@scaleway/sdk-edge-services 2.8.0 → 2.10.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -10,13 +10,14 @@ export type ListPurgeRequestsRequestOrderBy = 'created_at_asc' | 'created_at_des
10
10
  export type ListRouteStagesRequestOrderBy = 'created_at_asc' | 'created_at_desc';
11
11
  export type ListTLSStagesRequestOrderBy = 'created_at_asc' | 'created_at_desc';
12
12
  export type ListWafStagesRequestOrderBy = 'created_at_asc' | 'created_at_desc';
13
- export type PipelineErrorCode = 'unknown_code' | 'dns_invalid_format' | 'dns_invalid_tld' | 'dns_forbidden_root_domain' | 'dns_forbidden_scw_cloud' | 'dns_domain_dont_exist' | 'dns_cname_dont_exist' | 'dns_cname_resolve' | 'dns_fqdn_already_exists' | 'dns_fqdn_already_in_use' | 'tls_cert_deleted' | 'tls_cert_disabled' | 'tls_cert_expired' | 'tls_cert_invalid_format' | 'tls_cert_missing' | 'tls_chain_order' | 'tls_key_invalid_format' | 'tls_key_missing' | 'tls_key_too_many' | 'tls_managed_domain_rate_limit' | 'tls_managed_internal' | 'tls_pair_mismatch' | 'tls_root_inconsistent' | 'tls_root_incorrect' | 'tls_root_missing' | 'tls_san_mismatch' | 'tls_self_signed' | 'tls_caa_malfunction' | 'pipeline_invalid_workflow' | 'pipeline_missing_head_stage' | 'pipeline_websocket_limit';
13
+ export type PipelineErrorCode = 'unknown_code' | 'dns_invalid_format' | 'dns_invalid_tld' | 'dns_forbidden_root_domain' | 'dns_forbidden_scw_cloud' | 'dns_domain_dont_exist' | 'dns_cname_dont_exist' | 'dns_cname_resolve' | 'dns_fqdn_already_exists' | 'dns_fqdn_already_in_use' | 'tls_cert_deleted' | 'tls_cert_disabled' | 'tls_cert_expired' | 'tls_cert_invalid_format' | 'tls_cert_missing' | 'tls_chain_order' | 'tls_key_invalid_format' | 'tls_key_missing' | 'tls_key_too_many' | 'tls_managed_domain_rate_limit' | 'tls_managed_internal' | 'tls_managed_unsupported' | 'tls_not_wildcard' | 'tls_pair_mismatch' | 'tls_root_inconsistent' | 'tls_root_incorrect' | 'tls_root_missing' | 'tls_san_mismatch' | 'tls_self_signed' | 'tls_caa_malfunction' | 'pipeline_invalid_workflow' | 'pipeline_missing_head_stage' | 'pipeline_websocket_limit';
14
14
  export type PipelineErrorSeverity = 'unknown_severity' | 'warning' | 'critical';
15
15
  export type PipelineErrorStage = 'unknown_stage' | 'dns' | 'tls' | 'cache' | 'backend';
16
16
  export type PipelineErrorType = 'unknown_type' | 'runtime' | 'config';
17
17
  export type PipelineStatus = 'unknown_status' | 'ready' | 'error' | 'pending' | 'warning' | 'locked';
18
18
  export type PlanName = 'unknown_name' | 'starter' | 'professional' | 'advanced';
19
19
  export type PurgeRequestStatus = 'unknown_status' | 'done' | 'error' | 'pending';
20
+ export type RuleHttpMatchHostFilterHostFilterType = 'unknown_host_filter' | 'regex';
20
21
  export type RuleHttpMatchMethodFilter = 'unknown_method_filter' | 'get' | 'post' | 'put' | 'patch' | 'delete' | 'head' | 'options';
21
22
  export type RuleHttpMatchPathFilterPathFilterType = 'unknown_path_filter' | 'regex';
22
23
  export type SearchBackendStagesRequestOrderBy = 'created_at_asc' | 'created_at_desc';
@@ -49,6 +50,10 @@ export interface ScalewayLb {
49
50
  */
50
51
  hasWebsocket?: boolean;
51
52
  }
53
+ export interface RuleHttpMatchHostFilter {
54
+ hostFilterType: RuleHttpMatchHostFilterHostFilterType;
55
+ value: string;
56
+ }
52
57
  export interface RuleHttpMatchPathFilter {
53
58
  /**
54
59
  * Type of filter to match for the HTTP URL path. For now, all path filters must be written in regex and use the `regex` type.
@@ -119,6 +124,10 @@ export interface RuleHttpMatch {
119
124
  * HTTP URL path to filter for. A request whose path matches the given filter will be considered to match the rule. All paths will match if none is provided.
