@gaodefa/daocore 2026.5.29 → 2026.5.30
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/abort-DI3P6TIb.js +277 -0
- package/dist/abort.runtime-B6Z7lDEa.js +2 -0
- package/dist/abort.runtime.js +1 -1
- package/dist/account-inspect-BFz7X0TX.js +173 -0
- package/dist/accounts-BoYYrY7x.js +107 -0
- package/dist/accounts-Busq29zW.js +107 -0
- package/dist/accounts-CuvH2tuN.js +119 -0
- package/dist/accounts-DkIcqvf7.js +2 -0
- package/dist/acp-runtime-BA8lzXzf.js +26 -0
- package/dist/acp-spawn-DPz2aX3A.js +2 -0
- package/dist/acp-spawn-DvVCsWYV.js +1275 -0
- package/dist/acp-stateful-target-driver-DcC76aZW.js +89 -0
- package/dist/action-kill-D-dVisIX.js +33 -0
- package/dist/action-runtime-BEiqwxDD.js +469 -0
- package/dist/action-runtime-api-1LzcGjcX.js +2 -0
- package/dist/action-send-c3CnDuPg.js +39 -0
- package/dist/action-spawn-Dj4kwpWs.js +47 -0
- package/dist/actions-qLccmQBc.js +161 -0
- package/dist/actions.runtime-B5vYAgNi.js +5 -0
- package/dist/agent-command-D6Ds198G.js +1367 -0
- package/dist/agent-components.runtime-xquK0B3L.js +10 -0
- package/dist/agent-components.runtime.js +1 -1
- package/dist/agent-harness-runtime-Dq1fCBOM.js +180 -0
- package/dist/agent-harness-task-runtime-DvSEqFkD.js +140 -0
- package/dist/agent-lm5ZYOFy.js +3 -0
- package/dist/agent-runner-execution-Dbh2pDhQ.js +1713 -0
- package/dist/agent-runner-utils-Di3r2T1T.js +266 -0
- package/dist/agent-runner.runtime-BW90EcGW.js +3455 -0
- package/dist/agent-runner.runtime.js +1 -1
- package/dist/agent-runtime-BgIT5Ytc.js +229 -0
- package/dist/agent-via-gateway-DMMS8-hK.js +463 -0
- package/dist/agent-ylolD8-V.js +2 -0
- package/dist/api-BB4vXLtW.js +2 -0
- package/dist/api-CUhM3KNB.js +134 -0
- package/dist/api-CewRHSbT.js +6 -0
- package/dist/api-CfKjNJlW.js +2 -0
- package/dist/api-Rsnqui1u.js +3 -0
- package/dist/api-k7AvxwHr.js +639 -0
- package/dist/apply-DQ4TQNMA.js +54 -0
- package/dist/apply-S_75Py4Y.js +41 -0
- package/dist/approval-handler.runtime-Cthxrstu.js +130 -0
- package/dist/assistant-Cp9pGaBw.js +291 -0
- package/dist/attachment-normalize-5R0bLLOj.js +225 -0
- package/dist/attempt-execution-DuyyZYsU.js +558 -0
- package/dist/attempt-execution.runtime-DF2GPgNh.js +3 -0
- package/dist/attempt-execution.runtime.js +1 -1
- package/dist/attempt-execution.shared-CwdukA3t.js +38 -0
- package/dist/attempt.prompt-helpers-CUqKtIa5.js +475 -0
- package/dist/attempt.tool-run-context-BbN4_BYO.js +2094 -0
- package/dist/binding-routing-C6Ex2Blu.js +113 -0
- package/dist/binding-targets-BqREncSL.js +121 -0
- package/dist/bot-DGMEkaIJ.js +7894 -0
- package/dist/bot-deps-BltYjeMX.js +2 -0
- package/dist/bot-deps-XvGCor9f.js +747 -0
- package/dist/bot-message-context.runtime-kK-xvLV7.js +7 -0
- package/dist/bot-message-context.runtime.js +1 -1
- package/dist/bot-message-context.session.runtime-DpOIJUae.js +12 -0
- package/dist/bot-message-context.session.runtime.js +1 -1
- package/dist/bot-native-commands.delivery.runtime-D49p5Lc1.js +4 -0
- package/dist/bot-native-commands.delivery.runtime.js +1 -1
- package/dist/bot-native-commands.runtime-8XBdSpkQ.js +13 -0
- package/dist/bot-native-commands.runtime.js +1 -1
- package/dist/bridge-server-y_XGduPx.js +113 -0
- package/dist/browser-cli-B2jmmTT3.js +230 -0
- package/dist/browser-cli-actions-input-JQt5ZQcn.js +473 -0
- package/dist/browser-cli-actions-observe-CrfKh6AX.js +81 -0
- package/dist/browser-cli-debug-DQACWlvC.js +137 -0
- package/dist/browser-cli-inspect-DDnxx0Xw.js +104 -0
- package/dist/browser-cli-lEuOnZzs.js +2 -0
- package/dist/browser-cli-manage-DogmwtYt.js +443 -0
- package/dist/browser-cli-resize-BHuV71VZ.js +26 -0
- package/dist/browser-cli-shared-CidShgoF.js +50 -0
- package/dist/browser-cli-state-i8cCGbiQ.js +337 -0
- package/dist/browser-control-auth-CKfXdXWj.js +2 -0
- package/dist/browser-profiles-ATBTvUGh.js +2 -0
- package/dist/browser-runtime-KmCT6FuL.js +384 -0
- package/dist/build-DOOT6f62.js +257 -0
- package/dist/build-info.json +3 -3
- package/dist/bundled/boot-md/handler.js +2 -2
- package/dist/bundled/session-memory/handler.js +1 -1
- package/dist/canvas-host/a2ui/.bundle.hash +1 -1
- package/dist/capability-cli-DwvrwB-g.js +1782 -0
- package/dist/channel-B-wgK1bK.js +481 -0
- package/dist/channel-B1e_k1P0.js +867 -0
- package/dist/channel-BRDfa5tc.js +1777 -0
- package/dist/channel-BVEO1O4p.js +376 -0
- package/dist/channel-BYlO5l1d.js +508 -0
- package/dist/channel-Bl0sPoNx.js +653 -0
- package/dist/channel-C84xtDBy.js +1134 -0
- package/dist/channel-CLgKq4Ds.js +1556 -0
- package/dist/channel-CZT0qxLh.js +1249 -0
- package/dist/channel-CffBHWkb.js +955 -0
- package/dist/channel-D34ZJvVB.js +2126 -0
- package/dist/channel-DcdXLo_W.js +238 -0
- package/dist/channel-DnK5TrXV.js +362 -0
- package/dist/channel-Dzj4RHY2.js +740 -0
- package/dist/channel-OhZzLZCj.js +562 -0
- package/dist/channel-actions.runtime-Cdvhqc9s.js +265 -0
- package/dist/channel-actions.runtime.js +1 -1
- package/dist/channel-core-Dz9I_R4j.js +5 -0
- package/dist/channel-inbound-COGoV_aS.js +80 -0
- package/dist/channel-mP6HCIMr.js +1496 -0
- package/dist/channel-plugin-runtime-C0R46KeG.js +998 -0
- package/dist/channel-quGdgWel.js +808 -0
- package/dist/channel-runtime-FvPQoIF9.js +408 -0
- package/dist/channel.runtime-2vUz3gij.js +109 -0
- package/dist/channel.runtime-BZLDSNuQ.js +254 -0
- package/dist/channel.runtime-Bo5jO0Hj.js +4 -0
- package/dist/channel.runtime-CDgvrjM2.js +652 -0
- package/dist/channel.runtime-COf8SDFn.js +88 -0
- package/dist/channel.runtime-C_C1f8lu.js +733 -0
- package/dist/channel.runtime-CqPbsg8t.js +2528 -0
- package/dist/channel.runtime-DtV85Khx.js +1008 -0
- package/dist/channel.runtime-Spt1ukGW.js +21009 -0
- package/dist/channel.setup-Bc0LUQS1.js +1098 -0
- package/dist/channel.setup-ChTkj2hq.js +343 -0
- package/dist/channel.setup-CpMD9F8i.js +10 -0
- package/dist/chat-mUsjD5YN.js +2666 -0
- package/dist/chrome-u314zcbM.js +1503 -0
- package/dist/cli/run-main.js +5 -5
- package/dist/cli-CJMoqXrc.js +1341 -0
- package/dist/cli-compaction-qGYB7suI.js +347 -0
- package/dist/cli-metadata-BBJFpNU9.js +22 -0
- package/dist/cli-runner-C0kcts0I.js +540 -0
- package/dist/cli-runner-CTm8K6s8.js +2 -0
- package/dist/cli-runner.runtime-C8deL5FL.js +3 -0
- package/dist/cli-runner.runtime-DDAg1D0L.js +4 -0
- package/dist/cli-runner.runtime.js +1 -1
- package/dist/cli-startup-metadata.json +8 -8
- package/dist/client-CPxpgs4m.js +650 -0
- package/dist/client-adapter-CLlqOqfu.js +897 -0
- package/dist/client-factory-R7Rr2jwn.js +9 -0
- package/dist/command-auth-CkQP1buP.js +135 -0
- package/dist/command-handlers-CJEjFyMk.js +1609 -0
- package/dist/command-registry-BDgyOqDw.js +4 -0
- package/dist/command-registry-BVi5Jn1S.js +9 -0
- package/dist/command-registry-core-JCfsVRtz.js +110 -0
- package/dist/command-status.runtime-CM1JLzi6.js +90 -0
- package/dist/command-status.runtime.js +1 -1
- package/dist/commands-acp-C1-I78U6.js +74 -0
- package/dist/commands-compact.runtime-DOsNavwp.js +10 -0
- package/dist/commands-compact.runtime.js +1 -1
- package/dist/commands-handlers.runtime-BD1n2WGw.js +6154 -0
- package/dist/commands-handlers.runtime.js +1 -1
- package/dist/commands-status-DU_UTQz1.js +16 -0
- package/dist/commands-status-DejfTakp.js +3 -0
- package/dist/commands-status.runtime-DejfTakp.js +3 -0
- package/dist/commands-status.runtime.js +1 -1
- package/dist/commands-subagents-control.runtime-D7vo_2Y_.js +3 -0
- package/dist/commands-subagents-control.runtime-DGybTjJ6.js +2 -0
- package/dist/commands-subagents-control.runtime.js +1 -1
- package/dist/commands-system-prompt-BEBXAMea.js +2 -0
- package/dist/commands-system-prompt-gj3oQpQO.js +162 -0
- package/dist/commands.runtime-CgXX70IN.js +176 -0
- package/dist/commands.runtime.js +1 -1
- package/dist/commitments/runtime.js +1 -1
- package/dist/compact-C41XxMDt.js +480 -0
- package/dist/compact-DUVAF9EC.js +1141 -0
- package/dist/compact.runtime-COMRg6s3.js +12 -0
- package/dist/compact.runtime.js +1 -1
- package/dist/completion-cli-CmEYoB9a.js +315 -0
- package/dist/computer-use-BwJHu1QF.js +367 -0
- package/dist/config-ATBTvUGh.js +2 -0
- package/dist/config-DlNgjF8W.js +373 -0
- package/dist/config-mutations-tl_OqI6d.js +159 -0
- package/dist/context-engine-host-compat-BNPAIK9F.js +288 -0
- package/dist/context-engine-host-compat-C69CK7zS.js +2 -0
- package/dist/context-engine-lifecycle-iQ8f5a_-.js +1274 -0
- package/dist/control-auth-vVxyGKxY.js +114 -0
- package/dist/control-service-73nj79EW.js +145 -0
- package/dist/control-ui/assets/agents-DdWIz8Vk.js +1008 -0
- package/dist/control-ui/assets/channel-config-extras-C7ELhuDi.js +2 -0
- package/dist/control-ui/assets/channels-Bsoj-9BS.js +367 -0
- package/dist/control-ui/assets/cron-BRTEw1tT.js +1013 -0
- package/dist/control-ui/assets/debug-EKl_F8_L.js +97 -0
- package/dist/control-ui/assets/index-DSbSO7ys.js +7370 -0
- package/dist/control-ui/assets/instances-B1AoYwI5.js +57 -0
- package/dist/control-ui/assets/logs-BChOznzh.js +74 -0
- package/dist/control-ui/assets/nodes-5yebKh9k.js +436 -0
- package/dist/control-ui/assets/sessions-BlDYNThc.js +399 -0
- package/dist/control-ui/assets/skills-shared-CNFnf7KU.js +11 -0
- package/dist/control-ui/assets/skills-uxTDRmLx.js +314 -0
- package/dist/control-ui/index.html +1 -1
- package/dist/control-ui/sw.js +1 -1
- package/dist/conversation-binding-runtime-CmoTKcY1.js +4 -0
- package/dist/conversation-runtime-BxOHxuin.js +31 -0
- package/dist/core-D0Y2H55f.js +282 -0
- package/dist/core-api-BKlJUtDt.js +5 -0
- package/dist/core-api-_fiftUHn.js +2 -0
- package/dist/crestodian/crestodian.js +1 -1
- package/dist/crestodian/rescue-message.js +1 -1
- package/dist/crestodian-BJifoQiR.js +55 -0
- package/dist/daocore-tools-BMdF8RwK.js +11727 -0
- package/dist/delivery-e2ci_bcX.js +1002 -0
- package/dist/dialogue-BXayGhnz.js +37 -0
- package/dist/dir-fetch-tool-Cara5mZh.js +565 -0
- package/dist/dir-list-tool-CQ8Bo5Ez.js +100 -0
- package/dist/direct-dm-CPk6Qm9D.js +64 -0
- package/dist/directive-handling.fast-lane-BQ9aXqk8.js +68 -0
- package/dist/directive-handling.impl--a5AGurq.js +818 -0
- package/dist/directive-handling.impl-C4JqMwle.js +2 -0
- package/dist/directive-handling.model-selection-pyTYMIXn.js +122 -0
- package/dist/directive-handling.persist.runtime-B7vWT1r9.js +263 -0
- package/dist/directive-handling.persist.runtime.js +1 -1
- package/dist/dispatch-3Ru_eGq1.js +1640 -0
- package/dist/dispatch-acp-transcript.runtime-CYMP-5oE.js +40 -0
- package/dist/dispatch-acp-transcript.runtime.js +1 -1
- package/dist/dispatch-acp.runtime-BVCiklXk.js +18 -0
- package/dist/dispatch-acp.runtime.js +1 -1
- package/dist/doctor-B8mR3Sgr.js +2 -0
- package/dist/doctor-BJ6DuerV.js +6 -0
- package/dist/doctor-config-flow-BdOGs_zn.js +1741 -0
- package/dist/doctor-core-checks-CDf0stz-.js +2 -0
- package/dist/doctor-core-checks-Cpdnu2XI.js +573 -0
- package/dist/doctor-health-0qv_acBu.js +65 -0
- package/dist/doctor-health-contributions-Db1FQgFw.js +696 -0
- package/dist/doctor-lint-C1g4Llgl.js +94 -0
- package/dist/doctor-state-integrity-C8iXFLJ7.js +1231 -0
- package/dist/doctor-update-CsPu6p3d.js +58 -0
- package/dist/dynamic-tools-YQ0z0YKH.js +486 -0
- package/dist/embedded-backend-S0cahIZw.js +579 -0
- package/dist/embedded-gateway-stub.runtime-Cjw12ALm.js +12 -0
- package/dist/embedded-gateway-stub.runtime.js +1 -1
- package/dist/exec-approvals-ArHHjoE-.js +149 -0
- package/dist/extensionAPI.js +1 -1
- package/dist/extensions/active-memory/index.js +1 -1
- package/dist/extensions/admin-http-rpc/index.js +1 -1
- package/dist/extensions/browser/browser-bridge.js +1 -1
- package/dist/extensions/browser/browser-config.js +4 -4
- package/dist/extensions/browser/browser-control-auth.js +2 -2
- package/dist/extensions/browser/browser-doctor.js +2 -2
- package/dist/extensions/browser/browser-maintenance.js +1 -1
- package/dist/extensions/browser/browser-profiles.js +2 -2
- package/dist/extensions/browser/browser-runtime-api.js +11 -11
- package/dist/extensions/browser/cli-metadata.js +1 -1
- package/dist/extensions/browser/index.js +1 -1
- package/dist/extensions/browser/plugin-registration.js +1 -1
- package/dist/extensions/browser/register.runtime.js +4 -4
- package/dist/extensions/browser/runtime-api.js +13 -13
- package/dist/extensions/canvas/index.js +1 -1
- package/dist/extensions/clickclack/api.js +2 -2
- package/dist/extensions/clickclack/channel-plugin-api.js +1 -1
- package/dist/extensions/clickclack/runtime-api.js +2 -2
- package/dist/extensions/device-pair/api.js +1 -1
- package/dist/extensions/device-pair/pair-command-approve.js +1 -1
- package/dist/extensions/file-transfer/index.js +4 -4
- package/dist/extensions/imessage/api.js +2 -2
- package/dist/extensions/imessage/channel-plugin-api.js +1 -1
- package/dist/extensions/imessage/message-tool-api.d.ts +1 -1
- package/dist/extensions/imessage/runtime-api.js +3 -3
- package/dist/extensions/irc/api.js +2 -2
- package/dist/extensions/irc/channel-plugin-api.js +1 -1
- package/dist/extensions/llm-task/index.js +1 -1
- package/dist/extensions/mattermost/api.js +1 -1
- package/dist/extensions/mattermost/channel-plugin-api.js +1 -1
- package/dist/extensions/mattermost/channel-plugin-runtime.js +1 -1
- package/dist/extensions/mattermost/policy-api.js +1 -1
- package/dist/extensions/mattermost/runtime-api.js +2 -2
- package/dist/extensions/mattermost/slash-route-api.js +1 -1
- package/dist/extensions/memory-core/cli-metadata.js +1 -1
- package/dist/extensions/migrate-claude/apply.js +1 -1
- package/dist/extensions/migrate-claude/index.js +1 -1
- package/dist/extensions/migrate-claude/plan.js +1 -1
- package/dist/extensions/migrate-claude/provider.js +1 -1
- package/dist/extensions/migrate-claude/targets.js +1 -1
- package/dist/extensions/migrate-hermes/apply.js +1 -1
- package/dist/extensions/migrate-hermes/index.js +1 -1
- package/dist/extensions/migrate-hermes/model.js +1 -1
- package/dist/extensions/migrate-hermes/plan.js +1 -1
- package/dist/extensions/migrate-hermes/provider.js +1 -1
- package/dist/extensions/migrate-hermes/secrets.js +1 -1
- package/dist/extensions/migrate-hermes/targets.js +1 -1
- package/dist/extensions/policy/api.js +1 -1
- package/dist/extensions/policy/index.js +2 -2
- package/dist/extensions/signal/api.js +6 -6
- package/dist/extensions/signal/channel-plugin-api.js +1 -1
- package/dist/extensions/signal/reaction-runtime-api.js +1 -1
- package/dist/extensions/signal/runtime-api.js +7 -7
- package/dist/extensions/skill-workshop/api.js +1 -1
- package/dist/extensions/skill-workshop/index.js +2 -2
- package/dist/extensions/telegram/account-inspect-api.js +1 -1
- package/dist/extensions/telegram/api.js +11 -11
- package/dist/extensions/telegram/channel-plugin-api.js +2 -2
- package/dist/extensions/telegram/contract-api.js +3 -3
- package/dist/extensions/telegram/runtime-api.js +7 -7
- package/dist/extensions/telegram/security-audit-contract-api.js +1 -1
- package/dist/extensions/telegram/setup-plugin-api.js +1 -1
- package/dist/extensions/telegram/test-api.js +2 -2
- package/dist/extensions/webhooks/api.js +1 -1
- package/dist/extensions/webhooks/index.js +1 -1
- package/dist/extensions/xai/index.js +4 -4
- package/dist/extensions/xai/realtime-transcription-provider.js +1 -1
- package/dist/extensions/xai/speech-provider.js +1 -1
- package/dist/extensions/xai/test-api.js +1 -1
- package/dist/extensions/xai/tts.js +1 -1
- package/dist/extensions/xai/web-search.js +1 -1
- package/dist/extensions/xai/xai-oauth.js +1 -1
- package/dist/file-fetch-tool-DQpAtjX4.js +124 -0
