Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

appscode-api-js-client

Package Overview
Dependencies
Maintainers
1
Versions
65
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

appscode-api-js-client - npm Package Compare versions

Comparing version 1.0.56 to 1.0.57

13

apis/kubernetes/v1beta1/cluster.gw.js

@@ -33,4 +33,4 @@ // Code generated by protoc-gen-grpc-js-client

function clustersScale(p, conf) {
path = '/kubernetes/v1beta1/clusters/' + p['name'] + '/actions/scale/json'
function clustersReconfigure(p, conf) {
path = '/kubernetes/v1beta1/clusters/' + p['name'] + '/actions/reconfigure/json'
delete p['name']

@@ -40,8 +40,2 @@ return xhr(path, 'PUT', conf, null, p);

function clustersSetVersion(p, conf) {
path = '/kubernetes/v1beta1/clusters/' + p['name'] + '/actions/set-version/json'
delete p['name']
return xhr(path, 'PUT', conf, null, p);
}
function clustersDelete(p, conf) {

@@ -86,4 +80,3 @@ path = '/kubernetes/v1beta1/clusters/' + p['name'] + '/json'

update: clustersUpdate,
scale: clustersScale,
setVersion: clustersSetVersion,
reconfigure: clustersReconfigure,
delete: clustersDelete,

@@ -90,0 +83,0 @@ clientConfig: clustersClientConfig,

{
"name": "appscode-api-js-client",
"version": "1.0.56",
"version": "1.0.57",
"description": "AppsCode API JavaScript Client",

@@ -5,0 +5,0 @@ "main": "index.js",

@@ -25,3 +25,3 @@ {

"default_access_level": {
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - team-admins // to allow ns admin access\n - cluster-admins // to allow admin access\n - cluster-editors // to allow editor access\n - cluster-deployers // to allow deployer access\n - cluster-viewers // to allow viewer access\n - no-access // to allow no default access\nIf not set this will set \"\"",
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - kubernetes:team-admin\n - kubernetes:cluster-admin\n - kubernetes:admin\n - kubernetes:editor\n - kubernetes:viewer\n - deny-access\nIf not set this will set \"\"",
"type": "string"

@@ -138,30 +138,10 @@ },

},
"v1beta1ClusterScaleRequest": {
"v1beta1ClusterReconfigureRequest": {
"properties": {
"name": {
"maxLength": 63,
"pattern": "^[a-z0-9](?:[a-z0-9\\-]{0,61}[a-z0-9])?$",
"type": "string"
},
"node_groups": {
"items": {
"$ref": "#/definitions/v1beta1InstanceGroup"
},
"type": "array"
},
"node_set": {
"additionalProperties": {
"type": "integer"
},
"title": "New node configuration for the cluster",
"type": "object"
}
},
"type": "object"
},
"v1beta1ClusterSetVersionRequest": {
"properties": {
"apply_to_master": {
"type": "boolean"
},
"count": {
"type": "integer"
},
"hostfacts_version": {

@@ -226,3 +206,3 @@ "type": "string"

"default_access_level": {
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - v:cluster-admins // to allow admin access\n - v:cluster-deployer // to allow deployer access\n - v:cluster-viewer // to allow viewer access\n - \"\" // empty value stands for no access",
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - kubernetes:team-admin\n - kubernetes:cluster-admin\n - kubernetes:admin\n - kubernetes:editor\n - kubernetes:viewer\n - deny-access",
"type": "string"

@@ -229,0 +209,0 @@ },

{
"definitions": {
"kubernetesv1beta1Spec": {
"properties": {
"backend": {
"$ref": "#/definitions/v1beta1HTTPLoadBalancerRule"
},
"rules": {
"items": {
"$ref": "#/definitions/v1beta1LoadBalancerRule"
},
"type": "array"
}
},
"type": "object"
},
"kubernetesv1beta1Status": {

@@ -135,3 +121,3 @@ "properties": {

"spec": {
"$ref": "#/definitions/kubernetesv1beta1Spec"
"$ref": "#/definitions/v1beta1Spec"
},

@@ -190,2 +176,16 @@ "status": {

},
"v1beta1Spec": {
"properties": {
"backend": {
"$ref": "#/definitions/v1beta1HTTPLoadBalancerRule"
},
"rules": {
"items": {
"$ref": "#/definitions/v1beta1LoadBalancerRule"
},
"type": "array"
}
},
"type": "object"
},
"v1beta1TCPLoadBalancerRule": {

@@ -192,0 +192,0 @@ "properties": {

@@ -42,3 +42,3 @@ {

"default_access_level": {
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - team-admins // to allow ns admin access\n - cluster-admins // to allow admin access\n - cluster-editors // to allow editor access\n - cluster-deployers // to allow deployer access\n - cluster-viewers // to allow viewer access\n - no-access // to allow no default access\nIf not set this will set \"\"",
"title": "Default access level is to allow permission to the cluster\nwhen no Role matched for that specif user or group. This can\nset as\n - kubernetes:team-admin\n - kubernetes:cluster-admin\n - kubernetes:admin\n - kubernetes:editor\n - kubernetes:viewer\n - deny-access\nIf not set this will set \"\"",
"type": "string"

@@ -111,28 +111,10 @@ },

},
"v1beta1ClusterScaleRequest": {
"v1beta1ClusterReconfigureRequest": {
"properties": {
"name": {
"type": "string"
},
"node_groups": {
"items": {
"$ref": "#/definitions/v1beta1InstanceGroup"
},
"type": "array"
},
"node_set": {
"additionalProperties": {
"type": "integer"
},
"title": "New node configuration for the cluster",
"type": "object"
}
},
"type": "object"
},
"v1beta1ClusterSetVersionRequest": {
"properties": {
"apply_to_master": {
"type": "boolean"
},
"count": {
"type": "integer"
},
"hostfacts_version": {

@@ -139,0 +121,0 @@ "type": "string"

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc