latitudesh-typescript-sdk 0.3.5 → 0.3.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -1
- package/bin/mcp-server.js +979 -684
- package/bin/mcp-server.js.map +15 -10
- package/dist/commonjs/funcs/kubernetesClustersUpdateKubernetesCluster.d.ts +29 -0
- package/dist/commonjs/funcs/kubernetesClustersUpdateKubernetesCluster.d.ts.map +1 -0
- package/dist/commonjs/funcs/kubernetesClustersUpdateKubernetesCluster.js +140 -0
- package/dist/commonjs/funcs/kubernetesClustersUpdateKubernetesCluster.js.map +1 -0
- package/dist/commonjs/lib/config.d.ts +3 -3
- package/dist/commonjs/lib/config.js +3 -3
- package/dist/commonjs/lib/config.js.map +1 -1
- package/dist/commonjs/lib/security.d.ts +1 -1
- package/dist/commonjs/lib/security.d.ts.map +1 -1
- package/dist/commonjs/lib/security.js +19 -8
- package/dist/commonjs/lib/security.js.map +1 -1
- package/dist/commonjs/mcp-server/mcp-server.js +1 -1
- package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/server.js +3 -1
- package/dist/commonjs/mcp-server/server.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.js +75 -0
- package/dist/commonjs/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.js.map +1 -0
- package/dist/commonjs/models/index.d.ts +2 -0
- package/dist/commonjs/models/index.d.ts.map +1 -1
- package/dist/commonjs/models/index.js +2 -0
- package/dist/commonjs/models/index.js.map +1 -1
- package/dist/commonjs/models/kubernetesclusterdata.d.ts +43 -0
- package/dist/commonjs/models/kubernetesclusterdata.d.ts.map +1 -1
- package/dist/commonjs/models/kubernetesclusterdata.js +34 -1
- package/dist/commonjs/models/kubernetesclusterdata.js.map +1 -1
- package/dist/commonjs/models/kubernetesclusterupdateresponse.d.ts +92 -0
- package/dist/commonjs/models/kubernetesclusterupdateresponse.d.ts.map +1 -0
- package/dist/commonjs/models/kubernetesclusterupdateresponse.js +131 -0
- package/dist/commonjs/models/kubernetesclusterupdateresponse.js.map +1 -0
- package/dist/commonjs/models/operations/index.d.ts +1 -0
- package/dist/commonjs/models/operations/index.d.ts.map +1 -1
- package/dist/commonjs/models/operations/index.js +1 -0
- package/dist/commonjs/models/operations/index.js.map +1 -1
- package/dist/commonjs/models/operations/updatekubernetescluster.d.ts +23 -0
- package/dist/commonjs/models/operations/updatekubernetescluster.d.ts.map +1 -0
- package/dist/commonjs/models/operations/updatekubernetescluster.js +72 -0
- package/dist/commonjs/models/operations/updatekubernetescluster.js.map +1 -0
- package/dist/commonjs/models/updatekubernetescluster.d.ts +73 -0
- package/dist/commonjs/models/updatekubernetescluster.d.ts.map +1 -0
- package/dist/commonjs/models/updatekubernetescluster.js +116 -0
- package/dist/commonjs/models/updatekubernetescluster.js.map +1 -0
- package/dist/commonjs/sdk/kubernetesclusters.d.ts +17 -0
- package/dist/commonjs/sdk/kubernetesclusters.d.ts.map +1 -1
- package/dist/commonjs/sdk/kubernetesclusters.js +20 -0
- package/dist/commonjs/sdk/kubernetesclusters.js.map +1 -1
- package/dist/esm/funcs/kubernetesClustersUpdateKubernetesCluster.d.ts +29 -0
- package/dist/esm/funcs/kubernetesClustersUpdateKubernetesCluster.d.ts.map +1 -0
- package/dist/esm/funcs/kubernetesClustersUpdateKubernetesCluster.js +104 -0
- package/dist/esm/funcs/kubernetesClustersUpdateKubernetesCluster.js.map +1 -0
- package/dist/esm/lib/config.d.ts +3 -3
- package/dist/esm/lib/config.js +3 -3
- package/dist/esm/lib/config.js.map +1 -1
- package/dist/esm/lib/security.d.ts +1 -1
- package/dist/esm/lib/security.d.ts.map +1 -1
- package/dist/esm/lib/security.js +19 -8
- package/dist/esm/lib/security.js.map +1 -1
- package/dist/esm/mcp-server/mcp-server.js +1 -1
- package/dist/esm/mcp-server/server.d.ts.map +1 -1
- package/dist/esm/mcp-server/server.js +3 -1
- package/dist/esm/mcp-server/server.js.map +1 -1
- package/dist/esm/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.d.ts +8 -0
- package/dist/esm/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.js +39 -0
- package/dist/esm/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.js.map +1 -0
- package/dist/esm/models/index.d.ts +2 -0
- package/dist/esm/models/index.d.ts.map +1 -1
- package/dist/esm/models/index.js +2 -0
- package/dist/esm/models/index.js.map +1 -1
- package/dist/esm/models/kubernetesclusterdata.d.ts +43 -0
- package/dist/esm/models/kubernetesclusterdata.d.ts.map +1 -1
- package/dist/esm/models/kubernetesclusterdata.js +33 -0
- package/dist/esm/models/kubernetesclusterdata.js.map +1 -1
- package/dist/esm/models/kubernetesclusterupdateresponse.d.ts +92 -0
- package/dist/esm/models/kubernetesclusterupdateresponse.d.ts.map +1 -0
- package/dist/esm/models/kubernetesclusterupdateresponse.js +89 -0
- package/dist/esm/models/kubernetesclusterupdateresponse.js.map +1 -0
- package/dist/esm/models/operations/index.d.ts +1 -0
- package/dist/esm/models/operations/index.d.ts.map +1 -1
- package/dist/esm/models/operations/index.js +1 -0
- package/dist/esm/models/operations/index.js.map +1 -1
- package/dist/esm/models/operations/updatekubernetescluster.d.ts +23 -0
- package/dist/esm/models/operations/updatekubernetescluster.d.ts.map +1 -0
- package/dist/esm/models/operations/updatekubernetescluster.js +34 -0
- package/dist/esm/models/operations/updatekubernetescluster.js.map +1 -0
- package/dist/esm/models/updatekubernetescluster.d.ts +73 -0
- package/dist/esm/models/updatekubernetescluster.d.ts.map +1 -0
- package/dist/esm/models/updatekubernetescluster.js +74 -0
- package/dist/esm/models/updatekubernetescluster.js.map +1 -0
- package/dist/esm/sdk/kubernetesclusters.d.ts +17 -0
- package/dist/esm/sdk/kubernetesclusters.d.ts.map +1 -1
- package/dist/esm/sdk/kubernetesclusters.js +20 -0
- package/dist/esm/sdk/kubernetesclusters.js.map +1 -1
- package/jsr.json +1 -1
- package/package.json +3 -3
- package/src/funcs/kubernetesClustersUpdateKubernetesCluster.ts +199 -0
- package/src/lib/config.ts +3 -3
- package/src/lib/security.ts +14 -2
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +3 -1
- package/src/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.ts +50 -0
- package/src/models/index.ts +2 -0
- package/src/models/kubernetesclusterdata.ts +61 -0
- package/src/models/kubernetesclusterupdateresponse.ts +245 -0
- package/src/models/operations/index.ts +1 -0
- package/src/models/operations/updatekubernetescluster.ts +72 -0
- package/src/models/updatekubernetescluster.ts +198 -0
- package/src/sdk/kubernetesclusters.ts +28 -0
package/bin/mcp-server.js
CHANGED
|
@@ -53149,9 +53149,9 @@ var init_config = __esm(() => {
|
|
|
53149
53149
|
SDK_METADATA = {
|
|
53150
53150
|
language: "typescript",
|
|
53151
53151
|
openapiDocVersion: "2023-06-01",
|
|
53152
|
-
sdkVersion: "0.3.
|
|
53153
|
-
genVersion: "2.
|
|
53154
|
-
userAgent: "speakeasy-sdk/typescript 0.3.
|
|
53152
|
+
sdkVersion: "0.3.6",
|
|
53153
|
+
genVersion: "2.879.1",
|
|
53154
|
+
userAgent: "speakeasy-sdk/typescript 0.3.6 2.879.1 2023-06-01 latitudesh-typescript-sdk"
|
|
53155
53155
|
};
|
|
53156
53156
|
});
|
|
53157
53157
|
|
|
@@ -54605,14 +54605,25 @@ function applyBearer(state, spec) {
|
|
|
54605
54605
|
state.headers[spec.fieldName] = value;
|
|
54606
54606
|
}
|
|
54607
54607
|
}
|
|
54608
|
-
function resolveGlobalSecurity(security) {
|
|
54609
|
-
|
|
54610
|
-
|
|
54611
|
-
|
|
54612
|
-
|
|
54613
|
-
|
|
54614
|
-
|
|
54615
|
-
|
|
54608
|
+
function resolveGlobalSecurity(security, allowedFields) {
|
|
54609
|
+
let inputs = [
|
|
54610
|
+
[
|
|
54611
|
+
{
|
|
54612
|
+
fieldName: "Authorization",
|
|
54613
|
+
type: "apiKey:header",
|
|
54614
|
+
value: security?.bearer ?? env().LATITUDESH_BEARER
|
|
54615
|
+
}
|
|
54616
|
+
]
|
|
54617
|
+
];
|
|
54618
|
+
if (allowedFields) {
|
|
54619
|
+
inputs = allowedFields.map((i) => {
|
|
54620
|
+
if (i < 0 || i >= inputs.length) {
|
|
54621
|
+
throw new RangeError(`invalid allowedFields index ${i}`);
|
|
54622
|
+
}
|
|
54623
|
+
return inputs[i];
|
|
54624
|
+
});
|
|
54625
|
+
}
|
|
54626
|
+
return resolveSecurity(...inputs);
|
|
54616
54627
|
}
|
|
54617
54628
|
async function extractSecurity(sec) {
|
|
54618
54629
|
if (sec == null) {
|
|
@@ -56073,7 +56084,7 @@ var init_ipmisession = __esm(() => {
|
|
|
56073
56084
|
});
|
|
56074
56085
|
|
|
56075
56086
|
// src/models/kubernetesclusterdata.ts
|
|
56076
|
-
var KubernetesClusterDataPhase, KubernetesClusterDataName, KubernetesClusterDataStepStatus, KubernetesClusterDataType, NodeStatus, KubernetesClusterDataPhase$inboundSchema, KubernetesClusterDataPhase$outboundSchema, ControlPlane$inboundSchema, ControlPlane$outboundSchema, Workers$inboundSchema, Workers$outboundSchema, KubernetesClusterDataName$inboundSchema, KubernetesClusterDataName$outboundSchema, KubernetesClusterDataStepStatus$inboundSchema, KubernetesClusterDataStepStatus$outboundSchema, KubernetesClusterDataStep$inboundSchema, KubernetesClusterDataStep$outboundSchema, KubernetesClusterDataType$inboundSchema, KubernetesClusterDataType$outboundSchema, NodeStatus$inboundSchema, NodeStatus$outboundSchema, Node$inboundSchema, Node$outboundSchema, KubernetesClusterDataProject$inboundSchema, KubernetesClusterDataProject$outboundSchema, KubernetesClusterDataAttributes$inboundSchema, KubernetesClusterDataAttributes$outboundSchema, KubernetesClusterData$inboundSchema, KubernetesClusterData$outboundSchema;
|
|
56087
|
+
var KubernetesClusterDataPhase, WorkerStatus, ControlPlaneStatus, KubernetesClusterDataName, KubernetesClusterDataStepStatus, KubernetesClusterDataType, NodeStatus, KubernetesClusterDataPhase$inboundSchema, KubernetesClusterDataPhase$outboundSchema, ControlPlane$inboundSchema, ControlPlane$outboundSchema, Workers$inboundSchema, Workers$outboundSchema, WorkerStatus$inboundSchema, WorkerStatus$outboundSchema, ControlPlaneStatus$inboundSchema, ControlPlaneStatus$outboundSchema, KubernetesClusterDataName$inboundSchema, KubernetesClusterDataName$outboundSchema, KubernetesClusterDataStepStatus$inboundSchema, KubernetesClusterDataStepStatus$outboundSchema, KubernetesClusterDataStep$inboundSchema, KubernetesClusterDataStep$outboundSchema, KubernetesClusterDataType$inboundSchema, KubernetesClusterDataType$outboundSchema, NodeStatus$inboundSchema, NodeStatus$outboundSchema, Node$inboundSchema, Node$outboundSchema, KubernetesClusterDataProject$inboundSchema, KubernetesClusterDataProject$outboundSchema, KubernetesClusterDataAttributes$inboundSchema, KubernetesClusterDataAttributes$outboundSchema, KubernetesClusterData$inboundSchema, KubernetesClusterData$outboundSchema;
|
|
56077
56088
|
var init_kubernetesclusterdata = __esm(() => {
|
|
56078
56089
|
init_v3();
|
|
56079
56090
|
init_primitives();
|
|
@@ -56084,6 +56095,17 @@ var init_kubernetesclusterdata = __esm(() => {
|
|
|
56084
56095
|
Deleting: "Deleting",
|
|
56085
56096
|
Failed: "Failed"
|
|
56086
56097
|
};
|
|
56098
|
+
WorkerStatus = {
|
|
56099
|
+
Idle: "idle",
|
|
56100
|
+
Ready: "ready",
|
|
56101
|
+
Scaling: "scaling",
|
|
56102
|
+
Error: "error"
|
|
56103
|
+
};
|
|
56104
|
+
ControlPlaneStatus = {
|
|
56105
|
+
Ready: "ready",
|
|
56106
|
+
Scaling: "scaling",
|
|
56107
|
+
Error: "error"
|
|
56108
|
+
};
|
|
56087
56109
|
KubernetesClusterDataName = {
|
|
56088
56110
|
Infrastructure: "infrastructure",
|
|
56089
56111
|
ControlPlane: "control_plane",
|
|
@@ -56144,6 +56166,10 @@ var init_kubernetesclusterdata = __esm(() => {
|
|
|
56144
56166
|
availableReplicas: "available_replicas"
|
|
56145
56167
|
});
|
|
56146
56168
|
});
|
|
56169
|
+
WorkerStatus$inboundSchema = nativeEnumType(WorkerStatus);
|
|
56170
|
+
WorkerStatus$outboundSchema = WorkerStatus$inboundSchema;
|
|
56171
|
+
ControlPlaneStatus$inboundSchema = nativeEnumType(ControlPlaneStatus);
|
|
56172
|
+
ControlPlaneStatus$outboundSchema = ControlPlaneStatus$inboundSchema;
|
|
56147
56173
|
KubernetesClusterDataName$inboundSchema = nativeEnumType(KubernetesClusterDataName);
|
|
56148
56174
|
KubernetesClusterDataName$outboundSchema = KubernetesClusterDataName$inboundSchema;
|
|
56149
56175
|
KubernetesClusterDataStepStatus$inboundSchema = nativeEnumType(KubernetesClusterDataStepStatus);
|
|
@@ -56220,6 +56246,8 @@ var init_kubernetesclusterdata = __esm(() => {
|
|
|
56220
56246
|
worker_count: numberType().int().optional(),
|
|
56221
56247
|
control_plane: nullableType(lazyType(() => ControlPlane$inboundSchema)).optional(),
|
|
56222
56248
|
workers: nullableType(lazyType(() => Workers$inboundSchema)).optional(),
|
|
56249
|
+
worker_status: nullableType(WorkerStatus$inboundSchema).optional(),
|
|
56250
|
+
control_plane_status: ControlPlaneStatus$inboundSchema.optional(),
|
|
56223
56251
|
infrastructure_ready: booleanType().optional(),
|
|
56224
56252
|
control_plane_ready: booleanType().optional(),
|
|
56225
56253
|
message: stringType().optional(),
|
|
@@ -56240,6 +56268,8 @@ var init_kubernetesclusterdata = __esm(() => {
|
|
|
56240
56268
|
control_plane_count: "controlPlaneCount",
|
|
56241
56269
|
worker_count: "workerCount",
|
|
56242
56270
|
control_plane: "controlPlane",
|
|
56271
|
+
worker_status: "workerStatus",
|
|
56272
|
+
control_plane_status: "controlPlaneStatus",
|
|
56243
56273
|
infrastructure_ready: "infrastructureReady",
|
|
56244
56274
|
control_plane_ready: "controlPlaneReady",
|
|
56245
56275
|
last_status_change: "lastStatusChange",
|
|
@@ -56263,6 +56293,8 @@ var init_kubernetesclusterdata = __esm(() => {
|
|
|
56263
56293
|
workerCount: numberType().int().optional(),
|
|
56264
56294
|
controlPlane: nullableType(lazyType(() => ControlPlane$outboundSchema)).optional(),
|
|
56265
56295
|
workers: nullableType(lazyType(() => Workers$outboundSchema)).optional(),
|
|
56296
|
+
workerStatus: nullableType(WorkerStatus$outboundSchema).optional(),
|
|
56297
|
+
controlPlaneStatus: ControlPlaneStatus$outboundSchema.optional(),
|
|
56266
56298
|
infrastructureReady: booleanType().optional(),
|
|
56267
56299
|
controlPlaneReady: booleanType().optional(),
|
|
56268
56300
|
message: stringType().optional(),
|
|
@@ -56283,6 +56315,8 @@ var init_kubernetesclusterdata = __esm(() => {
|
|
|
56283
56315
|
controlPlaneCount: "control_plane_count",
|
|
56284
56316
|
workerCount: "worker_count",
|
|
56285
56317
|
controlPlane: "control_plane",
|
|
56318
|
+
workerStatus: "worker_status",
|
|
56319
|
+
controlPlaneStatus: "control_plane_status",
|
|
56286
56320
|
infrastructureReady: "infrastructure_ready",
|
|
56287
56321
|
controlPlaneReady: "control_plane_ready",
|
|
56288
56322
|
lastStatusChange: "last_status_change",
|
|
@@ -56492,6 +56526,62 @@ var init_kubernetesclusters = __esm(() => {
|
|
|
56492
56526
|
});
|
|
56493
56527
|
});
|
|
56494
56528
|
|
|
56529
|
+
// src/models/kubernetesclusterupdateresponse.ts
|
|
56530
|
+
var KubernetesClusterUpdateResponseType, KubernetesClusterUpdateResponseStatus, KubernetesClusterUpdateResponseType$inboundSchema, KubernetesClusterUpdateResponseType$outboundSchema, KubernetesClusterUpdateResponseStatus$inboundSchema, KubernetesClusterUpdateResponseStatus$outboundSchema, KubernetesClusterUpdateResponseAttributes$inboundSchema, KubernetesClusterUpdateResponseAttributes$outboundSchema, KubernetesClusterUpdateResponseData$inboundSchema, KubernetesClusterUpdateResponseData$outboundSchema, KubernetesClusterUpdateResponse$inboundSchema, KubernetesClusterUpdateResponse$outboundSchema;
|
|
56531
|
+
var init_kubernetesclusterupdateresponse = __esm(() => {
|
|
56532
|
+
init_v3();
|
|
56533
|
+
init_primitives();
|
|
56534
|
+
KubernetesClusterUpdateResponseType = {
|
|
56535
|
+
KubernetesClusters: "kubernetes_clusters"
|
|
56536
|
+
};
|
|
56537
|
+
KubernetesClusterUpdateResponseStatus = {
|
|
56538
|
+
Scaling: "scaling",
|
|
56539
|
+
Unchanged: "unchanged"
|
|
56540
|
+
};
|
|
56541
|
+
KubernetesClusterUpdateResponseType$inboundSchema = nativeEnumType(KubernetesClusterUpdateResponseType);
|
|
56542
|
+
KubernetesClusterUpdateResponseType$outboundSchema = KubernetesClusterUpdateResponseType$inboundSchema;
|
|
56543
|
+
KubernetesClusterUpdateResponseStatus$inboundSchema = nativeEnumType(KubernetesClusterUpdateResponseStatus);
|
|
56544
|
+
KubernetesClusterUpdateResponseStatus$outboundSchema = KubernetesClusterUpdateResponseStatus$inboundSchema;
|
|
56545
|
+
KubernetesClusterUpdateResponseAttributes$inboundSchema = objectType({
|
|
56546
|
+
name: stringType().optional(),
|
|
56547
|
+
status: KubernetesClusterUpdateResponseStatus$inboundSchema.optional(),
|
|
56548
|
+
worker_count: nullableType(numberType().int()).optional(),
|
|
56549
|
+
control_plane_count: nullableType(numberType().int()).optional()
|
|
56550
|
+
}).transform((v2) => {
|
|
56551
|
+
return remap(v2, {
|
|
56552
|
+
worker_count: "workerCount",
|
|
56553
|
+
control_plane_count: "controlPlaneCount"
|
|
56554
|
+
});
|
|
56555
|
+
});
|
|
56556
|
+
KubernetesClusterUpdateResponseAttributes$outboundSchema = objectType({
|
|
56557
|
+
name: stringType().optional(),
|
|
56558
|
+
status: KubernetesClusterUpdateResponseStatus$outboundSchema.optional(),
|
|
56559
|
+
workerCount: nullableType(numberType().int()).optional(),
|
|
56560
|
+
controlPlaneCount: nullableType(numberType().int()).optional()
|
|
56561
|
+
}).transform((v2) => {
|
|
56562
|
+
return remap(v2, {
|
|
56563
|
+
workerCount: "worker_count",
|
|
56564
|
+
controlPlaneCount: "control_plane_count"
|
|
56565
|
+
});
|
|
56566
|
+
});
|
|
56567
|
+
KubernetesClusterUpdateResponseData$inboundSchema = objectType({
|
|
56568
|
+
type: KubernetesClusterUpdateResponseType$inboundSchema.optional(),
|
|
56569
|
+
id: stringType().optional(),
|
|
56570
|
+
attributes: lazyType(() => KubernetesClusterUpdateResponseAttributes$inboundSchema).optional()
|
|
56571
|
+
});
|
|
56572
|
+
KubernetesClusterUpdateResponseData$outboundSchema = objectType({
|
|
56573
|
+
type: KubernetesClusterUpdateResponseType$outboundSchema.optional(),
|
|
56574
|
+
id: stringType().optional(),
|
|
56575
|
+
attributes: lazyType(() => KubernetesClusterUpdateResponseAttributes$outboundSchema).optional()
|
|
56576
|
+
});
|
|
56577
|
+
KubernetesClusterUpdateResponse$inboundSchema = objectType({
|
|
56578
|
+
data: lazyType(() => KubernetesClusterUpdateResponseData$inboundSchema).optional()
|
|
56579
|
+
});
|
|
56580
|
+
KubernetesClusterUpdateResponse$outboundSchema = objectType({
|
|
56581
|
+
data: lazyType(() => KubernetesClusterUpdateResponseData$outboundSchema).optional()
|
|
56582
|
+
});
|
|
56583
|
+
});
|
|
56584
|
+
|
|
56495
56585
|
// src/models/membership.ts
|
|
56496
56586
|
var MembershipRole, MembershipRole$inboundSchema, MembershipRole$outboundSchema, MembershipAttributes$inboundSchema, MembershipAttributes$outboundSchema, MembershipData$inboundSchema, MembershipData$outboundSchema, Membership$inboundSchema, Membership$outboundSchema;
|
|
56497
56587
|
var init_membership = __esm(() => {
|
|
@@ -58472,6 +58562,54 @@ var init_updateelasticip = __esm(() => {
|
|
|
58472
58562
|
});
|
|
58473
58563
|
});
|
|
58474
58564
|
|
|
58565
|
+
// src/models/updatekubernetescluster.ts
|
|
58566
|
+
var UpdateKubernetesClusterType, UpdateKubernetesClusterType$inboundSchema, UpdateKubernetesClusterType$outboundSchema, UpdateKubernetesClusterAttributes$inboundSchema, UpdateKubernetesClusterAttributes$outboundSchema, UpdateKubernetesClusterData$inboundSchema, UpdateKubernetesClusterData$outboundSchema, UpdateKubernetesCluster$inboundSchema, UpdateKubernetesCluster$outboundSchema;
|
|
58567
|
+
var init_updatekubernetescluster = __esm(() => {
|
|
58568
|
+
init_v3();
|
|
58569
|
+
init_primitives();
|
|
58570
|
+
UpdateKubernetesClusterType = {
|
|
58571
|
+
KubernetesClusters: "kubernetes_clusters"
|
|
58572
|
+
};
|
|
58573
|
+
UpdateKubernetesClusterType$inboundSchema = nativeEnumType(UpdateKubernetesClusterType);
|
|
58574
|
+
UpdateKubernetesClusterType$outboundSchema = UpdateKubernetesClusterType$inboundSchema;
|
|
58575
|
+
UpdateKubernetesClusterAttributes$inboundSchema = objectType({
|
|
58576
|
+
worker_count: numberType().int().optional(),
|
|
58577
|
+
control_plane_count: numberType().int().optional(),
|
|
58578
|
+
worker_plan: nullableType(stringType()).optional()
|
|
58579
|
+
}).transform((v2) => {
|
|
58580
|
+
return remap(v2, {
|
|
58581
|
+
worker_count: "workerCount",
|
|
58582
|
+
control_plane_count: "controlPlaneCount",
|
|
58583
|
+
worker_plan: "workerPlan"
|
|
58584
|
+
});
|
|
58585
|
+
});
|
|
58586
|
+
UpdateKubernetesClusterAttributes$outboundSchema = objectType({
|
|
58587
|
+
workerCount: numberType().int().optional(),
|
|
58588
|
+
controlPlaneCount: numberType().int().optional(),
|
|
58589
|
+
workerPlan: nullableType(stringType()).optional()
|
|
58590
|
+
}).transform((v2) => {
|
|
58591
|
+
return remap(v2, {
|
|
58592
|
+
workerCount: "worker_count",
|
|
58593
|
+
controlPlaneCount: "control_plane_count",
|
|
58594
|
+
workerPlan: "worker_plan"
|
|
58595
|
+
});
|
|
58596
|
+
});
|
|
58597
|
+
UpdateKubernetesClusterData$inboundSchema = objectType({
|
|
58598
|
+
type: UpdateKubernetesClusterType$inboundSchema,
|
|
58599
|
+
attributes: lazyType(() => UpdateKubernetesClusterAttributes$inboundSchema)
|
|
58600
|
+
});
|
|
58601
|
+
UpdateKubernetesClusterData$outboundSchema = objectType({
|
|
58602
|
+
type: UpdateKubernetesClusterType$outboundSchema,
|
|
58603
|
+
attributes: lazyType(() => UpdateKubernetesClusterAttributes$outboundSchema)
|
|
58604
|
+
});
|
|
58605
|
+
UpdateKubernetesCluster$inboundSchema = objectType({
|
|
58606
|
+
data: lazyType(() => UpdateKubernetesClusterData$inboundSchema)
|
|
58607
|
+
});
|
|
58608
|
+
UpdateKubernetesCluster$outboundSchema = objectType({
|
|
58609
|
+
data: lazyType(() => UpdateKubernetesClusterData$outboundSchema)
|
|
58610
|
+
});
|
|
58611
|
+
});
|
|
58612
|
+
|
|
58475
58613
|
// src/models/user.ts
|
|
58476
58614
|
var UserRole$inboundSchema, UserRole$outboundSchema, UserAttributes$inboundSchema, UserAttributes$outboundSchema, User$inboundSchema, User$outboundSchema;
|
|
58477
58615
|
var init_user = __esm(() => {
|
|
@@ -59615,6 +59753,7 @@ var init_models = __esm(() => {
|
|
|
59615
59753
|
init_kubernetesclusterkubeconfig();
|
|
59616
59754
|
init_kubernetesclusters();
|
|
59617
59755
|
init_kubernetesclustersummarydata();
|
|
59756
|
+
init_kubernetesclusterupdateresponse();
|
|
59618
59757
|
init_membership();
|
|
59619
59758
|
init_objectstoragedata();
|
|
59620
59759
|
init_objectstorages();
|
|
@@ -59651,6 +59790,7 @@ var init_models = __esm(() => {
|
|
|
59651
59790
|
init_trafficquota();
|
|
59652
59791
|
init_updateapikey();
|
|
59653
59792
|
init_updateelasticip();
|
|
59793
|
+
init_updatekubernetescluster();
|
|
59654
59794
|
init_user();
|
|
59655
59795
|
init_userdata();
|
|
59656
59796
|
init_userdataobject();
|
|
@@ -63959,6 +64099,32 @@ var init_updatefirewall = __esm(() => {
|
|
|
63959
64099
|
});
|
|
63960
64100
|
});
|
|
63961
64101
|
|
|
64102
|
+
// src/models/operations/updatekubernetescluster.ts
|
|
64103
|
+
var UpdateKubernetesClusterRequest$inboundSchema, UpdateKubernetesClusterRequest$outboundSchema;
|
|
64104
|
+
var init_updatekubernetescluster2 = __esm(() => {
|
|
64105
|
+
init_v3();
|
|
64106
|
+
init_primitives();
|
|
64107
|
+
init_models();
|
|
64108
|
+
UpdateKubernetesClusterRequest$inboundSchema = objectType({
|
|
64109
|
+
kubernetes_cluster_id: stringType(),
|
|
64110
|
+
update_kubernetes_cluster: UpdateKubernetesCluster$inboundSchema
|
|
64111
|
+
}).transform((v2) => {
|
|
64112
|
+
return remap(v2, {
|
|
64113
|
+
kubernetes_cluster_id: "kubernetesClusterId",
|
|
64114
|
+
update_kubernetes_cluster: "updateKubernetesCluster"
|
|
64115
|
+
});
|
|
64116
|
+
});
|
|
64117
|
+
UpdateKubernetesClusterRequest$outboundSchema = objectType({
|
|
64118
|
+
kubernetesClusterId: stringType(),
|
|
64119
|
+
updateKubernetesCluster: UpdateKubernetesCluster$outboundSchema
|
|
64120
|
+
}).transform((v2) => {
|
|
64121
|
+
return remap(v2, {
|
|
64122
|
+
kubernetesClusterId: "kubernetes_cluster_id",
|
|
64123
|
+
updateKubernetesCluster: "update_kubernetes_cluster"
|
|
64124
|
+
});
|
|
64125
|
+
});
|
|
64126
|
+
});
|
|
64127
|
+
|
|
63962
64128
|
// src/models/operations/updateplansbandwidth.ts
|
|
63963
64129
|
var UpdatePlansBandwidthType2, UpdatePlansBandwidthType2$inboundSchema, UpdatePlansBandwidthType2$outboundSchema, UpdatePlansBandwidthAttributes2$inboundSchema, UpdatePlansBandwidthAttributes2$outboundSchema, UpdatePlansBandwidthData2$inboundSchema, UpdatePlansBandwidthData2$outboundSchema, UpdatePlansBandwidthRequest$inboundSchema, UpdatePlansBandwidthRequest$outboundSchema;
|
|
63964
64130
|
var init_updateplansbandwidth = __esm(() => {
|
|
@@ -64515,6 +64681,7 @@ var init_operations = __esm(() => {
|
|
|
64515
64681
|
init_updateapikey2();
|
|
64516
64682
|
init_updateelasticip2();
|
|
64517
64683
|
init_updatefirewall();
|
|
64684
|
+
init_updatekubernetescluster2();
|
|
64518
64685
|
init_updateplansbandwidth();
|
|
64519
64686
|
init_updateproject();
|
|
64520
64687
|
init_updateserver();
|
|
@@ -67873,11 +68040,137 @@ Lists all Kubernetes clusters for a project.
