@robinmordasiewicz/f5xc-api-mcp 3.4.0 → 3.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (170) hide show
  1. package/dist/generator/dependency-extractor.d.ts +103 -0
  2. package/dist/generator/dependency-extractor.d.ts.map +1 -0
  3. package/dist/generator/dependency-extractor.js +473 -0
  4. package/dist/generator/dependency-extractor.js.map +1 -0
  5. package/dist/generator/dependency-graph.d.ts +67 -0
  6. package/dist/generator/dependency-graph.d.ts.map +1 -0
  7. package/dist/generator/dependency-graph.js +330 -0
  8. package/dist/generator/dependency-graph.js.map +1 -0
  9. package/dist/generator/dependency-types.d.ts +206 -0
  10. package/dist/generator/dependency-types.d.ts.map +1 -0
  11. package/dist/generator/dependency-types.js +37 -0
  12. package/dist/generator/dependency-types.js.map +1 -0
  13. package/dist/generator/openapi-parser.d.ts +21 -77
  14. package/dist/generator/openapi-parser.d.ts.map +1 -1
  15. package/dist/generator/openapi-parser.js +126 -17
  16. package/dist/generator/openapi-parser.js.map +1 -1
  17. package/dist/generator/tool-generator.d.ts +19 -3
  18. package/dist/generator/tool-generator.d.ts.map +1 -1
  19. package/dist/generator/tool-generator.js +26 -28
  20. package/dist/generator/tool-generator.js.map +1 -1
  21. package/dist/index.d.ts +2 -10
  22. package/dist/index.d.ts.map +1 -1
  23. package/dist/index.js +28 -33
  24. package/dist/index.js.map +1 -1
  25. package/dist/prompts/workflows.d.ts.map +1 -1
  26. package/dist/prompts/workflows.js +30 -174
  27. package/dist/prompts/workflows.js.map +1 -1
  28. package/dist/resources/handlers.d.ts +0 -2
  29. package/dist/resources/handlers.d.ts.map +1 -1
  30. package/dist/resources/handlers.js +0 -51
  31. package/dist/resources/handlers.js.map +1 -1
  32. package/dist/server.d.ts +1 -1
  33. package/dist/server.d.ts.map +1 -1
  34. package/dist/server.js +1 -2
  35. package/dist/server.js.map +1 -1
  36. package/dist/tools/discovery/dependencies.d.ts +113 -0
  37. package/dist/tools/discovery/dependencies.d.ts.map +1 -0
  38. package/dist/tools/discovery/dependencies.js +258 -0
  39. package/dist/tools/discovery/dependencies.js.map +1 -0
  40. package/dist/tools/discovery/execute.d.ts +1 -3
  41. package/dist/tools/discovery/execute.d.ts.map +1 -1
  42. package/dist/tools/discovery/execute.js +1 -34
  43. package/dist/tools/discovery/execute.js.map +1 -1
  44. package/dist/tools/discovery/index.d.ts +33 -0
  45. package/dist/tools/discovery/index.d.ts.map +1 -1
  46. package/dist/tools/discovery/index.js +43 -0
  47. package/dist/tools/discovery/index.js.map +1 -1
  48. package/dist/tools/generated/admin_console_and_ui/index.d.ts.map +1 -1
  49. package/dist/tools/generated/admin_console_and_ui/index.js +8 -28
  50. package/dist/tools/generated/admin_console_and_ui/index.js.map +1 -1
  51. package/dist/tools/generated/api/index.d.ts.map +1 -1
  52. package/dist/tools/generated/api/index.js +1256 -908
  53. package/dist/tools/generated/api/index.js.map +1 -1
  54. package/dist/tools/generated/authentication/index.d.ts.map +1 -1
  55. package/dist/tools/generated/authentication/index.js +58 -156
  56. package/dist/tools/generated/authentication/index.js.map +1 -1
  57. package/dist/tools/generated/bigip/index.d.ts.map +1 -1
  58. package/dist/tools/generated/bigip/index.js +344 -410
  59. package/dist/tools/generated/bigip/index.js.map +1 -1
  60. package/dist/tools/generated/billing_and_usage/index.d.ts.map +1 -1
  61. package/dist/tools/generated/billing_and_usage/index.js +192 -442
  62. package/dist/tools/generated/billing_and_usage/index.js.map +1 -1
  63. package/dist/tools/generated/blindfold/index.d.ts.map +1 -1
  64. package/dist/tools/generated/blindfold/index.js +360 -568
  65. package/dist/tools/generated/blindfold/index.js.map +1 -1
  66. package/dist/tools/generated/bot_and_threat_defense/index.d.ts.map +1 -1
  67. package/dist/tools/generated/bot_and_threat_defense/index.js +502 -340
  68. package/dist/tools/generated/bot_and_threat_defense/index.js.map +1 -1
  69. package/dist/tools/generated/cdn/index.d.ts.map +1 -1
  70. package/dist/tools/generated/cdn/index.js +369 -428
  71. package/dist/tools/generated/cdn/index.js.map +1 -1
  72. package/dist/tools/generated/ce_management/index.d.ts.map +1 -1
  73. package/dist/tools/generated/ce_management/index.js +407 -558
  74. package/dist/tools/generated/ce_management/index.js.map +1 -1
  75. package/dist/tools/generated/certificates/index.d.ts.map +1 -1
  76. package/dist/tools/generated/certificates/index.js +288 -320
  77. package/dist/tools/generated/certificates/index.js.map +1 -1
  78. package/dist/tools/generated/cloud_infrastructure/index.d.ts.map +1 -1
  79. package/dist/tools/generated/cloud_infrastructure/index.js +407 -572
  80. package/dist/tools/generated/cloud_infrastructure/index.js.map +1 -1
  81. package/dist/tools/generated/container_services/index.d.ts.map +1 -1
  82. package/dist/tools/generated/container_services/index.js +228 -264
  83. package/dist/tools/generated/container_services/index.js.map +1 -1
  84. package/dist/tools/generated/data_and_privacy_security/index.d.ts.map +1 -1
  85. package/dist/tools/generated/data_and_privacy_security/index.js +156 -202
  86. package/dist/tools/generated/data_and_privacy_security/index.js.map +1 -1
  87. package/dist/tools/generated/data_intelligence/index.d.ts.map +1 -1
  88. package/dist/tools/generated/data_intelligence/index.js +120 -290
  89. package/dist/tools/generated/data_intelligence/index.js.map +1 -1
  90. package/dist/tools/generated/ddos/index.d.ts.map +1 -1
  91. package/dist/tools/generated/ddos/index.js +732 -1152
  92. package/dist/tools/generated/ddos/index.js.map +1 -1
  93. package/dist/tools/generated/dns/index.d.ts.map +1 -1
  94. package/dist/tools/generated/dns/index.js +544 -908
  95. package/dist/tools/generated/dns/index.js.map +1 -1
  96. package/dist/tools/generated/generative_ai/index.d.ts.map +1 -1
  97. package/dist/tools/generated/generative_ai/index.js +58 -254
  98. package/dist/tools/generated/generative_ai/index.js.map +1 -1
  99. package/dist/tools/generated/managed_kubernetes/index.d.ts.map +1 -1
  100. package/dist/tools/generated/managed_kubernetes/index.js +535 -400
  101. package/dist/tools/generated/managed_kubernetes/index.js.map +1 -1
  102. package/dist/tools/generated/marketplace/index.d.ts.map +1 -1
  103. package/dist/tools/generated/marketplace/index.js +343 -594
  104. package/dist/tools/generated/marketplace/index.js.map +1 -1
  105. package/dist/tools/generated/network/index.d.ts.map +1 -1
  106. package/dist/tools/generated/network/index.js +1398 -1590
  107. package/dist/tools/generated/network/index.js.map +1 -1
  108. package/dist/tools/generated/network_security/index.d.ts.map +1 -1
  109. package/dist/tools/generated/network_security/index.js +1879 -1126
  110. package/dist/tools/generated/network_security/index.js.map +1 -1
  111. package/dist/tools/generated/nginx_one/index.d.ts.map +1 -1
  112. package/dist/tools/generated/nginx_one/index.js +108 -236
  113. package/dist/tools/generated/nginx_one/index.js.map +1 -1
  114. package/dist/tools/generated/object_storage/index.d.ts.map +1 -1
  115. package/dist/tools/generated/object_storage/index.js +39 -98
  116. package/dist/tools/generated/object_storage/index.js.map +1 -1
  117. package/dist/tools/generated/observability/index.d.ts.map +1 -1
  118. package/dist/tools/generated/observability/index.js +310 -790
  119. package/dist/tools/generated/observability/index.js.map +1 -1
  120. package/dist/tools/generated/rate_limiting/index.d.ts.map +1 -1
  121. package/dist/tools/generated/rate_limiting/index.js +411 -240
  122. package/dist/tools/generated/rate_limiting/index.js.map +1 -1
  123. package/dist/tools/generated/secops_and_incident_response/index.d.ts.map +1 -1