- package/dist/file-write-tool-CkB0oYwe.js +127 -0
- package/dist/format-DUJUpMFQ.js +1145 -0
- package/dist/gateway-cli-CQo_E4Ka.js +435 -0
- package/dist/gateway-method-runtime-1QPgVJH7.js +21 -0
- package/dist/get-reply-DfUcsC-O.js +4689 -0
- package/dist/get-reply-from-config.runtime-C95MG73O.js +2 -0
- package/dist/get-reply-from-config.runtime.js +1 -1
- package/dist/graph-users-DPJe0fPs.js +1419 -0
- package/dist/group-access-DefaNJ6L.js +112 -0
- package/dist/handle-action.guild-admin-C1sy1kGJ.js +288 -0
- package/dist/harness-BgPRdmNK.js +61 -0
- package/dist/health-DFR9A1YV.js +4 -0
- package/dist/heartbeat-runner-BiYVPs25.js +5 -0
- package/dist/heartbeat-runner.runtime-Bmaq8WUA.js +4 -0
- package/dist/heartbeat-runner.runtime.js +1 -1
- package/dist/hooks-CNJDuJUm.js +534 -0
- package/dist/inbound-direct-dm-runtime-DFt58p71.js +2 -0
- package/dist/inbound-reply-dispatch-kgSDM8ax.js +148 -0
- package/dist/index.js +1 -1
- package/dist/init-B0zO_U4r.js +59 -0
- package/dist/inline-buttons-B6zgQW3J.js +40 -0
- package/dist/internal-events-C3Q5t6hg.js +90 -0
- package/dist/isolated-agent-CaSU5GCJ.js +2 -0
- package/dist/isolated-agent-CnsD2TmP.js +1118 -0
- package/dist/lifecycle-i3WZDaIn.js +571 -0
- package/dist/list.probe-g0rUiVXW.js +449 -0
- package/dist/list.status-command-DG3PrmeO.js +789 -0
- package/dist/llm-slug-generator-CHlf69FU.js +78 -0
- package/dist/llm-slug-generator.js +1 -1
- package/dist/local-dispatch.runtime-CDeHUp_A.js +9 -0
- package/dist/local-dispatch.runtime.js +1 -1
- package/dist/manager.runtime-BlLMPUTq.js +2714 -0
- package/dist/manager.runtime.js +1 -1
- package/dist/markdown-to-line-r_mBHMdy.js +811 -0
- package/dist/mcp-http-C5UPIJGR.js +555 -0
- package/dist/mcp-http-CTy9gpfA.js +2 -0
- package/dist/media-understanding-provider-BT6TOuVa.js +339 -0
- package/dist/message-actions-BdcjjwFt.js +145 -0
- package/dist/message-handler-B29Tj2p2.js +1715 -0
- package/dist/message-handler-BhHb1FHI.js +384 -0
- package/dist/message-handler.preflight-ouZ_-3o8.js +1125 -0
- package/dist/message-handler.process-CrYiBx_F.js +1484 -0
- package/dist/model-CLbtocQX.js +74 -0
- package/dist/model-selection-BG_vU9Kl.js +272 -0
- package/dist/models-4KERn3ya.js +104 -0
- package/dist/models-BCa-ipxi.js +2 -0
- package/dist/models-cli-DtpGXEsf.js +256 -0
- package/dist/monitor-B-egsvmI.js +1657 -0
- package/dist/monitor-BJX9Yv7k.js +2 -0
- package/dist/monitor-BPrIy3pV.js +715 -0
- package/dist/monitor-BWknZZ7N.js +4377 -0
- package/dist/monitor-C3y_PtI1.js +60 -0
- package/dist/monitor-DCzfdqE4.js +1370 -0
- package/dist/monitor-P24epSwE.js +2788 -0
- package/dist/monitor-auth-CEG_xldE.js +179 -0
- package/dist/monitor-jEePJbbS.js +834 -0
- package/dist/monitor-polling.runtime-BzlHK11u.js +883 -0
- package/dist/monitor-polling.runtime.js +1 -1
- package/dist/monitor-webhook.runtime-vFEhk_Zj.js +387 -0
- package/dist/monitor-webhook.runtime.js +1 -1
- package/dist/monitor.account-BUIfgWXg.js +5233 -0
- package/dist/monitor.runtime-Cp7W4fhb.js +2 -0
- package/dist/monitor.runtime.js +1 -1
- package/dist/monitor.webhook-DzrbeR4T.js +180 -0
- package/dist/node-cli-sessions-CLbI14UA.js +1228 -0
- package/dist/openai-http-BM9BIA_g.js +824 -0
- package/dist/openresponses-http-CNoW9kk8.js +1173 -0
- package/dist/operations-DT4bsxV6.js +805 -0
- package/dist/outbound-adapter-CZRUOgY0.js +543 -0
- package/dist/outbound-session-route-DneMsGNx.js +45 -0
- package/dist/outbound.runtime-CHuoKJJI.js +2 -0
- package/dist/outbound.runtime.js +1 -1
- package/dist/pi-embedded-1-rsueO_.js +3796 -0
- package/dist/pi-embedded-BRfDncVO.js +4 -0
- package/dist/pi-embedded.runtime-DEYoa6bW.js +4 -0
- package/dist/pi-embedded.runtime.js +1 -1
- package/dist/pi-tools-C0P3NgP5.js +2413 -0
- package/dist/plan-BQUkjBMY.js +81 -0
- package/dist/plan-CRO9_2_k.js +112 -0
- package/dist/plugin-BJCmWhnh.js +12396 -0
- package/dist/plugin-app-cache-key-CXAg0F7A.js +46 -0
- package/dist/plugin-enabled-D93Z9LSo.js +233 -0
- package/dist/plugin-registration-BBrTcZnf.js +88 -0
- package/dist/plugin-sdk/.boundary-entry-shims.stamp +1 -1
- package/dist/plugin-sdk/acp-runtime-backend.js +1 -1
- package/dist/plugin-sdk/acp-runtime.js +2 -2
- package/dist/plugin-sdk/agent-harness-runtime.js +6 -6
- package/dist/plugin-sdk/agent-harness-task-runtime.js +1 -1
- package/dist/plugin-sdk/agent-harness.js +7 -7
- package/dist/plugin-sdk/agent-runtime.js +2 -2
- package/dist/plugin-sdk/channel-core.js +2 -2
- package/dist/plugin-sdk/channel-inbound.js +2 -2
- package/dist/plugin-sdk/channel-test-helpers.js +1 -1
- package/dist/plugin-sdk/command-auth.js +1 -1
- package/dist/plugin-sdk/command-status-runtime.js +1 -1
- package/dist/plugin-sdk/compat.js +1 -1
- package/dist/plugin-sdk/conversation-binding-runtime.js +2 -2
- package/dist/plugin-sdk/conversation-runtime.js +3 -3
- package/dist/plugin-sdk/core.js +2 -2
- package/dist/plugin-sdk/direct-dm.js +1 -1
- package/dist/plugin-sdk/gateway-method-runtime.js +1 -1
- package/dist/plugin-sdk/health.js +2 -2
- package/dist/plugin-sdk/inbound-reply-dispatch.js +1 -1
- package/dist/plugin-sdk/index.js +1 -1
- package/dist/plugin-sdk/mattermost.js +1 -1
- package/dist/plugin-sdk/plugin-test-contracts.js +2 -2
- package/dist/plugin-sdk/provider-test-contracts.js +4 -4
- package/dist/plugin-sdk/reply-runtime.js +4 -4
- package/dist/plugin-sdk/testing.js +2 -2
- package/dist/plugin-sdk/zalouser.js +1 -1
- package/dist/plugin-service-DnZEPBEA.js +1229 -0
- package/dist/plugins/runtime/index.js +4 -4
- package/dist/policy-CMv5QMPG.js +138 -0
- package/dist/policy-CeoP4t9J.js +680 -0
- package/dist/prepare.runtime-DZ55JiTt.js +732 -0
- package/dist/prepare.runtime.js +1 -1
- package/dist/preview-warnings-O08PZRxu.js +392 -0
- package/dist/probe-C6w3bP8X.js +682 -0
- package/dist/probe-Cs1_X1NA.js +47 -0
- package/dist/probe-Cuee_jyM.js +2204 -0
- package/dist/probe-DZxCnDzn.js +2 -0
- package/dist/program-C2dT8VHB.js +131 -0
- package/dist/provider-C2_vSzYh.js +32 -0
- package/dist/provider-DSfTDQbj.js +152 -0
- package/dist/provider-U8hrm9h-.js +32 -0
- package/dist/provider-_v910H8y.js +8735 -0
- package/dist/provider-dispatcher-C3kmmIEC.js +22 -0
- package/dist/provider-dispatcher.runtime.js +1 -1
- package/dist/provider-session.runtime-Mg0fx5hH.js +9 -0
- package/dist/provider-session.runtime.js +1 -1
- package/dist/provider.runtime-pSTXuHrq.js +2 -0
- package/dist/provider.runtime.js +1 -1
- package/dist/public-surface-loader-09t4TTue.js +114 -0
- package/dist/pw-ai-DjNqHV3_.js +3029 -0
- package/dist/pw-role-snapshot-DoGefdv7.js +333 -0
- package/dist/reaction-level-C8Mqxizo.js +19 -0
- package/dist/reaction-runtime-api-DOP6xOsm.js +116 -0
- package/dist/realtime-transcription-provider-BTGEXXna.js +205 -0
- package/dist/register-CbZPpqI3.js +2178 -0
- package/dist/register.agent-DrBFuPKh.js +156 -0
- package/dist/register.crestodian-DwTbmaK8.js +24 -0
- package/dist/register.maintenance-BIeoYBub.js +83 -0
- package/dist/register.runtime-B5V9_Dwz.js +54 -0
- package/dist/register.subclis-CJE9ISZY.js +31 -0
- package/dist/register.subclis-YQsKas8N.js +3 -0
- package/dist/register.subclis-core-CjwdGeGU.js +273 -0
- package/dist/repair-sequencing-C0jrL5pw.js +640 -0
- package/dist/reply-delivery-B28mTIpb.js +196 -0
- package/dist/reply-runtime-BqQX7HHw.js +11 -0
- package/dist/reply.runtime-C95MG73O.js +2 -0
- package/dist/reply.runtime.js +1 -1
- package/dist/request-BqoMvXxH.js +54 -0
- package/dist/resolve-allowlist-hbKKd_kq.js +220 -0
- package/dist/result-fallback-classifier-BrORPoxj.js +79 -0
- package/dist/route-HHRgSzVy.js +469 -0
- package/dist/route-resolution-C7bafjVc.js +274 -0
- package/dist/routes-86XGeo7a.js +2 -0
- package/dist/routes-BhVGr9ie.js +3602 -0
- package/dist/run-Bb5QP5JV.js +1162 -0
- package/dist/run-attempt-CLi0wV7j.js +7704 -0
- package/dist/run-command-Be6GAxiW.js +2 -0
- package/dist/run-command-Ds4hr3iU.js +23 -0
- package/dist/run-embedded.runtime-wX9ORojX.js +4 -0
- package/dist/run-embedded.runtime.js +1 -1
- package/dist/run-execution-cli.runtime-BmNZVB2N.js +4 -0
- package/dist/run-execution-cli.runtime.js +1 -1
- package/dist/run-executor.runtime.js +1 -1
- package/dist/run-subagent-registry.runtime-Uq5sjftu.js +2 -0
- package/dist/run-subagent-registry.runtime.js +1 -1
- package/dist/runtime-BktLQ75j.js +1287 -0
- package/dist/runtime-C9XdR62_.js +438 -0
- package/dist/runtime-CTvWDPx9.js +6179 -0
- package/dist/runtime-api-BojB3MUw.js +21 -0
- package/dist/runtime-api-C92MlAwp.js +13 -0
- package/dist/runtime-api-CFNZE9Xt.js +13 -0
- package/dist/runtime-api-Cimpgm5_.js +3 -0
- package/dist/runtime-api-D8qG_lUm.js +17 -0
- package/dist/runtime-api-DMDMnQEG.js +4 -0
- package/dist/runtime-api-DupQdIlE.js +24 -0
- package/dist/runtime-api.actions-B8i3elqu.js +3 -0
- package/dist/runtime-api.monitor-BntFzf_M.js +6 -0
- package/dist/runtime-api.send-CPlmi1jc.js +4 -0
- package/dist/runtime-api.threads-D-H_r_Nl.js +2 -0
- package/dist/runtime-channel-BGhTxnXZ.js +150 -0
- package/dist/runtime-channel-CPFxNapZ.js +2 -0
- package/dist/runtime-embedded-pi.runtime-BjnMTurB.js +2 -0
- package/dist/runtime-embedded-pi.runtime.js +1 -1
- package/dist/sanitize-outbound-BMUv1NeS.js +127 -0
- package/dist/sdk-setup-tools-Do3DkQi_.js +8 -0
- package/dist/secrets-B8YVPHhk.js +113 -0
- package/dist/security-audit-7Gg_nL4o.js +122 -0
- package/dist/security-audit-Bk3CREj-.js +118 -0
- package/dist/security-audit.runtime-BmSJrdeq.js +2 -0
- package/dist/security-audit.runtime.js +1 -1
- package/dist/selection-BFGde9-_.js +3 -0
- package/dist/selection-DrLFlbgG.js +16157 -0
- package/dist/send-4dLa-BQo.js +1631 -0
- package/dist/send-CV6gCwYP.js +192 -0
- package/dist/send-aGiK3Efu.js +143 -0
- package/dist/send-dB3CehAN.js +2 -0
- package/dist/send.components-BcG9BlkC.js +2 -0
- package/dist/send.components-rLjDlfYU.js +500 -0
- package/dist/send.runtime-D20k2MSr.js +2 -0
- package/dist/send.runtime.js +1 -1
- package/dist/server-BTRx_U1s.js +73 -0
- package/dist/server-CY0ymhBg.js +24 -0
- package/dist/server-close.runtime.js +1 -1
- package/dist/server-context-BxGT8wbK.js +955 -0
- package/dist/server-context-DYlbhAaT.js +2 -0
- package/dist/server-cron-BB_15lcP.js +2 -0
- package/dist/server-cron-CfyJX_a4.js +2989 -0
- package/dist/server-methods-Ck2ab6TC.js +16494 -0
- package/dist/server-node-events-BdRizF-5.js +596 -0
- package/dist/server-plugin-bootstrap-CPUr8NFE.js +70 -0
- package/dist/server-plugins-__5AxjzH.js +432 -0
- package/dist/server-reload-handlers-BMl9Fx9b.js +714 -0
- package/dist/server-restart-sentinel-D11M_ZsH.js +747 -0
- package/dist/server-restart-sentinel-DGptQ27c.js +2 -0
- package/dist/server-runtime-services-BwtLs-8I.js +2 -0
- package/dist/server-runtime-services-aJydixRu.js +267 -0
- package/dist/server-startup-plugins-m_P3gY4m.js +113 -0
- package/dist/server-startup-post-attach-DuXQ1AXL.js +716 -0
- package/dist/server-ws-runtime-mXmxB1W8.js +349 -0
- package/dist/server.impl-fuV8aKSP.js +2586 -0
- package/dist/service-a8cTFka4.js +1446 -0
- package/dist/session-binding-BIycxo9u.js +2 -0
- package/dist/session-binding-xHwQr9vM.js +219 -0
- package/dist/session-kill-http-DiUZhcoN.js +121 -0
- package/dist/session-reset-service-DkepDoob.js +625 -0
- package/dist/session-route-Ba5u7ecb.js +93 -0
- package/dist/session-status.runtime-Cb1X69Rl.js +2 -0
- package/dist/session-status.runtime.js +1 -1
- package/dist/session-subagent-reactivation.runtime-rbqmto4G.js +2 -0
- package/dist/session-subagent-reactivation.runtime.js +1 -1
- package/dist/session-tab-registry-DSKOoJta.js +521 -0
- package/dist/sessions-history-http-CWP88I_C.js +430 -0
- package/dist/sessions.runtime-1q1OwLn3.js +2 -0
- package/dist/sessions.runtime.js +1 -1
- package/dist/setup-api-DtrOOYeP.js +29 -0
- package/dist/setup-core-DMrJS6LP.js +174 -0
- package/dist/setup-surface-BFPNu1qA.js +405 -0
- package/dist/setup-surface-CedShqhO.js +288 -0
- package/dist/setup-surface-DLOBH1Vf.js +320 -0
- package/dist/setup-surface-MhCeEWSj.js +221 -0
- package/dist/shared-DamL-e8D.js +121 -0
- package/dist/shared-client-B48JoAsz.js +2 -0
- package/dist/shared-client-BoSiDnUo.js +629 -0
- package/dist/side-question-DQoQ_ETb.js +683 -0
- package/dist/skill-tool-dispatch.runtime-CWLloYA8.js +143 -0
- package/dist/skill-tool-dispatch.runtime.js +1 -1
- package/dist/slash-state-DrrWJQfv.js +2166 -0
- package/dist/speech-provider-8Hx1uw41.js +184 -0
- package/dist/src-BbUYOPwU.js +4256 -0
- package/dist/startup-context-opAJAamX.js +313 -0
- package/dist/status-subagents.runtime-DSo7ZK_Z.js +18 -0
- package/dist/status-subagents.runtime.js +1 -1
- package/dist/status-text-AyPuDzrO.js +296 -0
- package/dist/sticker-cache-91Tp8mLP.js +206 -0
- package/dist/sticker-vision.runtime-DjleFXi5.js +17 -0
- package/dist/sticker-vision.runtime.js +1 -1
- package/dist/subagent-announce-delivery-DS_2W9oZ.js +958 -0
- package/dist/subagent-announce-hatA_PZ2.js +354 -0
- package/dist/subagent-control-IyFIvc7T.js +508 -0
- package/dist/subagent-hooks-BCj5eB0Z.js +2 -0
- package/dist/subagent-hooks-BWjTBkox.js +146 -0
- package/dist/subagent-hooks-CdGLK9_3.js +230 -0
- package/dist/subagent-hooks-EH0tBkw9.js +2 -0
- package/dist/subagent-hooks-api-BhYaXQJV.js +23 -0
- package/dist/subagent-hooks-api-uGsV8Xn5.js +22 -0
- package/dist/subagent-hooks-api-wfJFKIPx.js +23 -0
- package/dist/subagent-hooks-l8Xd94dt.js +2 -0
- package/dist/subagent-hooks-m2eHUO_d.js +116 -0
- package/dist/subagent-orphan-recovery-Bq9zvX3L.js +352 -0
- package/dist/subagent-registry-Bcb3zy6b.js +3 -0
- package/dist/subagent-registry-CoZNTFx-.js +2351 -0
- package/dist/subagent-registry.runtime.js +1 -1
- package/dist/subagent-session-cleanup--00EjDLe.js +525 -0
- package/dist/subagent-spawn-ClJJkz3D.js +1164 -0
- package/dist/target-id-BsZLiF3x.js +107 -0
- package/dist/targets-CQMe4AZP.js +44 -0
- package/dist/targets-SmL1AU-H.js +19 -0
- package/dist/targets-Y-roiA47.js +19 -0
- package/dist/task-registry-control.runtime.js +1 -1
- package/dist/telegram/token.js +1 -1
- package/dist/testing-B5hNJDuF.js +267 -0
- package/dist/thread-bindings-BD3eE0kK.js +232 -0
- package/dist/thread-bindings-C9NNiv8K.js +571 -0
- package/dist/thread-bindings-Dl4PN1vZ.js +228 -0
- package/dist/thread-bindings-uK1LLAwy.js +8 -0
- package/dist/thread-bindings.discord-api-BHNEUbnk.js +187 -0
- package/dist/thread-bindings.manager-B0LXiH3F.js +2 -0
- package/dist/thread-bindings.manager-BTlH4XMG.js +536 -0
- package/dist/thread-lifecycle-DG8uyPHd.js +1614 -0
- package/dist/token-BbGCANnE.js +134 -0
- package/dist/tool-actions.runtime-oUUrD8HB.js +534 -0
- package/dist/tool-actions.runtime.js +1 -1
- package/dist/tool-bqg-_vYv.js +139 -0
- package/dist/tool-resolution-CSZsa3kP.js +149 -0
- package/dist/tools-effective-inventory-0CqFp-vq.js +204 -0
- package/dist/tools-invoke-http-DhYHY0Yh.js +67 -0
- package/dist/tools-invoke-shared-CbVJJUj7.js +200 -0
- package/dist/tts-C2qD-ad6.js +66 -0
- package/dist/tui-CzGY254f.js +4709 -0
- package/dist/tui-backend-fzoeoSN0.js +256 -0
- package/dist/tui-cli-B2RWb2gM.js +37 -0
- package/dist/tui-dgS8hdXU.js +2 -0
- package/dist/update-cli-BmiBDf3c.js +3664 -0
- package/dist/update-runner-CM7QVX6u.js +2379 -0
- package/dist/vision-tools-BzoBZnIc.js +1409 -0
- package/dist/web-search-DmfOd66S.js +62 -0
- package/dist/web-search-provider.runtime-3C5-pODD.js +328 -0
- package/dist/web-search-provider.runtime-Doh-Z9We.js +2 -0
- package/dist/web-search-provider.runtime.js +1 -1
- package/dist/xai-oauth-BLvQ43hx.js +479 -0
- package/dist/xai-user-agent-BdMQ_0_O.js +32 -0
- package/package.json +1 -1
- package/dist/abort-DeEb_wKd.js +0 -277
- package/dist/abort.runtime-CoYXQGPK.js +0 -2
- package/dist/account-inspect-D_06-CYS.js +0 -173
- package/dist/accounts-BCTqtj4Y.js +0 -107
- package/dist/accounts-BudLl8P2.js +0 -107
- package/dist/accounts-CUReBDA0.js +0 -2
- package/dist/accounts-PCioSzzr.js +0 -119
- package/dist/acp-runtime-B2t9_BHD.js +0 -26
- package/dist/acp-spawn-0x4Iiu1o.js +0 -2
- package/dist/acp-spawn-B2Ghe0jJ.js +0 -1275
- package/dist/acp-stateful-target-driver-C4VgcSyz.js +0 -89
- package/dist/action-kill-ClYsXEz7.js +0 -33
- package/dist/action-runtime-DrLPkNvU.js +0 -469
- package/dist/action-runtime-api-BqSflr9q.js +0 -2
- package/dist/action-send-CIy9cziD.js +0 -39
- package/dist/action-spawn-BjV6lFnX.js +0 -47
- package/dist/actions-D-QH7wq5.js +0 -161
- package/dist/actions.runtime-hzDtXQGU.js +0 -5
- package/dist/agent-Bb1DTBgv.js +0 -3
- package/dist/agent-Cnqj258q.js +0 -2
- package/dist/agent-command-BRx6ZNgJ.js +0 -1367
- package/dist/agent-components.runtime-D-g6xXJ0.js +0 -10
- package/dist/agent-harness-runtime-dKUQFuOc.js +0 -180
- package/dist/agent-harness-task-runtime-v2crUm3i.js +0 -140
- package/dist/agent-runner-execution-AOzdxvWR.js +0 -1713
- package/dist/agent-runner-utils-Byv50B4Z.js +0 -266
- package/dist/agent-runner.runtime-hhgRE0Z-.js +0 -3455
- package/dist/agent-runtime-BHmh3i0o.js +0 -229
- package/dist/agent-via-gateway-DnCqaK4a.js +0 -463
- package/dist/api-Bzyb8sFU.js +0 -3
- package/dist/api-CIEDFXZs.js +0 -2
- package/dist/api-D_dTQAu8.js +0 -2
- package/dist/api-DilBjZ9Q.js +0 -6
- package/dist/api-E5zoQMmh.js +0 -134
- package/dist/api-OJZug8gQ.js +0 -639
- package/dist/apply-C0eV5T0O.js +0 -41
- package/dist/apply-alsYvxLE.js +0 -54
- package/dist/approval-handler.runtime-C6jqZXSN.js +0 -130
- package/dist/assistant-DDXnAAB5.js +0 -291
- package/dist/attachment-normalize-Cv-_4DWU.js +0 -225
- package/dist/attempt-execution-DECEU59r.js +0 -558
- package/dist/attempt-execution.runtime-kasMxuER.js +0 -3
- package/dist/attempt-execution.shared-ClUxk52p.js +0 -38
- package/dist/attempt.prompt-helpers-Bxlv9VSu.js +0 -475
- package/dist/attempt.tool-run-context-CplQWX6g.js +0 -2094
- package/dist/binding-routing-0Obpp-Ij.js +0 -113
- package/dist/binding-targets-CZHQaZL4.js +0 -121
- package/dist/bot-BPbQ0840.js +0 -7894
- package/dist/bot-deps-Cs1M9USs.js +0 -2
- package/dist/bot-deps-xAcaOtTZ.js +0 -747
- package/dist/bot-message-context.runtime-Bji78Cbn.js +0 -7
- package/dist/bot-message-context.session.runtime-C3dyOIYH.js +0 -12
- package/dist/bot-native-commands.delivery.runtime-WshH99fy.js +0 -4
- package/dist/bot-native-commands.runtime-C1L364gU.js +0 -13
- package/dist/bridge-server-DPlM8_Lk.js +0 -113
- package/dist/browser-cli-DFNQE98N.js +0 -230
- package/dist/browser-cli-Drb5E5--.js +0 -2
- package/dist/browser-cli-actions-input-Dx-1OXmE.js +0 -473
- package/dist/browser-cli-actions-observe-BMDfE7xU.js +0 -81
- package/dist/browser-cli-debug-nu7Ih09g.js +0 -137
- package/dist/browser-cli-inspect-D5X2wohg.js +0 -104
- package/dist/browser-cli-manage-DkzYwph4.js +0 -443
- package/dist/browser-cli-resize-B30Avedl.js +0 -26
- package/dist/browser-cli-shared-cMgQoQzF.js +0 -50
- package/dist/browser-cli-state-CQLDvDy7.js +0 -337
- package/dist/browser-control-auth-D7ArmHUt.js +0 -2
- package/dist/browser-profiles-B39SIZNb.js +0 -2
- package/dist/browser-runtime-DUbSAOOS.js +0 -384
- package/dist/build-D25KqC92.js +0 -257
- package/dist/capability-cli-CuyXrlAB.js +0 -1782
- package/dist/channel-0N3YGMGg.js +0 -1496
- package/dist/channel-1UyKoLyp.js +0 -481
- package/dist/channel-BG87pSEW.js +0 -740
- package/dist/channel-BPGSaZW7.js +0 -1249
- package/dist/channel-BQMPh1J_.js +0 -376
- package/dist/channel-Bd_8V6zn.js +0 -1134
- package/dist/channel-BtBjh_ij.js +0 -362
- package/dist/channel-CpFBlVH6.js +0 -562
- package/dist/channel-CwuTrIrF.js +0 -508
- package/dist/channel-Cxl4sJA-.js +0 -1777
- package/dist/channel-D-VfU4Z2.js +0 -2126
- package/dist/channel-D9q8aYrN.js +0 -867
- package/dist/channel-DKSvVvZh.js +0 -238
- package/dist/channel-DvoFfWLx.js +0 -808
- package/dist/channel-GktTcGHm.js +0 -955
- package/dist/channel-actions.runtime-CKcRA0GW.js +0 -265
- package/dist/channel-core-nm8s1qFZ.js +0 -5
- package/dist/channel-d3t2ESlE.js +0 -653
- package/dist/channel-inbound-DKz40dq-.js +0 -80
- package/dist/channel-plugin-runtime-DKIGZWfW.js +0 -998
- package/dist/channel-runtime-Bh8_GY12.js +0 -408
- package/dist/channel-yQ8jCOb9.js +0 -1556
- package/dist/channel.runtime-BG4mM5cQ.js +0 -652
- package/dist/channel.runtime-BS6PyFFa.js +0 -1008
- package/dist/channel.runtime-CE_xECqN.js +0 -88
- package/dist/channel.runtime-Cd1Sw8U4.js +0 -254
- package/dist/channel.runtime-DIq3XOEe.js +0 -733
- package/dist/channel.runtime-Dy1cx35I.js +0 -21009
- package/dist/channel.runtime-NyIMjLnP.js +0 -109
- package/dist/channel.runtime-Zx5mfE2V.js +0 -4
- package/dist/channel.runtime-rJRibGfN.js +0 -2528
- package/dist/channel.setup--4ACadmF.js +0 -10
- package/dist/channel.setup-DzwqIlo3.js +0 -1098
- package/dist/channel.setup-FKYSJwXR.js +0 -343
- package/dist/chat-CKxSm7r1.js +0 -2666
- package/dist/chrome-rMubJwRG.js +0 -1503
- package/dist/cli-CbTod55I.js +0 -1341
- package/dist/cli-compaction-BbHgjJyW.js +0 -347
- package/dist/cli-metadata-DkOWLC_p.js +0 -22
- package/dist/cli-runner-Cwzv_RKf.js +0 -540
- package/dist/cli-runner-DdnUsgPl.js +0 -2
- package/dist/cli-runner.runtime-BlrSgbEW.js +0 -3
- package/dist/cli-runner.runtime-D8kVfvFH.js +0 -4
- package/dist/client-ClvxsWgL.js +0 -650
- package/dist/client-adapter-CsrIIjK1.js +0 -897
- package/dist/client-factory-DAYClhwm.js +0 -9
- package/dist/command-auth-CCha2ofd.js +0 -135
- package/dist/command-handlers-DCWJzHyB.js +0 -1609
- package/dist/command-registry-BIf61QNz.js +0 -9
- package/dist/command-registry-DJROBy4h.js +0 -4
- package/dist/command-registry-core-BQOWqi6S.js +0 -110
- package/dist/command-status.runtime-D88CUglL.js +0 -90
- package/dist/commands-acp-B-8dHX4Z.js +0 -74
- package/dist/commands-compact.runtime-ComX5mUk.js +0 -10
- package/dist/commands-handlers.runtime-DR3wjXHX.js +0 -6154
- package/dist/commands-status-CDyGrwsI.js +0 -3
- package/dist/commands-status-DV-i_ZIK.js +0 -16
- package/dist/commands-status.runtime-CDyGrwsI.js +0 -3
- package/dist/commands-subagents-control.runtime-B029cXAS.js +0 -3
- package/dist/commands-subagents-control.runtime-DR8Qspe0.js +0 -2
- package/dist/commands-system-prompt-C10ctsG3.js +0 -162
- package/dist/commands-system-prompt-DQlRWwnk.js +0 -2
- package/dist/commands.runtime-BYmIAuN0.js +0 -176
- package/dist/compact-14Ljaaeu.js +0 -480
- package/dist/compact-B--ovdkx.js +0 -1141
- package/dist/compact.runtime-E0Idf2Dq.js +0 -12
- package/dist/completion-cli-DMvvQGSk.js +0 -315
- package/dist/computer-use-CcLwX5SR.js +0 -367
- package/dist/config-B39SIZNb.js +0 -2
- package/dist/config-D4rsGOyV.js +0 -373
- package/dist/config-mutations-CsI3YJu7.js +0 -159
- package/dist/context-engine-host-compat-BZpDFiMJ.js +0 -2
- package/dist/context-engine-host-compat-runUdES5.js +0 -288
- package/dist/context-engine-lifecycle-D6odtNrn.js +0 -1274
- package/dist/control-auth-BPGpPtfz.js +0 -114
- package/dist/control-service-C-OmdPCe.js +0 -145
- package/dist/control-ui/assets/agents-GeyOHPuW.js +0 -1008
- package/dist/control-ui/assets/channel-config-extras-D7en6iUg.js +0 -2
- package/dist/control-ui/assets/channels-DkEyr1w5.js +0 -367
- package/dist/control-ui/assets/cron-C-wThQ1Q.js +0 -1013
- package/dist/control-ui/assets/debug-83AFRtIX.js +0 -97
- package/dist/control-ui/assets/index-CiGEhMOA.js +0 -7370
- package/dist/control-ui/assets/instances-CVl0t-1h.js +0 -57
- package/dist/control-ui/assets/logs-eybVEXxg.js +0 -74
- package/dist/control-ui/assets/nodes-C_A7eoU2.js +0 -436
- package/dist/control-ui/assets/sessions-Cq4Nc69u.js +0 -399
- package/dist/control-ui/assets/skills-ZN6hroIh.js +0 -314
- package/dist/control-ui/assets/skills-shared-DIWGwmdC.js +0 -11
- package/dist/conversation-binding-runtime-C2U1JElL.js +0 -4
- package/dist/conversation-runtime-NmIUd3Zu.js +0 -31
- package/dist/core-DGKJP1dm.js +0 -282
- package/dist/core-api-1fA4sNeC.js +0 -5
- package/dist/core-api-BY822Quq.js +0 -2
- package/dist/crestodian-Bp-NXiBC.js +0 -55
- package/dist/daocore-tools-Defpam0j.js +0 -11727
- package/dist/delivery-CEdVAUGB.js +0 -1002
- package/dist/dialogue-CZ69INPq.js +0 -37
- package/dist/dir-fetch-tool-BCicHhQE.js +0 -565
- package/dist/dir-list-tool-Cv_WktsJ.js +0 -100
- package/dist/direct-dm-Bz89rM8x.js +0 -64
- package/dist/directive-handling.fast-lane-DDnbcc5S.js +0 -68
- package/dist/directive-handling.impl-B0H52Ymr.js +0 -818
- package/dist/directive-handling.impl-CgKpwEW-.js +0 -2
- package/dist/directive-handling.model-selection-_cXAr0vt.js +0 -122
- package/dist/directive-handling.persist.runtime-Dw0mfzXT.js +0 -263
- package/dist/dispatch-C3AeYvyP.js +0 -1640
- package/dist/dispatch-acp-transcript.runtime-CP8pqBwS.js +0 -40
- package/dist/dispatch-acp.runtime-Cdap-AZI.js +0 -18
- package/dist/doctor-BZwVH97p.js +0 -2
- package/dist/doctor-BfkGBii1.js +0 -6
- package/dist/doctor-config-flow-D3JASGDt.js +0 -1741
- package/dist/doctor-core-checks-DH5AIT0Q.js +0 -573
- package/dist/doctor-core-checks-DiNu7VSh.js +0 -2
- package/dist/doctor-health-BDIJ-Nro.js +0 -65
- package/dist/doctor-health-contributions-BgmF7w8X.js +0 -696
- package/dist/doctor-lint-uIxkMUSO.js +0 -94
- package/dist/doctor-state-integrity-ws1b_BGk.js +0 -1231
- package/dist/doctor-update-Cx4CqxaX.js +0 -58
- package/dist/dynamic-tools-DiqOxhJh.js +0 -486
- package/dist/embedded-backend-C634irMl.js +0 -579
- package/dist/embedded-gateway-stub.runtime-CCfrTOeN.js +0 -12
- package/dist/exec-approvals-D85KThSg.js +0 -149
- package/dist/file-fetch-tool-BERaGYCT.js +0 -124
- package/dist/file-write-tool-BjHrMyfe.js +0 -127
- package/dist/format-DE9PuPg1.js +0 -1145
- package/dist/gateway-cli-B5hjhbUy.js +0 -435
- package/dist/gateway-method-runtime-Bu0E9Eki.js +0 -21
- package/dist/get-reply-6PtPz9hv.js +0 -4689
- package/dist/get-reply-from-config.runtime-CwprvhoR.js +0 -2
- package/dist/graph-users-DUp1kgnS.js +0 -1419
- package/dist/group-access-D5GBQ3w6.js +0 -112
- package/dist/handle-action.guild-admin-CA0Y-buD.js +0 -288
- package/dist/harness-B5nOFVfm.js +0 -61
- package/dist/health-D5heIDj3.js +0 -4
- package/dist/heartbeat-runner-BzFkIFHh.js +0 -5
- package/dist/heartbeat-runner.runtime-p6H1_xMV.js +0 -4
- package/dist/hooks-BvTyQ14X.js +0 -534
- package/dist/inbound-direct-dm-runtime-DwiDXi8L.js +0 -2
- package/dist/inbound-reply-dispatch-YoDUOC6C.js +0 -148
- package/dist/init-CPtcV5Xu.js +0 -59
- package/dist/inline-buttons-DeD5d42c.js +0 -40
- package/dist/internal-events-DEb50Sw3.js +0 -90
- package/dist/isolated-agent-CcxFFZ-Z.js +0 -1118
- package/dist/isolated-agent-CpHzq5qr.js +0 -2
- package/dist/lifecycle-DNel-oMe.js +0 -571
- package/dist/list.probe-DCa3N25d.js +0 -449
- package/dist/list.status-command-CyeAJmZW.js +0 -789
- package/dist/llm-slug-generator-CyqTY37Z.js +0 -78
- package/dist/local-dispatch.runtime-nE39kFIP.js +0 -9
- package/dist/manager.runtime-CpAPB8D5.js +0 -2714
- package/dist/markdown-to-line-Ci6TRmoZ.js +0 -811
- package/dist/mcp-http-BR0vmxFL.js +0 -2
- package/dist/mcp-http-C0oniA8h.js +0 -555
- package/dist/media-understanding-provider-BwA0XqC3.js +0 -339
- package/dist/message-actions-C9C_Ngkd.js +0 -145
- package/dist/message-handler-CUUKPC5n.js +0 -384
- package/dist/message-handler-xRTfIXWV.js +0 -1715
- package/dist/message-handler.preflight-Ch2Q7V3M.js +0 -1125
- package/dist/message-handler.process-HM3mK93q.js +0 -1484
- package/dist/model-CB8Ex5xS.js +0 -74
- package/dist/model-selection-2s0Dinux.js +0 -272
- package/dist/models-Cn-6DJ41.js +0 -2
- package/dist/models-CzszJD__.js +0 -104
- package/dist/models-cli-CbhElnA5.js +0 -256
- package/dist/monitor-7aprTsMV.js +0 -715
- package/dist/monitor-BuVhqwDS.js +0 -1370
- package/dist/monitor-C4H_YkgY.js +0 -2
- package/dist/monitor-CPQsMxgv.js +0 -1657
- package/dist/monitor-Ce0V1PiR.js +0 -4377
- package/dist/monitor-D0bcGJWI.js +0 -60
- package/dist/monitor-DEjlJqzh.js +0 -834
- package/dist/monitor-auth-DjJZsjgV.js +0 -179
- package/dist/monitor-ikSYagv3.js +0 -2788
- package/dist/monitor-polling.runtime-D7yEflMM.js +0 -883
- package/dist/monitor-webhook.runtime-CIZt-biI.js +0 -387
- package/dist/monitor.account-C2sMOBCS.js +0 -5233
- package/dist/monitor.runtime-BAi6zmcn.js +0 -2
- package/dist/monitor.webhook-BcjpfRCX.js +0 -180
- package/dist/node-cli-sessions-CIhkJRU4.js +0 -1228
- package/dist/openai-http-Dj21RwSj.js +0 -824
- package/dist/openresponses-http-COnnr1ox.js +0 -1173
- package/dist/operations-H3vUh0lM.js +0 -805
- package/dist/outbound-adapter-WLtWE7wv.js +0 -543
- package/dist/outbound-session-route-CZtd64EH.js +0 -45
- package/dist/outbound.runtime-D98P0sN1.js +0 -2
- package/dist/pi-embedded-BWJzd4mK.js +0 -4
- package/dist/pi-embedded-DeNsSqQQ.js +0 -3796
- package/dist/pi-embedded.runtime-CZnNwFpc.js +0 -4
- package/dist/pi-tools-CNHSpjBa.js +0 -2413
- package/dist/plan-B0reFFlM.js +0 -81
- package/dist/plan-CrfF-TH8.js +0 -112
- package/dist/plugin-DI_8eYOe.js +0 -12396
- package/dist/plugin-app-cache-key-WaTUD3e-.js +0 -46
- package/dist/plugin-enabled-aWLXgGGi.js +0 -233
- package/dist/plugin-registration-ByjRIVJm.js +0 -88
- package/dist/plugin-service-VQm_241d.js +0 -1229
- package/dist/policy-BmJH-swe.js +0 -680
- package/dist/policy-DE-bO1zn.js +0 -138
- package/dist/prepare.runtime-bSj3-res.js +0 -732
- package/dist/preview-warnings-CbuGYsF9.js +0 -392
- package/dist/probe-C_rWg7_m.js +0 -682
- package/dist/probe-CagOFfx6.js +0 -2
- package/dist/probe-thX1HqOh.js +0 -2204
- package/dist/probe-zU6B6gFt.js +0 -47
- package/dist/program-BtVdH743.js +0 -131
- package/dist/provider-CDoD7tO0.js +0 -8735
- package/dist/provider-CK1gMdJ2.js +0 -32
- package/dist/provider-DJqr9djy.js +0 -32
- package/dist/provider-DsOJp5bK.js +0 -152
- package/dist/provider-dispatcher-UNQ-LSx9.js +0 -22
- package/dist/provider-session.runtime-DMrkMb4x.js +0 -9
- package/dist/provider.runtime-C2-t3zm8.js +0 -2
- package/dist/public-surface-loader-hTeyyHcd.js +0 -114
- package/dist/pw-ai-BaL3eVYx.js +0 -3029
- package/dist/pw-role-snapshot-DKeBqhN1.js +0 -333
- package/dist/reaction-level-BV2potsD.js +0 -19
- package/dist/reaction-runtime-api-CCBxgM10.js +0 -116
- package/dist/realtime-transcription-provider-CHYtIXZm.js +0 -205
- package/dist/register-BJf28G9B.js +0 -2178
- package/dist/register.agent-oXAHwNQv.js +0 -156
- package/dist/register.crestodian-CQ0sqdV2.js +0 -24
- package/dist/register.maintenance-CylVRs5M.js +0 -83
- package/dist/register.runtime-CcDgwy0X.js +0 -54
- package/dist/register.subclis-CpBYNw2X.js +0 -3
- package/dist/register.subclis-N2CvieOL.js +0 -31
- package/dist/register.subclis-core-BHaGvbzg.js +0 -273
- package/dist/repair-sequencing-EBBnBdIB.js +0 -640
- package/dist/reply-delivery-BLoPALlI.js +0 -196
- package/dist/reply-runtime-D4asNTSa.js +0 -11
- package/dist/reply.runtime-CwprvhoR.js +0 -2
- package/dist/request-DlWPRUDt.js +0 -54
- package/dist/resolve-allowlist-BukQf58x.js +0 -220
- package/dist/result-fallback-classifier-DyHFnqfV.js +0 -79
- package/dist/route-BMf4keN5.js +0 -469
- package/dist/route-resolution-DWNi1QAu.js +0 -274
- package/dist/routes-C20LC8c4.js +0 -3602
- package/dist/routes-CkK7Vv_m.js +0 -2
- package/dist/run-KDF_AEza.js +0 -1162
- package/dist/run-attempt-JHYCfonU.js +0 -7704
- package/dist/run-command-3PVihYIy.js +0 -2