|
|
|
67873
68040
|
};
|
|
67874
68041
|
});
|
|
67875
68042
|
|
|
67876
|
-
// src/funcs/
|
|
67877
|
-
function
|
|
68043
|
+
// src/funcs/kubernetesClustersUpdateKubernetesCluster.ts
|
|
68044
|
+
function kubernetesClustersUpdateKubernetesCluster(client, request, options) {
|
|
67878
68045
|
return new APIPromise($do29(client, request, options));
|
|
67879
68046
|
}
|
|
67880
68047
|
async function $do29(client, request, options) {
|
|
68048
|
+
const parsed = safeParse4(request, (value) => UpdateKubernetesClusterRequest$outboundSchema.parse(value), "Input validation failed");
|
|
68049
|
+
if (!parsed.ok) {
|
|
68050
|
+
return [parsed, { status: "invalid" }];
|
|
68051
|
+
}
|
|
68052
|
+
const payload = parsed.value;
|
|
68053
|
+
const body = encodeJSON("body", payload.update_kubernetes_cluster, {
|
|
68054
|
+
explode: true
|
|
68055
|
+
});
|
|
68056
|
+
const pathParams = {
|
|
68057
|
+
kubernetes_cluster_id: encodeSimple("kubernetes_cluster_id", payload.kubernetes_cluster_id, { explode: false, charEncoding: "percent" })
|
|
68058
|
+
};
|
|
68059
|
+
const path = pathToFunc("/kubernetes_clusters/{kubernetes_cluster_id}")(pathParams);
|
|
68060
|
+
const headers = new Headers(compactMap({
|
|
68061
|
+
"Content-Type": "application/vnd.api+json",
|
|
68062
|
+
Accept: "application/vnd.api+json"
|
|
68063
|
+
}));
|
|
68064
|
+
const secConfig = await extractSecurity(client._options.bearer);
|
|
68065
|
+
const securityInput = secConfig == null ? {} : { bearer: secConfig };
|
|
68066
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
68067
|
+
const context = {
|
|
68068
|
+
options: client._options,
|
|
68069
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
68070
|
+
operationID: "update-kubernetes-cluster",
|
|
68071
|
+
oAuth2Scopes: null,
|
|
68072
|
+
resolvedSecurity: requestSecurity,
|
|
68073
|
+
securitySource: client._options.bearer,
|
|
68074
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
68075
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
68076
|
+
};
|
|
68077
|
+
const requestRes = client._createRequest(context, {
|
|
68078
|
+
security: requestSecurity,
|
|
68079
|
+
method: "PATCH",
|
|
68080
|
+
baseURL: options?.serverURL,
|
|
68081
|
+
path,
|
|
68082
|
+
headers,
|
|
68083
|
+
body,
|
|
68084
|
+
userAgent: client._options.userAgent,
|
|
68085
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
68086
|
+
}, options);
|
|
68087
|
+
if (!requestRes.ok) {
|
|
68088
|
+
return [requestRes, { status: "invalid" }];
|
|
68089
|
+
}
|
|
68090
|
+
const req = requestRes.value;
|
|
68091
|
+
const doResult = await client._do(req, {
|
|
68092
|
+
context,
|
|
68093
|
+
errorCodes: ["400", "403", "404", "422", "4XX", "503", "5XX"],
|
|
68094
|
+
retryConfig: context.retryConfig,
|
|
68095
|
+
retryCodes: context.retryCodes
|
|
68096
|
+
});
|
|
68097
|
+
if (!doResult.ok) {
|
|
68098
|
+
return [doResult, { status: "request-error", request: req }];
|
|
68099
|
+
}
|
|
68100
|
+
const response = doResult.value;
|
|
68101
|
+
const responseFields = {
|
|
68102
|
+
HttpMeta: { Response: response, Request: req }
|
|
68103
|
+
};
|
|
68104
|
+
const [result] = await match(json([200, 202], KubernetesClusterUpdateResponse$inboundSchema, {
|
|
68105
|
+
ctype: "application/vnd.api+json"
|
|
68106
|
+
}), jsonErr([400, 403, 404, 422], ErrorObject$inboundSchema, {
|
|
68107
|
+
ctype: "application/vnd.api+json"
|
|
68108
|
+
}), jsonErr(503, ErrorObject$inboundSchema, {
|
|
68109
|
+
ctype: "application/vnd.api+json"
|
|
68110
|
+
}), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
|
|
68111
|
+
if (!result.ok) {
|
|
68112
|
+
return [result, { status: "complete", request: req, response }];
|
|
68113
|
+
}
|
|
68114
|
+
return [result, { status: "complete", request: req, response }];
|
|
68115
|
+
}
|
|
68116
|
+
var init_kubernetesClustersUpdateKubernetesCluster = __esm(() => {
|
|
68117
|
+
init_encodings();
|
|
68118
|
+
init_matchers();
|
|
68119
|
+
init_primitives();
|
|
68120
|
+
init_schemas4();
|
|
68121
|
+
init_security();
|
|
68122
|
+
init_url();
|
|
68123
|
+
init_errors4();
|
|
68124
|
+
init_models();
|
|
68125
|
+
init_operations();
|
|
68126
|
+
init_async();
|
|
68127
|
+
});
|
|
68128
|
+
|
|
68129
|
+
// src/mcp-server/tools/kubernetesClustersUpdateKubernetesCluster.ts
|
|
68130
|
+
var args28, tool$kubernetesClustersUpdateKubernetesCluster;
|
|
68131
|
+
var init_kubernetesClustersUpdateKubernetesCluster2 = __esm(() => {
|
|
68132
|
+
init_kubernetesClustersUpdateKubernetesCluster();
|
|
68133
|
+
init_operations();
|
|
68134
|
+
init_tools();
|
|
68135
|
+
args28 = {
|
|
68136
|
+
request: UpdateKubernetesClusterRequest$inboundSchema
|
|
68137
|
+
};
|
|
68138
|
+
tool$kubernetesClustersUpdateKubernetesCluster = {
|
|
68139
|
+
name: "kubernetes-clusters-update-kubernetes-cluster",
|
|
68140
|
+
description: `Scale Kubernetes Cluster
|
|
68141
|
+
|
|
68142
|
+
Scales the worker nodes or control plane nodes of a Kubernetes cluster. The cluster must be in \`Provisioned\` phase to accept updates.
|
|
68143
|
+
|
|
68144
|
+
Exactly one of \`worker_count\` or \`control_plane_count\` must be provided per request. You cannot scale workers and control plane nodes in the same request.
|
|
68145
|
+
|
|
68146
|
+
When scaling up, the API validates that sufficient server stock is available for the requested delta (e.g., scaling from 2 to 5 workers checks for 3 available servers).
|
|
68147
|
+
|
|
68148
|
+
When scaling from 0 workers, you must provide a \`worker_plan\` since there is no existing configuration to inherit the plan from.
|
|
68149
|
+
|
|
68150
|
+
Control plane scaling has a minimum of 1 node. You cannot scale control plane nodes to zero.
|
|
68151
|
+
|
|
68152
|
+
Returns 202 Accepted when a scaling operation is triggered. Poll the GET endpoint to monitor progress. Returns 200 OK if the requested count matches the current count (no-op).
|
|
68153
|
+
`,
|
|
68154
|
+
args: args28,
|
|
68155
|
+
tool: async (client, args29, ctx) => {
|
|
68156
|
+
const [result, apiCall] = await kubernetesClustersUpdateKubernetesCluster(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68157
|
+
if (!result.ok) {
|
|
68158
|
+
return {
|
|
68159
|
+
content: [{ type: "text", text: result.error.message }],
|
|
68160
|
+
isError: true
|
|
68161
|
+
};
|
|
68162
|
+
}
|
|
68163
|
+
const value = result.value;
|
|
68164
|
+
return formatResult(value, apiCall);
|
|
68165
|
+
}
|
|
68166
|
+
};
|
|
68167
|
+
});
|
|
68168
|
+
|
|
68169
|
+
// src/funcs/operatingSystemsListPlans.ts
|
|
68170
|
+
function operatingSystemsListPlans(client, request, options) {
|
|
68171
|
+
return new APIPromise($do30(client, request, options));
|
|
68172
|
+
}
|
|
68173
|
+
async function $do30(client, request, options) {
|
|
67881
68174
|
const parsed = safeParse4(request, (value) => GetPlansOperatingSystemRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
67882
68175
|
if (!parsed.ok) {
|
|
67883
68176
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -67984,12 +68277,12 @@ var init_operatingSystemsListPlans = __esm(() => {
|
|
|
67984
68277
|
});
|
|
67985
68278
|
|
|
67986
68279
|
// src/mcp-server/tools/operatingSystemsListPlans.ts
|
|
67987
|
-
var
|
|
68280
|
+
var args29, tool$operatingSystemsListPlans;
|
|
67988
68281
|
var init_operatingSystemsListPlans2 = __esm(() => {
|
|
67989
68282
|
init_operatingSystemsListPlans();
|
|
67990
68283
|
init_operations();
|
|
67991
68284
|
init_tools();
|
|
67992
|
-
|
|
68285
|
+
args29 = {
|
|
67993
68286
|
request: GetPlansOperatingSystemRequest$inboundSchema.optional()
|
|
67994
68287
|
};
|
|
67995
68288
|
tool$operatingSystemsListPlans = {
|
|
@@ -67998,9 +68291,9 @@ var init_operatingSystemsListPlans2 = __esm(() => {
|
|
|
67998
68291
|
|
|
67999
68292
|
Lists all operating systems available to deploy and reinstall.
|
|
68000
68293
|
`,
|
|
68001
|
-
args:
|
|
68002
|
-
tool: async (client,
|
|
68003
|
-
const [result, apiCall] = await operatingSystemsListPlans(client,
|
|
68294
|
+
args: args29,
|
|
68295
|
+
tool: async (client, args30, ctx) => {
|
|
68296
|
+
const [result, apiCall] = await operatingSystemsListPlans(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68004
68297
|
if (!result.ok) {
|
|
68005
68298
|
return {
|
|
68006
68299
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -68015,9 +68308,9 @@ Lists all operating systems available to deploy and reinstall.
|
|
|
68015
68308
|
|
|
68016
68309
|
// src/funcs/plansGet.ts
|
|
68017
68310
|
function plansGet(client, request, options) {
|
|
68018
|
-
return new APIPromise($
|
|
68311
|
+
return new APIPromise($do31(client, request, options));
|
|
68019
68312
|
}
|
|
68020
|
-
async function $
|
|
68313
|
+
async function $do31(client, request, options) {
|
|
68021
68314
|
const parsed = safeParse4(request, (value) => GetPlanRequest$outboundSchema.parse(value), "Input validation failed");
|
|
68022
68315
|
if (!parsed.ok) {
|
|
68023
68316
|
return [parsed, { status: "invalid" }];
|
|
@@ -68092,20 +68385,20 @@ var init_plansGet = __esm(() => {
|
|
|
68092
68385
|
});
|
|
68093
68386
|
|
|
68094
68387
|
// src/mcp-server/tools/plansGet.ts
|
|
68095
|
-
var
|
|
68388
|
+
var args30, tool$plansGet;
|
|
68096
68389
|
var init_plansGet2 = __esm(() => {
|
|
68097
68390
|
init_plansGet();
|
|
68098
68391
|
init_operations();
|
|
68099
68392
|
init_tools();
|
|
68100
|
-
|
|
68393
|
+
args30 = {
|
|
68101
68394
|
request: GetPlanRequest$inboundSchema
|
|
68102
68395
|
};
|
|
68103
68396
|
tool$plansGet = {
|
|
68104
68397
|
name: "plans-get",
|
|
68105
68398
|
description: `Retrieve plan`,
|
|
68106
|
-
args:
|
|
68107
|
-
tool: async (client,
|
|
68108
|
-
const [result, apiCall] = await plansGet(client,
|
|
68399
|
+
args: args30,
|
|
68400
|
+
tool: async (client, args31, ctx) => {
|
|
68401
|
+
const [result, apiCall] = await plansGet(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68109
68402
|
if (!result.ok) {
|
|
68110
68403
|
return {
|
|
68111
68404
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -68120,9 +68413,9 @@ var init_plansGet2 = __esm(() => {
|
|
|
68120
68413
|
|
|
68121
68414
|
// src/funcs/plansGetBandwidth.ts
|
|
68122
68415
|
function plansGetBandwidth(client, request, options) {
|
|
68123
|
-
return new APIPromise($
|
|
68416
|
+
return new APIPromise($do32(client, request, options));
|
|
68124
68417
|
}
|
|
68125
|
-
async function $
|
|
68418
|
+
async function $do32(client, request, options) {
|
|
68126
68419
|
const parsed = safeParse4(request, (value) => GetBandwidthPlansRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
68127
68420
|
if (!parsed.ok) {
|
|
68128
68421
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -68234,12 +68527,12 @@ var init_plansGetBandwidth = __esm(() => {
|
|
|
68234
68527
|
});
|
|
68235
68528
|
|
|
68236
68529
|
// src/mcp-server/tools/plansGetBandwidth.ts
|
|
68237
|
-
var
|
|
68530
|
+
var args31, tool$plansGetBandwidth;
|
|
68238
68531
|
var init_plansGetBandwidth2 = __esm(() => {
|
|
68239
68532
|
init_plansGetBandwidth();
|
|
68240
68533
|
init_operations();
|
|
68241
68534
|
init_tools();
|
|
68242
|
-
|
|
68535
|
+
args31 = {
|
|
68243
68536
|
request: GetBandwidthPlansRequest$inboundSchema.optional()
|
|
68244
68537
|
};
|
|
68245
68538
|
tool$plansGetBandwidth = {
|
|
@@ -68247,9 +68540,9 @@ var init_plansGetBandwidth2 = __esm(() => {
|
|
|
68247
68540
|
description: `List bandwidth plans
|
|
68248
68541
|
|
|
68249
68542
|
Lists all bandwidth plans.`,
|
|
68250
|
-
args:
|
|
68251
|
-
tool: async (client,
|
|
68252
|
-
const [result, apiCall] = await plansGetBandwidth(client,
|
|
68543
|
+
args: args31,
|
|
68544
|
+
tool: async (client, args32, ctx) => {
|
|
68545
|
+
const [result, apiCall] = await plansGetBandwidth(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68253
68546
|
if (!result.ok) {
|
|
68254
68547
|
return {
|
|
68255
68548
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -68264,9 +68557,9 @@ Lists all bandwidth plans.`,
|
|
|
68264
68557
|
|
|
68265
68558
|
// src/funcs/plansList.ts
|
|
68266
68559
|
function plansList(client, request, options) {
|
|
68267
|
-
return new APIPromise($
|
|
68560
|
+
return new APIPromise($do33(client, request, options));
|
|
68268
68561
|
}
|
|
68269
|
-
async function $
|
|
68562
|
+
async function $do33(client, request, options) {
|
|
68270
68563
|
const parsed = safeParse4(request, (value) => GetPlansRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
68271
68564
|
if (!parsed.ok) {
|
|
68272
68565
|
return [parsed, { status: "invalid" }];
|
|
@@ -68345,12 +68638,12 @@ var init_plansList = __esm(() => {
|
|
|
68345
68638
|
});
|
|
68346
68639
|
|
|
68347
68640
|
// src/mcp-server/tools/plansList.ts
|
|
68348
|
-
var
|
|
68641
|
+
var args32, tool$plansList;
|
|
68349
68642
|
var init_plansList2 = __esm(() => {
|
|
68350
68643
|
init_plansList();
|
|
68351
68644
|
init_operations();
|
|
68352
68645
|
init_tools();
|
|
68353
|
-
|
|
68646
|
+
args32 = {
|
|
68354
68647
|
request: GetPlansRequest$inboundSchema.optional()
|
|
68355
68648
|
};
|
|
68356
68649
|
tool$plansList = {
|
|
@@ -68359,9 +68652,9 @@ var init_plansList2 = __esm(() => {
|
|
|
68359
68652
|
|
|
68360
68653
|
Lists all plans. Availability by region is included in \`attributes.regions.locations.available[*]\` node for a given plan.
|
|
68361
68654
|
`,
|
|
68362
|
-
args:
|
|
68363
|
-
tool: async (client,
|
|
68364
|
-
const [result, apiCall] = await plansList(client,
|
|
68655
|
+
args: args32,
|
|
68656
|
+
tool: async (client, args33, ctx) => {
|
|
68657
|
+
const [result, apiCall] = await plansList(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68365
68658
|
if (!result.ok) {
|
|
68366
68659
|
return {
|
|
68367
68660
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -68376,9 +68669,9 @@ Lists all plans. Availability by region is included in \`attributes.regions.loca
|
|
|
68376
68669
|
|
|
68377
68670
|
// src/funcs/plansListStorage.ts
|
|
68378
68671
|
function plansListStorage(client, options) {
|
|
68379
|
-
return new APIPromise($
|
|
68672
|
+
return new APIPromise($do34(client, options));
|
|
68380
68673
|
}
|
|
68381
|
-
async function $
|
|
68674
|
+
async function $do34(client, options) {
|
|
68382
68675
|
const path = pathToFunc("/plans/storage")();
|
|
68383
68676
|
const headers = new Headers(compactMap({
|
|
68384
68677
|
Accept: "application/vnd.api+json"
|
|
@@ -68460,9 +68753,9 @@ var init_plansListStorage2 = __esm(() => {
|
|
|
68460
68753
|
|
|
68461
68754
|
// src/funcs/plansUpdateBandwidth.ts
|
|
68462
68755
|
function plansUpdateBandwidth(client, request, options) {
|
|
68463
|
-
return new APIPromise($
|
|
68756
|
+
return new APIPromise($do35(client, request, options));
|
|
68464
68757
|
}
|
|
68465
|
-
async function $
|
|
68758
|
+
async function $do35(client, request, options) {
|
|
68466
68759
|
const parsed = safeParse4(request, (value) => UpdatePlansBandwidthRequest$outboundSchema.parse(value), "Input validation failed");
|
|
68467
68760
|
if (!parsed.ok) {
|
|
68468
68761
|
return [parsed, { status: "invalid" }];
|
|
@@ -68532,12 +68825,12 @@ var init_plansUpdateBandwidth = __esm(() => {
|
|
|
68532
68825
|
});
|
|
68533
68826
|
|
|
68534
68827
|
// src/mcp-server/tools/plansUpdateBandwidth.ts
|
|
68535
|
-
var
|
|
68828
|
+
var args33, tool$plansUpdateBandwidth;
|
|
68536
68829
|
var init_plansUpdateBandwidth2 = __esm(() => {
|
|
68537
68830
|
init_plansUpdateBandwidth();
|
|
68538
68831
|
init_operations();
|
|
68539
68832
|
init_tools();
|
|
68540
|
-
|
|
68833
|
+
args33 = {
|
|
68541
68834
|
request: UpdatePlansBandwidthRequest$inboundSchema
|
|
68542
68835
|
};
|
|
68543
68836
|
tool$plansUpdateBandwidth = {
|
|
@@ -68546,9 +68839,9 @@ var init_plansUpdateBandwidth2 = __esm(() => {
|
|
|
68546
68839
|
|
|
68547
68840
|
Allows to increase or decrease bandwidth packages. Only admins and owners can request.
|
|
68548
68841
|
`,
|
|
68549
|
-
args:
|
|
68550
|
-
tool: async (client,
|
|
68551
|
-
const [result, apiCall] = await plansUpdateBandwidth(client,
|
|
68842
|
+
args: args33,
|
|
68843
|
+
tool: async (client, args34, ctx) => {
|
|
68844
|
+
const [result, apiCall] = await plansUpdateBandwidth(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68552
68845
|
if (!result.ok) {
|
|
68553
68846
|
return {
|
|
68554
68847
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -68563,9 +68856,9 @@ Allows to increase or decrease bandwidth packages. Only admins and owners can re
|
|
|
68563
68856
|
|
|
68564
68857
|
// src/funcs/plansVmList.ts
|
|
68565
68858
|
function plansVmList(client, request, options) {
|
|
68566
|
-
return new APIPromise($
|
|
68859
|
+
return new APIPromise($do36(client, request, options));
|
|
68567
68860
|
}
|
|
68568
|
-
async function $
|
|
68861
|
+
async function $do36(client, request, options) {
|
|
68569
68862
|
const parsed = safeParse4(request, (value) => GetVmPlansRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
68570
68863
|
if (!parsed.ok) {
|
|
68571
68864
|
return [parsed, { status: "invalid" }];
|
|
@@ -68638,20 +68931,20 @@ var init_plansVmList = __esm(() => {
|
|
|
68638
68931
|
});
|
|
68639
68932
|
|
|
68640
68933
|
// src/mcp-server/tools/plansVmList.ts
|
|
68641
|
-
var
|
|
68934
|
+
var args34, tool$plansVmList;
|
|
68642
68935
|
var init_plansVmList2 = __esm(() => {
|
|
68643
68936
|
init_plansVmList();
|
|
68644
68937
|
init_operations();
|
|
68645
68938
|
init_tools();
|
|
68646
|
-
|
|
68939
|
+
args34 = {
|
|
68647
68940
|
request: GetVmPlansRequest$inboundSchema.optional()
|
|
68648
68941
|
};
|
|
68649
68942
|
tool$plansVmList = {
|
|
68650
68943
|
name: "plans-vm-list",
|
|
68651
68944
|
description: `List VM plans`,
|
|
68652
|
-
args:
|
|
68653
|
-
tool: async (client,
|
|
68654
|
-
const [result, apiCall] = await plansVmList(client,
|
|
68945
|
+
args: args34,
|
|
68946
|
+
tool: async (client, args35, ctx) => {
|
|
68947
|
+
const [result, apiCall] = await plansVmList(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68655
68948
|
if (!result.ok) {
|
|
68656
68949
|
return {
|
|
68657
68950
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -68666,9 +68959,9 @@ var init_plansVmList2 = __esm(() => {
|
|
|
68666
68959
|
|
|
68667
68960
|
// src/funcs/privateNetworksAssign.ts
|
|
68668
68961
|
function privateNetworksAssign(client, request, options) {
|
|
68669
|
-
return new APIPromise($
|
|
68962
|
+
return new APIPromise($do37(client, request, options));
|
|
68670
68963
|
}
|
|
68671
|
-
async function $
|
|
68964
|
+
async function $do37(client, request, options) {
|
|
68672
68965
|
const parsed = safeParse4(request, (value) => AssignServerVirtualNetworkRequest$outboundSchema.parse(value), "Input validation failed");
|
|
68673
68966
|
if (!parsed.ok) {
|
|
68674
68967
|
return [parsed, { status: "invalid" }];
|
|
@@ -68738,20 +69031,20 @@ var init_privateNetworksAssign = __esm(() => {
|
|
|
68738
69031
|
});
|
|
68739
69032
|
|
|
68740
69033
|
// src/mcp-server/tools/privateNetworksAssign.ts
|
|
68741
|
-
var
|
|
69034
|
+
var args35, tool$privateNetworksAssign;
|
|
68742
69035
|
var init_privateNetworksAssign2 = __esm(() => {
|
|
68743
69036
|
init_privateNetworksAssign();
|
|
68744
69037
|
init_operations();
|
|
68745
69038
|
init_tools();
|
|
68746
|
-
|
|
69039
|
+
args35 = {
|
|
68747
69040
|
request: AssignServerVirtualNetworkRequest$inboundSchema
|
|
68748
69041
|
};
|
|
68749
69042
|
tool$privateNetworksAssign = {
|
|
68750
69043
|
name: "private-networks-assign",
|
|
68751
69044
|
description: `Assign VLAN`,
|
|
68752
|
-
args:
|
|
68753
|
-
tool: async (client,
|
|
68754
|
-
const [result, apiCall] = await privateNetworksAssign(client,
|
|
69045
|
+
args: args35,
|
|
69046
|
+
tool: async (client, args36, ctx) => {
|
|
69047
|
+
const [result, apiCall] = await privateNetworksAssign(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68755
69048
|
if (!result.ok) {
|
|
68756
69049
|
return {
|
|
68757
69050
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -68766,9 +69059,9 @@ var init_privateNetworksAssign2 = __esm(() => {
|
|
|
68766
69059
|
|
|
68767
69060
|
// src/funcs/privateNetworksCreate.ts
|
|
68768
69061
|
function privateNetworksCreate(client, request, options) {
|
|
68769
|
-
return new APIPromise($
|
|
69062
|
+
return new APIPromise($do38(client, request, options));
|
|
68770
69063
|
}
|
|
68771
|
-
async function $
|
|
69064
|
+
async function $do38(client, request, options) {
|
|
68772
69065
|
const parsed = safeParse4(request, (value) => CreateVirtualNetworkRequest$outboundSchema.parse(value), "Input validation failed");
|
|
68773
69066
|
if (!parsed.ok) {
|
|
68774
69067
|
return [parsed, { status: "invalid" }];
|
|
@@ -68838,12 +69131,12 @@ var init_privateNetworksCreate = __esm(() => {
|
|
|
68838
69131
|
});
|
|
68839
69132
|
|
|
68840
69133
|
// src/mcp-server/tools/privateNetworksCreate.ts
|
|
68841
|
-
var
|
|
69134
|
+
var args36, tool$privateNetworksCreate;
|
|
68842
69135
|
var init_privateNetworksCreate2 = __esm(() => {
|
|
68843
69136
|
init_privateNetworksCreate();
|
|
68844
69137
|
init_operations();
|
|
68845
69138
|
init_tools();
|
|
68846
|
-
|
|
69139
|
+
args36 = {
|
|
68847
69140
|
request: CreateVirtualNetworkRequest$inboundSchema
|
|
68848
69141
|
};
|
|
68849
69142
|
tool$privateNetworksCreate = {
|
|
@@ -68852,9 +69145,9 @@ var init_privateNetworksCreate2 = __esm(() => {
|
|
|
68852
69145
|
|
|
68853
69146
|
Creates a new Virtual Network.
|
|
68854
69147
|
`,
|
|
68855
|
-
args:
|
|
68856
|
-
tool: async (client,
|
|
68857
|
-
const [result, apiCall] = await privateNetworksCreate(client,
|
|
69148
|
+
args: args36,
|
|
69149
|
+
tool: async (client, args37, ctx) => {
|
|
69150
|
+
const [result, apiCall] = await privateNetworksCreate(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68858
69151
|
if (!result.ok) {
|
|
68859
69152
|
return {
|
|
68860
69153
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -68869,9 +69162,9 @@ Creates a new Virtual Network.
|
|
|
68869
69162
|
|
|
68870
69163
|
// src/funcs/privateNetworksDeleteAssignment.ts
|
|
68871
69164
|
function privateNetworksDeleteAssignment(client, request, options) {
|
|
68872
|
-
return new APIPromise($
|
|
69165
|
+
return new APIPromise($do39(client, request, options));
|
|
68873
69166
|
}
|
|
68874
|
-
async function $
|
|
69167
|
+
async function $do39(client, request, options) {
|
|
68875
69168
|
const parsed = safeParse4(request, (value) => DeleteVirtualNetworksAssignmentsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
68876
69169
|
if (!parsed.ok) {
|
|
68877
69170
|
return [parsed, { status: "invalid" }];
|
|
@@ -68944,12 +69237,12 @@ var init_privateNetworksDeleteAssignment = __esm(() => {
|
|
|
68944
69237
|
});
|
|
68945
69238
|
|
|
68946
69239
|
// src/mcp-server/tools/privateNetworksDeleteAssignment.ts
|
|
68947
|
-
var
|
|
69240
|
+
var args37, tool$privateNetworksDeleteAssignment;
|
|
68948
69241
|
var init_privateNetworksDeleteAssignment2 = __esm(() => {
|
|
68949
69242
|
init_privateNetworksDeleteAssignment();
|
|
68950
69243
|
init_operations();
|
|
68951
69244
|
init_tools();
|
|
68952
|
-
|
|
69245
|
+
args37 = {
|
|
68953
69246
|
request: DeleteVirtualNetworksAssignmentsRequest$inboundSchema
|
|
68954
69247
|
};
|
|
68955
69248
|
tool$privateNetworksDeleteAssignment = {
|
|
@@ -68958,9 +69251,9 @@ var init_privateNetworksDeleteAssignment2 = __esm(() => {
|
|
|
68958
69251
|
|
|
68959
69252
|
Allow you to remove a Virtual Network assignment.
|
|
68960
69253
|
`,
|
|
68961
|
-
args:
|
|
68962
|
-
tool: async (client,
|
|
68963
|
-
const [result, apiCall] = await privateNetworksDeleteAssignment(client,
|
|
69254
|
+
args: args37,
|
|
69255
|
+
tool: async (client, args38, ctx) => {
|
|
69256
|
+
const [result, apiCall] = await privateNetworksDeleteAssignment(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
68964
69257
|
if (!result.ok) {
|
|
68965
69258
|
return {
|
|
68966
69259
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -68974,9 +69267,9 @@ Allow you to remove a Virtual Network assignment.
|
|
|
68974
69267
|
|
|
68975
69268
|
// src/funcs/privateNetworksGet.ts
|
|
68976
69269
|
function privateNetworksGet(client, request, options) {
|
|
68977
|
-
return new APIPromise($
|
|
69270
|
+
return new APIPromise($do40(client, request, options));
|
|
68978
69271
|
}
|
|
68979
|
-
async function $
|
|
69272
|
+
async function $do40(client, request, options) {
|
|
68980
69273
|
const parsed = safeParse4(request, (value) => GetVirtualNetworkRequest$outboundSchema.parse(value), "Input validation failed");
|
|
68981
69274
|
if (!parsed.ok) {
|
|
68982
69275
|
return [parsed, { status: "invalid" }];
|
|
@@ -69051,12 +69344,12 @@ var init_privateNetworksGet = __esm(() => {
|
|
|
69051
69344
|
});
|
|
69052
69345
|
|
|
69053
69346
|
// src/mcp-server/tools/privateNetworksGet.ts
|
|
69054
|
-
var
|
|
69347
|
+
var args38, tool$privateNetworksGet;
|
|
69055
69348
|
var init_privateNetworksGet2 = __esm(() => {
|
|
69056
69349
|
init_privateNetworksGet();
|
|
69057
69350
|
init_operations();
|
|
69058
69351
|
init_tools();
|
|
69059
|
-
|
|
69352
|
+
args38 = {
|
|
69060
69353
|
request: GetVirtualNetworkRequest$inboundSchema
|
|
69061
69354
|
};
|
|
69062
69355
|
tool$privateNetworksGet = {
|
|
@@ -69065,9 +69358,9 @@ var init_privateNetworksGet2 = __esm(() => {
|
|
|
69065
69358
|
|
|
69066
69359
|
Retrieve a Virtual Network.
|
|
69067
69360
|
`,
|
|
69068
|
-
args:
|
|
69069
|
-
tool: async (client,
|
|
69070
|
-
const [result, apiCall] = await privateNetworksGet(client,
|
|
69361
|
+
args: args38,
|
|
69362
|
+
tool: async (client, args39, ctx) => {
|
|
69363
|
+
const [result, apiCall] = await privateNetworksGet(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
69071
69364
|
if (!result.ok) {
|
|
69072
69365
|
return {
|
|
69073
69366
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -69082,9 +69375,9 @@ Retrieve a Virtual Network.
|
|
|
69082
69375
|
|
|
69083
69376
|
// src/funcs/privateNetworksList.ts
|
|
69084
69377
|
function privateNetworksList(client, request, options) {
|
|
69085
|
-
return new APIPromise($
|
|
69378
|
+
return new APIPromise($do41(client, request, options));
|
|
69086
69379
|
}
|
|
69087
|
-
async function $
|
|
69380
|
+
async function $do41(client, request, options) {
|
|
69088
69381
|
const parsed = safeParse4(request, (value) => GetVirtualNetworksRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
69089
69382
|
if (!parsed.ok) {
|
|
69090
69383
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -69194,12 +69487,12 @@ var init_privateNetworksList = __esm(() => {
|
|
|
69194
69487
|
});
|
|
69195
69488
|
|
|
69196
69489
|
// src/mcp-server/tools/privateNetworksList.ts
|
|
69197
|
-
var
|
|
69490
|
+
var args39, tool$privateNetworksList;
|
|
69198
69491
|
var init_privateNetworksList2 = __esm(() => {
|
|
69199
69492
|
init_privateNetworksList();
|
|
69200
69493
|
init_operations();
|
|
69201
69494
|
init_tools();
|
|
69202
|
-
|
|
69495
|
+
args39 = {
|
|
69203
69496
|
request: GetVirtualNetworksRequest$inboundSchema.optional()
|
|
69204
69497
|
};
|
|
69205
69498
|
tool$privateNetworksList = {
|
|
@@ -69208,9 +69501,9 @@ var init_privateNetworksList2 = __esm(() => {
|
|
|
69208
69501
|
|
|
69209
69502
|
Lists virtual networks assigned to a project
|
|
69210
69503
|
`,
|
|
69211
|
-
args:
|
|
69212
|
-
tool: async (client,
|
|
69213
|
-
const [result, apiCall] = await privateNetworksList(client,
|
|
69504
|
+
args: args39,
|
|
69505
|
+
tool: async (client, args40, ctx) => {
|
|
69506
|
+
const [result, apiCall] = await privateNetworksList(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
69214
69507
|
if (!result.ok) {
|
|
69215
69508
|
return {
|
|
69216
69509
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -69225,9 +69518,9 @@ Lists virtual networks assigned to a project
|
|
|
69225
69518
|
|
|
69226
69519
|
// src/funcs/privateNetworksListAssignments.ts
|
|
69227
69520
|
function privateNetworksListAssignments(client, request, options) {
|
|
69228
|
-
return new APIPromise($
|
|
69521
|
+
return new APIPromise($do42(client, request, options));
|
|
69229
69522
|
}
|
|
69230
|
-
async function $
|
|
69523
|
+
async function $do42(client, request, options) {
|
|
69231
69524
|
const parsed = safeParse4(request, (value) => GetVirtualNetworksAssignmentsRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
69232
69525
|
if (!parsed.ok) {
|
|
69233
69526
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -69334,12 +69627,12 @@ var init_privateNetworksListAssignments = __esm(() => {
|
|
|
69334
69627
|
});
|
|
69335
69628
|
|
|
69336
69629
|
// src/mcp-server/tools/privateNetworksListAssignments.ts
|
|
69337
|
-
var
|
|
69630
|
+
var args40, tool$privateNetworksListAssignments;
|
|
69338
69631
|
var init_privateNetworksListAssignments2 = __esm(() => {
|
|
69339
69632
|
init_privateNetworksListAssignments();
|
|
69340
69633
|
init_operations();
|
|
69341
69634
|
init_tools();
|
|
69342
|
-
|
|
69635
|
+
args40 = {
|
|
69343
69636
|
request: GetVirtualNetworksAssignmentsRequest$inboundSchema.optional()
|
|
69344
69637
|
};
|
|
69345
69638
|
tool$privateNetworksListAssignments = {
|
|
@@ -69348,9 +69641,9 @@ var init_privateNetworksListAssignments2 = __esm(() => {
|
|
|
69348
69641
|
|
|
69349
69642
|
Returns a list of all servers assigned to virtual networks.
