@unkey/api 2.1.0 → 2.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (202) hide show
  1. package/README.md +10 -6
  2. package/bin/mcp-server.js +568 -166
  3. package/bin/mcp-server.js.map +23 -11
  4. package/dist/commonjs/funcs/keysMigrateKeys.d.ts +23 -0
  5. package/dist/commonjs/funcs/keysMigrateKeys.d.ts.map +1 -0
  6. package/dist/commonjs/funcs/keysMigrateKeys.js +133 -0
  7. package/dist/commonjs/funcs/keysMigrateKeys.js.map +1 -0
  8. package/dist/commonjs/funcs/ratelimitLimit.d.ts +0 -4
  9. package/dist/commonjs/funcs/ratelimitLimit.d.ts.map +1 -1
  10. package/dist/commonjs/funcs/ratelimitLimit.js +0 -4
  11. package/dist/commonjs/funcs/ratelimitLimit.js.map +1 -1
  12. package/dist/commonjs/funcs/ratelimitMultiLimit.d.ts +28 -0
  13. package/dist/commonjs/funcs/ratelimitMultiLimit.d.ts.map +1 -0
  14. package/dist/commonjs/funcs/ratelimitMultiLimit.js +139 -0
  15. package/dist/commonjs/funcs/ratelimitMultiLimit.js.map +1 -0
  16. package/dist/commonjs/lib/config.d.ts +3 -3
  17. package/dist/commonjs/lib/config.js +3 -3
  18. package/dist/commonjs/mcp-server/mcp-server.js +1 -1
  19. package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
  20. package/dist/commonjs/mcp-server/server.js +5 -1
  21. package/dist/commonjs/mcp-server/server.js.map +1 -1
  22. package/dist/commonjs/mcp-server/tools/keysMigrateKeys.d.ts +8 -0
  23. package/dist/commonjs/mcp-server/tools/keysMigrateKeys.d.ts.map +1 -0
  24. package/dist/commonjs/mcp-server/tools/keysMigrateKeys.js +70 -0
  25. package/dist/commonjs/mcp-server/tools/keysMigrateKeys.js.map +1 -0
  26. package/dist/commonjs/mcp-server/tools/ratelimitLimit.d.ts.map +1 -1
  27. package/dist/commonjs/mcp-server/tools/ratelimitLimit.js +0 -4
  28. package/dist/commonjs/mcp-server/tools/ratelimitLimit.js.map +1 -1
  29. package/dist/commonjs/mcp-server/tools/ratelimitMultiLimit.d.ts +9 -0
  30. package/dist/commonjs/mcp-server/tools/ratelimitMultiLimit.d.ts.map +1 -0
  31. package/dist/commonjs/mcp-server/tools/ratelimitMultiLimit.js +76 -0
  32. package/dist/commonjs/mcp-server/tools/ratelimitMultiLimit.js.map +1 -0
  33. package/dist/commonjs/models/components/index.d.ts +8 -0
  34. package/dist/commonjs/models/components/index.d.ts.map +1 -1
  35. package/dist/commonjs/models/components/index.js +8 -0
  36. package/dist/commonjs/models/components/index.js.map +1 -1
  37. package/dist/commonjs/models/components/v2keysmigratekeydata.d.ts +113 -0
  38. package/dist/commonjs/models/components/v2keysmigratekeydata.d.ts.map +1 -0
  39. package/dist/commonjs/models/components/v2keysmigratekeydata.js +78 -0
  40. package/dist/commonjs/models/components/v2keysmigratekeydata.js.map +1 -0
  41. package/dist/commonjs/models/components/v2keysmigratekeysmigration.d.ts +25 -0
  42. package/dist/commonjs/models/components/v2keysmigratekeysmigration.d.ts.map +1 -0
  43. package/dist/commonjs/models/components/v2keysmigratekeysmigration.js +60 -0
  44. package/dist/commonjs/models/components/v2keysmigratekeysmigration.js.map +1 -0
  45. package/dist/commonjs/models/components/v2keysmigratekeysrequestbody.d.ts +28 -0
  46. package/dist/commonjs/models/components/v2keysmigratekeysrequestbody.d.ts.map +1 -0
  47. package/dist/commonjs/models/components/v2keysmigratekeysrequestbody.js +63 -0
  48. package/dist/commonjs/models/components/v2keysmigratekeysrequestbody.js.map +1 -0
  49. package/dist/commonjs/models/components/v2keysmigratekeysresponsebody.d.ts +24 -0
  50. package/dist/commonjs/models/components/v2keysmigratekeysresponsebody.d.ts.map +1 -0
  51. package/dist/commonjs/models/components/v2keysmigratekeysresponsebody.js +62 -0
  52. package/dist/commonjs/models/components/v2keysmigratekeysresponsebody.js.map +1 -0
  53. package/dist/commonjs/models/components/v2keysmigratekeysresponsedata.d.ts +26 -0
  54. package/dist/commonjs/models/components/v2keysmigratekeysresponsedata.d.ts.map +1 -0
  55. package/dist/commonjs/models/components/v2keysmigratekeysresponsedata.js +61 -0
  56. package/dist/commonjs/models/components/v2keysmigratekeysresponsedata.js.map +1 -0
  57. package/dist/commonjs/models/components/v2keysverifykeyrequestbody.d.ts +5 -0
  58. package/dist/commonjs/models/components/v2keysverifykeyrequestbody.d.ts.map +1 -1
  59. package/dist/commonjs/models/components/v2keysverifykeyrequestbody.js +2 -0
  60. package/dist/commonjs/models/components/v2keysverifykeyrequestbody.js.map +1 -1
  61. package/dist/commonjs/models/components/v2keysverifykeyresponsedata.d.ts +3 -3
  62. package/dist/commonjs/models/components/v2ratelimitmultilimitcheck.d.ts +84 -0
  63. package/dist/commonjs/models/components/v2ratelimitmultilimitcheck.d.ts.map +1 -0
  64. package/dist/commonjs/models/components/v2ratelimitmultilimitcheck.js +70 -0
  65. package/dist/commonjs/models/components/v2ratelimitmultilimitcheck.js.map +1 -0
  66. package/dist/commonjs/models/components/v2ratelimitmultilimitresponsebody.d.ts +27 -0
  67. package/dist/commonjs/models/components/v2ratelimitmultilimitresponsebody.d.ts.map +1 -0
  68. package/dist/commonjs/models/components/v2ratelimitmultilimitresponsebody.js +62 -0
  69. package/dist/commonjs/models/components/v2ratelimitmultilimitresponsebody.js.map +1 -0
  70. package/dist/commonjs/models/components/v2ratelimitmultilimitresponsedata.d.ts +33 -0
  71. package/dist/commonjs/models/components/v2ratelimitmultilimitresponsedata.d.ts.map +1 -0
  72. package/dist/commonjs/models/components/v2ratelimitmultilimitresponsedata.js +61 -0
  73. package/dist/commonjs/models/components/v2ratelimitmultilimitresponsedata.js.map +1 -0
  74. package/dist/commonjs/sdk/keys.d.ts +12 -0
  75. package/dist/commonjs/sdk/keys.d.ts.map +1 -1
  76. package/dist/commonjs/sdk/keys.js +15 -0
  77. package/dist/commonjs/sdk/keys.js.map +1 -1
  78. package/dist/commonjs/sdk/ratelimit.d.ts +17 -4
  79. package/dist/commonjs/sdk/ratelimit.d.ts.map +1 -1
  80. package/dist/commonjs/sdk/ratelimit.js +20 -4
  81. package/dist/commonjs/sdk/ratelimit.js.map +1 -1
  82. package/dist/commonjs/types/enums.d.ts +10 -6
  83. package/dist/commonjs/types/enums.d.ts.map +1 -1
  84. package/dist/commonjs/types/enums.js +76 -2
  85. package/dist/commonjs/types/enums.js.map +1 -1
  86. package/dist/commonjs/types/index.d.ts +0 -1
  87. package/dist/commonjs/types/index.d.ts.map +1 -1
  88. package/dist/commonjs/types/index.js +1 -3
  89. package/dist/commonjs/types/index.js.map +1 -1
  90. package/dist/esm/funcs/keysMigrateKeys.d.ts +23 -0
  91. package/dist/esm/funcs/keysMigrateKeys.d.ts.map +1 -0
  92. package/dist/esm/funcs/keysMigrateKeys.js +97 -0
  93. package/dist/esm/funcs/keysMigrateKeys.js.map +1 -0
  94. package/dist/esm/funcs/ratelimitLimit.d.ts +0 -4
  95. package/dist/esm/funcs/ratelimitLimit.d.ts.map +1 -1
  96. package/dist/esm/funcs/ratelimitLimit.js +0 -4
  97. package/dist/esm/funcs/ratelimitLimit.js.map +1 -1
  98. package/dist/esm/funcs/ratelimitMultiLimit.d.ts +28 -0
  99. package/dist/esm/funcs/ratelimitMultiLimit.d.ts.map +1 -0
  100. package/dist/esm/funcs/ratelimitMultiLimit.js +103 -0
  101. package/dist/esm/funcs/ratelimitMultiLimit.js.map +1 -0
  102. package/dist/esm/lib/config.d.ts +3 -3
  103. package/dist/esm/lib/config.js +3 -3
  104. package/dist/esm/mcp-server/mcp-server.js +1 -1
  105. package/dist/esm/mcp-server/server.d.ts.map +1 -1
  106. package/dist/esm/mcp-server/server.js +5 -1
  107. package/dist/esm/mcp-server/server.js.map +1 -1
  108. package/dist/esm/mcp-server/tools/keysMigrateKeys.d.ts +8 -0
  109. package/dist/esm/mcp-server/tools/keysMigrateKeys.d.ts.map +1 -0
  110. package/dist/esm/mcp-server/tools/keysMigrateKeys.js +34 -0
  111. package/dist/esm/mcp-server/tools/keysMigrateKeys.js.map +1 -0
  112. package/dist/esm/mcp-server/tools/ratelimitLimit.d.ts.map +1 -1
  113. package/dist/esm/mcp-server/tools/ratelimitLimit.js +0 -4
  114. package/dist/esm/mcp-server/tools/ratelimitLimit.js.map +1 -1
  115. package/dist/esm/mcp-server/tools/ratelimitMultiLimit.d.ts +9 -0
  116. package/dist/esm/mcp-server/tools/ratelimitMultiLimit.d.ts.map +1 -0
  117. package/dist/esm/mcp-server/tools/ratelimitMultiLimit.js +40 -0
  118. package/dist/esm/mcp-server/tools/ratelimitMultiLimit.js.map +1 -0
  119. package/dist/esm/models/components/index.d.ts +8 -0
  120. package/dist/esm/models/components/index.d.ts.map +1 -1
  121. package/dist/esm/models/components/index.js +8 -0
  122. package/dist/esm/models/components/index.js.map +1 -1
  123. package/dist/esm/models/components/v2keysmigratekeydata.d.ts +113 -0
  124. package/dist/esm/models/components/v2keysmigratekeydata.d.ts.map +1 -0
  125. package/dist/esm/models/components/v2keysmigratekeydata.js +40 -0
  126. package/dist/esm/models/components/v2keysmigratekeydata.js.map +1 -0
  127. package/dist/esm/models/components/v2keysmigratekeysmigration.d.ts +25 -0
  128. package/dist/esm/models/components/v2keysmigratekeysmigration.d.ts.map +1 -0
  129. package/dist/esm/models/components/v2keysmigratekeysmigration.js +22 -0
  130. package/dist/esm/models/components/v2keysmigratekeysmigration.js.map +1 -0
  131. package/dist/esm/models/components/v2keysmigratekeysrequestbody.d.ts +28 -0
  132. package/dist/esm/models/components/v2keysmigratekeysrequestbody.d.ts.map +1 -0
  133. package/dist/esm/models/components/v2keysmigratekeysrequestbody.js +25 -0
  134. package/dist/esm/models/components/v2keysmigratekeysrequestbody.js.map +1 -0
  135. package/dist/esm/models/components/v2keysmigratekeysresponsebody.d.ts +24 -0
  136. package/dist/esm/models/components/v2keysmigratekeysresponsebody.d.ts.map +1 -0
  137. package/dist/esm/models/components/v2keysmigratekeysresponsebody.js +24 -0
  138. package/dist/esm/models/components/v2keysmigratekeysresponsebody.js.map +1 -0
  139. package/dist/esm/models/components/v2keysmigratekeysresponsedata.d.ts +26 -0
  140. package/dist/esm/models/components/v2keysmigratekeysresponsedata.d.ts.map +1 -0
  141. package/dist/esm/models/components/v2keysmigratekeysresponsedata.js +23 -0
  142. package/dist/esm/models/components/v2keysmigratekeysresponsedata.js.map +1 -0
  143. package/dist/esm/models/components/v2keysverifykeyrequestbody.d.ts +5 -0
  144. package/dist/esm/models/components/v2keysverifykeyrequestbody.d.ts.map +1 -1
  145. package/dist/esm/models/components/v2keysverifykeyrequestbody.js +2 -0
  146. package/dist/esm/models/components/v2keysverifykeyrequestbody.js.map +1 -1
  147. package/dist/esm/models/components/v2keysverifykeyresponsedata.d.ts +3 -3
  148. package/dist/esm/models/components/v2ratelimitmultilimitcheck.d.ts +84 -0
  149. package/dist/esm/models/components/v2ratelimitmultilimitcheck.d.ts.map +1 -0
  150. package/dist/esm/models/components/v2ratelimitmultilimitcheck.js +32 -0
  151. package/dist/esm/models/components/v2ratelimitmultilimitcheck.js.map +1 -0
  152. package/dist/esm/models/components/v2ratelimitmultilimitresponsebody.d.ts +27 -0
  153. package/dist/esm/models/components/v2ratelimitmultilimitresponsebody.d.ts.map +1 -0
  154. package/dist/esm/models/components/v2ratelimitmultilimitresponsebody.js +24 -0
  155. package/dist/esm/models/components/v2ratelimitmultilimitresponsebody.js.map +1 -0
  156. package/dist/esm/models/components/v2ratelimitmultilimitresponsedata.d.ts +33 -0
  157. package/dist/esm/models/components/v2ratelimitmultilimitresponsedata.d.ts.map +1 -0
  158. package/dist/esm/models/components/v2ratelimitmultilimitresponsedata.js +23 -0
  159. package/dist/esm/models/components/v2ratelimitmultilimitresponsedata.js.map +1 -0
  160. package/dist/esm/sdk/keys.d.ts +12 -0
  161. package/dist/esm/sdk/keys.d.ts.map +1 -1
  162. package/dist/esm/sdk/keys.js +15 -0
  163. package/dist/esm/sdk/keys.js.map +1 -1
  164. package/dist/esm/sdk/ratelimit.d.ts +17 -4
  165. package/dist/esm/sdk/ratelimit.d.ts.map +1 -1
  166. package/dist/esm/sdk/ratelimit.js +20 -4
  167. package/dist/esm/sdk/ratelimit.js.map +1 -1
  168. package/dist/esm/types/enums.d.ts +10 -6
  169. package/dist/esm/types/enums.d.ts.map +1 -1
  170. package/dist/esm/types/enums.js +38 -1
  171. package/dist/esm/types/enums.js.map +1 -1
  172. package/dist/esm/types/index.d.ts +0 -1
  173. package/dist/esm/types/index.d.ts.map +1 -1
  174. package/dist/esm/types/index.js +0 -1
  175. package/dist/esm/types/index.js.map +1 -1
  176. package/examples/package-lock.json +1 -1
  177. package/jsr.json +1 -1
  178. package/package.json +1 -1
  179. package/src/funcs/keysMigrateKeys.ts +201 -0
  180. package/src/funcs/ratelimitLimit.ts +0 -4
  181. package/src/funcs/ratelimitMultiLimit.ts +213 -0
  182. package/src/lib/config.ts +3 -3
  183. package/src/mcp-server/mcp-server.ts +1 -1
  184. package/src/mcp-server/server.ts +5 -1
  185. package/src/mcp-server/tools/keysMigrateKeys.ts +43 -0
  186. package/src/mcp-server/tools/ratelimitLimit.ts +0 -4
  187. package/src/mcp-server/tools/ratelimitMultiLimit.ts +49 -0
  188. package/src/models/components/index.ts +8 -0
  189. package/src/models/components/v2keysmigratekeydata.ts +171 -0
  190. package/src/models/components/v2keysmigratekeysmigration.ts +61 -0
  191. package/src/models/components/v2keysmigratekeysrequestbody.ts +73 -0
  192. package/src/models/components/v2keysmigratekeysresponsebody.ts +72 -0
  193. package/src/models/components/v2keysmigratekeysresponsedata.ts +69 -0
  194. package/src/models/components/v2keysverifykeyrequestbody.ts +7 -0
  195. package/src/models/components/v2keysverifykeyresponsedata.ts +3 -3
  196. package/src/models/components/v2ratelimitmultilimitcheck.ts +130 -0
  197. package/src/models/components/v2ratelimitmultilimitresponsebody.ts +75 -0
  198. package/src/models/components/v2ratelimitmultilimitresponsedata.ts +76 -0
  199. package/src/sdk/keys.ts +23 -0
  200. package/src/sdk/ratelimit.ts +28 -4
  201. package/src/types/enums.ts +55 -6
  202. package/src/types/index.ts +0 -1
package/bin/mcp-server.js CHANGED
@@ -34274,9 +34274,9 @@ var init_config = __esm(() => {
34274
34274
  SDK_METADATA = {
34275
34275
  language: "typescript",
34276
34276
  openapiDocVersion: "2.0.0",
34277
- sdkVersion: "2.1.0",
34278
- genVersion: "2.743.9",
34279
- userAgent: "speakeasy-sdk/typescript 2.1.0 2.743.9 2.0.0 @unkey/api"
34277
+ sdkVersion: "2.1.1",
34278
+ genVersion: "2.753.1",
34279
+ userAgent: "speakeasy-sdk/typescript 2.1.1 2.753.1 2.0.0 @unkey/api"
34280
34280
  };
34281
34281
  });
34282
34282
 
