@vercel/sdk 1.7.4 → 1.7.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (164) hide show
  1. package/README.md +6 -6
  2. package/bin/mcp-server.js +559 -272
  3. package/bin/mcp-server.js.map +35 -35
  4. package/docs/sdks/accessgroups/README.md +16 -0
  5. package/docs/sdks/artifacts/README.md +6 -6
  6. package/docs/sdks/authentication/README.md +1 -1
  7. package/docs/sdks/deployments/README.md +8 -14
  8. package/docs/sdks/dns/README.md +12 -26
  9. package/docs/sdks/domains/README.md +2 -2
  10. package/docs/sdks/edgeconfig/README.md +10 -2
  11. package/docs/sdks/marketplace/README.md +77 -97
  12. package/docs/sdks/security/README.md +4 -10
  13. package/docs/sdks/teams/README.md +8 -0
  14. package/docs/sdks/vercel/README.md +2 -2
  15. package/docs/sdks/webhooks/README.md +12 -4
  16. package/esm/__tests__/deployments.test.js +1 -2
  17. package/esm/__tests__/deployments.test.js.map +1 -1
  18. package/esm/__tests__/projects.test.js +13 -15
  19. package/esm/__tests__/projects.test.js.map +1 -1
  20. package/esm/funcs/authenticationExchangeSsoToken.d.ts +1 -1
  21. package/esm/funcs/authenticationExchangeSsoToken.js +1 -1
  22. package/esm/funcs/certsGetCertById.js +1 -1
  23. package/esm/funcs/certsIssueCert.js +1 -1
  24. package/esm/funcs/certsRemoveCert.js +1 -1
  25. package/esm/funcs/certsUploadCert.js +1 -1
  26. package/esm/funcs/deploymentsGetDeploymentFileContents.d.ts +2 -2
  27. package/esm/funcs/deploymentsGetDeploymentFileContents.d.ts.map +1 -1
  28. package/esm/funcs/deploymentsGetDeploymentFileContents.js +4 -3
  29. package/esm/funcs/deploymentsGetDeploymentFileContents.js.map +1 -1
  30. package/esm/funcs/marketplaceExchangeSsoToken.d.ts +1 -1
  31. package/esm/funcs/marketplaceExchangeSsoToken.js +1 -1
  32. package/esm/funcs/projectsRemoveProjectDomain.js +3 -2
  33. package/esm/funcs/projectsRemoveProjectDomain.js.map +1 -1
  34. package/esm/funcs/projectsRequestPromote.js +0 -1
  35. package/esm/funcs/projectsRequestPromote.js.map +1 -1
  36. package/esm/lib/config.d.ts +3 -3
  37. package/esm/lib/config.js +3 -3
  38. package/esm/mcp-server/cli/start/impl.js +2 -2
  39. package/esm/mcp-server/cli/start/impl.js.map +1 -1
  40. package/esm/mcp-server/mcp-server.js +1 -1
  41. package/esm/mcp-server/server.js +1 -1
  42. package/esm/mcp-server/tools/authenticationExchangeSsoToken.js +1 -1
  43. package/esm/mcp-server/tools/authenticationExchangeSsoToken.js.map +1 -1
  44. package/esm/mcp-server/tools/deploymentsGetDeploymentFileContents.d.ts.map +1 -1
  45. package/esm/mcp-server/tools/deploymentsGetDeploymentFileContents.js +1 -2
  46. package/esm/mcp-server/tools/deploymentsGetDeploymentFileContents.js.map +1 -1
  47. package/esm/mcp-server/tools/marketplaceExchangeSsoToken.js +1 -1
  48. package/esm/mcp-server/tools/marketplaceExchangeSsoToken.js.map +1 -1
  49. package/esm/models/canceldeploymentop.d.ts +10 -0
  50. package/esm/models/canceldeploymentop.d.ts.map +1 -1
  51. package/esm/models/canceldeploymentop.js +4 -0
  52. package/esm/models/canceldeploymentop.js.map +1 -1
  53. package/esm/models/createdeploymentop.d.ts +38 -28
  54. package/esm/models/createdeploymentop.d.ts.map +1 -1
  55. package/esm/models/createdeploymentop.js +16 -12
  56. package/esm/models/createdeploymentop.js.map +1 -1
  57. package/esm/models/createprojectop.d.ts +114 -2
  58. package/esm/models/createprojectop.d.ts.map +1 -1
  59. package/esm/models/createprojectop.js +108 -2
  60. package/esm/models/createprojectop.js.map +1 -1
  61. package/esm/models/getdeploymentfilecontentsop.d.ts +0 -31
  62. package/esm/models/getdeploymentfilecontentsop.d.ts.map +1 -1
  63. package/esm/models/getdeploymentfilecontentsop.js +0 -25
  64. package/esm/models/getdeploymentfilecontentsop.js.map +1 -1
  65. package/esm/models/getdeploymentop.d.ts +10 -0
  66. package/esm/models/getdeploymentop.d.ts.map +1 -1
  67. package/esm/models/getdeploymentop.js +4 -0
  68. package/esm/models/getdeploymentop.js.map +1 -1
  69. package/esm/models/getprojectsop.d.ts +114 -2
  70. package/esm/models/getprojectsop.d.ts.map +1 -1
  71. package/esm/models/getprojectsop.js +108 -2
  72. package/esm/models/getprojectsop.js.map +1 -1
  73. package/esm/models/importresourceop.d.ts +9 -0
  74. package/esm/models/importresourceop.d.ts.map +1 -1
  75. package/esm/models/importresourceop.js +2 -0
  76. package/esm/models/importresourceop.js.map +1 -1
  77. package/esm/models/issuecertop.d.ts +2 -2
  78. package/esm/models/issuecertop.d.ts.map +1 -1
  79. package/esm/models/issuecertop.js +2 -2
  80. package/esm/models/issuecertop.js.map +1 -1
  81. package/esm/models/removeprojectdomainop.d.ts +30 -0
  82. package/esm/models/removeprojectdomainop.d.ts.map +1 -1
  83. package/esm/models/removeprojectdomainop.js +38 -0
  84. package/esm/models/removeprojectdomainop.js.map +1 -1
  85. package/esm/models/requestpromoteop.d.ts +0 -5
  86. package/esm/models/requestpromoteop.d.ts.map +1 -1
  87. package/esm/models/requestpromoteop.js +0 -2
  88. package/esm/models/requestpromoteop.js.map +1 -1
  89. package/esm/models/teamlimited.d.ts +13 -13
  90. package/esm/models/teamlimited.d.ts.map +1 -1
  91. package/esm/models/teamlimited.js +6 -6
  92. package/esm/models/teamlimited.js.map +1 -1
  93. package/esm/models/updateprojectdatacacheop.d.ts +114 -2
  94. package/esm/models/updateprojectdatacacheop.d.ts.map +1 -1
