@robinmordasiewicz/f5xc-api-mcp 3.3.1 → 3.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/generator/openapi-parser.d.ts +355 -0
- package/dist/generator/openapi-parser.d.ts.map +1 -1
- package/dist/generator/openapi-parser.js +202 -2
- package/dist/generator/openapi-parser.js.map +1 -1
- package/dist/generator/tool-generator.d.ts +29 -2
- package/dist/generator/tool-generator.d.ts.map +1 -1
- package/dist/generator/tool-generator.js +144 -28
- package/dist/generator/tool-generator.js.map +1 -1
- package/dist/index.d.ts +2 -10
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +28 -33
- package/dist/index.js.map +1 -1
- package/dist/prompts/workflows.d.ts.map +1 -1
- package/dist/prompts/workflows.js +30 -174
- package/dist/prompts/workflows.js.map +1 -1
- package/dist/resources/handlers.d.ts +0 -2
- package/dist/resources/handlers.d.ts.map +1 -1
- package/dist/resources/handlers.js +0 -51
- package/dist/resources/handlers.js.map +1 -1
- package/dist/server.d.ts +1 -1
- package/dist/server.d.ts.map +1 -1
- package/dist/server.js +1 -2
- package/dist/server.js.map +1 -1
- package/dist/tools/discovery/describe.d.ts +1 -0
- package/dist/tools/discovery/describe.d.ts.map +1 -1
- package/dist/tools/discovery/describe.js +10 -8
- package/dist/tools/discovery/describe.js.map +1 -1
- package/dist/tools/discovery/execute.d.ts +1 -3
- package/dist/tools/discovery/execute.d.ts.map +1 -1
- package/dist/tools/discovery/execute.js +1 -34
- package/dist/tools/discovery/execute.js.map +1 -1
- package/dist/tools/generated/admin_console_and_ui/index.d.ts +8 -0
- package/dist/tools/generated/admin_console_and_ui/index.d.ts.map +1 -0
- package/dist/tools/generated/admin_console_and_ui/index.js +259 -0
- package/dist/tools/generated/admin_console_and_ui/index.js.map +1 -0
- package/dist/tools/generated/api/index.d.ts +8 -0
- package/dist/tools/generated/{vpn → api}/index.d.ts.map +1 -1
- package/dist/tools/generated/api/index.js +5812 -0
- package/dist/tools/generated/api/index.js.map +1 -0
- package/dist/tools/generated/authentication/index.d.ts +8 -0
- package/dist/tools/generated/authentication/index.d.ts.map +1 -0
- package/dist/tools/generated/authentication/index.js +858 -0
- package/dist/tools/generated/authentication/index.js.map +1 -0
- package/dist/tools/generated/bigip/index.d.ts.map +1 -1
- package/dist/tools/generated/bigip/index.js +1660 -0
- package/dist/tools/generated/bigip/index.js.map +1 -1
- package/dist/tools/generated/billing_and_usage/index.d.ts +8 -0
- package/dist/tools/generated/billing_and_usage/index.d.ts.map +1 -0
- package/dist/tools/generated/billing_and_usage/index.js +2283 -0
- package/dist/tools/generated/billing_and_usage/index.js.map +1 -0
- package/dist/tools/generated/blindfold/index.d.ts +8 -0
- package/dist/tools/generated/blindfold/index.d.ts.map +1 -0
- package/dist/tools/generated/blindfold/index.js +3462 -0
- package/dist/tools/generated/blindfold/index.js.map +1 -0
- package/dist/tools/generated/bot_and_threat_defense/index.d.ts +8 -0
- package/dist/tools/generated/bot_and_threat_defense/index.d.ts.map +1 -0
- package/dist/tools/generated/bot_and_threat_defense/index.js +2264 -0
- package/dist/tools/generated/bot_and_threat_defense/index.js.map +1 -0
- package/dist/tools/generated/cdn/index.d.ts.map +1 -1
- package/dist/tools/generated/cdn/index.js +1498 -0
- package/dist/tools/generated/cdn/index.js.map +1 -1
- package/dist/tools/generated/ce_management/index.d.ts +8 -0
- package/dist/tools/generated/ce_management/index.d.ts.map +1 -0
- package/dist/tools/generated/ce_management/index.js +3437 -0
- package/dist/tools/generated/ce_management/index.js.map +1 -0
- package/dist/tools/generated/certificates/index.d.ts +8 -0
- package/dist/tools/generated/certificates/index.d.ts.map +1 -0
- package/dist/tools/generated/certificates/index.js +2279 -0
- package/dist/tools/generated/certificates/index.js.map +1 -0
- package/dist/tools/generated/cloud_infrastructure/index.d.ts +8 -0
- package/dist/tools/generated/cloud_infrastructure/index.d.ts.map +1 -0
- package/dist/tools/generated/cloud_infrastructure/index.js +3585 -0
- package/dist/tools/generated/cloud_infrastructure/index.js.map +1 -0
- package/dist/tools/generated/container_services/index.d.ts +8 -0
- package/dist/tools/generated/container_services/index.d.ts.map +1 -0
- package/dist/tools/generated/container_services/index.js +1806 -0
- package/dist/tools/generated/container_services/index.js.map +1 -0
- package/dist/tools/generated/data_and_privacy_security/index.d.ts +8 -0
- package/dist/tools/generated/data_and_privacy_security/index.d.ts.map +1 -0
- package/dist/tools/generated/data_and_privacy_security/index.js +1519 -0
- package/dist/tools/generated/data_and_privacy_security/index.js.map +1 -0
- package/dist/tools/generated/data_intelligence/index.d.ts +8 -0
- package/dist/tools/generated/data_intelligence/index.d.ts.map +1 -0
- package/dist/tools/generated/data_intelligence/index.js +1495 -0
- package/dist/tools/generated/data_intelligence/index.js.map +1 -0
- package/dist/tools/generated/ddos/index.d.ts +8 -0
- package/dist/tools/generated/ddos/index.d.ts.map +1 -0
- package/dist/tools/generated/ddos/index.js +7427 -0
- package/dist/tools/generated/ddos/index.js.map +1 -0
- package/dist/tools/generated/dns/index.d.ts +8 -0
- package/dist/tools/generated/dns/index.d.ts.map +1 -0
- package/dist/tools/generated/dns/index.js +5604 -0
- package/dist/tools/generated/dns/index.js.map +1 -0
- package/dist/tools/generated/generative_ai/index.d.ts +8 -0
- package/dist/tools/generated/generative_ai/index.d.ts.map +1 -0
- package/dist/tools/generated/generative_ai/index.js +972 -0
- package/dist/tools/generated/generative_ai/index.js.map +1 -0
- package/dist/tools/generated/managed_kubernetes/index.d.ts +8 -0
- package/dist/tools/generated/managed_kubernetes/index.d.ts.map +1 -0
- package/dist/tools/generated/managed_kubernetes/index.js +2858 -0
- package/dist/tools/generated/managed_kubernetes/index.js.map +1 -0
- package/dist/tools/generated/marketplace/index.d.ts +8 -0
- package/dist/tools/generated/marketplace/index.d.ts.map +1 -0
- package/dist/tools/generated/marketplace/index.js +4022 -0
- package/dist/tools/generated/marketplace/index.js.map +1 -0
- package/dist/tools/generated/network/index.d.ts +8 -0
- package/dist/tools/generated/network/index.d.ts.map +1 -0
- package/dist/tools/generated/network/index.js +11132 -0
- package/dist/tools/generated/network/index.js.map +1 -0
- package/dist/tools/generated/network_security/index.d.ts +8 -0
- package/dist/tools/generated/network_security/index.d.ts.map +1 -0
- package/dist/tools/generated/network_security/index.js +7827 -0
- package/dist/tools/generated/network_security/index.js.map +1 -0
- package/dist/tools/generated/nginx_one/index.d.ts +8 -0
- package/dist/tools/generated/nginx_one/index.d.ts.map +1 -0
- package/dist/tools/generated/nginx_one/index.js +1598 -0
- package/dist/tools/generated/nginx_one/index.js.map +1 -0
- package/dist/tools/generated/object_storage/index.d.ts +8 -0
- package/dist/tools/generated/object_storage/index.d.ts.map +1 -0
- package/dist/tools/generated/object_storage/index.js +964 -0
- package/dist/tools/generated/object_storage/index.js.map +1 -0
- package/dist/tools/generated/observability/index.d.ts.map +1 -1
- package/dist/tools/generated/observability/index.js +3521 -4641
- package/dist/tools/generated/observability/index.js.map +1 -1
- package/dist/tools/generated/rate_limiting/index.d.ts +8 -0
- package/dist/tools/generated/rate_limiting/index.d.ts.map +1 -0
- package/dist/tools/generated/rate_limiting/index.js +1712 -0
- package/dist/tools/generated/rate_limiting/index.js.map +1 -0
- package/dist/tools/generated/secops_and_incident_response/index.d.ts +8 -0
- package/dist/tools/generated/secops_and_incident_response/index.d.ts.map +1 -0
- package/dist/tools/generated/secops_and_incident_response/index.js +578 -0
- package/dist/tools/generated/secops_and_incident_response/index.js.map +1 -0
- package/dist/tools/generated/service_mesh/index.d.ts.map +1 -1
- package/dist/tools/generated/service_mesh/index.js +3810 -438
- package/dist/tools/generated/service_mesh/index.js.map +1 -1
- package/dist/tools/generated/shape/index.d.ts +8 -0
- package/dist/tools/generated/shape/index.d.ts.map +1 -0
- package/dist/tools/generated/shape/index.js +18464 -0
- package/dist/tools/generated/shape/index.js.map +1 -0
- package/dist/tools/generated/sites/index.d.ts +8 -0
- package/dist/tools/generated/sites/index.d.ts.map +1 -0
- package/dist/tools/generated/sites/index.js +11494 -0
- package/dist/tools/generated/sites/index.js.map +1 -0
- package/dist/tools/generated/statistics/index.d.ts +8 -0
- package/dist/tools/generated/statistics/index.d.ts.map +1 -0
- package/dist/tools/generated/statistics/index.js +7557 -0
- package/dist/tools/generated/statistics/index.js.map +1 -0
- package/dist/tools/generated/support/index.d.ts +8 -0
- package/dist/tools/generated/support/index.d.ts.map +1 -0
- package/dist/tools/generated/support/index.js +5334 -0
- package/dist/tools/generated/support/index.js.map +1 -0
- package/dist/tools/generated/telemetry_and_insights/index.d.ts +8 -0
- package/dist/tools/generated/telemetry_and_insights/index.d.ts.map +1 -0
- package/dist/tools/generated/telemetry_and_insights/index.js +2304 -0
- package/dist/tools/generated/telemetry_and_insights/index.js.map +1 -0
- package/dist/tools/generated/tenant_and_identity/index.d.ts +8 -0
- package/dist/tools/generated/tenant_and_identity/index.d.ts.map +1 -0
- package/dist/tools/generated/tenant_and_identity/index.js +17560 -0
- package/dist/tools/generated/tenant_and_identity/index.js.map +1 -0
- package/dist/tools/generated/threat_campaign/index.d.ts +8 -0
- package/dist/tools/generated/threat_campaign/index.d.ts.map +1 -0
- package/dist/tools/generated/threat_campaign/index.js +99 -0
- package/dist/tools/generated/threat_campaign/index.js.map +1 -0
- package/dist/tools/generated/users/index.d.ts +8 -0
- package/dist/tools/generated/users/index.d.ts.map +1 -0
- package/dist/tools/generated/users/index.js +1376 -0
- package/dist/tools/generated/users/index.js.map +1 -0
- package/dist/tools/generated/virtual/index.d.ts +8 -0
- package/dist/tools/generated/virtual/index.d.ts.map +1 -0
- package/dist/tools/generated/virtual/index.js +10103 -0
- package/dist/tools/generated/virtual/index.js.map +1 -0
- package/dist/tools/generated/vpm_and_node_management/index.d.ts +8 -0
- package/dist/tools/generated/vpm_and_node_management/index.d.ts.map +1 -0
- package/dist/tools/generated/vpm_and_node_management/index.js +85 -0
- package/dist/tools/generated/vpm_and_node_management/index.js.map +1 -0
- package/dist/tools/generated/waf/index.d.ts +8 -0
- package/dist/tools/generated/waf/index.d.ts.map +1 -0
- package/dist/tools/generated/waf/index.js +3802 -0
- package/dist/tools/generated/waf/index.js.map +1 -0
- package/dist/tools/registry.d.ts.map +1 -1
- package/dist/tools/registry.js +68 -36
- package/dist/tools/registry.js.map +1 -1
- package/package.json +3 -1
- package/dist/cli/index.d.ts +0 -16
- package/dist/cli/index.d.ts.map +0 -1
- package/dist/cli/index.js +0 -116
- package/dist/cli/index.js.map +0 -1
- package/dist/cli/setup.d.ts +0 -54
- package/dist/cli/setup.d.ts.map +0 -1
- package/dist/cli/setup.js +0 -347
- package/dist/cli/setup.js.map +0 -1
- package/dist/tools/generated/ai_intelligence/index.d.ts +0 -8
- package/dist/tools/generated/ai_intelligence/index.d.ts.map +0 -1
- package/dist/tools/generated/ai_intelligence/index.js +0 -282
- package/dist/tools/generated/ai_intelligence/index.js.map +0 -1
- package/dist/tools/generated/api_security/index.d.ts +0 -8
- package/dist/tools/generated/api_security/index.d.ts.map +0 -1
- package/dist/tools/generated/api_security/index.js +0 -1852
- package/dist/tools/generated/api_security/index.js.map +0 -1
- package/dist/tools/generated/applications/index.d.ts +0 -8
- package/dist/tools/generated/applications/index.d.ts.map +0 -1
- package/dist/tools/generated/applications/index.js +0 -1589
- package/dist/tools/generated/applications/index.js.map +0 -1
- package/dist/tools/generated/billing/index.d.ts +0 -8
- package/dist/tools/generated/billing/index.d.ts.map +0 -1
- package/dist/tools/generated/billing/index.js +0 -759
- package/dist/tools/generated/billing/index.js.map +0 -1
- package/dist/tools/generated/config/index.d.ts +0 -8
- package/dist/tools/generated/config/index.d.ts.map +0 -1
- package/dist/tools/generated/config/index.js +0 -316
- package/dist/tools/generated/config/index.js.map +0 -1
- package/dist/tools/generated/identity/index.d.ts +0 -8
- package/dist/tools/generated/identity/index.d.ts.map +0 -1
- package/dist/tools/generated/identity/index.js +0 -5371
- package/dist/tools/generated/identity/index.js.map +0 -1
- package/dist/tools/generated/infrastructure/index.d.ts +0 -8
- package/dist/tools/generated/infrastructure/index.d.ts.map +0 -1
- package/dist/tools/generated/infrastructure/index.js +0 -5342
- package/dist/tools/generated/infrastructure/index.js.map +0 -1
- package/dist/tools/generated/infrastructure_protection/index.d.ts +0 -8
- package/dist/tools/generated/infrastructure_protection/index.d.ts.map +0 -1
- package/dist/tools/generated/infrastructure_protection/index.js +0 -2919
- package/dist/tools/generated/infrastructure_protection/index.js.map +0 -1
- package/dist/tools/generated/integrations/index.d.ts +0 -8
- package/dist/tools/generated/integrations/index.d.ts.map +0 -1
- package/dist/tools/generated/integrations/index.js +0 -1995
- package/dist/tools/generated/integrations/index.js.map +0 -1
- package/dist/tools/generated/load_balancer/index.d.ts +0 -8
- package/dist/tools/generated/load_balancer/index.d.ts.map +0 -1
- package/dist/tools/generated/load_balancer/index.js +0 -2269
- package/dist/tools/generated/load_balancer/index.js.map +0 -1
- package/dist/tools/generated/networking/index.d.ts +0 -8
- package/dist/tools/generated/networking/index.d.ts.map +0 -1
- package/dist/tools/generated/networking/index.js +0 -11289
- package/dist/tools/generated/networking/index.js.map +0 -1
- package/dist/tools/generated/nginx/index.d.ts +0 -8
- package/dist/tools/generated/nginx/index.d.ts.map +0 -1
- package/dist/tools/generated/nginx/index.js +0 -680
- package/dist/tools/generated/nginx/index.js.map +0 -1
- package/dist/tools/generated/operations/index.d.ts +0 -8
- package/dist/tools/generated/operations/index.d.ts.map +0 -1
- package/dist/tools/generated/operations/index.js +0 -1759
- package/dist/tools/generated/operations/index.js.map +0 -1
- package/dist/tools/generated/security/index.d.ts +0 -8
- package/dist/tools/generated/security/index.d.ts.map +0 -1
- package/dist/tools/generated/security/index.js +0 -9111
- package/dist/tools/generated/security/index.js.map +0 -1
- package/dist/tools/generated/shape_security/index.d.ts +0 -8
- package/dist/tools/generated/shape_security/index.d.ts.map +0 -1
- package/dist/tools/generated/shape_security/index.js +0 -4121
- package/dist/tools/generated/shape_security/index.js.map +0 -1
- package/dist/tools/generated/subscriptions/index.d.ts +0 -8
- package/dist/tools/generated/subscriptions/index.d.ts.map +0 -1
- package/dist/tools/generated/subscriptions/index.js +0 -778
- package/dist/tools/generated/subscriptions/index.js.map +0 -1
- package/dist/tools/generated/tenant_management/index.d.ts +0 -8
- package/dist/tools/generated/tenant_management/index.d.ts.map +0 -1
- package/dist/tools/generated/tenant_management/index.js +0 -2292
- package/dist/tools/generated/tenant_management/index.js.map +0 -1
- package/dist/tools/generated/vpn/index.d.ts +0 -8
- package/dist/tools/generated/vpn/index.js +0 -1183
- package/dist/tools/generated/vpn/index.js.map +0 -1
|
@@ -0,0 +1,3462 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Generated tool definitions for blindfold domain
|
|
3
|
+
* DO NOT EDIT - This file is auto-generated by scripts/generate.ts
|
|
4
|
+
*/
|
|
5
|
+
export const blindfoldTools = [
|
|
6
|
+
{
|
|
7
|
+
toolName: "f5xc-api-blindfold-access-count-create",
|
|
8
|
+
method: "POST",
|
|
9
|
+
path: "/api/secret_management/namespaces/{namespace}/voltshare/access_count",
|
|
10
|
+
operation: "create",
|
|
11
|
+
domain: "blindfold",
|
|
12
|
+
resource: "access-count",
|
|
13
|
+
summary: "VoltShare Access Count Query.",
|
|
14
|
+
description: "Request to GET number of VoltShare API calls aggregated across multiple dimensions like OPERATION, COUNTRY, RESULT, USER_TENANT.",
|
|
15
|
+
pathParameters: [
|
|
16
|
+
{
|
|
17
|
+
description: "Namespace\nnamespace is used to scope the security events for the given namespace.",
|
|
18
|
+
in: "path",
|
|
19
|
+
name: "namespace",
|
|
20
|
+
required: true,
|
|
21
|
+
schema: {
|
|
22
|
+
type: "string",
|
|
23
|
+
},
|
|
24
|
+
"x-displayname": "Namespace",
|
|
25
|
+
"x-ves-example": "Blogging-app-namespace-1.",
|
|
26
|
+
},
|
|
27
|
+
],
|
|
28
|
+
queryParameters: [],
|
|
29
|
+
requestBodySchema: {
|
|
30
|
+
$ref: "#/components/schemas/voltshareVoltShareAccessCountRequest",
|
|
31
|
+
},
|
|
32
|
+
responseSchema: {
|
|
33
|
+
$ref: "#/components/schemas/voltshareVoltShareAccessCountResponse",
|
|
34
|
+
},
|
|
35
|
+
requiredParams: ["body", "namespace"],
|
|
36
|
+
operationId: "ves.io.schema.voltshare.MonitoringAPI.VoltShareAccessCountQuery",
|
|
37
|
+
tags: ["Security"],
|
|
38
|
+
sourceFile: "domains/blindfold.json",
|
|
39
|
+
displayName: null,
|
|
40
|
+
dangerLevel: "medium",
|
|
41
|
+
sideEffects: {
|
|
42
|
+
creates: ["access-count"],
|
|
43
|
+
},
|
|
44
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
45
|
+
confirmationRequired: false,
|
|
46
|
+
parameterExamples: {
|
|
47
|
+
namespace: "Blogging-app-namespace-1.",
|
|
48
|
+
},
|
|
49
|
+
validationRules: {},
|
|
50
|
+
operationMetadata: {
|
|
51
|
+
common_errors: [
|
|
52
|
+
{
|
|
53
|
+
code: 401,
|
|
54
|
+
message: "Authentication required",
