@scaleway/sdk-iam 1.3.0 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.gen.d.ts +1 -1
- package/dist/v1alpha1/api.gen.cjs +126 -5
- package/dist/v1alpha1/api.gen.d.ts +63 -8
- package/dist/v1alpha1/api.gen.js +127 -6
- package/dist/v1alpha1/index.gen.cjs +8 -0
- package/dist/v1alpha1/index.gen.d.ts +4 -4
- package/dist/v1alpha1/index.gen.js +9 -1
- package/dist/v1alpha1/marshalling.gen.cjs +100 -3
- package/dist/v1alpha1/marshalling.gen.d.ts +9 -1
- package/dist/v1alpha1/marshalling.gen.js +101 -4
- package/dist/v1alpha1/types.gen.d.ts +180 -9
- package/dist/v1alpha1/validation-rules.gen.cjs +12 -6
- package/dist/v1alpha1/validation-rules.gen.d.ts +8 -3
- package/dist/v1alpha1/validation-rules.gen.js +12 -6
- package/package.json +6 -6
|
@@ -15,8 +15,11 @@ export type LocalityType = 'global' | 'region' | 'zone';
|
|
|
15
15
|
export type LogAction = 'unknown_action' | 'created' | 'updated' | 'deleted';
|
|
16
16
|
export type LogResourceType = 'unknown_resource_type' | 'api_key' | 'user' | 'application' | 'group' | 'policy';
|
|
17
17
|
export type PermissionSetScopeType = 'unknown_scope_type' | 'projects' | 'organization' | 'account_root_user';
|
|
18
|
+
export type SamlCertificateOrigin = 'unknown_certificate_origin' | 'scaleway' | 'identity_provider';
|
|
19
|
+
export type SamlCertificateType = 'unknown_certificate_type' | 'signing' | 'encryption';
|
|
20
|
+
export type SamlStatus = 'unknown_saml_status' | 'valid' | 'missing_certificate' | 'missing_entity_id' | 'missing_single_sign_on_url';
|
|
18
21
|
export type UserStatus = 'unknown_status' | 'invitation_pending' | 'activated';
|
|
19
|
-
export type UserType = 'unknown_type' | '
|
|
22
|
+
export type UserType = 'unknown_type' | 'owner' | 'member';
|
|
20
23
|
export interface ConnectionConnectedOrganization {
|
|
21
24
|
id: string;
|
|
22
25
|
name: string;
|
|
@@ -581,6 +584,28 @@ export interface SSHKey {
|
|
|
581
584
|
*/
|
|
582
585
|
disabled: boolean;
|
|
583
586
|
}
|
|
587
|
+
export interface SamlCertificate {
|
|
588
|
+
/**
|
|
589
|
+
* ID of the SAML certificate.
|
|
590
|
+
*/
|
|
591
|
+
id: string;
|
|
592
|
+
/**
|
|
593
|
+
* Type of the SAML certificate.
|
|
594
|
+
*/
|
|
595
|
+
type: SamlCertificateType;
|
|
596
|
+
/**
|
|
597
|
+
* Origin of the SAML certificate.
|
|
598
|
+
*/
|
|
599
|
+
origin: SamlCertificateOrigin;
|
|
600
|
+
/**
|
|
601
|
+
* Content of the SAML certificate.
|
|
602
|
+
*/
|
|
603
|
+
content: string;
|
|
604
|
+
/**
|
|
605
|
+
* Date and time of the SAML certificate expiration.
|
|
606
|
+
*/
|
|
607
|
+
expiresAt?: Date;
|
|
608
|
+
}
|
|
584
609
|
export interface User {
|
|
585
610
|
/**
|
|
586
611
|
* ID of user.
|
|
@@ -639,9 +664,9 @@ export interface User {
|
|
|
639
664
|
*/
|
|
640
665
|
twoFactorEnabled?: boolean;
|
|
641
666
|
/**
|
|
642
|
-
* Status of user invitation.
|
|
667
|
+
* @deprecated Status of user invitation.
|
|
643
668
|
*/
|
|
644
|
-
status
|
|
669
|
+
status?: UserStatus;
|
|
645
670
|
/**
|
|
646
671
|
* Defines whether MFA is enabled.
