@vercel/sdk 1.7.4 → 1.7.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +6 -6
- package/bin/mcp-server.js +559 -272
- package/bin/mcp-server.js.map +35 -35
- package/docs/sdks/accessgroups/README.md +16 -0
- package/docs/sdks/artifacts/README.md +6 -6
- package/docs/sdks/authentication/README.md +1 -1
- package/docs/sdks/deployments/README.md +8 -14
- package/docs/sdks/dns/README.md +12 -26
- package/docs/sdks/domains/README.md +2 -2
- package/docs/sdks/edgeconfig/README.md +10 -2
- package/docs/sdks/marketplace/README.md +77 -97
- package/docs/sdks/security/README.md +4 -10
- package/docs/sdks/teams/README.md +8 -0
- package/docs/sdks/vercel/README.md +2 -2
- package/docs/sdks/webhooks/README.md +12 -4
- package/esm/__tests__/deployments.test.js +1 -2
- package/esm/__tests__/deployments.test.js.map +1 -1
- package/esm/__tests__/projects.test.js +13 -15
- package/esm/__tests__/projects.test.js.map +1 -1
- package/esm/funcs/authenticationExchangeSsoToken.d.ts +1 -1
- package/esm/funcs/authenticationExchangeSsoToken.js +1 -1
- package/esm/funcs/certsGetCertById.js +1 -1
- package/esm/funcs/certsIssueCert.js +1 -1
- package/esm/funcs/certsRemoveCert.js +1 -1
- package/esm/funcs/certsUploadCert.js +1 -1
- package/esm/funcs/deploymentsGetDeploymentFileContents.d.ts +2 -2
- package/esm/funcs/deploymentsGetDeploymentFileContents.d.ts.map +1 -1
- package/esm/funcs/deploymentsGetDeploymentFileContents.js +4 -3
- package/esm/funcs/deploymentsGetDeploymentFileContents.js.map +1 -1
- package/esm/funcs/marketplaceExchangeSsoToken.d.ts +1 -1
- package/esm/funcs/marketplaceExchangeSsoToken.js +1 -1
- package/esm/funcs/projectsRemoveProjectDomain.js +3 -2
- package/esm/funcs/projectsRemoveProjectDomain.js.map +1 -1
- package/esm/funcs/projectsRequestPromote.js +0 -1
- package/esm/funcs/projectsRequestPromote.js.map +1 -1
- package/esm/lib/config.d.ts +3 -3
- package/esm/lib/config.js +3 -3
- package/esm/mcp-server/cli/start/impl.js +2 -2
- package/esm/mcp-server/cli/start/impl.js.map +1 -1
- package/esm/mcp-server/mcp-server.js +1 -1
- package/esm/mcp-server/server.js +1 -1
- package/esm/mcp-server/tools/authenticationExchangeSsoToken.js +1 -1
- package/esm/mcp-server/tools/authenticationExchangeSsoToken.js.map +1 -1
- package/esm/mcp-server/tools/deploymentsGetDeploymentFileContents.d.ts.map +1 -1
- package/esm/mcp-server/tools/deploymentsGetDeploymentFileContents.js +1 -2
- package/esm/mcp-server/tools/deploymentsGetDeploymentFileContents.js.map +1 -1
- package/esm/mcp-server/tools/marketplaceExchangeSsoToken.js +1 -1
- package/esm/mcp-server/tools/marketplaceExchangeSsoToken.js.map +1 -1
- package/esm/models/canceldeploymentop.d.ts +10 -0
- package/esm/models/canceldeploymentop.d.ts.map +1 -1
- package/esm/models/canceldeploymentop.js +4 -0
- package/esm/models/canceldeploymentop.js.map +1 -1
- package/esm/models/createdeploymentop.d.ts +38 -28
- package/esm/models/createdeploymentop.d.ts.map +1 -1
- package/esm/models/createdeploymentop.js +16 -12
- package/esm/models/createdeploymentop.js.map +1 -1
- package/esm/models/createprojectop.d.ts +114 -2
- package/esm/models/createprojectop.d.ts.map +1 -1
- package/esm/models/createprojectop.js +108 -2
- package/esm/models/createprojectop.js.map +1 -1
- package/esm/models/getdeploymentfilecontentsop.d.ts +0 -31
- package/esm/models/getdeploymentfilecontentsop.d.ts.map +1 -1
- package/esm/models/getdeploymentfilecontentsop.js +0 -25
- package/esm/models/getdeploymentfilecontentsop.js.map +1 -1
- package/esm/models/getdeploymentop.d.ts +10 -0
- package/esm/models/getdeploymentop.d.ts.map +1 -1
- package/esm/models/getdeploymentop.js +4 -0
- package/esm/models/getdeploymentop.js.map +1 -1
- package/esm/models/getprojectsop.d.ts +114 -2
- package/esm/models/getprojectsop.d.ts.map +1 -1
- package/esm/models/getprojectsop.js +108 -2
- package/esm/models/getprojectsop.js.map +1 -1
- package/esm/models/importresourceop.d.ts +9 -0
- package/esm/models/importresourceop.d.ts.map +1 -1
- package/esm/models/importresourceop.js +2 -0
- package/esm/models/importresourceop.js.map +1 -1
- package/esm/models/issuecertop.d.ts +2 -2
- package/esm/models/issuecertop.d.ts.map +1 -1
- package/esm/models/issuecertop.js +2 -2
- package/esm/models/issuecertop.js.map +1 -1
- package/esm/models/removeprojectdomainop.d.ts +30 -0
