@unkey/api 2.1.0 → 2.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +10 -6
- package/bin/mcp-server.js +568 -166
- package/bin/mcp-server.js.map +23 -11
- package/dist/commonjs/funcs/keysMigrateKeys.d.ts +23 -0
- package/dist/commonjs/funcs/keysMigrateKeys.d.ts.map +1 -0
- package/dist/commonjs/funcs/keysMigrateKeys.js +133 -0
- package/dist/commonjs/funcs/keysMigrateKeys.js.map +1 -0
- package/dist/commonjs/funcs/ratelimitLimit.d.ts +0 -4
- package/dist/commonjs/funcs/ratelimitLimit.d.ts.map +1 -1
- package/dist/commonjs/funcs/ratelimitLimit.js +0 -4
- package/dist/commonjs/funcs/ratelimitLimit.js.map +1 -1
- package/dist/commonjs/funcs/ratelimitMultiLimit.d.ts +28 -0
- package/dist/commonjs/funcs/ratelimitMultiLimit.d.ts.map +1 -0
- package/dist/commonjs/funcs/ratelimitMultiLimit.js +139 -0
- package/dist/commonjs/funcs/ratelimitMultiLimit.js.map +1 -0
- package/dist/commonjs/lib/config.d.ts +3 -3
- package/dist/commonjs/lib/config.js +3 -3
- package/dist/commonjs/mcp-server/mcp-server.js +1 -1
- package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/server.js +5 -1
- package/dist/commonjs/mcp-server/server.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/keysMigrateKeys.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/keysMigrateKeys.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/keysMigrateKeys.js +70 -0
- package/dist/commonjs/mcp-server/tools/keysMigrateKeys.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/ratelimitLimit.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/tools/ratelimitLimit.js +0 -4
- package/dist/commonjs/mcp-server/tools/ratelimitLimit.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/ratelimitMultiLimit.d.ts +9 -0
- package/dist/commonjs/mcp-server/tools/ratelimitMultiLimit.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/ratelimitMultiLimit.js +76 -0
- package/dist/commonjs/mcp-server/tools/ratelimitMultiLimit.js.map +1 -0
- package/dist/commonjs/models/components/index.d.ts +8 -0
- package/dist/commonjs/models/components/index.d.ts.map +1 -1
- package/dist/commonjs/models/components/index.js +8 -0
- package/dist/commonjs/models/components/index.js.map +1 -1
- package/dist/commonjs/models/components/v2keysmigratekeydata.d.ts +113 -0
- package/dist/commonjs/models/components/v2keysmigratekeydata.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysmigratekeydata.js +78 -0
- package/dist/commonjs/models/components/v2keysmigratekeydata.js.map +1 -0
- package/dist/commonjs/models/components/v2keysmigratekeysmigration.d.ts +25 -0
- package/dist/commonjs/models/components/v2keysmigratekeysmigration.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysmigratekeysmigration.js +60 -0
- package/dist/commonjs/models/components/v2keysmigratekeysmigration.js.map +1 -0
- package/dist/commonjs/models/components/v2keysmigratekeysrequestbody.d.ts +28 -0
- package/dist/commonjs/models/components/v2keysmigratekeysrequestbody.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysmigratekeysrequestbody.js +63 -0
- package/dist/commonjs/models/components/v2keysmigratekeysrequestbody.js.map +1 -0
- package/dist/commonjs/models/components/v2keysmigratekeysresponsebody.d.ts +24 -0
- package/dist/commonjs/models/components/v2keysmigratekeysresponsebody.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysmigratekeysresponsebody.js +62 -0
- package/dist/commonjs/models/components/v2keysmigratekeysresponsebody.js.map +1 -0
- package/dist/commonjs/models/components/v2keysmigratekeysresponsedata.d.ts +26 -0
- package/dist/commonjs/models/components/v2keysmigratekeysresponsedata.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysmigratekeysresponsedata.js +61 -0
- package/dist/commonjs/models/components/v2keysmigratekeysresponsedata.js.map +1 -0
- package/dist/commonjs/models/components/v2keysverifykeyrequestbody.d.ts +5 -0
- package/dist/commonjs/models/components/v2keysverifykeyrequestbody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysverifykeyrequestbody.js +2 -0
- package/dist/commonjs/models/components/v2keysverifykeyrequestbody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysverifykeyresponsedata.d.ts +3 -3
- package/dist/commonjs/models/components/v2ratelimitmultilimitcheck.d.ts +84 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitcheck.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitcheck.js +70 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitcheck.js.map +1 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitresponsebody.d.ts +27 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitresponsebody.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitresponsebody.js +62 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitresponsebody.js.map +1 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitresponsedata.d.ts +33 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitresponsedata.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitresponsedata.js +61 -0
- package/dist/commonjs/models/components/v2ratelimitmultilimitresponsedata.js.map +1 -0
- package/dist/commonjs/sdk/keys.d.ts +12 -0
- package/dist/commonjs/sdk/keys.d.ts.map +1 -1
- package/dist/commonjs/sdk/keys.js +15 -0
- package/dist/commonjs/sdk/keys.js.map +1 -1
- package/dist/commonjs/sdk/ratelimit.d.ts +17 -4
- package/dist/commonjs/sdk/ratelimit.d.ts.map +1 -1
- package/dist/commonjs/sdk/ratelimit.js +20 -4
- package/dist/commonjs/sdk/ratelimit.js.map +1 -1
- package/dist/commonjs/types/enums.d.ts +10 -6
- package/dist/commonjs/types/enums.d.ts.map +1 -1
- package/dist/commonjs/types/enums.js +76 -2
- package/dist/commonjs/types/enums.js.map +1 -1
- package/dist/commonjs/types/index.d.ts +0 -1
- package/dist/commonjs/types/index.d.ts.map +1 -1
- package/dist/commonjs/types/index.js +1 -3
- package/dist/commonjs/types/index.js.map +1 -1
- package/dist/esm/funcs/keysMigrateKeys.d.ts +23 -0
- package/dist/esm/funcs/keysMigrateKeys.d.ts.map +1 -0
- package/dist/esm/funcs/keysMigrateKeys.js +97 -0
- package/dist/esm/funcs/keysMigrateKeys.js.map +1 -0
- package/dist/esm/funcs/ratelimitLimit.d.ts +0 -4
- package/dist/esm/funcs/ratelimitLimit.d.ts.map +1 -1
- package/dist/esm/funcs/ratelimitLimit.js +0 -4
- package/dist/esm/funcs/ratelimitLimit.js.map +1 -1
- package/dist/esm/funcs/ratelimitMultiLimit.d.ts +28 -0
- package/dist/esm/funcs/ratelimitMultiLimit.d.ts.map +1 -0
- package/dist/esm/funcs/ratelimitMultiLimit.js +103 -0
- package/dist/esm/funcs/ratelimitMultiLimit.js.map +1 -0
- package/dist/esm/lib/config.d.ts +3 -3
- package/dist/esm/lib/config.js +3 -3
- package/dist/esm/mcp-server/mcp-server.js +1 -1
- package/dist/esm/mcp-server/server.d.ts.map +1 -1
- package/dist/esm/mcp-server/server.js +5 -1
- package/dist/esm/mcp-server/server.js.map +1 -1
- package/dist/esm/mcp-server/tools/keysMigrateKeys.d.ts +8 -0
- package/dist/esm/mcp-server/tools/keysMigrateKeys.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/keysMigrateKeys.js +34 -0
- package/dist/esm/mcp-server/tools/keysMigrateKeys.js.map +1 -0
- package/dist/esm/mcp-server/tools/ratelimitLimit.d.ts.map +1 -1
- package/dist/esm/mcp-server/tools/ratelimitLimit.js +0 -4
- package/dist/esm/mcp-server/tools/ratelimitLimit.js.map +1 -1
- package/dist/esm/mcp-server/tools/ratelimitMultiLimit.d.ts +9 -0
- package/dist/esm/mcp-server/tools/ratelimitMultiLimit.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/ratelimitMultiLimit.js +40 -0
- package/dist/esm/mcp-server/tools/ratelimitMultiLimit.js.map +1 -0
- package/dist/esm/models/components/index.d.ts +8 -0
- package/dist/esm/models/components/index.d.ts.map +1 -1
- package/dist/esm/models/components/index.js +8 -0
- package/dist/esm/models/components/index.js.map +1 -1
- package/dist/esm/models/components/v2keysmigratekeydata.d.ts +113 -0
- package/dist/esm/models/components/v2keysmigratekeydata.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysmigratekeydata.js +40 -0
- package/dist/esm/models/components/v2keysmigratekeydata.js.map +1 -0
- package/dist/esm/models/components/v2keysmigratekeysmigration.d.ts +25 -0
- package/dist/esm/models/components/v2keysmigratekeysmigration.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysmigratekeysmigration.js +22 -0
- package/dist/esm/models/components/v2keysmigratekeysmigration.js.map +1 -0
- package/dist/esm/models/components/v2keysmigratekeysrequestbody.d.ts +28 -0
- package/dist/esm/models/components/v2keysmigratekeysrequestbody.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysmigratekeysrequestbody.js +25 -0
- package/dist/esm/models/components/v2keysmigratekeysrequestbody.js.map +1 -0
- package/dist/esm/models/components/v2keysmigratekeysresponsebody.d.ts +24 -0
- package/dist/esm/models/components/v2keysmigratekeysresponsebody.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysmigratekeysresponsebody.js +24 -0
- package/dist/esm/models/components/v2keysmigratekeysresponsebody.js.map +1 -0
- package/dist/esm/models/components/v2keysmigratekeysresponsedata.d.ts +26 -0
- package/dist/esm/models/components/v2keysmigratekeysresponsedata.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysmigratekeysresponsedata.js +23 -0
- package/dist/esm/models/components/v2keysmigratekeysresponsedata.js.map +1 -0
- package/dist/esm/models/components/v2keysverifykeyrequestbody.d.ts +5 -0
- package/dist/esm/models/components/v2keysverifykeyrequestbody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysverifykeyrequestbody.js +2 -0
- package/dist/esm/models/components/v2keysverifykeyrequestbody.js.map +1 -1
- package/dist/esm/models/components/v2keysverifykeyresponsedata.d.ts +3 -3
- package/dist/esm/models/components/v2ratelimitmultilimitcheck.d.ts +84 -0
- package/dist/esm/models/components/v2ratelimitmultilimitcheck.d.ts.map +1 -0
- package/dist/esm/models/components/v2ratelimitmultilimitcheck.js +32 -0
- package/dist/esm/models/components/v2ratelimitmultilimitcheck.js.map +1 -0
- package/dist/esm/models/components/v2ratelimitmultilimitresponsebody.d.ts +27 -0
- package/dist/esm/models/components/v2ratelimitmultilimitresponsebody.d.ts.map +1 -0
- package/dist/esm/models/components/v2ratelimitmultilimitresponsebody.js +24 -0
- package/dist/esm/models/components/v2ratelimitmultilimitresponsebody.js.map +1 -0
- package/dist/esm/models/components/v2ratelimitmultilimitresponsedata.d.ts +33 -0
- package/dist/esm/models/components/v2ratelimitmultilimitresponsedata.d.ts.map +1 -0
- package/dist/esm/models/components/v2ratelimitmultilimitresponsedata.js +23 -0
- package/dist/esm/models/components/v2ratelimitmultilimitresponsedata.js.map +1 -0
- package/dist/esm/sdk/keys.d.ts +12 -0
- package/dist/esm/sdk/keys.d.ts.map +1 -1
- package/dist/esm/sdk/keys.js +15 -0
- package/dist/esm/sdk/keys.js.map +1 -1
- package/dist/esm/sdk/ratelimit.d.ts +17 -4
- package/dist/esm/sdk/ratelimit.d.ts.map +1 -1
- package/dist/esm/sdk/ratelimit.js +20 -4
- package/dist/esm/sdk/ratelimit.js.map +1 -1
- package/dist/esm/types/enums.d.ts +10 -6
- package/dist/esm/types/enums.d.ts.map +1 -1
- package/dist/esm/types/enums.js +38 -1
- package/dist/esm/types/enums.js.map +1 -1
- package/dist/esm/types/index.d.ts +0 -1
- package/dist/esm/types/index.d.ts.map +1 -1
- package/dist/esm/types/index.js +0 -1
- package/dist/esm/types/index.js.map +1 -1
- package/examples/package-lock.json +1 -1
- package/jsr.json +1 -1
- package/package.json +1 -1
- package/src/funcs/keysMigrateKeys.ts +201 -0
- package/src/funcs/ratelimitLimit.ts +0 -4
- package/src/funcs/ratelimitMultiLimit.ts +213 -0
- package/src/lib/config.ts +3 -3
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +5 -1
- package/src/mcp-server/tools/keysMigrateKeys.ts +43 -0
- package/src/mcp-server/tools/ratelimitLimit.ts +0 -4
- package/src/mcp-server/tools/ratelimitMultiLimit.ts +49 -0
- package/src/models/components/index.ts +8 -0
- package/src/models/components/v2keysmigratekeydata.ts +171 -0
- package/src/models/components/v2keysmigratekeysmigration.ts +61 -0
- package/src/models/components/v2keysmigratekeysrequestbody.ts +73 -0
- package/src/models/components/v2keysmigratekeysresponsebody.ts +72 -0
- package/src/models/components/v2keysmigratekeysresponsedata.ts +69 -0
- package/src/models/components/v2keysverifykeyrequestbody.ts +7 -0
- package/src/models/components/v2keysverifykeyresponsedata.ts +3 -3
- package/src/models/components/v2ratelimitmultilimitcheck.ts +130 -0
- package/src/models/components/v2ratelimitmultilimitresponsebody.ts +75 -0
- package/src/models/components/v2ratelimitmultilimitresponsedata.ts +76 -0
- package/src/sdk/keys.ts +23 -0
- package/src/sdk/ratelimit.ts +28 -4
- package/src/types/enums.ts +55 -6
- package/src/types/index.ts +0 -1
package/bin/mcp-server.js
CHANGED
|
@@ -34274,9 +34274,9 @@ var init_config = __esm(() => {
|
|
|
34274
34274
|
SDK_METADATA = {
|
|
34275
34275
|
language: "typescript",
|
|
34276
34276
|
openapiDocVersion: "2.0.0",
|
|
34277
|
-
sdkVersion: "2.1.