|
|
647
672
|
*/
|
|
@@ -659,6 +684,10 @@ export interface User {
|
|
|
659
684
|
*/
|
|
660
685
|
locked: boolean;
|
|
661
686
|
}
|
|
687
|
+
export interface SamlServiceProvider {
|
|
688
|
+
entityId: string;
|
|
689
|
+
assertionConsumerServiceUrl: string;
|
|
690
|
+
}
|
|
662
691
|
export type AddGroupMemberRequest = {
|
|
663
692
|
/**
|
|
664
693
|
* ID of the group.
|
|
@@ -691,6 +720,20 @@ export type AddGroupMembersRequest = {
|
|
|
691
720
|
*/
|
|
692
721
|
applicationIds?: string[];
|
|
693
722
|
};
|
|
723
|
+
export type AddSamlCertificateRequest = {
|
|
724
|
+
/**
|
|
725
|
+
* ID of the SAML configuration.
|
|
726
|
+
*/
|
|
727
|
+
samlId: string;
|
|
728
|
+
/**
|
|
729
|
+
* Type of the SAML certificate.
|
|
730
|
+
*/
|
|
731
|
+
type: SamlCertificateType;
|
|
732
|
+
/**
|
|
733
|
+
* Content of the SAML certificate.
|
|
734
|
+
*/
|
|
735
|
+
content: string;
|
|
736
|
+
};
|
|
694
737
|
export type ClonePolicyRequest = {
|
|
695
738
|
policyId: string;
|
|
696
739
|
};
|
|
@@ -887,6 +930,18 @@ export type DeletePolicyRequest = {
|
|
|
887
930
|
export type DeleteSSHKeyRequest = {
|
|
888
931
|
sshKeyId: string;
|
|
889
932
|
};
|
|
933
|
+
export type DeleteSamlCertificateRequest = {
|
|
934
|
+
/**
|
|
935
|
+
* ID of the certificate to delete.
|
|
936
|
+
*/
|
|
937
|
+
certificateId: string;
|
|
938
|
+
};
|
|
939
|
+
export type DeleteSamlRequest = {
|
|
940
|
+
/**
|
|
941
|
+
* ID of the SAML configuration.
|
|
942
|
+
*/
|
|
943
|
+
samlId: string;
|
|
944
|
+
};
|
|
890
945
|
export type DeleteUserMFAOTPRequest = {
|
|
891
946
|
/**
|
|
892
947
|
* User ID of the MFA OTP.
|
|
@@ -899,6 +954,12 @@ export type DeleteUserRequest = {
|
|
|
899
954
|
*/
|
|
900
955
|
userId: string;
|
|
901
956
|
};
|
|
957
|
+
export type EnableOrganizationSamlRequest = {
|
|
958
|
+
/**
|
|
959
|
+
* ID of the Organization.
|
|
960
|
+
*/
|
|
961
|
+
organizationId?: string;
|
|
962
|
+
};
|
|
902
963
|
export interface EncodedJWT {
|
|
903
964
|
/**
|
|
904
965
|
* The renewed JWT.
|
|
@@ -949,6 +1010,12 @@ export type GetOrganizationRequest = {
|
|
|
949
1010
|
*/
|
|
950
1011
|
organizationId?: string;
|
|
951
1012
|
};
|
|
1013
|
+
export type GetOrganizationSamlRequest = {
|
|
1014
|
+
/**
|
|
1015
|
+
* ID of the Organization.
|
|
1016
|
+
*/
|
|
1017
|
+
organizationId?: string;
|
|
1018
|
+
};
|
|
952
1019
|
export type GetOrganizationSecuritySettingsRequest = {
|
|
953
1020
|
/**
|
|
954
1021
|
* ID of the Organization.
|
|
@@ -1447,6 +1514,18 @@ export interface ListSSHKeysResponse {
|
|
|
1447
1514
|
*/
|
|
1448
1515
|
totalCount: number;
|
|
1449
1516
|
}
|
|
1517
|
+
export type ListSamlCertificatesRequest = {
|
|
1518
|
+
/**
|
|
1519
|
+
* ID of the SAML configuration.
|
|
1520
|
+
*/
|
|
1521
|
+
samlId: string;
|
|
1522
|
+
};
|
|
1523
|
+
export interface ListSamlCertificatesResponse {
|
|
1524
|
+
/**
|
|
1525
|
+
* List of SAML certificates.
