@camstack/core 0.1.37 → 0.1.38
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/builtins/remote-access-orchestrator/remote-access-orchestrator.addon.d.ts +7 -1
- package/dist/builtins/remote-access-orchestrator/remote-access-orchestrator.addon.d.ts.map +1 -1
- package/dist/builtins/remote-access-orchestrator/remote-access-orchestrator.addon.js +46 -56
- package/dist/builtins/remote-access-orchestrator/remote-access-orchestrator.addon.js.map +1 -1
- package/dist/builtins/remote-access-orchestrator/remote-access-orchestrator.addon.mjs +47 -57
- package/dist/builtins/remote-access-orchestrator/remote-access-orchestrator.addon.mjs.map +1 -1
- package/dist/index.js +10 -138
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +10 -138
- package/dist/index.mjs.map +1 -1
- package/package.json +1 -37
- package/dist/builtins/auth-orchestrator/auth-orchestrator.addon.d.ts +0 -8
- package/dist/builtins/auth-orchestrator/auth-orchestrator.addon.d.ts.map +0 -1
- package/dist/builtins/auth-orchestrator/auth-orchestrator.addon.js +0 -75
- package/dist/builtins/auth-orchestrator/auth-orchestrator.addon.js.map +0 -1
- package/dist/builtins/auth-orchestrator/auth-orchestrator.addon.mjs +0 -69
- package/dist/builtins/auth-orchestrator/auth-orchestrator.addon.mjs.map +0 -1
- package/dist/builtins/auth-orchestrator/index.d.ts +0 -2
- package/dist/builtins/auth-orchestrator/index.d.ts.map +0 -1
- package/dist/builtins/auth-orchestrator/index.js +0 -7
- package/dist/builtins/auth-orchestrator/index.mjs +0 -2
- package/dist/builtins/mesh-orchestrator/index.d.ts +0 -2
- package/dist/builtins/mesh-orchestrator/index.d.ts.map +0 -1
- package/dist/builtins/mesh-orchestrator/index.js +0 -7
- package/dist/builtins/mesh-orchestrator/index.mjs +0 -2
- package/dist/builtins/mesh-orchestrator/mesh-orchestrator.addon.d.ts +0 -9
- package/dist/builtins/mesh-orchestrator/mesh-orchestrator.addon.d.ts.map +0 -1
- package/dist/builtins/mesh-orchestrator/mesh-orchestrator.addon.js +0 -113
- package/dist/builtins/mesh-orchestrator/mesh-orchestrator.addon.js.map +0 -1
- package/dist/builtins/mesh-orchestrator/mesh-orchestrator.addon.mjs +0 -107
- package/dist/builtins/mesh-orchestrator/mesh-orchestrator.addon.mjs.map +0 -1
- package/dist/builtins/turn-orchestrator/index.d.ts +0 -2
- package/dist/builtins/turn-orchestrator/index.d.ts.map +0 -1
- package/dist/builtins/turn-orchestrator/index.js +0 -7
- package/dist/builtins/turn-orchestrator/index.mjs +0 -2
- package/dist/builtins/turn-orchestrator/turn-orchestrator.addon.d.ts +0 -34
- package/dist/builtins/turn-orchestrator/turn-orchestrator.addon.d.ts.map +0 -1
- package/dist/builtins/turn-orchestrator/turn-orchestrator.addon.js +0 -126
- package/dist/builtins/turn-orchestrator/turn-orchestrator.addon.js.map +0 -1
- package/dist/builtins/turn-orchestrator/turn-orchestrator.addon.mjs +0 -120
- package/dist/builtins/turn-orchestrator/turn-orchestrator.addon.mjs.map +0 -1
package/dist/index.mjs
CHANGED
|
@@ -31,7 +31,7 @@ import { promisify } from "node:util";
|
|
|
31
31
|
import { errMsg, parseJsonObject } from "@camstack/types";
|
|
32
32
|
import * as vm from "node:vm";
|
|
33
33
|
import * as os from "node:os";
|
|
34
|
-
//#region ../types/dist/index-
|
|
34
|
+
//#region ../types/dist/index-CWhQOnm9.mjs
|
|
35
35
|
var MODEL_FORMATS = [
|
|
36
36
|
"onnx",
|
|
37
37
|
"coreml",
|
|
@@ -3585,42 +3585,6 @@ method(z.object({
|
|
|
3585
3585
|
username: z.string(),
|
|
3586
3586
|
password: z.string()
|
|
3587
3587
|
}), AuthResultSchema.nullable(), { kind: "mutation" }), method(z.object({ state: z.string() }), z.string()), method(z.record(z.string(), z.string()), AuthResultSchema, { kind: "mutation" }), method(z.object({ token: z.string() }), AuthResultSchema.nullable());
|
|
3588
|
-
var AuthProviderInfoSchema = z.object({
|
|
3589
|
-
/** Stable id matching the addon id (used for `getLoginUrl({addonId,…})`). */
|
|
3590
|
-
addonId: z.string(),
|
|
3591
|
-
/**
|
|
3592
|
-
* Per-instance id when one addon registers multiple "logical"
|
|
3593
|
-
* providers (e.g. OIDC with Google + Microsoft + custom). The login
|
|
3594
|
-
* URL becomes `/addon/${addonId}/${instanceId}/start` — handler reads
|
|
3595
|
-
* `:instanceId` from the route. Empty/unset means the addon is a
|
|
3596
|
-
* single-instance provider; the URL is `/addon/${addonId}/start`.
