@camstack/addon-tailscale-ingress 0.1.4 → 0.1.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4617,7 +4617,7 @@ function _instanceof(cls, params = {}) {
4617
4617
  return inst;
4618
4618
  }
4619
4619
  //#endregion
4620
- //#region ../types/dist/index-Ce7RZWP4.mjs
4620
+ //#region ../types/dist/index-CWhQOnm9.mjs
4621
4621
  var MODEL_FORMATS = [
4622
4622
  "onnx",
4623
4623
  "coreml",
@@ -8226,42 +8226,6 @@ method(object({
8226
8226
  username: string(),
8227
8227
  password: string()
8228
8228
  }), AuthResultSchema.nullable(), { kind: "mutation" }), method(object({ state: string() }), string()), method(record(string(), string()), AuthResultSchema, { kind: "mutation" }), method(object({ token: string() }), AuthResultSchema.nullable());
8229
- var AuthProviderInfoSchema = object({
8230
- /** Stable id matching the addon id (used for `getLoginUrl({addonId,…})`). */
8231
- addonId: string(),
8232
- /**
8233
- * Per-instance id when one addon registers multiple "logical"
8234
- * providers (e.g. OIDC with Google + Microsoft + custom). The login
8235
- * URL becomes `/addon/${addonId}/${instanceId}/start` — handler reads
8236
- * `:instanceId` from the route. Empty/unset means the addon is a
8237
- * single-instance provider; the URL is `/addon/${addonId}/start`.
8238
- */
8239
- instanceId: string().optional(),
8240
- /** Display label shown on the login button + admin row. */
8241
- displayName: string(),
8242
- /** Optional iconography hint (lucide-react icon name OR emoji). */
8243
- icon: string().optional(),
8244
- /** When true, the provider exposes a redirect-based login flow
8245
- * (`getLoginUrl` returns a URL the browser navigates to). */
8246
- hasRedirectFlow: boolean(),
8247
- /** When true, the provider exposes a credential-form login flow
8248
- * (`validateCredentials` accepts username + password). */
8249
- hasCredentialFlow: boolean(),
8250
- /** Provider kind, drives admin-UI hint dispatch (oidc / saml / totp / …). */
8251
- kind: string().optional(),
8252
- /** Operator-facing status string (e.g. "Connected to https://login.acme.com"). */
8253
- status: string().optional(),
8254
- /** When false, the provider is registered but disabled by config; the
8255
- * UI surfaces it as inactive without enumerating it for login. */
8256
- enabled: boolean()
8257
- });
8258
- method(_void(), array(AuthProviderInfoSchema).readonly()), method(object({
8259
- addonId: string(),
8260
- enabled: boolean()
8261
- }), object({ success: literal(true) }), {
8262
- kind: "mutation",
8263
- auth: "admin"
8264
- });
8265
8229
  var NetworkEndpointSchema = object({
8266
8230
  url: string(),
8267
8231
  hostname: string(),
@@ -8290,7 +8254,6 @@ var networkAccessCapability = {
8290
8254
  name: "network-access",
8291
8255
  scope: "system",
8292
8256
  mode: "collection",
8293
- internal: true,
8294
8257
  providerKind: "ingress",
8295
8258
  methods: {
8296
8259
  start: method(_void(), NetworkEndpointSchema, { kind: "mutation" }),
@@ -8298,40 +8261,13 @@ var networkAccessCapability = {
8298
8261
  getEndpoint: method(_void(), NetworkEndpointSchema.nullable()),
8299
8262
  getStatus: method(_void(), NetworkAccessStatusSchema),
8300
8263
  /**
8301
- * Enumerate every active ingress entry. Default implementation (when
8302
- * the provider omits this method) is derived from `getEndpoint()` —
8303
- * see the remote-access orchestrator for the fallback path.
8264
+ * Enumerate every active ingress entry. Providers that expose only a
8265
+ * single endpoint may omit this method; callers fall back to
8266
+ * `getEndpoint()` in that case.
