+ init_tools();
40517
+ args17 = {
40518
+ request: V2KeysRerollKeyRequestBody$inboundSchema
40519
+ };
40520
+ tool$keysRerollKey = {
40521
+ name: "keys-reroll-key",
40522
+ description: `Reroll Key
40523
+
40524
+ Generate a new API key while preserving the configuration from an existing key.
40525
+
40526
+ This operation creates a fresh key with a new token while maintaining all settings from the original key:
40527
+ - Permissions and roles
40528
+ - Custom metadata
40529
+ - Rate limit configurations
40530
+ - Identity associations
40531
+ - Remaining credits
40532
+ - Recovery settings
40533
+
40534
+ **Key Generation:**
40535
+ - The system attempts to extract the prefix from the original key
40536
+ - If prefix extraction fails, the default API prefix is used
40537
+ - Key length follows the API's default byte configuration (or 16 bytes if not specified)
40538
+
40539
+ **Original Key Handling:**
40540
+ - The original key will be revoked after the duration specified in \`expiration\`
40541
+ - Set \`expiration\` to 0 to revoke immediately
40542
+ - This allows for graceful key rotation with an overlap period
40543
+
40544
+ Common use cases include:
40545
+ - Rotating keys for security compliance
40546
+ - Issuing replacement keys for compromised credentials
40547
+ - Creating backup keys with identical permissions
40548
+
40549
+ **Important:** Analytics and usage metrics are tracked at both the key level AND identity level. If the original key has an identity, the new key will inherit it, allowing you to track usage across both individual keys and the overall identity.
40550
+
40551
+ **Required Permissions**
40552
+
40553
+ Your root key must have:
40554
+ - \`api.*.create_key\` or \`api.<api_id>.create_key\`
40555
+ - \`api.*.encrypt_key\` or \`api.<api_id>.encrypt_key\` (only when the original key is recoverable)
40556
+ `,
40557
+ args: args17,
40558
+ tool: async (client, args18, ctx) => {
40559
+ const [result, apiCall] = await keysRerollKey(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40560
+ if (!result.ok) {
40561
+ return {
40562
+ content: [{ type: "text", text: result.error.message }],
40563
+ isError: true
40564
+ };
40565
+ }
40566
+ const value = result.value;
40567
+ return formatResult(value, apiCall);
40568
+ }
40569
+ };
40570
+ });
40571
+
40572
+ // src/funcs/keysSetPermissions.ts
40573
+ function keysSetPermissions(client, request, options) {
40574
+ return new APIPromise($do18(client, request, options));
40575
+ }
40576
+ async function $do18(client, request, options) {
40277
40577
  const parsed = safeParse(request, (value) => V2KeysSetPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
40278
40578
  if (!parsed.ok) {
40279
40579
  return [parsed, { status: "invalid" }];
@@ -40353,12 +40653,12 @@ var init_keysSetPermissions = __esm(() => {
40353
40653
  });
40354
40654
 
40355
40655
  // src/mcp-server/tools/keysSetPermissions.ts
40356
- var args17, tool$keysSetPermissions;
40656
+ var args18, tool$keysSetPermissions;
40357
40657
  var init_keysSetPermissions2 = __esm(() => {
40358
40658
  init_keysSetPermissions();
40359
40659
  init_components();
40360
40660
  init_tools();
40361
- args17 = {
40661
+ args18 = {
40362
40662
  request: V2KeysSetPermissionsRequestBody$inboundSchema
40363
40663
  };
40364
40664
  tool$keysSetPermissions = {
@@ -40381,9 +40681,9 @@ Your root key must have one of the following permissions:
40381
40681
 
40382
40682
  Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
40383
40683
  `,
40384
- args: args17,
40385
- tool: async (client, args18, ctx) => {
40386
- const [result, apiCall] = await keysSetPermissions(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40684
+ args: args18,
40685
+ tool: async (client, args19, ctx) => {
40686
+ const [result, apiCall] = await keysSetPermissions(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40387
40687
  if (!result.ok) {
40388
40688
  return {
40389
40689
  content: [{ type: "text", text: result.error.message }],
@@ -40398,9 +40698,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
40398
40698
 
40399
40699
  // src/funcs/keysSetRoles.ts
40400
40700
  function keysSetRoles(client, request, options) {
40401
- return new APIPromise($do18(client, request, options));
40701
+ return new APIPromise($do19(client, request, options));
40402
40702
  }
40403
- async function $do18(client, request, options) {
40703
+ async function $do19(client, request, options) {
40404
40704
  const parsed = safeParse(request, (value) => V2KeysSetRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
40405
40705
  if (!parsed.ok) {
40406
40706
  return [parsed, { status: "invalid" }];
@@ -40480,12 +40780,12 @@ var init_keysSetRoles = __esm(() => {
40480
40780
  });
40481
40781
 
40482
40782
  // src/mcp-server/tools/keysSetRoles.ts
40483
- var args18, tool$keysSetRoles;
40783
+ var args19, tool$keysSetRoles;
40484
40784
  var init_keysSetRoles2 = __esm(() => {
40485
40785
  init_keysSetRoles();
40486
40786
  init_components();
40487
40787
  init_tools();
40488
- args18 = {
40788
+ args19 = {
40489
40789
  request: V2KeysSetRolesRequestBody$inboundSchema
40490
40790
  };
40491
40791
  tool$keysSetRoles = {
@@ -40508,9 +40808,9 @@ Your root key must have one of the following permissions:
40508
40808
 
