@robinmordasiewicz/f5xc-xcsh 2.0.3-2601050142 → 2.0.8-2601050643
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/completions/_xcsh +1 -102
- package/completions/xcsh.bash +1 -1
- package/completions/xcsh.fish +1 -102
- package/dist/index.js +51 -72
- package/package.json +1 -1
package/completions/_xcsh
CHANGED
|
@@ -68,108 +68,7 @@ _xcsh() {
|
|
|
68
68
|
'virtual:HTTP, TCP, UDP load balancers and origin pools.'
|
|
69
69
|
'vpm_and_node_management:Vpm And Node Management API'
|
|
70
70
|
'waf:Request inspection, attack signatures, and bot mitigation.'
|
|
71
|
-
|
|
72
|
-
'ui-assets:Alias for admin_console_and_ui'
|
|
73
|
-
'static-components:Alias for admin_console_and_ui'
|
|
74
|
-
'apisec:Alias for api'
|
|
75
|
-
'api-discovery:Alias for api'
|
|
76
|
-
'authn:Alias for authentication'
|
|
77
|
-
'oidc:Alias for authentication'
|
|
78
|
-
'sso:Alias for authentication'
|
|
79
|
-
'f5-bigip:Alias for bigip'
|
|
80
|
-
'irule:Alias for bigip'
|
|
81
|
-
'ltm:Alias for bigip'
|
|
82
|
-
'billing-usage:Alias for billing_and_usage'
|
|
83
|
-
'quotas:Alias for billing_and_usage'
|
|
84
|
-
'usage-tracking:Alias for billing_and_usage'
|
|
85
|
-
'bf:Alias for blindfold'
|
|
86
|
-
'encrypt:Alias for blindfold'
|
|
87
|
-
'secrets:Alias for blindfold'
|
|
88
|
-
'threat-defense:Alias for bot_and_threat_defense'
|
|
89
|
-
'tpm:Alias for bot_and_threat_defense'
|
|
90
|
-
'shape-bot:Alias for bot_and_threat_defense'
|
|
91
|
-
'cache:Alias for cdn'
|
|
92
|
-
'content:Alias for cdn'
|
|
93
|
-
'ce-mgmt:Alias for ce_management'
|
|
94
|
-
'edge-management:Alias for ce_management'
|
|
95
|
-
'ce-lifecycle:Alias for ce_management'
|
|
96
|
-
'cert:Alias for certificates'
|
|
97
|
-
'certs:Alias for certificates'
|
|
98
|
-
'ssl:Alias for certificates'
|
|
99
|
-
'tls:Alias for certificates'
|
|
100
|
-
'cloud:Alias for cloud_infrastructure'
|
|
101
|
-
'infra:Alias for cloud_infrastructure'
|
|
102
|
-
'provider:Alias for cloud_infrastructure'
|
|
103
|
-
'vk8s:Alias for container_services'
|
|
104
|
-
'containers:Alias for container_services'
|
|
105
|
-
'workloads:Alias for container_services'
|
|
106
|
-
'data-privacy:Alias for data_and_privacy_security'
|
|
107
|
-
'pii:Alias for data_and_privacy_security'
|
|
108
|
-
'sensitive-data:Alias for data_and_privacy_security'
|
|
109
|
-
'lma:Alias for data_and_privacy_security'
|
|
110
|
-
'di:Alias for data_intelligence'
|
|
111
|
-
'intelligence:Alias for data_intelligence'
|
|
112
|
-
'insights:Alias for data_intelligence'
|
|
113
|
-
'dos:Alias for ddos'
|
|
114
|
-
'ddos-protect:Alias for ddos'
|
|
115
|
-
'dns-zone:Alias for dns'
|
|
116
|
-
'zones:Alias for dns'
|
|
117
|
-
'mk8s:Alias for managed_kubernetes'
|
|
118
|
-
'appstack:Alias for managed_kubernetes'
|
|
119
|
-
'k8s-mgmt:Alias for managed_kubernetes'
|
|
120
|
-
'market:Alias for marketplace'
|
|
121
|
-
'addons:Alias for marketplace'
|
|
122
|
-
'extensions:Alias for marketplace'
|
|
123
|
-
'net:Alias for network'
|
|
124
|
-
'routing:Alias for network'
|
|
125
|
-
'bgp:Alias for network'
|
|
126
|
-
'netsec:Alias for network_security'
|
|
127
|
-
'nfw:Alias for network_security'
|
|
128
|
-
'nginx:Alias for nginx_one'
|
|
129
|
-
'nms:Alias for nginx_one'
|
|
130
|
-
'nginx-plus:Alias for nginx_one'
|
|
131
|
-
'storage:Alias for object_storage'
|
|
132
|
-
's3:Alias for object_storage'
|
|
133
|
-
'buckets:Alias for object_storage'
|
|
134
|
-
'obs:Alias for observability'
|
|
135
|
-
'monitoring:Alias for observability'
|
|
136
|
-
'synth:Alias for observability'
|
|
137
|
-
'ratelimit:Alias for rate_limiting'
|
|
138
|
-
'throttle:Alias for rate_limiting'
|
|
139
|
-
'policer:Alias for rate_limiting'
|
|
140
|
-
'secops:Alias for secops_and_incident_response'
|
|
141
|
-
'incident-response:Alias for secops_and_incident_response'
|
|
142
|
-
'mitigation:Alias for secops_and_incident_response'
|
|
143
|
-
'mesh:Alias for service_mesh'
|
|
144
|
-
'svc-mesh:Alias for service_mesh'
|
|
145
|
-
'shape-sec:Alias for shape'
|
|
146
|
-
'safeap:Alias for shape'
|
|
147
|
-
'site:Alias for sites'
|
|
148
|
-
'deployment:Alias for sites'
|
|
149
|
-
'stats:Alias for statistics'
|
|
150
|
-
'metrics:Alias for statistics'
|
|
151
|
-
'logs:Alias for statistics'
|
|
152
|
-
'tickets:Alias for support'
|
|
153
|
-
'help-desk:Alias for support'
|
|
154
|
-
'telemetry:Alias for telemetry_and_insights'
|
|
155
|
-
'ti:Alias for telemetry_and_insights'
|
|
156
|
-
'tenant-identity:Alias for tenant_and_identity'
|
|
157
|
-
'idm:Alias for tenant_and_identity'
|
|
158
|
-
'user-settings:Alias for tenant_and_identity'
|
|
159
|
-
'threats:Alias for threat_campaign'
|
|
160
|
-
'campaigns:Alias for threat_campaign'
|
|
161
|
-
'threat-intel:Alias for threat_campaign'
|
|
162
|
-
'user:Alias for users'
|
|
163
|
-
'accounts:Alias for users'
|
|
164
|
-
'iam:Alias for users'
|
|
165
|
-
'lb:Alias for virtual'
|
|
166
|
-
'loadbalancer:Alias for virtual'
|
|
167
|
-
'vhost:Alias for virtual'
|
|
168
|
-
'vpm:Alias for vpm_and_node_management'
|
|
169
|
-
'nodes:Alias for vpm_and_node_management'
|
|
170
|
-
'node-mgmt:Alias for vpm_and_node_management'
|
|
171
|
-
'firewall:Alias for waf'
|
|
172
|
-
'appfw:Alias for waf'
|
|
71
|
+
|
|
173
72
|
)
|
|
174
73
|
builtins=(
|
|
175
74
|
'help:Show help information'
|
package/completions/xcsh.bash
CHANGED
|
@@ -6,7 +6,7 @@ _xcsh_completions() {
|
|
|
6
6
|
local cur prev words cword
|
|
7
7
|
_init_completion || return
|
|
8
8
|
|
|
9
|
-
local commands="admin_console_and_ui ai_services api authentication bigip billing_and_usage blindfold bot_and_threat_defense cdn ce_management certificates cloud_infrastructure cloudstatus completion container_services data_and_privacy_security data_intelligence ddos dns login managed_kubernetes marketplace network network_security nginx_one object_storage observability rate_limiting secops_and_incident_response service_mesh shape sites statistics subscription support telemetry_and_insights tenant_and_identity threat_campaign users virtual vpm_and_node_management waf
|
|
9
|
+
local commands="admin_console_and_ui ai_services api authentication bigip billing_and_usage blindfold bot_and_threat_defense cdn ce_management certificates cloud_infrastructure cloudstatus completion container_services data_and_privacy_security data_intelligence ddos dns login managed_kubernetes marketplace network network_security nginx_one object_storage observability rate_limiting secops_and_incident_response service_mesh shape sites statistics subscription support telemetry_and_insights tenant_and_identity threat_campaign users virtual vpm_and_node_management waf help quit exit clear history refresh"
|
|
10
10
|
local actions="list get create delete replace apply status patch add-labels remove-labels"
|
|
11
11
|
local builtins="help quit exit clear history context ctx refresh"
|
|
12
12
|
local global_flags="--help -h --version -v --no-color --output -o --namespace -ns --spec"
|