  124. package/dist/tools/generated/secops_and_incident_response/index.js +137 -80
  125. package/dist/tools/generated/secops_and_incident_response/index.js.map +1 -1
  126. package/dist/tools/generated/service_mesh/index.d.ts.map +1 -1
  127. package/dist/tools/generated/service_mesh/index.js +1118 -778
  128. package/dist/tools/generated/service_mesh/index.js.map +1 -1
  129. package/dist/tools/generated/shape/index.d.ts.map +1 -1
  130. package/dist/tools/generated/shape/index.js +1101 -3504
  131. package/dist/tools/generated/shape/index.js.map +1 -1
  132. package/dist/tools/generated/sites/index.d.ts.map +1 -1
  133. package/dist/tools/generated/sites/index.js +1780 -1872
  134. package/dist/tools/generated/sites/index.js.map +1 -1
  135. package/dist/tools/generated/statistics/index.d.ts.map +1 -1
  136. package/dist/tools/generated/statistics/index.js +644 -1350
  137. package/dist/tools/generated/statistics/index.js.map +1 -1
  138. package/dist/tools/generated/support/index.d.ts.map +1 -1
  139. package/dist/tools/generated/support/index.js +321 -928
  140. package/dist/tools/generated/support/index.js.map +1 -1
  141. package/dist/tools/generated/telemetry_and_insights/index.d.ts.map +1 -1
  142. package/dist/tools/generated/telemetry_and_insights/index.js +123 -492
  143. package/dist/tools/generated/telemetry_and_insights/index.js.map +1 -1
  144. package/dist/tools/generated/tenant_and_identity/index.d.ts.map +1 -1
  145. package/dist/tools/generated/tenant_and_identity/index.js +1568 -3086
  146. package/dist/tools/generated/tenant_and_identity/index.js.map +1 -1
  147. package/dist/tools/generated/threat_campaign/index.d.ts.map +1 -1
  148. package/dist/tools/generated/threat_campaign/index.js +4 -14
  149. package/dist/tools/generated/threat_campaign/index.js.map +1 -1
  150. package/dist/tools/generated/users/index.d.ts.map +1 -1
  151. package/dist/tools/generated/users/index.js +151 -208
  152. package/dist/tools/generated/users/index.js.map +1 -1
  153. package/dist/tools/generated/virtual/index.d.ts.map +1 -1
  154. package/dist/tools/generated/virtual/index.js +1256 -1533
  155. package/dist/tools/generated/virtual/index.js.map +1 -1
  156. package/dist/tools/generated/vpm_and_node_management/index.d.ts.map +1 -1
  157. package/dist/tools/generated/vpm_and_node_management/index.js +4 -14
  158. package/dist/tools/generated/vpm_and_node_management/index.js.map +1 -1
  159. package/dist/tools/generated/waf/index.d.ts.map +1 -1
  160. package/dist/tools/generated/waf/index.js +821 -675
  161. package/dist/tools/generated/waf/index.js.map +1 -1
  162. package/package.json +1 -1
  163. package/dist/cli/index.d.ts +0 -16
  164. package/dist/cli/index.d.ts.map +0 -1
  165. package/dist/cli/index.js +0 -116
  166. package/dist/cli/index.js.map +0 -1
  167. package/dist/cli/setup.d.ts +0 -54
  168. package/dist/cli/setup.d.ts.map +0 -1
  169. package/dist/cli/setup.js +0 -347
  170. package/dist/cli/setup.js.map +0 -1
@@ -42,18 +42,6 @@ export const blindfoldTools = [
42
42
  creates: ["access-count"],
43
43
  },
44
44
  requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
45
- cliExamples: [
46
- {
47
- command: "f5xcctl secret_management access-count create {name} --namespace {namespace}",
48
- description: "Create access-count",
49
- use_case: "basic_create",
50
- },
51
- {
52
- command: "f5xcctl secret_management access-count create -f {file}.yaml",
53
- description: "Create from YAML file",
54
- use_case: "file_based",
55
- },
56
- ],
57
45
  confirmationRequired: false,
58
46
  parameterExamples: {
59
47
  namespace: "Blogging-app-namespace-1.",
@@ -98,18 +86,6 @@ export const blindfoldTools = [
98
86
  },
99
87
  confirmation_required: false,
100
88
  danger_level: "medium",
101
- examples: [
102
- {
103
- command: "f5xcctl secret_management access-count create {name} --namespace {namespace}",
104
- description: "Create access-count",
105
- use_case: "basic_create",
106
- },
107
- {
108
- command: "f5xcctl secret_management access-count create -f {file}.yaml",
109
- description: "Create from YAML file",
110
- use_case: "file_based",
111
- },
112
- ],
113
89
  field_docs: {},
114
90
  optional_fields: [],
115
91
  performance_impact: {
@@ -122,6 +98,10 @@ export const blindfoldTools = [
122
98
  creates: ["access-count"],
123
99
  },
124
100
  },
101
+ curlExample: null,
102
+ dependencies: [],
103
+ oneOfGroups: [],
104
+ subscriptionRequirements: [],
125
105
  },
126
106
  {
127
107
  toolName: "f5xc-api-blindfold-aggregation-create",
@@ -162,18 +142,6 @@ export const blindfoldTools = [
162
142
  creates: ["aggregation"],
163
143
  },
164
144
  requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
165
- cliExamples: [
166
- {
167
- command: "f5xcctl secret_management aggregation create {name} --namespace {namespace}",
168
- description: "Create aggregation",
169
- use_case: "basic_create",
170
- },
171
- {
172
- command: "f5xcctl secret_management aggregation create -f {file}.yaml",
173
- description: "Create from YAML file",
174
- use_case: "file_based",
175
- },
176
- ],
177
145
  confirmationRequired: false,
178
146
  parameterExamples: {
179
147
  namespace: "Value",
@@ -218,18 +186,6 @@ export const blindfoldTools = [
218
186
  },
219
187
  confirmation_required: false,
220
188
  danger_level: "medium",
221
- examples: [
222
- {
223
- command: "f5xcctl secret_management aggregation create {name} --namespace {namespace}",
224
- description: "Create aggregation",
225
- use_case: "basic_create",
226
- },
227
- {
228
- command: "f5xcctl secret_management aggregation create -f {file}.yaml",
229
- description: "Create from YAML file",
230
- use_case: "file_based",
231
- },
232
- ],
233
189
  field_docs: {},
234
190
  optional_fields: [],
235
191
  performance_impact: {
@@ -242,6 +198,10 @@ export const blindfoldTools = [
242
198
  creates: ["aggregation"],
243
199
  },
244
200
  },
201
+ curlExample: null,
202
+ dependencies: [],
203
+ oneOfGroups: [],
204
+ subscriptionRequirements: [],
245
205
  },
246
206
  {
247
207
  toolName: "f5xc-api-blindfold-audit-log-create",
@@ -282,18 +242,6 @@ export const blindfoldTools = [
282
242
  creates: ["audit-log"],
283
243
  },
284
244
  requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
285
- cliExamples: [
286
- {
287
- command: "f5xcctl secret_management audit-log create {name} --namespace {namespace}",
288
- description: "Create audit-log",
289
- use_case: "basic_create",
290
- },
291
- {
292
- command: "f5xcctl secret_management audit-log create -f {file}.yaml",
293
- description: "Create from YAML file",
294
- use_case: "file_based",
295
- },
296
- ],
297
245
  confirmationRequired: false,
298
246
  parameterExamples: {
299
247
  namespace: "Value",
@@ -338,18 +286,6 @@ export const blindfoldTools = [
338
286
  },
339
287
  confirmation_required: false,
340
288
  danger_level: "medium",
341
- examples: [
342
- {
343
- command: "f5xcctl secret_management audit-log create {name} --namespace {namespace}",
344
- description: "Create audit-log",
345
- use_case: "basic_create",
346
- },
347
- {
348
- command: "f5xcctl secret_management audit-log create -f {file}.yaml",
349
- description: "Create from YAML file",
350
- use_case: "file_based",
351
- },
352
- ],
353
289
  field_docs: {},
354
290
  optional_fields: [],
355
291
  performance_impact: {
@@ -362,6 +298,10 @@ export const blindfoldTools = [
362
298
  creates: ["audit-log"],
363
299
  },
364
300
  },
301
+ curlExample: null,
302
+ dependencies: [],
303
+ oneOfGroups: [],
304
+ subscriptionRequirements: [],
365
305
  },
366
306
  {
367
307
  toolName: "f5xc-api-blindfold-decrypt-secret-create",
@@ -390,18 +330,6 @@ export const blindfoldTools = [
390
330
  creates: ["decrypt-secret"],
391
331
  },
392
332
