@camstack/types 0.1.20 → 0.1.22
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{auth-records-DaPoK6Cr.mjs → auth-records-COv3plzv.mjs} +9 -32
- package/dist/{auth-records-DaPoK6Cr.mjs.map → auth-records-COv3plzv.mjs.map} +1 -1
- package/dist/{auth-records-BS1ylE_b.js → auth-records-Q5ocndX5.js} +9 -32
- package/dist/{auth-records-BS1ylE_b.js.map → auth-records-Q5ocndX5.js.map} +1 -1
- package/dist/capabilities/addons.cap.d.ts.map +1 -1
- package/dist/capabilities/authentication.cap.d.ts +0 -14
- package/dist/capabilities/authentication.cap.d.ts.map +1 -1
- package/dist/capabilities/remote-access.cap.d.ts +0 -12
- package/dist/capabilities/remote-access.cap.d.ts.map +1 -1
- package/dist/capabilities/turn-orchestrator.cap.d.ts +0 -12
- package/dist/capabilities/turn-orchestrator.cap.d.ts.map +1 -1
- package/dist/capabilities/user-management.cap.d.ts +15 -0
- package/dist/capabilities/user-management.cap.d.ts.map +1 -1
- package/dist/generated/addon-api.d.ts +36 -36
- package/dist/generated/addon-api.d.ts.map +1 -1
- package/dist/index.js +1 -1
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +2 -2
- package/dist/index.mjs.map +1 -1
- package/dist/node.js +1 -1
- package/dist/node.mjs +1 -1
- package/dist/schemas/auth-records.d.ts +3 -0
- package/dist/schemas/auth-records.d.ts.map +1 -1
- package/package.json +1 -1
|
@@ -5348,15 +5348,6 @@ const AuthProviderInfoSchema = z.object({
|
|
|
5348
5348
|
addonId: z.string(),
|
|
5349
5349
|
/** Display label shown on the login button + admin row. */
|
|
5350
5350
|
displayName: z.string(),
|
|
5351
|
-
/**
|
|
5352
|
-
* Provider kind — drives icon + grouping in admin UI.
|
|
5353
|
-
* - `local` — username/password form (always at top of login page)
|
|
5354
|
-
* - `oidc` — OpenID Connect (Google, Microsoft, Okta, generic)
|
|
5355
|
-
* - `saml` — SAML 2.0
|
|
5356
|
-
* - `ldap` — LDAP / Active Directory
|
|
5357
|
-
* - `other` — anything else (custom integrations)
|
|
5358
|
-
*/
|
|
5359
|
-
kind: z.enum(["local", "oidc", "saml", "ldap", "other"]),
|
|
5360
5351
|
/** Optional iconography hint (lucide-react icon name OR emoji). */
|
|
5361
5352
|
icon: z.string().optional(),
|
|
5362
5353
|
/** When true, the provider exposes a redirect-based login flow
|
|
@@ -5422,16 +5413,8 @@ const RemoteAccessEndpointSchema = z.object({
|
|
|
5422
5413
|
const RemoteAccessProviderInfoSchema = z.object({
|
|
5423
5414
|
/** Stable id matching the addon id. */
|
|
5424
5415
|
addonId: z.string(),
|
|
5425
|
-
/** Display label shown on the admin row. */
|
|
5416
|
+
/** Display label shown on the admin row — sourced from the addon manifest. */
|
|
5426
5417
|
displayName: z.string(),
|
|
5427
|
-
/**
|
|
5428
|
-
* Provider kind — drives icon + status formatting.
|
|
5429
|
-
* - `cloudflare-tunnel`
|
|
5430
|
-
* - `ngrok`
|
|
5431
|
-
* - `tailscale`
|
|
5432
|
-
* - `other`
|
|
5433
|
-
*/
|
|
5434
|
-
kind: z.enum(["cloudflare-tunnel", "ngrok", "tailscale", "other"]),
|
|
5435
5418
|
/** When false, the provider is registered but disabled. */
|
|
5436
5419
|
enabled: z.boolean(),
|
|
5437
5420
|
/** True when the underlying tunnel/connection is up. */
|
|
@@ -5491,16 +5474,8 @@ const turnProviderCapability = {
|
|
|
5491
5474
|
const TurnProviderInfoSchema = z.object({
|
|
5492
5475
|
/** Stable id matching the addon id. */
|
|
5493
5476
|
addonId: z.string(),
|
|
5494
|
-
/** Display label shown on the admin row. */
|
|
5477
|
+
/** Display label shown on the admin row — sourced from the addon manifest. */
|
|
5495
5478
|
displayName: z.string(),
|
|
5496
|
-
/**
|
|
5497
|
-
* Provider kind — drives icon + grouping.
