@robinmordasiewicz/f5xc-api-mcp 3.4.0 → 3.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/generator/dependency-extractor.d.ts +103 -0
- package/dist/generator/dependency-extractor.d.ts.map +1 -0
- package/dist/generator/dependency-extractor.js +473 -0
- package/dist/generator/dependency-extractor.js.map +1 -0
- package/dist/generator/dependency-graph.d.ts +67 -0
- package/dist/generator/dependency-graph.d.ts.map +1 -0
- package/dist/generator/dependency-graph.js +330 -0
- package/dist/generator/dependency-graph.js.map +1 -0
- package/dist/generator/dependency-types.d.ts +206 -0
- package/dist/generator/dependency-types.d.ts.map +1 -0
- package/dist/generator/dependency-types.js +37 -0
- package/dist/generator/dependency-types.js.map +1 -0
- package/dist/generator/openapi-parser.d.ts +21 -77
- package/dist/generator/openapi-parser.d.ts.map +1 -1
- package/dist/generator/openapi-parser.js +126 -17
- package/dist/generator/openapi-parser.js.map +1 -1
- package/dist/generator/tool-generator.d.ts +19 -3
- package/dist/generator/tool-generator.d.ts.map +1 -1
- package/dist/generator/tool-generator.js +26 -28
- package/dist/generator/tool-generator.js.map +1 -1
- package/dist/index.d.ts +2 -10
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +28 -33
- package/dist/index.js.map +1 -1
- package/dist/prompts/workflows.d.ts.map +1 -1
- package/dist/prompts/workflows.js +30 -174
- package/dist/prompts/workflows.js.map +1 -1
- package/dist/resources/handlers.d.ts +0 -2
- package/dist/resources/handlers.d.ts.map +1 -1
- package/dist/resources/handlers.js +0 -51
- package/dist/resources/handlers.js.map +1 -1
- package/dist/server.d.ts +1 -1
- package/dist/server.d.ts.map +1 -1
- package/dist/server.js +1 -2
- package/dist/server.js.map +1 -1
- package/dist/tools/discovery/dependencies.d.ts +113 -0
- package/dist/tools/discovery/dependencies.d.ts.map +1 -0
- package/dist/tools/discovery/dependencies.js +258 -0
- package/dist/tools/discovery/dependencies.js.map +1 -0
- package/dist/tools/discovery/execute.d.ts +1 -3
- package/dist/tools/discovery/execute.d.ts.map +1 -1
- package/dist/tools/discovery/execute.js +1 -34
- package/dist/tools/discovery/execute.js.map +1 -1
- package/dist/tools/discovery/index.d.ts +33 -0
- package/dist/tools/discovery/index.d.ts.map +1 -1
- package/dist/tools/discovery/index.js +43 -0
- package/dist/tools/discovery/index.js.map +1 -1
- package/dist/tools/generated/admin_console_and_ui/index.d.ts.map +1 -1
- package/dist/tools/generated/admin_console_and_ui/index.js +8 -28
- package/dist/tools/generated/admin_console_and_ui/index.js.map +1 -1
- package/dist/tools/generated/api/index.d.ts.map +1 -1
- package/dist/tools/generated/api/index.js +1256 -908
- package/dist/tools/generated/api/index.js.map +1 -1
- package/dist/tools/generated/authentication/index.d.ts.map +1 -1
- package/dist/tools/generated/authentication/index.js +58 -156
- package/dist/tools/generated/authentication/index.js.map +1 -1
- package/dist/tools/generated/bigip/index.d.ts.map +1 -1
- package/dist/tools/generated/bigip/index.js +344 -410
- package/dist/tools/generated/bigip/index.js.map +1 -1
- package/dist/tools/generated/billing_and_usage/index.d.ts.map +1 -1
- package/dist/tools/generated/billing_and_usage/index.js +192 -442
- package/dist/tools/generated/billing_and_usage/index.js.map +1 -1
- package/dist/tools/generated/blindfold/index.d.ts.map +1 -1
- package/dist/tools/generated/blindfold/index.js +360 -568
- package/dist/tools/generated/blindfold/index.js.map +1 -1
- package/dist/tools/generated/bot_and_threat_defense/index.d.ts.map +1 -1
- package/dist/tools/generated/bot_and_threat_defense/index.js +502 -340
- package/dist/tools/generated/bot_and_threat_defense/index.js.map +1 -1
- package/dist/tools/generated/cdn/index.d.ts.map +1 -1
- package/dist/tools/generated/cdn/index.js +369 -428
- package/dist/tools/generated/cdn/index.js.map +1 -1
- package/dist/tools/generated/ce_management/index.d.ts.map +1 -1
- package/dist/tools/generated/ce_management/index.js +407 -558
- package/dist/tools/generated/ce_management/index.js.map +1 -1
- package/dist/tools/generated/certificates/index.d.ts.map +1 -1
- package/dist/tools/generated/certificates/index.js +288 -320
- package/dist/tools/generated/certificates/index.js.map +1 -1
- package/dist/tools/generated/cloud_infrastructure/index.d.ts.map +1 -1
- package/dist/tools/generated/cloud_infrastructure/index.js +407 -572
- package/dist/tools/generated/cloud_infrastructure/index.js.map +1 -1
- package/dist/tools/generated/container_services/index.d.ts.map +1 -1
- package/dist/tools/generated/container_services/index.js +228 -264
- package/dist/tools/generated/container_services/index.js.map +1 -1
- package/dist/tools/generated/data_and_privacy_security/index.d.ts.map +1 -1
- package/dist/tools/generated/data_and_privacy_security/index.js +156 -202
- package/dist/tools/generated/data_and_privacy_security/index.js.map +1 -1
- package/dist/tools/generated/data_intelligence/index.d.ts.map +1 -1
- package/dist/tools/generated/data_intelligence/index.js +120 -290
- package/dist/tools/generated/data_intelligence/index.js.map +1 -1
- package/dist/tools/generated/ddos/index.d.ts.map +1 -1
- package/dist/tools/generated/ddos/index.js +732 -1152
- package/dist/tools/generated/ddos/index.js.map +1 -1
- package/dist/tools/generated/dns/index.d.ts.map +1 -1
- package/dist/tools/generated/dns/index.js +544 -908
- package/dist/tools/generated/dns/index.js.map +1 -1
- package/dist/tools/generated/generative_ai/index.d.ts.map +1 -1
- package/dist/tools/generated/generative_ai/index.js +58 -254
- package/dist/tools/generated/generative_ai/index.js.map +1 -1
- package/dist/tools/generated/managed_kubernetes/index.d.ts.map +1 -1
- package/dist/tools/generated/managed_kubernetes/index.js +535 -400
- package/dist/tools/generated/managed_kubernetes/index.js.map +1 -1
- package/dist/tools/generated/marketplace/index.d.ts.map +1 -1
- package/dist/tools/generated/marketplace/index.js +343 -594
- package/dist/tools/generated/marketplace/index.js.map +1 -1
- package/dist/tools/generated/network/index.d.ts.map +1 -1
- package/dist/tools/generated/network/index.js +1398 -1590
- package/dist/tools/generated/network/index.js.map +1 -1
- package/dist/tools/generated/network_security/index.d.ts.map +1 -1
- package/dist/tools/generated/network_security/index.js +1879 -1126
- package/dist/tools/generated/network_security/index.js.map +1 -1
- package/dist/tools/generated/nginx_one/index.d.ts.map +1 -1
- package/dist/tools/generated/nginx_one/index.js +108 -236
- package/dist/tools/generated/nginx_one/index.js.map +1 -1
- package/dist/tools/generated/object_storage/index.d.ts.map +1 -1
- package/dist/tools/generated/object_storage/index.js +39 -98
- package/dist/tools/generated/object_storage/index.js.map +1 -1
- package/dist/tools/generated/observability/index.d.ts.map +1 -1
- package/dist/tools/generated/observability/index.js +310 -790
- package/dist/tools/generated/observability/index.js.map +1 -1
- package/dist/tools/generated/rate_limiting/index.d.ts.map +1 -1
- package/dist/tools/generated/rate_limiting/index.js +411 -240
- package/dist/tools/generated/rate_limiting/index.js.map +1 -1
- package/dist/tools/generated/secops_and_incident_response/index.d.ts.map +1 -1
- package/dist/tools/generated/secops_and_incident_response/index.js +137 -80
- package/dist/tools/generated/secops_and_incident_response/index.js.map +1 -1
- package/dist/tools/generated/service_mesh/index.d.ts.map +1 -1
- package/dist/tools/generated/service_mesh/index.js +1118 -778
- package/dist/tools/generated/service_mesh/index.js.map +1 -1
- package/dist/tools/generated/shape/index.d.ts.map +1 -1
- package/dist/tools/generated/shape/index.js +1101 -3504
- package/dist/tools/generated/shape/index.js.map +1 -1
- package/dist/tools/generated/sites/index.d.ts.map +1 -1
- package/dist/tools/generated/sites/index.js +1780 -1872
- package/dist/tools/generated/sites/index.js.map +1 -1
- package/dist/tools/generated/statistics/index.d.ts.map +1 -1
- package/dist/tools/generated/statistics/index.js +644 -1350
- package/dist/tools/generated/statistics/index.js.map +1 -1
- package/dist/tools/generated/support/index.d.ts.map +1 -1
- package/dist/tools/generated/support/index.js +321 -928
- package/dist/tools/generated/support/index.js.map +1 -1
- package/dist/tools/generated/telemetry_and_insights/index.d.ts.map +1 -1
- package/dist/tools/generated/telemetry_and_insights/index.js +123 -492
- package/dist/tools/generated/telemetry_and_insights/index.js.map +1 -1
- package/dist/tools/generated/tenant_and_identity/index.d.ts.map +1 -1
- package/dist/tools/generated/tenant_and_identity/index.js +1568 -3086
- package/dist/tools/generated/tenant_and_identity/index.js.map +1 -1