|
|
34278
|
-
genVersion: "2.
|
|
34279
|
-
userAgent: "speakeasy-sdk/typescript 2.1.
|
|
34277
|
+
sdkVersion: "2.1.1",
|
|
34278
|
+
genVersion: "2.753.1",
|
|
34279
|
+
userAgent: "speakeasy-sdk/typescript 2.1.1 2.753.1 2.0.0 @unkey/api"
|
|
34280
34280
|
};
|
|
34281
34281
|
});
|
|
34282
34282
|
|
|
@@ -36609,6 +36609,100 @@ var init_v2keysgetkeyresponsebody = __esm(() => {
|
|
|
36609
36609
|
});
|
|
36610
36610
|
});
|
|
36611
36611
|
|
|
36612
|
+
// src/models/components/v2keysmigratekeydata.ts
|
|
36613
|
+
var V2KeysMigrateKeyData$inboundSchema, V2KeysMigrateKeyData$outboundSchema;
|
|
36614
|
+
var init_v2keysmigratekeydata = __esm(() => {
|
|
36615
|
+
init_v3();
|
|
36616
|
+
init_keycreditsdata();
|
|
36617
|
+
init_ratelimitrequest();
|
|
36618
|
+
V2KeysMigrateKeyData$inboundSchema = objectType({
|
|
36619
|
+
hash: stringType(),
|
|
36620
|
+
name: stringType().optional(),
|
|
36621
|
+
externalId: stringType().optional(),
|
|
36622
|
+
meta: recordType(anyType()).optional(),
|
|
36623
|
+
roles: arrayType(stringType()).optional(),
|
|
36624
|
+
permissions: arrayType(stringType()).optional(),
|
|
36625
|
+
expires: numberType().int().optional(),
|
|
36626
|
+
enabled: booleanType().default(true),
|
|
36627
|
+
credits: KeyCreditsData$inboundSchema.optional(),
|
|
36628
|
+
ratelimits: arrayType(RatelimitRequest$inboundSchema).optional()
|
|
36629
|
+
});
|
|
36630
|
+
V2KeysMigrateKeyData$outboundSchema = objectType({
|
|
36631
|
+
hash: stringType(),
|
|
36632
|
+
name: stringType().optional(),
|
|
36633
|
+
externalId: stringType().optional(),
|
|
36634
|
+
meta: recordType(anyType()).optional(),
|
|
36635
|
+
roles: arrayType(stringType()).optional(),
|
|
36636
|
+
permissions: arrayType(stringType()).optional(),
|
|
36637
|
+
expires: numberType().int().optional(),
|
|
36638
|
+
enabled: booleanType().default(true),
|
|
36639
|
+
credits: KeyCreditsData$outboundSchema.optional(),
|
|
36640
|
+
ratelimits: arrayType(RatelimitRequest$outboundSchema).optional()
|
|
36641
|
+
});
|
|
36642
|
+
});
|
|
36643
|
+
|
|
36644
|
+
// src/models/components/v2keysmigratekeysmigration.ts
|
|
36645
|
+
var V2KeysMigrateKeysMigration$inboundSchema, V2KeysMigrateKeysMigration$outboundSchema;
|
|
36646
|
+
var init_v2keysmigratekeysmigration = __esm(() => {
|
|
36647
|
+
init_v3();
|
|
36648
|
+
V2KeysMigrateKeysMigration$inboundSchema = objectType({
|
|
36649
|
+
hash: stringType(),
|
|
36650
|
+
keyId: stringType()
|
|
36651
|
+
});
|
|
36652
|
+
V2KeysMigrateKeysMigration$outboundSchema = objectType({
|
|
36653
|
+
hash: stringType(),
|
|
36654
|
+
keyId: stringType()
|
|
36655
|
+
});
|
|
36656
|
+
});
|
|
36657
|
+
|
|
36658
|
+
// src/models/components/v2keysmigratekeysrequestbody.ts
|
|
36659
|
+
var V2KeysMigrateKeysRequestBody$inboundSchema, V2KeysMigrateKeysRequestBody$outboundSchema;
|
|
36660
|
+
var init_v2keysmigratekeysrequestbody = __esm(() => {
|
|
36661
|
+
init_v3();
|
|
36662
|
+
init_v2keysmigratekeydata();
|
|
36663
|
+
V2KeysMigrateKeysRequestBody$inboundSchema = objectType({
|
|
36664
|
+
migrationId: stringType(),
|
|
36665
|
+
apiId: stringType(),
|
|
36666
|
+
keys: arrayType(V2KeysMigrateKeyData$inboundSchema)
|
|
36667
|
+
});
|
|
36668
|
+
V2KeysMigrateKeysRequestBody$outboundSchema = objectType({
|
|
36669
|
+
migrationId: stringType(),
|
|
36670
|
+
apiId: stringType(),
|
|
36671
|
+
keys: arrayType(V2KeysMigrateKeyData$outboundSchema)
|
|
36672
|
+
});
|
|
36673
|
+
});
|
|
36674
|
+
|
|
36675
|
+
// src/models/components/v2keysmigratekeysresponsedata.ts
|
|
36676
|
+
var V2KeysMigrateKeysResponseData$inboundSchema, V2KeysMigrateKeysResponseData$outboundSchema;
|
|
36677
|
+
var init_v2keysmigratekeysresponsedata = __esm(() => {
|
|
36678
|
+
init_v3();
|
|
36679
|
+
init_v2keysmigratekeysmigration();
|
|
36680
|
+
V2KeysMigrateKeysResponseData$inboundSchema = objectType({
|
|
36681
|
+
migrated: arrayType(V2KeysMigrateKeysMigration$inboundSchema),
|
|
36682
|
+
failed: arrayType(stringType())
|
|
36683
|
+
});
|
|
36684
|
+
V2KeysMigrateKeysResponseData$outboundSchema = objectType({
|
|
36685
|
+
migrated: arrayType(V2KeysMigrateKeysMigration$outboundSchema),
|
|
36686
|
+
failed: arrayType(stringType())
|
|
36687
|
+
});
|
|
36688
|
+
});
|
|
36689
|
+
|
|
36690
|
+
// src/models/components/v2keysmigratekeysresponsebody.ts
|
|
36691
|
+
var V2KeysMigrateKeysResponseBody$inboundSchema, V2KeysMigrateKeysResponseBody$outboundSchema;
|
|
36692
|
+
var init_v2keysmigratekeysresponsebody = __esm(() => {
|
|
36693
|
+
init_v3();
|
|
36694
|
+
init_meta();
|
|
36695
|
+
init_v2keysmigratekeysresponsedata();
|
|
36696
|
+
V2KeysMigrateKeysResponseBody$inboundSchema = objectType({
|
|
36697
|
+
meta: Meta$inboundSchema,
|
|
36698
|
+
data: V2KeysMigrateKeysResponseData$inboundSchema
|
|
36699
|
+
});
|
|
36700
|
+
V2KeysMigrateKeysResponseBody$outboundSchema = objectType({
|
|
36701
|
+
meta: Meta$outboundSchema,
|
|
36702
|
+
data: V2KeysMigrateKeysResponseData$outboundSchema
|
|
36703
|
+
});
|
|
36704
|
+
});
|
|
36705
|
+
|
|
36612
36706
|
// src/models/components/v2keysremovepermissionsrequestbody.ts
|
|
36613
36707
|
var V2KeysRemovePermissionsRequestBody$inboundSchema, V2KeysRemovePermissionsRequestBody$outboundSchema;
|
|
36614
36708
|
var init_v2keysremovepermissionsrequestbody = __esm(() => {
|
|
@@ -36871,14 +36965,16 @@ var init_v2keysverifykeyrequestbody = __esm(() => {
|
|
|
36871
36965
|
tags: arrayType(stringType()).optional(),
|
|
36872
36966
|
permissions: stringType().optional(),
|
|
36873
36967
|
credits: KeysVerifyKeyCredits$inboundSchema.optional(),
|
|
36874
|
-
ratelimits: arrayType(KeysVerifyKeyRatelimit$inboundSchema).optional()
|
|
36968
|
+
ratelimits: arrayType(KeysVerifyKeyRatelimit$inboundSchema).optional(),
|
|
36969
|
+
migrationId: stringType().optional()
|
|
36875
36970
|
});
|
|
36876
36971
|
V2KeysVerifyKeyRequestBody$outboundSchema = objectType({
|
|
36877
36972
|
key: stringType(),
|
|
36878
36973
|
tags: arrayType(stringType()).optional(),
|
|
36879
36974
|
permissions: stringType().optional(),
|
|
36880
36975
|
credits: KeysVerifyKeyCredits$outboundSchema.optional(),
|
|
36881
|
-
ratelimits: arrayType(KeysVerifyKeyRatelimit$outboundSchema).optional()
|
|
36976
|
+
ratelimits: arrayType(KeysVerifyKeyRatelimit$outboundSchema).optional(),
|
|
36977
|
+
migrationId: stringType().optional()
|
|
36882
36978
|
});
|
|
36883
36979
|
});
|
|
36884
36980
|
|
|
@@ -37424,6 +37520,61 @@ var init_v2ratelimitlistoverridesresponsebody = __esm(() => {
|
|
|
37424
37520
|
});
|
|
37425
37521
|
});
|
|
37426
37522
|
|
|
37523
|
+
// src/models/components/v2ratelimitmultilimitcheck.ts
|
|
37524
|
+
var V2RatelimitMultiLimitCheck$inboundSchema, V2RatelimitMultiLimitCheck$outboundSchema;
|
|
37525
|
+
var init_v2ratelimitmultilimitcheck = __esm(() => {
|
|
37526
|
+
init_v3();
|
|
37527
|
+
V2RatelimitMultiLimitCheck$inboundSchema = objectType({
|
|
37528
|
+
namespace: stringType(),
|
|
37529
|
+
identifier: stringType(),
|
|
37530
|
+
limit: numberType().int(),
|
|
37531
|
+
remaining: numberType().int(),
|
|
37532
|
+
reset: numberType().int(),
|
|
37533
|
+
passed: booleanType(),
|
|
37534
|
+
overrideId: stringType().optional()
|
|
37535
|
+
});
|
|
37536
|
+
V2RatelimitMultiLimitCheck$outboundSchema = objectType({
|
|
37537
|
+
namespace: stringType(),
|
|
37538
|
+
identifier: stringType(),
|
|
37539
|
+
limit: numberType().int(),
|
|
37540
|
+
remaining: numberType().int(),
|
|
37541
|
+
reset: numberType().int(),
|
|
37542
|
+
passed: booleanType(),
|
|
37543
|
+
overrideId: stringType().optional()