  95. package/esm/models/updateprojectdatacacheop.js +108 -2
  96. package/esm/models/updateprojectdatacacheop.js.map +1 -1
  97. package/esm/models/updateprojectop.d.ts +114 -2
  98. package/esm/models/updateprojectop.d.ts.map +1 -1
  99. package/esm/models/updateprojectop.js +108 -2
  100. package/esm/models/updateprojectop.js.map +1 -1
  101. package/esm/models/updateresourcesecretsbyidop.d.ts +9 -0
  102. package/esm/models/updateresourcesecretsbyidop.d.ts.map +1 -1
  103. package/esm/models/updateresourcesecretsbyidop.js +2 -0
  104. package/esm/models/updateresourcesecretsbyidop.js.map +1 -1
  105. package/esm/models/updateresourcesecretsop.d.ts +9 -0
  106. package/esm/models/updateresourcesecretsop.d.ts.map +1 -1
  107. package/esm/models/updateresourcesecretsop.js +2 -0
  108. package/esm/models/updateresourcesecretsop.js.map +1 -1
  109. package/esm/models/uploadcertop.d.ts +2 -2
  110. package/esm/models/uploadcertop.d.ts.map +1 -1
  111. package/esm/models/uploadcertop.js +2 -2
  112. package/esm/models/uploadcertop.js.map +1 -1
  113. package/esm/models/userevent.d.ts +368 -257
  114. package/esm/models/userevent.d.ts.map +1 -1
  115. package/esm/models/userevent.js +423 -315
  116. package/esm/models/userevent.js.map +1 -1
  117. package/esm/sdk/authentication.d.ts +1 -1
  118. package/esm/sdk/authentication.js +1 -1
  119. package/esm/sdk/deployments.d.ts +2 -2
  120. package/esm/sdk/deployments.d.ts.map +1 -1
  121. package/esm/sdk/deployments.js.map +1 -1
  122. package/esm/sdk/marketplace.d.ts +1 -1
  123. package/esm/sdk/marketplace.js +1 -1
  124. package/jsr.json +1 -1
  125. package/package.json +1 -1
  126. package/src/__tests__/deployments.test.ts +1 -2
  127. package/src/__tests__/projects.test.ts +13 -15
  128. package/src/funcs/authenticationExchangeSsoToken.ts +1 -1
  129. package/src/funcs/certsGetCertById.ts +1 -1
  130. package/src/funcs/certsIssueCert.ts +1 -1
  131. package/src/funcs/certsRemoveCert.ts +1 -1
  132. package/src/funcs/certsUploadCert.ts +1 -1
  133. package/src/funcs/deploymentsGetDeploymentFileContents.ts +6 -7
  134. package/src/funcs/marketplaceExchangeSsoToken.ts +1 -1
  135. package/src/funcs/projectsRemoveProjectDomain.ts +3 -2
  136. package/src/funcs/projectsRequestPromote.ts +0 -1
  137. package/src/lib/config.ts +3 -3
  138. package/src/mcp-server/cli/start/impl.ts +2 -2
  139. package/src/mcp-server/mcp-server.ts +1 -1
  140. package/src/mcp-server/server.ts +1 -1
  141. package/src/mcp-server/tools/authenticationExchangeSsoToken.ts +1 -1
  142. package/src/mcp-server/tools/deploymentsGetDeploymentFileContents.ts +1 -3
  143. package/src/mcp-server/tools/marketplaceExchangeSsoToken.ts +1 -1
  144. package/src/models/canceldeploymentop.ts +14 -0
  145. package/src/models/createdeploymentop.ts +30 -16
  146. package/src/models/createprojectop.ts +243 -4
  147. package/src/models/getdeploymentfilecontentsop.ts +0 -69
  148. package/src/models/getdeploymentop.ts +14 -0
  149. package/src/models/getprojectsop.ts +237 -4
  150. package/src/models/importresourceop.ts +7 -0
  151. package/src/models/issuecertop.ts +4 -4
  152. package/src/models/removeprojectdomainop.ts +78 -0
  153. package/src/models/requestpromoteop.ts +0 -7
  154. package/src/models/teamlimited.ts +13 -13
  155. package/src/models/updateprojectdatacacheop.ts +260 -4
  156. package/src/models/updateprojectop.ts +243 -4
  157. package/src/models/updateresourcesecretsbyidop.ts +7 -0
  158. package/src/models/updateresourcesecretsop.ts +7 -0
  159. package/src/models/uploadcertop.ts +4 -4
  160. package/src/models/userevent.ts +798 -582
  161. package/src/sdk/authentication.ts +1 -1
  162. package/src/sdk/deployments.ts +2 -5
  163. package/src/sdk/marketplace.ts +1 -1
  164. package/vercel-spec.json +497 -94
@@ -9,7 +9,7 @@ export declare class Authentication extends ClientSDK {
9
9
  * SSO Token Exchange
10
10
  *
11
11
  * @remarks
12
- * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. This is used to verify the identity of the user during the [**Open in Provider** flow](https://vercel.com/docs/integrations/marketplace-flows#open-in-provider-button-flow). Providers should not persist the returned `id_token` in a database since the token will expire.
12
+ * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
13
13
  */
14
14
  exchangeSsoToken(request: ExchangeSsoTokenRequestBody, options?: RequestOptions): Promise<ExchangeSsoTokenResponseBody>;
15
15
  /**
@@ -13,7 +13,7 @@ export class Authentication extends ClientSDK {
13
13
  * SSO Token Exchange
14
14
  *
15
15
  * @remarks
16
- * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. This is used to verify the identity of the user during the [**Open in Provider** flow](https://vercel.com/docs/integrations/marketplace-flows#open-in-provider-button-flow). Providers should not persist the returned `id_token` in a database since the token will expire.
16
+ * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
17
17
  */
18
18
  async exchangeSsoToken(request, options) {
19
19
  return unwrapAsync(authenticationExchangeSsoToken(this, request, options));
@@ -5,7 +5,7 @@ import { CreateDeploymentRequest, CreateDeploymentResponseBody } from "../models
5
5
  import { DeleteDeploymentRequest, DeleteDeploymentResponseBody } from "../models/deletedeploymentop.js";
6
6