- package/dist/tools/generated/threat_campaign/index.d.ts.map +1 -1
- package/dist/tools/generated/threat_campaign/index.js +4 -14
- package/dist/tools/generated/threat_campaign/index.js.map +1 -1
- package/dist/tools/generated/users/index.d.ts.map +1 -1
- package/dist/tools/generated/users/index.js +151 -208
- package/dist/tools/generated/users/index.js.map +1 -1
- package/dist/tools/generated/virtual/index.d.ts.map +1 -1
- package/dist/tools/generated/virtual/index.js +1256 -1533
- package/dist/tools/generated/virtual/index.js.map +1 -1
- package/dist/tools/generated/vpm_and_node_management/index.d.ts.map +1 -1
- package/dist/tools/generated/vpm_and_node_management/index.js +4 -14
- package/dist/tools/generated/vpm_and_node_management/index.js.map +1 -1
- package/dist/tools/generated/waf/index.d.ts.map +1 -1
- package/dist/tools/generated/waf/index.js +821 -675
- package/dist/tools/generated/waf/index.js.map +1 -1
- package/package.json +1 -1
- package/dist/cli/index.d.ts +0 -16
- package/dist/cli/index.d.ts.map +0 -1
- package/dist/cli/index.js +0 -116
- package/dist/cli/index.js.map +0 -1
- package/dist/cli/setup.d.ts +0 -54
- package/dist/cli/setup.d.ts.map +0 -1
- package/dist/cli/setup.js +0 -347
- package/dist/cli/setup.js.map +0 -1
|
@@ -42,18 +42,6 @@ export const blindfoldTools = [
|
|
|
42
42
|
creates: ["access-count"],
|
|
43
43
|
},
|
|
44
44
|
requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
45
|
-
cliExamples: [
|
|
46
|
-
{
|
|
47
|
-
command: "f5xcctl secret_management access-count create {name} --namespace {namespace}",
|
|
48
|
-
description: "Create access-count",
|
|
49
|
-
use_case: "basic_create",
|
|
50
|
-
},
|
|
51
|
-
{
|
|
52
|
-
command: "f5xcctl secret_management access-count create -f {file}.yaml",
|
|
53
|
-
description: "Create from YAML file",
|
|
54
|
-
use_case: "file_based",
|
|
55
|
-
},
|
|
56
|
-
],
|
|
57
45
|
confirmationRequired: false,
|
|
58
46
|
parameterExamples: {
|
|
59
47
|
namespace: "Blogging-app-namespace-1.",
|
|
@@ -98,18 +86,6 @@ export const blindfoldTools = [
|
|
|
98
86
|
},
|
|
99
87
|
confirmation_required: false,
|
|
100
88
|
danger_level: "medium",
|
|
101
|
-
examples: [
|
|
102
|
-
{
|
|
103
|
-
command: "f5xcctl secret_management access-count create {name} --namespace {namespace}",
|
|
104
|
-
description: "Create access-count",
|
|
105
|
-
use_case: "basic_create",
|
|
106
|
-
},
|
|
107
|
-
{
|
|
108
|
-
command: "f5xcctl secret_management access-count create -f {file}.yaml",
|
|
109
|
-
description: "Create from YAML file",
|
|
110
|
-
use_case: "file_based",
|
|
111
|
-
},
|
|
112
|
-
],
|
|
113
89
|
field_docs: {},
|
|
114
90
|
optional_fields: [],
|
|
115
91
|
performance_impact: {
|
|
@@ -122,6 +98,10 @@ export const blindfoldTools = [
|
|
|
122
98
|
creates: ["access-count"],
|
|
123
99
|
},
|
|
124
100
|
},
|
|
101
|
+
curlExample: null,
|
|
102
|
+
dependencies: [],
|
|
103
|
+
oneOfGroups: [],
|
|
104
|
+
subscriptionRequirements: [],
|
|
125
105
|
},
|
|
126
106
|
{
|
|
127
107
|
toolName: "f5xc-api-blindfold-aggregation-create",
|
|
@@ -162,18 +142,6 @@ export const blindfoldTools = [
|
|
|
162
142
|
creates: ["aggregation"],
|
|
163
143
|
},
|
|
164
144
|
requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
165
|
-
cliExamples: [
|
|
166
|
-
{
|
|
167
|
-
command: "f5xcctl secret_management aggregation create {name} --namespace {namespace}",
|
|
168
|
-
description: "Create aggregation",
|
|
169
|
-
use_case: "basic_create",
|
|
170
|
-
},
|
|
171
|
-
{
|
|
172
|
-
command: "f5xcctl secret_management aggregation create -f {file}.yaml",
|
|
173
|
-
description: "Create from YAML file",
|
|
174
|
-
use_case: "file_based",
|
|
175
|
-
},
|
|
176
|
-
],
|
|
177
145
|
confirmationRequired: false,
|
|
178
146
|
parameterExamples: {
|
|
179
147
|
namespace: "Value",
|
|
@@ -218,18 +186,6 @@ export const blindfoldTools = [
|
|
|
218
186
|
},
|
|
219
187
|
confirmation_required: false,
|
|
220
188
|
danger_level: "medium",
|
|
221
|
-
examples: [
|
|
222
|
-
{
|
|
223
|
-
command: "f5xcctl secret_management aggregation create {name} --namespace {namespace}",
|
|
224
|
-
description: "Create aggregation",
|
|
225
|
-
use_case: "basic_create",
|
|
226
|
-
},
|
|
227
|
-
{
|
|
228
|
-
command: "f5xcctl secret_management aggregation create -f {file}.yaml",
|
|
229
|
-
description: "Create from YAML file",
|
|
230
|
-
use_case: "file_based",
|
|
231
|
-
},
|
|
232
|
-
],
|
|
233
189
|
field_docs: {},
|
|
234
190
|
optional_fields: [],
|
|
235
191
|
performance_impact: {
|
|
@@ -242,6 +198,10 @@ export const blindfoldTools = [
|
|
|
242
198
|
creates: ["aggregation"],
|
|
243
199
|
},
|
|
244
200
|
},
|
|
201
|
+
curlExample: null,
|
|
202
|
+
dependencies: [],
|
|
203
|
+
oneOfGroups: [],
|
|
204
|
+
subscriptionRequirements: [],
|
|
245
205
|
},
|
|
246
206
|
{
|
|
247
207
|
toolName: "f5xc-api-blindfold-audit-log-create",
|
|
@@ -282,18 +242,6 @@ export const blindfoldTools = [
|
|
|
282
242
|
creates: ["audit-log"],
|
|
283
243
|
},
|
|
284
244
|
requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
285
|
-
cliExamples: [
|
|
286
|
-
{
|
|
287
|
-
command: "f5xcctl secret_management audit-log create {name} --namespace {namespace}",
|
|
288
|
-
description: "Create audit-log",
|
|
289
|
-
use_case: "basic_create",
|
|
290
|
-
},
|
|
291
|
-
{
|
|
292
|
-
command: "f5xcctl secret_management audit-log create -f {file}.yaml",
|
|
293
|
-
description: "Create from YAML file",
|
|
294
|
-
use_case: "file_based",
|
|
295
|
-
},
|
|
296
|
-
],
|
|
297
245
|
confirmationRequired: false,
|
|
298
246
|
parameterExamples: {
|
|
299
247
|
namespace: "Value",
|
|
@@ -338,18 +286,6 @@ export const blindfoldTools = [
|
|
|
338
286
|
},
|
|
339
287
|
confirmation_required: false,
|
|
340
288
|
danger_level: "medium",
|
|
341
|
-
examples: [
|
|
342
|
-
{
|
|
343
|
-
command: "f5xcctl secret_management audit-log create {name} --namespace {namespace}",
|
|
344
|
-
description: "Create audit-log",
|
|
345
|
-
use_case: "basic_create",
|
|
346
|
-
},
|
|
347
|
-
{
|
|
348
|
-
command: "f5xcctl secret_management audit-log create -f {file}.yaml",
|
|
349
|
-
description: "Create from YAML file",
|
|
350
|
-
use_case: "file_based",
|
|
351
|
-
},
|
|
352
|
-
],
|
|
353
289
|
field_docs: {},
|
|
354
290
|
optional_fields: [],
|
|
355
291
|
performance_impact: {
|
|
@@ -362,6 +298,10 @@ export const blindfoldTools = [
|
|
|
362
298
|
creates: ["audit-log"],
|
|
363
299
|
},
|
|
364
300
|
},
|
|
301
|
+
curlExample: null,
|
|
302
|
+
dependencies: [],
|
|
303
|
+
oneOfGroups: [],
|
|
304
|
+
subscriptionRequirements: [],
|
|
365
305
|
},
|
|
366
306
|
{
|
|
367
307
|
toolName: "f5xc-api-blindfold-decrypt-secret-create",
|
|
@@ -390,18 +330,6 @@ export const blindfoldTools = [
|
|
|
390
330
|
creates: ["decrypt-secret"],
|
|
391
331
|
},
|
|
392
332
|
requiredFields: ["metadata.name", "metadata.namespace"],
|
|
393
|
-
cliExamples: [
|
|
394
|
-
{
|
|
395
|
-
command: "f5xcctl secret_management decrypt-secret create {name} --namespace {namespace}",
|
|
396
|
-
description: "Create decrypt-secret",
|
|
397
|
-
use_case: "basic_create",
|
|
398
|
-
},
|
|
399
|
-
{
|
|
400
|
-
command: "f5xcctl secret_management decrypt-secret create -f {file}.yaml",
|
|
401
|
-
description: "Create from YAML file",
|
|
402
|
-
use_case: "file_based",
|
|
403
|
-
},
|
|
404
|
-
],
|
|
405
333
|
confirmationRequired: false,
|
|
406
334
|
parameterExamples: {},
|
|
407
335
|
validationRules: {},
|
|
@@ -444,18 +372,6 @@ export const blindfoldTools = [
|
|
|
444
372
|
},
|
|
445
373
|
confirmation_required: false,
|
|
446
374
|
danger_level: "medium",
|
|
447
|
-
examples: [
|
|
448
|
-
{
|
|
449
|
-
command: "f5xcctl secret_management decrypt-secret create {name} --namespace {namespace}",
|
|
450
|
-
description: "Create decrypt-secret",
|
|
451
|
-
use_case: "basic_create",
|
|
452
|
-
},
|
|
453
|
-
{
|
|
454
|
-
command: "f5xcctl secret_management decrypt-secret create -f {file}.yaml",
|
|
455
|
-
description: "Create from YAML file",
|
|
456
|
-
use_case: "file_based",
|
|
457
|
-
},
|
|
458
|
-
],
|
|
459
375
|
field_docs: {},
|
|
460
376
|
optional_fields: [],
|
|
461
377
|
performance_impact: {
|
|
@@ -468,6 +384,18 @@ export const blindfoldTools = [
|
|
|
468
384
|
creates: ["decrypt-secret"],
|
|
469
385
|
},
|
|
470
386
|
},
|
|
387
|
+
curlExample: null,
|
|
388
|
+
dependencies: [
|
|
389
|
+
{
|
|
390
|
+
domain: "",
|
|
391
|
+
fieldPath: "policy_document",
|
|
392
|
+
inline: false,
|
|
393
|
+
required: false,
|
|
394
|
+
resourceType: "voltshare-policy-information",
|
|
395
|
+
},
|
|
396
|
+
],
|
|
397
|
+
oneOfGroups: [],
|
|
398
|
+
subscriptionRequirements: [],
|
|
471
399
|
},
|
|
472
400
|
{
|
|
473
401
|
