@highstate/library 0.4.1 → 0.4.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/dist/index.d.ts +306 -110
  2. package/dist/index.mjs +409 -103
  3. package/package.json +7 -5
package/dist/index.d.ts CHANGED
@@ -1,19 +1,27 @@
1
1
  import * as _highstate_contract from '@highstate/contract';
2
2
  import * as _sinclair_typebox from '@sinclair/typebox';
3
+ import { Static } from '@sinclair/typebox';
3
4
 
4
5
  declare const serverEntity: _highstate_contract.Entity<"common.server", _sinclair_typebox.TObject<{
5
6
  endpoint: _sinclair_typebox.TString;
6
- sshCredentials: _sinclair_typebox.TObject<{
7
+ hostname: _sinclair_typebox.TString;
8
+ sshCredentials: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
7
9
  endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
8
10
  user: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
9
11
  port: _sinclair_typebox.TOptional<_sinclair_typebox.TNumber>;
10
12
  password: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
11
- privateKey: _sinclair_typebox.TObject<{
13
+ privateKey: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
12
14
  type: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
13
15
  privateKey: _sinclair_typebox.TString;
14
16
  publicKey: _sinclair_typebox.TString;
15
- }>;
16
- }>;
17
+ }>>;
18
+ }>>;
19
+ }>>;
20
+ declare const innerCircuitEntity: _highstate_contract.Entity<"common.inner-circuit", _sinclair_typebox.TObject<{
21
+ interface: _sinclair_typebox.TString;
22
+ }>>;
23
+ declare const outerCircuitEntity: _highstate_contract.Entity<"common.outer-circuit", _sinclair_typebox.TObject<{
24
+ interface: _sinclair_typebox.TString;
17
25
  }>>;
18
26
  declare const gatewayEntity: _highstate_contract.Entity<"common.gateway", _sinclair_typebox.TObject<{
19
27
  endpoint: _sinclair_typebox.TString;
@@ -42,18 +50,48 @@ declare const accessPoint: _highstate_contract.Unit<Record<string, never>, {
42
50
  name: _sinclair_typebox.TString;
43
51
  }>>, true, false];
44
52
  }, Record<string, never>>;
53
+ declare const existingServer: _highstate_contract.Unit<{
54
+ sshUser?: string | undefined;
55
+ sshPort?: number | undefined;
56
+ endpoint: string;
57
+ }, Record<string, never>, {
58
+ server: [_highstate_contract.Entity<"common.server", _sinclair_typebox.TObject<{
59
+ endpoint: _sinclair_typebox.TString;
60
+ hostname: _sinclair_typebox.TString;
61
+ sshCredentials: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
62
+ endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
63
+ user: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
64
+ port: _sinclair_typebox.TOptional<_sinclair_typebox.TNumber>;
65
+ password: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
66
+ privateKey: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
67
+ type: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
68
+ privateKey: _sinclair_typebox.TString;
69
+ publicKey: _sinclair_typebox.TString;
70
+ }>>;
71
+ }>>;
72
+ }>>, true, false];
73
+ }, {
74
+ sshPassword?: string | undefined;
75
+ }>;
76
+ type Server = Static<typeof serverEntity.schema>;
77
+ type AccessPoint = Static<typeof accessPointEntity.schema>;
45
78
 
79
+ type common_AccessPoint = AccessPoint;
80
+ type common_Server = Server;
46
81
  declare const common_accessPoint: typeof accessPoint;
47
82
  declare const common_accessPointEntity: typeof accessPointEntity;
48
83
  declare const common_dnsProviderEntity: typeof dnsProviderEntity;
84
+ declare const common_existingServer: typeof existingServer;
49
85
  declare const common_gatewayEntity: typeof gatewayEntity;
86
+ declare const common_innerCircuitEntity: typeof innerCircuitEntity;
87
+ declare const common_outerCircuitEntity: typeof outerCircuitEntity;
50
88
  declare const common_serverEntity: typeof serverEntity;
51
89
  declare const common_tlsIssuerEntity: typeof tlsIssuerEntity;
52
90
  declare namespace common {
53
- export { common_accessPoint as accessPoint, common_accessPointEntity as accessPointEntity, common_dnsProviderEntity as dnsProviderEntity, common_gatewayEntity as gatewayEntity, common_serverEntity as serverEntity, common_tlsIssuerEntity as tlsIssuerEntity };
91
+ export { type common_AccessPoint as AccessPoint, type common_Server as Server, common_accessPoint as accessPoint, common_accessPointEntity as accessPointEntity, common_dnsProviderEntity as dnsProviderEntity, common_existingServer as existingServer, common_gatewayEntity as gatewayEntity, common_innerCircuitEntity as innerCircuitEntity, common_outerCircuitEntity as outerCircuitEntity, common_serverEntity as serverEntity, common_tlsIssuerEntity as tlsIssuerEntity };
54
92
  }
55
93
 