|
|
37544
|
+
});
|
|
37545
|
+
});
|
|
37546
|
+
|
|
37547
|
+
// src/models/components/v2ratelimitmultilimitresponsedata.ts
|
|
37548
|
+
var V2RatelimitMultiLimitResponseData$inboundSchema, V2RatelimitMultiLimitResponseData$outboundSchema;
|
|
37549
|
+
var init_v2ratelimitmultilimitresponsedata = __esm(() => {
|
|
37550
|
+
init_v3();
|
|
37551
|
+
init_v2ratelimitmultilimitcheck();
|
|
37552
|
+
V2RatelimitMultiLimitResponseData$inboundSchema = objectType({
|
|
37553
|
+
passed: booleanType(),
|
|
37554
|
+
limits: arrayType(V2RatelimitMultiLimitCheck$inboundSchema)
|
|
37555
|
+
});
|
|
37556
|
+
V2RatelimitMultiLimitResponseData$outboundSchema = objectType({
|
|
37557
|
+
passed: booleanType(),
|
|
37558
|
+
limits: arrayType(V2RatelimitMultiLimitCheck$outboundSchema)
|
|
37559
|
+
});
|
|
37560
|
+
});
|
|
37561
|
+
|
|
37562
|
+
// src/models/components/v2ratelimitmultilimitresponsebody.ts
|
|
37563
|
+
var V2RatelimitMultiLimitResponseBody$inboundSchema, V2RatelimitMultiLimitResponseBody$outboundSchema;
|
|
37564
|
+
var init_v2ratelimitmultilimitresponsebody = __esm(() => {
|
|
37565
|
+
init_v3();
|
|
37566
|
+
init_meta();
|
|
37567
|
+
init_v2ratelimitmultilimitresponsedata();
|
|
37568
|
+
V2RatelimitMultiLimitResponseBody$inboundSchema = objectType({
|
|
37569
|
+
meta: Meta$inboundSchema,
|
|
37570
|
+
data: V2RatelimitMultiLimitResponseData$inboundSchema
|
|
37571
|
+
});
|
|
37572
|
+
V2RatelimitMultiLimitResponseBody$outboundSchema = objectType({
|
|
37573
|
+
meta: Meta$outboundSchema,
|
|
37574
|
+
data: V2RatelimitMultiLimitResponseData$outboundSchema
|
|
37575
|
+
});
|
|
37576
|
+
});
|
|
37577
|
+
|
|
37427
37578
|
// src/models/components/v2ratelimitsetoverriderequestbody.ts
|
|
37428
37579
|
var V2RatelimitSetOverrideRequestBody$inboundSchema, V2RatelimitSetOverrideRequestBody$outboundSchema;
|
|
37429
37580
|
var init_v2ratelimitsetoverriderequestbody = __esm(() => {
|
|
@@ -37525,6 +37676,11 @@ var init_components = __esm(() => {
|
|
|
37525
37676
|
init_v2keysdeletekeyresponsebody();
|
|
37526
37677
|
init_v2keysgetkeyrequestbody();
|
|
37527
37678
|
init_v2keysgetkeyresponsebody();
|
|
37679
|
+
init_v2keysmigratekeydata();
|
|
37680
|
+
init_v2keysmigratekeysmigration();
|
|
37681
|
+
init_v2keysmigratekeysrequestbody();
|
|
37682
|
+
init_v2keysmigratekeysresponsebody();
|
|
37683
|
+
init_v2keysmigratekeysresponsedata();
|
|
37528
37684
|
init_v2keysremovepermissionsrequestbody();
|
|
37529
37685
|
init_v2keysremovepermissionsresponsebody();
|
|
37530
37686
|
init_v2keysremoverolesrequestbody();
|
|
@@ -37573,6 +37729,9 @@ var init_components = __esm(() => {
|
|
|
37573
37729
|
init_v2ratelimitlimitresponsedata();
|
|
37574
37730
|
init_v2ratelimitlistoverridesrequestbody();
|
|
37575
37731
|
init_v2ratelimitlistoverridesresponsebody();
|
|
37732
|
+
init_v2ratelimitmultilimitcheck();
|
|
37733
|
+
init_v2ratelimitmultilimitresponsebody();
|
|
37734
|
+
init_v2ratelimitmultilimitresponsedata();
|
|
37576
37735
|
init_v2ratelimitsetoverriderequestbody();
|
|
37577
37736
|
init_v2ratelimitsetoverrideresponsebody();
|
|
37578
37737
|
init_v2ratelimitsetoverrideresponsedata();
|
|
@@ -39986,11 +40145,129 @@ Additional permission required for decrypt functionality:
|
|
|
39986
40145
|
};
|
|
39987
40146
|
});
|
|
39988
40147
|
|
|
39989
|
-
// src/funcs/
|
|
39990
|
-
function
|
|
40148
|
+
// src/funcs/keysMigrateKeys.ts
|
|
40149
|
+
function keysMigrateKeys(client, request, options) {
|
|
39991
40150
|
return new APIPromise($do16(client, request, options));
|
|
39992
40151
|
}
|
|
39993
40152
|
async function $do16(client, request, options) {
|
|
40153
|
+
const parsed = safeParse(request, (value) => V2KeysMigrateKeysRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40154
|
+
if (!parsed.ok) {
|
|
40155
|
+
return [parsed, { status: "invalid" }];
|
|
40156
|
+
}
|
|
40157
|
+
const payload = parsed.value;
|
|
40158
|
+
const body = encodeJSON("body", payload, { explode: true });
|
|
40159
|
+
const path = pathToFunc("/v2/keys.migrateKeys")();
|
|
40160
|
+
const headers = new Headers(compactMap({
|
|
40161
|
+
"Content-Type": "application/json",
|
|
40162
|
+
Accept: "application/json"
|
|
40163
|
+
}));
|
|
40164
|
+
const secConfig = await extractSecurity(client._options.rootKey);
|
|
40165
|
+
const securityInput = secConfig == null ? {} : { rootKey: secConfig };
|
|
40166
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
40167
|
+
const context = {
|
|
40168
|
+
options: client._options,
|
|
40169
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
40170
|
+
operationID: "migrateKeys",
|
|
40171
|
+
oAuth2Scopes: null,
|
|
40172
|
+
resolvedSecurity: requestSecurity,
|
|
40173
|
+
securitySource: client._options.rootKey,
|
|
40174
|
+
retryConfig: options?.retries || client._options.retryConfig || {
|
|
40175
|
+
strategy: "backoff",
|
|
40176
|
+
backoff: {
|
|
40177
|
+
initialInterval: 50,
|
|
40178
|
+
maxInterval: 1000,
|
|
40179
|
+
exponent: 1.5,
|
|
40180
|
+
maxElapsedTime: 1e4
|
|
40181
|
+
},
|
|
40182
|
+
retryConnectionErrors: true
|
|
40183
|
+
},
|
|
40184
|
+
retryCodes: options?.retryCodes || ["5XX"]
|
|
40185
|
+
};
|
|
40186
|
+
const requestRes = client._createRequest(context, {
|
|
40187
|
+
security: requestSecurity,
|
|
40188
|
+
method: "POST",
|
|
40189
|
+
baseURL: options?.serverURL,
|
|
40190
|
+
path,
|
|
40191
|
+
headers,
|
|
40192
|
+
body,
|
|
40193
|
+
userAgent: client._options.userAgent,
|
|
40194
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
40195
|
+
}, options);
|
|
40196
|
+
if (!requestRes.ok) {
|
|
40197
|
+
return [requestRes, { status: "invalid" }];
|
|
40198
|
+
}
|
|
40199
|
+
const req = requestRes.value;
|
|
40200
|
+
const doResult = await client._do(req, {
|
|
40201
|
+
context,
|
|
40202
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
40203
|
+
retryConfig: context.retryConfig,
|
|
40204
|
+
retryCodes: context.retryCodes
|
|
40205
|
+
});
|
|
40206
|
+
if (!doResult.ok) {
|
|
40207
|
+
return [doResult, { status: "request-error", request: req }];
|
|
40208
|
+
}
|
|
40209
|
+
const response = doResult.value;
|
|
40210
|
+
const responseFields = {
|
|
40211
|
+
HttpMeta: { Response: response, Request: req }
|
|
40212
|
+
};
|
|
40213
|
+
const [result] = await match(json(200, V2KeysMigrateKeysResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
|
|
40214
|
+
if (!result.ok) {
|
|
40215
|
+
return [result, { status: "complete", request: req, response }];
|
|
40216
|
+
}
|
|
40217
|
+
return [result, { status: "complete", request: req, response }];
|
|
40218
|
+
}
|
|
40219
|
+
var init_keysMigrateKeys = __esm(() => {
|
|
40220
|
+
init_encodings();
|
|
40221
|
+
init_matchers();
|
|
40222
|
+
init_primitives();
|
|
40223
|
+
init_schemas();
|
|
40224
|
+
init_security();
|
|
40225
|
+
init_url();
|
|
40226
|
+
init_components();
|
|
40227
|
+
init_errors2();
|
|
40228
|
+
init_async();
|
|
40229
|
+
});
|
|
40230
|
+
|
|
40231
|
+
// src/mcp-server/tools/keysMigrateKeys.ts
|
|
40232
|
+
var args16, tool$keysMigrateKeys;
|
|
40233
|
+
var init_keysMigrateKeys2 = __esm(() => {
|
|
40234
|
+
init_keysMigrateKeys();
|
|
40235
|
+
init_components();
|
|
40236
|
+
init_tools();
|
|
40237
|
+
args16 = {
|
|
40238
|
+
request: V2KeysMigrateKeysRequestBody$inboundSchema
|
|
40239
|
+
};
|
|
40240
|
+
tool$keysMigrateKeys = {
|
|
40241
|
+
name: "keys-migrate-keys",
|
|
40242
|
+
description: `Migrate API key(s)
|
|
40243
|
+
|
|
40244
|
+
Returns HTTP 200 even on partial success; hashes that could not be migrated are listed under \`data.failed\`.
