Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

appscode-api-js-client

Package Overview
Dependencies
Maintainers
1
Versions
65
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

appscode-api-js-client - npm Package Compare versions

Comparing version 1.0.33 to 1.0.35

apis/auth/v1beta1/project.gw.js

6

index.js

@@ -11,4 +11,2 @@ // Code generated by ./hack/browserify.py

var apis = _.merge({},
require('./apis/alert/v1beta1/alert.gw.js'),
require('./apis/alert/v1beta1/incident.gw.js'),
require('./apis/artifactory/v1beta1/artifact.gw.js'),

@@ -18,2 +16,3 @@ require('./apis/artifactory/v1beta1/version.gw.js'),

require('./apis/auth/v1beta1/conduit.gw.js'),
require('./apis/auth/v1beta1/project.gw.js'),
require('./apis/backup/v1beta1/client.gw.js'),

@@ -40,6 +39,7 @@ require('./apis/backup/v1beta1/server.gw.js'),

require('./apis/kubernetes/v1beta1/event.gw.js'),
require('./apis/kubernetes/v1beta1/incident.gw.js'),
require('./apis/kubernetes/v1beta1/loadbalancer.gw.js'),
require('./apis/kubernetes/v1beta1/metadata.gw.js'),
require('./apis/kubernetes/v1beta2/client.gw.js'),
require('./apis/kubernetes/v1beta2/disk.gw.js'),
require('./apis/loadbalancer/v1beta1/loadbalancer.gw.js'),
require('./apis/mailinglist/v1beta1/mailinglist.gw.js'),

@@ -46,0 +46,0 @@ require('./apis/namespace/v1beta1/team.gw.js'),

{
"name": "appscode-api-js-client",
"version": "1.0.33",
"version": "1.0.35",
"description": "AppsCode API JavaScript Client",

@@ -5,0 +5,0 @@ "main": "index.js",

@@ -24,2 +24,6 @@ {

},
"default_access_level": {
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - v:cluster-admins // to allow admin access\n - v:cluster-deployer // to allow deployer access\n - v:cluster-viewer // to allow viewer access\n - \"\" // empty value stands for no access\nIf not set this will set \"\"",
"type": "string"
},
"do_not_delete": {

@@ -174,2 +178,6 @@ "type": "boolean"

"properties": {
"default_access_level": {
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - v:cluster-admins // to allow admin access\n - v:cluster-deployer // to allow deployer access\n - v:cluster-viewer // to allow viewer access\n - \"\" // empty value stands for no access",
"type": "string"
},
"do_not_delete": {

@@ -176,0 +184,0 @@ "type": "boolean"

{
"definitions": {
"ListResourceRequestAncestor": {
"properties": {
"name": {
"maxLength": 63,
"pattern": "^[a-z0-9](?:[a-z0-9\\-]{0,61}[a-z0-9])?$",
"type": "string"
},
"type": {
"type": "string"
}
},
"type": "object"
},
"v1beta2ConfigMapEditRequest": {

@@ -136,2 +149,5 @@ "properties": {

"properties": {
"ancestor": {
"$ref": "#/definitions/ListResourceRequestAncestor"
},
"cluster": {

@@ -148,5 +164,2 @@ "type": "string"

},
"pod_ancestor": {
"$ref": "#/definitions/v1beta2ListResourceRequestPodAncestor"
},
"type": {

@@ -158,15 +171,2 @@ "type": "string"

},
"v1beta2ListResourceRequestPodAncestor": {
"properties": {
"name": {
"maxLength": 63,
"pattern": "^[a-z0-9](?:[a-z0-9\\-]{0,61}[a-z0-9])?$",
"type": "string"
},
"type": {
"type": "string"
}
},
"type": "object"
},
"v1beta2PersistentVolumeClaimRegisterRequest": {

@@ -173,0 +173,0 @@ "properties": {

@@ -17,2 +17,5 @@ {

},
"vhd_container_name": {
"type": "string"
},
"zone": {

@@ -31,2 +34,5 @@ "type": "string"

"type": "string"
},
"vhd_container_name": {
"type": "string"
}

@@ -46,2 +52,5 @@ },

"type": "string"
},
"vhd_container_name": {
"type": "string"
}

@@ -48,0 +57,0 @@ },

{
"definitions": {
"AlertSyncRequestPodAncestor": {
"properties": {
"name": {
"type": "string"
},
"type": {
"type": "string"
}
},
"title": "Next Id: 3",
"type": "object"
},
"v1beta1AgentCreateRequest": {

@@ -55,26 +43,2 @@ "properties": {

},
"v1beta1AlertSyncRequest": {
"properties": {
"kubernetes_cluster": {
"type": "string"
},
"kubernetes_namespace": {
"type": "string"
},
"kubernetes_objectName": {
"type": "string"
},
"kubernetes_objectType": {
"type": "string"
},
"pod_ancestors": {
"items": {
"$ref": "#/definitions/AlertSyncRequestPodAncestor"
},
"type": "array"
}
},
"title": "Next Id: 6",
"type": "object"
},
"v1beta1BackupScheduleRequest": {

@@ -118,2 +82,6 @@ "properties": {

},
"default_access_level": {
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - v:cluster-admins // to allow admin access\n - v:cluster-deployer // to allow deployer access\n - v:cluster-viewer // to allow viewer access\n - \"\" // empty value stands for no access\nIf not set this will set \"\"",
"type": "string"
},
"do_not_delete": {

@@ -120,0 +88,0 @@ "type": "boolean"

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc