@scaleway/sdk-lb 1.0.1 → 1.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -259,6 +259,7 @@ const unmarshalFrontend = (data) => {
|
|
|
259
259
|
certificateIds: data.certificate_ids,
|
|
260
260
|
connectionRateLimit: data.connection_rate_limit,
|
|
261
261
|
createdAt: sdkClient.unmarshalDate(data.created_at),
|
|
262
|
+
enableAccessLogs: data.enable_access_logs,
|
|
262
263
|
enableHttp3: data.enable_http3,
|
|
263
264
|
id: data.id,
|
|
264
265
|
inboundPort: data.inbound_port,
|
|
@@ -379,6 +380,7 @@ const unmarshalRouteMatch = (data) => {
|
|
|
379
380
|
return {
|
|
380
381
|
hostHeader: data.host_header,
|
|
381
382
|
matchSubdomains: data.match_subdomains,
|
|
383
|
+
pathBegin: data.path_begin,
|
|
382
384
|
sni: data.sni
|
|
383
385
|
};
|
|
384
386
|
};
|
|
@@ -743,6 +745,7 @@ const marshalCreateFrontendRequest = (request, defaults) => ({
|
|
|
743
745
|
certificate_id: request.certificateId,
|
|
744
746
|
certificate_ids: request.certificateIds,
|
|
745
747
|
connection_rate_limit: request.connectionRateLimit,
|
|
748
|
+
enable_access_logs: request.enableAccessLogs,
|
|
746
749
|
enable_http3: request.enableHttp3,
|
|
747
750
|
inbound_port: request.inboundPort,
|
|
748
751
|
name: request.name || randomName("lbf"),
|
|
@@ -792,7 +795,8 @@ const marshalRouteMatch = (request, defaults) => ({
|
|
|
792
795
|
match_subdomains: request.matchSubdomains,
|
|
793
796
|
...sdkClient.resolveOneOf([
|
|
794
797
|
{ param: "sni", value: request.sni },
|
|
795
|
-
{ param: "host_header", value: request.hostHeader }
|
|
798
|
+
{ param: "host_header", value: request.hostHeader },
|
|
799
|
+
{ param: "path_begin", value: request.pathBegin }
|
|
796
800
|
])
|
|
797
801
|
});
|
|
798
802
|
const marshalCreateRouteRequest = (request, defaults) => ({
|
|
@@ -879,6 +883,7 @@ const marshalUpdateFrontendRequest = (request, defaults) => ({
|
|
|
879
883
|
certificate_id: request.certificateId,
|
|
880
884
|
certificate_ids: request.certificateIds,
|
|
881
885
|
connection_rate_limit: request.connectionRateLimit,
|
|
886
|
+
enable_access_logs: request.enableAccessLogs,
|
|
882
887
|
enable_http3: request.enableHttp3,
|
|
883
888
|
inbound_port: request.inboundPort,
|
|
884
889
|
name: request.name,
|
|
@@ -1023,6 +1028,7 @@ const marshalZonedApiCreateFrontendRequest = (request, defaults) => ({
|
|
|
1023
1028
|
certificate_id: request.certificateId,
|
|
1024
1029
|
certificate_ids: request.certificateIds,
|
|
1025
1030
|
connection_rate_limit: request.connectionRateLimit,
|
|
1031
|
+
enable_access_logs: request.enableAccessLogs,
|
|
1026
1032
|
enable_http3: request.enableHttp3,
|
|
1027
1033
|
inbound_port: request.inboundPort,
|
|
1028
1034
|
name: request.name || randomName("lbf"),
|
|
@@ -1159,6 +1165,7 @@ const marshalZonedApiUpdateFrontendRequest = (request, defaults) => ({
|
|
|
1159
1165
|
certificate_id: request.certificateId,
|
|
1160
1166
|
certificate_ids: request.certificateIds,
|
|
1161
1167
|
connection_rate_limit: request.connectionRateLimit,
|
|
1168
|
+
enable_access_logs: request.enableAccessLogs,
|
|
1162
1169
|
enable_http3: request.enableHttp3,
|
|
1163
1170
|
inbound_port: request.inboundPort,
|
|
1164
1171
|
name: request.name,
|
|
@@ -257,6 +257,7 @@ const unmarshalFrontend = (data) => {
|
|
|
257
257
|
certificateIds: data.certificate_ids,
|
|
258
258
|
connectionRateLimit: data.connection_rate_limit,
|
|
259
259
|
createdAt: unmarshalDate(data.created_at),
|
|
260
|
+
enableAccessLogs: data.enable_access_logs,
|
|
260
261
|
enableHttp3: data.enable_http3,
|
|
261
262
|
id: data.id,
|
|
262
263
|
inboundPort: data.inbound_port,
|
|
@@ -377,6 +378,7 @@ const unmarshalRouteMatch = (data) => {
|
|
|
377
378
|
return {
|
|
378
379
|
hostHeader: data.host_header,
|
|
379
380
|
matchSubdomains: data.match_subdomains,
|
|
381
|
+
pathBegin: data.path_begin,
|
|
380
382
|
sni: data.sni
|
|
381
383
|
};
|
|
382
384
|
};
|
|
