@robinmordasiewicz/f5xc-xcsh 2.0.3-2601050142 → 2.0.8-2601050643

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/completions/_xcsh CHANGED
@@ -68,108 +68,7 @@ _xcsh() {
68
68
  'virtual:HTTP, TCP, UDP load balancers and origin pools.'
69
69
  'vpm_and_node_management:Vpm And Node Management API'
70
70
  'waf:Request inspection, attack signatures, and bot mitigation.'
71
- 'console-ui:Alias for admin_console_and_ui'
72
- 'ui-assets:Alias for admin_console_and_ui'
73
- 'static-components:Alias for admin_console_and_ui'
74
- 'apisec:Alias for api'
75
- 'api-discovery:Alias for api'
76
- 'authn:Alias for authentication'
77
- 'oidc:Alias for authentication'
78
- 'sso:Alias for authentication'
79
- 'f5-bigip:Alias for bigip'
80
- 'irule:Alias for bigip'
81
- 'ltm:Alias for bigip'
82
- 'billing-usage:Alias for billing_and_usage'
83
- 'quotas:Alias for billing_and_usage'
84
- 'usage-tracking:Alias for billing_and_usage'
85
- 'bf:Alias for blindfold'
86
- 'encrypt:Alias for blindfold'
87
- 'secrets:Alias for blindfold'
88
- 'threat-defense:Alias for bot_and_threat_defense'
89
- 'tpm:Alias for bot_and_threat_defense'
90
- 'shape-bot:Alias for bot_and_threat_defense'
91
- 'cache:Alias for cdn'
92
- 'content:Alias for cdn'
93
- 'ce-mgmt:Alias for ce_management'
94
- 'edge-management:Alias for ce_management'
95
- 'ce-lifecycle:Alias for ce_management'
96
- 'cert:Alias for certificates'
97
- 'certs:Alias for certificates'
98
- 'ssl:Alias for certificates'
99
- 'tls:Alias for certificates'
100
- 'cloud:Alias for cloud_infrastructure'
101
- 'infra:Alias for cloud_infrastructure'
102
- 'provider:Alias for cloud_infrastructure'
103
- 'vk8s:Alias for container_services'
104
- 'containers:Alias for container_services'
105
- 'workloads:Alias for container_services'
106
- 'data-privacy:Alias for data_and_privacy_security'
107
- 'pii:Alias for data_and_privacy_security'
108
- 'sensitive-data:Alias for data_and_privacy_security'
109
- 'lma:Alias for data_and_privacy_security'
110
- 'di:Alias for data_intelligence'
111
- 'intelligence:Alias for data_intelligence'
112
- 'insights:Alias for data_intelligence'
113
- 'dos:Alias for ddos'
114
- 'ddos-protect:Alias for ddos'
115
- 'dns-zone:Alias for dns'
116
- 'zones:Alias for dns'
117
- 'mk8s:Alias for managed_kubernetes'
118
- 'appstack:Alias for managed_kubernetes'
119
- 'k8s-mgmt:Alias for managed_kubernetes'
120
- 'market:Alias for marketplace'
121
- 'addons:Alias for marketplace'
122
- 'extensions:Alias for marketplace'
123
- 'net:Alias for network'
124
- 'routing:Alias for network'
125
- 'bgp:Alias for network'
126
- 'netsec:Alias for network_security'
127
- 'nfw:Alias for network_security'
128
- 'nginx:Alias for nginx_one'
129
- 'nms:Alias for nginx_one'
130
- 'nginx-plus:Alias for nginx_one'
131
- 'storage:Alias for object_storage'
132
- 's3:Alias for object_storage'
133
- 'buckets:Alias for object_storage'
134
- 'obs:Alias for observability'
135
- 'monitoring:Alias for observability'
136
- 'synth:Alias for observability'
137
- 'ratelimit:Alias for rate_limiting'
138
- 'throttle:Alias for rate_limiting'
139
- 'policer:Alias for rate_limiting'
140
- 'secops:Alias for secops_and_incident_response'
141
- 'incident-response:Alias for secops_and_incident_response'
142
- 'mitigation:Alias for secops_and_incident_response'
143
- 'mesh:Alias for service_mesh'
144
- 'svc-mesh:Alias for service_mesh'
145
- 'shape-sec:Alias for shape'
146
- 'safeap:Alias for shape'
147
- 'site:Alias for sites'
148
- 'deployment:Alias for sites'
149
- 'stats:Alias for statistics'
150
- 'metrics:Alias for statistics'
151
- 'logs:Alias for statistics'
152
- 'tickets:Alias for support'
153
- 'help-desk:Alias for support'
154
- 'telemetry:Alias for telemetry_and_insights'
155
- 'ti:Alias for telemetry_and_insights'
156
- 'tenant-identity:Alias for tenant_and_identity'
157
- 'idm:Alias for tenant_and_identity'
158
- 'user-settings:Alias for tenant_and_identity'
159
- 'threats:Alias for threat_campaign'
160
- 'campaigns:Alias for threat_campaign'
161
- 'threat-intel:Alias for threat_campaign'
162
- 'user:Alias for users'
163
- 'accounts:Alias for users'
164
- 'iam:Alias for users'
165
- 'lb:Alias for virtual'
166
- 'loadbalancer:Alias for virtual'
167
- 'vhost:Alias for virtual'
168
- 'vpm:Alias for vpm_and_node_management'
169
- 'nodes:Alias for vpm_and_node_management'
170
- 'node-mgmt:Alias for vpm_and_node_management'
171
- 'firewall:Alias for waf'
172
- 'appfw:Alias for waf'
71
+
173
72
  )
174
73
  builtins=(
175
74
  'help:Show help information'
@@ -6,7 +6,7 @@ _xcsh_completions() {
6
6
  local cur prev words cword
7
7
  _init_completion || return
8
8
 
9
- local commands="admin_console_and_ui ai_services api authentication bigip billing_and_usage blindfold bot_and_threat_defense cdn ce_management certificates cloud_infrastructure cloudstatus completion container_services data_and_privacy_security data_intelligence ddos dns login managed_kubernetes marketplace network network_security nginx_one object_storage observability rate_limiting secops_and_incident_response service_mesh shape sites statistics subscription support telemetry_and_insights tenant_and_identity threat_campaign users virtual vpm_and_node_management waf console-ui ui-assets static-components apisec api-discovery authn oidc sso f5-bigip irule ltm billing-usage quotas usage-tracking bf encrypt secrets threat-defense tpm shape-bot cache content ce-mgmt edge-management ce-lifecycle cert certs ssl tls cloud infra provider vk8s containers workloads data-privacy pii sensitive-data lma di intelligence insights dos ddos-protect dns-zone zones mk8s appstack k8s-mgmt market addons extensions net routing bgp netsec nfw nginx nms nginx-plus storage s3 buckets obs monitoring synth ratelimit throttle policer secops incident-response mitigation mesh svc-mesh shape-sec safeap site deployment stats metrics logs tickets help-desk telemetry ti tenant-identity idm user-settings threats campaigns threat-intel user accounts iam lb loadbalancer vhost vpm nodes node-mgmt firewall appfw help quit exit clear history refresh"
9
+ local commands="admin_console_and_ui ai_services api authentication bigip billing_and_usage blindfold bot_and_threat_defense cdn ce_management certificates cloud_infrastructure cloudstatus completion container_services data_and_privacy_security data_intelligence ddos dns login managed_kubernetes marketplace network network_security nginx_one object_storage observability rate_limiting secops_and_incident_response service_mesh shape sites statistics subscription support telemetry_and_insights tenant_and_identity threat_campaign users virtual vpm_and_node_management waf help quit exit clear history refresh"
10
10
  local actions="list get create delete replace apply status patch add-labels remove-labels"
11
11
  local builtins="help quit exit clear history context ctx refresh"
12
12
  local global_flags="--help -h --version -v --no-color --output -o --namespace -ns --spec"
@@ -67,108 +67,7 @@ complete -c xcsh -n "__fish_use_subcommand" -a "vpm_and_node_management" -d 'Vpm
67
67
  complete -c xcsh -n "__fish_use_subcommand" -a "waf" -d 'Request inspection, attack signatures, and bot mitigation.'