|
|
55
|
+
solution: "Provide valid API credentials",
|
|
56
|
+
},
|
|
57
|
+
{
|
|
58
|
+
code: 403,
|
|
59
|
+
message: "Permission denied",
|
|
60
|
+
solution: "Check access permissions for this operation",
|
|
61
|
+
},
|
|
62
|
+
{
|
|
63
|
+
code: 404,
|
|
64
|
+
message: "Resource not found",
|
|
65
|
+
solution: "Verify resource name, namespace, and path",
|
|
66
|
+
},
|
|
67
|
+
{
|
|
68
|
+
code: 409,
|
|
69
|
+
message: "Resource already exists",
|
|
70
|
+
solution: "Use different name or update existing resource",
|
|
71
|
+
},
|
|
72
|
+
{
|
|
73
|
+
code: 429,
|
|
74
|
+
message: "Rate limit exceeded",
|
|
75
|
+
solution: "Wait before retrying the operation",
|
|
76
|
+
},
|
|
77
|
+
{
|
|
78
|
+
code: 500,
|
|
79
|
+
message: "Server error",
|
|
80
|
+
solution: "Retry operation or contact support",
|
|
81
|
+
},
|
|
82
|
+
],
|
|
83
|
+
conditions: {
|
|
84
|
+
postconditions: ["Access-count resource created", "Resource assigned unique identifier"],
|
|
85
|
+
prerequisites: ["Active namespace"],
|
|
86
|
+
},
|
|
87
|
+
confirmation_required: false,
|
|
88
|
+
danger_level: "medium",
|
|
89
|
+
field_docs: {},
|
|
90
|
+
optional_fields: [],
|
|
91
|
+
performance_impact: {
|
|
92
|
+
latency: "low",
|
|
93
|
+
resource_usage: "low",
|
|
94
|
+
},
|
|
95
|
+
purpose: "Create new access-count",
|
|
96
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
97
|
+
side_effects: {
|
|
98
|
+
creates: ["access-count"],
|
|
99
|
+
},
|
|
100
|
+
},
|
|
101
|
+
curlExample: null,
|
|
102
|
+
},
|
|
103
|
+
{
|
|
104
|
+
toolName: "f5xc-api-blindfold-aggregation-create",
|
|
105
|
+
method: "POST",
|
|
106
|
+
path: "/api/secret_management/namespaces/{namespace}/voltshare/audit_logs/aggregation",
|
|
107
|
+
operation: "create",
|
|
108
|
+
domain: "blindfold",
|
|
109
|
+
resource: "aggregation",
|
|
110
|
+
summary: "Audit Log Aggregation Query.",
|
|
111
|
+
description: "Request to GET summary/analytics data for the audit logs that matches the criteria in request.",
|
|
112
|
+
pathParameters: [
|
|
113
|
+
{
|
|
114
|
+
description: "Namespace\nfetch aggregation data scoped by namespace.",
|
|
115
|
+
in: "path",
|
|
116
|
+
name: "namespace",
|
|
117
|
+
required: true,
|
|
118
|
+
schema: {
|
|
119
|
+
type: "string",
|
|
120
|
+
},
|
|
121
|
+
"x-displayname": "Namespace",
|
|
122
|
+
"x-ves-example": "Value",
|
|
123
|
+
},
|
|
124
|
+
],
|
|
125
|
+
queryParameters: [],
|
|
126
|
+
requestBodySchema: {
|
|
127
|
+
$ref: "#/components/schemas/voltshareAuditLogAggregationRequest",
|
|
128
|
+
},
|
|
129
|
+
responseSchema: {
|
|
130
|
+
$ref: "#/components/schemas/voltshareAuditLogAggregationResponse",
|
|
131
|
+
},
|
|
132
|
+
requiredParams: ["body", "namespace"],
|
|
133
|
+
operationId: "ves.io.schema.voltshare.MonitoringAPI.AuditLogAggregationQuery",
|
|
134
|
+
tags: ["Security"],
|
|
135
|
+
sourceFile: "domains/blindfold.json",
|
|
136
|
+
displayName: null,
|
|
137
|
+
dangerLevel: "medium",
|
|
138
|
+
sideEffects: {
|
|
139
|
+
creates: ["aggregation"],
|
|
140
|
+
},
|
|
141
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
142
|
+
confirmationRequired: false,
|
|
143
|
+
parameterExamples: {
|
|
144
|
+
namespace: "Value",
|
|
145
|
+
},
|
|
146
|
+
validationRules: {},
|
|
147
|
+
operationMetadata: {
|
|
148
|
+
common_errors: [
|
|
149
|
+
{
|
|
150
|
+
code: 401,
|
|
151
|
+
message: "Authentication required",
|
|
152
|
+
solution: "Provide valid API credentials",
|
|
153
|
+
},
|
|
154
|
+
{
|
|
155
|
+
code: 403,
|
|
156
|
+
message: "Permission denied",
|
|
157
|
+
solution: "Check access permissions for this operation",
|
|
158
|
+
},
|
|
159
|
+
{
|
|
160
|
+
code: 404,
|
|
161
|
+
message: "Resource not found",
|
|
162
|
+
solution: "Verify resource name, namespace, and path",
|
|
163
|
+
},
|
|
164
|
+
{
|
|
165
|
+
code: 409,
|
|
166
|
+
message: "Resource already exists",
|
|
167
|
+
solution: "Use different name or update existing resource",
|
|
168
|
+
},
|
|
169
|
+
{
|
|
170
|
+
code: 429,
|
|
171
|
+
message: "Rate limit exceeded",
|
|
172
|
+
solution: "Wait before retrying the operation",
|
|
173
|
+
},
|
|
174
|
+
{
|
|
175
|
+
code: 500,
|
|
176
|
+
message: "Server error",
|
|
177
|
+
solution: "Retry operation or contact support",
|
|
178
|
+
},
|
|
179
|
+
],
|
|
180
|
+
conditions: {
|
|
181
|
+
postconditions: ["Aggregation resource created", "Resource assigned unique identifier"],
|
|
182
|
+
prerequisites: ["Active namespace"],
|
|
183
|
+
},
|
|
184
|
+
confirmation_required: false,
|
|
185
|
+
danger_level: "medium",
|
|
186
|
+
field_docs: {},
|
|
187
|
+
optional_fields: [],
|
|
188
|
+
performance_impact: {
|
|
189
|
+
latency: "low",
|
|
190
|
+
resource_usage: "low",
|
|
191
|
+
},
|
|
192
|
+
purpose: "Create new aggregation",
|
|
193
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
194
|
+
side_effects: {
|
|
195
|
+
creates: ["aggregation"],
|
|
196
|
+
},
|
|
197
|
+
},
|
|
198
|
+
curlExample: null,
|
|
199
|
+
},
|
|
200
|
+
{
|
|
201
|
+
toolName: "f5xc-api-blindfold-audit-log-create",
|
|
202
|
+
method: "POST",
|
|
203
|
+
path: "/api/secret_management/namespaces/{namespace}/voltshare/audit_logs",
|
|
204
|
+
operation: "create",
|
|
205
|
+
domain: "blindfold",
|
|
206
|
+
resource: "audit-log",
|
|
207
|
+
summary: "Audit Log Query.",
|
|
208
|
+
description: "Request to GET voltshare audit logs that matches the criteria in request.\nIf no match conditions are specified in the request, then the response contains all\nCRUD operations performed.",
|
|
209
|
+
pathParameters: [
|
|
210
|
+
{
|
|
211
|
+
description: "Namespace\nfetch the log messages scoped by namespace.",
|
|
212
|
+
in: "path",
|
|
213
|
+
name: "namespace",
|
|
214
|
+
required: true,
|
|
215
|
+
schema: {
|
|
216
|
+
type: "string",
|
|
217
|
+
},
|
|
218
|
+
"x-displayname": "Namespace",
|
|
219
|
+
"x-ves-example": "Value",
|
|
220
|
+
},
|
|
221
|
+
],
|
|
222
|
+
queryParameters: [],
|
|
223
|
+
requestBodySchema: {
|
|
224
|
+
$ref: "#/components/schemas/voltshareAuditLogRequest",
|
|
225
|
+
},
|
|
226
|
+
responseSchema: {
|
|
227
|
+
$ref: "#/components/schemas/voltshareAuditLogResponse",
|
|
228
|
+
},
|
|
229
|
+
requiredParams: ["body", "namespace"],
|
|
230
|
+
operationId: "ves.io.schema.voltshare.MonitoringAPI.AuditLogQuery",
|
|
231
|
+
tags: ["Security"],
|
|
232
|
+
sourceFile: "domains/blindfold.json",
|
|
233
|
+
displayName: null,
|
|
234
|
+
dangerLevel: "medium",
|
|
235
|
+
sideEffects: {
|
|
236
|
+
creates: ["audit-log"],
|
|
237
|
+
},
|
|
238
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
239
|
+
confirmationRequired: false,
|
|
240
|
+
parameterExamples: {
|
|
241
|
+
namespace: "Value",
|
|
242
|
+
},
|
|
243
|
+
validationRules: {},
|
|
244
|
+
operationMetadata: {
|
|
245
|
+
common_errors: [
|
|
246
|
+
{
|
|
247
|
+
code: 401,
|
|
248
|
+
message: "Authentication required",
|
|
249
|
+
solution: "Provide valid API credentials",
|
|
250
|
+
},
|
|
251
|
+
{
|
|
252
|
+
code: 403,
|
|
253
|
+
message: "Permission denied",
|
|
254
|
+
solution: "Check access permissions for this operation",
|
|
255
|
+
},
|
|
256
|
+
{
|
|
257
|
+
code: 404,
|
|
258
|
+
message: "Resource not found",
|
|
259
|
+
solution: "Verify resource name, namespace, and path",
|
|
260
|
+
},
|
|
261
|
+
{
|
|
262
|
+
code: 409,
|
|
263
|
+
message: "Resource already exists",
|
|
264
|
+
solution: "Use different name or update existing resource",
|
|
265
|
+
},
|
|
266
|
+
{
|
|
267
|
+
code: 429,
|
|
268
|
+
message: "Rate limit exceeded",
|
|
269
|
+
solution: "Wait before retrying the operation",
|
|
270
|
+
},
|
|
271
|
+
{
|
|
272
|
+
code: 500,
|
|
273
|
+
message: "Server error",
|
|
274
|
+
solution: "Retry operation or contact support",
|
|
275
|
+
},
|
|
276
|
+
],
|
|
277
|
+
conditions: {
|
|
278
|
+
postconditions: ["Audit-log resource created", "Resource assigned unique identifier"],
|
|
279
|
+
prerequisites: ["Active namespace"],
|
|
280
|
+
},
|
|
281
|
+
confirmation_required: false,
|
|
282
|
+
danger_level: "medium",
|
|
283
|
+
field_docs: {},
|
|
284
|
+
optional_fields: [],
|
|
285
|
+
performance_impact: {
|
|
286
|
+
latency: "low",
|
|
287
|
+
resource_usage: "low",
|
|
288
|
+
},
|
|
289
|
+
purpose: "Create new audit-log",
|
|
290
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
291
|
+
side_effects: {
|
|
292
|
+
creates: ["audit-log"],
|
|
293
|
+
},
|
|
294
|
+
},
|
|
295
|
+
curlExample: null,
|
|
296
|
+
},
|
|
297
|
+
{
|
|
298
|
+
toolName: "f5xc-api-blindfold-decrypt-secret-create",
|
|
299
|
+
method: "POST",
|
|
300
|
+
path: "/api/secret_management/namespaces/system/voltshare/decrypt_secret",
|
|
301
|
+
operation: "create",
|
|
302
|
+
domain: "blindfold",
|
|
303
|
+
resource: "decrypt-secret",
|
|
304
|
+
summary: "DecryptSecret.",
|
|
305
|
+
description: "DecryptSecret API takes blinded encrypted secret and policy and responds with blinded decrypted secret if user is allowed by the policy.",
|
|
306
|
+
pathParameters: [],
|
|
307
|
+
queryParameters: [],
|
|
308
|
+
requestBodySchema: {
|
|
309
|
+
$ref: "#/components/schemas/voltshareDecryptSecretRequest",
|
|
310
|
+
},
|
|
311
|
+
responseSchema: {
|
|
312
|
+
$ref: "#/components/schemas/voltshareDecryptSecretResponse",
|
|
313
|
+
},
|
|
314
|
+
requiredParams: ["body"],
|
|
315
|
+
operationId: "ves.io.schema.voltshare.CustomAPI.DecryptSecret",
|
|
316
|
+
tags: ["Security"],
|
|
317
|
+
sourceFile: "domains/blindfold.json",
|
|
318
|
+
displayName: null,
|
|
319
|
+
dangerLevel: "medium",
|
|
320
|
+
sideEffects: {
|
|
321
|
+
creates: ["decrypt-secret"],
|
|
322
|
+
},
|
|
323
|
+
requiredFields: ["metadata.name", "metadata.namespace"],
|
|
324
|
+
confirmationRequired: false,
|
|
325
|
+
parameterExamples: {},
|
|
326
|
+
validationRules: {},
|
|
327
|
+
operationMetadata: {
|
|
328
|
+
common_errors: [
|
|
329
|
+
{
|
|
330
|
+
code: 401,
|
|
331
|
+
message: "Authentication required",
|
|
332
|
+
solution: "Provide valid API credentials",
|
|
333
|
+
},
|
|
334
|
+
{
|
|
335
|
+
code: 403,
|
|
336
|
+
message: "Permission denied",
|
|
337
|
+
solution: "Check access permissions for this operation",
|
|
338
|
+
},
|
|
339
|
+
{
|
|
340
|
+
code: 404,
|
|
341
|
+
message: "Resource not found",
|
|
342
|
+
solution: "Verify resource name, namespace, and path",
|
|
343
|
+
},
|
|
344
|
+
{
|
|
345
|
+
code: 409,
|
|
346
|
+
message: "Resource already exists",
|
|
347
|
+
solution: "Use different name or update existing resource",
|
|
348
|
+
},
|
|
349
|
+
{
|
|
350
|
+
code: 429,
|
|
351
|
+
message: "Rate limit exceeded",
|
|
352
|
+
solution: "Wait before retrying the operation",
|
|
353
|
+
},
|
|
354
|
+
{
|
|
355
|
+
code: 500,
|
|
356
|
+
message: "Server error",
|
|
357
|
+
solution: "Retry operation or contact support",
|
|
358
|
+
},
|
|
359
|
+
],
|
|
360
|
+
conditions: {
|
|
361
|
+
postconditions: ["Decrypt-secret resource created", "Resource assigned unique identifier"],
|
|
362
|
+
prerequisites: ["Active namespace"],
|
|
363
|
+
},
|
|
364
|
+
confirmation_required: false,
|
|
365
|
+
danger_level: "medium",
|
|
366
|
+
field_docs: {},
|
|
367
|
+
optional_fields: [],
|
|
368
|
+
performance_impact: {
|
|
369
|
+
latency: "low",
|
|
370
|
+
resource_usage: "low",
|
|
371
|
+
},
|
|
372
|
+
purpose: "Create new decrypt-secret",
|
|
373
|
+
required_fields: ["metadata.name", "metadata.namespace"],
|
|
374
|
+
side_effects: {
|
|
375
|
+
creates: ["decrypt-secret"],
|
|
376
|
+
},
|
|
377
|
+
},
|
|
378
|
+
curlExample: null,
|
|
379
|
+
},
|
|
380
|
+
{
|
|
381
|
+
toolName: "f5xc-api-blindfold-get-policy-document-get",
|
|
382
|
+
method: "GET",
|
|
383
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policys/{name}/get_policy_document",
|
|
384
|
+
operation: "get",
|
|
385
|
+
domain: "blindfold",
|
|
386
|
+
resource: "get-policy-document",
|
|
387
|
+
summary: "Policy Document.",
|
|
388
|
+
description: "GetPolicyDocument API returns secret policy document for the given policy that contains information about all the rules in the policy and policy_id.\nThis document can be given to F5 Distributed Cloud secret management tool to do secret encryption.",
|
|
389
|
+
pathParameters: [
|
|
390
|
+
{
|
|
391
|
+
description: "Name\n\nx-required\nName of the secret policy.",
|
|
392
|
+
in: "path",
|
|
393
|
+
name: "name",
|
|
394
|
+
required: true,
|
|
395
|
+
schema: {
|
|
396
|
+
type: "string",
|
|
397
|
+
},
|
|
398
|
+
"x-displayname": "Name",
|
|
399
|
+
"x-ves-example": "Site-secret-policy.",
|
|
400
|
+
},
|
|
401
|
+
{
|
|
402
|
+
description: "Namespace\n\nx-required\nNamespace of the secret policy.",
|
|
403
|
+
in: "path",
|
|
404
|
+
name: "namespace",
|
|
405
|
+
required: true,
|
|
406
|
+
schema: {
|
|
407
|
+
type: "string",
|
|
408
|
+
},
|
|
409
|
+
"x-displayname": "Namespace",
|
|
410
|
+
"x-ves-example": "System",
|
|
411
|
+
},
|
|
412
|
+
],
|
|
413
|
+
queryParameters: [],
|
|
414
|
+
requestBodySchema: null,
|
|
415
|
+
responseSchema: {
|
|
416
|
+
$ref: "#/components/schemas/secret_managementGetPolicyDocumentResponse",
|
|
417
|
+
},
|
|
418
|
+
requiredParams: ["name", "namespace"],
|
|
419
|
+
operationId: "ves.io.schema.secret_management.CustomAPI.GetPolicyDocument",
|
|
420
|
+
tags: ["Security"],
|
|
421
|
+
sourceFile: "domains/blindfold.json",
|
|
422
|
+
displayName: null,
|
|
423
|
+
dangerLevel: "low",
|
|
424
|
+
sideEffects: null,
|
|
425
|
+
requiredFields: ["path.name", "path.namespace"],
|
|
426
|
+
confirmationRequired: false,
|
|
427
|
+
parameterExamples: {
|
|
428
|
+
name: "Site-secret-policy.",
|
|
429
|
+
namespace: "System",
|
|
430
|
+
},
|
|
431
|
+
validationRules: {},
|
|
432
|
+
operationMetadata: {
|
|
433
|
+
common_errors: [
|
|
434
|
+
{
|
|
435
|
+
code: 401,
|
|
436
|
+
message: "Authentication required",
|
|
437
|
+
solution: "Provide valid API credentials",
|
|
438
|
+
},
|
|
439
|
+
{
|
|
440
|
+
code: 403,
|
|
441
|
+
message: "Permission denied",
|
|
442
|
+
solution: "Check access permissions for this operation",
|
|
443
|
+
},
|
|
444
|
+
{
|
|
445
|
+
code: 404,
|
|
446
|
+
message: "Resource not found",
|
|
447
|
+
solution: "Verify resource name, namespace, and path",
|
|
448
|
+
},
|
|
449
|
+
{
|
|
450
|
+
code: 409,
|
|
451
|
+
message: "Resource already exists",
|
|
452
|
+
solution: "Use different name or update existing resource",
|
|
453
|
+
},
|
|
454
|
+
{
|
|
455
|
+
code: 429,
|
|
456
|
+
message: "Rate limit exceeded",
|
|
457
|
+
solution: "Wait before retrying the operation",
|
|
458
|
+
},
|
|
459
|
+
{
|
|
460
|
+
code: 500,
|
|
461
|
+
message: "Server error",
|
|
462
|
+
solution: "Retry operation or contact support",
|
|
463
|
+
},
|
|
464
|
+
],
|
|
465
|
+
conditions: {
|
|
466
|
+
postconditions: [],
|
|
467
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
468
|
+
},
|
|
469
|
+
confirmation_required: false,
|
|
470
|
+
danger_level: "low",
|
|
471
|
+
field_docs: {},
|
|
472
|
+
optional_fields: [],
|
|
473
|
+
performance_impact: {
|
|
474
|
+
latency: "moderate",
|
|
475
|
+
resource_usage: "moderate",
|
|
476
|
+
},
|
|
477
|
+
purpose: "Retrieve specific get-policy-document",
|
|
478
|
+
required_fields: ["path.name", "path.namespace"],
|
|
479
|
+
side_effects: {},
|
|
480
|
+
},
|
|
481
|
+
curlExample: null,
|
|
482
|
+
},
|
|
483
|
+
{
|
|
484
|
+
toolName: "f5xc-api-blindfold-get-public-key-list",
|
|
485
|
+
method: "GET",
|
|
486
|
+
path: "/api/secret_management/get_public_key",
|
|
487
|
+
operation: "list",
|
|
488
|
+
domain: "blindfold",
|
|
489
|
+
resource: "get-public-key",
|
|
490
|
+
summary: "Public Key.",
|
|
491
|
+
description: "GetPublicKey API returns public part of the F5 Distributed Cloud secret management key that needs to be given to F5 Distributed Cloud secret management tool to do secret encryption.",
|
|
492
|
+
pathParameters: [],
|
|
493
|
+
queryParameters: [
|
|
494
|
+
{
|
|
495
|
+
description: "The version of public key.",
|
|
496
|
+
in: "query",
|
|
497
|
+
name: "key_version",
|
|
498
|
+
required: false,
|
|
499
|
+
schema: {
|
|
500
|
+
format: "int64",
|
|
501
|
+
type: "integer",
|
|
502
|
+
},
|
|
503
|
+
"x-displayname": "Key Version.",
|
|
504
|
+
"x-ves-example": "0",
|
|
505
|
+
},
|
|
506
|
+
],
|
|
507
|
+
requestBodySchema: null,
|
|
508
|
+
responseSchema: {
|
|
509
|
+
$ref: "#/components/schemas/secret_managementGetPublicKeyResponse",
|
|
510
|
+
},
|
|
511
|
+
requiredParams: [],
|
|
512
|
+
operationId: "ves.io.schema.secret_management.CustomAPI.GetPublicKey",
|
|
513
|
+
tags: ["Security"],
|
|
514
|
+
sourceFile: "domains/blindfold.json",
|
|
515
|
+
displayName: null,
|
|
516
|
+
dangerLevel: "low",
|
|
517
|
+
sideEffects: null,
|
|
518
|
+
requiredFields: [],
|
|
519
|
+
confirmationRequired: false,
|
|
520
|
+
parameterExamples: {
|
|
521
|
+
key_version: "0",
|
|
522
|
+
},
|
|
523
|
+
validationRules: {},
|
|
524
|
+
operationMetadata: {
|
|
525
|
+
common_errors: [
|
|
526
|
+
{
|
|
527
|
+
code: 401,
|
|
528
|
+
message: "Authentication required",
|
|
529
|
+
solution: "Provide valid API credentials",
|
|
530
|
+
},
|
|
531
|
+
{
|
|
532
|
+
code: 403,
|
|
533
|
+
message: "Permission denied",
|
|
534
|
+
solution: "Check access permissions for this operation",
|
|
535
|
+
},
|
|
536
|
+
{
|
|
537
|
+
code: 404,
|
|
538
|
+
message: "Resource not found",
|
|
539
|
+
solution: "Verify resource name, namespace, and path",
|
|
540
|
+
},
|
|
541
|
+
{
|
|
542
|
+
code: 409,
|
|
543
|
+
message: "Resource already exists",
|
|
544
|
+
solution: "Use different name or update existing resource",
|
|
545
|
+
},
|
|
546
|
+
{
|
|
547
|
+
code: 429,
|
|
548
|
+
message: "Rate limit exceeded",
|
|
549
|
+
solution: "Wait before retrying the operation",
|
|
550
|
+
},
|
|
551
|
+
{
|
|
552
|
+
code: 500,
|
|
553
|
+
message: "Server error",
|
|
554
|
+
solution: "Retry operation or contact support",
|
|
555
|
+
},
|
|
556
|
+
],
|
|
557
|
+
conditions: {
|
|
558
|
+
