@camstack/types 0.1.20 → 0.1.22

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -5349,15 +5349,6 @@ const AuthProviderInfoSchema = zod.z.object({
5349
5349
  addonId: zod.z.string(),
5350
5350
  /** Display label shown on the login button + admin row. */
5351
5351
  displayName: zod.z.string(),
5352
- /**
5353
- * Provider kind — drives icon + grouping in admin UI.
5354
- * - `local` — username/password form (always at top of login page)
5355
- * - `oidc` — OpenID Connect (Google, Microsoft, Okta, generic)
5356
- * - `saml` — SAML 2.0
5357
- * - `ldap` — LDAP / Active Directory
5358
- * - `other` — anything else (custom integrations)
5359
- */
5360
- kind: zod.z.enum(["local", "oidc", "saml", "ldap", "other"]),
5361
5352
  /** Optional iconography hint (lucide-react icon name OR emoji). */
5362
5353
  icon: zod.z.string().optional(),
5363
5354
  /** When true, the provider exposes a redirect-based login flow
@@ -5423,16 +5414,8 @@ const RemoteAccessEndpointSchema = zod.z.object({
5423
5414
  const RemoteAccessProviderInfoSchema = zod.z.object({
5424
5415
  /** Stable id matching the addon id. */
5425
5416
  addonId: zod.z.string(),
5426
- /** Display label shown on the admin row. */
5417
+ /** Display label shown on the admin row — sourced from the addon manifest. */
5427
5418
  displayName: zod.z.string(),
5428
- /**
5429
- * Provider kind — drives icon + status formatting.
5430
- * - `cloudflare-tunnel`
5431
- * - `ngrok`
5432
- * - `tailscale`
5433
- * - `other`
5434
- */
5435
- kind: zod.z.enum(["cloudflare-tunnel", "ngrok", "tailscale", "other"]),
5436
5419
  /** When false, the provider is registered but disabled. */
5437
5420
  enabled: zod.z.boolean(),
5438
5421
  /** True when the underlying tunnel/connection is up. */
@@ -5492,16 +5475,8 @@ const turnProviderCapability = {
5492
5475
  const TurnProviderInfoSchema = zod.z.object({
5493
5476
  /** Stable id matching the addon id. */
5494
5477
  addonId: zod.z.string(),
5495
- /** Display label shown on the admin row. */
5478
+ /** Display label shown on the admin row — sourced from the addon manifest. */
5496
5479
  displayName: zod.z.string(),
5497
- /**
5498
- * Provider kind — drives icon + grouping.
5499
- * - `cloudflare` — Cloudflare TURN
5500
- * - `coturn` — self-hosted coturn
5501
- * - `twilio` — Twilio Network Traversal
5502
- * - `other` — anything else
5503
- */
5504
- kind: zod.z.enum(["cloudflare", "coturn", "twilio", "other"]),
5505
5480
  /** When false, the provider is registered but disabled. */
5506
5481
  enabled: zod.z.boolean(),
5507
5482
  /** Number of servers this provider is currently exposing. */
@@ -7210,7 +7185,7 @@ const meshOrchestratorCapability = {
7210
7185
  )
7211
7186
  }
7212
7187
  };
7213
- const UserRoleSchema$1 = zod.z.enum(["super_admin", "admin", "viewer", "agent"]);
7188
+ const UserRoleSchema$1 = zod.z.enum(["super_admin", "admin", "viewer", "agent", "scoped"]);
7214
7189
  const UserSummarySchema = zod.z.object({
7215
7190
  id: zod.z.string(),
7216
7191
  username: zod.z.string(),
@@ -7778,14 +7753,16 @@ const addonsCapability = {
7778
7753
  // ── Listing ──────────────────────────────────────────────────────
7779
7754
  list: method(zod.z.void(), zod.z.array(AddonListItemSchema).readonly()),
7780
7755
  // ── Logs (query) ────────────────────────────────────────────────
7756
+ // Default auth (`protected`): authenticated users — including scoped
7757
+ // tokens with the right route-prefix scope. Reading logs isn't an
7758
+ // administrative action; install/restart/uninstall stay admin-only.
7781
7759
  getLogs: method(
7782
7760
  zod.z.object({
7783
7761
  addonId: zod.z.string(),
7784
7762
  limit: zod.z.number().min(1).max(500).default(100),
7785
7763
  level: LogLevelSchema.optional()
7786
7764
  }),
7787
- zod.z.array(LogQueryEntrySchema),
7788
- { auth: "admin" }
7765
+ zod.z.array(LogQueryEntrySchema)
7789
7766
  ),
7790
7767
  // ── Packages ────────────────────────────────────────────────────
7791
7768
  listPackages: method(zod.z.void(), zod.z.array(InstalledPackageSchema).readonly()),
@@ -7930,7 +7907,7 @@ const PIPELINE_OWNER_CAPABILITY_NAMES = [
7930
7907
  "pipeline-orchestrator",
7931
7908
  "pipeline-runner"
7932
7909
  ];
7933
- const UserRoleSchema = zod.z.enum(["super_admin", "admin", "viewer", "agent"]);
7910
+ const UserRoleSchema = zod.z.enum(["super_admin", "admin", "viewer", "agent", "scoped"]);
7934
7911
  const AllowedProviderSchema = zod.z.union([zod.z.literal("*"), zod.z.array(zod.z.string())]);
7935
7912
  const AllowedDevicesSchema = zod.z.record(zod.z.string(), zod.z.union([zod.z.literal("*"), zod.z.array(zod.z.string())]));
7936
7913
  const UserRecordSchema = zod.z.object({
@@ -8309,4 +8286,4 @@ exports.webrtcSessionCapability = webrtcSessionCapability;
8309
8286
  exports.zoneAnalyticsCapability = zoneAnalyticsCapability;
8310
8287
  exports.zoneRulesCapability = zoneRulesCapability;
8311
8288
  exports.zonesCapability = zonesCapability;
8312
- //# sourceMappingURL=auth-records-BS1ylE_b.js.map
8289
+ //# sourceMappingURL=auth-records-Q5ocndX5.js.map