8304
8267
  */
8305
8268
  listEndpoints: method(_void(), array(NetworkEndpointEntrySchema).readonly())
8306
8269
  }
8307
8270
  };
8308
- var RemoteAccessEndpointSchema = object({
8309
- url: string(),
8310
- hostname: string(),
8311
- port: number(),
8312
- protocol: _enum(["http", "https"])
8313
- });
8314
- var RemoteAccessProviderInfoSchema = object({
8315
- /** Stable id matching the addon id. */
8316
- addonId: string(),
8317
- /** Display label shown on the admin row — sourced from the addon manifest. */
8318
- displayName: string(),
8319
- /** When false, the provider is registered but disabled. */
8320
- enabled: boolean(),
8321
- /** True when the underlying tunnel/connection is up. */
8322
- connected: boolean(),
8323
- /** Public-facing endpoint, when connected. Null otherwise. */
8324
- endpoint: RemoteAccessEndpointSchema.nullable(),
8325
- /** Last error message (when connected=false), if available. */
8326
- error: string().optional()
8327
- });
8328
- method(_void(), array(RemoteAccessProviderInfoSchema).readonly()), method(object({ addonId: string() }), RemoteAccessEndpointSchema, {
8329
- kind: "mutation",
8330
- auth: "admin"
8331
- }), method(object({ addonId: string() }), object({ success: literal(true) }), {
8332
- kind: "mutation",
8333
- auth: "admin"
8334
- });
8335
8271
  var TurnServerSchema = object({
8336
8272
  /** Single URL or list of URLs (e.g. "turn:turn.example.com:3478?transport=udp"). */
8337
8273
  urls: union([string(), array(string())]),
@@ -8339,33 +8275,6 @@ var TurnServerSchema = object({
8339
8275
  credential: string().optional()
8340
8276
  });
8341
8277
  method(_void(), array(TurnServerSchema).readonly());
8342
- var TurnProviderInfoSchema = object({
8343
- /** Stable id matching the addon id. */
8344
- addonId: string(),
8345
- /** Display label shown on the admin row — sourced from the addon manifest. */
8346
- displayName: string(),
8347
- /** When false, the provider is registered but disabled. */
8348
- enabled: boolean(),
8349
- /** Number of servers this provider is currently exposing. */
8350
- serverCount: number(),
8351
- /**
8352
- * Flat list of every TURN/STUN URL this provider currently exposes.
8353
- * One row per URL (multi-URL ICE server entries are flattened). The
8354
- * admin UI shows this in a compact per-provider list so operators
8355
- * can verify what's actually being negotiated without having to dig
8356
- * into the combined `getAllServers` output.
8357
- */
8358
- urls: array(string()).readonly(),
8359
- /** Last fetch error (when serverCount=0 due to API failure), if any. */
8360
- error: string().optional()
8361
- });
8362
- method(_void(), array(TurnProviderInfoSchema).readonly()), method(_void(), array(TurnServerSchema).readonly()), method(object({
8363
- addonId: string(),
8364
- enabled: boolean()
8365
- }), object({ success: literal(true) }), {
8366
- kind: "mutation",
8367
- auth: "admin"
8368
- });
8369
8278
  var SnapshotImageSchema = object({
8370
8279
  base64: string(),
8371
8280
  contentType: string()
@@ -9459,7 +9368,7 @@ method(_void(), ListResultSchema), method(_void(), PreferredSchema), method(obje
9459
9368
  * tunnel always emits `https://` regardless. */
9460
9369
  scheme: _enum(["http", "https"]).optional()
9461
9370
  }), GetConnectionEndpointsResultSchema), method(_void(), AllowedAddressesSchema), method(AllowedAddressesSchema, object({ success: literal(true) }), { kind: "mutation" }), method(_void(), AllowedAddressesSchema, { kind: "mutation" });
9462
- var MeshEndpointSchema$1 = object({
9371
+ var MeshEndpointSchema = object({
9463
9372
  /** Stable identifier within the provider (e.g. `mesh-ipv4`, `magicdns`, `funnel`). */