  requiredFields: ["metadata.name", "metadata.namespace"],
393
- cliExamples: [
394
- {
395
- command: "f5xcctl secret_management decrypt-secret create {name} --namespace {namespace}",
396
- description: "Create decrypt-secret",
397
- use_case: "basic_create",
398
- },
399
- {
400
- command: "f5xcctl secret_management decrypt-secret create -f {file}.yaml",
401
- description: "Create from YAML file",
402
- use_case: "file_based",
403
- },
404
- ],
405
333
  confirmationRequired: false,
406
334
  parameterExamples: {},
407
335
  validationRules: {},
@@ -444,18 +372,6 @@ export const blindfoldTools = [
444
372
  },
445
373
  confirmation_required: false,
446
374
  danger_level: "medium",
447
- examples: [
448
- {
449
- command: "f5xcctl secret_management decrypt-secret create {name} --namespace {namespace}",
450
- description: "Create decrypt-secret",
451
- use_case: "basic_create",
452
- },
453
- {
454
- command: "f5xcctl secret_management decrypt-secret create -f {file}.yaml",
455
- description: "Create from YAML file",
456
- use_case: "file_based",
457
- },
458
- ],
459
375
  field_docs: {},
460
376
  optional_fields: [],
461
377
  performance_impact: {
@@ -468,6 +384,18 @@ export const blindfoldTools = [
468
384
  creates: ["decrypt-secret"],
469
385
  },
470
386
  },
387
+ curlExample: null,
388
+ dependencies: [
389
+ {
390
+ domain: "",
391
+ fieldPath: "policy_document",
392
+ inline: false,
393
+ required: false,
394
+ resourceType: "voltshare-policy-information",
395
+ },
396
+ ],
397
+ oneOfGroups: [],
398
+ subscriptionRequirements: [],
471
399
  },
472
400
  {
473
401
  toolName: "f5xc-api-blindfold-get-policy-document-get",
@@ -515,13 +443,6 @@ export const blindfoldTools = [
515
443
  dangerLevel: "low",
516
444
  sideEffects: null,
517
445
  requiredFields: ["path.name", "path.namespace"],
518
- cliExamples: [
519
- {
520
- command: "f5xcctl secret_management get-policy-document get {name} --namespace {namespace}",
521
- description: "Get specific get-policy-document",
522
- use_case: "get_specific",
523
- },
524
- ],
525
446
  confirmationRequired: false,
526
447
  parameterExamples: {
527
448
  name: "Site-secret-policy.",
@@ -567,13 +488,6 @@ export const blindfoldTools = [
567
488
  },
568
489
  confirmation_required: false,
569
490
  danger_level: "low",
570
- examples: [
571
- {
572
- command: "f5xcctl secret_management get-policy-document get {name} --namespace {namespace}",
573
- description: "Get specific get-policy-document",
574
- use_case: "get_specific",
575
- },
576
- ],
577
491
  field_docs: {},
578
492
  optional_fields: [],
579
493
  performance_impact: {
@@ -584,6 +498,10 @@ export const blindfoldTools = [
584
498
  required_fields: ["path.name", "path.namespace"],
585
499
  side_effects: {},
586
500
  },
501
+ curlExample: null,
502
+ dependencies: [],
503
+ oneOfGroups: [],
504
+ subscriptionRequirements: [],
587
505
  },
588
506
  {
589
507
  toolName: "f5xc-api-blindfold-get-public-key-list",
@@ -621,13 +539,6 @@ export const blindfoldTools = [
621
539
  dangerLevel: "low",
622
540
  sideEffects: null,
623
541
  requiredFields: [],
624
- cliExamples: [
625
- {
626
- command: "f5xcctl secret_management get-public-key list --namespace {namespace}",
627
- description: "List all get-public-keys",
628
- use_case: "list_all",
629
- },
630
- ],
631
542
  confirmationRequired: false,
632
543
  parameterExamples: {
633
544
  key_version: "0",
@@ -672,13 +583,6 @@ export const blindfoldTools = [
672
583
  },
673
584
  confirmation_required: false,
674
585
  danger_level: "low",
675
- examples: [
676
- {
677
- command: "f5xcctl secret_management get-public-key list --namespace {namespace}",
678
- description: "List all get-public-keys",
679
- use_case: "list_all",
680
- },
681
- ],
682
586
  field_docs: {},
683
587
  optional_fields: [],
684
588
  performance_impact: {
@@ -689,6 +593,10 @@ export const blindfoldTools = [
689
593
  required_fields: [],
690
594
  side_effects: {},
691
595
  },
596
+ curlExample: null,
597
+ dependencies: [],
598
+ oneOfGroups: [],
599
+ subscriptionRequirements: [],
692
600
  },
693
601
  {
694
602
  toolName: "f5xc-api-blindfold-list-policy-list",
@@ -736,13 +644,6 @@ export const blindfoldTools = [
736
644
  dangerLevel: "low",
737
645
  sideEffects: null,
738
646
  requiredFields: ["path.namespace", "path.policy_state"],
739
- cliExamples: [
740
- {
741
- command: "f5xcctl secret_management list-policy list --namespace {namespace}",
742
- description: "List all list-policys",
743
- use_case: "list_all",
744
- },
745
- ],
746
647
  confirmationRequired: false,
747
648
  parameterExamples: {
748
649
  namespace: "System",
@@ -788,13 +689,6 @@ export const blindfoldTools = [
788
689
  },
789
690
  confirmation_required: false,
790
691
  danger_level: "low",
791
- examples: [
792
- {
793
- command: "f5xcctl secret_management list-policy list --namespace {namespace}",
794
- description: "List all list-policys",
795
- use_case: "list_all",
796
- },
797
- ],
798
692
  field_docs: {},
799
693
  optional_fields: [],
800
694
  performance_impact: {
@@ -805,6 +699,10 @@ export const blindfoldTools = [
805
699
  required_fields: ["path.namespace", "path.policy_state"],
806
700
  side_effects: {},
807
701
  },
702
+ curlExample: null,
703
+ dependencies: [],
704
+ oneOfGroups: [],
705
+ subscriptionRequirements: [],
808
706
  },
809
707
  {
810
708
  toolName: "f5xc-api-blindfold-process-policy-information-create",
@@ -833,18 +731,6 @@ export const blindfoldTools = [
833
731
  creates: ["process-policy-information"],
834
732
  },
835
733
  requiredFields: ["metadata.name", "metadata.namespace"],
836
- cliExamples: [
837
- {
838
- command: "f5xcctl secret_management process-policy-information create -f {file}.yaml",
839
- description: "Create from YAML file",
840
- use_case: "file_based",
841
- },
842
- {
843
- command: "f5xcctl secret_management process-policy-information create {name} --namespace {namespace}",
844
- description: "Create process-policy-information",
845
- use_case: "basic_create",
846
- },
847
- ],
848
734
  confirmationRequired: false,
849
735
  parameterExamples: {},
850
736
  validationRules: {},
@@ -890,18 +776,6 @@ export const blindfoldTools = [
890
776
  },
891
777
  confirmation_required: false,
892
778
  danger_level: "medium",
893
- examples: [
894
- {
895
- command: "f5xcctl secret_management process-policy-information create {name} --namespace {namespace}",
896
- description: "Create process-policy-information",
897
- use_case: "basic_create",
898
- },
899
- {
900
- command: "f5xcctl secret_management process-policy-information create -f {file}.yaml",
901
- description: "Create from YAML file",
902
- use_case: "file_based",
903
- },
904
- ],
905
779
  field_docs: {},
906
780
  optional_fields: [],
907
781
  performance_impact: {
@@ -914,6 +788,18 @@ export const blindfoldTools = [
914
788
  creates: ["process-policy-information"],
915
789
  },
916
790
  },
791
+ curlExample: null,
792
+ dependencies: [
793
+ {
794
+ domain: "",
795
+ fieldPath: "policy",
796
+ inline: false,
797
+ required: false,
798
+ resourceType: "voltshare-policy",
799
+ },
800
+ ],
801
+ oneOfGroups: [],
802
+ subscriptionRequirements: [],
917
803
  },
918
804
  {
919
805
  toolName: "f5xc-api-blindfold-recover-create",
@@ -965,18 +851,6 @@ export const blindfoldTools = [
965
851
  creates: ["recover"],
966
852
  },
967
853
  requiredFields: ["metadata.name", "metadata.namespace", "path.name", "path.namespace"],
968
- cliExamples: [
969
- {
970
- command: "f5xcctl secret_management recover create -f {file}.yaml",
971
- description: "Create from YAML file",
972
- use_case: "file_based",
973
- },
974
- {
975
- command: "f5xcctl secret_management recover create {name} --namespace {namespace}",
976
- description: "Create recover",
