@camstack/types 0.1.21 → 0.1.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{auth-records-BPN2YvK2.js → auth-records-U1Xok3iP.js} +4 -31
- package/dist/{auth-records-BPN2YvK2.js.map → auth-records-U1Xok3iP.js.map} +1 -1
- package/dist/{auth-records-Bsjs9Xri.mjs → auth-records-wKlyGWdW.mjs} +4 -31
- package/dist/{auth-records-Bsjs9Xri.mjs.map → auth-records-wKlyGWdW.mjs.map} +1 -1
- package/dist/capabilities/authentication.cap.d.ts +0 -14
- package/dist/capabilities/authentication.cap.d.ts.map +1 -1
- package/dist/capabilities/mesh-orchestrator.cap.d.ts +0 -12
- package/dist/capabilities/mesh-orchestrator.cap.d.ts.map +1 -1
- package/dist/capabilities/remote-access.cap.d.ts +0 -12
- package/dist/capabilities/remote-access.cap.d.ts.map +1 -1
- package/dist/capabilities/turn-orchestrator.cap.d.ts +0 -12
- package/dist/capabilities/turn-orchestrator.cap.d.ts.map +1 -1
- package/dist/generated/addon-api.d.ts +24 -30
- package/dist/generated/addon-api.d.ts.map +1 -1
- package/dist/index.js +1 -1
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +2 -2
- package/dist/index.mjs.map +1 -1
- package/dist/node.js +1 -1
- package/dist/node.mjs +1 -1
- package/package.json +1 -1
|
@@ -14,13 +14,6 @@ import { type InferProvider } from './capability-definition.js';
|
|
|
14
14
|
declare const AuthProviderInfoSchema: z.ZodObject<{
|
|
15
15
|
addonId: z.ZodString;
|
|
16
16
|
displayName: z.ZodString;
|
|
17
|
-
kind: z.ZodEnum<{
|
|
18
|
-
other: "other";
|
|
19
|
-
local: "local";
|
|
20
|
-
oidc: "oidc";
|
|
21
|
-
saml: "saml";
|
|
22
|
-
ldap: "ldap";
|
|
23
|
-
}>;
|
|
24
17
|
icon: z.ZodOptional<z.ZodString>;
|
|
25
18
|
hasRedirectFlow: z.ZodBoolean;
|
|
26
19
|
hasCredentialFlow: z.ZodBoolean;
|
|
@@ -52,13 +45,6 @@ export declare const authenticationCapability: {
|
|
|
52
45
|
readonly listProviders: import("./capability-definition.js").CapabilityMethodSchema<z.ZodVoid, z.ZodReadonly<z.ZodArray<z.ZodObject<{
|
|
53
46
|
addonId: z.ZodString;
|
|
54
47
|
displayName: z.ZodString;
|
|
55
|
-
kind: z.ZodEnum<{
|
|
56
|
-
other: "other";
|
|
57
|
-
local: "local";
|
|
58
|
-
oidc: "oidc";
|
|
59
|
-
saml: "saml";
|
|
60
|
-
ldap: "ldap";
|
|
61
|
-
}>;
|
|
62
48
|
icon: z.ZodOptional<z.ZodString>;
|
|
63
49
|
hasRedirectFlow: z.ZodBoolean;
|
|
64
50
|
hasCredentialFlow: z.ZodBoolean;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authentication.cap.d.ts","sourceRoot":"","sources":["../../src/capabilities/authentication.cap.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAA;AACvB,OAAO,EAAqC,KAAK,aAAa,EAAE,MAAM,4BAA4B,CAAA;AAElG;;;;;;;;;;GAUG;AACH,QAAA,MAAM,sBAAsB
|
|
1
|
+
{"version":3,"file":"authentication.cap.d.ts","sourceRoot":"","sources":["../../src/capabilities/authentication.cap.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAA;AACvB,OAAO,EAAqC,KAAK,aAAa,EAAE,MAAM,4BAA4B,CAAA;AAElG;;;;;;;;;;GAUG;AACH,QAAA,MAAM,sBAAsB;;;;;;;;iBAkB1B,CAAA;AAEF,MAAM,MAAM,gBAAgB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAA;AAErE;;;;;;;;;;;;;;GAcG;AACH,eAAO,MAAM,wBAAwB;;;;;QAKjC,gEAAgE;;;;;;;;;;QAEhE;;;;WAIG;;;;;;;;CAOkC,CAAA;AAEzC,MAAM,MAAM,uBAAuB,GAAG,aAAa,CAAC,OAAO,wBAAwB,CAAC,CAAA;AAEpF,OAAO,EAAE,sBAAsB,EAAE,CAAA"}
|
|
@@ -9,12 +9,6 @@ import { type InferProvider } from './capability-definition.js';
|
|
|
9
9
|
declare const MeshProviderInfoSchema: z.ZodObject<{
|
|
10
10
|
addonId: z.ZodString;
|
|
11
11
|
displayName: z.ZodString;
|
|
12
|
-
kind: z.ZodEnum<{
|
|
13
|
-
other: "other";
|
|
14
|
-
tailscale: "tailscale";
|
