@axonflow/sdk 1.4.2 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/client.d.ts +246 -1
- package/dist/cjs/client.d.ts.map +1 -1
- package/dist/cjs/client.js +452 -0
- package/dist/cjs/client.js.map +1 -1
- package/dist/cjs/index.d.ts +1 -0
- package/dist/cjs/index.d.ts.map +1 -1
- package/dist/cjs/index.js.map +1 -1
- package/dist/cjs/types/index.d.ts +1 -0
- package/dist/cjs/types/index.d.ts.map +1 -1
- package/dist/cjs/types/index.js +1 -0
- package/dist/cjs/types/index.js.map +1 -1
- package/dist/cjs/types/policies.d.ts +351 -0
- package/dist/cjs/types/policies.d.ts.map +1 -0
- package/dist/cjs/types/policies.js +7 -0
- package/dist/cjs/types/policies.js.map +1 -0
- package/dist/esm/client.d.ts +246 -1
- package/dist/esm/client.d.ts.map +1 -1
- package/dist/esm/client.js +452 -0
- package/dist/esm/client.js.map +1 -1
- package/dist/esm/index.d.ts +1 -0
- package/dist/esm/index.d.ts.map +1 -1
- package/dist/esm/index.js.map +1 -1
- package/dist/esm/types/index.d.ts +1 -0
- package/dist/esm/types/index.d.ts.map +1 -1
- package/dist/esm/types/index.js +1 -0
- package/dist/esm/types/index.js.map +1 -1
- package/dist/esm/types/policies.d.ts +351 -0
- package/dist/esm/types/policies.d.ts.map +1 -0
- package/dist/esm/types/policies.js +6 -0
- package/dist/esm/types/policies.js.map +1 -0
- package/package.json +1 -1
|
@@ -0,0 +1,351 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Policy CRUD types for AxonFlow SDK
|
|
3
|
+
* Part of Unified Policy Architecture v2.0.0
|
|
4
|
+
*/
|
|
5
|
+
/**
|
|
6
|
+
* Policy categories for organization and filtering
|
|
7
|
+
*/
|
|
8
|
+
export type PolicyCategory = 'security-sqli' | 'security-admin' | 'pii-global' | 'pii-us' | 'pii-eu' | 'pii-india' | 'dynamic-risk' | 'dynamic-compliance' | 'dynamic-security' | 'dynamic-cost' | 'dynamic-access' | 'custom';
|
|
9
|
+
/**
|
|
10
|
+
* Policy tiers determine where policies apply
|
|
11
|
+
* - system: Platform-wide policies (read-only, managed by AxonFlow)
|
|
12
|
+
* - organization: Organization-specific policies (Enterprise)
|
|
13
|
+
* - tenant: Tenant-specific policies
|
|
14
|
+
*/
|
|
15
|
+
export type PolicyTier = 'system' | 'organization' | 'tenant';
|
|
16
|
+
/**
|
|
17
|
+
* Override action for policy overrides
|
|
18
|
+
*/
|
|
19
|
+
export type OverrideAction = 'block' | 'warn' | 'log' | 'redact';
|
|
20
|
+
/**
|
|
21
|
+
* Action to take when policy matches
|
|
22
|
+
*/
|
|
23
|
+
export type PolicyAction = 'block' | 'warn' | 'log' | 'redact' | 'allow';
|
|
24
|
+
/**
|
|
25
|
+
* Policy severity levels
|
|
26
|
+
*/
|
|
27
|
+
export type PolicySeverity = 'critical' | 'high' | 'medium' | 'low';
|
|
28
|
+
/**
|
|
29
|
+
* Static policy definition
|
|
30
|
+
*/
|
|
31
|
+
export interface StaticPolicy {
|
|
32
|
+
/** Unique policy identifier */
|
|
33
|
+
id: string;
|
|
34
|
+
/** Human-readable policy name */
|
|
35
|
+
name: string;
|
|
36
|
+
/** Policy description */
|
|
37
|
+
description?: string;
|
|
38
|
+
/** Policy category for grouping and filtering */
|
|
39
|
+
category: PolicyCategory;
|
|
40
|
+
/** Policy tier (system, organization, tenant) */
|
|
41
|
+
tier: PolicyTier;
|
|
42
|
+
/** Regex pattern to match against input */
|
|
43
|
+
pattern: string;
|
|
44
|
+
/** Severity level (critical, high, medium, low) */
|
|
45
|
+
severity: PolicySeverity;
|
|
46
|
+
/** Whether the policy is enabled */
|
|
47
|
+
enabled: boolean;
|
|
48
|
+
/** Action to take when pattern matches */
|
|
49
|
+
action: PolicyAction;
|
|
50
|
+
/** Organization ID (for organization-tier policies) */
|
|
51
|
+
organizationId?: string;
|
|
52
|
+
/** Tenant ID (for tenant-tier policies) */
|
|
53
|
+
tenantId?: string;
|
|
54
|
+
/** Creation timestamp */
|
|
55
|
+
createdAt: string;
|
|
56
|
+
/** Last update timestamp */
|
|
57
|
+
updatedAt: string;
|
|
58
|
+
/** Version number for tracking changes */
|
|
59
|
+
version?: number;
|
|
60
|
+
/** Whether this policy has an active override */
|
|
61
|
+
hasOverride?: boolean;
|
|
62
|
+
/** Active override details */
|
|
63
|
+
override?: PolicyOverride;
|
|
64
|
+
}
|
|
65
|
+
/**
|
|
66
|
+
* Options for listing static policies
|
|
67
|
+
*/
|
|
68
|
+
export interface ListStaticPoliciesOptions {
|
|
69
|
+
/** Filter by category */
|
|
70
|
+
category?: PolicyCategory;
|
|
71
|
+
/** Filter by tier */
|
|
72
|
+
tier?: PolicyTier;
|
|
73
|
+
/** Filter by enabled status */
|
|
74
|
+
enabled?: boolean;
|
|
75
|
+
/** Maximum number of results to return */
|
|
76
|
+
limit?: number;
|
|
77
|
+
/** Offset for pagination */
|
|
78
|
+
offset?: number;
|
|
79
|
+
/** Sort field */
|
|
80
|
+
sortBy?: 'name' | 'severity' | 'category' | 'createdAt' | 'updatedAt';
|
|
81
|
+
/** Sort order */
|
|
82
|
+
sortOrder?: 'asc' | 'desc';
|
|
83
|
+
/** Search query for name/description */
|
|
84
|
+
search?: string;
|
|
85
|
+
}
|
|
86
|
+
/**
|
|
87
|
+
* Request to create a new static policy
|
|
88
|
+
*/
|
|
89
|
+
export interface CreateStaticPolicyRequest {
|
|
90
|
+
/** Human-readable policy name */
|
|
91
|
+
name: string;
|
|
92
|
+
/** Policy description */
|
|
93
|
+
description?: string;
|
|
94
|
+
/** Policy category */
|
|
95
|
+
category: PolicyCategory;
|
|
96
|
+
/** Policy tier (defaults to 'tenant' for custom policies) */
|
|
97
|
+
tier?: PolicyTier;
|
|
98
|
+
/** Regex pattern to match */
|
|
99
|
+
pattern: string;
|
|
100
|
+
/** Severity level (critical, high, medium, low) */
|
|
101
|
+
severity?: PolicySeverity;
|
|
102
|
+
/** Whether the policy is enabled */
|
|
103
|
+
enabled?: boolean;
|
|
104
|
+
/** Action to take when pattern matches */
|
|
105
|
+
action?: PolicyAction;
|
|
106
|
+
}
|
|
107
|
+
/**
|
|
108
|
+
* Request to update an existing static policy
|
|
109
|
+
*/
|
|
110
|
+
export interface UpdateStaticPolicyRequest {
|
|
111
|
+
/** Updated policy name */
|
|
112
|
+
name?: string;
|
|
113
|
+
/** Updated description */
|
|
114
|
+
description?: string;
|
|
115
|
+
/** Updated category */
|
|
116
|
+
category?: PolicyCategory;
|
|
117
|
+
/** Updated pattern */
|
|
118
|
+
pattern?: string;
|
|
119
|
+
/** Updated severity */
|
|
120
|
+
severity?: PolicySeverity;
|
|
121
|
+
/** Updated enabled status */
|
|
122
|
+
enabled?: boolean;
|
|
123
|
+
/** Updated action */
|
|
124
|
+
action?: PolicyAction;
|
|
125
|
+
}
|
|
126
|
+
/**
|
|
127
|
+
* Policy override configuration
|
|
128
|
+
*/
|
|
129
|
+
export interface PolicyOverride {
|
|
130
|
+
/** Policy ID this override applies to */
|
|
131
|
+
policyId: string;
|
|
132
|
+
/** Override action */
|
|
133
|
+
action: OverrideAction;
|
|
134
|
+
/** Reason for the override */
|
|
135
|
+
reason: string;
|
|
136
|
+
/** Who created the override */
|
|
137
|
+
createdBy?: string;
|
|
138
|
+
/** When the override was created */
|
|
139
|
+
createdAt: string;
|
|
140
|
+
/** When the override expires (optional) */
|
|
141
|
+
expiresAt?: string;
|
|
142
|
+
/** Whether the override is currently active */
|
|
143
|
+
active: boolean;
|
|
144
|
+
}
|
|
145
|
+
/**
|
|
146
|
+
* Request to create a policy override
|
|
147
|
+
*/
|
|
148
|
+
export interface CreatePolicyOverrideRequest {
|
|
149
|
+
/** Override action */
|
|
150
|
+
action: OverrideAction;
|
|
151
|
+
/** Reason for the override */
|
|
152
|
+
reason: string;
|
|
153
|
+
/** Optional expiration date (ISO 8601 format) */
|
|
154
|
+
expiresAt?: string;
|
|
155
|
+
}
|
|
156
|
+
/**
|
|
157
|
+
* Dynamic policy definition
|
|
158
|
+
*/
|
|
159
|
+
export interface DynamicPolicy {
|
|
160
|
+
/** Unique policy identifier */
|
|
161
|
+
id: string;
|
|
162
|
+
/** Human-readable policy name */
|
|
163
|
+
name: string;
|
|
164
|
+
/** Policy description */
|
|
165
|
+
description?: string;
|
|
166
|
+
/** Policy category */
|
|
167
|
+
category: PolicyCategory;
|
|
168
|
+
/** Policy tier */
|
|
169
|
+
tier: PolicyTier;
|
|
170
|
+
/** Whether the policy is enabled */
|
|
171
|
+
enabled: boolean;
|
|
172
|
+
/** Organization ID (for organization-tier policies) */
|
|
173
|
+
organizationId?: string;
|
|
174
|
+
/** Tenant ID (for tenant-tier policies) */
|
|
175
|
+
tenantId?: string;
|
|
176
|
+
/** Policy configuration/rules */
|
|
177
|
+
config: DynamicPolicyConfig;
|
|
178
|
+
/** Creation timestamp */
|
|
179
|
+
createdAt: string;
|
|
180
|
+
/** Last update timestamp */
|
|
181
|
+
updatedAt: string;
|
|
182
|
+
/** Version number */
|
|
183
|
+
version?: number;
|
|
184
|
+
}
|
|
185
|
+
/**
|
|
186
|
+
* Configuration for a dynamic policy
|
|
187
|
+
*/
|
|
188
|
+
export interface DynamicPolicyConfig {
|
|
189
|
+
/** Policy type (e.g., 'rate-limit', 'cost-control', 'access-control') */
|
|
190
|
+
type: string;
|
|
191
|
+
/** Type-specific rules */
|
|
192
|
+
rules: Record<string, unknown>;
|
|
193
|
+
/** Conditions for when the policy applies */
|
|
194
|
+
conditions?: DynamicPolicyCondition[];
|
|
195
|
+
/** Action to take when policy triggers */
|
|
196
|
+
action: PolicyAction;
|
|
197
|
+
/** Additional parameters */
|
|
198
|
+
parameters?: Record<string, unknown>;
|
|
199
|
+
}
|
|
200
|
+
/**
|
|
201
|
+
* Condition for dynamic policy evaluation
|
|
202
|
+
*/
|
|
203
|
+
export interface DynamicPolicyCondition {
|
|
204
|
+
/** Field to evaluate */
|
|
205
|
+
field: string;
|
|
206
|
+
/** Comparison operator */
|
|
207
|
+
operator: 'equals' | 'not_equals' | 'contains' | 'not_contains' | 'greater_than' | 'less_than' | 'in' | 'not_in' | 'regex';
|
|
208
|
+
/** Value to compare against */
|
|
209
|
+
value: unknown;
|
|
210
|
+
}
|
|
211
|
+
/**
|
|
212
|
+
* Options for listing dynamic policies
|
|
213
|
+
*/
|
|
214
|
+
export interface ListDynamicPoliciesOptions {
|
|
215
|
+
/** Filter by category */
|
|
216
|
+
category?: PolicyCategory;
|
|
217
|
+
/** Filter by tier */
|
|
218
|
+
tier?: PolicyTier;
|
|
219
|
+
/** Filter by enabled status */
|
|
220
|
+
enabled?: boolean;
|
|
221
|
+
/** Maximum number of results */
|
|
222
|
+
limit?: number;
|
|
223
|
+
/** Offset for pagination */
|
|
224
|
+
offset?: number;
|
|
225
|
+
/** Sort field */
|
|
226
|
+
sortBy?: 'name' | 'category' | 'createdAt' | 'updatedAt';
|
|
227
|
+
/** Sort order */
|
|
228
|
+
sortOrder?: 'asc' | 'desc';
|
|
229
|
+
/** Search query */
|
|
230
|
+
search?: string;
|
|
231
|
+
}
|
|
232
|
+
/**
|
|
233
|
+
* Request to create a dynamic policy
|
|
234
|
+
*/
|
|
235
|
+
export interface CreateDynamicPolicyRequest {
|
|
236
|
+
/** Policy name */
|
|
237
|
+
name: string;
|
|
238
|
+
/** Policy description */
|
|
239
|
+
description?: string;
|
|
240
|
+
/** Policy category */
|
|
241
|
+
category: PolicyCategory;
|
|
242
|
+
/** Policy configuration */
|
|
243
|
+
config: DynamicPolicyConfig;
|
|
244
|
+
/** Whether the policy is enabled */
|
|
245
|
+
enabled?: boolean;
|
|
246
|
+
}
|
|
247
|
+
/**
|
|
248
|
+
* Request to update a dynamic policy
|
|
249
|
+
*/
|
|
250
|
+
export interface UpdateDynamicPolicyRequest {
|
|
251
|
+
/** Updated name */
|
|
252
|
+
name?: string;
|
|
253
|
+
/** Updated description */
|
|
254
|
+
description?: string;
|
|
255
|
+
/** Updated category */
|
|
256
|
+
category?: PolicyCategory;
|
|
257
|
+
/** Updated configuration */
|
|
258
|
+
config?: DynamicPolicyConfig;
|
|
259
|
+
/** Updated enabled status */
|
|
260
|
+
enabled?: boolean;
|
|
261
|
+
}
|
|
262
|
+
/**
|
|
263
|
+
* Result of testing a regex pattern
|
|
264
|
+
*/
|
|
265
|
+
export interface TestPatternResult {
|
|
266
|
+
/** Whether the pattern is valid */
|
|
267
|
+
valid: boolean;
|
|
268
|
+
/** Error message if pattern is invalid */
|
|
269
|
+
error?: string;
|
|
270
|
+
/** The pattern that was tested */
|
|
271
|
+
pattern: string;
|
|
272
|
+
/** The inputs that were tested */
|
|
273
|
+
inputs: string[];
|
|
274
|
+
/** Match results for each input */
|
|
275
|
+
matches: TestPatternMatch[];
|
|
276
|
+
}
|
|
277
|
+
/**
|
|
278
|
+
* Individual pattern match result
|
|
279
|
+
*/
|
|
280
|
+
export interface TestPatternMatch {
|
|
281
|
+
/** The input that was tested */
|
|
282
|
+
input: string;
|
|
283
|
+
/** Whether the pattern matched */
|
|
284
|
+
matched: boolean;
|
|
285
|
+
/** Captured groups if any */
|
|
286
|
+
groups?: string[];
|
|
287
|
+
}
|
|
288
|
+
/**
|
|
289
|
+
* Policy version history entry
|
|
290
|
+
*/
|
|
291
|
+
export interface PolicyVersion {
|
|
292
|
+
/** Version number */
|
|
293
|
+
version: number;
|
|
294
|
+
/** Who made the change */
|
|
295
|
+
changedBy?: string;
|
|
296
|
+
/** When the change was made */
|
|
297
|
+
changedAt: string;
|
|
298
|
+
/** Type of change */
|
|
299
|
+
changeType: 'created' | 'updated' | 'enabled' | 'disabled' | 'deleted';
|
|
300
|
+
/** Description of changes */
|
|
301
|
+
changeDescription?: string;
|
|
302
|
+
/** Previous values (for updates) */
|
|
303
|
+
previousValues?: Record<string, unknown>;
|
|
304
|
+
/** New values */
|
|
305
|
+
newValues?: Record<string, unknown>;
|
|
306
|
+
}
|
|
307
|
+
/**
|
|
308
|
+
* Options for getting effective policies
|
|
309
|
+
*/
|
|
310
|
+
export interface EffectivePoliciesOptions {
|
|
311
|
+
/** Filter by category */
|
|
312
|
+
category?: PolicyCategory;
|
|
313
|
+
/** Include disabled policies */
|
|
314
|
+
includeDisabled?: boolean;
|
|
315
|
+
/** Include overridden policies */
|
|
316
|
+
includeOverridden?: boolean;
|
|
317
|
+
}
|
|
318
|
+
/**
|
|
319
|
+
* Response containing effective policies with tier inheritance applied
|
|
320
|
+
*/
|
|
321
|
+
export interface EffectivePoliciesResponse {
|
|
322
|
+
/** Effective policies after tier inheritance */
|
|
323
|
+
policies: StaticPolicy[] | DynamicPolicy[];
|
|
324
|
+
/** Inheritance chain information */
|
|
325
|
+
inheritance: {
|
|
326
|
+
/** System policies count */
|
|
327
|
+
systemPolicies: number;
|
|
328
|
+
/** Organization policies count */
|
|
329
|
+
organizationPolicies: number;
|
|
330
|
+
/** Tenant policies count */
|
|
331
|
+
tenantPolicies: number;
|
|
332
|
+
/** Overrides applied */
|
|
333
|
+
overridesApplied: number;
|
|
334
|
+
};
|
|
335
|
+
}
|
|
336
|
+
/**
|
|
337
|
+
* Paginated response wrapper
|
|
338
|
+
*/
|
|
339
|
+
export interface PaginatedResponse<T> {
|
|
340
|
+
/** Array of items */
|
|
341
|
+
items: T[];
|
|
342
|
+
/** Total number of items */
|
|
343
|
+
total: number;
|
|
344
|
+
/** Current page limit */
|
|
345
|
+
limit: number;
|
|
346
|
+
/** Current offset */
|
|
347
|
+
offset: number;
|
|
348
|
+
/** Whether there are more items */
