@alter-ai/alter-sdk 0.2.1 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +145 -51
- package/dist/index.cjs +315 -53
- package/dist/index.d.cts +262 -137
- package/dist/index.d.ts +262 -137
- package/dist/index.js +311 -53
- package/package.json +1 -1
package/dist/index.d.ts
CHANGED
|
@@ -1,3 +1,212 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Models for Alter SDK.
|
|
3
|
+
*
|
|
4
|
+
* These models provide type-safe data structures for SDK operations.
|
|
5
|
+
*
|
|
6
|
+
* Security Hardening (v0.4.0):
|
|
7
|
+
* - TokenResponse: accessToken stored in module-private WeakMap in client.ts
|
|
8
|
+
* (not readable as property, not importable from this module)
|
|
9
|
+
* - TokenResponse: Object.freeze(this) prevents mutation after creation
|
|
10
|
+
* - toJSON() and toString() exclude access token from serialization
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
* Actor types for tracking SDK callers.
|
|
14
|
+
*/
|
|
15
|
+
declare enum ActorType {
|
|
16
|
+
BACKEND_SERVICE = "backend_service",
|
|
17
|
+
AI_AGENT = "ai_agent",
|
|
18
|
+
MCP_SERVER = "mcp_server"
|
|
19
|
+
}
|
|
20
|
+
/**
|
|
21
|
+
* OAuth token response from Alter Vault.
|
|
22
|
+
*
|
|
23
|
+
* This represents an access token retrieved from the backend.
|
|
24
|
+
* The access_token is NOT stored as a readable property — it lives in a
|
|
25
|
+
* module-private WeakMap in client.ts and is only accessible internally.
|
|
26
|
+
*
|
|
27
|
+
* SECURITY:
|
|
28
|
+
* - No accessToken property (stored in WeakMap inside client.ts)
|
|
29
|
+
* - Instance is frozen after construction to prevent mutation
|
|
30
|
+
* - toJSON() and toString() exclude access token
|
|
31
|
+
* - _extractAccessToken() lives in client.ts, NOT in this file,
|
|
32
|
+
* so it cannot be imported by consumers even via deep imports
|
|
33
|
+
*/
|
|
34
|
+
declare class TokenResponse {
|
|
35
|
+
/** Token type (usually "Bearer") */
|
|
36
|
+
readonly tokenType: string;
|
|
37
|
+
/** Seconds until token expires */
|
|
38
|
+
readonly expiresIn: number | null;
|
|
39
|
+
/** Absolute expiration time */
|
|
40
|
+
readonly expiresAt: Date | null;
|
|
41
|
+
/** OAuth scopes granted */
|
|
42
|
+
readonly scopes: string[];
|
|
43
|
+
/** Connection ID that provided this token */
|
|
44
|
+
readonly connectionId: string;
|
|
45
|
+
/** Provider ID (google, github, etc.) */
|
|
46
|
+
readonly providerId: string;
|
|
47
|
+
/** HTTP header name for credential injection (e.g., "Authorization", "X-API-Key") */
|
|
48
|
+
readonly injectionHeader: string;
|
|
49
|
+
/** Header value format with {token} placeholder (e.g., "Bearer {token}", "{token}") */
|
|
50
|
+
readonly injectionFormat: string;
|
|
51
|
+
constructor(data: {
|
|
52
|
+
access_token: string;
|
|
53
|
+
token_type?: string;
|
|
54
|
+
expires_in?: number | null;
|
|
55
|
+
expires_at?: string | null;
|
|
56
|
+
scopes?: string[];
|
|
57
|
+
connection_id: string;
|
|
58
|
+
provider_id?: string;
|
|
59
|
+
injection_header?: string;
|
|
60
|
+
injection_format?: string;
|
|
61
|
+
});
|
|
62
|
+
/**
|
|
63
|
+
* Parse expires_at from ISO string.
|
|
64
|
+
*/
|
|
65
|
+
private static parseExpiresAt;
|
|
66
|
+
/**
|
|
67
|
+
* Check if token is expired.
|
|
68
|
+
*
|
|
69
|
+
* @param bufferSeconds - Consider token expired N seconds before actual expiry.
|
|
70
|
+
* Useful for preventing race conditions.
|
|
71
|
+
* @returns True if token is expired or will expire within bufferSeconds.
|
|
72
|
+
*/
|
|
73
|
+
isExpired(bufferSeconds?: number): boolean;
|
|
74
|
+
/**
|
|
75
|
+
* Check if token should be refreshed soon.