postconditions: [],
|
|
559
|
+
prerequisites: [],
|
|
560
|
+
},
|
|
561
|
+
confirmation_required: false,
|
|
562
|
+
danger_level: "low",
|
|
563
|
+
field_docs: {},
|
|
564
|
+
optional_fields: [],
|
|
565
|
+
performance_impact: {
|
|
566
|
+
latency: "moderate",
|
|
567
|
+
resource_usage: "moderate",
|
|
568
|
+
},
|
|
569
|
+
purpose: "List all get-public-keys",
|
|
570
|
+
required_fields: [],
|
|
571
|
+
side_effects: {},
|
|
572
|
+
},
|
|
573
|
+
curlExample: null,
|
|
574
|
+
},
|
|
575
|
+
{
|
|
576
|
+
toolName: "f5xc-api-blindfold-list-policy-list",
|
|
577
|
+
method: "GET",
|
|
578
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policy/list_policy/{policy_state}",
|
|
579
|
+
operation: "list",
|
|
580
|
+
domain: "blindfold",
|
|
581
|
+
resource: "list-policy",
|
|
582
|
+
summary: "List secret policy.",
|
|
583
|
+
description: "Listpolicy CustomAPI.",
|
|
584
|
+
pathParameters: [
|
|
585
|
+
{
|
|
586
|
+
description: "Namespace\n\nx-required\nNamespace of the secret policy.",
|
|
587
|
+
in: "path",
|
|
588
|
+
name: "namespace",
|
|
589
|
+
required: true,
|
|
590
|
+
schema: {
|
|
591
|
+
type: "string",
|
|
592
|
+
},
|
|
593
|
+
"x-displayname": "Namespace",
|
|
594
|
+
"x-ves-example": "System",
|
|
595
|
+
},
|
|
596
|
+
{
|
|
597
|
+
description: "Policy_state\n\nx-required\nstate of the policy to filter in results.",
|
|
598
|
+
in: "path",
|
|
599
|
+
name: "policy_state",
|
|
600
|
+
required: true,
|
|
601
|
+
schema: {
|
|
602
|
+
type: "string",
|
|
603
|
+
},
|
|
604
|
+
"x-displayname": "Policy_state.",
|
|
605
|
+
"x-ves-example": "All",
|
|
606
|
+
},
|
|
607
|
+
],
|
|
608
|
+
queryParameters: [],
|
|
609
|
+
requestBodySchema: null,
|
|
610
|
+
responseSchema: {
|
|
611
|
+
$ref: "#/components/schemas/secret_policyListPolicyResponse",
|
|
612
|
+
},
|
|
613
|
+
requiredParams: ["namespace", "policy_state"],
|
|
614
|
+
operationId: "ves.io.schema.secret_policy.CustomAPI.ListPolicy",
|
|
615
|
+
tags: ["Security"],
|
|
616
|
+
sourceFile: "domains/blindfold.json",
|
|
617
|
+
displayName: null,
|
|
618
|
+
dangerLevel: "low",
|
|
619
|
+
sideEffects: null,
|
|
620
|
+
requiredFields: ["path.namespace", "path.policy_state"],
|
|
621
|
+
confirmationRequired: false,
|
|
622
|
+
parameterExamples: {
|
|
623
|
+
namespace: "System",
|
|
624
|
+
policy_state: "All",
|
|
625
|
+
},
|
|
626
|
+
validationRules: {},
|
|
627
|
+
operationMetadata: {
|
|
628
|
+
common_errors: [
|
|
629
|
+
{
|
|
630
|
+
code: 401,
|
|
631
|
+
message: "Authentication required",
|
|
632
|
+
solution: "Provide valid API credentials",
|
|
633
|
+
},
|
|
634
|
+
{
|
|
635
|
+
code: 403,
|
|
636
|
+
message: "Permission denied",
|
|
637
|
+
solution: "Check access permissions for this operation",
|
|
638
|
+
},
|
|
639
|
+
{
|
|
640
|
+
code: 404,
|
|
641
|
+
message: "Resource not found",
|
|
642
|
+
solution: "Verify resource name, namespace, and path",
|
|
643
|
+
},
|
|
644
|
+
{
|
|
645
|
+
code: 409,
|
|
646
|
+
message: "Resource already exists",
|
|
647
|
+
solution: "Use different name or update existing resource",
|
|
648
|
+
},
|
|
649
|
+
{
|
|
650
|
+
code: 429,
|
|
651
|
+
message: "Rate limit exceeded",
|
|
652
|
+
solution: "Wait before retrying the operation",
|
|
653
|
+
},
|
|
654
|
+
{
|
|
655
|
+
code: 500,
|
|
656
|
+
message: "Server error",
|
|
657
|
+
solution: "Retry operation or contact support",
|
|
658
|
+
},
|
|
659
|
+
],
|
|
660
|
+
conditions: {
|
|
661
|
+
postconditions: [],
|
|
662
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
663
|
+
},
|
|
664
|
+
confirmation_required: false,
|
|
665
|
+
danger_level: "low",
|
|
666
|
+
field_docs: {},
|
|
667
|
+
optional_fields: [],
|
|
668
|
+
performance_impact: {
|
|
669
|
+
latency: "low",
|
|
670
|
+
resource_usage: "low",
|
|
671
|
+
},
|
|
672
|
+
purpose: "List all list-policys",
|
|
673
|
+
required_fields: ["path.namespace", "path.policy_state"],
|
|
674
|
+
side_effects: {},
|
|
675
|
+
},
|
|
676
|
+
curlExample: null,
|
|
677
|
+
},
|
|
678
|
+
{
|
|
679
|
+
toolName: "f5xc-api-blindfold-process-policy-information-create",
|
|
680
|
+
method: "POST",
|
|
681
|
+
path: "/api/secret_management/namespaces/system/voltshare/process_policy_information",
|
|
682
|
+
operation: "create",
|
|
683
|
+
domain: "blindfold",
|
|
684
|
+
resource: "process-policy-information",
|
|
685
|
+
summary: "ProcessPolicyInformation.",
|
|
686
|
+
description: "ProcessPolicyInformation API takes policy and secret name as input and returns a document containing .",
|
|
687
|
+
pathParameters: [],
|
|
688
|
+
queryParameters: [],
|
|
689
|
+
requestBodySchema: {
|
|
690
|
+
$ref: "#/components/schemas/voltshareProcessPolicyRequest",
|
|
691
|
+
},
|
|
692
|
+
responseSchema: {
|
|
693
|
+
$ref: "#/components/schemas/voltshareProcessPolicyResponse",
|
|
694
|
+
},
|
|
695
|
+
requiredParams: ["body"],
|
|
696
|
+
operationId: "ves.io.schema.voltshare.CustomAPI.ProcessPolicyInformation",
|
|
697
|
+
tags: ["Security"],
|
|
698
|
+
sourceFile: "domains/blindfold.json",
|
|
699
|
+
displayName: null,
|
|
700
|
+
dangerLevel: "medium",
|
|
701
|
+
sideEffects: {
|
|
702
|
+
creates: ["process-policy-information"],
|
|
703
|
+
},
|
|
704
|
+
requiredFields: ["metadata.name", "metadata.namespace"],
|
|
705
|
+
confirmationRequired: false,
|
|
706
|
+
parameterExamples: {},
|
|
707
|
+
validationRules: {},
|
|
708
|
+
operationMetadata: {
|
|
709
|
+
common_errors: [
|
|
710
|
+
{
|
|
711
|
+
code: 401,
|
|
712
|
+
message: "Authentication required",
|
|
713
|
+
solution: "Provide valid API credentials",
|
|
714
|
+
},
|
|
715
|
+
{
|
|
716
|
+
code: 403,
|
|
717
|
+
message: "Permission denied",
|
|
718
|
+
solution: "Check access permissions for this operation",
|
|
719
|
+
},
|
|
720
|
+
{
|
|
721
|
+
code: 404,
|
|
722
|
+
message: "Resource not found",
|
|
723
|
+
solution: "Verify resource name, namespace, and path",
|
|
724
|
+
},
|
|
725
|
+
{
|
|
726
|
+
code: 409,
|
|
727
|
+
message: "Resource already exists",
|
|
728
|
+
solution: "Use different name or update existing resource",
|
|
729
|
+
},
|
|
730
|
+
{
|
|
731
|
+
code: 429,
|
|
732
|
+
message: "Rate limit exceeded",
|
|
733
|
+
solution: "Wait before retrying the operation",
|
|
734
|
+
},
|
|
735
|
+
{
|
|
736
|
+
code: 500,
|
|
737
|
+
message: "Server error",
|
|
738
|
+
solution: "Retry operation or contact support",
|
|
739
|
+
},
|
|
740
|
+
],
|
|
741
|
+
conditions: {
|
|
742
|
+
postconditions: [
|
|
743
|
+
"Process-policy-information resource created",
|
|
744
|
+
"Resource assigned unique identifier",
|
|
745
|
+
],
|
|
746
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
747
|
+
},
|
|
748
|
+
confirmation_required: false,
|
|
749
|
+
danger_level: "medium",
|
|
750
|
+
field_docs: {},
|
|
751
|
+
optional_fields: [],
|
|
752
|
+
performance_impact: {
|
|
753
|
+
latency: "low",
|
|
754
|
+
resource_usage: "low",
|
|
755
|
+
},
|
|
756
|
+
purpose: "Create new process-policy-information",
|
|
757
|
+
required_fields: ["metadata.name", "metadata.namespace"],
|
|
758
|
+
side_effects: {
|
|
759
|
+
creates: ["process-policy-information"],
|
|
760
|
+
},
|
|
761
|
+
},
|
|
762
|
+
curlExample: null,
|
|
763
|
+
},
|
|
764
|
+
{
|
|
765
|
+
toolName: "f5xc-api-blindfold-recover-create",
|
|
766
|
+
method: "POST",
|
|
767
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policy/{name}/recover",
|
|
768
|
+
operation: "create",
|
|
769
|
+
domain: "blindfold",
|
|
770
|
+
resource: "recover",
|
|
771
|
+
summary: "Recover secret policy with given policy name.",
|
|
772
|
+
description: "Recoverpolicy CustomAPI.",
|
|
773
|
+
pathParameters: [
|
|
774
|
+
{
|
|
775
|
+
description: "Name\n\nx-required\nName of the secret policy.",
|
|
776
|
+
in: "path",
|
|
777
|
+
name: "name",
|
|
778
|
+
required: true,
|
|
779
|
+
schema: {
|
|
780
|
+
type: "string",
|
|
781
|
+
},
|
|
782
|
+
"x-displayname": "Name",
|
|
783
|
+
"x-ves-example": "Site-secret-policy.",
|
|
784
|
+
},
|
|
785
|
+
{
|
|
786
|
+
description: "Namespace\n\nx-required\nNamespace of the secret policy.",
|
|
787
|
+
in: "path",
|
|
788
|
+
name: "namespace",
|
|
789
|
+
required: true,
|
|
790
|
+
schema: {
|
|
791
|
+
type: "string",
|
|
792
|
+
},
|
|
793
|
+
"x-displayname": "Namespace",
|
|
794
|
+
"x-ves-example": "System",
|
|
795
|
+
},
|
|
796
|
+
],
|
|
797
|
+
queryParameters: [],
|
|
798
|
+
requestBodySchema: {
|
|
799
|
+
$ref: "#/components/schemas/secret_policyRecoverRequest",
|
|
800
|
+
},
|
|
801
|
+
responseSchema: {
|
|
802
|
+
$ref: "#/components/schemas/secret_policyRecoverResponse",
|
|
803
|
+
},
|
|
804
|
+
requiredParams: ["body", "name", "namespace"],
|
|
805
|
+
operationId: "ves.io.schema.secret_policy.CustomAPI.RecoverPolicy",
|
|
806
|
+
tags: ["Security"],
|
|
807
|
+
sourceFile: "domains/blindfold.json",
|
|
808
|
+
displayName: null,
|
|
809
|
+
dangerLevel: "medium",
|
|
810
|
+
sideEffects: {
|
|
811
|
+
creates: ["recover"],
|
|
812
|
+
},
|
|
813
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.name", "path.namespace"],
|
|
814
|
+
confirmationRequired: false,
|
|
815
|
+
parameterExamples: {
|
|
816
|
+
name: "Site-secret-policy.",
|
|
817
|
+
namespace: "System",
|
|
818
|
+
},
|
|
819
|
+
validationRules: {},
|
|
820
|
+
operationMetadata: {
|
|
821
|
+
common_errors: [
|
|
822
|
+
{
|
|
823
|
+
code: 401,
|
|
824
|
+
message: "Authentication required",
|
|
825
|
+
solution: "Provide valid API credentials",
|
|
826
|
+
},
|
|
827
|
+
{
|
|
828
|
+
code: 403,
|
|
829
|
+
message: "Permission denied",
|
|
830
|
+
solution: "Check access permissions for this operation",
|
|
831
|
+
},
|
|
832
|
+
{
|
|
833
|
+
code: 404,
|
|
834
|
+
message: "Resource not found",
|
|
835
|
+
solution: "Verify resource name, namespace, and path",
|
|
836
|
+
},
|
|
837
|
+
{
|
|
838
|
+
code: 409,
|
|
839
|
+
message: "Resource already exists",
|
|
840
|
+
solution: "Use different name or update existing resource",
|
|
841
|
+
},
|
|
842
|
+
{
|
|
843
|
+
code: 429,
|
|
844
|
+
message: "Rate limit exceeded",
|
|
845
|
+
solution: "Wait before retrying the operation",
|
|
846
|
+
},
|
|
847
|
+
{
|
|
848
|
+
code: 500,
|
|
849
|
+
message: "Server error",
|
|
850
|
+
solution: "Retry operation or contact support",
|
|
851
|
+
},
|
|
852
|
+
],
|
|
853
|
+
conditions: {
|
|
854
|
+
postconditions: ["Recover resource created", "Resource assigned unique identifier"],
|
|
855
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
856
|
+
},
|
|
857
|
+
confirmation_required: false,
|
|
858
|
+
danger_level: "medium",
|
|
859
|
+
field_docs: {},
|
|
860
|
+
optional_fields: [],
|
|
861
|
+
performance_impact: {
|
|
862
|
+
latency: "low",
|
|
863
|
+
resource_usage: "low",
|
|
864
|
+
},
|
|
865
|
+
purpose: "Create new recover",
|
|
866
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.name", "path.namespace"],
|
|
867
|
+
side_effects: {
|
|
868
|
+
creates: ["recover"],
|
|
869
|
+
},
|
|
870
|
+
},
|
|
871
|
+
curlExample: null,
|
|
872
|
+
},
|
|
873
|
+
{
|
|
874
|
+
toolName: "f5xc-api-blindfold-scroll-create",
|
|
875
|
+
method: "POST",
|
|
876
|
+
path: "/api/secret_management/namespaces/{namespace}/voltshare/audit_logs/scroll",
|
|
877
|
+
operation: "create",
|
|
878
|
+
domain: "blindfold",
|
|
879
|
+
resource: "scroll",
|
|
880
|
+
summary: "Audit Log Scroll Query.",
|
|
881
|
+
description: "The response for audit log query contain no more than 500 messages.\nOne can use scroll request to scroll through more than 500 messages or all messages\nin multiple batches. Empty scroll_id in the response indicates no more messages to fetch (EOF).",
|
|
882
|
+
pathParameters: [
|
|
883
|
+
{
|
|
884
|
+
description: "Namespace\nfetch the log messages scoped by namespace.",
|
|
885
|
+
in: "path",
|
|
886
|
+
name: "namespace",
|
|
887
|
+
required: true,
|
|
888
|
+
schema: {
|
|
889
|
+
type: "string",
|
|
890
|
+
},
|
|
891
|
+
"x-displayname": "Namespace",
|
|
892
|
+
"x-ves-example": "Value",
|
|
893
|
+
},
|
|
894
|
+
],
|
|
895
|
+
queryParameters: [],
|
|
896
|
+
requestBodySchema: {
|
|
897
|
+
$ref: "#/components/schemas/voltshareAuditLogScrollRequest",
|
|
898
|
+
},
|
|
899
|
+
responseSchema: {
|
|
900
|
+
$ref: "#/components/schemas/voltshareAuditLogResponse",
|
|
901
|
+
},
|
|
902
|
+
requiredParams: ["body", "namespace"],
|
|
903
|
+
operationId: "docs_cloud_f5_com_0109_public_ves_io_schema_voltshare_ves_swagger_ves.io.schema.voltshare.MonitoringAPI.AuditLogScrollQuery",
|
|
904
|
+
tags: ["Security"],
|
|
905
|
+
sourceFile: "domains/blindfold.json",
|
|
906
|
+
displayName: null,
|
|
907
|
+
dangerLevel: "medium",
|
|
908
|
+
sideEffects: {
|
|
909
|
+
creates: ["scroll"],
|
|
910
|
+
},
|
|
911
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
912
|
+
confirmationRequired: false,
|
|
913
|
+
parameterExamples: {
|
|
914
|
+
namespace: "Value",
|
|
915
|
+
},
|
|
916
|
+
validationRules: {},
|
|
917
|
+
operationMetadata: {
|
|
918
|
+
common_errors: [
|
|
919
|
+
{
|
|
920
|
+
code: 401,
|
|
921
|
+
message: "Authentication required",
|
|
922
|
+
solution: "Provide valid API credentials",
|
|
923
|
+
},
|
|
924
|
+
{
|
|
925
|
+
code: 403,
|
|
926
|
+
message: "Permission denied",
|
|
927
|
+
solution: "Check access permissions for this operation",
|
|
928
|
+
},
|
|
929
|
+
{
|
|
930
|
+
code: 404,
|
|
931
|
+
message: "Resource not found",
|
|
932
|
+
solution: "Verify resource name, namespace, and path",
|
|
933
|
+
},
|
|
934
|
+
{
|
|
935
|
+
code: 409,
|
|
936
|
+
message: "Resource already exists",
|
|
937
|
+
solution: "Use different name or update existing resource",
|
|
938
|
+
},
|
|
939
|
+
{
|
|
940
|
+
code: 429,
|
|
941
|
+
message: "Rate limit exceeded",
|
|
942
|
+
solution: "Wait before retrying the operation",
|
|
943
|
+
},
|
|
944
|
+
{
|
|
945
|
+
code: 500,
|
|
946
|
+
message: "Server error",
|
|
947
|
+
solution: "Retry operation or contact support",
|
|
948
|
+
},
|
|
949
|
+
],
|
|
950
|
+
conditions: {
|
|
951
|
+
postconditions: ["Scroll resource created", "Resource assigned unique identifier"],
|
|
952
|
+
prerequisites: ["Active namespace"],
|
|
953
|
+
},
|
|
954
|
+
confirmation_required: false,
|
|
955
|
+
danger_level: "medium",
|
|
956
|
+
field_docs: {},
|
|
957
|
+
optional_fields: [],
|
|
958
|
+
performance_impact: {
|
|
959
|
+
latency: "low",
|
|
960
|
+
resource_usage: "low",
|
|
961
|
+
},
|
|
962
|
+
purpose: "Create new scroll",
|
|
963
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
964
|
+
side_effects: {
|
|
965
|
+
creates: ["scroll"],
|
|
966
|
+
},
|
|
967
|
+
},
|
|
968
|
+
curlExample: null,
|
|
969
|
+
},
|
|
970
|
+
{
|
|
971
|
+
toolName: "f5xc-api-blindfold-scroll-list",
|
|
972
|
+
method: "GET",
|
|
973
|
+
path: "/api/secret_management/namespaces/{namespace}/voltshare/audit_logs/scroll",
|
|
974
|
+
operation: "list",
|
|
975
|
+
domain: "blindfold",
|
|
976
|
+
resource: "scroll",
|
|
977
|
+
summary: "Audit Log Scroll Query.",
|
|
978
|
+
description: "The response for audit log query contain no more than 500 messages.\nOne can use scroll request to scroll through more than 500 messages or all messages\nin multiple batches. Empty scroll_id in the response indicates no more messages to fetch (EOF).",
|
|
979
|
+
pathParameters: [
|
|
980
|
+
{
|
|
981
|
+
description: "Namespace\nfetch the log messages scoped by namespace.",
|
|
982
|
+
in: "path",
|
|
983
|
+
name: "namespace",
|
|
984
|
+
required: true,
|
|
985
|
+
schema: {
|
|
986
|
+
type: "string",
|
|
987
|
+
},
|
|
988
|
+
"x-displayname": "Namespace",
|
|
989
|
+
"x-ves-example": "Value",
|
|
990
|
+
},
|
|
991
|
+
],
|
|
992
|
+
queryParameters: [
|
|
993
|
+
{
|
|
994
|
+
description: "Long Base-64 encoded string which can be used to retrieve next batch of log messages.",
|
|
995
|
+
in: "query",
|
|
996
|
+
name: "scroll_id",
|
|
997
|
+
required: false,
|
|
998
|
+
schema: {
|
|
999
|
+
type: "string",
|
|
1000
|
+
},
|
|
1001
|
+
"x-displayname": "Scroll ID",
|
|
1002
|
+
"x-ves-example": "Vm9sdGVycmEgRWRnZSBQbGF0Zm9ybQ==.",
|
|
1003
|
+
},
|
|
1004
|
+
],
|
|
1005
|
+
requestBodySchema: null,
|
|
1006
|
+
responseSchema: {
|
|
1007
|
+
$ref: "#/components/schemas/voltshareAuditLogResponse",
|
|
1008
|
+
},
|
|
1009
|
+
requiredParams: ["namespace"],
|
|
1010
|
+
operationId: "ves.io.schema.voltshare.MonitoringAPI.AuditLogScrollQuery",
|
|
1011
|
+
tags: ["Security"],
|
|
1012
|
+
sourceFile: "domains/blindfold.json",
|
|
1013
|
+
displayName: null,
|
|
1014
|
+
dangerLevel: "low",
|
|
1015
|
+
sideEffects: null,
|
|
1016
|
+
requiredFields: ["path.namespace"],
|
|
1017
|
+
confirmationRequired: false,
|
|
1018
|
+
parameterExamples: {
|
|
1019
|
+
namespace: "Value",
|
|
1020
|
+
scroll_id: "Vm9sdGVycmEgRWRnZSBQbGF0Zm9ybQ==.",
|
|
1021
|
+
},
|
|
1022
|
+
validationRules: {},
|
|
1023
|
+
operationMetadata: {
|
|
1024
|
+
common_errors: [
|
|
1025
|
+
{
|
|
1026
|
+
code: 401,
|
|
1027
|
+
message: "Authentication required",
|
|
1028
|
+
solution: "Provide valid API credentials",
|
|
1029
|
+
},
|
|
1030
|
+
{
|
|
1031
|
+
code: 403,
|
|
1032
|
+
message: "Permission denied",
|
|
1033
|
+
solution: "Check access permissions for this operation",
|
|
1034
|
+
},
|
|
1035
|
+
{
|
|
1036
|
+
code: 404,
|
|
1037
|
+
message: "Resource not found",
|
|
1038
|
+
solution: "Verify resource name, namespace, and path",
|
|
1039
|
+
},
|
|
1040
|
+
{
|
|
1041
|
+
code: 409,
|
|
1042
|
+
message: "Resource already exists",
|
|
1043
|
+
solution: "Use different name or update existing resource",
|
|
1044
|
+
},
|
|
1045
|
+
{
|
|
1046
|
+
code: 429,
|
|
1047
|
+
message: "Rate limit exceeded",
|
|
1048
|
+
solution: "Wait before retrying the operation",
|
|
1049
|
+
},
|
|
1050
|
+
{
|
|
1051
|
+
code: 500,
|
|
1052
|
+
message: "Server error",
|
|
1053
|
+
solution: "Retry operation or contact support",
|
|
1054
|
+
},
|
|
1055
|
+
],
|
|
1056
|
+
conditions: {
|
|
1057
|
+
postconditions: [],
|
|
1058
|
+
prerequisites: ["Active namespace"],