@@ -741,6 +743,7 @@ const marshalCreateFrontendRequest = (request, defaults) => ({
|
|
|
741
743
|
certificate_id: request.certificateId,
|
|
742
744
|
certificate_ids: request.certificateIds,
|
|
743
745
|
connection_rate_limit: request.connectionRateLimit,
|
|
746
|
+
enable_access_logs: request.enableAccessLogs,
|
|
744
747
|
enable_http3: request.enableHttp3,
|
|
745
748
|
inbound_port: request.inboundPort,
|
|
746
749
|
name: request.name || randomName("lbf"),
|
|
@@ -790,7 +793,8 @@ const marshalRouteMatch = (request, defaults) => ({
|
|
|
790
793
|
match_subdomains: request.matchSubdomains,
|
|
791
794
|
...resolveOneOf([
|
|
792
795
|
{ param: "sni", value: request.sni },
|
|
793
|
-
{ param: "host_header", value: request.hostHeader }
|
|
796
|
+
{ param: "host_header", value: request.hostHeader },
|
|
797
|
+
{ param: "path_begin", value: request.pathBegin }
|
|
794
798
|
])
|
|
795
799
|
});
|
|
796
800
|
const marshalCreateRouteRequest = (request, defaults) => ({
|
|
@@ -877,6 +881,7 @@ const marshalUpdateFrontendRequest = (request, defaults) => ({
|
|
|
877
881
|
certificate_id: request.certificateId,
|
|
878
882
|
certificate_ids: request.certificateIds,
|
|
879
883
|
connection_rate_limit: request.connectionRateLimit,
|
|
884
|
+
enable_access_logs: request.enableAccessLogs,
|
|
880
885
|
enable_http3: request.enableHttp3,
|
|
881
886
|
inbound_port: request.inboundPort,
|
|
882
887
|
name: request.name,
|
|
@@ -1021,6 +1026,7 @@ const marshalZonedApiCreateFrontendRequest = (request, defaults) => ({
|
|
|
1021
1026
|
certificate_id: request.certificateId,
|
|
1022
1027
|
certificate_ids: request.certificateIds,
|
|
1023
1028
|
connection_rate_limit: request.connectionRateLimit,
|
|
1029
|
+
enable_access_logs: request.enableAccessLogs,
|
|
1024
1030
|
enable_http3: request.enableHttp3,
|
|
1025
1031
|
inbound_port: request.inboundPort,
|
|
1026
1032
|
name: request.name || randomName("lbf"),
|
|
@@ -1157,6 +1163,7 @@ const marshalZonedApiUpdateFrontendRequest = (request, defaults) => ({
|
|
|
1157
1163
|
certificate_id: request.certificateId,
|
|
1158
1164
|
certificate_ids: request.certificateIds,
|
|
1159
1165
|
connection_rate_limit: request.connectionRateLimit,
|
|
1166
|
+
enable_access_logs: request.enableAccessLogs,
|
|
1160
1167
|
enable_http3: request.enableHttp3,
|
|
1161
1168
|
inbound_port: request.inboundPort,
|
|
1162
1169
|
name: request.name,
|
package/dist/v1/types.gen.d.ts
CHANGED
|
@@ -596,6 +596,10 @@ export interface Frontend {
|
|
|
596
596
|
* Rate limit for new connections established on this frontend. Use 0 value to disable, else value is connections per second.
|
|
597
597
|
*/
|
|
598
598
|
connectionRateLimit?: number;
|
|
599
|
+
/**
|
|
600
|
+
* Defines wether to enable access logs on the frontend.
|
|
601
|
+
*/
|
|
602
|
+
enableAccessLogs: boolean;
|
|
599
603
|
}
|
|
600
604
|
export interface PrivateNetworkDHCPConfig {
|
|
601
605
|
/**
|
|
@@ -615,19 +619,25 @@ export interface RouteMatch {
|
|
|
615
619
|
/**
|
|
616
620
|
* Value to match in the Server Name Indication TLS extension (SNI) field from an incoming connection made via an SSL/TLS transport layer. This field should be set for routes on TCP Load Balancers.
|
|
617
621
|
*
|
|
618
|
-
* One-of ('matchType'): at most one of 'sni', 'hostHeader' could be set.
|
|
622
|
+
* One-of ('matchType'): at most one of 'sni', 'hostHeader', 'pathBegin' could be set.
|
|
619
623
|
*/
|
|
620
624
|
sni?: string;
|
|
621
625
|
/**
|
|
622
626
|
* Value to match in the HTTP Host request header from an incoming request. This field should be set for routes on HTTP Load Balancers.
|
|
623
627
|
*
|
|
624
|
-
* One-of ('matchType'): at most one of 'sni', 'hostHeader' could be set.
|
|
628
|
+
* One-of ('matchType'): at most one of 'sni', 'hostHeader', 'pathBegin' could be set.
|
|
625
629
|
*/
|
|
626
630
|
hostHeader?: string;
|
|
627
631
|
/**
|
|
628
632
|
* If true, all subdomains will match.