68
68
 
69
69
  # Alias completions
70
- complete -c xcsh -n "__fish_use_subcommand" -a "console-ui" -d 'Alias for admin_console_and_ui'
71
- complete -c xcsh -n "__fish_use_subcommand" -a "ui-assets" -d 'Alias for admin_console_and_ui'
72
- complete -c xcsh -n "__fish_use_subcommand" -a "static-components" -d 'Alias for admin_console_and_ui'
73
- complete -c xcsh -n "__fish_use_subcommand" -a "apisec" -d 'Alias for api'
74
- complete -c xcsh -n "__fish_use_subcommand" -a "api-discovery" -d 'Alias for api'
75
- complete -c xcsh -n "__fish_use_subcommand" -a "authn" -d 'Alias for authentication'
76
- complete -c xcsh -n "__fish_use_subcommand" -a "oidc" -d 'Alias for authentication'
77
- complete -c xcsh -n "__fish_use_subcommand" -a "sso" -d 'Alias for authentication'
78
- complete -c xcsh -n "__fish_use_subcommand" -a "f5-bigip" -d 'Alias for bigip'
79
- complete -c xcsh -n "__fish_use_subcommand" -a "irule" -d 'Alias for bigip'
80
- complete -c xcsh -n "__fish_use_subcommand" -a "ltm" -d 'Alias for bigip'
81
- complete -c xcsh -n "__fish_use_subcommand" -a "billing-usage" -d 'Alias for billing_and_usage'
82
- complete -c xcsh -n "__fish_use_subcommand" -a "quotas" -d 'Alias for billing_and_usage'
83
- complete -c xcsh -n "__fish_use_subcommand" -a "usage-tracking" -d 'Alias for billing_and_usage'
84
- complete -c xcsh -n "__fish_use_subcommand" -a "bf" -d 'Alias for blindfold'
85
- complete -c xcsh -n "__fish_use_subcommand" -a "encrypt" -d 'Alias for blindfold'
86
- complete -c xcsh -n "__fish_use_subcommand" -a "secrets" -d 'Alias for blindfold'
87
- complete -c xcsh -n "__fish_use_subcommand" -a "threat-defense" -d 'Alias for bot_and_threat_defense'
88
- complete -c xcsh -n "__fish_use_subcommand" -a "tpm" -d 'Alias for bot_and_threat_defense'
89
- complete -c xcsh -n "__fish_use_subcommand" -a "shape-bot" -d 'Alias for bot_and_threat_defense'
90
- complete -c xcsh -n "__fish_use_subcommand" -a "cache" -d 'Alias for cdn'
91
- complete -c xcsh -n "__fish_use_subcommand" -a "content" -d 'Alias for cdn'
92
- complete -c xcsh -n "__fish_use_subcommand" -a "ce-mgmt" -d 'Alias for ce_management'
93
- complete -c xcsh -n "__fish_use_subcommand" -a "edge-management" -d 'Alias for ce_management'
94
- complete -c xcsh -n "__fish_use_subcommand" -a "ce-lifecycle" -d 'Alias for ce_management'
95
- complete -c xcsh -n "__fish_use_subcommand" -a "cert" -d 'Alias for certificates'
96
- complete -c xcsh -n "__fish_use_subcommand" -a "certs" -d 'Alias for certificates'
97
- complete -c xcsh -n "__fish_use_subcommand" -a "ssl" -d 'Alias for certificates'
98
- complete -c xcsh -n "__fish_use_subcommand" -a "tls" -d 'Alias for certificates'
99
- complete -c xcsh -n "__fish_use_subcommand" -a "cloud" -d 'Alias for cloud_infrastructure'
100
- complete -c xcsh -n "__fish_use_subcommand" -a "infra" -d 'Alias for cloud_infrastructure'
101
- complete -c xcsh -n "__fish_use_subcommand" -a "provider" -d 'Alias for cloud_infrastructure'
102
- complete -c xcsh -n "__fish_use_subcommand" -a "vk8s" -d 'Alias for container_services'
103
- complete -c xcsh -n "__fish_use_subcommand" -a "containers" -d 'Alias for container_services'
104
- complete -c xcsh -n "__fish_use_subcommand" -a "workloads" -d 'Alias for container_services'
105
- complete -c xcsh -n "__fish_use_subcommand" -a "data-privacy" -d 'Alias for data_and_privacy_security'
106
- complete -c xcsh -n "__fish_use_subcommand" -a "pii" -d 'Alias for data_and_privacy_security'
107
- complete -c xcsh -n "__fish_use_subcommand" -a "sensitive-data" -d 'Alias for data_and_privacy_security'
108
- complete -c xcsh -n "__fish_use_subcommand" -a "lma" -d 'Alias for data_and_privacy_security'
109
- complete -c xcsh -n "__fish_use_subcommand" -a "di" -d 'Alias for data_intelligence'
110
- complete -c xcsh -n "__fish_use_subcommand" -a "intelligence" -d 'Alias for data_intelligence'
111
- complete -c xcsh -n "__fish_use_subcommand" -a "insights" -d 'Alias for data_intelligence'
112
- complete -c xcsh -n "__fish_use_subcommand" -a "dos" -d 'Alias for ddos'
113
- complete -c xcsh -n "__fish_use_subcommand" -a "ddos-protect" -d 'Alias for ddos'
114
- complete -c xcsh -n "__fish_use_subcommand" -a "dns-zone" -d 'Alias for dns'
115
- complete -c xcsh -n "__fish_use_subcommand" -a "zones" -d 'Alias for dns'
116
- complete -c xcsh -n "__fish_use_subcommand" -a "mk8s" -d 'Alias for managed_kubernetes'
117
- complete -c xcsh -n "__fish_use_subcommand" -a "appstack" -d 'Alias for managed_kubernetes'
118
- complete -c xcsh -n "__fish_use_subcommand" -a "k8s-mgmt" -d 'Alias for managed_kubernetes'
119
- complete -c xcsh -n "__fish_use_subcommand" -a "market" -d 'Alias for marketplace'
120
- complete -c xcsh -n "__fish_use_subcommand" -a "addons" -d 'Alias for marketplace'
121
- complete -c xcsh -n "__fish_use_subcommand" -a "extensions" -d 'Alias for marketplace'
122
- complete -c xcsh -n "__fish_use_subcommand" -a "net" -d 'Alias for network'
123
- complete -c xcsh -n "__fish_use_subcommand" -a "routing" -d 'Alias for network'
124
- complete -c xcsh -n "__fish_use_subcommand" -a "bgp" -d 'Alias for network'
125
- complete -c xcsh -n "__fish_use_subcommand" -a "netsec" -d 'Alias for network_security'
126
- complete -c xcsh -n "__fish_use_subcommand" -a "nfw" -d 'Alias for network_security'
127
- complete -c xcsh -n "__fish_use_subcommand" -a "nginx" -d 'Alias for nginx_one'
128
- complete -c xcsh -n "__fish_use_subcommand" -a "nms" -d 'Alias for nginx_one'
129
- complete -c xcsh -n "__fish_use_subcommand" -a "nginx-plus" -d 'Alias for nginx_one'
130
- complete -c xcsh -n "__fish_use_subcommand" -a "storage" -d 'Alias for object_storage'
131
- complete -c xcsh -n "__fish_use_subcommand" -a "s3" -d 'Alias for object_storage'
132
- complete -c xcsh -n "__fish_use_subcommand" -a "buckets" -d 'Alias for object_storage'
133
- complete -c xcsh -n "__fish_use_subcommand" -a "obs" -d 'Alias for observability'
134
- complete -c xcsh -n "__fish_use_subcommand" -a "monitoring" -d 'Alias for observability'
135
- complete -c xcsh -n "__fish_use_subcommand" -a "synth" -d 'Alias for observability'
136
- complete -c xcsh -n "__fish_use_subcommand" -a "ratelimit" -d 'Alias for rate_limiting'
137
- complete -c xcsh -n "__fish_use_subcommand" -a "throttle" -d 'Alias for rate_limiting'
138
- complete -c xcsh -n "__fish_use_subcommand" -a "policer" -d 'Alias for rate_limiting'
139
- complete -c xcsh -n "__fish_use_subcommand" -a "secops" -d 'Alias for secops_and_incident_response'
140
- complete -c xcsh -n "__fish_use_subcommand" -a "incident-response" -d 'Alias for secops_and_incident_response'
141
- complete -c xcsh -n "__fish_use_subcommand" -a "mitigation" -d 'Alias for secops_and_incident_response'
142
- complete -c xcsh -n "__fish_use_subcommand" -a "mesh" -d 'Alias for service_mesh'