toolName: "f5xc-api-blindfold-get-policy-document-get",
|
|
@@ -515,13 +443,6 @@ export const blindfoldTools = [
|
|
|
515
443
|
dangerLevel: "low",
|
|
516
444
|
sideEffects: null,
|
|
517
445
|
requiredFields: ["path.name", "path.namespace"],
|
|
518
|
-
cliExamples: [
|
|
519
|
-
{
|
|
520
|
-
command: "f5xcctl secret_management get-policy-document get {name} --namespace {namespace}",
|
|
521
|
-
description: "Get specific get-policy-document",
|
|
522
|
-
use_case: "get_specific",
|
|
523
|
-
},
|
|
524
|
-
],
|
|
525
446
|
confirmationRequired: false,
|
|
526
447
|
parameterExamples: {
|
|
527
448
|
name: "Site-secret-policy.",
|
|
@@ -567,13 +488,6 @@ export const blindfoldTools = [
|
|
|
567
488
|
},
|
|
568
489
|
confirmation_required: false,
|
|
569
490
|
danger_level: "low",
|
|
570
|
-
examples: [
|
|
571
|
-
{
|
|
572
|
-
command: "f5xcctl secret_management get-policy-document get {name} --namespace {namespace}",
|
|
573
|
-
description: "Get specific get-policy-document",
|
|
574
|
-
use_case: "get_specific",
|
|
575
|
-
},
|
|
576
|
-
],
|
|
577
491
|
field_docs: {},
|
|
578
492
|
optional_fields: [],
|
|
579
493
|
performance_impact: {
|
|
@@ -584,6 +498,10 @@ export const blindfoldTools = [
|
|
|
584
498
|
required_fields: ["path.name", "path.namespace"],
|
|
585
499
|
side_effects: {},
|
|
586
500
|
},
|
|
501
|
+
curlExample: null,
|
|
502
|
+
dependencies: [],
|
|
503
|
+
oneOfGroups: [],
|
|
504
|
+
subscriptionRequirements: [],
|
|
587
505
|
},
|
|
588
506
|
{
|
|
589
507
|
toolName: "f5xc-api-blindfold-get-public-key-list",
|
|
@@ -621,13 +539,6 @@ export const blindfoldTools = [
|
|
|
621
539
|
dangerLevel: "low",
|
|
622
540
|
sideEffects: null,
|
|
623
541
|
requiredFields: [],
|
|
624
|
-
cliExamples: [
|
|
625
|
-
{
|
|
626
|
-
command: "f5xcctl secret_management get-public-key list --namespace {namespace}",
|
|
627
|
-
description: "List all get-public-keys",
|
|
628
|
-
use_case: "list_all",
|
|
629
|
-
},
|
|
630
|
-
],
|
|
631
542
|
confirmationRequired: false,
|
|
632
543
|
parameterExamples: {
|
|
633
544
|
key_version: "0",
|
|
@@ -672,13 +583,6 @@ export const blindfoldTools = [
|
|
|
672
583
|
},
|
|
673
584
|
confirmation_required: false,
|
|
674
585
|
danger_level: "low",
|
|
675
|
-
examples: [
|
|
676
|
-
{
|
|
677
|
-
command: "f5xcctl secret_management get-public-key list --namespace {namespace}",
|
|
678
|
-
description: "List all get-public-keys",
|
|
679
|
-
use_case: "list_all",
|
|
680
|
-
},
|
|
681
|
-
],
|
|
682
586
|
field_docs: {},
|
|
683
587
|
optional_fields: [],
|
|
684
588
|
performance_impact: {
|
|
@@ -689,6 +593,10 @@ export const blindfoldTools = [
|
|
|
689
593
|
required_fields: [],
|
|
690
594
|
side_effects: {},
|
|
691
595
|
},
|
|
596
|
+
curlExample: null,
|
|
597
|
+
dependencies: [],
|
|
598
|
+
oneOfGroups: [],
|
|
599
|
+
subscriptionRequirements: [],
|
|
692
600
|
},
|
|
693
601
|
{
|
|
694
602
|
toolName: "f5xc-api-blindfold-list-policy-list",
|
|
@@ -736,13 +644,6 @@ export const blindfoldTools = [
|
|
|
736
644
|
dangerLevel: "low",
|
|
737
645
|
sideEffects: null,
|
|
738
646
|
requiredFields: ["path.namespace", "path.policy_state"],
|
|
739
|
-
cliExamples: [
|
|
740
|
-
{
|
|
741
|
-
command: "f5xcctl secret_management list-policy list --namespace {namespace}",
|
|
742
|
-
description: "List all list-policys",
|
|
743
|
-
use_case: "list_all",
|
|
744
|
-
},
|
|
745
|
-
],
|
|
746
647
|
confirmationRequired: false,
|
|
747
648
|
parameterExamples: {
|
|
748
649
|
namespace: "System",
|
|
@@ -788,13 +689,6 @@ export const blindfoldTools = [
|
|
|
788
689
|
},
|
|
789
690
|
confirmation_required: false,
|
|
790
691
|
danger_level: "low",
|
|
791
|
-
examples: [
|
|
792
|
-
{
|
|
793
|
-
command: "f5xcctl secret_management list-policy list --namespace {namespace}",
|
|
794
|
-
description: "List all list-policys",
|
|
795
|
-
use_case: "list_all",
|
|
796
|
-
},
|
|
797
|
-
],
|
|
798
692
|
field_docs: {},
|
|
799
693
|
optional_fields: [],
|
|
800
694
|
performance_impact: {
|
|
@@ -805,6 +699,10 @@ export const blindfoldTools = [
|
|
|
805
699
|
required_fields: ["path.namespace", "path.policy_state"],
|
|
806
700
|
side_effects: {},
|
|
807
701
|
},
|
|
702
|
+
curlExample: null,
|
|
703
|
+
dependencies: [],
|
|
704
|
+
oneOfGroups: [],
|
|
705
|
+
subscriptionRequirements: [],
|
|
808
706
|
},
|
|
809
707
|
{
|
|
810
708
|
toolName: "f5xc-api-blindfold-process-policy-information-create",
|
|
@@ -833,18 +731,6 @@ export const blindfoldTools = [
|
|
|
833
731
|
creates: ["process-policy-information"],
|
|
834
732
|
},
|
|
835
733
|
requiredFields: ["metadata.name", "metadata.namespace"],
|
|
836
|
-
cliExamples: [
|
|
837
|
-
{
|
|
838
|
-
command: "f5xcctl secret_management process-policy-information create -f {file}.yaml",
|
|
839
|
-
description: "Create from YAML file",
|
|
840
|
-
use_case: "file_based",
|
|
841
|
-
},
|
|
842
|
-
{
|
|
843
|
-
command: "f5xcctl secret_management process-policy-information create {name} --namespace {namespace}",
|
|
844
|
-
description: "Create process-policy-information",
|
|
845
|
-
use_case: "basic_create",
|
|
846
|
-
},
|
|
847
|
-
],
|
|
848
734
|
confirmationRequired: false,
|
|
849
735
|
parameterExamples: {},
|
|
850
736
|
validationRules: {},
|
|
@@ -890,18 +776,6 @@ export const blindfoldTools = [
|
|
|
890
776
|
},
|
|
891
777
|
confirmation_required: false,
|
|
892
778
|
danger_level: "medium",
|
|
893
|
-
examples: [
|
|
894
|
-
{
|
|
895
|
-
command: "f5xcctl secret_management process-policy-information create {name} --namespace {namespace}",
|
|
896
|
-
description: "Create process-policy-information",
|
|
897
|
-
use_case: "basic_create",
|
|
898
|
-
},
|
|
899
|
-
{
|
|
900
|
-
command: "f5xcctl secret_management process-policy-information create -f {file}.yaml",
|
|
901
|
-
description: "Create from YAML file",
|
|
902
|
-
use_case: "file_based",
|
|
903
|
-
},
|
|
904
|
-
],
|
|
905
779
|
field_docs: {},
|
|
906
780
|
optional_fields: [],
|
|
907
781
|
performance_impact: {
|
|
@@ -914,6 +788,18 @@ export const blindfoldTools = [
|
|
|
914
788
|
creates: ["process-policy-information"],
|
|
915
789
|
},
|
|
916
790
|
},
|
|
791
|
+
curlExample: null,
|
|
792
|
+
dependencies: [
|
|
793
|
+
{
|
|
794
|
+
domain: "",
|
|
795
|
+
fieldPath: "policy",
|
|
796
|
+
inline: false,
|
|
797
|
+
required: false,
|
|
798
|
+
resourceType: "voltshare-policy",
|
|
799
|
+
},
|
|
800
|
+
],
|
|
801
|
+
oneOfGroups: [],
|
|
802
|
+
subscriptionRequirements: [],
|
|
917
803
|
},
|
|
918
804
|
{
|
|
919
805
|
toolName: "f5xc-api-blindfold-recover-create",
|
|
@@ -965,18 +851,6 @@ export const blindfoldTools = [
|
|
|
965
851
|
creates: ["recover"],
|
|
966
852
|
},
|
|
967
853
|
requiredFields: ["metadata.name", "metadata.namespace", "path.name", "path.namespace"],
|
|
968
|
-
cliExamples: [
|
|
969
|
-
{
|
|
970
|
-
command: "f5xcctl secret_management recover create -f {file}.yaml",
|
|
971
|
-
description: "Create from YAML file",
|
|
972
|
-
use_case: "file_based",
|
|
973
|
-
},
|
|
974
|
-
{
|
|
975
|
-
command: "f5xcctl secret_management recover create {name} --namespace {namespace}",
|
|
976
|
-
description: "Create recover",
|
|
977
|
-
use_case: "basic_create",
|
|
978
|
-
},
|
|
979
|
-
],
|
|
980
854
|
confirmationRequired: false,
|
|
981
855
|
parameterExamples: {
|
|
982
856
|
name: "Site-secret-policy.",
|
|
@@ -1022,18 +896,6 @@ export const blindfoldTools = [
|
|
|
1022
896
|
},
|
|
1023
897
|
confirmation_required: false,
|
|
1024
898
|
danger_level: "medium",
|
|
1025
|
-
examples: [
|
|
1026
|
-
{
|
|
1027
|
-
command: "f5xcctl secret_management recover create {name} --namespace {namespace}",
|
|
1028
|
-
description: "Create recover",
|
|
1029
|
-
use_case: "basic_create",
|
|
1030
|
-
},
|
|
1031
|
-
{
|
|
1032
|
-
command: "f5xcctl secret_management recover create -f {file}.yaml",
|
|
1033
|
-
description: "Create from YAML file",
|
|
1034
|
-
use_case: "file_based",
|
|
1035
|
-
},
|
|
1036
|
-
],
|
|
1037
899
|
field_docs: {},
|
|
1038
900
|
optional_fields: [],
|
|
1039
901
|
performance_impact: {
|
|
@@ -1046,6 +908,10 @@ export const blindfoldTools = [
|
|
|
1046
908
|
creates: ["recover"],
|
|
1047
909
|
},
|
|
1048
910
|
},
|
|
911
|
+
curlExample: null,
|
|
912
|
+
dependencies: [],
|
|
913
|
+
oneOfGroups: [],
|
|
914
|
+
subscriptionRequirements: [],
|
|
1049
915
|
},
|
|
1050
916
|
{
|
|
1051
917
|
toolName: "f5xc-api-blindfold-scroll-create",
|
|
@@ -1086,18 +952,6 @@ export const blindfoldTools = [
|
|
|
1086
952
|
creates: ["scroll"],
|
|
1087
953
|
},
|
|
1088
954
|
requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
|
|
1089
|
-
cliExamples: [
|
|
1090
|
-
{
|
|
1091
|
-
command: "f5xcctl secret_management scroll create -f {file}.yaml",
|
|
1092