|
|
40245
|
+
|
|
40246
|
+
**Required Permissions**
|
|
40247
|
+
Your root key must have one of the following permissions for basic key information:
|
|
40248
|
+
- \`api.*.create_key\` (to migrate keys to any API)
|
|
40249
|
+
- \`api.<api_id>.create_key\` (to migrate keys to a specific API)
|
|
40250
|
+
`,
|
|
40251
|
+
args: args16,
|
|
40252
|
+
tool: async (client, args17, ctx) => {
|
|
40253
|
+
const [result, apiCall] = await keysMigrateKeys(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40254
|
+
if (!result.ok) {
|
|
40255
|
+
return {
|
|
40256
|
+
content: [{ type: "text", text: result.error.message }],
|
|
40257
|
+
isError: true
|
|
40258
|
+
};
|
|
40259
|
+
}
|
|
40260
|
+
const value = result.value;
|
|
40261
|
+
return formatResult(value, apiCall);
|
|
40262
|
+
}
|
|
40263
|
+
};
|
|
40264
|
+
});
|
|
40265
|
+
|
|
40266
|
+
// src/funcs/keysRemovePermissions.ts
|
|
40267
|
+
function keysRemovePermissions(client, request, options) {
|
|
40268
|
+
return new APIPromise($do17(client, request, options));
|
|
40269
|
+
}
|
|
40270
|
+
async function $do17(client, request, options) {
|
|
39994
40271
|
const parsed = safeParse(request, (value) => V2KeysRemovePermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
39995
40272
|
if (!parsed.ok) {
|
|
39996
40273
|
return [parsed, { status: "invalid" }];
|
|
@@ -40070,12 +40347,12 @@ var init_keysRemovePermissions = __esm(() => {
|
|
|
40070
40347
|
});
|
|
40071
40348
|
|
|
40072
40349
|
// src/mcp-server/tools/keysRemovePermissions.ts
|
|
40073
|
-
var
|
|
40350
|
+
var args17, tool$keysRemovePermissions;
|
|
40074
40351
|
var init_keysRemovePermissions2 = __esm(() => {
|
|
40075
40352
|
init_keysRemovePermissions();
|
|
40076
40353
|
init_components();
|
|
40077
40354
|
init_tools();
|
|
40078
|
-
|
|
40355
|
+
args17 = {
|
|
40079
40356
|
request: V2KeysRemovePermissionsRequestBody$inboundSchema
|
|
40080
40357
|
};
|
|
40081
40358
|
tool$keysRemovePermissions = {
|
|
@@ -40098,9 +40375,9 @@ Your root key must have one of the following permissions:
|
|
|
40098
40375
|
|
|
40099
40376
|
Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
|
|
40100
40377
|
`,
|
|
40101
|
-
args:
|
|
40102
|
-
tool: async (client,
|
|
40103
|
-
const [result, apiCall] = await keysRemovePermissions(client,
|
|
40378
|
+
args: args17,
|
|
40379
|
+
tool: async (client, args18, ctx) => {
|
|
40380
|
+
const [result, apiCall] = await keysRemovePermissions(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40104
40381
|
if (!result.ok) {
|
|
40105
40382
|
return {
|
|
40106
40383
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40115,9 +40392,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
|
|
|
40115
40392
|
|
|
40116
40393
|
// src/funcs/keysRemoveRoles.ts
|
|
40117
40394
|
function keysRemoveRoles(client, request, options) {
|
|
40118
|
-
return new APIPromise($
|
|
40395
|
+
return new APIPromise($do18(client, request, options));
|
|
40119
40396
|
}
|
|
40120
|
-
async function $
|
|
40397
|
+
async function $do18(client, request, options) {
|
|
40121
40398
|
const parsed = safeParse(request, (value) => V2KeysRemoveRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40122
40399
|
if (!parsed.ok) {
|
|
40123
40400
|
return [parsed, { status: "invalid" }];
|
|
@@ -40197,12 +40474,12 @@ var init_keysRemoveRoles = __esm(() => {
|
|
|
40197
40474
|
});
|
|
40198
40475
|
|
|
40199
40476
|
// src/mcp-server/tools/keysRemoveRoles.ts
|
|
40200
|
-
var
|
|
40477
|
+
var args18, tool$keysRemoveRoles;
|
|
40201
40478
|
var init_keysRemoveRoles2 = __esm(() => {
|
|
40202
40479
|
init_keysRemoveRoles();
|
|
40203
40480
|
init_components();
|
|
40204
40481
|
init_tools();
|
|
40205
|
-
|
|
40482
|
+
args18 = {
|
|
40206
40483
|
request: V2KeysRemoveRolesRequestBody$inboundSchema
|
|
40207
40484
|
};
|
|
40208
40485
|
tool$keysRemoveRoles = {
|
|
@@ -40225,9 +40502,9 @@ Your root key must have one of the following permissions:
|
|
|
40225
40502
|
|
|
40226
40503
|
Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
|
|
40227
40504
|
`,
|
|
40228
|
-
args:
|
|
40229
|
-
tool: async (client,
|
|
40230
|
-
const [result, apiCall] = await keysRemoveRoles(client,
|
|
40505
|
+
args: args18,
|
|
40506
|
+
tool: async (client, args19, ctx) => {
|
|
40507
|
+
const [result, apiCall] = await keysRemoveRoles(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40231
40508
|
if (!result.ok) {
|
|
40232
40509
|
return {
|
|
40233
40510
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40242,9 +40519,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
|
|
|
40242
40519
|
|
|
40243
40520
|
// src/funcs/keysRerollKey.ts
|
|
40244
40521
|
function keysRerollKey(client, request, options) {
|
|
40245
|
-
return new APIPromise($
|
|
40522
|
+
return new APIPromise($do19(client, request, options));
|
|
40246
40523
|
}
|
|
40247
|
-
async function $
|
|
40524
|
+
async function $do19(client, request, options) {
|
|
40248
40525
|
const parsed = safeParse(request, (value) => V2KeysRerollKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40249
40526
|
if (!parsed.ok) {
|
|
40250
40527
|
return [parsed, { status: "invalid" }];
|
|
@@ -40324,12 +40601,12 @@ var init_keysRerollKey = __esm(() => {
|
|
|
40324
40601
|
});
|
|
40325
40602
|
|
|
40326
40603
|
// src/mcp-server/tools/keysRerollKey.ts
|
|
40327
|
-
var
|
|
40604
|
+
var args19, tool$keysRerollKey;
|
|
40328
40605
|
var init_keysRerollKey2 = __esm(() => {
|
|
40329
40606
|
init_keysRerollKey();
|
|
40330
40607
|
init_components();
|
|
40331
40608
|
init_tools();
|
|
40332
|
-
|
|
40609
|
+
args19 = {
|
|
40333
40610
|
request: V2KeysRerollKeyRequestBody$inboundSchema
|
|
40334
40611
|
};
|
|
40335
40612
|
tool$keysRerollKey = {
|
|
@@ -40369,9 +40646,9 @@ Common use cases include:
|
|
|
40369
40646
|
- \`api.*.create_key\` or \`api.<api_id>.create_key\`
|
|
40370
40647
|
- \`api.*.encrypt_key\` or \`api.<api_id>.encrypt_key\` (only when the original key is recoverable)
|
|
40371
40648
|
`,
|
|
40372
|
-
args:
|
|
40373
|
-
tool: async (client,
|
|
40374
|
-
const [result, apiCall] = await keysRerollKey(client,
|
|
40649
|
+
args: args19,
|
|
40650
|
+
tool: async (client, args20, ctx) => {
|
|
40651
|
+
const [result, apiCall] = await keysRerollKey(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40375
40652
|
if (!result.ok) {
|
|
40376
40653
|
return {
|
|
40377
40654
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40386,9 +40663,9 @@ Common use cases include:
|
|
|
40386
40663
|
|
|
40387
40664
|
// src/funcs/keysSetPermissions.ts
|
|
40388
40665
|
function keysSetPermissions(client, request, options) {
|
|
40389
|
-
return new APIPromise($
|
|
40666
|
+
return new APIPromise($do20(client, request, options));
|
|
40390
40667
|
}
|
|
40391
|
-
async function $
|
|
40668
|
+
async function $do20(client, request, options) {
|
|
40392
40669
|
const parsed = safeParse(request, (value) => V2KeysSetPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40393
40670
|
if (!parsed.ok) {
|
|
40394
40671
|
return [parsed, { status: "invalid" }];
|
|
@@ -40468,12 +40745,12 @@ var init_keysSetPermissions = __esm(() => {
|
|
|
40468
40745
|
});
|
|
40469
40746
|
|
|
40470
40747
|
// src/mcp-server/tools/keysSetPermissions.ts
|
|
40471
|
-
var
|
|
40748
|
+
var args20, tool$keysSetPermissions;
|
|
40472
40749
|
var init_keysSetPermissions2 = __esm(() => {
|
|
40473
40750
|
init_keysSetPermissions();
|
|
40474
40751
|
init_components();
|
|
40475
40752
|
init_tools();
|
|
40476
|
-
|
|
40753
|
+
args20 = {
|
|
40477
40754
|
request: V2KeysSetPermissionsRequestBody$inboundSchema
|
|
40478
40755
|
};
|
|
40479
40756
|
tool$keysSetPermissions = {
|
|
@@ -40496,9 +40773,9 @@ Your root key must have one of the following permissions:
|
|
|
40496
40773
|
|
|
40497
40774
|
Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
|
|
40498
40775
|
`,
|
|
40499
|
-
args:
|
|
40500
|
-
tool: async (client,
|
|
40501
|
-
const [result, apiCall] = await keysSetPermissions(client,
|
|
40776
|
+
args: args20,
|
|
40777
|
+
tool: async (client, args21, ctx) => {
|
|
40778
|
+
const [result, apiCall] = await keysSetPermissions(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40502
40779
|
if (!result.ok) {
|
|
40503
40780
|
return {
|
|
40504
40781
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40513,9 +40790,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
|
|
|
40513
40790
|
|
|
40514
40791
|
// src/funcs/keysSetRoles.ts
|
|
40515
40792
|
function keysSetRoles(client, request, options) {
|
|
40516
|
-
return new APIPromise($
|
|
40793
|
+
return new APIPromise($do21(client, request, options));
|
|
40517
40794
|
}
|
|
40518
|
-
async function $
|
|
40795
|
+
async function $do21(client, request, options) {
|
|
40519
40796
|
const parsed = safeParse(request, (value) => V2KeysSetRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40520
40797
|
if (!parsed.ok) {
|
|
40521
40798
|
return [parsed, { status: "invalid" }];
|
|
@@ -40595,12 +40872,12 @@ var init_keysSetRoles = __esm(() => {
|
|
|
40595
40872
|
});
|
|
40596
40873
|
|
|
40597
40874
|
// src/mcp-server/tools/keysSetRoles.ts
|
|
40598
|
-
var
|
|
40875
|
+
var args21, tool$keysSetRoles;
|
|
40599
40876
|
var init_keysSetRoles2 = __esm(() => {
|
|
40600
40877
|
init_keysSetRoles();
|
|
40601
40878
|
init_components();
|
|
40602
40879
|
init_tools();
|
|
40603
|
-
|
|
40880
|
+
args21 = {
|
|
40604
40881
|
request: V2KeysSetRolesRequestBody$inboundSchema
|
|
40605
40882
|
};
|
|
40606
40883
|
tool$keysSetRoles = {
|
|
@@ -40623,9 +40900,9 @@ Your root key must have one of the following permissions:
|
|
|
40623
40900
|
|
|
40624
40901
|
Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
|
|
40625
40902
|
`,
|
|
40626
|
-
args:
|
|
40627
|
-
tool: async (client,
|
|
40628
|
-
const [result, apiCall] = await keysSetRoles(client,
|
|
40903
|
+
args: args21,
|
|
40904
|
+
tool: async (client, args22, ctx) => {
|
|
40905
|
+
const [result, apiCall] = await keysSetRoles(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40629
40906
|
if (!result.ok) {
|
|
40630
40907
|
return {
|
|
40631
40908
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40640,9 +40917,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
|
|
|
40640
40917
|
|
|
40641
40918
|
// src/funcs/keysUpdateCredits.ts
|
|
40642
40919
|
function keysUpdateCredits(client, request, options) {
|
|
40643
|
-
return new APIPromise($
|
|
40920
|
+
return new APIPromise($do22(client, request, options));
|
|
40644
40921
|
}
|
|
40645
|
-
async function $
|
|
40922
|
+
async function $do22(client, request, options) {
|
|
40646
40923
|
const parsed = safeParse(request, (value) => V2KeysUpdateCreditsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40647
40924
|
if (!parsed.ok) {
|
|
40648
40925
|
return [parsed, { status: "invalid" }];
|
|
@@ -40722,12 +40999,12 @@ var init_keysUpdateCredits = __esm(() => {
|
|
|
40722
40999
|
});
|
|
40723
41000
|
|
|
40724
41001
|
// src/mcp-server/tools/keysUpdateCredits.ts
|
|
40725
|
-
var
|
|
41002
|
+
var args22, tool$keysUpdateCredits;
|
|
40726
41003
|
var init_keysUpdateCredits2 = __esm(() => {
|
|
40727
41004
|
init_keysUpdateCredits();
|
|
40728
41005
|
init_components();
|
|
40729
41006
|
init_tools();
|
|
40730
|
-
|
|
41007
|
+
args22 = {
|
|
40731
41008
|
request: V2KeysUpdateCreditsRequestBody$inboundSchema
|
|
40732
41009
|
};
|
|
40733
41010
|
tool$keysUpdateCredits = {
|
|
@@ -40750,9 +41027,9 @@ Your root key must have one of the following permissions:
|
|
|
40750
41027
|
|
|
40751
41028
|
Credit updates remove the key from cache immediately. Setting credits to unlimited automatically clears any existing refill settings. Changes take effect instantly but may take up to 30 seconds to propagate to all edge regions.