40509
40809
  Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
40510
40810
  `,
40511
- args: args18,
40512
- tool: async (client, args19, ctx) => {
40513
- const [result, apiCall] = await keysSetRoles(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40811
+ args: args19,
40812
+ tool: async (client, args20, ctx) => {
40813
+ const [result, apiCall] = await keysSetRoles(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40514
40814
  if (!result.ok) {
40515
40815
  return {
40516
40816
  content: [{ type: "text", text: result.error.message }],
@@ -40525,9 +40825,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
40525
40825
 
40526
40826
  // src/funcs/keysUpdateCredits.ts
40527
40827
  function keysUpdateCredits(client, request, options) {
40528
- return new APIPromise($do19(client, request, options));
40828
+ return new APIPromise($do20(client, request, options));
40529
40829
  }
40530
- async function $do19(client, request, options) {
40830
+ async function $do20(client, request, options) {
40531
40831
  const parsed = safeParse(request, (value) => V2KeysUpdateCreditsRequestBody$outboundSchema.parse(value), "Input validation failed");
40532
40832
  if (!parsed.ok) {
40533
40833
  return [parsed, { status: "invalid" }];
@@ -40607,12 +40907,12 @@ var init_keysUpdateCredits = __esm(() => {
40607
40907
  });
40608
40908
 
40609
40909
  // src/mcp-server/tools/keysUpdateCredits.ts
40610
- var args19, tool$keysUpdateCredits;
40910
+ var args20, tool$keysUpdateCredits;
40611
40911
  var init_keysUpdateCredits2 = __esm(() => {
40612
40912
  init_keysUpdateCredits();
40613
40913
  init_components();
40614
40914
  init_tools();
40615
- args19 = {
40915
+ args20 = {
40616
40916
  request: V2KeysUpdateCreditsRequestBody$inboundSchema
40617
40917
  };
40618
40918
  tool$keysUpdateCredits = {
@@ -40635,9 +40935,9 @@ Your root key must have one of the following permissions:
40635
40935
 
40636
40936
  Credit updates remove the key from cache immediately. Setting credits to unlimited automatically clears any existing refill settings. Changes take effect instantly but may take up to 30 seconds to propagate to all edge regions.
40637
40937
  `,
40638
- args: args19,
40639
- tool: async (client, args20, ctx) => {
40640
- const [result, apiCall] = await keysUpdateCredits(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40938
+ args: args20,
40939
+ tool: async (client, args21, ctx) => {
40940
+ const [result, apiCall] = await keysUpdateCredits(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40641
40941
  if (!result.ok) {
40642
40942
  return {
40643
40943
  content: [{ type: "text", text: result.error.message }],
@@ -40652,9 +40952,9 @@ Credit updates remove the key from cache immediately. Setting credits to unlimit
40652
40952
 
40653
40953
  // src/funcs/keysUpdateKey.ts
40654
40954
  function keysUpdateKey(client, request, options) {
40655
- return new APIPromise($do20(client, request, options));
40955
+ return new APIPromise($do21(client, request, options));
40656
40956
  }
40657
- async function $do20(client, request, options) {
40957
+ async function $do21(client, request, options) {
40658
40958
  const parsed = safeParse(request, (value) => V2KeysUpdateKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40659
40959
  if (!parsed.ok) {
40660
40960
  return [parsed, { status: "invalid" }];
@@ -40734,12 +41034,12 @@ var init_keysUpdateKey = __esm(() => {
40734
41034
  });
40735
41035
 
40736
41036
  // src/mcp-server/tools/keysUpdateKey.ts
40737
- var args20, tool$keysUpdateKey;
41037
+ var args21, tool$keysUpdateKey;
40738
41038
  var init_keysUpdateKey2 = __esm(() => {
40739
41039
  init_keysUpdateKey();
40740
41040
  init_components();
40741
41041
  init_tools();
40742
- args20 = {
41042
+ args21 = {
40743
41043
  request: V2KeysUpdateKeyRequestBody$inboundSchema
40744
41044
  };
40745
41045
  tool$keysUpdateKey = {
@@ -40762,9 +41062,9 @@ Your root key must have one of the following permissions:
40762
41062
 
40763
41063
  If you specify an \`externalId\` that doesn't exist, a new identity will be automatically created and linked to the key. Permission updates will auto-create any permissions that don't exist in your workspace. Changes take effect immediately but may take up to 30 seconds to propagate to all edge regions due to cache invalidation.
40764
41064
  `,
40765
- args: args20,
40766
- tool: async (client, args21, ctx) => {
40767
- const [result, apiCall] = await keysUpdateKey(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41065
+ args: args21,
41066
+ tool: async (client, args22, ctx) => {
41067
+ const [result, apiCall] = await keysUpdateKey(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40768
41068
  if (!result.ok) {
40769
41069
  return {
40770
41070
  content: [{ type: "text", text: result.error.message }],
@@ -40779,9 +41079,9 @@ If you specify an \`externalId\` that doesn't exist, a new identity will be auto
40779
41079
 
40780
41080
  // src/funcs/keysVerifyKey.ts
40781
41081
  function keysVerifyKey(client, request, options) {
40782
- return new APIPromise($do21(client, request, options));
41082
+ return new APIPromise($do22(client, request, options));
40783
41083
  }
40784
- async function $do21(client, request, options) {
41084
+ async function $do22(client, request, options) {
40785
41085
  const parsed = safeParse(request, (value) => V2KeysVerifyKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40786
41086
  if (!parsed.ok) {
40787
41087
  return [parsed, { status: "invalid" }];
@@ -40861,12 +41161,12 @@ var init_keysVerifyKey = __esm(() => {
40861
41161
  });
40862
41162
 