package/completions/xcsh.fish
CHANGED
|
@@ -67,108 +67,7 @@ complete -c xcsh -n "__fish_use_subcommand" -a "vpm_and_node_management" -d 'Vpm
|
|
|
67
67
|
complete -c xcsh -n "__fish_use_subcommand" -a "waf" -d 'Request inspection, attack signatures, and bot mitigation.'
|
|
68
68
|
|
|
69
69
|
# Alias completions
|
|
70
|
-
|
|
71
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "ui-assets" -d 'Alias for admin_console_and_ui'
|
|
72
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "static-components" -d 'Alias for admin_console_and_ui'
|
|
73
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "apisec" -d 'Alias for api'
|
|
74
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "api-discovery" -d 'Alias for api'
|
|
75
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "authn" -d 'Alias for authentication'
|
|
76
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "oidc" -d 'Alias for authentication'
|
|
77
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "sso" -d 'Alias for authentication'
|
|
78
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "f5-bigip" -d 'Alias for bigip'
|
|
79
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "irule" -d 'Alias for bigip'
|
|
80
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "ltm" -d 'Alias for bigip'
|
|
81
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "billing-usage" -d 'Alias for billing_and_usage'
|
|
82
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "quotas" -d 'Alias for billing_and_usage'
|
|
83
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "usage-tracking" -d 'Alias for billing_and_usage'
|
|
84
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "bf" -d 'Alias for blindfold'
|
|
85
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "encrypt" -d 'Alias for blindfold'
|
|
86
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "secrets" -d 'Alias for blindfold'
|
|
87
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "threat-defense" -d 'Alias for bot_and_threat_defense'
|
|
88
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "tpm" -d 'Alias for bot_and_threat_defense'
|
|
89
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "shape-bot" -d 'Alias for bot_and_threat_defense'
|
|
90
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "cache" -d 'Alias for cdn'
|
|
91
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "content" -d 'Alias for cdn'
|
|
92
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "ce-mgmt" -d 'Alias for ce_management'
|
|
93
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "edge-management" -d 'Alias for ce_management'
|
|
94
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "ce-lifecycle" -d 'Alias for ce_management'
|
|
95
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "cert" -d 'Alias for certificates'
|
|
96
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "certs" -d 'Alias for certificates'
|
|
97
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "ssl" -d 'Alias for certificates'
|
|
98
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "tls" -d 'Alias for certificates'
|
|
99
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "cloud" -d 'Alias for cloud_infrastructure'
|
|
100
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "infra" -d 'Alias for cloud_infrastructure'
|
|
101
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "provider" -d 'Alias for cloud_infrastructure'
|
|
102
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "vk8s" -d 'Alias for container_services'
|
|
103
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "containers" -d 'Alias for container_services'
|
|
104
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "workloads" -d 'Alias for container_services'
|
|
105
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "data-privacy" -d 'Alias for data_and_privacy_security'
|
|
106
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "pii" -d 'Alias for data_and_privacy_security'
|
|
107
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "sensitive-data" -d 'Alias for data_and_privacy_security'
|
|
108
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "lma" -d 'Alias for data_and_privacy_security'
|
|
109
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "di" -d 'Alias for data_intelligence'
|
|
110
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "intelligence" -d 'Alias for data_intelligence'
|
|
111
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "insights" -d 'Alias for data_intelligence'
|
|
112
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "dos" -d 'Alias for ddos'
|
|
113
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "ddos-protect" -d 'Alias for ddos'
|
|
114
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "dns-zone" -d 'Alias for dns'
|
|
115
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "zones" -d 'Alias for dns'
|
|
116
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "mk8s" -d 'Alias for managed_kubernetes'
|
|
117
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "appstack" -d 'Alias for managed_kubernetes'
|
|
118
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "k8s-mgmt" -d 'Alias for managed_kubernetes'
|
|
119
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "market" -d 'Alias for marketplace'
|
|
120
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "addons" -d 'Alias for marketplace'
|
|
121
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "extensions" -d 'Alias for marketplace'
|
|
122
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "net" -d 'Alias for network'
|
|
123
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "routing" -d 'Alias for network'
|
|
124
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "bgp" -d 'Alias for network'
|
|
125
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "netsec" -d 'Alias for network_security'
|
|
126
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "nfw" -d 'Alias for network_security'
|
|
127
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "nginx" -d 'Alias for nginx_one'
|
|
128
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "nms" -d 'Alias for nginx_one'
|
|
129
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "nginx-plus" -d 'Alias for nginx_one'
|
|
130
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "storage" -d 'Alias for object_storage'
|
|
131
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "s3" -d 'Alias for object_storage'
|
|
132
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "buckets" -d 'Alias for object_storage'
|
|
133
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "obs" -d 'Alias for observability'
|
|
134
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "monitoring" -d 'Alias for observability'
|
|
135
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "synth" -d 'Alias for observability'
|
|
136
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "ratelimit" -d 'Alias for rate_limiting'
|
|
137
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "throttle" -d 'Alias for rate_limiting'