- package/dist/run-command-QHAXnyKY.js +0 -23
- package/dist/run-embedded.runtime-BJw-2vss.js +0 -4
- package/dist/run-execution-cli.runtime-GHClMn2g.js +0 -4
- package/dist/run-subagent-registry.runtime-BLLMrhtE.js +0 -2
- package/dist/runtime-C2u-dC1r.js +0 -1287
- package/dist/runtime-ClyfkDWT.js +0 -6179
- package/dist/runtime-WXCarlPc.js +0 -438
- package/dist/runtime-api-3QhGLpZf.js +0 -13
- package/dist/runtime-api-DRAu3mjv.js +0 -4
- package/dist/runtime-api-JE07pOem.js +0 -13
- package/dist/runtime-api-JuKylHvw.js +0 -24
- package/dist/runtime-api-bcbk4yax.js +0 -21
- package/dist/runtime-api-dDe9U2_V.js +0 -17
- package/dist/runtime-api-uMexLqGS.js +0 -3
- package/dist/runtime-api.actions-Bo7TLDFl.js +0 -3
- package/dist/runtime-api.monitor-7q78L1Em.js +0 -6
- package/dist/runtime-api.send-Bf9RR4nV.js +0 -4
- package/dist/runtime-api.threads-Dj2QuhHj.js +0 -2
- package/dist/runtime-channel-k1C0Satl.js +0 -2
- package/dist/runtime-channel-qt9t0J-J.js +0 -150
- package/dist/runtime-embedded-pi.runtime-BPB9NlTS.js +0 -2
- package/dist/sanitize-outbound-BLH_SQvg.js +0 -127
- package/dist/sdk-setup-tools-BshlBPau.js +0 -8
- package/dist/secrets-CsHXv7d3.js +0 -113
- package/dist/security-audit-CUXBQXNX.js +0 -122
- package/dist/security-audit-CzdXbRma.js +0 -118
- package/dist/security-audit.runtime-Ca0FMFJG.js +0 -2
- package/dist/selection-BmvQJlSD.js +0 -3
- package/dist/selection-BplDXc9w.js +0 -16157
- package/dist/send--qFg8a9v.js +0 -1631
- package/dist/send-BPdryPPA.js +0 -192
- package/dist/send-Bl4YaRkS.js +0 -143
- package/dist/send-Ccm7RMXC.js +0 -2
- package/dist/send.components-c3OUPSmR.js +0 -2
- package/dist/send.components-rhQJYoXs.js +0 -500
- package/dist/send.runtime-dfUkAp5d.js +0 -2
- package/dist/server-DRhyTMLe.js +0 -73
- package/dist/server-Dv4BzjGn.js +0 -24
- package/dist/server-context-4HRJy2vp.js +0 -955
- package/dist/server-context-DlxYb1G5.js +0 -2
- package/dist/server-cron-Bt8Pkc3i.js +0 -2989
- package/dist/server-cron-CtNWsa4Z.js +0 -2
- package/dist/server-methods-rye_okUW.js +0 -16494
- package/dist/server-node-events-C1yZ5a1u.js +0 -596
- package/dist/server-plugin-bootstrap-DUMyVtlP.js +0 -70
- package/dist/server-plugins-B5ZWWkRE.js +0 -432
- package/dist/server-reload-handlers-CTnMXNjT.js +0 -714
- package/dist/server-restart-sentinel-CAYxtwmY.js +0 -747
- package/dist/server-restart-sentinel-DqrtSIvy.js +0 -2
- package/dist/server-runtime-services-CuptQTe5.js +0 -2
- package/dist/server-runtime-services-aaS2IiW3.js +0 -267
- package/dist/server-startup-plugins-D0ymJgQT.js +0 -113
- package/dist/server-startup-post-attach-DlrN2uyt.js +0 -716
- package/dist/server-ws-runtime-CdpLbv4o.js +0 -349
- package/dist/server.impl-Cb4qcMTg.js +0 -2586
- package/dist/service-qxvDlMQE.js +0 -1446
- package/dist/session-binding-6bLobLHL.js +0 -219
- package/dist/session-binding-Bm6fCpoY.js +0 -2
- package/dist/session-kill-http-B6WjVo8V.js +0 -121
- package/dist/session-reset-service-GUVIhxp4.js +0 -625
- package/dist/session-route-BcRDnvzG.js +0 -93
- package/dist/session-status.runtime-BcjOunV4.js +0 -2
- package/dist/session-subagent-reactivation.runtime-BSmk_KYn.js +0 -2
- package/dist/session-tab-registry-BBYzbSOu.js +0 -521
- package/dist/sessions-history-http-bLJJfgLm.js +0 -430
- package/dist/sessions.runtime-DNRtQzCk.js +0 -2
- package/dist/setup-api-CcolVVJs.js +0 -29
- package/dist/setup-core-eJD18F3B.js +0 -174
- package/dist/setup-surface-B75C2Qtz.js +0 -221
- package/dist/setup-surface-CFuPfVHp.js +0 -405
- package/dist/setup-surface-Dyy-Mzyz.js +0 -288
- package/dist/setup-surface-ZsVF_g8W.js +0 -320
- package/dist/shared-BkCNrcLX.js +0 -121
- package/dist/shared-client-B7zqC9p2.js +0 -2
- package/dist/shared-client-yXjKgZBz.js +0 -629
- package/dist/side-question-DU3gESCb.js +0 -683
- package/dist/skill-tool-dispatch.runtime-CPBuqyvk.js +0 -143
- package/dist/slash-state-Do3bAahA.js +0 -2166
- package/dist/speech-provider-Bg9los3C.js +0 -184
- package/dist/src-D7LzUctH.js +0 -4256
- package/dist/startup-context-CCF2gIOl.js +0 -313
- package/dist/status-subagents.runtime-DX5FTymp.js +0 -18
- package/dist/status-text-B-1u5dSV.js +0 -296
- package/dist/sticker-cache-DwpU_9RJ.js +0 -206
- package/dist/sticker-vision.runtime-Bbldi_YL.js +0 -17
- package/dist/subagent-announce-BCo0VHVL.js +0 -354
- package/dist/subagent-announce-delivery-JcnuDN_N.js +0 -958
- package/dist/subagent-control-BzbA3Suz.js +0 -508
- package/dist/subagent-hooks-BIGZQWrG.js +0 -2
- package/dist/subagent-hooks-Bj4qYZfv.js +0 -230
- package/dist/subagent-hooks-C-rvhVBv.js +0 -2
- package/dist/subagent-hooks-P01_AFl5.js +0 -116
- package/dist/subagent-hooks-VEfak8nl.js +0 -2
- package/dist/subagent-hooks-api-BPnSxxN4.js +0 -23
- package/dist/subagent-hooks-api-DwIAvMoS.js +0 -22
- package/dist/subagent-hooks-api-kgyR9FOb.js +0 -23
- package/dist/subagent-hooks-oED56wqq.js +0 -146
- package/dist/subagent-orphan-recovery-D79ZzwKN.js +0 -352
- package/dist/subagent-registry-D0soBT5j.js +0 -2351
- package/dist/subagent-registry-DRJDkmty.js +0 -3
- package/dist/subagent-session-cleanup-9eAO1aJe.js +0 -525
- package/dist/subagent-spawn-D80vbogm.js +0 -1164
- package/dist/target-id-COLv5LsJ.js +0 -107
- package/dist/targets-CDW5IQ6a.js +0 -44
- package/dist/targets-Ci6O1ZdP.js +0 -19
- package/dist/targets-CsaWFBg1.js +0 -19
- package/dist/testing-BoJit-h1.js +0 -267
- package/dist/thread-bindings-CGCvw0KT.js +0 -571
- package/dist/thread-bindings-ClCTNacX.js +0 -228
- package/dist/thread-bindings-DRb7BMZ6.js +0 -8
- package/dist/thread-bindings-Xc6smav0.js +0 -232
- package/dist/thread-bindings.discord-api-DC467oeF.js +0 -187
- package/dist/thread-bindings.manager-C_mpTDIZ.js +0 -536
- package/dist/thread-bindings.manager-DkCRs612.js +0 -2
- package/dist/thread-lifecycle-DpqCXlx9.js +0 -1614
- package/dist/token-CI6HjbTA.js +0 -134
- package/dist/tool-BMe7hjBK.js +0 -139
- package/dist/tool-actions.runtime-D-h5PI_m.js +0 -534
- package/dist/tool-resolution-CnLx0CHe.js +0 -149
- package/dist/tools-effective-inventory-BR6MUMtE.js +0 -204
- package/dist/tools-invoke-http-CTTs2yMT.js +0 -67
- package/dist/tools-invoke-shared-9B1EjXWf.js +0 -200
- package/dist/tts-eGOviZ5c.js +0 -66
- package/dist/tui-Bw0HqKd7.js +0 -4709
- package/dist/tui-CIZJnPzj.js +0 -2
- package/dist/tui-backend-BJ_r7tcF.js +0 -256
- package/dist/tui-cli-BaSMBpuA.js +0 -37
- package/dist/update-cli-zuCybGNR.js +0 -3664
- package/dist/update-runner-Dek2BHmQ.js +0 -2379
- package/dist/vision-tools-1ps0BEE5.js +0 -1409
- package/dist/web-search-B7EziZXE.js +0 -62
- package/dist/web-search-provider.runtime-DGTCvGch.js +0 -328
- package/dist/web-search-provider.runtime-DWL5t39M.js +0 -2
- package/dist/xai-oauth-CRtsj2Gs.js +0 -479
- package/dist/xai-user-agent-Dndwzw2S.js +0 -32
- /package/dist/{acp-runtime-backend-DSDBcyh9.js → acp-runtime-backend-Cxo7eBHf.js} +0 -0
- /package/dist/{channel-actions-FV66JqtI.js → channel-actions-UDeVjgGz.js} +0 -0
- /package/dist/{command-status-runtime-BRWKSoG7.js → command-status-runtime-CoHd4Fws.js} +0 -0
- /package/dist/{delegate-DGqKhwB4.js → delegate-B-2xZ77o.js} +0 -0
- /package/dist/{dispatch-acp-Ceoxja_Z.js → dispatch-acp-DLPkmK7K.js} +0 -0
- /package/dist/{heartbeat-runner-CJHvr5pG.js → heartbeat-runner-D2j6JwOI.js} +0 -0
- /package/dist/{library-Bq3aDek_.js → library-DBT0cIPP.js} +0 -0
- /package/dist/{run-executor.runtime-DNJhGPbA.js → run-executor.runtime-DE4J7f4M.js} +0 -0
- /package/dist/{shared-CYxmRpq1.js → shared-xeo8Yh5n.js} +0 -0
|
@@ -0,0 +1,2178 @@
|
|
|
1
|
+
import { o as coerceSecretRef } from "./types.secrets-Ct1DNG7D.js";
|
|
2
|
+
import { r as normalizeProviderId } from "./provider-id-zTW9Rdln.js";
|
|
3
|
+
import "./provider-model-shared-H18UrK7h.js";
|
|
4
|
+
import "./secret-input-s8BgZnEq.js";
|
|
5
|
+
import { i as registerHealthCheck } from "./health-check-registry-DxXQHCTW.js";
|
|
6
|
+
import "./health-DFR9A1YV.js";
|
|
7
|
+
import JSON5 from "json5";
|
|
8
|
+
import { basename, isAbsolute, resolve } from "node:path";
|
|
9
|
+
import { createHash } from "node:crypto";
|
|
10
|
+
//#region extensions/policy/src/policy-state.ts
|
|
11
|
+
const RESERVED_CHANNEL_CONFIG_KEYS = new Set(["defaults", "modelByChannel"]);
|
|
12
|
+
const NON_SLUG_CHARS = /[^a-z0-9-]+/g;
|
|
13
|
+
const COLLAPSE_HYPHENS = /-+/g;
|
|
14
|
+
const TRIM_HYPHENS = /^-+|-+$/g;
|
|
15
|
+
function policyDocumentHash(policy) {
|
|
16
|
+
return sha256(stableJson(policy));
|
|
17
|
+
}
|
|
18
|
+
function policyWorkspaceHash(evidence) {
|
|
19
|
+
return sha256(stableJson(evidence));
|
|
20
|
+
}
|
|
21
|
+
function policyFindingsHash(findings) {
|
|
22
|
+
return sha256(stableJson(findings));
|
|
23
|
+
}
|
|
24
|
+
function policyAttestationHash(input) {
|
|
25
|
+
return sha256(stableJson(input));
|
|
26
|
+
}
|
|
27
|
+
function createPolicyAttestation(input) {
|
|
28
|
+
const workspaceHash = policyWorkspaceHash(input.evidence);
|
|
29
|
+
const findingsHash = policyFindingsHash(input.findings);
|
|
30
|
+
return {
|
|
31
|
+
checkedAt: input.checkedAt,
|
|
32
|
+
...input.policyHash === void 0 ? {} : { policy: {
|
|
33
|
+
path: input.policyPath,
|
|
34
|
+
hash: input.policyHash
|
|
35
|
+
} },
|
|
36
|
+
workspace: {
|
|
37
|
+
scope: "policy",
|
|
38
|
+
hash: workspaceHash
|
|
39
|
+
},
|
|
40
|
+
findingsHash,
|
|
41
|
+
attestationHash: policyAttestationHash({
|
|
42
|
+
ok: input.ok,
|
|
43
|
+
policyHash: input.policyHash,
|
|
44
|
+
workspaceHash,
|
|
45
|
+
findingsHash
|
|
46
|
+
})
|
|
47
|
+
};
|
|
48
|
+
}
|
|
49
|
+
function collectPolicyEvidence(cfg, options = {}) {
|
|
50
|
+
const evidence = {
|
|
51
|
+
channels: scanPolicyChannels(cfg),
|
|
52
|
+
mcpServers: scanPolicyMcpServers(cfg),
|
|
53
|
+
modelProviders: scanPolicyModelProviders(cfg),
|
|
54
|
+
modelRefs: scanPolicyModelRefs(cfg),
|
|
55
|
+
network: scanPolicyNetwork(cfg),
|
|
56
|
+
...options.includeGatewayExposure === false ? {} : { gatewayExposure: scanPolicyGatewayExposure(cfg) },
|
|
57
|
+
...options.includeSecrets === false ? {} : { secrets: scanPolicySecrets(cfg) },
|
|
58
|
+
...options.includeAuthProfiles === false ? {} : { authProfiles: scanPolicyAuthProfiles(cfg) }
|
|
59
|
+
};
|
|
60
|
+
if (options.toolsRaw === void 0) return evidence;
|
|
61
|
+
return scanPolicyTools(options.toolsRaw).then((tools) => ({
|
|
62
|
+
...evidence,
|
|
63
|
+
tools
|
|
64
|
+
}));
|
|
65
|
+
}
|
|
66
|
+
function scanPolicyChannels(cfg) {
|
|
67
|
+
return Object.entries(configuredChannels(cfg)).filter(([id]) => !RESERVED_CHANNEL_CONFIG_KEYS.has(id)).toSorted(([a], [b]) => a.localeCompare(b)).map(([id, value]) => {
|
|
68
|
+
const entry = {
|
|
69
|
+
id,
|
|
70
|
+
provider: id,
|
|
71
|
+
source: `oc://daocore.config/channels/${id}`
|
|
72
|
+
};
|
|
73
|
+
if (isRecord$1(value) && typeof value.enabled === "boolean") entry.enabled = value.enabled;
|
|
74
|
+
return entry;
|
|
75
|
+
});
|
|
76
|
+
}
|
|
77
|
+
function scanPolicyMcpServers(cfg) {
|
|
78
|
+
return Object.entries(configuredMcpServers(cfg)).toSorted(([a], [b]) => a.localeCompare(b)).map(([id, value]) => {
|
|
79
|
+
const entry = {
|
|
80
|
+
id,
|
|
81
|
+
transport: mcpServerTransport(value),
|
|
82
|
+
source: `oc://daocore.config/mcp/servers/${ocPathSegment(id)}`
|
|
83
|
+
};
|
|
84
|
+
if (isRecord$1(value)) {
|
|
85
|
+
if (typeof value.command === "string") entry.command = value.command;
|
|
86
|
+
if (typeof value.url === "string") entry.url = redactMcpUrlForEvidence(value.url);
|
|
87
|
+
}
|
|
88
|
+
return entry;
|
|
89
|
+
});
|
|
90
|
+
}
|
|
91
|
+
function scanPolicyModelProviders(cfg) {
|
|
92
|
+
return Object.keys(configuredModelProviders(cfg)).toSorted((a, b) => a.localeCompare(b)).map((id) => ({
|
|
93
|
+
id: normalizeProviderId(id),
|
|
94
|
+
source: `oc://daocore.config/models/providers/${id}`
|
|
95
|
+
}));
|
|
96
|
+
}
|
|
97
|
+
function scanPolicyModelRefs(cfg) {
|
|
98
|
+
const refs = [];
|
|
99
|
+
if (isRecord$1(cfg.agents)) {
|
|
100
|
+
collectModelRefsFromRecord(refs, cfg.agents, "oc://daocore.config/agents");
|
|
101
|
+
collectModelRefsFromAgentAllowlist(refs, cfg.agents);
|
|
102
|
+
}
|
|
103
|
+
return refs.toSorted((a, b) => a.provider.localeCompare(b.provider) || a.model.localeCompare(b.model));
|
|
104
|
+
}
|
|
105
|
+
function scanPolicyNetwork(cfg) {
|
|
106
|
+
return [
|
|
107
|
+
networkBooleanEvidence(cfg, "browser-private-network", [
|
|
108
|
+
"browser",
|
|
109
|
+
"ssrfPolicy",
|
|
110
|
+
"dangerouslyAllowPrivateNetwork"
|
|
111
|
+
], "oc://daocore.config/browser/ssrfPolicy/dangerouslyAllowPrivateNetwork"),
|
|
112
|
+
networkBooleanEvidence(cfg, "browser-private-network-legacy", [
|
|
113
|
+
"browser",
|
|
114
|
+
"ssrfPolicy",
|
|
115
|
+
"allowPrivateNetwork"
|
|
116
|
+
], "oc://daocore.config/browser/ssrfPolicy/allowPrivateNetwork"),
|
|
117
|
+
networkBooleanEvidence(cfg, "web-fetch-private-network", [
|
|
118
|
+
"tools",
|
|
119
|
+
"web",
|
|
120
|
+
"fetch",
|
|
121
|
+
"ssrfPolicy",
|
|
122
|
+
"dangerouslyAllowPrivateNetwork"
|
|
123
|
+
], "oc://daocore.config/tools/web/fetch/ssrfPolicy/dangerouslyAllowPrivateNetwork"),
|
|
124
|
+
networkBooleanEvidence(cfg, "web-fetch-private-network-legacy", [
|
|
125
|
+
"tools",
|
|
126
|
+
"web",
|
|
127
|
+
"fetch",
|
|
128
|
+
"ssrfPolicy",
|
|
129
|
+
"allowPrivateNetwork"
|
|
130
|
+
], "oc://daocore.config/tools/web/fetch/ssrfPolicy/allowPrivateNetwork"),
|
|
131
|
+
networkBooleanEvidence(cfg, "web-fetch-rfc2544-benchmark-range", [
|
|
132
|
+
"tools",
|
|
133
|
+
"web",
|
|
134
|
+
"fetch",
|
|
135
|
+
"ssrfPolicy",
|
|
136
|
+
"allowRfc2544BenchmarkRange"
|
|
137
|
+
], "oc://daocore.config/tools/web/fetch/ssrfPolicy/allowRfc2544BenchmarkRange"),
|
|
138
|
+
networkBooleanEvidence(cfg, "web-fetch-ipv6-unique-local-range", [
|
|
139
|
+
"tools",
|
|
140
|
+
"web",
|
|
141
|
+
"fetch",
|
|
142
|
+
"ssrfPolicy",
|
|
143
|
+
"allowIpv6UniqueLocalRange"
|
|
144
|
+
], "oc://daocore.config/tools/web/fetch/ssrfPolicy/allowIpv6UniqueLocalRange")
|
|
145
|
+
].filter((entry) => entry !== void 0);
|
|
146
|
+
}
|
|
147
|
+
function scanPolicyGatewayExposure(cfg) {
|
|
148
|
+
const gateway = isRecord$1(cfg.gateway) ? cfg.gateway : {};
|
|
149
|
+
const entries = [];
|
|
150
|
+
const bind = typeof gateway.bind === "string" ? gateway.bind : void 0;
|
|
151
|
+
const customBindHost = typeof gateway.customBindHost === "string" ? gateway.customBindHost : void 0;
|
|
152
|
+
const hasCustomBindHost = customBindHost !== void 0 && customBindHost.trim() !== "";
|
|
153
|
+
const tailscale = isRecord$1(gateway.tailscale) ? gateway.tailscale : {};
|
|
154
|
+
const tailscaleForcesLoopback = tailscale.mode === "serve" || tailscale.mode === "funnel";
|
|
155
|
+
entries.push({
|
|
156
|
+
id: bind === void 0 ? "gateway-bind-default" : "gateway-bind",
|
|
157
|
+
kind: "bind",
|
|
158
|
+
source: "oc://daocore.config/gateway/bind",
|
|
159
|
+
value: bind ?? (tailscaleForcesLoopback ? "loopback" : "runtime-default"),
|
|
160
|
+
nonLoopback: bind === void 0 ? !tailscaleForcesLoopback : bind === "custom" ? false : isGatewayNonLoopbackBind(bind),
|
|
161
|
+
explicit: bind !== void 0
|
|
162
|
+
});
|
|
163
|
+
if (bind === "custom" && hasCustomBindHost) entries.push({
|
|
164
|
+
id: "gateway-custom-bind-host",
|
|
165
|
+
kind: "bind",
|
|
166
|
+
source: "oc://daocore.config/gateway/customBindHost",
|
|
167
|
+
value: customBindHost,
|
|
168
|
+
nonLoopback: isRuntimeNonLoopbackCustomBindHost(customBindHost)
|
|
169
|
+
});
|
|
170
|
+
const auth = isRecord$1(gateway.auth) ? gateway.auth : {};
|
|
171