40863
41163
  // src/mcp-server/tools/keysVerifyKey.ts
40864
- var args21, tool$keysVerifyKey;
41164
+ var args22, tool$keysVerifyKey;
40865
41165
  var init_keysVerifyKey2 = __esm(() => {
40866
41166
  init_keysVerifyKey();
40867
41167
  init_components();
40868
41168
  init_tools();
40869
- args21 = {
41169
+ args22 = {
40870
41170
  request: V2KeysVerifyKeyRequestBody$inboundSchema
40871
41171
  };
40872
41172
  tool$keysVerifyKey = {
@@ -40892,9 +41192,9 @@ Your root key needs one of:
40892
41192
 
40893
41193
  If you are getting a NOT_FOUND error, ensure your root key has the required verify key permissions.
40894
41194
  `,
40895
- args: args21,
40896
- tool: async (client, args22, ctx) => {
40897
- const [result, apiCall] = await keysVerifyKey(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41195
+ args: args22,
41196
+ tool: async (client, args23, ctx) => {
41197
+ const [result, apiCall] = await keysVerifyKey(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40898
41198
  if (!result.ok) {
40899
41199
  return {
40900
41200
  content: [{ type: "text", text: result.error.message }],
@@ -40909,9 +41209,9 @@ If you are getting a NOT_FOUND error, ensure your root key has the required veri
40909
41209
 
40910
41210
  // src/funcs/keysWhoami.ts
40911
41211
  function keysWhoami(client, request, options) {
40912
- return new APIPromise($do22(client, request, options));
41212
+ return new APIPromise($do23(client, request, options));
40913
41213
  }
40914
- async function $do22(client, request, options) {
41214
+ async function $do23(client, request, options) {
40915
41215
  const parsed = safeParse(request, (value) => V2KeysWhoamiRequestBody$outboundSchema.parse(value), "Input validation failed");
40916
41216
  if (!parsed.ok) {
40917
41217
  return [parsed, { status: "invalid" }];
@@ -40991,12 +41291,12 @@ var init_keysWhoami = __esm(() => {
40991
41291
  });
40992
41292
 
40993
41293
  // src/mcp-server/tools/keysWhoami.ts
40994
- var args22, tool$keysWhoami;
41294
+ var args23, tool$keysWhoami;
40995
41295
  var init_keysWhoami2 = __esm(() => {
40996
41296
  init_keysWhoami();
40997
41297
  init_components();
40998
41298
  init_tools();
40999
- args22 = {
41299
+ args23 = {
41000
41300
  request: V2KeysWhoamiRequestBody$inboundSchema
41001
41301
  };
41002
41302
  tool$keysWhoami = {
@@ -41013,9 +41313,9 @@ Your root key must have one of the following permissions for basic key informati
41013
41313
 
41014
41314
  If your rootkey lacks permissions but the key exists, we may return a 404 status here to prevent leaking the existance of a key to unauthorized clients. If you believe that a key should exist, but receive a 404, please double check your root key has the correct permissions.
41015
41315
  `,
41016
- args: args22,
41017
- tool: async (client, args23, ctx) => {
41018
- const [result, apiCall] = await keysWhoami(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41316
+ args: args23,
41317
+ tool: async (client, args24, ctx) => {
41318
+ const [result, apiCall] = await keysWhoami(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41019
41319
  if (!result.ok) {
41020
41320
  return {
41021
41321
  content: [{ type: "text", text: result.error.message }],
@@ -41030,9 +41330,9 @@ If your rootkey lacks permissions but the key exists, we may return a 404 status
41030
41330
 
41031
41331
  // src/funcs/permissionsCreatePermission.ts
41032
41332
  function permissionsCreatePermission(client, request, options) {
41033
- return new APIPromise($do23(client, request, options));
41333
+ return new APIPromise($do24(client, request, options));
41034
41334
  }
41035
- async function $do23(client, request, options) {
41335
+ async function $do24(client, request, options) {
41036
41336
  const parsed = safeParse(request, (value) => V2PermissionsCreatePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41037
41337
  if (!parsed.ok) {
41038
41338
  return [parsed, { status: "invalid" }];
@@ -41112,12 +41412,12 @@ var init_permissionsCreatePermission = __esm(() => {
41112
41412
  });
41113
41413
 
41114
41414
  // src/mcp-server/tools/permissionsCreatePermission.ts
41115
- var args23, tool$permissionsCreatePermission;
41415
+ var args24, tool$permissionsCreatePermission;
41116
41416
  var init_permissionsCreatePermission2 = __esm(() => {
41117
41417
  init_permissionsCreatePermission();
41118
41418
  init_components();
41119
41419
  init_tools();
41120
- args23 = {
41420
+ args24 = {
41121
41421
  request: V2PermissionsCreatePermissionRequestBody$inboundSchema
41122
41422
  };
41123
41423
  tool$permissionsCreatePermission = {
@@ -41135,9 +41435,9 @@ Use hierarchical naming patterns like \`documents.read\`, \`admin.users.delete\`
41135
41435
  Your root key must have the following permission:
41136
41436
  - \`rbac.*.create_permission\`
41137
41437
  `,
41138
- args: args23,
41139
- tool: async (client, args24, ctx) => {
41140
- const [result, apiCall] = await permissionsCreatePermission(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41438
+ args: args24,
41439
+ tool: async (client, args25, ctx) => {
41440
+ const [result, apiCall] = await permissionsCreatePermission(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41141
41441
  if (!result.ok) {
41142
41442
  return {
41143
41443
  content: [{ type: "text", text: result.error.message }],
@@ -41152,9 +41452,9 @@ Your root key must have the following permission:
41152
41452
 