|
|
76
|
+
*
|
|
77
|
+
* @param bufferSeconds - Consider token needing refresh N seconds before expiry.
|
|
78
|
+
* Default 5 minutes (300 seconds).
|
|
79
|
+
* @returns True if token will expire within bufferSeconds.
|
|
80
|
+
*/
|
|
81
|
+
needsRefresh(bufferSeconds?: number): boolean;
|
|
82
|
+
/**
|
|
83
|
+
* Custom JSON serialization — EXCLUDES access_token for security.
|
|
84
|
+
*/
|
|
85
|
+
toJSON(): Record<string, unknown>;
|
|
86
|
+
/**
|
|
87
|
+
* Custom string representation — EXCLUDES access_token for security.
|
|
88
|
+
*/
|
|
89
|
+
toString(): string;
|
|
90
|
+
}
|
|
91
|
+
/**
|
|
92
|
+
* OAuth connection info from Alter Vault.
|
|
93
|
+
*
|
|
94
|
+
* Represents a connected OAuth service (e.g., Google, GitHub).
|
|
95
|
+
* Returned by listConnections(). Contains metadata only — no tokens.
|
|
96
|
+
*/
|
|
97
|
+
declare class ConnectionInfo {
|
|
98
|
+
readonly id: string;
|
|
99
|
+
readonly providerId: string;
|
|
100
|
+
readonly scopes: string[];
|
|
101
|
+
readonly accountIdentifier: string | null;
|
|
102
|
+
readonly accountDisplayName: string | null;
|
|
103
|
+
readonly status: string;
|
|
104
|
+
readonly expiresAt: string | null;
|
|
105
|
+
readonly createdAt: string;
|
|
106
|
+
readonly lastUsedAt: string | null;
|
|
107
|
+
constructor(data: {
|
|
108
|
+
id: string;
|
|
109
|
+
provider_id: string;
|
|
110
|
+
scopes?: string[];
|
|
111
|
+
account_identifier?: string | null;
|
|
112
|
+
account_display_name?: string | null;
|
|
113
|
+
status: string;
|
|
114
|
+
expires_at?: string | null;
|
|
115
|
+
created_at: string;
|
|
116
|
+
last_used_at?: string | null;
|
|
117
|
+
});
|
|
118
|
+
toJSON(): Record<string, unknown>;
|
|
119
|
+
toString(): string;
|
|
120
|
+
}
|
|
121
|
+
/**
|
|
122
|
+
* Connect session for initiating OAuth flows.
|
|
123
|
+
*
|
|
124
|
+
* Returned by createConnectSession(). Contains a URL the user
|
|
125
|
+
* opens in their browser to authorize access.
|
|
126
|
+
*/
|
|
127
|
+
declare class ConnectSession {
|
|
128
|
+
readonly sessionToken: string;
|
|
129
|
+
readonly connectUrl: string;
|
|
130
|
+
readonly expiresIn: number;
|
|
131
|
+
readonly expiresAt: string;
|
|
132
|
+
constructor(data: {
|
|
133
|
+
session_token: string;
|
|
134
|
+
connect_url: string;
|
|
135
|
+
expires_in: number;
|
|
136
|
+
expires_at: string;
|
|
137
|
+
});
|
|
138
|
+
toJSON(): Record<string, unknown>;
|
|
139
|
+
toString(): string;
|
|
140
|
+
}
|
|
141
|
+
/**
|
|
142
|
+
* Paginated list of connections.
|
|
143
|
+
*
|
|
144
|
+
* Returned by listConnections(). Contains connection array plus pagination metadata.
|
|
145
|
+
*/
|
|
146
|
+
declare class ConnectionListResult {
|
|
147
|
+
readonly connections: ConnectionInfo[];
|
|
148
|
+
readonly total: number;
|
|
149
|
+
readonly limit: number;
|
|
150
|
+
readonly offset: number;
|
|
151
|
+
readonly hasMore: boolean;
|
|
152
|
+
constructor(data: {
|
|
153
|
+
connections: ConnectionInfo[];
|
|
154
|
+
total: number;
|
|
155
|
+
limit: number;
|
|
156
|
+
offset: number;
|
|
157
|
+
has_more: boolean;
|
|
158
|
+
});
|
|
159
|
+
}
|
|
160
|
+
/**
|
|
161
|
+
* Audit log entry for an API call to a provider.