56
- declare const clusterEntity$1: _highstate_contract.Entity<"proxmox.cluster", _sinclair_typebox.TObject<{
94
+ declare const clusterEntity$2: _highstate_contract.Entity<"proxmox.cluster", _sinclair_typebox.TObject<{
57
95
  endpoint: _sinclair_typebox.TString;
58
96
  insecure: _sinclair_typebox.TOptional<_sinclair_typebox.TBoolean>;
59
97
  username: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
@@ -71,9 +109,7 @@ declare const connection$1: _highstate_contract.Unit<{
71
109
  defaultDatastoreId?: string | undefined;
72
110
  endpoint: string;
73
111
  defaultNodeName: string;
74
- }, {
75
- [x: string]: never;
76
- }, {
112
+ }, Record<string, never>, {
77
113
  proxmoxCluster: [_highstate_contract.Entity<"proxmox.cluster", _sinclair_typebox.TObject<{
78
114
  endpoint: _sinclair_typebox.TString;
79
115
  insecure: _sinclair_typebox.TOptional<_sinclair_typebox.TBoolean>;
@@ -109,9 +145,7 @@ declare const image: _highstate_contract.Unit<{
109
145
  }, Record<string, never>>;
110
146
  declare const existingImage: _highstate_contract.Unit<{
111
147
  id: string;
112
- }, {
113
- [x: string]: never;
114
- }, {
148
+ }, Record<string, never>, {
115
149
  image: [_highstate_contract.Entity<"proxmox.image", _sinclair_typebox.TObject<{
116
150
  id: _sinclair_typebox.TString;
117
151
  }>>, true, false];
@@ -151,17 +185,18 @@ declare const virtualMachine: _highstate_contract.Unit<{
151
185
  }, {
152
186
  server: [_highstate_contract.Entity<"common.server", _sinclair_typebox.TObject<{
153
187
  endpoint: _sinclair_typebox.TString;
154
- sshCredentials: _sinclair_typebox.TObject<{
188
+ hostname: _sinclair_typebox.TString;
189
+ sshCredentials: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
155
190
  endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
156
191
  user: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
157
192
  port: _sinclair_typebox.TOptional<_sinclair_typebox.TNumber>;
158
193
  password: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
159
- privateKey: _sinclair_typebox.TObject<{
194
+ privateKey: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
160
195
  type: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
161
196
  privateKey: _sinclair_typebox.TString;
162
197
  publicKey: _sinclair_typebox.TString;
163
- }>;
164
- }>;
198
+ }>>;
199
+ }>>;
165
200
  }>>, true, false];
166
201
  }, Record<string, never>>;
167
202
 
@@ -170,7 +205,7 @@ declare const proxmox_image: typeof image;
170
205
  declare const proxmox_imageEntity: typeof imageEntity;
171
206
  declare const proxmox_virtualMachine: typeof virtualMachine;
172
207
  declare namespace proxmox {
173
- export { clusterEntity$1 as clusterEntity, connection$1 as connection, proxmox_existingImage as existingImage, proxmox_image as image, proxmox_imageEntity as imageEntity, proxmox_virtualMachine as virtualMachine };
208
+ export { clusterEntity$2 as clusterEntity, connection$1 as connection, proxmox_existingImage as existingImage, proxmox_image as image, proxmox_imageEntity as imageEntity, proxmox_virtualMachine as virtualMachine };
174
209
  }
175
210
 
