diff --git a/unraid_mcp/tools/keys.py b/unraid_mcp/tools/keys.py index f59ee0e..c5f08bc 100644 --- a/unraid_mcp/tools/keys.py +++ b/unraid_mcp/tools/keys.py @@ -6,21 +6,11 @@ creating, updating, and deleting API keys. from typing import Any, Literal, get_args -from fastmcp import Context as _Context from fastmcp import FastMCP from ..config.logging import logger from ..core.client import make_graphql_request -from ..core.exceptions import CredentialsNotConfiguredError as _CredErr from ..core.exceptions import ToolError, tool_error_handler -from ..core.setup import elicit_and_configure as _elicit - - -# Re-export at module scope so tests can patch "unraid_mcp.tools.keys.elicit_and_configure" -# and "unraid_mcp.tools.keys.CredentialsNotConfiguredError" -elicit_and_configure = _elicit -CredentialsNotConfiguredError = _CredErr -Context = _Context QUERIES: dict[str, str] = { @@ -85,7 +75,6 @@ def register_keys_tool(mcp: FastMCP) -> None: name: str | None = None, roles: list[str] | None = None, permissions: list[str] | None = None, - ctx: Context | None = None, ) -> dict[str, Any]: """Manage Unraid API keys. @@ -106,15 +95,7 @@ def register_keys_tool(mcp: FastMCP) -> None: logger.info(f"Executing unraid_keys action={action}") if action == "list": - try: - data = await make_graphql_request(QUERIES["list"]) - except CredentialsNotConfiguredError: - configured = await elicit_and_configure(ctx) - if not configured: - raise ToolError( - "Credentials required. Run `unraid_health action=setup` to configure." - ) - data = await make_graphql_request(QUERIES["list"]) + data = await make_graphql_request(QUERIES["list"]) keys = data.get("apiKeys", []) return {"keys": list(keys) if isinstance(keys, list) else []}