appscode-api-js-client
Advanced tools
Comparing version 1.0.56 to 1.0.57
@@ -33,4 +33,4 @@ // Code generated by protoc-gen-grpc-js-client | ||
function clustersScale(p, conf) { | ||
path = '/kubernetes/v1beta1/clusters/' + p['name'] + '/actions/scale/json' | ||
function clustersReconfigure(p, conf) { | ||
path = '/kubernetes/v1beta1/clusters/' + p['name'] + '/actions/reconfigure/json' | ||
delete p['name'] | ||
@@ -40,8 +40,2 @@ return xhr(path, 'PUT', conf, null, p); | ||
function clustersSetVersion(p, conf) { | ||
path = '/kubernetes/v1beta1/clusters/' + p['name'] + '/actions/set-version/json' | ||
delete p['name'] | ||
return xhr(path, 'PUT', conf, null, p); | ||
} | ||
function clustersDelete(p, conf) { | ||
@@ -86,4 +80,3 @@ path = '/kubernetes/v1beta1/clusters/' + p['name'] + '/json' | ||
update: clustersUpdate, | ||
scale: clustersScale, | ||
setVersion: clustersSetVersion, | ||
reconfigure: clustersReconfigure, | ||
delete: clustersDelete, | ||
@@ -90,0 +83,0 @@ clientConfig: clustersClientConfig, |
{ | ||
"name": "appscode-api-js-client", | ||
"version": "1.0.56", | ||
"version": "1.0.57", | ||
"description": "AppsCode API JavaScript Client", | ||
@@ -5,0 +5,0 @@ "main": "index.js", |
@@ -25,3 +25,3 @@ { | ||
"default_access_level": { | ||
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - team-admins // to allow ns admin access\n - cluster-admins // to allow admin access\n - cluster-editors // to allow editor access\n - cluster-deployers // to allow deployer access\n - cluster-viewers // to allow viewer access\n - no-access // to allow no default access\nIf not set this will set \"\"", | ||
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - kubernetes:team-admin\n - kubernetes:cluster-admin\n - kubernetes:admin\n - kubernetes:editor\n - kubernetes:viewer\n - deny-access\nIf not set this will set \"\"", | ||
"type": "string" | ||
@@ -138,30 +138,10 @@ }, | ||
}, | ||
"v1beta1ClusterScaleRequest": { | ||
"v1beta1ClusterReconfigureRequest": { | ||
"properties": { | ||
"name": { | ||
"maxLength": 63, | ||
"pattern": "^[a-z0-9](?:[a-z0-9\\-]{0,61}[a-z0-9])?$", | ||
"type": "string" | ||
}, | ||
"node_groups": { | ||
"items": { | ||
"$ref": "#/definitions/v1beta1InstanceGroup" | ||
}, | ||
"type": "array" | ||
}, | ||
"node_set": { | ||
"additionalProperties": { | ||
"type": "integer" | ||
}, | ||
"title": "New node configuration for the cluster", | ||
"type": "object" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"v1beta1ClusterSetVersionRequest": { | ||
"properties": { | ||
"apply_to_master": { | ||
"type": "boolean" | ||
}, | ||
"count": { | ||
"type": "integer" | ||
}, | ||
"hostfacts_version": { | ||
@@ -226,3 +206,3 @@ "type": "string" | ||
"default_access_level": { | ||
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - v:cluster-admins // to allow admin access\n - v:cluster-deployer // to allow deployer access\n - v:cluster-viewer // to allow viewer access\n - \"\" // empty value stands for no access", | ||
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - kubernetes:team-admin\n - kubernetes:cluster-admin\n - kubernetes:admin\n - kubernetes:editor\n - kubernetes:viewer\n - deny-access", | ||
"type": "string" | ||
@@ -229,0 +209,0 @@ }, |
{ | ||
"definitions": { | ||
"kubernetesv1beta1Spec": { | ||
"properties": { | ||
"backend": { | ||
"$ref": "#/definitions/v1beta1HTTPLoadBalancerRule" | ||
}, | ||
"rules": { | ||
"items": { | ||
"$ref": "#/definitions/v1beta1LoadBalancerRule" | ||
}, | ||
"type": "array" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"kubernetesv1beta1Status": { | ||
@@ -135,3 +121,3 @@ "properties": { | ||
"spec": { | ||
"$ref": "#/definitions/kubernetesv1beta1Spec" | ||
"$ref": "#/definitions/v1beta1Spec" | ||
}, | ||
@@ -190,2 +176,16 @@ "status": { | ||
}, | ||
"v1beta1Spec": { | ||
"properties": { | ||
"backend": { | ||
"$ref": "#/definitions/v1beta1HTTPLoadBalancerRule" | ||
}, | ||
"rules": { | ||
"items": { | ||
"$ref": "#/definitions/v1beta1LoadBalancerRule" | ||
}, | ||
"type": "array" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"v1beta1TCPLoadBalancerRule": { | ||
@@ -192,0 +192,0 @@ "properties": { |
@@ -42,3 +42,3 @@ { | ||
"default_access_level": { | ||
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - team-admins // to allow ns admin access\n - cluster-admins // to allow admin access\n - cluster-editors // to allow editor access\n - cluster-deployers // to allow deployer access\n - cluster-viewers // to allow viewer access\n - no-access // to allow no default access\nIf not set this will set \"\"", | ||
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - kubernetes:team-admin\n - kubernetes:cluster-admin\n - kubernetes:admin\n - kubernetes:editor\n - kubernetes:viewer\n - deny-access\nIf not set this will set \"\"", | ||
"type": "string" | ||
@@ -111,28 +111,10 @@ }, | ||
}, | ||
"v1beta1ClusterScaleRequest": { | ||
"v1beta1ClusterReconfigureRequest": { | ||
"properties": { | ||
"name": { | ||
"type": "string" | ||
}, | ||
"node_groups": { | ||
"items": { | ||
"$ref": "#/definitions/v1beta1InstanceGroup" | ||
}, | ||
"type": "array" | ||
}, | ||
"node_set": { | ||
"additionalProperties": { | ||
"type": "integer" | ||
}, | ||
"title": "New node configuration for the cluster", | ||
"type": "object" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"v1beta1ClusterSetVersionRequest": { | ||
"properties": { | ||
"apply_to_master": { | ||
"type": "boolean" | ||
}, | ||
"count": { | ||
"type": "integer" | ||
}, | ||
"hostfacts_version": { | ||
@@ -139,0 +121,0 @@ "type": "string" |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
100186
3338