|
|
1059
|
+
},
|
|
1060
|
+
confirmation_required: false,
|
|
1061
|
+
danger_level: "low",
|
|
1062
|
+
field_docs: {},
|
|
1063
|
+
optional_fields: [],
|
|
1064
|
+
performance_impact: {
|
|
1065
|
+
latency: "moderate",
|
|
1066
|
+
resource_usage: "moderate",
|
|
1067
|
+
},
|
|
1068
|
+
purpose: "List all scrolls",
|
|
1069
|
+
required_fields: ["path.namespace"],
|
|
1070
|
+
side_effects: {},
|
|
1071
|
+
},
|
|
1072
|
+
curlExample: null,
|
|
1073
|
+
},
|
|
1074
|
+
{
|
|
1075
|
+
toolName: "f5xc-api-blindfold-secret-management-access-create",
|
|
1076
|
+
method: "POST",
|
|
1077
|
+
path: "/api/config/namespaces/{metadata.namespace}/secret_management_accesss",
|
|
1078
|
+
operation: "create",
|
|
1079
|
+
domain: "blindfold",
|
|
1080
|
+
resource: "secret-management-access",
|
|
1081
|
+
summary: "Create Secret Management Access.",
|
|
1082
|
+
description: "Create secret_management_access creates a new object in storage backend for metadata.namespace.",
|
|
1083
|
+
pathParameters: [
|
|
1084
|
+
{
|
|
1085
|
+
description: 'Namespace\nThis defines the workspace within which each the configuration object is to be created.\nMust be a DNS_LABEL format. For a namespace object itself, namespace value will be ""',
|
|
1086
|
+
in: "path",
|
|
1087
|
+
name: "metadata.namespace",
|
|
1088
|
+
required: true,
|
|
1089
|
+
schema: {
|
|
1090
|
+
type: "string",
|
|
1091
|
+
},
|
|
1092
|
+
"x-displayname": "Namespace",
|
|
1093
|
+
"x-ves-example": "Staging",
|
|
1094
|
+
},
|
|
1095
|
+
],
|
|
1096
|
+
queryParameters: [],
|
|
1097
|
+
requestBodySchema: {
|
|
1098
|
+
$ref: "#/components/schemas/secret_management_accessCreateRequest",
|
|
1099
|
+
},
|
|
1100
|
+
responseSchema: {
|
|
1101
|
+
$ref: "#/components/schemas/secret_management_accessCreateResponse",
|
|
1102
|
+
},
|
|
1103
|
+
requiredParams: ["body", "metadata.namespace"],
|
|
1104
|
+
operationId: "ves.io.schema.secret_management_access.API.Create",
|
|
1105
|
+
tags: ["Other"],
|
|
1106
|
+
sourceFile: "domains/blindfold.json",
|
|
1107
|
+
displayName: null,
|
|
1108
|
+
dangerLevel: "medium",
|
|
1109
|
+
sideEffects: {
|
|
1110
|
+
creates: ["secret-management-access"],
|
|
1111
|
+
},
|
|
1112
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
1113
|
+
confirmationRequired: false,
|
|
1114
|
+
parameterExamples: {
|
|
1115
|
+
"metadata.namespace": "Staging",
|
|
1116
|
+
},
|
|
1117
|
+
validationRules: {},
|
|
1118
|
+
operationMetadata: {
|
|
1119
|
+
common_errors: [
|
|
1120
|
+
{
|
|
1121
|
+
code: 401,
|
|
1122
|
+
message: "Authentication required",
|
|
1123
|
+
solution: "Provide valid API credentials",
|
|
1124
|
+
},
|
|
1125
|
+
{
|
|
1126
|
+
code: 403,
|
|
1127
|
+
message: "Permission denied",
|
|
1128
|
+
solution: "Check access permissions for this operation",
|
|
1129
|
+
},
|
|
1130
|
+
{
|
|
1131
|
+
code: 404,
|
|
1132
|
+
message: "Resource not found",
|
|
1133
|
+
solution: "Verify resource name, namespace, and path",
|
|
1134
|
+
},
|
|
1135
|
+
{
|
|
1136
|
+
code: 409,
|
|
1137
|
+
message: "Resource already exists",
|
|
1138
|
+
solution: "Use different name or update existing resource",
|
|
1139
|
+
},
|
|
1140
|
+
{
|
|
1141
|
+
code: 429,
|
|
1142
|
+
message: "Rate limit exceeded",
|
|
1143
|
+
solution: "Wait before retrying the operation",
|
|
1144
|
+
},
|
|
1145
|
+
{
|
|
1146
|
+
code: 500,
|
|
1147
|
+
message: "Server error",
|
|
1148
|
+
solution: "Retry operation or contact support",
|
|
1149
|
+
},
|
|
1150
|
+
],
|
|
1151
|
+
conditions: {
|
|
1152
|
+
postconditions: [
|
|
1153
|
+
"Secret-management-access resource created",
|
|
1154
|
+
"Resource assigned unique identifier",
|
|
1155
|
+
],
|
|
1156
|
+
prerequisites: ["Active namespace"],
|
|
1157
|
+
},
|
|
1158
|
+
confirmation_required: false,
|
|
1159
|
+
danger_level: "medium",
|
|
1160
|
+
field_docs: {},
|
|
1161
|
+
optional_fields: [],
|
|
1162
|
+
performance_impact: {
|
|
1163
|
+
latency: "low",
|
|
1164
|
+
resource_usage: "low",
|
|
1165
|
+
},
|
|
1166
|
+
purpose: "Create new secret-management-access",
|
|
1167
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
1168
|
+
side_effects: {
|
|
1169
|
+
creates: ["secret-management-access"],
|
|
1170
|
+
},
|
|
1171
|
+
},
|
|
1172
|
+
curlExample: null,
|
|
1173
|
+
},
|
|
1174
|
+
{
|
|
1175
|
+
toolName: "f5xc-api-blindfold-secret-management-access-delete",
|
|
1176
|
+
method: "DELETE",
|
|
1177
|
+
path: "/api/config/namespaces/{namespace}/secret_management_accesss/{name}",
|
|
1178
|
+
operation: "delete",
|
|
1179
|
+
domain: "blindfold",
|
|
1180
|
+
resource: "secret-management-access",
|
|
1181
|
+
summary: "DELETE Secret Management Access.",
|
|
1182
|
+
description: "DELETE the specified secret_management_access.",
|
|
1183
|
+
pathParameters: [
|
|
1184
|
+
{
|
|
1185
|
+
description: "Name\nName of the configuration object.",
|
|
1186
|
+
in: "path",
|
|
1187
|
+
name: "name",
|
|
1188
|
+
required: true,
|
|
1189
|
+
schema: {
|
|
1190
|
+
type: "string",
|
|
1191
|
+
},
|
|
1192
|
+
"x-displayname": "Name",
|
|
1193
|
+
"x-ves-example": "Name",
|
|
1194
|
+
},
|
|
1195
|
+
{
|
|
1196
|
+
description: "Namespace\nNamespace in which the configuration object is present.",
|
|
1197
|
+
in: "path",
|
|
1198
|
+
name: "namespace",
|
|
1199
|
+
required: true,
|
|
1200
|
+
schema: {
|
|
1201
|
+
type: "string",
|
|
1202
|
+
},
|
|
1203
|
+
"x-displayname": "Namespace",
|
|
1204
|
+
"x-ves-example": "Ns1",
|
|
1205
|
+
},
|
|
1206
|
+
],
|
|
1207
|
+
queryParameters: [],
|
|
1208
|
+
requestBodySchema: {
|
|
1209
|
+
$ref: "#/components/schemas/secret_management_accessDeleteRequest",
|
|
1210
|
+
},
|
|
1211
|
+
responseSchema: {},
|
|
1212
|
+
requiredParams: ["body", "name", "namespace"],
|
|
1213
|
+
operationId: "ves.io.schema.secret_management_access.API.Delete",
|
|
1214
|
+
tags: ["Other"],
|
|
1215
|
+
sourceFile: "domains/blindfold.json",
|
|
1216
|
+
displayName: null,
|
|
1217
|
+
dangerLevel: "high",
|
|
1218
|
+
sideEffects: {
|
|
1219
|
+
deletes: ["secret-management-access", "contained_resources"],
|
|
1220
|
+
},
|
|
1221
|
+
requiredFields: ["path.name", "path.namespace"],
|
|
1222
|
+
confirmationRequired: true,
|
|
1223
|
+
parameterExamples: {
|
|
1224
|
+
name: "Name",
|
|
1225
|
+
namespace: "Ns1",
|
|
1226
|
+
},
|
|
1227
|
+
validationRules: {},
|
|
1228
|
+
operationMetadata: {
|
|
1229
|
+
common_errors: [
|
|
1230
|
+
{
|
|
1231
|
+
code: 401,
|
|
1232
|
+
message: "Authentication required",
|
|
1233
|
+
solution: "Provide valid API credentials",
|
|
1234
|
+
},
|
|
1235
|
+
{
|
|
1236
|
+
code: 403,
|
|
1237
|
+
message: "Permission denied",
|
|
1238
|
+
solution: "Check access permissions for this operation",
|
|
1239
|
+
},
|
|
1240
|
+
{
|
|
1241
|
+
code: 404,
|
|
1242
|
+
message: "Resource not found",
|
|
1243
|
+
solution: "Verify resource name, namespace, and path",
|
|
1244
|
+
},
|
|
1245
|
+
{
|
|
1246
|
+
code: 409,
|
|
1247
|
+
message: "Resource already exists",
|
|
1248
|
+
solution: "Use different name or update existing resource",
|
|
1249
|
+
},
|
|
1250
|
+
{
|
|
1251
|
+
code: 429,
|
|
1252
|
+
message: "Rate limit exceeded",
|
|
1253
|
+
solution: "Wait before retrying the operation",
|
|
1254
|
+
},
|
|
1255
|
+
{
|
|
1256
|
+
code: 500,
|
|
1257
|
+
message: "Server error",
|
|
1258
|
+
solution: "Retry operation or contact support",
|
|
1259
|
+
},
|
|
1260
|
+
],
|
|
1261
|
+
conditions: {
|
|
1262
|
+
postconditions: ["Resource removed from system", "Associated resources may be affected"],
|
|
1263
|
+
prerequisites: ["Active namespace"],
|
|
1264
|
+
},
|
|
1265
|
+
confirmation_required: true,
|
|
1266
|
+
danger_level: "high",
|
|
1267
|
+
field_docs: {},
|
|
1268
|
+
optional_fields: [],
|
|
1269
|
+
performance_impact: {
|
|
1270
|
+
latency: "high",
|
|
1271
|
+
resource_usage: "moderate",
|
|
1272
|
+
},
|
|
1273
|
+
purpose: "Delete secret-management-access",
|
|
1274
|
+
required_fields: ["path.name", "path.namespace"],
|
|
1275
|
+
side_effects: {
|
|
1276
|
+
deletes: ["secret-management-access", "contained_resources"],
|
|
1277
|
+
},
|
|
1278
|
+
},
|
|
1279
|
+
curlExample: null,
|
|
1280
|
+
},
|
|
1281
|
+
{
|
|
1282
|
+
toolName: "f5xc-api-blindfold-secret-management-access-get",
|
|
1283
|
+
method: "GET",
|
|
1284
|
+
path: "/api/config/namespaces/{namespace}/secret_management_accesss/{name}",
|
|
1285
|
+
operation: "get",
|
|
1286
|
+
domain: "blindfold",
|
|
1287
|
+
resource: "secret-management-access",
|
|
1288
|
+
summary: "GET Secret Management Access.",
|
|
1289
|
+
description: "GET secret_management_access reads a given object from storage backend for metadata.namespace.",
|
|
1290
|
+
pathParameters: [
|
|
1291
|
+
{
|
|
1292
|
+
description: "Name\nThe name of the configuration object to be fetched.",
|
|
1293
|
+
in: "path",
|
|
1294
|
+
name: "name",
|
|
1295
|
+
required: true,
|
|
1296
|
+
schema: {
|
|
1297
|
+
type: "string",
|
|
1298
|
+
},
|
|
1299
|
+
"x-displayname": "Name",
|
|
1300
|
+
"x-ves-example": "Name",
|
|
1301
|
+
},
|
|
1302
|
+
{
|
|
1303
|
+
description: "Namespace\nThe namespace in which the configuration object is present.",
|
|
1304
|
+
in: "path",
|
|
1305
|
+
name: "namespace",
|
|
1306
|
+
required: true,
|
|
1307
|
+
schema: {
|
|
1308
|
+
type: "string",
|
|
1309
|
+
},
|
|
1310
|
+
"x-displayname": "Namespace",
|
|
1311
|
+
"x-ves-example": "Ns1",
|
|
1312
|
+
},
|
|
1313
|
+
],
|
|
1314
|
+
queryParameters: [
|
|
1315
|
+
{
|
|
1316
|
+
description: "The format in which the configuration object is to be fetched. This could be for example\n - in GetSpec form for the contents of object\n - in CreateRequest form to create a new similar object\n - to ReplaceRequest form to replace changeable values\n\nDefault format of returned resource\nResponse should be in CreateRequest format\nResponse should be in ReplaceRequest format\nResponse should be in StatusObject(s) format\nResponse should be in format of GetSpecType\nResponse should have other objects referring to this object\nResponse should have deleted and disabled objects referrred by this object.",
|
|
1317
|
+
in: "query",
|
|
1318
|
+
name: "response_format",
|
|
1319
|
+
required: false,
|
|
1320
|
+
schema: {
|
|
1321
|
+
default: "GET_RSP_FORMAT_DEFAULT",
|
|
1322
|
+
enum: [
|
|
1323
|
+
"GET_RSP_FORMAT_DEFAULT",
|
|
1324
|
+
"GET_RSP_FORMAT_FOR_CREATE",
|
|
1325
|
+
"GET_RSP_FORMAT_FOR_REPLACE",
|
|
1326
|
+
"GET_RSP_FORMAT_STATUS",
|
|
1327
|
+
"GET_RSP_FORMAT_READ",
|
|
1328
|
+
"GET_RSP_FORMAT_REFERRING_OBJECTS",
|
|
1329
|
+
"GET_RSP_FORMAT_BROKEN_REFERENCES",
|
|
1330
|
+
],
|
|
1331
|
+
type: "string",
|
|
1332
|
+
},
|
|
1333
|
+
"x-displayname": "Broken Referred Objects.",
|
|
1334
|
+
},
|
|
1335
|
+
],
|
|
1336
|
+
requestBodySchema: null,
|
|
1337
|
+
responseSchema: {
|
|
1338
|
+
$ref: "#/components/schemas/secret_management_accessGetResponse",
|
|
1339
|
+
},
|
|
1340
|
+
requiredParams: ["name", "namespace"],
|
|
1341
|
+
operationId: "ves.io.schema.secret_management_access.API.Get",
|
|
1342
|
+
tags: ["Other"],
|
|
1343
|
+
sourceFile: "domains/blindfold.json",
|
|
1344
|
+
displayName: null,
|
|
1345
|
+
dangerLevel: "low",
|
|
1346
|
+
sideEffects: null,
|
|
1347
|
+
requiredFields: ["path.name", "path.namespace"],
|
|
1348
|
+
confirmationRequired: false,
|
|
1349
|
+
parameterExamples: {
|
|
1350
|
+
name: "Name",
|
|
1351
|
+
namespace: "Ns1",
|
|
1352
|
+
},
|
|
1353
|
+
validationRules: {},
|
|
1354
|
+
operationMetadata: {
|
|
1355
|
+
common_errors: [
|
|
1356
|
+
{
|
|
1357
|
+
code: 401,
|
|
1358
|
+
message: "Authentication required",
|
|
1359
|
+
solution: "Provide valid API credentials",
|
|
1360
|
+
},
|
|
1361
|
+
{
|
|
1362
|
+
code: 403,
|
|
1363
|
+
message: "Permission denied",
|
|
1364
|
+
solution: "Check access permissions for this operation",
|
|
1365
|
+
},
|
|
1366
|
+
{
|
|
1367
|
+
code: 404,
|
|
1368
|
+
message: "Resource not found",
|
|
1369
|
+
solution: "Verify resource name, namespace, and path",
|
|
1370
|
+
},
|
|
1371
|
+
{
|
|
1372
|
+
code: 409,
|
|
1373
|
+
message: "Resource already exists",
|
|
1374
|
+
solution: "Use different name or update existing resource",
|
|
1375
|
+
},
|
|
1376
|
+
{
|
|
1377
|
+
code: 429,
|
|
1378
|
+
message: "Rate limit exceeded",
|
|
1379
|
+
solution: "Wait before retrying the operation",
|
|
1380
|
+
},
|
|
1381
|
+
{
|
|
1382
|
+
code: 500,
|
|
1383
|
+
message: "Server error",
|
|
1384
|
+
solution: "Retry operation or contact support",
|
|
1385
|
+
},
|
|
1386
|
+
],
|
|
1387
|
+
conditions: {
|
|
1388
|
+
postconditions: [],
|
|
1389
|
+
prerequisites: ["Active namespace"],
|
|
1390
|
+
},
|
|
1391
|
+
confirmation_required: false,
|
|
1392
|
+
danger_level: "low",
|
|
1393
|
+
field_docs: {},
|
|
1394
|
+
optional_fields: [],
|
|
1395
|
+
performance_impact: {
|
|
1396
|
+
latency: "low",
|
|
1397
|
+
resource_usage: "low",
|
|
1398
|
+
},
|
|
1399
|
+
purpose: "Retrieve specific secret-management-access",
|
|
1400
|
+
required_fields: ["path.name", "path.namespace"],
|
|
1401
|
+
side_effects: {},
|
|
1402
|
+
},
|
|
1403
|
+
curlExample: null,
|
|
1404
|
+
},
|
|
1405
|
+
{
|
|
1406
|
+
toolName: "f5xc-api-blindfold-secret-management-access-list",
|
|
1407
|
+
method: "GET",
|
|
1408
|
+
path: "/api/config/namespaces/{namespace}/secret_management_accesss",
|
|
1409
|
+
operation: "list",
|
|
1410
|
+
domain: "blindfold",
|
|
1411
|
+
resource: "secret-management-access",
|
|
1412
|
+
summary: "List Secret Management Access.",
|
|
1413
|
+
description: "List the set of secret_management_access in a namespace.",
|
|
1414
|
+
pathParameters: [
|
|
1415
|
+
{
|
|
1416
|
+
description: "Namespace\nNamespace to scope the listing of secret_management_access.",
|
|
1417
|
+
in: "path",
|
|
1418
|
+
name: "namespace",
|
|
1419
|
+
required: true,
|
|
1420
|
+
schema: {
|
|
1421
|
+
type: "string",
|
|
1422
|
+
},
|
|
1423
|
+
"x-displayname": "Namespace",
|
|
1424
|
+
"x-ves-example": "Ns1",
|
|
1425
|
+
},
|
|
1426
|
+
],
|
|
1427
|
+
queryParameters: [
|
|
1428
|
+
{
|
|
1429
|
+
description: "A LabelSelectorType expression that every item in list response will satisfy.",
|
|
1430
|
+
in: "query",
|
|
1431
|
+
name: "label_filter",
|
|
1432
|
+
required: false,
|
|
1433
|
+
schema: {
|
|
1434
|
+
type: "string",
|
|
1435
|
+
},
|
|
1436
|
+
"x-displayname": "Label Filter.",
|
|
1437
|
+
"x-ves-example": "Env in (staging, testing), tier in (web, db)",
|
|
1438
|
+
},
|
|
1439
|
+
{
|
|
1440
|
+
description: 'X-example: ""\nExtra fields to return along with summary fields.',
|
|
1441
|
+
in: "query",
|
|
1442
|
+
name: "report_fields",
|
|
1443
|
+
required: false,
|
|
1444
|
+
schema: {
|
|
1445
|
+
items: {
|
|
1446
|
+
type: "string",
|
|
1447
|
+
},
|
|
1448
|
+
type: "array",
|
|
1449
|
+
},
|
|
1450
|
+
"x-displayname": "Report Fields.",
|
|
1451
|
+
},
|
|
1452
|
+
{
|
|
1453
|
+
description: 'X-example: ""\nExtra status fields to return along with summary fields.',
|
|
1454
|
+
in: "query",
|
|
1455
|
+
name: "report_status_fields",
|
|
1456
|
+
required: false,
|
|
1457
|
+
schema: {
|
|
1458
|
+
items: {
|
|
1459
|
+
type: "string",
|
|
1460
|
+
},
|
|
1461
|
+
type: "array",
|
|
1462
|
+
},
|
|
1463
|
+
"x-displayname": "Report Status Fields.",
|
|
1464
|
+
},
|
|
1465
|
+
],
|
|
1466
|
+
requestBodySchema: null,
|
|
1467
|
+
responseSchema: {
|
|
1468
|
+
$ref: "#/components/schemas/secret_management_accessListResponse",
|
|
1469
|
+
},
|
|
1470
|
+
requiredParams: ["namespace"],
|
|
1471
|
+
operationId: "ves.io.schema.secret_management_access.API.List",
|
|
1472
|
+
tags: ["Other"],
|
|
1473
|
+
sourceFile: "domains/blindfold.json",
|
|
1474
|
+
displayName: null,
|
|
1475
|
+
dangerLevel: "low",
|
|
1476
|
+
sideEffects: null,
|
|
1477
|
+
requiredFields: ["path.namespace"],
|
|
1478
|
+
confirmationRequired: false,
|
|
1479
|
+
parameterExamples: {
|
|
1480
|
+
label_filter: "Env in (staging, testing), tier in (web, db)",
|
|
1481
|
+
namespace: "Ns1",
|
|
1482
|
+
},
|
|
1483
|
+
validationRules: {},
|
|
1484
|
+
operationMetadata: {
|
|
1485
|
+
common_errors: [
|
|
1486
|
+
{
|
|
1487
|
+
code: 401,
|
|
1488
|
+
message: "Authentication required",
|
|
1489
|
+
solution: "Provide valid API credentials",
|
|
1490
|
+
},
|
|
1491
|
+
{
|
|
1492
|
+
code: 403,
|
|
1493
|
+
message: "Permission denied",
|
|
1494
|
+
solution: "Check access permissions for this operation",
|
|
1495
|
+
},
|
|
1496
|
+
{
|
|
1497
|
+
code: 404,
|
|
1498
|
+
message: "Resource not found",
|
|
1499
|
+
solution: "Verify resource name, namespace, and path",
|
|
1500
|
+
},
|
|
1501
|
+
{
|
|
1502
|
+
code: 409,
|
|
1503
|
+
message: "Resource already exists",
|
|
1504
|
+
solution: "Use different name or update existing resource",
|
|
1505
|
+
},
|
|
1506
|
+
{
|
|
1507
|
+
code: 429,
|
|
1508
|
+
message: "Rate limit exceeded",
|
|
1509
|
+
solution: "Wait before retrying the operation",
|
|
1510
|
+
},
|
|
1511
|
+
{
|
|
1512
|
+
code: 500,
|
|
1513
|
+
message: "Server error",
|
|
1514
|
+
solution: "Retry operation or contact support",
|
|
1515
|
+
},
|
|
1516
|
+
],
|
|
1517
|
+
conditions: {
|
|
1518
|
+
postconditions: [],
|
|
1519
|
+
prerequisites: ["Active namespace"],
|
|
1520
|
+
},
|
|
1521
|
+
confirmation_required: false,
|
|
1522
|
+
danger_level: "low",
|
|
1523
|
+
field_docs: {},
|
|
1524
|
+
optional_fields: [],
|
|
1525
|
+
performance_impact: {
|
|
1526
|
+
latency: "moderate",
|
|
1527
|
+
resource_usage: "moderate",
|
|
1528
|
+
},
|
|
1529
|
+
purpose: "List all secret-management-accesss",
|
|
1530
|
+
required_fields: ["path.namespace"],
|
|
1531
|
+
side_effects: {},
|
|
1532
|
+
},
|
|
1533
|
+
curlExample: null,
|
|
1534
|
+
},
|
|
1535
|
+
{
|
|
1536
|
+
toolName: "f5xc-api-blindfold-secret-management-access-update",
|
|
1537
|
+
method: "PUT",
|
|
1538
|
+
path: "/api/config/namespaces/{metadata.namespace}/secret_management_accesss/{metadata.name}",
|
|
1539
|
+