977
- use_case: "basic_create",
978
- },
979
- ],
980
854
  confirmationRequired: false,
981
855
  parameterExamples: {
982
856
  name: "Site-secret-policy.",
@@ -1022,18 +896,6 @@ export const blindfoldTools = [
1022
896
  },
1023
897
  confirmation_required: false,
1024
898
  danger_level: "medium",
1025
- examples: [
1026
- {
1027
- command: "f5xcctl secret_management recover create {name} --namespace {namespace}",
1028
- description: "Create recover",
1029
- use_case: "basic_create",
1030
- },
1031
- {
1032
- command: "f5xcctl secret_management recover create -f {file}.yaml",
1033
- description: "Create from YAML file",
1034
- use_case: "file_based",
1035
- },
1036
- ],
1037
899
  field_docs: {},
1038
900
  optional_fields: [],
1039
901
  performance_impact: {
@@ -1046,6 +908,10 @@ export const blindfoldTools = [
1046
908
  creates: ["recover"],
1047
909
  },
1048
910
  },
911
+ curlExample: null,
912
+ dependencies: [],
913
+ oneOfGroups: [],
914
+ subscriptionRequirements: [],
1049
915
  },
1050
916
  {
1051
917
  toolName: "f5xc-api-blindfold-scroll-create",
@@ -1086,18 +952,6 @@ export const blindfoldTools = [
1086
952
  creates: ["scroll"],
1087
953
  },
1088
954
  requiredFields: ["metadata.name", "metadata.namespace", "path.namespace"],
1089
- cliExamples: [
1090
- {
1091
- command: "f5xcctl secret_management scroll create -f {file}.yaml",
1092
- description: "Create from YAML file",
1093
- use_case: "file_based",
1094
- },
1095
- {
1096
- command: "f5xcctl secret_management scroll create {name} --namespace {namespace}",
1097
- description: "Create scroll",
1098
- use_case: "basic_create",
1099
- },
1100
- ],
1101
955
  confirmationRequired: false,
1102
956
  parameterExamples: {
1103
957
  namespace: "Value",
@@ -1142,18 +996,6 @@ export const blindfoldTools = [
1142
996
  },
1143
997
  confirmation_required: false,
1144
998
  danger_level: "medium",
1145
- examples: [
1146
- {
1147
- command: "f5xcctl secret_management scroll create {name} --namespace {namespace}",
1148
- description: "Create scroll",
1149
- use_case: "basic_create",
1150
- },
1151
- {
1152
- command: "f5xcctl secret_management scroll create -f {file}.yaml",
1153
- description: "Create from YAML file",
1154
- use_case: "file_based",
1155
- },
1156
- ],
1157
999
  field_docs: {},
1158
1000
  optional_fields: [],
1159
1001
  performance_impact: {
@@ -1166,6 +1008,10 @@ export const blindfoldTools = [
1166
1008
  creates: ["scroll"],
1167
1009
  },
1168
1010
  },
1011
+ curlExample: null,
1012
+ dependencies: [],
1013
+ oneOfGroups: [],
1014
+ subscriptionRequirements: [],
1169
1015
  },
1170
1016
  {
1171
1017
  toolName: "f5xc-api-blindfold-scroll-list",
@@ -1214,13 +1060,6 @@ export const blindfoldTools = [
1214
1060
  dangerLevel: "low",
1215
1061
  sideEffects: null,
1216
1062
  requiredFields: ["path.namespace"],
1217
- cliExamples: [
1218
- {
1219
- command: "f5xcctl secret_management scroll list --namespace {namespace}",
1220
- description: "List all scrolls",
1221
- use_case: "list_all",
1222
- },
1223
- ],
1224
1063
  confirmationRequired: false,
1225
1064
  parameterExamples: {
1226
1065
  namespace: "Value",
@@ -1266,13 +1105,6 @@ export const blindfoldTools = [
1266
1105
  },
1267
1106
  confirmation_required: false,
1268
1107
  danger_level: "low",
1269
- examples: [
1270
- {
1271
- command: "f5xcctl secret_management scroll list --namespace {namespace}",
1272
- description: "List all scrolls",
1273
- use_case: "list_all",
1274
- },
1275
- ],
1276
1108
  field_docs: {},
1277
1109
  optional_fields: [],
1278
1110
  performance_impact: {
@@ -1283,6 +1115,10 @@ export const blindfoldTools = [
1283
1115
  required_fields: ["path.namespace"],
1284
1116
  side_effects: {},
1285
1117
  },
1118
+ curlExample: null,
1119
+ dependencies: [],
1120
+ oneOfGroups: [],
1121
+ subscriptionRequirements: [],
1286
1122
  },
1287
1123
  {
1288
1124
  toolName: "f5xc-api-blindfold-secret-management-access-create",
@@ -1323,18 +1159,6 @@ export const blindfoldTools = [
1323
1159
  creates: ["secret-management-access"],
1324
1160
  },
1325
1161
  requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
1326
- cliExamples: [
1327
- {
1328
- command: "f5xcctl config secret-management-access create -f {file}.yaml",
1329
- description: "Create from YAML file",
1330
- use_case: "file_based",
1331
- },
1332
- {
1333
- command: "f5xcctl config secret-management-access create {name} --namespace {namespace}",
1334
- description: "Create secret-management-access",
1335
- use_case: "basic_create",
1336
- },
1337
- ],
1338
1162
  confirmationRequired: false,
1339
1163
  parameterExamples: {
1340
1164
  "metadata.namespace": "Staging",
@@ -1382,18 +1206,6 @@ export const blindfoldTools = [
1382
1206
  },
1383
1207
  confirmation_required: false,
1384
1208
  danger_level: "medium",
1385
- examples: [
1386
- {
1387
- command: "f5xcctl config secret-management-access create {name} --namespace {namespace}",
1388
- description: "Create secret-management-access",
1389
- use_case: "basic_create",
1390
- },
1391
- {
1392
- command: "f5xcctl config secret-management-access create -f {file}.yaml",
1393
- description: "Create from YAML file",
1394
- use_case: "file_based",
1395
- },
1396
- ],
1397
1209
  field_docs: {},
1398
1210
  optional_fields: [],
1399
1211
  performance_impact: {
@@ -1406,6 +1218,32 @@ export const blindfoldTools = [
1406
1218
  creates: ["secret-management-access"],
1407
1219
  },
1408
1220
  },
1221
+ curlExample: null,
1222
+ dependencies: [
1223
+ {
1224
+ domain: "",
1225
+ fieldPath: "",
1226
+ inline: false,
1227
+ required: false,
1228
+ resourceType: "secret-management-access",
1229
+ },
1230
+ {
1231
+ domain: "",
1232
+ fieldPath: "metadata",
1233
+ inline: false,
1234
+ required: false,
1235
+ resourceType: "schema-object-create-meta",
1236
+ },
1237
+ {
1238
+ domain: "",
1239
+ fieldPath: "spec",
1240
+ inline: false,
1241
+ required: false,
1242
+ resourceType: "secret-management-access-create",
1243
+ },
1244
+ ],
1245
+ oneOfGroups: [],
1246
+ subscriptionRequirements: [],
1409
1247
  },
1410
1248
  {
1411
1249
  toolName: "f5xc-api-blindfold-secret-management-access-delete",
@@ -1455,13 +1293,6 @@ export const blindfoldTools = [
1455
1293
  deletes: ["secret-management-access", "contained_resources"],
1456
1294
  },
1457
1295
  requiredFields: ["path.name", "path.namespace"],
1458
- cliExamples: [
1459
- {
1460
- command: "f5xcctl config secret-management-access delete {name} --namespace {namespace}",
1461
- description: "Delete secret-management-access",
1462
- use_case: "delete",
1463
- },
1464
- ],
1465
1296
  confirmationRequired: true,
1466
1297
  parameterExamples: {
1467
1298
  name: "Name",
@@ -1507,13 +1338,6 @@ export const blindfoldTools = [
1507
1338
  },
1508
1339
  confirmation_required: true,
1509
1340
  danger_level: "high",
1510
- examples: [
1511
- {
1512
- command: "f5xcctl config secret-management-access delete {name} --namespace {namespace}",
1513
- description: "Delete secret-management-access",
1514
- use_case: "delete",
1515
- },
1516
- ],
1517
1341
  field_docs: {},
1518
1342
  optional_fields: [],
1519
1343
  performance_impact: {
@@ -1526,6 +1350,18 @@ export const blindfoldTools = [
1526
1350
  deletes: ["secret-management-access", "contained_resources"],
1527
1351
  },
1528
1352
  },
1353
+ curlExample: null,
1354
+ dependencies: [
1355
+ {
1356
+ domain: "",
1357
+ fieldPath: "",
1358
+ inline: false,
1359
+ required: false,
1360
+ resourceType: "secret-management-access",
1361
+ },
1362
+ ],
1363
+ oneOfGroups: [],
1364
+ subscriptionRequirements: [],
1529
1365
  },
1530
1366
  {
1531
1367
  toolName: "f5xc-api-blindfold-secret-management-access-get",
@@ -1594,13 +1430,6 @@ export const blindfoldTools = [
1594
1430
  dangerLevel: "low",
1595
1431