- package/esm/models/removeprojectdomainop.d.ts.map +1 -1
- package/esm/models/removeprojectdomainop.js +38 -0
- package/esm/models/removeprojectdomainop.js.map +1 -1
- package/esm/models/requestpromoteop.d.ts +0 -5
- package/esm/models/requestpromoteop.d.ts.map +1 -1
- package/esm/models/requestpromoteop.js +0 -2
- package/esm/models/requestpromoteop.js.map +1 -1
- package/esm/models/teamlimited.d.ts +13 -13
- package/esm/models/teamlimited.d.ts.map +1 -1
- package/esm/models/teamlimited.js +6 -6
- package/esm/models/teamlimited.js.map +1 -1
- package/esm/models/updateprojectdatacacheop.d.ts +114 -2
- package/esm/models/updateprojectdatacacheop.d.ts.map +1 -1
- package/esm/models/updateprojectdatacacheop.js +108 -2
- package/esm/models/updateprojectdatacacheop.js.map +1 -1
- package/esm/models/updateprojectop.d.ts +114 -2
- package/esm/models/updateprojectop.d.ts.map +1 -1
- package/esm/models/updateprojectop.js +108 -2
- package/esm/models/updateprojectop.js.map +1 -1
- package/esm/models/updateresourcesecretsbyidop.d.ts +9 -0
- package/esm/models/updateresourcesecretsbyidop.d.ts.map +1 -1
- package/esm/models/updateresourcesecretsbyidop.js +2 -0
- package/esm/models/updateresourcesecretsbyidop.js.map +1 -1
- package/esm/models/updateresourcesecretsop.d.ts +9 -0
- package/esm/models/updateresourcesecretsop.d.ts.map +1 -1
- package/esm/models/updateresourcesecretsop.js +2 -0
- package/esm/models/updateresourcesecretsop.js.map +1 -1
- package/esm/models/uploadcertop.d.ts +2 -2
- package/esm/models/uploadcertop.d.ts.map +1 -1
- package/esm/models/uploadcertop.js +2 -2
- package/esm/models/uploadcertop.js.map +1 -1
- package/esm/models/userevent.d.ts +368 -257
- package/esm/models/userevent.d.ts.map +1 -1
- package/esm/models/userevent.js +423 -315
- package/esm/models/userevent.js.map +1 -1
- package/esm/sdk/authentication.d.ts +1 -1
- package/esm/sdk/authentication.js +1 -1
- package/esm/sdk/deployments.d.ts +2 -2
- package/esm/sdk/deployments.d.ts.map +1 -1
- package/esm/sdk/deployments.js.map +1 -1
- package/esm/sdk/marketplace.d.ts +1 -1
- package/esm/sdk/marketplace.js +1 -1
- package/jsr.json +1 -1
- package/package.json +1 -1
- package/src/__tests__/deployments.test.ts +1 -2
- package/src/__tests__/projects.test.ts +13 -15
- package/src/funcs/authenticationExchangeSsoToken.ts +1 -1
- package/src/funcs/certsGetCertById.ts +1 -1
- package/src/funcs/certsIssueCert.ts +1 -1
- package/src/funcs/certsRemoveCert.ts +1 -1
- package/src/funcs/certsUploadCert.ts +1 -1
- package/src/funcs/deploymentsGetDeploymentFileContents.ts +6 -7
- package/src/funcs/marketplaceExchangeSsoToken.ts +1 -1
- package/src/funcs/projectsRemoveProjectDomain.ts +3 -2
- package/src/funcs/projectsRequestPromote.ts +0 -1
- package/src/lib/config.ts +3 -3
- package/src/mcp-server/cli/start/impl.ts +2 -2
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +1 -1
- package/src/mcp-server/tools/authenticationExchangeSsoToken.ts +1 -1
- package/src/mcp-server/tools/deploymentsGetDeploymentFileContents.ts +1 -3
- package/src/mcp-server/tools/marketplaceExchangeSsoToken.ts +1 -1
- package/src/models/canceldeploymentop.ts +14 -0
- package/src/models/createdeploymentop.ts +30 -16
- package/src/models/createprojectop.ts +243 -4
- package/src/models/getdeploymentfilecontentsop.ts +0 -69
- package/src/models/getdeploymentop.ts +14 -0
- package/src/models/getprojectsop.ts +237 -4
- package/src/models/importresourceop.ts +7 -0
- package/src/models/issuecertop.ts +4 -4
- package/src/models/removeprojectdomainop.ts +78 -0
- package/src/models/requestpromoteop.ts +0 -7
- package/src/models/teamlimited.ts +13 -13
- package/src/models/updateprojectdatacacheop.ts +260 -4
- package/src/models/updateprojectop.ts +243 -4
- package/src/models/updateresourcesecretsbyidop.ts +7 -0
- package/src/models/updateresourcesecretsop.ts +7 -0
- package/src/models/uploadcertop.ts +4 -4
- package/src/models/userevent.ts +798 -582
- package/src/sdk/authentication.ts +1 -1
- package/src/sdk/deployments.ts +2 -5
- package/src/sdk/marketplace.ts +1 -1
- package/vercel-spec.json +497 -94
|
@@ -9,7 +9,7 @@ export declare class Authentication extends ClientSDK {
|
|
|
9
9
|
* SSO Token Exchange
|
|
10
10
|
*
|
|
11
11
|
* @remarks
|
|
12
|
-
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl.