143
- complete -c xcsh -n "__fish_use_subcommand" -a "svc-mesh" -d 'Alias for service_mesh'
144
- complete -c xcsh -n "__fish_use_subcommand" -a "shape-sec" -d 'Alias for shape'
145
- complete -c xcsh -n "__fish_use_subcommand" -a "safeap" -d 'Alias for shape'
146
- complete -c xcsh -n "__fish_use_subcommand" -a "site" -d 'Alias for sites'
147
- complete -c xcsh -n "__fish_use_subcommand" -a "deployment" -d 'Alias for sites'
148
- complete -c xcsh -n "__fish_use_subcommand" -a "stats" -d 'Alias for statistics'
149
- complete -c xcsh -n "__fish_use_subcommand" -a "metrics" -d 'Alias for statistics'
150
- complete -c xcsh -n "__fish_use_subcommand" -a "logs" -d 'Alias for statistics'
151
- complete -c xcsh -n "__fish_use_subcommand" -a "tickets" -d 'Alias for support'
152
- complete -c xcsh -n "__fish_use_subcommand" -a "help-desk" -d 'Alias for support'
153
- complete -c xcsh -n "__fish_use_subcommand" -a "telemetry" -d 'Alias for telemetry_and_insights'
154
- complete -c xcsh -n "__fish_use_subcommand" -a "ti" -d 'Alias for telemetry_and_insights'
155
- complete -c xcsh -n "__fish_use_subcommand" -a "tenant-identity" -d 'Alias for tenant_and_identity'
156
- complete -c xcsh -n "__fish_use_subcommand" -a "idm" -d 'Alias for tenant_and_identity'
157
- complete -c xcsh -n "__fish_use_subcommand" -a "user-settings" -d 'Alias for tenant_and_identity'
158
- complete -c xcsh -n "__fish_use_subcommand" -a "threats" -d 'Alias for threat_campaign'
159
- complete -c xcsh -n "__fish_use_subcommand" -a "campaigns" -d 'Alias for threat_campaign'
160
- complete -c xcsh -n "__fish_use_subcommand" -a "threat-intel" -d 'Alias for threat_campaign'
161
- complete -c xcsh -n "__fish_use_subcommand" -a "user" -d 'Alias for users'
162
- complete -c xcsh -n "__fish_use_subcommand" -a "accounts" -d 'Alias for users'
163
- complete -c xcsh -n "__fish_use_subcommand" -a "iam" -d 'Alias for users'
164
- complete -c xcsh -n "__fish_use_subcommand" -a "lb" -d 'Alias for virtual'
165
- complete -c xcsh -n "__fish_use_subcommand" -a "loadbalancer" -d 'Alias for virtual'
166
- complete -c xcsh -n "__fish_use_subcommand" -a "vhost" -d 'Alias for virtual'
167
- complete -c xcsh -n "__fish_use_subcommand" -a "vpm" -d 'Alias for vpm_and_node_management'
168
- complete -c xcsh -n "__fish_use_subcommand" -a "nodes" -d 'Alias for vpm_and_node_management'
169
- complete -c xcsh -n "__fish_use_subcommand" -a "node-mgmt" -d 'Alias for vpm_and_node_management'
170
- complete -c xcsh -n "__fish_use_subcommand" -a "firewall" -d 'Alias for waf'
171
- complete -c xcsh -n "__fish_use_subcommand" -a "appfw" -d 'Alias for waf'
70
+
172
71
 
173
72
  # Custom domain subcommands
174
73
  complete -c xcsh -n "__fish_seen_subcommand_from ai_services" -a "query" -d 'Query the AI assistant'
package/dist/index.js CHANGED
@@ -44113,7 +44113,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44113
44113
  description: "Dashboard customization through namespace-bounded asset libraries. Storage systems for branding resources, layout templates, and interactive widgets. Catalog organization with system object references tracking modification history and deployment status. Schema enforcement ensuring configuration validity across tenant hierarchies and environment boundaries.",
44114
44114
  descriptionShort: "Static UI components and console assets.",
44115
44115
  descriptionMedium: "Namespace-scoped visual elements with versioning. Custom widget deployment and catalog management for portal surfaces.",
44116
- aliases: ["console-ui", "ui-assets", "static-components"],
44116
+ aliases: [],
44117
44117
  complexity: "simple",
44118
44118
  isPreview: false,
44119
44119
  requiresTier: "Standard",
@@ -44159,7 +44159,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44159
44159
  description: "Query handling through inference routing with production and test modes. Positive and negative quality markers with detailed categorization capture assistant performance. Streaming connections support authenticated access, subscription lifecycles, and feature flags. IP provisioning services allocate infrastructure resources for model workloads across distributed systems.",
44160
44160
  descriptionShort: "AI assistant queries and feedback collection.",
44161
44161
  descriptionMedium: "Natural language processing with quality signals and anomaly monitoring. Token authentication for data stream subscriptions.",
44162
- aliases: ["ai", "genai", "assistant"],
44162
+ aliases: [],
44163
44163
  complexity: "simple",
44164
44164
  isPreview: true,
44165
44165
  requiresTier: "Advanced",
@@ -44209,7 +44209,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44209
44209
  description: "Structured classification systems with versioning support for contract evolution. Hierarchical groupings segment resources by operational role or security boundaries. Behavioral verification confirms authentication flows and permission constraints. Token and key safeguards protect sensitive credentials. Traffic inspection through connected load balancers and firewalls enables threat detection at network perimeters.",
44210
44210
  descriptionShort: "Interface definitions, schema validation, and grouping.",
44211
44211
  descriptionMedium: "Resource cataloging with automatic classification and security profiling. Organizational hierarchies segment access by function or protection policy.",
44212
- aliases: ["apisec", "api-discovery"],
44212
+ aliases: [],
44213
44213
  complexity: "advanced",
44214
44214
  isPreview: false,
44215
44215
  requiresTier: "Advanced",
@@ -44323,7 +44323,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44323
44323
  description: "F5 Distributed Cloud Authentication API specifications",
44324
44324
  descriptionShort: "Authentication API",
44325
44325
  descriptionMedium: "F5 Distributed Cloud Authentication API specifications",
44326
- aliases: ["authn", "oidc", "sso"],
44326
+ aliases: [],
44327
44327
  complexity: "simple",
44328
44328
  isPreview: false,
44329
44329
  requiresTier: "Standard",
@@ -44380,7 +44380,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44380
44380
  description: "On-premises appliance connector enabling iRule lifecycle operations and data group replication. APM policy coordination, virtual server configuration binding, and CNE linkage. Telemetry aggregation and health status monitoring across hybrid infrastructure deployments.",
44381
44381
  descriptionShort: "iRules, data groups, and APM integration.",
44382
44382
  descriptionMedium: "Legacy device orchestration with iRule scripts and data group synchronization. Virtual server bindings and metrics collection.",
44383
- aliases: ["f5-bigip", "irule", "ltm"],
44383
+ aliases: [],
44384
44384
  complexity: "moderate",
44385
44385
  isPreview: false,
44386