@@ -36609,6 +36609,100 @@ var init_v2keysgetkeyresponsebody = __esm(() => {
36609
36609
  });
36610
36610
  });
36611
36611
 
36612
+ // src/models/components/v2keysmigratekeydata.ts
36613
+ var V2KeysMigrateKeyData$inboundSchema, V2KeysMigrateKeyData$outboundSchema;
36614
+ var init_v2keysmigratekeydata = __esm(() => {
36615
+ init_v3();
36616
+ init_keycreditsdata();
36617
+ init_ratelimitrequest();
36618
+ V2KeysMigrateKeyData$inboundSchema = objectType({
36619
+ hash: stringType(),
36620
+ name: stringType().optional(),
36621
+ externalId: stringType().optional(),
36622
+ meta: recordType(anyType()).optional(),
36623
+ roles: arrayType(stringType()).optional(),
36624
+ permissions: arrayType(stringType()).optional(),
36625
+ expires: numberType().int().optional(),
36626
+ enabled: booleanType().default(true),
36627
+ credits: KeyCreditsData$inboundSchema.optional(),
36628
+ ratelimits: arrayType(RatelimitRequest$inboundSchema).optional()
36629
+ });
36630
+ V2KeysMigrateKeyData$outboundSchema = objectType({
36631
+ hash: stringType(),
36632
+ name: stringType().optional(),
36633
+ externalId: stringType().optional(),
36634
+ meta: recordType(anyType()).optional(),
36635
+ roles: arrayType(stringType()).optional(),
36636
+ permissions: arrayType(stringType()).optional(),
36637
+ expires: numberType().int().optional(),
36638
+ enabled: booleanType().default(true),
36639
+ credits: KeyCreditsData$outboundSchema.optional(),
36640
+ ratelimits: arrayType(RatelimitRequest$outboundSchema).optional()
36641
+ });
36642
+ });
36643
+
36644
+ // src/models/components/v2keysmigratekeysmigration.ts
36645
+ var V2KeysMigrateKeysMigration$inboundSchema, V2KeysMigrateKeysMigration$outboundSchema;
36646
+ var init_v2keysmigratekeysmigration = __esm(() => {
36647
+ init_v3();
36648
+ V2KeysMigrateKeysMigration$inboundSchema = objectType({
36649
+ hash: stringType(),
36650
+ keyId: stringType()
36651
+ });
36652
+ V2KeysMigrateKeysMigration$outboundSchema = objectType({
36653
+ hash: stringType(),
36654
+ keyId: stringType()
36655
+ });
36656
+ });
36657
+
36658
+ // src/models/components/v2keysmigratekeysrequestbody.ts
36659
+ var V2KeysMigrateKeysRequestBody$inboundSchema, V2KeysMigrateKeysRequestBody$outboundSchema;
36660
+ var init_v2keysmigratekeysrequestbody = __esm(() => {
36661
+ init_v3();
36662
+ init_v2keysmigratekeydata();
36663
+ V2KeysMigrateKeysRequestBody$inboundSchema = objectType({
36664
+ migrationId: stringType(),
36665
+ apiId: stringType(),
36666
+ keys: arrayType(V2KeysMigrateKeyData$inboundSchema)
36667
+ });
36668
+ V2KeysMigrateKeysRequestBody$outboundSchema = objectType({
36669
+ migrationId: stringType(),
36670
+ apiId: stringType(),
36671
+ keys: arrayType(V2KeysMigrateKeyData$outboundSchema)
36672
+ });
36673
+ });
36674
+
36675
+ // src/models/components/v2keysmigratekeysresponsedata.ts
36676
+ var V2KeysMigrateKeysResponseData$inboundSchema, V2KeysMigrateKeysResponseData$outboundSchema;
36677
+ var init_v2keysmigratekeysresponsedata = __esm(() => {
36678
+ init_v3();
36679
+ init_v2keysmigratekeysmigration();
36680
+ V2KeysMigrateKeysResponseData$inboundSchema = objectType({
36681
+ migrated: arrayType(V2KeysMigrateKeysMigration$inboundSchema),
36682
+ failed: arrayType(stringType())
36683
+ });
36684
+ V2KeysMigrateKeysResponseData$outboundSchema = objectType({
36685
+ migrated: arrayType(V2KeysMigrateKeysMigration$outboundSchema),
36686
+ failed: arrayType(stringType())
36687
+ });
36688
+ });
36689
+
36690
+ // src/models/components/v2keysmigratekeysresponsebody.ts
36691
+ var V2KeysMigrateKeysResponseBody$inboundSchema, V2KeysMigrateKeysResponseBody$outboundSchema;
36692
+ var init_v2keysmigratekeysresponsebody = __esm(() => {
36693
+ init_v3();
36694
+ init_meta();
36695
+ init_v2keysmigratekeysresponsedata();
36696
+ V2KeysMigrateKeysResponseBody$inboundSchema = objectType({
36697
+ meta: Meta$inboundSchema,
36698
+ data: V2KeysMigrateKeysResponseData$inboundSchema
36699
+ });
36700
+ V2KeysMigrateKeysResponseBody$outboundSchema = objectType({
36701
+ meta: Meta$outboundSchema,
36702
+ data: V2KeysMigrateKeysResponseData$outboundSchema
36703
+ });
36704
+ });
36705
+
36612
36706
  // src/models/components/v2keysremovepermissionsrequestbody.ts
36613
36707
  var V2KeysRemovePermissionsRequestBody$inboundSchema, V2KeysRemovePermissionsRequestBody$outboundSchema;
36614
36708
  var init_v2keysremovepermissionsrequestbody = __esm(() => {
@@ -36871,14 +36965,16 @@ var init_v2keysverifykeyrequestbody = __esm(() => {
36871
36965
  tags: arrayType(stringType()).optional(),
36872
36966
  permissions: stringType().optional(),
36873
36967
  credits: KeysVerifyKeyCredits$inboundSchema.optional(),
36874
- ratelimits: arrayType(KeysVerifyKeyRatelimit$inboundSchema).optional()
36968
+ ratelimits: arrayType(KeysVerifyKeyRatelimit$inboundSchema).optional(),
36969
+ migrationId: stringType().optional()
36875
36970
  });
36876
36971
  V2KeysVerifyKeyRequestBody$outboundSchema = objectType({
36877
36972
  key: stringType(),
36878
36973
  tags: arrayType(stringType()).optional(),
36879
36974
  permissions: stringType().optional(),
36880
36975
  credits: KeysVerifyKeyCredits$outboundSchema.optional(),
36881
- ratelimits: arrayType(KeysVerifyKeyRatelimit$outboundSchema).optional()
36976
+ ratelimits: arrayType(KeysVerifyKeyRatelimit$outboundSchema).optional(),
36977
+ migrationId: stringType().optional()
36882
36978
  });
36883
36979
  });
36884
36980
 