|
|
12
|
+
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
|
|
13
13
|
*/
|
|
14
14
|
exchangeSsoToken(request: ExchangeSsoTokenRequestBody, options?: RequestOptions): Promise<ExchangeSsoTokenResponseBody>;
|
|
15
15
|
/**
|
|
@@ -13,7 +13,7 @@ export class Authentication extends ClientSDK {
|
|
|
13
13
|
* SSO Token Exchange
|
|
14
14
|
*
|
|
15
15
|
* @remarks
|
|
16
|
-
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl.
|
|
16
|
+
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
|
|
17
17
|
*/
|
|
18
18
|
async exchangeSsoToken(request, options) {
|
|
19
19
|
return unwrapAsync(authenticationExchangeSsoToken(this, request, options));
|
package/esm/sdk/deployments.d.ts
CHANGED
|
@@ -5,7 +5,7 @@ import { CreateDeploymentRequest, CreateDeploymentResponseBody } from "../models
|
|
|
5
5
|
import { DeleteDeploymentRequest, DeleteDeploymentResponseBody } from "../models/deletedeploymentop.js";
|
|
6
6
|
import { FileTree } from "../models/filetree.js";
|
|
7
7
|
import { GetDeploymentEventsRequest, GetDeploymentEventsResponse } from "../models/getdeploymenteventsop.js";
|
|
8
|
-
import { GetDeploymentFileContentsRequest
|
|
8
|
+
import { GetDeploymentFileContentsRequest } from "../models/getdeploymentfilecontentsop.js";
|
|
9
9
|
import { GetDeploymentRequest, GetDeploymentResponseBody } from "../models/getdeploymentop.js";
|
|
10
10
|
import { GetDeploymentsRequest, GetDeploymentsResponseBody } from "../models/getdeploymentsop.js";
|
|
11
11
|
import { ListDeploymentFilesRequest } from "../models/listdeploymentfilesop.js";
|
|
@@ -70,7 +70,7 @@ export declare class Deployments extends ClientSDK {
|
|
|
70
70
|
* @remarks
|
|
71
71
|
* Allows to retrieve the content of a file by supplying the file identifier and the deployment unique identifier. The response body will contain a JSON response containing the contents of the file encoded as base64.
|
|
72
72
|
*/
|
|
73
|
-
getDeploymentFileContents(request: GetDeploymentFileContentsRequest, options?: RequestOptions): Promise<
|
|
73
|
+
getDeploymentFileContents(request: GetDeploymentFileContentsRequest, options?: RequestOptions): Promise<void>;
|
|
74
74
|
/**
|
|
75
75
|
* List deployments
|
|
76
76
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"deployments.d.ts","sourceRoot":"","sources":["../../src/sdk/deployments.ts"],"names":[],"mappings":"AAQA,OAAO,EAEL,6BAA6B,EAC9B,MAAM,4CAA4C,CAAC;AAMpD,OAAO,EAAE,SAAS,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAC3D,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACjD,OAAO,EACL,0BAA0B,EAC1B,2BAA2B,EAC5B,MAAM,oCAAoC,CAAC;AAC5C,OAAO,
|
|
1
|
+
{"version":3,"file":"deployments.d.ts","sourceRoot":"","sources":["../../src/sdk/deployments.ts"],"names":[],"mappings":"AAQA,OAAO,EAEL,6BAA6B,EAC9B,MAAM,4CAA4C,CAAC;AAMpD,OAAO,EAAE,SAAS,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAC3D,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACjD,OAAO,EACL,0BAA0B,EAC1B,2BAA2B,EAC5B,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EAAE,gCAAgC,EAAE,MAAM,0CAA0C,CAAC;AAC5F,OAAO,EACL,oBAAoB,EACpB,yBAAyB,EAC1B,MAAM,8BAA8B,CAAC;AACtC,OAAO,EACL,qBAAqB,EACrB,0BAA0B,EAC3B,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,0BAA0B,EAAE,MAAM,oCAAoC,CAAC;AAChF,OAAO,EAAE,wCAAwC,EAAE,MAAM,kDAAkD,CAAC;AAC5G