@camstack/addon-tailscale-ingress 0.1.4 → 0.1.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4621,7 +4621,7 @@ function _instanceof(cls, params = {}) {
4621
4621
  return inst;
4622
4622
  }
4623
4623
  //#endregion
4624
- //#region ../types/dist/index-Ce7RZWP4.mjs
4624
+ //#region ../types/dist/index-CWhQOnm9.mjs
4625
4625
  var MODEL_FORMATS = [
4626
4626
  "onnx",
4627
4627
  "coreml",
@@ -8230,42 +8230,6 @@ method(object({
8230
8230
  username: string(),
8231
8231
  password: string()
8232
8232
  }), AuthResultSchema.nullable(), { kind: "mutation" }), method(object({ state: string() }), string()), method(record(string(), string()), AuthResultSchema, { kind: "mutation" }), method(object({ token: string() }), AuthResultSchema.nullable());
8233
- var AuthProviderInfoSchema = object({
8234
- /** Stable id matching the addon id (used for `getLoginUrl({addonId,…})`). */
8235
- addonId: string(),
8236
- /**
8237
- * Per-instance id when one addon registers multiple "logical"
8238
- * providers (e.g. OIDC with Google + Microsoft + custom). The login
8239
- * URL becomes `/addon/${addonId}/${instanceId}/start` — handler reads
8240
- * `:instanceId` from the route. Empty/unset means the addon is a
8241
- * single-instance provider; the URL is `/addon/${addonId}/start`.
8242
- */
8243
- instanceId: string().optional(),
8244
- /** Display label shown on the login button + admin row. */
8245
- displayName: string(),
8246
- /** Optional iconography hint (lucide-react icon name OR emoji). */
8247
- icon: string().optional(),
8248
- /** When true, the provider exposes a redirect-based login flow
8249
- * (`getLoginUrl` returns a URL the browser navigates to). */
8250
- hasRedirectFlow: boolean(),
8251
- /** When true, the provider exposes a credential-form login flow
8252
- * (`validateCredentials` accepts username + password). */
8253
- hasCredentialFlow: boolean(),
8254
- /** Provider kind, drives admin-UI hint dispatch (oidc / saml / totp / …). */
8255
- kind: string().optional(),
8256
- /** Operator-facing status string (e.g. "Connected to https://login.acme.com"). */
8257
- status: string().optional(),
8258
- /** When false, the provider is registered but disabled by config; the
8259
- * UI surfaces it as inactive without enumerating it for login. */
8260
- enabled: boolean()
8261
- });
8262
- method(_void(), array(AuthProviderInfoSchema).readonly()), method(object({
8263
- addonId: string(),
8264
- enabled: boolean()
8265
- }), object({ success: literal(true) }), {
8266
- kind: "mutation",
8267
- auth: "admin"
8268
- });
8269
8233
  var NetworkEndpointSchema = object({
8270
8234
  url: string(),
8271
8235
  hostname: string(),
@@ -8294,7 +8258,6 @@ var networkAccessCapability = {
8294
8258
  name: "network-access",
8295
8259
  scope: "system",
8296
8260
  mode: "collection",
8297
- internal: true,
8298
8261
  providerKind: "ingress",
8299
8262
  methods: {
8300
8263
  start: method(_void(), NetworkEndpointSchema, { kind: "mutation" }),
@@ -8302,40 +8265,13 @@ var networkAccessCapability = {
8302
8265
  getEndpoint: method(_void(), NetworkEndpointSchema.nullable()),
8303
8266
  getStatus: method(_void(), NetworkAccessStatusSchema),
8304
8267
  /**
8305
- * Enumerate every active ingress entry. Default implementation (when
8306
- * the provider omits this method) is derived from `getEndpoint()` —
8307
- * see the remote-access orchestrator for the fallback path.
8268
+ * Enumerate every active ingress entry. Providers that expose only a
8269
+ * single endpoint may omit this method; callers fall back to
8270
+ * `getEndpoint()` in that case.