|
|
69350
69643
|
`,
|
|
69351
|
-
args:
|
|
69352
|
-
tool: async (client,
|
|
69353
|
-
const [result, apiCall] = await privateNetworksListAssignments(client,
|
|
69644
|
+
args: args40,
|
|
69645
|
+
tool: async (client, args41, ctx) => {
|
|
69646
|
+
const [result, apiCall] = await privateNetworksListAssignments(client, args41.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
69354
69647
|
if (!result.ok) {
|
|
69355
69648
|
return {
|
|
69356
69649
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -69365,9 +69658,9 @@ Returns a list of all servers assigned to virtual networks.
|
|
|
69365
69658
|
|
|
69366
69659
|
// src/funcs/privateNetworksUpdate.ts
|
|
69367
69660
|
function privateNetworksUpdate(client, request, options) {
|
|
69368
|
-
return new APIPromise($
|
|
69661
|
+
return new APIPromise($do43(client, request, options));
|
|
69369
69662
|
}
|
|
69370
|
-
async function $
|
|
69663
|
+
async function $do43(client, request, options) {
|
|
69371
69664
|
const parsed = safeParse4(request, (value) => UpdateVirtualNetworkRequest$outboundSchema.parse(value), "Input validation failed");
|
|
69372
69665
|
if (!parsed.ok) {
|
|
69373
69666
|
return [parsed, { status: "invalid" }];
|
|
@@ -69443,12 +69736,12 @@ var init_privateNetworksUpdate = __esm(() => {
|
|
|
69443
69736
|
});
|
|
69444
69737
|
|
|
69445
69738
|
// src/mcp-server/tools/privateNetworksUpdate.ts
|
|
69446
|
-
var
|
|
69739
|
+
var args41, tool$privateNetworksUpdate;
|
|
69447
69740
|
var init_privateNetworksUpdate2 = __esm(() => {
|
|
69448
69741
|
init_privateNetworksUpdate();
|
|
69449
69742
|
init_operations();
|
|
69450
69743
|
init_tools();
|
|
69451
|
-
|
|
69744
|
+
args41 = {
|
|
69452
69745
|
request: UpdateVirtualNetworkRequest$inboundSchema
|
|
69453
69746
|
};
|
|
69454
69747
|
tool$privateNetworksUpdate = {
|
|
@@ -69457,9 +69750,9 @@ var init_privateNetworksUpdate2 = __esm(() => {
|
|
|
69457
69750
|
|
|
69458
69751
|
Update a Virtual Network.
|
|
69459
69752
|
`,
|
|
69460
|
-
args:
|
|
69461
|
-
tool: async (client,
|
|
69462
|
-
const [result, apiCall] = await privateNetworksUpdate(client,
|
|
69753
|
+
args: args41,
|
|
69754
|
+
tool: async (client, args42, ctx) => {
|
|
69755
|
+
const [result, apiCall] = await privateNetworksUpdate(client, args42.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
69463
69756
|
if (!result.ok) {
|
|
69464
69757
|
return {
|
|
69465
69758
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -69474,9 +69767,9 @@ Update a Virtual Network.
|
|
|
69474
69767
|
|
|
69475
69768
|
// src/funcs/projectsCreate.ts
|
|
69476
69769
|
function projectsCreate(client, request, options) {
|
|
69477
|
-
return new APIPromise($
|
|
69770
|
+
return new APIPromise($do44(client, request, options));
|
|
69478
69771
|
}
|
|
69479
|
-
async function $
|
|
69772
|
+
async function $do44(client, request, options) {
|
|
69480
69773
|
const parsed = safeParse4(request, (value) => CreateProjectRequest$outboundSchema.parse(value), "Input validation failed");
|
|
69481
69774
|
if (!parsed.ok) {
|
|
69482
69775
|
return [parsed, { status: "invalid" }];
|
|
@@ -69545,20 +69838,20 @@ var init_projectsCreate = __esm(() => {
|
|
|
69545
69838
|
});
|
|
69546
69839
|
|
|
69547
69840
|
// src/mcp-server/tools/projectsCreate.ts
|
|
69548
|
-
var
|
|
69841
|
+
var args42, tool$projectsCreate;
|
|
69549
69842
|
var init_projectsCreate2 = __esm(() => {
|
|
69550
69843
|
init_projectsCreate();
|
|
69551
69844
|
init_operations();
|
|
69552
69845
|
init_tools();
|
|
69553
|
-
|
|
69846
|
+
args42 = {
|
|
69554
69847
|
request: CreateProjectRequest$inboundSchema
|
|
69555
69848
|
};
|
|
69556
69849
|
tool$projectsCreate = {
|
|
69557
69850
|
name: "projects-create",
|
|
69558
69851
|
description: `Create project`,
|
|
69559
|
-
args:
|
|
69560
|
-
tool: async (client,
|
|
69561
|
-
const [result, apiCall] = await projectsCreate(client,
|
|
69852
|
+
args: args42,
|
|
69853
|
+
tool: async (client, args43, ctx) => {
|
|
69854
|
+
const [result, apiCall] = await projectsCreate(client, args43.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
69562
69855
|
if (!result.ok) {
|
|
69563
69856
|
return {
|
|
69564
69857
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -69573,9 +69866,9 @@ var init_projectsCreate2 = __esm(() => {
|
|
|
69573
69866
|
|
|
69574
69867
|
// src/funcs/projectsDelete.ts
|
|
69575
69868
|
function projectsDelete(client, request, options) {
|
|
69576
|
-
return new APIPromise($
|
|
69869
|
+
return new APIPromise($do45(client, request, options));
|
|
69577
69870
|
}
|
|
69578
|
-
async function $
|
|
69871
|
+
async function $do45(client, request, options) {
|
|
69579
69872
|
const parsed = safeParse4(request, (value) => DeleteProjectRequest$outboundSchema.parse(value), "Input validation failed");
|
|
69580
69873
|
if (!parsed.ok) {
|
|
69581
69874
|
return [parsed, { status: "invalid" }];
|
|
@@ -69648,20 +69941,20 @@ var init_projectsDelete = __esm(() => {
|
|
|
69648
69941
|
});
|
|
69649
69942
|
|
|
69650
69943
|
// src/mcp-server/tools/projectsDelete.ts
|
|
69651
|
-
var
|
|
69944
|
+
var args43, tool$projectsDelete;
|
|
69652
69945
|
var init_projectsDelete2 = __esm(() => {
|
|
69653
69946
|
init_projectsDelete();
|
|
69654
69947
|
init_operations();
|
|
69655
69948
|
init_tools();
|
|
69656
|
-
|
|
69949
|
+
args43 = {
|
|
69657
69950
|
request: DeleteProjectRequest$inboundSchema
|
|
69658
69951
|
};
|
|
69659
69952
|
tool$projectsDelete = {
|
|
69660
69953
|
name: "projects-delete",
|
|
69661
69954
|
description: `Delete project`,
|
|
69662
|
-
args:
|
|
69663
|
-
tool: async (client,
|
|
69664
|
-
const [result, apiCall] = await projectsDelete(client,
|
|
69955
|
+
args: args43,
|
|
69956
|
+
tool: async (client, args44, ctx) => {
|
|
69957
|
+
const [result, apiCall] = await projectsDelete(client, args44.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
69665
69958
|
if (!result.ok) {
|
|
69666
69959
|
return {
|
|
69667
69960
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -69675,9 +69968,9 @@ var init_projectsDelete2 = __esm(() => {
|
|
|
69675
69968
|
|
|
69676
69969
|
// src/funcs/projectsList.ts
|
|
69677
69970
|
function projectsList(client, request, options) {
|
|
69678
|
-
return new APIPromise($
|
|
69971
|
+
return new APIPromise($do46(client, request, options));
|
|
69679
69972
|
}
|
|
69680
|
-
async function $
|
|
69973
|
+
async function $do46(client, request, options) {
|
|
69681
69974
|
const parsed = safeParse4(request, (value) => GetProjectsRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
69682
69975
|
if (!parsed.ok) {
|
|
69683
69976
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -69791,12 +70084,12 @@ var init_projectsList = __esm(() => {
|
|
|
69791
70084
|
});
|
|
69792
70085
|
|
|
69793
70086
|
// src/mcp-server/tools/projectsList.ts
|
|
69794
|
-
var
|
|
70087
|
+
var args44, tool$projectsList;
|
|
69795
70088
|
var init_projectsList2 = __esm(() => {
|
|
69796
70089
|
init_projectsList();
|
|
69797
70090
|
init_operations();
|
|
69798
70091
|
init_tools();
|
|
69799
|
-
|
|
70092
|
+
args44 = {
|
|
69800
70093
|
request: GetProjectsRequest$inboundSchema.optional()
|
|
69801
70094
|
};
|
|
69802
70095
|
tool$projectsList = {
|
|
@@ -69805,9 +70098,9 @@ var init_projectsList2 = __esm(() => {
|
|
|
69805
70098
|
|
|
69806
70099
|
Returns a list of all projects for the current team
|
|
69807
70100
|
`,
|
|
69808
|
-
args:
|
|
69809
|
-
tool: async (client,
|
|
69810
|
-
const [result, apiCall] = await projectsList(client,
|
|
70101
|
+
args: args44,
|
|
70102
|
+
tool: async (client, args45, ctx) => {
|
|
70103
|
+
const [result, apiCall] = await projectsList(client, args45.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
69811
70104
|
if (!result.ok) {
|
|
69812
70105
|
return {
|
|
69813
70106
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -69822,9 +70115,9 @@ Returns a list of all projects for the current team
|
|
|
69822
70115
|
|
|
69823
70116
|
// src/funcs/projectsSshKeysPostProjectSshKey.ts
|
|
69824
70117
|
function projectsSshKeysPostProjectSshKey(client, request, options) {
|
|
69825
|
-
return new APIPromise($
|
|
70118
|
+
return new APIPromise($do47(client, request, options));
|
|
69826
70119
|
}
|
|
69827
|
-
async function $
|
|
70120
|
+
async function $do47(client, request, options) {
|
|
69828
70121
|
const parsed = safeParse4(request, (value) => PostProjectSshKeyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
69829
70122
|
if (!parsed.ok) {
|
|
69830
70123
|
return [parsed, { status: "invalid" }];
|
|
@@ -69899,12 +70192,12 @@ var init_projectsSshKeysPostProjectSshKey = __esm(() => {
|
|
|
69899
70192
|
});
|
|
69900
70193
|
|
|
69901
70194
|
// src/mcp-server/tools/projectsSshKeysPostProjectSshKey.ts
|
|
69902
|
-
var
|
|
70195
|
+
var args45, tool$projectsSshKeysPostProjectSshKey;
|
|
69903
70196
|
var init_projectsSshKeysPostProjectSshKey2 = __esm(() => {
|
|
69904
70197
|
init_projectsSshKeysPostProjectSshKey();
|
|
69905
70198
|
init_operations();
|
|
69906
70199
|
init_tools();
|
|
69907
|
-
|
|
70200
|
+
args45 = {
|
|
69908
70201
|
request: PostProjectSshKeyRequest$inboundSchema
|
|
69909
70202
|
};
|
|
69910
70203
|
tool$projectsSshKeysPostProjectSshKey = {
|
|
@@ -69913,9 +70206,9 @@ var init_projectsSshKeysPostProjectSshKey2 = __esm(() => {
|
|
|
69913
70206
|
|
|
69914
70207
|
Allow you create SSH Keys in a project. These keys can be used to access servers after deploy and reinstall actions.
|
|
69915
70208
|
`,
|
|
69916
|
-
args:
|
|
69917
|
-
tool: async (client,
|
|
69918
|
-
const [result, apiCall] = await projectsSshKeysPostProjectSshKey(client,
|
|
70209
|
+
args: args45,
|
|
70210
|
+
tool: async (client, args46, ctx) => {
|
|
70211
|
+
const [result, apiCall] = await projectsSshKeysPostProjectSshKey(client, args46.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
69919
70212
|
if (!result.ok) {
|
|
69920
70213
|
return {
|
|
69921
70214
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -69930,9 +70223,9 @@ Allow you create SSH Keys in a project. These keys can be used to access servers
|
|
|
69930
70223
|
|
|
69931
70224
|
// src/funcs/projectsUpdate.ts
|
|
69932
70225
|
function projectsUpdate(client, request, options) {
|
|
69933
|
-
return new APIPromise($
|
|
70226
|
+
return new APIPromise($do48(client, request, options));
|
|
69934
70227
|
}
|
|
69935
|
-
async function $
|
|
70228
|
+
async function $do48(client, request, options) {
|
|
69936
70229
|
const parsed = safeParse4(request, (value) => UpdateProjectRequest$outboundSchema.parse(value), "Input validation failed");
|
|
69937
70230
|
if (!parsed.ok) {
|
|
69938
70231
|
return [parsed, { status: "invalid" }];
|
|
@@ -70007,20 +70300,20 @@ var init_projectsUpdate = __esm(() => {
|
|
|
70007
70300
|
});
|
|
70008
70301
|
|
|
70009
70302
|
// src/mcp-server/tools/projectsUpdate.ts
|
|
70010
|
-
var
|
|
70303
|
+
var args46, tool$projectsUpdate;
|
|
70011
70304
|
var init_projectsUpdate2 = __esm(() => {
|
|
70012
70305
|
init_projectsUpdate();
|
|
70013
70306
|
init_operations();
|
|
70014
70307
|
init_tools();
|
|
70015
|
-
|
|
70308
|
+
args46 = {
|
|
70016
70309
|
request: UpdateProjectRequest$inboundSchema
|
|
70017
70310
|
};
|
|
70018
70311
|
tool$projectsUpdate = {
|
|
70019
70312
|
name: "projects-update",
|
|
70020
70313
|
description: `Update project`,
|
|
70021
|
-
args:
|
|
70022
|
-
tool: async (client,
|
|
70023
|
-
const [result, apiCall] = await projectsUpdate(client,
|
|
70314
|
+
args: args46,
|
|
70315
|
+
tool: async (client, args47, ctx) => {
|
|
70316
|
+
const [result, apiCall] = await projectsUpdate(client, args47.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
70024
70317
|
if (!result.ok) {
|
|
70025
70318
|
return {
|
|
70026
70319
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -70035,9 +70328,9 @@ var init_projectsUpdate2 = __esm(() => {
|
|
|
70035
70328
|
|
|
70036
70329
|
// src/funcs/regionsFetch.ts
|
|
70037
70330
|
function regionsFetch(client, request, options) {
|
|
70038
|
-
return new APIPromise($
|
|
70331
|
+
return new APIPromise($do49(client, request, options));
|
|
70039
70332
|
}
|
|
70040
|
-
async function $
|
|
70333
|
+
async function $do49(client, request, options) {
|
|
70041
70334
|
const parsed = safeParse4(request, (value) => GetRegionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
70042
70335
|
if (!parsed.ok) {
|
|
70043
70336
|
return [parsed, { status: "invalid" }];
|
|
@@ -70112,20 +70405,20 @@ var init_regionsFetch = __esm(() => {
|
|
|
70112
70405
|
});
|
|
70113
70406
|
|
|
70114
70407
|
// src/mcp-server/tools/regionsFetch.ts
|
|
70115
|
-
var
|
|
70408
|
+
var args47, tool$regionsFetch;
|
|
70116
70409
|
var init_regionsFetch2 = __esm(() => {
|
|
70117
70410
|
init_regionsFetch();
|
|
70118
70411
|
init_operations();
|
|
70119
70412
|
init_tools();
|
|
70120
|
-
|
|
70413
|
+
args47 = {
|
|
70121
70414
|
request: GetRegionRequest$inboundSchema
|
|
70122
70415
|
};
|
|
70123
70416
|
tool$regionsFetch = {
|
|
70124
70417
|
name: "regions-fetch",
|
|
70125
70418
|
description: `Retrieve region`,
|
|
70126
|
-
args:
|
|
70127
|
-
tool: async (client,
|
|
70128
|
-
const [result, apiCall] = await regionsFetch(client,
|
|
70419
|
+
args: args47,
|
|
70420
|
+
tool: async (client, args48, ctx) => {
|
|
70421
|
+
const [result, apiCall] = await regionsFetch(client, args48.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
70129
70422
|
if (!result.ok) {
|
|
70130
70423
|
return {
|
|
70131
70424
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -70140,9 +70433,9 @@ var init_regionsFetch2 = __esm(() => {
|
|
|
70140
70433
|
|
|
70141
70434
|
// src/funcs/regionsGet.ts
|
|
70142
70435
|
function regionsGet(client, request, options) {
|
|
70143
|
-
return new APIPromise($
|
|
70436
|
+
return new APIPromise($do50(client, request, options));
|
|
70144
70437
|
}
|
|
70145
|
-
async function $
|
|
70438
|
+
async function $do50(client, request, options) {
|
|
70146
70439
|
const parsed = safeParse4(request, (value) => GetRegionsRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
70147
70440
|
if (!parsed.ok) {
|
|
70148
70441
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -70249,12 +70542,12 @@ var init_regionsGet = __esm(() => {
|
|
|
70249
70542
|
});
|
|
70250
70543
|
|
|
70251
70544
|
// src/mcp-server/tools/regionsGet.ts
|
|
70252
|
-
var
|
|
70545
|
+
var args48, tool$regionsGet;
|
|
70253
70546
|
var init_regionsGet2 = __esm(() => {
|
|
70254
70547
|
init_regionsGet();
|
|
70255
70548
|
init_operations();
|
|
70256
70549
|
init_tools();
|
|
70257
|
-
|
|
70550
|
+
args48 = {
|
|
70258
70551
|
request: GetRegionsRequest$inboundSchema.optional()
|
|
70259
70552
|
};
|
|
70260
70553
|
tool$regionsGet = {
|
|
@@ -70264,9 +70557,9 @@ var init_regionsGet2 = __esm(() => {
|
|
|
70264
70557
|
Lists all [available locations](https://latitude.sh/locations). For server availability by location, please see the [Plans API](/reference/get-plans).
|
|
70265
70558
|
|
|
70266
70559
|
`,
|
|
70267
|
-
args:
|
|
70268
|
-
tool: async (client,
|
|
70269
|
-
const [result, apiCall] = await regionsGet(client,
|
|
70560
|
+
args: args48,
|
|
70561
|
+
tool: async (client, args49, ctx) => {
|
|
70562
|
+
const [result, apiCall] = await regionsGet(client, args49.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
70270
70563
|
if (!result.ok) {
|
|
70271
70564
|
return {
|
|
70272
70565
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -70281,9 +70574,9 @@ Lists all [available locations](https://latitude.sh/locations). For server avail
|
|
|
70281
70574
|
|
|
70282
70575
|
// src/funcs/rolesGet.ts
|
|
70283
70576
|
function rolesGet(client, request, options) {
|
|
70284
|
-
return new APIPromise($
|
|
70577
|
+
return new APIPromise($do51(client, request, options));
|
|
70285
70578
|
}
|
|
70286
|
-
async function $
|
|
70579
|
+
async function $do51(client, request, options) {
|
|
70287
70580
|
const parsed = safeParse4(request, (value) => GetRoleIdRequest$outboundSchema.parse(value), "Input validation failed");
|
|
70288
70581
|
if (!parsed.ok) {
|
|
70289
70582
|
return [parsed, { status: "invalid" }];
|
|
@@ -70358,20 +70651,20 @@ var init_rolesGet = __esm(() => {
|
|
|
70358
70651
|
});
|
|
70359
70652
|
|
|
70360
70653
|
// src/mcp-server/tools/rolesGet.ts
|
|
70361
|
-
var
|
|
70654
|
+
var args49, tool$rolesGet;
|
|
70362
70655
|
var init_rolesGet2 = __esm(() => {
|
|
70363
70656
|
init_rolesGet();
|
|
70364
70657
|
init_operations();
|
|
70365
70658
|
init_tools();
|
|
70366
|
-
|
|
70659
|
+
args49 = {
|
|
70367
70660
|
request: GetRoleIdRequest$inboundSchema
|
|
70368
70661
|
};
|
|
70369
70662
|
tool$rolesGet = {
|
|
70370
70663
|
name: "roles-get",
|
|
70371
70664
|
description: `Retrieve role`,
|
|
70372
|
-
args:
|
|
70373
|
-
tool: async (client,
|
|
70374
|
-
const [result, apiCall] = await rolesGet(client,
|
|
70665
|
+
args: args49,
|
|
70666
|
+
tool: async (client, args50, ctx) => {
|
|
70667
|
+
const [result, apiCall] = await rolesGet(client, args50.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
70375
70668
|
if (!result.ok) {
|
|
70376
70669
|
return {
|
|
70377
70670
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -70386,9 +70679,9 @@ var init_rolesGet2 = __esm(() => {
|
|
|
70386
70679
|
|
|
70387
70680
|
// src/funcs/rolesList.ts
|
|
70388
70681
|
function rolesList(client, request, options) {
|
|
70389
|
-
return new APIPromise($
|
|
70682
|
+
return new APIPromise($do52(client, request, options));
|
|
70390
70683
|
}
|
|
70391
|
-
async function $
|
|
70684
|
+
async function $do52(client, request, options) {
|
|
70392
70685
|
const parsed = safeParse4(request, (value) => GetRolesRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
70393
70686
|
if (!parsed.ok) {
|
|
70394
70687
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -70495,12 +70788,12 @@ var init_rolesList = __esm(() => {
|
|
|
70495
70788
|
});
|
|
70496
70789
|
|
|
70497
70790
|
// src/mcp-server/tools/rolesList.ts
|
|
70498
|
-
var
|
|
70791
|
+
var args50, tool$rolesList;
|
|
70499
70792
|
var init_rolesList2 = __esm(() => {
|
|
70500
70793
|
init_rolesList();
|
|
70501
70794
|
init_operations();
|
|
70502
70795
|
init_tools();
|
|
70503
|
-
|
|
70796
|
+
args50 = {
|
|
70504
70797
|
request: GetRolesRequest$inboundSchema.optional()
|
|
70505
70798
|
};
|
|
70506
70799
|
tool$rolesList = {
|
|
@@ -70509,9 +70802,9 @@ var init_rolesList2 = __esm(() => {
|
|
|
70509
70802
|
|
|
70510
70803
|
Returns a list of all roles that can be assigned to users
|
|
70511
70804
|
`,
|
|
70512
|
-
args:
|
|
70513
|
-
tool: async (client,
|
|
70514
|
-
const [result, apiCall] = await rolesList(client,
|
|
70805
|
+
args: args50,
|
|
70806
|
+
tool: async (client, args51, ctx) => {
|
|
70807
|
+
const [result, apiCall] = await rolesList(client, args51.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
70515
70808
|
if (!result.ok) {
|
|
70516
70809
|
return {
|
|
70517
70810
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -70526,9 +70819,9 @@ Returns a list of all roles that can be assigned to users
|
|
|
70526
70819
|
|
|
70527
70820
|
// src/funcs/serversCreate.ts
|
|
70528
70821
|
function serversCreate(client, request, options) {
|
|
70529
|
-
return new APIPromise($
|
|
70822
|
+
return new APIPromise($do53(client, request, options));
|
|
70530
70823
|
}
|
|
70531
|
-
async function $
|
|
70824
|
+
async function $do53(client, request, options) {
|
|
70532
70825
|
const parsed = safeParse4(request, (value) => CreateServerRequest$outboundSchema.parse(value), "Input validation failed");
|
|
70533
70826
|
if (!parsed.ok) {
|
|
70534
70827
|
return [parsed, { status: "invalid" }];
|
|
@@ -70598,20 +70891,20 @@ var init_serversCreate = __esm(() => {
|
|
|
70598
70891
|
});
|
|
70599
70892
|
|
|
70600
70893
|
// src/mcp-server/tools/serversCreate.ts
|
|
70601
|
-
var
|
|
70894
|
+
var args51, tool$serversCreate;
|
|
70602
70895
|
var init_serversCreate2 = __esm(() => {
|
|
70603
70896
|
init_serversCreate();
|
|
70604
70897
|
init_operations();
|
|
70605
70898
|
init_tools();
|
|
70606
|
-
|
|
70899
|
+
args51 = {
|
|
70607
70900
|
request: CreateServerRequest$inboundSchema
|
|
70608
70901
|
};
|
|
70609
70902
|
tool$serversCreate = {
|
|
70610
70903
|
name: "servers-create",
|
|
70611
70904
|
description: `Create server`,
|
|
70612
|
-
args:
|
|
70613
|
-
tool: async (client,
|
|
70614
|
-
const [result, apiCall] = await serversCreate(client,
|
|
70905
|
+
args: args51,
|
|
70906
|
+
tool: async (client, args52, ctx) => {
|
|
70907
|
+
const [result, apiCall] = await serversCreate(client, args52.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
70615
70908
|
if (!result.ok) {
|
|
70616
70909
|
return {
|
|
70617
70910
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -70626,9 +70919,9 @@ var init_serversCreate2 = __esm(() => {
|
|
|
70626
70919
|
|
|
70627
70920
|
// src/funcs/serversCreateIpmiSession.ts
|
|
70628
70921
|
function serversCreateIpmiSession(client, request, options) {
|
|
70629
|
-
return new APIPromise($
|
|
70922
|
+
return new APIPromise($do54(client, request, options));
|
|
70630
70923
|
}
|
|
70631
|
-
async function $
|
|
70924
|
+
async function $do54(client, request, options) {
|
|
70632
70925
|
const parsed = safeParse4(request, (value) => CreateIpmiSessionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
70633
70926
|
if (!parsed.ok) {
|
|
70634
70927
|
return [parsed, { status: "invalid" }];
|
|
@@ -70703,12 +70996,12 @@ var init_serversCreateIpmiSession = __esm(() => {
|
|
|
70703
70996
|
});
|
|
70704
70997
|
|
|
70705
70998
|
// src/mcp-server/tools/serversCreateIpmiSession.ts
|
|
70706
|
-
var
|
|
70999
|
+
var args52, tool$serversCreateIpmiSession;
|
|
70707
71000
|
var init_serversCreateIpmiSession2 = __esm(() => {
|
|
70708
71001
|
init_serversCreateIpmiSession();
|
|
70709
71002
|
init_operations();
|
|
70710
71003
|
init_tools();
|
|
70711
|
-
|
|
71004
|
+
args52 = {
|
|
70712
71005
|
request: CreateIpmiSessionRequest$inboundSchema
|
|
70713
71006
|
};
|
|
70714
71007
|
tool$serversCreateIpmiSession = {
|
|
@@ -70720,9 +71013,9 @@ You will have to use a VPN client such as https://openvpn.net to connect. See \`
|
|
|
70720
71013
|
|
|
70721
71014
|
Related guide: https://docs.latitude.sh/docs/ipmi
|
|
70722
71015
|
`,
|
|
70723
|
-
args:
|
|
70724
|
-
tool: async (client,
|
|
70725
|
-
const [result, apiCall] = await serversCreateIpmiSession(client,
|
|
71016
|
+
args: args52,
|
|
71017
|
+
tool: async (client, args53, ctx) => {
|
|
71018
|
+
const [result, apiCall] = await serversCreateIpmiSession(client, args53.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
70726
71019
|
if (!result.ok) {
|
|
70727
71020
|
return {
|
|
70728
71021
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -70737,9 +71030,9 @@ Related guide: https://docs.latitude.sh/docs/ipmi
|
|
|
70737
71030
|
|
|
70738
71031
|
// src/funcs/serversDelete.ts
|
|
70739
71032
|
function serversDelete(client, request, options) {
|
|
70740
|
-
return new APIPromise($
|
|
71033
|
+
return new APIPromise($do55(client, request, options));
|
|
70741
71034
|
}
|
|
70742
|
-
async function $
|
|
71035
|
+
async function $do55(client, request, options) {
|
|
70743
71036
|
const parsed = safeParse4(request, (value) => DestroyServerRequest$outboundSchema.parse(value), "Input validation failed");
|
|
70744
71037
|
if (!parsed.ok) {
|
|
70745
71038
|
return [parsed, { status: "invalid" }];
|
|
@@ -70816,20 +71109,20 @@ var init_serversDelete = __esm(() => {
|
|
|
70816
71109
|
});
|
|
70817
71110
|
|
|
70818
71111
|
// src/mcp-server/tools/serversDelete.ts
|
|
70819
|
-
var
|
|
71112
|
+
var args53, tool$serversDelete;
|
|
70820
71113
|
var init_serversDelete2 = __esm(() => {
|
|
70821
71114
|
init_serversDelete();
|
|
70822
71115
|
init_operations();
|
|
70823
71116
|
init_tools();
|
|
70824
|
-
|
|
71117
|
+
args53 = {
|
|
70825
71118
|
request: DestroyServerRequest$inboundSchema
|
|
70826
71119
|
};
|
|
70827
71120
|
tool$serversDelete = {
|
|
70828
71121
|
name: "servers-delete",
|
|
70829
71122
|
description: `Remove server`,
|
|
70830
|
-
args:
|
|
70831
|
-
tool: async (client,
|
|
70832
|
-
const [result, apiCall] = await serversDelete(client,
|
|
71123
|
+
args: args53,
|
|
71124
|
+
tool: async (client, args54, ctx) => {
|
|
71125
|
+
const [result, apiCall] = await serversDelete(client, args54.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
70833
71126
|
if (!result.ok) {
|
|
70834
71127
|
return {
|
|
70835
71128
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -70843,9 +71136,9 @@ var init_serversDelete2 = __esm(() => {
|
|
|
70843
71136
|
|
|
70844
71137
|
// src/funcs/serversExitRescueMode.ts
|
|
70845
71138
|
function serversExitRescueMode(client, request, options) {
|
|
70846
|
-
return new APIPromise($
|
|
71139
|
+
return new APIPromise($do56(client, request, options));
|
|
70847
71140
|
}
|
|
70848
|
-
async function $
|
|
71141
|
+
async function $do56(client, request, options) {
|
|
70849
71142
|
const parsed = safeParse4(request, (value) => ServerExitRescueModeRequest$outboundSchema.parse(value), "Input validation failed");
|
|
70850
71143
|
if (!parsed.ok) {
|
|
70851
71144
|
return [parsed, { status: "invalid" }];
|
|
@@ -70920,12 +71213,12 @@ var init_serversExitRescueMode = __esm(() => {
|
|
|
70920
71213
|
});
|
|
70921
71214
|
|
|
70922
71215
|
// src/mcp-server/tools/serversExitRescueMode.ts
|
|
70923
|
-
var
|
|
71216
|
+
var args54, tool$serversExitRescueMode;
|
|
70924
71217
|
var init_serversExitRescueMode2 = __esm(() => {
|
|
70925
71218
|
init_serversExitRescueMode();
|
|
70926
71219
|
init_operations();
|
|
70927
71220
|
init_tools();
|
|
70928
|
-
|
|
71221
|
+
args54 = {
|
|
70929
71222
|
request: ServerExitRescueModeRequest$inboundSchema
|
|
70930
71223
|
};
|
|
70931
71224
|
tool$serversExitRescueMode = {
|
|
@@ -70933,9 +71226,9 @@ var init_serversExitRescueMode2 = __esm(() => {
|
|
|
70933
71226
|
description: `Exits rescue mode
|
|
70934
71227
|
|
|
70935
71228
|
Exits rescue mode on a given server.`,
|
|
70936
|
-
args:
|
|
70937
|
-
tool: async (client,
|
|
70938
|
-
const [result, apiCall] = await serversExitRescueMode(client,
|
|
71229
|
+
args: args54,
|
|
71230
|
+
tool: async (client, args55, ctx) => {
|
|
71231
|
+
const [result, apiCall] = await serversExitRescueMode(client, args55.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
70939
71232
|
if (!result.ok) {
|
|
70940
71233
|
return {
|
|
70941
71234
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -70950,9 +71243,9 @@ Exits rescue mode on a given server.`,
|
|
|
70950
71243
|
|
|
70951
71244
|
// src/funcs/serversGet.ts
|
|
70952
71245
|
function serversGet(client, request, options) {
|
|
70953
|
-
return new APIPromise($
|
|
71246
|
+
return new APIPromise($do57(client, request, options));
|
|
70954
71247
|
}
|
|
70955
|
-
async function $
|
|
71248
|
+
async function $do57(client, request, options) {
|
|
70956
71249
|
const parsed = safeParse4(request, (value) => GetServerRequest$outboundSchema.parse(value), "Input validation failed");
|
|
70957
71250
|
if (!parsed.ok) {
|
|
70958
71251
|
return [parsed, { status: "invalid" }];
|
|
@@ -71031,12 +71324,12 @@ var init_serversGet = __esm(() => {
|
|
|
71031
71324
|
});
|
|
71032
71325
|
|
|
71033
71326
|
// src/mcp-server/tools/serversGet.ts
|
|
71034
|
-
var
|
|
71327
|
+
var args55, tool$serversGet;
|
|
71035
71328
|
var init_serversGet2 = __esm(() => {
|
|
71036
71329
|
init_serversGet();
|
|
71037
71330
|
init_operations();
|
|
71038
71331
|
init_tools();
|
|
71039
|
-
|
|
71332
|
+
args55 = {
|
|
71040
71333
|
request: GetServerRequest$inboundSchema
|
|
71041
71334
|
};
|
|
71042
71335
|
tool$serversGet = {
|
|
@@ -71045,9 +71338,9 @@ var init_serversGet2 = __esm(() => {
|
|
|
71045
71338
|
|
|
71046
71339
|
Returns a server that belongs to the team.