176
211
  declare const keyTypeSchema: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
@@ -187,57 +222,41 @@ declare const credentialsSchema: _sinclair_typebox.TObject<{
187
222
  user: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
188
223
  port: _sinclair_typebox.TOptional<_sinclair_typebox.TNumber>;
189
224
  password: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
190
- privateKey: _sinclair_typebox.TObject<{
225
+ privateKey: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
191
226
  type: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
192
227
  privateKey: _sinclair_typebox.TString;
193
228
  publicKey: _sinclair_typebox.TString;
194
- }>;
229
+ }>>;
195
230
  }>;
196
- declare const keyPair: _highstate_contract.Unit<Record<string, never>, {
197
- [x: string]: never;
198
- }, {
199
- keyPair: [_highstate_contract.Entity<"ssh.key-pair", _sinclair_typebox.TObject<{
200
- type: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
201
- privateKey: _sinclair_typebox.TString;
202
- publicKey: _sinclair_typebox.TString;
203
- }>>, true, false];
204
- }, Record<string, never>>;
205
- declare const existingKeyPair: _highstate_contract.Unit<{
206
- type: "rsa" | "ed25519";
207
- }, {
208
- [x: string]: never;
209
- }, {
231
+ declare const keyPair: _highstate_contract.Unit<Record<string, never>, Record<string, never>, {
210
232
  keyPair: [_highstate_contract.Entity<"ssh.key-pair", _sinclair_typebox.TObject<{
211
233
  type: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
212
234
  privateKey: _sinclair_typebox.TString;
213
235
  publicKey: _sinclair_typebox.TString;
214
236
  }>>, true, false];
215
237
  }, {
216
- privateKey: string;
238
+ privateKey?: string | undefined;
217
239
  }>;
218
240
  declare const existingPublicKey: _highstate_contract.Unit<{
219
241
  type: "rsa" | "ed25519";
220
242
  publicKey: string;
221
- }, {
222
- [x: string]: never;
223
- }, {
243
+ }, Record<string, never>, {
224
244
  publicKey: [_highstate_contract.Entity<"ssh.public-key", _sinclair_typebox.TObject<{
225
245
  publicKey: _sinclair_typebox.TString;
226
246
  }>>, true, false];
227
247
  }, Record<string, never>>;
228
248
 
229
249
  declare const ssh_credentialsSchema: typeof credentialsSchema;
230
- declare const ssh_existingKeyPair: typeof existingKeyPair;
231
250
  declare const ssh_existingPublicKey: typeof existingPublicKey;
232
251
  declare const ssh_keyPair: typeof keyPair;
233
252
  declare const ssh_keyPairEntity: typeof keyPairEntity;
234
253
  declare const ssh_keyTypeSchema: typeof keyTypeSchema;
235
254
  declare const ssh_publicKeyEntity: typeof publicKeyEntity;
236
255
  declare namespace ssh {
237
- export { ssh_credentialsSchema as credentialsSchema, ssh_existingKeyPair as existingKeyPair, ssh_existingPublicKey as existingPublicKey, ssh_keyPair as keyPair, ssh_keyPairEntity as keyPairEntity, ssh_keyTypeSchema as keyTypeSchema, ssh_publicKeyEntity as publicKeyEntity };
256
+ export { ssh_credentialsSchema as credentialsSchema, ssh_existingPublicKey as existingPublicKey, ssh_keyPair as keyPair, ssh_keyPairEntity as keyPairEntity, ssh_keyTypeSchema as keyTypeSchema, ssh_publicKeyEntity as publicKeyEntity };
238
257
  }
239
258
 
240
- declare const clusterEntity: _highstate_contract.Entity<"k8s.cluster", _sinclair_typebox.TObject<{
259
+ declare const clusterEntity$1: _highstate_contract.Entity<"k8s.cluster", _sinclair_typebox.TObject<{
241
260
  kubeconfig: _sinclair_typebox.TString;
242
261
  }>>;
243
262
  declare const routeEntity: _highstate_contract.Entity<"k8s.route", _sinclair_typebox.TObject<{
@@ -278,157 +297,288 @@ declare const coredns: _highstate_contract.Unit<Record<string, never>, {
278
297
  }, Record<string, never>>;
279
298
 
280
299
  declare const k8s_certManager: typeof certManager;
281
- declare const k8s_clusterEntity: typeof clusterEntity;
282
300
  declare const k8s_coredns: typeof coredns;
283
301
  declare const k8s_routeEntity: typeof routeEntity;
284
302
  declare const k8s_traefikGateway: typeof traefikGateway;
285
303
  declare namespace k8s {
286
- export { k8s_certManager as certManager, k8s_clusterEntity as clusterEntity, k8s_coredns as coredns, k8s_routeEntity as routeEntity, k8s_traefikGateway as traefikGateway };
304
+ export { k8s_certManager as certManager, clusterEntity$1 as clusterEntity, k8s_coredns as coredns, k8s_routeEntity as routeEntity, k8s_traefikGateway as traefikGateway };
287
305
  }
288
306
 