|
-
description: "Create from YAML file",
|
|
1093
|
-
use_case: "file_based",
|
|
1094
|
-
},
|
|
1095
|
-
{
|
|
1096
|
-
command: "f5xcctl secret_management scroll create {name} --namespace {namespace}",
|
|
1097
|
-
description: "Create scroll",
|
|
1098
|
-
use_case: "basic_create",
|
|
1099
|
-
},
|
|
1100
|
-
],
|
|
1101
955
|
confirmationRequired: false,
|
|
1102
956
|
parameterExamples: {
|
|
1103
957
|
namespace: "Value",
|
|
@@ -1142,18 +996,6 @@ export const blindfoldTools = [
|
|
|
1142
996
|
},
|
|
1143
997
|
confirmation_required: false,
|
|
1144
998
|
danger_level: "medium",
|
|
1145
|
-
examples: [
|
|
1146
|
-
{
|
|
1147
|
-
command: "f5xcctl secret_management scroll create {name} --namespace {namespace}",
|
|
1148
|
-
description: "Create scroll",
|
|
1149
|
-
use_case: "basic_create",
|
|
1150
|
-
},
|
|
1151
|
-
{
|
|
1152
|
-
command: "f5xcctl secret_management scroll create -f {file}.yaml",
|
|
1153
|
-
description: "Create from YAML file",
|
|
1154
|
-
use_case: "file_based",
|
|
1155
|
-
},
|
|
1156
|
-
],
|
|
1157
999
|
field_docs: {},
|
|
1158
1000
|
optional_fields: [],
|
|
1159
1001
|
performance_impact: {
|
|
@@ -1166,6 +1008,10 @@ export const blindfoldTools = [
|
|
|
1166
1008
|
creates: ["scroll"],
|
|
1167
1009
|
},
|
|
1168
1010
|
},
|
|
1011
|
+
curlExample: null,
|
|
1012
|
+
dependencies: [],
|
|
1013
|
+
oneOfGroups: [],
|
|
1014
|
+
subscriptionRequirements: [],
|
|
1169
1015
|
},
|
|
1170
1016
|
{
|
|
1171
1017
|
toolName: "f5xc-api-blindfold-scroll-list",
|
|
@@ -1214,13 +1060,6 @@ export const blindfoldTools = [
|
|
|
1214
1060
|
dangerLevel: "low",
|
|
1215
1061
|
sideEffects: null,
|
|
1216
1062
|
requiredFields: ["path.namespace"],
|
|
1217
|
-
cliExamples: [
|
|
1218
|
-
{
|
|
1219
|
-
command: "f5xcctl secret_management scroll list --namespace {namespace}",
|
|
1220
|
-
description: "List all scrolls",
|
|
1221
|
-
use_case: "list_all",
|
|
1222
|
-
},
|
|
1223
|
-
],
|
|
1224
1063
|
confirmationRequired: false,
|
|
1225
1064
|
parameterExamples: {
|
|
1226
1065
|
namespace: "Value",
|
|
@@ -1266,13 +1105,6 @@ export const blindfoldTools = [
|
|
|
1266
1105
|
},
|
|
1267
1106
|
confirmation_required: false,
|
|
1268
1107
|
danger_level: "low",
|
|
1269
|
-
examples: [
|
|
1270
|
-
{
|
|
1271
|
-
command: "f5xcctl secret_management scroll list --namespace {namespace}",
|
|
1272
|
-
description: "List all scrolls",
|
|
1273
|
-
use_case: "list_all",
|
|
1274
|
-
},
|
|
1275
|
-
],
|
|
1276
1108
|
field_docs: {},
|
|
1277
1109
|
optional_fields: [],
|
|
1278
1110
|
performance_impact: {
|
|
@@ -1283,6 +1115,10 @@ export const blindfoldTools = [
|
|
|
1283
1115
|
required_fields: ["path.namespace"],
|
|
1284
1116
|
side_effects: {},
|
|
1285
1117
|
},
|
|
1118
|
+
curlExample: null,
|
|
1119
|
+
dependencies: [],
|
|
1120
|
+
oneOfGroups: [],
|
|
1121
|
+
subscriptionRequirements: [],
|
|
1286
1122
|
},
|
|
1287
1123
|
{
|
|
1288
1124
|
toolName: "f5xc-api-blindfold-secret-management-access-create",
|
|
@@ -1323,18 +1159,6 @@ export const blindfoldTools = [
|
|
|
1323
1159
|
creates: ["secret-management-access"],
|
|
1324
1160
|
},
|
|
1325
1161
|
requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
1326
|
-
cliExamples: [
|
|
1327
|
-
{
|
|
1328
|
-
command: "f5xcctl config secret-management-access create -f {file}.yaml",
|
|
1329
|
-
description: "Create from YAML file",
|
|
1330
|
-
use_case: "file_based",
|
|
1331
|
-
},
|
|
1332
|
-
{
|
|
1333
|
-
command: "f5xcctl config secret-management-access create {name} --namespace {namespace}",
|
|
1334
|
-
description: "Create secret-management-access",
|
|
1335
|
-
use_case: "basic_create",
|
|
1336
|
-
},
|
|
1337
|
-
],
|
|
1338
1162
|
confirmationRequired: false,
|
|
1339
1163
|
parameterExamples: {
|
|
1340
1164
|
"metadata.namespace": "Staging",
|
|
@@ -1382,18 +1206,6 @@ export const blindfoldTools = [
|
|
|
1382
1206
|
},
|
|
1383
1207
|
confirmation_required: false,
|
|
1384
1208
|
danger_level: "medium",
|
|
1385
|
-
examples: [
|
|
1386
|
-
{
|
|
1387
|
-
command: "f5xcctl config secret-management-access create {name} --namespace {namespace}",
|
|
1388
|
-
description: "Create secret-management-access",
|
|
1389
|
-
use_case: "basic_create",
|
|
1390
|
-
},
|
|
1391
|
-
{
|
|
1392
|
-
command: "f5xcctl config secret-management-access create -f {file}.yaml",
|
|
1393
|
-
description: "Create from YAML file",
|
|
1394
|
-
use_case: "file_based",
|
|
1395
|
-
},
|
|
1396
|
-
],
|
|
1397
1209
|
field_docs: {},
|
|
1398
1210
|
optional_fields: [],
|
|
1399
1211
|
performance_impact: {
|
|
@@ -1406,6 +1218,32 @@ export const blindfoldTools = [
|
|
|
1406
1218
|
creates: ["secret-management-access"],
|
|
1407
1219
|
},
|
|
1408
1220
|
},
|
|
1221
|
+
curlExample: null,
|
|
1222
|
+
dependencies: [
|
|
1223
|
+
{
|
|
1224
|
+
domain: "",
|
|
1225
|
+
fieldPath: "",
|
|
1226
|
+
inline: false,
|
|
1227
|
+
required: false,
|
|
1228
|
+
resourceType: "secret-management-access",
|
|
1229
|
+
},
|
|
1230
|
+
{
|
|
1231
|
+
domain: "",
|
|
1232
|
+
fieldPath: "metadata",
|
|
1233
|
+
inline: false,
|
|
1234
|
+
required: false,
|
|
1235
|
+
resourceType: "schema-object-create-meta",
|
|
1236
|
+
},
|
|
1237
|
+
{
|
|
1238
|
+
domain: "",
|
|
1239
|
+
fieldPath: "spec",
|
|
1240
|
+
inline: false,
|
|
1241
|
+
required: false,
|
|
1242
|
+
resourceType: "secret-management-access-create",
|
|
1243
|
+
},
|
|
1244
|
+
],
|
|
1245
|
+
oneOfGroups: [],
|
|
1246
|
+
subscriptionRequirements: [],
|
|
1409
1247
|
},
|
|
1410
1248
|
{
|
|
1411
1249
|
toolName: "f5xc-api-blindfold-secret-management-access-delete",
|
|
@@ -1455,13 +1293,6 @@ export const blindfoldTools = [
|
|
|
1455
1293
|
deletes: ["secret-management-access", "contained_resources"],
|
|
1456
1294
|
},
|
|
1457
1295
|
requiredFields: ["path.name", "path.namespace"],
|
|
1458
|
-
cliExamples: [
|
|
1459
|
-
{
|
|
1460
|
-
command: "f5xcctl config secret-management-access delete {name} --namespace {namespace}",
|
|
1461
|
-
description: "Delete secret-management-access",
|
|
1462
|
-
use_case: "delete",
|
|
1463
|
-
},
|
|
1464
|
-
],
|
|
1465
1296
|
confirmationRequired: true,
|
|
1466
1297
|
parameterExamples: {
|
|
1467
1298
|
name: "Name",
|
|
@@ -1507,13 +1338,6 @@ export const blindfoldTools = [
|
|
|
1507
1338
|
},
|
|
1508
1339
|
confirmation_required: true,
|
|
1509
1340
|
danger_level: "high",
|
|
1510
|
-
examples: [
|
|
1511
|
-
{
|
|
1512
|
-
command: "f5xcctl config secret-management-access delete {name} --namespace {namespace}",
|
|
1513
|
-
description: "Delete secret-management-access",
|
|
1514
|
-
use_case: "delete",
|
|
1515
|
-
},
|
|
1516
|
-
],
|
|
1517
1341
|
field_docs: {},
|
|
1518
1342
|
optional_fields: [],
|
|
1519
1343
|
performance_impact: {
|
|
@@ -1526,6 +1350,18 @@ export const blindfoldTools = [
|
|
|
1526
1350
|
deletes: ["secret-management-access", "contained_resources"],
|
|
1527
1351
|
},
|
|
1528
1352
|
},
|
|
1353
|
+
curlExample: null,
|
|
1354
|
+
dependencies: [
|
|
1355
|
+
{
|
|
1356
|
+
domain: "",
|
|
1357
|
+
fieldPath: "",
|
|
1358
|
+
inline: false,
|
|
1359
|
+
required: false,
|
|
1360
|
+
resourceType: "secret-management-access",
|
|
1361
|
+
},
|
|
1362
|
+
],
|
|
1363
|
+
oneOfGroups: [],
|
|
1364
|
+
subscriptionRequirements: [],
|
|
1529
1365
|
},
|
|
1530
1366
|
{
|
|
1531
1367
|
toolName: "f5xc-api-blindfold-secret-management-access-get",
|
|
@@ -1594,13 +1430,6 @@ export const blindfoldTools = [
|
|
|
1594
1430
|
dangerLevel: "low",
|
|
1595
1431
|
sideEffects: null,
|
|
1596
1432
|
requiredFields: ["path.name", "path.namespace"],
|
|
1597
|
-
cliExamples: [
|
|
1598
|
-
{
|
|
1599
|
-
command: "f5xcctl config secret-management-access get {name} --namespace {namespace}",
|
|
1600
|
-
description: "Get specific secret-management-access",
|
|
1601
|
-
use_case: "get_specific",
|
|
1602
|
-
},
|
|
1603
|
-
],
|
|
1604
1433
|
confirmationRequired: false,
|
|
1605
1434
|
parameterExamples: {
|
|
1606
1435
|
name: "Name",
|
|
@@ -1646,13 +1475,6 @@ export const blindfoldTools = [
|
|
|
1646
1475
|
},
|
|
1647
1476
|
confirmation_required: false,
|
|
1648
1477
|
danger_level: "low",
|
|
1649
|
-
examples: [
|
|
1650
|
-
{
|
|
1651
|
-
command: "f5xcctl config secret-management-access get {name} --namespace {namespace}",
|
|
1652
|
-
description: "Get specific secret-management-access",
|
|
1653
|
-
use_case: "get_specific",
|
|
1654
|
-
},
|
|
1655
|
-
],
|
|
1656
1478
|
field_docs: {},
|
|
1657
1479
|
optional_fields: [],
|
|
1658
1480
|
performance_impact: {
|
|
@@ -1663,6 +1485,10 @@ export const blindfoldTools = [
|
|
|
1663
1485
|
required_fields: ["path.name", "path.namespace"],
|
|
1664
1486
|
side_effects: {},
|
|
1665
1487
|
},
|
|
1488
|
+
curlExample: null,
|
|
1489
|
+
dependencies: [],
|
|