41153
41453
  // src/funcs/permissionsCreateRole.ts
41154
41454
  function permissionsCreateRole(client, request, options) {
41155
- return new APIPromise($do24(client, request, options));
41455
+ return new APIPromise($do25(client, request, options));
41156
41456
  }
41157
- async function $do24(client, request, options) {
41457
+ async function $do25(client, request, options) {
41158
41458
  const parsed = safeParse(request, (value) => V2PermissionsCreateRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41159
41459
  if (!parsed.ok) {
41160
41460
  return [parsed, { status: "invalid" }];
@@ -41234,12 +41534,12 @@ var init_permissionsCreateRole = __esm(() => {
41234
41534
  });
41235
41535
 
41236
41536
  // src/mcp-server/tools/permissionsCreateRole.ts
41237
- var args24, tool$permissionsCreateRole;
41537
+ var args25, tool$permissionsCreateRole;
41238
41538
  var init_permissionsCreateRole2 = __esm(() => {
41239
41539
  init_permissionsCreateRole();
41240
41540
  init_components();
41241
41541
  init_tools();
41242
- args24 = {
41542
+ args25 = {
41243
41543
  request: V2PermissionsCreateRoleRequestBody$inboundSchema
41244
41544
  };
41245
41545
  tool$permissionsCreateRole = {
@@ -41255,9 +41555,9 @@ Create a new role to group related permissions for easier management. Roles enab
41255
41555
  Your root key must have the following permission:
41256
41556
  - \`rbac.*.create_role\`
41257
41557
  `,
41258
- args: args24,
41259
- tool: async (client, args25, ctx) => {
41260
- const [result, apiCall] = await permissionsCreateRole(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41558
+ args: args25,
41559
+ tool: async (client, args26, ctx) => {
41560
+ const [result, apiCall] = await permissionsCreateRole(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41261
41561
  if (!result.ok) {
41262
41562
  return {
41263
41563
  content: [{ type: "text", text: result.error.message }],
@@ -41272,9 +41572,9 @@ Your root key must have the following permission:
41272
41572
 
41273
41573
  // src/funcs/permissionsDeletePermission.ts
41274
41574
  function permissionsDeletePermission(client, request, options) {
41275
- return new APIPromise($do25(client, request, options));
41575
+ return new APIPromise($do26(client, request, options));
41276
41576
  }
41277
- async function $do25(client, request, options) {
41577
+ async function $do26(client, request, options) {
41278
41578
  const parsed = safeParse(request, (value) => V2PermissionsDeletePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41279
41579
  if (!parsed.ok) {
41280
41580
  return [parsed, { status: "invalid" }];
@@ -41354,12 +41654,12 @@ var init_permissionsDeletePermission = __esm(() => {
41354
41654
  });
41355
41655
 
41356
41656
  // src/mcp-server/tools/permissionsDeletePermission.ts
41357
- var args25, tool$permissionsDeletePermission;
41657
+ var args26, tool$permissionsDeletePermission;
41358
41658
  var init_permissionsDeletePermission2 = __esm(() => {
41359
41659
  init_permissionsDeletePermission();
41360
41660
  init_components();
41361
41661
  init_tools();
41362
- args25 = {
41662
+ args26 = {
41363
41663
  request: V2PermissionsDeletePermissionRequestBody$inboundSchema
41364
41664
  };
41365
41665
  tool$permissionsDeletePermission = {
@@ -41375,9 +41675,9 @@ Remove a permission from your workspace. This also removes the permission from a
41375
41675
  Your root key must have the following permission:
41376
41676
  - \`rbac.*.delete_permission\`
41377
41677
  `,
41378
- args: args25,
41379
- tool: async (client, args26, ctx) => {
41380
- const [result, apiCall] = await permissionsDeletePermission(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41678
+ args: args26,
41679
+ tool: async (client, args27, ctx) => {
41680
+ const [result, apiCall] = await permissionsDeletePermission(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41381
41681
  if (!result.ok) {
41382
41682
  return {
41383
41683
  content: [{ type: "text", text: result.error.message }],
@@ -41392,9 +41692,9 @@ Your root key must have the following permission:
41392
41692
 
41393
41693
  // src/funcs/permissionsDeleteRole.ts
41394
41694
  function permissionsDeleteRole(client, request, options) {
41395
- return new APIPromise($do26(client, request, options));
41695
+ return new APIPromise($do27(client, request, options));
41396
41696
  }
41397
- async function $do26(client, request, options) {
41697
+ async function $do27(client, request, options) {
41398
41698
  const parsed = safeParse(request, (value) => V2PermissionsDeleteRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41399
41699
  if (!parsed.ok) {
41400
41700
  return [parsed, { status: "invalid" }];
@@ -41474,12 +41774,12 @@ var init_permissionsDeleteRole = __esm(() => {
41474
41774
  });
41475
41775
 
41476
41776
  // src/mcp-server/tools/permissionsDeleteRole.ts
41477
- var args26, tool$permissionsDeleteRole;
41777
+ var args27, tool$permissionsDeleteRole;
41478
41778
  var init_permissionsDeleteRole2 = __esm(() => {
41479
41779
  init_permissionsDeleteRole();
41480
41780
  init_components();
41481
41781
  init_tools();
41482
- args26 = {
41782
+ args27 = {
41483
41783
  request: V2PermissionsDeleteRoleRequestBody$inboundSchema
41484
41784
  };
41485
41785
  tool$permissionsDeleteRole = {
@@ -41495,9 +41795,9 @@ Remove a role from your workspace. This also removes the role from all assigned
41495
41795
  Your root key must have the following permission:
41496
41796
  - \`rbac.*.delete_role\`
41497
41797
  `,
41498
- args: args26,
41499
- tool: async (client, args27, ctx) => {
41500
- const [result, apiCall] = await permissionsDeleteRole(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41798
+ args: args27,
41799
+ tool: async (client, args28, ctx) => {
41800
+ const [result, apiCall] = await permissionsDeleteRole(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41501
41801
  if (!result.ok) {
41502
41802
  return {
41503
41803
  content: [{ type: "text", text: result.error.message }],
@@ -41512,9 +41812,9 @@ Your root key must have the following permission:
41512
41812
 