|
|
1526
|
+
*/
|
|
1527
|
+
certificates: SamlCertificate[];
|
|
1528
|
+
}
|
|
1450
1529
|
export type ListUsersRequest = {
|
|
1451
1530
|
/**
|
|
1452
1531
|
* Criteria for sorting results.
|
|
@@ -1500,12 +1579,6 @@ export type LockUserRequest = {
|
|
|
1500
1579
|
export interface MFAOTP {
|
|
1501
1580
|
secret: string;
|
|
1502
1581
|
}
|
|
1503
|
-
export type MigrateOrganizationGuestsRequest = {
|
|
1504
|
-
/**
|
|
1505
|
-
* ID of the Organization.
|
|
1506
|
-
*/
|
|
1507
|
-
organizationId?: string;
|
|
1508
|
-
};
|
|
1509
1582
|
export interface Organization {
|
|
1510
1583
|
/**
|
|
1511
1584
|
* ID of the Organization.
|
|
@@ -1519,6 +1592,22 @@ export interface Organization {
|
|
|
1519
1592
|
* Alias of the Organization.
|
|
1520
1593
|
*/
|
|
1521
1594
|
alias: string;
|
|
1595
|
+
/**
|
|
1596
|
+
* Defines whether login with a password is enabled for the Organization.
|
|
1597
|
+
*/
|
|
1598
|
+
loginPasswordEnabled: boolean;
|
|
1599
|
+
/**
|
|
1600
|
+
* Defines whether login with an authentication code is enabled for the Organization.
|
|
1601
|
+
*/
|
|
1602
|
+
loginMagicCodeEnabled: boolean;
|
|
1603
|
+
/**
|
|
1604
|
+
* Defines whether login through OAuth2 is enabled for the Organization.
|
|
1605
|
+
*/
|
|
1606
|
+
loginOauth2Enabled: boolean;
|
|
1607
|
+
/**
|
|
1608
|
+
* Defines whether login through SAML is enabled for the Organization.
|
|
1609
|
+
*/
|
|
1610
|
+
loginSamlEnabled: boolean;
|
|
1522
1611
|
}
|
|
1523
1612
|
export interface OrganizationSecuritySettings {
|
|
1524
1613
|
/**
|
|
@@ -1533,6 +1622,22 @@ export interface OrganizationSecuritySettings {
|
|
|
1533
1622
|
* Number of login attempts before the account is locked.
|
|
1534
1623
|
*/
|
|
1535
1624
|
loginAttemptsBeforeLocked: number;
|
|
1625
|
+
/**
|
|
1626
|
+
* Maximum duration a login session will stay active before needing to relogin.
|
|
1627
|
+
*/
|
|
1628
|
+
maxLoginSessionDuration?: string;
|
|
1629
|
+
/**
|
|
1630
|
+
* Maximum duration the `expires_at` field of an API key can represent. A value of 0 means there is no maximum duration.
|
|
1631
|
+
*/
|
|
1632
|
+
maxApiKeyExpirationDuration?: string;
|
|
1633
|
+
}
|
|
1634
|
+
export type ParseSamlMetadataRequest = {
|
|
1635
|
+
file: Blob;
|
|
1636
|
+
};
|
|
1637
|
+
export interface ParseSamlMetadataResponse {
|
|
1638
|
+
singleSignOnUrl: string;
|
|
1639
|
+
entityId: string;
|
|
1640
|
+
signingCertificates: string[];
|
|
1536
1641
|
}
|
|
1537
1642
|
export type RemoveGroupMemberRequest = {
|
|
1538
1643
|
/**
|
|
@@ -1562,6 +1667,28 @@ export type RemoveUserConnectionRequest = {
|
|
|
1562
1667
|
*/
|
|
1563
1668
|
targetUserId: string;
|
|
1564
1669
|
};
|
|
1670
|
+
export interface Saml {
|
|
1671
|
+
/**
|
|
1672
|
+
* ID of the SAML configuration.
|
|
1673
|
+
*/
|
|
1674
|
+
id: string;
|
|
1675
|
+
/**
|
|
1676
|
+
* Status of the SAML configuration.
|
|
1677
|
+
*/
|
|
1678
|
+
status: SamlStatus;
|
|
1679
|
+
/**
|
|
1680
|
+
* Service Provider information.