|
|
349
|
+
hasMore: boolean;
|
|
350
|
+
}
|
|
351
|
+
//# sourceMappingURL=policies.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"policies.d.ts","sourceRoot":"","sources":["../../../src/types/policies.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAMH;;GAEG;AACH,MAAM,MAAM,cAAc,GACtB,eAAe,GACf,gBAAgB,GAChB,YAAY,GACZ,QAAQ,GACR,QAAQ,GACR,WAAW,GACX,cAAc,GACd,oBAAoB,GACpB,kBAAkB,GAClB,cAAc,GACd,gBAAgB,GAChB,QAAQ,CAAC;AAEb;;;;;GAKG;AACH,MAAM,MAAM,UAAU,GAAG,QAAQ,GAAG,cAAc,GAAG,QAAQ,CAAC;AAE9D;;GAEG;AACH,MAAM,MAAM,cAAc,GAAG,OAAO,GAAG,MAAM,GAAG,KAAK,GAAG,QAAQ,CAAC;AAEjE;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG,OAAO,GAAG,MAAM,GAAG,KAAK,GAAG,QAAQ,GAAG,OAAO,CAAC;AAEzE;;GAEG;AACH,MAAM,MAAM,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,QAAQ,GAAG,KAAK,CAAC;AAMpE;;GAEG;AACH,MAAM,WAAW,YAAY;IAC3B,+BAA+B;IAC/B,EAAE,EAAE,MAAM,CAAC;IACX,iCAAiC;IACjC,IAAI,EAAE,MAAM,CAAC;IACb,yBAAyB;IACzB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,iDAAiD;IACjD,QAAQ,EAAE,cAAc,CAAC;IACzB,iDAAiD;IACjD,IAAI,EAAE,UAAU,CAAC;IACjB,2CAA2C;IAC3C,OAAO,EAAE,MAAM,CAAC;IAChB,mDAAmD;IACnD,QAAQ,EAAE,cAAc,CAAC;IACzB,oCAAoC;IACpC,OAAO,EAAE,OAAO,CAAC;IACjB,0CAA0C;IAC1C,MAAM,EAAE,YAAY,CAAC;IACrB,uDAAuD;IACvD,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,2CAA2C;IAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,yBAAyB;IACzB,SAAS,EAAE,MAAM,CAAC;IAClB,4BAA4B;IAC5B,SAAS,EAAE,MAAM,CAAC;IAClB,0CAA0C;IAC1C,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,iDAAiD;IACjD,WAAW,CAAC,EAAE,OAAO,CAAC;IACtB,8BAA8B;IAC9B,QAAQ,CAAC,EAAE,cAAc,CAAC;CAC3B;AAED;;GAEG;AACH,MAAM,WAAW,yBAAyB;IACxC,yBAAyB;IACzB,QAAQ,CAAC,EAAE,cAAc,CAAC;IAC1B,qBAAqB;IACrB,IAAI,CAAC,EAAE,UAAU,CAAC;IAClB,+BAA+B;IAC/B,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,0CAA0C;IAC1C,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,4BAA4B;IAC5B,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,iBAAiB;IACjB,MAAM,CAAC,EAAE,MAAM,GAAG,UAAU,GAAG,UAAU,GAAG,WAAW,GAAG,WAAW,CAAC;IACtE,iBAAiB;IACjB,SAAS,CAAC,EAAE,KAAK,GAAG,MAAM,CAAC;IAC3B,wCAAwC;IACxC,MAAM,CAAC,EAAE,MAAM,CAAC;CACjB;AAED;;GAEG;AACH,MAAM,WAAW,yBAAyB;IACxC,iCAAiC;IACjC,IAAI,EAAE,MAAM,CAAC;IACb,yBAAyB;IACzB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,sBAAsB;IACtB,QAAQ,EAAE,cAAc,CAAC;IACzB,6DAA6D;IAC7D,IAAI,CAAC,EAAE,UAAU,CAAC;IAClB,6BAA6B;IAC7B,OAAO,EAAE,MAAM,CAAC;IAChB,mDAAmD;IACnD,QAAQ,CAAC,EAAE,cAAc,CAAC;IAC1B,oCAAoC;IACpC,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,0CAA0C;IAC1C,MAAM,CAAC,EAAE,YAAY,CAAC;CACvB;AAED;;GAEG;AACH,MAAM,WAAW,yBAAyB;IACxC,0BAA0B;IAC1B,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,0BAA0B;IAC1B,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,uBAAuB;IACvB,QAAQ,CAAC,EAAE,cAAc,CAAC;IAC1B,sBAAsB;IACtB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,uBAAuB;IACvB,QAAQ,CAAC,EAAE,cAAc,CAAC;IAC1B,6BAA6B;IAC7B,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,qBAAqB;IACrB,MAAM,CAAC,EAAE,YAAY,CAAC;CACvB;AAMD;;GAEG;AACH,MAAM,WAAW,cAAc;IAC7B,yCAAyC;IACzC,QAAQ,EAAE,MAAM,CAAC;IACjB,sBAAsB;IACtB,MAAM,EAAE,cAAc,CAAC;IACvB,8BAA8B;IAC9B,MAAM,EAAE,MAAM,CAAC;IACf,+BAA+B;IAC/B,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,oCAAoC;IACpC,SAAS,EAAE,MAAM,CAAC;IAClB,2CAA2C;IAC3C,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,+CAA+C;IAC/C,MAAM,EAAE,OAAO,CAAC;CACjB;AAED;;GAEG;AACH,MAAM,WAAW,2BAA2B;IAC1C,sBAAsB;IACtB,MAAM,EAAE,cAAc,CAAC;IACvB,8BAA8B;IAC9B,MAAM,EAAE,MAAM,CAAC;IACf,iDAAiD;IACjD,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB;AAMD;;GAEG;AACH,MAAM,WAAW,aAAa;IAC5B,+BAA+B;IAC/B,EAAE,EAAE,MAAM,CAAC;IACX,iCAAiC;IACjC,IAAI,EAAE,MAAM,CAAC;IACb,yBAAyB;IACzB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,sBAAsB;IACtB,QAAQ,EAAE,cAAc,CAAC;IACzB,kBAAkB;IAClB,IAAI,EAAE,UAAU,CAAC;IACjB,oCAAoC;IACpC,OAAO,EAAE,OAAO,CAAC;IACjB,uDAAuD;IACvD,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,2CAA2C;IAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,iCAAiC;IACjC,MAAM,EAAE,mBAAmB,CAAC;IAC5B,yBAAyB;IACzB,SAAS,EAAE,MAAM,CAAC;IAClB,4BAA4B;IAC5B,SAAS,EAAE,MAAM,CAAC;IAClB,qBAAqB;IACrB,OAAO,CAAC,EAAE,MAAM,CAAC;CAClB;AAED;;GAEG;AACH,MAAM,WAAW,mBAAmB;IAClC,yEAAyE;IACzE,IAAI,EAAE,MAAM,CAAC;IACb,0BAA0B;IAC1B,KAAK,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC/B,6CAA6C;IAC7C,UAAU,CAAC,EAAE,sBAAsB,EAAE,CAAC;IACtC,0CAA0C;IAC1C,MAAM,EAAE,YAAY,CAAC;IACrB,4BAA4B;IAC5B,UAAU,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CACtC;AAED;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACrC,wBAAwB;IACxB,KAAK,EAAE,MAAM,CAAC;IACd,0BAA0B;IAC1B,QAAQ,EACJ,QAAQ,GACR,YAAY,GACZ,UAAU,GACV,cAAc,GACd,cAAc,GACd,WAAW,GACX,IAAI,GACJ,QAAQ,GACR,OAAO,CAAC;IACZ,+BAA+B;IAC/B,KAAK,EAAE,OAAO,CAAC;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,0BAA0B;IACzC,yBAAyB;IACzB,QAAQ,CAAC,EAAE,cAAc,CAAC;IAC1B,qBAAqB;IACrB,IAAI,CAAC,EAAE,UAAU,CAAC;IAClB,+BAA+B;IAC/B