41513
41813
  // src/funcs/permissionsGetPermission.ts
41514
41814
  function permissionsGetPermission(client, request, options) {
41515
- return new APIPromise($do27(client, request, options));
41815
+ return new APIPromise($do28(client, request, options));
41516
41816
  }
41517
- async function $do27(client, request, options) {
41817
+ async function $do28(client, request, options) {
41518
41818
  const parsed = safeParse(request, (value) => V2PermissionsGetPermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41519
41819
  if (!parsed.ok) {
41520
41820
  return [parsed, { status: "invalid" }];
@@ -41594,12 +41894,12 @@ var init_permissionsGetPermission = __esm(() => {
41594
41894
  });
41595
41895
 
41596
41896
  // src/mcp-server/tools/permissionsGetPermission.ts
41597
- var args27, tool$permissionsGetPermission;
41897
+ var args28, tool$permissionsGetPermission;
41598
41898
  var init_permissionsGetPermission2 = __esm(() => {
41599
41899
  init_permissionsGetPermission();
41600
41900
  init_components();
41601
41901
  init_tools();
41602
- args27 = {
41902
+ args28 = {
41603
41903
  request: V2PermissionsGetPermissionRequestBody$inboundSchema
41604
41904
  };
41605
41905
  tool$permissionsGetPermission = {
@@ -41613,9 +41913,9 @@ Retrieve details about a specific permission including its name, description, an
41613
41913
  Your root key must have the following permission:
41614
41914
  - \`rbac.*.read_permission\`
41615
41915
  `,
41616
- args: args27,
41617
- tool: async (client, args28, ctx) => {
41618
- const [result, apiCall] = await permissionsGetPermission(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41916
+ args: args28,
41917
+ tool: async (client, args29, ctx) => {
41918
+ const [result, apiCall] = await permissionsGetPermission(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41619
41919
  if (!result.ok) {
41620
41920
  return {
41621
41921
  content: [{ type: "text", text: result.error.message }],
@@ -41630,9 +41930,9 @@ Your root key must have the following permission:
41630
41930
 
41631
41931
  // src/funcs/permissionsGetRole.ts
41632
41932
  function permissionsGetRole(client, request, options) {
41633
- return new APIPromise($do28(client, request, options));
41933
+ return new APIPromise($do29(client, request, options));
41634
41934
  }
41635
- async function $do28(client, request, options) {
41935
+ async function $do29(client, request, options) {
41636
41936
  const parsed = safeParse(request, (value) => V2PermissionsGetRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41637
41937
  if (!parsed.ok) {
41638
41938
  return [parsed, { status: "invalid" }];
@@ -41712,12 +42012,12 @@ var init_permissionsGetRole = __esm(() => {
41712
42012
  });
41713
42013
 
41714
42014
  // src/mcp-server/tools/permissionsGetRole.ts
41715
- var args28, tool$permissionsGetRole;
42015
+ var args29, tool$permissionsGetRole;
41716
42016
  var init_permissionsGetRole2 = __esm(() => {
41717
42017
  init_permissionsGetRole();
41718
42018
  init_components();
41719
42019
  init_tools();
41720
- args28 = {
42020
+ args29 = {
41721
42021
  request: V2PermissionsGetRoleRequestBody$inboundSchema
41722
42022
  };
41723
42023
  tool$permissionsGetRole = {
@@ -41731,9 +42031,9 @@ Retrieve details about a specific role including its assigned permissions.
41731
42031
  Your root key must have the following permission:
41732
42032
  - \`rbac.*.read_role\`
41733
42033
  `,
41734
- args: args28,
41735
- tool: async (client, args29, ctx) => {
41736
- const [result, apiCall] = await permissionsGetRole(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42034
+ args: args29,
42035
+ tool: async (client, args30, ctx) => {
42036
+ const [result, apiCall] = await permissionsGetRole(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41737
42037
  if (!result.ok) {
41738
42038
  return {
41739
42039
  content: [{ type: "text", text: result.error.message }],
@@ -41748,9 +42048,9 @@ Your root key must have the following permission:
41748
42048
 
41749
42049
  // src/funcs/permissionsListPermissions.ts
41750
42050
  function permissionsListPermissions(client, request, options) {
41751
- return new APIPromise($do29(client, request, options));
42051
+ return new APIPromise($do30(client, request, options));
41752
42052
  }
41753
- async function $do29(client, request, options) {
42053
+ async function $do30(client, request, options) {
41754
42054
  const parsed = safeParse(request, (value) => V2PermissionsListPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
41755
42055
  if (!parsed.ok) {
41756
42056
  return [parsed, { status: "invalid" }];
@@ -41830,28 +42130,29 @@ var init_permissionsListPermissions = __esm(() => {
41830
42130
  });
41831
42131
 
41832
42132
  // src/mcp-server/tools/permissionsListPermissions.ts
41833
- var args29, tool$permissionsListPermissions;
42133
+ var args30, tool$permissionsListPermissions;
41834
42134
  var init_permissionsListPermissions2 = __esm(() => {
41835
42135
  init_permissionsListPermissions();
41836
42136
  init_components();
41837
42137
  init_tools();
41838
- args29 = {
42138
+ args30 = {
41839
42139
  request: V2PermissionsListPermissionsRequestBody$inboundSchema
41840
42140
  };
41841
42141
  tool$permissionsListPermissions = {
41842
42142
  name: "permissions-list-permissions",
41843
42143
  description: `List permissions
41844
42144
 