9464
9373
  id: string(),
9465
9374
  /** Operator-facing label (e.g. "Mesh IPv4", "MagicDNS"). */
@@ -9536,7 +9445,7 @@ var MeshStatusSchema = object({
9536
9445
  /** Number of peers visible to this host (excluding self). */
9537
9446
  peerCount: number(),
9538
9447
  /** Every endpoint this provider exposes for the current host. */
9539
- endpoints: array(MeshEndpointSchema$1).readonly(),
9448
+ endpoints: array(MeshEndpointSchema).readonly(),
9540
9449
  /** Last error from the daemon, when not joined. */
9541
9450
  error: string().optional(),
9542
9451
  /**
@@ -9611,51 +9520,6 @@ authKey: string().optional() }), object({
9611
9520
  /** Human-readable error when `ok: false`. */
9612
9521
  error: string().optional()
9613
9522
  }), { kind: "mutation" });
9614
- var MeshEndpointSchema = object({
9615
- id: string(),
9616
- label: string(),
9617
- scope: _enum(["mesh", "public"]),
9618
- url: string(),
9619
- hostname: string(),
9620
- port: number(),
9621
- protocol: _enum(["http", "https"])
9622
- });
9623
- var MeshProviderInfoSchema = object({
9624
- /** Stable id matching the addon id. */
9625
- addonId: string(),
9626
- /** Display label shown on the admin row — sourced from the addon manifest. */
9627
- displayName: string(),
9628
- /** True when the host is joined to this provider's mesh. */
9629
- joined: boolean(),
9630
- /** Local mesh IP (empty when not joined). */
9631
- meshIp: string(),
9632
- /** MagicDNS / mesh hostname (empty when not configured). */
9633
- magicDnsHostname: string(),
9634
- /** Peer count (excluding self). */
9635
- peerCount: number(),
9636
- /** Active endpoints (mesh IP + MagicDNS + optional public Funnel). */
9637
- endpoints: array(MeshEndpointSchema).readonly(),
9638
- /** Last error reported by the provider. */
9639
- error: string().optional(),
9640
- /** Tenant / tailnet / network display name. Empty pre-join. */
9641
- tenantName: string(),
9642
- /** Mesh DNS suffix (e.g. tailXXXX.ts.net). Empty when not configured. */
9643
- magicDnsSuffix: string(),
9644
- /** Authenticated user / account login. Null for token-only providers. */
9645
- userLogin: string().nullable(),
9646
- /** Provider control-plane URL. */
9647
- controlPlaneUrl: string(),
9648
- /** Machine-key expiry (epoch ms). Null when keys don't rotate. */
9649
- keyExpiry: number().nullable()
9650
- });
9651
- method(_void(), array(MeshProviderInfoSchema).readonly()), method(object({
9652
- addonId: string(),
9653
- authKey: string().min(8),
9654
- hostname: string().optional()
9655
- }), object({ joined: literal(true) }), { kind: "mutation" }), method(object({ addonId: string() }), object({ success: literal(true) }), { kind: "mutation" }), method(object({
9656
- addonId: string(),
9657
- hostname: string().optional()
9658
- }), object({ loginUrl: string() }), { kind: "mutation" }), method(object({ addonId: string() }), object({ loggedOut: literal(true) }), { kind: "mutation" }), method(object({ addonId: string() }), object({ peers: array(MeshPeerSchema).readonly() }));
9659
9523
  var MethodAccessSchema = _enum([
9660
9524
  "view",
9661
9525
  "create",
@@ -10345,6 +10209,13 @@ method(_void(), array(AddonListItemSchema).readonly()), method(object({
10345
10209
  mode: _enum(["singleton", "collection"]),
10346
10210
  isActive: boolean()
10347
10211
  })).readonly()), method(object({
10212
+ capName: string().min(1),
10213
+ addonId: string().min(1),
10214
+ enabled: boolean()
10215
+ }), object({ success: literal(true) }), {
10216
+ kind: "mutation",
10217
+ auth: "admin"
10218
+ }), method(object({
10348
10219
  packageName: string().min(1),
10349
10220
  version: string().optional()
10350
10221
  }), UpdateFrameworkPackageResultSchema, {