|
|
40752
41029
|
`,
|
|
40753
|
-
args:
|
|
40754
|
-
tool: async (client,
|
|
40755
|
-
const [result, apiCall] = await keysUpdateCredits(client,
|
|
41030
|
+
args: args22,
|
|
41031
|
+
tool: async (client, args23, ctx) => {
|
|
41032
|
+
const [result, apiCall] = await keysUpdateCredits(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40756
41033
|
if (!result.ok) {
|
|
40757
41034
|
return {
|
|
40758
41035
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40767,9 +41044,9 @@ Credit updates remove the key from cache immediately. Setting credits to unlimit
|
|
|
40767
41044
|
|
|
40768
41045
|
// src/funcs/keysUpdateKey.ts
|
|
40769
41046
|
function keysUpdateKey(client, request, options) {
|
|
40770
|
-
return new APIPromise($
|
|
41047
|
+
return new APIPromise($do23(client, request, options));
|
|
40771
41048
|
}
|
|
40772
|
-
async function $
|
|
41049
|
+
async function $do23(client, request, options) {
|
|
40773
41050
|
const parsed = safeParse(request, (value) => V2KeysUpdateKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40774
41051
|
if (!parsed.ok) {
|
|
40775
41052
|
return [parsed, { status: "invalid" }];
|
|
@@ -40849,12 +41126,12 @@ var init_keysUpdateKey = __esm(() => {
|
|
|
40849
41126
|
});
|
|
40850
41127
|
|
|
40851
41128
|
// src/mcp-server/tools/keysUpdateKey.ts
|
|
40852
|
-
var
|
|
41129
|
+
var args23, tool$keysUpdateKey;
|
|
40853
41130
|
var init_keysUpdateKey2 = __esm(() => {
|
|
40854
41131
|
init_keysUpdateKey();
|
|
40855
41132
|
init_components();
|
|
40856
41133
|
init_tools();
|
|
40857
|
-
|
|
41134
|
+
args23 = {
|
|
40858
41135
|
request: V2KeysUpdateKeyRequestBody$inboundSchema
|
|
40859
41136
|
};
|
|
40860
41137
|
tool$keysUpdateKey = {
|
|
@@ -40877,9 +41154,9 @@ Your root key must have one of the following permissions:
|
|
|
40877
41154
|
|
|
40878
41155
|
If you specify an \`externalId\` that doesn't exist, a new identity will be automatically created and linked to the key. Permission updates will auto-create any permissions that don't exist in your workspace. Changes take effect immediately but may take up to 30 seconds to propagate to all edge regions due to cache invalidation.
|
|
40879
41156
|
`,
|
|
40880
|
-
args:
|
|
40881
|
-
tool: async (client,
|
|
40882
|
-
const [result, apiCall] = await keysUpdateKey(client,
|
|
41157
|
+
args: args23,
|
|
41158
|
+
tool: async (client, args24, ctx) => {
|
|
41159
|
+
const [result, apiCall] = await keysUpdateKey(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40883
41160
|
if (!result.ok) {
|
|
40884
41161
|
return {
|
|
40885
41162
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40894,9 +41171,9 @@ If you specify an \`externalId\` that doesn't exist, a new identity will be auto
|
|
|
40894
41171
|
|
|
40895
41172
|
// src/funcs/keysVerifyKey.ts
|
|
40896
41173
|
function keysVerifyKey(client, request, options) {
|
|
40897
|
-
return new APIPromise($
|
|
41174
|
+
return new APIPromise($do24(client, request, options));
|
|
40898
41175
|
}
|
|
40899
|
-
async function $
|
|
41176
|
+
async function $do24(client, request, options) {
|
|
40900
41177
|
const parsed = safeParse(request, (value) => V2KeysVerifyKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40901
41178
|
if (!parsed.ok) {
|
|
40902
41179
|
return [parsed, { status: "invalid" }];
|
|
@@ -40976,12 +41253,12 @@ var init_keysVerifyKey = __esm(() => {
|
|
|
40976
41253
|
});
|
|
40977
41254
|
|
|
40978
41255
|
// src/mcp-server/tools/keysVerifyKey.ts
|
|
40979
|
-
var
|
|
41256
|
+
var args24, tool$keysVerifyKey;
|
|
40980
41257
|
var init_keysVerifyKey2 = __esm(() => {
|
|
40981
41258
|
init_keysVerifyKey();
|
|
40982
41259
|
init_components();
|
|
40983
41260
|
init_tools();
|
|
40984
|
-
|
|
41261
|
+
args24 = {
|
|
40985
41262
|
request: V2KeysVerifyKeyRequestBody$inboundSchema
|
|
40986
41263
|
};
|
|
40987
41264
|
tool$keysVerifyKey = {
|
|
@@ -41007,9 +41284,9 @@ Your root key needs one of:
|
|
|
41007
41284
|
|
|
41008
41285
|
If you are getting a NOT_FOUND error, ensure your root key has the required verify key permissions.
|
|
41009
41286
|
`,
|
|
41010
|
-
args:
|
|
41011
|
-
tool: async (client,
|
|
41012
|
-
const [result, apiCall] = await keysVerifyKey(client,
|
|
41287
|
+
args: args24,
|
|
41288
|
+
tool: async (client, args25, ctx) => {
|
|
41289
|
+
const [result, apiCall] = await keysVerifyKey(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41013
41290
|
if (!result.ok) {
|
|
41014
41291
|
return {
|
|
41015
41292
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41024,9 +41301,9 @@ If you are getting a NOT_FOUND error, ensure your root key has the required veri
|
|
|
41024
41301
|
|
|
41025
41302
|
// src/funcs/keysWhoami.ts
|
|
41026
41303
|
function keysWhoami(client, request, options) {
|
|
41027
|
-
return new APIPromise($
|
|
41304
|
+
return new APIPromise($do25(client, request, options));
|
|
41028
41305
|
}
|
|
41029
|
-
async function $
|
|
41306
|
+
async function $do25(client, request, options) {
|
|
41030
41307
|
const parsed = safeParse(request, (value) => V2KeysWhoamiRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41031
41308
|
if (!parsed.ok) {
|
|
41032
41309
|
return [parsed, { status: "invalid" }];
|
|
@@ -41106,12 +41383,12 @@ var init_keysWhoami = __esm(() => {
|
|
|
41106
41383
|
});
|
|
41107
41384
|
|
|
41108
41385
|
// src/mcp-server/tools/keysWhoami.ts
|
|
41109
|
-
var
|
|
41386
|
+
var args25, tool$keysWhoami;
|
|
41110
41387
|
var init_keysWhoami2 = __esm(() => {
|
|
41111
41388
|
init_keysWhoami();
|
|
41112
41389
|
init_components();
|
|
41113
41390
|
init_tools();
|
|
41114
|
-
|
|
41391
|
+
args25 = {
|
|
41115
41392
|
request: V2KeysWhoamiRequestBody$inboundSchema
|
|
41116
41393
|
};
|
|
41117
41394
|
tool$keysWhoami = {
|
|
@@ -41128,9 +41405,9 @@ Your root key must have one of the following permissions for basic key informati
|
|
|
41128
41405
|
|
|
41129
41406
|
If your rootkey lacks permissions but the key exists, we may return a 404 status here to prevent leaking the existance of a key to unauthorized clients. If you believe that a key should exist, but receive a 404, please double check your root key has the correct permissions.
|
|
41130
41407
|
`,
|
|
41131
|
-
args:
|
|
41132
|
-
tool: async (client,
|
|
41133
|
-
const [result, apiCall] = await keysWhoami(client,
|
|
41408
|
+
args: args25,
|
|
41409
|
+
tool: async (client, args26, ctx) => {
|
|
41410
|
+
const [result, apiCall] = await keysWhoami(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41134
41411
|
if (!result.ok) {
|
|
41135
41412
|
return {
|
|
41136
41413
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41145,9 +41422,9 @@ If your rootkey lacks permissions but the key exists, we may return a 404 status
|
|
|
41145
41422
|
|
|
41146
41423
|
// src/funcs/permissionsCreatePermission.ts
|
|
41147
41424
|
function permissionsCreatePermission(client, request, options) {
|
|
41148
|
-
return new APIPromise($
|
|
41425
|
+
return new APIPromise($do26(client, request, options));
|
|
41149
41426
|
}
|
|
41150
|
-
async function $
|
|
41427
|
+
async function $do26(client, request, options) {
|
|
41151
41428
|
const parsed = safeParse(request, (value) => V2PermissionsCreatePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41152
41429
|
if (!parsed.ok) {
|
|
41153
41430
|
return [parsed, { status: "invalid" }];
|
|
@@ -41227,12 +41504,12 @@ var init_permissionsCreatePermission = __esm(() => {
|
|
|
41227
41504
|
});
|
|
41228
41505
|
|
|
41229
41506
|
// src/mcp-server/tools/permissionsCreatePermission.ts
|
|
41230
|
-
var
|
|
41507
|
+
var args26, tool$permissionsCreatePermission;
|
|
41231
41508
|
var init_permissionsCreatePermission2 = __esm(() => {
|
|
41232
41509
|
init_permissionsCreatePermission();
|
|
41233
41510
|
init_components();
|
|
41234
41511
|
init_tools();
|
|
41235
|
-
|
|
41512
|
+
args26 = {
|
|
41236
41513
|
request: V2PermissionsCreatePermissionRequestBody$inboundSchema
|
|
41237
41514
|
};
|
|
41238
41515
|
tool$permissionsCreatePermission = {
|
|
@@ -41250,9 +41527,9 @@ Use hierarchical naming patterns like \`documents.read\`, \`admin.users.delete\`
|
|
|
41250
41527
|
Your root key must have the following permission:
|
|
41251
41528
|
- \`rbac.*.create_permission\`
|
|
41252
41529
|
`,
|
|
41253
|
-
args:
|
|
41254
|
-
tool: async (client,
|
|
41255
|
-
const [result, apiCall] = await permissionsCreatePermission(client,
|
|
41530
|
+
args: args26,
|
|
41531
|
+
tool: async (client, args27, ctx) => {
|
|
41532
|
+
const [result, apiCall] = await permissionsCreatePermission(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41256
41533
|
if (!result.ok) {
|
|
41257
41534
|
return {
|
|
41258
41535
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41267,9 +41544,9 @@ Your root key must have the following permission:
|
|
|
41267
41544
|
|
|
41268
41545
|
// src/funcs/permissionsCreateRole.ts
|
|
41269
41546
|
function permissionsCreateRole(client, request, options) {
|
|
41270
|
-
return new APIPromise($
|
|
41547
|
+
return new APIPromise($do27(client, request, options));
|
|
41271
41548
|
}
|
|
41272
|
-
async function $
|
|
41549
|
+
async function $do27(client, request, options) {
|
|
41273
41550
|
const parsed = safeParse(request, (value) => V2PermissionsCreateRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41274
41551
|
if (!parsed.ok) {
|
|
41275
41552
|
return [parsed, { status: "invalid" }];
|
|
@@ -41349,12 +41626,12 @@ var init_permissionsCreateRole = __esm(() => {
|
|
|
41349
41626
|
});
|
|
41350
41627
|
|
|
41351
41628
|
// src/mcp-server/tools/permissionsCreateRole.ts
|
|
41352
|
-
var
|
|
41629
|
+
var args27, tool$permissionsCreateRole;
|
|
41353
41630
|
var init_permissionsCreateRole2 = __esm(() => {
|
|
41354
41631
|
init_permissionsCreateRole();
|
|
41355
41632
|
init_components();
|
|
41356
41633
|
init_tools();
|
|
41357
|
-
|
|
41634
|
+
args27 = {
|
|
41358
41635
|
request: V2PermissionsCreateRoleRequestBody$inboundSchema
|
|
41359
41636
|
};
|
|
41360
41637
|
tool$permissionsCreateRole = {
|
|
@@ -41370,9 +41647,9 @@ Create a new role to group related permissions for easier management. Roles enab