120
125
  */
121
126
  pathFilter?: RuleHttpMatchPathFilter;
127
+ /**
128
+ * Host to filter for. A request whose host matches the given filter will be considered to match the rule. All hosts will match if none is provided.
129
+ */
130
+ hostFilter?: RuleHttpMatchHostFilter;
122
131
  }
123
132
  export interface BackendStage {
124
133
  /**
@@ -249,6 +258,10 @@ export interface DNSStage {
249
258
  * One-of ('next'): at most one of 'tlsStageId', 'cacheStageId', 'backendStageId' could be set.
250
259
  */
251
260
  backendStageId?: string;
261
+ /**
262
+ * Support of wildcard (subdomains) for the given domain (a wildcard certificate is required to make it work).
263
+ */
264
+ wildcardDomain: boolean;
252
265
  }
253
266
  export interface Pipeline {
254
267
  /**
@@ -404,7 +417,7 @@ export interface WafStage {
404
417
  }
405
418
  export interface SetRouteRulesRequestRouteRule {
406
419
  /**
407
- * Rule condition to be matched. Requests matching the condition defined here will be directly forwarded to the backend specified by the `backend_stage_id` field. Requests that do not match will be checked by the next rule's condition.
420
+ * Rule condition to be matched. Requests matching the condition defined here will be directly forwarded to the backend specified by the `backend_stage_id` or `waf_stage_id` fields. Requests that do not match will be checked by the next rule's condition.
408
421
  *
409
422
  * One-of ('match'): at most one of 'ruleHttpMatch' could be set.
410
423
  */
@@ -424,7 +437,7 @@ export interface SetRouteRulesRequestRouteRule {
424
437
  }
425
438
  export interface RouteRule {
426
439
  /**
427
- * Rule condition to be matched. Requests matching the condition defined here will be directly forwarded to the backend specified by the `backend_stage_id` field. Requests that do not match will be checked by the next rule's condition.
440
+ * Rule condition to be matched. Requests matching the condition defined here will be directly forwarded to the backend specified by the `backend_stage_id` or `waf_stage_id` fields. Requests that do not match will be checked by the next rule's condition.
428
441
  *
429
442
  * One-of ('match'): at most one of 'ruleHttpMatch' could be set.
430
443
  */
@@ -475,6 +488,10 @@ export interface PlanDetails {
475
488
  * Number of backends per pipeline included in subscription plan.
476
489
  */
477
490
  backendLimit: number;
491
+ /**
492
+ * Support of wildcard subdomains for the customized domain.
493
+ */
494
+ wildcardDomain: boolean;
478
495
  }
479
496
  export interface PlanUsageDetails {
480
497
  /**
@@ -561,7 +578,7 @@ export type AddRouteRulesRequest = {
561
578
  */
562
579
  routeStageId: string;
563
580
  /**
564
- * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the WAF stage defined by `waf_stage_id`.
581
+ * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the stage defined by `waf_stage_id` or `backend_stage_id`.
565
582
  */
566
583
  routeRules?: SetRouteRulesRequestRouteRule[];
567
584
  /**
@@ -579,7 +596,7 @@ export type AddRouteRulesRequest = {
579
596
  };
580
597
  export interface AddRouteRulesResponse {
581
598
  /**
582
- * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the WAF stage defined by `waf_stage_id`.
599
+ * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the stage defined by `waf_stage_id` or `backend_stage_id`.
583
600
  */
584
601
  routeRules: RouteRule[];
585
602
  }
@@ -700,6 +717,10 @@ export type CreateDNSStageRequest = {
700
717
  * One-of ('next'): at most one of 'tlsStageId', 'cacheStageId', 'backendStageId' could be set.
701
718
  */
702
719
  backendStageId?: string;
720
+ /**
721
+ * Support of wildcard (subdomains) for the given domain (a wildcard certificate is required to make it work).
722
+ */
723
+ wildcardDomain?: boolean;
703
724
  };
704
725
  export type CreatePipelineRequest = {
705
726
  /**
@@ -745,6 +766,7 @@ export type CreateRouteStageRequest = {
745
766
  */
746
767
  wafStageId?: string;
747
768
  /**
769
+ * ID of the backend stage HTTP requests should be forwarded to when no rules are matched.
748
770
  *
749
771
  * One-of ('next'): at most one of 'wafStageId', 'backendStageId' could be set.
750
772
  */
@@ -1189,7 +1211,7 @@ export type ListRouteRulesRequest = {
1189
1211
  };
1190
1212
  export interface ListRouteRulesResponse {
1191
1213
  /**
1192
- * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the WAF stage defined by `waf_stage_id`.