|
15
|
-
headscale: "headscale";
|
|
16
|
-
zerotier: "zerotier";
|
|
17
|
-
}>;
|
|
18
12
|
joined: z.ZodBoolean;
|
|
19
13
|
meshIp: z.ZodString;
|
|
20
14
|
magicDnsHostname: z.ZodString;
|
|
@@ -46,12 +40,6 @@ export declare const meshOrchestratorCapability: {
|
|
|
46
40
|
readonly listProviders: import("./capability-definition.js").CapabilityMethodSchema<z.ZodVoid, z.ZodReadonly<z.ZodArray<z.ZodObject<{
|
|
47
41
|
addonId: z.ZodString;
|
|
48
42
|
displayName: z.ZodString;
|
|
49
|
-
kind: z.ZodEnum<{
|
|
50
|
-
other: "other";
|
|
51
|
-
tailscale: "tailscale";
|
|
52
|
-
headscale: "headscale";
|
|
53
|
-
zerotier: "zerotier";
|
|
54
|
-
}>;
|
|
55
43
|
joined: z.ZodBoolean;
|
|
56
44
|
meshIp: z.ZodString;
|
|
57
45
|
magicDnsHostname: z.ZodString;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"mesh-orchestrator.cap.d.ts","sourceRoot":"","sources":["../../src/capabilities/mesh-orchestrator.cap.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AACH,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAA;AACvB,OAAO,EAAqC,KAAK,aAAa,EAAE,MAAM,4BAA4B,CAAA;AAYlG,QAAA,MAAM,sBAAsB
|
|
1
|
+
{"version":3,"file":"mesh-orchestrator.cap.d.ts","sourceRoot":"","sources":["../../src/capabilities/mesh-orchestrator.cap.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AACH,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAA;AACvB,OAAO,EAAqC,KAAK,aAAa,EAAE,MAAM,4BAA4B,CAAA;AAYlG,QAAA,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;iBAiB1B,CAAA;AAEF,MAAM,MAAM,gBAAgB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAA;AAErE,eAAO,MAAM,0BAA0B;;;;;QAKnC,2DAA2D;;;;;;;;;;;;;;;;;;;;;;;;;QAE3D;;;WAGG;;;;;;;;;;;;;;CAgBkC,CAAA;AAEzC,MAAM,MAAM,iBAAiB,GAAG,aAAa,CAAC,OAAO,0BAA0B,CAAC,CAAA"}
|
|
@@ -17,12 +17,6 @@ declare const RemoteAccessEndpointSchema: z.ZodObject<{
|
|
|
17
17
|
declare const RemoteAccessProviderInfoSchema: z.ZodObject<{
|
|
18
18
|
addonId: z.ZodString;
|
|
19
19
|
displayName: z.ZodString;
|
|
20
|
-
kind: z.ZodEnum<{
|
|
21
|
-
other: "other";
|
|
22
|
-
tailscale: "tailscale";
|
|
23
|
-
"cloudflare-tunnel": "cloudflare-tunnel";
|
|
24
|
-
ngrok: "ngrok";
|
|
25
|
-
}>;
|
|
26
20
|
enabled: z.ZodBoolean;
|
|
27
21
|
connected: z.ZodBoolean;
|
|
28
22
|
endpoint: z.ZodNullable<z.ZodObject<{
|
|
@@ -55,12 +49,6 @@ export declare const remoteAccessCapability: {
|
|
|
55
49
|
readonly listProviders: import("./capability-definition.js").CapabilityMethodSchema<z.ZodVoid, z.ZodReadonly<z.ZodArray<z.ZodObject<{
|
|
56
50
|
addonId: z.ZodString;
|
|
57
51
|
displayName: z.ZodString;
|
|
58
|
-
kind: z.ZodEnum<{
|
|
59
|
-
other: "other";
|
|
60
|
-
tailscale: "tailscale";
|
|
61
|
-
"cloudflare-tunnel": "cloudflare-tunnel";
|
|
62
|
-
ngrok: "ngrok";
|
|
63
|
-
}>;
|
|
64
52
|
enabled: z.ZodBoolean;
|
|
65
53
|
connected: z.ZodBoolean;
|
|
66
54
|
endpoint: z.ZodNullable<z.ZodObject<{
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"remote-access.cap.d.ts","sourceRoot":"","sources":["../../src/capabilities/remote-access.cap.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAA;AACvB,OAAO,EAAqC,KAAK,aAAa,EAAE,MAAM,4BAA4B,CAAA;AAElG,QAAA,MAAM,0BAA0B;;;;;;;;iBAK9B,CAAA;AAEF;;;;GAIG;AACH,QAAA,MAAM,8BAA8B
|
|
1
|
+