44386
  requiresTier: "Advanced",
@@ -44426,7 +44426,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44426
44426
  description: "Subscription lifecycle with plan transitions and billing states. Payment method hierarchies supporting primary and secondary configurations. Invoice generation with PDF downloads and custom listing. Resource quotas per namespace with limit definitions and consumption metrics. Contact types for billing notifications and tenant deletion workflows.",
44427
44427
  descriptionShort: "Subscription plans, payment methods, and quotas.",
44428
44428
  descriptionMedium: "Plan transitions, invoicing, and resource consumption. Namespace-level quota limits and usage tracking.",
44429
- aliases: ["billing-usage", "quotas", "usage-tracking"],
44429
+ aliases: [],
44430
44430
  complexity: "moderate",
44431
44431
  isPreview: false,
44432
44432
  requiresTier: "Standard",
@@ -44482,7 +44482,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44482
44482
  description: "Public key retrieval and secret policy enforcement for encrypted data handling. Policy rules govern access with configurable matching and transformation actions. VoltShare integration provides decryption services, access counting, and audit log aggregation. Namespace-scoped policies enable fine-grained control over sensitive information with administrative overrides.",
44483
44483
  descriptionShort: "Secret encryption, key policies, and audit trails.",
44484
44484
  descriptionMedium: "Encryption key management with policy-based access controls. Audit logging and secure data protection.",
44485
- aliases: ["bf", "encrypt", "secrets"],
44485
+ aliases: [],
44486
44486
  complexity: "moderate",
44487
44487
  isPreview: false,
44488
44488
  requiresTier: "Advanced",
@@ -44537,7 +44537,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44537
44537
  description: "Behavioral fingerprinting identifies automated clients through request patterns, mouse movements, and JavaScript execution. Threat categories classify attacks by type including credential stuffing, scraping, and denial-of-service. Defense instances apply per-namespace policies with configurable sensitivity thresholds and challenge actions. Provisioning handles integration credentials for third-party threat intelligence feeds.",
44538
44538
  descriptionShort: "Bot detection, threat categories, and defense instances.",
44539
44539
  descriptionMedium: "Threat classification with behavioral analysis and signature matching. Automated blocking for malicious traffic patterns.",
44540
- aliases: ["threat-defense", "tpm", "shape-bot"],
44540
+ aliases: [],
44541
44541
  complexity: "moderate",
44542
44542
  isPreview: false,
44543
44543
  requiresTier: "Advanced",
@@ -44583,7 +44583,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44583
44583
  description: "Content distribution through global edge networks with rule-based eligibility. Path matchers, cookie patterns, and query parameter filters control caching behavior. Expression-based rules enable fine-grained targeting by request attributes. Load balancer integration provides throughput aggregation, request log queries, and on-demand cache clearing across worldwide distribution points.",
44584
44584
  descriptionShort: "Edge caching, content delivery, and distribution rules.",
44585
44585
  descriptionMedium: "Path-based policies with TTL controls and header conditions. Purge operations, access logs, and cache eligibility for multi-region deployments.",
44586
- aliases: ["cache", "content"],
44586
+ aliases: [],
44587
44587
  complexity: "advanced",
44588
44588
  isPreview: false,
44589
44589
  requiresTier: "Advanced",
@@ -44633,7 +44633,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44633
44633
  description: "Customer edge node lifecycle through secure enrollment tokens and downloadable deployment images. Network connectivity options span exclusive, common, and administrative pathways with DHCP address pools supporting both IPv4 and IPv6. Bulk grouping consolidates configuration across distributed locations. Compatibility verification runs before software updates, with rollout tracking for version progression across the infrastructure.",
44634
44634
  descriptionShort: "Network interfaces, fleets, and site registration.",
44635
44635
  descriptionMedium: "Token-based provisioning with image downloads and pre-upgrade validation. Fleet grouping enables bulk operations across distributed locations.",
44636
- aliases: ["ce-mgmt", "edge-management", "ce-lifecycle"],
44636
+ aliases: [],
44637
44637
  complexity: "advanced",
44638
44638
  isPreview: false,
44639
44639
  requiresTier: "Standard",
@@ -44689,7 +44689,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44689
44689
  description: "X.509 certificate chains with intermediate and root CA support. Trusted CA list bundles for client authentication and mTLS validation. CRL distribution points and OCSP stapling configuration. Certificate manifests link credentials to load balancers and gateways. Automatic expiration tracking and renewal notifications.",
44690
44690
  descriptionShort: "SSL/TLS chains, trusted CAs, and revocation lists.",
44691
44691
  descriptionMedium: "Certificate chains and trusted CA bundles. Revocation list management and manifest configuration for PKI operations.",
44692
- aliases: ["cert", "certs", "ssl", "tls"],
44692
+ aliases: [],
44693
44693
  complexity: "moderate",
44694
44694
  isPreview: false,
44695
44695
  requiresTier: "Standard",
@@ -44745,7 +44745,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44745
44745
  description: "Hyperscaler integration supporting Amazon Web Services, Microsoft Azure, and Google Cloud Platform environments. Virtual network attachment workflows enable elastic compute provisioning with automatic reattachment capabilities. Edge authentication secrets for provider access. Segment telemetry and cross-region link reapplication for distributed deployments. Autonomous path synchronization across peered networks with real-time topology updates.",
44746
44746
  descriptionShort: "AWS, Azure, GCP connectors and VPC attachments.",
44747
44747
  descriptionMedium: "Multi-cloud provider connections with gateway peering and network path configuration. Credential vault integration and subnet enumeration.",
44748
- aliases: ["cloud", "infra", "provider"],
44748
+ aliases: [],
44749
44749
  complexity: "moderate",
44750
44750
  isPreview: false,
44751
44751
  requiresTier: "Standard",
@@ -44823,7 +44823,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44823
44823
  description: "Namespaced isolation with configurable limits and autoscaling policies. vK8s abstracts operational overhead while providing scheduling, persistent storage, and service mesh integration. Compute profiles specify CPU, memory, and GPU allocations for reproducible environments. Telemetry tracks consumption patterns across geographically distributed infrastructure nodes.",