,OAAO,CAAC,EAAE,OAAO,CAAC;IAClB,gCAAgC;IAChC,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,4BAA4B;IAC5B,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,iBAAiB;IACjB,MAAM,CAAC,EAAE,MAAM,GAAG,UAAU,GAAG,WAAW,GAAG,WAAW,CAAC;IACzD,iBAAiB;IACjB,SAAS,CAAC,EAAE,KAAK,GAAG,MAAM,CAAC;IAC3B,mBAAmB;IACnB,MAAM,CAAC,EAAE,MAAM,CAAC;CACjB;AAED;;GAEG;AACH,MAAM,WAAW,0BAA0B;IACzC,kBAAkB;IAClB,IAAI,EAAE,MAAM,CAAC;IACb,yBAAyB;IACzB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,sBAAsB;IACtB,QAAQ,EAAE,cAAc,CAAC;IACzB,2BAA2B;IAC3B,MAAM,EAAE,mBAAmB,CAAC;IAC5B,oCAAoC;IACpC,OAAO,CAAC,EAAE,OAAO,CAAC;CACnB;AAED;;GAEG;AACH,MAAM,WAAW,0BAA0B;IACzC,mBAAmB;IACnB,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,0BAA0B;IAC1B,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,uBAAuB;IACvB,QAAQ,CAAC,EAAE,cAAc,CAAC;IAC1B,4BAA4B;IAC5B,MAAM,CAAC,EAAE,mBAAmB,CAAC;IAC7B,6BAA6B;IAC7B,OAAO,CAAC,EAAE,OAAO,CAAC;CACnB;AAMD;;GAEG;AACH,MAAM,WAAW,iBAAiB;IAChC,mCAAmC;IACnC,KAAK,EAAE,OAAO,CAAC;IACf,0CAA0C;IAC1C,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,kCAAkC;IAClC,OAAO,EAAE,MAAM,CAAC;IAChB,kCAAkC;IAClC,MAAM,EAAE,MAAM,EAAE,CAAC;IACjB,mCAAmC;IACnC,OAAO,EAAE,gBAAgB,EAAE,CAAC;CAC7B;AAED;;GAEG;AACH,MAAM,WAAW,gBAAgB;IAC/B,gCAAgC;IAChC,KAAK,EAAE,MAAM,CAAC;IACd,kCAAkC;IAClC,OAAO,EAAE,OAAO,CAAC;IACjB,6BAA6B;IAC7B,MAAM,CAAC,EAAE,MAAM,EAAE,CAAC;CACnB;AAMD;;GAEG;AACH,MAAM,WAAW,aAAa;IAC5B,qBAAqB;IACrB,OAAO,EAAE,MAAM,CAAC;IAChB,0BAA0B;IAC1B,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,+BAA+B;IAC/B,SAAS,EAAE,MAAM,CAAC;IAClB,qBAAqB;IACrB,UAAU,EAAE,SAAS,GAAG,SAAS,GAAG,SAAS,GAAG,UAAU,GAAG,SAAS,CAAC;IACvE,6BAA6B;IAC7B,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B,oCAAoC;IACpC,cAAc,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACzC,iBAAiB;IACjB,SAAS,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CACrC;AAMD;;GAEG;AACH,MAAM,WAAW,wBAAwB;IACvC,yBAAyB;IACzB,QAAQ,CAAC,EAAE,cAAc,CAAC;IAC1B,gCAAgC;IAChC,eAAe,CAAC,EAAE,OAAO,CAAC;IAC1B,kCAAkC;IAClC,iBAAiB,CAAC,EAAE,OAAO,CAAC;CAC7B;AAED;;GAEG;AACH,MAAM,WAAW,yBAAyB;IACxC,gDAAgD;IAChD,QAAQ,EAAE,YAAY,EAAE,GAAG,aAAa,EAAE,CAAC;IAC3C,oCAAoC;IACpC,WAAW,EAAE;QACX,4BAA4B;QAC5B,cAAc,EAAE,MAAM,CAAC;QACvB,kCAAkC;QAClC,oBAAoB,EAAE,MAAM,CAAC;QAC7B,4BAA4B;QAC5B,cAAc,EAAE,MAAM,CAAC;QACvB,wBAAwB;QACxB,gBAAgB,EAAE,MAAM,CAAC;KAC1B,CAAC;CACH;AAMD;;GAEG;AACH,MAAM,WAAW,iBAAiB,CAAC,CAAC;IAClC,qBAAqB;IACrB,KAAK,EAAE,CAAC,EAAE,CAAC;IACX,4BAA4B;IAC5B,KAAK,EAAE,MAAM,CAAC;IACd,yBAAyB;IACzB,KAAK,EAAE,MAAM,CAAC;IACd,qBAAqB;IACrB,MAAM,EAAE,MAAM,CAAC;IACf,mCAAmC;IACnC,OAAO,EAAE,OAAO,CAAC;CAClB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"policies.js","sourceRoot":"","sources":["../../../src/types/policies.ts"],"names":[],"mappings":";AAAA;;;GAGG"}
|
package/dist/esm/client.d.ts
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { AxonFlowConfig, ConnectorMetadata, ConnectorInstallRequest, ConnectorResponse, PlanResponse, PlanExecutionResponse, PolicyApprovalResult, PolicyApprovalOptions, AuditResult, AuditOptions, ExecuteQueryOptions, ExecuteQueryResponse, HealthStatus } from './types';
|
|
1
|
+
import { AxonFlowConfig, ConnectorMetadata, ConnectorInstallRequest, ConnectorResponse, PlanResponse, PlanExecutionResponse, PolicyApprovalResult, PolicyApprovalOptions, AuditResult, AuditOptions, ExecuteQueryOptions, ExecuteQueryResponse, HealthStatus, StaticPolicy, DynamicPolicy, PolicyOverride, ListStaticPoliciesOptions, ListDynamicPoliciesOptions, CreateStaticPolicyRequest, UpdateStaticPolicyRequest, CreateDynamicPolicyRequest, UpdateDynamicPolicyRequest, CreatePolicyOverrideRequest, TestPatternResult, PolicyVersion, EffectivePoliciesOptions } from './types';
|
|
2
2
|
/**
|
|
3
3
|
* Main AxonFlow client for invisible AI governance
|
|
4
4
|
*/
|
|
@@ -213,5 +213,250 @@ export declare class AxonFlow {
|
|
|
213
213
|
* ```
|
|
214
214
|
*/
|
|
215
215
|
auditLLMCall(options: AuditOptions): Promise<AuditResult>;
|
|
216
|
+
/**
|
|
217
|
+
* Build authentication headers for API requests
|
|
218
|
+
*/
|
|
219
|
+
private buildAuthHeaders;
|
|
220
|
+
/**
|
|
221
|
+
* Generic HTTP request helper for policy APIs
|
|
222
|
+
*/
|
|
223
|
+
private policyRequest;
|
|
224
|
+
/**
|
|
225
|
+
* List all static policies with optional filtering.
|
|
226
|
+
*
|
|
227
|
+
* @param options - Filtering and pagination options
|
|
228
|
+
* @returns Array of static policies
|
|
229
|
+
*
|
|
230
|
+
* @example
|
|
231
|
+
* ```typescript
|
|
232
|
+
* // List all enabled SQL injection policies
|
|
233
|
+
* const policies = await axonflow.listStaticPolicies({
|
|
234
|
+
* category: 'security-sqli',
|
|
235
|
+
* enabled: true
|
|
236
|
+
* });
|
|
237
|
+
* ```
|
|
238
|
+
*/
|
|
239
|
+
listStaticPolicies(options?: ListStaticPoliciesOptions): Promise<StaticPolicy[]>;
|
|
240
|
+
/**
|
|
241
|
+
* Get a specific static policy by ID.