|
+
entries.push({
|
|
172
|
+
id: "gateway-auth-mode",
|
|
173
|
+
kind: "auth",
|
|
174
|
+
source: "oc://daocore.config/gateway/auth/mode",
|
|
175
|
+
value: typeof auth.mode === "string" ? auth.mode : "token",
|
|
176
|
+
explicit: typeof auth.mode === "string"
|
|
177
|
+
});
|
|
178
|
+
entries.push({
|
|
179
|
+
id: "gateway-auth-rate-limit",
|
|
180
|
+
kind: "authRateLimit",
|
|
181
|
+
source: "oc://daocore.config/gateway/auth/rateLimit",
|
|
182
|
+
value: isRecord$1(auth.rateLimit),
|
|
183
|
+
explicit: isRecord$1(auth.rateLimit)
|
|
184
|
+
});
|
|
185
|
+
const controlUi = isRecord$1(gateway.controlUi) ? gateway.controlUi : {};
|
|
186
|
+
pushGatewayBooleanEvidence(entries, "gateway-control-ui-enabled", "controlUi", controlUi.enabled, "oc://daocore.config/gateway/controlUi/enabled");
|
|
187
|
+
pushGatewayBooleanEvidence(entries, "gateway-control-ui-insecure-auth", "controlUi", controlUi.allowInsecureAuth, "oc://daocore.config/gateway/controlUi/allowInsecureAuth");
|
|
188
|
+
pushGatewayBooleanEvidence(entries, "gateway-control-ui-device-auth-disabled", "controlUi", controlUi.dangerouslyDisableDeviceAuth, "oc://daocore.config/gateway/controlUi/dangerouslyDisableDeviceAuth");
|
|
189
|
+
pushGatewayBooleanEvidence(entries, "gateway-control-ui-host-origin-fallback", "controlUi", controlUi.dangerouslyAllowHostHeaderOriginFallback, "oc://daocore.config/gateway/controlUi/dangerouslyAllowHostHeaderOriginFallback");
|
|
190
|
+
if (typeof tailscale.mode === "string") entries.push({
|
|
191
|
+
id: "gateway-tailscale-mode",
|
|
192
|
+
kind: "tailscale",
|
|
193
|
+
source: "oc://daocore.config/gateway/tailscale/mode",
|
|
194
|
+
value: tailscale.mode
|
|
195
|
+
});
|
|
196
|
+
if (tailscale.mode === "serve" && tailscale.preserveFunnel === true) entries.push({
|
|
197
|
+
id: "gateway-tailscale-preserve-funnel",
|
|
198
|
+
kind: "tailscale",
|
|
199
|
+
source: "oc://daocore.config/gateway/tailscale/preserveFunnel",
|
|
200
|
+
value: "funnel"
|
|
201
|
+
});
|
|
202
|
+
const remote = isRecord$1(gateway.remote) ? gateway.remote : {};
|
|
203
|
+
if (gateway.mode === "remote") {
|
|
204
|
+
entries.push({
|
|
205
|
+
id: "gateway-mode-remote",
|
|
206
|
+
kind: "remote",
|
|
207
|
+
source: "oc://daocore.config/gateway/mode",
|
|
208
|
+
value: "remote"
|
|
209
|
+
});
|
|
210
|
+
if (typeof remote.url === "string" && remote.url.trim() !== "") entries.push({
|
|
211
|
+
id: "gateway-remote-url",
|
|
212
|
+
kind: "remote",
|
|
213
|
+
source: "oc://daocore.config/gateway/remote/url",
|
|
214
|
+
value: true
|
|
215
|
+
});
|
|
216
|
+
}
|
|
217
|
+
const http = isRecord$1(gateway.http) ? gateway.http : {};
|
|
218
|
+
const endpoints = isRecord$1(http.endpoints) ? http.endpoints : {};
|
|
219
|
+
pushGatewayHttpEndpointEvidence(entries, endpoints, "chatCompletions");
|
|
220
|
+
pushGatewayHttpEndpointEvidence(entries, endpoints, "responses");
|
|
221
|
+
return entries.toSorted((a, b) => a.source.localeCompare(b.source));
|
|
222
|
+
}
|
|
223
|
+
function scanPolicySecrets(cfg) {
|
|
224
|
+
return [...scanPolicySecretProviders(cfg), ...scanPolicySecretInputs(cfg)].toSorted((a, b) => a.source.localeCompare(b.source));
|
|
225
|
+
}
|
|
226
|
+
function scanPolicyAuthProfiles(cfg) {
|
|
227
|
+
const auth = isRecord$1(cfg.auth) ? cfg.auth : {};
|
|
228
|
+
const profiles = isRecord$1(auth.profiles) ? auth.profiles : {};
|
|
229
|
+
return Object.entries(profiles).toSorted(([a], [b]) => a.localeCompare(b)).map(([id, value]) => {
|
|
230
|
+
const entry = {
|
|
231
|
+
id,
|
|
232
|
+
source: `oc://daocore.config/auth/profiles/${ocPathSegment(id)}`,
|
|
233
|
+
validMetadata: isValidAuthProfileMetadata(value)
|
|
234
|
+
};
|
|
235
|
+
if (isRecord$1(value)) {
|
|
236
|
+
if (typeof value.provider === "string") entry.provider = value.provider;
|
|
237
|
+
if (typeof value.mode === "string") entry.mode = value.mode;
|
|
238
|
+
}
|
|
239
|
+
return entry;
|
|
240
|
+
});
|
|
241
|
+
}
|
|
242
|
+
function scanPolicySecretProviders(cfg) {
|
|
243
|
+
const secrets = isRecord$1(cfg.secrets) ? cfg.secrets : {};
|
|
244
|
+
const providers = isRecord$1(secrets.providers) ? secrets.providers : {};
|
|
245
|
+
return Object.entries(providers).map(([id, value]) => {
|
|
246
|
+
const insecure = secretProviderInsecureFlags(value);
|
|
247
|
+
const entry = {
|
|
248
|
+
id,
|
|
249
|
+
kind: "provider",
|
|
250
|
+
source: `oc://daocore.config/secrets/providers/${ocPathSegment(id)}`
|
|
251
|
+
};
|
|
252
|
+
if (isRecord$1(value) && typeof value.source === "string") entry.providerSource = value.source;
|
|
253
|
+
if (insecure.length > 0) entry.insecure = insecure;
|
|
254
|
+
return entry;
|
|
255
|
+
});
|
|
256
|
+
}
|
|
257
|
+
function scanPolicySecretInputs(cfg) {
|
|
258
|
+
const entries = [];
|
|
259
|
+
collectSecretInputs(entries, cfg, [], secretRefDefaults((isRecord$1(cfg.secrets) ? cfg.secrets : {}).defaults));
|
|
260
|
+
return entries;
|
|
261
|
+
}
|
|
262
|
+
function collectSecretInputs(entries, value, path, defaults) {
|
|
263
|
+
if (Array.isArray(value)) {
|
|
264
|
+
value.forEach((item, index) => collectSecretInputs(entries, item, [...path, `#${index}`], defaults));
|
|
265
|
+
return;
|
|
266
|
+
}
|
|
267
|
+
if (!isRecord$1(value)) return;
|
|
268
|
+
for (const [key, child] of Object.entries(value)) {
|
|
269
|
+
const childPath = [...path, key];
|
|
270
|
+
const source = configPathSource(childPath);
|
|
271
|
+
const ref = isSecretInputPath(childPath) ? secretRefEvidence(child, defaults) : void 0;
|
|
272
|
+
if (ref !== void 0) {
|
|
273
|
+
entries.push({
|
|
274
|
+
id: source,
|
|
275
|
+
kind: "input",
|
|
276
|
+
source,
|
|
277
|
+
provenance: "secretRef",
|
|
278
|
+
refSource: ref.source,
|
|
279
|
+
refProvider: ref.provider
|
|
280
|
+
});
|
|
281
|
+
continue;
|
|
282
|
+
}
|
|
283
|
+
collectSecretInputs(entries, child, childPath, defaults);
|
|
284
|
+
}
|
|
285
|
+
}
|
|
286
|
+
function configPathSource(path) {
|
|
287
|
+
return `oc://daocore.config/${path.map(ocPathSegment).join("/")}`;
|
|
288
|
+
}
|
|
289
|
+
function isSecretInputPath(path) {
|
|
290
|
+
const key = path.at(-1);
|
|
291
|
+
if (key === void 0) return false;
|
|
292
|
+
if (matchesConfigPath(path, [
|
|
293
|
+
"plugins",
|
|
294
|
+
"entries",
|
|
295
|
+
"acpx",
|
|
296
|
+
"config",
|
|
297
|
+
"mcpServers",
|
|
298
|
+
"*",
|
|
299
|
+
"env",
|
|
300
|
+
"*"
|
|
301
|
+
])) return true;
|
|
302
|
+
if (isRawEnvMapValuePath(path)) return false;
|
|
303
|
+
if (isSecretInputKey(key)) return true;
|
|
304
|
+
return matchesConfigPath(path, [
|
|
305
|
+
"models",
|
|
306
|
+
"providers",
|
|
307
|
+
"*",
|
|
308
|
+
"headers",
|
|
309
|
+
"*"
|
|
310
|
+
]) || isConfiguredProviderRequestSecretPath(path, [
|
|
311
|
+
"models",
|
|
312
|
+
"providers",
|
|
313
|
+
"*"
|
|
314
|
+
]) || isMediaConfiguredProviderRequestSecretPath(path) || matchesConfigPath(path, [
|
|
315
|
+
"agents",
|
|
316
|
+
"defaults",
|
|
317
|
+
"memorySearch",
|
|
318
|
+
"remote",
|
|
319
|
+
"headers",
|
|
320
|
+
"*"
|
|
321
|
+
]) || matchesConfigPath(path, [
|
|
322
|
+
"diagnostics",
|
|
323
|
+
"otel",
|
|
324
|
+
"headers",
|
|
325
|
+
"*"
|
|
326
|
+
]);
|
|
327
|
+
}
|
|
328
|
+
function isRawEnvMapValuePath(path) {
|
|
329
|
+
return path.length >= 2 && path.at(-2) === "env";
|
|
330
|
+
}
|
|
331
|
+
function isMediaConfiguredProviderRequestSecretPath(path) {
|
|
332
|
+
return isConfiguredProviderRequestSecretPath(path, [
|
|
333
|
+
"tools",
|
|
334
|
+
"media",
|
|
335
|
+
"models",
|
|
336
|
+
"#"
|
|
337
|
+
]) || isConfiguredProviderRequestSecretPath(path, [
|
|
338
|
+
"tools",
|
|
339
|
+
"media",
|
|
340
|
+
"audio"
|
|
341
|
+
]) || isConfiguredProviderRequestSecretPath(path, [
|
|
342
|
+
"tools",
|
|
343
|
+
"media",
|
|
344
|
+
"audio",
|
|
345
|
+
"models",
|
|
346
|
+
"#"
|
|
347
|
+
]) || isConfiguredProviderRequestSecretPath(path, [
|
|
348
|
+
"tools",
|
|
349
|
+
"media",
|
|
350
|
+
"image"
|
|
351
|
+
]) || isConfiguredProviderRequestSecretPath(path, [
|
|
352
|
+
"tools",
|
|
353
|
+
"media",
|
|
354
|
+
"image",
|
|
355
|
+
"models",
|
|
356
|
+
"#"
|
|
357
|
+
]) || isConfiguredProviderRequestSecretPath(path, [
|
|
358
|
+
"tools",
|
|
359
|
+
"media",
|
|
360
|
+
"video"
|
|
361
|
+
]) || isConfiguredProviderRequestSecretPath(path, [
|
|
362
|
+
"tools",
|
|
363
|
+
"media",
|
|
364
|
+
"video",
|
|
365
|
+
"models",
|
|
366
|
+
"#"
|
|
367
|
+
]);
|
|
368
|
+
}
|
|
369
|
+
function isConfiguredProviderRequestSecretPath(path, prefix) {
|
|
370
|
+
if (path.length < prefix.length + 3) return false;
|
|
371
|
+
if (!matchesConfigPathPrefix(path, prefix)) return false;
|
|
372
|
+
const requestIndex = prefix.length;
|
|
373
|
+
if (path[requestIndex] !== "request") return false;
|
|
374
|
+
const suffix = path.slice(requestIndex + 1);
|
|
375
|
+
if (suffix.length === 2 && suffix[0] === "headers") return true;
|
|
376
|
+
if (suffix.length === 2 && suffix[0] === "auth" && isConfiguredProviderAuthSecretKey(suffix[1])) return true;
|
|
377
|
+
if (suffix.length === 2 && suffix[0] === "tls" && isConfiguredProviderTlsSecretKey(suffix[1])) return true;
|
|
378
|
+
return suffix.length === 3 && suffix[0] === "proxy" && suffix[1] === "tls" && isConfiguredProviderTlsSecretKey(suffix[2]);
|
|
379
|
+
}
|
|
380
|
+
function matchesConfigPathPrefix(path, prefix) {
|
|
381
|
+
if (path.length < prefix.length) return false;
|
|
382
|
+
return prefix.every((segment, index) => {
|
|
383
|
+
const value = path[index];
|
|
384
|
+
if (segment === "*") return value !== void 0 && value !== "";
|
|
385
|
+
if (segment === "#") return value?.startsWith("#") ?? false;
|
|
386
|
+
return value === segment;
|
|
387
|
+
});
|
|
388
|
+
}
|
|
389
|
+
function matchesConfigPath(path, pattern) {
|
|
390
|
+
return path.length === pattern.length && matchesConfigPathPrefix(path, pattern);
|
|
391
|
+
}
|
|
392
|
+
function isConfiguredProviderTlsSecretKey(key) {
|
|
393
|
+
return key === "ca" || key === "cert" || key === "key" || key === "passphrase";
|
|
394
|
+
}
|
|
395
|
+
function isConfiguredProviderAuthSecretKey(key) {
|
|
396
|
+
return key === "token" || key === "value";
|
|
397
|
+
}
|
|
398
|
+
function isSecretInputKey(key) {
|
|
399
|
+
const normalized = key.toLowerCase();
|
|
400
|
+
return normalized === "apikey" || normalized === "keyref" || normalized === "token" || normalized === "tokenref" || normalized === "password" || normalized === "secret" || normalized === "encryptkey" || normalized === "webhooksecret" || normalized === "serviceaccount" || normalized === "serviceaccountref" || normalized === "privatekey" || normalized === "certificate" || normalized === "certificatedata" || normalized === "identitydata" || normalized === "knownhosts" || normalized === "knownhostsdata" || normalized.endsWith("apikey") || normalized.endsWith("token") || normalized.endsWith("secret") || normalized.endsWith("password");
|
|
401
|
+
}
|
|
402
|
+
function secretRefDefaults(value) {
|
|
403
|
+
if (!isRecord$1(value)) return;
|
|
404
|
+
const defaults = {};
|
|
405
|
+
if (typeof value.env === "string") defaults.env = value.env;
|
|
406
|
+
if (typeof value.file === "string") defaults.file = value.file;
|
|
407
|
+
if (typeof value.exec === "string") defaults.exec = value.exec;
|
|
408
|
+
return defaults;
|
|
409
|
+
}
|
|
410
|
+
function secretRefEvidence(value, defaults) {
|
|
411
|
+
const ref = coerceSecretRef(value, defaults);
|
|
412
|
+
return ref === null ? void 0 : {
|
|
413
|
+
source: ref.source,
|
|
414
|
+
provider: ref.provider,
|
|
415
|
+
id: ref.id
|
|
416
|
+
};
|
|
417
|
+
}
|
|
418
|
+
function secretProviderInsecureFlags(value) {
|
|
419
|
+
if (!isRecord$1(value)) return [];
|
|
420
|
+
return [...value.allowInsecurePath === true ? ["allowInsecurePath"] : [], ...value.allowSymlinkCommand === true ? ["allowSymlinkCommand"] : []];
|
|
421
|
+
}
|
|
422
|
+
function isValidAuthProfileMetadata(value) {
|
|
423
|
+
if (!isRecord$1(value)) return false;
|
|
424
|
+
return typeof value.provider === "string" && value.provider.trim() !== "" && isAuthProfileMode(value.mode);
|
|
425
|
+
}
|
|
426
|
+
function isAuthProfileMode(value) {
|
|
427
|
+
return value === "api_key" || value === "aws-sdk" || value === "oauth" || value === "token";
|
|
428
|
+
}
|
|
429
|
+
function scanPolicyTools(raw) {
|
|
430
|
+
return Promise.resolve(scanPolicyToolHeaders(raw));
|
|
431
|
+
}
|
|
432
|
+
function scanPolicyToolHeaders(raw) {
|
|
433
|
+
const section = markdownSectionLines(raw, "tools");
|
|
434
|
+
if (section.length === 0) return [];
|
|
435
|
+
const tools = [];
|
|
436
|
+
for (let index = 0; index < section.length; index += 1) {
|
|
437
|
+
const line = section[index]?.text ?? "";
|
|
438
|
+
const heading = /^###\s+([^\s#]+)(.*)$/.exec(line);
|
|
439
|
+
const bullet = /^[-*+]\s+([^:\s][^:]*?)\s*:(.*)$/.exec(line);
|
|
440
|
+
const match = heading ?? bullet;
|
|
441
|
+
if (match === null || slugify(match[1]).length === 0) continue;
|
|
442
|
+
const id = slugify(match[1]);
|
|
443
|
+
const entry = {
|
|
444
|
+
id,
|
|
445
|
+
source: `oc://TOOLS.md/tools/${id}`,
|
|
446
|
+
line: section[index]?.line ?? index + 1
|
|
447
|
+
};
|
|
448
|
+
const metaLines = [match[2] ?? ""];
|
|
449
|
+
for (let metaIndex = index + 1; metaIndex < section.length; metaIndex += 1) {
|
|
450
|
+
const metaLine = section[metaIndex]?.text ?? "";
|
|
451
|
+
if (/^###\s+\S+/.test(metaLine.trim()) || /^[-*+]\s+[^:\s][^:]*?\s*:/.test(metaLine)) break;
|
|
452
|
+
metaLines.push(metaLine);
|
|
453
|
+
}
|
|
454
|
+
const meta = metaLines.join("\n");
|
|
455
|
+
const risk = riskFromMeta(meta);
|
|
456
|
+
const sensitivity = /\bsensitivity\s*:\s*([a-z0-9_-]+)\b/i.exec(meta)?.[1]?.toLowerCase();
|
|
457
|
+
const owner = /\bowner\s*:\s*([^\s#]+)\b/i.exec(meta)?.[1];
|
|
458
|
+
const capabilities = capabilityTokensFromMetaLines(metaLines);
|
|
459
|
+
if (risk !== void 0) entry.risk = risk;
|
|
460
|
+
if (sensitivity !== void 0) entry.sensitivity = sensitivity;
|
|
461
|
+
if (owner !== void 0) entry.owner = owner;
|
|
462
|
+
if (capabilities.length > 0) entry.capabilities = capabilities;
|
|
463
|
+
tools.push(entry);
|
|
464
|
+
}
|
|
465
|
+
return tools;
|
|
466
|
+
}
|
|
467
|
+
function markdownSectionLines(raw, sectionSlug) {
|
|
468
|
+
const lines = raw.split(/\r?\n/);
|
|
469
|
+
let sectionDepth;
|
|
470
|
+
const section = [];
|
|
471
|
+
for (let index = 0; index < lines.length; index += 1) {
|
|
472
|
+
const line = lines[index] ?? "";
|
|
473
|
+
const heading = /^(#{1,6})\s+(.+?)\s*#*\s*$/.exec(line);
|
|
474
|
+
if (heading !== null) {
|
|
475
|
+
const depth = heading[1]?.length ?? 0;
|
|
476
|
+
const slug = slugify(heading[2] ?? "");
|
|
477
|
+
if (sectionDepth !== void 0 && depth <= sectionDepth) break;
|
|
478
|
+
if (sectionDepth !== void 0) {
|
|
479
|
+
section.push({
|
|
480
|
+
line: index + 1,
|
|
481
|
+
text: line
|
|
482
|
+
});
|
|
483
|
+
continue;
|
|
484
|
+
}
|
|
485
|
+
if (sectionDepth === void 0 && slug === sectionSlug) sectionDepth = depth;
|
|
486
|
+
continue;
|
|
487
|
+
}
|
|
488
|
+
if (sectionDepth !== void 0) section.push({
|
|
489
|
+
line: index + 1,
|
|
490
|
+
text: line
|
|
491
|
+
});
|
|
492
|
+
}
|
|
493
|
+
return section;
|
|
494
|
+
}
|
|
495
|
+
function slugify(text) {
|
|
496
|
+
return text.toLowerCase().replace(/_/g, "-").replace(NON_SLUG_CHARS, "-").replace(COLLAPSE_HYPHENS, "-").replace(TRIM_HYPHENS, "");
|
|
497
|
+
}
|
|
498
|
+
function riskFromMeta(meta) {
|
|
499
|
+