1490
|
+
oneOfGroups: [],
|
|
1491
|
+
subscriptionRequirements: [],
|
|
1666
1492
|
},
|
|
1667
1493
|
{
|
|
1668
1494
|
toolName: "f5xc-api-blindfold-secret-management-access-list",
|
|
@@ -1737,13 +1563,6 @@ export const blindfoldTools = [
|
|
|
1737
1563
|
dangerLevel: "low",
|
|
1738
1564
|
sideEffects: null,
|
|
1739
1565
|
requiredFields: ["path.namespace"],
|
|
1740
|
-
cliExamples: [
|
|
1741
|
-
{
|
|
1742
|
-
command: "f5xcctl config secret-management-access list --namespace {namespace}",
|
|
1743
|
-
description: "List all secret-management-accesss",
|
|
1744
|
-
use_case: "list_all",
|
|
1745
|
-
},
|
|
1746
|
-
],
|
|
1747
1566
|
confirmationRequired: false,
|
|
1748
1567
|
parameterExamples: {
|
|
1749
1568
|
label_filter: "Env in (staging, testing), tier in (web, db)",
|
|
@@ -1789,13 +1608,6 @@ export const blindfoldTools = [
|
|
|
1789
1608
|
},
|
|
1790
1609
|
confirmation_required: false,
|
|
1791
1610
|
danger_level: "low",
|
|
1792
|
-
examples: [
|
|
1793
|
-
{
|
|
1794
|
-
command: "f5xcctl config secret-management-access list --namespace {namespace}",
|
|
1795
|
-
description: "List all secret-management-accesss",
|
|
1796
|
-
use_case: "list_all",
|
|
1797
|
-
},
|
|
1798
|
-
],
|
|
1799
1611
|
field_docs: {},
|
|
1800
1612
|
optional_fields: [],
|
|
1801
1613
|
performance_impact: {
|
|
@@ -1806,6 +1618,10 @@ export const blindfoldTools = [
|
|
|
1806
1618
|
required_fields: ["path.namespace"],
|
|
1807
1619
|
side_effects: {},
|
|
1808
1620
|
},
|
|
1621
|
+
curlExample: null,
|
|
1622
|
+
dependencies: [],
|
|
1623
|
+
oneOfGroups: [],
|
|
1624
|
+
subscriptionRequirements: [],
|
|
1809
1625
|
},
|
|
1810
1626
|
{
|
|
1811
1627
|
toolName: "f5xc-api-blindfold-secret-management-access-update",
|
|
@@ -1857,13 +1673,6 @@ export const blindfoldTools = [
|
|
|
1857
1673
|
modifies: ["secret-management-access"],
|
|
1858
1674
|
},
|
|
1859
1675
|
requiredFields: ["path.metadata.name", "path.metadata.namespace"],
|
|
1860
|
-
cliExamples: [
|
|
1861
|
-
{
|
|
1862
|
-
command: "f5xcctl config secret-management-access update {name} --namespace {namespace} -f {file}.yaml",
|
|
1863
|
-
description: "Update secret-management-access",
|
|
1864
|
-
use_case: "update",
|
|
1865
|
-
},
|
|
1866
|
-
],
|
|
1867
1676
|
confirmationRequired: false,
|
|
1868
1677
|
parameterExamples: {
|
|
1869
1678
|
"metadata.name": "Example-corp-web.",
|
|
@@ -1909,13 +1718,6 @@ export const blindfoldTools = [
|
|
|
1909
1718
|
},
|
|
1910
1719
|
confirmation_required: false,
|
|
1911
1720
|
danger_level: "medium",
|
|
1912
|
-
examples: [
|
|
1913
|
-
{
|
|
1914
|
-
command: "f5xcctl config secret-management-access update {name} --namespace {namespace} -f {file}.yaml",
|
|
1915
|
-
description: "Update secret-management-access",
|
|
1916
|
-
use_case: "update",
|
|
1917
|
-
},
|
|
1918
|
-
],
|
|
1919
1721
|
field_docs: {},
|
|
1920
1722
|
optional_fields: [],
|
|
1921
1723
|
performance_impact: {
|
|
@@ -1928,6 +1730,32 @@ export const blindfoldTools = [
|
|
|
1928
1730
|
modifies: ["secret-management-access"],
|
|
1929
1731
|
},
|
|
1930
1732
|
},
|
|
1733
|
+
curlExample: null,
|
|
1734
|
+
dependencies: [
|
|
1735
|
+
{
|
|
1736
|
+
domain: "",
|
|
1737
|
+
fieldPath: "",
|
|
1738
|
+
inline: false,
|
|
1739
|
+
required: false,
|
|
1740
|
+
resourceType: "secret-management-access",
|
|
1741
|
+
},
|
|
1742
|
+
{
|
|
1743
|
+
domain: "",
|
|
1744
|
+
fieldPath: "metadata",
|
|
1745
|
+
inline: false,
|
|
1746
|
+
required: false,
|
|
1747
|
+
resourceType: "schema-object-replace-meta",
|
|
1748
|
+
},
|
|
1749
|
+
{
|
|
1750
|
+
domain: "",
|
|
1751
|
+
fieldPath: "spec",
|
|
1752
|
+
inline: false,
|
|
1753
|
+
required: false,
|
|
1754
|
+
resourceType: "secret-management-access-replace",
|
|
1755
|
+
},
|
|
1756
|
+
],
|
|
1757
|
+
oneOfGroups: [],
|
|
1758
|
+
subscriptionRequirements: [],
|
|
1931
1759
|
},
|
|
1932
1760
|
{
|
|
1933
1761
|
toolName: "f5xc-api-blindfold-secret-policy-create",
|
|
@@ -1968,18 +1796,6 @@ export const blindfoldTools = [
|
|
|
1968
1796
|
creates: ["secret-policy"],
|
|
1969
1797
|
},
|
|
1970
1798
|
requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
1971
|
-
cliExamples: [
|
|
1972
|
-
{
|
|
1973
|
-
command: "f5xcctl secret_management secret-policy create -f {file}.yaml",
|
|
1974
|
-
description: "Create from YAML file",
|
|
1975
|
-
use_case: "file_based",
|
|
1976
|
-
},
|
|
1977
|
-
{
|
|
1978
|
-
command: "f5xcctl secret_management secret-policy create {name} --namespace {namespace}",
|
|
1979
|
-
description: "Create secret-policy",
|
|
1980
|
-
use_case: "basic_create",
|
|
1981
|
-
},
|
|
1982
|
-
],
|
|
1983
1799
|
confirmationRequired: false,
|
|
1984
1800
|
parameterExamples: {
|
|
1985
1801
|
"metadata.namespace": "Staging",
|
|
@@ -2024,18 +1840,6 @@ export const blindfoldTools = [
|
|
|
2024
1840
|
},
|
|
2025
1841
|
confirmation_required: false,
|
|
2026
1842
|
danger_level: "medium",
|
|
2027
|
-
examples: [
|
|
2028
|
-
{
|
|
2029
|
-
command: "f5xcctl secret_management secret-policy create {name} --namespace {namespace}",
|
|
2030
|
-
description: "Create secret-policy",
|
|
2031
|
-
use_case: "basic_create",
|
|
2032
|
-
},
|
|
2033
|
-
{
|
|
2034
|
-
command: "f5xcctl secret_management secret-policy create -f {file}.yaml",
|
|
2035
|
-
description: "Create from YAML file",
|
|
2036
|
-
use_case: "file_based",
|
|
2037
|
-
},
|
|
2038
|
-
],
|
|
2039
1843
|
field_docs: {},
|
|
2040
1844
|
optional_fields: [],
|
|
2041
1845
|
performance_impact: {
|
|
@@ -2048,6 +1852,32 @@ export const blindfoldTools = [
|
|
|
2048
1852
|
creates: ["secret-policy"],
|
|
2049
1853
|
},
|
|
2050
1854
|
},
|
|
1855
|
+
curlExample: null,
|
|
1856
|
+
dependencies: [
|
|
1857
|
+
{
|
|
1858
|
+
domain: "",
|
|
1859
|
+
fieldPath: "",
|
|
1860
|
+
inline: false,
|
|
1861
|
+
required: false,
|
|
1862
|
+
resourceType: "secret-policy",
|
|
1863
|
+
},
|
|
1864
|
+
{
|
|
1865
|
+
domain: "",
|
|
1866
|
+
fieldPath: "metadata",
|
|
1867
|
+
inline: false,
|
|
1868
|
+
required: false,
|
|
1869
|
+
resourceType: "schema-object-create-meta",
|
|
1870
|
+
},
|
|
1871
|
+
{
|
|
1872
|
+
domain: "",
|
|
1873
|
+
fieldPath: "spec",
|
|
1874
|
+
inline: false,
|
|
1875
|
+
required: false,
|
|
1876
|
+
resourceType: "schemasecret-policy-create",
|
|
1877
|
+
},
|
|
1878
|
+
],
|
|
1879
|
+
oneOfGroups: [],
|
|
1880
|
+
subscriptionRequirements: [],
|
|
2051
1881
|
},
|
|
2052
1882
|
{
|
|
2053
1883
|
toolName: "f5xc-api-blindfold-secret-policy-delete",
|
|
@@ -2097,13 +1927,6 @@ export const blindfoldTools = [
|
|
|
2097
1927
|
deletes: ["secret-policy", "contained_resources"],
|
|
2098
1928
|
},
|
|
2099
1929
|
requiredFields: ["path.name", "path.namespace"],
|
|
2100
|
-
cliExamples: [
|
|
2101
|
-
{
|
|
2102
|
-
command: "f5xcctl secret_management secret-policy delete {name} --namespace {namespace}",
|
|
2103
|
-
description: "Delete secret-policy",
|
|
2104
|
-
use_case: "delete",
|
|
2105
|
-
},
|
|
2106
|
-
],
|
|
2107
1930
|
confirmationRequired: true,
|
|
2108
1931
|
parameterExamples: {
|
|
2109
1932
|
name: "Name",
|
|
@@ -2149,13 +1972,6 @@ export const blindfoldTools = [
|
|
|
2149
1972
|
},
|
|
2150
1973
|
confirmation_required: true,
|
|
2151
1974
|
danger_level: "high",
|
|
2152
|
-
examples: [
|
|
2153
|
-
{
|
|
2154
|
-
command: "f5xcctl secret_management secret-policy delete {name} --namespace {namespace}",
|
|
2155
|
-
description: "Delete secret-policy",
|
|
2156
|
-
use_case: "delete",
|
|
2157
|
-
},
|
|
2158
|
-
],
|
|
2159
1975
|
field_docs: {},
|
|
2160
1976
|
optional_fields: [],
|
|
2161
1977
|
performance_impact: {
|
|
@@ -2168,6 +1984,18 @@ export const blindfoldTools = [
|
|
|
2168
1984
|
deletes: ["secret-policy", "contained_resources"],
|
|
2169
1985
|
},
|
|
2170
1986
|
},
|
|
1987
|
+
curlExample: null,
|
|
1988
|
+
dependencies: [
|
|
1989
|
+
{
|
|
1990
|
+
domain: "",
|
|
1991
|
+
fieldPath: "",
|
|
1992
|
+
inline: false,
|
|
1993
|
+
required: false,
|
|
1994
|
+
resourceType: "secret-policy",
|
|
1995
|
+
},
|
|
1996
|
+
],
|
|
1997
|
+
oneOfGroups: [],
|
|
1998
|
+
subscriptionRequirements: [],
|
|
2171
1999
|
},
|
|
2172
2000
|
{
|
|
2173
2001
|
toolName: "f5xc-api-blindfold-secret-policy-get",
|
|
@@ -2236,13 +2064,6 @@ export const blindfoldTools = [
|
|
|
2236
2064
|
dangerLevel: "low",
|
|
2237
2065
|
sideEffects: null,
|
|
2238
2066
|
requiredFields: ["path.name", "path.namespace"],
|
|
2239
|
-
cliExamples: [
|
|
2240
|
-
{
|
|
2241
|
-
command: "f5xcctl secret_management secret-policy get {name} --namespace {namespace}",
|
|
2242
|
-
description: "Get specific secret-policy",
|
|
2243
|
-
use_case: "get_specific",
|
|
2244
|
-
},
|
|
2245
|
-
],
|
|
2246
2067
|
confirmationRequired: false,
|
|
2247
2068
|
parameterExamples: {