|
|
242
|
+
*
|
|
243
|
+
* @param id - Policy ID
|
|
244
|
+
* @returns The static policy
|
|
245
|
+
*
|
|
246
|
+
* @example
|
|
247
|
+
* ```typescript
|
|
248
|
+
* const policy = await axonflow.getStaticPolicy('pol_123');
|
|
249
|
+
* console.log(policy.name, policy.pattern);
|
|
250
|
+
* ```
|
|
251
|
+
*/
|
|
252
|
+
getStaticPolicy(id: string): Promise<StaticPolicy>;
|
|
253
|
+
/**
|
|
254
|
+
* Create a new static policy.
|
|
255
|
+
*
|
|
256
|
+
* @param policy - Policy creation request
|
|
257
|
+
* @returns The created policy
|
|
258
|
+
*
|
|
259
|
+
* @example
|
|
260
|
+
* ```typescript
|
|
261
|
+
* const policy = await axonflow.createStaticPolicy({
|
|
262
|
+
* name: 'Block Credit Card Numbers',
|
|
263
|
+
* category: 'pii-global',
|
|
264
|
+
* pattern: '\\b(?:\\d{4}[- ]?){3}\\d{4}\\b',
|
|
265
|
+
* severity: 8,
|
|
266
|
+
* action: 'block'
|
|
267
|
+
* });
|
|
268
|
+
* ```
|
|
269
|
+
*/
|
|
270
|
+
createStaticPolicy(policy: CreateStaticPolicyRequest): Promise<StaticPolicy>;
|
|
271
|
+
/**
|
|
272
|
+
* Update an existing static policy.
|
|
273
|
+
*
|
|
274
|
+
* @param id - Policy ID
|
|
275
|
+
* @param policy - Fields to update
|
|
276
|
+
* @returns The updated policy
|
|
277
|
+
*
|
|
278
|
+
* @example
|
|
279
|
+
* ```typescript
|
|
280
|
+
* const updated = await axonflow.updateStaticPolicy('pol_123', {
|
|
281
|
+
* severity: 10,
|
|
282
|
+
* description: 'Updated description'
|
|
283
|
+
* });
|
|
284
|
+
* ```
|
|
285
|
+
*/
|
|
286
|
+
updateStaticPolicy(id: string, policy: UpdateStaticPolicyRequest): Promise<StaticPolicy>;
|
|
287
|
+
/**
|
|
288
|
+
* Delete a static policy.
|
|
289
|
+
*
|
|
290
|
+
* @param id - Policy ID
|
|
291
|
+
*
|
|
292
|
+
* @example
|
|
293
|
+
* ```typescript
|
|
294
|
+
* await axonflow.deleteStaticPolicy('pol_123');
|
|
295
|
+
* ```
|
|
296
|
+
*/
|
|
297
|
+
deleteStaticPolicy(id: string): Promise<void>;
|
|
298
|
+
/**
|
|
299
|
+
* Toggle a static policy's enabled status.
|
|
300
|
+
*
|
|
301
|
+
* @param id - Policy ID
|
|
302
|
+
* @param enabled - Whether the policy should be enabled
|
|
303
|
+
* @returns The updated policy
|
|
304
|
+
*
|
|
305
|
+
* @example
|
|
306
|
+
* ```typescript
|
|
307
|
+
* // Disable a policy
|
|
308
|
+
* await axonflow.toggleStaticPolicy('pol_123', false);
|
|
309
|
+
* ```
|
|
310
|
+
*/
|
|
311
|
+
toggleStaticPolicy(id: string, enabled: boolean): Promise<StaticPolicy>;
|
|
312
|
+
/**
|
|
313
|
+
* Get effective static policies with tier inheritance applied.
|
|
314
|
+
* This returns the policies that would actually be enforced, taking into
|
|
315
|
+
* account system, organization, and tenant policies with proper inheritance.
|
|
316
|
+
*
|
|
317
|
+
* @param options - Filtering options
|
|
318
|
+
* @returns Array of effective policies
|
|
319
|
+
*
|
|
320
|
+
* @example
|
|
321
|
+
* ```typescript
|
|
322
|
+
* const effective = await axonflow.getEffectiveStaticPolicies({
|
|
323
|
+
* category: 'security-sqli'
|
|
324
|
+
* });
|
|
325
|
+
* ```
|
|
326
|
+
*/
|
|
327
|
+
getEffectiveStaticPolicies(options?: EffectivePoliciesOptions): Promise<StaticPolicy[]>;
|
|
328
|
+
/**
|
|
329
|
+
* Test a regex pattern against sample inputs.
|
|
330
|
+
* Use this to validate patterns before creating policies.
|
|
331
|
+
*
|
|
332
|
+
* @param pattern - Regex pattern to test
|
|
333
|
+
* @param testInputs - Array of strings to test against
|
|
334
|
+
* @returns Test results showing matches
|
|
335
|
+
*
|
|
336
|
+
* @example
|
|
337
|
+
* ```typescript
|
|
338
|
+
* const result = await axonflow.testPattern(
|
|
339
|
+
* '\\b\\d{3}-\\d{2}-\\d{4}\\b',
|
|
340
|
+
* ['My SSN is 123-45-6789', 'No SSN here', 'Another: 987-65-4321']
|
|
341
|
+
* );
|
|
342
|
+
* console.log(result.results); // Shows which inputs matched
|
|
343
|
+
* ```
|
|
344
|
+
*/
|
|
345
|
+
testPattern(pattern: string, testInputs: string[]): Promise<TestPatternResult>;
|
|
346
|
+
/**
|
|
347
|
+
* Get version history for a static policy.
|
|
348
|
+
*
|
|
349
|
+
* @param id - Policy ID
|
|
350
|
+
* @returns Array of version history entries
|
|
351
|
+
*
|
|
352
|
+
* @example
|
|
353
|
+
* ```typescript
|
|
354
|
+
* const versions = await axonflow.getStaticPolicyVersions('pol_123');
|
|
355
|
+
* versions.forEach(v => console.log(v.version, v.changeType, v.changedAt));
|
|
356
|
+
* ```
|
|
357
|
+
*/
|
|
358
|
+
getStaticPolicyVersions(id: string): Promise<PolicyVersion[]>;
|
|
359
|
+
/**
|
|
360
|
+
* Create an override for a static policy.
|
|
361
|
+
* Overrides allow changing how a system policy behaves at the organization level.
|
|
362
|
+
*
|
|
363
|
+
* @param policyId - ID of the policy to override
|
|
364
|
+
* @param override - Override configuration
|
|
365
|
+
* @returns The created override
|
|
366
|
+
*
|
|
367
|
+
* @example
|
|
368
|
+
* ```typescript
|
|
369
|
+
* // Change a blocking policy to warn-only
|
|
370
|
+
* const override = await axonflow.createPolicyOverride('pol_123', {
|
|
371
|
+
* action: 'warn',
|
|
372
|
+
* reason: 'Temporarily reducing strictness for migration',
|
|
373
|
+
* expiresAt: '2025-01-31T23:59:59Z'
|
|
374
|
+
* });
|
|
375
|
+
* ```
|
|
376
|
+
*/
|
|
377
|
+
createPolicyOverride(policyId: string, override: CreatePolicyOverrideRequest): Promise<PolicyOverride>;
|
|
378
|
+
/**
|
|
379
|
+
* Delete an override for a static policy.