,OAAO,EACL,iBAAiB,EACjB,sBAAsB,EACvB,MAAM,2BAA2B,CAAC;AAGnC,OAAO,EAAE,6BAA6B,EAAE,MAAM,4CAA4C,CAAC;AAE3F,qBAAa,WAAY,SAAQ,SAAS;IACxC;;;;;OAKG;IACG,mBAAmB,CACvB,OAAO,EAAE,0BAA0B,EACnC,OAAO,CAAC,EAAE,cAAc,GAAG;QACzB,oBAAoB,CAAC,EAAE,6BAA6B,CAAC;KACtD,GACA,OAAO,CAAC,2BAA2B,CAAC;IAQvC;;;;;OAKG;IACG,iCAAiC,CACrC,OAAO,EAAE,wCAAwC,EACjD,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,IAAI,CAAC;IAQhB;;;;;OAKG;IACG,aAAa,CACjB,OAAO,EAAE,oBAAoB,EAC7B,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,yBAAyB,CAAC;IAQrC;;;;;OAKG;IACG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,EAChC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,4BAA4B,CAAC;IAQxC;;;;;OAKG;IACG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,EAChC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,4BAA4B,CAAC;IAQxC;;;;;OAKG;IACG,UAAU,CACd,OAAO,EAAE,iBAAiB,EAC1B,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,sBAAsB,CAAC;IAQlC;;;;;OAKG;IACG,mBAAmB,CACvB,OAAO,EAAE,0BAA0B,EACnC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC;IAQ3B;;;;;OAKG;IACG,yBAAyB,CAC7B,OAAO,EAAE,gCAAgC,EACzC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,IAAI,CAAC;IAQhB;;;;;OAKG;IACG,cAAc,CAClB,OAAO,EAAE,qBAAqB,EAC9B,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,0BAA0B,CAAC;IAQtC;;;;;OAKG;IACG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,EAChC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,4BAA4B,CAAC;CAOzC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"deployments.js","sourceRoot":"","sources":["../../src/sdk/deployments.ts"],"names":[],"mappings":"AAAA;;GAEG;AAEH,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,wBAAwB,EAAE,MAAM,sCAAsC,CAAC;AAChF,OAAO,EACL,8BAA8B,GAE/B,MAAM,4CAA4C,CAAC;AACpD,OAAO,EAAE,oCAAoC,EAAE,MAAM,kDAAkD,CAAC;AACxG,OAAO,EAAE,yBAAyB,EAAE,MAAM,uCAAuC,CAAC;AAClF,OAAO,EAAE,8BAA8B,EAAE,MAAM,4CAA4C,CAAC;AAC5F,OAAO,EAAE,4CAA4C,EAAE,MAAM,0DAA0D,CAAC;AACxH,OAAO,EAAE,qBAAqB,EAAE,MAAM,mCAAmC,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAkB,MAAM,gBAAgB,CAAC;
|
|
1
|
+
{"version":3,"file":"deployments.js","sourceRoot":"","sources":["../../src/sdk/deployments.ts"],"names":[],"mappings":"AAAA;;GAEG;AAEH,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,wBAAwB,EAAE,MAAM,sCAAsC,CAAC;AAChF,OAAO,EACL,8BAA8B,GAE/B,MAAM,4CAA4C,CAAC;AACpD,OAAO,EAAE,oCAAoC,EAAE,MAAM,kDAAkD,CAAC;AACxG,OAAO,EAAE,yBAAyB,EAAE,MAAM,uCAAuC,CAAC;AAClF,OAAO,EAAE,8BAA8B,EAAE,MAAM,4CAA4C,CAAC;AAC5F,OAAO,EAAE,4CAA4C,EAAE,MAAM,0DAA0D,CAAC;AACxH,OAAO,EAAE,qBAAqB,EAAE,MAAM,mCAAmC,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAkB,MAAM,gBAAgB,CAAC;AAiC3D,OAAO,EAAE,WAAW,EAAE,MAAM,gBAAgB,CAAC;AAE7C,OAAO,EAAE,6BAA6B,EAAE,MAAM,4CAA4C,CAAC;AAE3F,MAAM,OAAO,WAAY,SAAQ,SAAS;IACxC;;;;;OAKG;IACH,KAAK,CAAC,mBAAmB,CACvB,OAAmC,EACnC,OAEC;QAED,OAAO,WAAW,CAAC,8BAA8B,CAC/C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,iCAAiC,CACrC,OAAiD,EACjD,OAAwB;QAExB,OAAO,WAAW,CAAC,4CAA4C,CAC7D,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,aAAa,CACjB,OAA6B,EAC7B,OAAwB;QAExB,OAAO,WAAW,CAAC,wBAAwB,CACzC,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,gBAAgB,CACpB,OAAgC,EAChC,OAAwB;QAExB,OAAO,WAAW,CAAC,2BAA2B,CAC5C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,gBAAgB,CACpB,OAAgC,EAChC,OAAwB;QAExB,OAAO,WAAW,CAAC,2BAA2B,CAC5C