|
|
162
|
+
*
|
|
163
|
+
* This is sent to the backend audit endpoint.
|
|
164
|
+
*/
|
|
165
|
+
declare class APICallAuditLog {
|
|
166
|
+
readonly connectionId: string;
|
|
167
|
+
readonly providerId: string;
|
|
168
|
+
readonly method: string;
|
|
169
|
+
readonly url: string;
|
|
170
|
+
readonly requestHeaders: Record<string, string> | null;
|
|
171
|
+
readonly requestBody: unknown | null;
|
|
172
|
+
readonly responseStatus: number;
|
|
173
|
+
readonly responseHeaders: Record<string, string> | null;
|
|
174
|
+
readonly responseBody: unknown | null;
|
|
175
|
+
readonly latencyMs: number;
|
|
176
|
+
/** Client-side timestamp (excluded from sanitize() output, like Python SDK) */
|
|
177
|
+
readonly timestamp: Date;
|
|
178
|
+
readonly reason: string | null;
|
|
179
|
+
/** Execution run ID for actor tracking */
|
|
180
|
+
readonly runId: string | null;
|
|
181
|
+
/** Conversation thread ID for actor tracking */
|
|
182
|
+
readonly threadId: string | null;
|
|
183
|
+
/** Tool invocation ID for actor tracking */
|
|
184
|
+
readonly toolCallId: string | null;
|
|
185
|
+
constructor(data: {
|
|
186
|
+
connectionId: string;
|
|
187
|
+
providerId: string;
|
|
188
|
+
method: string;
|
|
189
|
+
url: string;
|
|
190
|
+
requestHeaders?: Record<string, string> | null;
|
|
191
|
+
requestBody?: unknown | null;
|
|
192
|
+
responseStatus: number;
|
|
193
|
+
responseHeaders?: Record<string, string> | null;
|
|
194
|
+
responseBody?: unknown | null;
|
|
195
|
+
latencyMs: number;
|
|
196
|
+
reason?: string | null;
|
|
197
|
+
runId?: string | null;
|
|
198
|
+
threadId?: string | null;
|
|
199
|
+
toolCallId?: string | null;
|
|
200
|
+
});
|
|
201
|
+
/**
|
|
202
|
+
* Sanitize sensitive data before sending.
|
|
203
|
+
*
|
|
204
|
+
* Removes Authorization headers, cookies, etc.
|
|
205
|
+
*/
|
|
206
|
+
sanitize(): Record<string, unknown>;
|
|
207
|
+
private filterSensitiveHeaders;
|
|
208
|
+
}
|
|
209
|
+
|
|
1
210
|
/**
|
|
2
211
|
* Provider and HttpMethod enums for type-safe SDK usage.
|
|
3
212
|
*
|
|
@@ -37,8 +246,6 @@ declare enum Provider {
|
|
|
37
246
|
GOOGLE = "google",
|
|
38
247
|
GITHUB = "github",
|
|
39
248
|
SLACK = "slack",
|
|
40
|
-
MICROSOFT = "microsoft",
|
|
41
|
-
SALESFORCE = "salesforce",
|
|
42
249
|
SENTRY = "sentry"
|
|
43
250
|
}
|
|
44
251
|
/**
|
|
@@ -71,14 +278,12 @@ declare enum HttpMethod {
|
|
|
71
278
|
interface AlterVaultOptions {
|
|
72
279
|
/** Alter Vault API key (must start with "alter_key_") */
|
|
73
280
|
apiKey: string;
|
|
74
|
-
/** Base URL for Alter Vault API */
|
|
75
|
-
baseUrl?: string;
|
|
76
281
|
/** HTTP request timeout in milliseconds (default: 30000) */
|
|
77
282
|
timeout?: number;
|
|
78
|
-
/** Actor type (
|
|
79
|
-
actorType
|
|
283
|
+
/** Actor type (use ActorType enum: AI_AGENT, MCP_SERVER, BACKEND_SERVICE) */
|
|
284
|
+
actorType: ActorType | string;
|
|
80
285
|
/** Unique identifier for the actor (e.g., "email-assistant-v2") */
|
|
81
|
-
actorIdentifier
|
|
286
|
+
actorIdentifier: string;
|
|
82
287
|
/** Human-readable name for the actor */
|
|
83
288
|
actorName?: string;
|
|
84
289
|
/** Actor version string (e.g., "1.0.0") */
|
|
@@ -92,8 +297,6 @@ interface AlterVaultOptions {
|
|
|
92
297
|
* Options for the request() method.