const namedRisk = /\brisk\s*:\s*([a-z0-9_-]+)\b/i.exec(meta)?.[1];
|
|
500
|
+
if (namedRisk !== void 0) return namedRisk.toLowerCase();
|
|
501
|
+
switch (/\bR([0-5])\b/.exec(meta)?.[1]) {
|
|
502
|
+
case "0":
|
|
503
|
+
case "1": return "low";
|
|
504
|
+
case "2":
|
|
505
|
+
case "3": return "medium";
|
|
506
|
+
case "4": return "high";
|
|
507
|
+
case "5": return "critical";
|
|
508
|
+
default: return;
|
|
509
|
+
}
|
|
510
|
+
}
|
|
511
|
+
function capabilityTokensFromMetaLines(lines) {
|
|
512
|
+
return lines.flatMap((line, index) => {
|
|
513
|
+
const trimmed = line.trim();
|
|
514
|
+
if (trimmed.length === 0) return [];
|
|
515
|
+
const tokens = trimmed.match(/\b[A-Z][A-Z0-9_]{2,}\b/g) ?? [];
|
|
516
|
+
if (index === 0 || /\bcapabilities\s*:/i.test(trimmed)) return tokens;
|
|
517
|
+
const withoutTokens = tokens.reduce((remaining, token) => {
|
|
518
|
+
return remaining.replace(token, "");
|
|
519
|
+
}, trimmed);
|
|
520
|
+
return /^[\s,;:[\](){}#*_-]*$/.test(withoutTokens) ? tokens : [];
|
|
521
|
+
});
|
|
522
|
+
}
|
|
523
|
+
function configuredChannels(cfg) {
|
|
524
|
+
return isRecord$1(cfg.channels) ? cfg.channels : {};
|
|
525
|
+
}
|
|
526
|
+
function configuredMcpServers(cfg) {
|
|
527
|
+
return isRecord$1(cfg.mcp) && isRecord$1(cfg.mcp.servers) ? cfg.mcp.servers : {};
|
|
528
|
+
}
|
|
529
|
+
function mcpServerTransport(value) {
|
|
530
|
+
if (!isRecord$1(value)) return "unknown";
|
|
531
|
+
if (typeof value.command === "string") return "stdio";
|
|
532
|
+
if (value.transport === "sse" || value.transport === "streamable-http") return value.transport;
|
|
533
|
+
if (typeof value.url === "string") return "streamable-http";
|
|
534
|
+
return "unknown";
|
|
535
|
+
}
|
|
536
|
+
function redactMcpUrlForEvidence(raw) {
|
|
537
|
+
try {
|
|
538
|
+
const url = new URL(raw);
|
|
539
|
+
return `${url.protocol}//${url.host}`;
|
|
540
|
+
} catch {
|
|
541
|
+
return "[redacted-url]";
|
|
542
|
+
}
|
|
543
|
+
}
|
|
544
|
+
function configuredModelProviders(cfg) {
|
|
545
|
+
return isRecord$1(cfg.models) && isRecord$1(cfg.models.providers) ? cfg.models.providers : {};
|
|
546
|
+
}
|
|
547
|
+
function networkBooleanEvidence(cfg, id, path, source) {
|
|
548
|
+
const value = readBooleanPath(cfg, path);
|
|
549
|
+
return value === void 0 ? void 0 : {
|
|
550
|
+
id,
|
|
551
|
+
source,
|
|
552
|
+
value
|
|
553
|
+
};
|
|
554
|
+
}
|
|
555
|
+
function pushGatewayBooleanEvidence(entries, id, kind, value, source) {
|
|
556
|
+
if (typeof value !== "boolean") return;
|
|
557
|
+
entries.push({
|
|
558
|
+
id,
|
|
559
|
+
kind,
|
|
560
|
+
source,
|
|
561
|
+
value
|
|
562
|
+
});
|
|
563
|
+
}
|
|
564
|
+
function pushGatewayHttpEndpointEvidence(entries, endpoints, endpoint) {
|
|
565
|
+
const config = endpoints[endpoint];
|
|
566
|
+
if (!isRecord$1(config)) return;
|
|
567
|
+
const source = `oc://daocore.config/gateway/http/endpoints/${endpoint}`;
|
|
568
|
+
const enabled = config.enabled === true;
|
|
569
|
+
if (enabled) entries.push({
|
|
570
|
+
id: `gateway-http-${endpoint}`,
|
|
571
|
+
kind: "httpEndpoint",
|
|
572
|
+
source: `${source}/enabled`,
|
|
573
|
+
value: true,
|
|
574
|
+
endpoint
|
|
575
|
+
});
|
|
576
|
+
if (!enabled) return;
|
|
577
|
+
if (endpoint === "chatCompletions") {
|
|
578
|
+
pushGatewayHttpUrlFetchEvidence(entries, source, endpoint, ["images"], config.images);
|
|
579
|
+
return;
|
|
580
|
+
}
|
|
581
|
+
pushGatewayHttpUrlFetchEvidence(entries, source, endpoint, ["files"], config.files);
|
|
582
|
+
pushGatewayHttpUrlFetchEvidence(entries, source, endpoint, ["images"], config.images);
|
|
583
|
+
}
|
|
584
|
+
function pushGatewayHttpUrlFetchEvidence(entries, endpointSource, endpoint, path, value) {
|
|
585
|
+
const allowUrl = isRecord$1(value) ? value.allowUrl : void 0;
|
|
586
|
+
if (allowUrl === false || allowUrl !== true && endpoint !== "responses") return;
|
|
587
|
+
const allowlist = isRecord$1(value) ? value.urlAllowlist : void 0;
|
|
588
|
+
const hasEffectiveAllowlist = Array.isArray(allowlist) && allowlist.some((entry) => isEffectiveGatewayUrlAllowlistEntry(entry));
|
|
589
|
+
entries.push({
|
|
590
|
+
id: `gateway-http-${endpoint}-${path.join("-")}-url-fetch`,
|
|
591
|
+
kind: "httpUrlFetch",
|
|
592
|
+
source: `${endpointSource}/${path.map(ocPathSegment).join("/")}/allowUrl`,
|
|
593
|
+
value: true,
|
|
594
|
+
endpoint,
|
|
595
|
+
explicit: allowUrl === true,
|
|
596
|
+
hasAllowlist: hasEffectiveAllowlist
|
|
597
|
+
});
|
|
598
|
+
}
|
|
599
|
+
function isEffectiveGatewayUrlAllowlistEntry(value) {
|
|
600
|
+
if (typeof value !== "string") return false;
|
|
601
|
+
const normalized = value.trim().toLowerCase();
|
|
602
|
+
return normalized !== "" && normalized !== "*" && normalized !== "*.";
|
|
603
|
+
}
|
|
604
|
+
function isGatewayNonLoopbackBind(value) {
|
|
605
|
+
return value === "auto" || value === "lan" || value === "custom" || value === "tailnet";
|
|
606
|
+
}
|
|
607
|
+
function isRuntimeNonLoopbackCustomBindHost(value) {
|
|
608
|
+
const normalized = value.trim().toLowerCase();
|
|
609
|
+
return isCanonicalDottedDecimalIPv4(normalized) && !normalized.startsWith("127.");
|
|
610
|
+
}
|
|
611
|
+
function isCanonicalDottedDecimalIPv4(value) {
|
|
612
|
+
return /^(?:25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(?:\.(?:25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}$/.test(value);
|
|
613
|
+
}
|
|
614
|
+
function readBooleanPath(value, path) {
|
|
615
|
+
let current = value;
|
|
616
|
+
for (const part of path) {
|
|
617
|
+
if (!isRecord$1(current)) return;
|
|
618
|
+
current = current[part];
|
|
619
|
+
}
|
|
620
|
+
return typeof current === "boolean" ? current : void 0;
|
|
621
|
+
}
|
|
622
|
+
function collectModelRefsFromValue(refs, value, source) {
|
|
623
|
+
if (typeof value === "string") {
|
|
624
|
+
pushModelRef(refs, value, source);
|
|
625
|
+
return;
|
|
626
|
+
}
|
|
627
|
+
if (!isRecord$1(value)) return;
|
|
628
|
+
if (typeof value.primary === "string") pushModelRef(refs, value.primary, `${source}/primary`);
|
|
629
|
+
if (Array.isArray(value.fallbacks)) {
|
|
630
|
+
for (const [index, fallback] of value.fallbacks.entries()) if (typeof fallback === "string") pushModelRef(refs, fallback, `${source}/fallbacks/#${index}`);
|
|
631
|
+
}
|
|
632
|
+
}
|
|
633
|
+
function collectModelRefsFromRecord(refs, value, source) {
|
|
634
|
+
for (const [key, child] of Object.entries(value)) {
|
|
635
|
+
const childPath = `${source}/${key}`;
|
|
636
|
+
if (isModelSettingKey(key)) {
|
|
637
|
+
collectModelRefsFromValue(refs, child, childPath);
|
|
638
|
+
continue;
|
|
639
|
+
}
|
|
640
|
+
if (Array.isArray(child)) {
|
|
641
|
+
for (const [index, item] of child.entries()) if (isRecord$1(item)) collectModelRefsFromRecord(refs, item, `${childPath}/#${index}`);
|
|
642
|
+
continue;
|
|
643
|
+
}
|
|
644
|
+
if (isRecord$1(child)) collectModelRefsFromRecord(refs, child, childPath);
|
|
645
|
+
}
|
|
646
|
+
}
|
|
647
|
+
function collectModelRefsFromAgentAllowlist(refs, agents) {
|
|
648
|
+
const defaults = agents.defaults;
|
|
649
|
+
if (isRecord$1(defaults) && isRecord$1(defaults.models)) collectModelRefsFromModelMap(refs, defaults.models, "oc://daocore.config/agents/defaults/models");
|
|
650
|
+
const list = agents.list;
|
|
651
|
+
if (!Array.isArray(list)) return;
|
|
652
|
+
for (const [index, agent] of list.entries()) {
|
|
653
|
+
if (!isRecord$1(agent) || !isRecord$1(agent.models)) continue;
|
|
654
|
+
collectModelRefsFromModelMap(refs, agent.models, `oc://daocore.config/agents/list/#${index}/models`);
|
|
655
|
+
}
|
|
656
|
+
}
|
|
657
|
+
function collectModelRefsFromModelMap(refs, models, source) {
|
|
658
|
+
for (const ref of Object.keys(models)) pushModelRef(refs, ref, `${source}/${ocPathSegment(ref)}`);
|
|
659
|
+
}
|
|
660
|
+
function isModelSettingKey(key) {
|
|
661
|
+
return key === "model" || key.endsWith("Model");
|
|
662
|
+
}
|
|
663
|
+
function ocPathSegment(value) {
|
|
664
|
+
if (/^(?:[A-Za-z0-9_-]+|#\d+)$/.test(value)) return value;
|
|
665
|
+
if (value.includes("\"") || value.includes("\\")) return value;
|
|
666
|
+
return `"${value}"`;
|
|
667
|
+
}
|
|
668
|
+
function pushModelRef(refs, ref, source) {
|
|
669
|
+
const parsed = parseModelRef(ref);
|
|
670
|
+
if (parsed === void 0) return;
|
|
671
|
+
refs.push({
|
|
672
|
+
ref,
|
|
673
|
+
provider: parsed.provider,
|
|
674
|
+
model: parsed.model,
|
|
675
|
+
source
|
|
676
|
+
});
|
|
677
|
+
}
|
|
678
|
+
function parseModelRef(ref) {
|
|
679
|
+
const trimmed = ref.trim();
|
|
680
|
+
const slash = trimmed.indexOf("/");
|
|
681
|
+
if (slash <= 0 || slash >= trimmed.length - 1) return;
|
|
682
|
+
return {
|
|
683
|
+
provider: normalizeProviderId(trimmed.slice(0, slash)),
|
|
684
|
+
model: trimmed.slice(slash + 1)
|
|
685
|
+
};
|
|
686
|
+
}
|
|
687
|
+
function sha256(value) {
|
|
688
|
+
return `sha256:${createHash("sha256").update(value).digest("hex")}`;
|
|
689
|
+
}
|
|
690
|
+
function stableJson(value) {
|
|
691
|
+
if (Array.isArray(value)) return `[${value.map(stableJson).join(",")}]`;
|
|
692
|
+
if (isRecord$1(value)) return `{${Object.entries(value).toSorted(([a], [b]) => a.localeCompare(b)).map(([key, child]) => `${JSON.stringify(key)}:${stableJson(child)}`).join(",")}}`;
|
|
693
|
+
return JSON.stringify(value);
|
|
694
|
+
}
|
|
695
|
+
function isRecord$1(value) {
|
|
696
|
+
return typeof value === "object" && value !== null && !Array.isArray(value);
|
|
697
|
+
}
|
|
698
|
+
//#endregion
|
|
699
|
+
//#region extensions/policy/src/doctor/register.ts
|
|
700
|
+
const CHECK_IDS = {
|
|
701
|
+
policyAttestationMismatch: "policy/attestation-hash-mismatch",
|
|
702
|
+
policyDeniedChannelProvider: "policy/channels-denied-provider",
|
|
703
|
+
policyHashMismatch: "policy/policy-hash-mismatch",
|
|
704
|
+
policyInvalidFile: "policy/policy-jsonc-invalid",
|
|
705
|
+
policyMissingFile: "policy/policy-jsonc-missing",
|
|
706
|
+
policyDeniedMcpServer: "policy/mcp-denied-server",
|
|
707
|
+
policyUnapprovedMcpServer: "policy/mcp-unapproved-server",
|
|
708
|
+
policyDeniedModelProvider: "policy/models-denied-provider",
|
|
709
|
+
policyUnapprovedModelProvider: "policy/models-unapproved-provider",
|
|
710
|
+
policyPrivateNetworkAccess: "policy/network-private-access-enabled",
|
|
711
|
+
policyGatewayNonLoopbackBind: "policy/gateway-non-loopback-bind",
|
|
712
|
+
policyGatewayAuthDisabled: "policy/gateway-auth-disabled",
|
|
713
|
+
policyGatewayRateLimitMissing: "policy/gateway-rate-limit-missing",
|
|
714
|
+
policyGatewayControlUiInsecure: "policy/gateway-control-ui-insecure",
|
|
715
|
+
policyGatewayTailscaleFunnel: "policy/gateway-tailscale-funnel",
|
|
716
|
+
policyGatewayRemoteEnabled: "policy/gateway-remote-enabled",
|
|
717
|
+
policyGatewayHttpEndpointEnabled: "policy/gateway-http-endpoint-enabled",
|
|
718
|
+
policyGatewayHttpUrlFetchUnrestricted: "policy/gateway-http-url-fetch-unrestricted",
|
|
719
|
+
policySecretsUnmanagedProvider: "policy/secrets-unmanaged-provider",
|
|
720
|
+
policySecretsDeniedProviderSource: "policy/secrets-denied-provider-source",
|
|
721
|
+
policySecretsInsecureProvider: "policy/secrets-insecure-provider",
|
|
722
|
+
policyAuthProfileInvalidMetadata: "policy/auth-profile-invalid-metadata",
|
|
723
|
+
policyAuthProfileUnapprovedMode: "policy/auth-profile-unapproved-mode",
|
|
724
|
+
policyMissingToolOwner: "policy/tools-missing-owner",
|
|
725
|
+
policyMissingToolRisk: "policy/tools-missing-risk-level",
|
|
726
|
+
policyMissingToolSensitivity: "policy/tools-missing-sensitivity-token",
|
|
727
|
+
policyUnknownToolRisk: "policy/tools-unknown-risk-level",
|
|
728
|
+
policyUnknownToolSensitivity: "policy/tools-unknown-sensitivity-token"
|
|
729
|
+
};
|
|
730
|
+
const POLICY_CHECK_IDS = [
|
|
731
|
+
CHECK_IDS.policyMissingFile,
|
|
732
|
+
CHECK_IDS.policyInvalidFile,
|
|
733
|
+
CHECK_IDS.policyHashMismatch,
|
|
734
|
+
CHECK_IDS.policyAttestationMismatch,
|
|
735
|
+
CHECK_IDS.policyDeniedChannelProvider,
|
|
736
|
+
CHECK_IDS.policyDeniedMcpServer,
|
|
737
|
+
CHECK_IDS.policyUnapprovedMcpServer,
|
|
738
|
+
CHECK_IDS.policyDeniedModelProvider,
|
|
739
|
+
CHECK_IDS.policyUnapprovedModelProvider,
|
|
740
|
+
CHECK_IDS.policyPrivateNetworkAccess,
|
|
741
|
+
CHECK_IDS.policyGatewayNonLoopbackBind,
|
|
742
|
+
CHECK_IDS.policyGatewayAuthDisabled,
|
|
743
|
+
CHECK_IDS.policyGatewayRateLimitMissing,
|
|
744
|
+
CHECK_IDS.policyGatewayControlUiInsecure,
|
|
745
|
+
CHECK_IDS.policyGatewayTailscaleFunnel,
|
|
746
|
+
CHECK_IDS.policyGatewayRemoteEnabled,
|
|
747
|
+
CHECK_IDS.policyGatewayHttpEndpointEnabled,
|
|
748
|
+
CHECK_IDS.policyGatewayHttpUrlFetchUnrestricted,
|
|
749
|
+
CHECK_IDS.policySecretsUnmanagedProvider,
|
|
750
|
+
CHECK_IDS.policySecretsDeniedProviderSource,
|
|
751
|
+
CHECK_IDS.policySecretsInsecureProvider,
|
|
752
|
+
CHECK_IDS.policyAuthProfileInvalidMetadata,
|
|
753
|
+
CHECK_IDS.policyAuthProfileUnapprovedMode,
|
|
754
|
+
CHECK_IDS.policyMissingToolRisk,
|
|
755
|
+
CHECK_IDS.policyUnknownToolRisk,
|
|
756
|
+
CHECK_IDS.policyMissingToolSensitivity,
|
|
757
|
+
CHECK_IDS.policyMissingToolOwner,
|
|
758
|
+
CHECK_IDS.policyUnknownToolSensitivity
|
|
759
|
+
];
|
|
760
|
+
const KNOWN_RISK_LEVELS = [
|
|
761
|
+
"low",
|
|
762
|
+
"medium",
|
|
763
|
+
"high",
|
|
764
|
+
"critical"
|
|
765
|
+
];
|
|
766
|
+
const KNOWN_SENSITIVITY_LEVELS = [
|
|
767
|
+
"public",
|
|
768
|
+
"internal",
|
|
769
|
+
"confidential",
|
|
770
|
+
"restricted"
|
|
771
|
+
];
|
|
772
|
+
const SUPPORTED_TOOL_METADATA = [
|
|
773
|
+
"risk",
|
|
774
|
+
"sensitivity",
|
|
775
|
+
"owner"
|
|
776
|
+
];
|
|
777
|
+
const SUPPORTED_AUTH_PROFILE_METADATA = ["provider", "mode"];
|
|
778
|
+
const SUPPORTED_AUTH_PROFILE_MODES = [
|
|
779
|
+
"api_key",
|
|
780
|
+
"aws-sdk",
|
|
781
|
+
"oauth",
|
|
782
|
+
"token"
|
|
783
|
+
];
|
|
784
|
+
const SUPPORTED_GATEWAY_HTTP_ENDPOINTS = ["chatCompletions", "responses"];
|
|
785
|
+
let registered = false;
|
|
786
|
+
const policyEvaluationCache = /* @__PURE__ */ new WeakMap();
|
|
787
|
+
function registerPolicyDoctorChecks(host) {
|
|
788
|
+
if (registered) return;
|
|
789
|
+
const registerHealthCheck$1 = host?.registerHealthCheck ?? registerHealthCheck;
|
|
790
|
+
registerHealthCheck$1(policyMissingFileCheck);
|
|
791
|
+
registerHealthCheck$1(policyInvalidFileCheck);
|
|
792
|
+
registerHealthCheck$1(policyHashMismatchCheck);
|
|
793
|
+
registerHealthCheck$1(policyAttestationMismatchCheck);
|
|
794
|
+
registerHealthCheck$1(policyChannelsDeniedProviderCheck);
|
|
795
|
+
registerHealthCheck$1(policyMcpDeniedServerCheck);
|
|
796
|
+
registerHealthCheck$1(policyMcpUnapprovedServerCheck);
|
|
797
|
+
registerHealthCheck$1(policyModelsDeniedProviderCheck);
|
|
798
|
+
registerHealthCheck$1(policyModelsUnapprovedProviderCheck);
|
|
799
|
+
registerHealthCheck$1(policyNetworkPrivateAccessCheck);
|
|
800
|
+
registerHealthCheck$1(policyGatewayNonLoopbackBindCheck);
|
|
801
|
+
registerHealthCheck$1(policyGatewayAuthDisabledCheck);
|
|
802
|
+
registerHealthCheck$1(policyGatewayRateLimitMissingCheck);
|
|
803
|
+
registerHealthCheck$1(policyGatewayControlUiInsecureCheck);
|
|
804
|
+
registerHealthCheck$1(policyGatewayTailscaleFunnelCheck);
|
|
805
|
+
registerHealthCheck$1(policyGatewayRemoteEnabledCheck);
|
|
806
|
+
registerHealthCheck$1(policyGatewayHttpEndpointEnabledCheck);
|
|
807
|
+
registerHealthCheck$1(policyGatewayHttpUrlFetchUnrestrictedCheck);
|
|
808
|
+
registerHealthCheck$1(policySecretsUnmanagedProviderCheck);