  import { FileTree } from "../models/filetree.js";
7
7
  import { GetDeploymentEventsRequest, GetDeploymentEventsResponse } from "../models/getdeploymenteventsop.js";
8
- import { GetDeploymentFileContentsRequest, GetDeploymentFileContentsResponseBody } from "../models/getdeploymentfilecontentsop.js";
8
+ import { GetDeploymentFileContentsRequest } from "../models/getdeploymentfilecontentsop.js";
9
9
  import { GetDeploymentRequest, GetDeploymentResponseBody } from "../models/getdeploymentop.js";
10
10
  import { GetDeploymentsRequest, GetDeploymentsResponseBody } from "../models/getdeploymentsop.js";
11
11
  import { ListDeploymentFilesRequest } from "../models/listdeploymentfilesop.js";
@@ -70,7 +70,7 @@ export declare class Deployments extends ClientSDK {
70
70
  * @remarks
71
71
  * Allows to retrieve the content of a file by supplying the file identifier and the deployment unique identifier. The response body will contain a JSON response containing the contents of the file encoded as base64.
72
72
  */
73
- getDeploymentFileContents(request: GetDeploymentFileContentsRequest, options?: RequestOptions): Promise<GetDeploymentFileContentsResponseBody>;
73
+ getDeploymentFileContents(request: GetDeploymentFileContentsRequest, options?: RequestOptions): Promise<void>;
74
74
  /**
75
75
  * List deployments
76
76
  *
@@ -1 +1 @@
1
- {"version":3,"file":"deployments.d.ts","sourceRoot":"","sources":["../../src/sdk/deployments.ts"],"names":[],"mappings":"AAQA,OAAO,EAEL,6BAA6B,EAC9B,MAAM,4CAA4C,CAAC;AAMpD,OAAO,EAAE,SAAS,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAC3D,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACjD,OAAO,EACL,0BAA0B,EAC1B,2BAA2B,EAC5B,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EACL,gCAAgC,EAChC,qCAAqC,EACtC,MAAM,0CAA0C,CAAC;AAClD,OAAO,EACL,oBAAoB,EACpB,yBAAyB,EAC1B,MAAM,8BAA8B,CAAC;AACtC,OAAO,EACL,qBAAqB,EACrB,0BAA0B,EAC3B,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,0BAA0B,EAAE,MAAM,oCAAoC,CAAC;AAChF,OAAO,EAAE,wCAAwC,EAAE,MAAM,kDAAkD,CAAC;AAC5G,OAAO,EACL,iBAAiB,EACjB,sBAAsB,EACvB,MAAM,2BAA2B,CAAC;AAGnC,OAAO,EAAE,6BAA6B,EAAE,MAAM,4CAA4C,CAAC;AAE3F,qBAAa,WAAY,SAAQ,SAAS;IACxC;;;;;OAKG;IACG,mBAAmB,CACvB,OAAO,EAAE,0BAA0B,EACnC,OAAO,CAAC,EAAE,cAAc,GAAG;QACzB,oBAAoB,CAAC,EAAE,6BAA6B,CAAC;KACtD,GACA,OAAO,CAAC,2BAA2B,CAAC;IAQvC;;;;;OAKG;IACG,iCAAiC,CACrC,OAAO,EAAE,wCAAwC,EACjD,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,IAAI,CAAC;IAQhB;;;;;OAKG;IACG,aAAa,CACjB,OAAO,EAAE,oBAAoB,EAC7B,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,yBAAyB,CAAC;IAQrC;;;;;OAKG;IACG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,EAChC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,4BAA4B,CAAC;IAQxC;;;;;OAKG;IACG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,EAChC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,4BAA4B,CAAC;IAQxC;;;;;OAKG;IACG,UAAU,CACd,OAAO,EAAE,iBAAiB,EAC1B,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,sBAAsB,CAAC;IAQlC;;;;;OAKG;IACG,mBAAmB,CACvB,OAAO,EAAE,0BAA0B,EACnC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC;IAQ3B;;;;;OAKG;IACG,yBAAyB,CAC7B,OAAO,EAAE,gCAAgC,EACzC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,qCAAqC,CAAC;IAQjD;;;;;OAKG;IACG,cAAc,CAClB,OAAO,EAAE,qBAAqB,EAC9B,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,0BAA0B,CAAC;IAQtC;;;;;OAKG;IACG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,EAChC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,4BAA4B,CAAC;CAOzC"}
1
+ {"version":3,"file":"deployments.d.ts","sourceRoot":"","sources":["../../src/sdk/deployments.ts"],"names":[],"mappings":"AAQA,OAAO,EAEL,6BAA6B,EAC9B,MAAM,4CAA4C,CAAC;AAMpD,OAAO,EAAE,SAAS,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAC3D,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EACL,uBAAuB,EACvB,4BAA4B,EAC7B,MAAM,iCAAiC,CAAC;AACzC,OAAO,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACjD,OAAO,EACL,0BAA0B,EAC1B,2BAA2B,EAC5B,MAAM,oCAAoC,CAAC;AAC5C,OAAO,EAAE,gCAAgC,EAAE,MAAM,0CAA0C,CAAC;AAC5F,OAAO,EACL,oBAAoB,EACpB,yBAAyB,EAC1B,MAAM,8BAA8B,CAAC;AACtC,OAAO,EACL,qBAAqB,EACrB,0BAA0B,EAC3B,MAAM,+BAA+B,CAAC;AACvC,OAAO,EAAE,0BAA0B,EAAE,MAAM,oCAAoC,CAAC;AAChF,OAAO,EAAE,wCAAwC,EAAE,MAAM,kDAAkD,CAAC;AAC5G,OAAO,EACL,iBAAiB,EACjB,sBAAsB,EACvB,MAAM,2BAA2B,CAAC;AAGnC,OAAO,EAAE,6BAA6B,EAAE,MAAM,4CAA4C,CAAC;AAE3F,qBAAa,WAAY,SAAQ,SAAS;IACxC;;;;;OAKG;IACG,mBAAmB,CACvB,OAAO,EAAE,0BAA0B,EACnC,OAAO,CAAC,EAAE,cAAc,GAAG;QACzB,oBAAoB,CAAC,EAAE,6BAA6B,CAAC;KACtD,GACA,OAAO,CAAC,2BAA2B,CAAC;IAQvC;;;;;OAKG;IACG,iCAAiC,CACrC,OAAO,EAAE,wCAAwC,EACjD,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,IAAI,CAAC;IAQhB;;;;;OAKG;IACG,aAAa,CACjB,OAAO,EAAE,oBAAoB,EAC7B,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,yBAAyB,CAAC;IAQrC;;;;;OAKG;IACG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,EAChC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,4BAA4B,CAAC;IAQxC;;;;;OAKG;IACG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,EAChC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,4BAA4B,CAAC;IAQxC;;;;;OAKG;IACG,UAAU,CACd,OAAO,EAAE,iBAAiB,EAC1B,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,sBAAsB,CAAC;IAQlC;;;;;OAKG;IACG,mBAAmB,CACvB,OAAO,EAAE,0BAA0B,EACnC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC;IAQ3B;;;;;OAKG;IACG,yBAAyB,CAC7B,OAAO,EAAE,gCAAgC,EACzC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,IAAI,CAAC;IAQhB;;;;;OAKG;IACG,cAAc,CAClB,OAAO,EAAE,qBAAqB,EAC9B,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,0BAA0B,CAAC;IAQtC;;;;;OAKG;IACG,gBAAgB,CACpB,OAAO,EAAE,uBAAuB,EAChC,OAAO,CAAC,EAAE,cAAc,GACvB,OAAO,CAAC,4BAA4B,CAAC;CAOzC"}
