diff --git a/CHANGELOG.md b/CHANGELOG.md index 39b2e47..a2316c9 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,6 +1,6 @@ -## Version 1.4.1 +## Version 1.4.2 ### Bug Fixes -- Fixed cloudapi/k8s/workerAdd returning value type -- Fixed cloudapi/cloudbroker/account/create/update SendAccessEmails field tags +- Fixed cloudapi/cloudbroker/compute/pfwAdd publicPortEnd request field type +- Fixed typo in cloudapi/k8s/disable/enable request name diff --git a/pkg/cloudapi/compute/pfw_add.go b/pkg/cloudapi/compute/pfw_add.go index d6ce4fc..e6fa4a8 100644 --- a/pkg/cloudapi/compute/pfw_add.go +++ b/pkg/cloudapi/compute/pfw_add.go @@ -19,8 +19,9 @@ type PFWAddRequest struct { PublicPortStart uint64 `url:"publicPortStart" json:"publicPortStart" validate:"required"` // End port number (inclusive) for the ranged rule + // Default value: -1 // Required: false - PublicPortEnd uint64 `url:"publicPortEnd,omitempty" json:"publicPortEnd,omitempty"` + PublicPortEnd int64 `url:"publicPortEnd,omitempty" json:"publicPortEnd,omitempty"` // Internal base port number // Required: true diff --git a/pkg/cloudapi/k8s/disable_enable.go b/pkg/cloudapi/k8s/disable_enable.go index 9d5dbf0..76158a7 100644 --- a/pkg/cloudapi/k8s/disable_enable.go +++ b/pkg/cloudapi/k8s/disable_enable.go @@ -9,14 +9,14 @@ import ( ) // Request struct for disable/enable kubernetes cluster -type DisabelEnableRequest struct { +type DisableEnableRequest struct { // Kubernetes cluster ID // Required: true K8SID uint64 `url:"k8sId" json:"k8sId" validate:"required"` } // Disable disables kubernetes cluster by ID -func (k8s K8S) Disable(ctx context.Context, req DisabelEnableRequest) (bool, error) { +func (k8s K8S) Disable(ctx context.Context, req DisableEnableRequest) (bool, error) { err := validators.ValidateRequest(req) if err != nil { for _, validationError := range validators.GetErrors(err) { @@ -40,7 +40,7 @@ func (k8s K8S) Disable(ctx context.Context, req DisabelEnableRequest) (bool, err } // Enable enables kubernetes cluster by ID -func (k8s K8S) Enable(ctx context.Context, req DisabelEnableRequest) (bool, error) { +func (k8s K8S) Enable(ctx context.Context, req DisableEnableRequest) (bool, error) { err := validators.ValidateRequest(req) if err != nil { for _, validationError := range validators.GetErrors(err) { diff --git a/pkg/cloudbroker/compute/pfw_add.go b/pkg/cloudbroker/compute/pfw_add.go index ff220d0..8863451 100644 --- a/pkg/cloudbroker/compute/pfw_add.go +++ b/pkg/cloudbroker/compute/pfw_add.go @@ -19,8 +19,9 @@ type PFWAddRequest struct { PublicPortStart uint64 `url:"publicPortStart" json:"publicPortStart" validate:"required"` // End port number (inclusive) for the ranged rule + // Default value: -1 // Required: false - PublicPortEnd uint64 `url:"publicPortEnd,omitempty" json:"publicPortEnd,omitempty"` + PublicPortEnd int64 `url:"publicPortEnd,omitempty" json:"publicPortEnd,omitempty"` // Internal base port number // Required: true