|
|
93
298
|
*/
|
|
94
299
|
interface RequestOptions {
|
|
95
|
-
/** User attributes to match connection (e.g., { user_id: "alice" }) */
|
|
96
|
-
user: Record<string, unknown>;
|
|
97
300
|
/** Optional JSON request body */
|
|
98
301
|
json?: Record<string, unknown>;
|
|
99
302
|
/** Optional additional headers */
|
|
@@ -111,6 +314,39 @@ interface RequestOptions {
|
|
|
111
314
|
/** Tool invocation ID */
|
|
112
315
|
toolCallId?: string;
|
|
113
316
|
}
|
|
317
|
+
/**
|
|
318
|
+
* Options for the listConnections() method.
|
|
319
|
+
*/
|
|
320
|
+
interface ListConnectionsOptions {
|
|
321
|
+
/** Filter by provider ID (e.g., "google") */
|
|
322
|
+
providerId?: string;
|
|
323
|
+
/** Maximum number of connections to return (default 100, max 1000) */
|
|
324
|
+
limit?: number;
|
|
325
|
+
/** Offset for pagination (default 0) */
|
|
326
|
+
offset?: number;
|
|
327
|
+
}
|
|
328
|
+
/**
|
|
329
|
+
* Options for the createConnectSession() method.
|
|
330
|
+
*/
|
|
331
|
+
interface CreateConnectSessionOptions {
|
|
332
|
+
/** End user to create session for (requires at least id) */
|
|
333
|
+
endUser: {
|
|
334
|
+
id: string;
|
|
335
|
+
email?: string;
|
|
336
|
+
name?: string;
|
|
337
|
+
};
|
|
338
|
+
/** Restrict to specific providers (e.g., ["google", "github"]) */
|
|
339
|
+
allowedProviders?: string[];
|
|
340
|
+
/** URL to redirect after OAuth completion */
|
|
341
|
+
returnUrl?: string;
|
|
342
|
+
/** Allowed origin for postMessage communication */
|
|
343
|
+
allowedOrigin?: string;
|
|
344
|
+
/** Request metadata for audit */
|
|
345
|
+
metadata?: {
|
|
346
|
+
ipAddress?: string;
|
|
347
|
+
userAgent?: string;
|
|
348
|
+
};
|
|
349
|
+
}
|
|
114
350
|
/**
|
|
115
351
|
* Main SDK class for Alter Vault OAuth token management.
|
|
116
352
|
*
|
|
@@ -129,9 +365,8 @@ interface RequestOptions {
|
|
|
129
365
|
*
|
|
130
366
|
* // Make API request (token injected automatically)
|
|
131
367
|
* const response = await vault.request(
|
|
132
|
-
*
|
|
368
|
+
* "connection-uuid-here", HttpMethod.GET,
|
|
133
369
|
* "https://www.googleapis.com/calendar/v3/calendars/primary/events",
|
|
134
|
-
* { user: { user_id: "alice" } },
|
|
135
370
|
* );
|
|
136
371
|
* const events = await response.json();
|
|
137
372
|
*
|
|
@@ -153,140 +388,30 @@ declare class AlterVault {
|
|
|
153
388
|
* 4. Logs the call for audit (fire-and-forget)
|
|
154
389
|
* 5. Returns the raw response
|
|
155
390
|
*/
|
|
156
|
-
request(
|
|
391
|
+
request(connectionId: string, method: HttpMethod | string, url: string, options?: RequestOptions): Promise<Response>;
|
|
157
392
|
/**
|
|
158
|
-
*
|
|
159
|
-
* Waits for any pending audit tasks before closing.
|
|
160
|
-
*/
|
|
161
|
-
close(): Promise<void>;
|
|
162
|
-
/**
|
|
163
|
-
* Async dispose support for `await using vault = new AlterVault(...)`.
|
|
164
|
-
* Requires TypeScript 5.2+ and Node.js 18+.
|
|
165
|
-
*/
|
|
166
|
-
[Symbol.asyncDispose](): Promise<void>;
|
|
167
|
-
}
|
|
168
|
-
|
|
169
|
-
/**
|
|
170
|
-
* Models for Alter SDK.
|
|
171
|
-
*
|
|
172
|
-
* These models provide type-safe data structures for SDK operations.