|
|
|
41370
41647
|
Your root key must have the following permission:
|
|
41371
41648
|
- \`rbac.*.create_role\`
|
|
41372
41649
|
`,
|
|
41373
|
-
args:
|
|
41374
|
-
tool: async (client,
|
|
41375
|
-
const [result, apiCall] = await permissionsCreateRole(client,
|
|
41650
|
+
args: args27,
|
|
41651
|
+
tool: async (client, args28, ctx) => {
|
|
41652
|
+
const [result, apiCall] = await permissionsCreateRole(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41376
41653
|
if (!result.ok) {
|
|
41377
41654
|
return {
|
|
41378
41655
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41387,9 +41664,9 @@ Your root key must have the following permission:
|
|
|
41387
41664
|
|
|
41388
41665
|
// src/funcs/permissionsDeletePermission.ts
|
|
41389
41666
|
function permissionsDeletePermission(client, request, options) {
|
|
41390
|
-
return new APIPromise($
|
|
41667
|
+
return new APIPromise($do28(client, request, options));
|
|
41391
41668
|
}
|
|
41392
|
-
async function $
|
|
41669
|
+
async function $do28(client, request, options) {
|
|
41393
41670
|
const parsed = safeParse(request, (value) => V2PermissionsDeletePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41394
41671
|
if (!parsed.ok) {
|
|
41395
41672
|
return [parsed, { status: "invalid" }];
|
|
@@ -41469,12 +41746,12 @@ var init_permissionsDeletePermission = __esm(() => {
|
|
|
41469
41746
|
});
|
|
41470
41747
|
|
|
41471
41748
|
// src/mcp-server/tools/permissionsDeletePermission.ts
|
|
41472
|
-
var
|
|
41749
|
+
var args28, tool$permissionsDeletePermission;
|
|
41473
41750
|
var init_permissionsDeletePermission2 = __esm(() => {
|
|
41474
41751
|
init_permissionsDeletePermission();
|
|
41475
41752
|
init_components();
|
|
41476
41753
|
init_tools();
|
|
41477
|
-
|
|
41754
|
+
args28 = {
|
|
41478
41755
|
request: V2PermissionsDeletePermissionRequestBody$inboundSchema
|
|
41479
41756
|
};
|
|
41480
41757
|
tool$permissionsDeletePermission = {
|
|
@@ -41490,9 +41767,9 @@ Remove a permission from your workspace. This also removes the permission from a
|
|
|
41490
41767
|
Your root key must have the following permission:
|
|
41491
41768
|
- \`rbac.*.delete_permission\`
|
|
41492
41769
|
`,
|
|
41493
|
-
args:
|
|
41494
|
-
tool: async (client,
|
|
41495
|
-
const [result, apiCall] = await permissionsDeletePermission(client,
|
|
41770
|
+
args: args28,
|
|
41771
|
+
tool: async (client, args29, ctx) => {
|
|
41772
|
+
const [result, apiCall] = await permissionsDeletePermission(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41496
41773
|
if (!result.ok) {
|
|
41497
41774
|
return {
|
|
41498
41775
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41507,9 +41784,9 @@ Your root key must have the following permission:
|
|
|
41507
41784
|
|
|
41508
41785
|
// src/funcs/permissionsDeleteRole.ts
|
|
41509
41786
|
function permissionsDeleteRole(client, request, options) {
|
|
41510
|
-
return new APIPromise($
|
|
41787
|
+
return new APIPromise($do29(client, request, options));
|
|
41511
41788
|
}
|
|
41512
|
-
async function $
|
|
41789
|
+
async function $do29(client, request, options) {
|
|
41513
41790
|
const parsed = safeParse(request, (value) => V2PermissionsDeleteRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41514
41791
|
if (!parsed.ok) {
|
|
41515
41792
|
return [parsed, { status: "invalid" }];
|
|
@@ -41589,12 +41866,12 @@ var init_permissionsDeleteRole = __esm(() => {
|
|
|
41589
41866
|
});
|
|
41590
41867
|
|
|
41591
41868
|
// src/mcp-server/tools/permissionsDeleteRole.ts
|
|
41592
|
-
var
|
|
41869
|
+
var args29, tool$permissionsDeleteRole;
|
|
41593
41870
|
var init_permissionsDeleteRole2 = __esm(() => {
|
|
41594
41871
|
init_permissionsDeleteRole();
|
|
41595
41872
|
init_components();
|
|
41596
41873
|
init_tools();
|
|
41597
|
-
|
|
41874
|
+
args29 = {
|
|
41598
41875
|
request: V2PermissionsDeleteRoleRequestBody$inboundSchema
|
|
41599
41876
|
};
|
|
41600
41877
|
tool$permissionsDeleteRole = {
|
|
@@ -41610,9 +41887,9 @@ Remove a role from your workspace. This also removes the role from all assigned
|
|
|
41610
41887
|
Your root key must have the following permission:
|
|
41611
41888
|
- \`rbac.*.delete_role\`
|
|
41612
41889
|
`,
|
|
41613
|
-
args:
|
|
41614
|
-
tool: async (client,
|
|
41615
|
-
const [result, apiCall] = await permissionsDeleteRole(client,
|
|
41890
|
+
args: args29,
|
|
41891
|
+
tool: async (client, args30, ctx) => {
|
|
41892
|
+
const [result, apiCall] = await permissionsDeleteRole(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41616
41893
|
if (!result.ok) {
|
|
41617
41894
|
return {
|
|
41618
41895
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41627,9 +41904,9 @@ Your root key must have the following permission:
|
|
|
41627
41904
|
|
|
41628
41905
|
// src/funcs/permissionsGetPermission.ts
|
|
41629
41906
|
function permissionsGetPermission(client, request, options) {
|
|
41630
|
-
return new APIPromise($
|
|
41907
|
+
return new APIPromise($do30(client, request, options));
|
|
41631
41908
|
}
|
|
41632
|
-
async function $
|
|
41909
|
+
async function $do30(client, request, options) {
|
|
41633
41910
|
const parsed = safeParse(request, (value) => V2PermissionsGetPermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41634
41911
|
if (!parsed.ok) {
|
|
41635
41912
|
return [parsed, { status: "invalid" }];
|
|
@@ -41709,12 +41986,12 @@ var init_permissionsGetPermission = __esm(() => {
|
|
|
41709
41986
|
});
|
|
41710
41987
|
|
|
41711
41988
|
// src/mcp-server/tools/permissionsGetPermission.ts
|
|
41712
|
-
var
|
|
41989
|
+
var args30, tool$permissionsGetPermission;
|
|
41713
41990
|
var init_permissionsGetPermission2 = __esm(() => {
|
|
41714
41991
|
init_permissionsGetPermission();
|
|
41715
41992
|
init_components();
|
|
41716
41993
|
init_tools();
|
|
41717
|
-
|
|
41994
|
+
args30 = {
|
|
41718
41995
|
request: V2PermissionsGetPermissionRequestBody$inboundSchema
|
|
41719
41996
|
};
|
|
41720
41997
|
tool$permissionsGetPermission = {
|
|
@@ -41728,9 +42005,9 @@ Retrieve details about a specific permission including its name, description, an
|
|
|
41728
42005
|
Your root key must have the following permission:
|
|
41729
42006
|
- \`rbac.*.read_permission\`
|
|
41730
42007
|
`,
|
|
41731
|
-
args:
|
|
41732
|
-
tool: async (client,
|
|
41733
|
-
const [result, apiCall] = await permissionsGetPermission(client,
|
|
42008
|
+
args: args30,
|
|
42009
|
+
tool: async (client, args31, ctx) => {
|
|
42010
|
+
const [result, apiCall] = await permissionsGetPermission(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41734
42011
|
if (!result.ok) {
|
|
41735
42012
|
return {
|
|
41736
42013
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41745,9 +42022,9 @@ Your root key must have the following permission:
|
|
|
41745
42022
|
|
|
41746
42023
|
// src/funcs/permissionsGetRole.ts
|
|
41747
42024
|
function permissionsGetRole(client, request, options) {
|
|
41748
|
-
return new APIPromise($
|
|
42025
|
+
return new APIPromise($do31(client, request, options));
|
|
41749
42026
|
}
|
|
41750
|
-
async function $
|
|
42027
|
+
async function $do31(client, request, options) {
|
|
41751
42028
|
const parsed = safeParse(request, (value) => V2PermissionsGetRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41752
42029
|
if (!parsed.ok) {
|
|
41753
42030
|
return [parsed, { status: "invalid" }];
|
|
@@ -41827,12 +42104,12 @@ var init_permissionsGetRole = __esm(() => {
|
|
|
41827
42104
|
});
|
|
41828
42105
|
|
|
41829
42106
|
// src/mcp-server/tools/permissionsGetRole.ts
|
|
41830
|
-
var
|
|
42107
|
+
var args31, tool$permissionsGetRole;
|
|
41831
42108
|
var init_permissionsGetRole2 = __esm(() => {
|
|
41832
42109
|
init_permissionsGetRole();
|
|
41833
42110
|
init_components();
|
|
41834
42111
|
init_tools();
|
|
41835
|
-
|
|
42112
|
+
args31 = {
|
|
41836
42113
|
request: V2PermissionsGetRoleRequestBody$inboundSchema
|
|
41837
42114
|
};
|
|
41838
42115
|
tool$permissionsGetRole = {
|
|
@@ -41846,9 +42123,9 @@ Retrieve details about a specific role including its assigned permissions.
|
|
|
41846
42123
|
Your root key must have the following permission:
|
|
41847
42124
|
- \`rbac.*.read_role\`
|
|
41848
42125
|
`,
|
|
41849
|
-
args:
|
|
41850
|
-
tool: async (client,
|
|
41851
|
-
const [result, apiCall] = await permissionsGetRole(client,
|
|
42126
|
+
args: args31,
|
|
42127
|
+
tool: async (client, args32, ctx) => {
|
|
42128
|
+
const [result, apiCall] = await permissionsGetRole(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41852
42129
|
if (!result.ok) {
|
|
41853
42130
|
return {
|
|
41854
42131
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41863,9 +42140,9 @@ Your root key must have the following permission:
|
|
|
41863
42140
|
|
|
41864
42141
|
// src/funcs/permissionsListPermissions.ts
|
|
41865
42142
|
function permissionsListPermissions(client, request, options) {
|
|
41866
|
-
return new APIPromise($
|
|
42143
|
+
return new APIPromise($do32(client, request, options));
|
|
41867
42144
|
}
|
|
41868
|
-
async function $
|
|
42145
|
+
async function $do32(client, request, options) {
|
|
41869
42146
|
const parsed = safeParse(request, (value) => V2PermissionsListPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41870
42147
|
if (!parsed.ok) {
|
|
41871
42148
|
return [parsed, { status: "invalid" }];
|
|
@@ -41945,12 +42222,12 @@ var init_permissionsListPermissions = __esm(() => {
|
|
|
41945
42222
|
});
|
|
41946
42223
|
|
|
41947
42224
|
// src/mcp-server/tools/permissionsListPermissions.ts
|
|
41948
|
-
var
|
|
42225
|
+
var args32, tool$permissionsListPermissions;
|
|
41949
42226
|
var init_permissionsListPermissions2 = __esm(() => {
|
|
41950
42227
|
init_permissionsListPermissions();
|
|
41951
42228
|
init_components();
|
|
41952
42229
|
init_tools();
|
|
41953
|
-
|
|
42230
|
+
args32 = {
|
|
41954
42231
|
request: V2PermissionsListPermissionsRequestBody$inboundSchema
|
|
41955
42232
|
};
|
|
41956
42233
|
tool$permissionsListPermissions = {
|
|
@@ -41965,9 +42242,9 @@ Results are paginated and sorted by their id.