289
- declare const cluster: _highstate_contract.Unit<{
307
+ declare const clusterEntity: _highstate_contract.Entity<"talos.cluster", _sinclair_typebox.TObject<{
308
+ clientConfiguration: _sinclair_typebox.TString;
309
+ machineSecrets: _sinclair_typebox.TString;
310
+ }>>;
311
+ declare const cluster$1: _highstate_contract.Unit<{
312
+ endpoint?: string | undefined;
290
313
  scheduleOnMasters?: boolean | undefined;
314
+ clusterName?: string | undefined;
315
+ sharedConfigPatch?: {
316
+ [x: string]: any;
317
+ } | undefined;
318
+ masterConfigPatch?: {
319
+ [x: string]: any;
320
+ } | undefined;
321
+ workerConfigPatch?: {
322
+ [x: string]: any;
323
+ } | undefined;
291
324
  }, {
292
325
  masters: [_highstate_contract.Entity<"common.server", _sinclair_typebox.TObject<{
293
326
  endpoint: _sinclair_typebox.TString;
294
- sshCredentials: _sinclair_typebox.TObject<{
327
+ hostname: _sinclair_typebox.TString;
328
+ sshCredentials: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
295
329
  endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
296
330
  user: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
297
331
  port: _sinclair_typebox.TOptional<_sinclair_typebox.TNumber>;
298
332
  password: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
299
- privateKey: _sinclair_typebox.TObject<{
333
+ privateKey: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
300
334
  type: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
301
335
  privateKey: _sinclair_typebox.TString;
302
336
  publicKey: _sinclair_typebox.TString;
303
- }>;
304
- }>;
337
+ }>>;
338
+ }>>;
305
339
  }>>, true, true];
306
340
  workers: [_highstate_contract.Entity<"common.server", _sinclair_typebox.TObject<{
307
341
  endpoint: _sinclair_typebox.TString;
308
- sshCredentials: _sinclair_typebox.TObject<{
342
+ hostname: _sinclair_typebox.TString;
343
+ sshCredentials: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
309
344
  endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
310
345
  user: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
311
346
  port: _sinclair_typebox.TOptional<_sinclair_typebox.TNumber>;
312
347
  password: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
313
- privateKey: _sinclair_typebox.TObject<{
348
+ privateKey: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
314
349
  type: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
315
350
  privateKey: _sinclair_typebox.TString;
316
351
  publicKey: _sinclair_typebox.TString;
317
- }>;
318
- }>;
352
+ }>>;
353
+ }>>;
319
354
  }>>, false, true];
320
355
  }, {
321
356
  k8sCluster: [_highstate_contract.Entity<"k8s.cluster", _sinclair_typebox.TObject<{
322
357
  kubeconfig: _sinclair_typebox.TString;
323
358
  }>>, true, false];
359
+ talosCluster: [_highstate_contract.Entity<"talos.cluster", _sinclair_typebox.TObject<{
360
+ clientConfiguration: _sinclair_typebox.TString;
361
+ machineSecrets: _sinclair_typebox.TString;
362
+ }>>, true, false];
324
363
  egress: [_highstate_contract.Entity<"k8s.route", _sinclair_typebox.TObject<{
325
364
  someField: _sinclair_typebox.TString;
326
365
  }>>, true, false];
327
366
  }, Record<string, never>>;
328
367
 
329
- declare const talos_cluster: typeof cluster;
368
+ declare const talos_clusterEntity: typeof clusterEntity;
330
369
  declare namespace talos {
331
- export { talos_cluster as cluster };
370
+ export { cluster$1 as cluster, talos_clusterEntity as clusterEntity };
332
371
  }
333
372
 