|
|
138
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "policer" -d 'Alias for rate_limiting'
|
|
139
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "secops" -d 'Alias for secops_and_incident_response'
|
|
140
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "incident-response" -d 'Alias for secops_and_incident_response'
|
|
141
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "mitigation" -d 'Alias for secops_and_incident_response'
|
|
142
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "mesh" -d 'Alias for service_mesh'
|
|
143
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "svc-mesh" -d 'Alias for service_mesh'
|
|
144
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "shape-sec" -d 'Alias for shape'
|
|
145
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "safeap" -d 'Alias for shape'
|
|
146
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "site" -d 'Alias for sites'
|
|
147
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "deployment" -d 'Alias for sites'
|
|
148
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "stats" -d 'Alias for statistics'
|
|
149
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "metrics" -d 'Alias for statistics'
|
|
150
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "logs" -d 'Alias for statistics'
|
|
151
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "tickets" -d 'Alias for support'
|
|
152
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "help-desk" -d 'Alias for support'
|
|
153
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "telemetry" -d 'Alias for telemetry_and_insights'
|
|
154
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "ti" -d 'Alias for telemetry_and_insights'
|
|
155
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "tenant-identity" -d 'Alias for tenant_and_identity'
|
|
156
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "idm" -d 'Alias for tenant_and_identity'
|
|
157
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "user-settings" -d 'Alias for tenant_and_identity'
|
|
158
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "threats" -d 'Alias for threat_campaign'
|
|
159
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "campaigns" -d 'Alias for threat_campaign'
|
|
160
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "threat-intel" -d 'Alias for threat_campaign'
|
|
161
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "user" -d 'Alias for users'
|
|
162
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "accounts" -d 'Alias for users'
|
|
163
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "iam" -d 'Alias for users'
|
|
164
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "lb" -d 'Alias for virtual'
|
|
165
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "loadbalancer" -d 'Alias for virtual'
|
|
166
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "vhost" -d 'Alias for virtual'
|
|
167
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "vpm" -d 'Alias for vpm_and_node_management'
|
|
168
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "nodes" -d 'Alias for vpm_and_node_management'
|
|
169
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "node-mgmt" -d 'Alias for vpm_and_node_management'
|
|
170
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "firewall" -d 'Alias for waf'
|
|
171
|
-
complete -c xcsh -n "__fish_use_subcommand" -a "appfw" -d 'Alias for waf'
|
|
70
|
+
|
|
172
71
|
|
|
173
72
|
# Custom domain subcommands
|
|
174
73
|
complete -c xcsh -n "__fish_seen_subcommand_from ai_services" -a "query" -d 'Query the AI assistant'
|
package/dist/index.js
CHANGED
|
@@ -44113,7 +44113,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44113
44113
|
description: "Dashboard customization through namespace-bounded asset libraries. Storage systems for branding resources, layout templates, and interactive widgets. Catalog organization with system object references tracking modification history and deployment status. Schema enforcement ensuring configuration validity across tenant hierarchies and environment boundaries.",
|
|
44114
44114
|
descriptionShort: "Static UI components and console assets.",
|
|
44115
44115
|
descriptionMedium: "Namespace-scoped visual elements with versioning. Custom widget deployment and catalog management for portal surfaces.",
|
|
44116
|
-
aliases: [
|
|
44116
|
+
aliases: [],
|
|
44117
44117
|
complexity: "simple",
|
|
44118
44118
|
isPreview: false,
|
|
44119
44119
|
requiresTier: "Standard",
|
|
@@ -44159,7 +44159,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44159
44159
|
description: "Query handling through inference routing with production and test modes. Positive and negative quality markers with detailed categorization capture assistant performance. Streaming connections support authenticated access, subscription lifecycles, and feature flags. IP provisioning services allocate infrastructure resources for model workloads across distributed systems.",
|
|
44160
44160
|
descriptionShort: "AI assistant queries and feedback collection.",
|
|
44161
44161
|
descriptionMedium: "Natural language processing with quality signals and anomaly monitoring. Token authentication for data stream subscriptions.",
|
|
44162
|
-
aliases: [
|
|
44162
|
+
aliases: [],
|
|
44163
44163
|
complexity: "simple",
|
|
44164
44164
|
isPreview: true,
|
|
44165
44165
|
requiresTier: "Advanced",
|
|
@@ -44209,7 +44209,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44209
44209
|
description: "Structured classification systems with versioning support for contract evolution. Hierarchical groupings segment resources by operational role or security boundaries. Behavioral verification confirms authentication flows and permission constraints. Token and key safeguards protect sensitive credentials. Traffic inspection through connected load balancers and firewalls enables threat detection at network perimeters.",
|
|
44210
44210
|
descriptionShort: "Interface definitions, schema validation, and grouping.",
|
|
44211
44211
|
descriptionMedium: "Resource cataloging with automatic classification and security profiling. Organizational hierarchies segment access by function or protection policy.",
|
|
44212
|
-
aliases: [
|
|
44212
|
+
aliases: [],
|
|
44213
44213
|
complexity: "advanced",
|
|
44214
44214
|
isPreview: false,
|
|
44215
44215
|
requiresTier: "Advanced",
|
|
@@ -44323,7 +44323,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44323
44323
|
description: "F5 Distributed Cloud Authentication API specifications",
|
|
44324
44324
|
descriptionShort: "Authentication API",
|
|
44325
44325
|
descriptionMedium: "F5 Distributed Cloud Authentication API specifications",
|
|
44326
|
-
aliases: [
|
|
44326
|
+
aliases: [],
|
|
44327
44327
|
complexity: "simple",
|
|
44328
44328
|
isPreview: false,
|
|
44329
44329
|
requiresTier: "Standard",
|
|
@@ -44380,7 +44380,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44380