|
|
380
|
+
* This restores the policy to its default behavior.
|
|
381
|
+
*
|
|
382
|
+
* @param policyId - ID of the policy whose override to delete
|
|
383
|
+
*
|
|
384
|
+
* @example
|
|
385
|
+
* ```typescript
|
|
386
|
+
* await axonflow.deletePolicyOverride('pol_123');
|
|
387
|
+
* ```
|
|
388
|
+
*/
|
|
389
|
+
deletePolicyOverride(policyId: string): Promise<void>;
|
|
390
|
+
/**
|
|
391
|
+
* List all dynamic policies with optional filtering.
|
|
392
|
+
*
|
|
393
|
+
* @param options - Filtering and pagination options
|
|
394
|
+
* @returns Array of dynamic policies
|
|
395
|
+
*
|
|
396
|
+
* @example
|
|
397
|
+
* ```typescript
|
|
398
|
+
* const policies = await axonflow.listDynamicPolicies({
|
|
399
|
+
* category: 'dynamic-cost',
|
|
400
|
+
* enabled: true
|
|
401
|
+
* });
|
|
402
|
+
* ```
|
|
403
|
+
*/
|
|
404
|
+
listDynamicPolicies(options?: ListDynamicPoliciesOptions): Promise<DynamicPolicy[]>;
|
|
405
|
+
/**
|
|
406
|
+
* Get a specific dynamic policy by ID.
|
|
407
|
+
*
|
|
408
|
+
* @param id - Policy ID
|
|
409
|
+
* @returns The dynamic policy
|
|
410
|
+
*/
|
|
411
|
+
getDynamicPolicy(id: string): Promise<DynamicPolicy>;
|
|
412
|
+
/**
|
|
413
|
+
* Create a new dynamic policy.
|
|
414
|
+
*
|
|
415
|
+
* @param policy - Policy creation request
|
|
416
|
+
* @returns The created policy
|
|
417
|
+
*
|
|
418
|
+
* @example
|
|
419
|
+
* ```typescript
|
|
420
|
+
* const policy = await axonflow.createDynamicPolicy({
|
|
421
|
+
* name: 'Rate Limit API Calls',
|
|
422
|
+
* category: 'dynamic-cost',
|
|
423
|
+
* config: {
|
|
424
|
+
* type: 'rate-limit',
|
|
425
|
+
* rules: { maxRequestsPerMinute: 100 },
|
|
426
|
+
* action: 'block'
|
|
427
|
+
* }
|
|
428
|
+
* });
|
|
429
|
+
* ```
|
|
430
|
+
*/
|
|
431
|
+
createDynamicPolicy(policy: CreateDynamicPolicyRequest): Promise<DynamicPolicy>;
|
|
432
|
+
/**
|
|
433
|
+
* Update an existing dynamic policy.
|
|
434
|
+
*
|
|
435
|
+
* @param id - Policy ID
|
|
436
|
+
* @param policy - Fields to update
|
|
437
|
+
* @returns The updated policy
|
|
438
|
+
*/
|
|
439
|
+
updateDynamicPolicy(id: string, policy: UpdateDynamicPolicyRequest): Promise<DynamicPolicy>;
|
|
440
|
+
/**
|
|
441
|
+
* Delete a dynamic policy.
|
|
442
|
+
*
|
|
443
|
+
* @param id - Policy ID
|
|
444
|
+
*/
|
|
445
|
+
deleteDynamicPolicy(id: string): Promise<void>;
|
|
446
|
+
/**
|
|
447
|
+
* Toggle a dynamic policy's enabled status.
|
|
448
|
+
*
|
|
449
|
+
* @param id - Policy ID
|
|
450
|
+
* @param enabled - Whether the policy should be enabled
|
|
451
|
+
* @returns The updated policy
|
|
452
|
+
*/
|
|
453
|
+
toggleDynamicPolicy(id: string, enabled: boolean): Promise<DynamicPolicy>;
|
|
454
|
+
/**
|
|
455
|
+
* Get effective dynamic policies with tier inheritance applied.
|
|
456
|
+
*
|
|
457
|
+
* @param options - Filtering options
|
|
458
|
+
* @returns Array of effective dynamic policies
|
|
459
|
+
*/
|
|
460
|
+
getEffectiveDynamicPolicies(options?: EffectivePoliciesOptions): Promise<DynamicPolicy[]>;
|
|
216
461
|
}
|
|
217
462
|
//# sourceMappingURL=client.d.ts.map
|
package/dist/esm/client.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,cAAc,EAId,iBAAiB,EACjB,uBAAuB,EACvB,iBAAiB,EACjB,YAAY,EACZ,qBAAqB,EACrB,oBAAoB,EACpB,qBAAqB,EACrB,WAAW,EACX,YAAY,EACZ,mBAAmB,EACnB,oBAAoB,EACpB,YAAY,EACb,MAAM,SAAS,CAAC;AAOjB;;GAEG;AACH,qBAAa,QAAQ;IACnB,OAAO,CAAC,MAAM,CAWZ;IACF,OAAO,CAAC,YAAY,CAAyB;gBAEjC,MAAM,EAAE,cAAc;IAsDlC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA6CG;IACG,OAAO,CAAC,CAAC,GAAG,GAAG,EAAE,MAAM,EAAE,MAAM,OAAO,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC;IA4D5D;;OAEG;YACW,cAAc;IAiB5B;;OAEG;YACW,aAAa;IAyE3B;;OAEG;YACW,QAAQ;IAYtB;;OAEG;IACH,OAAO,CAAC,eAAe;IAQvB;;OAEG;IACH,MAAM,CAAC,OAAO,CAAC,MAAM,GAAE,MAAmB,GAAG,QAAQ;IAarD;;;;;;;;;;;;OAYG;IACG,WAAW,IAAI,OAAO,CAAC,YAAY,CAAC;IA0C1C;;;;;;;;;;;;;;;;;;;;;;;;;OAyBG;IACG,YAAY,CAAC,OAAO,EAAE,mBAAmB,GAAG,OAAO,CAAC,oBAAoB,CAAC;IAwG/E;;OAEG;IACG,cAAc,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;IAqBpD;;OAEG;IACG,gBAAgB,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,IAAI,CAAC;IAiCvE;;OAEG;IACG,cAAc,CAClB,aAAa,EAAE,MAAM,EACrB,KAAK,EAAE,MAAM,EACb,MAAM,CAAC,EAAE,GAAG,GACX,OAAO,CAAC,iBAAiB,CAAC;IAkD7B;;;;;OAKG;IACG,YAAY,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC;IAyD7F;;;;OAIG;IACG,WAAW,CAAC,MAAM,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,qBAAqB,CAAC;IAkDrF;;OAEG;IACG,aAAa,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,qBAAqB,CAAC;IA+BnE;;;OAGG;IACG,QAAQ,CAAC,OAAO,EAAE,qBAAqB,GAAG,OAAO,CAAC,oBAAoB,CAAC;IAI7E;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAwCG;IACG,wBAAwB,CAAC,OAAO,EAAE,qBAAqB,GAAG,OAAO,CAAC,oBAAoB,CAAC;IAkF7F;;;;;;;;;;;;;;;;;;;;;OAqBG;IACG,YAAY,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,WAAW,CAAC;
