@camstack/types 0.1.20 → 0.1.22
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{auth-records-DaPoK6Cr.mjs → auth-records-COv3plzv.mjs} +9 -32
- package/dist/{auth-records-DaPoK6Cr.mjs.map → auth-records-COv3plzv.mjs.map} +1 -1
- package/dist/{auth-records-BS1ylE_b.js → auth-records-Q5ocndX5.js} +9 -32
- package/dist/{auth-records-BS1ylE_b.js.map → auth-records-Q5ocndX5.js.map} +1 -1
- package/dist/capabilities/addons.cap.d.ts.map +1 -1
- package/dist/capabilities/authentication.cap.d.ts +0 -14
- package/dist/capabilities/authentication.cap.d.ts.map +1 -1
- package/dist/capabilities/remote-access.cap.d.ts +0 -12
- package/dist/capabilities/remote-access.cap.d.ts.map +1 -1
- package/dist/capabilities/turn-orchestrator.cap.d.ts +0 -12
- package/dist/capabilities/turn-orchestrator.cap.d.ts.map +1 -1
- package/dist/capabilities/user-management.cap.d.ts +15 -0
- package/dist/capabilities/user-management.cap.d.ts.map +1 -1
- package/dist/generated/addon-api.d.ts +36 -36
- package/dist/generated/addon-api.d.ts.map +1 -1
- package/dist/index.js +1 -1
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +2 -2
- package/dist/index.mjs.map +1 -1
- package/dist/node.js +1 -1
- package/dist/node.mjs +1 -1
- package/dist/schemas/auth-records.d.ts +3 -0
- package/dist/schemas/auth-records.d.ts.map +1 -1
- package/package.json +1 -1
|
@@ -5349,15 +5349,6 @@ const AuthProviderInfoSchema = zod.z.object({
|
|
|
5349
5349
|
addonId: zod.z.string(),
|
|
5350
5350
|
/** Display label shown on the login button + admin row. */
|
|
5351
5351
|
displayName: zod.z.string(),
|
|
5352
|
-
/**
|
|
5353
|
-
* Provider kind — drives icon + grouping in admin UI.
|
|
5354
|
-
* - `local` — username/password form (always at top of login page)
|
|
5355
|
-
* - `oidc` — OpenID Connect (Google, Microsoft, Okta, generic)
|
|
5356
|
-
* - `saml` — SAML 2.0
|
|
5357
|
-
* - `ldap` — LDAP / Active Directory
|
|
5358
|
-
* - `other` — anything else (custom integrations)
|
|
5359
|
-
*/
|
|
5360
|
-
kind: zod.z.enum(["local", "oidc", "saml", "ldap", "other"]),
|
|
5361
5352
|
/** Optional iconography hint (lucide-react icon name OR emoji). */
|
|
5362
5353
|
icon: zod.z.string().optional(),
|
|
5363
5354
|
/** When true, the provider exposes a redirect-based login flow
|
|
@@ -5423,16 +5414,8 @@ const RemoteAccessEndpointSchema = zod.z.object({
|
|
|
5423
5414
|
const RemoteAccessProviderInfoSchema = zod.z.object({
|
|
5424
5415
|
/** Stable id matching the addon id. */
|
|
5425
5416
|
addonId: zod.z.string(),
|
|
5426
|
-
/** Display label shown on the admin row. */
|
|
5417
|
+
/** Display label shown on the admin row — sourced from the addon manifest. */
|
|
5427
5418
|
displayName: zod.z.string(),
|
|
5428
|
-
/**
|
|
5429
|
-
* Provider kind — drives icon + status formatting.
|
|
5430
|
-
* - `cloudflare-tunnel`
|
|
5431
|
-
* - `ngrok`
|
|
5432
|
-
* - `tailscale`
|
|
5433
|
-
* - `other`
|
|
5434
|
-
*/
|
|
5435
|
-
kind: zod.z.enum(["cloudflare-tunnel", "ngrok", "tailscale", "other"]),
|
|
5436
5419
|
/** When false, the provider is registered but disabled. */
|
|
5437
5420
|
enabled: zod.z.boolean(),
|
|
5438
5421
|
/** True when the underlying tunnel/connection is up. */
|
|
@@ -5492,16 +5475,8 @@ const turnProviderCapability = {
|
|
|
5492
5475
|
const TurnProviderInfoSchema = zod.z.object({
|
|
5493
5476
|
/** Stable id matching the addon id. */
|
|
5494
5477
|
addonId: zod.z.string(),
|
|
5495
|
-
/** Display label shown on the admin row. */
|
|
5478
|
+
/** Display label shown on the admin row — sourced from the addon manifest. */
|
|
5496
5479
|
displayName: zod.z.string(),
|
|
5497
|
-
/**
|
|
5498
|
-
* Provider kind — drives icon + grouping.