  sideEffects: null,
1596
1432
  requiredFields: ["path.name", "path.namespace"],
1597
- cliExamples: [
1598
- {
1599
- command: "f5xcctl config secret-management-access get {name} --namespace {namespace}",
1600
- description: "Get specific secret-management-access",
1601
- use_case: "get_specific",
1602
- },
1603
- ],
1604
1433
  confirmationRequired: false,
1605
1434
  parameterExamples: {
1606
1435
  name: "Name",
@@ -1646,13 +1475,6 @@ export const blindfoldTools = [
1646
1475
  },
1647
1476
  confirmation_required: false,
1648
1477
  danger_level: "low",
1649
- examples: [
1650
- {
1651
- command: "f5xcctl config secret-management-access get {name} --namespace {namespace}",
1652
- description: "Get specific secret-management-access",
1653
- use_case: "get_specific",
1654
- },
1655
- ],
1656
1478
  field_docs: {},
1657
1479
  optional_fields: [],
1658
1480
  performance_impact: {
@@ -1663,6 +1485,10 @@ export const blindfoldTools = [
1663
1485
  required_fields: ["path.name", "path.namespace"],
1664
1486
  side_effects: {},
1665
1487
  },
1488
+ curlExample: null,
1489
+ dependencies: [],
1490
+ oneOfGroups: [],
1491
+ subscriptionRequirements: [],
1666
1492
  },
1667
1493
  {
1668
1494
  toolName: "f5xc-api-blindfold-secret-management-access-list",
@@ -1737,13 +1563,6 @@ export const blindfoldTools = [
1737
1563
  dangerLevel: "low",
1738
1564
  sideEffects: null,
1739
1565
  requiredFields: ["path.namespace"],
1740
- cliExamples: [
1741
- {
1742
- command: "f5xcctl config secret-management-access list --namespace {namespace}",
1743
- description: "List all secret-management-accesss",
1744
- use_case: "list_all",
1745
- },
1746
- ],
1747
1566
  confirmationRequired: false,
1748
1567
  parameterExamples: {
1749
1568
  label_filter: "Env in (staging, testing), tier in (web, db)",
@@ -1789,13 +1608,6 @@ export const blindfoldTools = [
1789
1608
  },
1790
1609
  confirmation_required: false,
1791
1610
  danger_level: "low",
1792
- examples: [
1793
- {
1794
- command: "f5xcctl config secret-management-access list --namespace {namespace}",
1795
- description: "List all secret-management-accesss",
1796
- use_case: "list_all",
1797
- },
1798
- ],
1799
1611
  field_docs: {},
1800
1612
  optional_fields: [],
1801
1613
  performance_impact: {
@@ -1806,6 +1618,10 @@ export const blindfoldTools = [
1806
1618
  required_fields: ["path.namespace"],
1807
1619
  side_effects: {},
1808
1620
  },
1621
+ curlExample: null,
1622
+ dependencies: [],
1623
+ oneOfGroups: [],
1624
+ subscriptionRequirements: [],
1809
1625
  },
1810
1626
  {
1811
1627
  toolName: "f5xc-api-blindfold-secret-management-access-update",
@@ -1857,13 +1673,6 @@ export const blindfoldTools = [
1857
1673
  modifies: ["secret-management-access"],
1858
1674
  },
1859
1675
  requiredFields: ["path.metadata.name", "path.metadata.namespace"],
1860
- cliExamples: [
1861
- {
1862
- command: "f5xcctl config secret-management-access update {name} --namespace {namespace} -f {file}.yaml",
1863
- description: "Update secret-management-access",
1864
- use_case: "update",
1865
- },
1866
- ],
1867
1676
  confirmationRequired: false,
1868
1677
  parameterExamples: {
1869
1678
  "metadata.name": "Example-corp-web.",
@@ -1909,13 +1718,6 @@ export const blindfoldTools = [
1909
1718
  },
1910
1719
  confirmation_required: false,
1911
1720
  danger_level: "medium",
1912
- examples: [
1913
- {
1914
- command: "f5xcctl config secret-management-access update {name} --namespace {namespace} -f {file}.yaml",
1915
- description: "Update secret-management-access",
1916
- use_case: "update",
1917
- },
1918
- ],
1919
1721
  field_docs: {},
1920
1722
  optional_fields: [],
1921
1723
  performance_impact: {
@@ -1928,6 +1730,32 @@ export const blindfoldTools = [
1928
1730
  modifies: ["secret-management-access"],
1929
1731
  },
1930
1732
  },
1733
+ curlExample: null,
1734
+ dependencies: [
1735
+ {
1736
+ domain: "",
1737
+ fieldPath: "",
1738
+ inline: false,
1739
+ required: false,
1740
+ resourceType: "secret-management-access",
1741
+ },
1742
+ {
1743
+ domain: "",
1744
+ fieldPath: "metadata",
1745
+ inline: false,
1746
+ required: false,
1747
+ resourceType: "schema-object-replace-meta",
1748
+ },
1749
+ {
1750
+ domain: "",
1751
+ fieldPath: "spec",
1752
+ inline: false,
1753
+ required: false,
1754
+ resourceType: "secret-management-access-replace",
1755
+ },
1756
+ ],
1757
+ oneOfGroups: [],
1758
+ subscriptionRequirements: [],
1931
1759
  },
1932
1760
  {
1933
1761
  toolName: "f5xc-api-blindfold-secret-policy-create",
@@ -1968,18 +1796,6 @@ export const blindfoldTools = [
1968
1796
  creates: ["secret-policy"],
1969
1797
  },
1970
1798
  requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
1971
- cliExamples: [
1972
- {
1973
- command: "f5xcctl secret_management secret-policy create -f {file}.yaml",
1974
- description: "Create from YAML file",
1975
- use_case: "file_based",
1976
- },
1977
- {
1978
- command: "f5xcctl secret_management secret-policy create {name} --namespace {namespace}",
1979
- description: "Create secret-policy",
1980
- use_case: "basic_create",
1981
- },
1982
- ],
1983
1799
  confirmationRequired: false,
1984
1800
  parameterExamples: {
1985
1801
  "metadata.namespace": "Staging",
@@ -2024,18 +1840,6 @@ export const blindfoldTools = [
2024
1840
  },
2025
1841
  confirmation_required: false,
2026
1842
  danger_level: "medium",
2027
- examples: [
2028
- {
2029
- command: "f5xcctl secret_management secret-policy create {name} --namespace {namespace}",
2030
- description: "Create secret-policy",
2031
- use_case: "basic_create",
2032
- },
2033
- {
2034
- command: "f5xcctl secret_management secret-policy create -f {file}.yaml",
2035
- description: "Create from YAML file",
2036
- use_case: "file_based",
2037
- },
2038
- ],
2039
1843
  field_docs: {},
2040
1844
  optional_fields: [],
2041
1845
  performance_impact: {
@@ -2048,6 +1852,32 @@ export const blindfoldTools = [
2048
1852
  creates: ["secret-policy"],
2049
1853
  },
2050
1854
  },
1855
+ curlExample: null,
1856
+ dependencies: [
1857
+ {
1858
+ domain: "",
1859
+ fieldPath: "",
1860
+ inline: false,
1861
+ required: false,
1862
+ resourceType: "secret-policy",
1863
+ },
1864
+ {
1865
+ domain: "",
1866
+ fieldPath: "metadata",
1867
+ inline: false,
1868
+ required: false,
1869
+ resourceType: "schema-object-create-meta",
1870
+ },
1871
+ {
1872
+ domain: "",
1873
+ fieldPath: "spec",
1874
+ inline: false,
1875
+ required: false,
1876
+ resourceType: "schemasecret-policy-create",
1877
+ },
1878
+ ],
1879
+ oneOfGroups: [],
1880
+ subscriptionRequirements: [],
2051
1881
  },
2052
1882
  {
2053
1883
  toolName: "f5xc-api-blindfold-secret-policy-delete",
@@ -2097,13 +1927,6 @@ export const blindfoldTools = [
2097
1927
  deletes: ["secret-policy", "contained_resources"],
2098
1928
  },
2099
1929
  requiredFields: ["path.name", "path.namespace"],
2100
- cliExamples: [
2101
- {
2102
- command: "f5xcctl secret_management secret-policy delete {name} --namespace {namespace}",
2103
- description: "Delete secret-policy",
2104
- use_case: "delete",
2105
- },
2106
- ],
2107
1930
  confirmationRequired: true,
2108
1931
  parameterExamples: {
2109
1932
  name: "Name",
@@ -2149,13 +1972,6 @@ export const blindfoldTools = [
2149
1972
  },
2150
1973
  confirmation_required: true,
2151
1974
  danger_level: "high",
2152
- examples: [
2153
- {
2154
- command: "f5xcctl secret_management secret-policy delete {name} --namespace {namespace}",
2155
- description: "Delete secret-policy",
2156
- use_case: "delete",
2157
- },
2158
- ],
2159
1975
  field_docs: {},
2160
1976
  optional_fields: [],
2161
1977
  performance_impact: {
@@ -2168,6 +1984,18 @@ export const blindfoldTools = [
2168
1984
  deletes: ["secret-policy", "contained_resources"],
2169
1985
  },
2170
1986
  },
1987
+ curlExample: null,