334
373
  declare const backendSchema: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>;
374
+ declare const presharedKeyModeSchema: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
375
+ type Backend = Static<typeof backendSchema>;
376
+ type PresharedKeyMode = Static<typeof presharedKeyModeSchema>;
335
377
  declare const networkEntity: _highstate_contract.Entity<"wireguard.network", _sinclair_typebox.TObject<{
336
378
  backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
337
- preSharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
379
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
380
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
338
381
  }>>;
339
382
  declare const identityEntity: _highstate_contract.Entity<"wireguard.identity", _sinclair_typebox.TObject<{
340
- network: _sinclair_typebox.TString;
383
+ name: _sinclair_typebox.TString;
384
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
385
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
386
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
387
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
388
+ }>>;
341
389
  address: _sinclair_typebox.TString;
342
390
  privateKey: _sinclair_typebox.TString;
391
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
343
392
  }>>;
344
393
  declare const peerEntity: _highstate_contract.Entity<"wireguard.peer", _sinclair_typebox.TObject<{
345
- network: _sinclair_typebox.TString;
346
- address: _sinclair_typebox.TString;
394
+ name: _sinclair_typebox.TString;
395
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
396
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
397
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
398
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
399
+ }>>;
347
400
  publicKey: _sinclair_typebox.TString;
401
+ address: _sinclair_typebox.TString;
402
+ allowedIps: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
348
403
  endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
404
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
349
405
  }>>;
350
406
  declare const k8sNodeEntity: _highstate_contract.Entity<"wireguard.node", _sinclair_typebox.TObject<{
351
407
  network: _sinclair_typebox.TString;
352
408
  address: _sinclair_typebox.TString;
353
- allowedIps: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
354
409
  endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
355
410
  peers: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
356
411
  }>>;
412
+ type NetworkEntity = Static<typeof networkEntity.schema>;
413
+ type IdentityEntity = Static<typeof identityEntity.schema>;
414
+ type PeerEntity = Static<typeof peerEntity.schema>;
415
+ /**
416
+ * The network hols the shared configuration for the WireGuard identities, peers and nodes.
417
+ */
357
418
  declare const network: _highstate_contract.Unit<{
358
- backend?: "wireguard" | "amneziawg" | undefined;
359
- preSharedKey?: string | undefined;
360
- }, {
361
- [x: string]: never;
362
- }, {
419
+ presharedKeyMode?: "none" | "global" | "secure" | undefined;
420
+ backend: "wireguard" | "amneziawg";
421
+ }, Record<string, never>, {
363
422
  network: [_highstate_contract.Entity<"wireguard.network", _sinclair_typebox.TObject<{
364
423
  backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
365
- preSharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
424
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
425
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
366
426
  }>>, true, false];
367
- }, Record<string, never>>;
427
+ }, {
428
+ globalPresharedKey?: string | undefined;
429
+ }>;
368
430
  declare const identity: _highstate_contract.Unit<{
369
431
  endpoint?: string | undefined;
432
+ allowedIps?: string[] | undefined;
433
+ peerName?: string | undefined;
434
+ exitNode?: boolean | undefined;
370
435
  address: string;
371
436
  }, {
372
437
  network: [_highstate_contract.Entity<"wireguard.network", _sinclair_typebox.TObject<{
373
438
  backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
374
- preSharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
375
- }>>, true, false];
439
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
440
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
441
+ }>>, false, false];
376
442
  }, {
377
443
  identity: [_highstate_contract.Entity<"wireguard.identity", _sinclair_typebox.TObject<{
378
- network: _sinclair_typebox.TString;
444
+ name: _sinclair_typebox.TString;
445
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
446
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
447
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
448
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
449
+ }>>;
379
450
  address: _sinclair_typebox.TString;
380
451
  privateKey: _sinclair_typebox.TString;
452
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
381
453
  }>>, true, false];
382
454
  peer: [_highstate_contract.Entity<"wireguard.peer", _sinclair_typebox.TObject<{
383
- network: _sinclair_typebox.TString;
384
- address: _sinclair_typebox.TString;
455
+ name: _sinclair_typebox.TString;
456
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
457
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
458
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
459
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
460
+ }>>;
385
461
  publicKey: _sinclair_typebox.TString;
462
+ address: _sinclair_typebox.TString;
463
+ allowedIps: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
386
464
  endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
465
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
387
466
  }>>, true, false];
388
- }, Record<string, never>>;
467
+ }, {
468
+ privateKey?: string | undefined;
469
+ presharedKeyPart?: string | undefined;
470
+ }>;
389
471
  declare const node: _highstate_contract.Unit<{
390
- allowedIps?: string[] | undefined;
391
472
  listenPort?: number | undefined;
392
473
  externalIp?: string | undefined;
393
474
  serviceType?: "NodePort" | "LoadBalancer" | "ClusterIP" | undefined;
394
475
  }, {
395
476
  identity: [_highstate_contract.Entity<"wireguard.identity", _sinclair_typebox.TObject<{
396
- network: _sinclair_typebox.TString;
477
+ name: _sinclair_typebox.TString;
478
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
479
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
480
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
481
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
482
+ }>>;
397
483
  address: _sinclair_typebox.TString;
398
484
  privateKey: _sinclair_typebox.TString;
485
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
399
486
  }>>, true, false];
400
487
  k8sCluster: [_highstate_contract.Entity<"k8s.cluster", _sinclair_typebox.TObject<{
401
488
  kubeconfig: _sinclair_typebox.TString;
402
489
  }>>, false, false];
403
490
  peers: [_highstate_contract.Entity<"wireguard.peer", _sinclair_typebox.TObject<{
404
- network: _sinclair_typebox.TString;
405
- address: _sinclair_typebox.TString;
491
+ name: _sinclair_typebox.TString;
492
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
493
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
494
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
495
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
496
+ }>>;
406
497
  publicKey: _sinclair_typebox.TString;
498
+ address: _sinclair_typebox.TString;
499
+ allowedIps: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
407
500
  endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
501
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
408
502
  }>>, false, true];
409
- }, {
410
- egress: [_highstate_contract.Entity<"k8s.route", _sinclair_typebox.TObject<{
411
- someField: _sinclair_typebox.TString;
503
+ innerCircuit: [_highstate_contract.Entity<"common.inner-circuit", _sinclair_typebox.TObject<{
504
+ interface: _sinclair_typebox.TString;
412
505
  }>>, true, false];
413
- }, Record<string, never>>;
506
+ outerCircuit: [_highstate_contract.Entity<"common.outer-circuit", _sinclair_typebox.TObject<{
507
+ interface: _sinclair_typebox.TString;
508
+ }>>, true, false];
509
+ }, Record<string, never>, Record<string, never>>;
414
510
  declare const config: _highstate_contract.Unit<Record<string, never>, {
415
511
  identity: [_highstate_contract.Entity<"wireguard.identity", _sinclair_typebox.TObject<{
416
- network: _sinclair_typebox.TString;
512
+ name: _sinclair_typebox.TString;
513
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
514
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
515
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
516
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
517
+ }>>;
417
518
  address: _sinclair_typebox.TString;
418
519
  privateKey: _sinclair_typebox.TString;
520
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
419
521
  }>>, true, false];
420
522
  peers: [_highstate_contract.Entity<"wireguard.peer", _sinclair_typebox.TObject<{
421
- network: _sinclair_typebox.TString;
422
- address: _sinclair_typebox.TString;
523
+ name: _sinclair_typebox.TString;
524
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
525
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
526
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
527
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
528
+ }>>;
423
529
  publicKey: _sinclair_typebox.TString;
530
+ address: _sinclair_typebox.TString;
531
+ allowedIps: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
424
532
  endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
533
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
425
534
  }>>, false, true];
535
+ }, Record<string, never>, Record<string, never>>;
536
+ declare const generator: _highstate_contract.Component<{
537
+ clientNames: string[];
538
+ cidr: string;
426
539
  }, {
427
- [x: string]: never;
428
- }, Record<string, never>>;
540
+ network: [_highstate_contract.Entity<"wireguard.network", _sinclair_typebox.TObject<{
541
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
542
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
543
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
544
+ }>>, true, false];
545
+ peer: [_highstate_contract.Entity<"wireguard.peer", _sinclair_typebox.TObject<{
546
+ name: _sinclair_typebox.TString;
547
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
548
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
549
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
550
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
551
+ }>>;
552
+ publicKey: _sinclair_typebox.TString;
553
+ address: _sinclair_typebox.TString;
554
+ allowedIps: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
555
+ endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
556
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
557
+ }>>, true, false];
558
+ }, {
559
+ peers: [_highstate_contract.Entity<"wireguard.peer", _sinclair_typebox.TObject<{
560
+ name: _sinclair_typebox.TString;
561
+ network: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
562
+ backend: _sinclair_typebox.TOptional<_sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"wireguard">, _sinclair_typebox.TLiteral<"amneziawg">]>>;
563
+ presharedKeyMode: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"none">, _sinclair_typebox.TLiteral<"global">, _sinclair_typebox.TLiteral<"secure">]>;
564
+ globalPresharedKey: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
565
+ }>>;
566
+ publicKey: _sinclair_typebox.TString;
567
+ address: _sinclair_typebox.TString;
568
+ allowedIps: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
569
+ endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
570
+ presharedKeyPart: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
571
+ }>>, true, true];
572
+ }>;
429
573
 