|
|
5499
|
-
* - `cloudflare` — Cloudflare TURN
|
|
5500
|
-
* - `coturn` — self-hosted coturn
|
|
5501
|
-
* - `twilio` — Twilio Network Traversal
|
|
5502
|
-
* - `other` — anything else
|
|
5503
|
-
*/
|
|
5504
|
-
kind: zod.z.enum(["cloudflare", "coturn", "twilio", "other"]),
|
|
5505
5480
|
/** When false, the provider is registered but disabled. */
|
|
5506
5481
|
enabled: zod.z.boolean(),
|
|
5507
5482
|
/** Number of servers this provider is currently exposing. */
|
|
@@ -7210,7 +7185,7 @@ const meshOrchestratorCapability = {
|
|
|
7210
7185
|
)
|
|
7211
7186
|
}
|
|
7212
7187
|
};
|
|
7213
|
-
const UserRoleSchema$1 = zod.z.enum(["super_admin", "admin", "viewer", "agent"]);
|
|
7188
|
+
const UserRoleSchema$1 = zod.z.enum(["super_admin", "admin", "viewer", "agent", "scoped"]);
|
|
7214
7189
|
const UserSummarySchema = zod.z.object({
|
|
7215
7190
|
id: zod.z.string(),
|
|
7216
7191
|
username: zod.z.string(),
|
|
@@ -7778,14 +7753,16 @@ const addonsCapability = {
|
|
|
7778
7753
|
// ── Listing ──────────────────────────────────────────────────────
|
|
7779
7754
|
list: method(zod.z.void(), zod.z.array(AddonListItemSchema).readonly()),
|
|
7780
7755
|
// ── Logs (query) ────────────────────────────────────────────────
|
|
7756
|
+
// Default auth (`protected`): authenticated users — including scoped
|
|
7757
|
+
// tokens with the right route-prefix scope. Reading logs isn't an
|
|
7758
|
+
// administrative action; install/restart/uninstall stay admin-only.
|
|
7781
7759
|
getLogs: method(
|
|
7782
7760
|
zod.z.object({
|
|
7783
7761
|
addonId: zod.z.string(),
|
|
7784
7762
|
limit: zod.z.number().min(1).max(500).default(100),
|
|
7785
7763
|
level: LogLevelSchema.optional()
|
|
7786
7764
|
}),
|
|
7787
|
-
zod.z.array(LogQueryEntrySchema)
|
|
7788
|
-
{ auth: "admin" }
|
|
7765
|
+
zod.z.array(LogQueryEntrySchema)
|
|
7789
7766
|
),
|
|
7790
7767
|
// ── Packages ────────────────────────────────────────────────────
|
|
7791
7768
|
listPackages: method(zod.z.void(), zod.z.array(InstalledPackageSchema).readonly()),
|
|
@@ -7930,7 +7907,7 @@ const PIPELINE_OWNER_CAPABILITY_NAMES = [
|
|
|
7930
7907
|
"pipeline-orchestrator",
|
|
7931
7908
|
"pipeline-runner"
|
|
7932
7909
|
];
|
|
7933
|
-
const UserRoleSchema = zod.z.enum(["super_admin", "admin", "viewer", "agent"]);
|
|
7910
|
+
const UserRoleSchema = zod.z.enum(["super_admin", "admin", "viewer", "agent", "scoped"]);
|
|
7934
7911
|
const AllowedProviderSchema = zod.z.union([zod.z.literal("*"), zod.z.array(zod.z.string())]);
|
|
7935
7912
|
const AllowedDevicesSchema = zod.z.record(zod.z.string(), zod.z.union([zod.z.literal("*"), zod.z.array(zod.z.string())]));
|
|
7936
7913
|
const UserRecordSchema = zod.z.object({
|
|
@@ -8309,4 +8286,4 @@ exports.webrtcSessionCapability = webrtcSessionCapability;
|
|
|
8309
8286
|
exports.zoneAnalyticsCapability = zoneAnalyticsCapability;
|
|
8310
8287
|
exports.zoneRulesCapability = zoneRulesCapability;
|
|
8311
8288
|
exports.zonesCapability = zonesCapability;
|
|
8312
|
-
//# sourceMappingURL=auth-records-
|
|
8289
|
+
//# sourceMappingURL=auth-records-Q5ocndX5.js.map
|