|
|
3597
|
-
*/
|
|
3598
|
-
instanceId: z.string().optional(),
|
|
3599
|
-
/** Display label shown on the login button + admin row. */
|
|
3600
|
-
displayName: z.string(),
|
|
3601
|
-
/** Optional iconography hint (lucide-react icon name OR emoji). */
|
|
3602
|
-
icon: z.string().optional(),
|
|
3603
|
-
/** When true, the provider exposes a redirect-based login flow
|
|
3604
|
-
* (`getLoginUrl` returns a URL the browser navigates to). */
|
|
3605
|
-
hasRedirectFlow: z.boolean(),
|
|
3606
|
-
/** When true, the provider exposes a credential-form login flow
|
|
3607
|
-
* (`validateCredentials` accepts username + password). */
|
|
3608
|
-
hasCredentialFlow: z.boolean(),
|
|
3609
|
-
/** Provider kind, drives admin-UI hint dispatch (oidc / saml / totp / …). */
|
|
3610
|
-
kind: z.string().optional(),
|
|
3611
|
-
/** Operator-facing status string (e.g. "Connected to https://login.acme.com"). */
|
|
3612
|
-
status: z.string().optional(),
|
|
3613
|
-
/** When false, the provider is registered but disabled by config; the
|
|
3614
|
-
* UI surfaces it as inactive without enumerating it for login. */
|
|
3615
|
-
enabled: z.boolean()
|
|
3616
|
-
});
|
|
3617
|
-
method(z.void(), z.array(AuthProviderInfoSchema).readonly()), method(z.object({
|
|
3618
|
-
addonId: z.string(),
|
|
3619
|
-
enabled: z.boolean()
|
|
3620
|
-
}), z.object({ success: z.literal(true) }), {
|
|
3621
|
-
kind: "mutation",
|
|
3622
|
-
auth: "admin"
|
|
3623
|
-
});
|
|
3624
3588
|
var NetworkEndpointSchema = z.object({
|
|
3625
3589
|
url: z.string(),
|
|
3626
3590
|
hostname: z.string(),
|
|
@@ -3646,33 +3610,6 @@ var NetworkEndpointEntrySchema = NetworkEndpointSchema.extend({
|
|
|
3646
3610
|
sourcePort: z.number().optional()
|
|
3647
3611
|
});
|
|
3648
3612
|
method(z.void(), NetworkEndpointSchema, { kind: "mutation" }), method(z.void(), z.void(), { kind: "mutation" }), method(z.void(), NetworkEndpointSchema.nullable()), method(z.void(), NetworkAccessStatusSchema), method(z.void(), z.array(NetworkEndpointEntrySchema).readonly());
|
|
3649
|
-
var RemoteAccessEndpointSchema = z.object({
|
|
3650
|
-
url: z.string(),
|
|
3651
|
-
hostname: z.string(),
|
|
3652
|
-
port: z.number(),
|
|
3653
|
-
protocol: z.enum(["http", "https"])
|
|
3654
|
-
});
|
|
3655
|
-
var RemoteAccessProviderInfoSchema = z.object({
|
|
3656
|
-
/** Stable id matching the addon id. */
|
|
3657
|
-
addonId: z.string(),
|
|
3658
|
-
/** Display label shown on the admin row — sourced from the addon manifest. */
|
|
3659
|
-
displayName: z.string(),
|
|
3660
|
-
/** When false, the provider is registered but disabled. */
|
|
3661
|
-
enabled: z.boolean(),
|
|
3662
|
-
/** True when the underlying tunnel/connection is up. */
|
|
3663
|
-
connected: z.boolean(),
|
|
3664
|
-
/** Public-facing endpoint, when connected. Null otherwise. */
|
|
3665
|
-
endpoint: RemoteAccessEndpointSchema.nullable(),
|
|
3666
|
-
/** Last error message (when connected=false), if available. */
|
|
3667
|
-
error: z.string().optional()
|
|
3668
|
-
});
|
|
3669
|
-
method(z.void(), z.array(RemoteAccessProviderInfoSchema).readonly()), method(z.object({ addonId: z.string() }), RemoteAccessEndpointSchema, {
|
|
3670
|
-
kind: "mutation",
|
|
3671
|
-
auth: "admin"
|
|
3672
|
-
}), method(z.object({ addonId: z.string() }), z.object({ success: z.literal(true) }), {
|
|
3673
|
-
kind: "mutation",
|
|
3674
|
-
auth: "admin"
|
|
3675
|
-
});
|
|
3676
3613
|