44824
44824
  descriptionShort: "Containerized workloads and virtual Kubernetes clusters.",
44825
44825
  descriptionMedium: "Pod orchestration without full cluster complexity. Edge site execution, quota enforcement, and standardized compute profiles for distributed apps.",
44826
- aliases: ["vk8s", "containers", "workloads"],
44826
+ aliases: [],
44827
44827
  complexity: "moderate",
44828
44828
  isPreview: false,
44829
44829
  requiresTier: "Advanced",
@@ -44887,7 +44887,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44887
44887
  description: "Pattern-based detection for personally identifiable information across request and response payloads. Custom data type definitions enable organization-specific classification beyond built-in PII categories. Regional log and metrics aggregation with Clickhouse, Elasticsearch, and Kafka export options. Geo-configuration policies enforce data residency requirements and jurisdiction-specific privacy regulations.",
44888
44888
  descriptionShort: "PII detection, data types, and regional compliance.",
44889
44889
  descriptionMedium: "Sensitive data policies with custom classification rules. LMA region configuration and geo-based compliance controls.",
44890
- aliases: ["data-privacy", "pii", "sensitive-data", "lma"],
44890
+ aliases: [],
44891
44891
  complexity: "simple",
44892
44892
  isPreview: false,
44893
44893
  requiresTier: "Advanced",
@@ -44933,7 +44933,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44933
44933
  description: "F5 Distributed Cloud Data Intelligence API specifications",
44934
44934
  descriptionShort: "Data Intelligence API",
44935
44935
  descriptionMedium: "F5 Distributed Cloud Data Intelligence API specifications",
44936
- aliases: ["di", "intelligence", "insights"],
44936
+ aliases: [],
44937
44937
  complexity: "moderate",
44938
44938
  isPreview: false,
44939
44939
  requiresTier: "Standard",
@@ -44978,7 +44978,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
44978
44978
  description: "Network perimeter hardening through deny list configurations, rule group hierarchies, and encrypted tunnel endpoints. Attack signature detection identifies flood patterns while throttling mechanisms block anomalous traffic bursts. Tunnel health checks verify coverage across distributed segments. Priority ordering governs policy application for multi-layered screening approaches.",
44979
44979
  descriptionShort: "Volumetric attack mitigation and traffic scrubbing.",
44980
44980
  descriptionMedium: "Deny lists, firewall rule groups, and tunnel-based safeguards. Rate limiting and pattern analysis for network perimeter security.",
44981
- aliases: ["dos", "ddos-protect"],
44981
+ aliases: [],
44982
44982
  complexity: "advanced",
44983
44983
  isPreview: false,
44984
44984
  requiresTier: "Advanced",
@@ -45027,7 +45027,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45027
45027
  description: "Primary and secondary zone configuration with support for A, AAAA, CNAME, CAA, CERT, and AFSDB record types. Zone cloning, BIND file imports, and AXFR transfers for migration. Load balancer health checks with metrics collection and request log analysis. Compliance policies and RRSet management for enterprise name resolution.",
45028
45028
  descriptionShort: "Zones, record types, and load balancing.",
45029
45029
  descriptionMedium: "Authoritative zone hosting with BIND and AXFR imports. Health checks, failover policies, and request logging.",
45030
- aliases: ["dns-zone", "zones"],
45030
+ aliases: [],
45031
45031
  complexity: "advanced",
45032
45032
  isPreview: false,
45033
45033
  requiresTier: "Standard",
@@ -45141,7 +45141,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45141
45141
  description: "Role-based access controls with cluster-scoped permissions and namespace bindings. Pod security admission levels enforce baseline, restricted, or privileged profiles. Container registry credentials support private image pulls across hybrid deployments. Policy rules define resource verbs, groups, and non-resource URL access patterns.",
45142
45142
  descriptionShort: "Cluster RBAC, pod security, and container registries.",
45143
45143
  descriptionMedium: "Kubernetes role bindings and admission policies. Registry integration for EKS, AKS, and GKE workloads.",
45144
- aliases: ["mk8s", "appstack", "k8s-mgmt"],
45144
+ aliases: [],
45145
45145
  complexity: "moderate",
45146
45146
  isPreview: false,
45147
45147
  requiresTier: "Advanced",
@@ -45201,7 +45201,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45201
45201
  description: "External connector infrastructure supporting direct, GRE, and encrypted tunnel modes with IKE parameter configuration and dead peer detection intervals. Cloud provider instances for Terraform automation and vendor partnerships. Service catalog entries with per-namespace activation flags, resource quotas, and administrative dashboard tile arrangement for operational workflows.",
45202
45202
  descriptionShort: "Add-on services, connectors, and TPM policies.",
45203
45203
  descriptionMedium: "Third-party GRE and IPSec tunnel provisioning with DPD timers. Shared resource allocation across namespaces with tile placement controls.",
45204
- aliases: ["market", "addons", "extensions"],
45204
+ aliases: [],
45205
45205
  complexity: "moderate",
45206
45206
  isPreview: false,
45207
45207
  requiresTier: "Advanced",
@@ -45247,7 +45247,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45247
45247
  description: "Routing table manipulation via peer state machines and path selection algorithms. Secure conduits between locations using IKE handshakes, cipher suites, and key exchanges. Segment attachments bridge hybrid topologies spanning cloud providers and on-premises infrastructure. SRv6 addressing, CIDR block matching, and advertisement controls direct traffic flows across distributed deployments with granular policy enforcement.",
45248
45248
  descriptionShort: "BGP peering, IPsec tunnels, and segment policies.",
45249
45249
  descriptionMedium: "Border gateway protocol with ASN management and autonomous system relationships. Site-to-site VPN linking datacenters through encrypted channels.",
45250
- aliases: ["net", "routing", "bgp"],
45250
+ aliases: [],
45251
45251
  complexity: "advanced",
45252
45252
  isPreview: false,
45253
45253
  requiresTier: "Advanced",
@@ -45315,7 +45315,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45315
45315