|
|
71047
71340
|
`,
|
|
71048
|
-
args:
|
|
71049
|
-
tool: async (client,
|
|
71050
|
-
const [result, apiCall] = await serversGet(client,
|
|
71341
|
+
args: args55,
|
|
71342
|
+
tool: async (client, args56, ctx) => {
|
|
71343
|
+
const [result, apiCall] = await serversGet(client, args56.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
71051
71344
|
if (!result.ok) {
|
|
71052
71345
|
return {
|
|
71053
71346
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -71062,9 +71355,9 @@ Returns a server that belongs to the team.
|
|
|
71062
71355
|
|
|
71063
71356
|
// src/funcs/serversGetDeployConfig.ts
|
|
71064
71357
|
function serversGetDeployConfig(client, request, options) {
|
|
71065
|
-
return new APIPromise($
|
|
71358
|
+
return new APIPromise($do58(client, request, options));
|
|
71066
71359
|
}
|
|
71067
|
-
async function $
|
|
71360
|
+
async function $do58(client, request, options) {
|
|
71068
71361
|
const parsed = safeParse4(request, (value) => GetServerDeployConfigRequest$outboundSchema.parse(value), "Input validation failed");
|
|
71069
71362
|
if (!parsed.ok) {
|
|
71070
71363
|
return [parsed, { status: "invalid" }];
|
|
@@ -71139,20 +71432,20 @@ var init_serversGetDeployConfig = __esm(() => {
|
|
|
71139
71432
|
});
|
|
71140
71433
|
|
|
71141
71434
|
// src/mcp-server/tools/serversGetDeployConfig.ts
|
|
71142
|
-
var
|
|
71435
|
+
var args56, tool$serversGetDeployConfig;
|
|
71143
71436
|
var init_serversGetDeployConfig2 = __esm(() => {
|
|
71144
71437
|
init_serversGetDeployConfig();
|
|
71145
71438
|
init_operations();
|
|
71146
71439
|
init_tools();
|
|
71147
|
-
|
|
71440
|
+
args56 = {
|
|
71148
71441
|
request: GetServerDeployConfigRequest$inboundSchema
|
|
71149
71442
|
};
|
|
71150
71443
|
tool$serversGetDeployConfig = {
|
|
71151
71444
|
name: "servers-get-deploy-config",
|
|
71152
71445
|
description: `Retrieve deploy config`,
|
|
71153
|
-
args:
|
|
71154
|
-
tool: async (client,
|
|
71155
|
-
const [result, apiCall] = await serversGetDeployConfig(client,
|
|
71446
|
+
args: args56,
|
|
71447
|
+
tool: async (client, args57, ctx) => {
|
|
71448
|
+
const [result, apiCall] = await serversGetDeployConfig(client, args57.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
71156
71449
|
if (!result.ok) {
|
|
71157
71450
|
return {
|
|
71158
71451
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -71167,9 +71460,9 @@ var init_serversGetDeployConfig2 = __esm(() => {
|
|
|
71167
71460
|
|
|
71168
71461
|
// src/funcs/serversGetOutOfBand.ts
|
|
71169
71462
|
function serversGetOutOfBand(client, request, options) {
|
|
71170
|
-
return new APIPromise($
|
|
71463
|
+
return new APIPromise($do59(client, request, options));
|
|
71171
71464
|
}
|
|
71172
|
-
async function $
|
|
71465
|
+
async function $do59(client, request, options) {
|
|
71173
71466
|
const parsed = safeParse4(request, (value) => GetServerOutOfBandRequest$outboundSchema.parse(value), "Input validation failed");
|
|
71174
71467
|
if (!parsed.ok) {
|
|
71175
71468
|
return [parsed, { status: "invalid" }];
|
|
@@ -71244,20 +71537,20 @@ var init_serversGetOutOfBand = __esm(() => {
|
|
|
71244
71537
|
});
|
|
71245
71538
|
|
|
71246
71539
|
// src/mcp-server/tools/serversGetOutOfBand.ts
|
|
71247
|
-
var
|
|
71540
|
+
var args57, tool$serversGetOutOfBand;
|
|
71248
71541
|
var init_serversGetOutOfBand2 = __esm(() => {
|
|
71249
71542
|
init_serversGetOutOfBand();
|
|
71250
71543
|
init_operations();
|
|
71251
71544
|
init_tools();
|
|
71252
|
-
|
|
71545
|
+
args57 = {
|
|
71253
71546
|
request: GetServerOutOfBandRequest$inboundSchema
|
|
71254
71547
|
};
|
|
71255
71548
|
tool$serversGetOutOfBand = {
|
|
71256
71549
|
name: "servers-get-out-of-band",
|
|
71257
71550
|
description: `List out-of-band connections`,
|
|
71258
|
-
args:
|
|
71259
|
-
tool: async (client,
|
|
71260
|
-
const [result, apiCall] = await serversGetOutOfBand(client,
|
|
71551
|
+
args: args57,
|
|
71552
|
+
tool: async (client, args58, ctx) => {
|
|
71553
|
+
const [result, apiCall] = await serversGetOutOfBand(client, args58.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
71261
71554
|
if (!result.ok) {
|
|
71262
71555
|
return {
|
|
71263
71556
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -71272,9 +71565,9 @@ var init_serversGetOutOfBand2 = __esm(() => {
|
|
|
71272
71565
|
|
|
71273
71566
|
// src/funcs/serversList.ts
|
|
71274
71567
|
function serversList(client, request, options) {
|
|
71275
|
-
return new APIPromise($
|
|
71568
|
+
return new APIPromise($do60(client, request, options));
|
|
71276
71569
|
}
|
|
71277
|
-
async function $
|
|
71570
|
+
async function $do60(client, request, options) {
|
|
71278
71571
|
const parsed = safeParse4(request, (value) => GetServersRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
71279
71572
|
if (!parsed.ok) {
|
|
71280
71573
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -71396,12 +71689,12 @@ var init_serversList = __esm(() => {
|
|
|
71396
71689
|
});
|
|
71397
71690
|
|
|
71398
71691
|
// src/mcp-server/tools/serversList.ts
|
|
71399
|
-
var
|
|
71692
|
+
var args58, tool$serversList;
|
|
71400
71693
|
var init_serversList2 = __esm(() => {
|
|
71401
71694
|
init_serversList();
|
|
71402
71695
|
init_operations();
|
|
71403
71696
|
init_tools();
|
|
71404
|
-
|
|
71697
|
+
args58 = {
|
|
71405
71698
|
request: GetServersRequest$inboundSchema.optional()
|
|
71406
71699
|
};
|
|
71407
71700
|
tool$serversList = {
|
|
@@ -71410,9 +71703,9 @@ var init_serversList2 = __esm(() => {
|
|
|
71410
71703
|
|
|
71411
71704
|
Returns a list of all servers belonging to the team.
|
|
71412
71705
|
`,
|
|
71413
|
-
args:
|
|
71414
|
-
tool: async (client,
|
|
71415
|
-
const [result, apiCall] = await serversList(client,
|
|
71706
|
+
args: args58,
|
|
71707
|
+
tool: async (client, args59, ctx) => {
|
|
71708
|
+
const [result, apiCall] = await serversList(client, args59.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
71416
71709
|
if (!result.ok) {
|
|
71417
71710
|
return {
|
|
71418
71711
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -71427,9 +71720,9 @@ Returns a list of all servers belonging to the team.
|
|
|
71427
71720
|
|
|
71428
71721
|
// src/funcs/serversLock.ts
|
|
71429
71722
|
function serversLock(client, request, options) {
|
|
71430
|
-
return new APIPromise($
|
|
71723
|
+
return new APIPromise($do61(client, request, options));
|
|
71431
71724
|
}
|
|
71432
|
-
async function $
|
|
71725
|
+
async function $do61(client, request, options) {
|
|
71433
71726
|
const parsed = safeParse4(request, (value) => ServerLockRequest$outboundSchema.parse(value), "Input validation failed");
|
|
71434
71727
|
if (!parsed.ok) {
|
|
71435
71728
|
return [parsed, { status: "invalid" }];
|
|
@@ -71504,12 +71797,12 @@ var init_serversLock = __esm(() => {
|
|
|
71504
71797
|
});
|
|
71505
71798
|
|
|
71506
71799
|
// src/mcp-server/tools/serversLock.ts
|
|
71507
|
-
var
|
|
71800
|
+
var args59, tool$serversLock;
|
|
71508
71801
|
var init_serversLock2 = __esm(() => {
|
|
71509
71802
|
init_serversLock();
|
|
71510
71803
|
init_operations();
|
|
71511
71804
|
init_tools();
|
|
71512
|
-
|
|
71805
|
+
args59 = {
|
|
71513
71806
|
request: ServerLockRequest$inboundSchema
|
|
71514
71807
|
};
|
|
71515
71808
|
tool$serversLock = {
|
|
@@ -71517,9 +71810,9 @@ var init_serversLock2 = __esm(() => {
|
|
|
71517
71810
|
description: `Lock server
|
|
71518
71811
|
|
|
71519
71812
|
Locks the server. A locked server cannot be deleted or modified and no actions can be performed on it.`,
|
|
71520
|
-
args:
|
|
71521
|
-
tool: async (client,
|
|
71522
|
-
const [result, apiCall] = await serversLock(client,
|
|
71813
|
+
args: args59,
|
|
71814
|
+
tool: async (client, args60, ctx) => {
|
|
71815
|
+
const [result, apiCall] = await serversLock(client, args60.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
71523
71816
|
if (!result.ok) {
|
|
71524
71817
|
return {
|
|
71525
71818
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -71534,9 +71827,9 @@ Locks the server. A locked server cannot be deleted or modified and no actions c
|
|
|
71534
71827
|
|
|
71535
71828
|
// src/funcs/serversReinstall.ts
|
|
71536
71829
|
function serversReinstall(client, request, options) {
|
|
71537
|
-
return new APIPromise($
|
|
71830
|
+
return new APIPromise($do62(client, request, options));
|
|
71538
71831
|
}
|
|
71539
|
-
async function $
|
|
71832
|
+
async function $do62(client, request, options) {
|
|
71540
71833
|
const parsed = safeParse4(request, (value) => CreateServerReinstallRequest$outboundSchema.parse(value), "Input validation failed");
|
|
71541
71834
|
if (!parsed.ok) {
|
|
71542
71835
|
return [parsed, { status: "invalid" }];
|
|
@@ -71610,20 +71903,20 @@ var init_serversReinstall = __esm(() => {
|
|
|
71610
71903
|
});
|
|
71611
71904
|
|
|
71612
71905
|
// src/mcp-server/tools/serversReinstall.ts
|
|
71613
|
-
var
|
|
71906
|
+
var args60, tool$serversReinstall;
|
|
71614
71907
|
var init_serversReinstall2 = __esm(() => {
|
|
71615
71908
|
init_serversReinstall();
|
|
71616
71909
|
init_operations();
|
|
71617
71910
|
init_tools();
|
|
71618
|
-
|
|
71911
|
+
args60 = {
|
|
71619
71912
|
request: CreateServerReinstallRequest$inboundSchema
|
|
71620
71913
|
};
|
|
71621
71914
|
tool$serversReinstall = {
|
|
71622
71915
|
name: "servers-reinstall",
|
|
71623
71916
|
description: `Run Server Reinstall`,
|
|
71624
|
-
args:
|
|
71625
|
-
tool: async (client,
|
|
71626
|
-
const [result, apiCall] = await serversReinstall(client,
|
|
71917
|
+
args: args60,
|
|
71918
|
+
tool: async (client, args61, ctx) => {
|
|
71919
|
+
const [result, apiCall] = await serversReinstall(client, args61.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
71627
71920
|
if (!result.ok) {
|
|
71628
71921
|
return {
|
|
71629
71922
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -71637,9 +71930,9 @@ var init_serversReinstall2 = __esm(() => {
|
|
|
71637
71930
|
|
|
71638
71931
|
// src/funcs/serversRunAction.ts
|
|
71639
71932
|
function serversRunAction(client, request, options) {
|
|
71640
|
-
return new APIPromise($
|
|
71933
|
+
return new APIPromise($do63(client, request, options));
|
|
71641
71934
|
}
|
|
71642
|
-
async function $
|
|
71935
|
+
async function $do63(client, request, options) {
|
|
71643
71936
|
const parsed = safeParse4(request, (value) => CreateServerActionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
71644
71937
|
if (!parsed.ok) {
|
|
71645
71938
|
return [parsed, { status: "invalid" }];
|
|
@@ -71715,12 +72008,12 @@ var init_serversRunAction = __esm(() => {
|
|
|
71715
72008
|
});
|
|
71716
72009
|
|
|
71717
72010
|
// src/mcp-server/tools/serversRunAction.ts
|
|
71718
|
-
var
|
|
72011
|
+
var args61, tool$serversRunAction;
|
|
71719
72012
|
var init_serversRunAction2 = __esm(() => {
|
|
71720
72013
|
init_serversRunAction();
|
|
71721
72014
|
init_operations();
|
|
71722
72015
|
init_tools();
|
|
71723
|
-
|
|
72016
|
+
args61 = {
|
|
71724
72017
|
request: CreateServerActionRequest$inboundSchema
|
|
71725
72018
|
};
|
|
71726
72019
|
tool$serversRunAction = {
|
|
@@ -71732,9 +72025,9 @@ Performs an action on a given server:
|
|
|
71732
72025
|
- \`power_off\`
|
|
71733
72026
|
- \`reboot\`
|
|
71734
72027
|
`,
|
|
71735
|
-
args:
|
|
71736
|
-
tool: async (client,
|
|
71737
|
-
const [result, apiCall] = await serversRunAction(client,
|
|
72028
|
+
args: args61,
|
|
72029
|
+
tool: async (client, args62, ctx) => {
|
|
72030
|
+
const [result, apiCall] = await serversRunAction(client, args62.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
71738
72031
|
if (!result.ok) {
|
|
71739
72032
|
return {
|
|
71740
72033
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -71749,9 +72042,9 @@ Performs an action on a given server:
|
|
|
71749
72042
|
|
|
71750
72043
|
// src/funcs/serversScheduleDeletion.ts
|
|
71751
72044
|
function serversScheduleDeletion(client, request, options) {
|
|
71752
|
-
return new APIPromise($
|
|
72045
|
+
return new APIPromise($do64(client, request, options));
|
|
71753
72046
|
}
|
|
71754
|
-
async function $
|
|
72047
|
+
async function $do64(client, request, options) {
|
|
71755
72048
|
const parsed = safeParse4(request, (value) => ServerScheduleDeletionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
71756
72049
|
if (!parsed.ok) {
|
|
71757
72050
|
return [parsed, { status: "invalid" }];
|
|
@@ -71826,12 +72119,12 @@ var init_serversScheduleDeletion = __esm(() => {
|
|
|
71826
72119
|
});
|
|
71827
72120
|
|
|
71828
72121
|
// src/mcp-server/tools/serversScheduleDeletion.ts
|
|
71829
|
-
var
|
|
72122
|
+
var args62, tool$serversScheduleDeletion;
|
|
71830
72123
|
var init_serversScheduleDeletion2 = __esm(() => {
|
|
71831
72124
|
init_serversScheduleDeletion();
|
|
71832
72125
|
init_operations();
|
|
71833
72126
|
init_tools();
|
|
71834
|
-
|
|
72127
|
+
args62 = {
|
|
71835
72128
|
request: ServerScheduleDeletionRequest$inboundSchema
|
|
71836
72129
|
};
|
|
71837
72130
|
tool$serversScheduleDeletion = {
|
|
@@ -71839,9 +72132,9 @@ var init_serversScheduleDeletion2 = __esm(() => {
|
|
|
71839
72132
|
description: `Schedule server deletion
|
|
71840
72133
|
|
|
71841
72134
|
Schedules the server to be removed at the end of the billing cycle.`,
|
|
71842
|
-
args:
|
|
71843
|
-
tool: async (client,
|
|
71844
|
-
const [result, apiCall] = await serversScheduleDeletion(client,
|
|
72135
|
+
args: args62,
|
|
72136
|
+
tool: async (client, args63, ctx) => {
|
|
72137
|
+
const [result, apiCall] = await serversScheduleDeletion(client, args63.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
71845
72138
|
if (!result.ok) {
|
|
71846
72139
|
return {
|
|
71847
72140
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -71856,9 +72149,9 @@ Schedules the server to be removed at the end of the billing cycle.`,
|
|
|
71856
72149
|
|
|
71857
72150
|
// src/funcs/serversStartOutOfBandConnection.ts
|
|
71858
72151
|
function serversStartOutOfBandConnection(client, request, options) {
|
|
71859
|
-
return new APIPromise($
|
|
72152
|
+
return new APIPromise($do65(client, request, options));
|
|
71860
72153
|
}
|
|
71861
|
-
async function $
|
|
72154
|
+
async function $do65(client, request, options) {
|
|
71862
72155
|
const parsed = safeParse4(request, (value) => CreateServerOutOfBandRequest$outboundSchema.parse(value), "Input validation failed");
|
|
71863
72156
|
if (!parsed.ok) {
|
|
71864
72157
|
return [parsed, { status: "invalid" }];
|
|
@@ -71934,20 +72227,20 @@ var init_serversStartOutOfBandConnection = __esm(() => {
|
|
|
71934
72227
|
});
|
|
71935
72228
|
|
|
71936
72229
|
// src/mcp-server/tools/serversStartOutOfBandConnection.ts
|
|
71937
|
-
var
|
|
72230
|
+
var args63, tool$serversStartOutOfBandConnection;
|
|
71938
72231
|
var init_serversStartOutOfBandConnection2 = __esm(() => {
|
|
71939
72232
|
init_serversStartOutOfBandConnection();
|
|
71940
72233
|
init_operations();
|
|
71941
72234
|
init_tools();
|
|
71942
|
-
|
|
72235
|
+
args63 = {
|
|
71943
72236
|
request: CreateServerOutOfBandRequest$inboundSchema
|
|
71944
72237
|
};
|
|
71945
72238
|
tool$serversStartOutOfBandConnection = {
|
|
71946
72239
|
name: "servers-start-out-of-band-connection",
|
|
71947
72240
|
description: `Create out-of-band connection`,
|
|
71948
|
-
args:
|
|
71949
|
-
tool: async (client,
|
|
71950
|
-
const [result, apiCall] = await serversStartOutOfBandConnection(client,
|
|
72241
|
+
args: args63,
|
|
72242
|
+
tool: async (client, args64, ctx) => {
|
|
72243
|
+
const [result, apiCall] = await serversStartOutOfBandConnection(client, args64.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
71951
72244
|
if (!result.ok) {
|
|
71952
72245
|
return {
|
|
71953
72246
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -71962,9 +72255,9 @@ var init_serversStartOutOfBandConnection2 = __esm(() => {
|
|
|
71962
72255
|
|
|
71963
72256
|
// src/funcs/serversStartRescueMode.ts
|
|
71964
72257
|
function serversStartRescueMode(client, request, options) {
|
|
71965
|
-
return new APIPromise($
|
|
72258
|
+
return new APIPromise($do66(client, request, options));
|
|
71966
72259
|
}
|
|
71967
|
-
async function $
|
|
72260
|
+
async function $do66(client, request, options) {
|
|
71968
72261
|
const parsed = safeParse4(request, (value) => ServerStartRescueModeRequest$outboundSchema.parse(value), "Input validation failed");
|
|
71969
72262
|
if (!parsed.ok) {
|
|
71970
72263
|
return [parsed, { status: "invalid" }];
|
|
@@ -72039,12 +72332,12 @@ var init_serversStartRescueMode = __esm(() => {
|
|
|
72039
72332
|
});
|
|
72040
72333
|
|
|
72041
72334
|
// src/mcp-server/tools/serversStartRescueMode.ts
|
|
72042
|
-
var
|
|
72335
|
+
var args64, tool$serversStartRescueMode;
|
|
72043
72336
|
var init_serversStartRescueMode2 = __esm(() => {
|
|
72044
72337
|
init_serversStartRescueMode();
|
|
72045
72338
|
init_operations();
|
|
72046
72339
|
init_tools();
|
|
72047
|
-
|
|
72340
|
+
args64 = {
|
|
72048
72341
|
request: ServerStartRescueModeRequest$inboundSchema
|
|
72049
72342
|
};
|
|
72050
72343
|
tool$serversStartRescueMode = {
|
|
@@ -72052,9 +72345,9 @@ var init_serversStartRescueMode2 = __esm(() => {
|
|
|
72052
72345
|
description: `Put server in rescue mode
|
|
72053
72346
|
|
|
72054
72347
|
Starts rescue mode on a given server.`,
|
|
72055
|
-
args:
|
|
72056
|
-
tool: async (client,
|
|
72057
|
-
const [result, apiCall] = await serversStartRescueMode(client,
|
|
72348
|
+
args: args64,
|
|
72349
|
+
tool: async (client, args65, ctx) => {
|
|
72350
|
+
const [result, apiCall] = await serversStartRescueMode(client, args65.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
72058
72351
|
if (!result.ok) {
|
|
72059
72352
|
return {
|
|
72060
72353
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -72069,9 +72362,9 @@ Starts rescue mode on a given server.`,
|
|
|
72069
72362
|
|
|
72070
72363
|
// src/funcs/serversUnlock.ts
|
|
72071
72364
|
function serversUnlock(client, request, options) {
|
|
72072
|
-
return new APIPromise($
|
|
72365
|
+
return new APIPromise($do67(client, request, options));
|
|
72073
72366
|
}
|
|
72074
|
-
async function $
|
|
72367
|
+
async function $do67(client, request, options) {
|
|
72075
72368
|
const parsed = safeParse4(request, (value) => ServerUnlockRequest$outboundSchema.parse(value), "Input validation failed");
|
|
72076
72369
|
if (!parsed.ok) {
|
|
72077
72370
|
return [parsed, { status: "invalid" }];
|
|
@@ -72146,12 +72439,12 @@ var init_serversUnlock = __esm(() => {
|
|
|
72146
72439
|
});
|
|
72147
72440
|
|
|
72148
72441
|
// src/mcp-server/tools/serversUnlock.ts
|
|
72149
|
-
var
|
|
72442
|
+
var args65, tool$serversUnlock;
|
|
72150
72443
|
var init_serversUnlock2 = __esm(() => {
|
|
72151
72444
|
init_serversUnlock();
|
|
72152
72445
|
init_operations();
|
|
72153
72446
|
init_tools();
|
|
72154
|
-
|
|
72447
|
+
args65 = {
|
|
72155
72448
|
request: ServerUnlockRequest$inboundSchema
|
|
72156
72449
|
};
|
|
72157
72450
|
tool$serversUnlock = {
|
|
@@ -72159,9 +72452,9 @@ var init_serversUnlock2 = __esm(() => {
|
|
|
72159
72452
|
description: `Unlock server
|
|
72160
72453
|
|
|
72161
72454
|
Unlocks the server. A locked server cannot be deleted or modified and no actions can be performed on it.`,
|
|
72162
|
-
args:
|
|
72163
|
-
tool: async (client,
|
|
72164
|
-
const [result, apiCall] = await serversUnlock(client,
|
|
72455
|
+
args: args65,
|
|
72456
|
+
tool: async (client, args66, ctx) => {
|
|
72457
|
+
const [result, apiCall] = await serversUnlock(client, args66.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
72165
72458
|
if (!result.ok) {
|
|
72166
72459
|
return {
|
|
72167
72460
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -72176,9 +72469,9 @@ Unlocks the server. A locked server cannot be deleted or modified and no actions
|
|
|
72176
72469
|
|
|
72177
72470
|
// src/funcs/serversUnscheduleDeletion.ts
|
|
72178
72471
|
function serversUnscheduleDeletion(client, request, options) {
|
|
72179
|
-
return new APIPromise($
|
|
72472
|
+
return new APIPromise($do68(client, request, options));
|
|
72180
72473
|
}
|
|
72181
|
-
async function $
|
|
72474
|
+
async function $do68(client, request, options) {
|
|
72182
72475
|
const parsed = safeParse4(request, (value) => ServerUnscheduleDeletionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
72183
72476
|
if (!parsed.ok) {
|
|
72184
72477
|
return [parsed, { status: "invalid" }];
|
|
@@ -72251,12 +72544,12 @@ var init_serversUnscheduleDeletion = __esm(() => {
|
|
|
72251
72544
|
});
|
|
72252
72545
|
|
|
72253
72546
|
// src/mcp-server/tools/serversUnscheduleDeletion.ts
|
|
72254
|
-
var
|
|
72547
|
+
var args66, tool$serversUnscheduleDeletion;
|
|
72255
72548
|
var init_serversUnscheduleDeletion2 = __esm(() => {
|
|
72256
72549
|
init_serversUnscheduleDeletion();
|
|
72257
72550
|
init_operations();
|
|
72258
72551
|
init_tools();
|
|
72259
|
-
|
|
72552
|
+
args66 = {
|
|
72260
72553
|
request: ServerUnscheduleDeletionRequest$inboundSchema
|
|
72261
72554
|
};
|
|
72262
72555
|
tool$serversUnscheduleDeletion = {
|
|
@@ -72264,9 +72557,9 @@ var init_serversUnscheduleDeletion2 = __esm(() => {
|
|
|
72264
72557
|
description: `Unschedule server deletion
|
|
72265
72558
|
|
|
72266
72559
|
Unschedules the server removal at the end of the billing cycle.`,
|
|
72267
|
-
args:
|
|
72268
|
-
tool: async (client,
|
|
72269
|
-
const [result, apiCall] = await serversUnscheduleDeletion(client,
|
|
72560
|
+
args: args66,
|
|
72561
|
+
tool: async (client, args67, ctx) => {
|
|
72562
|
+
const [result, apiCall] = await serversUnscheduleDeletion(client, args67.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
72270
72563
|
if (!result.ok) {
|
|
72271
72564
|
return {
|
|
72272
72565
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -72280,9 +72573,9 @@ Unschedules the server removal at the end of the billing cycle.`,
|
|
|
72280
72573
|
|
|
72281
72574
|
// src/funcs/serversUpdate.ts
|
|
72282
72575
|
function serversUpdate(client, request, options) {
|
|
72283
|
-
return new APIPromise($
|
|
72576
|
+
return new APIPromise($do69(client, request, options));
|
|
72284
72577
|
}
|
|
72285
|
-
async function $
|
|
72578
|
+
async function $do69(client, request, options) {
|
|
72286
72579
|
const parsed = safeParse4(request, (value) => UpdateServerRequest$outboundSchema.parse(value), "Input validation failed");
|
|
72287
72580
|
if (!parsed.ok) {
|
|
72288
72581
|
return [parsed, { status: "invalid" }];
|
|
@@ -72358,20 +72651,20 @@ var init_serversUpdate = __esm(() => {
|
|
|
72358
72651
|
});
|
|
72359
72652
|
|
|
72360
72653
|
// src/mcp-server/tools/serversUpdate.ts
|
|
72361
|
-
var
|
|
72654
|
+
var args67, tool$serversUpdate;
|
|
72362
72655
|
var init_serversUpdate2 = __esm(() => {
|
|
72363
72656
|
init_serversUpdate();
|
|
72364
72657
|
init_operations();
|
|
72365
72658
|
init_tools();
|
|
72366
|
-
|
|
72659
|
+
args67 = {
|
|
72367
72660
|
request: UpdateServerRequest$inboundSchema
|
|
72368
72661
|
};
|
|
72369
72662
|
tool$serversUpdate = {
|
|
72370
72663
|
name: "servers-update",
|
|
72371
72664
|
description: `Update server`,
|
|
72372
|
-
args:
|
|
72373
|
-
tool: async (client,
|
|
72374
|
-
const [result, apiCall] = await serversUpdate(client,
|
|
72665
|
+
args: args67,
|
|
72666
|
+
tool: async (client, args68, ctx) => {
|
|
72667
|
+
const [result, apiCall] = await serversUpdate(client, args68.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
72375
72668
|
if (!result.ok) {
|
|
72376
72669
|
return {
|
|
72377
72670
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -72386,9 +72679,9 @@ var init_serversUpdate2 = __esm(() => {
|
|
|
72386
72679
|
|
|
72387
72680
|
// src/funcs/serversUpdateDeployConfig.ts
|
|
72388
72681
|
function serversUpdateDeployConfig(client, request, options) {
|
|
72389
|
-
return new APIPromise($
|
|
72682
|
+
return new APIPromise($do70(client, request, options));
|
|
72390
72683
|
}
|
|
72391
|
-
async function $
|
|
72684
|
+
async function $do70(client, request, options) {
|
|
72392
72685
|
const parsed = safeParse4(request, (value) => UpdateServerDeployConfigRequest$outboundSchema.parse(value), "Input validation failed");
|
|
72393
72686
|
if (!parsed.ok) {
|
|
72394
72687
|
return [parsed, { status: "invalid" }];
|
|
@@ -72464,20 +72757,20 @@ var init_serversUpdateDeployConfig = __esm(() => {
|
|
|
72464
72757
|
});
|
|
72465
72758
|
|
|
72466
72759
|
// src/mcp-server/tools/serversUpdateDeployConfig.ts
|
|
72467
|
-
var
|
|
72760
|
+
var args68, tool$serversUpdateDeployConfig;
|
|
72468
72761
|
var init_serversUpdateDeployConfig2 = __esm(() => {
|
|
72469
72762
|
init_serversUpdateDeployConfig();
|
|
72470
72763
|
init_operations();
|
|
72471
72764
|
init_tools();
|
|
72472
|
-
|
|
72765
|
+
args68 = {
|
|
72473
72766
|
request: UpdateServerDeployConfigRequest$inboundSchema
|
|
72474
72767
|
};
|
|
72475
72768
|
tool$serversUpdateDeployConfig = {
|
|
72476
72769
|
name: "servers-update-deploy-config",
|
|
72477
72770
|
description: `Update deploy config`,
|
|
72478
|
-
args:
|
|
72479
|
-
tool: async (client,
|
|
72480
|
-
const [result, apiCall] = await serversUpdateDeployConfig(client,
|
|
72771
|
+
args: args68,
|
|
72772
|
+
tool: async (client, args69, ctx) => {
|
|
72773
|
+
const [result, apiCall] = await serversUpdateDeployConfig(client, args69.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
72481
72774
|
if (!result.ok) {
|
|
72482
72775
|
return {
|
|
72483
72776
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -72492,9 +72785,9 @@ var init_serversUpdateDeployConfig2 = __esm(() => {
|
|
|
72492
72785
|
|
|
72493
72786
|
// src/funcs/sshKeysCreate.ts
|
|
72494
72787
|
function sshKeysCreate(client, request, options) {
|
|
72495
|
-
return new APIPromise($
|
|
72788
|
+
return new APIPromise($do71(client, request, options));
|
|
72496
72789
|
}
|
|
72497
|
-
async function $
|
|
72790
|
+
async function $do71(client, request, options) {
|
|
72498
72791
|
const parsed = safeParse4(request, (value) => PostSshKeyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
72499
72792
|
if (!parsed.ok) {
|
|
72500
72793
|
return [parsed, { status: "invalid" }];
|
|
@@ -72563,12 +72856,12 @@ var init_sshKeysCreate = __esm(() => {
|
|
|
72563
72856
|
});
|
|
72564
72857
|
|
|
72565
72858
|
// src/mcp-server/tools/sshKeysCreate.ts
|
|
72566
|
-
var
|
|
72859
|
+
var args69, tool$sshKeysCreate;
|
|
72567
72860
|
var init_sshKeysCreate2 = __esm(() => {
|
|
72568
72861
|
init_sshKeysCreate();
|
|
72569
72862
|
init_operations();
|
|
72570
72863
|
init_tools();
|
|
72571
|
-
|
|
72864
|
+
args69 = {
|
|
72572
72865
|
request: PostSshKeyRequest$inboundSchema
|
|
72573
72866
|
};
|
|
72574
72867
|
tool$sshKeysCreate = {
|
|
@@ -72577,9 +72870,9 @@ var init_sshKeysCreate2 = __esm(() => {
|
|
|
72577
72870
|
|
|
72578
72871
|
Allows you create SSH Keys. These keys can be used to access servers after deploy and reinstall actions.