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,UAAU,CACd,OAA0B,EAC1B,OAAwB;QAExB,OAAO,WAAW,CAAC,qBAAqB,CACtC,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,mBAAmB,CACvB,OAAmC,EACnC,OAAwB;QAExB,OAAO,WAAW,CAAC,8BAA8B,CAC/C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,yBAAyB,CAC7B,OAAyC,EACzC,OAAwB;QAExB,OAAO,WAAW,CAAC,oCAAoC,CACrD,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,OAAwB;QAExB,OAAO,WAAW,CAAC,yBAAyB,CAC1C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,gBAAgB,CACpB,OAAgC,EAChC,OAAwB;QAExB,OAAO,WAAW,CAAC,2BAA2B,CAC5C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;CACF"}
|
package/esm/sdk/marketplace.d.ts
CHANGED
|
@@ -98,7 +98,7 @@ export declare class Marketplace extends ClientSDK {
|
|
|
98
98
|
* SSO Token Exchange
|
|
99
99
|
*
|
|
100
100
|
* @remarks
|
|
101
|
-
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl.
|
|
101
|
+
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
|
|
102
102
|
*/
|
|
103
103
|
exchangeSsoToken(request: ExchangeSsoTokenRequestBody, options?: RequestOptions): Promise<ExchangeSsoTokenResponseBody>;
|
|
104
104
|
/**
|
package/esm/sdk/marketplace.js
CHANGED
|
@@ -124,7 +124,7 @@ export class Marketplace extends ClientSDK {
|
|
|
124
124
|
* SSO Token Exchange
|
|
125
125
|
*
|
|
126
126
|
* @remarks
|
|
127
|
-
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl.
|
|
127
|
+
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
|
|
128
128
|
*/
|
|
129
129
|
async exchangeSsoToken(request, options) {
|
|
130
130
|
return unwrapAsync(marketplaceExchangeSsoToken(this, request, options));
|
package/jsr.json
CHANGED
package/package.json
CHANGED
|
@@ -179,13 +179,12 @@ test("Deployments Get Deployment File Contents", async () => {
|
|
|
179
179
|
bearerToken: "<YOUR_BEARER_TOKEN_HERE>",
|
|
180
180
|
});
|
|
181
181
|
|
|
182
|
-
|
|
182
|
+
await vercel.deployments.getDeploymentFileContents({
|
|
183
183
|
id: "<id>",
|
|
184
184
|
fileId: "<id>",
|
|
185
185
|
teamId: "team_1a2b3c4d5e6f7g8h9i0j1k2l",
|
|
186
186
|
slug: "my-team-url-slug",
|
|
187
187
|
});
|
|
188
|
-
expect(result).toBeDefined();
|
|
189
188
|
});
|
|
190
189
|
|
|
191
190
|
test("Deployments Get Deployments", async () => {
|
|
@@ -253,21 +253,19 @@ test("Projects Create Project Env", async () => {
|
|
|
253
253
|
upsert: "true",
|
|
254
254
|
teamId: "team_1a2b3c4d5e6f7g8h9i0j1k2l",
|
|
255
255
|
slug: "my-team-url-slug",
|
|
256
|
-
requestBody:
|
|
257
|
-
|
|
258
|
-
|
|
259
|
-
|
|
260
|
-
|
|
261
|
-
|
|
262
|
-
|
|
263
|
-
|
|
264
|
-
|
|
265
|
-
|
|
266
|
-
|
|
267
|
-
|
|
268
|
-
|
|
269
|
-
},
|
|
270
|
-
],
|
|
256
|
+
requestBody: {
|
|
257
|
+
key: "API_URL",
|
|
258
|
+
value: "https://api.vercel.com",
|
|
259
|
+
type: "plain",
|
|
260
|
+
target: [
|
|
261
|
+
"preview",
|
|
262
|
+
],
|
|
263
|
+
gitBranch: "feature-1",
|
|
264
|
+
comment: "database connection string for production",
|
|
265
|
+
customEnvironmentIds: [
|
|
266
|
+
"env_1234567890",
|
|
267
|
+
],
|
|
268
|
+
},
|
|
271
269
|
});
|
|
272
270
|
expect(result).toBeDefined();
|
|
273
271
|
});
|
|
@@ -39,7 +39,7 @@ import { Result } from "../types/fp.js";
|
|
|
39
39
|
* SSO Token Exchange
|
|
40
40
|
*
|
|
41
41
|
* @remarks
|
|
42
|
-
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl.