  description: "Perimeter defense through firewall configurations, address translation, and ingress/egress policies. Traffic steering directs packets according to defined criteria including origin, target, and service type. Segment boundaries create workload isolation zones while HTTP intermediaries manage client requests to external destinations. Port mappings employ static and dynamic address pools for flexible translation scenarios across multi-tenant environments.",
45316
45316
  descriptionShort: "NAT policies, firewalls, and segment connections.",
45317
45317
  descriptionMedium: "Firewall rules with routing decisions based on source, destination, or protocol. Segmentation isolates workloads while outbound proxies govern access.",
45318
- aliases: ["netsec", "nfw"],
45318
+ aliases: [],
45319
45319
  complexity: "advanced",
45320
45320
  isPreview: false,
45321
45321
  requiresTier: "Advanced",
@@ -45372,7 +45372,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45372
45372
  description: "Dataplane server registration with health status tracking and location awareness. Service discovery bindings for dynamic upstream resolution. Cloud service gateway integration for hybrid deployments. WAF policy attachment and instance-level security controls.",
45373
45373
  descriptionShort: "NGINX Plus instances and dataplane servers.",
45374
45374
  descriptionMedium: "Instance discovery, WAF integration, and service mesh connectivity. Subscription lifecycle and configuration synchronization.",
45375
- aliases: ["nginx", "nms", "nginx-plus"],
45375
+ aliases: [],
45376
45376
  complexity: "simple",
45377
45377
  isPreview: false,
45378
45378
  requiresTier: "Advanced",
@@ -45421,7 +45421,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45421
45421
  description: "Blob management for application component delivery across namespaces. Time-limited download links with cryptographic signing protect asset retrieval. Version-controlled packages organized by operating system type support artifact discovery. Query filtering by name, type, and release number enables programmatic access to integrator libraries and protection modules for mobile deployments.",
45422
45422
  descriptionShort: "Mobile SDK assets, versioned binaries, and app shield files.",
45423
45423
  descriptionMedium: "Versioned library distribution for mobile app integrators. Presigned URLs enable secure downloads with OS-specific builds for iOS and Android.",
45424
- aliases: ["storage", "s3", "buckets"],
45424
+ aliases: [],
45425
45425
  complexity: "simple",
45426
45426
  isPreview: false,
45427
45427
  requiresTier: "Advanced",
@@ -45472,7 +45472,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45472
45472
  description: "Telemetry systems execute scheduled availability checks from distributed AWS locations worldwide. Response code validation and timing metrics feed into historical trend analysis. DNS resolution accuracy verification ensures name service reliability. Certificate lifecycle tracking generates expiration warnings before outages occur. Regional probe distribution provides geographic coverage insights. Health summaries aggregate results into actionable dashboards with configurable alerting thresholds.",
45473
45473
  descriptionShort: "Synthetic health checks and DNS resolution validation.",
45474
45474
  descriptionMedium: "HTTP availability probes with latency measurement. Certificate expiration alerts and global status dashboards for infrastructure health.",
45475
- aliases: ["obs", "monitoring", "synth"],
45475
+ aliases: [],
45476
45476
  complexity: "advanced",
45477
45477
  isPreview: false,
45478
45478
  requiresTier: "Standard",
@@ -45527,7 +45527,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45527
45527
  description: "Threshold-based request blocking using sliding window calculations. Burst smoothing algorithms maintain sustained throughput without exceeding defined maximums. Per-connection controls apply granular restrictions by protocol type. Automatic block actions trigger when request counts surpass configured limits within specified intervals.",
45528
45528
  descriptionShort: "Request throttling, quotas, and policer rules.",
45529
45529
  descriptionMedium: "Time-based quota enforcement with configurable windows in hours, minutes, or seconds. Protocol-specific controls for traffic shaping.",
45530
- aliases: ["ratelimit", "throttle", "policer"],
45530
+ aliases: [],
45531
45531
  complexity: "simple",
45532
45532
  isPreview: false,
45533
45533
  requiresTier: "Advanced",
@@ -45586,7 +45586,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45586
45586
  description: "User threat assessment with configurable risk thresholds and mitigation rules. Detection covers high, medium, and low threat levels with corresponding actions like blocking, rate limiting, or alerting. Mitigation policies link to load balancers for real-time enforcement against identified bad actors.",
45587
45587
  descriptionShort: "Threat detection, user risk scoring, and automated blocking.",
45588
45588
  descriptionMedium: "Malicious user mitigation with threat level classification. Automated response actions for suspicious behavior patterns.",
45589
- aliases: ["secops", "incident-response", "mitigation"],
45589
+ aliases: [],
45590
45590
  complexity: "simple",
45591
45591
  isPreview: false,
45592
45592
  requiresTier: "Advanced",
@@ -45632,7 +45632,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45632
45632
  description: "NFV service lifecycle and software version tracking. Machine learning-driven classification with security risk assessment and PII detection. Override management for application behavior customization. Sidecar proxy orchestration with automatic mTLS certificate rotation and policy enforcement across distributed workloads.",
45633
45633
  descriptionShort: "Microservice routing and sidecar configuration.",
45634
45634
  descriptionMedium: "Application type definitions with discovery and learned schema analysis. Traffic pattern inference for intelligent request handling.",
45635
- aliases: ["mesh", "svc-mesh"],
45635
+ aliases: [],
45636
45636
  complexity: "advanced",
45637
45637
  isPreview: false,
45638
45638
  requiresTier: "Advanced",
@@ -45696,7 +45696,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45696
45696
  description: "Bot infrastructure policies with deployment tracking and subscription management. SafeAP protection against credential stuffing and account takeover. Mobile application shielding through SDK integration with OS-specific configurations. Real-time threat intelligence updates and automated response actions based on risk scoring and traffic patterns.",
45697
45697
  descriptionShort: "Bot defense, fraud prevention, and client integrity.",
45698
45698
  descriptionMedium: "Threat recognition with behavioral analysis and device fingerprinting. Mobile SDK integration for application shielding.",
45699