|
|
|
41965
42242
|
Your root key must have the following permission:
|
|
41966
42243
|
- \`rbac.*.read_permission\`
|
|
41967
42244
|
`,
|
|
41968
|
-
args:
|
|
41969
|
-
tool: async (client,
|
|
41970
|
-
const [result, apiCall] = await permissionsListPermissions(client,
|
|
42245
|
+
args: args32,
|
|
42246
|
+
tool: async (client, args33, ctx) => {
|
|
42247
|
+
const [result, apiCall] = await permissionsListPermissions(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41971
42248
|
if (!result.ok) {
|
|
41972
42249
|
return {
|
|
41973
42250
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41982,9 +42259,9 @@ Your root key must have the following permission:
|
|
|
41982
42259
|
|
|
41983
42260
|
// src/funcs/permissionsListRoles.ts
|
|
41984
42261
|
function permissionsListRoles(client, request, options) {
|
|
41985
|
-
return new APIPromise($
|
|
42262
|
+
return new APIPromise($do33(client, request, options));
|
|
41986
42263
|
}
|
|
41987
|
-
async function $
|
|
42264
|
+
async function $do33(client, request, options) {
|
|
41988
42265
|
const parsed = safeParse(request, (value) => V2PermissionsListRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41989
42266
|
if (!parsed.ok) {
|
|
41990
42267
|
return [parsed, { status: "invalid" }];
|
|
@@ -42064,12 +42341,12 @@ var init_permissionsListRoles = __esm(() => {
|
|
|
42064
42341
|
});
|
|
42065
42342
|
|
|
42066
42343
|
// src/mcp-server/tools/permissionsListRoles.ts
|
|
42067
|
-
var
|
|
42344
|
+
var args33, tool$permissionsListRoles;
|
|
42068
42345
|
var init_permissionsListRoles2 = __esm(() => {
|
|
42069
42346
|
init_permissionsListRoles();
|
|
42070
42347
|
init_components();
|
|
42071
42348
|
init_tools();
|
|
42072
|
-
|
|
42349
|
+
args33 = {
|
|
42073
42350
|
request: V2PermissionsListRolesRequestBody$inboundSchema
|
|
42074
42351
|
};
|
|
42075
42352
|
tool$permissionsListRoles = {
|
|
@@ -42084,9 +42361,9 @@ Results are paginated and sorted by their id.
|
|
|
42084
42361
|
Your root key must have the following permission:
|
|
42085
42362
|
- \`rbac.*.read_role\`
|
|
42086
42363
|
`,
|
|
42087
|
-
args:
|
|
42088
|
-
tool: async (client,
|
|
42089
|
-
const [result, apiCall] = await permissionsListRoles(client,
|
|
42364
|
+
args: args33,
|
|
42365
|
+
tool: async (client, args34, ctx) => {
|
|
42366
|
+
const [result, apiCall] = await permissionsListRoles(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42090
42367
|
if (!result.ok) {
|
|
42091
42368
|
return {
|
|
42092
42369
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42101,9 +42378,9 @@ Your root key must have the following permission:
|
|
|
42101
42378
|
|
|
42102
42379
|
// src/funcs/ratelimitDeleteOverride.ts
|
|
42103
42380
|
function ratelimitDeleteOverride(client, request, options) {
|
|
42104
|
-
return new APIPromise($
|
|
42381
|
+
return new APIPromise($do34(client, request, options));
|
|
42105
42382
|
}
|
|
42106
|
-
async function $
|
|
42383
|
+
async function $do34(client, request, options) {
|
|
42107
42384
|
const parsed = safeParse(request, (value) => V2RatelimitDeleteOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42108
42385
|
if (!parsed.ok) {
|
|
42109
42386
|
return [parsed, { status: "invalid" }];
|
|
@@ -42183,12 +42460,12 @@ var init_ratelimitDeleteOverride = __esm(() => {
|
|
|
42183
42460
|
});
|
|
42184
42461
|
|
|
42185
42462
|
// src/mcp-server/tools/ratelimitDeleteOverride.ts
|
|
42186
|
-
var
|
|
42463
|
+
var args34, tool$ratelimitDeleteOverride;
|
|
42187
42464
|
var init_ratelimitDeleteOverride2 = __esm(() => {
|
|
42188
42465
|
init_ratelimitDeleteOverride();
|
|
42189
42466
|
init_components();
|
|
42190
42467
|
init_tools();
|
|
42191
|
-
|
|
42468
|
+
args34 = {
|
|
42192
42469
|
request: V2RatelimitDeleteOverrideRequestBody$inboundSchema
|
|
42193
42470
|
};
|
|
42194
42471
|
tool$ratelimitDeleteOverride = {
|
|
@@ -42203,9 +42480,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
|
|
|
42203
42480
|
|
|
42204
42481
|
**Permissions:** Requires \`ratelimit.*.delete_override\` or \`ratelimit.<namespace_id>.delete_override\`
|
|
42205
42482
|
`,
|
|
42206
|
-
args:
|
|
42207
|
-
tool: async (client,
|
|
42208
|
-
const [result, apiCall] = await ratelimitDeleteOverride(client,
|
|
42483
|
+
args: args34,
|
|
42484
|
+
tool: async (client, args35, ctx) => {
|
|
42485
|
+
const [result, apiCall] = await ratelimitDeleteOverride(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42209
42486
|
if (!result.ok) {
|
|
42210
42487
|
return {
|
|
42211
42488
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42220,9 +42497,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
|
|
|
42220
42497
|
|
|
42221
42498
|
// src/funcs/ratelimitGetOverride.ts
|
|
42222
42499
|
function ratelimitGetOverride(client, request, options) {
|
|
42223
|
-
return new APIPromise($
|
|
42500
|
+
return new APIPromise($do35(client, request, options));
|
|
42224
42501
|
}
|
|
42225
|
-
async function $
|
|
42502
|
+
async function $do35(client, request, options) {
|
|
42226
42503
|
const parsed = safeParse(request, (value) => V2RatelimitGetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42227
42504
|
if (!parsed.ok) {
|
|
42228
42505
|
return [parsed, { status: "invalid" }];
|
|
@@ -42302,12 +42579,12 @@ var init_ratelimitGetOverride = __esm(() => {
|
|
|
42302
42579
|
});
|
|
42303
42580
|
|
|
42304
42581
|
// src/mcp-server/tools/ratelimitGetOverride.ts
|
|
42305
|
-
var
|
|
42582
|
+
var args35, tool$ratelimitGetOverride;
|
|
42306
42583
|
var init_ratelimitGetOverride2 = __esm(() => {
|
|
42307
42584
|
init_ratelimitGetOverride();
|
|
42308
42585
|
init_components();
|
|
42309
42586
|
init_tools();
|
|
42310
|
-
|
|
42587
|
+
args35 = {
|
|
42311
42588
|
request: V2RatelimitGetOverrideRequestBody$inboundSchema
|
|
42312
42589
|
};
|
|
42313
42590
|
tool$ratelimitGetOverride = {
|
|
@@ -42322,9 +42599,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
|
|
|
42322
42599
|
|
|
42323
42600
|
**Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
|
|
42324
42601
|
`,
|
|
42325
|
-
args:
|
|
42326
|
-
tool: async (client,
|
|
42327
|
-
const [result, apiCall] = await ratelimitGetOverride(client,
|
|
42602
|
+
args: args35,
|
|
42603
|
+
tool: async (client, args36, ctx) => {
|
|
42604
|
+
const [result, apiCall] = await ratelimitGetOverride(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42328
42605
|
if (!result.ok) {
|
|
42329
42606
|
return {
|
|
42330
42607
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42339,9 +42616,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
|
|
|
42339
42616
|
|
|
42340
42617
|
// src/funcs/ratelimitLimit.ts
|
|
42341
42618
|
function ratelimitLimit(client, request, options) {
|
|
42342
|
-
return new APIPromise($
|
|
42619
|
+
return new APIPromise($do36(client, request, options));
|
|
42343
42620
|
}
|
|
42344
|
-
async function $
|
|
42621
|
+
async function $do36(client, request, options) {
|
|
42345
42622
|
const parsed = safeParse(request, (value) => V2RatelimitLimitRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42346
42623
|
if (!parsed.ok) {
|
|
42347
42624
|
return [parsed, { status: "invalid" }];
|
|
@@ -42421,12 +42698,12 @@ var init_ratelimitLimit = __esm(() => {
|
|
|
42421
42698
|
});
|
|
42422
42699
|
|
|
42423
42700
|
// src/mcp-server/tools/ratelimitLimit.ts
|
|
42424
|
-
var
|
|
42701
|
+
var args36, tool$ratelimitLimit;
|
|
42425
42702
|
var init_ratelimitLimit2 = __esm(() => {
|
|
42426
42703
|
init_ratelimitLimit();
|
|
42427
42704
|
init_components();
|
|
42428
42705
|
init_tools();
|
|
42429
|
-
|
|
42706
|
+
args36 = {
|
|
42430
42707
|
request: V2RatelimitLimitRequestBody$inboundSchema
|
|
42431
42708
|
};
|
|
42432
42709
|
tool$ratelimitLimit = {
|
|
@@ -42444,14 +42721,10 @@ Use this for rate limiting beyond API keys - limit users by ID, IPs by address,
|
|
|
42444
42721
|
Your root key must have one of the following permissions:
|
|
42445
42722
|
- \`ratelimit.*.limit\` (to check limits in any namespace)
|
|
42446
42723
|
- \`ratelimit.<namespace_id>.limit\` (to check limits in a specific namespace)
|
|
42447
|
-
|
|
42448
|
-
**Side Effects**
|
|
42449
|
-
|
|
42450
|
-
Records rate limit metrics for analytics and monitoring, updates rate limit counters with sliding window algorithm, and optionally triggers override matching for custom limits.