|
|
42
|
+
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
|
|
43
43
|
*/
|
|
44
44
|
export function authenticationExchangeSsoToken(
|
|
45
45
|
client: VercelCore,
|
|
@@ -105,7 +105,7 @@ async function $do(
|
|
|
105
105
|
const payload = parsed.value;
|
|
106
106
|
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
107
107
|
|
|
108
|
-
const path = pathToFunc("/
|
|
108
|
+
const path = pathToFunc("/v8/certs")();
|
|
109
109
|
|
|
110
110
|
const query = encodeFormQuery({
|
|
111
111
|
"slug": payload.slug,
|
|
@@ -99,7 +99,7 @@ async function $do(
|
|
|
99
99
|
const payload = parsed.value;
|
|
100
100
|
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
101
101
|
|
|
102
|
-
const path = pathToFunc("/
|
|
102
|
+
const path = pathToFunc("/v8/certs")();
|
|
103
103
|
|
|
104
104
|
const query = encodeFormQuery({
|
|
105
105
|
"slug": payload.slug,
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
* Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.
|
|
3
3
|
*/
|
|
4
4
|
|
|
5
|
+
import * as z from "zod";
|
|
5
6
|
import { VercelCore } from "../core.js";
|
|
6
7
|
import { encodeFormQuery, encodeSimple } from "../lib/encodings.js";
|
|
7
8
|
import * as M from "../lib/matchers.js";
|
|
@@ -13,8 +14,6 @@ import { pathToFunc } from "../lib/url.js";
|
|
|
13
14
|
import {
|
|
14
15
|
GetDeploymentFileContentsRequest,
|
|
15
16
|
GetDeploymentFileContentsRequest$outboundSchema,
|
|
16
|
-
GetDeploymentFileContentsResponseBody,
|
|
17
|
-
GetDeploymentFileContentsResponseBody$inboundSchema,
|
|
18
17
|
} from "../models/getdeploymentfilecontentsop.js";
|
|
19
18
|
import {
|
|
20
19
|
ConnectionError,
|
|
@@ -52,7 +51,7 @@ export function deploymentsGetDeploymentFileContents(
|
|
|
52
51
|
options?: RequestOptions,
|
|
53
52
|
): APIPromise<
|
|
54
53
|
Result<
|
|
55
|
-
|
|
54
|
+
void,
|
|
56
55
|
| VercelBadRequestError
|
|
57
56
|
| VercelForbiddenError
|
|
58
57
|
| VercelNotFoundError
|
|
@@ -79,7 +78,7 @@ async function $do(
|
|
|
79
78
|
): Promise<
|
|
80
79
|
[
|
|
81
80
|
Result<
|
|
82
|
-
|
|
81
|
+
void,
|
|
83
82
|
| VercelBadRequestError
|
|
84
83
|
| VercelForbiddenError
|
|
85
84
|
| VercelNotFoundError
|
|
@@ -116,7 +115,7 @@ async function $do(
|
|
|
116
115
|
}),
|
|
117
116
|
};
|
|
118
117
|
|
|
119
|
-
const path = pathToFunc("/
|
|
118
|
+
const path = pathToFunc("/v8/deployments/{id}/files/{fileId}")(pathParams);
|
|
120
119
|
|
|
121
120
|
const query = encodeFormQuery({
|
|
122
121
|
"path": payload.path,
|
|
@@ -177,7 +176,7 @@ async function $do(
|
|
|
177
176
|
};
|
|
178
177
|
|
|
179
178
|
const [result] = await M.match<
|
|
180
|
-
|
|
179
|
+
void,
|
|
181
180
|
| VercelBadRequestError
|
|
182
181
|
| VercelForbiddenError
|
|
183
182
|
| VercelNotFoundError
|
|
@@ -189,10 +188,10 @@ async function $do(
|
|
|
189
188
|
| RequestTimeoutError
|
|
190
189
|
| ConnectionError
|
|
191
190
|
>(
|
|
192
|
-
M.json(200, GetDeploymentFileContentsResponseBody$inboundSchema),
|
|
193
191
|
M.jsonErr(400, VercelBadRequestError$inboundSchema),
|
|
194
192
|
M.jsonErr(401, VercelForbiddenError$inboundSchema),
|
|
195
193
|
M.jsonErr(404, VercelNotFoundError$inboundSchema),
|
|
194
|
+
M.nil("2XX", z.void()),
|
|
196
195
|
M.fail([403, 410, "4XX"]),
|
|
197
196
|
M.fail("5XX"),
|
|
198
197
|
)(response, { extraFields: responseFields });
|
|
@@ -39,7 +39,7 @@ import { Result } from "../types/fp.js";
|
|
|
39
39
|
* SSO Token Exchange
|
|
40
40
|
*
|
|
41
41
|
* @remarks
|
|
42
|
-
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl.