44380
|
description: "On-premises appliance connector enabling iRule lifecycle operations and data group replication. APM policy coordination, virtual server configuration binding, and CNE linkage. Telemetry aggregation and health status monitoring across hybrid infrastructure deployments.",
|
|
44381
44381
|
descriptionShort: "iRules, data groups, and APM integration.",
|
|
44382
44382
|
descriptionMedium: "Legacy device orchestration with iRule scripts and data group synchronization. Virtual server bindings and metrics collection.",
|
|
44383
|
-
aliases: [
|
|
44383
|
+
aliases: [],
|
|
44384
44384
|
complexity: "moderate",
|
|
44385
44385
|
isPreview: false,
|
|
44386
44386
|
requiresTier: "Advanced",
|
|
@@ -44426,7 +44426,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44426
44426
|
description: "Subscription lifecycle with plan transitions and billing states. Payment method hierarchies supporting primary and secondary configurations. Invoice generation with PDF downloads and custom listing. Resource quotas per namespace with limit definitions and consumption metrics. Contact types for billing notifications and tenant deletion workflows.",
|
|
44427
44427
|
descriptionShort: "Subscription plans, payment methods, and quotas.",
|
|
44428
44428
|
descriptionMedium: "Plan transitions, invoicing, and resource consumption. Namespace-level quota limits and usage tracking.",
|
|
44429
|
-
aliases: [
|
|
44429
|
+
aliases: [],
|
|
44430
44430
|
complexity: "moderate",
|
|
44431
44431
|
isPreview: false,
|
|
44432
44432
|
requiresTier: "Standard",
|
|
@@ -44482,7 +44482,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44482
44482
|
description: "Public key retrieval and secret policy enforcement for encrypted data handling. Policy rules govern access with configurable matching and transformation actions. VoltShare integration provides decryption services, access counting, and audit log aggregation. Namespace-scoped policies enable fine-grained control over sensitive information with administrative overrides.",
|
|
44483
44483
|
descriptionShort: "Secret encryption, key policies, and audit trails.",
|
|
44484
44484
|
descriptionMedium: "Encryption key management with policy-based access controls. Audit logging and secure data protection.",
|
|
44485
|
-
aliases: [
|
|
44485
|
+
aliases: [],
|
|
44486
44486
|
complexity: "moderate",
|
|
44487
44487
|
isPreview: false,
|
|
44488
44488
|
requiresTier: "Advanced",
|
|
@@ -44537,7 +44537,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44537
44537
|
description: "Behavioral fingerprinting identifies automated clients through request patterns, mouse movements, and JavaScript execution. Threat categories classify attacks by type including credential stuffing, scraping, and denial-of-service. Defense instances apply per-namespace policies with configurable sensitivity thresholds and challenge actions. Provisioning handles integration credentials for third-party threat intelligence feeds.",
|
|
44538
44538
|
descriptionShort: "Bot detection, threat categories, and defense instances.",
|
|
44539
44539
|
descriptionMedium: "Threat classification with behavioral analysis and signature matching. Automated blocking for malicious traffic patterns.",
|
|
44540
|
-
aliases: [
|
|
44540
|
+
aliases: [],
|
|
44541
44541
|
complexity: "moderate",
|
|
44542
44542
|
isPreview: false,
|
|
44543
44543
|
requiresTier: "Advanced",
|
|
@@ -44583,7 +44583,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44583
44583
|
description: "Content distribution through global edge networks with rule-based eligibility. Path matchers, cookie patterns, and query parameter filters control caching behavior. Expression-based rules enable fine-grained targeting by request attributes. Load balancer integration provides throughput aggregation, request log queries, and on-demand cache clearing across worldwide distribution points.",
|
|
44584
44584
|
descriptionShort: "Edge caching, content delivery, and distribution rules.",
|
|
44585
44585
|
descriptionMedium: "Path-based policies with TTL controls and header conditions. Purge operations, access logs, and cache eligibility for multi-region deployments.",
|
|
44586
|
-
aliases: [
|
|
44586
|
+
aliases: [],
|
|
44587
44587
|
complexity: "advanced",
|
|
44588
44588
|
isPreview: false,
|
|
44589
44589
|
requiresTier: "Advanced",
|
|
@@ -44633,7 +44633,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44633
44633
|
description: "Customer edge node lifecycle through secure enrollment tokens and downloadable deployment images. Network connectivity options span exclusive, common, and administrative pathways with DHCP address pools supporting both IPv4 and IPv6. Bulk grouping consolidates configuration across distributed locations. Compatibility verification runs before software updates, with rollout tracking for version progression across the infrastructure.",
|
|
44634
44634
|
descriptionShort: "Network interfaces, fleets, and site registration.",
|
|
44635
44635
|
descriptionMedium: "Token-based provisioning with image downloads and pre-upgrade validation. Fleet grouping enables bulk operations across distributed locations.",
|
|
44636
|
-
aliases: [
|
|
44636
|
+
aliases: [],
|
|
44637
44637
|
complexity: "advanced",
|
|
44638
44638
|
isPreview: false,
|
|
44639
44639
|
requiresTier: "Standard",
|
|
@@ -44689,7 +44689,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44689
44689
|
description: "X.509 certificate chains with intermediate and root CA support. Trusted CA list bundles for client authentication and mTLS validation. CRL distribution points and OCSP stapling configuration. Certificate manifests link credentials to load balancers and gateways. Automatic expiration tracking and renewal notifications.",
|
|
44690
44690
|
descriptionShort: "SSL/TLS chains, trusted CAs, and revocation lists.",
|
|
44691
44691
|
descriptionMedium: "Certificate chains and trusted CA bundles. Revocation list management and manifest configuration for PKI operations.",
|
|
44692
|
-
aliases: [
|
|
44692
|
+
aliases: [],
|
|
44693
44693
|
complexity: "moderate",
|
|
44694
44694
|
isPreview: false,
|
|
44695
44695
|
requiresTier: "Standard",
|
|
@@ -44745,7 +44745,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44745
44745
|
description: "Hyperscaler integration supporting Amazon Web Services, Microsoft Azure, and Google Cloud Platform environments. Virtual network attachment workflows enable elastic compute provisioning with automatic reattachment capabilities. Edge authentication secrets for provider access. Segment telemetry and cross-region link reapplication for distributed deployments. Autonomous path synchronization across peered networks with real-time topology updates.",
|
|
44746
44746
|
descriptionShort: "AWS, Azure, GCP connectors and VPC attachments.",
|
|
44747
44747
|
descriptionMedium: "Multi-cloud provider connections with gateway peering and network path configuration. Credential vault integration and subnet enumeration.",