|
|
5498
|
-
* - `cloudflare` — Cloudflare TURN
|
|
5499
|
-
* - `coturn` — self-hosted coturn
|
|
5500
|
-
* - `twilio` — Twilio Network Traversal
|
|
5501
|
-
* - `other` — anything else
|
|
5502
|
-
*/
|
|
5503
|
-
kind: z.enum(["cloudflare", "coturn", "twilio", "other"]),
|
|
5504
5479
|
/** When false, the provider is registered but disabled. */
|
|
5505
5480
|
enabled: z.boolean(),
|
|
5506
5481
|
/** Number of servers this provider is currently exposing. */
|
|
@@ -7209,7 +7184,7 @@ const meshOrchestratorCapability = {
|
|
|
7209
7184
|
)
|
|
7210
7185
|
}
|
|
7211
7186
|
};
|
|
7212
|
-
const UserRoleSchema$1 = z.enum(["super_admin", "admin", "viewer", "agent"]);
|
|
7187
|
+
const UserRoleSchema$1 = z.enum(["super_admin", "admin", "viewer", "agent", "scoped"]);
|
|
7213
7188
|
const UserSummarySchema = z.object({
|
|
7214
7189
|
id: z.string(),
|
|
7215
7190
|
username: z.string(),
|
|
@@ -7777,14 +7752,16 @@ const addonsCapability = {
|
|
|
7777
7752
|
// ── Listing ──────────────────────────────────────────────────────
|
|
7778
7753
|
list: method(z.void(), z.array(AddonListItemSchema).readonly()),
|
|
7779
7754
|
// ── Logs (query) ────────────────────────────────────────────────
|
|
7755
|
+
// Default auth (`protected`): authenticated users — including scoped
|
|
7756
|
+
// tokens with the right route-prefix scope. Reading logs isn't an
|
|
7757
|
+
// administrative action; install/restart/uninstall stay admin-only.
|
|
7780
7758
|
getLogs: method(
|
|
7781
7759
|
z.object({
|
|
7782
7760
|
addonId: z.string(),
|
|
7783
7761
|
limit: z.number().min(1).max(500).default(100),
|
|
7784
7762
|
level: LogLevelSchema.optional()
|
|
7785
7763
|
}),
|
|
7786
|
-
z.array(LogQueryEntrySchema)
|
|
7787
|
-
{ auth: "admin" }
|
|
7764
|
+
z.array(LogQueryEntrySchema)
|
|
7788
7765
|
),
|
|
7789
7766
|
// ── Packages ────────────────────────────────────────────────────
|
|
7790
7767
|
listPackages: method(z.void(), z.array(InstalledPackageSchema).readonly()),
|
|
@@ -7929,7 +7906,7 @@ const PIPELINE_OWNER_CAPABILITY_NAMES = [
|
|
|
7929
7906
|
"pipeline-orchestrator",
|
|
7930
7907
|
"pipeline-runner"
|
|
7931
7908
|
];
|
|
7932
|
-
const UserRoleSchema = z.enum(["super_admin", "admin", "viewer", "agent"]);
|
|
7909
|
+
const UserRoleSchema = z.enum(["super_admin", "admin", "viewer", "agent", "scoped"]);
|
|
7933
7910
|
const AllowedProviderSchema = z.union([z.literal("*"), z.array(z.string())]);
|
|
7934
7911
|
const AllowedDevicesSchema = z.record(z.string(), z.union([z.literal("*"), z.array(z.string())]));
|
|
7935
7912
|
const UserRecordSchema = z.object({
|
|
@@ -8310,4 +8287,4 @@ export {
|
|
|
8310
8287
|
addonsCapability as y,
|
|
8311
8288
|
zonesCapability as z
|
|
8312
8289
|
};
|
|
8313
|
-
//# sourceMappingURL=auth-records-
|
|
8290
|
+
//# sourceMappingURL=auth-records-COv3plzv.mjs.map
|