|
|
42
|
+
* During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
|
|
43
43
|
*/
|
|
44
44
|
export function marketplaceExchangeSsoToken(
|
|
45
45
|
client: VercelCore,
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
*/
|
|
4
4
|
|
|
5
5
|
import { VercelCore } from "../core.js";
|
|
6
|
-
import { encodeFormQuery, encodeSimple } from "../lib/encodings.js";
|
|
6
|
+
import { encodeFormQuery, encodeJSON, encodeSimple } from "../lib/encodings.js";
|
|
7
7
|
import * as M from "../lib/matchers.js";
|
|
8
8
|
import { compactMap } from "../lib/primitives.js";
|
|
9
9
|
import { safeParse } from "../lib/schemas.js";
|
|
@@ -103,7 +103,7 @@ async function $do(
|
|
|
103
103
|
return [parsed, { status: "invalid" }];
|
|
104
104
|
}
|
|
105
105
|
const payload = parsed.value;
|
|
106
|
-
const body =
|
|
106
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
107
107
|
|
|
108
108
|
const pathParams = {
|
|
109
109
|
domain: encodeSimple("domain", payload.domain, {
|
|
@@ -126,6 +126,7 @@ async function $do(
|
|
|
126
126
|
});
|
|
127
127
|
|
|
128
128
|
const headers = new Headers(compactMap({
|
|
129
|
+
"Content-Type": "application/json",
|
|
129
130
|
Accept: "application/json",
|
|
130
131
|
}));
|
|
131
132
|
|
package/src/lib/config.ts
CHANGED
|
@@ -57,7 +57,7 @@ export function serverURLFromOptions(options: SDKOptions): URL | null {
|
|
|
57
57
|
export const SDK_METADATA = {
|
|
58
58
|
language: "typescript",
|
|
59
59
|
openapiDocVersion: "0.0.1",
|
|
60
|
-
sdkVersion: "1.7.
|
|
61
|
-
genVersion: "2.
|
|
62
|
-
userAgent: "speakeasy-sdk/typescript 1.7.
|
|
60
|
+
sdkVersion: "1.7.5",
|
|
61
|
+
genVersion: "2.605.6",
|
|
62
|
+
userAgent: "speakeasy-sdk/typescript 1.7.5 2.605.6 0.0.1 @vercel/sdk",
|
|
63
63
|
} as const;
|
|
@@ -50,7 +50,7 @@ async function startStdio(flags: StartCommandFlags) {
|
|
|
50
50
|
logger,
|
|
51
51
|
allowedTools: flags.tool,
|
|
52
52
|
scopes: flags.scope,
|
|
53
|
-
...{ bearerToken: flags["bearer-token"] },
|
|
53
|
+
...{ bearerToken: flags["bearer-token"] ?? "" },
|
|
54
54
|
serverURL: flags["server-url"],
|
|
55
55
|
serverIdx: flags["server-index"],
|
|
56
56
|
});
|
|
@@ -71,7 +71,7 @@ async function startSSE(flags: StartCommandFlags) {
|
|
|
71
71
|
logger,
|
|
72
72
|
allowedTools: flags.tool,
|
|
73
73
|
scopes: flags.scope,
|
|
74
|
-
...{ bearerToken: flags["bearer-token"] },
|
|
74
|
+
...{ bearerToken: flags["bearer-token"] ?? "" },
|
|
75
75
|
serverURL: flags["server-url"],
|
|
76
76
|
serverIdx: flags["server-index"],
|
|
77
77
|
});
|
package/src/mcp-server/server.ts
CHANGED
|
@@ -15,7 +15,7 @@ export const tool$authenticationExchangeSsoToken: ToolDefinition<typeof args> =
|
|
|
15
15
|
name: "authentication-exchange-sso-token",
|
|
16
16
|
description: `SSO Token Exchange
|
|
17
17
|
|
|
18
|
-
During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization \`code\` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl.
|
|
18
|
+
During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization \`code\` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned \`id_token\` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.`,
|
|
19
19
|
args,
|
|
20
20
|
tool: async (client, args, ctx) => {
|
|
21
21
|
const [result, apiCall] = await authenticationExchangeSsoToken(
|
|
@@ -14,7 +14,7 @@ export const tool$marketplaceExchangeSsoToken: ToolDefinition<typeof args> = {
|
|
|
14
14
|
name: "marketplace-exchange-sso-token",
|
|
15
15
|
description: `SSO Token Exchange
|
|
16
16
|
|
|
17
|
-
During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization \`code\` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl.
|
|
17
|
+
During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization \`code\` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned \`id_token\` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.`,
|
|
18
18
|
args,
|
|
19
19
|
tool: async (client, args, ctx) => {
|
|
20
20
|
const [result, apiCall] = await marketplaceExchangeSsoToken(
|
|
@@ -1014,6 +1014,10 @@ export type CancelDeploymentMicrofrontends2 = {
|
|
|
1014
1014
|
*/
|
|
1015
1015
|
applications?: { [k: string]: MicrofrontendsApplications } | undefined;
|
|
1016
1016
|
isDefaultApp: boolean;
|
|
1017
|
+
/**
|
|
1018
|
+
* The project name of the default app of this deployment's microfrontends group.