@@ -1 +1 @@
1
- {"version":3,"file":"deployments.js","sourceRoot":"","sources":["../../src/sdk/deployments.ts"],"names":[],"mappings":"AAAA;;GAEG;AAEH,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,wBAAwB,EAAE,MAAM,sCAAsC,CAAC;AAChF,OAAO,EACL,8BAA8B,GAE/B,MAAM,4CAA4C,CAAC;AACpD,OAAO,EAAE,oCAAoC,EAAE,MAAM,kDAAkD,CAAC;AACxG,OAAO,EAAE,yBAAyB,EAAE,MAAM,uCAAuC,CAAC;AAClF,OAAO,EAAE,8BAA8B,EAAE,MAAM,4CAA4C,CAAC;AAC5F,OAAO,EAAE,4CAA4C,EAAE,MAAM,0DAA0D,CAAC;AACxH,OAAO,EAAE,qBAAqB,EAAE,MAAM,mCAAmC,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAkB,MAAM,gBAAgB,CAAC;AAoC3D,OAAO,EAAE,WAAW,EAAE,MAAM,gBAAgB,CAAC;AAE7C,OAAO,EAAE,6BAA6B,EAAE,MAAM,4CAA4C,CAAC;AAE3F,MAAM,OAAO,WAAY,SAAQ,SAAS;IACxC;;;;;OAKG;IACH,KAAK,CAAC,mBAAmB,CACvB,OAAmC,EACnC,OAEC;QAED,OAAO,WAAW,CAAC,8BAA8B,CAC/C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,iCAAiC,CACrC,OAAiD,EACjD,OAAwB;QAExB,OAAO,WAAW,CAAC,4CAA4C,CAC7D,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,aAAa,CACjB,OAA6B,EAC7B,OAAwB;QAExB,OAAO,WAAW,CAAC,wBAAwB,CACzC,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,gBAAgB,CACpB,OAAgC,EAChC,OAAwB;QAExB,OAAO,WAAW,CAAC,2BAA2B,CAC5C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,gBAAgB,CACpB,OAAgC,EAChC,OAAwB;QAExB,OAAO,WAAW,CAAC,2BAA2B,CAC5C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,UAAU,CACd,OAA0B,EAC1B,OAAwB;QAExB,OAAO,WAAW,CAAC,qBAAqB,CACtC,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,mBAAmB,CACvB,OAAmC,EACnC,OAAwB;QAExB,OAAO,WAAW,CAAC,8BAA8B,CAC/C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,yBAAyB,CAC7B,OAAyC,EACzC,OAAwB;QAExB,OAAO,WAAW,CAAC,oCAAoC,CACrD,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,OAAwB;QAExB,OAAO,WAAW,CAAC,yBAAyB,CAC1C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,gBAAgB,CACpB,OAAgC,EAChC,OAAwB;QAExB,OAAO,WAAW,CAAC,2BAA2B,CAC5C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;CACF"}
1
+ {"version":3,"file":"deployments.js","sourceRoot":"","sources":["../../src/sdk/deployments.ts"],"names":[],"mappings":"AAAA;;GAEG;AAEH,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,2BAA2B,EAAE,MAAM,yCAAyC,CAAC;AACtF,OAAO,EAAE,wBAAwB,EAAE,MAAM,sCAAsC,CAAC;AAChF,OAAO,EACL,8BAA8B,GAE/B,MAAM,4CAA4C,CAAC;AACpD,OAAO,EAAE,oCAAoC,EAAE,MAAM,kDAAkD,CAAC;AACxG,OAAO,EAAE,yBAAyB,EAAE,MAAM,uCAAuC,CAAC;AAClF,OAAO,EAAE,8BAA8B,EAAE,MAAM,4CAA4C,CAAC;AAC5F,OAAO,EAAE,4CAA4C,EAAE,MAAM,0DAA0D,CAAC;AACxH,OAAO,EAAE,qBAAqB,EAAE,MAAM,mCAAmC,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAkB,MAAM,gBAAgB,CAAC;AAiC3D,OAAO,EAAE,WAAW,EAAE,MAAM,gBAAgB,CAAC;AAE7C,OAAO,EAAE,6BAA6B,EAAE,MAAM,4CAA4C,CAAC;AAE3F,MAAM,OAAO,WAAY,SAAQ,SAAS;IACxC;;;;;OAKG;IACH,KAAK,CAAC,mBAAmB,CACvB,OAAmC,EACnC,OAEC;QAED,OAAO,WAAW,CAAC,8BAA8B,CAC/C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,iCAAiC,CACrC,OAAiD,EACjD,OAAwB;QAExB,OAAO,WAAW,CAAC,4CAA4C,CAC7D,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,aAAa,CACjB,OAA6B,EAC7B,OAAwB;QAExB,OAAO,WAAW,CAAC,wBAAwB,CACzC,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,gBAAgB,CACpB,OAAgC,EAChC,OAAwB;QAExB,OAAO,WAAW,CAAC,2BAA2B,CAC5C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,gBAAgB,CACpB,OAAgC,EAChC,OAAwB;QAExB,OAAO,WAAW,CAAC,2BAA2B,CAC5C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,UAAU,CACd,OAA0B,EAC1B,OAAwB;QAExB,OAAO,WAAW,CAAC,qBAAqB,CACtC,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,mBAAmB,CACvB,OAAmC,EACnC,OAAwB;QAExB,OAAO,WAAW,CAAC,8BAA8B,CAC/C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,yBAAyB,CAC7B,OAAyC,EACzC,OAAwB;QAExB,OAAO,WAAW,CAAC,oCAAoC,CACrD,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,OAAwB;QAExB,OAAO,WAAW,CAAC,yBAAyB,CAC1C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACH,KAAK,CAAC,gBAAgB,CACpB,OAAgC,EAChC,OAAwB;QAExB,OAAO,WAAW,CAAC,2BAA2B,CAC5C,IAAI,EACJ,OAAO,EACP,OAAO,CACR,CAAC,CAAC;IACL,CAAC;CACF"}
@@ -98,7 +98,7 @@ export declare class Marketplace extends ClientSDK {
98
98
  * SSO Token Exchange
99
99
  *
100
100
  * @remarks
101
- * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. This is used to verify the identity of the user during the [**Open in Provider** flow](https://vercel.com/docs/integrations/marketplace-flows#open-in-provider-button-flow). Providers should not persist the returned `id_token` in a database since the token will expire.
101
+ * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
102
102
  */
103
103
  exchangeSsoToken(request: ExchangeSsoTokenRequestBody, options?: RequestOptions): Promise<ExchangeSsoTokenResponseBody>;
104
104
  /**
@@ -124,7 +124,7 @@ export class Marketplace extends ClientSDK {
124
124
  * SSO Token Exchange
125
125
  *
126
126
  * @remarks
127
- * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. This is used to verify the identity of the user during the [**Open in Provider** flow](https://vercel.com/docs/integrations/marketplace-flows#open-in-provider-button-flow). Providers should not persist the returned `id_token` in a database since the token will expire.
127
+ * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
128
128
  */
129
129
  async exchangeSsoToken(request, options) {
130
130
  return unwrapAsync(marketplaceExchangeSsoToken(this, request, options));
package/jsr.json CHANGED
@@ -2,7 +2,7 @@
2
2
 