{"version":3,"file":"remote-access.cap.d.ts","sourceRoot":"","sources":["../../src/capabilities/remote-access.cap.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAA;AACvB,OAAO,EAAqC,KAAK,aAAa,EAAE,MAAM,4BAA4B,CAAA;AAElG,QAAA,MAAM,0BAA0B;;;;;;;;iBAK9B,CAAA;AAEF;;;;GAIG;AACH,QAAA,MAAM,8BAA8B;;;;;;;;;;;;;;;iBAalC,CAAA;AAEF,MAAM,MAAM,wBAAwB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,8BAA8B,CAAC,CAAA;AAErF;;;;;;;;GAQG;AACH,eAAO,MAAM,sBAAsB;;;;;QAK/B,kEAAkE;;;;;;;;;;;;;;;;;QAElE;;;;WAIG;;;;;;;;;;;;QAMH,yEAAyE;;;;;;;CAOpC,CAAA;AAEzC,MAAM,MAAM,yBAAyB,GAAG,aAAa,CAAC,OAAO,sBAAsB,CAAC,CAAA;AAEpF,OAAO,EAAE,0BAA0B,EAAE,8BAA8B,EAAE,CAAA"}
|
|
@@ -3,12 +3,6 @@ import { type InferProvider } from './capability-definition.js';
|
|
|
3
3
|
declare const TurnProviderInfoSchema: z.ZodObject<{
|
|
4
4
|
addonId: z.ZodString;
|
|
5
5
|
displayName: z.ZodString;
|
|
6
|
-
kind: z.ZodEnum<{
|
|
7
|
-
other: "other";
|
|
8
|
-
cloudflare: "cloudflare";
|
|
9
|
-
coturn: "coturn";
|
|
10
|
-
twilio: "twilio";
|
|
11
|
-
}>;
|
|
12
6
|
enabled: z.ZodBoolean;
|
|
13
7
|
serverCount: z.ZodNumber;
|
|
14
8
|
urls: z.ZodReadonly<z.ZodArray<z.ZodString>>;
|
|
@@ -40,12 +34,6 @@ export declare const turnOrchestratorCapability: {
|
|
|
40
34
|
readonly listProviders: import("./capability-definition.js").CapabilityMethodSchema<z.ZodVoid, z.ZodReadonly<z.ZodArray<z.ZodObject<{
|
|
41
35
|
addonId: z.ZodString;
|
|
42
36
|
displayName: z.ZodString;
|
|
43
|
-
kind: z.ZodEnum<{
|
|
44
|
-
other: "other";
|
|
45
|
-
cloudflare: "cloudflare";
|
|
46
|
-
coturn: "coturn";
|
|
47
|
-
twilio: "twilio";
|
|
48
|
-
}>;
|
|
49
37
|
enabled: z.ZodBoolean;
|
|
50
38
|
serverCount: z.ZodNumber;
|
|
51
39
|
urls: z.ZodReadonly<z.ZodArray<z.ZodString>>;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"turn-orchestrator.cap.d.ts","sourceRoot":"","sources":["../../src/capabilities/turn-orchestrator.cap.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAA;AACvB,OAAO,EAAqC,KAAK,aAAa,EAAE,MAAM,4BAA4B,CAAA;AAGlG,QAAA,MAAM,sBAAsB
|
|
1
|
+
{"version":3,"file":"turn-orchestrator.cap.d.ts","sourceRoot":"","sources":["../../src/capabilities/turn-orchestrator.cap.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAA;AACvB,OAAO,EAAqC,KAAK,aAAa,EAAE,MAAM,4BAA4B,CAAA;AAGlG,QAAA,MAAM,sBAAsB;;;;;;;iBAmB1B,CAAA;AAEF,MAAM,MAAM,gBAAgB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAA;AAErE;;;;;;;;;;;;;;;GAeG;AACH,eAAO,MAAM,0BAA0B;;;;;QAKnC,0DAA0D;;;;;;;;;QAE1D;;;;;WAKG;;;;;;QAEH,wCAAwC;;;;;;;;CAOH,CAAA;AAEzC,MAAM,MAAM,yBAAyB,GAAG,aAAa,CAAC,OAAO,0BAA0B,CAAC,CAAA;AAExF,OAAO,EAAE,sBAAsB,EAAE,CAAA"}
|
|
@@ -516,7 +516,6 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
516
516
|
output: readonly {
|
|
517
517
|
addonId: string;
|
|
518
518
|
displayName: string;
|
|
519
|
-
kind: "other" | "local" | "oidc" | "saml" | "ldap";
|
|
520
519
|
hasRedirectFlow: boolean;
|
|
521
520
|
hasCredentialFlow: boolean;
|
|
522
521
|
enabled: boolean;
|
|
@@ -550,7 +549,6 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
550
549
|
output: readonly {
|
|
551
550
|
addonId: string;
|
|
552
551
|
displayName: string;
|
|
553
|
-
kind: "other" | "tailscale" | "cloudflare-tunnel" | "ngrok";
|
|
554
552
|
enabled: boolean;
|
|
555
553
|
connected: boolean;
|
|
556
554
|
endpoint: {
|
|
@@ -600,7 +598,6 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
600
598
|
output: readonly {
|
|
601
599
|
addonId: string;
|
|
602
600
|
displayName: string;
|
|
603
|
-
kind: "other" | "cloudflare" | "coturn" | "twilio";
|
|
604
601
|
enabled: boolean;
|
|
605
602
|
serverCount: number;
|
|
606
603
|
urls: readonly string[];
|
|
@@ -6438,7 +6435,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6438
6435
|
user: {
|
|
6439
6436
|
id: string;
|
|
6440
6437
|
username: string;
|
|
6441