|
|
44748
|
-
aliases: [
|
|
44748
|
+
aliases: [],
|
|
44749
44749
|
complexity: "moderate",
|
|
44750
44750
|
isPreview: false,
|
|
44751
44751
|
requiresTier: "Standard",
|
|
@@ -44823,7 +44823,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44823
44823
|
description: "Namespaced isolation with configurable limits and autoscaling policies. vK8s abstracts operational overhead while providing scheduling, persistent storage, and service mesh integration. Compute profiles specify CPU, memory, and GPU allocations for reproducible environments. Telemetry tracks consumption patterns across geographically distributed infrastructure nodes.",
|
|
44824
44824
|
descriptionShort: "Containerized workloads and virtual Kubernetes clusters.",
|
|
44825
44825
|
descriptionMedium: "Pod orchestration without full cluster complexity. Edge site execution, quota enforcement, and standardized compute profiles for distributed apps.",
|
|
44826
|
-
aliases: [
|
|
44826
|
+
aliases: [],
|
|
44827
44827
|
complexity: "moderate",
|
|
44828
44828
|
isPreview: false,
|
|
44829
44829
|
requiresTier: "Advanced",
|
|
@@ -44887,7 +44887,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44887
44887
|
description: "Pattern-based detection for personally identifiable information across request and response payloads. Custom data type definitions enable organization-specific classification beyond built-in PII categories. Regional log and metrics aggregation with Clickhouse, Elasticsearch, and Kafka export options. Geo-configuration policies enforce data residency requirements and jurisdiction-specific privacy regulations.",
|
|
44888
44888
|
descriptionShort: "PII detection, data types, and regional compliance.",
|
|
44889
44889
|
descriptionMedium: "Sensitive data policies with custom classification rules. LMA region configuration and geo-based compliance controls.",
|
|
44890
|
-
aliases: [
|
|
44890
|
+
aliases: [],
|
|
44891
44891
|
complexity: "simple",
|
|
44892
44892
|
isPreview: false,
|
|
44893
44893
|
requiresTier: "Advanced",
|
|
@@ -44933,7 +44933,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44933
44933
|
description: "F5 Distributed Cloud Data Intelligence API specifications",
|
|
44934
44934
|
descriptionShort: "Data Intelligence API",
|
|
44935
44935
|
descriptionMedium: "F5 Distributed Cloud Data Intelligence API specifications",
|
|
44936
|
-
aliases: [
|
|
44936
|
+
aliases: [],
|
|
44937
44937
|
complexity: "moderate",
|
|
44938
44938
|
isPreview: false,
|
|
44939
44939
|
requiresTier: "Standard",
|
|
@@ -44978,7 +44978,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
44978
44978
|
description: "Network perimeter hardening through deny list configurations, rule group hierarchies, and encrypted tunnel endpoints. Attack signature detection identifies flood patterns while throttling mechanisms block anomalous traffic bursts. Tunnel health checks verify coverage across distributed segments. Priority ordering governs policy application for multi-layered screening approaches.",
|
|
44979
44979
|
descriptionShort: "Volumetric attack mitigation and traffic scrubbing.",
|
|
44980
44980
|
descriptionMedium: "Deny lists, firewall rule groups, and tunnel-based safeguards. Rate limiting and pattern analysis for network perimeter security.",
|
|
44981
|
-
aliases: [
|
|
44981
|
+
aliases: [],
|
|
44982
44982
|
complexity: "advanced",
|
|
44983
44983
|
isPreview: false,
|
|
44984
44984
|
requiresTier: "Advanced",
|
|
@@ -45027,7 +45027,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45027
45027
|
description: "Primary and secondary zone configuration with support for A, AAAA, CNAME, CAA, CERT, and AFSDB record types. Zone cloning, BIND file imports, and AXFR transfers for migration. Load balancer health checks with metrics collection and request log analysis. Compliance policies and RRSet management for enterprise name resolution.",
|
|
45028
45028
|
descriptionShort: "Zones, record types, and load balancing.",
|
|
45029
45029
|
descriptionMedium: "Authoritative zone hosting with BIND and AXFR imports. Health checks, failover policies, and request logging.",
|
|
45030
|
-
aliases: [
|
|
45030
|
+
aliases: [],
|
|
45031
45031
|
complexity: "advanced",
|
|
45032
45032
|
isPreview: false,
|
|
45033
45033
|
requiresTier: "Standard",
|
|
@@ -45141,7 +45141,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45141
45141
|
description: "Role-based access controls with cluster-scoped permissions and namespace bindings. Pod security admission levels enforce baseline, restricted, or privileged profiles. Container registry credentials support private image pulls across hybrid deployments. Policy rules define resource verbs, groups, and non-resource URL access patterns.",
|
|
45142
45142
|
descriptionShort: "Cluster RBAC, pod security, and container registries.",
|
|
45143
45143
|
descriptionMedium: "Kubernetes role bindings and admission policies. Registry integration for EKS, AKS, and GKE workloads.",
|
|
45144
|
-
aliases: [
|
|
45144
|
+
aliases: [],
|
|
45145
45145
|
complexity: "moderate",
|
|
45146
45146
|
isPreview: false,
|
|
45147
45147
|
requiresTier: "Advanced",
|
|
@@ -45201,7 +45201,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45201
45201
|
description: "External connector infrastructure supporting direct, GRE, and encrypted tunnel modes with IKE parameter configuration and dead peer detection intervals. Cloud provider instances for Terraform automation and vendor partnerships. Service catalog entries with per-namespace activation flags, resource quotas, and administrative dashboard tile arrangement for operational workflows.",
|
|
45202
45202
|
descriptionShort: "Add-on services, connectors, and TPM policies.",
|
|
45203
45203
|
descriptionMedium: "Third-party GRE and IPSec tunnel provisioning with DPD timers. Shared resource allocation across namespaces with tile placement controls.",
|
|
45204
|
-
aliases: [
|
|
45204
|
+
aliases: [],
|
|
45205
45205
|
complexity: "moderate",
|
|
45206
45206
|
isPreview: false,
|
|
45207
45207
|
requiresTier: "Advanced",
|
|
@@ -45247,7 +45247,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45247
45247
|
description: "Routing table manipulation via peer state machines and path selection algorithms. Secure conduits between locations using IKE handshakes, cipher suites, and key exchanges. Segment attachments bridge hybrid topologies spanning cloud providers and on-premises infrastructure. SRv6 addressing, CIDR block matching, and advertisement controls direct traffic flows across distributed deployments with granular policy enforcement.",
|
|
45248
45248
|
descriptionShort: "BGP peering, IPsec tunnels, and segment policies.",
|
|
45249
45249
|
descriptionMedium: "Border gateway protocol with ASN management and autonomous system relationships. Site-to-site VPN linking datacenters through encrypted channels.",
|
|
45250
|