574
+ type wireguard_Backend = Backend;
575
+ type wireguard_IdentityEntity = IdentityEntity;
576
+ type wireguard_NetworkEntity = NetworkEntity;
577
+ type wireguard_PeerEntity = PeerEntity;
578
+ type wireguard_PresharedKeyMode = PresharedKeyMode;
430
579
  declare const wireguard_backendSchema: typeof backendSchema;
431
580
  declare const wireguard_config: typeof config;
581
+ declare const wireguard_generator: typeof generator;
432
582
  declare const wireguard_identity: typeof identity;
433
583
  declare const wireguard_identityEntity: typeof identityEntity;
434
584
  declare const wireguard_k8sNodeEntity: typeof k8sNodeEntity;
@@ -436,8 +586,9 @@ declare const wireguard_network: typeof network;
436
586
  declare const wireguard_networkEntity: typeof networkEntity;
437
587
  declare const wireguard_node: typeof node;
438
588
  declare const wireguard_peerEntity: typeof peerEntity;
589
+ declare const wireguard_presharedKeyModeSchema: typeof presharedKeyModeSchema;
439
590
  declare namespace wireguard {
440
- export { wireguard_backendSchema as backendSchema, wireguard_config as config, wireguard_identity as identity, wireguard_identityEntity as identityEntity, wireguard_k8sNodeEntity as k8sNodeEntity, wireguard_network as network, wireguard_networkEntity as networkEntity, wireguard_node as node, wireguard_peerEntity as peerEntity };
591
+ export { type wireguard_Backend as Backend, type wireguard_IdentityEntity as IdentityEntity, type wireguard_NetworkEntity as NetworkEntity, type wireguard_PeerEntity as PeerEntity, type wireguard_PresharedKeyMode as PresharedKeyMode, wireguard_backendSchema as backendSchema, wireguard_config as config, wireguard_generator as generator, wireguard_identity as identity, wireguard_identityEntity as identityEntity, wireguard_k8sNodeEntity as k8sNodeEntity, wireguard_network as network, wireguard_networkEntity as networkEntity, wireguard_node as node, wireguard_peerEntity as peerEntity, wireguard_presharedKeyModeSchema as presharedKeyModeSchema };
441
592
  }
442
593
 