@@ -37424,6 +37520,61 @@ var init_v2ratelimitlistoverridesresponsebody = __esm(() => {
37424
37520
  });
37425
37521
  });
37426
37522
 
37523
+ // src/models/components/v2ratelimitmultilimitcheck.ts
37524
+ var V2RatelimitMultiLimitCheck$inboundSchema, V2RatelimitMultiLimitCheck$outboundSchema;
37525
+ var init_v2ratelimitmultilimitcheck = __esm(() => {
37526
+ init_v3();
37527
+ V2RatelimitMultiLimitCheck$inboundSchema = objectType({
37528
+ namespace: stringType(),
37529
+ identifier: stringType(),
37530
+ limit: numberType().int(),
37531
+ remaining: numberType().int(),
37532
+ reset: numberType().int(),
37533
+ passed: booleanType(),
37534
+ overrideId: stringType().optional()
37535
+ });
37536
+ V2RatelimitMultiLimitCheck$outboundSchema = objectType({
37537
+ namespace: stringType(),
37538
+ identifier: stringType(),
37539
+ limit: numberType().int(),
37540
+ remaining: numberType().int(),
37541
+ reset: numberType().int(),
37542
+ passed: booleanType(),
37543
+ overrideId: stringType().optional()
37544
+ });
37545
+ });
37546
+
37547
+ // src/models/components/v2ratelimitmultilimitresponsedata.ts
37548
+ var V2RatelimitMultiLimitResponseData$inboundSchema, V2RatelimitMultiLimitResponseData$outboundSchema;
37549
+ var init_v2ratelimitmultilimitresponsedata = __esm(() => {
37550
+ init_v3();
37551
+ init_v2ratelimitmultilimitcheck();
37552
+ V2RatelimitMultiLimitResponseData$inboundSchema = objectType({
37553
+ passed: booleanType(),
37554
+ limits: arrayType(V2RatelimitMultiLimitCheck$inboundSchema)
37555
+ });
37556
+ V2RatelimitMultiLimitResponseData$outboundSchema = objectType({
37557
+ passed: booleanType(),
37558
+ limits: arrayType(V2RatelimitMultiLimitCheck$outboundSchema)
37559
+ });
37560
+ });
37561
+
37562
+ // src/models/components/v2ratelimitmultilimitresponsebody.ts
37563
+ var V2RatelimitMultiLimitResponseBody$inboundSchema, V2RatelimitMultiLimitResponseBody$outboundSchema;
37564
+ var init_v2ratelimitmultilimitresponsebody = __esm(() => {
37565
+ init_v3();
37566
+ init_meta();
37567
+ init_v2ratelimitmultilimitresponsedata();
37568
+ V2RatelimitMultiLimitResponseBody$inboundSchema = objectType({
37569
+ meta: Meta$inboundSchema,
37570
+ data: V2RatelimitMultiLimitResponseData$inboundSchema
37571
+ });
37572
+ V2RatelimitMultiLimitResponseBody$outboundSchema = objectType({
37573
+ meta: Meta$outboundSchema,
37574
+ data: V2RatelimitMultiLimitResponseData$outboundSchema
37575
+ });
37576
+ });
37577
+
37427
37578
  // src/models/components/v2ratelimitsetoverriderequestbody.ts
37428
37579
  var V2RatelimitSetOverrideRequestBody$inboundSchema, V2RatelimitSetOverrideRequestBody$outboundSchema;
37429
37580
  var init_v2ratelimitsetoverriderequestbody = __esm(() => {
@@ -37525,6 +37676,11 @@ var init_components = __esm(() => {
37525
37676
  init_v2keysdeletekeyresponsebody();
37526
37677
  init_v2keysgetkeyrequestbody();
37527
37678
  init_v2keysgetkeyresponsebody();
37679
+ init_v2keysmigratekeydata();
37680
+ init_v2keysmigratekeysmigration();
37681
+ init_v2keysmigratekeysrequestbody();
37682
+ init_v2keysmigratekeysresponsebody();
37683
+ init_v2keysmigratekeysresponsedata();
37528
37684
  init_v2keysremovepermissionsrequestbody();
37529
37685
  init_v2keysremovepermissionsresponsebody();
37530
37686
  init_v2keysremoverolesrequestbody();
@@ -37573,6 +37729,9 @@ var init_components = __esm(() => {
37573
37729
  init_v2ratelimitlimitresponsedata();
37574
37730
  init_v2ratelimitlistoverridesrequestbody();
37575
37731
  init_v2ratelimitlistoverridesresponsebody();
37732
+ init_v2ratelimitmultilimitcheck();
37733
+ init_v2ratelimitmultilimitresponsebody();
37734
+ init_v2ratelimitmultilimitresponsedata();
37576
37735
  init_v2ratelimitsetoverriderequestbody();
37577
37736
  init_v2ratelimitsetoverrideresponsebody();
37578
37737
  init_v2ratelimitsetoverrideresponsedata();
@@ -39986,11 +40145,129 @@ Additional permission required for decrypt functionality:
39986
40145
  };
39987
40146
  });
39988
40147
 
39989
- // src/funcs/keysRemovePermissions.ts
39990
- function keysRemovePermissions(client, request, options) {
40148
+ // src/funcs/keysMigrateKeys.ts
40149
+ function keysMigrateKeys(client, request, options) {
39991
40150
  return new APIPromise($do16(client, request, options));
39992
40151
  }
39993
40152
  async function $do16(client, request, options) {
40153
+ const parsed = safeParse(request, (value) => V2KeysMigrateKeysRequestBody$outboundSchema.parse(value), "Input validation failed");
40154
+ if (!parsed.ok) {
40155
+ return [parsed, { status: "invalid" }];
40156
+ }
40157
+ const payload = parsed.value;
40158
+ const body = encodeJSON("body", payload, { explode: true });
40159
+ const path = pathToFunc("/v2/keys.migrateKeys")();
40160
+ const headers = new Headers(compactMap({
40161
+ "Content-Type": "application/json",
40162
+ Accept: "application/json"
40163
+ }));
40164
+ const secConfig = await extractSecurity(client._options.rootKey);
40165
+ const securityInput = secConfig == null ? {} : { rootKey: secConfig };
40166
+ const requestSecurity = resolveGlobalSecurity(securityInput);
40167
+ const context = {
40168
+ options: client._options,
40169
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
40170
+ operationID: "migrateKeys",
40171
+ oAuth2Scopes: null,
40172
+ resolvedSecurity: requestSecurity,
40173
+ securitySource: client._options.rootKey,
40174
+ retryConfig: options?.retries || client._options.retryConfig || {
40175
+ strategy: "backoff",
40176
+ backoff: {
40177
+ initialInterval: 50,
40178
+ maxInterval: 1000,
40179
+ exponent: 1.5,
40180
+ maxElapsedTime: 1e4
40181
+ },
40182
+ retryConnectionErrors: true
40183
+ },
40184
+ retryCodes: options?.retryCodes || ["5XX"]
40185
+ };
40186
+ const requestRes = client._createRequest(context, {
40187
+ security: requestSecurity,
40188
+ method: "POST",
40189
+ baseURL: options?.serverURL,
40190
+ path,
40191
+ headers,
40192
+ body,
40193
+ userAgent: client._options.userAgent,
40194
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
40195
+ }, options);
40196
+ if (!requestRes.ok) {
40197
+ return [requestRes, { status: "invalid" }];
40198
+ }
40199
+ const req = requestRes.value;
40200
+ const doResult = await client._do(req, {
40201
+ context,
40202
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
40203
+ retryConfig: context.retryConfig,
40204
+ retryCodes: context.retryCodes
40205
+ });
40206
+ if (!doResult.ok) {
40207
+ return [doResult, { status: "request-error", request: req }];
40208
+ }
40209
+ const response = doResult.value;
40210
+ const responseFields = {
40211
+ HttpMeta: { Response: response, Request: req }
40212
+ };
40213
+ const [result] = await match(json(200, V2KeysMigrateKeysResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
40214
+ if (!result.ok) {
40215
+ return [result, { status: "complete", request: req, response }];
40216
+ }
40217
+ return [result, { status: "complete", request: req, response }];
40218
+ }
40219
+ var init_keysMigrateKeys = __esm(() => {
40220
+ init_encodings();
40221
+ init_matchers();
40222
+ init_primitives();
40223
+ init_schemas();
40224
+ init_security();
40225
+ init_url();
40226
+ init_components();
40227
+ init_errors2();
40228
+ init_async();
40229
+ });
40230
+
40231
+ // src/mcp-server/tools/keysMigrateKeys.ts
40232
+ var args16, tool$keysMigrateKeys;
40233
+ var init_keysMigrateKeys2 = __esm(() => {
40234
+ init_keysMigrateKeys();
40235
+ init_components();
40236
+ init_tools();
40237
+ args16 = {
40238
+ request: V2KeysMigrateKeysRequestBody$inboundSchema
40239
+ };
40240
+ tool$keysMigrateKeys = {
40241
+ name: "keys-migrate-keys",
40242
+ description: `Migrate API key(s)
40243
+
40244
+ Returns HTTP 200 even on partial success; hashes that could not be migrated are listed under \`data.failed\`.
40245
+
40246
+ **Required Permissions**
40247
+ Your root key must have one of the following permissions for basic key information:
40248
+ - \`api.*.create_key\` (to migrate keys to any API)
40249
+ - \`api.<api_id>.create_key\` (to migrate keys to a specific API)
40250
+ `,
40251
+ args: args16,
40252
+ tool: async (client, args17, ctx) => {
40253
+ const [result, apiCall] = await keysMigrateKeys(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40254
+ if (!result.ok) {
40255
+ return {
40256
+ content: [{ type: "text", text: result.error.message }],
40257
+ isError: true
40258
+ };
40259
+ }
40260
+ const value = result.value;
40261
+ return formatResult(value, apiCall);
40262
+ }
40263
+ };
40264
+ });
40265
+
40266
+ // src/funcs/keysRemovePermissions.ts
40267
+ function keysRemovePermissions(client, request, options) {
40268
+ return new APIPromise($do17(client, request, options));
40269
+ }
40270
+ async function $do17(client, request, options) {
39994
40271
  const parsed = safeParse(request, (value) => V2KeysRemovePermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
39995
40272
  if (!parsed.ok) {
39996
40273
  return [parsed, { status: "invalid" }];
@@ -40070,12 +40347,12 @@ var init_keysRemovePermissions = __esm(() => {
40070
40347
  });
40071
40348
 