|
|
173
|
-
*
|
|
174
|
-
* Security Hardening (v0.4.0):
|
|
175
|
-
* - TokenResponse: accessToken stored in module-private WeakMap in client.ts
|
|
176
|
-
* (not readable as property, not importable from this module)
|
|
177
|
-
* - TokenResponse: Object.freeze(this) prevents mutation after creation
|
|
178
|
-
* - toJSON() and toString() exclude access token from serialization
|
|
179
|
-
*/
|
|
180
|
-
/**
|
|
181
|
-
* OAuth token response from Alter Vault.
|
|
182
|
-
*
|
|
183
|
-
* This represents an access token retrieved from the backend.
|
|
184
|
-
* The access_token is NOT stored as a readable property — it lives in a
|
|
185
|
-
* module-private WeakMap in client.ts and is only accessible internally.
|
|
186
|
-
*
|
|
187
|
-
* SECURITY:
|
|
188
|
-
* - No accessToken property (stored in WeakMap inside client.ts)
|
|
189
|
-
* - Instance is frozen after construction to prevent mutation
|
|
190
|
-
* - toJSON() and toString() exclude access token
|
|
191
|
-
* - _extractAccessToken() lives in client.ts, NOT in this file,
|
|
192
|
-
* so it cannot be imported by consumers even via deep imports
|
|
193
|
-
*/
|
|
194
|
-
declare class TokenResponse {
|
|
195
|
-
/** Token type (usually "Bearer") */
|
|
196
|
-
readonly tokenType: string;
|
|
197
|
-
/** Seconds until token expires */
|
|
198
|
-
readonly expiresIn: number | null;
|
|
199
|
-
/** Absolute expiration time */
|
|
200
|
-
readonly expiresAt: Date | null;
|
|
201
|
-
/** OAuth scopes granted */
|
|
202
|
-
readonly scopes: string[];
|
|
203
|
-
/** Connection ID that provided this token */
|
|
204
|
-
readonly connectionId: string;
|
|
205
|
-
constructor(data: {
|
|
206
|
-
access_token: string;
|
|
207
|
-
token_type?: string;
|
|
208
|
-
expires_in?: number | null;
|
|
209
|
-
expires_at?: string | null;
|
|
210
|
-
scopes?: string[];
|
|
211
|
-
connection_id: string;
|
|
212
|
-
});
|
|
213
|
-
/**
|
|
214
|
-
* Parse expires_at from ISO string.
|
|
215
|
-
*/
|
|
216
|
-
private static parseExpiresAt;
|
|
217
|
-
/**
|
|
218
|
-
* Check if token is expired.
|
|
393
|
+
* List OAuth connections for this app.
|
|
219
394
|
*
|
|
220
|
-
*
|
|
221
|
-
*
|
|
222
|
-
* @returns True if token is expired or will expire within bufferSeconds.
|
|
395
|
+
* Returns paginated connection metadata (no tokens).
|
|
396
|
+
* Useful for discovering which services a user has connected.
|
|
223
397
|
*/
|
|
224
|
-
|
|
398
|
+
listConnections(options?: ListConnectionsOptions): Promise<ConnectionListResult>;
|
|
225
399
|
/**
|
|
226
|
-
*
|
|
400
|
+
* Create a Connect session for initiating OAuth flows.
|
|
227
401
|
*
|
|
228
|
-
*
|
|
229
|
-
* Default 5 minutes (300 seconds).
|
|
230
|
-
* @returns True if token will expire within bufferSeconds.
|
|
402
|
+
* Returns a URL the user can open in their browser to authorize access.
|
|
231
403
|
*/
|
|
232
|
-
|
|
404
|
+
createConnectSession(options: CreateConnectSessionOptions): Promise<ConnectSession>;
|
|
233
405
|
/**
|
|
234
|
-
*
|
|
235
|
-
|
|
236
|
-
toJSON(): Record<string, unknown>;
|
|
237
|
-
/**
|
|
238
|
-
* Custom string representation — EXCLUDES access_token for security.
|
|
406
|
+
* Close HTTP clients and release resources.
|
|
407
|
+
* Waits for any pending audit tasks before closing.
|
|
239
408
|
*/
|
|
240
|
-
|
|
241
|
-
}
|
|
242
|
-
/**
|
|
243
|
-
* Audit log entry for an API call to a provider.
|
|
244
|
-
*
|
|
245
|
-
* This is sent to the backend audit endpoint.