|
|
42451
42724
|
`,
|
|
42452
|
-
args:
|
|
42453
|
-
tool: async (client,
|
|
42454
|
-
const [result, apiCall] = await ratelimitLimit(client,
|
|
42725
|
+
args: args36,
|
|
42726
|
+
tool: async (client, args37, ctx) => {
|
|
42727
|
+
const [result, apiCall] = await ratelimitLimit(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42455
42728
|
if (!result.ok) {
|
|
42456
42729
|
return {
|
|
42457
42730
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42466,9 +42739,9 @@ Records rate limit metrics for analytics and monitoring, updates rate limit coun
|
|
|
42466
42739
|
|
|
42467
42740
|
// src/funcs/ratelimitListOverrides.ts
|
|
42468
42741
|
function ratelimitListOverrides(client, request, options) {
|
|
42469
|
-
return new APIPromise($
|
|
42742
|
+
return new APIPromise($do37(client, request, options));
|
|
42470
42743
|
}
|
|
42471
|
-
async function $
|
|
42744
|
+
async function $do37(client, request, options) {
|
|
42472
42745
|
const parsed = safeParse(request, (value) => V2RatelimitListOverridesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42473
42746
|
if (!parsed.ok) {
|
|
42474
42747
|
return [parsed, { status: "invalid" }];
|
|
@@ -42548,12 +42821,12 @@ var init_ratelimitListOverrides = __esm(() => {
|
|
|
42548
42821
|
});
|
|
42549
42822
|
|
|
42550
42823
|
// src/mcp-server/tools/ratelimitListOverrides.ts
|
|
42551
|
-
var
|
|
42824
|
+
var args37, tool$ratelimitListOverrides;
|
|
42552
42825
|
var init_ratelimitListOverrides2 = __esm(() => {
|
|
42553
42826
|
init_ratelimitListOverrides();
|
|
42554
42827
|
init_components();
|
|
42555
42828
|
init_tools();
|
|
42556
|
-
|
|
42829
|
+
args37 = {
|
|
42557
42830
|
request: V2RatelimitListOverridesRequestBody$inboundSchema
|
|
42558
42831
|
};
|
|
42559
42832
|
tool$ratelimitListOverrides = {
|
|
@@ -42568,9 +42841,134 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
|
|
|
42568
42841
|
|
|
42569
42842
|
**Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
|
|
42570
42843
|
`,
|
|
42571
|
-
args:
|
|
42572
|
-
tool: async (client,
|
|
42573
|
-
const [result, apiCall] = await ratelimitListOverrides(client,
|
|
42844
|
+
args: args37,
|
|
42845
|
+
tool: async (client, args38, ctx) => {
|
|
42846
|
+
const [result, apiCall] = await ratelimitListOverrides(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42847
|
+
if (!result.ok) {
|
|
42848
|
+
return {
|
|
42849
|
+
content: [{ type: "text", text: result.error.message }],
|
|
42850
|
+
isError: true
|
|
42851
|
+
};
|
|
42852
|
+
}
|
|
42853
|
+
const value = result.value;
|
|
42854
|
+
return formatResult(value, apiCall);
|
|
42855
|
+
}
|
|
42856
|
+
};
|
|
42857
|
+
});
|
|
42858
|
+
|
|
42859
|
+
// src/funcs/ratelimitMultiLimit.ts
|
|
42860
|
+
function ratelimitMultiLimit(client, request, options) {
|
|
42861
|
+
return new APIPromise($do38(client, request, options));
|
|
42862
|
+
}
|
|
42863
|
+
async function $do38(client, request, options) {
|
|
42864
|
+
const parsed = safeParse(request, (value) => arrayType(V2RatelimitLimitRequestBody$outboundSchema).parse(value), "Input validation failed");
|
|
42865
|
+
if (!parsed.ok) {
|
|
42866
|
+
return [parsed, { status: "invalid" }];
|
|
42867
|
+
}
|
|
42868
|
+
const payload = parsed.value;
|
|
42869
|
+
const body = encodeJSON("body", payload, { explode: true });
|
|
42870
|
+
const path = pathToFunc("/v2/ratelimit.multiLimit")();
|
|
42871
|
+
const headers = new Headers(compactMap({
|
|
42872
|
+
"Content-Type": "application/json",
|
|
42873
|
+
Accept: "application/json"
|
|
42874
|
+
}));
|
|
42875
|
+
const secConfig = await extractSecurity(client._options.rootKey);
|
|
42876
|
+
const securityInput = secConfig == null ? {} : { rootKey: secConfig };
|
|
42877
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
42878
|
+
const context = {
|
|
42879
|
+
options: client._options,
|
|
42880
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
42881
|
+
operationID: "ratelimit.multiLimit",
|
|
42882
|
+
oAuth2Scopes: null,
|
|
42883
|
+
resolvedSecurity: requestSecurity,
|
|
42884
|
+
securitySource: client._options.rootKey,
|
|
42885
|
+
retryConfig: options?.retries || client._options.retryConfig || {
|
|
42886
|
+
strategy: "backoff",
|
|
42887
|
+
backoff: {
|
|
42888
|
+
initialInterval: 50,
|
|
42889
|
+
maxInterval: 1000,
|
|
42890
|
+
exponent: 1.5,
|
|
42891
|
+
maxElapsedTime: 1e4
|
|
42892
|
+
},
|
|
42893
|
+
retryConnectionErrors: true
|
|
42894
|
+
},
|
|
42895
|
+
retryCodes: options?.retryCodes || ["5XX"]
|
|
42896
|
+
};
|
|
42897
|
+
const requestRes = client._createRequest(context, {
|
|
42898
|
+
security: requestSecurity,
|
|
42899
|
+
method: "POST",
|
|
42900
|
+
baseURL: options?.serverURL,
|
|
42901
|
+
path,
|
|
42902
|
+
headers,
|
|
42903
|
+
body,
|
|
42904
|
+
userAgent: client._options.userAgent,
|
|
42905
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
42906
|
+
}, options);
|
|
42907
|
+
if (!requestRes.ok) {
|
|
42908
|
+
return [requestRes, { status: "invalid" }];
|
|
42909
|
+
}
|
|
42910
|
+
const req = requestRes.value;
|
|
42911
|
+
const doResult = await client._do(req, {
|
|
42912
|
+
context,
|
|
42913
|
+
errorCodes: ["400", "401", "403", "404", "410", "4XX", "500", "5XX"],
|
|
42914
|
+
retryConfig: context.retryConfig,
|
|
42915
|
+
retryCodes: context.retryCodes
|
|
42916
|
+
});
|
|
42917
|
+
if (!doResult.ok) {
|
|
42918
|
+
return [doResult, { status: "request-error", request: req }];
|
|
42919
|
+
}
|
|
42920
|
+
const response = doResult.value;
|
|
42921
|
+
const responseFields = {
|
|
42922
|
+
HttpMeta: { Response: response, Request: req }
|
|
42923
|
+
};
|
|
42924
|
+
const [result] = await match(json(200, V2RatelimitMultiLimitResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(410, GoneErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
|
|
42925
|
+
if (!result.ok) {
|
|
42926
|
+
return [result, { status: "complete", request: req, response }];
|
|
42927
|
+
}
|
|
42928
|
+
return [result, { status: "complete", request: req, response }];
|
|
42929
|
+
}
|
|
42930
|
+
var init_ratelimitMultiLimit = __esm(() => {
|
|
42931
|
+
init_v3();
|
|
42932
|
+
init_encodings();
|
|
42933
|
+
init_matchers();
|
|
42934
|
+
init_primitives();
|
|
42935
|
+
init_schemas();
|
|
42936
|
+
init_security();
|
|
42937
|
+
init_url();
|
|
42938
|
+
init_components();
|
|
42939
|
+
init_errors2();
|
|
42940
|
+
init_async();
|
|
42941
|
+
});
|
|
42942
|
+
|
|
42943
|
+
// src/mcp-server/tools/ratelimitMultiLimit.ts
|
|
42944
|
+
var args38, tool$ratelimitMultiLimit;
|
|
42945
|
+
var init_ratelimitMultiLimit2 = __esm(() => {
|
|
42946
|
+
init_v3();
|
|
42947
|
+
init_ratelimitMultiLimit();
|
|
42948
|
+
init_components();
|
|
42949
|
+
init_tools();
|
|
42950
|
+
args38 = {
|
|
42951
|
+
request: arrayType(V2RatelimitLimitRequestBody$inboundSchema)
|
|
42952
|
+
};
|
|
42953
|
+
tool$ratelimitMultiLimit = {
|
|
42954
|
+
name: "ratelimit-multi-limit",
|
|
42955
|
+
description: `Apply multiple rate limit checks
|
|
42956
|
+
|
|
42957
|
+
Check and enforce multiple rate limits in a single request for any identifiers (user IDs, IP addresses, API clients, etc.).
|
|
42958
|
+
|
|
42959
|
+
Use this to efficiently check multiple rate limits at once. Each rate limit check is independent and returns its own result with a top-level \`passed\` indicator showing if all checks succeeded.
|
|
42960
|
+
|
|
42961
|
+
**Response Codes**: Rate limit checks return HTTP 200 regardless of whether limits are exceeded - check the \`passed\` field to see if all limits passed, or the \`success\` field in each individual result. 4xx responses indicate auth, namespace existence/deletion, or validation errors (e.g., 410 Gone for deleted namespaces). 5xx responses indicate server errors.
|
|
42962
|
+
|
|
42963
|
+
**Required Permissions**
|
|
42964
|
+
|
|
42965
|
+
Your root key must have one of the following permissions:
|
|
42966
|
+
- \`ratelimit.*.limit\` (to check limits in any namespace)
|
|
42967
|
+
- \`ratelimit.<namespace_id>.limit\` (to check limits in all specific namespaces being checked)
|
|
42968
|
+
`,
|
|
42969
|
+
args: args38,
|
|
42970
|
+
tool: async (client, args39, ctx) => {
|
|
42971
|
+
const [result, apiCall] = await ratelimitMultiLimit(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42574
42972
|
if (!result.ok) {
|
|
42575
42973
|
return {
|
|
42576
42974
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42585,9 +42983,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
|
|
|
42585
42983
|
|
|
42586
42984
|
// src/funcs/ratelimitSetOverride.ts
|
|
42587
42985
|
function ratelimitSetOverride(client, request, options) {
|
|
42588
|
-
return new APIPromise($
|
|
42986
|
+
return new APIPromise($do39(client, request, options));
|
|
42589
42987
|
}
|
|
42590
|
-
async function $
|
|
42988
|
+
async function $do39(client, request, options) {
|
|
42591
42989
|
const parsed = safeParse(request, (value) => V2RatelimitSetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42592
42990
|
if (!parsed.ok) {
|
|
42593
42991
|
return [parsed, { status: "invalid" }];
|
|
@@ -42667,12 +43065,12 @@ var init_ratelimitSetOverride = __esm(() => {
|
|
|
42667
43065
|
});
|
|
42668
43066
|
|
|
42669
43067
|
// src/mcp-server/tools/ratelimitSetOverride.ts
|
|
42670
|
-
var
|
|
43068
|
+
var args39, tool$ratelimitSetOverride;
|
|
42671
43069
|
var init_ratelimitSetOverride2 = __esm(() => {
|
|
42672
43070
|
init_ratelimitSetOverride();
|
|
42673
43071
|
init_components();
|
|
42674
43072
|
init_tools();
|
|
42675
|
-
|
|
43073
|
+
args39 = {
|
|
42676
43074
|
request: V2RatelimitSetOverrideRequestBody$inboundSchema
|
|
42677
43075
|
};
|
|
42678
43076
|
tool$ratelimitSetOverride = {
|
|
@@ -42687,9 +43085,9 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
|
|
|
42687
43085
|
|
|
42688
43086
|
**Permissions:** Requires \`ratelimit.*.set_override\` or \`ratelimit.<namespace_id>.set_override\`
|
|
42689
43087
|
`,
|
|
42690
|
-
args:
|
|
42691
|
-
tool: async (client,
|
|
42692
|
-
const [result, apiCall] = await ratelimitSetOverride(client,
|
|
43088
|
+
args: args39,
|
|
43089
|
+
tool: async (client, args40, ctx) => {
|
|
43090
|
+
const [result, apiCall] = await ratelimitSetOverride(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42693
43091
|
if (!result.ok) {
|
|
42694
43092
|
return {
|
|
42695
43093
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42706,7 +43104,7 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
|
|
|
42706
43104
|
function createMCPServer(deps) {
|
|
42707
43105
|
const server = new McpServer({
|
|
42708
43106
|
name: "Unkey",
|
|
42709
|
-
version: "2.1.
|
|
43107
|
+
version: "2.1.1"
|
|
42710
43108
|
});
|
|
42711
43109
|
const client = new UnkeyCore({
|
|
42712
43110
|
rootKey: deps.rootKey,
|
|
@@ -42735,6 +43133,7 @@ function createMCPServer(deps) {
|
|
|
42735
43133
|
tool(tool$keysCreateKey);
|
|
42736
43134
|
tool(tool$keysDeleteKey);
|
|
42737
43135
|
tool(tool$keysGetKey);
|
|
43136
|
+
tool(tool$keysMigrateKeys);
|
|
42738
43137
|
tool(tool$keysRemovePermissions);
|
|
42739
43138
|
tool(tool$keysRemoveRoles);
|
|
42740
43139
|
tool(tool$keysRerollKey);
|
|
@@ -42756,6 +43155,7 @@ function createMCPServer(deps) {
|
|
|
42756
43155
|
tool(tool$ratelimitGetOverride);
|
|
42757
43156
|
tool(tool$ratelimitLimit);
|
|
42758
43157
|
tool(tool$ratelimitListOverrides);
|
|
43158
|
+
tool(tool$ratelimitMultiLimit);
|
|
42759
43159
|
tool(tool$ratelimitSetOverride);
|
|
42760
43160
|
return server;
|
|
42761
43161
|
}
|
|
@@ -42779,6 +43179,7 @@ var init_server2 = __esm(() => {
|
|
|
42779
43179
|
init_keysCreateKey2();
|
|
42780
43180
|
init_keysDeleteKey2();
|
|
42781
43181
|
init_keysGetKey2();
|
|
43182
|
+
init_keysMigrateKeys2();
|
|
42782
43183
|
init_keysRemovePermissions2();
|
|
42783
43184
|
init_keysRemoveRoles2();
|
|
42784
43185
|
init_keysRerollKey2();
|
|
@@ -42800,6 +43201,7 @@ var init_server2 = __esm(() => {
|
|
|
42800
43201
|
init_ratelimitGetOverride2();
|
|
42801
43202
|
init_ratelimitLimit2();
|
|
42802
43203
|
init_ratelimitListOverrides2();
|
|
43204
|
+
init_ratelimitMultiLimit2();
|
|
42803
43205
|
init_ratelimitSetOverride2();
|
|
42804
43206
|
});
|
|
42805
43207
|
|
|
@@ -43996,7 +44398,7 @@ var routes = ln({
|
|
|
43996
44398
|
var app = _e(routes, {
|
|
43997
44399
|
name: "mcp",
|
|
43998
44400
|
versionInfo: {
|
|
43999
|
-
currentVersion: "2.1.
|
|
44401
|
+
currentVersion: "2.1.1"
|
|
44000
44402
|
}
|
|
44001
44403
|
});
|
|
44002
44404
|
Yt(app, process3.argv.slice(2), buildContext(process3));
|
|
@@ -44004,5 +44406,5 @@ export {
|
|
|
44004
44406
|
app
|
|
44005
44407
|
};
|
|
44006
44408
|
|
|
44007
|
-
//# debugId=
|
|
44409
|
+
//# debugId=8A332BD30B1038DF64756E2164756E21
|
|
44008
44410
|
//# sourceMappingURL=mcp-server.js.map
|