8308
8271
  */
8309
8272
  listEndpoints: method(_void(), array(NetworkEndpointEntrySchema).readonly())
8310
8273
  }
8311
8274
  };
8312
- var RemoteAccessEndpointSchema = object({
8313
- url: string(),
8314
- hostname: string(),
8315
- port: number(),
8316
- protocol: _enum(["http", "https"])
8317
- });
8318
- var RemoteAccessProviderInfoSchema = object({
8319
- /** Stable id matching the addon id. */
8320
- addonId: string(),
8321
- /** Display label shown on the admin row — sourced from the addon manifest. */
8322
- displayName: string(),
8323
- /** When false, the provider is registered but disabled. */
8324
- enabled: boolean(),
8325
- /** True when the underlying tunnel/connection is up. */
8326
- connected: boolean(),
8327
- /** Public-facing endpoint, when connected. Null otherwise. */
8328
- endpoint: RemoteAccessEndpointSchema.nullable(),
8329
- /** Last error message (when connected=false), if available. */
8330
- error: string().optional()
8331
- });
8332
- method(_void(), array(RemoteAccessProviderInfoSchema).readonly()), method(object({ addonId: string() }), RemoteAccessEndpointSchema, {
8333
- kind: "mutation",
8334
- auth: "admin"
8335
- }), method(object({ addonId: string() }), object({ success: literal(true) }), {
8336
- kind: "mutation",
8337
- auth: "admin"
8338
- });
8339
8275
  var TurnServerSchema = object({
8340
8276
  /** Single URL or list of URLs (e.g. "turn:turn.example.com:3478?transport=udp"). */
8341
8277
  urls: union([string(), array(string())]),
@@ -8343,33 +8279,6 @@ var TurnServerSchema = object({
8343
8279
  credential: string().optional()
8344
8280
  });
8345
8281
  method(_void(), array(TurnServerSchema).readonly());
8346
- var TurnProviderInfoSchema = object({
8347
- /** Stable id matching the addon id. */
8348
- addonId: string(),
8349
- /** Display label shown on the admin row — sourced from the addon manifest. */
8350
- displayName: string(),
8351
- /** When false, the provider is registered but disabled. */
8352
- enabled: boolean(),
8353
- /** Number of servers this provider is currently exposing. */
8354
- serverCount: number(),
8355
- /**
8356
- * Flat list of every TURN/STUN URL this provider currently exposes.
8357
- * One row per URL (multi-URL ICE server entries are flattened). The
8358
- * admin UI shows this in a compact per-provider list so operators
8359
- * can verify what's actually being negotiated without having to dig
8360
- * into the combined `getAllServers` output.
8361
- */
8362
- urls: array(string()).readonly(),
8363
- /** Last fetch error (when serverCount=0 due to API failure), if any. */
8364
- error: string().optional()
8365
- });
8366
- method(_void(), array(TurnProviderInfoSchema).readonly()), method(_void(), array(TurnServerSchema).readonly()), method(object({
8367
- addonId: string(),
8368
- enabled: boolean()
8369
- }), object({ success: literal(true) }), {
8370
- kind: "mutation",
8371
- auth: "admin"
8372
- });
8373
8282
  var SnapshotImageSchema = object({
8374
8283
  base64: string(),
8375
8284
  contentType: string()
@@ -9463,7 +9372,7 @@ method(_void(), ListResultSchema), method(_void(), PreferredSchema), method(obje
9463
9372
  * tunnel always emits `https://` regardless. */
9464
9373
  scheme: _enum(["http", "https"]).optional()
9465
9374
  }), GetConnectionEndpointsResultSchema), method(_void(), AllowedAddressesSchema), method(AllowedAddressesSchema, object({ success: literal(true) }), { kind: "mutation" }), method(_void(), AllowedAddressesSchema, { kind: "mutation" });
9466
- var MeshEndpointSchema$1 = object({
9375
+ var MeshEndpointSchema = object({
9467
9376
  /** Stable identifier within the provider (e.g. `mesh-ipv4`, `magicdns`, `funnel`). */
