appscode-api-js-client
Advanced tools
Comparing version 1.0.33 to 1.0.35
@@ -11,4 +11,2 @@ // Code generated by ./hack/browserify.py | ||
var apis = _.merge({}, | ||
require('./apis/alert/v1beta1/alert.gw.js'), | ||
require('./apis/alert/v1beta1/incident.gw.js'), | ||
require('./apis/artifactory/v1beta1/artifact.gw.js'), | ||
@@ -18,2 +16,3 @@ require('./apis/artifactory/v1beta1/version.gw.js'), | ||
require('./apis/auth/v1beta1/conduit.gw.js'), | ||
require('./apis/auth/v1beta1/project.gw.js'), | ||
require('./apis/backup/v1beta1/client.gw.js'), | ||
@@ -40,6 +39,7 @@ require('./apis/backup/v1beta1/server.gw.js'), | ||
require('./apis/kubernetes/v1beta1/event.gw.js'), | ||
require('./apis/kubernetes/v1beta1/incident.gw.js'), | ||
require('./apis/kubernetes/v1beta1/loadbalancer.gw.js'), | ||
require('./apis/kubernetes/v1beta1/metadata.gw.js'), | ||
require('./apis/kubernetes/v1beta2/client.gw.js'), | ||
require('./apis/kubernetes/v1beta2/disk.gw.js'), | ||
require('./apis/loadbalancer/v1beta1/loadbalancer.gw.js'), | ||
require('./apis/mailinglist/v1beta1/mailinglist.gw.js'), | ||
@@ -46,0 +46,0 @@ require('./apis/namespace/v1beta1/team.gw.js'), |
{ | ||
"name": "appscode-api-js-client", | ||
"version": "1.0.33", | ||
"version": "1.0.35", | ||
"description": "AppsCode API JavaScript Client", | ||
@@ -5,0 +5,0 @@ "main": "index.js", |
@@ -24,2 +24,6 @@ { | ||
}, | ||
"default_access_level": { | ||
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - v:cluster-admins // to allow admin access\n - v:cluster-deployer // to allow deployer access\n - v:cluster-viewer // to allow viewer access\n - \"\" // empty value stands for no access\nIf not set this will set \"\"", | ||
"type": "string" | ||
}, | ||
"do_not_delete": { | ||
@@ -174,2 +178,6 @@ "type": "boolean" | ||
"properties": { | ||
"default_access_level": { | ||
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - v:cluster-admins // to allow admin access\n - v:cluster-deployer // to allow deployer access\n - v:cluster-viewer // to allow viewer access\n - \"\" // empty value stands for no access", | ||
"type": "string" | ||
}, | ||
"do_not_delete": { | ||
@@ -176,0 +184,0 @@ "type": "boolean" |
{ | ||
"definitions": { | ||
"ListResourceRequestAncestor": { | ||
"properties": { | ||
"name": { | ||
"maxLength": 63, | ||
"pattern": "^[a-z0-9](?:[a-z0-9\\-]{0,61}[a-z0-9])?$", | ||
"type": "string" | ||
}, | ||
"type": { | ||
"type": "string" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"v1beta2ConfigMapEditRequest": { | ||
@@ -136,2 +149,5 @@ "properties": { | ||
"properties": { | ||
"ancestor": { | ||
"$ref": "#/definitions/ListResourceRequestAncestor" | ||
}, | ||
"cluster": { | ||
@@ -148,5 +164,2 @@ "type": "string" | ||
}, | ||
"pod_ancestor": { | ||
"$ref": "#/definitions/v1beta2ListResourceRequestPodAncestor" | ||
}, | ||
"type": { | ||
@@ -158,15 +171,2 @@ "type": "string" | ||
}, | ||
"v1beta2ListResourceRequestPodAncestor": { | ||
"properties": { | ||
"name": { | ||
"maxLength": 63, | ||
"pattern": "^[a-z0-9](?:[a-z0-9\\-]{0,61}[a-z0-9])?$", | ||
"type": "string" | ||
}, | ||
"type": { | ||
"type": "string" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"v1beta2PersistentVolumeClaimRegisterRequest": { | ||
@@ -173,0 +173,0 @@ "properties": { |
@@ -17,2 +17,5 @@ { | ||
}, | ||
"vhd_container_name": { | ||
"type": "string" | ||
}, | ||
"zone": { | ||
@@ -31,2 +34,5 @@ "type": "string" | ||
"type": "string" | ||
}, | ||
"vhd_container_name": { | ||
"type": "string" | ||
} | ||
@@ -46,2 +52,5 @@ }, | ||
"type": "string" | ||
}, | ||
"vhd_container_name": { | ||
"type": "string" | ||
} | ||
@@ -48,0 +57,0 @@ }, |
{ | ||
"definitions": { | ||
"AlertSyncRequestPodAncestor": { | ||
"properties": { | ||
"name": { | ||
"type": "string" | ||
}, | ||
"type": { | ||
"type": "string" | ||
} | ||
}, | ||
"title": "Next Id: 3", | ||
"type": "object" | ||
}, | ||
"v1beta1AgentCreateRequest": { | ||
@@ -55,26 +43,2 @@ "properties": { | ||
}, | ||
"v1beta1AlertSyncRequest": { | ||
"properties": { | ||
"kubernetes_cluster": { | ||
"type": "string" | ||
}, | ||
"kubernetes_namespace": { | ||
"type": "string" | ||
}, | ||
"kubernetes_objectName": { | ||
"type": "string" | ||
}, | ||
"kubernetes_objectType": { | ||
"type": "string" | ||
}, | ||
"pod_ancestors": { | ||
"items": { | ||
"$ref": "#/definitions/AlertSyncRequestPodAncestor" | ||
}, | ||
"type": "array" | ||
} | ||
}, | ||
"title": "Next Id: 6", | ||
"type": "object" | ||
}, | ||
"v1beta1BackupScheduleRequest": { | ||
@@ -118,2 +82,6 @@ "properties": { | ||
}, | ||
"default_access_level": { | ||
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - v:cluster-admins // to allow admin access\n - v:cluster-deployer // to allow deployer access\n - v:cluster-viewer // to allow viewer access\n - \"\" // empty value stands for no access\nIf not set this will set \"\"", | ||
"type": "string" | ||
}, | ||
"do_not_delete": { | ||
@@ -120,0 +88,0 @@ "type": "boolean" |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
119783
4146