operation: "update",
|
|
1540
|
+
domain: "blindfold",
|
|
1541
|
+
resource: "secret-management-access",
|
|
1542
|
+
summary: "Replace Secret Management Access.",
|
|
1543
|
+
description: "Replace secret_management_access replaces an existing object in storage backend for metadata.namespace.",
|
|
1544
|
+
pathParameters: [
|
|
1545
|
+
{
|
|
1546
|
+
description: "Name\nThe configuration object to be replaced will be looked up by name.",
|
|
1547
|
+
in: "path",
|
|
1548
|
+
name: "metadata.name",
|
|
1549
|
+
required: true,
|
|
1550
|
+
schema: {
|
|
1551
|
+
type: "string",
|
|
1552
|
+
},
|
|
1553
|
+
"x-displayname": "Name",
|
|
1554
|
+
"x-ves-example": "Example-corp-web.",
|
|
1555
|
+
},
|
|
1556
|
+
{
|
|
1557
|
+
description: 'Namespace\nThis defines the workspace within which each the configuration object is to be created.\nMust be a DNS_LABEL format. For a namespace object itself, namespace value will be ""',
|
|
1558
|
+
in: "path",
|
|
1559
|
+
name: "metadata.namespace",
|
|
1560
|
+
required: true,
|
|
1561
|
+
schema: {
|
|
1562
|
+
type: "string",
|
|
1563
|
+
},
|
|
1564
|
+
"x-displayname": "Namespace",
|
|
1565
|
+
"x-ves-example": "Staging",
|
|
1566
|
+
},
|
|
1567
|
+
],
|
|
1568
|
+
queryParameters: [],
|
|
1569
|
+
requestBodySchema: {
|
|
1570
|
+
$ref: "#/components/schemas/secret_management_accessReplaceRequest",
|
|
1571
|
+
},
|
|
1572
|
+
responseSchema: {
|
|
1573
|
+
$ref: "#/components/schemas/secret_management_accessReplaceResponse",
|
|
1574
|
+
},
|
|
1575
|
+
requiredParams: ["body", "metadata.name", "metadata.namespace"],
|
|
1576
|
+
operationId: "ves.io.schema.secret_management_access.API.Replace",
|
|
1577
|
+
tags: ["Other"],
|
|
1578
|
+
sourceFile: "domains/blindfold.json",
|
|
1579
|
+
displayName: null,
|
|
1580
|
+
dangerLevel: "medium",
|
|
1581
|
+
sideEffects: {
|
|
1582
|
+
modifies: ["secret-management-access"],
|
|
1583
|
+
},
|
|
1584
|
+
requiredFields: ["path.metadata.name", "path.metadata.namespace"],
|
|
1585
|
+
confirmationRequired: false,
|
|
1586
|
+
parameterExamples: {
|
|
1587
|
+
"metadata.name": "Example-corp-web.",
|
|
1588
|
+
"metadata.namespace": "Staging",
|
|
1589
|
+
},
|
|
1590
|
+
validationRules: {},
|
|
1591
|
+
operationMetadata: {
|
|
1592
|
+
common_errors: [
|
|
1593
|
+
{
|
|
1594
|
+
code: 401,
|
|
1595
|
+
message: "Authentication required",
|
|
1596
|
+
solution: "Provide valid API credentials",
|
|
1597
|
+
},
|
|
1598
|
+
{
|
|
1599
|
+
code: 403,
|
|
1600
|
+
message: "Permission denied",
|
|
1601
|
+
solution: "Check access permissions for this operation",
|
|
1602
|
+
},
|
|
1603
|
+
{
|
|
1604
|
+
code: 404,
|
|
1605
|
+
message: "Resource not found",
|
|
1606
|
+
solution: "Verify resource name, namespace, and path",
|
|
1607
|
+
},
|
|
1608
|
+
{
|
|
1609
|
+
code: 409,
|
|
1610
|
+
message: "Resource already exists",
|
|
1611
|
+
solution: "Use different name or update existing resource",
|
|
1612
|
+
},
|
|
1613
|
+
{
|
|
1614
|
+
code: 429,
|
|
1615
|
+
message: "Rate limit exceeded",
|
|
1616
|
+
solution: "Wait before retrying the operation",
|
|
1617
|
+
},
|
|
1618
|
+
{
|
|
1619
|
+
code: 500,
|
|
1620
|
+
message: "Server error",
|
|
1621
|
+
solution: "Retry operation or contact support",
|
|
1622
|
+
},
|
|
1623
|
+
],
|
|
1624
|
+
conditions: {
|
|
1625
|
+
postconditions: ["Resource updated with new values"],
|
|
1626
|
+
prerequisites: ["Active namespace"],
|
|
1627
|
+
},
|
|
1628
|
+
confirmation_required: false,
|
|
1629
|
+
danger_level: "medium",
|
|
1630
|
+
field_docs: {},
|
|
1631
|
+
optional_fields: [],
|
|
1632
|
+
performance_impact: {
|
|
1633
|
+
latency: "low",
|
|
1634
|
+
resource_usage: "low",
|
|
1635
|
+
},
|
|
1636
|
+
purpose: "Replace existing secret-management-access",
|
|
1637
|
+
required_fields: ["path.metadata.name", "path.metadata.namespace"],
|
|
1638
|
+
side_effects: {
|
|
1639
|
+
modifies: ["secret-management-access"],
|
|
1640
|
+
},
|
|
1641
|
+
},
|
|
1642
|
+
curlExample: null,
|
|
1643
|
+
},
|
|
1644
|
+
{
|
|
1645
|
+
toolName: "f5xc-api-blindfold-secret-policy-create",
|
|
1646
|
+
method: "POST",
|
|
1647
|
+
path: "/api/secret_management/namespaces/{metadata.namespace}/secret_policys",
|
|
1648
|
+
operation: "create",
|
|
1649
|
+
domain: "blindfold",
|
|
1650
|
+
resource: "secret-policy",
|
|
1651
|
+
summary: "Create Secret Policy.",
|
|
1652
|
+
description: "Create secret_policy creates a new object in the storage backend for metadata.namespace.",
|
|
1653
|
+
pathParameters: [
|
|
1654
|
+
{
|
|
1655
|
+
description: 'Namespace\nThis defines the workspace within which each the configuration object is to be created.\nMust be a DNS_LABEL format. For a namespace object itself, namespace value will be ""',
|
|
1656
|
+
in: "path",
|
|
1657
|
+
name: "metadata.namespace",
|
|
1658
|
+
required: true,
|
|
1659
|
+
schema: {
|
|
1660
|
+
type: "string",
|
|
1661
|
+
},
|
|
1662
|
+
"x-displayname": "Namespace",
|
|
1663
|
+
"x-ves-example": "Staging",
|
|
1664
|
+
},
|
|
1665
|
+
],
|
|
1666
|
+
queryParameters: [],
|
|
1667
|
+
requestBodySchema: {
|
|
1668
|
+
$ref: "#/components/schemas/secret_policyCreateRequest",
|
|
1669
|
+
},
|
|
1670
|
+
responseSchema: {
|
|
1671
|
+
$ref: "#/components/schemas/secret_policyCreateResponse",
|
|
1672
|
+
},
|
|
1673
|
+
requiredParams: ["body", "metadata.namespace"],
|
|
1674
|
+
operationId: "ves.io.schema.secret_policy.API.Create",
|
|
1675
|
+
tags: ["Security"],
|
|
1676
|
+
sourceFile: "domains/blindfold.json",
|
|
1677
|
+
displayName: null,
|
|
1678
|
+
dangerLevel: "medium",
|
|
1679
|
+
sideEffects: {
|
|
1680
|
+
creates: ["secret-policy"],
|
|
1681
|
+
},
|
|
1682
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
1683
|
+
confirmationRequired: false,
|
|
1684
|
+
parameterExamples: {
|
|
1685
|
+
"metadata.namespace": "Staging",
|
|
1686
|
+
},
|
|
1687
|
+
validationRules: {},
|
|
1688
|
+
operationMetadata: {
|
|
1689
|
+
common_errors: [
|
|
1690
|
+
{
|
|
1691
|
+
code: 401,
|
|
1692
|
+
message: "Authentication required",
|
|
1693
|
+
solution: "Provide valid API credentials",
|
|
1694
|
+
},
|
|
1695
|
+
{
|
|
1696
|
+
code: 403,
|
|
1697
|
+
message: "Permission denied",
|
|
1698
|
+
solution: "Check access permissions for this operation",
|
|
1699
|
+
},
|
|
1700
|
+
{
|
|
1701
|
+
code: 404,
|
|
1702
|
+
message: "Resource not found",
|
|
1703
|
+
solution: "Verify resource name, namespace, and path",
|
|
1704
|
+
},
|
|
1705
|
+
{
|
|
1706
|
+
code: 409,
|
|
1707
|
+
message: "Resource already exists",
|
|
1708
|
+
solution: "Use different name or update existing resource",
|
|
1709
|
+
},
|
|
1710
|
+
{
|
|
1711
|
+
code: 429,
|
|
1712
|
+
message: "Rate limit exceeded",
|
|
1713
|
+
solution: "Wait before retrying the operation",
|
|
1714
|
+
},
|
|
1715
|
+
{
|
|
1716
|
+
code: 500,
|
|
1717
|
+
message: "Server error",
|
|
1718
|
+
solution: "Retry operation or contact support",
|
|
1719
|
+
},
|
|
1720
|
+
],
|
|
1721
|
+
conditions: {
|
|
1722
|
+
postconditions: ["Secret-policy resource created", "Resource assigned unique identifier"],
|
|
1723
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
1724
|
+
},
|
|
1725
|
+
confirmation_required: false,
|
|
1726
|
+
danger_level: "medium",
|
|
1727
|
+
field_docs: {},
|
|
1728
|
+
optional_fields: [],
|
|
1729
|
+
performance_impact: {
|
|
1730
|
+
latency: "low",
|
|
1731
|
+
resource_usage: "low",
|
|
1732
|
+
},
|
|
1733
|
+
purpose: "Create new secret-policy",
|
|
1734
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
1735
|
+
side_effects: {
|
|
1736
|
+
creates: ["secret-policy"],
|
|
1737
|
+
},
|
|
1738
|
+
},
|
|
1739
|
+
curlExample: null,
|
|
1740
|
+
},
|
|
1741
|
+
{
|
|
1742
|
+
toolName: "f5xc-api-blindfold-secret-policy-delete",
|
|
1743
|
+
method: "DELETE",
|
|
1744
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policys/{name}",
|
|
1745
|
+
operation: "delete",
|
|
1746
|
+
domain: "blindfold",
|
|
1747
|
+
resource: "secret-policy",
|
|
1748
|
+
summary: "DELETE Secret Policy.",
|
|
1749
|
+
description: "DELETE the specified secret_policy.",
|
|
1750
|
+
pathParameters: [
|
|
1751
|
+
{
|
|
1752
|
+
description: "Name\nName of the configuration object.",
|
|
1753
|
+
in: "path",
|
|
1754
|
+
name: "name",
|
|
1755
|
+
required: true,
|
|
1756
|
+
schema: {
|
|
1757
|
+
type: "string",
|
|
1758
|
+
},
|
|
1759
|
+
"x-displayname": "Name",
|
|
1760
|
+
"x-ves-example": "Name",
|
|
1761
|
+
},
|
|
1762
|
+
{
|
|
1763
|
+
description: "Namespace\nNamespace in which the configuration object is present.",
|
|
1764
|
+
in: "path",
|
|
1765
|
+
name: "namespace",
|
|
1766
|
+
required: true,
|
|
1767
|
+
schema: {
|
|
1768
|
+
type: "string",
|
|
1769
|
+
},
|
|
1770
|
+
"x-displayname": "Namespace",
|
|
1771
|
+
"x-ves-example": "Ns1",
|
|
1772
|
+
},
|
|
1773
|
+
],
|
|
1774
|
+
queryParameters: [],
|
|
1775
|
+
requestBodySchema: {
|
|
1776
|
+
$ref: "#/components/schemas/secret_policyDeleteRequest",
|
|
1777
|
+
},
|
|
1778
|
+
responseSchema: {},
|
|
1779
|
+
requiredParams: ["body", "name", "namespace"],
|
|
1780
|
+
operationId: "ves.io.schema.secret_policy.API.Delete",
|
|
1781
|
+
tags: ["Security"],
|
|
1782
|
+
sourceFile: "domains/blindfold.json",
|
|
1783
|
+
displayName: null,
|
|
1784
|
+
dangerLevel: "high",
|
|
1785
|
+
sideEffects: {
|
|
1786
|
+
deletes: ["secret-policy", "contained_resources"],
|
|
1787
|
+
},
|
|
1788
|
+
requiredFields: ["path.name", "path.namespace"],
|
|
1789
|
+
confirmationRequired: true,
|
|
1790
|
+
parameterExamples: {
|
|
1791
|
+
name: "Name",
|
|
1792
|
+
namespace: "Ns1",
|
|
1793
|
+
},
|
|
1794
|
+
validationRules: {},
|
|
1795
|
+
operationMetadata: {
|
|
1796
|
+
common_errors: [
|
|
1797
|
+
{
|
|
1798
|
+
code: 401,
|
|
1799
|
+
message: "Authentication required",
|
|
1800
|
+
solution: "Provide valid API credentials",
|
|
1801
|
+
},
|
|
1802
|
+
{
|
|
1803
|
+
code: 403,
|
|
1804
|
+
message: "Permission denied",
|
|
1805
|
+
solution: "Check access permissions for this operation",
|
|
1806
|
+
},
|
|
1807
|
+
{
|
|
1808
|
+
code: 404,
|
|
1809
|
+
message: "Resource not found",
|
|
1810
|
+
solution: "Verify resource name, namespace, and path",
|
|
1811
|
+
},
|
|
1812
|
+
{
|
|
1813
|
+
code: 409,
|
|
1814
|
+
message: "Resource already exists",
|
|
1815
|
+
solution: "Use different name or update existing resource",
|
|
1816
|
+
},
|
|
1817
|
+
{
|
|
1818
|
+
code: 429,
|
|
1819
|
+
message: "Rate limit exceeded",
|
|
1820
|
+
solution: "Wait before retrying the operation",
|
|
1821
|
+
},
|
|
1822
|
+
{
|
|
1823
|
+
code: 500,
|
|
1824
|
+
message: "Server error",
|
|
1825
|
+
solution: "Retry operation or contact support",
|
|
1826
|
+
},
|
|
1827
|
+
],
|
|
1828
|
+
conditions: {
|
|
1829
|
+
postconditions: ["Resource removed from system", "Associated resources may be affected"],
|
|
1830
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
1831
|
+
},
|
|
1832
|
+
confirmation_required: true,
|
|
1833
|
+
danger_level: "high",
|
|
1834
|
+
field_docs: {},
|
|
1835
|
+
optional_fields: [],
|
|
1836
|
+
performance_impact: {
|
|
1837
|
+
latency: "high",
|
|
1838
|
+
resource_usage: "moderate",
|
|
1839
|
+
},
|
|
1840
|
+
purpose: "Delete secret-policy",
|
|
1841
|
+
required_fields: ["path.name", "path.namespace"],
|
|
1842
|
+
side_effects: {
|
|
1843
|
+
deletes: ["secret-policy", "contained_resources"],
|
|
1844
|
+
},
|
|
1845
|
+
},
|
|
1846
|
+
curlExample: null,
|
|
1847
|
+
},
|
|
1848
|
+
{
|
|
1849
|
+
toolName: "f5xc-api-blindfold-secret-policy-get",
|
|
1850
|
+
method: "GET",
|
|
1851
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policys/{name}",
|
|
1852
|
+
operation: "get",
|
|
1853
|
+
domain: "blindfold",
|
|
1854
|
+
resource: "secret-policy",
|
|
1855
|
+
summary: "GET Secret Policy.",
|
|
1856
|
+
description: "GET secret_policy reads a given object from storage backend for metadata.namespace.",
|
|
1857
|
+
pathParameters: [
|
|
1858
|
+
{
|
|
1859
|
+
description: "Name\nThe name of the configuration object to be fetched.",
|
|
1860
|
+
in: "path",
|
|
1861
|
+
name: "name",
|
|
1862
|
+
required: true,
|
|
1863
|
+
schema: {
|
|
1864
|
+
type: "string",
|
|
1865
|
+
},
|
|
1866
|
+
"x-displayname": "Name",
|
|
1867
|
+
"x-ves-example": "Name",
|
|
1868
|
+
},
|
|
1869
|
+
{
|
|
1870
|
+
description: "Namespace\nThe namespace in which the configuration object is present.",
|
|
1871
|
+
in: "path",
|
|
1872
|
+
name: "namespace",
|
|
1873
|
+
required: true,
|
|
1874
|
+
schema: {
|
|
1875
|
+
type: "string",
|
|
1876
|
+
},
|
|
1877
|
+
"x-displayname": "Namespace",
|
|
1878
|
+
"x-ves-example": "Ns1",
|
|
1879
|
+
},
|
|
1880
|
+
],
|
|
1881
|
+
queryParameters: [
|
|
1882
|
+
{
|
|
1883
|
+
description: "The format in which the configuration object is to be fetched. This could be for example\n - in GetSpec form for the contents of object\n - in CreateRequest form to create a new similar object\n - to ReplaceRequest form to replace changeable values\n\nDefault format of returned resource\nResponse should be in CreateRequest format\nResponse should be in ReplaceRequest format\nResponse should be in StatusObject(s) format\nResponse should be in format of GetSpecType\nResponse should have other objects referring to this object\nResponse should have deleted and disabled objects referrred by this object.",
|
|
1884
|
+
in: "query",
|
|
1885
|
+
name: "response_format",
|
|
1886
|
+
required: false,
|
|
1887
|
+
schema: {
|
|
1888
|
+
default: "GET_RSP_FORMAT_DEFAULT",
|
|
1889
|
+
enum: [
|
|
1890
|
+
"GET_RSP_FORMAT_DEFAULT",
|
|
1891
|
+
"GET_RSP_FORMAT_FOR_CREATE",
|
|
1892
|
+
"GET_RSP_FORMAT_FOR_REPLACE",
|
|
1893
|
+
"GET_RSP_FORMAT_STATUS",
|
|
1894
|
+
"GET_RSP_FORMAT_READ",
|
|
1895
|
+
"GET_RSP_FORMAT_REFERRING_OBJECTS",
|
|
1896
|
+
"GET_RSP_FORMAT_BROKEN_REFERENCES",
|
|
1897
|
+
],
|
|
1898
|
+
type: "string",
|
|
1899
|
+
},
|
|
1900
|
+
"x-displayname": "Broken Referred Objects.",
|
|
1901
|
+
},
|
|
1902
|
+
],
|
|
1903
|
+
requestBodySchema: null,
|
|
1904
|
+
responseSchema: {
|
|
1905
|
+
$ref: "#/components/schemas/secret_policyGetResponse",
|
|
1906
|
+
},
|
|
1907
|
+
requiredParams: ["name", "namespace"],
|
|
1908
|
+
operationId: "ves.io.schema.secret_policy.API.Get",
|
|
1909
|
+
tags: ["Security"],
|
|
1910
|
+
sourceFile: "domains/blindfold.json",
|
|
1911
|
+
displayName: null,
|
|
1912
|
+
dangerLevel: "low",
|
|
1913
|
+
sideEffects: null,
|
|
1914
|
+
requiredFields: ["path.name", "path.namespace"],
|
|
1915
|
+
confirmationRequired: false,
|
|
1916
|
+
parameterExamples: {
|
|
1917
|
+
name: "Name",
|
|
1918
|
+
namespace: "Ns1",
|
|
1919
|
+
},
|
|
1920
|
+
validationRules: {},
|
|
1921
|
+
operationMetadata: {
|
|
1922
|
+
common_errors: [
|
|
1923
|
+
{
|
|
1924
|
+
code: 401,
|
|
1925
|
+
message: "Authentication required",
|
|
1926
|
+
solution: "Provide valid API credentials",
|
|
1927
|
+
},
|
|
1928
|
+
{
|
|
1929
|
+
code: 403,
|
|
1930
|
+
message: "Permission denied",
|
|
1931
|
+
solution: "Check access permissions for this operation",
|
|
1932
|
+
},
|
|
1933
|
+
{
|
|
1934
|
+
code: 404,
|
|
1935
|
+
message: "Resource not found",
|
|
1936
|
+
solution: "Verify resource name, namespace, and path",
|
|
1937
|
+
},
|
|
1938
|
+
{
|
|
1939
|
+
code: 409,
|
|
1940
|
+
message: "Resource already exists",
|
|
1941
|
+
solution: "Use different name or update existing resource",
|
|
1942
|
+
},
|
|
1943
|
+
{
|
|
1944
|
+
code: 429,
|
|
1945
|
+
message: "Rate limit exceeded",
|
|
1946
|
+
solution: "Wait before retrying the operation",
|
|
1947
|
+
},
|
|
1948
|
+
{
|
|
1949
|
+
code: 500,
|
|
1950
|
+
message: "Server error",
|
|
1951
|
+
solution: "Retry operation or contact support",
|
|
1952
|
+
},
|
|
1953
|
+
],
|
|
1954
|
+
conditions: {
|
|
1955
|
+
postconditions: [],
|
|
1956
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
1957
|
+
},
|
|
1958
|
+
confirmation_required: false,
|
|
1959
|
+
danger_level: "low",
|
|
1960
|
+
field_docs: {},
|
|
1961
|
+
optional_fields: [],
|
|
1962
|
+
performance_impact: {
|
|
1963
|
+
latency: "low",
|
|
1964
|
+
resource_usage: "low",
|
|
1965
|
+
},
|
|
1966
|
+
purpose: "Retrieve specific secret-policy",
|
|
1967
|
+
required_fields: ["path.name", "path.namespace"],
|
|
1968
|
+
side_effects: {},
|
|
1969
|
+
},
|
|
1970
|
+
curlExample: null,
|
|
1971
|
+
},
|
|
1972
|
+
{
|
|
1973
|
+
toolName: "f5xc-api-blindfold-secret-policy-list",
|
|
1974
|
+
method: "GET",
|
|
1975
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policys",
|
|
1976
|
+
operation: "list",
|
|
1977
|
+
domain: "blindfold",
|
|
1978
|
+
resource: "secret-policy",
|
|
1979
|
+
summary: "List Secret Policy.",
|
|
1980
|
+
description: "List the set of secret_policy in a namespace.",
|
|
1981
|
+
pathParameters: [
|
|
1982
|
+
{
|
|
1983
|
+
description: "Namespace\nNamespace to scope the listing of secret_policy.",
|
|
1984
|
+
in: "path",
|
|
1985
|
+
name: "namespace",
|
|
1986
|
+
required: true,
|
|
1987
|
+
schema: {
|
|
1988
|
+
type: "string",
|
|
1989
|
+
},
|
|
1990
|
+
"x-displayname": "Namespace",
|
|
1991
|
+
"x-ves-example": "Ns1",
|
|
1992
|
+
},
|
|
1993
|
+
],
|
|
1994
|
+
queryParameters: [
|
|
1995
|
+
{
|
|
1996
|
+
description: "A LabelSelectorType expression that every item in list response will satisfy.",
|
|
1997
|
+
in: "query",
|
|
1998
|
+
name: "label_filter",
|
|
1999
|
+
required: false,
|
|
2000
|
+
schema: {
|
|
2001
|
+
type: "string",
|
|
2002
|
+
},
|
|
2003
|
+
"x-displayname": "Label Filter.",
|
|
2004
|
+
"x-ves-example": "Env in (staging, testing), tier in (web, db)",
|
|
2005
|
+
},
|
|
2006
|
+
{
|
|
2007
|
+
description: 'X-example: ""\nExtra fields to return along with summary fields.',
|
|
2008
|
+
in: "query",
|
|
2009
|
+
name: "report_fields",
|
|
2010
|
+
required: false,
|
|
2011
|
+
schema: {
|
|
2012
|
+
items: {
|
|
2013
|
+
type: "string",
|
|
2014
|
+
},
|
|
2015
|
+
type: "array",
|
|
2016
|
+
},
|
|
2017
|
+