|
|
72579
72872
|
`,
|
|
72580
|
-
args:
|
|
72581
|
-
tool: async (client,
|
|
72582
|
-
const [result, apiCall] = await sshKeysCreate(client,
|
|
72873
|
+
args: args69,
|
|
72874
|
+
tool: async (client, args70, ctx) => {
|
|
72875
|
+
const [result, apiCall] = await sshKeysCreate(client, args70.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
72583
72876
|
if (!result.ok) {
|
|
72584
72877
|
return {
|
|
72585
72878
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -72594,9 +72887,9 @@ Allows you create SSH Keys. These keys can be used to access servers after deplo
|
|
|
72594
72887
|
|
|
72595
72888
|
// src/funcs/sshKeysDelete.ts
|
|
72596
72889
|
function sshKeysDelete(client, request, options) {
|
|
72597
|
-
return new APIPromise($
|
|
72890
|
+
return new APIPromise($do72(client, request, options));
|
|
72598
72891
|
}
|
|
72599
|
-
async function $
|
|
72892
|
+
async function $do72(client, request, options) {
|
|
72600
72893
|
const parsed = safeParse4(request, (value) => DeleteSshKeyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
72601
72894
|
if (!parsed.ok) {
|
|
72602
72895
|
return [parsed, { status: "invalid" }];
|
|
@@ -72669,12 +72962,12 @@ var init_sshKeysDelete = __esm(() => {
|
|
|
72669
72962
|
});
|
|
72670
72963
|
|
|
72671
72964
|
// src/mcp-server/tools/sshKeysDelete.ts
|
|
72672
|
-
var
|
|
72965
|
+
var args70, tool$sshKeysDelete;
|
|
72673
72966
|
var init_sshKeysDelete2 = __esm(() => {
|
|
72674
72967
|
init_sshKeysDelete();
|
|
72675
72968
|
init_operations();
|
|
72676
72969
|
init_tools();
|
|
72677
|
-
|
|
72970
|
+
args70 = {
|
|
72678
72971
|
request: DeleteSshKeyRequest$inboundSchema
|
|
72679
72972
|
};
|
|
72680
72973
|
tool$sshKeysDelete = {
|
|
@@ -72683,9 +72976,9 @@ var init_sshKeysDelete2 = __esm(() => {
|
|
|
72683
72976
|
|
|
72684
72977
|
Allows you remove SSH Keys in a project. Remove a SSH Key from the project won't revoke the SSH Keys access for previously deploy and reinstall actions.
|
|
72685
72978
|
`,
|
|
72686
|
-
args:
|
|
72687
|
-
tool: async (client,
|
|
72688
|
-
const [result, apiCall] = await sshKeysDelete(client,
|
|
72979
|
+
args: args70,
|
|
72980
|
+
tool: async (client, args71, ctx) => {
|
|
72981
|
+
const [result, apiCall] = await sshKeysDelete(client, args71.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
72689
72982
|
if (!result.ok) {
|
|
72690
72983
|
return {
|
|
72691
72984
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -72699,9 +72992,9 @@ Allows you remove SSH Keys in a project. Remove a SSH Key from the project won't
|
|
|
72699
72992
|
|
|
72700
72993
|
// src/funcs/sshKeysGet.ts
|
|
72701
72994
|
function sshKeysGet(client, request, options) {
|
|
72702
|
-
return new APIPromise($
|
|
72995
|
+
return new APIPromise($do73(client, request, options));
|
|
72703
72996
|
}
|
|
72704
|
-
async function $
|
|
72997
|
+
async function $do73(client, request, options) {
|
|
72705
72998
|
const parsed = safeParse4(request, (value) => GetProjectSshKeyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
72706
72999
|
if (!parsed.ok) {
|
|
72707
73000
|
return [parsed, { status: "invalid" }];
|
|
@@ -72779,12 +73072,12 @@ var init_sshKeysGet = __esm(() => {
|
|
|
72779
73072
|
});
|
|
72780
73073
|
|
|
72781
73074
|
// src/mcp-server/tools/sshKeysGet.ts
|
|
72782
|
-
var
|
|
73075
|
+
var args71, tool$sshKeysGet;
|
|
72783
73076
|
var init_sshKeysGet2 = __esm(() => {
|
|
72784
73077
|
init_sshKeysGet();
|
|
72785
73078
|
init_operations();
|
|
72786
73079
|
init_tools();
|
|
72787
|
-
|
|
73080
|
+
args71 = {
|
|
72788
73081
|
request: GetProjectSshKeyRequest$inboundSchema
|
|
72789
73082
|
};
|
|
72790
73083
|
tool$sshKeysGet = {
|
|
@@ -72793,9 +73086,9 @@ var init_sshKeysGet2 = __esm(() => {
|
|
|
72793
73086
|
|
|
72794
73087
|
List all SSH Keys in the project. These keys can be used to access servers after deploy and reinstall actions.
|
|
72795
73088
|
`,
|
|
72796
|
-
args:
|
|
72797
|
-
tool: async (client,
|
|
72798
|
-
const [result, apiCall] = await sshKeysGet(client,
|
|
73089
|
+
args: args71,
|
|
73090
|
+
tool: async (client, args72, ctx) => {
|
|
73091
|
+
const [result, apiCall] = await sshKeysGet(client, args72.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
72799
73092
|
if (!result.ok) {
|
|
72800
73093
|
return {
|
|
72801
73094
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -72810,9 +73103,9 @@ List all SSH Keys in the project. These keys can be used to access servers after
|
|
|
72810
73103
|
|
|
72811
73104
|
// src/funcs/sshKeysList.ts
|
|
72812
73105
|
function sshKeysList(client, request, options) {
|
|
72813
|
-
return new APIPromise($
|
|
73106
|
+
return new APIPromise($do74(client, request, options));
|
|
72814
73107
|
}
|
|
72815
|
-
async function $
|
|
73108
|
+
async function $do74(client, request, options) {
|
|
72816
73109
|
const parsed = safeParse4(request, (value) => GetProjectSshKeysRequest$outboundSchema.parse(value), "Input validation failed");
|
|
72817
73110
|
if (!parsed.ok) {
|
|
72818
73111
|
return [parsed, { status: "invalid" }];
|
|
@@ -72891,12 +73184,12 @@ var init_sshKeysList = __esm(() => {
|
|
|
72891
73184
|
});
|
|
72892
73185
|
|
|
72893
73186
|
// src/mcp-server/tools/sshKeysList.ts
|
|
72894
|
-
var
|
|
73187
|
+
var args72, tool$sshKeysList;
|
|
72895
73188
|
var init_sshKeysList2 = __esm(() => {
|
|
72896
73189
|
init_sshKeysList();
|
|
72897
73190
|
init_operations();
|
|
72898
73191
|
init_tools();
|
|
72899
|
-
|
|
73192
|
+
args72 = {
|
|
72900
73193
|
request: GetProjectSshKeysRequest$inboundSchema
|
|
72901
73194
|
};
|
|
72902
73195
|
tool$sshKeysList = {
|
|
@@ -72905,9 +73198,9 @@ var init_sshKeysList2 = __esm(() => {
|
|
|
72905
73198
|
|
|
72906
73199
|
List all SSH Keys in the project. These keys can be used to access servers after deploy and reinstall actions.
|
|
72907
73200
|
`,
|
|
72908
|
-
args:
|
|
72909
|
-
tool: async (client,
|
|
72910
|
-
const [result, apiCall] = await sshKeysList(client,
|
|
73201
|
+
args: args72,
|
|
73202
|
+
tool: async (client, args73, ctx) => {
|
|
73203
|
+
const [result, apiCall] = await sshKeysList(client, args73.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
72911
73204
|
if (!result.ok) {
|
|
72912
73205
|
return {
|
|
72913
73206
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -72922,9 +73215,9 @@ List all SSH Keys in the project. These keys can be used to access servers after
|
|
|
72922
73215
|
|
|
72923
73216
|
// src/funcs/sshKeysListAll.ts
|
|
72924
73217
|
function sshKeysListAll(client, request, options) {
|
|
72925
|
-
return new APIPromise($
|
|
73218
|
+
return new APIPromise($do75(client, request, options));
|
|
72926
73219
|
}
|
|
72927
|
-
async function $
|
|
73220
|
+
async function $do75(client, request, options) {
|
|
72928
73221
|
const parsed = safeParse4(request, (value) => GetSshKeysRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
72929
73222
|
if (!parsed.ok) {
|
|
72930
73223
|
return [parsed, { status: "invalid" }];
|
|
@@ -72999,12 +73292,12 @@ var init_sshKeysListAll = __esm(() => {
|
|
|
72999
73292
|
});
|
|
73000
73293
|
|
|
73001
73294
|
// src/mcp-server/tools/sshKeysListAll.ts
|
|
73002
|
-
var
|
|
73295
|
+
var args73, tool$sshKeysListAll;
|
|
73003
73296
|
var init_sshKeysListAll2 = __esm(() => {
|
|
73004
73297
|
init_sshKeysListAll();
|
|
73005
73298
|
init_operations();
|
|
73006
73299
|
init_tools();
|
|
73007
|
-
|
|
73300
|
+
args73 = {
|
|
73008
73301
|
request: GetSshKeysRequest$inboundSchema.optional()
|
|
73009
73302
|
};
|
|
73010
73303
|
tool$sshKeysListAll = {
|
|
@@ -73013,9 +73306,9 @@ var init_sshKeysListAll2 = __esm(() => {
|
|
|
73013
73306
|
|
|
73014
73307
|
List all SSH Keys in the project. These keys can be used to access servers after deploy and reinstall actions.
|
|
73015
73308
|
`,
|
|
73016
|
-
args:
|
|
73017
|
-
tool: async (client,
|
|
73018
|
-
const [result, apiCall] = await sshKeysListAll(client,
|
|
73309
|
+
args: args73,
|
|
73310
|
+
tool: async (client, args74, ctx) => {
|
|
73311
|
+
const [result, apiCall] = await sshKeysListAll(client, args74.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73019
73312
|
if (!result.ok) {
|
|
73020
73313
|
return {
|
|
73021
73314
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -73030,9 +73323,9 @@ List all SSH Keys in the project. These keys can be used to access servers after
|
|
|
73030
73323
|
|
|
73031
73324
|
// src/funcs/sshKeysModifyProjectKey.ts
|
|
73032
73325
|
function sshKeysModifyProjectKey(client, request, options) {
|
|
73033
|
-
return new APIPromise($
|
|
73326
|
+
return new APIPromise($do76(client, request, options));
|
|
73034
73327
|
}
|
|
73035
|
-
async function $
|
|
73328
|
+
async function $do76(client, request, options) {
|
|
73036
73329
|
const parsed = safeParse4(request, (value) => PutProjectSshKeyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
73037
73330
|
if (!parsed.ok) {
|
|
73038
73331
|
return [parsed, { status: "invalid" }];
|
|
@@ -73111,12 +73404,12 @@ var init_sshKeysModifyProjectKey = __esm(() => {
|
|
|
73111
73404
|
});
|
|
73112
73405
|
|
|
73113
73406
|
// src/mcp-server/tools/sshKeysModifyProjectKey.ts
|
|
73114
|
-
var
|
|
73407
|
+
var args74, tool$sshKeysModifyProjectKey;
|
|
73115
73408
|
var init_sshKeysModifyProjectKey2 = __esm(() => {
|
|
73116
73409
|
init_sshKeysModifyProjectKey();
|
|
73117
73410
|
init_operations();
|
|
73118
73411
|
init_tools();
|
|
73119
|
-
|
|
73412
|
+
args74 = {
|
|
73120
73413
|
request: PutProjectSshKeyRequest$inboundSchema
|
|
73121
73414
|
};
|
|
73122
73415
|
tool$sshKeysModifyProjectKey = {
|
|
@@ -73125,9 +73418,9 @@ var init_sshKeysModifyProjectKey2 = __esm(() => {
|
|
|
73125
73418
|
|
|
73126
73419
|
Allow you update SSH Key in a project. These keys can be used to access servers after deploy and reinstall actions.
|
|
73127
73420
|
`,
|
|
73128
|
-
args:
|
|
73129
|
-
tool: async (client,
|
|
73130
|
-
const [result, apiCall] = await sshKeysModifyProjectKey(client,
|
|
73421
|
+
args: args74,
|
|
73422
|
+
tool: async (client, args75, ctx) => {
|
|
73423
|
+
const [result, apiCall] = await sshKeysModifyProjectKey(client, args75.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73131
73424
|
if (!result.ok) {
|
|
73132
73425
|
return {
|
|
73133
73426
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -73142,9 +73435,9 @@ Allow you update SSH Key in a project. These keys can be used to access servers
|
|
|
73142
73435
|
|
|
73143
73436
|
// src/funcs/sshKeysRemoveFromProject.ts
|
|
73144
73437
|
function sshKeysRemoveFromProject(client, request, options) {
|
|
73145
|
-
return new APIPromise($
|
|
73438
|
+
return new APIPromise($do77(client, request, options));
|
|
73146
73439
|
}
|
|
73147
|
-
async function $
|
|
73440
|
+
async function $do77(client, request, options) {
|
|
73148
73441
|
const parsed = safeParse4(request, (value) => DeleteProjectSshKeyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
73149
73442
|
if (!parsed.ok) {
|
|
73150
73443
|
return [parsed, { status: "invalid" }];
|
|
@@ -73221,12 +73514,12 @@ var init_sshKeysRemoveFromProject = __esm(() => {
|
|
|
73221
73514
|
});
|
|
73222
73515
|
|
|
73223
73516
|
// src/mcp-server/tools/sshKeysRemoveFromProject.ts
|
|
73224
|
-
var
|
|
73517
|
+
var args75, tool$sshKeysRemoveFromProject;
|
|
73225
73518
|
var init_sshKeysRemoveFromProject2 = __esm(() => {
|
|
73226
73519
|
init_sshKeysRemoveFromProject();
|
|
73227
73520
|
init_operations();
|
|
73228
73521
|
init_tools();
|
|
73229
|
-
|
|
73522
|
+
args75 = {
|
|
73230
73523
|
request: DeleteProjectSshKeyRequest$inboundSchema
|
|
73231
73524
|
};
|
|
73232
73525
|
tool$sshKeysRemoveFromProject = {
|
|
@@ -73235,9 +73528,9 @@ var init_sshKeysRemoveFromProject2 = __esm(() => {
|
|
|
73235
73528
|
|
|
73236
73529
|
Allow you remove SSH Keys in a project. Remove a SSH Key from the project won't revoke the SSH Keys access for previously deploy and reinstall actions.
|
|
73237
73530
|
`,
|
|
73238
|
-
args:
|
|
73239
|
-
tool: async (client,
|
|
73240
|
-
const [result, apiCall] = await sshKeysRemoveFromProject(client,
|
|
73531
|
+
args: args75,
|
|
73532
|
+
tool: async (client, args76, ctx) => {
|
|
73533
|
+
const [result, apiCall] = await sshKeysRemoveFromProject(client, args76.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73241
73534
|
if (!result.ok) {
|
|
73242
73535
|
return {
|
|
73243
73536
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -73251,9 +73544,9 @@ Allow you remove SSH Keys in a project. Remove a SSH Key from the project won't
|
|
|
73251
73544
|
|
|
73252
73545
|
// src/funcs/sshKeysRetrieve.ts
|
|
73253
73546
|
function sshKeysRetrieve(client, request, options) {
|
|
73254
|
-
return new APIPromise($
|
|
73547
|
+
return new APIPromise($do78(client, request, options));
|
|
73255
73548
|
}
|
|
73256
|
-
async function $
|
|
73549
|
+
async function $do78(client, request, options) {
|
|
73257
73550
|
const parsed = safeParse4(request, (value) => GetSshKeyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
73258
73551
|
if (!parsed.ok) {
|
|
73259
73552
|
return [parsed, { status: "invalid" }];
|
|
@@ -73327,12 +73620,12 @@ var init_sshKeysRetrieve = __esm(() => {
|
|
|
73327
73620
|
});
|
|
73328
73621
|
|
|
73329
73622
|
// src/mcp-server/tools/sshKeysRetrieve.ts
|
|
73330
|
-
var
|
|
73623
|
+
var args76, tool$sshKeysRetrieve;
|
|
73331
73624
|
var init_sshKeysRetrieve2 = __esm(() => {
|
|
73332
73625
|
init_sshKeysRetrieve();
|
|
73333
73626
|
init_operations();
|
|
73334
73627
|
init_tools();
|
|
73335
|
-
|
|
73628
|
+
args76 = {
|
|
73336
73629
|
request: GetSshKeyRequest$inboundSchema
|
|
73337
73630
|
};
|
|
73338
73631
|
tool$sshKeysRetrieve = {
|
|
@@ -73341,9 +73634,9 @@ var init_sshKeysRetrieve2 = __esm(() => {
|
|
|
73341
73634
|
|
|
73342
73635
|
List all SSH Keys in the project. These keys can be used to access servers after deploy and reinstall actions.
|
|
73343
73636
|
`,
|
|
73344
|
-
args:
|
|
73345
|
-
tool: async (client,
|
|
73346
|
-
const [result, apiCall] = await sshKeysRetrieve(client,
|
|
73637
|
+
args: args76,
|
|
73638
|
+
tool: async (client, args77, ctx) => {
|
|
73639
|
+
const [result, apiCall] = await sshKeysRetrieve(client, args77.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73347
73640
|
if (!result.ok) {
|
|
73348
73641
|
return {
|
|
73349
73642
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -73358,9 +73651,9 @@ List all SSH Keys in the project. These keys can be used to access servers after
|
|
|
73358
73651
|
|
|
73359
73652
|
// src/funcs/sshKeysUpdate.ts
|
|
73360
73653
|
function sshKeysUpdate(client, request, options) {
|
|
73361
|
-
return new APIPromise($
|
|
73654
|
+
return new APIPromise($do79(client, request, options));
|
|
73362
73655
|
}
|
|
73363
|
-
async function $
|
|
73656
|
+
async function $do79(client, request, options) {
|
|
73364
73657
|
const parsed = safeParse4(request, (value) => PutSshKeyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
73365
73658
|
if (!parsed.ok) {
|
|
73366
73659
|
return [parsed, { status: "invalid" }];
|
|
@@ -73435,12 +73728,12 @@ var init_sshKeysUpdate = __esm(() => {
|
|
|
73435
73728
|
});
|
|
73436
73729
|
|
|
73437
73730
|
// src/mcp-server/tools/sshKeysUpdate.ts
|
|
73438
|
-
var
|
|
73731
|
+
var args77, tool$sshKeysUpdate;
|
|
73439
73732
|
var init_sshKeysUpdate2 = __esm(() => {
|
|
73440
73733
|
init_sshKeysUpdate();
|
|
73441
73734
|
init_operations();
|
|
73442
73735
|
init_tools();
|
|
73443
|
-
|
|
73736
|
+
args77 = {
|
|
73444
73737
|
request: PutSshKeyRequest$inboundSchema
|
|
73445
73738
|
};
|
|
73446
73739
|
tool$sshKeysUpdate = {
|
|
@@ -73449,9 +73742,9 @@ var init_sshKeysUpdate2 = __esm(() => {
|
|
|
73449
73742
|
|
|
73450
73743
|
Allows you update SSH Key in a project. These keys can be used to access servers after deploy and reinstall actions.
|
|
73451
73744
|
`,
|
|
73452
|
-
args:
|
|
73453
|
-
tool: async (client,
|
|
73454
|
-
const [result, apiCall] = await sshKeysUpdate(client,
|
|
73745
|
+
args: args77,
|
|
73746
|
+
tool: async (client, args78, ctx) => {
|
|
73747
|
+
const [result, apiCall] = await sshKeysUpdate(client, args78.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73455
73748
|
if (!result.ok) {
|
|
73456
73749
|
return {
|
|
73457
73750
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -73466,9 +73759,9 @@ Allows you update SSH Key in a project. These keys can be used to access servers
|
|
|
73466
73759
|
|
|
73467
73760
|
// src/funcs/storageCreateFilesystem.ts
|
|
73468
73761
|
function storageCreateFilesystem(client, request, options) {
|
|
73469
|
-
return new APIPromise($
|
|
73762
|
+
return new APIPromise($do80(client, request, options));
|
|
73470
73763
|
}
|
|
73471
|
-
async function $
|
|
73764
|
+
async function $do80(client, request, options) {
|
|
73472
73765
|
const parsed = safeParse4(request, (value) => PostStorageFilesystemsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
73473
73766
|
if (!parsed.ok) {
|
|
73474
73767
|
return [parsed, { status: "invalid" }];
|
|
@@ -73543,12 +73836,12 @@ var init_storageCreateFilesystem = __esm(() => {
|
|
|
73543
73836
|
});
|
|
73544
73837
|
|
|
73545
73838
|
// src/mcp-server/tools/storageCreateFilesystem.ts
|
|
73546
|
-
var
|
|
73839
|
+
var args78, tool$storageCreateFilesystem;
|
|
73547
73840
|
var init_storageCreateFilesystem2 = __esm(() => {
|
|
73548
73841
|
init_storageCreateFilesystem();
|
|
73549
73842
|
init_operations();
|
|
73550
73843
|
init_tools();
|
|
73551
|
-
|
|
73844
|
+
args78 = {
|
|
73552
73845
|
request: PostStorageFilesystemsRequest$inboundSchema
|
|
73553
73846
|
};
|
|
73554
73847
|
tool$storageCreateFilesystem = {
|
|
@@ -73556,9 +73849,9 @@ var init_storageCreateFilesystem2 = __esm(() => {
|
|
|
73556
73849
|
description: `Create filesystem
|
|
73557
73850
|
|
|
73558
73851
|
Allows you to add persistent storage to a project. These filesystems can be used to store data across your servers.`,
|
|
73559
|
-
args:
|
|
73560
|
-
tool: async (client,
|
|
73561
|
-
const [result, apiCall] = await storageCreateFilesystem(client,
|
|
73852
|
+
args: args78,
|
|
73853
|
+
tool: async (client, args79, ctx) => {
|
|
73854
|
+
const [result, apiCall] = await storageCreateFilesystem(client, args79.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73562
73855
|
if (!result.ok) {
|
|
73563
73856
|
return {
|
|
73564
73857
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -73573,9 +73866,9 @@ Allows you to add persistent storage to a project. These filesystems can be used
|
|
|
73573
73866
|
|
|
73574
73867
|
// src/funcs/storageDeleteFilesystem.ts
|
|
73575
73868
|
function storageDeleteFilesystem(client, request, options) {
|
|
73576
|
-
return new APIPromise($
|
|
73869
|
+
return new APIPromise($do81(client, request, options));
|
|
73577
73870
|
}
|
|
73578
|
-
async function $
|
|
73871
|
+
async function $do81(client, request, options) {
|
|
73579
73872
|
const parsed = safeParse4(request, (value) => DeleteStorageFilesystemsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
73580
73873
|
if (!parsed.ok) {
|
|
73581
73874
|
return [parsed, { status: "invalid" }];
|
|
@@ -73648,12 +73941,12 @@ var init_storageDeleteFilesystem = __esm(() => {
|
|
|
73648
73941
|
});
|
|
73649
73942
|
|
|
73650
73943
|
// src/mcp-server/tools/storageDeleteFilesystem.ts
|
|
73651
|
-
var
|
|
73944
|
+
var args79, tool$storageDeleteFilesystem;
|
|
73652
73945
|
var init_storageDeleteFilesystem2 = __esm(() => {
|
|
73653
73946
|
init_storageDeleteFilesystem();
|
|
73654
73947
|
init_operations();
|
|
73655
73948
|
init_tools();
|
|
73656
|
-
|
|
73949
|
+
args79 = {
|
|
73657
73950
|
request: DeleteStorageFilesystemsRequest$inboundSchema
|
|
73658
73951
|
};
|
|
73659
73952
|
tool$storageDeleteFilesystem = {
|
|
@@ -73661,9 +73954,9 @@ var init_storageDeleteFilesystem2 = __esm(() => {
|
|
|
73661
73954
|
description: `Delete filesystem
|
|
73662
73955
|
|
|
73663
73956
|
Allows you to remove persistent storage from a project.`,
|
|
73664
|
-
args:
|
|
73665
|
-
tool: async (client,
|
|
73666
|
-
const [result, apiCall] = await storageDeleteFilesystem(client,
|
|
73957
|
+
args: args79,
|
|
73958
|
+
tool: async (client, args80, ctx) => {
|
|
73959
|
+
const [result, apiCall] = await storageDeleteFilesystem(client, args80.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73667
73960
|
if (!result.ok) {
|
|
73668
73961
|
return {
|
|
73669
73962
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -73677,9 +73970,9 @@ Allows you to remove persistent storage from a project.`,
|
|
|
73677
73970
|
|
|
73678
73971
|
// src/funcs/storageDeleteStorageObjects.ts
|
|
73679
73972
|
function storageDeleteStorageObjects(client, request, options) {
|
|
73680
|
-
return new APIPromise($
|
|
73973
|
+
return new APIPromise($do82(client, request, options));
|
|
73681
73974
|
}
|
|
73682
|
-
async function $
|
|
73975
|
+
async function $do82(client, request, options) {
|
|
73683
73976
|
const parsed = safeParse4(request, (value) => DeleteStorageObjectsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
73684
73977
|
if (!parsed.ok) {
|
|
73685
73978
|
return [parsed, { status: "invalid" }];
|
|
@@ -73760,12 +74053,12 @@ var init_storageDeleteStorageObjects = __esm(() => {
|
|
|
73760
74053
|
});
|
|
73761
74054
|
|
|
73762
74055
|
// src/mcp-server/tools/storageDeleteStorageObjects.ts
|
|
73763
|
-
var
|
|
74056
|
+
var args80, tool$storageDeleteStorageObjects;
|
|
73764
74057
|
var init_storageDeleteStorageObjects2 = __esm(() => {
|
|
73765
74058
|
init_storageDeleteStorageObjects();
|
|
73766
74059
|
init_operations();
|
|
73767
74060
|
init_tools();
|
|
73768
|
-
|
|
74061
|
+
args80 = {
|
|
73769
74062
|
request: DeleteStorageObjectsRequest$inboundSchema
|
|
73770
74063
|
};
|
|
73771
74064
|
tool$storageDeleteStorageObjects = {
|
|
@@ -73773,9 +74066,9 @@ var init_storageDeleteStorageObjects2 = __esm(() => {
|
|
|
73773
74066
|
description: `Delete object storage
|
|
73774
74067
|
|
|
73775
74068
|
Allows you to remove an object storage from a project.`,
|
|
73776
|
-
args:
|
|
73777
|
-
tool: async (client,
|
|
73778
|
-
const [result, apiCall] = await storageDeleteStorageObjects(client,
|
|
74069
|
+
args: args80,
|
|
74070
|
+
tool: async (client, args81, ctx) => {
|
|
74071
|
+
const [result, apiCall] = await storageDeleteStorageObjects(client, args81.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73779
74072
|
if (!result.ok) {
|
|
73780
74073
|
return {
|
|
73781
74074
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -73789,9 +74082,9 @@ Allows you to remove an object storage from a project.`,
|
|
|
73789
74082
|
|
|
73790
74083
|
// src/funcs/storageDeleteStorageVolumes.ts
|
|
73791
74084
|
function storageDeleteStorageVolumes(client, request, options) {
|
|
73792
|
-
return new APIPromise($
|
|
74085
|
+
return new APIPromise($do83(client, request, options));
|
|
73793
74086
|
}
|
|
73794
|
-
async function $
|
|
74087
|
+
async function $do83(client, request, options) {
|
|
73795
74088
|
const parsed = safeParse4(request, (value) => DeleteStorageVolumesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
73796
74089
|
if (!parsed.ok) {
|
|
73797
74090
|
return [parsed, { status: "invalid" }];
|
|
@@ -73864,12 +74157,12 @@ var init_storageDeleteStorageVolumes = __esm(() => {
|
|
|
73864
74157
|
});
|
|
73865
74158
|
|
|
73866
74159
|
// src/mcp-server/tools/storageDeleteStorageVolumes.ts
|
|
73867
|
-
var
|
|
74160
|
+
var args81, tool$storageDeleteStorageVolumes;
|
|
73868
74161
|
var init_storageDeleteStorageVolumes2 = __esm(() => {
|
|
73869
74162
|
init_storageDeleteStorageVolumes();
|
|
73870
74163
|
init_operations();
|
|
73871
74164
|
init_tools();
|
|
73872
|
-
|
|
74165
|
+
args81 = {
|
|
73873
74166
|
request: DeleteStorageVolumesRequest$inboundSchema
|
|
73874
74167
|
};
|
|
73875
74168
|
tool$storageDeleteStorageVolumes = {
|
|
@@ -73877,9 +74170,9 @@ var init_storageDeleteStorageVolumes2 = __esm(() => {
|
|
|
73877
74170
|
description: `Delete volume
|
|
73878
74171
|
|
|
73879
74172
|
Allows you to remove persistent storage from a project.`,
|
|
73880
|
-
args:
|
|
73881
|
-
tool: async (client,
|
|
73882
|
-
const [result, apiCall] = await storageDeleteStorageVolumes(client,
|
|
74173
|
+
args: args81,
|
|
74174
|
+
tool: async (client, args82, ctx) => {
|
|
74175
|
+