40072
40349
  // src/mcp-server/tools/keysRemovePermissions.ts
40073
- var args16, tool$keysRemovePermissions;
40350
+ var args17, tool$keysRemovePermissions;
40074
40351
  var init_keysRemovePermissions2 = __esm(() => {
40075
40352
  init_keysRemovePermissions();
40076
40353
  init_components();
40077
40354
  init_tools();
40078
- args16 = {
40355
+ args17 = {
40079
40356
  request: V2KeysRemovePermissionsRequestBody$inboundSchema
40080
40357
  };
40081
40358
  tool$keysRemovePermissions = {
@@ -40098,9 +40375,9 @@ Your root key must have one of the following permissions:
40098
40375
 
40099
40376
  Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
40100
40377
  `,
40101
- args: args16,
40102
- tool: async (client, args17, ctx) => {
40103
- const [result, apiCall] = await keysRemovePermissions(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40378
+ args: args17,
40379
+ tool: async (client, args18, ctx) => {
40380
+ const [result, apiCall] = await keysRemovePermissions(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40104
40381
  if (!result.ok) {
40105
40382
  return {
40106
40383
  content: [{ type: "text", text: result.error.message }],
@@ -40115,9 +40392,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
40115
40392
 
40116
40393
  // src/funcs/keysRemoveRoles.ts
40117
40394
  function keysRemoveRoles(client, request, options) {
40118
- return new APIPromise($do17(client, request, options));
40395
+ return new APIPromise($do18(client, request, options));
40119
40396
  }
40120
- async function $do17(client, request, options) {
40397
+ async function $do18(client, request, options) {
40121
40398
  const parsed = safeParse(request, (value) => V2KeysRemoveRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
40122
40399
  if (!parsed.ok) {
40123
40400
  return [parsed, { status: "invalid" }];
@@ -40197,12 +40474,12 @@ var init_keysRemoveRoles = __esm(() => {
40197
40474
  });
40198
40475
 
40199
40476
  // src/mcp-server/tools/keysRemoveRoles.ts
40200
- var args17, tool$keysRemoveRoles;
40477
+ var args18, tool$keysRemoveRoles;
40201
40478
  var init_keysRemoveRoles2 = __esm(() => {
40202
40479
  init_keysRemoveRoles();
40203
40480
  init_components();
40204
40481
  init_tools();
40205
- args17 = {
40482
+ args18 = {
40206
40483
  request: V2KeysRemoveRolesRequestBody$inboundSchema
40207
40484
  };
40208
40485
  tool$keysRemoveRoles = {
@@ -40225,9 +40502,9 @@ Your root key must have one of the following permissions:
40225
40502
 
40226
40503
  Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
40227
40504
  `,
40228
- args: args17,
40229
- tool: async (client, args18, ctx) => {
40230
- const [result, apiCall] = await keysRemoveRoles(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40505
+ args: args18,
40506
+ tool: async (client, args19, ctx) => {
40507
+ const [result, apiCall] = await keysRemoveRoles(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40231
40508
  if (!result.ok) {
40232
40509
  return {
40233
40510
  content: [{ type: "text", text: result.error.message }],
@@ -40242,9 +40519,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
40242
40519
 
40243
40520
  // src/funcs/keysRerollKey.ts
40244
40521
  function keysRerollKey(client, request, options) {
40245
- return new APIPromise($do18(client, request, options));
40522
+ return new APIPromise($do19(client, request, options));
40246
40523
  }
40247
- async function $do18(client, request, options) {
40524
+ async function $do19(client, request, options) {
40248
40525
  const parsed = safeParse(request, (value) => V2KeysRerollKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40249
40526
  if (!parsed.ok) {
40250
40527
  return [parsed, { status: "invalid" }];
@@ -40324,12 +40601,12 @@ var init_keysRerollKey = __esm(() => {
40324
40601
  });
40325
40602
 
40326
40603
  // src/mcp-server/tools/keysRerollKey.ts
40327
- var args18, tool$keysRerollKey;
40604
+ var args19, tool$keysRerollKey;
40328
40605
  var init_keysRerollKey2 = __esm(() => {
40329
40606
  init_keysRerollKey();
40330
40607
  init_components();
40331
40608
  init_tools();
40332
- args18 = {
40609
+ args19 = {
40333
40610
  request: V2KeysRerollKeyRequestBody$inboundSchema
40334
40611
  };
40335
40612
  tool$keysRerollKey = {
@@ -40369,9 +40646,9 @@ Common use cases include:
40369
40646
  - \`api.*.create_key\` or \`api.<api_id>.create_key\`
40370
40647
  - \`api.*.encrypt_key\` or \`api.<api_id>.encrypt_key\` (only when the original key is recoverable)
40371
40648
  `,
40372
- args: args18,
40373
- tool: async (client, args19, ctx) => {
40374
- const [result, apiCall] = await keysRerollKey(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40649
+ args: args19,
40650
+ tool: async (client, args20, ctx) => {
40651
+ const [result, apiCall] = await keysRerollKey(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40375
40652
  if (!result.ok) {
40376
40653
  return {
40377
40654
  content: [{ type: "text", text: result.error.message }],
@@ -40386,9 +40663,9 @@ Common use cases include:
40386
40663
 
40387
40664
  // src/funcs/keysSetPermissions.ts
40388
40665
  function keysSetPermissions(client, request, options) {
40389
- return new APIPromise($do19(client, request, options));
40666
+ return new APIPromise($do20(client, request, options));
40390
40667
  }
40391
- async function $do19(client, request, options) {
40668
+ async function $do20(client, request, options) {
40392
40669
  const parsed = safeParse(request, (value) => V2KeysSetPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
40393
40670
  if (!parsed.ok) {
40394
40671
  return [parsed, { status: "invalid" }];
@@ -40468,12 +40745,12 @@ var init_keysSetPermissions = __esm(() => {
40468
40745
  });
40469
40746
 
40470
40747
  // src/mcp-server/tools/keysSetPermissions.ts
40471
- var args19, tool$keysSetPermissions;
40748
+ var args20, tool$keysSetPermissions;
40472
40749
  var init_keysSetPermissions2 = __esm(() => {
40473
40750
  init_keysSetPermissions();
40474
40751
  init_components();
40475
40752
  init_tools();
40476
- args19 = {
40753
+ args20 = {
40477
40754
  request: V2KeysSetPermissionsRequestBody$inboundSchema
40478
40755
  };
40479
40756
  tool$keysSetPermissions = {
@@ -40496,9 +40773,9 @@ Your root key must have one of the following permissions:
40496
40773
 
40497
40774
  Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
40498
40775
  `,
40499
- args: args19,
40500
- tool: async (client, args20, ctx) => {
40501
- const [result, apiCall] = await keysSetPermissions(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40776
+ args: args20,
40777
+ tool: async (client, args21, ctx) => {
40778
+ const [result, apiCall] = await keysSetPermissions(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40502
40779
  if (!result.ok) {
40503
40780
  return {
40504
40781
  content: [{ type: "text", text: result.error.message }],
@@ -40513,9 +40790,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
40513
40790
 
40514
40791
  // src/funcs/keysSetRoles.ts
40515
40792
  function keysSetRoles(client, request, options) {
40516
- return new APIPromise($do20(client, request, options));
40793
+ return new APIPromise($do21(client, request, options));
40517
40794
  }
40518
- async function $do20(client, request, options) {
40795
+ async function $do21(client, request, options) {
40519
40796
  const parsed = safeParse(request, (value) => V2KeysSetRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
40520
40797
  if (!parsed.ok) {
40521
40798
  return [parsed, { status: "invalid" }];
@@ -40595,12 +40872,12 @@ var init_keysSetRoles = __esm(() => {
40595
40872
  });
40596
40873
 
40597
40874
  // src/mcp-server/tools/keysSetRoles.ts
40598
- var args20, tool$keysSetRoles;
40875
+ var args21, tool$keysSetRoles;
40599
40876
  var init_keysSetRoles2 = __esm(() => {
40600
40877
  init_keysSetRoles();
40601
40878
  init_components();
40602
40879
  init_tools();
40603
- args20 = {
40880
+ args21 = {
40604
40881
  request: V2KeysSetRolesRequestBody$inboundSchema
40605
40882
  };
40606
40883
  tool$keysSetRoles = {
@@ -40623,9 +40900,9 @@ Your root key must have one of the following permissions:
40623
40900
 