-
aliases: [
|
|
45250
|
+
aliases: [],
|
|
45251
45251
|
complexity: "advanced",
|
|
45252
45252
|
isPreview: false,
|
|
45253
45253
|
requiresTier: "Advanced",
|
|
@@ -45315,7 +45315,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45315
45315
|
description: "Perimeter defense through firewall configurations, address translation, and ingress/egress policies. Traffic steering directs packets according to defined criteria including origin, target, and service type. Segment boundaries create workload isolation zones while HTTP intermediaries manage client requests to external destinations. Port mappings employ static and dynamic address pools for flexible translation scenarios across multi-tenant environments.",
|
|
45316
45316
|
descriptionShort: "NAT policies, firewalls, and segment connections.",
|
|
45317
45317
|
descriptionMedium: "Firewall rules with routing decisions based on source, destination, or protocol. Segmentation isolates workloads while outbound proxies govern access.",
|
|
45318
|
-
aliases: [
|
|
45318
|
+
aliases: [],
|
|
45319
45319
|
complexity: "advanced",
|
|
45320
45320
|
isPreview: false,
|
|
45321
45321
|
requiresTier: "Advanced",
|
|
@@ -45372,7 +45372,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45372
45372
|
description: "Dataplane server registration with health status tracking and location awareness. Service discovery bindings for dynamic upstream resolution. Cloud service gateway integration for hybrid deployments. WAF policy attachment and instance-level security controls.",
|
|
45373
45373
|
descriptionShort: "NGINX Plus instances and dataplane servers.",
|
|
45374
45374
|
descriptionMedium: "Instance discovery, WAF integration, and service mesh connectivity. Subscription lifecycle and configuration synchronization.",
|
|
45375
|
-
aliases: [
|
|
45375
|
+
aliases: [],
|
|
45376
45376
|
complexity: "simple",
|
|
45377
45377
|
isPreview: false,
|
|
45378
45378
|
requiresTier: "Advanced",
|
|
@@ -45421,7 +45421,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45421
45421
|
description: "Blob management for application component delivery across namespaces. Time-limited download links with cryptographic signing protect asset retrieval. Version-controlled packages organized by operating system type support artifact discovery. Query filtering by name, type, and release number enables programmatic access to integrator libraries and protection modules for mobile deployments.",
|
|
45422
45422
|
descriptionShort: "Mobile SDK assets, versioned binaries, and app shield files.",
|
|
45423
45423
|
descriptionMedium: "Versioned library distribution for mobile app integrators. Presigned URLs enable secure downloads with OS-specific builds for iOS and Android.",
|
|
45424
|
-
aliases: [
|
|
45424
|
+
aliases: [],
|
|
45425
45425
|
complexity: "simple",
|
|
45426
45426
|
isPreview: false,
|
|
45427
45427
|
requiresTier: "Advanced",
|
|
@@ -45472,7 +45472,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45472
45472
|
description: "Telemetry systems execute scheduled availability checks from distributed AWS locations worldwide. Response code validation and timing metrics feed into historical trend analysis. DNS resolution accuracy verification ensures name service reliability. Certificate lifecycle tracking generates expiration warnings before outages occur. Regional probe distribution provides geographic coverage insights. Health summaries aggregate results into actionable dashboards with configurable alerting thresholds.",
|
|
45473
45473
|
descriptionShort: "Synthetic health checks and DNS resolution validation.",
|
|
45474
45474
|
descriptionMedium: "HTTP availability probes with latency measurement. Certificate expiration alerts and global status dashboards for infrastructure health.",
|
|
45475
|
-
aliases: [
|
|
45475
|
+
aliases: [],
|
|
45476
45476
|
complexity: "advanced",
|
|
45477
45477
|
isPreview: false,
|
|
45478
45478
|
requiresTier: "Standard",
|
|
@@ -45527,7 +45527,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45527
45527
|
description: "Threshold-based request blocking using sliding window calculations. Burst smoothing algorithms maintain sustained throughput without exceeding defined maximums. Per-connection controls apply granular restrictions by protocol type. Automatic block actions trigger when request counts surpass configured limits within specified intervals.",
|
|
45528
45528
|
descriptionShort: "Request throttling, quotas, and policer rules.",
|
|
45529
45529
|
descriptionMedium: "Time-based quota enforcement with configurable windows in hours, minutes, or seconds. Protocol-specific controls for traffic shaping.",
|
|
45530
|
-
aliases: [
|
|
45530
|
+
aliases: [],
|
|
45531
45531
|
complexity: "simple",
|
|
45532
45532
|
isPreview: false,
|
|
45533
45533
|
requiresTier: "Advanced",
|
|
@@ -45586,7 +45586,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45586
45586
|
description: "User threat assessment with configurable risk thresholds and mitigation rules. Detection covers high, medium, and low threat levels with corresponding actions like blocking, rate limiting, or alerting. Mitigation policies link to load balancers for real-time enforcement against identified bad actors.",
|
|
45587
45587
|
descriptionShort: "Threat detection, user risk scoring, and automated blocking.",
|
|
45588
45588
|
descriptionMedium: "Malicious user mitigation with threat level classification. Automated response actions for suspicious behavior patterns.",
|
|
45589
|
-
aliases: [
|
|
45589
|
+
aliases: [],
|
|
45590
45590
|
complexity: "simple",
|
|
45591
45591
|
isPreview: false,
|
|
45592
45592
|
requiresTier: "Advanced",
|
|
@@ -45632,7 +45632,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45632
45632
|
description: "NFV service lifecycle and software version tracking. Machine learning-driven classification with security risk assessment and PII detection. Override management for application behavior customization. Sidecar proxy orchestration with automatic mTLS certificate rotation and policy enforcement across distributed workloads.",
|
|
45633
45633
|
descriptionShort: "Microservice routing and sidecar configuration.",
|
|
45634
45634
|
descriptionMedium: "Application type definitions with discovery and learned schema analysis. Traffic pattern inference for intelligent request handling.",
|
|
45635
|
-
aliases: [
|
|
45635
|
+
aliases: [],
|
|
45636
45636
|
complexity: "advanced",
|
|
45637
45637
|
isPreview: false,
|
|
45638
45638
|
requiresTier: "Advanced",
|
|
@@ -45696,7 +45696,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45696
45696
|
description: "Bot infrastructure policies with deployment tracking and subscription management. SafeAP protection against credential stuffing and account takeover. Mobile application shielding through SDK integration with OS-specific configurations. Real-time threat intelligence updates and automated response actions based on risk scoring and traffic patterns.",