const [result, apiCall] = await storageDeleteStorageVolumes(client, args82.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73883
74176
|
if (!result.ok) {
|
|
73884
74177
|
return {
|
|
73885
74178
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -73893,9 +74186,9 @@ Allows you to remove persistent storage from a project.`,
|
|
|
73893
74186
|
|
|
73894
74187
|
// src/funcs/storageGetStorageObject.ts
|
|
73895
74188
|
function storageGetStorageObject(client, request, options) {
|
|
73896
|
-
return new APIPromise($
|
|
74189
|
+
return new APIPromise($do84(client, request, options));
|
|
73897
74190
|
}
|
|
73898
|
-
async function $
|
|
74191
|
+
async function $do84(client, request, options) {
|
|
73899
74192
|
const parsed = safeParse4(request, (value) => GetStorageObjectRequest$outboundSchema.parse(value), "Input validation failed");
|
|
73900
74193
|
if (!parsed.ok) {
|
|
73901
74194
|
return [parsed, { status: "invalid" }];
|
|
@@ -73975,12 +74268,12 @@ var init_storageGetStorageObject = __esm(() => {
|
|
|
73975
74268
|
});
|
|
73976
74269
|
|
|
73977
74270
|
// src/mcp-server/tools/storageGetStorageObject.ts
|
|
73978
|
-
var
|
|
74271
|
+
var args82, tool$storageGetStorageObject;
|
|
73979
74272
|
var init_storageGetStorageObject2 = __esm(() => {
|
|
73980
74273
|
init_storageGetStorageObject();
|
|
73981
74274
|
init_operations();
|
|
73982
74275
|
init_tools();
|
|
73983
|
-
|
|
74276
|
+
args82 = {
|
|
73984
74277
|
request: GetStorageObjectRequest$inboundSchema
|
|
73985
74278
|
};
|
|
73986
74279
|
tool$storageGetStorageObject = {
|
|
@@ -73988,9 +74281,9 @@ var init_storageGetStorageObject2 = __esm(() => {
|
|
|
73988
74281
|
description: `Retrieve object storage
|
|
73989
74282
|
|
|
73990
74283
|
Shows details of a specific object storage.`,
|
|
73991
|
-
args:
|
|
73992
|
-
tool: async (client,
|
|
73993
|
-
const [result, apiCall] = await storageGetStorageObject(client,
|
|
74284
|
+
args: args82,
|
|
74285
|
+
tool: async (client, args83, ctx) => {
|
|
74286
|
+
const [result, apiCall] = await storageGetStorageObject(client, args83.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
73994
74287
|
if (!result.ok) {
|
|
73995
74288
|
return {
|
|
73996
74289
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74005,9 +74298,9 @@ Shows details of a specific object storage.`,
|
|
|
74005
74298
|
|
|
74006
74299
|
// src/funcs/storageGetStorageObjects.ts
|
|
74007
74300
|
function storageGetStorageObjects(client, request, options) {
|
|
74008
|
-
return new APIPromise($
|
|
74301
|
+
return new APIPromise($do85(client, request, options));
|
|
74009
74302
|
}
|
|
74010
|
-
async function $
|
|
74303
|
+
async function $do85(client, request, options) {
|
|
74011
74304
|
const parsed = safeParse4(request, (value) => GetStorageObjectsRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
74012
74305
|
if (!parsed.ok) {
|
|
74013
74306
|
return [parsed, { status: "invalid" }];
|
|
@@ -74086,12 +74379,12 @@ var init_storageGetStorageObjects = __esm(() => {
|
|
|
74086
74379
|
});
|
|
74087
74380
|
|
|
74088
74381
|
// src/mcp-server/tools/storageGetStorageObjects.ts
|
|
74089
|
-
var
|
|
74382
|
+
var args83, tool$storageGetStorageObjects;
|
|
74090
74383
|
var init_storageGetStorageObjects2 = __esm(() => {
|
|
74091
74384
|
init_storageGetStorageObjects();
|
|
74092
74385
|
init_operations();
|
|
74093
74386
|
init_tools();
|
|
74094
|
-
|
|
74387
|
+
args83 = {
|
|
74095
74388
|
request: GetStorageObjectsRequest$inboundSchema.optional()
|
|
74096
74389
|
};
|
|
74097
74390
|
tool$storageGetStorageObjects = {
|
|
@@ -74099,9 +74392,9 @@ var init_storageGetStorageObjects2 = __esm(() => {
|
|
|
74099
74392
|
description: `List object storages
|
|
74100
74393
|
|
|
74101
74394
|
Lists all object storages from a team.`,
|
|
74102
|
-
args:
|
|
74103
|
-
tool: async (client,
|
|
74104
|
-
const [result, apiCall] = await storageGetStorageObjects(client,
|
|
74395
|
+
args: args83,
|
|
74396
|
+
tool: async (client, args84, ctx) => {
|
|
74397
|
+
const [result, apiCall] = await storageGetStorageObjects(client, args84.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
74105
74398
|
if (!result.ok) {
|
|
74106
74399
|
return {
|
|
74107
74400
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74116,9 +74409,9 @@ Lists all object storages from a team.`,
|
|
|
74116
74409
|
|
|
74117
74410
|
// src/funcs/storageGetStorageVolume.ts
|
|
74118
74411
|
function storageGetStorageVolume(client, request, options) {
|
|
74119
|
-
return new APIPromise($
|
|
74412
|
+
return new APIPromise($do86(client, request, options));
|
|
74120
74413
|
}
|
|
74121
|
-
async function $
|
|
74414
|
+
async function $do86(client, request, options) {
|
|
74122
74415
|
const parsed = safeParse4(request, (value) => GetStorageVolumeRequest$outboundSchema.parse(value), "Input validation failed");
|
|
74123
74416
|
if (!parsed.ok) {
|
|
74124
74417
|
return [parsed, { status: "invalid" }];
|
|
@@ -74192,12 +74485,12 @@ var init_storageGetStorageVolume = __esm(() => {
|
|
|
74192
74485
|
});
|
|
74193
74486
|
|
|
74194
74487
|
// src/mcp-server/tools/storageGetStorageVolume.ts
|
|
74195
|
-
var
|
|
74488
|
+
var args84, tool$storageGetStorageVolume;
|
|
74196
74489
|
var init_storageGetStorageVolume2 = __esm(() => {
|
|
74197
74490
|
init_storageGetStorageVolume();
|
|
74198
74491
|
init_operations();
|
|
74199
74492
|
init_tools();
|
|
74200
|
-
|
|
74493
|
+
args84 = {
|
|
74201
74494
|
request: GetStorageVolumeRequest$inboundSchema
|
|
74202
74495
|
};
|
|
74203
74496
|
tool$storageGetStorageVolume = {
|
|
@@ -74205,9 +74498,9 @@ var init_storageGetStorageVolume2 = __esm(() => {
|
|
|
74205
74498
|
description: `Retrieve volume
|
|
74206
74499
|
|
|
74207
74500
|
Shows details of a specific volume storage.`,
|
|
74208
|
-
args:
|
|
74209
|
-
tool: async (client,
|
|
74210
|
-
const [result, apiCall] = await storageGetStorageVolume(client,
|
|
74501
|
+
args: args84,
|
|
74502
|
+
tool: async (client, args85, ctx) => {
|
|
74503
|
+
const [result, apiCall] = await storageGetStorageVolume(client, args85.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
74211
74504
|
if (!result.ok) {
|
|
74212
74505
|
return {
|
|
74213
74506
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74222,9 +74515,9 @@ Shows details of a specific volume storage.`,
|
|
|
74222
74515
|
|
|
74223
74516
|
// src/funcs/storageGetStorageVolumes.ts
|
|
74224
74517
|
function storageGetStorageVolumes(client, request, options) {
|
|
74225
|
-
return new APIPromise($
|
|
74518
|
+
return new APIPromise($do87(client, request, options));
|
|
74226
74519
|
}
|
|
74227
|
-
async function $
|
|
74520
|
+
async function $do87(client, request, options) {
|
|
74228
74521
|
const parsed = safeParse4(request, (value) => GetStorageVolumesRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
74229
74522
|
if (!parsed.ok) {
|
|
74230
74523
|
return [parsed, { status: "invalid" }];
|
|
@@ -74296,12 +74589,12 @@ var init_storageGetStorageVolumes = __esm(() => {
|
|
|
74296
74589
|
});
|
|
74297
74590
|
|
|
74298
74591
|
// src/mcp-server/tools/storageGetStorageVolumes.ts
|
|
74299
|
-
var
|
|
74592
|
+
var args85, tool$storageGetStorageVolumes;
|
|
74300
74593
|
var init_storageGetStorageVolumes2 = __esm(() => {
|
|
74301
74594
|
init_storageGetStorageVolumes();
|
|
74302
74595
|
init_operations();
|
|
74303
74596
|
init_tools();
|
|
74304
|
-
|
|
74597
|
+
args85 = {
|
|
74305
74598
|
request: GetStorageVolumesRequest$inboundSchema.optional()
|
|
74306
74599
|
};
|
|
74307
74600
|
tool$storageGetStorageVolumes = {
|
|
@@ -74309,9 +74602,9 @@ var init_storageGetStorageVolumes2 = __esm(() => {
|
|
|
74309
74602
|
description: `List volumes
|
|
74310
74603
|
|
|
74311
74604
|
Lists all the volumes from a team.`,
|
|
74312
|
-
args:
|
|
74313
|
-
tool: async (client,
|
|
74314
|
-
const [result, apiCall] = await storageGetStorageVolumes(client,
|
|
74605
|
+
args: args85,
|
|
74606
|
+
tool: async (client, args86, ctx) => {
|
|
74607
|
+
const [result, apiCall] = await storageGetStorageVolumes(client, args86.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
74315
74608
|
if (!result.ok) {
|
|
74316
74609
|
return {
|
|
74317
74610
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74326,9 +74619,9 @@ Lists all the volumes from a team.`,
|
|
|
74326
74619
|
|
|
74327
74620
|
// src/funcs/storageListFilesystems.ts
|
|
74328
74621
|
function storageListFilesystems(client, request, options) {
|
|
74329
|
-
return new APIPromise($
|
|
74622
|
+
return new APIPromise($do88(client, request, options));
|
|
74330
74623
|
}
|
|
74331
|
-
async function $
|
|
74624
|
+
async function $do88(client, request, options) {
|
|
74332
74625
|
const parsed = safeParse4(request, (value) => GetStorageFilesystemsRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
74333
74626
|
if (!parsed.ok) {
|
|
74334
74627
|
return [parsed, { status: "invalid" }];
|
|
@@ -74399,12 +74692,12 @@ var init_storageListFilesystems = __esm(() => {
|
|
|
74399
74692
|
});
|
|
74400
74693
|
|
|
74401
74694
|
// src/mcp-server/tools/storageListFilesystems.ts
|
|
74402
|
-
var
|
|
74695
|
+
var args86, tool$storageListFilesystems;
|
|
74403
74696
|
var init_storageListFilesystems2 = __esm(() => {
|
|
74404
74697
|
init_storageListFilesystems();
|
|
74405
74698
|
init_operations();
|
|
74406
74699
|
init_tools();
|
|
74407
|
-
|
|
74700
|
+
args86 = {
|
|
74408
74701
|
request: GetStorageFilesystemsRequest$inboundSchema.optional()
|
|
74409
74702
|
};
|
|
74410
74703
|
tool$storageListFilesystems = {
|
|
@@ -74412,9 +74705,9 @@ var init_storageListFilesystems2 = __esm(() => {
|
|
|
74412
74705
|
description: `List filesystems
|
|
74413
74706
|
|
|
74414
74707
|
Lists all the filesystems from a team.`,
|
|
74415
|
-
args:
|
|
74416
|
-
tool: async (client,
|
|
74417
|
-
const [result, apiCall] = await storageListFilesystems(client,
|
|
74708
|
+
args: args86,
|
|
74709
|
+
tool: async (client, args87, ctx) => {
|
|
74710
|
+
const [result, apiCall] = await storageListFilesystems(client, args87.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
74418
74711
|
if (!result.ok) {
|
|
74419
74712
|
return {
|
|
74420
74713
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74428,9 +74721,9 @@ Lists all the filesystems from a team.`,
|
|
|
74428
74721
|
|
|
74429
74722
|
// src/funcs/storagePostStorageObjects.ts
|
|
74430
74723
|
function storagePostStorageObjects(client, request, options) {
|
|
74431
|
-
return new APIPromise($
|
|
74724
|
+
return new APIPromise($do89(client, request, options));
|
|
74432
74725
|
}
|
|
74433
|
-
async function $
|
|
74726
|
+
async function $do89(client, request, options) {
|
|
74434
74727
|
const parsed = safeParse4(request, (value) => PostStorageObjectsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
74435
74728
|
if (!parsed.ok) {
|
|
74436
74729
|
return [parsed, { status: "invalid" }];
|
|
@@ -74507,12 +74800,12 @@ var init_storagePostStorageObjects = __esm(() => {
|
|
|
74507
74800
|
});
|
|
74508
74801
|
|
|
74509
74802
|
// src/mcp-server/tools/storagePostStorageObjects.ts
|
|
74510
|
-
var
|
|
74803
|
+
var args87, tool$storagePostStorageObjects;
|
|
74511
74804
|
var init_storagePostStorageObjects2 = __esm(() => {
|
|
74512
74805
|
init_storagePostStorageObjects();
|
|
74513
74806
|
init_operations();
|
|
74514
74807
|
init_tools();
|
|
74515
|
-
|
|
74808
|
+
args87 = {
|
|
74516
74809
|
request: PostStorageObjectsRequest$inboundSchema
|
|
74517
74810
|
};
|
|
74518
74811
|
tool$storagePostStorageObjects = {
|
|
@@ -74520,9 +74813,9 @@ var init_storagePostStorageObjects2 = __esm(() => {
|
|
|
74520
74813
|
description: `Create object storage
|
|
74521
74814
|
|
|
74522
74815
|
Creates a new object storage bucket for a project.`,
|
|
74523
|
-
args:
|
|
74524
|
-
tool: async (client,
|
|
74525
|
-
const [result, apiCall] = await storagePostStorageObjects(client,
|
|
74816
|
+
args: args87,
|
|
74817
|
+
tool: async (client, args88, ctx) => {
|
|
74818
|
+
const [result, apiCall] = await storagePostStorageObjects(client, args88.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
74526
74819
|
if (!result.ok) {
|
|
74527
74820
|
return {
|
|
74528
74821
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74537,9 +74830,9 @@ Creates a new object storage bucket for a project.`,
|
|
|
74537
74830
|
|
|
74538
74831
|
// src/funcs/storagePostStorageVolumes.ts
|
|
74539
74832
|
function storagePostStorageVolumes(client, request, options) {
|
|
74540
|
-
return new APIPromise($
|
|
74833
|
+
return new APIPromise($do90(client, request, options));
|
|
74541
74834
|
}
|
|
74542
|
-
async function $
|
|
74835
|
+
async function $do90(client, request, options) {
|
|
74543
74836
|
const parsed = safeParse4(request, (value) => PostStorageVolumesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
74544
74837
|
if (!parsed.ok) {
|
|
74545
74838
|
return [parsed, { status: "invalid" }];
|
|
@@ -74614,12 +74907,12 @@ var init_storagePostStorageVolumes = __esm(() => {
|
|
|
74614
74907
|
});
|
|
74615
74908
|
|
|
74616
74909
|
// src/mcp-server/tools/storagePostStorageVolumes.ts
|
|
74617
|
-
var
|
|
74910
|
+
var args88, tool$storagePostStorageVolumes;
|
|
74618
74911
|
var init_storagePostStorageVolumes2 = __esm(() => {
|
|
74619
74912
|
init_storagePostStorageVolumes();
|
|
74620
74913
|
init_operations();
|
|
74621
74914
|
init_tools();
|
|
74622
|
-
|
|
74915
|
+
args88 = {
|
|
74623
74916
|
request: PostStorageVolumesRequest$inboundSchema
|
|
74624
74917
|
};
|
|
74625
74918
|
tool$storagePostStorageVolumes = {
|
|
@@ -74627,9 +74920,9 @@ var init_storagePostStorageVolumes2 = __esm(() => {
|
|
|
74627
74920
|
description: `Create volume
|
|
74628
74921
|
|
|
74629
74922
|
Allows you to add persistent storage to a project. These volumes can be used to store data across your servers.`,
|
|
74630
|
-
args:
|
|
74631
|
-
tool: async (client,
|
|
74632
|
-
const [result, apiCall] = await storagePostStorageVolumes(client,
|
|
74923
|
+
args: args88,
|
|
74924
|
+
tool: async (client, args89, ctx) => {
|
|
74925
|
+
const [result, apiCall] = await storagePostStorageVolumes(client, args89.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
74633
74926
|
if (!result.ok) {
|
|
74634
74927
|
return {
|
|
74635
74928
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74644,9 +74937,9 @@ Allows you to add persistent storage to a project. These volumes can be used to
|
|
|
74644
74937
|
|
|
74645
74938
|
// src/funcs/storagePostStorageVolumesMount.ts
|
|
74646
74939
|
function storagePostStorageVolumesMount(client, request, options) {
|
|
74647
|
-
return new APIPromise($
|
|
74940
|
+
return new APIPromise($do91(client, request, options));
|
|
74648
74941
|
}
|
|
74649
|
-
async function $
|
|
74942
|
+
async function $do91(client, request, options) {
|
|
74650
74943
|
const parsed = safeParse4(request, (value) => PostStorageVolumesMountRequest$outboundSchema.parse(value), "Input validation failed");
|
|
74651
74944
|
if (!parsed.ok) {
|
|
74652
74945
|
return [parsed, { status: "invalid" }];
|
|
@@ -74720,12 +75013,12 @@ var init_storagePostStorageVolumesMount = __esm(() => {
|
|
|
74720
75013
|
});
|
|
74721
75014
|
|
|
74722
75015
|
// src/mcp-server/tools/storagePostStorageVolumesMount.ts
|
|
74723
|
-
var
|
|
75016
|
+
var args89, tool$storagePostStorageVolumesMount;
|
|
74724
75017
|
var init_storagePostStorageVolumesMount2 = __esm(() => {
|
|
74725
75018
|
init_storagePostStorageVolumesMount();
|
|
74726
75019
|
init_operations();
|
|
74727
75020
|
init_tools();
|
|
74728
|
-
|
|
75021
|
+
args89 = {
|
|
74729
75022
|
request: PostStorageVolumesMountRequest$inboundSchema
|
|
74730
75023
|
};
|
|
74731
75024
|
tool$storagePostStorageVolumesMount = {
|
|
@@ -74733,9 +75026,9 @@ var init_storagePostStorageVolumesMount2 = __esm(() => {
|
|
|
74733
75026
|
description: `Mount volume
|
|
74734
75027
|
|
|
74735
75028
|
Mounts volume storage by adding the client to an allowed list`,
|
|
74736
|
-
args:
|
|
74737
|
-
tool: async (client,
|
|
74738
|
-
const [result, apiCall] = await storagePostStorageVolumesMount(client,
|
|
75029
|
+
args: args89,
|
|
75030
|
+
tool: async (client, args90, ctx) => {
|
|
75031
|
+
const [result, apiCall] = await storagePostStorageVolumesMount(client, args90.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
74739
75032
|
if (!result.ok) {
|
|
74740
75033
|
return {
|
|
74741
75034
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74749,9 +75042,9 @@ Mounts volume storage by adding the client to an allowed list`,
|
|
|
74749
75042
|
|
|
74750
75043
|
// src/funcs/storageUpdateFilesystem.ts
|
|
74751
75044
|
function storageUpdateFilesystem(client, request, options) {
|
|
74752
|
-
return new APIPromise($
|
|
75045
|
+
return new APIPromise($do92(client, request, options));
|
|
74753
75046
|
}
|
|
74754
|
-
async function $
|
|
75047
|
+
async function $do92(client, request, options) {
|
|
74755
75048
|
const parsed = safeParse4(request, (value) => PatchStorageFilesystemsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
74756
75049
|
if (!parsed.ok) {
|
|
74757
75050
|
return [parsed, { status: "invalid" }];
|
|
@@ -74826,12 +75119,12 @@ var init_storageUpdateFilesystem = __esm(() => {
|
|
|
74826
75119
|
});
|
|
74827
75120
|
|
|
74828
75121
|
// src/mcp-server/tools/storageUpdateFilesystem.ts
|
|
74829
|
-
var
|
|
75122
|
+
var args90, tool$storageUpdateFilesystem;
|
|
74830
75123
|
var init_storageUpdateFilesystem2 = __esm(() => {
|
|
74831
75124
|
init_storageUpdateFilesystem();
|
|
74832
75125
|
init_operations();
|
|
74833
75126
|
init_tools();
|
|
74834
|
-
|
|
75127
|
+
args90 = {
|
|
74835
75128
|
request: PatchStorageFilesystemsRequest$inboundSchema
|
|
74836
75129
|
};
|
|
74837
75130
|
tool$storageUpdateFilesystem = {
|
|
@@ -74839,9 +75132,9 @@ var init_storageUpdateFilesystem2 = __esm(() => {
|
|
|
74839
75132
|
description: `Update filesystem
|
|
74840
75133
|
|
|
74841
75134
|
Allow you to upgrade the size of a filesystem.`,
|
|
74842
|
-
args:
|
|
74843
|
-
tool: async (client,
|
|
74844
|
-
const [result, apiCall] = await storageUpdateFilesystem(client,
|
|
75135
|
+
args: args90,
|
|
75136
|
+
tool: async (client, args91, ctx) => {
|
|
75137
|
+
const [result, apiCall] = await storageUpdateFilesystem(client, args91.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
74845
75138
|
if (!result.ok) {
|
|
74846
75139
|
return {
|
|
74847
75140
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74856,9 +75149,9 @@ Allow you to upgrade the size of a filesystem.`,
|
|
|
74856
75149
|
|
|
74857
75150
|
// src/funcs/tagsCreate.ts
|
|
74858
75151
|
function tagsCreate(client, request, options) {
|
|
74859
|
-
return new APIPromise($
|
|
75152
|
+
return new APIPromise($do93(client, request, options));
|
|
74860
75153
|
}
|
|
74861
|
-
async function $
|
|
75154
|
+
async function $do93(client, request, options) {
|
|
74862
75155
|
const parsed = safeParse4(request, (value) => CreateTagRequest$outboundSchema.parse(value), "Input validation failed");
|
|
74863
75156
|
if (!parsed.ok) {
|
|
74864
75157
|
return [parsed, { status: "invalid" }];
|
|
@@ -74934,12 +75227,12 @@ var init_tagsCreate = __esm(() => {
|
|
|
74934
75227
|
});
|
|
74935
75228
|
|
|
74936
75229
|
// src/mcp-server/tools/tagsCreate.ts
|
|
74937
|
-
var
|
|
75230
|
+
var args91, tool$tagsCreate;
|
|
74938
75231
|
var init_tagsCreate2 = __esm(() => {
|
|
74939
75232
|
init_tagsCreate();
|
|
74940
75233
|
init_operations();
|
|
74941
75234
|
init_tools();
|
|
74942
|
-
|
|
75235
|
+
args91 = {
|
|
74943
75236
|
request: CreateTagRequest$inboundSchema
|
|
74944
75237
|
};
|
|
74945
75238
|
tool$tagsCreate = {
|
|
@@ -74948,9 +75241,9 @@ var init_tagsCreate2 = __esm(() => {
|
|
|
74948
75241
|
|
|
74949
75242
|
Create a Tag in the team.
|
|
74950
75243
|
`,
|
|
74951
|
-
args:
|
|
74952
|
-
tool: async (client,
|
|
74953
|
-
const [result, apiCall] = await tagsCreate(client,
|
|
75244
|
+
args: args91,
|
|
75245
|
+
tool: async (client, args92, ctx) => {
|
|
75246
|
+
const [result, apiCall] = await tagsCreate(client, args92.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
74954
75247
|
if (!result.ok) {
|
|
74955
75248
|
return {
|
|
74956
75249
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -74965,9 +75258,9 @@ Create a Tag in the team.
|
|
|
74965
75258
|
|
|
74966
75259
|
// src/funcs/tagsDelete.ts
|
|
74967
75260
|
function tagsDelete(client, request, options) {
|
|
74968
|
-
return new APIPromise($
|
|
75261
|
+
return new APIPromise($do94(client, request, options));
|
|
74969
75262
|
}
|
|
74970
|
-
async function $
|
|
75263
|
+
async function $do94(client, request, options) {
|
|
74971
75264
|
const parsed = safeParse4(request, (value) => DestroyTagRequest$outboundSchema.parse(value), "Input validation failed");
|
|
74972
75265
|
if (!parsed.ok) {
|
|
74973
75266
|
return [parsed, { status: "invalid" }];
|
|
@@ -75040,12 +75333,12 @@ var init_tagsDelete = __esm(() => {
|
|
|
75040
75333
|
});
|
|
75041
75334
|
|
|
75042
75335
|
// src/mcp-server/tools/tagsDelete.ts
|
|
75043
|
-
var
|
|
75336
|
+
var args92, tool$tagsDelete;
|
|
75044
75337
|
var init_tagsDelete2 = __esm(() => {
|
|
75045
75338
|
init_tagsDelete();
|
|
75046
75339
|
init_operations();
|
|
75047
75340
|
init_tools();
|
|
75048
|
-
|
|
75341
|
+
args92 = {
|
|
75049
75342
|
request: DestroyTagRequest$inboundSchema
|
|
75050
75343
|
};
|
|
75051
75344
|
tool$tagsDelete = {
|
|
@@ -75054,9 +75347,9 @@ var init_tagsDelete2 = __esm(() => {
|
|
|
75054
75347
|
|
|
75055
75348
|
Update a Tag in the team.
|
|
75056
75349
|
`,
|
|
75057
|
-
args:
|
|
75058
|
-
tool: async (client,
|
|
75059
|
-
const [result, apiCall] = await tagsDelete(client,
|
|
75350
|
+
args: args92,
|
|
75351
|
+
tool: async (client, args93, ctx) => {
|
|
75352
|
+
const [result, apiCall] = await tagsDelete(client, args93.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
75060
75353
|
if (!result.ok) {
|
|
75061
75354
|
return {
|
|
75062
75355
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -75070,9 +75363,9 @@ Update a Tag in the team.
|
|
|
75070
75363
|
|
|
75071
75364
|
// src/funcs/tagsList.ts
|
|
75072
75365
|
function tagsList(client, options) {
|
|
75073
|
-
return new APIPromise($
|
|
75366
|
+
return new APIPromise($do95(client, options));
|
|
75074
75367
|
}
|
|
75075
|
-
async function $
|
|
75368
|
+
async function $do95(client, options) {
|
|
75076
75369
|
const path = pathToFunc("/tags")();
|
|
75077
75370
|
const headers = new Headers(compactMap({
|
|
75078
75371
|
Accept: "application/vnd.api+json"
|
|
@@ -75157,9 +75450,9 @@ List all Tags in the team.
|
|
|
75157
75450
|
|
|
75158
75451
|
// src/funcs/tagsUpdate.ts
|
|
75159
75452
|
function tagsUpdate(client, request, options) {
|
|
75160
|
-
return new APIPromise($
|
|
75453
|
+
return new APIPromise($do96(client, request, options));
|
|
75161
75454
|
}
|
|
75162
|
-
async function $
|
|
75455
|
+
async function $do96(client, request, options) {
|
|
75163
75456
|
const parsed = safeParse4(request, (value) => UpdateTagRequest$outboundSchema.parse(value), "Input validation failed");
|
|
75164
75457
|
if (!parsed.ok) {
|
|
75165
75458
|
return [parsed, { status: "invalid" }];
|
|
@@ -75241,12 +75534,12 @@ var init_tagsUpdate = __esm(() => {
|
|
|
75241
75534
|
});
|
|
75242
75535
|
|
|
75243
75536
|
// src/mcp-server/tools/tagsUpdate.ts
|
|
75244
|
-
var
|
|
75537
|
+
var args93, tool$tagsUpdate;
|
|
75245
75538
|
var init_tagsUpdate2 = __esm(() => {
|
|
75246
75539
|
init_tagsUpdate();
|
|
75247
75540
|
init_operations();
|
|
75248
75541
|
init_tools();
|
|
75249
|
-
|
|
75542
|
+
args93 = {
|
|
75250
75543
|
request: UpdateTagRequest$inboundSchema
|
|
75251
75544
|
};
|
|
75252
75545
|
tool$tagsUpdate = {
|
|
@@ -75255,9 +75548,9 @@ var init_tagsUpdate2 = __esm(() => {
|
|
|
75255
75548
|
|
|
75256
75549
|
Update a Tag in the team.
|
|
75257
75550
|
`,
|
|
75258
|
-
args:
|
|
75259
|
-
tool: async (client,
|
|
75260
|
-
const [result, apiCall] = await tagsUpdate(client,
|
|
75551
|
+
args: args93,
|
|
75552
|
+
tool: async (client, args94, ctx) => {
|
|
75553
|
+
const [result, apiCall] = await tagsUpdate(client, args94.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
75261
75554
|
if (!result.ok) {
|
|
75262
75555
|
return {
|
|
75263
75556
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -75272,9 +75565,9 @@ Update a Tag in the team.