40624
40901
  Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
40625
40902
  `,
40626
- args: args20,
40627
- tool: async (client, args21, ctx) => {
40628
- const [result, apiCall] = await keysSetRoles(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40903
+ args: args21,
40904
+ tool: async (client, args22, ctx) => {
40905
+ const [result, apiCall] = await keysSetRoles(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40629
40906
  if (!result.ok) {
40630
40907
  return {
40631
40908
  content: [{ type: "text", text: result.error.message }],
@@ -40640,9 +40917,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
40640
40917
 
40641
40918
  // src/funcs/keysUpdateCredits.ts
40642
40919
  function keysUpdateCredits(client, request, options) {
40643
- return new APIPromise($do21(client, request, options));
40920
+ return new APIPromise($do22(client, request, options));
40644
40921
  }
40645
- async function $do21(client, request, options) {
40922
+ async function $do22(client, request, options) {
40646
40923
  const parsed = safeParse(request, (value) => V2KeysUpdateCreditsRequestBody$outboundSchema.parse(value), "Input validation failed");
40647
40924
  if (!parsed.ok) {
40648
40925
  return [parsed, { status: "invalid" }];
@@ -40722,12 +40999,12 @@ var init_keysUpdateCredits = __esm(() => {
40722
40999
  });
40723
41000
 
40724
41001
  // src/mcp-server/tools/keysUpdateCredits.ts
40725
- var args21, tool$keysUpdateCredits;
41002
+ var args22, tool$keysUpdateCredits;
40726
41003
  var init_keysUpdateCredits2 = __esm(() => {
40727
41004
  init_keysUpdateCredits();
40728
41005
  init_components();
40729
41006
  init_tools();
40730
- args21 = {
41007
+ args22 = {
40731
41008
  request: V2KeysUpdateCreditsRequestBody$inboundSchema
40732
41009
  };
40733
41010
  tool$keysUpdateCredits = {
@@ -40750,9 +41027,9 @@ Your root key must have one of the following permissions:
40750
41027
 
40751
41028
  Credit updates remove the key from cache immediately. Setting credits to unlimited automatically clears any existing refill settings. Changes take effect instantly but may take up to 30 seconds to propagate to all edge regions.
40752
41029
  `,
40753
- args: args21,
40754
- tool: async (client, args22, ctx) => {
40755
- const [result, apiCall] = await keysUpdateCredits(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41030
+ args: args22,
41031
+ tool: async (client, args23, ctx) => {
41032
+ const [result, apiCall] = await keysUpdateCredits(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40756
41033
  if (!result.ok) {
40757
41034
  return {
40758
41035
  content: [{ type: "text", text: result.error.message }],
@@ -40767,9 +41044,9 @@ Credit updates remove the key from cache immediately. Setting credits to unlimit
40767
41044
 
40768
41045
  // src/funcs/keysUpdateKey.ts
40769
41046
  function keysUpdateKey(client, request, options) {
40770
- return new APIPromise($do22(client, request, options));
41047
+ return new APIPromise($do23(client, request, options));
40771
41048
  }
40772
- async function $do22(client, request, options) {
41049
+ async function $do23(client, request, options) {
40773
41050
  const parsed = safeParse(request, (value) => V2KeysUpdateKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40774
41051
  if (!parsed.ok) {
40775
41052
  return [parsed, { status: "invalid" }];
@@ -40849,12 +41126,12 @@ var init_keysUpdateKey = __esm(() => {
40849
41126
  });
40850
41127
 
40851
41128
  // src/mcp-server/tools/keysUpdateKey.ts
40852
- var args22, tool$keysUpdateKey;
41129
+ var args23, tool$keysUpdateKey;
40853
41130
  var init_keysUpdateKey2 = __esm(() => {
40854
41131
  init_keysUpdateKey();
40855
41132
  init_components();
40856
41133
  init_tools();
40857
- args22 = {
41134
+ args23 = {
40858
41135
  request: V2KeysUpdateKeyRequestBody$inboundSchema
40859
41136
  };
40860
41137
  tool$keysUpdateKey = {
@@ -40877,9 +41154,9 @@ Your root key must have one of the following permissions:
40877
41154
 
40878
41155
  If you specify an \`externalId\` that doesn't exist, a new identity will be automatically created and linked to the key. Permission updates will auto-create any permissions that don't exist in your workspace. Changes take effect immediately but may take up to 30 seconds to propagate to all edge regions due to cache invalidation.
40879
41156
  `,
40880
- args: args22,
40881
- tool: async (client, args23, ctx) => {
40882
- const [result, apiCall] = await keysUpdateKey(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41157
+ args: args23,
41158
+ tool: async (client, args24, ctx) => {
41159
+ const [result, apiCall] = await keysUpdateKey(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40883
41160
  if (!result.ok) {
40884
41161
  return {
40885
41162
  content: [{ type: "text", text: result.error.message }],
@@ -40894,9 +41171,9 @@ If you specify an \`externalId\` that doesn't exist, a new identity will be auto
40894
41171
 
40895
41172
  // src/funcs/keysVerifyKey.ts
40896
41173
  function keysVerifyKey(client, request, options) {
40897
- return new APIPromise($do23(client, request, options));
41174
+ return new APIPromise($do24(client, request, options));
40898
41175
  }
40899
- async function $do23(client, request, options) {
41176
+ async function $do24(client, request, options) {
40900
41177
  const parsed = safeParse(request, (value) => V2KeysVerifyKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40901
41178
  if (!parsed.ok) {
40902
41179
  return [parsed, { status: "invalid" }];
@@ -40976,12 +41253,12 @@ var init_keysVerifyKey = __esm(() => {
40976
41253
  });
40977
41254
 
40978
41255
  // src/mcp-server/tools/keysVerifyKey.ts
40979
- var args23, tool$keysVerifyKey;
41256
+ var args24, tool$keysVerifyKey;
40980
41257
  var init_keysVerifyKey2 = __esm(() => {
40981
41258
  init_keysVerifyKey();
40982
41259
  init_components();
40983
41260
  init_tools();
40984
- args23 = {
41261
+ args24 = {
40985
41262
  request: V2KeysVerifyKeyRequestBody$inboundSchema
40986
41263
  };
40987
41264
  tool$keysVerifyKey = {
@@ -41007,9 +41284,9 @@ Your root key needs one of:
41007
41284
 
41008
41285
  If you are getting a NOT_FOUND error, ensure your root key has the required verify key permissions.
41009
41286
  `,
41010
- args: args23,
41011
- tool: async (client, args24, ctx) => {
41012
- const [result, apiCall] = await keysVerifyKey(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41287
+ args: args24,
41288
+ tool: async (client, args25, ctx) => {
41289
+ const [result, apiCall] = await keysVerifyKey(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41013
41290
  if (!result.ok) {
41014
41291
  return {
41015
41292
  content: [{ type: "text", text: result.error.message }],
@@ -41024,9 +41301,9 @@ If you are getting a NOT_FOUND error, ensure your root key has the required veri
41024
41301
 
41025
41302
  // src/funcs/keysWhoami.ts
41026
41303
  function keysWhoami(client, request, options) {
41027
- return new APIPromise($do24(client, request, options));
41304
+ return new APIPromise($do25(client, request, options));
41028
41305
  }
41029
- async function $do24(client, request, options) {
41306
+ async function $do25(client, request, options) {
41030
41307
  const parsed = safeParse(request, (value) => V2KeysWhoamiRequestBody$outboundSchema.parse(value), "Input validation failed");
41031
41308
  if (!parsed.ok) {
41032
41309
  return [parsed, { status: "invalid" }];
@@ -41106,12 +41383,12 @@ var init_keysWhoami = __esm(() => {
41106
41383
  });
41107
41384
 
41108
41385
  // src/mcp-server/tools/keysWhoami.ts
41109
- var args24, tool$keysWhoami;
41386
+ var args25, tool$keysWhoami;
41110
41387
  var init_keysWhoami2 = __esm(() => {
41111
41388
  init_keysWhoami();
41112
41389
  init_components();
41113
41390
  init_tools();
41114
- args24 = {
41391
+ args25 = {
41115
41392
  request: V2KeysWhoamiRequestBody$inboundSchema
41116
41393
  };
41117
41394
  tool$keysWhoami = {
@@ -41128,9 +41405,9 @@ Your root key must have one of the following permissions for basic key informati
41128
41405
 
41129
41406
  If your rootkey lacks permissions but the key exists, we may return a 404 status here to prevent leaking the existance of a key to unauthorized clients. If you believe that a key should exist, but receive a 404, please double check your root key has the correct permissions.
41130
41407
  `,
41131
- args: args24,
41132
- tool: async (client, args25, ctx) => {
41133
- const [result, apiCall] = await keysWhoami(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41408
+ args: args25,
41409
+ tool: async (client, args26, ctx) => {
41410
+ const [result, apiCall] = await keysWhoami(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41134
41411
  if (!result.ok) {
41135
41412
  return {
41136
41413
  content: [{ type: "text", text: result.error.message }],
@@ -41145,9 +41422,9 @@ If your rootkey lacks permissions but the key exists, we may return a 404 status
41145
41422
 
41146
41423
  // src/funcs/permissionsCreatePermission.ts
41147
41424
  function permissionsCreatePermission(client, request, options) {
41148
- return new APIPromise($do25(client, request, options));
41425
+ return new APIPromise($do26(client, request, options));
41149
41426
  }
41150
- async function $do25(client, request, options) {
41427
+ async function $do26(client, request, options) {
41151
41428
  const parsed = safeParse(request, (value) => V2PermissionsCreatePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41152
41429
  if (!parsed.ok) {
41153
41430
  return [parsed, { status: "invalid" }];
@@ -41227,12 +41504,12 @@ var init_permissionsCreatePermission = __esm(() => {
41227
41504
  });
41228
41505
 
41229
41506
  // src/mcp-server/tools/permissionsCreatePermission.ts
41230
- var args25, tool$permissionsCreatePermission;
41507
+ var args26, tool$permissionsCreatePermission;
41231
41508
  var init_permissionsCreatePermission2 = __esm(() => {
41232
41509
  init_permissionsCreatePermission();
41233
41510
  init_components();
41234
41511
  init_tools();
41235
- args25 = {
41512
+ args26 = {
41236
41513
  request: V2PermissionsCreatePermissionRequestBody$inboundSchema
41237
41514
  };
41238
41515
  tool$permissionsCreatePermission = {
@@ -41250,9 +41527,9 @@ Use hierarchical naming patterns like \`documents.read\`, \`admin.users.delete\`
41250
41527
  Your root key must have the following permission:
41251
41528
  - \`rbac.*.create_permission\`
41252
41529
  `,
41253
- args: args25,
41254
- tool: async (client, args26, ctx) => {
41255
- const [result, apiCall] = await permissionsCreatePermission(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41530
+ args: args26,
41531
+ tool: async (client, args27, ctx) => {
41532
+ const [result, apiCall] = await permissionsCreatePermission(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41256
41533
  if (!result.ok) {
41257
41534
  return {
41258
41535
  content: [{ type: "text", text: result.error.message }],
@@ -41267,9 +41544,9 @@ Your root key must have the following permission:
41267
41544
 