"x-displayname": "Report Fields.",
|
|
2018
|
+
},
|
|
2019
|
+
{
|
|
2020
|
+
description: 'X-example: ""\nExtra status fields to return along with summary fields.',
|
|
2021
|
+
in: "query",
|
|
2022
|
+
name: "report_status_fields",
|
|
2023
|
+
required: false,
|
|
2024
|
+
schema: {
|
|
2025
|
+
items: {
|
|
2026
|
+
type: "string",
|
|
2027
|
+
},
|
|
2028
|
+
type: "array",
|
|
2029
|
+
},
|
|
2030
|
+
"x-displayname": "Report Status Fields.",
|
|
2031
|
+
},
|
|
2032
|
+
],
|
|
2033
|
+
requestBodySchema: null,
|
|
2034
|
+
responseSchema: {
|
|
2035
|
+
$ref: "#/components/schemas/secret_policyListResponse",
|
|
2036
|
+
},
|
|
2037
|
+
requiredParams: ["namespace"],
|
|
2038
|
+
operationId: "ves.io.schema.secret_policy.API.List",
|
|
2039
|
+
tags: ["Security"],
|
|
2040
|
+
sourceFile: "domains/blindfold.json",
|
|
2041
|
+
displayName: null,
|
|
2042
|
+
dangerLevel: "low",
|
|
2043
|
+
sideEffects: null,
|
|
2044
|
+
requiredFields: ["path.namespace"],
|
|
2045
|
+
confirmationRequired: false,
|
|
2046
|
+
parameterExamples: {
|
|
2047
|
+
label_filter: "Env in (staging, testing), tier in (web, db)",
|
|
2048
|
+
namespace: "Ns1",
|
|
2049
|
+
},
|
|
2050
|
+
validationRules: {},
|
|
2051
|
+
operationMetadata: {
|
|
2052
|
+
common_errors: [
|
|
2053
|
+
{
|
|
2054
|
+
code: 401,
|
|
2055
|
+
message: "Authentication required",
|
|
2056
|
+
solution: "Provide valid API credentials",
|
|
2057
|
+
},
|
|
2058
|
+
{
|
|
2059
|
+
code: 403,
|
|
2060
|
+
message: "Permission denied",
|
|
2061
|
+
solution: "Check access permissions for this operation",
|
|
2062
|
+
},
|
|
2063
|
+
{
|
|
2064
|
+
code: 404,
|
|
2065
|
+
message: "Resource not found",
|
|
2066
|
+
solution: "Verify resource name, namespace, and path",
|
|
2067
|
+
},
|
|
2068
|
+
{
|
|
2069
|
+
code: 409,
|
|
2070
|
+
message: "Resource already exists",
|
|
2071
|
+
solution: "Use different name or update existing resource",
|
|
2072
|
+
},
|
|
2073
|
+
{
|
|
2074
|
+
code: 429,
|
|
2075
|
+
message: "Rate limit exceeded",
|
|
2076
|
+
solution: "Wait before retrying the operation",
|
|
2077
|
+
},
|
|
2078
|
+
{
|
|
2079
|
+
code: 500,
|
|
2080
|
+
message: "Server error",
|
|
2081
|
+
solution: "Retry operation or contact support",
|
|
2082
|
+
},
|
|
2083
|
+
],
|
|
2084
|
+
conditions: {
|
|
2085
|
+
postconditions: [],
|
|
2086
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
2087
|
+
},
|
|
2088
|
+
confirmation_required: false,
|
|
2089
|
+
danger_level: "low",
|
|
2090
|
+
field_docs: {},
|
|
2091
|
+
optional_fields: [],
|
|
2092
|
+
performance_impact: {
|
|
2093
|
+
latency: "moderate",
|
|
2094
|
+
resource_usage: "moderate",
|
|
2095
|
+
},
|
|
2096
|
+
purpose: "List all secret-policys",
|
|
2097
|
+
required_fields: ["path.namespace"],
|
|
2098
|
+
side_effects: {},
|
|
2099
|
+
},
|
|
2100
|
+
curlExample: null,
|
|
2101
|
+
},
|
|
2102
|
+
{
|
|
2103
|
+
toolName: "f5xc-api-blindfold-secret-policy-rule-create",
|
|
2104
|
+
method: "POST",
|
|
2105
|
+
path: "/api/secret_management/namespaces/{metadata.namespace}/secret_policy_rules",
|
|
2106
|
+
operation: "create",
|
|
2107
|
+
domain: "blindfold",
|
|
2108
|
+
resource: "secret-policy-rule",
|
|
2109
|
+
summary: "Create Secret Policy Rule.",
|
|
2110
|
+
description: "Create secret_policy_rule creates a new object in storage backend for metadata.namespace.",
|
|
2111
|
+
pathParameters: [
|
|
2112
|
+
{
|
|
2113
|
+
description: 'Namespace\nThis defines the workspace within which each the configuration object is to be created.\nMust be a DNS_LABEL format. For a namespace object itself, namespace value will be ""',
|
|
2114
|
+
in: "path",
|
|
2115
|
+
name: "metadata.namespace",
|
|
2116
|
+
required: true,
|
|
2117
|
+
schema: {
|
|
2118
|
+
type: "string",
|
|
2119
|
+
},
|
|
2120
|
+
"x-displayname": "Namespace",
|
|
2121
|
+
"x-ves-example": "Staging",
|
|
2122
|
+
},
|
|
2123
|
+
],
|
|
2124
|
+
queryParameters: [],
|
|
2125
|
+
requestBodySchema: {
|
|
2126
|
+
$ref: "#/components/schemas/secret_policy_ruleCreateRequest",
|
|
2127
|
+
},
|
|
2128
|
+
responseSchema: {
|
|
2129
|
+
$ref: "#/components/schemas/secret_policy_ruleCreateResponse",
|
|
2130
|
+
},
|
|
2131
|
+
requiredParams: ["body", "metadata.namespace"],
|
|
2132
|
+
operationId: "ves.io.schema.secret_policy_rule.API.Create",
|
|
2133
|
+
tags: ["Security"],
|
|
2134
|
+
sourceFile: "domains/blindfold.json",
|
|
2135
|
+
displayName: null,
|
|
2136
|
+
dangerLevel: "medium",
|
|
2137
|
+
sideEffects: {
|
|
2138
|
+
creates: ["secret-policy-rule"],
|
|
2139
|
+
},
|
|
2140
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
2141
|
+
confirmationRequired: false,
|
|
2142
|
+
parameterExamples: {
|
|
2143
|
+
"metadata.namespace": "Staging",
|
|
2144
|
+
},
|
|
2145
|
+
validationRules: {},
|
|
2146
|
+
operationMetadata: {
|
|
2147
|
+
common_errors: [
|
|
2148
|
+
{
|
|
2149
|
+
code: 401,
|
|
2150
|
+
message: "Authentication required",
|
|
2151
|
+
solution: "Provide valid API credentials",
|
|
2152
|
+
},
|
|
2153
|
+
{
|
|
2154
|
+
code: 403,
|
|
2155
|
+
message: "Permission denied",
|
|
2156
|
+
solution: "Check access permissions for this operation",
|
|
2157
|
+
},
|
|
2158
|
+
{
|
|
2159
|
+
code: 404,
|
|
2160
|
+
message: "Resource not found",
|
|
2161
|
+
solution: "Verify resource name, namespace, and path",
|
|
2162
|
+
},
|
|
2163
|
+
{
|
|
2164
|
+
code: 409,
|
|
2165
|
+
message: "Resource already exists",
|
|
2166
|
+
solution: "Use different name or update existing resource",
|
|
2167
|
+
},
|
|
2168
|
+
{
|
|
2169
|
+
code: 429,
|
|
2170
|
+
message: "Rate limit exceeded",
|
|
2171
|
+
solution: "Wait before retrying the operation",
|
|
2172
|
+
},
|
|
2173
|
+
{
|
|
2174
|
+
code: 500,
|
|
2175
|
+
message: "Server error",
|
|
2176
|
+
solution: "Retry operation or contact support",
|
|
2177
|
+
},
|
|
2178
|
+
],
|
|
2179
|
+
conditions: {
|
|
2180
|
+
postconditions: [
|
|
2181
|
+
"Secret-policy-rule resource created",
|
|
2182
|
+
"Resource assigned unique identifier",
|
|
2183
|
+
],
|
|
2184
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
2185
|
+
},
|
|
2186
|
+
confirmation_required: false,
|
|
2187
|
+
danger_level: "medium",
|
|
2188
|
+
field_docs: {},
|
|
2189
|
+
optional_fields: [],
|
|
2190
|
+
performance_impact: {
|
|
2191
|
+
latency: "low",
|
|
2192
|
+
resource_usage: "low",
|
|
2193
|
+
},
|
|
2194
|
+
purpose: "Create new secret-policy-rule",
|
|
2195
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
2196
|
+
side_effects: {
|
|
2197
|
+
creates: ["secret-policy-rule"],
|
|
2198
|
+
},
|
|
2199
|
+
},
|
|
2200
|
+
curlExample: null,
|
|
2201
|
+
},
|
|
2202
|
+
{
|
|
2203
|
+
toolName: "f5xc-api-blindfold-secret-policy-rule-delete",
|
|
2204
|
+
method: "DELETE",
|
|
2205
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policy_rules/{name}",
|
|
2206
|
+
operation: "delete",
|
|
2207
|
+
domain: "blindfold",
|
|
2208
|
+
resource: "secret-policy-rule",
|
|
2209
|
+
summary: "DELETE Secret Policy Rule.",
|
|
2210
|
+
description: "DELETE the specified secret_policy_rule.",
|
|
2211
|
+
pathParameters: [
|
|
2212
|
+
{
|
|
2213
|
+
description: "Name\nName of the configuration object.",
|
|
2214
|
+
in: "path",
|
|
2215
|
+
name: "name",
|
|
2216
|
+
required: true,
|
|
2217
|
+
schema: {
|
|
2218
|
+
type: "string",
|
|
2219
|
+
},
|
|
2220
|
+
"x-displayname": "Name",
|
|
2221
|
+
"x-ves-example": "Name",
|
|
2222
|
+
},
|
|
2223
|
+
{
|
|
2224
|
+
description: "Namespace\nNamespace in which the configuration object is present.",
|
|
2225
|
+
in: "path",
|
|
2226
|
+
name: "namespace",
|
|
2227
|
+
required: true,
|
|
2228
|
+
schema: {
|
|
2229
|
+
type: "string",
|
|
2230
|
+
},
|
|
2231
|
+
"x-displayname": "Namespace",
|
|
2232
|
+
"x-ves-example": "Ns1",
|
|
2233
|
+
},
|
|
2234
|
+
],
|
|
2235
|
+
queryParameters: [],
|
|
2236
|
+
requestBodySchema: {
|
|
2237
|
+
$ref: "#/components/schemas/secret_policy_ruleDeleteRequest",
|
|
2238
|
+
},
|
|
2239
|
+
responseSchema: {},
|
|
2240
|
+
requiredParams: ["body", "name", "namespace"],
|
|
2241
|
+
operationId: "ves.io.schema.secret_policy_rule.API.Delete",
|
|
2242
|
+
tags: ["Security"],
|
|
2243
|
+
sourceFile: "domains/blindfold.json",
|
|
2244
|
+
displayName: null,
|
|
2245
|
+
dangerLevel: "high",
|
|
2246
|
+
sideEffects: {
|
|
2247
|
+
deletes: ["secret-policy-rule", "contained_resources"],
|
|
2248
|
+
},
|
|
2249
|
+
requiredFields: ["path.name", "path.namespace"],
|
|
2250
|
+
confirmationRequired: true,
|
|
2251
|
+
parameterExamples: {
|
|
2252
|
+
name: "Name",
|
|
2253
|
+
namespace: "Ns1",
|
|
2254
|
+
},
|
|
2255
|
+
validationRules: {},
|
|
2256
|
+
operationMetadata: {
|
|
2257
|
+
common_errors: [
|
|
2258
|
+
{
|
|
2259
|
+
code: 401,
|
|
2260
|
+
message: "Authentication required",
|
|
2261
|
+
solution: "Provide valid API credentials",
|
|
2262
|
+
},
|
|
2263
|
+
{
|
|
2264
|
+
code: 403,
|
|
2265
|
+
message: "Permission denied",
|
|
2266
|
+
solution: "Check access permissions for this operation",
|
|
2267
|
+
},
|
|
2268
|
+
{
|
|
2269
|
+
code: 404,
|
|
2270
|
+
message: "Resource not found",
|
|
2271
|
+
solution: "Verify resource name, namespace, and path",
|
|
2272
|
+
},
|
|
2273
|
+
{
|
|
2274
|
+
code: 409,
|
|
2275
|
+
message: "Resource already exists",
|
|
2276
|
+
solution: "Use different name or update existing resource",
|
|
2277
|
+
},
|
|
2278
|
+
{
|
|
2279
|
+
code: 429,
|
|
2280
|
+
message: "Rate limit exceeded",
|
|
2281
|
+
solution: "Wait before retrying the operation",
|
|
2282
|
+
},
|
|
2283
|
+
{
|
|
2284
|
+
code: 500,
|
|
2285
|
+
message: "Server error",
|
|
2286
|
+
solution: "Retry operation or contact support",
|
|
2287
|
+
},
|
|
2288
|
+
],
|
|
2289
|
+
conditions: {
|
|
2290
|
+
postconditions: ["Resource removed from system", "Associated resources may be affected"],
|
|
2291
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
2292
|
+
},
|
|
2293
|
+
confirmation_required: true,
|
|
2294
|
+
danger_level: "high",
|
|
2295
|
+
field_docs: {},
|
|
2296
|
+
optional_fields: [],
|
|
2297
|
+
performance_impact: {
|
|
2298
|
+
latency: "high",
|
|
2299
|
+
resource_usage: "moderate",
|
|
2300
|
+
},
|
|
2301
|
+
purpose: "Delete secret-policy-rule",
|
|
2302
|
+
required_fields: ["path.name", "path.namespace"],
|
|
2303
|
+
side_effects: {
|
|
2304
|
+
deletes: ["secret-policy-rule", "contained_resources"],
|
|
2305
|
+
},
|
|
2306
|
+
},
|
|
2307
|
+
curlExample: null,
|
|
2308
|
+
},
|
|
2309
|
+
{
|
|
2310
|
+
toolName: "f5xc-api-blindfold-secret-policy-rule-get",
|
|
2311
|
+
method: "GET",
|
|
2312
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policy_rules/{name}",
|
|
2313
|
+
operation: "get",
|
|
2314
|
+
domain: "blindfold",
|
|
2315
|
+
resource: "secret-policy-rule",
|
|
2316
|
+
summary: "GET Secret Policy Rule.",
|
|
2317
|
+
description: "GET secret_policy_rule reads a given object from storage backend for metadata.namespace.",
|
|
2318
|
+
pathParameters: [
|
|
2319
|
+
{
|
|
2320
|
+
description: "Name\nThe name of the configuration object to be fetched.",
|
|
2321
|
+
in: "path",
|
|
2322
|
+
name: "name",
|
|
2323
|
+
required: true,
|
|
2324
|
+
schema: {
|
|
2325
|
+
type: "string",
|
|
2326
|
+
},
|
|
2327
|
+
"x-displayname": "Name",
|
|
2328
|
+
"x-ves-example": "Name",
|
|
2329
|
+
},
|
|
2330
|
+
{
|
|
2331
|
+
description: "Namespace\nThe namespace in which the configuration object is present.",
|
|
2332
|
+
in: "path",
|
|
2333
|
+
name: "namespace",
|
|
2334
|
+
required: true,
|
|
2335
|
+
schema: {
|
|
2336
|
+
type: "string",
|
|
2337
|
+
},
|
|
2338
|
+
"x-displayname": "Namespace",
|
|
2339
|
+
"x-ves-example": "Ns1",
|
|
2340
|
+
},
|
|
2341
|
+
],
|
|
2342
|
+
queryParameters: [
|
|
2343
|
+
{
|
|
2344
|
+
description: "The format in which the configuration object is to be fetched. This could be for example\n - in GetSpec form for the contents of object\n - in CreateRequest form to create a new similar object\n - to ReplaceRequest form to replace changeable values\n\nDefault format of returned resource\nResponse should be in CreateRequest format\nResponse should be in ReplaceRequest format\nResponse should be in StatusObject(s) format\nResponse should be in format of GetSpecType\nResponse should have other objects referring to this object\nResponse should have deleted and disabled objects referrred by this object.",
|
|
2345
|
+
in: "query",
|
|
2346
|
+
name: "response_format",
|
|
2347
|
+
required: false,
|
|
2348
|
+
schema: {
|
|
2349
|
+
default: "GET_RSP_FORMAT_DEFAULT",
|
|
2350
|
+
enum: [
|
|
2351
|
+
"GET_RSP_FORMAT_DEFAULT",
|
|
2352
|
+
"GET_RSP_FORMAT_FOR_CREATE",
|
|
2353
|
+
"GET_RSP_FORMAT_FOR_REPLACE",
|
|
2354
|
+
"GET_RSP_FORMAT_STATUS",
|
|
2355
|
+
"GET_RSP_FORMAT_READ",
|
|
2356
|
+
"GET_RSP_FORMAT_REFERRING_OBJECTS",
|
|
2357
|
+
"GET_RSP_FORMAT_BROKEN_REFERENCES",
|
|
2358
|
+
],
|
|
2359
|
+
type: "string",
|
|
2360
|
+
},
|
|
2361
|
+
"x-displayname": "Broken Referred Objects.",
|
|
2362
|
+
},
|
|
2363
|
+
],
|
|
2364
|
+
requestBodySchema: null,
|
|
2365
|
+
responseSchema: {
|
|
2366
|
+
$ref: "#/components/schemas/secret_policy_ruleGetResponse",
|
|
2367
|
+
},
|
|
2368
|
+
requiredParams: ["name", "namespace"],
|
|
2369
|
+
operationId: "ves.io.schema.secret_policy_rule.API.Get",
|
|
2370
|
+
tags: ["Security"],
|
|
2371
|
+
sourceFile: "domains/blindfold.json",
|
|
2372
|
+
displayName: null,
|
|
2373
|
+
dangerLevel: "low",
|
|
2374
|
+
sideEffects: null,
|
|
2375
|
+
requiredFields: ["path.name", "path.namespace"],
|
|
2376
|
+
confirmationRequired: false,
|
|
2377
|
+
parameterExamples: {
|
|
2378
|
+
name: "Name",
|
|
2379
|
+
namespace: "Ns1",
|
|
2380
|
+
},
|
|
2381
|
+
validationRules: {},
|
|
2382
|
+
operationMetadata: {
|
|
2383
|
+
common_errors: [
|
|
2384
|
+
{
|
|
2385
|
+
code: 401,
|
|
2386
|
+
message: "Authentication required",
|
|
2387
|
+
solution: "Provide valid API credentials",
|
|
2388
|
+
},
|
|
2389
|
+
{
|
|
2390
|
+
code: 403,
|
|
2391
|
+
message: "Permission denied",
|
|
2392
|
+
solution: "Check access permissions for this operation",
|
|
2393
|
+
},
|
|
2394
|
+
{
|
|
2395
|
+
code: 404,
|
|
2396
|
+
message: "Resource not found",
|
|
2397
|
+
solution: "Verify resource name, namespace, and path",
|
|
2398
|
+
},
|
|
2399
|
+
{
|
|
2400
|
+
code: 409,
|
|
2401
|
+
message: "Resource already exists",
|
|
2402
|
+
solution: "Use different name or update existing resource",
|
|
2403
|
+
},
|
|
2404
|
+
{
|
|
2405
|
+
code: 429,
|
|
2406
|
+
message: "Rate limit exceeded",
|
|
2407
|
+
solution: "Wait before retrying the operation",
|
|
2408
|
+
},
|
|
2409
|
+
{
|
|
2410
|
+
code: 500,
|
|
2411
|
+
message: "Server error",
|
|
2412
|
+
solution: "Retry operation or contact support",
|
|
2413
|
+
},
|
|
2414
|
+
],
|
|
2415
|
+
conditions: {
|
|
2416
|
+
postconditions: [],
|
|
2417
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
2418
|
+
},
|
|
2419
|
+
confirmation_required: false,
|
|
2420
|
+
danger_level: "low",
|
|
2421
|
+
field_docs: {},
|
|
2422
|
+
optional_fields: [],
|
|
2423
|
+
performance_impact: {
|
|
2424
|
+
latency: "low",
|
|
2425
|
+
resource_usage: "low",
|
|
2426
|
+
},
|
|
2427
|
+
purpose: "Retrieve specific secret-policy-rule",
|
|
2428
|
+
required_fields: ["path.name", "path.namespace"],
|
|
2429
|
+
side_effects: {},
|
|
2430
|
+
},
|
|
2431
|
+
curlExample: null,
|
|
2432
|
+
},
|
|
2433
|
+
{
|
|
2434
|
+
toolName: "f5xc-api-blindfold-secret-policy-rule-list",
|
|
2435
|
+
method: "GET",
|
|
2436
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policy_rules",
|
|
2437
|
+
operation: "list",
|
|
2438
|
+
domain: "blindfold",
|
|
2439
|
+
resource: "secret-policy-rule",
|
|
2440
|
+
summary: "List Secret Policy Rule.",
|
|
2441
|
+
description: "List the set of secret_policy_rule in a namespace.",
|
|
2442
|
+
pathParameters: [
|
|
2443
|
+
{
|
|
2444
|
+
description: "Namespace\nNamespace to scope the listing of secret_policy_rule.",
|
|
2445
|
+
in: "path",
|
|
2446
|
+
name: "namespace",
|
|
2447
|
+
required: true,
|
|
2448
|
+
schema: {
|
|
2449
|
+
type: "string",
|
|
2450
|
+
},
|
|
2451
|
+
"x-displayname": "Namespace",
|
|
2452
|
+
"x-ves-example": "Ns1",
|
|
2453
|
+
},
|
|
2454
|
+
],
|
|
2455
|
+
queryParameters: [
|
|
2456
|
+
{
|
|
2457
|
+
description: "A LabelSelectorType expression that every item in list response will satisfy.",
|
|
2458
|
+
in: "query",
|
|
2459
|
+
name: "label_filter",
|
|
2460
|
+
required: false,
|
|
2461
|
+
schema: {
|
|
2462
|
+
type: "string",
|
|
2463
|
+
},
|
|
2464
|
+
"x-displayname": "Label Filter.",
|
|
2465
|
+
"x-ves-example": "Env in (staging, testing), tier in (web, db)",
|
|
2466
|
+
},
|
|
2467
|
+
{
|
|
2468
|
+
description: 'X-example: ""\nExtra fields to return along with summary fields.',
|
|
2469
|
+
in: "query",
|
|
2470
|
+
name: "report_fields",
|
|
2471
|
+
required: false,
|
|
2472
|
+
schema: {
|
|
2473
|
+
items: {
|
|
2474
|
+
type: "string",
|
|
2475
|
+
},
|
|
2476
|
+
type: "array",
|
|
2477
|
+
},
|
|
2478
|
+
"x-displayname": "Report Fields.",
|
|
2479
|
+
},
|
|
2480
|
+
{
|
|
2481
|
+
description: 'X-example: ""\nExtra status fields to return along with summary fields.',
|
|
2482
|
+
in: "query",
|
|
2483
|
+
name: "report_status_fields",
|
|
2484
|
+
required: false,
|
|
2485
|
+
schema: {
|
|
2486
|
+
items: {
|
|
2487
|
+
type: "string",
|
|
2488
|
+
},
|
|
2489
|
+
type: "array",
|
|
2490
|
+
},
|
|
2491
|
+
"x-displayname": "Report Status Fields.",
|
|
2492
|
+
},
|
|
2493
|
+
],
|
|
2494
|
+
requestBodySchema: null,
|
|
2495
|
+
responseSchema: {
|
|
2496
|
+
$ref: "#/components/schemas/secret_policy_ruleListResponse",
|
|
2497
|
+
},
|
|
2498
|
+
requiredParams: ["namespace"],
|
|
2499
|
+
operationId: "ves.io.schema.secret_policy_rule.API.List",
|
|
2500
|
+
tags: ["Security"],
|
|
2501
|
+
sourceFile: "domains/blindfold.json",
|
|
2502
|
+
displayName: null,
|
|
2503
|
+
dangerLevel: "low",
|
|
2504
|
+
sideEffects: null,