- aliases: ["shape-sec", "safeap"],
45699
+ aliases: [],
45700
45700
  complexity: "advanced",
45701
45701
  isPreview: false,
45702
45702
  requiresTier: "Advanced",
@@ -45742,7 +45742,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45742
45742
  description: "Multi-cloud node provisioning spanning major public cloud environments including TGW, VNet, and VPC architectures. VPN tunnel configuration handles secure connectivity while IP prefix management controls address allocation. Customer edge deployments support external container orchestration platforms. Geographic distribution with resource sharing enables consistent policy enforcement across deployment points.",
45743
45743
  descriptionShort: "Cloud and edge node deployments.",
45744
45744
  descriptionMedium: "AWS, Azure, GCP VPC integration with transit gateways. Label-based selection for policy application across regions.",
45745
- aliases: ["site", "deployment"],
45745
+ aliases: [],
45746
45746
  complexity: "advanced",
45747
45747
  isPreview: false,
45748
45748
  requiresTier: "Standard",
@@ -45864,7 +45864,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45864
45864
  description: "Alert policies with custom matchers, label groupings, and notification parameters. Log receivers for centralized collection with confirmation and verification workflows. Flow analytics, historical trend data, and namespace-scoped dashboards. Topology discovery and site-level health indicators for operational visibility.",
45865
45865
  descriptionShort: "Alerts, logs, flow analytics, and reporting.",
45866
45866
  descriptionMedium: "Alerting policies with receiver integrations. Log aggregation, topology views, and site health tracking.",
45867
- aliases: ["stats", "metrics", "logs"],
45867
+ aliases: [],
45868
45868
  complexity: "advanced",
45869
45869
  isPreview: false,
45870
45870
  requiresTier: "Standard",
@@ -45916,7 +45916,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45916
45916
  description: "Case management workflows including submission, commentary, and closure paths. Urgency adjustments and routing for time-sensitive incidents. Tax exemption verification requests. Site-level tcpdump operations\u2014initiation, enumeration, and termination\u2014for low-level network troubleshooting and protocol analysis.",
45917
45917
  descriptionShort: "Tickets, escalations, and network diagnostics.",
45918
45918
  descriptionMedium: "Issue lifecycle with comments, severity changes, and resolution tracking. Packet capture for connection analysis.",
45919
- aliases: ["tickets", "help-desk"],
45919
+ aliases: [],
45920
45920
  complexity: "moderate",
45921
45921
  isPreview: false,
45922
45922
  requiresTier: "Standard",
@@ -45971,7 +45971,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
45971
45971
  description: "F5 Distributed Cloud Telemetry And Insights API specifications",
45972
45972
  descriptionShort: "Telemetry And Insights API",
45973
45973
  descriptionMedium: "F5 Distributed Cloud Telemetry And Insights API specifications",
45974
- aliases: ["telemetry", "ti"],
45974
+ aliases: [],
45975
45975
  complexity: "moderate",
45976
45976
  isPreview: false,
45977
45977
  requiresTier: "Standard",
@@ -46016,7 +46016,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
46016
46016
  description: "Profile images and display customizations for personalized dashboard experiences. Federated authentication toggles controlling SSO behavior across organizational boundaries. Session lifecycle tracking with real-time visibility into active connections and timeout policies. Support ticket workflows including attachment handling and closure procedures for managed client escalations. Initial access provisioning sequences for new user onboarding.",
46017
46017
  descriptionShort: "User profiles, sessions, and OTP settings.",
46018
46018
  descriptionMedium: "Account view configurations and admin alert channels. One-time password resets, provisioning flows, and active connection monitoring.",
46019
- aliases: ["tenant-identity", "idm", "user-settings"],
46019
+ aliases: [],
46020
46020
  complexity: "advanced",
46021
46021
  isPreview: false,
46022
46022
  requiresTier: "Standard",
@@ -46072,7 +46072,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
46072
46072
  description: "F5 Distributed Cloud Threat Campaign API specifications",
46073
46073
  descriptionShort: "Threat Campaign API",
46074
46074
  descriptionMedium: "F5 Distributed Cloud Threat Campaign API specifications",
46075
- aliases: ["threats", "campaigns", "threat-intel"],
46075
+ aliases: [],
46076
46076
  complexity: "moderate",
46077
46077
  isPreview: false,
46078
46078
  requiresTier: "Standard",
@@ -46107,7 +46107,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
46107
46107
  description: "Token lifecycle governs automated site onboarding through cloud-init integration with configurable validity periods. Explicit category keys establish permitted classification hierarchies enforced across deployments. Inferred attributes attach automatically based on object characteristics and placement context. Namespace-scoped operations handle credential generation, revocation, and state transitions for streamlined provisioning workflows.",
46108
46108
  descriptionShort: "Account tokens, labels, and cloud-init config.",
46109
46109
  descriptionMedium: "Site enrollment credentials with automatic expiration. Taxonomy keys define allowed categorization while auto-derived tags apply dynamically.",
46110
- aliases: ["user", "accounts", "iam"],
46110
+ aliases: [],
46111
46111
  complexity: "simple",
46112
46112
  isPreview: false,
46113
46113
  requiresTier: "Standard",
@@ -46167,7 +46167,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
46167
46167
  description: "Traffic distribution across origin pools with weighted routing and session persistence. Malware protection integration, threat campaign blocking, and request inspection. Proxy forwarding policies, server monitoring, and latency-based routing decisions. Service policy sets for fine-grained access control and rate limiter policies for traffic shaping.",
46168
46168
  descriptionShort: "HTTP, TCP, UDP load balancers and origin pools.",
46169
46169
  descriptionMedium: "Layer 7 routing rules with health checks and failover. Rate limiting, geo-routing, and service policy enforcement.",
46170
- aliases: ["lb", "loadbalancer", "vhost"],
46170
+ aliases: [],
46171
46171
  complexity: "advanced",
46172
46172
  isPreview: false,
46173
46173
  requiresTier: "Advanced",
@@ -46319,7 +46319,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
46319
46319
  description: "F5 Distributed Cloud Vpm And Node Management API specifications",
46320
46320
  descriptionShort: "Vpm And Node Management API",
46321
46321