9468
9377
  id: string(),
9469
9378
  /** Operator-facing label (e.g. "Mesh IPv4", "MagicDNS"). */
@@ -9540,7 +9449,7 @@ var MeshStatusSchema = object({
9540
9449
  /** Number of peers visible to this host (excluding self). */
9541
9450
  peerCount: number(),
9542
9451
  /** Every endpoint this provider exposes for the current host. */
9543
- endpoints: array(MeshEndpointSchema$1).readonly(),
9452
+ endpoints: array(MeshEndpointSchema).readonly(),
9544
9453
  /** Last error from the daemon, when not joined. */
9545
9454
  error: string().optional(),
9546
9455
  /**
@@ -9615,51 +9524,6 @@ authKey: string().optional() }), object({
9615
9524
  /** Human-readable error when `ok: false`. */
9616
9525
  error: string().optional()
9617
9526
  }), { kind: "mutation" });
9618
- var MeshEndpointSchema = object({
9619
- id: string(),
9620
- label: string(),
9621
- scope: _enum(["mesh", "public"]),
9622
- url: string(),
9623
- hostname: string(),
9624
- port: number(),
9625
- protocol: _enum(["http", "https"])
9626
- });
9627
- var MeshProviderInfoSchema = object({
9628
- /** Stable id matching the addon id. */
9629
- addonId: string(),
9630
- /** Display label shown on the admin row — sourced from the addon manifest. */
9631
- displayName: string(),
9632
- /** True when the host is joined to this provider's mesh. */
9633
- joined: boolean(),
9634
- /** Local mesh IP (empty when not joined). */
9635
- meshIp: string(),
9636
- /** MagicDNS / mesh hostname (empty when not configured). */
9637
- magicDnsHostname: string(),
9638
- /** Peer count (excluding self). */
9639
- peerCount: number(),
9640
- /** Active endpoints (mesh IP + MagicDNS + optional public Funnel). */
9641
- endpoints: array(MeshEndpointSchema).readonly(),
9642
- /** Last error reported by the provider. */
9643
- error: string().optional(),
9644
- /** Tenant / tailnet / network display name. Empty pre-join. */
9645
- tenantName: string(),
9646
- /** Mesh DNS suffix (e.g. tailXXXX.ts.net). Empty when not configured. */
9647
- magicDnsSuffix: string(),
9648
- /** Authenticated user / account login. Null for token-only providers. */
9649
- userLogin: string().nullable(),
9650
- /** Provider control-plane URL. */
9651
- controlPlaneUrl: string(),
9652
- /** Machine-key expiry (epoch ms). Null when keys don't rotate. */
9653
- keyExpiry: number().nullable()
9654
- });
9655
- method(_void(), array(MeshProviderInfoSchema).readonly()), method(object({
9656
- addonId: string(),
9657
- authKey: string().min(8),
9658
- hostname: string().optional()
9659
- }), object({ joined: literal(true) }), { kind: "mutation" }), method(object({ addonId: string() }), object({ success: literal(true) }), { kind: "mutation" }), method(object({
9660
- addonId: string(),
9661
- hostname: string().optional()
9662
- }), object({ loginUrl: string() }), { kind: "mutation" }), method(object({ addonId: string() }), object({ loggedOut: literal(true) }), { kind: "mutation" }), method(object({ addonId: string() }), object({ peers: array(MeshPeerSchema).readonly() }));
9663
9527
  var MethodAccessSchema = _enum([
9664
9528
  "view",
9665
9529
  "create",
@@ -10349,6 +10213,13 @@ method(_void(), array(AddonListItemSchema).readonly()), method(object({
10349
10213
  mode: _enum(["singleton", "collection"]),
10350
10214
  isActive: boolean()
10351
10215
  })).readonly()), method(object({
10216
+ capName: string().min(1),
10217
+ addonId: string().min(1),
10218
+ enabled: boolean()
10219
+ }), object({ success: literal(true) }), {
10220
+ kind: "mutation",
10221
+ auth: "admin"
10222
+ }), method(object({
10352
10223
  packageName: string().min(1),
10353
10224
  version: string().optional()
10354
10225
  }), UpdateFrameworkPackageResultSchema, {