3
3
  {
4
4
  "name": "@vercel/sdk",
5
- "version": "1.7.4",
5
+ "version": "1.7.5",
6
6
  "exports": {
7
7
  ".": "./src/index.ts",
8
8
  "./models": "./src/models/index.ts",
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@vercel/sdk",
3
- "version": "1.7.4",
3
+ "version": "1.7.5",
4
4
  "author": "Speakeasy",
5
5
  "type": "module",
6
6
  "bin": {
@@ -179,13 +179,12 @@ test("Deployments Get Deployment File Contents", async () => {
179
179
  bearerToken: "<YOUR_BEARER_TOKEN_HERE>",
180
180
  });
181
181
 
182
- const result = await vercel.deployments.getDeploymentFileContents({
182
+ await vercel.deployments.getDeploymentFileContents({
183
183
  id: "<id>",
184
184
  fileId: "<id>",
185
185
  teamId: "team_1a2b3c4d5e6f7g8h9i0j1k2l",
186
186
  slug: "my-team-url-slug",
187
187
  });
188
- expect(result).toBeDefined();
189
188
  });
190
189
 
191
190
  test("Deployments Get Deployments", async () => {
@@ -253,21 +253,19 @@ test("Projects Create Project Env", async () => {
253
253
  upsert: "true",
254
254
  teamId: "team_1a2b3c4d5e6f7g8h9i0j1k2l",
255
255
  slug: "my-team-url-slug",
256
- requestBody: [
257
- {
258
- key: "API_URL",
259
- value: "https://api.vercel.com",
260
- type: "plain",
261
- target: [
262
- "preview",
263
- ],
264
- gitBranch: "feature-1",
265
- comment: "database connection string for production",
266
- customEnvironmentIds: [
267
- "env_1234567890",
268
- ],
269
- },
270
- ],
256
+ requestBody: {
257
+ key: "API_URL",
258
+ value: "https://api.vercel.com",
259
+ type: "plain",
260
+ target: [
261
+ "preview",
262
+ ],
263
+ gitBranch: "feature-1",
264
+ comment: "database connection string for production",
265
+ customEnvironmentIds: [
266
+ "env_1234567890",
267
+ ],
268
+ },
271
269
  });
272
270
  expect(result).toBeDefined();
273
271
  });
@@ -39,7 +39,7 @@ import { Result } from "../types/fp.js";
39
39
  * SSO Token Exchange
40
40
  *
41
41
  * @remarks
42
- * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. This is used to verify the identity of the user during the [**Open in Provider** flow](https://vercel.com/docs/integrations/marketplace-flows#open-in-provider-button-flow). Providers should not persist the returned `id_token` in a database since the token will expire.
42
+ * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
43
43
  */
44
44
  export function authenticationExchangeSsoToken(
45
45
  client: VercelCore,
@@ -112,7 +112,7 @@ async function $do(
112
112
  }),
113
113
  };
114
114
 