|
|
246
|
-
*/
|
|
247
|
-
declare class APICallAuditLog {
|
|
248
|
-
readonly connectionId: string;
|
|
249
|
-
readonly providerId: string;
|
|
250
|
-
readonly method: string;
|
|
251
|
-
readonly url: string;
|
|
252
|
-
readonly requestHeaders: Record<string, string> | null;
|
|
253
|
-
readonly requestBody: unknown | null;
|
|
254
|
-
readonly responseStatus: number;
|
|
255
|
-
readonly responseHeaders: Record<string, string> | null;
|
|
256
|
-
readonly responseBody: unknown | null;
|
|
257
|
-
readonly latencyMs: number;
|
|
258
|
-
/** Client-side timestamp (excluded from sanitize() output, like Python SDK) */
|
|
259
|
-
readonly timestamp: Date;
|
|
260
|
-
readonly reason: string | null;
|
|
261
|
-
/** Execution run ID for actor tracking */
|
|
262
|
-
readonly runId: string | null;
|
|
263
|
-
/** Conversation thread ID for actor tracking */
|
|
264
|
-
readonly threadId: string | null;
|
|
265
|
-
/** Tool invocation ID for actor tracking */
|
|
266
|
-
readonly toolCallId: string | null;
|
|
267
|
-
constructor(data: {
|
|
268
|
-
connectionId: string;
|
|
269
|
-
providerId: string;
|
|
270
|
-
method: string;
|
|
271
|
-
url: string;
|
|
272
|
-
requestHeaders?: Record<string, string> | null;
|
|
273
|
-
requestBody?: unknown | null;
|
|
274
|
-
responseStatus: number;
|
|
275
|
-
responseHeaders?: Record<string, string> | null;
|
|
276
|
-
responseBody?: unknown | null;
|
|
277
|
-
latencyMs: number;
|
|
278
|
-
reason?: string | null;
|
|
279
|
-
runId?: string | null;
|
|
280
|
-
threadId?: string | null;
|
|
281
|
-
toolCallId?: string | null;
|
|
282
|
-
});
|
|
409
|
+
close(): Promise<void>;
|
|
283
410
|
/**
|
|
284
|
-
*
|
|
285
|
-
*
|
|
286
|
-
* Removes Authorization headers, cookies, etc.
|
|
411
|
+
* Async dispose support for `await using vault = new AlterVault(...)`.
|
|
412
|
+
* Requires TypeScript 5.2+ and Node.js 18+.
|
|
287
413
|
*/
|
|
288
|
-
|
|
289
|
-
private filterSensitiveHeaders;
|
|
414
|
+
[Symbol.asyncDispose](): Promise<void>;
|
|
290
415
|
}
|
|
291
416
|
|
|
292
417
|
/**
|
|
@@ -321,7 +446,7 @@ declare class PolicyViolationError extends TokenRetrievalError {
|
|
|
321
446
|
/**
|
|
322
447
|
* Raised when OAuth connection not found.
|
|
323
448
|
*
|
|
324
|
-
* This indicates no connection exists for the given
|
|
449
|
+
* This indicates no connection exists for the given connection_id.
|
|
325
450
|
*/
|
|
326
451
|
declare class ConnectionNotFoundError extends TokenRetrievalError {
|
|
327
452
|
constructor(message: string, details?: Record<string, unknown>);
|
|
@@ -368,4 +493,4 @@ declare class TimeoutError extends NetworkError {
|
|
|
368
493
|
constructor(message: string, details?: Record<string, unknown>);
|
|
369
494
|
}
|
|
370
495
|
|
|
371
|
-
export { APICallAuditLog, AlterSDKError, AlterVault, type AlterVaultOptions, ConnectionNotFoundError, HttpMethod, NetworkError, PolicyViolationError, Provider, ProviderAPIError, type RequestOptions, TimeoutError, TokenExpiredError, TokenResponse, TokenRetrievalError };
|
|
496
|
+
export { APICallAuditLog, ActorType, AlterSDKError, AlterVault, type AlterVaultOptions, ConnectSession, ConnectionInfo, ConnectionListResult, ConnectionNotFoundError, type CreateConnectSessionOptions, HttpMethod, type ListConnectionsOptions, NetworkError, PolicyViolationError, Provider, ProviderAPIError, type RequestOptions, TimeoutError, TokenExpiredError, TokenResponse, TokenRetrievalError };
|