41845
- Retrieve all permissions in your workspace. Results are paginated and sorted alphabetically by permission name.
42145
+ Retrieve all permissions in your workspace.
42146
+ Results are paginated and sorted by their id.
41846
42147
 
41847
42148
  **Required Permissions**
41848
42149
 
41849
42150
  Your root key must have the following permission:
41850
42151
  - \`rbac.*.read_permission\`
41851
42152
  `,
41852
- args: args29,
41853
- tool: async (client, args30, ctx) => {
41854
- const [result, apiCall] = await permissionsListPermissions(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42153
+ args: args30,
42154
+ tool: async (client, args31, ctx) => {
42155
+ const [result, apiCall] = await permissionsListPermissions(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41855
42156
  if (!result.ok) {
41856
42157
  return {
41857
42158
  content: [{ type: "text", text: result.error.message }],
@@ -41866,9 +42167,9 @@ Your root key must have the following permission:
41866
42167
 
41867
42168
  // src/funcs/permissionsListRoles.ts
41868
42169
  function permissionsListRoles(client, request, options) {
41869
- return new APIPromise($do30(client, request, options));
42170
+ return new APIPromise($do31(client, request, options));
41870
42171
  }
41871
- async function $do30(client, request, options) {
42172
+ async function $do31(client, request, options) {
41872
42173
  const parsed = safeParse(request, (value) => V2PermissionsListRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
41873
42174
  if (!parsed.ok) {
41874
42175
  return [parsed, { status: "invalid" }];
@@ -41948,28 +42249,29 @@ var init_permissionsListRoles = __esm(() => {
41948
42249
  });
41949
42250
 
41950
42251
  // src/mcp-server/tools/permissionsListRoles.ts
41951
- var args30, tool$permissionsListRoles;
42252
+ var args31, tool$permissionsListRoles;
41952
42253
  var init_permissionsListRoles2 = __esm(() => {
41953
42254
  init_permissionsListRoles();
41954
42255
  init_components();
41955
42256
  init_tools();
41956
- args30 = {
42257
+ args31 = {
41957
42258
  request: V2PermissionsListRolesRequestBody$inboundSchema
41958
42259
  };
41959
42260
  tool$permissionsListRoles = {
41960
42261
  name: "permissions-list-roles",
41961
42262
  description: `List roles
41962
42263
 
41963
- Retrieve all roles in your workspace including their assigned permissions. Results are paginated and sorted alphabetically by role name.
42264
+ Retrieve all roles in your workspace including their assigned permissions.
42265
+ Results are paginated and sorted by their id.
41964
42266
 
41965
42267
  **Required Permissions**
41966
42268
 
41967
42269
  Your root key must have the following permission:
41968
42270
  - \`rbac.*.read_role\`
41969
42271
  `,
41970
- args: args30,
41971
- tool: async (client, args31, ctx) => {
41972
- const [result, apiCall] = await permissionsListRoles(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42272
+ args: args31,
42273
+ tool: async (client, args32, ctx) => {
42274
+ const [result, apiCall] = await permissionsListRoles(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41973
42275
  if (!result.ok) {
41974
42276
  return {
41975
42277
  content: [{ type: "text", text: result.error.message }],
@@ -41984,9 +42286,9 @@ Your root key must have the following permission:
41984
42286
 
41985
42287
  // src/funcs/ratelimitDeleteOverride.ts
41986
42288
  function ratelimitDeleteOverride(client, request, options) {
41987
- return new APIPromise($do31(client, request, options));
42289
+ return new APIPromise($do32(client, request, options));
41988
42290
  }
41989
- async function $do31(client, request, options) {
42291
+ async function $do32(client, request, options) {
41990
42292
  const parsed = safeParse(request, (value) => V2RatelimitDeleteOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
41991
42293
  if (!parsed.ok) {
41992
42294
  return [parsed, { status: "invalid" }];
@@ -42066,12 +42368,12 @@ var init_ratelimitDeleteOverride = __esm(() => {
42066
42368
  });
42067
42369
 
42068
42370
  // src/mcp-server/tools/ratelimitDeleteOverride.ts
42069
- var args31, tool$ratelimitDeleteOverride;
42371
+ var args32, tool$ratelimitDeleteOverride;
42070
42372
  var init_ratelimitDeleteOverride2 = __esm(() => {
42071
42373
  init_ratelimitDeleteOverride();
42072
42374
  init_components();
42073
42375
  init_tools();
42074
- args31 = {
42376
+ args32 = {
42075
42377
  request: V2RatelimitDeleteOverrideRequestBody$inboundSchema
42076
42378
  };
42077
42379
  tool$ratelimitDeleteOverride = {
@@ -42086,9 +42388,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
42086
42388
 
42087
42389
  **Permissions:** Requires \`ratelimit.*.delete_override\` or \`ratelimit.<namespace_id>.delete_override\`
42088
42390
  `,
42089
- args: args31,
42090
- tool: async (client, args32, ctx) => {
42091
- const [result, apiCall] = await ratelimitDeleteOverride(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42391
+ args: args32,
42392
+ tool: async (client, args33, ctx) => {
42393
+ const [result, apiCall] = await ratelimitDeleteOverride(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42092
42394
  if (!result.ok) {
42093
42395
  return {
42094
42396
  content: [{ type: "text", text: result.error.message }],
@@ -42103,9 +42405,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
42103
42405
 
42104
42406
  // src/funcs/ratelimitGetOverride.ts
42105
42407
  function ratelimitGetOverride(client, request, options) {
42106
- return new APIPromise($do32(client, request, options));
42408
+ return new APIPromise($do33(client, request, options));
42107
42409
  }
42108
- async function $do32(client, request, options) {
42410
+ async function $do33(client, request, options) {
42109
42411
  const parsed = safeParse(request, (value) => V2RatelimitGetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42110
42412
  if (!parsed.ok) {
42111
42413
  return [parsed, { status: "invalid" }];
@@ -42185,12 +42487,12 @@ var init_ratelimitGetOverride = __esm(() => {
42185
42487
  });
42186
42488
 