|
|
2248
2069
|
name: "Name",
|
|
@@ -2288,13 +2109,6 @@ export const blindfoldTools = [
|
|
|
2288
2109
|
},
|
|
2289
2110
|
confirmation_required: false,
|
|
2290
2111
|
danger_level: "low",
|
|
2291
|
-
examples: [
|
|
2292
|
-
{
|
|
2293
|
-
command: "f5xcctl secret_management secret-policy get {name} --namespace {namespace}",
|
|
2294
|
-
description: "Get specific secret-policy",
|
|
2295
|
-
use_case: "get_specific",
|
|
2296
|
-
},
|
|
2297
|
-
],
|
|
2298
2112
|
field_docs: {},
|
|
2299
2113
|
optional_fields: [],
|
|
2300
2114
|
performance_impact: {
|
|
@@ -2305,6 +2119,10 @@ export const blindfoldTools = [
|
|
|
2305
2119
|
required_fields: ["path.name", "path.namespace"],
|
|
2306
2120
|
side_effects: {},
|
|
2307
2121
|
},
|
|
2122
|
+
curlExample: null,
|
|
2123
|
+
dependencies: [],
|
|
2124
|
+
oneOfGroups: [],
|
|
2125
|
+
subscriptionRequirements: [],
|
|
2308
2126
|
},
|
|
2309
2127
|
{
|
|
2310
2128
|
toolName: "f5xc-api-blindfold-secret-policy-list",
|
|
@@ -2379,13 +2197,6 @@ export const blindfoldTools = [
|
|
|
2379
2197
|
dangerLevel: "low",
|
|
2380
2198
|
sideEffects: null,
|
|
2381
2199
|
requiredFields: ["path.namespace"],
|
|
2382
|
-
cliExamples: [
|
|
2383
|
-
{
|
|
2384
|
-
command: "f5xcctl secret_management secret-policy list --namespace {namespace}",
|
|
2385
|
-
description: "List all secret-policys",
|
|
2386
|
-
use_case: "list_all",
|
|
2387
|
-
},
|
|
2388
|
-
],
|
|
2389
2200
|
confirmationRequired: false,
|
|
2390
2201
|
parameterExamples: {
|
|
2391
2202
|
label_filter: "Env in (staging, testing), tier in (web, db)",
|
|
@@ -2431,13 +2242,6 @@ export const blindfoldTools = [
|
|
|
2431
2242
|
},
|
|
2432
2243
|
confirmation_required: false,
|
|
2433
2244
|
danger_level: "low",
|
|
2434
|
-
examples: [
|
|
2435
|
-
{
|
|
2436
|
-
command: "f5xcctl secret_management secret-policy list --namespace {namespace}",
|
|
2437
|
-
description: "List all secret-policys",
|
|
2438
|
-
use_case: "list_all",
|
|
2439
|
-
},
|
|
2440
|
-
],
|
|
2441
2245
|
field_docs: {},
|
|
2442
2246
|
optional_fields: [],
|
|
2443
2247
|
performance_impact: {
|
|
@@ -2448,6 +2252,10 @@ export const blindfoldTools = [
|
|
|
2448
2252
|
required_fields: ["path.namespace"],
|
|
2449
2253
|
side_effects: {},
|
|
2450
2254
|
},
|
|
2255
|
+
curlExample: null,
|
|
2256
|
+
dependencies: [],
|
|
2257
|
+
oneOfGroups: [],
|
|
2258
|
+
subscriptionRequirements: [],
|
|
2451
2259
|
},
|
|
2452
2260
|
{
|
|
2453
2261
|
toolName: "f5xc-api-blindfold-secret-policy-rule-create",
|
|
@@ -2488,18 +2296,6 @@ export const blindfoldTools = [
|
|
|
2488
2296
|
creates: ["secret-policy-rule"],
|
|
2489
2297
|
},
|
|
2490
2298
|
requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
2491
|
-
cliExamples: [
|
|
2492
|
-
{
|
|
2493
|
-
command: "f5xcctl secret_management secret-policy-rule create -f {file}.yaml",
|
|
2494
|
-
description: "Create from YAML file",
|
|
2495
|
-
use_case: "file_based",
|
|
2496
|
-
},
|
|
2497
|
-
{
|
|
2498
|
-
command: "f5xcctl secret_management secret-policy-rule create {name} --namespace {namespace}",
|
|
2499
|
-
description: "Create secret-policy-rule",
|
|
2500
|
-
use_case: "basic_create",
|
|
2501
|
-
},
|
|
2502
|
-
],
|
|
2503
2299
|
confirmationRequired: false,
|
|
2504
2300
|
parameterExamples: {
|
|
2505
2301
|
"metadata.namespace": "Staging",
|
|
@@ -2547,18 +2343,6 @@ export const blindfoldTools = [
|
|
|
2547
2343
|
},
|
|
2548
2344
|
confirmation_required: false,
|
|
2549
2345
|
danger_level: "medium",
|
|
2550
|
-
examples: [
|
|
2551
|
-
{
|
|
2552
|
-
command: "f5xcctl secret_management secret-policy-rule create {name} --namespace {namespace}",
|
|
2553
|
-
description: "Create secret-policy-rule",
|
|
2554
|
-
use_case: "basic_create",
|
|
2555
|
-
},
|
|
2556
|
-
{
|
|
2557
|
-
command: "f5xcctl secret_management secret-policy-rule create -f {file}.yaml",
|
|
2558
|
-
description: "Create from YAML file",
|
|
2559
|
-
use_case: "file_based",
|
|
2560
|
-
},
|
|
2561
|
-
],
|
|
2562
2346
|
field_docs: {},
|
|
2563
2347
|
optional_fields: [],
|
|
2564
2348
|
performance_impact: {
|
|
@@ -2571,6 +2355,32 @@ export const blindfoldTools = [
|
|
|
2571
2355
|
creates: ["secret-policy-rule"],
|
|
2572
2356
|
},
|
|
2573
2357
|
},
|
|
2358
|
+
curlExample: null,
|
|
2359
|
+
dependencies: [
|
|
2360
|
+
{
|
|
2361
|
+
domain: "",
|
|
2362
|
+
fieldPath: "",
|
|
2363
|
+
inline: false,
|
|
2364
|
+
required: false,
|
|
2365
|
+
resourceType: "secret-policy-rule",
|
|
2366
|
+
},
|
|
2367
|
+
{
|
|
2368
|
+
domain: "",
|
|
2369
|
+
fieldPath: "metadata",
|
|
2370
|
+
inline: false,
|
|
2371
|
+
required: false,
|
|
2372
|
+
resourceType: "schema-object-create-meta",
|
|
2373
|
+
},
|
|
2374
|
+
{
|
|
2375
|
+
domain: "",
|
|
2376
|
+
fieldPath: "spec",
|
|
2377
|
+
inline: false,
|
|
2378
|
+
required: false,
|
|
2379
|
+
resourceType: "schemasecret-policy-rule-create",
|
|
2380
|
+
},
|
|
2381
|
+
],
|
|
2382
|
+
oneOfGroups: [],
|
|
2383
|
+
subscriptionRequirements: [],
|
|
2574
2384
|
},
|
|
2575
2385
|
{
|
|
2576
2386
|
toolName: "f5xc-api-blindfold-secret-policy-rule-delete",
|
|
@@ -2620,13 +2430,6 @@ export const blindfoldTools = [
|
|
|
2620
2430
|
deletes: ["secret-policy-rule", "contained_resources"],
|
|
2621
2431
|
},
|
|
2622
2432
|
requiredFields: ["path.name", "path.namespace"],
|
|
2623
|
-
cliExamples: [
|
|
2624
|
-
{
|
|
2625
|
-
command: "f5xcctl secret_management secret-policy-rule delete {name} --namespace {namespace}",
|
|
2626
|
-
description: "Delete secret-policy-rule",
|
|
2627
|
-
use_case: "delete",
|
|
2628
|
-
},
|
|
2629
|
-
],
|
|
2630
2433
|
confirmationRequired: true,
|
|
2631
2434
|
parameterExamples: {
|
|
2632
2435
|
name: "Name",
|
|
@@ -2672,13 +2475,6 @@ export const blindfoldTools = [
|
|
|
2672
2475
|
},
|
|
2673
2476
|
confirmation_required: true,
|
|
2674
2477
|
danger_level: "high",
|
|
2675
|
-
examples: [
|
|
2676
|
-
{
|
|
2677
|
-
command: "f5xcctl secret_management secret-policy-rule delete {name} --namespace {namespace}",
|
|
2678
|
-
description: "Delete secret-policy-rule",
|
|
2679
|
-
use_case: "delete",
|
|
2680
|
-
},
|
|
2681
|
-
],
|
|
2682
2478
|
field_docs: {},
|
|
2683
2479
|
optional_fields: [],
|
|
2684
2480
|
performance_impact: {
|
|
@@ -2691,6 +2487,18 @@ export const blindfoldTools = [
|
|
|
2691
2487
|
deletes: ["secret-policy-rule", "contained_resources"],
|
|
2692
2488
|
},
|
|
2693
2489
|
},
|
|
2490
|
+
curlExample: null,
|
|
2491
|
+
dependencies: [
|
|
2492
|
+
{
|
|
2493
|
+
domain: "",
|
|
2494
|
+
fieldPath: "",
|
|
2495
|
+
inline: false,
|
|
2496
|
+
required: false,
|
|
2497
|
+
resourceType: "secret-policy-rule",
|
|
2498
|
+
},
|
|
2499
|
+
],
|
|
2500
|
+
oneOfGroups: [],
|
|
2501
|
+
subscriptionRequirements: [],
|
|
2694
2502
|
},
|
|
2695
2503
|
{
|
|
2696
2504
|
toolName: "f5xc-api-blindfold-secret-policy-rule-get",
|
|
@@ -2759,13 +2567,6 @@ export const blindfoldTools = [
|
|
|
2759
2567
|
dangerLevel: "low",
|
|
2760
2568
|
sideEffects: null,
|
|
2761
2569
|
requiredFields: ["path.name", "path.namespace"],
|
|
2762
|
-
cliExamples: [
|
|
2763
|
-
{
|
|
2764
|
-
command: "f5xcctl secret_management secret-policy-rule get {name} --namespace {namespace}",
|
|
2765
|
-
description: "Get specific secret-policy-rule",
|
|
2766
|
-
use_case: "get_specific",
|
|
2767
|
-
},
|
|
2768
|
-
],
|
|
2769
2570
|
confirmationRequired: false,
|
|
2770
2571
|
parameterExamples: {
|
|
2771
2572
|
name: "Name",
|
|
@@ -2811,13 +2612,6 @@ export const blindfoldTools = [
|
|
|
2811
2612
|
},
|
|
2812
2613
|
confirmation_required: false,
|
|
2813
2614
|
danger_level: "low",
|
|
2814
|
-
examples: [
|
|
2815
|
-
{
|
|
2816
|
-
command: "f5xcctl secret_management secret-policy-rule get {name} --namespace {namespace}",
|
|
2817
|
-
description: "Get specific secret-policy-rule",
|
|
2818
|
-
use_case: "get_specific",
|
|
2819
|
-
},
|
|
2820
|
-
],
|
|
2821
2615
|
field_docs: {},
|
|
2822
2616
|
optional_fields: [],
|
|
2823
2617
|
performance_impact: {
|
|
@@ -2828,6 +2622,10 @@ export const blindfoldTools = [
|
|
|
2828
2622
|
required_fields: ["path.name", "path.namespace"],
|
|
2829
2623
|
side_effects: {},
|
|
2830
2624
|
},
|
|
2625
|
+
curlExample: null,
|
|
2626
|
+
dependencies: [],
|
|
2627
|
+
oneOfGroups: [],
|
|
2628
|
+
subscriptionRequirements: [],
|
|
2831
2629
|
},
|
|
2832
2630
|
{
|
|
2833
2631
|
toolName: "f5xc-api-blindfold-secret-policy-rule-list",
|
|
@@ -2902,13 +2700,6 @@ export const blindfoldTools = [
|
|
|
2902
2700
|
dangerLevel: "low",
|
|
2903
2701
|
sideEffects: null,
|
|
2904
2702
|
requiredFields: ["path.namespace"],
|
|
2905
|
-
cliExamples: [
|
|
2906
|
-
{
|
|
2907
|
-
command: "f5xcctl secret_management secret-policy-rule list --namespace {namespace}",
|
|