|
|
2505
|
+
requiredFields: ["path.namespace"],
|
|
2506
|
+
confirmationRequired: false,
|
|
2507
|
+
parameterExamples: {
|
|
2508
|
+
label_filter: "Env in (staging, testing), tier in (web, db)",
|
|
2509
|
+
namespace: "Ns1",
|
|
2510
|
+
},
|
|
2511
|
+
validationRules: {},
|
|
2512
|
+
operationMetadata: {
|
|
2513
|
+
common_errors: [
|
|
2514
|
+
{
|
|
2515
|
+
code: 401,
|
|
2516
|
+
message: "Authentication required",
|
|
2517
|
+
solution: "Provide valid API credentials",
|
|
2518
|
+
},
|
|
2519
|
+
{
|
|
2520
|
+
code: 403,
|
|
2521
|
+
message: "Permission denied",
|
|
2522
|
+
solution: "Check access permissions for this operation",
|
|
2523
|
+
},
|
|
2524
|
+
{
|
|
2525
|
+
code: 404,
|
|
2526
|
+
message: "Resource not found",
|
|
2527
|
+
solution: "Verify resource name, namespace, and path",
|
|
2528
|
+
},
|
|
2529
|
+
{
|
|
2530
|
+
code: 409,
|
|
2531
|
+
message: "Resource already exists",
|
|
2532
|
+
solution: "Use different name or update existing resource",
|
|
2533
|
+
},
|
|
2534
|
+
{
|
|
2535
|
+
code: 429,
|
|
2536
|
+
message: "Rate limit exceeded",
|
|
2537
|
+
solution: "Wait before retrying the operation",
|
|
2538
|
+
},
|
|
2539
|
+
{
|
|
2540
|
+
code: 500,
|
|
2541
|
+
message: "Server error",
|
|
2542
|
+
solution: "Retry operation or contact support",
|
|
2543
|
+
},
|
|
2544
|
+
],
|
|
2545
|
+
conditions: {
|
|
2546
|
+
postconditions: [],
|
|
2547
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
2548
|
+
},
|
|
2549
|
+
confirmation_required: false,
|
|
2550
|
+
danger_level: "low",
|
|
2551
|
+
field_docs: {},
|
|
2552
|
+
optional_fields: [],
|
|
2553
|
+
performance_impact: {
|
|
2554
|
+
latency: "moderate",
|
|
2555
|
+
resource_usage: "moderate",
|
|
2556
|
+
},
|
|
2557
|
+
purpose: "List all secret-policy-rules",
|
|
2558
|
+
required_fields: ["path.namespace"],
|
|
2559
|
+
side_effects: {},
|
|
2560
|
+
},
|
|
2561
|
+
curlExample: null,
|
|
2562
|
+
},
|
|
2563
|
+
{
|
|
2564
|
+
toolName: "f5xc-api-blindfold-secret-policy-rule-update",
|
|
2565
|
+
method: "PUT",
|
|
2566
|
+
path: "/api/secret_management/namespaces/{metadata.namespace}/secret_policy_rules/{metadata.name}",
|
|
2567
|
+
operation: "update",
|
|
2568
|
+
domain: "blindfold",
|
|
2569
|
+
resource: "secret-policy-rule",
|
|
2570
|
+
summary: "Replace Secret Policy Rule.",
|
|
2571
|
+
description: "Replace secret_policy_rule creates a new object in storage backend for metadata.namespace.",
|
|
2572
|
+
pathParameters: [
|
|
2573
|
+
{
|
|
2574
|
+
description: "Name\nThe configuration object to be replaced will be looked up by name.",
|
|
2575
|
+
in: "path",
|
|
2576
|
+
name: "metadata.name",
|
|
2577
|
+
required: true,
|
|
2578
|
+
schema: {
|
|
2579
|
+
type: "string",
|
|
2580
|
+
},
|
|
2581
|
+
"x-displayname": "Name",
|
|
2582
|
+
"x-ves-example": "Example-corp-web.",
|
|
2583
|
+
},
|
|
2584
|
+
{
|
|
2585
|
+
description: 'Namespace\nThis defines the workspace within which each the configuration object is to be created.\nMust be a DNS_LABEL format. For a namespace object itself, namespace value will be ""',
|
|
2586
|
+
in: "path",
|
|
2587
|
+
name: "metadata.namespace",
|
|
2588
|
+
required: true,
|
|
2589
|
+
schema: {
|
|
2590
|
+
type: "string",
|
|
2591
|
+
},
|
|
2592
|
+
"x-displayname": "Namespace",
|
|
2593
|
+
"x-ves-example": "Staging",
|
|
2594
|
+
},
|
|
2595
|
+
],
|
|
2596
|
+
queryParameters: [],
|
|
2597
|
+
requestBodySchema: {
|
|
2598
|
+
$ref: "#/components/schemas/secret_policy_ruleReplaceRequest",
|
|
2599
|
+
},
|
|
2600
|
+
responseSchema: {
|
|
2601
|
+
$ref: "#/components/schemas/secret_policy_ruleReplaceResponse",
|
|
2602
|
+
},
|
|
2603
|
+
requiredParams: ["body", "metadata.name", "metadata.namespace"],
|
|
2604
|
+
operationId: "ves.io.schema.secret_policy_rule.API.Replace",
|
|
2605
|
+
tags: ["Security"],
|
|
2606
|
+
sourceFile: "domains/blindfold.json",
|
|
2607
|
+
displayName: null,
|
|
2608
|
+
dangerLevel: "medium",
|
|
2609
|
+
sideEffects: {
|
|
2610
|
+
modifies: ["secret-policy-rule"],
|
|
2611
|
+
},
|
|
2612
|
+
requiredFields: ["path.metadata.name", "path.metadata.namespace"],
|
|
2613
|
+
confirmationRequired: false,
|
|
2614
|
+
parameterExamples: {
|
|
2615
|
+
"metadata.name": "Example-corp-web.",
|
|
2616
|
+
"metadata.namespace": "Staging",
|
|
2617
|
+
},
|
|
2618
|
+
validationRules: {},
|
|
2619
|
+
operationMetadata: {
|
|
2620
|
+
common_errors: [
|
|
2621
|
+
{
|
|
2622
|
+
code: 401,
|
|
2623
|
+
message: "Authentication required",
|
|
2624
|
+
solution: "Provide valid API credentials",
|
|
2625
|
+
},
|
|
2626
|
+
{
|
|
2627
|
+
code: 403,
|
|
2628
|
+
message: "Permission denied",
|
|
2629
|
+
solution: "Check access permissions for this operation",
|
|
2630
|
+
},
|
|
2631
|
+
{
|
|
2632
|
+
code: 404,
|
|
2633
|
+
message: "Resource not found",
|
|
2634
|
+
solution: "Verify resource name, namespace, and path",
|
|
2635
|
+
},
|
|
2636
|
+
{
|
|
2637
|
+
code: 409,
|
|
2638
|
+
message: "Resource already exists",
|
|
2639
|
+
solution: "Use different name or update existing resource",
|
|
2640
|
+
},
|
|
2641
|
+
{
|
|
2642
|
+
code: 429,
|
|
2643
|
+
message: "Rate limit exceeded",
|
|
2644
|
+
solution: "Wait before retrying the operation",
|
|
2645
|
+
},
|
|
2646
|
+
{
|
|
2647
|
+
code: 500,
|
|
2648
|
+
message: "Server error",
|
|
2649
|
+
solution: "Retry operation or contact support",
|
|
2650
|
+
},
|
|
2651
|
+
],
|
|
2652
|
+
conditions: {
|
|
2653
|
+
postconditions: ["Resource updated with new values"],
|
|
2654
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
2655
|
+
},
|
|
2656
|
+
confirmation_required: false,
|
|
2657
|
+
danger_level: "medium",
|
|
2658
|
+
field_docs: {},
|
|
2659
|
+
optional_fields: [],
|
|
2660
|
+
performance_impact: {
|
|
2661
|
+
latency: "low",
|
|
2662
|
+
resource_usage: "low",
|
|
2663
|
+
},
|
|
2664
|
+
purpose: "Replace existing secret-policy-rule",
|
|
2665
|
+
required_fields: ["path.metadata.name", "path.metadata.namespace"],
|
|
2666
|
+
side_effects: {
|
|
2667
|
+
modifies: ["secret-policy-rule"],
|
|
2668
|
+
},
|
|
2669
|
+
},
|
|
2670
|
+
curlExample: null,
|
|
2671
|
+
},
|
|
2672
|
+
{
|
|
2673
|
+
toolName: "f5xc-api-blindfold-secret-policy-update",
|
|
2674
|
+
method: "PUT",
|
|
2675
|
+
path: "/api/secret_management/namespaces/{metadata.namespace}/secret_policys/{metadata.name}",
|
|
2676
|
+
operation: "update",
|
|
2677
|
+
domain: "blindfold",
|
|
2678
|
+
resource: "secret-policy",
|
|
2679
|
+
summary: "Replace Secret Policy.",
|
|
2680
|
+
description: "Replace secret_policy replaces an existing object in the storage backend for metadata.namespace.",
|
|
2681
|
+
pathParameters: [
|
|
2682
|
+
{
|
|
2683
|
+
description: "Name\nThe configuration object to be replaced will be looked up by name.",
|
|
2684
|
+
in: "path",
|
|
2685
|
+
name: "metadata.name",
|
|
2686
|
+
required: true,
|
|
2687
|
+
schema: {
|
|
2688
|
+
type: "string",
|
|
2689
|
+
},
|
|
2690
|
+
"x-displayname": "Name",
|
|
2691
|
+
"x-ves-example": "Example-corp-web.",
|
|
2692
|
+
},
|
|
2693
|
+
{
|
|
2694
|
+
description: 'Namespace\nThis defines the workspace within which each the configuration object is to be created.\nMust be a DNS_LABEL format. For a namespace object itself, namespace value will be ""',
|
|
2695
|
+
in: "path",
|
|
2696
|
+
name: "metadata.namespace",
|
|
2697
|
+
required: true,
|
|
2698
|
+
schema: {
|
|
2699
|
+
type: "string",
|
|
2700
|
+
},
|
|
2701
|
+
"x-displayname": "Namespace",
|
|
2702
|
+
"x-ves-example": "Staging",
|
|
2703
|
+
},
|
|
2704
|
+
],
|
|
2705
|
+
queryParameters: [],
|
|
2706
|
+
requestBodySchema: {
|
|
2707
|
+
$ref: "#/components/schemas/secret_policyReplaceRequest",
|
|
2708
|
+
},
|
|
2709
|
+
responseSchema: {
|
|
2710
|
+
$ref: "#/components/schemas/secret_policyReplaceResponse",
|
|
2711
|
+
},
|
|
2712
|
+
requiredParams: ["body", "metadata.name", "metadata.namespace"],
|
|
2713
|
+
operationId: "ves.io.schema.secret_policy.API.Replace",
|
|
2714
|
+
tags: ["Security"],
|
|
2715
|
+
sourceFile: "domains/blindfold.json",
|
|
2716
|
+
displayName: null,
|
|
2717
|
+
dangerLevel: "medium",
|
|
2718
|
+
sideEffects: {
|
|
2719
|
+
modifies: ["secret-policy"],
|
|
2720
|
+
},
|
|
2721
|
+
requiredFields: ["path.metadata.name", "path.metadata.namespace"],
|
|
2722
|
+
confirmationRequired: false,
|
|
2723
|
+
parameterExamples: {
|
|
2724
|
+
"metadata.name": "Example-corp-web.",
|
|
2725
|
+
"metadata.namespace": "Staging",
|
|
2726
|
+
},
|
|
2727
|
+
validationRules: {},
|
|
2728
|
+
operationMetadata: {
|
|
2729
|
+
common_errors: [
|
|
2730
|
+
{
|
|
2731
|
+
code: 401,
|
|
2732
|
+
message: "Authentication required",
|
|
2733
|
+
solution: "Provide valid API credentials",
|
|
2734
|
+
},
|
|
2735
|
+
{
|
|
2736
|
+
code: 403,
|
|
2737
|
+
message: "Permission denied",
|
|
2738
|
+
solution: "Check access permissions for this operation",
|
|
2739
|
+
},
|
|
2740
|
+
{
|
|
2741
|
+
code: 404,
|
|
2742
|
+
message: "Resource not found",
|
|
2743
|
+
solution: "Verify resource name, namespace, and path",
|
|
2744
|
+
},
|
|
2745
|
+
{
|
|
2746
|
+
code: 409,
|
|
2747
|
+
message: "Resource already exists",
|
|
2748
|
+
solution: "Use different name or update existing resource",
|
|
2749
|
+
},
|
|
2750
|
+
{
|
|
2751
|
+
code: 429,
|
|
2752
|
+
message: "Rate limit exceeded",
|
|
2753
|
+
solution: "Wait before retrying the operation",
|
|
2754
|
+
},
|
|
2755
|
+
{
|
|
2756
|
+
code: 500,
|
|
2757
|
+
message: "Server error",
|
|
2758
|
+
solution: "Retry operation or contact support",
|
|
2759
|
+
},
|
|
2760
|
+
],
|
|
2761
|
+
conditions: {
|
|
2762
|
+
postconditions: ["Resource updated with new values"],
|
|
2763
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
2764
|
+
},
|
|
2765
|
+
confirmation_required: false,
|
|
2766
|
+
danger_level: "medium",
|
|
2767
|
+
field_docs: {},
|
|
2768
|
+
optional_fields: [],
|
|
2769
|
+
performance_impact: {
|
|
2770
|
+
latency: "low",
|
|
2771
|
+
resource_usage: "low",
|
|
2772
|
+
},
|
|
2773
|
+
purpose: "Replace existing secret-policy",
|
|
2774
|
+
required_fields: ["path.metadata.name", "path.metadata.namespace"],
|
|
2775
|
+
side_effects: {
|
|
2776
|
+
modifies: ["secret-policy"],
|
|
2777
|
+
},
|
|
2778
|
+
},
|
|
2779
|
+
curlExample: null,
|
|
2780
|
+
},
|
|
2781
|
+
{
|
|
2782
|
+
toolName: "f5xc-api-blindfold-softdelete-create",
|
|
2783
|
+
method: "POST",
|
|
2784
|
+
path: "/api/secret_management/namespaces/{namespace}/secret_policy/{name}/softdelete",
|
|
2785
|
+
operation: "create",
|
|
2786
|
+
domain: "blindfold",
|
|
2787
|
+
resource: "softdelete",
|
|
2788
|
+
summary: "DELETE secret policy with given policy name.",
|
|
2789
|
+
description: "Deletepolicy CustomAPI.",
|
|
2790
|
+
pathParameters: [
|
|
2791
|
+
{
|
|
2792
|
+
description: "Name\n\nx-required\nName of the secret policy.",
|
|
2793
|
+
in: "path",
|
|
2794
|
+
name: "name",
|
|
2795
|
+
required: true,
|
|
2796
|
+
schema: {
|
|
2797
|
+
type: "string",
|
|
2798
|
+
},
|
|
2799
|
+
"x-displayname": "Name",
|
|
2800
|
+
"x-ves-example": "Site-secret-policy.",
|
|
2801
|
+
},
|
|
2802
|
+
{
|
|
2803
|
+
description: "Namespace\n\nx-required\nNamespace of the secret policy.",
|
|
2804
|
+
in: "path",
|
|
2805
|
+
name: "namespace",
|
|
2806
|
+
required: true,
|
|
2807
|
+
schema: {
|
|
2808
|
+
type: "string",
|
|
2809
|
+
},
|
|
2810
|
+
"x-displayname": "Namespace",
|
|
2811
|
+
"x-ves-example": "System",
|
|
2812
|
+
},
|
|
2813
|
+
],
|
|
2814
|
+
queryParameters: [],
|
|
2815
|
+
requestBodySchema: {
|
|
2816
|
+
$ref: "#/components/schemas/secret_policySoftDeleteRequest",
|
|
2817
|
+
},
|
|
2818
|
+
responseSchema: {
|
|
2819
|
+
$ref: "#/components/schemas/secret_policySoftDeleteResponse",
|
|
2820
|
+
},
|
|
2821
|
+
requiredParams: ["body", "name", "namespace"],
|
|
2822
|
+
operationId: "ves.io.schema.secret_policy.CustomAPI.DeletePolicy",
|
|
2823
|
+
tags: ["Security"],
|
|
2824
|
+
sourceFile: "domains/blindfold.json",
|
|
2825
|
+
displayName: null,
|
|
2826
|
+
dangerLevel: "medium",
|
|
2827
|
+
sideEffects: {
|
|
2828
|
+
creates: ["softdelete"],
|
|
2829
|
+
},
|
|
2830
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.name", "path.namespace"],
|
|
2831
|
+
confirmationRequired: false,
|
|
2832
|
+
parameterExamples: {
|
|
2833
|
+
name: "Site-secret-policy.",
|
|
2834
|
+
namespace: "System",
|
|
2835
|
+
},
|
|
2836
|
+
validationRules: {},
|
|
2837
|
+
operationMetadata: {
|
|
2838
|
+
common_errors: [
|
|
2839
|
+
{
|
|
2840
|
+
code: 401,
|
|
2841
|
+
message: "Authentication required",
|
|
2842
|
+
solution: "Provide valid API credentials",
|
|
2843
|
+
},
|
|
2844
|
+
{
|
|
2845
|
+
code: 403,
|
|
2846
|
+
message: "Permission denied",
|
|
2847
|
+
solution: "Check access permissions for this operation",
|
|
2848
|
+
},
|
|
2849
|
+
{
|
|
2850
|
+
code: 404,
|
|
2851
|
+
message: "Resource not found",
|
|
2852
|
+
solution: "Verify resource name, namespace, and path",
|
|
2853
|
+
},
|
|
2854
|
+
{
|
|
2855
|
+
code: 409,
|
|
2856
|
+
message: "Resource already exists",
|
|
2857
|
+
solution: "Use different name or update existing resource",
|
|
2858
|
+
},
|
|
2859
|
+
{
|
|
2860
|
+
code: 429,
|
|
2861
|
+
message: "Rate limit exceeded",
|
|
2862
|
+
solution: "Wait before retrying the operation",
|
|
2863
|
+
},
|
|
2864
|
+
{
|
|
2865
|
+
code: 500,
|
|
2866
|
+
message: "Server error",
|
|
2867
|
+
solution: "Retry operation or contact support",
|
|
2868
|
+
},
|
|
2869
|
+
],
|
|
2870
|
+
conditions: {
|
|
2871
|
+
postconditions: ["Softdelete resource created", "Resource assigned unique identifier"],
|
|
2872
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
2873
|
+
},
|
|
2874
|
+
confirmation_required: false,
|
|
2875
|
+
danger_level: "medium",
|
|
2876
|
+
field_docs: {},
|
|
2877
|
+
optional_fields: [],
|
|
2878
|
+
performance_impact: {
|
|
2879
|
+
latency: "low",
|
|
2880
|
+
resource_usage: "low",
|
|
2881
|
+
},
|
|
2882
|
+
purpose: "Create new softdelete",
|
|
2883
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.name", "path.namespace"],
|
|
2884
|
+
side_effects: {
|
|
2885
|
+
creates: ["softdelete"],
|
|
2886
|
+
},
|
|
2887
|
+
},
|
|
2888
|
+
curlExample: null,
|
|
2889
|
+
},
|
|
2890
|
+
{
|
|
2891
|
+
toolName: "f5xc-api-blindfold-voltshare-admin-policy-create",
|
|
2892
|
+
method: "POST",
|
|
2893
|
+
path: "/api/secret_management/namespaces/{metadata.namespace}/voltshare_admin_policys",
|
|
2894
|
+
operation: "create",
|
|
2895
|
+
domain: "blindfold",
|
|
2896
|
+
resource: "voltshare-admin-policy",
|
|
2897
|
+
summary: "Create VoltShare Admin Policy.",
|
|
2898
|
+
description: "Create voltshare_admin_policy creates a new object in the storage backend for metadata.namespace.",
|
|
2899
|
+
pathParameters: [
|
|
2900
|
+
{
|
|
2901
|
+
description: 'Namespace\nThis defines the workspace within which each the configuration object is to be created.\nMust be a DNS_LABEL format. For a namespace object itself, namespace value will be ""',
|
|
2902
|
+
in: "path",
|
|
2903
|
+
name: "metadata.namespace",
|
|
2904
|
+
required: true,
|
|
2905
|
+
schema: {
|
|
2906
|
+
type: "string",
|
|
2907
|
+
},
|
|
2908
|
+
"x-displayname": "Namespace",
|
|
2909
|
+
"x-ves-example": "Staging",
|
|
2910
|
+
},
|
|
2911
|
+
],
|
|
2912
|
+
queryParameters: [],
|
|
2913
|
+
requestBodySchema: {
|
|
2914
|
+
$ref: "#/components/schemas/voltshare_admin_policyCreateRequest",
|
|
2915
|
+
},
|
|
2916
|
+
responseSchema: {
|
|
2917
|
+
$ref: "#/components/schemas/voltshare_admin_policyCreateResponse",
|
|
2918
|
+
},
|
|
2919
|
+
requiredParams: ["body", "metadata.namespace"],
|
|
2920
|
+
operationId: "ves.io.schema.voltshare_admin_policy.API.Create",
|
|
2921
|
+
tags: ["Security"],
|
|
2922
|
+
sourceFile: "domains/blindfold.json",
|
|
2923
|
+
displayName: null,
|
|
2924
|
+
dangerLevel: "medium",
|
|
2925
|
+
sideEffects: {
|
|
2926
|
+
creates: ["voltshare-admin-policy"],
|
|
2927
|
+
},
|
|
2928
|
+
requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
2929
|
+
confirmationRequired: false,
|
|
2930
|
+
parameterExamples: {
|
|
2931
|
+
"metadata.namespace": "Staging",
|
|
2932
|
+
},
|
|
2933
|
+
validationRules: {},
|
|
2934
|
+
operationMetadata: {
|
|
2935
|
+
common_errors: [
|
|
2936
|
+
{
|
|
2937
|
+
code: 401,
|
|
2938
|
+
message: "Authentication required",
|
|
2939
|
+
solution: "Provide valid API credentials",
|
|
2940
|
+
},
|
|
2941
|
+
{
|
|
2942
|
+
code: 403,
|
|
2943
|
+
message: "Permission denied",
|
|
2944
|
+
solution: "Check access permissions for this operation",
|
|
2945
|
+
},
|
|
2946
|
+
{
|
|
2947
|
+
code: 404,
|
|
2948
|
+
message: "Resource not found",
|
|
2949
|
+
solution: "Verify resource name, namespace, and path",
|
|
2950
|
+
},
|
|
2951
|
+
{
|
|
2952
|
+
code: 409,
|
|
2953
|
+
message: "Resource already exists",
|
|
2954
|
+
solution: "Use different name or update existing resource",
|
|
2955
|
+
},
|
|
2956
|
+
{
|
|
2957
|
+
code: 429,
|
|
2958
|
+
message: "Rate limit exceeded",
|
|
2959
|
+
solution: "Wait before retrying the operation",
|
|
2960
|
+
},
|
|
2961
|
+
{
|
|
2962
|
+
code: 500,
|
|
2963
|
+
message: "Server error",
|
|
2964
|
+
solution: "Retry operation or contact support",
|
|
2965
|
+
},
|
|
2966
|
+
],
|
|
2967
|
+
conditions: {
|
|
2968
|
+
postconditions: [
|
|
2969
|
+
"Voltshare-admin-policy resource created",
|
|
2970
|
+
"Resource assigned unique identifier",
|
|
2971
|
+
],
|
|
2972
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
2973
|
+
},
|
|
2974
|
+
confirmation_required: false,
|
|
2975
|
+
danger_level: "medium",
|
|
2976
|
+
field_docs: {},
|
|
2977
|
+
optional_fields: [],
|
|
2978
|
+
performance_impact: {
|
|
2979
|
+
latency: "low",
|
|
2980
|
+
resource_usage: "low",
|
|
2981
|
+
},
|
|
2982
|
+
purpose: "Create new voltshare-admin-policy",
|
|
2983
|
+
required_fields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
2984