|
|
629
633
|
*/
|
|
630
634
|
matchSubdomains: boolean;
|
|
635
|
+
/**
|
|
636
|
+
* Value to match in the URL beginning path from an incoming request.
|
|
637
|
+
*
|
|
638
|
+
* One-of ('matchType'): at most one of 'sni', 'hostHeader', 'pathBegin' could be set.
|
|
639
|
+
*/
|
|
640
|
+
pathBegin?: string;
|
|
631
641
|
}
|
|
632
642
|
export interface CreateCertificateRequestCustomCertificate {
|
|
633
643
|
/**
|
|
@@ -1067,6 +1077,10 @@ export type CreateFrontendRequest = {
|
|
|
1067
1077
|
* Rate limit for new connections established on this frontend. Use 0 value to disable, else value is connections per second.
|
|
1068
1078
|
*/
|
|
1069
1079
|
connectionRateLimit?: number;
|
|
1080
|
+
/**
|
|
1081
|
+
* Defines wether to enable access logs on the frontend.
|
|
1082
|
+
*/
|
|
1083
|
+
enableAccessLogs: boolean;
|
|
1070
1084
|
};
|
|
1071
1085
|
export type CreateIpRequest = {
|
|
1072
1086
|
/**
|
|
@@ -2047,6 +2061,10 @@ export type UpdateFrontendRequest = {
|
|
|
2047
2061
|
* Rate limit for new connections established on this frontend. Use 0 value to disable, else value is connections per second.
|
|
2048
2062
|
*/
|
|
2049
2063
|
connectionRateLimit?: number;
|
|
2064
|
+
/**
|
|
2065
|
+
* Defines wether to enable access logs on the frontend.
|
|
2066
|
+
*/
|
|
2067
|
+
enableAccessLogs?: boolean;
|
|
2050
2068
|
};
|
|
2051
2069
|
export type UpdateHealthCheckRequest = {
|
|
2052
2070
|
/**
|
|
@@ -2460,6 +2478,10 @@ export type ZonedApiCreateFrontendRequest = {
|
|
|
2460
2478
|
* Rate limit for new connections established on this frontend. Use 0 value to disable, else value is connections per second.
|
|
2461
2479
|
*/
|
|
2462
2480
|
connectionRateLimit?: number;
|
|
2481
|
+
/**
|
|
2482
|
+
* Defines wether to enable access logs on the frontend.
|
|
2483
|
+
*/
|
|
2484
|
+
enableAccessLogs: boolean;
|
|
2463
2485
|
};
|
|
2464
2486
|
export type ZonedApiCreateIpRequest = {
|
|
2465
2487
|
/**
|
|
@@ -3328,6 +3350,10 @@ export type ZonedApiUpdateFrontendRequest = {
|
|
|
3328
3350
|
* Rate limit for new connections established on this frontend. Use 0 value to disable, else value is connections per second.
|
|
3329
3351
|
*/
|
|
3330
3352
|
connectionRateLimit?: number;
|
|
3353
|
+
/**
|
|
3354
|
+
* Defines wether to enable access logs on the frontend.
|
|
3355
|
+
*/
|
|
3356
|
+
enableAccessLogs?: boolean;
|
|
3331
3357
|
};
|
|
3332
3358
|
export type ZonedApiUpdateHealthCheckRequest = {
|
|
3333
3359
|
/**
|
package/package.json
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@scaleway/sdk-lb",
|
|
3
|
-
"version": "1.0
|
|
3
|
+
"version": "1.2.0",
|
|
4
4
|
"description": "Scaleway SDK lb",
|
|
5
|
-
"
|
|
5
|
+
"license": "Apache-2.0",
|
|
6
6
|
"files": [
|
|
7
7
|
"dist"
|
|
8
8
|
],
|
|
@@ -26,21 +26,18 @@
|
|
|
26
26
|
"directory": "packages_generated/lb"
|
|
27
27
|
},
|
|
28
28
|
"engines": {
|
|
29
|
-
"node": ">=20.
|
|
29
|
+
"node": ">=20.19.1"
|
|
30
30
|
},
|
|
31
31
|
"dependencies": {
|
|
32
32
|
"@scaleway/random-name": "5.1.1",
|
|
33
|
-
"@scaleway/sdk-std": "1.0.
|
|
33
|
+
"@scaleway/sdk-std": "1.0.4"
|
|
34
34
|
},
|
|
35
35
|
"peerDependencies": {
|
|
36
|
-
"@scaleway/sdk-client": "^1.2.
|
|
36
|
+
"@scaleway/sdk-client": "^1.2.3"
|
|
37
37
|
},
|
|
38
38
|
"devDependencies": {
|
|
39
|
-
"@scaleway/sdk-client": "^1.2.
|
|
39
|
+
"@scaleway/sdk-client": "^1.2.3"
|
|
40
40
|
},
|
|
41
|
-
"bundledDependencies": [
|
|
42
|
-
"@scaleway/random-name"
|
|
43
|
-
],
|
|
44
41
|
"scripts": {
|
|
45
42
|
"package:check": "pnpm publint",
|
|
46
43
|
"typecheck": "tsc --noEmit",
|