42187
42489
  // src/mcp-server/tools/ratelimitGetOverride.ts
42188
- var args32, tool$ratelimitGetOverride;
42490
+ var args33, tool$ratelimitGetOverride;
42189
42491
  var init_ratelimitGetOverride2 = __esm(() => {
42190
42492
  init_ratelimitGetOverride();
42191
42493
  init_components();
42192
42494
  init_tools();
42193
- args32 = {
42495
+ args33 = {
42194
42496
  request: V2RatelimitGetOverrideRequestBody$inboundSchema
42195
42497
  };
42196
42498
  tool$ratelimitGetOverride = {
@@ -42205,9 +42507,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
42205
42507
 
42206
42508
  **Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
42207
42509
  `,
42208
- args: args32,
42209
- tool: async (client, args33, ctx) => {
42210
- const [result, apiCall] = await ratelimitGetOverride(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42510
+ args: args33,
42511
+ tool: async (client, args34, ctx) => {
42512
+ const [result, apiCall] = await ratelimitGetOverride(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42211
42513
  if (!result.ok) {
42212
42514
  return {
42213
42515
  content: [{ type: "text", text: result.error.message }],
@@ -42222,9 +42524,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
42222
42524
 
42223
42525
  // src/funcs/ratelimitLimit.ts
42224
42526
  function ratelimitLimit(client, request, options) {
42225
- return new APIPromise($do33(client, request, options));
42527
+ return new APIPromise($do34(client, request, options));
42226
42528
  }
42227
- async function $do33(client, request, options) {
42529
+ async function $do34(client, request, options) {
42228
42530
  const parsed = safeParse(request, (value) => V2RatelimitLimitRequestBody$outboundSchema.parse(value), "Input validation failed");
42229
42531
  if (!parsed.ok) {
42230
42532
  return [parsed, { status: "invalid" }];
@@ -42274,7 +42576,7 @@ async function $do33(client, request, options) {
42274
42576
  const req = requestRes.value;
42275
42577
  const doResult = await client._do(req, {
42276
42578
  context,
42277
- errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
42579
+ errorCodes: ["400", "401", "403", "404", "410", "4XX", "500", "5XX"],
42278
42580
  retryConfig: context.retryConfig,
42279
42581
  retryCodes: context.retryCodes
42280
42582
  });
@@ -42285,7 +42587,7 @@ async function $do33(client, request, options) {
42285
42587
  const responseFields = {
42286
42588
  HttpMeta: { Response: response, Request: req }
42287
42589
  };
42288
- const [result] = await match(json(200, V2RatelimitLimitResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
42590
+ const [result] = await match(json(200, V2RatelimitLimitResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(410, GoneErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
42289
42591
  if (!result.ok) {
42290
42592
  return [result, { status: "complete", request: req, response }];
42291
42593
  }
@@ -42304,12 +42606,12 @@ var init_ratelimitLimit = __esm(() => {
42304
42606
  });
42305
42607
 
42306
42608
  // src/mcp-server/tools/ratelimitLimit.ts
42307
- var args33, tool$ratelimitLimit;
42609
+ var args34, tool$ratelimitLimit;
42308
42610
  var init_ratelimitLimit2 = __esm(() => {
42309
42611
  init_ratelimitLimit();
42310
42612
  init_components();
42311
42613
  init_tools();
42312
- args33 = {
42614
+ args34 = {
42313
42615
  request: V2RatelimitLimitRequestBody$inboundSchema
42314
42616
  };
42315
42617
  tool$ratelimitLimit = {
@@ -42320,7 +42622,7 @@ Check and enforce rate limits for any identifier (user ID, IP address, API clien
42320
42622
 
42321
42623
  Use this for rate limiting beyond API keys - limit users by ID, IPs by address, or any custom identifier. Supports namespace organization, variable costs, and custom overrides.
42322
42624
 
42323
- **Important**: Always returns HTTP 200. Check the \`success\` field to determine if the request should proceed.
42625
+ **Response Codes**: Rate limit checks return HTTP 200 regardless of whether the limit is exceeded - check the \`success\` field in the response to determine if the request should be allowed. 4xx responses indicate auth, namespace existence/deletion, or validation errors (e.g., 410 Gone for deleted namespaces). 5xx responses indicate server errors.
42324
42626
 
42325
42627
  **Required Permissions**
42326
42628
 
@@ -42332,9 +42634,9 @@ Your root key must have one of the following permissions:
42332
42634
 
42333
42635
  Records rate limit metrics for analytics and monitoring, updates rate limit counters with sliding window algorithm, and optionally triggers override matching for custom limits.
42334
42636
  `,
42335
- args: args33,
42336
- tool: async (client, args34, ctx) => {
42337
- const [result, apiCall] = await ratelimitLimit(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42637
+ args: args34,
42638
+ tool: async (client, args35, ctx) => {
42639
+ const [result, apiCall] = await ratelimitLimit(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42338
42640
  if (!result.ok) {
42339
42641
  return {
42340
42642
  content: [{ type: "text", text: result.error.message }],
@@ -42349,9 +42651,9 @@ Records rate limit metrics for analytics and monitoring, updates rate limit coun
42349
42651
 