1214
+ * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the stage defined by `waf_stage_id` or `backend_stage_id`.
1193
1215
  */
1194
1216
  routeRules: RouteRule[];
1195
1217
  /**
@@ -1348,13 +1370,13 @@ export type SetRouteRulesRequest = {
1348
1370
  */
1349
1371
  routeStageId: string;
1350
1372
  /**
1351
- * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the WAF stage defined by `waf_stage_id`.
1373
+ * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the stage defined by `waf_stage_id` or `backend_stage_id`.
1352
1374
  */
1353
1375
  routeRules?: SetRouteRulesRequestRouteRule[];
1354
1376
  };
1355
1377
  export interface SetRouteRulesResponse {
1356
1378
  /**
1357
- * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the WAF stage defined by `waf_stage_id`.
1379
+ * List of rules to be checked against every HTTP request. The first matching rule will forward the request to its specified backend stage. If no rules are matched, the request is forwarded to the stage defined by `waf_stage_id` or `backend_stage_id`.
1358
1380
  */
1359
1381
  routeRules: RouteRule[];
1360
1382
  }
@@ -1447,6 +1469,10 @@ export type UpdateDNSStageRequest = {
1447
1469
  * One-of ('next'): at most one of 'tlsStageId', 'cacheStageId', 'backendStageId' could be set.
1448
1470
  */
1449
1471
  backendStageId?: string;
1472
+ /**
1473
+ * Support of wildcard (subdomains) for the given domain (a wildcard certificate is required to make it work).
1474
+ */
1475
+ wildcardDomain?: boolean;
1450
1476
  };
1451
1477
  export type UpdatePipelineRequest = {
1452
1478
  /**
@@ -1474,6 +1500,7 @@ export type UpdateRouteStageRequest = {
1474
1500
  */
1475
1501
  wafStageId?: string;
1476
1502
  /**
1503
+ * ID of the backend stage HTTP requests should be forwarded to when no rules are matched.
1477
1504
  *
1478
1505
  * One-of ('next'): at most one of 'wafStageId', 'backendStageId' could be set.
1479
1506
  */
File without changes
@@ -1,19 +1,21 @@
1
1
  import { __exportAll } from "../_virtual/_rolldown/runtime.js";
2
+ //#region src/v1beta1/validation-rules.gen.ts
2
3
  var validation_rules_gen_exports = /* @__PURE__ */ __exportAll({
3
4
  CreateWafStageRequest: () => CreateWafStageRequest,
4
5
  UpdateWafStageRequest: () => UpdateWafStageRequest,
5
6
  WafStage: () => WafStage
6
7
  });
7
- const CreateWafStageRequest = { paranoiaLevel: {
8
+ var CreateWafStageRequest = { paranoiaLevel: {
8
9
  greaterThanOrEqual: 1,
9
10
  lessThanOrEqual: 4
10
11
  } };
11
- const UpdateWafStageRequest = { paranoiaLevel: {
12
+ var UpdateWafStageRequest = { paranoiaLevel: {
12
13
  greaterThanOrEqual: 1,
13
14
  lessThanOrEqual: 4
14
15
  } };
15
- const WafStage = { paranoiaLevel: {
16
+ var WafStage = { paranoiaLevel: {
16
17
  greaterThanOrEqual: 1,
17
18
  lessThanOrEqual: 4
18
19
  } };
19
- export { validation_rules_gen_exports };
20
+ //#endregion
21
+ export { CreateWafStageRequest, UpdateWafStageRequest, WafStage, validation_rules_gen_exports };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@scaleway/sdk-edge-services",
3
- "version": "2.8.0",
3
+ "version": "2.10.0",
4
4
  "description": "Scaleway SDK edge-services",
5
5
  "license": "Apache-2.0",
6
6
  "files": [
@@ -26,14 +26,14 @@
26
26
  "node": ">=20.19.6"
27
27
  },
28
28
  "dependencies": {
29
- "@scaleway/random-name": "5.1.2",
30
- "@scaleway/sdk-std": "2.2.1"
29
+ "@scaleway/random-name": "5.1.4",
30
+ "@scaleway/sdk-std": "2.2.2"
31
31
  },
32
32
  "peerDependencies": {
33
- "@scaleway/sdk-client": "^2.2.1"
33
+ "@scaleway/sdk-client": "^2.2.2"
34
34
  },
35
35
  "devDependencies": {
36
- "@scaleway/sdk-client": "^2.2.1"
36
+ "@scaleway/sdk-client": "^2.2.2"
37
37
  },
38
38
  "scripts": {
39
39
  "package:check": "pnpm publint",