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6438
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6442
6439
|
};
|
|
6443
6440
|
};
|
|
6444
6441
|
meta: object;
|
|
@@ -6448,9 +6445,9 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6448
6445
|
output: {
|
|
6449
6446
|
id: string;
|
|
6450
6447
|
username: string;
|
|
6451
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6448
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6452
6449
|
permissions: {
|
|
6453
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6450
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6454
6451
|
allowedProviders: string[] | "*";
|
|
6455
6452
|
allowedDevices: Record<string, unknown>;
|
|
6456
6453
|
};
|
|
@@ -6490,7 +6487,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6490
6487
|
output: {
|
|
6491
6488
|
id: string;
|
|
6492
6489
|
username: string;
|
|
6493
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6490
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6494
6491
|
allowedProviders: string[] | "*";
|
|
6495
6492
|
allowedDevices: Record<string, string[] | "*">;
|
|
6496
6493
|
createdAt: number;
|
|
@@ -6503,14 +6500,14 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6503
6500
|
[x: string]: unknown;
|
|
6504
6501
|
username: string;
|
|
6505
6502
|
password: string;
|
|
6506
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6503
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6507
6504
|
allowedProviders?: string[] | "*" | undefined;
|
|
6508
6505
|
allowedDevices?: Record<string, string[] | "*"> | undefined;
|
|
6509
6506
|
};
|
|
6510
6507
|
output: {
|
|
6511
6508
|
id: string;
|
|
6512
6509
|
username: string;
|
|
6513
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6510
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6514
6511
|
allowedProviders: string[] | "*";
|
|
6515
6512
|
allowedDevices: Record<string, string[] | "*">;
|
|
6516
6513
|
createdAt: number;
|
|
@@ -6522,7 +6519,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6522
6519
|
input: {
|
|
6523
6520
|
[x: string]: unknown;
|
|
6524
6521
|
id: string;
|
|
6525
|
-
role?: "admin" | "viewer" | "super_admin" | "agent" | undefined;
|
|
6522
|
+
role?: "admin" | "viewer" | "super_admin" | "agent" | "scoped" | undefined;
|
|
6526
6523
|
allowedProviders?: string[] | "*" | undefined;
|
|
6527
6524
|
allowedDevices?: Record<string, string[] | "*"> | undefined;
|
|
6528
6525
|
};
|
|
@@ -6561,7 +6558,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6561
6558
|
output: {
|
|
6562
6559
|
id: string;
|
|
6563
6560
|
username: string;
|
|
6564
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6561
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6565
6562
|
allowedProviders: string[] | "*";
|
|
6566
6563
|
allowedDevices: Record<string, string[] | "*">;
|
|
6567
6564
|
createdAt: number;
|
|
@@ -6577,7 +6574,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6577
6574
|
output: {
|
|
6578
6575
|
id: string;
|
|
6579
6576
|
label: string;
|
|
6580
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6577
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6581
6578
|
tokenPrefix: string;
|
|
6582
6579
|
createdAt: number;
|
|
6583
6580
|
allowedProviders?: string[] | "*" | undefined;
|
|
@@ -6590,7 +6587,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6590
6587
|
input: {
|
|
6591
6588
|
[x: string]: unknown;
|
|
6592
6589
|
label: string;
|
|
6593
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6590