@@ -11034,6 +10905,12 @@ Object.freeze({
11034
10905
  addonId: null,
11035
10906
  access: "create"
11036
10907
  },
10908
+ "addons.setCapabilityProviderEnabled": {
10909
+ capName: "addons",
10910
+ capScope: "system",
10911
+ addonId: null,
10912
+ access: "create"
10913
+ },
11037
10914
  "addons.uninstallPackage": {
11038
10915
  capName: "addons",
11039
10916
  capScope: "system",
@@ -11286,18 +11163,6 @@ Object.freeze({
11286
11163
  addonId: null,
11287
11164
  access: "view"
11288
11165
  },
11289
- "authentication.listProviders": {
11290
- capName: "authentication",
11291
- capScope: "system",
11292
- addonId: null,
11293
- access: "view"
11294
- },
11295
- "authentication.setProviderEnabled": {
11296
- capName: "authentication",
11297
- capScope: "system",
11298
- addonId: null,
11299
- access: "create"
11300
- },
11301
11166
  "authProvider.getLoginUrl": {
11302
11167
  capName: "auth-provider",
11303
11168
  capScope: "system",
@@ -12144,42 +12009,6 @@ Object.freeze({
12144
12009
  addonId: null,
12145
12010
  access: "create"
12146
12011
  },
12147
- "meshOrchestrator.joinProvider": {
12148
- capName: "mesh-orchestrator",
12149
- capScope: "system",
12150
- addonId: null,
12151
- access: "create"
12152
- },
12153
- "meshOrchestrator.leaveProvider": {
12154
- capName: "mesh-orchestrator",
12155
- capScope: "system",
12156
- addonId: null,
12157
- access: "create"
12158
- },
12159
- "meshOrchestrator.listProviderPeers": {
12160
- capName: "mesh-orchestrator",
12161
- capScope: "system",
12162
- addonId: null,
12163
- access: "view"
12164
- },
12165
- "meshOrchestrator.listProviders": {
12166
- capName: "mesh-orchestrator",
12167
- capScope: "system",
12168
- addonId: null,
12169
- access: "view"
12170
- },
12171
- "meshOrchestrator.logoutProvider": {
12172
- capName: "mesh-orchestrator",
12173
- capScope: "system",
12174
- addonId: null,
12175
- access: "create"
12176
- },
12177
- "meshOrchestrator.startLoginProvider": {
12178
- capName: "mesh-orchestrator",
12179
- capScope: "system",
12180
- addonId: null,
12181
- access: "create"
12182
- },
12183
12012
  "metricsProvider.collectSnapshot": {
12184
12013
  capName: "metrics-provider",
12185
12014
  capScope: "system",
@@ -13206,24 +13035,6 @@ Object.freeze({
13206
13035
  addonId: null,
13207
13036
  access: "create"
13208
13037
  },
13209
- "remoteAccess.listProviders": {
13210
- capName: "remote-access",
13211
- capScope: "system",
13212
- addonId: null,
13213
- access: "view"
13214
- },
13215
- "remoteAccess.startProvider": {
13216
- capName: "remote-access",
13217
- capScope: "system",
13218
- addonId: null,
13219
- access: "create"
13220
- },
13221
- "remoteAccess.stopProvider": {
13222
- capName: "remote-access",
13223
- capScope: "system",
13224
- addonId: null,
13225
- access: "create"
13226
- },
13227
13038
  "restreamer.getExposedResources": {
13228
13039
  capName: "restreamer",
13229
13040
  capScope: "system",
@@ -13782,24 +13593,6 @@ Object.freeze({
13782
13593
  addonId: null,
13783
13594
  access: "view"
13784
13595
  },
13785
- "turnOrchestrator.getAllServers": {
13786
- capName: "turn-orchestrator",
13787
- capScope: "system",
13788
- addonId: null,
13789
- access: "view"
13790
- },
13791
- "turnOrchestrator.listProviders": {
13792
- capName: "turn-orchestrator",
13793
- capScope: "system",
13794
- addonId: null,
13795
- access: "view"
13796
- },
13797
- "turnOrchestrator.setProviderEnabled": {
13798
- capName: "turn-orchestrator",
13799
- capScope: "system",
13800
- addonId: null,
13801
- access: "create"
13802
- },
13803
13596
  "turnProvider.getTurnServers": {
13804
13597
  capName: "turn-provider",
13805
13598
  capScope: "system",