|
|
|
75272
75565
|
|
|
75273
75566
|
// src/funcs/teamMembersDelete.ts
|
|
75274
75567
|
function teamMembersDelete(client, request, options) {
|
|
75275
|
-
return new APIPromise($
|
|
75568
|
+
return new APIPromise($do97(client, request, options));
|
|
75276
75569
|
}
|
|
75277
|
-
async function $
|
|
75570
|
+
async function $do97(client, request, options) {
|
|
75278
75571
|
const parsed = safeParse4(request, (value) => DestroyTeamMemberRequest$outboundSchema.parse(value), "Input validation failed");
|
|
75279
75572
|
if (!parsed.ok) {
|
|
75280
75573
|
return [parsed, { status: "invalid" }];
|
|
@@ -75347,20 +75640,20 @@ var init_teamMembersDelete = __esm(() => {
|
|
|
75347
75640
|
});
|
|
75348
75641
|
|
|
75349
75642
|
// src/mcp-server/tools/teamMembersDelete.ts
|
|
75350
|
-
var
|
|
75643
|
+
var args94, tool$teamMembersDelete;
|
|
75351
75644
|
var init_teamMembersDelete2 = __esm(() => {
|
|
75352
75645
|
init_teamMembersDelete();
|
|
75353
75646
|
init_operations();
|
|
75354
75647
|
init_tools();
|
|
75355
|
-
|
|
75648
|
+
args94 = {
|
|
75356
75649
|
request: DestroyTeamMemberRequest$inboundSchema
|
|
75357
75650
|
};
|
|
75358
75651
|
tool$teamMembersDelete = {
|
|
75359
75652
|
name: "team-members-delete",
|
|
75360
75653
|
description: `Remove a member`,
|
|
75361
|
-
args:
|
|
75362
|
-
tool: async (client,
|
|
75363
|
-
const [result, apiCall] = await teamMembersDelete(client,
|
|
75654
|
+
args: args94,
|
|
75655
|
+
tool: async (client, args95, ctx) => {
|
|
75656
|
+
const [result, apiCall] = await teamMembersDelete(client, args95.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
75364
75657
|
if (!result.ok) {
|
|
75365
75658
|
return {
|
|
75366
75659
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -75374,9 +75667,9 @@ var init_teamMembersDelete2 = __esm(() => {
|
|
|
75374
75667
|
|
|
75375
75668
|
// src/funcs/teamMembersPostTeamMembers.ts
|
|
75376
75669
|
function teamMembersPostTeamMembers(client, request, options) {
|
|
75377
|
-
return new APIPromise($
|
|
75670
|
+
return new APIPromise($do98(client, request, options));
|
|
75378
75671
|
}
|
|
75379
|
-
async function $
|
|
75672
|
+
async function $do98(client, request, options) {
|
|
75380
75673
|
const parsed = safeParse4(request, (value) => PostTeamMembersRequest$outboundSchema.parse(value), "Input validation failed");
|
|
75381
75674
|
if (!parsed.ok) {
|
|
75382
75675
|
return [parsed, { status: "invalid" }];
|
|
@@ -75446,20 +75739,20 @@ var init_teamMembersPostTeamMembers = __esm(() => {
|
|
|
75446
75739
|
});
|
|
75447
75740
|
|
|
75448
75741
|
// src/mcp-server/tools/teamMembersPostTeamMembers.ts
|
|
75449
|
-
var
|
|
75742
|
+
var args95, tool$teamMembersPostTeamMembers;
|
|
75450
75743
|
var init_teamMembersPostTeamMembers2 = __esm(() => {
|
|
75451
75744
|
init_teamMembersPostTeamMembers();
|
|
75452
75745
|
init_operations();
|
|
75453
75746
|
init_tools();
|
|
75454
|
-
|
|
75747
|
+
args95 = {
|
|
75455
75748
|
request: PostTeamMembersRequest$inboundSchema
|
|
75456
75749
|
};
|
|
75457
75750
|
tool$teamMembersPostTeamMembers = {
|
|
75458
75751
|
name: "team-members-post-team-members",
|
|
75459
75752
|
description: `Create member`,
|
|
75460
|
-
args:
|
|
75461
|
-
tool: async (client,
|
|
75462
|
-
const [result, apiCall] = await teamMembersPostTeamMembers(client,
|
|
75753
|
+
args: args95,
|
|
75754
|
+
tool: async (client, args96, ctx) => {
|
|
75755
|
+
const [result, apiCall] = await teamMembersPostTeamMembers(client, args96.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
75463
75756
|
if (!result.ok) {
|
|
75464
75757
|
return {
|
|
75465
75758
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -75474,9 +75767,9 @@ var init_teamMembersPostTeamMembers2 = __esm(() => {
|
|
|
75474
75767
|
|
|
75475
75768
|
// src/funcs/teamsCreate.ts
|
|
75476
75769
|
function teamsCreate(client, request, options) {
|
|
75477
|
-
return new APIPromise($
|
|
75770
|
+
return new APIPromise($do99(client, request, options));
|
|
75478
75771
|
}
|
|
75479
|
-
async function $
|
|
75772
|
+
async function $do99(client, request, options) {
|
|
75480
75773
|
const parsed = safeParse4(request, (value) => PostTeamRequest$outboundSchema.parse(value), "Input validation failed");
|
|
75481
75774
|
if (!parsed.ok) {
|
|
75482
75775
|
return [parsed, { status: "invalid" }];
|
|
@@ -75545,20 +75838,20 @@ var init_teamsCreate = __esm(() => {
|
|
|
75545
75838
|
});
|
|
75546
75839
|
|
|
75547
75840
|
// src/mcp-server/tools/teamsCreate.ts
|
|
75548
|
-
var
|
|
75841
|
+
var args96, tool$teamsCreate;
|
|
75549
75842
|
var init_teamsCreate2 = __esm(() => {
|
|
75550
75843
|
init_teamsCreate();
|
|
75551
75844
|
init_operations();
|
|
75552
75845
|
init_tools();
|
|
75553
|
-
|
|
75846
|
+
args96 = {
|
|
75554
75847
|
request: PostTeamRequest$inboundSchema
|
|
75555
75848
|
};
|
|
75556
75849
|
tool$teamsCreate = {
|
|
75557
75850
|
name: "teams-create",
|
|
75558
|
-
description: `Create team`,
|
|
75559
|
-
args:
|
|
75560
|
-
tool: async (client,
|
|
75561
|
-
const [result, apiCall] = await teamsCreate(client,
|
|
75851
|
+
description: `Create team`,
|
|
75852
|
+
args: args96,
|
|
75853
|
+
tool: async (client, args97, ctx) => {
|
|
75854
|
+
const [result, apiCall] = await teamsCreate(client, args97.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
75562
75855
|
if (!result.ok) {
|
|
75563
75856
|
return {
|
|
75564
75857
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -75573,9 +75866,9 @@ var init_teamsCreate2 = __esm(() => {
|
|
|
75573
75866
|
|
|
75574
75867
|
// src/funcs/teamsGet.ts
|
|
75575
75868
|
function teamsGet(client, options) {
|
|
75576
|
-
return new APIPromise($
|
|
75869
|
+
return new APIPromise($do100(client, options));
|
|
75577
75870
|
}
|
|
75578
|
-
async function $
|
|
75871
|
+
async function $do100(client, options) {
|
|
75579
75872
|
const path = pathToFunc("/team")();
|
|
75580
75873
|
const headers = new Headers(compactMap({
|
|
75581
75874
|
Accept: "application/vnd.api+json"
|
|
@@ -75657,9 +75950,9 @@ var init_teamsGet2 = __esm(() => {
|
|
|
75657
75950
|
|
|
75658
75951
|
// src/funcs/teamsMembersGetTeamMembers.ts
|
|
75659
75952
|
function teamsMembersGetTeamMembers(client, request, options) {
|
|
75660
|
-
return new APIPromise($
|
|
75953
|
+
return new APIPromise($do101(client, request, options));
|
|
75661
75954
|
}
|
|
75662
|
-
async function $
|
|
75955
|
+
async function $do101(client, request, options) {
|
|
75663
75956
|
const parsed = safeParse4(request, (value) => GetTeamMembersRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
75664
75957
|
if (!parsed.ok) {
|
|
75665
75958
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -75766,20 +76059,20 @@ var init_teamsMembersGetTeamMembers = __esm(() => {
|
|
|
75766
76059
|
});
|
|
75767
76060
|
|
|
75768
76061
|
// src/mcp-server/tools/teamsMembersGetTeamMembers.ts
|
|
75769
|
-
var
|
|
76062
|
+
var args97, tool$teamsMembersGetTeamMembers;
|
|
75770
76063
|
var init_teamsMembersGetTeamMembers2 = __esm(() => {
|
|
75771
76064
|
init_teamsMembersGetTeamMembers();
|
|
75772
76065
|
init_operations();
|
|
75773
76066
|
init_tools();
|
|
75774
|
-
|
|
76067
|
+
args97 = {
|
|
75775
76068
|
request: GetTeamMembersRequest$inboundSchema.optional()
|
|
75776
76069
|
};
|
|
75777
76070
|
tool$teamsMembersGetTeamMembers = {
|
|
75778
76071
|
name: "teams-members-get-team-members",
|
|
75779
76072
|
description: `List members`,
|
|
75780
|
-
args:
|
|
75781
|
-
tool: async (client,
|
|
75782
|
-
const [result, apiCall] = await teamsMembersGetTeamMembers(client,
|
|
76073
|
+
args: args97,
|
|
76074
|
+
tool: async (client, args98, ctx) => {
|
|
76075
|
+
const [result, apiCall] = await teamsMembersGetTeamMembers(client, args98.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
75783
76076
|
if (!result.ok) {
|
|
75784
76077
|
return {
|
|
75785
76078
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -75794,9 +76087,9 @@ var init_teamsMembersGetTeamMembers2 = __esm(() => {
|
|
|
75794
76087
|
|
|
75795
76088
|
// src/funcs/teamsUpdate.ts
|
|
75796
76089
|
function teamsUpdate(client, request, options) {
|
|
75797
|
-
return new APIPromise($
|
|
76090
|
+
return new APIPromise($do102(client, request, options));
|
|
75798
76091
|
}
|
|
75799
|
-
async function $
|
|
76092
|
+
async function $do102(client, request, options) {
|
|
75800
76093
|
const parsed = safeParse4(request, (value) => PatchCurrentTeamRequest$outboundSchema.parse(value), "Input validation failed");
|
|
75801
76094
|
if (!parsed.ok) {
|
|
75802
76095
|
return [parsed, { status: "invalid" }];
|
|
@@ -75871,20 +76164,20 @@ var init_teamsUpdate = __esm(() => {
|
|
|
75871
76164
|
});
|
|
75872
76165
|
|
|
75873
76166
|
// src/mcp-server/tools/teamsUpdate.ts
|
|
75874
|
-
var
|
|
76167
|
+
var args98, tool$teamsUpdate;
|
|
75875
76168
|
var init_teamsUpdate2 = __esm(() => {
|
|
75876
76169
|
init_teamsUpdate();
|
|
75877
76170
|
init_operations();
|
|
75878
76171
|
init_tools();
|
|
75879
|
-
|
|
76172
|
+
args98 = {
|
|
75880
76173
|
request: PatchCurrentTeamRequest$inboundSchema
|
|
75881
76174
|
};
|
|
75882
76175
|
tool$teamsUpdate = {
|
|
75883
76176
|
name: "teams-update",
|
|
75884
76177
|
description: `Update team`,
|
|
75885
|
-
args:
|
|
75886
|
-
tool: async (client,
|
|
75887
|
-
const [result, apiCall] = await teamsUpdate(client,
|
|
76178
|
+
args: args98,
|
|
76179
|
+
tool: async (client, args99, ctx) => {
|
|
76180
|
+
const [result, apiCall] = await teamsUpdate(client, args99.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
75888
76181
|
if (!result.ok) {
|
|
75889
76182
|
return {
|
|
75890
76183
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -75899,9 +76192,9 @@ var init_teamsUpdate2 = __esm(() => {
|
|
|
75899
76192
|
|
|
75900
76193
|
// src/funcs/trafficGet.ts
|
|
75901
76194
|
function trafficGet(client, request, options) {
|
|
75902
|
-
return new APIPromise($
|
|
76195
|
+
return new APIPromise($do103(client, request, options));
|
|
75903
76196
|
}
|
|
75904
|
-
async function $
|
|
76197
|
+
async function $do103(client, request, options) {
|
|
75905
76198
|
const parsed = safeParse4(request, (value) => GetTrafficConsumptionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
75906
76199
|
if (!parsed.ok) {
|
|
75907
76200
|
return [parsed, { status: "invalid" }];
|
|
@@ -75977,20 +76270,20 @@ var init_trafficGet = __esm(() => {
|
|
|
75977
76270
|
});
|
|
75978
76271
|
|
|
75979
76272
|
// src/mcp-server/tools/trafficGet.ts
|
|
75980
|
-
var
|
|
76273
|
+
var args99, tool$trafficGet;
|
|
75981
76274
|
var init_trafficGet2 = __esm(() => {
|
|
75982
76275
|
init_trafficGet();
|
|
75983
76276
|
init_operations();
|
|
75984
76277
|
init_tools();
|
|
75985
|
-
|
|
76278
|
+
args99 = {
|
|
75986
76279
|
request: GetTrafficConsumptionRequest$inboundSchema
|
|
75987
76280
|
};
|
|
75988
76281
|
tool$trafficGet = {
|
|
75989
76282
|
name: "traffic-get",
|
|
75990
76283
|
description: `Retrieve traffic`,
|
|
75991
|
-
args:
|
|
75992
|
-
tool: async (client,
|
|
75993
|
-
const [result, apiCall] = await trafficGet(client,
|
|
76284
|
+
args: args99,
|
|
76285
|
+
tool: async (client, args100, ctx) => {
|
|
76286
|
+
const [result, apiCall] = await trafficGet(client, args100.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
75994
76287
|
if (!result.ok) {
|
|
75995
76288
|
return {
|
|
75996
76289
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76005,9 +76298,9 @@ var init_trafficGet2 = __esm(() => {
|
|
|
76005
76298
|
|
|
76006
76299
|
// src/funcs/trafficGetQuota.ts
|
|
76007
76300
|
function trafficGetQuota(client, request, options) {
|
|
76008
|
-
return new APIPromise($
|
|
76301
|
+
return new APIPromise($do104(client, request, options));
|
|
76009
76302
|
}
|
|
76010
|
-
async function $
|
|
76303
|
+
async function $do104(client, request, options) {
|
|
76011
76304
|
const parsed = safeParse4(request, (value) => GetTrafficQuotaRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
76012
76305
|
if (!parsed.ok) {
|
|
76013
76306
|
return [parsed, { status: "invalid" }];
|
|
@@ -76080,20 +76373,20 @@ var init_trafficGetQuota = __esm(() => {
|
|
|
76080
76373
|
});
|
|
76081
76374
|
|
|
76082
76375
|
// src/mcp-server/tools/trafficGetQuota.ts
|
|
76083
|
-
var
|
|
76376
|
+
var args100, tool$trafficGetQuota;
|
|
76084
76377
|
var init_trafficGetQuota2 = __esm(() => {
|
|
76085
76378
|
init_trafficGetQuota();
|
|
76086
76379
|
init_operations();
|
|
76087
76380
|
init_tools();
|
|
76088
|
-
|
|
76381
|
+
args100 = {
|
|
76089
76382
|
request: GetTrafficQuotaRequest$inboundSchema.optional()
|
|
76090
76383
|
};
|
|
76091
76384
|
tool$trafficGetQuota = {
|
|
76092
76385
|
name: "traffic-get-quota",
|
|
76093
76386
|
description: `Retrieve traffic quota`,
|
|
76094
|
-
args:
|
|
76095
|
-
tool: async (client,
|
|
76096
|
-
const [result, apiCall] = await trafficGetQuota(client,
|
|
76387
|
+
args: args100,
|
|
76388
|
+
tool: async (client, args101, ctx) => {
|
|
76389
|
+
const [result, apiCall] = await trafficGetQuota(client, args101.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
76097
76390
|
if (!result.ok) {
|
|
76098
76391
|
return {
|
|
76099
76392
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76108,9 +76401,9 @@ var init_trafficGetQuota2 = __esm(() => {
|
|
|
76108
76401
|
|
|
76109
76402
|
// src/funcs/userDataCreate.ts
|
|
76110
76403
|
function userDataCreate(client, request, options) {
|
|
76111
|
-
return new APIPromise($
|
|
76404
|
+
return new APIPromise($do105(client, request, options));
|
|
76112
76405
|
}
|
|
76113
|
-
async function $
|
|
76406
|
+
async function $do105(client, request, options) {
|
|
76114
76407
|
const parsed = safeParse4(request, (value) => PostProjectUserDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
76115
76408
|
if (!parsed.ok) {
|
|
76116
76409
|
return [parsed, { status: "invalid" }];
|
|
@@ -76186,12 +76479,12 @@ var init_userDataCreate = __esm(() => {
|
|
|
76186
76479
|
});
|
|
76187
76480
|
|
|
76188
76481
|
// src/mcp-server/tools/userDataCreate.ts
|
|
76189
|
-
var
|
|
76482
|
+
var args101, tool$userDataCreate;
|
|
76190
76483
|
var init_userDataCreate2 = __esm(() => {
|
|
76191
76484
|
init_userDataCreate();
|
|
76192
76485
|
init_operations();
|
|
76193
76486
|
init_tools();
|
|
76194
|
-
|
|
76487
|
+
args101 = {
|
|
76195
76488
|
request: PostProjectUserDataRequest$inboundSchema
|
|
76196
76489
|
};
|
|
76197
76490
|
tool$userDataCreate = {
|
|
@@ -76200,9 +76493,9 @@ var init_userDataCreate2 = __esm(() => {
|
|
|
76200
76493
|
|
|
76201
76494
|
Allows you to create User Data in a project, which can be used to perform custom setup on your servers after deploy and reinstall.
|
|
76202
76495
|
`,
|
|
76203
|
-
args:
|
|
76204
|
-
tool: async (client,
|
|
76205
|
-
const [result, apiCall] = await userDataCreate(client,
|
|
76496
|
+
args: args101,
|
|
76497
|
+
tool: async (client, args102, ctx) => {
|
|
76498
|
+
const [result, apiCall] = await userDataCreate(client, args102.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
76206
76499
|
if (!result.ok) {
|
|
76207
76500
|
return {
|
|
76208
76501
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76217,9 +76510,9 @@ Allows you to create User Data in a project, which can be used to perform custom
|
|
|
76217
76510
|
|
|
76218
76511
|
// src/funcs/userDataCreateNew.ts
|
|
76219
76512
|
function userDataCreateNew(client, request, options) {
|
|
76220
|
-
return new APIPromise($
|
|
76513
|
+
return new APIPromise($do106(client, request, options));
|
|
76221
76514
|
}
|
|
76222
|
-
async function $
|
|
76515
|
+
async function $do106(client, request, options) {
|
|
76223
76516
|
const parsed = safeParse4(request, (value) => PostUserDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
76224
76517
|
if (!parsed.ok) {
|
|
76225
76518
|
return [parsed, { status: "invalid" }];
|
|
@@ -76289,12 +76582,12 @@ var init_userDataCreateNew = __esm(() => {
|
|
|
76289
76582
|
});
|
|
76290
76583
|
|
|
76291
76584
|
// src/mcp-server/tools/userDataCreateNew.ts
|
|
76292
|
-
var
|
|
76585
|
+
var args102, tool$userDataCreateNew;
|
|
76293
76586
|
var init_userDataCreateNew2 = __esm(() => {
|
|
76294
76587
|
init_userDataCreateNew();
|
|
76295
76588
|
init_operations();
|
|
76296
76589
|
init_tools();
|
|
76297
|
-
|
|
76590
|
+
args102 = {
|
|
76298
76591
|
request: PostUserDataRequest$inboundSchema
|
|
76299
76592
|
};
|
|
76300
76593
|
tool$userDataCreateNew = {
|
|
@@ -76303,9 +76596,9 @@ var init_userDataCreateNew2 = __esm(() => {
|
|
|
76303
76596
|
|
|
76304
76597
|
Allows you to create User Data in a team, which can be used to perform custom setup on your servers after deploy and reinstall.
|
|
76305
76598
|
`,
|
|
76306
|
-
args:
|
|
76307
|
-
tool: async (client,
|
|
76308
|
-
const [result, apiCall] = await userDataCreateNew(client,
|
|
76599
|
+
args: args102,
|
|
76600
|
+
tool: async (client, args103, ctx) => {
|
|
76601
|
+
const [result, apiCall] = await userDataCreateNew(client, args103.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
76309
76602
|
if (!result.ok) {
|
|
76310
76603
|
return {
|
|
76311
76604
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76320,9 +76613,9 @@ Allows you to create User Data in a team, which can be used to perform custom se
|
|
|
76320
76613
|
|
|
76321
76614
|
// src/funcs/userDataDelete.ts
|
|
76322
76615
|
function userDataDelete(client, request, options) {
|
|
76323
|
-
return new APIPromise($
|
|
76616
|
+
return new APIPromise($do107(client, request, options));
|
|
76324
76617
|
}
|
|
76325
|
-
async function $
|
|
76618
|
+
async function $do107(client, request, options) {
|
|
76326
76619
|
const parsed = safeParse4(request, (value) => DeleteUserDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
76327
76620
|
if (!parsed.ok) {
|
|
76328
76621
|
return [parsed, { status: "invalid" }];
|
|
@@ -76395,20 +76688,20 @@ var init_userDataDelete = __esm(() => {
|
|
|
76395
76688
|
});
|
|
76396
76689
|
|
|
76397
76690
|
// src/mcp-server/tools/userDataDelete.ts
|
|
76398
|
-
var
|
|
76691
|
+
var args103, tool$userDataDelete;
|
|
76399
76692
|
var init_userDataDelete2 = __esm(() => {
|
|
76400
76693
|
init_userDataDelete();
|
|
76401
76694
|
init_operations();
|
|
76402
76695
|
init_tools();
|
|
76403
|
-
|
|
76696
|
+
args103 = {
|
|
76404
76697
|
request: DeleteUserDataRequest$inboundSchema
|
|
76405
76698
|
};
|
|
76406
76699
|
tool$userDataDelete = {
|
|
76407
76700
|
name: "user-data-delete",
|
|
76408
76701
|
description: `Delete user data`,
|
|
76409
|
-
args:
|
|
76410
|
-
tool: async (client,
|
|
76411
|
-
const [result, apiCall] = await userDataDelete(client,
|
|
76702
|
+
args: args103,
|
|
76703
|
+
tool: async (client, args104, ctx) => {
|
|
76704
|
+
const [result, apiCall] = await userDataDelete(client, args104.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
76412
76705
|
if (!result.ok) {
|
|
76413
76706
|
return {
|
|
76414
76707
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76422,9 +76715,9 @@ var init_userDataDelete2 = __esm(() => {
|
|
|
76422
76715
|
|
|
76423
76716
|
// src/funcs/userDataDeleteProjectUserData.ts
|
|
76424
76717
|
function userDataDeleteProjectUserData(client, request, options) {
|
|
76425
|
-
return new APIPromise($
|
|
76718
|
+
return new APIPromise($do108(client, request, options));
|
|
76426
76719
|
}
|
|
76427
|
-
async function $
|
|
76720
|
+
async function $do108(client, request, options) {
|
|
76428
76721
|
const parsed = safeParse4(request, (value) => DeleteProjectUserDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
76429
76722
|
if (!parsed.ok) {
|
|
76430
76723
|
return [parsed, { status: "invalid" }];
|
|
@@ -76501,12 +76794,12 @@ var init_userDataDeleteProjectUserData = __esm(() => {
|
|
|
76501
76794
|
});
|
|
76502
76795
|
|
|
76503
76796
|
// src/mcp-server/tools/userDataDeleteProjectUserData.ts
|
|
76504
|
-
var
|
|
76797
|
+
var args104, tool$userDataDeleteProjectUserData;
|
|
76505
76798
|
var init_userDataDeleteProjectUserData2 = __esm(() => {
|
|
76506
76799
|
init_userDataDeleteProjectUserData();
|
|
76507
76800
|
init_operations();
|
|
76508
76801
|
init_tools();
|
|
76509
|
-
|
|
76802
|
+
args104 = {
|
|
76510
76803
|
request: DeleteProjectUserDataRequest$inboundSchema
|
|
76511
76804
|
};
|
|
76512
76805
|
tool$userDataDeleteProjectUserData = {
|
|
@@ -76515,9 +76808,9 @@ var init_userDataDeleteProjectUserData2 = __esm(() => {
|
|
|
76515
76808
|
|
|
76516
76809
|
Allow you remove User Data in a project.
|
|
76517
76810
|
`,
|
|
76518
|
-
args:
|
|
76519
|
-
tool: async (client,
|
|
76520
|
-
const [result, apiCall] = await userDataDeleteProjectUserData(client,
|
|
76811
|
+
args: args104,
|
|
76812
|
+
tool: async (client, args105, ctx) => {
|
|
76813
|
+
const [result, apiCall] = await userDataDeleteProjectUserData(client, args105.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
76521
76814
|
if (!result.ok) {
|
|
76522
76815
|
return {
|
|
76523
76816
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76531,9 +76824,9 @@ Allow you remove User Data in a project.
|
|
|
76531
76824
|
|
|
76532
76825
|
// src/funcs/userDataGetProjectUserData.ts
|
|
76533
76826
|
function userDataGetProjectUserData(client, request, options) {
|
|
76534
|
-
return new APIPromise($
|
|
76827
|
+
return new APIPromise($do109(client, request, options));
|
|
76535
76828
|
}
|
|
76536
|
-
async function $
|
|
76829
|
+
async function $do109(client, request, options) {
|
|
76537
76830
|
const parsed = safeParse4(request, (value) => GetProjectUserDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
76538
76831
|
if (!parsed.ok) {
|
|
76539
76832
|
return [parsed, { status: "invalid" }];
|
|
@@ -76616,12 +76909,12 @@ var init_userDataGetProjectUserData = __esm(() => {
|
|
|
76616
76909
|
});
|
|
76617
76910
|
|
|
76618
76911
|
// src/mcp-server/tools/userDataGetProjectUserData.ts
|
|
76619
|
-
var
|
|
76912
|
+
var args105, tool$userDataGetProjectUserData;
|
|
76620
76913
|
var init_userDataGetProjectUserData2 = __esm(() => {
|
|
76621
76914
|
init_userDataGetProjectUserData();
|
|
76622
76915
|
init_operations();
|
|
76623
76916
|
init_tools();
|
|
76624
|
-
|
|
76917
|
+
args105 = {
|
|
76625
76918
|
request: GetProjectUserDataRequest$inboundSchema
|
|
76626
76919
|
};
|
|
76627
76920
|
tool$userDataGetProjectUserData = {
|
|
@@ -76630,9 +76923,9 @@ var init_userDataGetProjectUserData2 = __esm(() => {
|
|
|
76630
76923
|
|
|
76631
76924
|
Get User Data in the project. These scripts can be used to configure servers with user data.
|
|
76632
76925
|
`,
|
|
76633
|
-
args:
|
|
76634
|
-
tool: async (client,
|
|
76635
|
-
const [result, apiCall] = await userDataGetProjectUserData(client,
|
|
76926
|
+
args: args105,
|
|
76927
|
+
tool: async (client, args106, ctx) => {
|
|
76928
|
+
const [result, apiCall] = await userDataGetProjectUserData(client, args106.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
76636
76929
|
if (!result.ok) {
|
|
76637
76930
|
return {
|
|
76638
76931
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76647,9 +76940,9 @@ Get User Data in the project. These scripts can be used to configure servers wit
|
|
|
76647
76940
|
|
|
76648
76941
|
// src/funcs/userDataGetProjectUsersData.ts
|
|
76649
76942
|
function userDataGetProjectUsersData(client, request, options) {
|
|
76650
|
-
return new APIPromise($
|
|
76943
|
+
return new APIPromise($do110(client, request, options));
|
|
76651
76944
|
}
|
|
76652
|
-
async function $
|
|
76945
|
+
async function $do110(client, request, options) {
|
|
76653
76946
|
const parsed = safeParse4(request, (value) => GetProjectUsersDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
76654
76947
|
if (!parsed.ok) {
|
|
76655
76948
|
return [parsed, { status: "invalid" }];
|
|
@@ -76728,12 +77021,12 @@ var init_userDataGetProjectUsersData = __esm(() => {
|
|
|
76728
77021
|
});
|
|
76729
77022
|
|
|
76730
77023
|
// src/mcp-server/tools/userDataGetProjectUsersData.ts
|
|
76731
|
-
var
|
|
77024
|
+
var args106, tool$userDataGetProjectUsersData;
|
|
76732
77025
|
var init_userDataGetProjectUsersData2 = __esm(() => {
|
|
76733
77026
|
init_userDataGetProjectUsersData();
|
|
76734
77027
|
init_operations();
|
|
76735
77028
|
init_tools();
|
|
76736
|
-
|
|
77029
|
+
args106 = {
|
|
76737
77030
|
request: GetProjectUsersDataRequest$inboundSchema
|
|
76738
77031
|
};
|
|
76739
77032
|
tool$userDataGetProjectUsersData = {
|
|
@@ -76742,9 +77035,9 @@ var init_userDataGetProjectUsersData2 = __esm(() => {
|
|
|
76742
77035
|
|
|
76743
77036
|
List all Users Data in the project. These scripts can be used to configure servers with user data.
|
|
76744
77037
|
`,
|
|
76745
|
-
args:
|
|
76746
|
-
tool: async (client,
|
|
76747
|
-
const [result, apiCall] = await userDataGetProjectUsersData(client,
|
|
77038
|
+
args: args106,
|
|
77039
|
+
tool: async (client, args107, ctx) => {
|
|
77040
|
+
const [result, apiCall] = await userDataGetProjectUsersData(client, args107.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
76748
77041
|
if (!result.ok) {
|
|
76749
77042
|
return {
|
|
76750
77043
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76759,9 +77052,9 @@ List all Users Data in the project. These scripts can be used to configure serve
|
|
|
76759
77052
|
|
|
76760
77053
|
// src/funcs/userDataList.ts
|
|
76761
77054
|
function userDataList(client, request, options) {
|
|
76762
|
-
return new APIPromise($
|
|
77055
|
+
return new APIPromise($do111(client, request, options));
|
|
76763
77056
|
}
|
|
76764
|
-
async function $
|
|
77057
|
+
async function $do111(client, request, options) {
|
|
76765
77058
|
const parsed = safeParse4(request, (value) => GetUsersDataRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
76766
77059
|
if (!parsed.ok) {
|
|
76767
77060
|
return [parsed, { status: "invalid" }];
|
|
@@ -76836,12 +77129,12 @@ var init_userDataList = __esm(() => {
|
|
|
76836
77129
|
});
|
|
76837
77130
|
|
|
76838
77131
|
// src/mcp-server/tools/userDataList.ts
|
|
76839
|
-
var
|
|
77132
|
+
var args107, tool$userDataList;
|
|
76840
77133
|
var init_userDataList2 = __esm(() => {
|
|
76841
77134
|
init_userDataList();
|
|
76842
77135
|
init_operations();
|
|
76843
77136
|
init_tools();
|
|
76844
|
-
|
|
77137
|
+
args107 = {
|
|
76845
77138
|
request: GetUsersDataRequest$inboundSchema.optional()
|
|
76846
77139
|
};
|
|
76847
77140
|
tool$userDataList = {
|
|
@@ -76850,9 +77143,9 @@ var init_userDataList2 = __esm(() => {
|
|
|
76850
77143
|
|
|
76851
77144
|
List all Users Data in the project. These scripts can be used to configure servers with user data.
|
|
76852
77145
|
`,
|
|
76853
|
-
args:
|
|
76854
|
-
tool: async (client,
|
|
76855
|
-
const [result, apiCall] = await userDataList(client,
|
|
77146
|
+
args: args107,
|
|
77147
|
+
tool: async (client, args108, ctx) => {
|
|
77148
|
+
const [result, apiCall] = await userDataList(client, args108.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
76856
77149
|
if (!result.ok) {
|
|
76857
77150
|
return {
|
|
76858
77151
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76867,9 +77160,9 @@ List all Users Data in the project. These scripts can be used to configure serve
|
|
|
76867
77160
|
|
|
76868
77161
|
// src/funcs/userDataRetrieve.ts
|
|
76869
77162
|
function userDataRetrieve(client, request, options) {
|
|
76870
|
-
return new APIPromise($
|
|
77163
|
+
return new APIPromise($do112(client, request, options));
|
|
76871
77164
|
}
|
|
76872
|
-
async function $
|
|
77165
|
+
async function $do112(client, request, options) {
|
|
76873
77166
|
const parsed = safeParse4(request, (value) => GetUserDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
76874
77167
|
if (!parsed.ok) {
|
|
76875
77168
|
return [parsed, { status: "invalid" }];
|
|
@@ -76948,12 +77241,12 @@ var init_userDataRetrieve = __esm(() => {
|
|
|
76948
77241
|
});
|
|
76949
77242
|
|
|
76950
77243
|
// src/mcp-server/tools/userDataRetrieve.ts
|
|
76951
|
-
var
|
|
77244
|
+
var args108, tool$userDataRetrieve;
|
|
76952
77245
|
var init_userDataRetrieve2 = __esm(() => {
|
|
76953
77246
|
init_userDataRetrieve();
|
|
76954
77247
|
init_operations();
|
|
76955
77248
|
init_tools();
|
|
76956
|
-
|
|
77249
|
+
args108 = {
|
|
76957
77250
|
request: GetUserDataRequest$inboundSchema
|
|
76958
77251
|
};
|
|
76959
77252
|
tool$userDataRetrieve = {
|
|
@@ -76962,9 +77255,9 @@ var init_userDataRetrieve2 = __esm(() => {
|
|
|
76962
77255
|
|
|
76963
77256
|
Get User Data in the project. These scripts can be used to configure servers with user data.
|
|
76964
77257
|
`,
|
|
76965
|
-
args:
|
|
76966
|
-
tool: async (client,
|
|
76967
|
-
const [result, apiCall] = await userDataRetrieve(client,
|
|
77258
|
+
args: args108,
|
|
77259
|
+
tool: async (client, args109, ctx) => {
|
|
77260
|
+
const [result, apiCall] = await userDataRetrieve(client, args109.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
76968
77261
|
if (!result.ok) {
|
|
76969
77262
|
return {
|
|
76970
77263
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -76979,9 +77272,9 @@ Get User Data in the project. These scripts can be used to configure servers wit
|
|
|
76979
77272
|
|
|
76980
77273
|
// src/funcs/userDataUpdate.ts
|
|
76981
77274
|
function userDataUpdate(client, request, options) {
|
|
76982
|
-
return new APIPromise($
|
|
77275
|
+
return new APIPromise($do113(client, request, options));
|
|
76983
77276
|
}
|
|
76984
|
-
async function $
|
|
77277
|
+
async function $do113(client, request, options) {
|
|
76985
77278
|
const parsed = safeParse4(request, (value) => PatchUserDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
76986
77279
|
if (!parsed.ok) {
|
|
76987
77280
|
return [parsed, { status: "invalid" }];
|
|
@@ -77057,12 +77350,12 @@ var init_userDataUpdate = __esm(() => {
|
|
|
77057
77350
|
});
|
|
77058
77351
|
|
|
77059
77352
|
// src/mcp-server/tools/userDataUpdate.ts
|
|
77060
|
-
var
|
|
77353
|
+
var args109, tool$userDataUpdate;
|
|
77061
77354
|
var init_userDataUpdate2 = __esm(() => {
|
|
77062
77355
|
init_userDataUpdate();
|
|
77063
77356
|
init_operations();
|
|
77064
77357
|
init_tools();
|
|
77065
|
-
|
|
77358
|
+
args109 = {
|
|
77066
77359
|
request: PatchUserDataRequest$inboundSchema
|
|
77067
77360
|
};
|
|
77068
77361
|
tool$userDataUpdate = {
|
|
@@ -77071,9 +77364,9 @@ var init_userDataUpdate2 = __esm(() => {
|
|
|
77071
77364
|
|
|
77072
77365
|
Allow you update User Data in a team.
|
|
77073
77366
|
`,
|
|
77074
|
-
args:
|
|
77075
|
-
tool: async (client,
|
|
77076
|
-
const [result, apiCall] = await userDataUpdate(client,
|
|
77367
|
+
args: args109,
|
|
77368
|
+
tool: async (client, args110, ctx) => {
|
|
77369
|
+
const [result, apiCall] = await userDataUpdate(client, args110.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
77077
77370
|
if (!result.ok) {
|
|
77078
77371
|
return {
|
|
77079
77372
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -77088,9 +77381,9 @@ Allow you update User Data in a team.
|
|
|
77088
77381
|
|
|
77089
77382
|
// src/funcs/userDataUpdateForProject.ts
|
|
77090
77383
|
function userDataUpdateForProject(client, request, options) {
|
|
77091
|
-
return new APIPromise($
|
|
77384
|
+
return new APIPromise($do114(client, request, options));
|
|
77092
77385
|
}
|
|
77093
|
-
async function $
|
|
77386
|
+
async function $do114(client, request, options) {
|
|
77094
77387
|
const parsed = safeParse4(request, (value) => PutProjectUserDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
77095
77388
|
if (!parsed.ok) {
|
|
77096
77389
|
return [parsed, { status: "invalid" }];
|
|
@@ -77170,12 +77463,12 @@ var init_userDataUpdateForProject = __esm(() => {
|
|
|
77170
77463
|
});
|
|
77171
77464
|
|
|
77172
77465
|
// src/mcp-server/tools/userDataUpdateForProject.ts
|
|
77173
|
-
var
|
|
77466
|
+
var args110, tool$userDataUpdateForProject;
|
|
77174
77467
|
var init_userDataUpdateForProject2 = __esm(() => {
|
|
77175
77468
|
init_userDataUpdateForProject();
|
|
77176
77469
|
init_operations();
|
|
77177
77470
|
init_tools();
|
|
77178
|
-
|
|
77471
|
+
args110 = {
|
|
77179
77472
|
request: PutProjectUserDataRequest$inboundSchema
|
|
77180
77473
|
};
|
|
77181
77474
|
tool$userDataUpdateForProject = {
|
|
@@ -77184,9 +77477,9 @@ var init_userDataUpdateForProject2 = __esm(() => {
|
|
|
77184
77477
|
|
|
77185
77478
|
Allow you update User Data in a project.
|
|
77186
77479
|
`,
|
|
77187
|
-
args:
|
|
77188
|
-
tool: async (client,
|
|
77189
|
-
const [result, apiCall] = await userDataUpdateForProject(client,
|
|
77480
|
+
args: args110,
|
|
77481
|
+
tool: async (client, args111, ctx) => {
|
|
77482
|
+
const [result, apiCall] = await userDataUpdateForProject(client, args111.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
77190
77483
|
if (!result.ok) {
|
|
77191
77484
|
return {
|
|
77192
77485
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -77201,9 +77494,9 @@ Allow you update User Data in a project.