115
- const path = pathToFunc("/v7/certs/{id}")(pathParams);
115
+ const path = pathToFunc("/v8/certs/{id}")(pathParams);
116
116
 
117
117
  const query = encodeFormQuery({
118
118
  "slug": payload.slug,
@@ -105,7 +105,7 @@ async function $do(
105
105
  const payload = parsed.value;
106
106
  const body = encodeJSON("body", payload.RequestBody, { explode: true });
107
107
 
108
- const path = pathToFunc("/v7/certs")();
108
+ const path = pathToFunc("/v8/certs")();
109
109
 
110
110
  const query = encodeFormQuery({
111
111
  "slug": payload.slug,
@@ -112,7 +112,7 @@ async function $do(
112
112
  }),
113
113
  };
114
114
 
115
- const path = pathToFunc("/v7/certs/{id}")(pathParams);
115
+ const path = pathToFunc("/v8/certs/{id}")(pathParams);
116
116
 
117
117
  const query = encodeFormQuery({
118
118
  "slug": payload.slug,
@@ -99,7 +99,7 @@ async function $do(
99
99
  const payload = parsed.value;
100
100
  const body = encodeJSON("body", payload.RequestBody, { explode: true });
101
101
 
102
- const path = pathToFunc("/v7/certs")();
102
+ const path = pathToFunc("/v8/certs")();
103
103
 
104
104
  const query = encodeFormQuery({
105
105
  "slug": payload.slug,
@@ -2,6 +2,7 @@
2
2
  * Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.
3
3
  */
4
4
 
5
+ import * as z from "zod";
5
6
  import { VercelCore } from "../core.js";
6
7
  import { encodeFormQuery, encodeSimple } from "../lib/encodings.js";
7
8
  import * as M from "../lib/matchers.js";
@@ -13,8 +14,6 @@ import { pathToFunc } from "../lib/url.js";
13
14
  import {
14
15
  GetDeploymentFileContentsRequest,
15
16
  GetDeploymentFileContentsRequest$outboundSchema,
16
- GetDeploymentFileContentsResponseBody,
17
- GetDeploymentFileContentsResponseBody$inboundSchema,
18
17
  } from "../models/getdeploymentfilecontentsop.js";
19
18
  import {
20
19
  ConnectionError,
@@ -52,7 +51,7 @@ export function deploymentsGetDeploymentFileContents(
52
51
  options?: RequestOptions,
53
52
  ): APIPromise<
54
53
  Result<
55
- GetDeploymentFileContentsResponseBody,
54
+ void,
56
55
  | VercelBadRequestError
57
56
  | VercelForbiddenError
58
57
  | VercelNotFoundError
@@ -79,7 +78,7 @@ async function $do(
79
78
  ): Promise<
80
79
  [
81
80
  Result<
82
- GetDeploymentFileContentsResponseBody,
81
+ void,
83
82
  | VercelBadRequestError
84
83
  | VercelForbiddenError
85
84
  | VercelNotFoundError
@@ -116,7 +115,7 @@ async function $do(
116
115
  }),
117
116
  };
118
117
 
119
- const path = pathToFunc("/v7/deployments/{id}/files/{fileId}")(pathParams);
118
+ const path = pathToFunc("/v8/deployments/{id}/files/{fileId}")(pathParams);
120
119
 
121
120
  const query = encodeFormQuery({
122
121
  "path": payload.path,
@@ -177,7 +176,7 @@ async function $do(
177
176
  };
178
177
 