|
|
1681
|
+
*/
|
|
1682
|
+
serviceProvider?: SamlServiceProvider;
|
|
1683
|
+
/**
|
|
1684
|
+
* Entity ID of the SAML Identity Provider.
|
|
1685
|
+
*/
|
|
1686
|
+
entityId: string;
|
|
1687
|
+
/**
|
|
1688
|
+
* Single Sign-On URL of the SAML Identity Provider.
|
|
1689
|
+
*/
|
|
1690
|
+
singleSignOnUrl: string;
|
|
1691
|
+
}
|
|
1565
1692
|
export type SetGroupMembersRequest = {
|
|
1566
1693
|
groupId: string;
|
|
1567
1694
|
userIds: string[];
|
|
@@ -1649,6 +1776,28 @@ export type UpdateGroupRequest = {
|
|
|
1649
1776
|
*/
|
|
1650
1777
|
tags?: string[];
|
|
1651
1778
|
};
|
|
1779
|
+
export type UpdateOrganizationLoginMethodsRequest = {
|
|
1780
|
+
/**
|
|
1781
|
+
* ID of the Organization.
|
|
1782
|
+
*/
|
|
1783
|
+
organizationId?: string;
|
|
1784
|
+
/**
|
|
1785
|
+
* Defines whether login with a password is enabled for the Organization.
|
|
1786
|
+
*/
|
|
1787
|
+
loginPasswordEnabled?: boolean;
|
|
1788
|
+
/**
|
|
1789
|
+
* Defines whether login through OAuth2 is enabled for the Organization.
|
|
1790
|
+
*/
|
|
1791
|
+
loginOauth2Enabled?: boolean;
|
|
1792
|
+
/**
|
|
1793
|
+
* Defines whether login with an authentication code is enabled for the Organization.
|
|
1794
|
+
*/
|
|
1795
|
+
loginMagicCodeEnabled?: boolean;
|
|
1796
|
+
/**
|
|
1797
|
+
* Defines whether login through SAML is enabled for the Organization.
|
|
1798
|
+
*/
|
|
1799
|
+
loginSamlEnabled?: boolean;
|
|
1800
|
+
};
|
|
1652
1801
|
export type UpdateOrganizationSecuritySettingsRequest = {
|
|
1653
1802
|
/**
|
|
1654
1803
|
* ID of the Organization.
|
|
@@ -1666,6 +1815,14 @@ export type UpdateOrganizationSecuritySettingsRequest = {
|
|
|
1666
1815
|
* Number of login attempts before the account is locked.
|
|
1667
1816
|
*/
|
|
1668
1817
|
loginAttemptsBeforeLocked?: number;
|
|
1818
|
+
/**
|
|
1819
|
+
* Maximum duration a login session will stay active before needing to relogin.
|
|
1820
|
+
*/
|
|
1821
|
+
maxLoginSessionDuration?: string;
|
|
1822
|
+
/**
|
|
1823
|
+
* Maximum duration the `expires_at` field of an API key can represent. A value of 0 means there is no maximum duration.
|
|
1824
|
+
*/
|
|
1825
|
+
maxApiKeyExpirationDuration?: string;
|
|
1669
1826
|
};
|
|
1670
1827
|
export type UpdatePolicyRequest = {
|
|
1671
1828
|
/**
|
|
@@ -1720,6 +1877,20 @@ export type UpdateSSHKeyRequest = {
|
|
|
1720
1877
|
*/
|
|
1721
1878
|
disabled?: boolean;
|
|
1722
1879
|
};
|
|
1880
|
+
export type UpdateSamlRequest = {
|
|
1881
|
+
/**
|
|
1882
|
+
* ID of the SAML configuration.
|
|
1883
|
+
*/
|
|
1884
|
+
samlId: string;
|
|
1885
|
+
/**
|
|
1886
|
+
* Entity ID of the SAML Identity Provider.
|
|
1887
|
+
*/
|
|
1888
|
+
entityId?: string;
|
|
1889
|
+
/**
|
|
1890
|
+
* Single Sign-On URL of the SAML Identity Provider.