|
+
side_effects: {
|
|
2985
|
+
creates: ["voltshare-admin-policy"],
|
|
2986
|
+
},
|
|
2987
|
+
},
|
|
2988
|
+
curlExample: null,
|
|
2989
|
+
},
|
|
2990
|
+
{
|
|
2991
|
+
toolName: "f5xc-api-blindfold-voltshare-admin-policy-delete",
|
|
2992
|
+
method: "DELETE",
|
|
2993
|
+
path: "/api/secret_management/namespaces/{namespace}/voltshare_admin_policys/{name}",
|
|
2994
|
+
operation: "delete",
|
|
2995
|
+
domain: "blindfold",
|
|
2996
|
+
resource: "voltshare-admin-policy",
|
|
2997
|
+
summary: "DELETE VoltShare Admin Policy.",
|
|
2998
|
+
description: "DELETE the specified voltshare_admin_policy.",
|
|
2999
|
+
pathParameters: [
|
|
3000
|
+
{
|
|
3001
|
+
description: "Name\nName of the configuration object.",
|
|
3002
|
+
in: "path",
|
|
3003
|
+
name: "name",
|
|
3004
|
+
required: true,
|
|
3005
|
+
schema: {
|
|
3006
|
+
type: "string",
|
|
3007
|
+
},
|
|
3008
|
+
"x-displayname": "Name",
|
|
3009
|
+
"x-ves-example": "Name",
|
|
3010
|
+
},
|
|
3011
|
+
{
|
|
3012
|
+
description: "Namespace\nNamespace in which the configuration object is present.",
|
|
3013
|
+
in: "path",
|
|
3014
|
+
name: "namespace",
|
|
3015
|
+
required: true,
|
|
3016
|
+
schema: {
|
|
3017
|
+
type: "string",
|
|
3018
|
+
},
|
|
3019
|
+
"x-displayname": "Namespace",
|
|
3020
|
+
"x-ves-example": "Ns1",
|
|
3021
|
+
},
|
|
3022
|
+
],
|
|
3023
|
+
queryParameters: [],
|
|
3024
|
+
requestBodySchema: {
|
|
3025
|
+
$ref: "#/components/schemas/voltshare_admin_policyDeleteRequest",
|
|
3026
|
+
},
|
|
3027
|
+
responseSchema: {},
|
|
3028
|
+
requiredParams: ["body", "name", "namespace"],
|
|
3029
|
+
operationId: "ves.io.schema.voltshare_admin_policy.API.Delete",
|
|
3030
|
+
tags: ["Security"],
|
|
3031
|
+
sourceFile: "domains/blindfold.json",
|
|
3032
|
+
displayName: null,
|
|
3033
|
+
dangerLevel: "high",
|
|
3034
|
+
sideEffects: {
|
|
3035
|
+
deletes: ["voltshare-admin-policy", "contained_resources"],
|
|
3036
|
+
},
|
|
3037
|
+
requiredFields: ["path.name", "path.namespace"],
|
|
3038
|
+
confirmationRequired: true,
|
|
3039
|
+
parameterExamples: {
|
|
3040
|
+
name: "Name",
|
|
3041
|
+
namespace: "Ns1",
|
|
3042
|
+
},
|
|
3043
|
+
validationRules: {},
|
|
3044
|
+
operationMetadata: {
|
|
3045
|
+
common_errors: [
|
|
3046
|
+
{
|
|
3047
|
+
code: 401,
|
|
3048
|
+
message: "Authentication required",
|
|
3049
|
+
solution: "Provide valid API credentials",
|
|
3050
|
+
},
|
|
3051
|
+
{
|
|
3052
|
+
code: 403,
|
|
3053
|
+
message: "Permission denied",
|
|
3054
|
+
solution: "Check access permissions for this operation",
|
|
3055
|
+
},
|
|
3056
|
+
{
|
|
3057
|
+
code: 404,
|
|
3058
|
+
message: "Resource not found",
|
|
3059
|
+
solution: "Verify resource name, namespace, and path",
|
|
3060
|
+
},
|
|
3061
|
+
{
|
|
3062
|
+
code: 409,
|
|
3063
|
+
message: "Resource already exists",
|
|
3064
|
+
solution: "Use different name or update existing resource",
|
|
3065
|
+
},
|
|
3066
|
+
{
|
|
3067
|
+
code: 429,
|
|
3068
|
+
message: "Rate limit exceeded",
|
|
3069
|
+
solution: "Wait before retrying the operation",
|
|
3070
|
+
},
|
|
3071
|
+
{
|
|
3072
|
+
code: 500,
|
|
3073
|
+
message: "Server error",
|
|
3074
|
+
solution: "Retry operation or contact support",
|
|
3075
|
+
},
|
|
3076
|
+
],
|
|
3077
|
+
conditions: {
|
|
3078
|
+
postconditions: ["Resource removed from system", "Associated resources may be affected"],
|
|
3079
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
3080
|
+
},
|
|
3081
|
+
confirmation_required: true,
|
|
3082
|
+
danger_level: "high",
|
|
3083
|
+
field_docs: {},
|
|
3084
|
+
optional_fields: [],
|
|
3085
|
+
performance_impact: {
|
|
3086
|
+
latency: "high",
|
|
3087
|
+
resource_usage: "moderate",
|
|
3088
|
+
},
|
|
3089
|
+
purpose: "Delete voltshare-admin-policy",
|
|
3090
|
+
required_fields: ["path.name", "path.namespace"],
|
|
3091
|
+
side_effects: {
|
|
3092
|
+
deletes: ["voltshare-admin-policy", "contained_resources"],
|
|
3093
|
+
},
|
|
3094
|
+
},
|
|
3095
|
+
curlExample: null,
|
|
3096
|
+
},
|
|
3097
|
+
{
|
|
3098
|
+
toolName: "f5xc-api-blindfold-voltshare-admin-policy-get",
|
|
3099
|
+
method: "GET",
|
|
3100
|
+
path: "/api/secret_management/namespaces/{namespace}/voltshare_admin_policys/{name}",
|
|
3101
|
+
operation: "get",
|
|
3102
|
+
domain: "blindfold",
|
|
3103
|
+
resource: "voltshare-admin-policy",
|
|
3104
|
+
summary: "GET VoltShare Admin Policy.",
|
|
3105
|
+
description: "GET voltshare_admin_policy reads a given object from storage backend for metadata.namespace.",
|
|
3106
|
+
pathParameters: [
|
|
3107
|
+
{
|
|
3108
|
+
description: "Name\nThe name of the configuration object to be fetched.",
|
|
3109
|
+
in: "path",
|
|
3110
|
+
name: "name",
|
|
3111
|
+
required: true,
|
|
3112
|
+
schema: {
|
|
3113
|
+
type: "string",
|
|
3114
|
+
},
|
|
3115
|
+
"x-displayname": "Name",
|
|
3116
|
+
"x-ves-example": "Name",
|
|
3117
|
+
},
|
|
3118
|
+
{
|
|
3119
|
+
description: "Namespace\nThe namespace in which the configuration object is present.",
|
|
3120
|
+
in: "path",
|
|
3121
|
+
name: "namespace",
|
|
3122
|
+
required: true,
|
|
3123
|
+
schema: {
|
|
3124
|
+
type: "string",
|
|
3125
|
+
},
|
|
3126
|
+
"x-displayname": "Namespace",
|
|
3127
|
+
"x-ves-example": "Ns1",
|
|
3128
|
+
},
|
|
3129
|
+
],
|
|
3130
|
+
queryParameters: [
|
|
3131
|
+
{
|
|
3132
|
+
description: "The format in which the configuration object is to be fetched. This could be for example\n - in GetSpec form for the contents of object\n - in CreateRequest form to create a new similar object\n - to ReplaceRequest form to replace changeable values\n\nDefault format of returned resource\nResponse should be in CreateRequest format\nResponse should be in ReplaceRequest format\nResponse should be in StatusObject(s) format\nResponse should be in format of GetSpecType\nResponse should have other objects referring to this object\nResponse should have deleted and disabled objects referrred by this object.",
|
|
3133
|
+
in: "query",
|
|
3134
|
+
name: "response_format",
|
|
3135
|
+
required: false,
|
|
3136
|
+
schema: {
|
|
3137
|
+
default: "GET_RSP_FORMAT_DEFAULT",
|
|
3138
|
+
enum: [
|
|
3139
|
+
"GET_RSP_FORMAT_DEFAULT",
|
|
3140
|
+
"GET_RSP_FORMAT_FOR_CREATE",
|
|
3141
|
+
"GET_RSP_FORMAT_FOR_REPLACE",
|
|
3142
|
+
"GET_RSP_FORMAT_STATUS",
|
|
3143
|
+
"GET_RSP_FORMAT_READ",
|
|
3144
|
+
"GET_RSP_FORMAT_REFERRING_OBJECTS",
|
|
3145
|
+
"GET_RSP_FORMAT_BROKEN_REFERENCES",
|
|
3146
|
+
],
|
|
3147
|
+
type: "string",
|
|
3148
|
+
},
|
|
3149
|
+
"x-displayname": "Broken Referred Objects.",
|
|
3150
|
+
},
|
|
3151
|
+
],
|
|
3152
|
+
requestBodySchema: null,
|
|
3153
|
+
responseSchema: {
|
|
3154
|
+
$ref: "#/components/schemas/voltshare_admin_policyGetResponse",
|
|
3155
|
+
},
|
|
3156
|
+
requiredParams: ["name", "namespace"],
|
|
3157
|
+
operationId: "ves.io.schema.voltshare_admin_policy.API.Get",
|
|
3158
|
+
tags: ["Security"],
|
|
3159
|
+
sourceFile: "domains/blindfold.json",
|
|
3160
|
+
displayName: null,
|
|
3161
|
+
dangerLevel: "low",
|
|
3162
|
+
sideEffects: null,
|
|
3163
|
+
requiredFields: ["path.name", "path.namespace"],
|
|
3164
|
+
confirmationRequired: false,
|
|
3165
|
+
parameterExamples: {
|
|
3166
|
+
name: "Name",
|
|
3167
|
+
namespace: "Ns1",
|
|
3168
|
+
},
|
|
3169
|
+
validationRules: {},
|
|
3170
|
+
operationMetadata: {
|
|
3171
|
+
common_errors: [
|
|
3172
|
+
{
|
|
3173
|
+
code: 401,
|
|
3174
|
+
message: "Authentication required",
|
|
3175
|
+
solution: "Provide valid API credentials",
|
|
3176
|
+
},
|
|
3177
|
+
{
|
|
3178
|
+
code: 403,
|
|
3179
|
+
message: "Permission denied",
|
|
3180
|
+
solution: "Check access permissions for this operation",
|
|
3181
|
+
},
|
|
3182
|
+
{
|
|
3183
|
+
code: 404,
|
|
3184
|
+
message: "Resource not found",
|
|
3185
|
+
solution: "Verify resource name, namespace, and path",
|
|
3186
|
+
},
|
|
3187
|
+
{
|
|
3188
|
+
code: 409,
|
|
3189
|
+
message: "Resource already exists",
|
|
3190
|
+
solution: "Use different name or update existing resource",
|
|
3191
|
+
},
|
|
3192
|
+
{
|
|
3193
|
+
code: 429,
|
|
3194
|
+
message: "Rate limit exceeded",
|
|
3195
|
+
solution: "Wait before retrying the operation",
|
|
3196
|
+
},
|
|
3197
|
+
{
|
|
3198
|
+
code: 500,
|
|
3199
|
+
message: "Server error",
|
|
3200
|
+
solution: "Retry operation or contact support",
|
|
3201
|
+
},
|
|
3202
|
+
],
|
|
3203
|
+
conditions: {
|
|
3204
|
+
postconditions: [],
|
|
3205
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
3206
|
+
},
|
|
3207
|
+
confirmation_required: false,
|
|
3208
|
+
danger_level: "low",
|
|
3209
|
+
field_docs: {},
|
|
3210
|
+
optional_fields: [],
|
|
3211
|
+
performance_impact: {
|
|
3212
|
+
latency: "low",
|
|
3213
|
+
resource_usage: "low",
|
|
3214
|
+
},
|
|
3215
|
+
purpose: "Retrieve specific voltshare-admin-policy",
|
|
3216
|
+
required_fields: ["path.name", "path.namespace"],
|
|
3217
|
+
side_effects: {},
|
|
3218
|
+
},
|
|
3219
|
+
curlExample: null,
|
|
3220
|
+
},
|
|
3221
|
+
{
|
|
3222
|
+
toolName: "f5xc-api-blindfold-voltshare-admin-policy-list",
|
|
3223
|
+
method: "GET",
|
|
3224
|
+
path: "/api/secret_management/namespaces/{namespace}/voltshare_admin_policys",
|
|
3225
|
+
operation: "list",
|
|
3226
|
+
domain: "blindfold",
|
|
3227
|
+
resource: "voltshare-admin-policy",
|
|
3228
|
+
summary: "List VoltShare Admin Policy.",
|
|
3229
|
+
description: "List the set of voltshare_admin_policy in a namespace.",
|
|
3230
|
+
pathParameters: [
|
|
3231
|
+
{
|
|
3232
|
+
description: "Namespace\nNamespace to scope the listing of voltshare_admin_policy.",
|
|
3233
|
+
in: "path",
|
|
3234
|
+
name: "namespace",
|
|
3235
|
+
required: true,
|
|
3236
|
+
schema: {
|
|
3237
|
+
type: "string",
|
|
3238
|
+
},
|
|
3239
|
+
"x-displayname": "Namespace",
|
|
3240
|
+
"x-ves-example": "Ns1",
|
|
3241
|
+
},
|
|
3242
|
+
],
|
|
3243
|
+
queryParameters: [
|
|
3244
|
+
{
|
|
3245
|
+
description: "A LabelSelectorType expression that every item in list response will satisfy.",
|
|
3246
|
+
in: "query",
|
|
3247
|
+
name: "label_filter",
|
|
3248
|
+
required: false,
|
|
3249
|
+
schema: {
|
|
3250
|
+
type: "string",
|
|
3251
|
+
},
|
|
3252
|
+
"x-displayname": "Label Filter.",
|
|
3253
|
+
"x-ves-example": "Env in (staging, testing), tier in (web, db)",
|
|
3254
|
+
},
|
|
3255
|
+
{
|
|
3256
|
+
description: 'X-example: ""\nExtra fields to return along with summary fields.',
|
|
3257
|
+
in: "query",
|
|
3258
|
+
name: "report_fields",
|
|
3259
|
+
required: false,
|
|
3260
|
+
schema: {
|
|
3261
|
+
items: {
|
|
3262
|
+
type: "string",
|
|
3263
|
+
},
|
|
3264
|
+
type: "array",
|
|
3265
|
+
},
|
|
3266
|
+
"x-displayname": "Report Fields.",
|
|
3267
|
+
},
|
|
3268
|
+
{
|
|
3269
|
+
description: 'X-example: ""\nExtra status fields to return along with summary fields.',
|
|
3270
|
+
in: "query",
|
|
3271
|
+
name: "report_status_fields",
|
|
3272
|
+
required: false,
|
|
3273
|
+
schema: {
|
|
3274
|
+
items: {
|
|
3275
|
+
type: "string",
|
|
3276
|
+
},
|
|
3277
|
+
type: "array",
|
|
3278
|
+
},
|
|
3279
|
+
"x-displayname": "Report Status Fields.",
|
|
3280
|
+
},
|
|
3281
|
+
],
|
|
3282
|
+
requestBodySchema: null,
|
|
3283
|
+
responseSchema: {
|
|
3284
|
+
$ref: "#/components/schemas/voltshare_admin_policyListResponse",
|
|
3285
|
+
},
|
|
3286
|
+
requiredParams: ["namespace"],
|
|
3287
|
+
operationId: "ves.io.schema.voltshare_admin_policy.API.List",
|
|
3288
|
+
tags: ["Security"],
|
|
3289
|
+
sourceFile: "domains/blindfold.json",
|
|
3290
|
+
displayName: null,
|
|
3291
|
+
dangerLevel: "low",
|
|
3292
|
+
sideEffects: null,
|
|
3293
|
+
requiredFields: ["path.namespace"],
|
|
3294
|
+
confirmationRequired: false,
|
|
3295
|
+
parameterExamples: {
|
|
3296
|
+
label_filter: "Env in (staging, testing), tier in (web, db)",
|
|
3297
|
+
namespace: "Ns1",
|
|
3298
|
+
},
|
|
3299
|
+
validationRules: {},
|
|
3300
|
+
operationMetadata: {
|
|
3301
|
+
common_errors: [
|
|
3302
|
+
{
|
|
3303
|
+
code: 401,
|
|
3304
|
+
message: "Authentication required",
|
|
3305
|
+
solution: "Provide valid API credentials",
|
|
3306
|
+
},
|
|
3307
|
+
{
|
|
3308
|
+
code: 403,
|
|
3309
|
+
message: "Permission denied",
|
|
3310
|
+
solution: "Check access permissions for this operation",
|
|
3311
|
+
},
|
|
3312
|
+
{
|
|
3313
|
+
code: 404,
|
|
3314
|
+
message: "Resource not found",
|
|
3315
|
+
solution: "Verify resource name, namespace, and path",
|
|
3316
|
+
},
|
|
3317
|
+
{
|
|
3318
|
+
code: 409,
|
|
3319
|
+
message: "Resource already exists",
|
|
3320
|
+
solution: "Use different name or update existing resource",
|
|
3321
|
+
},
|
|
3322
|
+
{
|
|
3323
|
+
code: 429,
|
|
3324
|
+
message: "Rate limit exceeded",
|
|
3325
|
+
solution: "Wait before retrying the operation",
|
|
3326
|
+
},
|
|
3327
|
+
{
|
|
3328
|
+
code: 500,
|
|
3329
|
+
message: "Server error",
|
|
3330
|
+
solution: "Retry operation or contact support",
|
|
3331
|
+
},
|
|
3332
|
+
],
|
|
3333
|
+
conditions: {
|
|
3334
|
+
postconditions: [],
|
|
3335
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
3336
|
+
},
|
|
3337
|
+
confirmation_required: false,
|
|
3338
|
+
danger_level: "low",
|
|
3339
|
+
field_docs: {},
|
|
3340
|
+
optional_fields: [],
|
|
3341
|
+
performance_impact: {
|
|
3342
|
+
latency: "moderate",
|
|
3343
|
+
resource_usage: "moderate",
|
|
3344
|
+
},
|
|
3345
|
+
purpose: "List all voltshare-admin-policys",
|
|
3346
|
+
required_fields: ["path.namespace"],
|
|
3347
|
+
side_effects: {},
|
|
3348
|
+
},
|
|
3349
|
+
curlExample: null,
|
|
3350
|
+
},
|
|
3351
|
+
{
|
|
3352
|
+
toolName: "f5xc-api-blindfold-voltshare-admin-policy-update",
|
|
3353
|
+
method: "PUT",
|
|
3354
|
+
path: "/api/secret_management/namespaces/{metadata.namespace}/voltshare_admin_policys/{metadata.name}",
|
|
3355
|
+
operation: "update",
|
|
3356
|
+
domain: "blindfold",
|
|
3357
|
+
resource: "voltshare-admin-policy",
|
|
3358
|
+
summary: "Replace VoltShare Admin Policy.",
|
|
3359
|
+
description: "Replace voltshare_admin_policy replaces an existing object in the storage backend for metadata.namespace.",
|
|
3360
|
+
pathParameters: [
|
|
3361
|
+
{
|
|
3362
|
+
description: "Name\nThe configuration object to be replaced will be looked up by name.",
|
|
3363
|
+
in: "path",
|
|
3364
|
+
name: "metadata.name",
|
|
3365
|
+
required: true,
|
|
3366
|
+
schema: {
|
|
3367
|
+
type: "string",
|
|
3368
|
+
},
|
|
3369
|
+
"x-displayname": "Name",
|
|
3370
|
+
"x-ves-example": "Example-corp-web.",
|
|
3371
|
+
},
|
|
3372
|
+
{
|
|
3373
|
+
description: 'Namespace\nThis defines the workspace within which each the configuration object is to be created.\nMust be a DNS_LABEL format. For a namespace object itself, namespace value will be ""',
|
|
3374
|
+
in: "path",
|
|
3375
|
+
name: "metadata.namespace",
|
|
3376
|
+
required: true,
|
|
3377
|
+
schema: {
|
|
3378
|
+
type: "string",
|
|
3379
|
+
},
|
|
3380
|
+
"x-displayname": "Namespace",
|
|
3381
|
+
"x-ves-example": "Staging",
|
|
3382
|
+
},
|
|
3383
|
+
],
|
|
3384
|
+
queryParameters: [],
|
|
3385
|
+
requestBodySchema: {
|
|
3386
|
+
$ref: "#/components/schemas/voltshare_admin_policyReplaceRequest",
|
|
3387
|
+
},
|
|
3388
|
+
responseSchema: {
|
|
3389
|
+
$ref: "#/components/schemas/voltshare_admin_policyReplaceResponse",
|
|
3390
|
+
},
|
|
3391
|
+
requiredParams: ["body", "metadata.name", "metadata.namespace"],
|
|
3392
|
+
operationId: "ves.io.schema.voltshare_admin_policy.API.Replace",
|
|
3393
|
+
tags: ["Security"],
|
|
3394
|
+
sourceFile: "domains/blindfold.json",
|
|
3395
|
+
displayName: null,
|
|
3396
|
+
dangerLevel: "medium",
|
|
3397
|
+
sideEffects: {
|
|
3398
|
+
modifies: ["voltshare-admin-policy"],
|
|
3399
|
+
},
|
|
3400
|
+
requiredFields: ["path.metadata.name", "path.metadata.namespace"],
|
|
3401
|
+
confirmationRequired: false,
|
|
3402
|
+
parameterExamples: {
|
|
3403
|
+
"metadata.name": "Example-corp-web.",
|
|
3404
|
+
"metadata.namespace": "Staging",
|
|
3405
|
+
},
|
|
3406
|
+
validationRules: {},
|
|
3407
|
+
operationMetadata: {
|
|
3408
|
+
common_errors: [
|
|
3409
|
+
{
|
|
3410
|
+
code: 401,
|
|
3411
|
+
message: "Authentication required",
|
|
3412
|
+
solution: "Provide valid API credentials",
|
|
3413
|
+
},
|
|
3414
|
+
{
|
|
3415
|
+
code: 403,
|
|
3416
|
+
message: "Permission denied",
|
|
3417
|
+
solution: "Check access permissions for this operation",
|
|
3418
|
+
},
|
|
3419
|
+
{
|
|
3420
|
+
code: 404,
|
|
3421
|
+
message: "Resource not found",
|
|
3422
|
+
solution: "Verify resource name, namespace, and path",
|
|
3423
|
+
},
|
|
3424
|
+
{
|
|
3425
|
+
code: 409,
|
|
3426
|
+
message: "Resource already exists",
|
|
3427
|
+
solution: "Use different name or update existing resource",
|
|
3428
|
+
},
|
|
3429
|
+
{
|
|
3430
|
+
code: 429,
|
|
3431
|
+
message: "Rate limit exceeded",
|
|
3432
|
+
solution: "Wait before retrying the operation",
|
|
3433
|
+
},
|
|
3434
|
+
{
|
|
3435
|
+
code: 500,
|
|
3436
|
+
message: "Server error",
|
|
3437
|
+
solution: "Retry operation or contact support",
|
|
3438
|
+
},
|
|
3439
|
+
],
|
|
3440
|
+
conditions: {
|
|
3441
|
+
postconditions: ["Resource updated with new values"],
|
|
3442
|
+
prerequisites: ["Active namespace", "Policy parameters defined"],
|
|
3443
|
+
},
|
|
3444
|
+
confirmation_required: false,
|
|
3445
|
+
danger_level: "medium",
|
|
3446
|
+
field_docs: {},
|
|
3447
|
+
optional_fields: [],
|
|
3448
|
+
performance_impact: {
|
|
3449
|
+
latency: "low",
|
|
3450
|
+
resource_usage: "low",
|
|
3451
|
+
},
|
|
3452
|
+
purpose: "Replace existing voltshare-admin-policy",
|
|
3453
|
+
required_fields: ["path.metadata.name", "path.metadata.namespace"],
|
|
3454
|
+
side_effects: {
|
|
3455
|
+
modifies: ["voltshare-admin-policy"],
|
|
3456
|
+
},
|
|
3457
|
+
},
|
|
3458
|
+
curlExample: null,
|
|
3459
|
+
},
|
|
3460
|
+
];
|
|
3461
|
+
export default blindfoldTools;
|
|
3462
|
+
//# sourceMappingURL=index.js.map
|