  descriptionMedium: "F5 Distributed Cloud Vpm And Node Management API specifications",
46322
- aliases: ["vpm", "nodes", "node-mgmt"],
46322
+ aliases: [],
46323
46323
  complexity: "simple",
46324
46324
  isPreview: false,
46325
46325
  requiresTier: "Standard",
@@ -46364,7 +46364,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
46364
46364
  description: "Signature-based attack detection with customizable blocking responses. Attack type classification, protocol inspection, and AI-driven risk assessment. Exclusion policies override default blocking for trusted traffic. Staged signature testing validates rules before enforcement. Security event metrics track rule hits and blocked requests across namespaces.",
46365
46365
  descriptionShort: "Request inspection, attack signatures, and bot mitigation.",
46366
46366
  descriptionMedium: "Application firewall rules with signature-based detection. Exclusion policies, blocking pages, and anomaly prevention.",
46367
- aliases: ["firewall", "appfw"],
46367
+ aliases: [],
46368
46368
  complexity: "advanced",
46369
46369
  isPreview: false,
46370
46370
  requiresTier: "Advanced",
@@ -46420,31 +46420,14 @@ var generatedDomains = /* @__PURE__ */ new Map([
46420
46420
 
46421
46421
  // src/types/domains.ts
46422
46422
  var domainRegistry = new Map(generatedDomains);
46423
- var aliasRegistry = /* @__PURE__ */ new Map();
46424
- function initializeAliasRegistry() {
46425
- aliasRegistry.clear();
46426
- for (const [canonical, info] of domainRegistry) {
46427
- aliasRegistry.set(canonical, canonical);
46428
- for (const alias of info.aliases) {
46429
- aliasRegistry.set(alias, canonical);
46430
- }
46431
- }
46432
- }
46433
- function resolveDomain(nameOrAlias) {
46434
- return aliasRegistry.get(nameOrAlias);
46435
- }
46436
- function getDomainInfo(nameOrAlias) {
46437
- const canonical = resolveDomain(nameOrAlias);
46438
- if (!canonical) {
46439
- return void 0;
46440
- }
46441
- return domainRegistry.get(canonical);
46423
+ function getDomainInfo(name) {
46424
+ return domainRegistry.get(name);
46442
46425
  }
46443
46426
  function allDomains() {
46444
46427
  return Array.from(domainRegistry.keys()).sort();
46445
46428
  }
46446
46429
  function isValidDomain(name) {
46447
- return aliasRegistry.has(name);
46430
+ return domainRegistry.has(name);
46448
46431
  }
46449
46432
  var validActions = /* @__PURE__ */ new Set([
46450
46433
  "list",
@@ -46461,7 +46444,6 @@ var validActions = /* @__PURE__ */ new Set([
46461
46444
  function isValidAction(name) {
46462
46445
  return validActions.has(name);
46463
46446
  }
46464
- initializeAliasRegistry();
46465
46447
 
46466
46448
  // src/repl/context.ts
46467
46449
  var ContextPath = class _ContextPath {
@@ -46558,9 +46540,6 @@ var ContextValidator = class {
46558
46540
  for (const domain of domainRegistry.keys()) {
46559
46541
  this.domains.add(domain);
46560
46542
  }
46561
- for (const alias of aliasRegistry.keys()) {
46562
- this.domains.add(alias);
46563
- }
46564
46543
  }
46565
46544
  /**
46566
46545
  * Check if input is a valid domain name or alias
@@ -46575,10 +46554,11 @@ var ContextValidator = class {
46575
46554
  return isValidAction(name);
46576
46555
  }
46577
46556
  /**
46578
- * Resolve an alias to its canonical domain name
46557
+ * Resolve a domain name (aliases removed in v2.0.4)
46558
+ * Returns the name if it's a valid domain, undefined otherwise
46579
46559
  */
46580
46560
  resolveDomain(name) {
46581
- return resolveDomain(name);
46561
+ return this.domains.has(name) ? name : void 0;
46582
46562
  }
46583
46563
  };
46584
46564
 
@@ -47014,8 +46994,8 @@ function getLogoModeFromEnv(envPrefix) {
47014
46994
  var CLI_NAME = "xcsh";
47015
46995
  var CLI_FULL_NAME = "F5 Distributed Cloud Shell";
47016
46996
  function getVersion() {
47017
- if ("v2.0.3-2601050142") {
47018
- return "v2.0.3-2601050142";
46997
+ if ("v2.0.8-2601050643") {
46998
+ return "v2.0.8-2601050643";
47019
46999
  }
47020
47000
  if (process.env.XCSH_VERSION) {
47021
47001
  return process.env.XCSH_VERSION;
@@ -151207,7 +151187,7 @@ var ExtensionRegistry = class {
151207
151187
  * @returns Merged domain view or undefined if neither exists
151208
151188
  */
151209
151189
  getMergedDomain(domain) {
151210
- const canonical = aliasRegistry.get(domain) ?? domain;
151190
+ const canonical = domain;
151211
151191
  const cached = this.mergedCache.get(canonical);
151212
151192
  if (cached) {
151213
151193
  return cached;
@@ -152843,7 +152823,7 @@ async function handleDirectNavigation(cmd, ctx, session) {
152843
152823
  contextChanged: false
152844
152824
  };
152845
152825
  }
152846
- const extensionDomain = aliasRegistry.get(cmd.targetDomain) ?? cmd.targetDomain;
152826
+ const extensionDomain = cmd.targetDomain;
152847
152827
  const merged = extensionRegistry.getMergedDomain(extensionDomain);
152848
152828
  if (merged?.hasExtension && cmd.targetAction) {
152849
152829
  const extCmd = extensionRegistry.getExtensionCommand(
@@ -153062,8 +153042,7 @@ async function executeCommand(input, session) {
153062
153042
  return await executeAPICommand(session, ctx, cmd);
153063
153043
  }
153064
153044
  function domainToResourcePath(domain) {
153065
- const canonical = resolveDomain(domain) ?? domain;
153066
- const resourceName = canonical;
153045
+ const resourceName = domain;
153067
153046
  return resourceName.endsWith("s") ? resourceName : `${resourceName}s`;
153068
153047
  }
153069
153048
  function parseCommandArgs(args, domainResourceTypes) {
@@ -153207,7 +153186,7 @@ async function executeAPICommand(session, ctx, cmd) {
153207
153186
  action = "list";
153208
153187
  }
153209
153188
  }
153210
- const canonicalDomain = resolveDomain(domain) ?? domain;
153189
+ const canonicalDomain = domain;
153211
153190
  const domainInfo = getDomainInfo(canonicalDomain);
153212
153191
  const domainResourceTypes = new Set(
153213
153192
  domainInfo?.primaryResources?.map((r) => r.name) ?? []
@@ -154341,7 +154320,7 @@ program2.name(CLI_NAME).description("F5 Distributed Cloud Shell - Interactive CL
154341
154320
  }
154342
154321
  process.stdin.resume();
154343
154322
  const appProps = { initialSession: session };
154344
- render_default(/* @__PURE__ */ (0, import_jsx_runtime5.jsx)(App2, { ...appProps }));
154323
+ render_default(/* @__PURE__ */ (0, import_jsx_runtime5.jsx)(App2, { ...appProps }), { exitOnCtrlC: false });
154345
154324
  return;
154346
154325
  }
154347
154326
  await executeNonInteractive(commandArgs);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@robinmordasiewicz/f5xc-xcsh",
3
- "version": "2.0.3-2601050142",
3
+ "version": "2.0.8-2601050643",
4
4
  "description": "F5 Distributed Cloud Shell - Interactive CLI for F5 XC",
5
5
  "type": "module",
6
6
  "bin": {