1988
+ dependencies: [
1989
+ {
1990
+ domain: "",
1991
+ fieldPath: "",
1992
+ inline: false,
1993
+ required: false,
1994
+ resourceType: "secret-policy",
1995
+ },
1996
+ ],
1997
+ oneOfGroups: [],
1998
+ subscriptionRequirements: [],
2171
1999
  },
2172
2000
  {
2173
2001
  toolName: "f5xc-api-blindfold-secret-policy-get",
@@ -2236,13 +2064,6 @@ export const blindfoldTools = [
2236
2064
  dangerLevel: "low",
2237
2065
  sideEffects: null,
2238
2066
  requiredFields: ["path.name", "path.namespace"],
2239
- cliExamples: [
2240
- {
2241
- command: "f5xcctl secret_management secret-policy get {name} --namespace {namespace}",
2242
- description: "Get specific secret-policy",
2243
- use_case: "get_specific",
2244
- },
2245
- ],
2246
2067
  confirmationRequired: false,
2247
2068
  parameterExamples: {
2248
2069
  name: "Name",
@@ -2288,13 +2109,6 @@ export const blindfoldTools = [
2288
2109
  },
2289
2110
  confirmation_required: false,
2290
2111
  danger_level: "low",
2291
- examples: [
2292
- {
2293
- command: "f5xcctl secret_management secret-policy get {name} --namespace {namespace}",
2294
- description: "Get specific secret-policy",
2295
- use_case: "get_specific",
2296
- },
2297
- ],
2298
2112
  field_docs: {},
2299
2113
  optional_fields: [],
2300
2114
  performance_impact: {
@@ -2305,6 +2119,10 @@ export const blindfoldTools = [
2305
2119
  required_fields: ["path.name", "path.namespace"],
2306
2120
  side_effects: {},
2307
2121
  },
2122
+ curlExample: null,
2123
+ dependencies: [],
2124
+ oneOfGroups: [],
2125
+ subscriptionRequirements: [],
2308
2126
  },
2309
2127
  {
2310
2128
  toolName: "f5xc-api-blindfold-secret-policy-list",
@@ -2379,13 +2197,6 @@ export const blindfoldTools = [
2379
2197
  dangerLevel: "low",
2380
2198
  sideEffects: null,
2381
2199
  requiredFields: ["path.namespace"],
2382
- cliExamples: [
2383
- {
2384
- command: "f5xcctl secret_management secret-policy list --namespace {namespace}",
2385
- description: "List all secret-policys",
2386
- use_case: "list_all",
2387
- },
2388
- ],
2389
2200
  confirmationRequired: false,
2390
2201
  parameterExamples: {
2391
2202
  label_filter: "Env in (staging, testing), tier in (web, db)",
@@ -2431,13 +2242,6 @@ export const blindfoldTools = [
2431
2242
  },
2432
2243
  confirmation_required: false,
2433
2244
  danger_level: "low",
2434
- examples: [
2435
- {
2436
- command: "f5xcctl secret_management secret-policy list --namespace {namespace}",
2437
- description: "List all secret-policys",
2438
- use_case: "list_all",
2439
- },
2440
- ],
2441
2245
  field_docs: {},
2442
2246
  optional_fields: [],
2443
2247
  performance_impact: {
@@ -2448,6 +2252,10 @@ export const blindfoldTools = [
2448
2252
  required_fields: ["path.namespace"],
2449
2253
  side_effects: {},
2450
2254
  },
2255
+ curlExample: null,
2256
+ dependencies: [],
2257
+ oneOfGroups: [],
2258
+ subscriptionRequirements: [],
2451
2259
  },
2452
2260
  {
2453
2261
  toolName: "f5xc-api-blindfold-secret-policy-rule-create",
@@ -2488,18 +2296,6 @@ export const blindfoldTools = [
2488
2296
  creates: ["secret-policy-rule"],
2489
2297
  },
2490
2298
  requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
2491
- cliExamples: [
2492
- {
2493
- command: "f5xcctl secret_management secret-policy-rule create -f {file}.yaml",
2494
- description: "Create from YAML file",
2495
- use_case: "file_based",
2496
- },
2497
- {
2498
- command: "f5xcctl secret_management secret-policy-rule create {name} --namespace {namespace}",
2499
- description: "Create secret-policy-rule",
2500
- use_case: "basic_create",
2501
- },
2502
- ],
2503
2299
  confirmationRequired: false,
2504
2300
  parameterExamples: {
2505
2301
  "metadata.namespace": "Staging",
@@ -2547,18 +2343,6 @@ export const blindfoldTools = [
2547
2343
  },
2548
2344
  confirmation_required: false,
2549
2345
  danger_level: "medium",
2550
- examples: [
2551
- {
2552
- command: "f5xcctl secret_management secret-policy-rule create {name} --namespace {namespace}",
2553
- description: "Create secret-policy-rule",
2554
- use_case: "basic_create",
2555
- },
2556
- {
2557
- command: "f5xcctl secret_management secret-policy-rule create -f {file}.yaml",
2558
- description: "Create from YAML file",
2559
- use_case: "file_based",
2560
- },
2561
- ],
2562
2346
  field_docs: {},
2563
2347
  optional_fields: [],
2564
2348
  performance_impact: {
@@ -2571,6 +2355,32 @@ export const blindfoldTools = [
2571
2355
  creates: ["secret-policy-rule"],
2572
2356
  },
2573
2357
  },
2358
+ curlExample: null,
2359
+ dependencies: [
2360
+ {
2361
+ domain: "",
2362
+ fieldPath: "",
2363
+ inline: false,
2364
+ required: false,
2365
+ resourceType: "secret-policy-rule",
2366
+ },
2367
+ {
2368
+ domain: "",
2369
+ fieldPath: "metadata",
2370
+ inline: false,
2371
+ required: false,
2372
+ resourceType: "schema-object-create-meta",
2373
+ },
2374
+ {
2375
+ domain: "",
2376
+ fieldPath: "spec",
2377
+ inline: false,
2378
+ required: false,
2379
+ resourceType: "schemasecret-policy-rule-create",
2380
+ },
2381
+ ],
2382
+ oneOfGroups: [],
2383
+ subscriptionRequirements: [],
2574
2384
  },
2575
2385
  {
2576
2386
  toolName: "f5xc-api-blindfold-secret-policy-rule-delete",
@@ -2620,13 +2430,6 @@ export const blindfoldTools = [
2620
2430
  deletes: ["secret-policy-rule", "contained_resources"],
2621
2431
  },
2622
2432
  requiredFields: ["path.name", "path.namespace"],
2623
- cliExamples: [
2624
- {
2625
- command: "f5xcctl secret_management secret-policy-rule delete {name} --namespace {namespace}",
2626
- description: "Delete secret-policy-rule",
2627
- use_case: "delete",
2628
- },
2629
- ],
2630
2433
  confirmationRequired: true,
2631
2434
  parameterExamples: {
2632
2435
  name: "Name",
@@ -2672,13 +2475,6 @@ export const blindfoldTools = [
2672
2475
  },
2673
2476
  confirmation_required: true,
2674
2477
  danger_level: "high",
2675
- examples: [
2676
- {
2677
- command: "f5xcctl secret_management secret-policy-rule delete {name} --namespace {namespace}",
2678
- description: "Delete secret-policy-rule",
2679
- use_case: "delete",
2680
- },
2681
- ],
2682
2478
  field_docs: {},
2683
2479
  optional_fields: [],
2684
2480
  performance_impact: {
@@ -2691,6 +2487,18 @@ export const blindfoldTools = [
2691
2487
  deletes: ["secret-policy-rule", "contained_resources"],
2692
2488
  },
2693
2489
  },
2490
+ curlExample: null,
2491
+ dependencies: [
2492
+ {
2493
+ domain: "",
2494
+ fieldPath: "",
2495
+ inline: false,
2496
+ required: false,
2497
+ resourceType: "secret-policy-rule",
2498
+ },
2499
+ ],
2500
+ oneOfGroups: [],
2501
+ subscriptionRequirements: [],
2694
2502
  },
2695
2503
  {
2696
2504
  toolName: "f5xc-api-blindfold-secret-policy-rule-get",
@@ -2759,13 +2567,6 @@ export const blindfoldTools = [
2759
2567
  dangerLevel: "low",
2760
2568
  sideEffects: null,
2761
2569
  requiredFields: ["path.name", "path.namespace"],
2762
- cliExamples: [
2763
- {
2764
- command: "f5xcctl secret_management secret-policy-rule get {name} --namespace {namespace}",
2765
- description: "Get specific secret-policy-rule",
2766
- use_case: "get_specific",
2767
- },
2768
- ],
2769
2570
  confirmationRequired: false,
2770
2571
  parameterExamples: {
2771
2572
  name: "Name",
@@ -2811,13 +2612,6 @@ export const blindfoldTools = [
2811
2612
  },
2812
2613
  confirmation_required: false,
2813
2614
  danger_level: "low",
2814
- examples: [
2815
- {
2816
- command: "f5xcctl secret_management secret-policy-rule get {name} --namespace {namespace}",
2817
- description: "Get specific secret-policy-rule",
2818
- use_case: "get_specific",
2819
- },
2820
- ],
2821
2615
  field_docs: {},
2822
2616
  optional_fields: [],
2823
2617
  performance_impact: {
@@ -2828,6 +2622,10 @@ export const blindfoldTools = [
2828
2622
  required_fields: ["path.name", "path.namespace"],