443
594
  declare const mariadbEntity: _highstate_contract.Entity<"mariadb", _sinclair_typebox.TObject<{
@@ -448,10 +599,7 @@ declare const postgresqlEntity: _highstate_contract.Entity<"postgresql", _sincla
448
599
  rootPassword: _sinclair_typebox.TString;
449
600
  databases: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
450
601
  }>>;
451
- declare const mariadb: _highstate_contract.Unit<{
452
- rootPassword: string;
453
- databases: string[];
454
- }, {
602
+ declare const mariadb: _highstate_contract.Unit<Record<string, never>, {
455
603
  k8sCluster: [_highstate_contract.Entity<"k8s.cluster", _sinclair_typebox.TObject<{
456
604
  kubeconfig: _sinclair_typebox.TString;
457
605
  }>>, true, false];
@@ -460,11 +608,10 @@ declare const mariadb: _highstate_contract.Unit<{
460
608
  rootPassword: _sinclair_typebox.TString;
461
609
  databases: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
462
610
  }>>, true, false];
463
- }, Record<string, never>>;
464
- declare const postgresql: _highstate_contract.Unit<{
465
- rootPassword: string;
466
- databases: string[];
467
611
  }, {
612
+ rootPassword: string;
613
+ }>;
614
+ declare const postgresql: _highstate_contract.Unit<Record<string, never>, {
468
615
  k8sCluster: [_highstate_contract.Entity<"k8s.cluster", _sinclair_typebox.TObject<{
469
616
  kubeconfig: _sinclair_typebox.TString;
470
617
  }>>, true, false];
@@ -473,7 +620,9 @@ declare const postgresql: _highstate_contract.Unit<{
473
620
  rootPassword: _sinclair_typebox.TString;
474
621
  databases: _sinclair_typebox.TArray<_sinclair_typebox.TString>;
475
622
  }>>, true, false];
476
- }, Record<string, never>>;
623
+ }, {
624
+ rootPassword: string;
625
+ }>;
477
626
  declare const vaultwarden: _highstate_contract.Unit<{
478
627
  domain: string;
479
628
  }, {
@@ -484,9 +633,7 @@ declare const vaultwarden: _highstate_contract.Unit<{
484
633
  accessPoint: [_highstate_contract.Entity<"common.access-point", _sinclair_typebox.TObject<{
485
634
  name: _sinclair_typebox.TString;
486
635
  }>>, true, false];
487
- }, {
488
- [x: string]: never;
489
- }, Record<string, never>>;
636
+ }, Record<string, never>, Record<string, never>>;
490
637
  declare const gitea: _highstate_contract.Unit<{
491
638
  domain: string;
492
639
  }, {
@@ -497,9 +644,7 @@ declare const gitea: _highstate_contract.Unit<{
497
644
  accessPoint: [_highstate_contract.Entity<"common.access-point", _sinclair_typebox.TObject<{
498
645
  name: _sinclair_typebox.TString;
499
646
  }>>, true, false];
500
- }, {
501
- [x: string]: never;
502
- }, Record<string, never>>;
647
+ }, Record<string, never>, Record<string, never>>;
503
648
  declare const zitadel: _highstate_contract.Unit<{
504
649
  domain: string;
505
650
  }, {
@@ -510,9 +655,7 @@ declare const zitadel: _highstate_contract.Unit<{
510
655
  accessPoint: [_highstate_contract.Entity<"common.access-point", _sinclair_typebox.TObject<{
511
656
  name: _sinclair_typebox.TString;
512
657
  }>>, true, false];
513
- }, {
514
- [x: string]: never;
515
- }, Record<string, never>>;
658
+ }, Record<string, never>, Record<string, never>>;
516
659
 