|
|
|
77201
77494
|
|
|
77202
77495
|
// src/funcs/userProfileGet.ts
|
|
77203
77496
|
function userProfileGet(client, options) {
|
|
77204
|
-
return new APIPromise($
|
|
77497
|
+
return new APIPromise($do115(client, options));
|
|
77205
77498
|
}
|
|
77206
|
-
async function $
|
|
77499
|
+
async function $do115(client, options) {
|
|
77207
77500
|
const path = pathToFunc("/user/profile")();
|
|
77208
77501
|
const headers = new Headers(compactMap({
|
|
77209
77502
|
Accept: "application/vnd.api+json"
|
|
@@ -77288,9 +77581,9 @@ Retrieve the current user profile
|
|
|
77288
77581
|
|
|
77289
77582
|
// src/funcs/userProfileListTeams.ts
|
|
77290
77583
|
function userProfileListTeams(client, options) {
|
|
77291
|
-
return new APIPromise($
|
|
77584
|
+
return new APIPromise($do116(client, options));
|
|
77292
77585
|
}
|
|
77293
|
-
async function $
|
|
77586
|
+
async function $do116(client, options) {
|
|
77294
77587
|
const path = pathToFunc("/user/teams")();
|
|
77295
77588
|
const headers = new Headers(compactMap({
|
|
77296
77589
|
Accept: "application/vnd.api+json"
|
|
@@ -77375,9 +77668,9 @@ Returns a list of all teams the user belongs to
|
|
|
77375
77668
|
|
|
77376
77669
|
// src/funcs/userProfileUpdate.ts
|
|
77377
77670
|
function userProfileUpdate(client, request, options) {
|
|
77378
|
-
return new APIPromise($
|
|
77671
|
+
return new APIPromise($do117(client, request, options));
|
|
77379
77672
|
}
|
|
77380
|
-
async function $
|
|
77673
|
+
async function $do117(client, request, options) {
|
|
77381
77674
|
const parsed = safeParse4(request, (value) => PatchUserProfileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
77382
77675
|
if (!parsed.ok) {
|
|
77383
77676
|
return [parsed, { status: "invalid" }];
|
|
@@ -77452,12 +77745,12 @@ var init_userProfileUpdate = __esm(() => {
|
|
|
77452
77745
|
});
|
|
77453
77746
|
|
|
77454
77747
|
// src/mcp-server/tools/userProfileUpdate.ts
|
|
77455
|
-
var
|
|
77748
|
+
var args111, tool$userProfileUpdate;
|
|
77456
77749
|
var init_userProfileUpdate2 = __esm(() => {
|
|
77457
77750
|
init_userProfileUpdate();
|
|
77458
77751
|
init_operations();
|
|
77459
77752
|
init_tools();
|
|
77460
|
-
|
|
77753
|
+
args111 = {
|
|
77461
77754
|
request: PatchUserProfileRequest$inboundSchema
|
|
77462
77755
|
};
|
|
77463
77756
|
tool$userProfileUpdate = {
|
|
@@ -77466,9 +77759,9 @@ var init_userProfileUpdate2 = __esm(() => {
|
|
|
77466
77759
|
|
|
77467
77760
|
Update the current user profile
|
|
77468
77761
|
`,
|
|
77469
|
-
args:
|
|
77470
|
-
tool: async (client,
|
|
77471
|
-
const [result, apiCall] = await userProfileUpdate(client,
|
|
77762
|
+
args: args111,
|
|
77763
|
+
tool: async (client, args112, ctx) => {
|
|
77764
|
+
const [result, apiCall] = await userProfileUpdate(client, args112.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
77472
77765
|
if (!result.ok) {
|
|
77473
77766
|
return {
|
|
77474
77767
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -77483,9 +77776,9 @@ Update the current user profile
|
|
|
77483
77776
|
|
|
77484
77777
|
// src/funcs/virtualMachinesCreate.ts
|
|
77485
77778
|
function virtualMachinesCreate(client, request, options) {
|
|
77486
|
-
return new APIPromise($
|
|
77779
|
+
return new APIPromise($do118(client, request, options));
|
|
77487
77780
|
}
|
|
77488
|
-
async function $
|
|
77781
|
+
async function $do118(client, request, options) {
|
|
77489
77782
|
const parsed = safeParse4(request, (value) => VirtualMachinePayload$outboundSchema.parse(value), "Input validation failed");
|
|
77490
77783
|
if (!parsed.ok) {
|
|
77491
77784
|
return [parsed, { status: "invalid" }];
|
|
@@ -77554,12 +77847,12 @@ var init_virtualMachinesCreate = __esm(() => {
|
|
|
77554
77847
|
});
|
|
77555
77848
|
|
|
77556
77849
|
// src/mcp-server/tools/virtualMachinesCreate.ts
|
|
77557
|
-
var
|
|
77850
|
+
var args112, tool$virtualMachinesCreate;
|
|
77558
77851
|
var init_virtualMachinesCreate2 = __esm(() => {
|
|
77559
77852
|
init_virtualMachinesCreate();
|
|
77560
77853
|
init_models();
|
|
77561
77854
|
init_tools();
|
|
77562
|
-
|
|
77855
|
+
args112 = {
|
|
77563
77856
|
request: VirtualMachinePayload$inboundSchema
|
|
77564
77857
|
};
|
|
77565
77858
|
tool$virtualMachinesCreate = {
|
|
@@ -77568,9 +77861,9 @@ var init_virtualMachinesCreate2 = __esm(() => {
|
|
|
77568
77861
|
|
|
77569
77862
|
Creates a new Virtual Machine.
|
|
77570
77863
|
`,
|
|
77571
|
-
args:
|
|
77572
|
-
tool: async (client,
|
|
77573
|
-
const [result, apiCall] = await virtualMachinesCreate(client,
|
|
77864
|
+
args: args112,
|
|
77865
|
+
tool: async (client, args113, ctx) => {
|
|
77866
|
+
const [result, apiCall] = await virtualMachinesCreate(client, args113.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
77574
77867
|
if (!result.ok) {
|
|
77575
77868
|
return {
|
|
77576
77869
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -77585,9 +77878,9 @@ Creates a new Virtual Machine.
|
|
|
77585
77878
|
|
|
77586
77879
|
// src/funcs/virtualMachinesCreateVirtualMachineAction.ts
|
|
77587
77880
|
function virtualMachinesCreateVirtualMachineAction(client, request, options) {
|
|
77588
|
-
return new APIPromise($
|
|
77881
|
+
return new APIPromise($do119(client, request, options));
|
|
77589
77882
|
}
|
|
77590
|
-
async function $
|
|
77883
|
+
async function $do119(client, request, options) {
|
|
77591
77884
|
const parsed = safeParse4(request, (value) => CreateVirtualMachineActionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
77592
77885
|
if (!parsed.ok) {
|
|
77593
77886
|
return [parsed, { status: "invalid" }];
|
|
@@ -77658,12 +77951,12 @@ var init_virtualMachinesCreateVirtualMachineAction = __esm(() => {
|
|
|
77658
77951
|
});
|
|
77659
77952
|
|
|
77660
77953
|
// src/mcp-server/tools/virtualMachinesCreateVirtualMachineAction.ts
|
|
77661
|
-
var
|
|
77954
|
+
var args113, tool$virtualMachinesCreateVirtualMachineAction;
|
|
77662
77955
|
var init_virtualMachinesCreateVirtualMachineAction2 = __esm(() => {
|
|
77663
77956
|
init_virtualMachinesCreateVirtualMachineAction();
|
|
77664
77957
|
init_operations();
|
|
77665
77958
|
init_tools();
|
|
77666
|
-
|
|
77959
|
+
args113 = {
|
|
77667
77960
|
request: CreateVirtualMachineActionRequest$inboundSchema
|
|
77668
77961
|
};
|
|
77669
77962
|
tool$virtualMachinesCreateVirtualMachineAction = {
|
|
@@ -77675,9 +77968,9 @@ Performs a power action on a given virtual machine:
|
|
|
77675
77968
|
- \`power_off\` - Stops the virtual machine
|
|
77676
77969
|
- \`reboot\` - Restarts the virtual machine
|
|
77677
77970
|
`,
|
|
77678
|
-
args:
|
|
77679
|
-
tool: async (client,
|
|
77680
|
-
const [result, apiCall] = await virtualMachinesCreateVirtualMachineAction(client,
|
|
77971
|
+
args: args113,
|
|
77972
|
+
tool: async (client, args114, ctx) => {
|
|
77973
|
+
const [result, apiCall] = await virtualMachinesCreateVirtualMachineAction(client, args114.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
77681
77974
|
if (!result.ok) {
|
|
77682
77975
|
return {
|
|
77683
77976
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -77691,9 +77984,9 @@ Performs a power action on a given virtual machine:
|
|
|
77691
77984
|
|
|
77692
77985
|
// src/funcs/virtualMachinesDelete.ts
|
|
77693
77986
|
function virtualMachinesDelete(client, request, options) {
|
|
77694
|
-
return new APIPromise($
|
|
77987
|
+
return new APIPromise($do120(client, request, options));
|
|
77695
77988
|
}
|
|
77696
|
-
async function $
|
|
77989
|
+
async function $do120(client, request, options) {
|
|
77697
77990
|
const parsed = safeParse4(request, (value) => DestroyVirtualMachineRequest$outboundSchema.parse(value), "Input validation failed");
|
|
77698
77991
|
if (!parsed.ok) {
|
|
77699
77992
|
return [parsed, { status: "invalid" }];
|
|
@@ -77763,12 +78056,12 @@ var init_virtualMachinesDelete = __esm(() => {
|
|
|
77763
78056
|
});
|
|
77764
78057
|
|
|
77765
78058
|
// src/mcp-server/tools/virtualMachinesDelete.ts
|
|
77766
|
-
var
|
|
78059
|
+
var args114, tool$virtualMachinesDelete;
|
|
77767
78060
|
var init_virtualMachinesDelete2 = __esm(() => {
|
|
77768
78061
|
init_virtualMachinesDelete();
|
|
77769
78062
|
init_operations();
|
|
77770
78063
|
init_tools();
|
|
77771
|
-
|
|
78064
|
+
args114 = {
|
|
77772
78065
|
request: DestroyVirtualMachineRequest$inboundSchema
|
|
77773
78066
|
};
|
|
77774
78067
|
tool$virtualMachinesDelete = {
|
|
@@ -77777,9 +78070,9 @@ var init_virtualMachinesDelete2 = __esm(() => {
|
|
|
77777
78070
|
|
|
77778
78071
|
Destroys a Virtual Machine.
|
|
77779
78072
|
`,
|
|
77780
|
-
args:
|
|
77781
|
-
tool: async (client,
|
|
77782
|
-
const [result, apiCall] = await virtualMachinesDelete(client,
|
|
78073
|
+
args: args114,
|
|
78074
|
+
tool: async (client, args115, ctx) => {
|
|
78075
|
+
const [result, apiCall] = await virtualMachinesDelete(client, args115.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
77783
78076
|
if (!result.ok) {
|
|
77784
78077
|
return {
|
|
77785
78078
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -77793,9 +78086,9 @@ Destroys a Virtual Machine.
|
|
|
77793
78086
|
|
|
77794
78087
|
// src/funcs/virtualMachinesGet.ts
|
|
77795
78088
|
function virtualMachinesGet(client, request, options) {
|
|
77796
|
-
return new APIPromise($
|
|
78089
|
+
return new APIPromise($do121(client, request, options));
|
|
77797
78090
|
}
|
|
77798
|
-
async function $
|
|
78091
|
+
async function $do121(client, request, options) {
|
|
77799
78092
|
const parsed = safeParse4(request, (value) => ShowVirtualMachineRequest$outboundSchema.parse(value), "Input validation failed");
|
|
77800
78093
|
if (!parsed.ok) {
|
|
77801
78094
|
return [parsed, { status: "invalid" }];
|
|
@@ -77867,12 +78160,12 @@ var init_virtualMachinesGet = __esm(() => {
|
|
|
77867
78160
|
});
|
|
77868
78161
|
|
|
77869
78162
|
// src/mcp-server/tools/virtualMachinesGet.ts
|
|
77870
|
-
var
|
|
78163
|
+
var args115, tool$virtualMachinesGet;
|
|
77871
78164
|
var init_virtualMachinesGet2 = __esm(() => {
|
|
77872
78165
|
init_virtualMachinesGet();
|
|
77873
78166
|
init_operations();
|
|
77874
78167
|
init_tools();
|
|
77875
|
-
|
|
78168
|
+
args115 = {
|
|
77876
78169
|
request: ShowVirtualMachineRequest$inboundSchema
|
|
77877
78170
|
};
|
|
77878
78171
|
tool$virtualMachinesGet = {
|
|
@@ -77881,9 +78174,9 @@ var init_virtualMachinesGet2 = __esm(() => {
|
|
|
77881
78174
|
|
|
77882
78175
|
Show a Virtual Machine.
|
|
77883
78176
|
`,
|
|
77884
|
-
args:
|
|
77885
|
-
tool: async (client,
|
|
77886
|
-
const [result, apiCall] = await virtualMachinesGet(client,
|
|
78177
|
+
args: args115,
|
|
78178
|
+
tool: async (client, args116, ctx) => {
|
|
78179
|
+
const [result, apiCall] = await virtualMachinesGet(client, args116.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
77887
78180
|
if (!result.ok) {
|
|
77888
78181
|
return {
|
|
77889
78182
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -77898,9 +78191,9 @@ Show a Virtual Machine.
|
|
|
77898
78191
|
|
|
77899
78192
|
// src/funcs/virtualMachinesList.ts
|
|
77900
78193
|
function virtualMachinesList(client, request, options) {
|
|
77901
|
-
return new APIPromise($
|
|
78194
|
+
return new APIPromise($do122(client, request, options));
|
|
77902
78195
|
}
|
|
77903
|
-
async function $
|
|
78196
|
+
async function $do122(client, request, options) {
|
|
77904
78197
|
const parsed = safeParse4(request, (value) => IndexVirtualMachineRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
77905
78198
|
if (!parsed.ok) {
|
|
77906
78199
|
return [parsed, { status: "invalid" }];
|
|
@@ -77974,12 +78267,12 @@ var init_virtualMachinesList = __esm(() => {
|
|
|
77974
78267
|
});
|
|
77975
78268
|
|
|
77976
78269
|
// src/mcp-server/tools/virtualMachinesList.ts
|
|
77977
|
-
var
|
|
78270
|
+
var args116, tool$virtualMachinesList;
|
|
77978
78271
|
var init_virtualMachinesList2 = __esm(() => {
|
|
77979
78272
|
init_virtualMachinesList();
|
|
77980
78273
|
init_operations();
|
|
77981
78274
|
init_tools();
|
|
77982
|
-
|
|
78275
|
+
args116 = {
|
|
77983
78276
|
request: IndexVirtualMachineRequest$inboundSchema.optional()
|
|
77984
78277
|
};
|
|
77985
78278
|
tool$virtualMachinesList = {
|
|
@@ -77988,9 +78281,9 @@ var init_virtualMachinesList2 = __esm(() => {
|
|
|
77988
78281
|
|
|
77989
78282
|
Show all Team's Virtual Machines.
|
|
77990
78283
|
`,
|
|
77991
|
-
args:
|
|
77992
|
-
tool: async (client,
|
|
77993
|
-
const [result, apiCall] = await virtualMachinesList(client,
|
|
78284
|
+
args: args116,
|
|
78285
|
+
tool: async (client, args117, ctx) => {
|
|
78286
|
+
const [result, apiCall] = await virtualMachinesList(client, args117.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
77994
78287
|
if (!result.ok) {
|
|
77995
78288
|
return {
|
|
77996
78289
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -78005,9 +78298,9 @@ Show all Team's Virtual Machines.
|
|
|
78005
78298
|
|
|
78006
78299
|
// src/funcs/virtualMachinesUpdateVirtualMachine.ts
|
|
78007
78300
|
function virtualMachinesUpdateVirtualMachine(client, request, options) {
|
|
78008
|
-
return new APIPromise($
|
|
78301
|
+
return new APIPromise($do123(client, request, options));
|
|
78009
78302
|
}
|
|
78010
|
-
async function $
|
|
78303
|
+
async function $do123(client, request, options) {
|
|
78011
78304
|
const parsed = safeParse4(request, (value) => UpdateVirtualMachineRequest$outboundSchema.parse(value), "Input validation failed");
|
|
78012
78305
|
if (!parsed.ok) {
|
|
78013
78306
|
return [parsed, { status: "invalid" }];
|
|
@@ -78082,12 +78375,12 @@ var init_virtualMachinesUpdateVirtualMachine = __esm(() => {
|
|
|
78082
78375
|
});
|
|
78083
78376
|
|
|
78084
78377
|
// src/mcp-server/tools/virtualMachinesUpdateVirtualMachine.ts
|
|
78085
|
-
var
|
|
78378
|
+
var args117, tool$virtualMachinesUpdateVirtualMachine;
|
|
78086
78379
|
var init_virtualMachinesUpdateVirtualMachine2 = __esm(() => {
|
|
78087
78380
|
init_virtualMachinesUpdateVirtualMachine();
|
|
78088
78381
|
init_operations();
|
|
78089
78382
|
init_tools();
|
|
78090
|
-
|
|
78383
|
+
args117 = {
|
|
78091
78384
|
request: UpdateVirtualMachineRequest$inboundSchema
|
|
78092
78385
|
};
|
|
78093
78386
|
tool$virtualMachinesUpdateVirtualMachine = {
|
|
@@ -78096,9 +78389,9 @@ var init_virtualMachinesUpdateVirtualMachine2 = __esm(() => {
|
|
|
78096
78389
|
|
|
78097
78390
|
Updates a Virtual Machine's display name (hostname).
|
|
78098
78391
|
`,
|
|
78099
|
-
args:
|
|
78100
|
-
tool: async (client,
|
|
78101
|
-
const [result, apiCall] = await virtualMachinesUpdateVirtualMachine(client,
|
|
78392
|
+
args: args117,
|
|
78393
|
+
tool: async (client, args118, ctx) => {
|
|
78394
|
+
const [result, apiCall] = await virtualMachinesUpdateVirtualMachine(client, args118.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
78102
78395
|
if (!result.ok) {
|
|
78103
78396
|
return {
|
|
78104
78397
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -78113,9 +78406,9 @@ Updates a Virtual Machine's display name (hostname).
|
|
|
78113
78406
|
|
|
78114
78407
|
// src/funcs/virtualNetworksDelete.ts
|
|
78115
78408
|
function virtualNetworksDelete(client, request, options) {
|
|
78116
|
-
return new APIPromise($
|
|
78409
|
+
return new APIPromise($do124(client, request, options));
|
|
78117
78410
|
}
|
|
78118
|
-
async function $
|
|
78411
|
+
async function $do124(client, request, options) {
|
|
78119
78412
|
const parsed = safeParse4(request, (value) => DestroyVirtualNetworkRequest$outboundSchema.parse(value), "Input validation failed");
|
|
78120
78413
|
if (!parsed.ok) {
|
|
78121
78414
|
return [parsed, { status: "invalid" }];
|
|
@@ -78188,12 +78481,12 @@ var init_virtualNetworksDelete = __esm(() => {
|
|
|
78188
78481
|
});
|
|
78189
78482
|
|
|
78190
78483
|
// src/mcp-server/tools/virtualNetworksDelete.ts
|
|
78191
|
-
var
|
|
78484
|
+
var args118, tool$virtualNetworksDelete;
|
|
78192
78485
|
var init_virtualNetworksDelete2 = __esm(() => {
|
|
78193
78486
|
init_virtualNetworksDelete();
|
|
78194
78487
|
init_operations();
|
|
78195
78488
|
init_tools();
|
|
78196
|
-
|
|
78489
|
+
args118 = {
|
|
78197
78490
|
request: DestroyVirtualNetworkRequest$inboundSchema
|
|
78198
78491
|
};
|
|
78199
78492
|
tool$virtualNetworksDelete = {
|
|
@@ -78202,9 +78495,9 @@ var init_virtualNetworksDelete2 = __esm(() => {
|
|
|
78202
78495
|
|
|
78203
78496
|
Delete virtual network
|
|
78204
78497
|
`,
|
|
78205
|
-
args:
|
|
78206
|
-
tool: async (client,
|
|
78207
|
-
const [result, apiCall] = await virtualNetworksDelete(client,
|
|
78498
|
+
args: args118,
|
|
78499
|
+
tool: async (client, args119, ctx) => {
|
|
78500
|
+
const [result, apiCall] = await virtualNetworksDelete(client, args119.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
78208
78501
|
if (!result.ok) {
|
|
78209
78502
|
return {
|
|
78210
78503
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -78218,9 +78511,9 @@ Delete virtual network
|
|
|
78218
78511
|
|
|
78219
78512
|
// src/funcs/vpnSessionsCreate.ts
|
|
78220
78513
|
function vpnSessionsCreate(client, request, options) {
|
|
78221
|
-
return new APIPromise($
|
|
78514
|
+
return new APIPromise($do125(client, request, options));
|
|
78222
78515
|
}
|
|
78223
|
-
async function $
|
|
78516
|
+
async function $do125(client, request, options) {
|
|
78224
78517
|
const parsed = safeParse4(request, (value) => PostVpnSessionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
78225
78518
|
if (!parsed.ok) {
|
|
78226
78519
|
return [parsed, { status: "invalid" }];
|
|
@@ -78290,12 +78583,12 @@ var init_vpnSessionsCreate = __esm(() => {
|
|
|
78290
78583
|
});
|
|
78291
78584
|
|
|
78292
78585
|
// src/mcp-server/tools/vpnSessionsCreate.ts
|
|
78293
|
-
var
|
|
78586
|
+
var args119, tool$vpnSessionsCreate;
|
|
78294
78587
|
var init_vpnSessionsCreate2 = __esm(() => {
|
|
78295
78588
|
init_vpnSessionsCreate();
|
|
78296
78589
|
init_operations();
|
|
78297
78590
|
init_tools();
|
|
78298
|
-
|
|
78591
|
+
args119 = {
|
|
78299
78592
|
request: PostVpnSessionRequest$inboundSchema
|
|
78300
78593
|
};
|
|
78301
78594
|
tool$vpnSessionsCreate = {
|
|
@@ -78305,9 +78598,9 @@ var init_vpnSessionsCreate2 = __esm(() => {
|
|
|
78305
78598
|
Creates a new VPN Session.
|
|
78306
78599
|
\`NOTE:\` The VPN credentials are only listed ONCE upon creation. They can however be refreshed or deleted.
|
|
78307
78600
|
`,
|
|
78308
|
-
args:
|
|
78309
|
-
tool: async (client,
|
|
78310
|
-
const [result, apiCall] = await vpnSessionsCreate(client,
|
|
78601
|
+
args: args119,
|
|
78602
|
+
tool: async (client, args120, ctx) => {
|
|
78603
|
+
const [result, apiCall] = await vpnSessionsCreate(client, args120.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
78311
78604
|
if (!result.ok) {
|
|
78312
78605
|
return {
|
|
78313
78606
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -78322,9 +78615,9 @@ Creates a new VPN Session.
|
|
|
78322
78615
|
|
|
78323
78616
|
// src/funcs/vpnSessionsDelete.ts
|
|
78324
78617
|
function vpnSessionsDelete(client, request, options) {
|
|
78325
|
-
return new APIPromise($
|
|
78618
|
+
return new APIPromise($do126(client, request, options));
|
|
78326
78619
|
}
|
|
78327
|
-
async function $
|
|
78620
|
+
async function $do126(client, request, options) {
|
|
78328
78621
|
const parsed = safeParse4(request, (value) => DeleteVpnSessionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
78329
78622
|
if (!parsed.ok) {
|
|
78330
78623
|
return [parsed, { status: "invalid" }];
|
|
@@ -78397,12 +78690,12 @@ var init_vpnSessionsDelete = __esm(() => {
|
|
|
78397
78690
|
});
|
|
78398
78691
|
|
|
78399
78692
|
// src/mcp-server/tools/vpnSessionsDelete.ts
|
|
78400
|
-
var
|
|
78693
|
+
var args120, tool$vpnSessionsDelete;
|
|
78401
78694
|
var init_vpnSessionsDelete2 = __esm(() => {
|
|
78402
78695
|
init_vpnSessionsDelete();
|
|
78403
78696
|
init_operations();
|
|
78404
78697
|
init_tools();
|
|
78405
|
-
|
|
78698
|
+
args120 = {
|
|
78406
78699
|
request: DeleteVpnSessionRequest$inboundSchema
|
|
78407
78700
|
};
|
|
78408
78701
|
tool$vpnSessionsDelete = {
|
|
@@ -78411,9 +78704,9 @@ var init_vpnSessionsDelete2 = __esm(() => {
|
|
|
78411
78704
|
|
|
78412
78705
|
Deletes an existing VPN Session.
|
|
78413
78706
|
`,
|
|
78414
|
-
args:
|
|
78415
|
-
tool: async (client,
|
|
78416
|
-
const [result, apiCall] = await vpnSessionsDelete(client,
|
|
78707
|
+
args: args120,
|
|
78708
|
+
tool: async (client, args121, ctx) => {
|
|
78709
|
+
const [result, apiCall] = await vpnSessionsDelete(client, args121.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
78417
78710
|
if (!result.ok) {
|
|
78418
78711
|
return {
|
|
78419
78712
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -78427,9 +78720,9 @@ Deletes an existing VPN Session.
|
|
|
78427
78720
|
|
|
78428
78721
|
// src/funcs/vpnSessionsList.ts
|
|
78429
78722
|
function vpnSessionsList(client, request, options) {
|
|
78430
|
-
return new APIPromise($
|
|
78723
|
+
return new APIPromise($do127(client, request, options));
|
|
78431
78724
|
}
|
|
78432
|
-
async function $
|
|
78725
|
+
async function $do127(client, request, options) {
|
|
78433
78726
|
const parsed = safeParse4(request, (value) => GetVpnSessionsRequest$outboundSchema.optional().parse(value), "Input validation failed");
|
|
78434
78727
|
if (!parsed.ok) {
|
|
78435
78728
|
return [parsed, { status: "invalid" }];
|
|
@@ -78501,20 +78794,20 @@ var init_vpnSessionsList = __esm(() => {
|
|
|
78501
78794
|
});
|
|
78502
78795
|
|
|
78503
78796
|
// src/mcp-server/tools/vpnSessionsList.ts
|
|
78504
|
-
var
|
|
78797
|
+
var args121, tool$vpnSessionsList;
|
|
78505
78798
|
var init_vpnSessionsList2 = __esm(() => {
|
|
78506
78799
|
init_vpnSessionsList();
|
|
78507
78800
|
init_operations();
|
|
78508
78801
|
init_tools();
|
|
78509
|
-
|
|
78802
|
+
args121 = {
|
|
78510
78803
|
request: GetVpnSessionsRequest$inboundSchema.optional()
|
|
78511
78804
|
};
|
|
78512
78805
|
tool$vpnSessionsList = {
|
|
78513
78806
|
name: "vpn-sessions-list",
|
|
78514
78807
|
description: `List VPN sessions`,
|
|
78515
|
-
args:
|
|
78516
|
-
tool: async (client,
|
|
78517
|
-
const [result, apiCall] = await vpnSessionsList(client,
|
|
78808
|
+
args: args121,
|
|
78809
|
+
tool: async (client, args122, ctx) => {
|
|
78810
|
+
const [result, apiCall] = await vpnSessionsList(client, args122.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
78518
78811
|
if (!result.ok) {
|
|
78519
78812
|
return {
|
|
78520
78813
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -78529,9 +78822,9 @@ var init_vpnSessionsList2 = __esm(() => {
|
|
|
78529
78822
|
|
|
78530
78823
|
// src/funcs/vpnSessionsRefreshPassword.ts
|
|
78531
78824
|
function vpnSessionsRefreshPassword(client, request, options) {
|
|
78532
|
-
return new APIPromise($
|
|
78825
|
+
return new APIPromise($do128(client, request, options));
|
|
78533
78826
|
}
|
|
78534
|
-
async function $
|
|
78827
|
+
async function $do128(client, request, options) {
|
|
78535
78828
|
const parsed = safeParse4(request, (value) => PutVpnSessionRequest$outboundSchema.parse(value), "Input validation failed");
|
|
78536
78829
|
if (!parsed.ok) {
|
|
78537
78830
|
return [parsed, { status: "invalid" }];
|
|
@@ -78606,12 +78899,12 @@ var init_vpnSessionsRefreshPassword = __esm(() => {
|
|
|
78606
78899
|
});
|
|
78607
78900
|
|
|
78608
78901
|
// src/mcp-server/tools/vpnSessionsRefreshPassword.ts
|
|
78609
|
-
var
|
|
78902
|
+
var args122, tool$vpnSessionsRefreshPassword;
|
|
78610
78903
|
var init_vpnSessionsRefreshPassword2 = __esm(() => {
|
|
78611
78904
|
init_vpnSessionsRefreshPassword();
|
|
78612
78905
|
init_operations();
|
|
78613
78906
|
init_tools();
|
|
78614
|
-
|
|
78907
|
+
args122 = {
|
|
78615
78908
|
request: PutVpnSessionRequest$inboundSchema
|
|
78616
78909
|
};
|
|
78617
78910
|
tool$vpnSessionsRefreshPassword = {
|
|
@@ -78620,9 +78913,9 @@ var init_vpnSessionsRefreshPassword2 = __esm(() => {
|
|
|
78620
78913
|
|
|
78621
78914
|
Refreshing an existing VPN Session will create new credentials for that session
|
|
78622
78915
|
`,
|
|
78623
|
-
args:
|
|
78624
|
-
tool: async (client,
|
|
78625
|
-
const [result, apiCall] = await vpnSessionsRefreshPassword(client,
|
|
78916
|
+
args: args122,
|
|
78917
|
+
tool: async (client, args123, ctx) => {
|
|
78918
|
+
const [result, apiCall] = await vpnSessionsRefreshPassword(client, args123.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
78626
78919
|
if (!result.ok) {
|
|
78627
78920
|
return {
|
|
78628
78921
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -78639,7 +78932,7 @@ Refreshing an existing VPN Session will create new credentials for that session
|
|
|
78639
78932
|
function createMCPServer(deps) {
|
|
78640
78933
|
const server2 = new McpServer({
|
|
78641
78934
|
name: "Latitudesh",
|
|
78642
|
-
version: "0.3.
|
|
78935
|
+
version: "0.3.6"
|
|
78643
78936
|
});
|
|
78644
78937
|
const client = new LatitudeshCore({
|
|
78645
78938
|
bearer: deps.bearer,
|
|
@@ -78686,6 +78979,7 @@ function createMCPServer(deps) {
|
|
|
78686
78979
|
tool(tool$kubernetesClustersCreateKubernetesCluster);
|
|
78687
78980
|
tool(tool$kubernetesClustersGetKubernetesCluster);
|
|
78688
78981
|
tool(tool$kubernetesClustersDeleteKubernetesCluster);
|
|
78982
|
+
tool(tool$kubernetesClustersUpdateKubernetesCluster);
|
|
78689
78983
|
tool(tool$kubernetesClustersGetKubernetesClusterKubeconfig);
|
|
78690
78984
|
tool(tool$plansList);
|
|
78691
78985
|
tool(tool$plansGet);
|
|
@@ -78816,6 +79110,7 @@ var init_server4 = __esm(() => {
|
|
|
78816
79110
|
init_kubernetesClustersGetKubernetesCluster2();
|
|
78817
79111
|
init_kubernetesClustersGetKubernetesClusterKubeconfig2();
|
|
78818
79112
|
init_kubernetesClustersListKubernetesClusters2();
|
|
79113
|
+
init_kubernetesClustersUpdateKubernetesCluster2();
|
|
78819
79114
|
init_operatingSystemsListPlans2();
|
|
78820
79115
|
init_plansGet2();
|
|
78821
79116
|
init_plansGetBandwidth2();
|
|
@@ -80118,7 +80413,7 @@ var routes = ln({
|
|
|
80118
80413
|
var app = _e(routes, {
|
|
80119
80414
|
name: "mcp",
|
|
80120
80415
|
versionInfo: {
|
|
80121
|
-
currentVersion: "0.3.
|
|
80416
|
+
currentVersion: "0.3.6"
|
|
80122
80417
|
}
|
|
80123
80418
|
});
|
|
80124
80419
|
Yt(app, process3.argv.slice(2), buildContext(process3));
|
|
@@ -80126,5 +80421,5 @@ export {
|
|
|
80126
80421
|
app
|
|
80127
80422
|
};
|
|
80128
80423
|
|
|
80129
|
-
//# debugId=
|
|
80424
|
+
//# debugId=4BD556437EF3D68564756E2164756E21
|
|
80130
80425
|
//# sourceMappingURL=mcp-server.js.map
|