2829
2623
  side_effects: {},
2830
2624
  },
2625
+ curlExample: null,
2626
+ dependencies: [],
2627
+ oneOfGroups: [],
2628
+ subscriptionRequirements: [],
2831
2629
  },
2832
2630
  {
2833
2631
  toolName: "f5xc-api-blindfold-secret-policy-rule-list",
@@ -2902,13 +2700,6 @@ export const blindfoldTools = [
2902
2700
  dangerLevel: "low",
2903
2701
  sideEffects: null,
2904
2702
  requiredFields: ["path.namespace"],
2905
- cliExamples: [
2906
- {
2907
- command: "f5xcctl secret_management secret-policy-rule list --namespace {namespace}",
2908
- description: "List all secret-policy-rules",
2909
- use_case: "list_all",
2910
- },
2911
- ],
2912
2703
  confirmationRequired: false,
2913
2704
  parameterExamples: {
2914
2705
  label_filter: "Env in (staging, testing), tier in (web, db)",
@@ -2954,13 +2745,6 @@ export const blindfoldTools = [
2954
2745
  },
2955
2746
  confirmation_required: false,
2956
2747
  danger_level: "low",
2957
- examples: [
2958
- {
2959
- command: "f5xcctl secret_management secret-policy-rule list --namespace {namespace}",
2960
- description: "List all secret-policy-rules",
2961
- use_case: "list_all",
2962
- },
2963
- ],
2964
2748
  field_docs: {},
2965
2749
  optional_fields: [],
2966
2750
  performance_impact: {
@@ -2971,6 +2755,10 @@ export const blindfoldTools = [
2971
2755
  required_fields: ["path.namespace"],
2972
2756
  side_effects: {},
2973
2757
  },
2758
+ curlExample: null,
2759
+ dependencies: [],
2760
+ oneOfGroups: [],
2761
+ subscriptionRequirements: [],
2974
2762
  },
2975
2763
  {
2976
2764
  toolName: "f5xc-api-blindfold-secret-policy-rule-update",
@@ -3022,13 +2810,6 @@ export const blindfoldTools = [
3022
2810
  modifies: ["secret-policy-rule"],
3023
2811
  },
3024
2812
  requiredFields: ["path.metadata.name", "path.metadata.namespace"],
3025
- cliExamples: [
3026
- {
3027
- command: "f5xcctl secret_management secret-policy-rule update {name} --namespace {namespace} -f {file}.yaml",
3028
- description: "Update secret-policy-rule",
3029
- use_case: "update",
3030
- },
3031
- ],
3032
2813
  confirmationRequired: false,
3033
2814
  parameterExamples: {
3034
2815
  "metadata.name": "Example-corp-web.",
@@ -3074,13 +2855,6 @@ export const blindfoldTools = [
3074
2855
  },
3075
2856
  confirmation_required: false,
3076
2857
  danger_level: "medium",
3077
- examples: [
3078
- {
3079
- command: "f5xcctl secret_management secret-policy-rule update {name} --namespace {namespace} -f {file}.yaml",
3080
- description: "Update secret-policy-rule",
3081
- use_case: "update",
3082
- },
3083
- ],
3084
2858
  field_docs: {},
3085
2859
  optional_fields: [],
3086
2860
  performance_impact: {
@@ -3093,6 +2867,32 @@ export const blindfoldTools = [
3093
2867
  modifies: ["secret-policy-rule"],
3094
2868
  },
3095
2869
  },
2870
+ curlExample: null,
2871
+ dependencies: [
2872
+ {
2873
+ domain: "",
2874
+ fieldPath: "",
2875
+ inline: false,
2876
+ required: false,
2877
+ resourceType: "secret-policy-rule",
2878
+ },
2879
+ {
2880
+ domain: "",
2881
+ fieldPath: "metadata",
2882
+ inline: false,
2883
+ required: false,
2884
+ resourceType: "schema-object-replace-meta",
2885
+ },
2886
+ {
2887
+ domain: "",
2888
+ fieldPath: "spec",
2889
+ inline: false,
2890
+ required: false,
2891
+ resourceType: "schemasecret-policy-rule-replace",
2892
+ },
2893
+ ],
2894
+ oneOfGroups: [],
2895
+ subscriptionRequirements: [],
3096
2896
  },
3097
2897
  {
3098
2898
  toolName: "f5xc-api-blindfold-secret-policy-update",
@@ -3144,13 +2944,6 @@ export const blindfoldTools = [
3144
2944
  modifies: ["secret-policy"],
3145
2945
  },
3146
2946
  requiredFields: ["path.metadata.name", "path.metadata.namespace"],
3147
- cliExamples: [
3148
- {
3149
- command: "f5xcctl secret_management secret-policy update {name} --namespace {namespace} -f {file}.yaml",
3150
- description: "Update secret-policy",
3151
- use_case: "update",
3152
- },
3153
- ],
3154
2947
  confirmationRequired: false,
3155
2948
  parameterExamples: {
3156
2949
  "metadata.name": "Example-corp-web.",
@@ -3196,13 +2989,6 @@ export const blindfoldTools = [
3196
2989
  },
3197
2990
  confirmation_required: false,
3198
2991
  danger_level: "medium",
3199
- examples: [
3200
- {
3201
- command: "f5xcctl secret_management secret-policy update {name} --namespace {namespace} -f {file}.yaml",
3202
- description: "Update secret-policy",
3203
- use_case: "update",
3204
- },
3205
- ],
3206
2992
  field_docs: {},
3207
2993
  optional_fields: [],
3208
2994
  performance_impact: {
@@ -3215,6 +3001,32 @@ export const blindfoldTools = [
3215
3001
  modifies: ["secret-policy"],
3216
3002
  },
3217
3003
  },
3004
+ curlExample: null,
3005
+ dependencies: [
3006
+ {
3007
+ domain: "",
3008
+ fieldPath: "",
3009
+ inline: false,
3010
+ required: false,
3011
+ resourceType: "secret-policy",
3012
+ },
3013
+ {
3014
+ domain: "",
3015
+ fieldPath: "metadata",
3016
+ inline: false,
3017
+ required: false,
3018
+ resourceType: "schema-object-replace-meta",
3019
+ },
3020
+ {
3021
+ domain: "",
3022
+ fieldPath: "spec",
3023
+ inline: false,
3024
+ required: false,
3025
+ resourceType: "schemasecret-policy-replace",
3026
+ },
3027
+ ],
3028
+ oneOfGroups: [],
3029
+ subscriptionRequirements: [],
3218
3030
  },
3219
3031
  {
3220
3032
  toolName: "f5xc-api-blindfold-softdelete-create",
@@ -3266,18 +3078,6 @@ export const blindfoldTools = [
3266
3078
  creates: ["softdelete"],
3267
3079
  },
3268
3080
  requiredFields: ["metadata.name", "metadata.namespace", "path.name", "path.namespace"],
3269
- cliExamples: [
3270
- {
3271
- command: "f5xcctl secret_management softdelete create -f {file}.yaml",
3272
- description: "Create from YAML file",
3273
- use_case: "file_based",
3274
- },
3275
- {
3276
- command: "f5xcctl secret_management softdelete create {name} --namespace {namespace}",
3277
- description: "Create softdelete",
3278
- use_case: "basic_create",
3279
- },
3280
- ],
3281
3081
  confirmationRequired: false,
3282
3082
  parameterExamples: {
3283
3083
  name: "Site-secret-policy.",
@@ -3323,18 +3123,6 @@ export const blindfoldTools = [
3323
3123
  },
3324
3124
  confirmation_required: false,
3325
3125
  danger_level: "medium",
3326
- examples: [
3327
- {
3328
- command: "f5xcctl secret_management softdelete create {name} --namespace {namespace}",
3329
- description: "Create softdelete",
3330
- use_case: "basic_create",
3331
- },
3332
- {
3333
- command: "f5xcctl secret_management softdelete create -f {file}.yaml",
3334
- description: "Create from YAML file",
3335
- use_case: "file_based",
3336
- },
3337
- ],
3338
3126
  field_docs: {},
3339
3127
  optional_fields: [],
3340
3128
  performance_impact: {
@@ -3347,6 +3135,18 @@ export const blindfoldTools = [
3347
3135
  creates: ["softdelete"],
3348
3136
  },
3349
3137
  },
3138
+ curlExample: null,
3139
+ dependencies: [
3140
+ {
3141
+ domain: "",
3142
+ fieldPath: "",
3143
+ inline: false,
3144
+ required: false,
3145
+ resourceType: "secret-policy-soft",
3146
+ },
3147
+ ],
3148
+ oneOfGroups: [],
3149
+ subscriptionRequirements: [],
3350
3150
  },
3351
3151
  {
3352
3152
  toolName: "f5xc-api-blindfold-voltshare-admin-policy-create",
@@ -3387,18 +3187,6 @@ export const blindfoldTools = [
3387
3187
  creates: ["voltshare-admin-policy"],
3388
3188
  },
3389
3189
  requiredFields: ["metadata.name", "metadata.namespace", "path.metadata.namespace"],
3390
- cliExamples: [
3391
- {
3392
- command: "f5xcctl secret_management voltshare-admin-policy create -f {file}.yaml",
3393
- description: "Create from YAML file",
3394
- use_case: "file_based",
3395
- },
3396
- {
3397
- command: "f5xcctl secret_management voltshare-admin-policy create {name} --namespace {namespace}",
3398
- description: "Create voltshare-admin-policy",
3399
- use_case: "basic_create",
3400
- },
3401
- ],