|
|
1019
|
+
*/
|
|
1020
|
+
defaultAppProjectName: string;
|
|
1017
1021
|
/**
|
|
1018
1022
|
* A path that is used to take screenshots and as the default path in preview links when a domain for this microfrontend is shown in the UI.
|
|
1019
1023
|
*/
|
|
@@ -1029,6 +1033,10 @@ export type CancelDeploymentMicrofrontends1 = {
|
|
|
1029
1033
|
* Whether this project is the default application for the microfrontends group. The default application is the one that is used as the top level shell for the microfrontends group and hosts the other microfrontends.
|
|
1030
1034
|
*/
|
|
1031
1035
|
isDefaultApp?: boolean | undefined;
|
|
1036
|
+
/**
|
|
1037
|
+
* The project name of the default app of this deployment's microfrontends group.
|
|
1038
|
+
*/
|
|
1039
|
+
defaultAppProjectName: string;
|
|
1032
1040
|
/**
|
|
1033
1041
|
* A path that is used to take screenshots and as the default path in preview links when a domain for this microfrontend is shown in the UI.
|
|
1034
1042
|
*/
|
|
@@ -6381,6 +6389,7 @@ export const CancelDeploymentMicrofrontends2$inboundSchema: z.ZodType<
|
|
|
6381
6389
|
applications: z.record(z.lazy(() => MicrofrontendsApplications$inboundSchema))
|
|
6382
6390
|
.optional(),
|
|
6383
6391
|
isDefaultApp: z.boolean(),
|
|
6392
|
+
defaultAppProjectName: z.string(),
|
|
6384
6393
|
defaultRoute: z.string().optional(),
|
|
6385
6394
|
groupIds: z.array(z.string()),
|
|
6386
6395
|
});
|
|
@@ -6391,6 +6400,7 @@ export type CancelDeploymentMicrofrontends2$Outbound = {
|
|
|
6391
6400
|
| { [k: string]: MicrofrontendsApplications$Outbound }
|
|
6392
6401
|
| undefined;
|
|
6393
6402
|
isDefaultApp: boolean;
|
|
6403
|
+
defaultAppProjectName: string;
|
|
6394
6404
|
defaultRoute?: string | undefined;
|
|
6395
6405
|
groupIds: Array<string>;
|
|
6396
6406
|
};
|
|
@@ -6405,6 +6415,7 @@ export const CancelDeploymentMicrofrontends2$outboundSchema: z.ZodType<
|
|
|
6405
6415
|
z.lazy(() => MicrofrontendsApplications$outboundSchema),
|
|
6406
6416
|
).optional(),
|
|
6407
6417
|
isDefaultApp: z.boolean(),
|
|
6418
|
+
defaultAppProjectName: z.string(),
|
|
6408
6419
|
defaultRoute: z.string().optional(),
|
|
6409
6420
|
groupIds: z.array(z.string()),
|
|
6410
6421
|
});
|
|
@@ -6449,6 +6460,7 @@ export const CancelDeploymentMicrofrontends1$inboundSchema: z.ZodType<
|
|
|
6449
6460
|
unknown
|
|
6450
6461
|
> = z.object({
|
|
6451
6462
|
isDefaultApp: z.boolean().optional(),
|
|
6463
|
+
defaultAppProjectName: z.string(),
|
|
6452
6464
|
defaultRoute: z.string().optional(),
|
|
6453
6465
|
groupIds: z.array(z.string()),
|
|
6454
6466
|
});
|
|
@@ -6456,6 +6468,7 @@ export const CancelDeploymentMicrofrontends1$inboundSchema: z.ZodType<
|
|
|
6456
6468
|
/** @internal */
|
|
6457
6469
|
export type CancelDeploymentMicrofrontends1$Outbound = {
|
|
6458
6470
|
isDefaultApp?: boolean | undefined;
|
|
6471
|
+
defaultAppProjectName: string;
|
|
6459
6472
|
defaultRoute?: string | undefined;
|
|
6460
6473
|
groupIds: Array<string>;
|
|
6461
6474
|
};
|
|
@@ -6467,6 +6480,7 @@ export const CancelDeploymentMicrofrontends1$outboundSchema: z.ZodType<
|
|
|
6467
6480
|
CancelDeploymentMicrofrontends1
|
|
6468
6481
|
> = z.object({
|
|
6469
6482
|
isDefaultApp: z.boolean().optional(),
|
|
6483
|
+
defaultAppProjectName: z.string(),
|
|
6470
6484
|
defaultRoute: z.string().optional(),
|
|
6471
6485
|
groupIds: z.array(z.string()),
|
|
6472
6486
|
});
|