@@ -11030,6 +10901,12 @@ Object.freeze({
11030
10901
  addonId: null,
11031
10902
  access: "create"
11032
10903
  },
10904
+ "addons.setCapabilityProviderEnabled": {
10905
+ capName: "addons",
10906
+ capScope: "system",
10907
+ addonId: null,
10908
+ access: "create"
10909
+ },
11033
10910
  "addons.uninstallPackage": {
11034
10911
  capName: "addons",
11035
10912
  capScope: "system",
@@ -11282,18 +11159,6 @@ Object.freeze({
11282
11159
  addonId: null,
11283
11160
  access: "view"
11284
11161
  },
11285
- "authentication.listProviders": {
11286
- capName: "authentication",
11287
- capScope: "system",
11288
- addonId: null,
11289
- access: "view"
11290
- },
11291
- "authentication.setProviderEnabled": {
11292
- capName: "authentication",
11293
- capScope: "system",
11294
- addonId: null,
11295
- access: "create"
11296
- },
11297
11162
  "authProvider.getLoginUrl": {
11298
11163
  capName: "auth-provider",
11299
11164
  capScope: "system",
@@ -12140,42 +12005,6 @@ Object.freeze({
12140
12005
  addonId: null,
12141
12006
  access: "create"
12142
12007
  },
12143
- "meshOrchestrator.joinProvider": {
12144
- capName: "mesh-orchestrator",
12145
- capScope: "system",
12146
- addonId: null,
12147
- access: "create"
12148
- },
12149
- "meshOrchestrator.leaveProvider": {
12150
- capName: "mesh-orchestrator",
12151
- capScope: "system",
12152
- addonId: null,
12153
- access: "create"
12154
- },
12155
- "meshOrchestrator.listProviderPeers": {
12156
- capName: "mesh-orchestrator",
12157
- capScope: "system",
12158
- addonId: null,
12159
- access: "view"
12160
- },
12161
- "meshOrchestrator.listProviders": {
12162
- capName: "mesh-orchestrator",
12163
- capScope: "system",
12164
- addonId: null,
12165
- access: "view"
12166
- },
12167
- "meshOrchestrator.logoutProvider": {
12168
- capName: "mesh-orchestrator",
12169
- capScope: "system",
12170
- addonId: null,
12171
- access: "create"
12172
- },
12173
- "meshOrchestrator.startLoginProvider": {
12174
- capName: "mesh-orchestrator",
12175
- capScope: "system",
12176
- addonId: null,
12177
- access: "create"
12178
- },
12179
12008
  "metricsProvider.collectSnapshot": {
12180
12009
  capName: "metrics-provider",
12181
12010
  capScope: "system",
@@ -13202,24 +13031,6 @@ Object.freeze({
13202
13031
  addonId: null,
13203
13032
  access: "create"
13204
13033
  },
13205
- "remoteAccess.listProviders": {
13206
- capName: "remote-access",
13207
- capScope: "system",
13208
- addonId: null,
13209
- access: "view"
13210
- },
13211
- "remoteAccess.startProvider": {
13212
- capName: "remote-access",
13213
- capScope: "system",
13214
- addonId: null,
13215
- access: "create"
13216
- },
13217
- "remoteAccess.stopProvider": {
13218
- capName: "remote-access",
13219
- capScope: "system",
13220
- addonId: null,
13221
- access: "create"
13222
- },
13223
13034
  "restreamer.getExposedResources": {
13224
13035
  capName: "restreamer",
13225
13036
  capScope: "system",
@@ -13778,24 +13589,6 @@ Object.freeze({
13778
13589
  addonId: null,
13779
13590
  access: "view"
13780
13591
  },
13781
- "turnOrchestrator.getAllServers": {
13782
- capName: "turn-orchestrator",
13783
- capScope: "system",
13784
- addonId: null,
13785
- access: "view"
13786
- },
13787
- "turnOrchestrator.listProviders": {
13788
- capName: "turn-orchestrator",
13789
- capScope: "system",
13790
- addonId: null,
13791
- access: "view"
13792
- },
13793
- "turnOrchestrator.setProviderEnabled": {
13794
- capName: "turn-orchestrator",
13795
- capScope: "system",
13796
- addonId: null,
13797
- access: "create"
13798
- },
13799
13592
  "turnProvider.getTurnServers": {
13800
13593
  capName: "turn-provider",
13801
13594
  capScope: "system",