2908
|
-
description: "List all secret-policy-rules",
|
|
2909
|
-
use_case: "list_all",
|
|
2910
|
-
},
|
|
2911
|
-
],
|
|
2912
2703
|
confirmationRequired: false,
|
|
2913
2704
|
parameterExamples: {
|
|
2914
2705
|
label_filter: "Env in (staging, testing), tier in (web, db)",
|
|
@@ -2954,13 +2745,6 @@ export const blindfoldTools = [
|
|
|
2954
2745
|
},
|
|
2955
2746
|
confirmation_required: false,
|
|
2956
2747
|
danger_level: "low",
|
|
2957
|
-
examples: [
|
|
2958
|
-
{
|
|
2959
|
-
command: "f5xcctl secret_management secret-policy-rule list --namespace {namespace}",
|
|
2960
|
-
description: "List all secret-policy-rules",
|
|
2961
|
-
use_case: "list_all",
|
|
2962
|
-
},
|
|
2963
|
-
],
|
|
2964
2748
|
field_docs: {},
|
|
2965
2749
|
optional_fields: [],
|
|
2966
2750
|
performance_impact: {
|
|
@@ -2971,6 +2755,10 @@ export const blindfoldTools = [
|
|
|
2971
2755
|
required_fields: ["path.namespace"],
|
|
2972
2756
|
side_effects: {},
|
|
2973
2757
|
},
|
|
2758
|
+
curlExample: null,
|
|
2759
|
+
dependencies: [],
|
|
2760
|
+
oneOfGroups: [],
|
|
2761
|
+
subscriptionRequirements: [],
|
|
2974
2762
|
},
|
|
2975
2763
|
{
|
|
2976
2764
|
toolName: "f5xc-api-blindfold-secret-policy-rule-update",
|
|
@@ -3022,13 +2810,6 @@ export const blindfoldTools = [
|
|
|
3022
2810
|
modifies: ["secret-policy-rule"],
|
|
3023
2811
|
},
|
|
3024
2812
|
requiredFields: ["path.metadata.name", "path.metadata.namespace"],
|
|
3025
|
-
cliExamples: [
|
|
3026
|
-
{
|
|
3027
|
-
command: "f5xcctl secret_management secret-policy-rule update {name} --namespace {namespace} -f {file}.yaml",
|
|
3028
|
-
description: "Update secret-policy-rule",
|
|
3029
|
-
use_case: "update",
|
|
3030
|
-
},
|
|
3031
|
-
],
|
|
3032
2813
|
confirmationRequired: false,
|
|
3033
2814
|
parameterExamples: {
|
|
3034
2815
|
"metadata.name": "Example-corp-web.",
|
|
@@ -3074,13 +2855,6 @@ export const blindfoldTools = [
|
|
|
3074
2855
|
},
|
|
3075
2856
|
confirmation_required: false,
|
|
3076
2857
|
danger_level: "medium",
|
|
3077
|
-
examples: [
|
|
3078
|
-
{
|
|
3079
|
-
command: "f5xcctl secret_management secret-policy-rule update {name} --namespace {namespace} -f {file}.yaml",
|
|
3080
|
-
description: "Update secret-policy-rule",
|
|
3081
|
-
use_case: "update",
|
|
3082
|
-
},
|
|
3083
|
-
],
|
|
3084
2858
|
field_docs: {},
|
|
3085
2859
|
optional_fields: [],
|
|
3086
2860
|
performance_impact: {
|
|
@@ -3093,6 +2867,32 @@ export const blindfoldTools = [
|
|
|
3093
2867
|
modifies: ["secret-policy-rule"],
|
|
3094
2868
|
},
|
|
3095
2869
|
},
|
|
2870
|
+
curlExample: null,
|
|
2871
|
+
dependencies: [
|
|
2872
|
+
{
|
|
2873
|
+
domain: "",
|
|
2874
|
+
fieldPath: "",
|
|
2875
|
+
inline: false,
|
|
2876
|
+
required: false,
|
|
2877
|
+
resourceType: "secret-policy-rule",
|
|
2878
|
+
},
|
|
2879
|
+
{
|
|
2880
|
+
domain: "",
|
|
2881
|
+
fieldPath: "metadata",
|
|
2882
|
+
inline: false,
|
|
2883
|
+
required: false,
|
|
2884
|
+
resourceType: "schema-object-replace-meta",
|
|
2885
|
+
},
|
|
2886
|
+
{
|
|
2887
|
+
domain: "",
|
|
2888
|
+
fieldPath: "spec",
|
|
2889
|
+
inline: false,
|
|
2890
|
+
required: false,
|
|
2891
|
+
resourceType: "schemasecret-policy-rule-replace",
|
|
2892
|
+
},
|
|
2893
|
+
],
|
|
2894
|
+
oneOfGroups: [],
|
|
2895
|
+
subscriptionRequirements: [],
|
|
3096
2896
|
},
|
|
3097
2897
|
{
|
|
3098
2898
|
toolName: "f5xc-api-blindfold-secret-policy-update",
|
|
@@ -3144,13 +2944,6 @@ export const blindfoldTools = [
|
|
|
3144
2944
|
modifies: ["secret-policy"],
|
|
3145
2945
|
},
|
|
3146
2946
|
requiredFields: ["path.metadata.name", "path.metadata.namespace"],
|
|
3147
|
-
cliExamples: [
|
|
3148
|
-
{
|
|
3149
|
-
command: "f5xcctl secret_management secret-policy update {name} --namespace {namespace} -f {file}.yaml",
|
|
3150
|
-
description: "Update secret-policy",
|
|
3151
|
-
use_case: "update",
|
|
3152
|
-
},
|
|
3153
|
-
],
|
|
3154
2947
|
confirmationRequired: false,
|
|
3155
2948
|
parameterExamples: {
|
|
3156
2949
|
"metadata.name": "Example-corp-web.",
|
|
@@ -3196,13 +2989,6 @@ export const blindfoldTools = [
|
|
|
3196
2989
|
},
|
|
3197
2990
|
confirmation_required: false,
|
|
3198
2991
|
danger_level: "medium",
|
|
3199
|
-
examples: [
|
|
3200
|
-
{
|
|
3201
|
-
command: "f5xcctl secret_management secret-policy update {name} --namespace {namespace} -f {file}.yaml",
|
|
3202
|
-
description: "Update secret-policy",
|
|
3203
|
-
use_case: "update",
|
|
3204
|
-
},
|
|
3205
|
-
],
|
|
3206
2992
|
field_docs: {},
|
|
3207
2993
|
optional_fields: [],
|
|
3208
2994
|
performance_impact: {
|
|
@@ -3215,6 +3001,32 @@ export const blindfoldTools = [
|
|
|
3215
3001
|
modifies: ["secret-policy"],
|
|
3216
3002
|
},
|
|
3217
3003
|
},
|
|
3004
|
+
curlExample: null,
|
|
3005
|
+
dependencies: [
|
|
3006
|
+
{
|
|
3007
|
+
domain: "",
|
|
3008
|
+
fieldPath: "",
|
|
3009
|
+
inline: false,
|
|
3010
|
+
required: false,
|
|
3011
|
+
resourceType: "secret-policy",
|
|
3012
|
+
},
|
|
3013
|
+
{
|
|
3014
|
+
domain: "",
|
|
3015
|
+
fieldPath: "metadata",
|
|
3016
|
+
inline: false,
|
|
3017
|
+
required: false,
|
|
3018
|
+
resourceType: "schema-object-replace-meta",
|
|
3019
|
+
},
|
|
3020
|
+
{
|
|
3021
|
+
domain: "",
|
|
3022
|
+
fieldPath: "spec",
|
|
3023
|
+
inline: false,
|
|
3024
|
+
required: false,
|
|
3025
|
+
resourceType: "schemasecret-policy-replace",
|
|
3026
|
+
},
|
|
3027
|
+
],
|
|
3028
|
+
oneOfGroups: [],
|
|
3029
|
+
subscriptionRequirements: [],
|
|
3218
3030
|
},
|
|
3219
3031
|
{
|
|
3220
3032
|
toolName: "f5xc-api-blindfold-softdelete-create",
|
|
@@ -3266,18 +3078,6 @@ export const blindfoldTools = [
|
|
|
3266
3078
|
creates: ["softdelete"],
|
|
3267
3079
|
},
|
|
3268
3080
|
requiredFields: ["metadata.name", "metadata.namespace", "path.name", "path.namespace"],
|
|
3269
|
-
cliExamples: [
|
|
3270
|
-
{
|
|
3271
|
-
command: "f5xcctl secret_management softdelete create -f {file}.yaml",
|
|
3272
|
-
description: "Create from YAML file",
|
|
3273
|
-
use_case: "file_based",
|
|
3274
|
-
},
|
|
3275
|
-
{
|
|
3276
|
-
command: "f5xcctl secret_management softdelete create {name} --namespace {namespace}",
|
|
3277
|
-
description: "Create softdelete",
|
|
3278
|
-
use_case: "basic_create",
|
|
3279
|
-
},
|
|
3280
|
-
],
|
|
3281
3081
|
confirmationRequired: false,
|
|
3282
3082
|
parameterExamples: {
|
|
3283
3083
|
name: "Site-secret-policy.",
|
|
@@ -3323,18 +3123,6 @@ export const blindfoldTools = [
|
|
|
3323
3123
|
},
|
|
3324
3124
|
confirmation_required: false,
|
|
3325
3125
|
danger_level: "medium",
|
|
3326
|
-
examples: [
|
|
3327
|
-
{
|
|
3328
|
-
command: "f5xcctl secret_management softdelete create {name} --namespace {namespace}",
|
|
3329
|
-
description: "Create softdelete",
|
|
3330
|
-
use_case: "basic_create",
|
|
3331
|
-
},
|
|
3332
|
-
{
|
|
3333
|
-
command: "f5xcctl secret_management softdelete create -f {file}.yaml",
|
|
3334
|
-
description: "Create from YAML file",
|
|
3335
|
-
use_case: "file_based",
|
|
3336
|
-
},
|
|
3337
|
-
],
|
|
3338
3126
|
field_docs: {},
|
|
3339
3127
|
optional_fields: [],
|
|
3340
3128
|
performance_impact: {
|
|
@@ -3347,6 +3135,18 @@ export const blindfoldTools = [
|
|
|
3347
3135
|
creates: ["softdelete"],
|
|
3348
3136
|
},
|
|
3349
3137
|
},
|
|
3138
|
+
curlExample: null,
|
|
3139
|
+
dependencies: [
|
|
3140
|
+
{
|
|
3141
|
+
domain: "",
|
|
3142
|
+
fieldPath: "",
|
|
3143
|
+
inline: false,
|
|
3144
|
+
required: false,
|
|
3145
|
+
resourceType: "secret-policy-soft",
|
|
3146
|
+
},
|
|
3147
|
+
],
|
|
3148
|
+
oneOfGroups: [],
|
|
3149
|
+
subscriptionRequirements: [],
|
|
3350
3150
|
},
|
|
3351
3151
|
{
|
|
3352
3152
|
toolName: "f5xc-api-blindfold-voltshare-admin-policy-create",
|
|
@@ -3387,18 +3187,6 @@ export const blindfoldTools = [
|
|
|
3387
3187
|
creates: ["voltshare-admin-policy"],
|
|
3388
3188
|
},
|
|
3389
3189
|
requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
|
|
3390
|
-
cliExamples: [
|
|
3391
|
-
{
|
|
3392
|
-
command: "f5xcctl secret_management voltshare-admin-policy create -f {file}.yaml",
|
|
3393
|
-
description: "Create from YAML file",
|
|
3394
|
-
use_case: "file_based",
|
|
3395
|
-
},
|
|
3396
|
-
{
|
|
3397
|
-
command: "f5xcctl secret_management voltshare-admin-policy create {name} --namespace {namespace}",
|
|
3398
|
-
description: "Create voltshare-admin-policy",
|
|
3399
|
-
use_case: "basic_create",
|
|
3400
|
-
},
|
|
3401
|
-
],
|
|
3402
3190
|
confirmationRequired: false,
|
|
3403
3191
|
parameterExamples: {
|
|
3404
3192
|
"metadata.namespace": "Staging",
|
|
@@ -3446,18 +3234,6 @@ export const blindfoldTools = [
|
|
|
3446
3234
|
},
|
|
3447
3235
|
confirmation_required: false,
|
|
3448
3236
|
danger_level: "medium",
|
|
3449
|
-
examples: [
|
|