3402
3190
  confirmationRequired: false,
3403
3191
  parameterExamples: {
3404
3192
  "metadata.namespace": "Staging",
@@ -3446,18 +3234,6 @@ export const blindfoldTools = [
3446
3234
  },
3447
3235
  confirmation_required: false,
3448
3236
  danger_level: "medium",
3449
- examples: [
3450
- {
3451
- command: "f5xcctl secret_management voltshare-admin-policy create {name} --namespace {namespace}",
3452
- description: "Create voltshare-admin-policy",
3453
- use_case: "basic_create",
3454
- },
3455
- {
3456
- command: "f5xcctl secret_management voltshare-admin-policy create -f {file}.yaml",
3457
- description: "Create from YAML file",
3458
- use_case: "file_based",
3459
- },
3460
- ],
3461
3237
  field_docs: {},
3462
3238
  optional_fields: [],
3463
3239
  performance_impact: {
@@ -3470,6 +3246,32 @@ export const blindfoldTools = [
3470
3246
  creates: ["voltshare-admin-policy"],
3471
3247
  },
3472
3248
  },
3249
+ curlExample: null,
3250
+ dependencies: [
3251
+ {
3252
+ domain: "",
3253
+ fieldPath: "",
3254
+ inline: false,
3255
+ required: false,
3256
+ resourceType: "voltshare-admin-policy",
3257
+ },
3258
+ {
3259
+ domain: "",
3260
+ fieldPath: "metadata",
3261
+ inline: false,
3262
+ required: false,
3263
+ resourceType: "schema-object-create-meta",
3264
+ },
3265
+ {
3266
+ domain: "",
3267
+ fieldPath: "spec",
3268
+ inline: false,
3269
+ required: false,
3270
+ resourceType: "schemavoltshare-admin-policy-create",
3271
+ },
3272
+ ],
3273
+ oneOfGroups: [],
3274
+ subscriptionRequirements: [],
3473
3275
  },
3474
3276
  {
3475
3277
  toolName: "f5xc-api-blindfold-voltshare-admin-policy-delete",
@@ -3519,13 +3321,6 @@ export const blindfoldTools = [
3519
3321
  deletes: ["voltshare-admin-policy", "contained_resources"],
3520
3322
  },
3521
3323
  requiredFields: ["path.name", "path.namespace"],
3522
- cliExamples: [
3523
- {
3524
- command: "f5xcctl secret_management voltshare-admin-policy delete {name} --namespace {namespace}",
3525
- description: "Delete voltshare-admin-policy",
3526
- use_case: "delete",
3527
- },
3528
- ],
3529
3324
  confirmationRequired: true,
3530
3325
  parameterExamples: {
3531
3326
  name: "Name",
@@ -3571,13 +3366,6 @@ export const blindfoldTools = [
3571
3366
  },
3572
3367
  confirmation_required: true,
3573
3368
  danger_level: "high",
3574
- examples: [
3575
- {
3576
- command: "f5xcctl secret_management voltshare-admin-policy delete {name} --namespace {namespace}",
3577
- description: "Delete voltshare-admin-policy",
3578
- use_case: "delete",
3579
- },
3580
- ],
3581
3369
  field_docs: {},
3582
3370
  optional_fields: [],
3583
3371
  performance_impact: {
@@ -3590,6 +3378,18 @@ export const blindfoldTools = [
3590
3378
  deletes: ["voltshare-admin-policy", "contained_resources"],
3591
3379
  },
3592
3380
  },
3381
+ curlExample: null,
3382
+ dependencies: [
3383
+ {
3384
+ domain: "",
3385
+ fieldPath: "",
3386
+ inline: false,
3387
+ required: false,
3388
+ resourceType: "voltshare-admin-policy",
3389
+ },
3390
+ ],
3391
+ oneOfGroups: [],
3392
+ subscriptionRequirements: [],
3593
3393
  },
3594
3394
  {
3595
3395
  toolName: "f5xc-api-blindfold-voltshare-admin-policy-get",
@@ -3658,13 +3458,6 @@ export const blindfoldTools = [
3658
3458
  dangerLevel: "low",
3659
3459
  sideEffects: null,
3660
3460
  requiredFields: ["path.name", "path.namespace"],
3661
- cliExamples: [
3662
- {
3663
- command: "f5xcctl secret_management voltshare-admin-policy get {name} --namespace {namespace}",
3664
- description: "Get specific voltshare-admin-policy",
3665
- use_case: "get_specific",
3666
- },
3667
- ],
3668
3461
  confirmationRequired: false,
3669
3462
  parameterExamples: {
3670
3463
  name: "Name",
@@ -3710,13 +3503,6 @@ export const blindfoldTools = [
3710
3503
  },
3711
3504
  confirmation_required: false,
3712
3505
  danger_level: "low",
3713
- examples: [
3714
- {
3715
- command: "f5xcctl secret_management voltshare-admin-policy get {name} --namespace {namespace}",
3716
- description: "Get specific voltshare-admin-policy",
3717
- use_case: "get_specific",
3718
- },
3719
- ],
3720
3506
  field_docs: {},
3721
3507
  optional_fields: [],
3722
3508
  performance_impact: {
@@ -3727,6 +3513,10 @@ export const blindfoldTools = [
3727
3513
  required_fields: ["path.name", "path.namespace"],
3728
3514
  side_effects: {},
3729
3515
  },
3516
+ curlExample: null,
3517
+ dependencies: [],
3518
+ oneOfGroups: [],
3519
+ subscriptionRequirements: [],
3730
3520
  },
3731
3521
  {
3732
3522
  toolName: "f5xc-api-blindfold-voltshare-admin-policy-list",
@@ -3801,13 +3591,6 @@ export const blindfoldTools = [
3801
3591
  dangerLevel: "low",
3802
3592
  sideEffects: null,
3803
3593
  requiredFields: ["path.namespace"],
3804
- cliExamples: [
3805
- {
3806
- command: "f5xcctl secret_management voltshare-admin-policy list --namespace {namespace}",
3807
- description: "List all voltshare-admin-policys",
3808
- use_case: "list_all",
3809
- },
3810
- ],
3811
3594
  confirmationRequired: false,
3812
3595
  parameterExamples: {
3813
3596
  label_filter: "Env in (staging, testing), tier in (web, db)",
@@ -3853,13 +3636,6 @@ export const blindfoldTools = [
3853
3636
  },
3854
3637
  confirmation_required: false,
3855
3638
  danger_level: "low",
3856
- examples: [
3857
- {
3858
- command: "f5xcctl secret_management voltshare-admin-policy list --namespace {namespace}",
3859
- description: "List all voltshare-admin-policys",
3860
- use_case: "list_all",
3861
- },
3862
- ],
3863
3639
  field_docs: {},
3864
3640
  optional_fields: [],
3865
3641
  performance_impact: {
@@ -3870,6 +3646,10 @@ export const blindfoldTools = [
3870
3646
  required_fields: ["path.namespace"],
3871
3647
  side_effects: {},
3872
3648
  },
3649
+ curlExample: null,
3650
+ dependencies: [],
3651
+ oneOfGroups: [],
3652
+ subscriptionRequirements: [],
3873
3653
  },
3874
3654
  {
3875
3655
  toolName: "f5xc-api-blindfold-voltshare-admin-policy-update",
@@ -3921,13 +3701,6 @@ export const blindfoldTools = [
3921
3701
  modifies: ["voltshare-admin-policy"],
3922
3702
  },
3923
3703
  requiredFields: ["path.metadata.name", "path.metadata.namespace"],
3924
- cliExamples: [
3925
- {
3926
- command: "f5xcctl secret_management voltshare-admin-policy update {name} --namespace {namespace} -f {file}.yaml",
3927
- description: "Update voltshare-admin-policy",
3928
- use_case: "update",
3929
- },
3930
- ],
3931
3704
  confirmationRequired: false,
3932
3705
  parameterExamples: {
3933
3706
  "metadata.name": "Example-corp-web.",
@@ -3973,13 +3746,6 @@ export const blindfoldTools = [
3973
3746
  },
3974
3747
  confirmation_required: false,
3975
3748
  danger_level: "medium",
3976
- examples: [
3977
- {
3978
- command: "f5xcctl secret_management voltshare-admin-policy update {name} --namespace {namespace} -f {file}.yaml",
3979
- description: "Update voltshare-admin-policy",
3980
- use_case: "update",
3981
- },
3982
- ],
3983
3749
  field_docs: {},
3984
3750
  optional_fields: [],
3985
3751
  performance_impact: {
@@ -3992,6 +3758,32 @@ export const blindfoldTools = [
3992
3758
  modifies: ["voltshare-admin-policy"],
3993
3759
  },
3994
3760
  },
3761
+ curlExample: null,
3762
+ dependencies: [
3763
+ {
3764
+ domain: "",
3765
+ fieldPath: "",
3766
+ inline: false,
3767
+ required: false,
3768
+ resourceType: "voltshare-admin-policy",
3769
+ },
3770
+ {
3771
+ domain: "",
3772
+ fieldPath: "metadata",
3773
+ inline: false,
3774
+ required: false,
3775
+ resourceType: "schema-object-replace-meta",
3776
+ },
3777
+ {
3778
+ domain: "",
3779
+ fieldPath: "spec",
3780
+ inline: false,
3781
+ required: false,
3782
+ resourceType: "schemavoltshare-admin-policy-replace",
3783
+ },
3784
+ ],
3785
+ oneOfGroups: [],
3786
+ subscriptionRequirements: [],
3995
3787
  },
3996
3788
  ];
3997
3789
  export default blindfoldTools;