41268
41545
  // src/funcs/permissionsCreateRole.ts
41269
41546
  function permissionsCreateRole(client, request, options) {
41270
- return new APIPromise($do26(client, request, options));
41547
+ return new APIPromise($do27(client, request, options));
41271
41548
  }
41272
- async function $do26(client, request, options) {
41549
+ async function $do27(client, request, options) {
41273
41550
  const parsed = safeParse(request, (value) => V2PermissionsCreateRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41274
41551
  if (!parsed.ok) {
41275
41552
  return [parsed, { status: "invalid" }];
@@ -41349,12 +41626,12 @@ var init_permissionsCreateRole = __esm(() => {
41349
41626
  });
41350
41627
 
41351
41628
  // src/mcp-server/tools/permissionsCreateRole.ts
41352
- var args26, tool$permissionsCreateRole;
41629
+ var args27, tool$permissionsCreateRole;
41353
41630
  var init_permissionsCreateRole2 = __esm(() => {
41354
41631
  init_permissionsCreateRole();
41355
41632
  init_components();
41356
41633
  init_tools();
41357
- args26 = {
41634
+ args27 = {
41358
41635
  request: V2PermissionsCreateRoleRequestBody$inboundSchema
41359
41636
  };
41360
41637
  tool$permissionsCreateRole = {
@@ -41370,9 +41647,9 @@ Create a new role to group related permissions for easier management. Roles enab
41370
41647
  Your root key must have the following permission:
41371
41648
  - \`rbac.*.create_role\`
41372
41649
  `,
41373
- args: args26,
41374
- tool: async (client, args27, ctx) => {
41375
- const [result, apiCall] = await permissionsCreateRole(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41650
+ args: args27,
41651
+ tool: async (client, args28, ctx) => {
41652
+ const [result, apiCall] = await permissionsCreateRole(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41376
41653
  if (!result.ok) {
41377
41654
  return {
41378
41655
  content: [{ type: "text", text: result.error.message }],
@@ -41387,9 +41664,9 @@ Your root key must have the following permission:
41387
41664
 
41388
41665
  // src/funcs/permissionsDeletePermission.ts
41389
41666
  function permissionsDeletePermission(client, request, options) {
41390
- return new APIPromise($do27(client, request, options));
41667
+ return new APIPromise($do28(client, request, options));
41391
41668
  }
41392
- async function $do27(client, request, options) {
41669
+ async function $do28(client, request, options) {
41393
41670
  const parsed = safeParse(request, (value) => V2PermissionsDeletePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41394
41671
  if (!parsed.ok) {
41395
41672
  return [parsed, { status: "invalid" }];
@@ -41469,12 +41746,12 @@ var init_permissionsDeletePermission = __esm(() => {
41469
41746
  });
41470
41747
 
41471
41748
  // src/mcp-server/tools/permissionsDeletePermission.ts
41472
- var args27, tool$permissionsDeletePermission;
41749
+ var args28, tool$permissionsDeletePermission;
41473
41750
  var init_permissionsDeletePermission2 = __esm(() => {
41474
41751
  init_permissionsDeletePermission();
41475
41752
  init_components();
41476
41753
  init_tools();
41477
- args27 = {
41754
+ args28 = {
41478
41755
  request: V2PermissionsDeletePermissionRequestBody$inboundSchema
41479
41756
  };
41480
41757
  tool$permissionsDeletePermission = {
@@ -41490,9 +41767,9 @@ Remove a permission from your workspace. This also removes the permission from a
41490
41767
  Your root key must have the following permission:
41491
41768
  - \`rbac.*.delete_permission\`
41492
41769
  `,
41493
- args: args27,
41494
- tool: async (client, args28, ctx) => {
41495
- const [result, apiCall] = await permissionsDeletePermission(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41770
+ args: args28,
41771
+ tool: async (client, args29, ctx) => {
41772
+ const [result, apiCall] = await permissionsDeletePermission(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41496
41773
  if (!result.ok) {
41497
41774
  return {
41498
41775
  content: [{ type: "text", text: result.error.message }],
@@ -41507,9 +41784,9 @@ Your root key must have the following permission:
41507
41784
 
41508
41785
  // src/funcs/permissionsDeleteRole.ts
41509
41786
  function permissionsDeleteRole(client, request, options) {
41510
- return new APIPromise($do28(client, request, options));
41787
+ return new APIPromise($do29(client, request, options));
41511
41788
  }
41512
- async function $do28(client, request, options) {
41789
+ async function $do29(client, request, options) {
41513
41790
  const parsed = safeParse(request, (value) => V2PermissionsDeleteRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41514
41791
  if (!parsed.ok) {
41515
41792
  return [parsed, { status: "invalid" }];
@@ -41589,12 +41866,12 @@ var init_permissionsDeleteRole = __esm(() => {
41589
41866
  });
41590
41867
 
41591
41868
  // src/mcp-server/tools/permissionsDeleteRole.ts
41592
- var args28, tool$permissionsDeleteRole;
41869
+ var args29, tool$permissionsDeleteRole;
41593
41870
  var init_permissionsDeleteRole2 = __esm(() => {
41594
41871
  init_permissionsDeleteRole();
41595
41872
  init_components();
41596
41873
  init_tools();
41597
- args28 = {
41874
+ args29 = {
41598
41875
  request: V2PermissionsDeleteRoleRequestBody$inboundSchema
41599
41876
  };
41600
41877
  tool$permissionsDeleteRole = {
@@ -41610,9 +41887,9 @@ Remove a role from your workspace. This also removes the role from all assigned
41610
41887
  Your root key must have the following permission:
41611
41888
  - \`rbac.*.delete_role\`
41612
41889
  `,
41613
- args: args28,
41614
- tool: async (client, args29, ctx) => {
41615
- const [result, apiCall] = await permissionsDeleteRole(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41890
+ args: args29,
41891
+ tool: async (client, args30, ctx) => {
41892
+ const [result, apiCall] = await permissionsDeleteRole(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41616
41893
  if (!result.ok) {
41617
41894
  return {
41618
41895
  content: [{ type: "text", text: result.error.message }],
@@ -41627,9 +41904,9 @@ Your root key must have the following permission:
41627
41904
 
41628
41905
  // src/funcs/permissionsGetPermission.ts
41629
41906
  function permissionsGetPermission(client, request, options) {
41630
- return new APIPromise($do29(client, request, options));
41907
+ return new APIPromise($do30(client, request, options));
41631
41908
  }
41632
- async function $do29(client, request, options) {
41909
+ async function $do30(client, request, options) {
41633
41910
  const parsed = safeParse(request, (value) => V2PermissionsGetPermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41634
41911
  if (!parsed.ok) {
41635
41912
  return [parsed, { status: "invalid" }];
@@ -41709,12 +41986,12 @@ var init_permissionsGetPermission = __esm(() => {
41709
41986
  });
41710
41987
 
41711
41988
  // src/mcp-server/tools/permissionsGetPermission.ts
41712
- var args29, tool$permissionsGetPermission;
41989
+ var args30, tool$permissionsGetPermission;
41713
41990
  var init_permissionsGetPermission2 = __esm(() => {
41714
41991
  init_permissionsGetPermission();
41715
41992
  init_components();
41716
41993
  init_tools();
41717
- args29 = {
41994
+ args30 = {
41718
41995
  request: V2PermissionsGetPermissionRequestBody$inboundSchema
41719
41996
  };
41720
41997
  tool$permissionsGetPermission = {
@@ -41728,9 +42005,9 @@ Retrieve details about a specific permission including its name, description, an
41728
42005
  Your root key must have the following permission:
41729
42006
  - \`rbac.*.read_permission\`
41730
42007
  `,
41731
- args: args29,
41732
- tool: async (client, args30, ctx) => {
41733
- const [result, apiCall] = await permissionsGetPermission(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42008
+ args: args30,
42009
+ tool: async (client, args31, ctx) => {
42010
+ const [result, apiCall] = await permissionsGetPermission(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41734
42011
  if (!result.ok) {
41735
42012
  return {
41736
42013
  content: [{ type: "text", text: result.error.message }],
@@ -41745,9 +42022,9 @@ Your root key must have the following permission:
41745
42022
 
41746
42023
  // src/funcs/permissionsGetRole.ts
41747
42024
  function permissionsGetRole(client, request, options) {
41748
- return new APIPromise($do30(client, request, options));
42025
+ return new APIPromise($do31(client, request, options));
41749
42026
  }
41750
- async function $do30(client, request, options) {
42027
+ async function $do31(client, request, options) {
41751
42028
  const parsed = safeParse(request, (value) => V2PermissionsGetRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41752
42029
  if (!parsed.ok) {
41753
42030
  return [parsed, { status: "invalid" }];
@@ -41827,12 +42104,12 @@ var init_permissionsGetRole = __esm(() => {
41827
42104
  });
41828
42105
 
41829
42106
  // src/mcp-server/tools/permissionsGetRole.ts
41830
- var args30, tool$permissionsGetRole;
42107
+ var args31, tool$permissionsGetRole;
41831
42108
  var init_permissionsGetRole2 = __esm(() => {
41832
42109
  init_permissionsGetRole();
41833
42110
  init_components();
41834
42111
  init_tools();
41835
- args30 = {
42112
+ args31 = {
41836
42113
  request: V2PermissionsGetRoleRequestBody$inboundSchema
41837
42114
  };
41838
42115
  tool$permissionsGetRole = {
@@ -41846,9 +42123,9 @@ Retrieve details about a specific role including its assigned permissions.
41846
42123
  Your root key must have the following permission:
41847
42124
  - \`rbac.*.read_role\`
41848
42125
  `,
41849
- args: args30,
41850
- tool: async (client, args31, ctx) => {
41851
- const [result, apiCall] = await permissionsGetRole(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42126
+ args: args31,
42127
+ tool: async (client, args32, ctx) => {
42128
+ const [result, apiCall] = await permissionsGetRole(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41852
42129
  if (!result.ok) {
41853
42130
  return {
41854
42131
  content: [{ type: "text", text: result.error.message }],
@@ -41863,9 +42140,9 @@ Your root key must have the following permission:
41863
42140
 
41864
42141
  // src/funcs/permissionsListPermissions.ts
41865
42142
  function permissionsListPermissions(client, request, options) {
41866
- return new APIPromise($do31(client, request, options));
42143
+ return new APIPromise($do32(client, request, options));
41867
42144
  }
41868
- async function $do31(client, request, options) {
42145
+ async function $do32(client, request, options) {
41869
42146
  const parsed = safeParse(request, (value) => V2PermissionsListPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
41870
42147
  if (!parsed.ok) {
41871
42148
  return [parsed, { status: "invalid" }];
@@ -41945,12 +42222,12 @@ var init_permissionsListPermissions = __esm(() => {
41945
42222
  });
41946
42223
 