179
178
  const [result] = await M.match<
180
- GetDeploymentFileContentsResponseBody,
179
+ void,
181
180
  | VercelBadRequestError
182
181
  | VercelForbiddenError
183
182
  | VercelNotFoundError
@@ -189,10 +188,10 @@ async function $do(
189
188
  | RequestTimeoutError
190
189
  | ConnectionError
191
190
  >(
192
- M.json(200, GetDeploymentFileContentsResponseBody$inboundSchema),
193
191
  M.jsonErr(400, VercelBadRequestError$inboundSchema),
194
192
  M.jsonErr(401, VercelForbiddenError$inboundSchema),
195
193
  M.jsonErr(404, VercelNotFoundError$inboundSchema),
194
+ M.nil("2XX", z.void()),
196
195
  M.fail([403, 410, "4XX"]),
197
196
  M.fail("5XX"),
198
197
  )(response, { extraFields: responseFields });
@@ -39,7 +39,7 @@ import { Result } from "../types/fp.js";
39
39
  * SSO Token Exchange
40
40
  *
41
41
  * @remarks
42
- * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. This is used to verify the identity of the user during the [**Open in Provider** flow](https://vercel.com/docs/integrations/marketplace-flows#open-in-provider-button-flow). Providers should not persist the returned `id_token` in a database since the token will expire.
42
+ * During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization `code` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned `id_token` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.
43
43
  */
44
44
  export function marketplaceExchangeSsoToken(
45
45
  client: VercelCore,
@@ -3,7 +3,7 @@
3
3
  */
4
4
 
5
5
  import { VercelCore } from "../core.js";
6
- import { encodeFormQuery, encodeSimple } from "../lib/encodings.js";
6
+ import { encodeFormQuery, encodeJSON, encodeSimple } from "../lib/encodings.js";
7
7
  import * as M from "../lib/matchers.js";
8
8
  import { compactMap } from "../lib/primitives.js";
9
9
  import { safeParse } from "../lib/schemas.js";
@@ -103,7 +103,7 @@ async function $do(
103
103
  return [parsed, { status: "invalid" }];
104
104
  }
105
105
  const payload = parsed.value;
106
- const body = null;
106
+ const body = encodeJSON("body", payload.RequestBody, { explode: true });
107
107
 
108
108
  const pathParams = {
109
109
  domain: encodeSimple("domain", payload.domain, {
@@ -126,6 +126,7 @@ async function $do(
126
126
  });
127
127
 
128
128
  const headers = new Headers(compactMap({
129
+ "Content-Type": "application/json",
129
130
  Accept: "application/json",
130
131
  }));
131
132
 
@@ -114,7 +114,6 @@ async function $do(
114
114
  );
115
115
 
116
116
  const query = encodeFormQuery({
117
- "dangerouslyForcePromoteCanary": payload.dangerouslyForcePromoteCanary,
118
117
  "slug": payload.slug,
119
118
  "teamId": payload.teamId,
120
119
  });
package/src/lib/config.ts CHANGED
@@ -57,7 +57,7 @@ export function serverURLFromOptions(options: SDKOptions): URL | null {
57
57
  export const SDK_METADATA = {
58
58
  language: "typescript",
59
59
  openapiDocVersion: "0.0.1",
60
- sdkVersion: "1.7.4",
61
- genVersion: "2.599.0",
62
- userAgent: "speakeasy-sdk/typescript 1.7.4 2.599.0 0.0.1 @vercel/sdk",
60
+ sdkVersion: "1.7.5",
61
+ genVersion: "2.605.6",
62
+ userAgent: "speakeasy-sdk/typescript 1.7.5 2.605.6 0.0.1 @vercel/sdk",
63
63
  } as const;
@@ -50,7 +50,7 @@ async function startStdio(flags: StartCommandFlags) {
50
50
  logger,
51
51
  allowedTools: flags.tool,
52
52
  scopes: flags.scope,
53
- ...{ bearerToken: flags["bearer-token"] },
53
+ ...{ bearerToken: flags["bearer-token"] ?? "" },
54
54
  serverURL: flags["server-url"],
55
55
  serverIdx: flags["server-index"],
56
56
  });
@@ -71,7 +71,7 @@ async function startSSE(flags: StartCommandFlags) {
71
71
  logger,
72
72
  allowedTools: flags.tool,
73
73
  scopes: flags.scope,
74
- ...{ bearerToken: flags["bearer-token"] },
74
+ ...{ bearerToken: flags["bearer-token"] ?? "" },
75
75
  serverURL: flags["server-url"],
76
76
  serverIdx: flags["server-index"],
77
77
  });
@@ -19,7 +19,7 @@ const routes = buildRouteMap({
19
19
  export const app = buildApplication(routes, {
20
20
  name: "mcp",
21
21
  versionInfo: {
22
- currentVersion: "1.7.4",
22
+ currentVersion: "1.7.5",
23
23
  },
24
24
  });
25
25
 
@@ -191,7 +191,7 @@ export function createMCPServer(deps: {
191
191
  }) {
192
192
  const server = new McpServer({
193
193
  name: "Vercel",
194
- version: "1.7.4",
194
+ version: "1.7.5",
195
195
  });
196
196
 
197
197
  const client = new VercelCore({
@@ -15,7 +15,7 @@ export const tool$authenticationExchangeSsoToken: ToolDefinition<typeof args> =
15
15
  name: "authentication-exchange-sso-token",
16
16
  description: `SSO Token Exchange
17
17
 
18
- During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization \`code\` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. This is used to verify the identity of the user during the [**Open in Provider** flow](https://vercel.com/docs/integrations/marketplace-flows#open-in-provider-button-flow). Providers should not persist the returned \`id_token\` in a database since the token will expire.`,
18
+ During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization \`code\` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned \`id_token\` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.`,
19
19
  args,
20
20
  tool: async (client, args, ctx) => {
21
21
  const [result, apiCall] = await authenticationExchangeSsoToken(
@@ -32,8 +32,6 @@ Allows to retrieve the content of a file by supplying the file identifier and th
32
32
  };
33
33
  }
34
34
 