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6594
6591
|
allowedProviders?: string[] | "*" | undefined;
|
|
6595
6592
|
allowedDevices?: Record<string, string[] | "*"> | undefined;
|
|
6596
6593
|
};
|
|
@@ -6599,7 +6596,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6599
6596
|
record: {
|
|
6600
6597
|
id: string;
|
|
6601
6598
|
label: string;
|
|
6602
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6599
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6603
6600
|
tokenPrefix: string;
|
|
6604
6601
|
createdAt: number;
|
|
6605
6602
|
allowedProviders?: string[] | "*" | undefined;
|
|
@@ -6627,7 +6624,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
6627
6624
|
output: {
|
|
6628
6625
|
id: string;
|
|
6629
6626
|
label: string;
|
|
6630
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
6627
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
6631
6628
|
tokenPrefix: string;
|
|
6632
6629
|
createdAt: number;
|
|
6633
6630
|
allowedProviders?: string[] | "*" | undefined;
|
|
@@ -8691,7 +8688,6 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
8691
8688
|
output: readonly {
|
|
8692
8689
|
addonId: string;
|
|
8693
8690
|
displayName: string;
|
|
8694
|
-
kind: "other" | "local" | "oidc" | "saml" | "ldap";
|
|
8695
8691
|
hasRedirectFlow: boolean;
|
|
8696
8692
|
hasCredentialFlow: boolean;
|
|
8697
8693
|
enabled: boolean;
|
|
@@ -8725,7 +8721,6 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
8725
8721
|
output: readonly {
|
|
8726
8722
|
addonId: string;
|
|
8727
8723
|
displayName: string;
|
|
8728
|
-
kind: "other" | "tailscale" | "cloudflare-tunnel" | "ngrok";
|
|
8729
8724
|
enabled: boolean;
|
|
8730
8725
|
connected: boolean;
|
|
8731
8726
|
endpoint: {
|
|
@@ -8775,7 +8770,6 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
8775
8770
|
output: readonly {
|
|
8776
8771
|
addonId: string;
|
|
8777
8772
|
displayName: string;
|
|
8778
|
-
kind: "other" | "cloudflare" | "coturn" | "twilio";
|
|
8779
8773
|
enabled: boolean;
|
|
8780
8774
|
serverCount: number;
|
|
8781
8775
|
urls: readonly string[];
|
|
@@ -14613,7 +14607,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14613
14607
|
user: {
|
|
14614
14608
|
id: string;
|
|
14615
14609
|
username: string;
|
|
14616
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14610
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14617
14611
|
};
|
|
14618
14612
|
};
|
|
14619
14613
|
meta: object;
|
|
@@ -14623,9 +14617,9 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14623
14617
|
output: {
|
|
14624
14618
|
id: string;
|
|
14625
14619
|
username: string;
|
|
14626
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14620
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14627
14621
|
permissions: {
|
|
14628
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14622
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14629
14623
|
allowedProviders: string[] | "*";
|
|
14630
14624
|
allowedDevices: Record<string, unknown>;
|
|
14631
14625
|
};
|
|
@@ -14665,7 +14659,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14665
14659
|
output: {
|
|
14666
14660
|
id: string;
|
|
14667
14661
|
username: string;
|
|
14668
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14662
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14669
14663
|
allowedProviders: string[] | "*";
|
|
14670
14664
|
allowedDevices: Record<string, string[] | "*">;
|
|
14671
14665
|
createdAt: number;
|
|
@@ -14678,14 +14672,14 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14678