|
|
45697
45697
|
descriptionShort: "Bot defense, fraud prevention, and client integrity.",
|
|
45698
45698
|
descriptionMedium: "Threat recognition with behavioral analysis and device fingerprinting. Mobile SDK integration for application shielding.",
|
|
45699
|
-
aliases: [
|
|
45699
|
+
aliases: [],
|
|
45700
45700
|
complexity: "advanced",
|
|
45701
45701
|
isPreview: false,
|
|
45702
45702
|
requiresTier: "Advanced",
|
|
@@ -45742,7 +45742,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45742
45742
|
description: "Multi-cloud node provisioning spanning major public cloud environments including TGW, VNet, and VPC architectures. VPN tunnel configuration handles secure connectivity while IP prefix management controls address allocation. Customer edge deployments support external container orchestration platforms. Geographic distribution with resource sharing enables consistent policy enforcement across deployment points.",
|
|
45743
45743
|
descriptionShort: "Cloud and edge node deployments.",
|
|
45744
45744
|
descriptionMedium: "AWS, Azure, GCP VPC integration with transit gateways. Label-based selection for policy application across regions.",
|
|
45745
|
-
aliases: [
|
|
45745
|
+
aliases: [],
|
|
45746
45746
|
complexity: "advanced",
|
|
45747
45747
|
isPreview: false,
|
|
45748
45748
|
requiresTier: "Standard",
|
|
@@ -45864,7 +45864,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45864
45864
|
description: "Alert policies with custom matchers, label groupings, and notification parameters. Log receivers for centralized collection with confirmation and verification workflows. Flow analytics, historical trend data, and namespace-scoped dashboards. Topology discovery and site-level health indicators for operational visibility.",
|
|
45865
45865
|
descriptionShort: "Alerts, logs, flow analytics, and reporting.",
|
|
45866
45866
|
descriptionMedium: "Alerting policies with receiver integrations. Log aggregation, topology views, and site health tracking.",
|
|
45867
|
-
aliases: [
|
|
45867
|
+
aliases: [],
|
|
45868
45868
|
complexity: "advanced",
|
|
45869
45869
|
isPreview: false,
|
|
45870
45870
|
requiresTier: "Standard",
|
|
@@ -45916,7 +45916,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45916
45916
|
description: "Case management workflows including submission, commentary, and closure paths. Urgency adjustments and routing for time-sensitive incidents. Tax exemption verification requests. Site-level tcpdump operations\u2014initiation, enumeration, and termination\u2014for low-level network troubleshooting and protocol analysis.",
|
|
45917
45917
|
descriptionShort: "Tickets, escalations, and network diagnostics.",
|
|
45918
45918
|
descriptionMedium: "Issue lifecycle with comments, severity changes, and resolution tracking. Packet capture for connection analysis.",
|
|
45919
|
-
aliases: [
|
|
45919
|
+
aliases: [],
|
|
45920
45920
|
complexity: "moderate",
|
|
45921
45921
|
isPreview: false,
|
|
45922
45922
|
requiresTier: "Standard",
|
|
@@ -45971,7 +45971,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
45971
45971
|
description: "F5 Distributed Cloud Telemetry And Insights API specifications",
|
|
45972
45972
|
descriptionShort: "Telemetry And Insights API",
|
|
45973
45973
|
descriptionMedium: "F5 Distributed Cloud Telemetry And Insights API specifications",
|
|
45974
|
-
aliases: [
|
|
45974
|
+
aliases: [],
|
|
45975
45975
|
complexity: "moderate",
|
|
45976
45976
|
isPreview: false,
|
|
45977
45977
|
requiresTier: "Standard",
|
|
@@ -46016,7 +46016,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
46016
46016
|
description: "Profile images and display customizations for personalized dashboard experiences. Federated authentication toggles controlling SSO behavior across organizational boundaries. Session lifecycle tracking with real-time visibility into active connections and timeout policies. Support ticket workflows including attachment handling and closure procedures for managed client escalations. Initial access provisioning sequences for new user onboarding.",
|
|
46017
46017
|
descriptionShort: "User profiles, sessions, and OTP settings.",
|
|
46018
46018
|
descriptionMedium: "Account view configurations and admin alert channels. One-time password resets, provisioning flows, and active connection monitoring.",
|
|
46019
|
-
aliases: [
|
|
46019
|
+
aliases: [],
|
|
46020
46020
|
complexity: "advanced",
|
|
46021
46021
|
isPreview: false,
|
|
46022
46022
|
requiresTier: "Standard",
|
|
@@ -46072,7 +46072,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
46072
46072
|
description: "F5 Distributed Cloud Threat Campaign API specifications",
|
|
46073
46073
|
descriptionShort: "Threat Campaign API",
|
|
46074
46074
|
descriptionMedium: "F5 Distributed Cloud Threat Campaign API specifications",
|
|
46075
|
-
aliases: [
|
|
46075
|
+
aliases: [],
|
|
46076
46076
|
complexity: "moderate",
|
|
46077
46077
|
isPreview: false,
|
|
46078
46078
|
requiresTier: "Standard",
|
|
@@ -46107,7 +46107,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
46107
46107
|
description: "Token lifecycle governs automated site onboarding through cloud-init integration with configurable validity periods. Explicit category keys establish permitted classification hierarchies enforced across deployments. Inferred attributes attach automatically based on object characteristics and placement context. Namespace-scoped operations handle credential generation, revocation, and state transitions for streamlined provisioning workflows.",
|
|
46108
46108
|
descriptionShort: "Account tokens, labels, and cloud-init config.",
|
|
46109
46109
|
descriptionMedium: "Site enrollment credentials with automatic expiration. Taxonomy keys define allowed categorization while auto-derived tags apply dynamically.",
|
|
46110
|
-
aliases: [
|
|
46110
|
+
aliases: [],
|
|
46111
46111
|
complexity: "simple",
|
|
46112
46112
|
isPreview: false,
|
|
46113
46113
|
requiresTier: "Standard",
|
|
@@ -46167,7 +46167,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
46167
46167
|
description: "Traffic distribution across origin pools with weighted routing and session persistence. Malware protection integration, threat campaign blocking, and request inspection. Proxy forwarding policies, server monitoring, and latency-based routing decisions. Service policy sets for fine-grained access control and rate limiter policies for traffic shaping.",
|
|
46168
46168
|
descriptionShort: "HTTP, TCP, UDP load balancers and origin pools.",
|
|
46169
46169
|
descriptionMedium: "Layer 7 routing rules with health checks and failover. Rate limiting, geo-routing, and service policy enforcement.",
|
|
46170
|
-
aliases: [
|
|
46170
|
+
aliases: [],
|
|
46171
46171
|
complexity: "advanced",
|
|
46172
46172
|
isPreview: false,
|
|
46173
46173
|
requiresTier: "Advanced",
|
|
@@ -46319,7 +46319,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