|
|
809
|
+
registerHealthCheck$1(policySecretsDeniedProviderSourceCheck);
|
|
810
|
+
registerHealthCheck$1(policySecretsInsecureProviderCheck);
|
|
811
|
+
registerHealthCheck$1(policyAuthProfileInvalidMetadataCheck);
|
|
812
|
+
registerHealthCheck$1(policyAuthProfileUnapprovedModeCheck);
|
|
813
|
+
registerHealthCheck$1(policyToolsMissingRiskCheck);
|
|
814
|
+
registerHealthCheck$1(policyToolsUnknownRiskCheck);
|
|
815
|
+
registerHealthCheck$1(policyToolsMissingSensitivityCheck);
|
|
816
|
+
registerHealthCheck$1(policyToolsMissingOwnerCheck);
|
|
817
|
+
registerHealthCheck$1(policyToolsUnknownSensitivityCheck);
|
|
818
|
+
registered = true;
|
|
819
|
+
}
|
|
820
|
+
function evaluatePolicy(ctx) {
|
|
821
|
+
const cached = policyEvaluationCache.get(ctx);
|
|
822
|
+
if (cached !== void 0) return cached;
|
|
823
|
+
const next = evaluatePolicyUncached(ctx);
|
|
824
|
+
policyEvaluationCache.set(ctx, next);
|
|
825
|
+
return next;
|
|
826
|
+
}
|
|
827
|
+
const policyMissingFileCheck = {
|
|
828
|
+
id: CHECK_IDS.policyMissingFile,
|
|
829
|
+
kind: "plugin",
|
|
830
|
+
description: "The enabled Policy plugin has a policy file to verify.",
|
|
831
|
+
source: "policy",
|
|
832
|
+
async detect(ctx) {
|
|
833
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyMissingFile);
|
|
834
|
+
}
|
|
835
|
+
};
|
|
836
|
+
const policyHashMismatchCheck = {
|
|
837
|
+
id: CHECK_IDS.policyHashMismatch,
|
|
838
|
+
kind: "plugin",
|
|
839
|
+
description: "The policy file matches the configured expected hash.",
|
|
840
|
+
source: "policy",
|
|
841
|
+
async detect(ctx) {
|
|
842
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyHashMismatch);
|
|
843
|
+
}
|
|
844
|
+
};
|
|
845
|
+
const policyAttestationMismatchCheck = {
|
|
846
|
+
id: CHECK_IDS.policyAttestationMismatch,
|
|
847
|
+
kind: "plugin",
|
|
848
|
+
description: "The current policy check matches the accepted attestation.",
|
|
849
|
+
source: "policy",
|
|
850
|
+
async detect(ctx) {
|
|
851
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyAttestationMismatch);
|
|
852
|
+
}
|
|
853
|
+
};
|
|
854
|
+
const policyInvalidFileCheck = {
|
|
855
|
+
id: CHECK_IDS.policyInvalidFile,
|
|
856
|
+
kind: "plugin",
|
|
857
|
+
description: "The enabled policy file parses before policy checks run.",
|
|
858
|
+
source: "policy",
|
|
859
|
+
async detect(ctx) {
|
|
860
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyInvalidFile);
|
|
861
|
+
}
|
|
862
|
+
};
|
|
863
|
+
const policyChannelsDeniedProviderCheck = {
|
|
864
|
+
id: CHECK_IDS.policyDeniedChannelProvider,
|
|
865
|
+
kind: "plugin",
|
|
866
|
+
description: "Configured channels satisfy policy deny rules.",
|
|
867
|
+
source: "policy",
|
|
868
|
+
async detect(ctx) {
|
|
869
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyDeniedChannelProvider);
|
|
870
|
+
},
|
|
871
|
+
async repair(ctx, findings) {
|
|
872
|
+
if (!workspaceRepairsEnabled(ctx)) return workspaceRepairsDisabledResult("channel config");
|
|
873
|
+
const channelIds = channelIdsFromFindings(findings);
|
|
874
|
+
if (channelIds.length === 0) return {
|
|
875
|
+
status: "skipped",
|
|
876
|
+
reason: "no channel findings matched a configurable channel",
|
|
877
|
+
changes: []
|
|
878
|
+
};
|
|
879
|
+
const next = disableChannels(ctx.cfg, channelIds);
|
|
880
|
+
if (next.changed.length === 0) return {
|
|
881
|
+
status: "skipped",
|
|
882
|
+
reason: "matching channels were already disabled or missing",
|
|
883
|
+
changes: []
|
|
884
|
+
};
|
|
885
|
+
return {
|
|
886
|
+
config: next.config,
|
|
887
|
+
changes: next.changed.map((id) => `Disabled channels.${id}.enabled for policy conformance.`)
|
|
888
|
+
};
|
|
889
|
+
}
|
|
890
|
+
};
|
|
891
|
+
const policyMcpDeniedServerCheck = {
|
|
892
|
+
id: CHECK_IDS.policyDeniedMcpServer,
|
|
893
|
+
kind: "plugin",
|
|
894
|
+
description: "Configured MCP servers do not match policy deny rules.",
|
|
895
|
+
source: "policy",
|
|
896
|
+
async detect(ctx) {
|
|
897
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyDeniedMcpServer);
|
|
898
|
+
}
|
|
899
|
+
};
|
|
900
|
+
const policyMcpUnapprovedServerCheck = {
|
|
901
|
+
id: CHECK_IDS.policyUnapprovedMcpServer,
|
|
902
|
+
kind: "plugin",
|
|
903
|
+
description: "Configured MCP servers do not match policy allow rules.",
|
|
904
|
+
source: "policy",
|
|
905
|
+
async detect(ctx) {
|
|
906
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyUnapprovedMcpServer);
|
|
907
|
+
}
|
|
908
|
+
};
|
|
909
|
+
const policyModelsDeniedProviderCheck = {
|
|
910
|
+
id: CHECK_IDS.policyDeniedModelProvider,
|
|
911
|
+
kind: "plugin",
|
|
912
|
+
description: "Configured model providers do not match policy deny rules.",
|
|
913
|
+
source: "policy",
|
|
914
|
+
async detect(ctx) {
|
|
915
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyDeniedModelProvider);
|
|
916
|
+
}
|
|
917
|
+
};
|
|
918
|
+
const policyModelsUnapprovedProviderCheck = {
|
|
919
|
+
id: CHECK_IDS.policyUnapprovedModelProvider,
|
|
920
|
+
kind: "plugin",
|
|
921
|
+
description: "Configured model providers do not match policy allow rules.",
|
|
922
|
+
source: "policy",
|
|
923
|
+
async detect(ctx) {
|
|
924
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyUnapprovedModelProvider);
|
|
925
|
+
}
|
|
926
|
+
};
|
|
927
|
+
const policyNetworkPrivateAccessCheck = {
|
|
928
|
+
id: CHECK_IDS.policyPrivateNetworkAccess,
|
|
929
|
+
kind: "plugin",
|
|
930
|
+
description: "Network SSRF policy settings match private-network requirements.",
|
|
931
|
+
source: "policy",
|
|
932
|
+
async detect(ctx) {
|
|
933
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyPrivateNetworkAccess);
|
|
934
|
+
}
|
|
935
|
+
};
|
|
936
|
+
const policyGatewayNonLoopbackBindCheck = {
|
|
937
|
+
id: CHECK_IDS.policyGatewayNonLoopbackBind,
|
|
938
|
+
kind: "plugin",
|
|
939
|
+
description: "Gateway bind posture matches policy exposure requirements.",
|
|
940
|
+
source: "policy",
|
|
941
|
+
async detect(ctx) {
|
|
942
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayNonLoopbackBind);
|
|
943
|
+
}
|
|
944
|
+
};
|
|
945
|
+
const policyGatewayAuthDisabledCheck = {
|
|
946
|
+
id: CHECK_IDS.policyGatewayAuthDisabled,
|
|
947
|
+
kind: "plugin",
|
|
948
|
+
description: "Gateway authentication remains enabled when required by policy.",
|
|
949
|
+
source: "policy",
|
|
950
|
+
async detect(ctx) {
|
|
951
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayAuthDisabled);
|
|
952
|
+
}
|
|
953
|
+
};
|
|
954
|
+
const policyGatewayRateLimitMissingCheck = {
|
|
955
|
+
id: CHECK_IDS.policyGatewayRateLimitMissing,
|
|
956
|
+
kind: "plugin",
|
|
957
|
+
description: "Gateway authentication rate-limit posture is explicit when required by policy.",
|
|
958
|
+
source: "policy",
|
|
959
|
+
async detect(ctx) {
|
|
960
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayRateLimitMissing);
|
|
961
|
+
}
|
|
962
|
+
};
|
|
963
|
+
const policyGatewayControlUiInsecureCheck = {
|
|
964
|
+
id: CHECK_IDS.policyGatewayControlUiInsecure,
|
|
965
|
+
kind: "plugin",
|
|
966
|
+
description: "Gateway Control UI insecure exposure toggles remain disabled by policy.",
|
|
967
|
+
source: "policy",
|
|
968
|
+
async detect(ctx) {
|
|
969
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayControlUiInsecure);
|
|
970
|
+
}
|
|
971
|
+
};
|
|
972
|
+
const policyGatewayTailscaleFunnelCheck = {
|
|
973
|
+
id: CHECK_IDS.policyGatewayTailscaleFunnel,
|
|
974
|
+
kind: "plugin",
|
|
975
|
+
description: "Gateway Tailscale Funnel exposure matches policy.",
|
|
976
|
+
source: "policy",
|
|
977
|
+
async detect(ctx) {
|
|
978
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayTailscaleFunnel);
|
|
979
|
+
}
|
|
980
|
+
};
|
|
981
|
+
const policyGatewayRemoteEnabledCheck = {
|
|
982
|
+
id: CHECK_IDS.policyGatewayRemoteEnabled,
|
|
983
|
+
kind: "plugin",
|
|
984
|
+
description: "Remote gateway mode matches policy.",
|
|
985
|
+
source: "policy",
|
|
986
|
+
async detect(ctx) {
|
|
987
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayRemoteEnabled);
|
|
988
|
+
}
|
|
989
|
+
};
|
|
990
|
+
const policyGatewayHttpEndpointEnabledCheck = {
|
|
991
|
+
id: CHECK_IDS.policyGatewayHttpEndpointEnabled,
|
|
992
|
+
kind: "plugin",
|
|
993
|
+
description: "Gateway HTTP API endpoints match policy.",
|
|
994
|
+
source: "policy",
|
|
995
|
+
async detect(ctx) {
|
|
996
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayHttpEndpointEnabled);
|
|
997
|
+
}
|
|
998
|
+
};
|
|
999
|
+
const policyGatewayHttpUrlFetchUnrestrictedCheck = {
|
|
1000
|
+
id: CHECK_IDS.policyGatewayHttpUrlFetchUnrestricted,
|
|
1001
|
+
kind: "plugin",
|
|
1002
|
+
description: "Gateway HTTP URL-fetch inputs have allowlists when required by policy.",
|
|
1003
|
+
source: "policy",
|
|
1004
|
+
async detect(ctx) {
|
|
1005
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyGatewayHttpUrlFetchUnrestricted);
|
|
1006
|
+
}
|
|
1007
|
+
};
|
|
1008
|
+
const policySecretsUnmanagedProviderCheck = {
|
|
1009
|
+
id: CHECK_IDS.policySecretsUnmanagedProvider,
|
|
1010
|
+
kind: "plugin",
|
|
1011
|
+
description: "DaoCore config SecretRefs use configured secret providers when policy requires managed providers.",
|
|
1012
|
+
source: "policy",
|
|
1013
|
+
async detect(ctx) {
|
|
1014
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policySecretsUnmanagedProvider);
|
|
1015
|
+
}
|
|
1016
|
+
};
|
|
1017
|
+
const policySecretsDeniedProviderSourceCheck = {
|
|
1018
|
+
id: CHECK_IDS.policySecretsDeniedProviderSource,
|
|
1019
|
+
kind: "plugin",
|
|
1020
|
+
description: "DaoCore config secret providers and SecretRefs do not use sources denied by policy.",
|
|
1021
|
+
source: "policy",
|
|
1022
|
+
async detect(ctx) {
|
|
1023
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policySecretsDeniedProviderSource);
|
|
1024
|
+
}
|
|
1025
|
+
};
|
|
1026
|
+
const policySecretsInsecureProviderCheck = {
|
|
1027
|
+
id: CHECK_IDS.policySecretsInsecureProvider,
|
|
1028
|
+
kind: "plugin",
|
|
1029
|
+
description: "Configured secret providers do not opt into insecure posture unless policy allows it.",
|
|
1030
|
+
source: "policy",
|
|
1031
|
+
async detect(ctx) {
|
|
1032
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policySecretsInsecureProvider);
|
|
1033
|
+
}
|
|
1034
|
+
};
|
|
1035
|
+
const policyAuthProfileInvalidMetadataCheck = {
|
|
1036
|
+
id: CHECK_IDS.policyAuthProfileInvalidMetadata,
|
|
1037
|
+
kind: "plugin",
|
|
1038
|
+
description: "DaoCore config auth profiles declare required provider and mode metadata.",
|
|
1039
|
+
source: "policy",
|
|
1040
|
+
async detect(ctx) {
|
|
1041
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyAuthProfileInvalidMetadata);
|
|
1042
|
+
}
|
|
1043
|
+
};
|
|
1044
|
+
const policyAuthProfileUnapprovedModeCheck = {
|
|
1045
|
+
id: CHECK_IDS.policyAuthProfileUnapprovedMode,
|
|
1046
|
+
kind: "plugin",
|
|
1047
|
+
description: "DaoCore config auth profile modes stay within the policy allowlist.",
|
|
1048
|
+
source: "policy",
|
|
1049
|
+
async detect(ctx) {
|
|
1050
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyAuthProfileUnapprovedMode);
|
|
1051
|
+
}
|
|
1052
|
+
};
|
|
1053
|
+
const policyToolsMissingRiskCheck = {
|
|
1054
|
+
id: CHECK_IDS.policyMissingToolRisk,
|
|
1055
|
+
kind: "plugin",
|
|
1056
|
+
description: "TOOLS.md policy entries declare explicit risk levels.",
|
|
1057
|
+
source: "policy",
|
|
1058
|
+
async detect(ctx) {
|
|
1059
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyMissingToolRisk);
|
|
1060
|
+
}
|
|
1061
|
+
};
|
|
1062
|
+
const policyToolsUnknownRiskCheck = {
|
|
1063
|
+
id: CHECK_IDS.policyUnknownToolRisk,
|
|
1064
|
+
kind: "plugin",
|
|
1065
|
+
description: "TOOLS.md policy entries use known risk levels.",
|
|
1066
|
+
source: "policy",
|
|
1067
|
+
async detect(ctx) {
|
|
1068
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyUnknownToolRisk);
|
|
1069
|
+
}
|
|
1070
|
+
};
|
|
1071
|
+
const policyToolsMissingSensitivityCheck = {
|
|
1072
|
+
id: CHECK_IDS.policyMissingToolSensitivity,
|
|
1073
|
+
kind: "plugin",
|
|
1074
|
+
description: "TOOLS.md policy entries declare default artifact sensitivity.",
|
|
1075
|
+
source: "policy",
|
|
1076
|
+
async detect(ctx) {
|
|
1077
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyMissingToolSensitivity);
|
|
1078
|
+
}
|
|
1079
|
+
};
|
|
1080
|
+
const policyToolsUnknownSensitivityCheck = {
|
|
1081
|
+
id: CHECK_IDS.policyUnknownToolSensitivity,
|
|
1082
|
+
kind: "plugin",
|
|
1083
|
+
description: "TOOLS.md policy entries use known sensitivity levels.",
|
|
1084
|
+
source: "policy",
|
|
1085
|
+
async detect(ctx) {
|
|
1086
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyUnknownToolSensitivity);
|
|
1087
|
+
}
|
|
1088
|
+
};
|
|
1089
|
+
const policyToolsMissingOwnerCheck = {
|
|
1090
|
+
id: CHECK_IDS.policyMissingToolOwner,
|
|
1091
|
+
kind: "plugin",
|
|
1092
|
+
description: "TOOLS.md policy entries declare an accountable owner.",
|
|
1093
|
+
source: "policy",
|
|
1094
|
+
async detect(ctx) {
|
|
1095
|
+
return findingsForCheck(await evaluatePolicy(ctx), CHECK_IDS.policyMissingToolOwner);
|
|
1096
|
+
}
|
|
1097
|
+
};
|
|
1098
|
+
async function evaluatePolicyUncached(ctx) {
|
|
1099
|
+
const settings = policySettings(ctx);
|
|
1100
|
+
const policyPath = policyDisplayName(ctx);
|
|
1101
|
+
let evidence = collectPolicyEvidence(ctx.cfg, {
|
|
1102
|
+
includeGatewayExposure: false,
|
|
1103
|
+
includeSecrets: false,
|
|
1104
|
+
includeAuthProfiles: false
|
|
1105
|
+
});
|
|
1106
|
+
const findings = [];
|
|
1107
|
+
if (!policyChecksEnabled(ctx, settings)) return {
|
|
1108
|
+
policyPath,
|
|
1109
|
+
evidence,
|
|
1110
|
+
expectedAttestationHash: settings.expectedAttestationHash,
|
|
1111
|
+
findings,
|
|
1112
|
+
attestedFindings: findings
|
|
1113
|
+
};
|
|
1114
|
+
const policyFile = await readPolicyFile(ctx);
|
|
1115
|
+
if (policyFile === null) {
|
|
1116
|
+
findings.push({
|
|
1117
|
+
checkId: CHECK_IDS.policyMissingFile,
|
|
1118
|
+
severity: "warning",
|
|
1119
|
+
message: `${policyPath} is missing for the enabled Policy plugin.`,
|
|
1120
|
+
source: "policy",
|
|
1121
|
+
path: policyPath,
|
|
1122
|
+
fixHint: `Restore ${policyPath} or add the policy artifact for this workspace.`
|
|
1123
|
+
});
|
|
1124
|
+
return {
|
|
1125
|
+
policyPath,
|
|
1126
|
+
evidence,
|
|
1127
|
+
expectedAttestationHash: settings.expectedAttestationHash,
|
|
1128
|
+
findings,
|
|
1129
|
+
attestedFindings: findings
|
|
1130
|
+
};
|
|
1131
|
+
}
|
|
1132
|
+
const parsedPolicy = parsePolicyFile(policyFile.raw);
|
|
1133
|
+
if (!parsedPolicy.ok) {
|
|
1134
|
+
findings.push(policyParseFinding(policyFile.displayName, policyFile.ocDocName, parsedPolicy));
|
|
1135
|
+
return {
|
|
1136
|
+
policyPath,
|
|
1137
|
+
evidence,
|
|
1138
|
+
expectedAttestationHash: settings.expectedAttestationHash,
|
|
1139
|
+
findings,
|
|
1140
|
+
attestedFindings: findings
|
|
1141
|
+
};
|
|
1142
|
+
}
|
|
1143
|
+
const policy = parsedPolicy.value;
|
|
1144
|
+
const policyHash = policyDocumentHash(policy);
|
|
1145
|
+
const expectedHash = settings.expectedHash;
|
|
1146
|
+
if (typeof expectedHash === "string" && expectedHash.trim() !== "" && policyHash !== expectedHash.trim()) {
|
|
1147
|
+
findings.push({
|
|
1148
|
+
checkId: CHECK_IDS.policyHashMismatch,
|
|
1149
|
+
severity: "error",
|
|
1150
|
+
message: `${policyFile.displayName} does not match the configured policy hash.`,
|
|
1151
|
+
source: "policy",
|
|
1152
|
+
path: policyFile.displayName,