517
660
  declare const apps_gitea: typeof gitea;
518
661
  declare const apps_mariadb: typeof mariadb;
@@ -528,15 +671,13 @@ declare namespace apps {
528
671
  declare const connectionEntity: _highstate_contract.Entity<"cloudflare.connection", _sinclair_typebox.TObject<{
529
672
  apiKey: _sinclair_typebox.TString;
530
673
  }>>;
531
- declare const connection: _highstate_contract.Unit<{
532
- apiKey: string;
533
- }, {
534
- [x: string]: never;
535
- }, {
674
+ declare const connection: _highstate_contract.Unit<Record<string, never>, Record<string, never>, {
536
675
  connection: [_highstate_contract.Entity<"cloudflare.connection", _sinclair_typebox.TObject<{
537
676
  apiKey: _sinclair_typebox.TString;
538
677
  }>>, true, false];
539
- }, Record<string, never>>;
678
+ }, {
679
+ apiKey: string;
680
+ }>;
540
681
  declare const zone: _highstate_contract.Unit<{
541
682
  domain: string;
542
683
  zoneId: string;
@@ -557,4 +698,59 @@ declare namespace cloudflare {
557
698
  export { cloudflare_connection as connection, cloudflare_connectionEntity as connectionEntity, cloudflare_zone as zone };
558
699
  }
559
700
 
560
- export { apps, cloudflare, common, k8s, proxmox, ssh, talos, wireguard };
701
+ declare const cluster: _highstate_contract.Unit<Record<string, never>, {
702
+ server: [_highstate_contract.Entity<"common.server", _sinclair_typebox.TObject<{
703
+ endpoint: _sinclair_typebox.TString;
704
+ hostname: _sinclair_typebox.TString;
705
+ sshCredentials: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
706
+ endpoint: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
707
+ user: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
708
+ port: _sinclair_typebox.TOptional<_sinclair_typebox.TNumber>;
709
+ password: _sinclair_typebox.TOptional<_sinclair_typebox.TString>;
710
+ privateKey: _sinclair_typebox.TOptional<_sinclair_typebox.TObject<{
711
+ type: _sinclair_typebox.TUnion<[_sinclair_typebox.TLiteral<"rsa">, _sinclair_typebox.TLiteral<"ed25519">]>;
712
+ privateKey: _sinclair_typebox.TString;
713
+ publicKey: _sinclair_typebox.TString;
714
+ }>>;
715
+ }>>;
716
+ }>>, true, false];
717
+ }, {
718
+ k8sCluster: [_highstate_contract.Entity<"k8s.cluster", _sinclair_typebox.TObject<{
719
+ kubeconfig: _sinclair_typebox.TString;
720
+ }>>, true, false];
721
+ }, Record<string, never>>;
722
+
723
+ declare const k3s_cluster: typeof cluster;
724
+ declare namespace k3s {
725
+ export { k3s_cluster as cluster };
726
+ }
727
+
728
+ declare const channelEntity: _highstate_contract.Entity<"xt-wgobfs.target", _sinclair_typebox.TObject<{
729
+ endpoint: _sinclair_typebox.TString;
730
+ }>>;
731
+ declare const obfuscatorNode: _highstate_contract.Unit<Record<string, never>, Record<string, never>, {
732
+ outerCircuit: [_highstate_contract.Entity<"common.outer-circuit", _sinclair_typebox.TObject<{
733
+ interface: _sinclair_typebox.TString;
734
+ }>>, true, false];
735
+ channel: [_highstate_contract.Entity<"xt-wgobfs.target", _sinclair_typebox.TObject<{
736
+ endpoint: _sinclair_typebox.TString;
737
+ }>>, true, false];
738
+ }, Record<string, never>>;
739
+ declare const deobfuscatorNode: _highstate_contract.Unit<Record<string, never>, {
740
+ channel: [_highstate_contract.Entity<"xt-wgobfs.target", _sinclair_typebox.TObject<{
741
+ endpoint: _sinclair_typebox.TString;
742
+ }>>, true, false];
743
+ }, {
744
+ outerCircuit: [_highstate_contract.Entity<"common.outer-circuit", _sinclair_typebox.TObject<{
745
+ interface: _sinclair_typebox.TString;
746
+ }>>, true, false];
747
+ }, Record<string, never>>;
748
+
749
+ declare const xtWgobfs_channelEntity: typeof channelEntity;
750
+ declare const xtWgobfs_deobfuscatorNode: typeof deobfuscatorNode;
751
+ declare const xtWgobfs_obfuscatorNode: typeof obfuscatorNode;
752
+ declare namespace xtWgobfs {
753
+ export { xtWgobfs_channelEntity as channelEntity, xtWgobfs_deobfuscatorNode as deobfuscatorNode, xtWgobfs_obfuscatorNode as obfuscatorNode };
754
+ }
755
+
756
+ export { apps, cloudflare, common, k3s, k8s, proxmox, ssh, talos, wireguard, xtWgobfs };