41947
42224
  // src/mcp-server/tools/permissionsListPermissions.ts
41948
- var args31, tool$permissionsListPermissions;
42225
+ var args32, tool$permissionsListPermissions;
41949
42226
  var init_permissionsListPermissions2 = __esm(() => {
41950
42227
  init_permissionsListPermissions();
41951
42228
  init_components();
41952
42229
  init_tools();
41953
- args31 = {
42230
+ args32 = {
41954
42231
  request: V2PermissionsListPermissionsRequestBody$inboundSchema
41955
42232
  };
41956
42233
  tool$permissionsListPermissions = {
@@ -41965,9 +42242,9 @@ Results are paginated and sorted by their id.
41965
42242
  Your root key must have the following permission:
41966
42243
  - \`rbac.*.read_permission\`
41967
42244
  `,
41968
- args: args31,
41969
- tool: async (client, args32, ctx) => {
41970
- const [result, apiCall] = await permissionsListPermissions(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42245
+ args: args32,
42246
+ tool: async (client, args33, ctx) => {
42247
+ const [result, apiCall] = await permissionsListPermissions(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41971
42248
  if (!result.ok) {
41972
42249
  return {
41973
42250
  content: [{ type: "text", text: result.error.message }],
@@ -41982,9 +42259,9 @@ Your root key must have the following permission:
41982
42259
 
41983
42260
  // src/funcs/permissionsListRoles.ts
41984
42261
  function permissionsListRoles(client, request, options) {
41985
- return new APIPromise($do32(client, request, options));
42262
+ return new APIPromise($do33(client, request, options));
41986
42263
  }
41987
- async function $do32(client, request, options) {
42264
+ async function $do33(client, request, options) {
41988
42265
  const parsed = safeParse(request, (value) => V2PermissionsListRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
41989
42266
  if (!parsed.ok) {
41990
42267
  return [parsed, { status: "invalid" }];
@@ -42064,12 +42341,12 @@ var init_permissionsListRoles = __esm(() => {
42064
42341
  });
42065
42342
 
42066
42343
  // src/mcp-server/tools/permissionsListRoles.ts
42067
- var args32, tool$permissionsListRoles;
42344
+ var args33, tool$permissionsListRoles;
42068
42345
  var init_permissionsListRoles2 = __esm(() => {
42069
42346
  init_permissionsListRoles();
42070
42347
  init_components();
42071
42348
  init_tools();
42072
- args32 = {
42349
+ args33 = {
42073
42350
  request: V2PermissionsListRolesRequestBody$inboundSchema
42074
42351
  };
42075
42352
  tool$permissionsListRoles = {
@@ -42084,9 +42361,9 @@ Results are paginated and sorted by their id.
42084
42361
  Your root key must have the following permission:
42085
42362
  - \`rbac.*.read_role\`
42086
42363
  `,
42087
- args: args32,
42088
- tool: async (client, args33, ctx) => {
42089
- const [result, apiCall] = await permissionsListRoles(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42364
+ args: args33,
42365
+ tool: async (client, args34, ctx) => {
42366
+ const [result, apiCall] = await permissionsListRoles(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42090
42367
  if (!result.ok) {
42091
42368
  return {
42092
42369
  content: [{ type: "text", text: result.error.message }],
@@ -42101,9 +42378,9 @@ Your root key must have the following permission:
42101
42378
 
42102
42379
  // src/funcs/ratelimitDeleteOverride.ts
42103
42380
  function ratelimitDeleteOverride(client, request, options) {
42104
- return new APIPromise($do33(client, request, options));
42381
+ return new APIPromise($do34(client, request, options));
42105
42382
  }
42106
- async function $do33(client, request, options) {
42383
+ async function $do34(client, request, options) {
42107
42384
  const parsed = safeParse(request, (value) => V2RatelimitDeleteOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42108
42385
  if (!parsed.ok) {
42109
42386
  return [parsed, { status: "invalid" }];
@@ -42183,12 +42460,12 @@ var init_ratelimitDeleteOverride = __esm(() => {
42183
42460
  });
42184
42461
 
42185
42462
  // src/mcp-server/tools/ratelimitDeleteOverride.ts
42186
- var args33, tool$ratelimitDeleteOverride;
42463
+ var args34, tool$ratelimitDeleteOverride;
42187
42464
  var init_ratelimitDeleteOverride2 = __esm(() => {
42188
42465
  init_ratelimitDeleteOverride();
42189
42466
  init_components();
42190
42467
  init_tools();
42191
- args33 = {
42468
+ args34 = {
42192
42469
  request: V2RatelimitDeleteOverrideRequestBody$inboundSchema
42193
42470
  };
42194
42471
  tool$ratelimitDeleteOverride = {
@@ -42203,9 +42480,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
42203
42480
 
42204
42481
  **Permissions:** Requires \`ratelimit.*.delete_override\` or \`ratelimit.<namespace_id>.delete_override\`
42205
42482
  `,
42206
- args: args33,
42207
- tool: async (client, args34, ctx) => {
42208
- const [result, apiCall] = await ratelimitDeleteOverride(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42483
+ args: args34,
42484
+ tool: async (client, args35, ctx) => {
42485
+ const [result, apiCall] = await ratelimitDeleteOverride(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42209
42486
  if (!result.ok) {
42210
42487
  return {
42211
42488
  content: [{ type: "text", text: result.error.message }],
@@ -42220,9 +42497,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
42220
42497
 
42221
42498
  // src/funcs/ratelimitGetOverride.ts
42222
42499
  function ratelimitGetOverride(client, request, options) {
42223
- return new APIPromise($do34(client, request, options));
42500
+ return new APIPromise($do35(client, request, options));
42224
42501
  }
42225
- async function $do34(client, request, options) {
42502
+ async function $do35(client, request, options) {
42226
42503
  const parsed = safeParse(request, (value) => V2RatelimitGetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42227
42504
  if (!parsed.ok) {
42228
42505
  return [parsed, { status: "invalid" }];
@@ -42302,12 +42579,12 @@ var init_ratelimitGetOverride = __esm(() => {
42302
42579
  });
42303
42580
 
42304
42581
  // src/mcp-server/tools/ratelimitGetOverride.ts
42305
- var args34, tool$ratelimitGetOverride;
42582
+ var args35, tool$ratelimitGetOverride;
42306
42583
  var init_ratelimitGetOverride2 = __esm(() => {
42307
42584
  init_ratelimitGetOverride();
42308
42585
  init_components();
42309
42586
  init_tools();
42310
- args34 = {
42587
+ args35 = {
42311
42588
  request: V2RatelimitGetOverrideRequestBody$inboundSchema
42312
42589
  };
42313
42590
  tool$ratelimitGetOverride = {
@@ -42322,9 +42599,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
42322
42599
 
42323
42600
  **Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
42324
42601
  `,
42325
- args: args34,
42326
- tool: async (client, args35, ctx) => {
42327
- const [result, apiCall] = await ratelimitGetOverride(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42602
+ args: args35,
42603
+ tool: async (client, args36, ctx) => {
42604
+ const [result, apiCall] = await ratelimitGetOverride(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42328
42605
  if (!result.ok) {
42329
42606
  return {
42330
42607
  content: [{ type: "text", text: result.error.message }],
@@ -42339,9 +42616,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
42339
42616
 
42340
42617
  // src/funcs/ratelimitLimit.ts
42341
42618
  function ratelimitLimit(client, request, options) {
42342
- return new APIPromise($do35(client, request, options));
42619
+ return new APIPromise($do36(client, request, options));
42343
42620
  }
42344
- async function $do35(client, request, options) {
42621
+ async function $do36(client, request, options) {
42345
42622
  const parsed = safeParse(request, (value) => V2RatelimitLimitRequestBody$outboundSchema.parse(value), "Input validation failed");
42346
42623
  if (!parsed.ok) {
42347
42624
  return [parsed, { status: "invalid" }];
@@ -42421,12 +42698,12 @@ var init_ratelimitLimit = __esm(() => {
42421
42698
  });
42422
42699
 
42423
42700
  // src/mcp-server/tools/ratelimitLimit.ts
42424
- var args35, tool$ratelimitLimit;
42701
+ var args36, tool$ratelimitLimit;
42425
42702
  var init_ratelimitLimit2 = __esm(() => {
42426
42703
  init_ratelimitLimit();
42427
42704
  init_components();
42428
42705
  init_tools();
42429
- args35 = {
42706
+ args36 = {
42430
42707
  request: V2RatelimitLimitRequestBody$inboundSchema
42431
42708
  };
42432
42709
  tool$ratelimitLimit = {
@@ -42444,14 +42721,10 @@ Use this for rate limiting beyond API keys - limit users by ID, IPs by address,
42444
42721
  Your root key must have one of the following permissions:
42445
42722
  - \`ratelimit.*.limit\` (to check limits in any namespace)
42446
42723
  - \`ratelimit.<namespace_id>.limit\` (to check limits in a specific namespace)
42447
-
42448
- **Side Effects**
42449
-
42450
- Records rate limit metrics for analytics and monitoring, updates rate limit counters with sliding window algorithm, and optionally triggers override matching for custom limits.
42451
42724
  `,
42452
- args: args35,
42453
- tool: async (client, args36, ctx) => {
42454
- const [result, apiCall] = await ratelimitLimit(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42725
+ args: args36,
42726
+ tool: async (client, args37, ctx) => {
42727
+ const [result, apiCall] = await ratelimitLimit(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42455
42728
  if (!result.ok) {
42456
42729
  return {
42457
42730
  content: [{ type: "text", text: result.error.message }],
@@ -42466,9 +42739,9 @@ Records rate limit metrics for analytics and monitoring, updates rate limit coun
42466
42739
 
42467
42740
  // src/funcs/ratelimitListOverrides.ts
42468
42741
  function ratelimitListOverrides(client, request, options) {
42469
- return new APIPromise($do36(client, request, options));
42742
+ return new APIPromise($do37(client, request, options));
42470
42743
  }
42471
- async function $do36(client, request, options) {
42744
+ async function $do37(client, request, options) {
42472
42745
  const parsed = safeParse(request, (value) => V2RatelimitListOverridesRequestBody$outboundSchema.parse(value), "Input validation failed");
42473
42746
  if (!parsed.ok) {
42474
42747
  return [parsed, { status: "invalid" }];
@@ -42548,12 +42821,12 @@ var init_ratelimitListOverrides = __esm(() => {
42548
42821
  });
42549
42822
 
42550
42823
  // src/mcp-server/tools/ratelimitListOverrides.ts
42551
- var args36, tool$ratelimitListOverrides;
42824
+ var args37, tool$ratelimitListOverrides;
42552
42825
  var init_ratelimitListOverrides2 = __esm(() => {
42553
42826
  init_ratelimitListOverrides();
42554
42827
  init_components();
42555
42828
  init_tools();
42556
- args36 = {
42829
+ args37 = {
42557
42830
  request: V2RatelimitListOverridesRequestBody$inboundSchema
42558
42831
  };
42559
42832
  tool$ratelimitListOverrides = {
@@ -42568,9 +42841,134 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
42568
42841
 