|
|
1891
|
+
*/
|
|
1892
|
+
singleSignOnUrl?: string;
|
|
1893
|
+
};
|
|
1723
1894
|
export type UpdateUserPasswordRequest = {
|
|
1724
1895
|
/**
|
|
1725
1896
|
* ID of the user to update.
|
|
@@ -1,5 +1,11 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
|
|
3
|
+
const AddSamlCertificateRequest = {
|
|
4
|
+
content: {
|
|
5
|
+
maxLength: 16384,
|
|
6
|
+
minLength: 1
|
|
7
|
+
}
|
|
8
|
+
};
|
|
3
9
|
const CreateAPIKeyRequest = {
|
|
4
10
|
description: {
|
|
5
11
|
ignoreEmpty: true,
|
|
@@ -57,8 +63,7 @@ const CreateUserRequestMember = {
|
|
|
57
63
|
maxLength: 64
|
|
58
64
|
},
|
|
59
65
|
password: {
|
|
60
|
-
ignoreEmpty: true
|
|
61
|
-
maxLength: 72
|
|
66
|
+
ignoreEmpty: true
|
|
62
67
|
},
|
|
63
68
|
username: {
|
|
64
69
|
maxLength: 64,
|
|
@@ -262,9 +267,9 @@ const UpdateSSHKeyRequest = {
|
|
|
262
267
|
maxLength: 1e3
|
|
263
268
|
}
|
|
264
269
|
};
|
|
265
|
-
const
|
|
266
|
-
|
|
267
|
-
maxLength:
|
|
270
|
+
const UpdateSamlRequest = {
|
|
271
|
+
entityId: {
|
|
272
|
+
maxLength: 1024,
|
|
268
273
|
minLength: 1
|
|
269
274
|
}
|
|
270
275
|
};
|
|
@@ -288,6 +293,7 @@ const ValidateUserMFAOTPRequest = {
|
|
|
288
293
|
pattern: /^[0-9]{6}$/
|
|
289
294
|
}
|
|
290
295
|
};
|
|
296
|
+
exports.AddSamlCertificateRequest = AddSamlCertificateRequest;
|
|
291
297
|
exports.CreateAPIKeyRequest = CreateAPIKeyRequest;
|
|
292
298
|
exports.CreateApplicationRequest = CreateApplicationRequest;
|
|
293
299
|
exports.CreateGroupRequest = CreateGroupRequest;
|
|
@@ -315,7 +321,7 @@ exports.UpdateGroupRequest = UpdateGroupRequest;
|
|
|
315
321
|
exports.UpdateOrganizationSecuritySettingsRequest = UpdateOrganizationSecuritySettingsRequest;
|
|
316
322
|
exports.UpdatePolicyRequest = UpdatePolicyRequest;
|
|
317
323
|
exports.UpdateSSHKeyRequest = UpdateSSHKeyRequest;
|
|
318
|
-
exports.
|
|
324
|
+
exports.UpdateSamlRequest = UpdateSamlRequest;
|
|
319
325
|
exports.UpdateUserRequest = UpdateUserRequest;
|
|
320
326
|
exports.UpdateUserUsernameRequest = UpdateUserUsernameRequest;
|
|
321
327
|
exports.ValidateUserMFAOTPRequest = ValidateUserMFAOTPRequest;
|
|
@@ -1,3 +1,9 @@
|
|
|
1
|
+
export declare const AddSamlCertificateRequest: {
|
|
2
|
+
content: {
|
|
3
|
+
maxLength: number;
|
|
4
|
+
minLength: number;
|
|
5
|
+
};
|
|
6
|
+
};
|
|
1
7
|
export declare const CreateAPIKeyRequest: {
|
|
2
8
|
description: {
|
|
3
9
|
ignoreEmpty: boolean;
|
|
@@ -56,7 +62,6 @@ export declare const CreateUserRequestMember: {
|
|
|
56
62
|
};
|
|
57
63
|
password: {
|
|
58
64
|
ignoreEmpty: boolean;
|
|
59
|
-
maxLength: number;
|
|
60
65
|
};
|
|
61
66
|
username: {
|
|
62
67
|
maxLength: number;
|
|
@@ -260,8 +265,8 @@ export declare const UpdateSSHKeyRequest: {