3450
|
-
{
|
|
3451
|
-
command: "f5xcctl secret_management voltshare-admin-policy create {name} --namespace {namespace}",
|
|
3452
|
-
description: "Create voltshare-admin-policy",
|
|
3453
|
-
use_case: "basic_create",
|
|
3454
|
-
},
|
|
3455
|
-
{
|
|
3456
|
-
command: "f5xcctl secret_management voltshare-admin-policy create -f {file}.yaml",
|
|
3457
|
-
description: "Create from YAML file",
|
|
3458
|
-
use_case: "file_based",
|
|
3459
|
-
},
|
|
3460
|
-
],
|
|
3461
3237
|
field_docs: {},
|
|
3462
3238
|
optional_fields: [],
|
|
3463
3239
|
performance_impact: {
|
|
@@ -3470,6 +3246,32 @@ export const blindfoldTools = [
|
|
|
3470
3246
|
creates: ["voltshare-admin-policy"],
|
|
3471
3247
|
},
|
|
3472
3248
|
},
|
|
3249
|
+
curlExample: null,
|
|
3250
|
+
dependencies: [
|
|
3251
|
+
{
|
|
3252
|
+
domain: "",
|
|
3253
|
+
fieldPath: "",
|
|
3254
|
+
inline: false,
|
|
3255
|
+
required: false,
|
|
3256
|
+
resourceType: "voltshare-admin-policy",
|
|
3257
|
+
},
|
|
3258
|
+
{
|
|
3259
|
+
domain: "",
|
|
3260
|
+
fieldPath: "metadata",
|
|
3261
|
+
inline: false,
|
|
3262
|
+
required: false,
|
|
3263
|
+
resourceType: "schema-object-create-meta",
|
|
3264
|
+
},
|
|
3265
|
+
{
|
|
3266
|
+
domain: "",
|
|
3267
|
+
fieldPath: "spec",
|
|
3268
|
+
inline: false,
|
|
3269
|
+
required: false,
|
|
3270
|
+
resourceType: "schemavoltshare-admin-policy-create",
|
|
3271
|
+
},
|
|
3272
|
+
],
|
|
3273
|
+
oneOfGroups: [],
|
|
3274
|
+
subscriptionRequirements: [],
|
|
3473
3275
|
},
|
|
3474
3276
|
{
|
|
3475
3277
|
toolName: "f5xc-api-blindfold-voltshare-admin-policy-delete",
|
|
@@ -3519,13 +3321,6 @@ export const blindfoldTools = [
|
|
|
3519
3321
|
deletes: ["voltshare-admin-policy", "contained_resources"],
|
|
3520
3322
|
},
|
|
3521
3323
|
requiredFields: ["path.name", "path.namespace"],
|
|
3522
|
-
cliExamples: [
|
|
3523
|
-
{
|
|
3524
|
-
command: "f5xcctl secret_management voltshare-admin-policy delete {name} --namespace {namespace}",
|
|
3525
|
-
description: "Delete voltshare-admin-policy",
|
|
3526
|
-
use_case: "delete",
|
|
3527
|
-
},
|
|
3528
|
-
],
|
|
3529
3324
|
confirmationRequired: true,
|
|
3530
3325
|
parameterExamples: {
|
|
3531
3326
|
name: "Name",
|
|
@@ -3571,13 +3366,6 @@ export const blindfoldTools = [
|
|
|
3571
3366
|
},
|
|
3572
3367
|
confirmation_required: true,
|
|
3573
3368
|
danger_level: "high",
|
|
3574
|
-
examples: [
|
|
3575
|
-
{
|
|
3576
|
-
command: "f5xcctl secret_management voltshare-admin-policy delete {name} --namespace {namespace}",
|
|
3577
|
-
description: "Delete voltshare-admin-policy",
|
|
3578
|
-
use_case: "delete",
|
|
3579
|
-
},
|
|
3580
|
-
],
|
|
3581
3369
|
field_docs: {},
|
|
3582
3370
|
optional_fields: [],
|
|
3583
3371
|
performance_impact: {
|
|
@@ -3590,6 +3378,18 @@ export const blindfoldTools = [
|
|
|
3590
3378
|
deletes: ["voltshare-admin-policy", "contained_resources"],
|
|
3591
3379
|
},
|
|
3592
3380
|
},
|
|
3381
|
+
curlExample: null,
|
|
3382
|
+
dependencies: [
|
|
3383
|
+
{
|
|
3384
|
+
domain: "",
|
|
3385
|
+
fieldPath: "",
|
|
3386
|
+
inline: false,
|
|
3387
|
+
required: false,
|
|
3388
|
+
resourceType: "voltshare-admin-policy",
|
|
3389
|
+
},
|
|
3390
|
+
],
|
|
3391
|
+
oneOfGroups: [],
|
|
3392
|
+
subscriptionRequirements: [],
|
|
3593
3393
|
},
|
|
3594
3394
|
{
|
|
3595
3395
|
toolName: "f5xc-api-blindfold-voltshare-admin-policy-get",
|
|
@@ -3658,13 +3458,6 @@ export const blindfoldTools = [
|
|
|
3658
3458
|
dangerLevel: "low",
|
|
3659
3459
|
sideEffects: null,
|
|
3660
3460
|
requiredFields: ["path.name", "path.namespace"],
|
|
3661
|
-
cliExamples: [
|
|
3662
|
-
{
|
|
3663
|
-
command: "f5xcctl secret_management voltshare-admin-policy get {name} --namespace {namespace}",
|
|
3664
|
-
description: "Get specific voltshare-admin-policy",
|
|
3665
|
-
use_case: "get_specific",
|
|
3666
|
-
},
|
|
3667
|
-
],
|
|
3668
3461
|
confirmationRequired: false,
|
|
3669
3462
|
parameterExamples: {
|
|
3670
3463
|
name: "Name",
|
|
@@ -3710,13 +3503,6 @@ export const blindfoldTools = [
|
|
|
3710
3503
|
},
|
|
3711
3504
|
confirmation_required: false,
|
|
3712
3505
|
danger_level: "low",
|
|
3713
|
-
examples: [
|
|
3714
|
-
{
|
|
3715
|
-
command: "f5xcctl secret_management voltshare-admin-policy get {name} --namespace {namespace}",
|
|
3716
|
-
description: "Get specific voltshare-admin-policy",
|
|
3717
|
-
use_case: "get_specific",
|
|
3718
|
-
},
|
|
3719
|
-
],
|
|
3720
3506
|
field_docs: {},
|
|
3721
3507
|
optional_fields: [],
|
|
3722
3508
|
performance_impact: {
|
|
@@ -3727,6 +3513,10 @@ export const blindfoldTools = [
|
|
|
3727
3513
|
required_fields: ["path.name", "path.namespace"],
|
|
3728
3514
|
side_effects: {},
|
|
3729
3515
|
},
|
|
3516
|
+
curlExample: null,
|
|
3517
|
+
dependencies: [],
|
|
3518
|
+
oneOfGroups: [],
|
|
3519
|
+
subscriptionRequirements: [],
|
|
3730
3520
|
},
|
|
3731
3521
|
{
|
|
3732
3522
|
toolName: "f5xc-api-blindfold-voltshare-admin-policy-list",
|
|
@@ -3801,13 +3591,6 @@ export const blindfoldTools = [
|
|
|
3801
3591
|
dangerLevel: "low",
|
|
3802
3592
|
sideEffects: null,
|
|
3803
3593
|
requiredFields: ["path.namespace"],
|
|
3804
|
-
cliExamples: [
|
|
3805
|
-
{
|
|
3806
|
-
command: "f5xcctl secret_management voltshare-admin-policy list --namespace {namespace}",
|
|
3807
|
-
description: "List all voltshare-admin-policys",
|
|
3808
|
-
use_case: "list_all",
|
|
3809
|
-
},
|
|
3810
|
-
],
|
|
3811
3594
|
confirmationRequired: false,
|
|
3812
3595
|
parameterExamples: {
|
|
3813
3596
|
label_filter: "Env in (staging, testing), tier in (web, db)",
|
|
@@ -3853,13 +3636,6 @@ export const blindfoldTools = [
|
|
|
3853
3636
|
},
|
|
3854
3637
|
confirmation_required: false,
|
|
3855
3638
|
danger_level: "low",
|
|
3856
|
-
examples: [
|
|
3857
|
-
{
|
|
3858
|
-
command: "f5xcctl secret_management voltshare-admin-policy list --namespace {namespace}",
|
|
3859
|
-
description: "List all voltshare-admin-policys",
|
|
3860
|
-
use_case: "list_all",
|
|
3861
|
-
},
|
|
3862
|
-
],
|
|
3863
3639
|
field_docs: {},
|
|
3864
3640
|
optional_fields: [],
|
|
3865
3641
|
performance_impact: {
|
|
@@ -3870,6 +3646,10 @@ export const blindfoldTools = [
|
|
|
3870
3646
|
required_fields: ["path.namespace"],
|
|
3871
3647
|
side_effects: {},
|
|
3872
3648
|
},
|
|
3649
|
+
curlExample: null,
|
|
3650
|
+
dependencies: [],
|
|
3651
|
+
oneOfGroups: [],
|
|
3652
|
+
subscriptionRequirements: [],
|
|
3873
3653
|
},
|
|
3874
3654
|
{
|
|
3875
3655
|
toolName: "f5xc-api-blindfold-voltshare-admin-policy-update",
|
|
@@ -3921,13 +3701,6 @@ export const blindfoldTools = [
|
|
|
3921
3701
|
modifies: ["voltshare-admin-policy"],
|
|
3922
3702
|
},
|
|
3923
3703
|
requiredFields: ["path.metadata.name", "path.metadata.namespace"],
|
|
3924
|
-
cliExamples: [
|
|
3925
|
-
{
|
|
3926
|
-
command: "f5xcctl secret_management voltshare-admin-policy update {name} --namespace {namespace} -f {file}.yaml",
|
|
3927
|
-
description: "Update voltshare-admin-policy",
|
|
3928
|
-
use_case: "update",
|
|
3929
|
-
},
|
|
3930
|
-
],
|
|
3931
3704
|
confirmationRequired: false,
|
|
3932
3705
|
parameterExamples: {
|
|
3933
3706
|
"metadata.name": "Example-corp-web.",
|
|
@@ -3973,13 +3746,6 @@ export const blindfoldTools = [
|
|
|
3973
3746
|
},
|
|
3974
3747
|
confirmation_required: false,
|
|
3975
3748
|
danger_level: "medium",
|
|
3976
|
-
examples: [
|
|
3977
|
-
{
|
|
3978
|
-
command: "f5xcctl secret_management voltshare-admin-policy update {name} --namespace {namespace} -f {file}.yaml",
|
|
3979
|
-
description: "Update voltshare-admin-policy",
|
|
3980
|
-
use_case: "update",
|
|
3981
|
-
},
|
|
3982
|
-
],
|
|
3983
3749
|
field_docs: {},
|
|
3984
3750
|
optional_fields: [],
|
|
3985
3751
|
performance_impact: {
|
|
@@ -3992,6 +3758,32 @@ export const blindfoldTools = [
|
|
|
3992
3758
|
modifies: ["voltshare-admin-policy"],
|
|
3993
3759
|
},
|
|
3994
3760
|
},
|
|
3761
|
+
curlExample: null,
|
|
3762
|
+
dependencies: [
|
|
3763
|
+
{
|
|
3764
|
+
domain: "",
|
|
3765
|
+
fieldPath: "",
|
|
3766
|
+
inline: false,
|
|
3767
|
+
required: false,
|
|
3768
|
+
resourceType: "voltshare-admin-policy",
|
|
3769
|
+
},
|
|
3770
|
+
{
|
|
3771
|
+
domain: "",
|
|
3772
|
+
fieldPath: "metadata",
|
|
3773
|
+
inline: false,
|
|
3774
|
+
required: false,
|
|
3775
|
+
resourceType: "schema-object-replace-meta",
|
|
3776
|
+
},
|
|
3777
|
+
{
|
|
3778
|
+
domain: "",
|
|
3779
|
+
fieldPath: "spec",
|
|
3780
|
+
inline: false,
|
|
3781
|
+
required: false,
|
|
3782
|
+
resourceType: "schemavoltshare-admin-policy-replace",
|
|
3783
|
+
},
|
|
3784
|
+
],
|
|
3785
|
+
oneOfGroups: [],
|
|
3786
|
+
subscriptionRequirements: [],
|
|
3995
3787
|
},
|
|
3996
3788
|
];
|
|
3997
3789
|
export default blindfoldTools;
|