windmill-cli 1.610.1 → 1.611.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/esm/gen/core/OpenAPI.js +1 -1
- package/esm/gen/services.gen.js +56 -0
- package/esm/src/main.js +1 -1
- package/package.json +1 -1
- package/types/gen/services.gen.d.ts +31 -1
- package/types/gen/services.gen.d.ts.map +1 -1
- package/types/gen/types.gen.d.ts +84 -0
- package/types/gen/types.gen.d.ts.map +1 -1
- package/types/src/main.d.ts +1 -1
- package/types/windmill-utils-internal/src/gen/types.gen.d.ts +84 -0
- package/types/windmill-utils-internal/src/gen/types.gen.d.ts.map +1 -1
package/types/gen/types.gen.d.ts
CHANGED
|
@@ -730,6 +730,68 @@ export type FlowNote = {
|
|
|
730
730
|
* Type of note - 'free' for standalone notes, 'group' for notes that group other nodes
|
|
731
731
|
*/
|
|
732
732
|
export type type2 = 'free' | 'group';
|
|
733
|
+
export type VaultSettings = {
|
|
734
|
+
/**
|
|
735
|
+
* HashiCorp Vault server address (e.g., https://vault.company.com:8200)
|
|
736
|
+
*/
|
|
737
|
+
address: string;
|
|
738
|
+
/**
|
|
739
|
+
* KV v2 secrets engine mount path (e.g., windmill)
|
|
740
|
+
*/
|
|
741
|
+
mount_path: string;
|
|
742
|
+
/**
|
|
743
|
+
* Vault JWT auth role name for Windmill (optional, if not provided token auth is used)
|
|
744
|
+
*/
|
|
745
|
+
jwt_role?: string;
|
|
746
|
+
/**
|
|
747
|
+
* Vault Enterprise namespace (optional)
|
|
748
|
+
*/
|
|
749
|
+
namespace?: string;
|
|
750
|
+
/**
|
|
751
|
+
* Static Vault token for testing/development (optional, if provided this is used instead of JWT authentication)
|
|
752
|
+
*/
|
|
753
|
+
token?: string;
|
|
754
|
+
};
|
|
755
|
+
export type SecretMigrationFailure = {
|
|
756
|
+
/**
|
|
757
|
+
* Workspace ID where the secret is located
|
|
758
|
+
*/
|
|
759
|
+
workspace_id: string;
|
|
760
|
+
/**
|
|
761
|
+
* Path of the secret that failed to migrate
|
|
762
|
+
*/
|
|
763
|
+
path: string;
|
|
764
|
+
/**
|
|
765
|
+
* Error message
|
|
766
|
+
*/
|
|
767
|
+
error: string;
|
|
768
|
+
};
|
|
769
|
+
export type SecretMigrationReport = {
|
|
770
|
+
/**
|
|
771
|
+
* Total number of secrets found
|
|
772
|
+
*/
|
|
773
|
+
total_secrets: number;
|
|
774
|
+
/**
|
|
775
|
+
* Number of secrets successfully migrated
|
|
776
|
+
*/
|
|
777
|
+
migrated_count: number;
|
|
778
|
+
/**
|
|
779
|
+
* Number of secrets that failed to migrate
|
|
780
|
+
*/
|
|
781
|
+
failed_count: number;
|
|
782
|
+
/**
|
|
783
|
+
* Details of any failures encountered during migration
|
|
784
|
+
*/
|
|
785
|
+
failures: Array<SecretMigrationFailure>;
|
|
786
|
+
};
|
|
787
|
+
export type JwksResponse = {
|
|
788
|
+
/**
|
|
789
|
+
* Array of JSON Web Keys for JWT verification
|
|
790
|
+
*/
|
|
791
|
+
keys: Array<{
|
|
792
|
+
[key: string]: unknown;
|
|
793
|
+
}>;
|
|
794
|
+
};
|
|
733
795
|
export type FlowConversation = {
|
|
734
796
|
/**
|
|
735
797
|
* Unique identifier for the conversation
|
|
@@ -3731,6 +3793,28 @@ export type TestMetadataData = {
|
|
|
3731
3793
|
};
|
|
3732
3794
|
export type TestMetadataResponse = (string);
|
|
3733
3795
|
export type ListGlobalSettingsResponse = (Array<GlobalSetting>);
|
|
3796
|
+
export type GetJwksResponse = (JwksResponse);
|
|
3797
|
+
export type TestSecretBackendData = {
|
|
3798
|
+
/**
|
|
3799
|
+
* Vault settings to test
|
|
3800
|
+
*/
|
|
3801
|
+
requestBody: VaultSettings;
|
|
3802
|
+
};
|
|
3803
|
+
export type TestSecretBackendResponse = (string);
|
|
3804
|
+
export type MigrateSecretsToVaultData = {
|
|
3805
|
+
/**
|
|
3806
|
+
* Vault settings for migration target
|
|
3807
|
+
*/
|
|
3808
|
+
requestBody: VaultSettings;
|
|
3809
|
+
};
|
|
3810
|
+
export type MigrateSecretsToVaultResponse = (SecretMigrationReport);
|
|
3811
|
+
export type MigrateSecretsToDatabaseData = {
|
|
3812
|
+
/**
|
|
3813
|
+
* Vault settings for migration source
|
|
3814
|
+
*/
|
|
3815
|
+
requestBody: VaultSettings;
|
|
3816
|
+
};
|
|
3817
|
+
export type MigrateSecretsToDatabaseResponse = (SecretMigrationReport);
|
|
3734
3818
|
export type GetCurrentEmailResponse = (string);
|
|
3735
3819
|
export type RefreshUserTokenData = {
|
|
3736
3820
|
ifExpiringInLessThanS?: number;
|