var TurnServerSchema = z.object({
|
|
3677
3614
|
/** Single URL or list of URLs (e.g. "turn:turn.example.com:3478?transport=udp"). */
|
|
3678
3615
|
urls: z.union([z.string(), z.array(z.string())]),
|
|
@@ -3680,33 +3617,6 @@ var TurnServerSchema = z.object({
|
|
|
3680
3617
|
credential: z.string().optional()
|
|
3681
3618
|
});
|
|
3682
3619
|
method(z.void(), z.array(TurnServerSchema).readonly());
|
|
3683
|
-
var TurnProviderInfoSchema = z.object({
|
|
3684
|
-
/** Stable id matching the addon id. */
|
|
3685
|
-
addonId: z.string(),
|
|
3686
|
-
/** Display label shown on the admin row — sourced from the addon manifest. */
|
|
3687
|
-
displayName: z.string(),
|
|
3688
|
-
/** When false, the provider is registered but disabled. */
|
|
3689
|
-
enabled: z.boolean(),
|
|
3690
|
-
/** Number of servers this provider is currently exposing. */
|
|
3691
|
-
serverCount: z.number(),
|
|
3692
|
-
/**
|
|
3693
|
-
* Flat list of every TURN/STUN URL this provider currently exposes.
|
|
3694
|
-
* One row per URL (multi-URL ICE server entries are flattened). The
|
|
3695
|
-
* admin UI shows this in a compact per-provider list so operators
|
|
3696
|
-
* can verify what's actually being negotiated without having to dig
|
|
3697
|
-
* into the combined `getAllServers` output.
|
|
3698
|
-
*/
|
|
3699
|
-
urls: z.array(z.string()).readonly(),
|
|
3700
|
-
/** Last fetch error (when serverCount=0 due to API failure), if any. */
|
|
3701
|
-
error: z.string().optional()
|
|
3702
|
-
});
|
|
3703
|
-
method(z.void(), z.array(TurnProviderInfoSchema).readonly()), method(z.void(), z.array(TurnServerSchema).readonly()), method(z.object({
|
|
3704
|
-
addonId: z.string(),
|
|
3705
|
-
enabled: z.boolean()
|
|
3706
|
-
}), z.object({ success: z.literal(true) }), {
|
|
3707
|
-
kind: "mutation",
|
|
3708
|
-
auth: "admin"
|
|
3709
|
-
});
|
|
3710
3620
|
var SnapshotImageSchema = z.object({
|
|
3711
3621
|
base64: z.string(),
|
|
3712
3622
|
contentType: z.string()
|
|
@@ -4803,7 +4713,7 @@ method(z.void(), ListResultSchema), method(z.void(), PreferredSchema), method(z.
|
|
|
4803
4713
|
* tunnel always emits `https://` regardless. */
|
|
4804
4714
|
scheme: z.enum(["http", "https"]).optional()
|
|
4805
4715
|
}), GetConnectionEndpointsResultSchema), method(z.void(), AllowedAddressesSchema), method(AllowedAddressesSchema, z.object({ success: z.literal(true) }), { kind: "mutation" }), method(z.void(), AllowedAddressesSchema, { kind: "mutation" });
|
|
4806
|
-
var MeshEndpointSchema
|
|
4716
|
+
var MeshEndpointSchema = z.object({
|
|
4807
4717
|
/** Stable identifier within the provider (e.g. `mesh-ipv4`, `magicdns`, `funnel`). */
|
|
4808
4718
|
id: z.string(),
|
|
4809
4719
|
/** Operator-facing label (e.g. "Mesh IPv4", "MagicDNS"). */
|
|
@@ -4880,7 +4790,7 @@ var MeshStatusSchema = z.object({
|
|
|
4880
4790
|
/** Number of peers visible to this host (excluding self). */
|
|
4881
4791
|
peerCount: z.number(),
|
|
4882
4792
|
/** Every endpoint this provider exposes for the current host. */
|
|
4883
|
-
endpoints: z.array(MeshEndpointSchema
|
|
4793
|
+
endpoints: z.array(MeshEndpointSchema).readonly(),
|
|
4884
4794
|
/** Last error from the daemon, when not joined. */
|
|
4885
4795
|
error: z.string().optional(),
|
|
4886
4796
|
/**
|
|
@@ -4955,51 +4865,6 @@ authKey: z.string().optional() }), z.object({
|
|
|
4955
4865
|
/** Human-readable error when `ok: false`. */
|
|
4956
4866
|
error: z.string().optional()