|
|
1
|
+
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,cAAc,EAId,iBAAiB,EACjB,uBAAuB,EACvB,iBAAiB,EACjB,YAAY,EACZ,qBAAqB,EACrB,oBAAoB,EACpB,qBAAqB,EACrB,WAAW,EACX,YAAY,EACZ,mBAAmB,EACnB,oBAAoB,EACpB,YAAY,EAEZ,YAAY,EACZ,aAAa,EACb,cAAc,EACd,yBAAyB,EACzB,0BAA0B,EAC1B,yBAAyB,EACzB,yBAAyB,EACzB,0BAA0B,EAC1B,0BAA0B,EAC1B,2BAA2B,EAC3B,iBAAiB,EACjB,aAAa,EACb,wBAAwB,EACzB,MAAM,SAAS,CAAC;AAOjB;;GAEG;AACH,qBAAa,QAAQ;IACnB,OAAO,CAAC,MAAM,CAWZ;IACF,OAAO,CAAC,YAAY,CAAyB;gBAEjC,MAAM,EAAE,cAAc;IAsDlC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA6CG;IACG,OAAO,CAAC,CAAC,GAAG,GAAG,EAAE,MAAM,EAAE,MAAM,OAAO,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC;IA4D5D;;OAEG;YACW,cAAc;IAiB5B;;OAEG;YACW,aAAa;IAyE3B;;OAEG;YACW,QAAQ;IAYtB;;OAEG;IACH,OAAO,CAAC,eAAe;IAQvB;;OAEG;IACH,MAAM,CAAC,OAAO,CAAC,MAAM,GAAE,MAAmB,GAAG,QAAQ;IAarD;;;;;;;;;;;;OAYG;IACG,WAAW,IAAI,OAAO,CAAC,YAAY,CAAC;IA0C1C;;;;;;;;;;;;;;;;;;;;;;;;;OAyBG;IACG,YAAY,CAAC,OAAO,EAAE,mBAAmB,GAAG,OAAO,CAAC,oBAAoB,CAAC;IAwG/E;;OAEG;IACG,cAAc,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;IAqBpD;;OAEG;IACG,gBAAgB,CAAC,OAAO,EAAE,uBAAuB,GAAG,OAAO,CAAC,IAAI,CAAC;IAiCvE;;OAEG;IACG,cAAc,CAClB,aAAa,EAAE,MAAM,EACrB,KAAK,EAAE,MAAM,EACb,MAAM,CAAC,EAAE,GAAG,GACX,OAAO,CAAC,iBAAiB,CAAC;IAkD7B;;;;;OAKG;IACG,YAAY,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC;IAyD7F;;;;OAIG;IACG,WAAW,CAAC,MAAM,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,qBAAqB,CAAC;IAkDrF;;OAEG;IACG,aAAa,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,qBAAqB,CAAC;IA+BnE;;;OAGG;IACG,QAAQ,CAAC,OAAO,EAAE,qBAAqB,GAAG,OAAO,CAAC,oBAAoB,CAAC;IAI7E;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAwCG;IACG,wBAAwB,CAAC,OAAO,EAAE,qBAAqB,GAAG,OAAO,CAAC,oBAAoB,CAAC;IAkF7F;;;;;;;;;;;;;;;;;;;;;OAqBG;IACG,YAAY,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,WAAW,CAAC;IA0E/D;;OAEG;IACH,OAAO,CAAC,gBAAgB;IAwBxB;;OAEG;YACW,aAAa;IAgC3B;;;;;;;;;;;;;;OAcG;IACG,kBAAkB,CAAC,OAAO,CAAC,EAAE,yBAAyB,GAAG,OAAO,CAAC,YAAY,EAAE,CAAC;IAwBtF;;;;;;;;;;;OAWG;IACG,eAAe,CAAC,EAAE,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC;IAQxD;;;;;;;;;;;;;;;;OAgBG;IACG,kBAAkB,CAAC,MAAM,EAAE,yBAAyB,GAAG,OAAO,CAAC,YAAY,CAAC;IAclF;;;;;;;;;;;;;;OAcG;IACG,kBAAkB,CAAC,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE,yBAAyB,GAAG,OAAO,CAAC,YAAY,CAAC;IAQ9F;;;;;;;;;OASG;IACG,kBAAkB,CAAC,EAAE,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAQnD;;;;;;;;;;;;OAYG;IACG,kBAAkB,CAAC,EAAE,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,GAAG,OAAO,CAAC,YAAY,CAAC;IAQ7E;;;;;;;;;;;;;;OAcG;IACG,0BAA0B,CAAC,OAAO,CAAC,EAAE,wBAAwB,GAAG,OAAO,CAAC,YAAY,EAAE,CAAC;IAmB7F;;;;;;;;;;;;;;;;OAgBG;IACG,WAAW,CAAC,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,EAAE,GAAG,OAAO,CAAC,iBAAiB,CAAC;IAWpF;;;;;;;;;;;OAWG;IACG,uBAAuB,CAAC,EAAE,EAAE,MAAM,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;IAYnE;;;;;;;;;;;;;;;;;OAiBG;IACG,oBAAoB,CACxB,QAAQ,EAAE,MAAM,EAChB,QAAQ,EAAE,2BAA2B,GACpC,OAAO,CAAC,cAAc,CAAC;IAY1B;;;;;;;;;;OAUG;IACG,oBAAoB,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAY3D;;;;;;;;;;;;;OAaG;IACG,mBAAmB,CAAC,OAAO,CAAC,EAAE,0BAA0B,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;IAsBzF;;;;;OAKG;IACG,gBAAgB,CAAC,EAAE,EAAE,MAAM,GAAG,OAAO,CAAC,aAAa,CAAC;IAQ1D;;;;;;;;;;;;;;;;;;OAkBG;IACG,mBAAmB,CAAC,MAAM,EAAE,0BAA0B,GAAG,OAAO,CAAC,aAAa,CAAC;IAQrF;;;;;;OAMG;IACG,mBAAmB,CACvB,EAAE,EAAE,MAAM,EACV,MAAM,EAAE,0BAA0B,GACjC,OAAO,CAAC,aAAa,CAAC;IAQzB;;;;OAIG;IACG,mBAAmB,CAAC,EAAE,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAQpD;;;;;;OAMG;IACG,mBAAmB,CAAC,EAAE,EAAE,MAAM,EAAE,OAAO,EAAE,OAAO,GAAG,OAAO,CAAC,aAAa,CAAC;IAQ/E;;;;;OAKG;IACG,2BAA2B,CAAC,OAAO,CAAC,EAAE,wBAAwB,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;CAehG"}
|