42350
42652
  // src/funcs/ratelimitListOverrides.ts
42351
42653
  function ratelimitListOverrides(client, request, options) {
42352
- return new APIPromise($do34(client, request, options));
42654
+ return new APIPromise($do35(client, request, options));
42353
42655
  }
42354
- async function $do34(client, request, options) {
42656
+ async function $do35(client, request, options) {
42355
42657
  const parsed = safeParse(request, (value) => V2RatelimitListOverridesRequestBody$outboundSchema.parse(value), "Input validation failed");
42356
42658
  if (!parsed.ok) {
42357
42659
  return [parsed, { status: "invalid" }];
@@ -42431,12 +42733,12 @@ var init_ratelimitListOverrides = __esm(() => {
42431
42733
  });
42432
42734
 
42433
42735
  // src/mcp-server/tools/ratelimitListOverrides.ts
42434
- var args34, tool$ratelimitListOverrides;
42736
+ var args35, tool$ratelimitListOverrides;
42435
42737
  var init_ratelimitListOverrides2 = __esm(() => {
42436
42738
  init_ratelimitListOverrides();
42437
42739
  init_components();
42438
42740
  init_tools();
42439
- args34 = {
42741
+ args35 = {
42440
42742
  request: V2RatelimitListOverridesRequestBody$inboundSchema
42441
42743
  };
42442
42744
  tool$ratelimitListOverrides = {
@@ -42451,9 +42753,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
42451
42753
 
42452
42754
  **Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
42453
42755
  `,
42454
- args: args34,
42455
- tool: async (client, args35, ctx) => {
42456
- const [result, apiCall] = await ratelimitListOverrides(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42756
+ args: args35,
42757
+ tool: async (client, args36, ctx) => {
42758
+ const [result, apiCall] = await ratelimitListOverrides(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42457
42759
  if (!result.ok) {
42458
42760
  return {
42459
42761
  content: [{ type: "text", text: result.error.message }],
@@ -42468,9 +42770,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
42468
42770
 
42469
42771
  // src/funcs/ratelimitSetOverride.ts
42470
42772
  function ratelimitSetOverride(client, request, options) {
42471
- return new APIPromise($do35(client, request, options));
42773
+ return new APIPromise($do36(client, request, options));
42472
42774
  }
42473
- async function $do35(client, request, options) {
42775
+ async function $do36(client, request, options) {
42474
42776
  const parsed = safeParse(request, (value) => V2RatelimitSetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42475
42777
  if (!parsed.ok) {
42476
42778
  return [parsed, { status: "invalid" }];
@@ -42550,12 +42852,12 @@ var init_ratelimitSetOverride = __esm(() => {
42550
42852
  });
42551
42853
 
42552
42854
  // src/mcp-server/tools/ratelimitSetOverride.ts
42553
- var args35, tool$ratelimitSetOverride;
42855
+ var args36, tool$ratelimitSetOverride;
42554
42856
  var init_ratelimitSetOverride2 = __esm(() => {
42555
42857
  init_ratelimitSetOverride();
42556
42858
  init_components();
42557
42859
  init_tools();
42558
- args35 = {
42860
+ args36 = {
42559
42861
  request: V2RatelimitSetOverrideRequestBody$inboundSchema
42560
42862
  };
42561
42863
  tool$ratelimitSetOverride = {
@@ -42570,9 +42872,9 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
42570
42872
 
42571
42873
  **Permissions:** Requires \`ratelimit.*.set_override\` or \`ratelimit.<namespace_id>.set_override\`
42572
42874
  `,
42573
- args: args35,
42574
- tool: async (client, args36, ctx) => {
42575
- const [result, apiCall] = await ratelimitSetOverride(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42875
+ args: args36,
42876
+ tool: async (client, args37, ctx) => {
42877
+ const [result, apiCall] = await ratelimitSetOverride(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42576
42878
  if (!result.ok) {
42577
42879
  return {
42578
42880
  content: [{ type: "text", text: result.error.message }],
@@ -42589,7 +42891,7 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
42589
42891
  function createMCPServer(deps) {
42590
42892
  const server = new McpServer({
42591
42893
  name: "Unkey",
42592
- version: "2.0.3"
42894
+ version: "2.0.5"
42593
42895
  });
42594
42896
  const client = new UnkeyCore({
42595
42897
  rootKey: deps.rootKey,
@@ -42619,6 +42921,7 @@ function createMCPServer(deps) {
42619
42921
  tool(tool$keysGetKey);
42620
42922
  tool(tool$keysRemovePermissions);
42621
42923
  tool(tool$keysRemoveRoles);
42924
+ tool(tool$keysRerollKey);
42622
42925
  tool(tool$keysSetPermissions);
42623
42926
  tool(tool$keysSetRoles);
42624
42927
  tool(tool$keysUpdateCredits);
@@ -42661,6 +42964,7 @@ var init_server2 = __esm(() => {
42661
42964
  init_keysGetKey2();
42662
42965
  init_keysRemovePermissions2();
42663
42966
  init_keysRemoveRoles2();
42967
+ init_keysRerollKey2();
42664
42968
  init_keysSetPermissions2();
42665
42969
  init_keysSetRoles2();
42666
42970
  init_keysUpdateCredits2();
@@ -43875,7 +44179,7 @@ var routes = ln({
43875
44179
  var app = _e(routes, {
43876
44180
  name: "mcp",
43877
44181
  versionInfo: {
43878
- currentVersion: "2.0.3"
44182
+ currentVersion: "2.0.5"
43879
44183
  }
43880
44184
  });
43881
44185
  Yt(app, process3.argv.slice(2), buildContext(process3));
@@ -43883,5 +44187,5 @@ export {
43883
44187
  app
43884
44188
  };
43885
44189
 
43886
- //# debugId=3661F440CC19596D64756E2164756E21
44190
+ //# debugId=F5367D37EBBC8D0864756E2164756E21
43887
44191
  //# sourceMappingURL=mcp-server.js.map