|
|
4957
4867
|
}), { kind: "mutation" });
|
|
4958
|
-
var MeshEndpointSchema = z.object({
|
|
4959
|
-
id: z.string(),
|
|
4960
|
-
label: z.string(),
|
|
4961
|
-
scope: z.enum(["mesh", "public"]),
|
|
4962
|
-
url: z.string(),
|
|
4963
|
-
hostname: z.string(),
|
|
4964
|
-
port: z.number(),
|
|
4965
|
-
protocol: z.enum(["http", "https"])
|
|
4966
|
-
});
|
|
4967
|
-
var MeshProviderInfoSchema = z.object({
|
|
4968
|
-
/** Stable id matching the addon id. */
|
|
4969
|
-
addonId: z.string(),
|
|
4970
|
-
/** Display label shown on the admin row — sourced from the addon manifest. */
|
|
4971
|
-
displayName: z.string(),
|
|
4972
|
-
/** True when the host is joined to this provider's mesh. */
|
|
4973
|
-
joined: z.boolean(),
|
|
4974
|
-
/** Local mesh IP (empty when not joined). */
|
|
4975
|
-
meshIp: z.string(),
|
|
4976
|
-
/** MagicDNS / mesh hostname (empty when not configured). */
|
|
4977
|
-
magicDnsHostname: z.string(),
|
|
4978
|
-
/** Peer count (excluding self). */
|
|
4979
|
-
peerCount: z.number(),
|
|
4980
|
-
/** Active endpoints (mesh IP + MagicDNS + optional public Funnel). */
|
|
4981
|
-
endpoints: z.array(MeshEndpointSchema).readonly(),
|
|
4982
|
-
/** Last error reported by the provider. */
|
|
4983
|
-
error: z.string().optional(),
|
|
4984
|
-
/** Tenant / tailnet / network display name. Empty pre-join. */
|
|
4985
|
-
tenantName: z.string(),
|
|
4986
|
-
/** Mesh DNS suffix (e.g. tailXXXX.ts.net). Empty when not configured. */
|
|
4987
|
-
magicDnsSuffix: z.string(),
|
|
4988
|
-
/** Authenticated user / account login. Null for token-only providers. */
|
|
4989
|
-
userLogin: z.string().nullable(),
|
|
4990
|
-
/** Provider control-plane URL. */
|
|
4991
|
-
controlPlaneUrl: z.string(),
|
|
4992
|
-
/** Machine-key expiry (epoch ms). Null when keys don't rotate. */
|
|
4993
|
-
keyExpiry: z.number().nullable()
|
|
4994
|
-
});
|
|
4995
|
-
method(z.void(), z.array(MeshProviderInfoSchema).readonly()), method(z.object({
|
|
4996
|
-
addonId: z.string(),
|
|
4997
|
-
authKey: z.string().min(8),
|
|
4998
|
-
hostname: z.string().optional()
|
|
4999
|
-
}), z.object({ joined: z.literal(true) }), { kind: "mutation" }), method(z.object({ addonId: z.string() }), z.object({ success: z.literal(true) }), { kind: "mutation" }), method(z.object({
|
|
5000
|
-
addonId: z.string(),
|
|
5001
|
-
hostname: z.string().optional()
|
|
5002
|
-
}), z.object({ loginUrl: z.string() }), { kind: "mutation" }), method(z.object({ addonId: z.string() }), z.object({ loggedOut: z.literal(true) }), { kind: "mutation" }), method(z.object({ addonId: z.string() }), z.object({ peers: z.array(MeshPeerSchema).readonly() }));
|
|
5003
4868
|
var MethodAccessSchema = z.enum([
|
|
5004
4869
|
"view",
|
|
5005
4870
|
"create",
|
|
@@ -5689,6 +5554,13 @@ method(z.void(), z.array(AddonListItemSchema).readonly()), method(z.object({
|
|
|
5689
5554
|
mode: z.enum(["singleton", "collection"]),
|
|
5690
5555
|
isActive: z.boolean()
|
|
5691
5556
|
})).readonly()), method(z.object({
|
|
5557
|
+
capName: z.string().min(1),
|
|
5558
|
+
addonId: z.string().min(1),
|
|
5559
|
+
enabled: z.boolean()
|
|
5560
|
+
}), z.object({ success: z.literal(true) }), {
|
|
5561
|
+
kind: "mutation",
|
|
5562
|
+
auth: "admin"
|
|
5563
|
+
}), method(z.object({
|
|
5692
5564
|
packageName: z.string().min(1),
|
|
5693
5565
|
version: z.string().optional()
|
|
5694
5566
|
}), UpdateFrameworkPackageResultSchema, {
|