Expose imported critical data in web app
This commit is contained in:
@@ -15,6 +15,15 @@
|
||||
<pre class="code-block">{
|
||||
"attackTables": [
|
||||
{ "key": "broadsword", "label": "Broadsword" }
|
||||
],
|
||||
"criticalTables": [
|
||||
{
|
||||
"key": "mana",
|
||||
"label": "Mana Critical Strike Table",
|
||||
"family": "standard",
|
||||
"sourceDocument": "Mana.pdf",
|
||||
"notes": "Imported from PDF XML extraction."
|
||||
}
|
||||
]
|
||||
}</pre>
|
||||
</section>
|
||||
@@ -34,10 +43,11 @@
|
||||
<h2 class="panel-title">Critical lookup</h2>
|
||||
<p class="panel-copy"><code>POST /api/lookup/critical</code></p>
|
||||
<pre class="code-block">{
|
||||
"criticalType": "slash",
|
||||
"column": "B",
|
||||
"roll": 72,
|
||||
"criticalType": "mana",
|
||||
"column": "E",
|
||||
"roll": 100,
|
||||
"group": null
|
||||
}</pre>
|
||||
<p class="panel-copy">Response now includes table metadata, roll-band bounds, raw imported cell text, parse status, and parsed JSON alongside the gameplay description.</p>
|
||||
</section>
|
||||
</div>
|
||||
|
||||
Reference in New Issue
Block a user