14672
|
[x: string]: unknown;
|
|
14679
14673
|
username: string;
|
|
14680
14674
|
password: string;
|
|
14681
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14675
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14682
14676
|
allowedProviders?: string[] | "*" | undefined;
|
|
14683
14677
|
allowedDevices?: Record<string, string[] | "*"> | undefined;
|
|
14684
14678
|
};
|
|
14685
14679
|
output: {
|
|
14686
14680
|
id: string;
|
|
14687
14681
|
username: string;
|
|
14688
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14682
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14689
14683
|
allowedProviders: string[] | "*";
|
|
14690
14684
|
allowedDevices: Record<string, string[] | "*">;
|
|
14691
14685
|
createdAt: number;
|
|
@@ -14697,7 +14691,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14697
14691
|
input: {
|
|
14698
14692
|
[x: string]: unknown;
|
|
14699
14693
|
id: string;
|
|
14700
|
-
role?: "admin" | "viewer" | "super_admin" | "agent" | undefined;
|
|
14694
|
+
role?: "admin" | "viewer" | "super_admin" | "agent" | "scoped" | undefined;
|
|
14701
14695
|
allowedProviders?: string[] | "*" | undefined;
|
|
14702
14696
|
allowedDevices?: Record<string, string[] | "*"> | undefined;
|
|
14703
14697
|
};
|
|
@@ -14736,7 +14730,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14736
14730
|
output: {
|
|
14737
14731
|
id: string;
|
|
14738
14732
|
username: string;
|
|
14739
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14733
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14740
14734
|
allowedProviders: string[] | "*";
|
|
14741
14735
|
allowedDevices: Record<string, string[] | "*">;
|
|
14742
14736
|
createdAt: number;
|
|
@@ -14752,7 +14746,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14752
14746
|
output: {
|
|
14753
14747
|
id: string;
|
|
14754
14748
|
label: string;
|
|
14755
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14749
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14756
14750
|
tokenPrefix: string;
|
|
14757
14751
|
createdAt: number;
|
|
14758
14752
|
allowedProviders?: string[] | "*" | undefined;
|
|
@@ -14765,7 +14759,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14765
14759
|
input: {
|
|
14766
14760
|
[x: string]: unknown;
|
|
14767
14761
|
label: string;
|
|
14768
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14762
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14769
14763
|
allowedProviders?: string[] | "*" | undefined;
|
|
14770
14764
|
allowedDevices?: Record<string, string[] | "*"> | undefined;
|
|
14771
14765
|
};
|
|
@@ -14774,7 +14768,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14774
14768
|
record: {
|
|
14775
14769
|
id: string;
|
|
14776
14770
|
label: string;
|
|
14777
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14771
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14778
14772
|
tokenPrefix: string;
|
|
14779
14773
|
createdAt: number;
|
|
14780
14774
|
allowedProviders?: string[] | "*" | undefined;
|
|
@@ -14802,7 +14796,7 @@ export type AppRouter = import("@trpc/server/unstable-core-do-not-import").Route
|
|
|
14802
14796
|
output: {
|
|
14803
14797
|
id: string;
|
|
14804
14798
|
label: string;
|
|
14805
|
-
role: "admin" | "viewer" | "super_admin" | "agent";
|
|
14799
|
+
role: "admin" | "viewer" | "super_admin" | "agent" | "scoped";
|
|
14806
14800
|
tokenPrefix: string;
|
|
14807
14801
|
createdAt: number;
|
|
14808
14802
|
allowedProviders?: string[] | "*" | undefined;
|