46319
46319
|
description: "F5 Distributed Cloud Vpm And Node Management API specifications",
|
|
46320
46320
|
descriptionShort: "Vpm And Node Management API",
|
|
46321
46321
|
descriptionMedium: "F5 Distributed Cloud Vpm And Node Management API specifications",
|
|
46322
|
-
aliases: [
|
|
46322
|
+
aliases: [],
|
|
46323
46323
|
complexity: "simple",
|
|
46324
46324
|
isPreview: false,
|
|
46325
46325
|
requiresTier: "Standard",
|
|
@@ -46364,7 +46364,7 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
46364
46364
|
description: "Signature-based attack detection with customizable blocking responses. Attack type classification, protocol inspection, and AI-driven risk assessment. Exclusion policies override default blocking for trusted traffic. Staged signature testing validates rules before enforcement. Security event metrics track rule hits and blocked requests across namespaces.",
|
|
46365
46365
|
descriptionShort: "Request inspection, attack signatures, and bot mitigation.",
|
|
46366
46366
|
descriptionMedium: "Application firewall rules with signature-based detection. Exclusion policies, blocking pages, and anomaly prevention.",
|
|
46367
|
-
aliases: [
|
|
46367
|
+
aliases: [],
|
|
46368
46368
|
complexity: "advanced",
|
|
46369
46369
|
isPreview: false,
|
|
46370
46370
|
requiresTier: "Advanced",
|
|
@@ -46420,31 +46420,14 @@ var generatedDomains = /* @__PURE__ */ new Map([
|
|
|
46420
46420
|
|
|
46421
46421
|
// src/types/domains.ts
|
|
46422
46422
|
var domainRegistry = new Map(generatedDomains);
|
|
46423
|
-
|
|
46424
|
-
|
|
46425
|
-
aliasRegistry.clear();
|
|
46426
|
-
for (const [canonical, info] of domainRegistry) {
|
|
46427
|
-
aliasRegistry.set(canonical, canonical);
|
|
46428
|
-
for (const alias of info.aliases) {
|
|
46429
|
-
aliasRegistry.set(alias, canonical);
|
|
46430
|
-
}
|
|
46431
|
-
}
|
|
46432
|
-
}
|
|
46433
|
-
function resolveDomain(nameOrAlias) {
|
|
46434
|
-
return aliasRegistry.get(nameOrAlias);
|
|
46435
|
-
}
|
|
46436
|
-
function getDomainInfo(nameOrAlias) {
|
|
46437
|
-
const canonical = resolveDomain(nameOrAlias);
|
|
46438
|
-
if (!canonical) {
|
|
46439
|
-
return void 0;
|
|
46440
|
-
}
|
|
46441
|
-
return domainRegistry.get(canonical);
|
|
46423
|
+
function getDomainInfo(name) {
|
|
46424
|
+
return domainRegistry.get(name);
|
|
46442
46425
|
}
|
|
46443
46426
|
function allDomains() {
|
|
46444
46427
|
return Array.from(domainRegistry.keys()).sort();
|
|
46445
46428
|
}
|
|
46446
46429
|
function isValidDomain(name) {
|
|
46447
|
-
return
|
|
46430
|
+
return domainRegistry.has(name);
|
|
46448
46431
|
}
|
|
46449
46432
|
var validActions = /* @__PURE__ */ new Set([
|
|
46450
46433
|
"list",
|
|
@@ -46461,7 +46444,6 @@ var validActions = /* @__PURE__ */ new Set([
|
|
|
46461
46444
|
function isValidAction(name) {
|
|
46462
46445
|
return validActions.has(name);
|
|
46463
46446
|
}
|
|
46464
|
-
initializeAliasRegistry();
|
|
46465
46447
|
|
|
46466
46448
|
// src/repl/context.ts
|
|
46467
46449
|
var ContextPath = class _ContextPath {
|
|
@@ -46558,9 +46540,6 @@ var ContextValidator = class {
|
|
|
46558
46540
|
for (const domain of domainRegistry.keys()) {
|
|
46559
46541
|
this.domains.add(domain);
|
|
46560
46542
|
}
|
|
46561
|
-
for (const alias of aliasRegistry.keys()) {
|
|
46562
|
-
this.domains.add(alias);
|
|
46563
|
-
}
|
|
46564
46543
|
}
|
|
46565
46544
|
/**
|
|
46566
46545
|
* Check if input is a valid domain name or alias
|
|
@@ -46575,10 +46554,11 @@ var ContextValidator = class {
|
|
|
46575
46554
|
return isValidAction(name);
|
|
46576
46555
|
}
|
|
46577
46556
|
/**
|
|
46578
|
-
* Resolve
|
|
46557
|
+
* Resolve a domain name (aliases removed in v2.0.4)
|
|
46558
|
+
* Returns the name if it's a valid domain, undefined otherwise
|
|
46579
46559
|
*/
|
|
46580
46560
|
resolveDomain(name) {
|
|
46581
|
-
return
|
|
46561
|
+
return this.domains.has(name) ? name : void 0;
|
|
46582
46562
|
}
|
|
46583
46563
|
};
|
|
46584
46564
|
|
|
@@ -47014,8 +46994,8 @@ function getLogoModeFromEnv(envPrefix) {
|
|
|
47014
46994
|
var CLI_NAME = "xcsh";
|
|
47015
46995
|
var CLI_FULL_NAME = "F5 Distributed Cloud Shell";
|
|
47016
46996
|
function getVersion() {
|
|
47017
|
-
if ("v2.0.
|
|
47018
|
-
return "v2.0.
|
|
46997
|
+
if ("v2.0.8-2601050643") {
|
|
46998
|
+
return "v2.0.8-2601050643";
|
|
47019
46999
|
}
|
|
47020
47000
|
if (process.env.XCSH_VERSION) {
|
|
47021
47001
|
return process.env.XCSH_VERSION;
|
|
@@ -151207,7 +151187,7 @@ var ExtensionRegistry = class {
|
|
|
151207
151187
|
* @returns Merged domain view or undefined if neither exists
|
|
151208
151188
|
*/
|
|
151209
151189
|
getMergedDomain(domain) {
|
|
151210
|
-
const canonical =
|
|
151190
|
+
const canonical = domain;
|
|
151211
151191
|
const cached = this.mergedCache.get(canonical);
|
|
151212
151192
|
if (cached) {
|
|
151213
151193
|
return cached;
|
|
@@ -152843,7 +152823,7 @@ async function handleDirectNavigation(cmd, ctx, session) {
|
|
|
152843
152823
|
contextChanged: false
|
|
152844
152824
|
};
|
|
152845
152825
|
}
|
|
152846
|
-
const extensionDomain =
|
|
152826
|
+
const extensionDomain = cmd.targetDomain;
|
|
152847
152827
|
const merged = extensionRegistry.getMergedDomain(extensionDomain);
|
|
152848
152828
|
if (merged?.hasExtension && cmd.targetAction) {
|
|
152849
152829
|
const extCmd = extensionRegistry.getExtensionCommand(
|
|
@@ -153062,8 +153042,7 @@ async function executeCommand(input, session) {
|
|
|
153062
153042
|
return await executeAPICommand(session, ctx, cmd);
|
|
153063
153043
|
}
|
|
153064
153044
|
function domainToResourcePath(domain) {
|
|
153065
|
-
const
|
|
153066
|
-
const resourceName = canonical;
|
|
153045
|
+
const resourceName = domain;
|
|
153067
153046
|
return resourceName.endsWith("s") ? resourceName : `${resourceName}s`;
|
|
153068
153047
|
}
|
|
153069
153048
|
function parseCommandArgs(args, domainResourceTypes) {
|
|
@@ -153207,7 +153186,7 @@ async function executeAPICommand(session, ctx, cmd) {
|
|
|
153207
153186
|
action = "list";
|
|
153208
153187
|
}
|
|
153209
153188
|
}
|
|
153210
|
-
const canonicalDomain =
|
|
153189
|
+
const canonicalDomain = domain;
|
|
153211
153190
|
const domainInfo = getDomainInfo(canonicalDomain);
|
|
153212
153191
|
const domainResourceTypes = new Set(
|
|
153213
153192
|
domainInfo?.primaryResources?.map((r) => r.name) ?? []
|
|
@@ -154341,7 +154320,7 @@ program2.name(CLI_NAME).description("F5 Distributed Cloud Shell - Interactive CL
|
|
|
154341
154320
|
}
|
|
154342
154321
|
process.stdin.resume();
|
|
154343
154322
|
const appProps = { initialSession: session };
|
|
154344
|
-
render_default(/* @__PURE__ */ (0, import_jsx_runtime5.jsx)(App2, { ...appProps }));
|
|
154323
|
+
render_default(/* @__PURE__ */ (0, import_jsx_runtime5.jsx)(App2, { ...appProps }), { exitOnCtrlC: false });
|
|
154345
154324
|
return;
|
|
154346
154325
|
}
|
|
154347
154326
|
await executeNonInteractive(commandArgs);
|