35
- const value = result.value;
36
-
37
- return formatResult(value, apiCall);
35
+ return formatResult(void 0, apiCall);
38
36
  },
39
37
  };
@@ -14,7 +14,7 @@ export const tool$marketplaceExchangeSsoToken: ToolDefinition<typeof args> = {
14
14
  name: "marketplace-exchange-sso-token",
15
15
  description: `SSO Token Exchange
16
16
 
17
- During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization \`code\` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. This is used to verify the identity of the user during the [**Open in Provider** flow](https://vercel.com/docs/integrations/marketplace-flows#open-in-provider-button-flow). Providers should not persist the returned \`id_token\` in a database since the token will expire.`,
17
+ During the autorization process, Vercel sends the user to the provider [redirectLoginUrl](https://vercel.com/docs/integrations/create-integration/submit-integration#redirect-login-url), that includes the OAuth authorization \`code\` parameter. The provider then calls the SSO Token Exchange endpoint with the sent code and receives the OIDC token. They log the user in based on this token and redirects the user back to the Vercel account using deep-link parameters included the redirectLoginUrl. Providers should not persist the returned \`id_token\` in a database since the token will expire. See [**Authentication with SSO**](https://vercel.com/docs/integrations/create-integration/marketplace-api#authentication-with-sso) for more details.`,
18
18
  args,
19
19
  tool: async (client, args, ctx) => {
20
20
  const [result, apiCall] = await marketplaceExchangeSsoToken(
@@ -1014,6 +1014,10 @@ export type CancelDeploymentMicrofrontends2 = {
1014
1014
  */
1015
1015
  applications?: { [k: string]: MicrofrontendsApplications } | undefined;
1016
1016
  isDefaultApp: boolean;
1017
+ /**
1018
+ * The project name of the default app of this deployment's microfrontends group.
1019
+ */
1020
+ defaultAppProjectName: string;
1017
1021
  /**
1018
1022
  * A path that is used to take screenshots and as the default path in preview links when a domain for this microfrontend is shown in the UI.
1019
1023
  */
@@ -1029,6 +1033,10 @@ export type CancelDeploymentMicrofrontends1 = {
1029
1033
  * Whether this project is the default application for the microfrontends group. The default application is the one that is used as the top level shell for the microfrontends group and hosts the other microfrontends.
1030
1034
  */
1031
1035
  isDefaultApp?: boolean | undefined;
1036
+ /**
1037
+ * The project name of the default app of this deployment's microfrontends group.
1038
+ */
1039
+ defaultAppProjectName: string;
1032
1040
  /**
1033
1041
  * A path that is used to take screenshots and as the default path in preview links when a domain for this microfrontend is shown in the UI.
1034
1042
  */
@@ -6381,6 +6389,7 @@ export const CancelDeploymentMicrofrontends2$inboundSchema: z.ZodType<
6381
6389
  applications: z.record(z.lazy(() => MicrofrontendsApplications$inboundSchema))
6382
6390
  .optional(),
6383
6391
  isDefaultApp: z.boolean(),
6392
+ defaultAppProjectName: z.string(),
6384
6393
  defaultRoute: z.string().optional(),
6385
6394
  groupIds: z.array(z.string()),
6386
6395
  });
@@ -6391,6 +6400,7 @@ export type CancelDeploymentMicrofrontends2$Outbound = {
6391
6400
  | { [k: string]: MicrofrontendsApplications$Outbound }
6392
6401
  | undefined;
6393
6402
  isDefaultApp: boolean;
6403
+ defaultAppProjectName: string;
6394
6404
  defaultRoute?: string | undefined;
6395
6405
  groupIds: Array<string>;
6396
6406
  };
@@ -6405,6 +6415,7 @@ export const CancelDeploymentMicrofrontends2$outboundSchema: z.ZodType<
6405
6415
  z.lazy(() => MicrofrontendsApplications$outboundSchema),
6406
6416
  ).optional(),
6407
6417
  isDefaultApp: z.boolean(),
6418
+ defaultAppProjectName: z.string(),
6408
6419
  defaultRoute: z.string().optional(),
6409
6420
  groupIds: z.array(z.string()),
6410
6421
  });
@@ -6449,6 +6460,7 @@ export const CancelDeploymentMicrofrontends1$inboundSchema: z.ZodType<
6449
6460
  unknown
6450
6461
  > = z.object({
6451
6462
  isDefaultApp: z.boolean().optional(),
6463
+ defaultAppProjectName: z.string(),
6452
6464
  defaultRoute: z.string().optional(),
6453
6465
  groupIds: z.array(z.string()),
6454
6466
  });
@@ -6456,6 +6468,7 @@ export const CancelDeploymentMicrofrontends1$inboundSchema: z.ZodType<
6456
6468
  /** @internal */
6457
6469
  export type CancelDeploymentMicrofrontends1$Outbound = {
6458
6470
  isDefaultApp?: boolean | undefined;
6471
+ defaultAppProjectName: string;
6459
6472
  defaultRoute?: string | undefined;
6460
6473
  groupIds: Array<string>;
6461
6474
  };
@@ -6467,6 +6480,7 @@ export const CancelDeploymentMicrofrontends1$outboundSchema: z.ZodType<
6467
6480
  CancelDeploymentMicrofrontends1
6468
6481
  > = z.object({
6469
6482
  isDefaultApp: z.boolean().optional(),
6483
+ defaultAppProjectName: z.string(),
6470
6484
  defaultRoute: z.string().optional(),
6471
6485
  groupIds: z.array(z.string()),
6472
6486
  });