42569
42842
  **Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
42570
42843
  `,
42571
- args: args36,
42572
- tool: async (client, args37, ctx) => {
42573
- const [result, apiCall] = await ratelimitListOverrides(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42844
+ args: args37,
42845
+ tool: async (client, args38, ctx) => {
42846
+ const [result, apiCall] = await ratelimitListOverrides(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42847
+ if (!result.ok) {
42848
+ return {
42849
+ content: [{ type: "text", text: result.error.message }],
42850
+ isError: true
42851
+ };
42852
+ }
42853
+ const value = result.value;
42854
+ return formatResult(value, apiCall);
42855
+ }
42856
+ };
42857
+ });
42858
+
42859
+ // src/funcs/ratelimitMultiLimit.ts
42860
+ function ratelimitMultiLimit(client, request, options) {
42861
+ return new APIPromise($do38(client, request, options));
42862
+ }
42863
+ async function $do38(client, request, options) {
42864
+ const parsed = safeParse(request, (value) => arrayType(V2RatelimitLimitRequestBody$outboundSchema).parse(value), "Input validation failed");
42865
+ if (!parsed.ok) {
42866
+ return [parsed, { status: "invalid" }];
42867
+ }
42868
+ const payload = parsed.value;
42869
+ const body = encodeJSON("body", payload, { explode: true });
42870
+ const path = pathToFunc("/v2/ratelimit.multiLimit")();
42871
+ const headers = new Headers(compactMap({
42872
+ "Content-Type": "application/json",
42873
+ Accept: "application/json"
42874
+ }));
42875
+ const secConfig = await extractSecurity(client._options.rootKey);
42876
+ const securityInput = secConfig == null ? {} : { rootKey: secConfig };
42877
+ const requestSecurity = resolveGlobalSecurity(securityInput);
42878
+ const context = {
42879
+ options: client._options,
42880
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
42881
+ operationID: "ratelimit.multiLimit",
42882
+ oAuth2Scopes: null,
42883
+ resolvedSecurity: requestSecurity,
42884
+ securitySource: client._options.rootKey,
42885
+ retryConfig: options?.retries || client._options.retryConfig || {
42886
+ strategy: "backoff",
42887
+ backoff: {
42888
+ initialInterval: 50,
42889
+ maxInterval: 1000,
42890
+ exponent: 1.5,
42891
+ maxElapsedTime: 1e4
42892
+ },
42893
+ retryConnectionErrors: true
42894
+ },
42895
+ retryCodes: options?.retryCodes || ["5XX"]
42896
+ };
42897
+ const requestRes = client._createRequest(context, {
42898
+ security: requestSecurity,
42899
+ method: "POST",
42900
+ baseURL: options?.serverURL,
42901
+ path,
42902
+ headers,
42903
+ body,
42904
+ userAgent: client._options.userAgent,
42905
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
42906
+ }, options);
42907
+ if (!requestRes.ok) {
42908
+ return [requestRes, { status: "invalid" }];
42909
+ }
42910
+ const req = requestRes.value;
42911
+ const doResult = await client._do(req, {
42912
+ context,
42913
+ errorCodes: ["400", "401", "403", "404", "410", "4XX", "500", "5XX"],
42914
+ retryConfig: context.retryConfig,
42915
+ retryCodes: context.retryCodes
42916
+ });
42917
+ if (!doResult.ok) {
42918
+ return [doResult, { status: "request-error", request: req }];
42919
+ }
42920
+ const response = doResult.value;
42921
+ const responseFields = {
42922
+ HttpMeta: { Response: response, Request: req }
42923
+ };
42924
+ const [result] = await match(json(200, V2RatelimitMultiLimitResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(410, GoneErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
42925
+ if (!result.ok) {
42926
+ return [result, { status: "complete", request: req, response }];
42927
+ }
42928
+ return [result, { status: "complete", request: req, response }];
42929
+ }
42930
+ var init_ratelimitMultiLimit = __esm(() => {
42931
+ init_v3();
42932
+ init_encodings();
42933
+ init_matchers();
42934
+ init_primitives();
42935
+ init_schemas();
42936
+ init_security();
42937
+ init_url();
42938
+ init_components();
42939
+ init_errors2();
42940
+ init_async();
42941
+ });
42942
+
42943
+ // src/mcp-server/tools/ratelimitMultiLimit.ts
42944
+ var args38, tool$ratelimitMultiLimit;
42945
+ var init_ratelimitMultiLimit2 = __esm(() => {
42946
+ init_v3();
42947
+ init_ratelimitMultiLimit();
42948
+ init_components();
42949
+ init_tools();
42950
+ args38 = {
42951
+ request: arrayType(V2RatelimitLimitRequestBody$inboundSchema)
42952
+ };
42953
+ tool$ratelimitMultiLimit = {
42954
+ name: "ratelimit-multi-limit",
42955
+ description: `Apply multiple rate limit checks
42956
+
42957
+ Check and enforce multiple rate limits in a single request for any identifiers (user IDs, IP addresses, API clients, etc.).
42958
+
42959
+ Use this to efficiently check multiple rate limits at once. Each rate limit check is independent and returns its own result with a top-level \`passed\` indicator showing if all checks succeeded.
42960
+
42961
+ **Response Codes**: Rate limit checks return HTTP 200 regardless of whether limits are exceeded - check the \`passed\` field to see if all limits passed, or the \`success\` field in each individual result. 4xx responses indicate auth, namespace existence/deletion, or validation errors (e.g., 410 Gone for deleted namespaces). 5xx responses indicate server errors.
42962
+
42963
+ **Required Permissions**
42964
+
42965
+ Your root key must have one of the following permissions:
42966
+ - \`ratelimit.*.limit\` (to check limits in any namespace)
42967
+ - \`ratelimit.<namespace_id>.limit\` (to check limits in all specific namespaces being checked)
42968
+ `,
42969
+ args: args38,
42970
+ tool: async (client, args39, ctx) => {
42971
+ const [result, apiCall] = await ratelimitMultiLimit(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42574
42972
  if (!result.ok) {
42575
42973
  return {
42576
42974
  content: [{ type: "text", text: result.error.message }],
@@ -42585,9 +42983,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
42585
42983
 
42586
42984
  // src/funcs/ratelimitSetOverride.ts
42587
42985
  function ratelimitSetOverride(client, request, options) {
42588
- return new APIPromise($do37(client, request, options));
42986
+ return new APIPromise($do39(client, request, options));
42589
42987
  }
42590
- async function $do37(client, request, options) {
42988
+ async function $do39(client, request, options) {
42591
42989
  const parsed = safeParse(request, (value) => V2RatelimitSetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42592
42990
  if (!parsed.ok) {
42593
42991
  return [parsed, { status: "invalid" }];
@@ -42667,12 +43065,12 @@ var init_ratelimitSetOverride = __esm(() => {
42667
43065
  });
42668
43066
 
42669
43067
  // src/mcp-server/tools/ratelimitSetOverride.ts
42670
- var args37, tool$ratelimitSetOverride;
43068
+ var args39, tool$ratelimitSetOverride;
42671
43069
  var init_ratelimitSetOverride2 = __esm(() => {
42672
43070
  init_ratelimitSetOverride();
42673
43071
  init_components();
42674
43072
  init_tools();
42675
- args37 = {
43073
+ args39 = {
42676
43074
  request: V2RatelimitSetOverrideRequestBody$inboundSchema
42677
43075
  };
42678
43076
  tool$ratelimitSetOverride = {
@@ -42687,9 +43085,9 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
42687
43085
 
42688
43086
  **Permissions:** Requires \`ratelimit.*.set_override\` or \`ratelimit.<namespace_id>.set_override\`
42689
43087
  `,
42690
- args: args37,
42691
- tool: async (client, args38, ctx) => {
42692
- const [result, apiCall] = await ratelimitSetOverride(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43088
+ args: args39,
43089
+ tool: async (client, args40, ctx) => {
43090
+ const [result, apiCall] = await ratelimitSetOverride(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42693
43091
  if (!result.ok) {
42694
43092
  return {
42695
43093
  content: [{ type: "text", text: result.error.message }],
@@ -42706,7 +43104,7 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
42706
43104
  function createMCPServer(deps) {
42707
43105
  const server = new McpServer({
42708
43106
  name: "Unkey",
42709
- version: "2.1.0"
43107
+ version: "2.1.1"
42710
43108
  });
42711
43109
  const client = new UnkeyCore({
42712
43110
  rootKey: deps.rootKey,
@@ -42735,6 +43133,7 @@ function createMCPServer(deps) {
42735
43133
  tool(tool$keysCreateKey);
42736
43134
  tool(tool$keysDeleteKey);
42737
43135
  tool(tool$keysGetKey);
43136
+ tool(tool$keysMigrateKeys);
42738
43137
  tool(tool$keysRemovePermissions);
42739
43138
  tool(tool$keysRemoveRoles);
42740
43139
  tool(tool$keysRerollKey);
@@ -42756,6 +43155,7 @@ function createMCPServer(deps) {
42756
43155
  tool(tool$ratelimitGetOverride);
42757
43156
  tool(tool$ratelimitLimit);
42758
43157
  tool(tool$ratelimitListOverrides);
43158
+ tool(tool$ratelimitMultiLimit);
42759
43159
  tool(tool$ratelimitSetOverride);
42760
43160
  return server;
42761
43161
  }
@@ -42779,6 +43179,7 @@ var init_server2 = __esm(() => {
42779
43179
  init_keysCreateKey2();
42780
43180
  init_keysDeleteKey2();
42781
43181
  init_keysGetKey2();
43182
+ init_keysMigrateKeys2();
42782
43183
  init_keysRemovePermissions2();
42783
43184
  init_keysRemoveRoles2();
42784
43185
  init_keysRerollKey2();
@@ -42800,6 +43201,7 @@ var init_server2 = __esm(() => {
42800
43201
  init_ratelimitGetOverride2();
42801
43202
  init_ratelimitLimit2();
42802
43203
  init_ratelimitListOverrides2();
43204
+ init_ratelimitMultiLimit2();
42803
43205
  init_ratelimitSetOverride2();
42804
43206
  });
42805
43207
 
@@ -43996,7 +44398,7 @@ var routes = ln({
43996
44398
  var app = _e(routes, {
43997
44399
  name: "mcp",
43998
44400
  versionInfo: {
43999
- currentVersion: "2.1.0"
44401
+ currentVersion: "2.1.1"
44000
44402
  }
44001
44403
  });
44002
44404
  Yt(app, process3.argv.slice(2), buildContext(process3));
@@ -44004,5 +44406,5 @@ export {
44004
44406
  app
44005
44407
  };
44006
44408
 
44007
- //# debugId=2814142040324B2664756E2164756E21
44409
+ //# debugId=8A332BD30B1038DF64756E2164756E21
44008
44410
  //# sourceMappingURL=mcp-server.js.map