|
|
|
260
265
|
maxLength: number;
|
|
261
266
|
};
|
|
262
267
|
};
|
|
263
|
-
export declare const
|
|
264
|
-
|
|
268
|
+
export declare const UpdateSamlRequest: {
|
|
269
|
+
entityId: {
|
|
265
270
|
maxLength: number;
|
|
266
271
|
minLength: number;
|
|
267
272
|
};
|
|
@@ -1,3 +1,9 @@
|
|
|
1
|
+
const AddSamlCertificateRequest = {
|
|
2
|
+
content: {
|
|
3
|
+
maxLength: 16384,
|
|
4
|
+
minLength: 1
|
|
5
|
+
}
|
|
6
|
+
};
|
|
1
7
|
const CreateAPIKeyRequest = {
|
|
2
8
|
description: {
|
|
3
9
|
ignoreEmpty: true,
|
|
@@ -55,8 +61,7 @@ const CreateUserRequestMember = {
|
|
|
55
61
|
maxLength: 64
|
|
56
62
|
},
|
|
57
63
|
password: {
|
|
58
|
-
ignoreEmpty: true
|
|
59
|
-
maxLength: 72
|
|
64
|
+
ignoreEmpty: true
|
|
60
65
|
},
|
|
61
66
|
username: {
|
|
62
67
|
maxLength: 64,
|
|
@@ -260,9 +265,9 @@ const UpdateSSHKeyRequest = {
|
|
|
260
265
|
maxLength: 1e3
|
|
261
266
|
}
|
|
262
267
|
};
|
|
263
|
-
const
|
|
264
|
-
|
|
265
|
-
maxLength:
|
|
268
|
+
const UpdateSamlRequest = {
|
|
269
|
+
entityId: {
|
|
270
|
+
maxLength: 1024,
|
|
266
271
|
minLength: 1
|
|
267
272
|
}
|
|
268
273
|
};
|
|
@@ -287,6 +292,7 @@ const ValidateUserMFAOTPRequest = {
|
|
|
287
292
|
}
|
|
288
293
|
};
|
|
289
294
|
export {
|
|
295
|
+
AddSamlCertificateRequest,
|
|
290
296
|
CreateAPIKeyRequest,
|
|
291
297
|
CreateApplicationRequest,
|
|
292
298
|
CreateGroupRequest,
|
|
@@ -314,7 +320,7 @@ export {
|
|
|
314
320
|
UpdateOrganizationSecuritySettingsRequest,
|
|
315
321
|
UpdatePolicyRequest,
|
|
316
322
|
UpdateSSHKeyRequest,
|
|
317
|
-
|
|
323
|
+
UpdateSamlRequest,
|
|
318
324
|
UpdateUserRequest,
|
|
319
325
|
UpdateUserUsernameRequest,
|
|
320
326
|
ValidateUserMFAOTPRequest
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@scaleway/sdk-iam",
|
|
3
|
-
"version": "1.
|
|
3
|
+
"version": "1.5.0",
|
|
4
4
|
"description": "Scaleway SDK iam",
|
|
5
5
|
"license": "Apache-2.0",
|
|
6
6
|
"files": [
|
|
@@ -26,17 +26,17 @@
|
|
|
26
26
|
"directory": "packages_generated/iam"
|
|
27
27
|
},
|
|
28
28
|
"engines": {
|
|
29
|
-
"node": ">=20.19.
|
|
29
|
+
"node": ">=20.19.4"
|
|
30
30
|
},
|
|
31
31
|
"dependencies": {
|
|
32
|
-
"@scaleway/random-name": "5.1.
|
|
33
|
-
"@scaleway/sdk-std": "1.0
|
|
32
|
+
"@scaleway/random-name": "5.1.2",
|
|
33
|
+
"@scaleway/sdk-std": "1.1.0"
|
|
34
34
|
},
|
|
35
35
|
"peerDependencies": {
|
|
36
|
-
"@scaleway/sdk-client": "^1.3.
|
|
36
|
+
"@scaleway/sdk-client": "^1.3.2"
|
|
37
37
|
},
|
|
38
38
|
"devDependencies": {
|
|
39
|
-
"@scaleway/sdk-client": "^1.3.
|
|
39
|
+
"@scaleway/sdk-client": "^1.3.2"
|
|
40
40
|
},
|
|
41
41
|
"scripts": {
|
|
42
42
|
"package:check": "pnpm publint",
|