|
|
1153
|
+
target: `oc://${policyFile.ocDocName}`,
|
|
1154
|
+
requirement: "oc://daocore.config/plugins/entries/policy/config/expectedHash",
|
|
1155
|
+
fixHint: `Restore the approved policy artifact or update plugins.entries.policy.config.expectedHash after review.`
|
|
1156
|
+
});
|
|
1157
|
+
return {
|
|
1158
|
+
policyPath,
|
|
1159
|
+
policy: {
|
|
1160
|
+
value: policy,
|
|
1161
|
+
hash: policyHash
|
|
1162
|
+
},
|
|
1163
|
+
evidence,
|
|
1164
|
+
expectedAttestationHash: settings.expectedAttestationHash,
|
|
1165
|
+
findings,
|
|
1166
|
+
attestedFindings: findings
|
|
1167
|
+
};
|
|
1168
|
+
}
|
|
1169
|
+
const metadataRequirementFindings = toolMetadataRequirementFindings(policy, policyFile.displayName, policyFile.ocDocName);
|
|
1170
|
+
const authMetadataRequirementFindings = authProfileMetadataRequirementFindings(policy, policyFile.displayName, policyFile.ocDocName);
|
|
1171
|
+
const requiredMetadata = metadataRequirementFindings.length === 0 ? requiredToolMetadata(policy) : /* @__PURE__ */ new Set();
|
|
1172
|
+
const includeSecrets = policyHasSecretRules(policy);
|
|
1173
|
+
const includeAuthProfiles = policyHasAuthProfileRules(policy);
|
|
1174
|
+
const includeGatewayExposure = policyHasGatewayRules(policy);
|
|
1175
|
+
if (requiredMetadata.size > 0) {
|
|
1176
|
+
const toolsFile = await readWorkspaceFile(ctx, "TOOLS.md");
|
|
1177
|
+
evidence = await collectPolicyEvidence(ctx.cfg, {
|
|
1178
|
+
toolsRaw: toolsFile?.raw ?? "",
|
|
1179
|
+
includeGatewayExposure,
|
|
1180
|
+
includeSecrets,
|
|
1181
|
+
includeAuthProfiles
|
|
1182
|
+
});
|
|
1183
|
+
} else evidence = collectPolicyEvidence(ctx.cfg, {
|
|
1184
|
+
includeGatewayExposure,
|
|
1185
|
+
includeSecrets,
|
|
1186
|
+
includeAuthProfiles
|
|
1187
|
+
});
|
|
1188
|
+
const policyFindings = [
|
|
1189
|
+
...policyContainerShapeFindings(policy, policyFile.displayName, policyFile.ocDocName),
|
|
1190
|
+
...channelFindings(policy, policyFile.displayName, policyFile.ocDocName, evidence),
|
|
1191
|
+
...mcpServerFindings(policy, policyFile.ocDocName, evidence),
|
|
1192
|
+
...modelProviderFindings(policy, policyFile.ocDocName, evidence),
|
|
1193
|
+
...networkFindings(policy, policyFile.ocDocName, evidence),
|
|
1194
|
+
...secretAuthProvenanceFindings(policy, policyFile.displayName, policyFile.ocDocName, evidence),
|
|
1195
|
+
...gatewayExposureFindings(policy, policyFile.ocDocName, evidence),
|
|
1196
|
+
...authMetadataRequirementFindings,
|
|
1197
|
+
...metadataRequirementFindings
|
|
1198
|
+
];
|
|
1199
|
+
if (requiredMetadata.has("risk")) {
|
|
1200
|
+
policyFindings.push(...toolRiskFindings(policyFile.ocDocName, evidence));
|
|
1201
|
+
policyFindings.push(...toolUnknownRiskFindings(policyFile.ocDocName, evidence));
|
|
1202
|
+
}
|
|
1203
|
+
if (requiredMetadata.has("sensitivity")) policyFindings.push(...toolSensitivityFindings(policyFile.ocDocName, evidence));
|
|
1204
|
+
if (requiredMetadata.has("owner")) policyFindings.push(...toolOwnerFindings(policyFile.ocDocName, evidence));
|
|
1205
|
+
const attestationFindings = policyAttestationFindings(policyFile.displayName, policyHash, evidence, policyFindings, settings);
|
|
1206
|
+
if (hasPolicyValidationFinding(policyFindings)) findings.push(...policyFindings);
|
|
1207
|
+
else if (attestationFindings.length > 0) findings.push(...attestationFindings);
|
|
1208
|
+
else findings.push(...policyFindings);
|
|
1209
|
+
return {
|
|
1210
|
+
policyPath,
|
|
1211
|
+
policy: {
|
|
1212
|
+
value: policy,
|
|
1213
|
+
hash: policyHash
|
|
1214
|
+
},
|
|
1215
|
+
evidence,
|
|
1216
|
+
expectedAttestationHash: settings.expectedAttestationHash,
|
|
1217
|
+
findings,
|
|
1218
|
+
attestedFindings: policyFindings
|
|
1219
|
+
};
|
|
1220
|
+
}
|
|
1221
|
+
function policyParseFinding(policyPath, policyDocName, parseError) {
|
|
1222
|
+
return {
|
|
1223
|
+
checkId: CHECK_IDS.policyInvalidFile,
|
|
1224
|
+
severity: "error",
|
|
1225
|
+
message: `${policyPath} could not be parsed: ${parseError.message}`,
|
|
1226
|
+
source: "policy",
|
|
1227
|
+
path: policyPath,
|
|
1228
|
+
target: `oc://${policyDocName}`,
|
|
1229
|
+
fixHint: `Fix ${policyPath} so policy conformance checks can run.`
|
|
1230
|
+
};
|
|
1231
|
+
}
|
|
1232
|
+
function findingsForCheck(evaluation, checkId) {
|
|
1233
|
+
return evaluation.findings.filter((finding) => finding.checkId === checkId);
|
|
1234
|
+
}
|
|
1235
|
+
function hasPolicyValidationFinding(findings) {
|
|
1236
|
+
return findings.some((finding) => finding.checkId === CHECK_IDS.policyInvalidFile);
|
|
1237
|
+
}
|
|
1238
|
+
function channelFindings(policy, policyPath, policyDocName, evidence) {
|
|
1239
|
+
const invalidRules = invalidChannelDenyRuleFindings(policy, policyPath, policyDocName);
|
|
1240
|
+
if (invalidRules.length > 0) return invalidRules;
|
|
1241
|
+
const denyRules = readChannelDenyRules(policy, policyDocName);
|
|
1242
|
+
if (denyRules.length === 0) return [];
|
|
1243
|
+
return evidence.channels.flatMap((channel) => {
|
|
1244
|
+
if (channel.enabled === false) return [];
|
|
1245
|
+
const rule = denyRules.find((candidate) => candidate.when?.provider === channel.provider);
|
|
1246
|
+
if (rule === void 0) return [];
|
|
1247
|
+
return [{
|
|
1248
|
+
checkId: CHECK_IDS.policyDeniedChannelProvider,
|
|
1249
|
+
severity: "error",
|
|
1250
|
+
message: `Channel '${channel.id}' uses denied provider '${channel.provider}'.`,
|
|
1251
|
+
source: "policy",
|
|
1252
|
+
path: "daocore config",
|
|
1253
|
+
ocPath: channel.source,
|
|
1254
|
+
target: channel.source,
|
|
1255
|
+
requirement: rule.requirement,
|
|
1256
|
+
fixHint: rule.reason ?? "Disable this channel, remove it from config, or update the policy deny rule."
|
|
1257
|
+
}];
|
|
1258
|
+
});
|
|
1259
|
+
}
|
|
1260
|
+
function policyAttestationFindings(policyPath, policyHash, evidence, findings, settings) {
|
|
1261
|
+
const expected = settings.expectedAttestationHash?.trim();
|
|
1262
|
+
if (!expected) return [];
|
|
1263
|
+
const current = createPolicyAttestation({
|
|
1264
|
+
ok: findings.length === 0,
|
|
1265
|
+
checkedAt: (/* @__PURE__ */ new Date(0)).toISOString(),
|
|
1266
|
+
policyPath,
|
|
1267
|
+
policyHash,
|
|
1268
|
+
evidence,
|
|
1269
|
+
findings: findings.map(toAttestedFinding)
|
|
1270
|
+
});
|
|
1271
|
+
if (current.attestationHash === expected) return [];
|
|
1272
|
+
return [{
|
|
1273
|
+
checkId: CHECK_IDS.policyAttestationMismatch,
|
|
1274
|
+
severity: "error",
|
|
1275
|
+
message: "The current policy check no longer matches the accepted policy attestation.",
|
|
1276
|
+
source: "policy",
|
|
1277
|
+
path: "policy attestation",
|
|
1278
|
+
target: "oc://policy/attestation/current",
|
|
1279
|
+
requirement: "oc://daocore.config/plugins/entries/policy/config/expectedAttestationHash",
|
|
1280
|
+
fixHint: `Run policy check, review attestation ${current.attestationHash}, then update plugins.entries.policy.config.expectedAttestationHash and the supervisor/gateway accepted attestation.`
|
|
1281
|
+
}];
|
|
1282
|
+
}
|
|
1283
|
+
function toAttestedFinding(finding) {
|
|
1284
|
+
return {
|
|
1285
|
+
checkId: finding.checkId,
|
|
1286
|
+
severity: finding.severity,
|
|
1287
|
+
message: finding.message,
|
|
1288
|
+
...finding.source !== void 0 ? { source: finding.source } : {},
|
|
1289
|
+
...finding.path !== void 0 ? { path: finding.path } : {},
|
|
1290
|
+
...finding.line !== void 0 ? { line: finding.line } : {},
|
|
1291
|
+
...finding.column !== void 0 ? { column: finding.column } : {},
|
|
1292
|
+
...finding.ocPath !== void 0 ? { ocPath: finding.ocPath } : {},
|
|
1293
|
+
...finding.target !== void 0 ? { target: finding.target } : {},
|
|
1294
|
+
...finding.requirement !== void 0 ? { requirement: finding.requirement } : {},
|
|
1295
|
+
...finding.fixHint !== void 0 ? { fixHint: finding.fixHint } : {}
|
|
1296
|
+
};
|
|
1297
|
+
}
|
|
1298
|
+
function toolMetadataRequirementFindings(policy, policyPath, policyDocName) {
|
|
1299
|
+
if (!isRecord(policy) || !isRecord(policy.tools) || policy.tools.requireMetadata === void 0) return [];
|
|
1300
|
+
if (!Array.isArray(policy.tools.requireMetadata)) return [{
|
|
1301
|
+
checkId: CHECK_IDS.policyInvalidFile,
|
|
1302
|
+
severity: "error",
|
|
1303
|
+
message: `${policyPath} tools.requireMetadata must be an array of metadata keys.`,
|
|
1304
|
+
source: "policy",
|
|
1305
|
+
path: policyPath,
|
|
1306
|
+
target: `oc://${policyDocName}/tools/requireMetadata`,
|
|
1307
|
+
fixHint: `Use supported metadata keys: ${SUPPORTED_TOOL_METADATA.join(", ")}.`
|
|
1308
|
+
}];
|
|
1309
|
+
const invalidIndex = policy.tools.requireMetadata.findIndex((entry) => typeof entry !== "string" || !SUPPORTED_TOOL_METADATA.includes(entry.trim().toLowerCase()));
|
|
1310
|
+
if (invalidIndex < 0) return [];
|
|
1311
|
+
return [{
|
|
1312
|
+
checkId: CHECK_IDS.policyInvalidFile,
|
|
1313
|
+
severity: "error",
|
|
1314
|
+
message: `${policyPath} tools.requireMetadata[${invalidIndex}] must be a supported metadata key.`,
|
|
1315
|
+
source: "policy",
|
|
1316
|
+
path: policyPath,
|
|
1317
|
+
target: `oc://${policyDocName}/tools/requireMetadata/#${invalidIndex}`,
|
|
1318
|
+
fixHint: `Use supported metadata keys: ${SUPPORTED_TOOL_METADATA.join(", ")}.`
|
|
1319
|
+
}];
|
|
1320
|
+
}
|
|
1321
|
+
function policyContainerShapeFindings(policy, policyPath, policyDocName) {
|
|
1322
|
+
if (!isRecord(policy)) return [policyShapeFinding(policyPath, `oc://${policyDocName}`, `${policyPath} must contain a policy object.`, `Fix ${policyPath} so the top-level policy is an object.`)];
|
|
1323
|
+
if (policy.tools !== void 0 && !isRecord(policy.tools)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/tools`, `${policyPath} tools must be an object.`, `Fix ${policyPath} so tools is an object.`)];
|
|
1324
|
+
if (isRecord(policy.tools)) {
|
|
1325
|
+
if (policy.tools.settings !== void 0 && !isRecord(policy.tools.settings)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/tools/settings`, `${policyPath} tools.settings must be an object.`, `Fix ${policyPath} so tools.settings is an object.`)];
|
|
1326
|
+
if (policy.tools.entries !== void 0 && !Array.isArray(policy.tools.entries)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/tools/entries`, `${policyPath} tools.entries must be an array.`, `Fix ${policyPath} so tools.entries is an array.`)];
|
|
1327
|
+
}
|
|
1328
|
+
if (policy.channels !== void 0 && !isRecord(policy.channels)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/channels`, `${policyPath} channels must be an object.`, `Fix ${policyPath} so channels is an object.`)];
|
|
1329
|
+
if (policy.mcp !== void 0 && !isRecord(policy.mcp)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/mcp`, `${policyPath} mcp must be an object.`, `Fix ${policyPath} so mcp is an object.`)];
|
|
1330
|
+
if (isRecord(policy.mcp)) {
|
|
1331
|
+
const finding = policyStringArrayShapeFinding(policy.mcp.servers, {
|
|
1332
|
+
property: "mcp.servers",
|
|
1333
|
+
policyDocName,
|
|
1334
|
+
policyPath,
|
|
1335
|
+
target: "mcp/servers",
|
|
1336
|
+
valueName: "MCP server id"
|
|
1337
|
+
});
|
|
1338
|
+
if (finding !== void 0) return [finding];
|
|
1339
|
+
}
|
|
1340
|
+
if (policy.models !== void 0 && !isRecord(policy.models)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/models`, `${policyPath} models must be an object.`, `Fix ${policyPath} so models is an object.`)];
|
|
1341
|
+
if (isRecord(policy.models)) {
|
|
1342
|
+
const finding = policyStringArrayShapeFinding(policy.models.providers, {
|
|
1343
|
+
property: "models.providers",
|
|
1344
|
+
policyDocName,
|
|
1345
|
+
policyPath,
|
|
1346
|
+
target: "models/providers",
|
|
1347
|
+
valueName: "model provider id"
|
|
1348
|
+
});
|
|
1349
|
+
if (finding !== void 0) return [finding];
|
|
1350
|
+
}
|
|
1351
|
+
if (policy.network !== void 0 && !isRecord(policy.network)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/network`, `${policyPath} network must be an object.`, `Fix ${policyPath} so network is an object.`)];
|
|
1352
|
+
if (isRecord(policy.network)) {
|
|
1353
|
+
if (policy.network.privateNetwork !== void 0 && !isRecord(policy.network.privateNetwork)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/network/privateNetwork`, `${policyPath} network.privateNetwork must be an object.`, `Fix ${policyPath} so network.privateNetwork is an object.`)];
|
|
1354
|
+
if (isRecord(policy.network.privateNetwork) && policy.network.privateNetwork.allow !== void 0 && typeof policy.network.privateNetwork.allow !== "boolean") return [policyShapeFinding(policyPath, `oc://${policyDocName}/network/privateNetwork/allow`, `${policyPath} network.privateNetwork.allow must be a boolean.`, `Fix ${policyPath} so network.privateNetwork.allow is true or false.`)];
|
|
1355
|
+
}
|
|
1356
|
+
if (policy.secrets !== void 0 && !isRecord(policy.secrets)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/secrets`, `${policyPath} secrets must be an object.`, `Fix ${policyPath} so secrets is an object.`)];
|
|
1357
|
+
if (policy.auth !== void 0 && !isRecord(policy.auth)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/auth`, `${policyPath} auth must be an object.`, `Fix ${policyPath} so auth is an object.`)];
|
|
1358
|
+
if (isRecord(policy.auth) && policy.auth.profiles !== void 0 && !isRecord(policy.auth.profiles)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/auth/profiles`, `${policyPath} auth.profiles must be an object.`, `Fix ${policyPath} so auth.profiles is an object.`)];
|
|
1359
|
+
const gatewayFinding = gatewayPolicyShapeFinding(policy.gateway, {
|
|
1360
|
+
policyDocName,
|
|
1361
|
+
policyPath
|
|
1362
|
+
});
|
|
1363
|
+
if (gatewayFinding !== void 0) return [gatewayFinding];
|
|
1364
|
+
return [];
|
|
1365
|
+
}
|
|
1366
|
+
function gatewayPolicyShapeFinding(value, params) {
|
|
1367
|
+
if (value === void 0) return;
|
|
1368
|
+
if (!isRecord(value)) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/gateway`, `${params.policyPath} gateway must be an object.`, `Fix ${params.policyPath} so gateway is an object.`);
|
|
1369
|
+
for (const section of [
|
|
1370
|
+
"exposure",
|
|
1371
|
+
"auth",
|
|
1372
|
+
"controlUi",
|
|
1373
|
+
"remote",
|
|
1374
|
+
"http"
|
|
1375
|
+
]) if (value[section] !== void 0 && !isRecord(value[section])) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/gateway/${section}`, `${params.policyPath} gateway.${section} must be an object.`, `Fix ${params.policyPath} so gateway.${section} is an object.`);
|
|
1376
|
+
const exposure = isRecord(value.exposure) ? value.exposure : {};
|
|
1377
|
+
const auth = isRecord(value.auth) ? value.auth : {};
|
|
1378
|
+
const controlUi = isRecord(value.controlUi) ? value.controlUi : {};
|
|
1379
|
+
const remote = isRecord(value.remote) ? value.remote : {};
|
|
1380
|
+
const http = isRecord(value.http) ? value.http : {};
|
|
1381
|
+
const booleanRules = [
|
|
1382
|
+
[
|
|
1383
|
+
"gateway/exposure/allowNonLoopbackBind",
|
|
1384
|
+
"gateway.exposure.allowNonLoopbackBind",
|
|
1385
|
+
exposure.allowNonLoopbackBind
|
|
1386
|
+
],
|
|
1387
|
+
[
|
|
1388
|
+
"gateway/exposure/allowTailscaleFunnel",
|
|
1389
|
+
"gateway.exposure.allowTailscaleFunnel",
|
|
1390
|
+
exposure.allowTailscaleFunnel
|
|
1391
|
+
],
|
|
1392
|
+
[
|
|
1393
|
+
"gateway/auth/requireAuth",
|
|
1394
|
+
"gateway.auth.requireAuth",
|
|
1395
|
+
auth.requireAuth
|
|
1396
|
+
],
|
|
1397
|
+
[
|
|
1398
|
+
"gateway/auth/requireExplicitRateLimit",
|
|
1399
|
+
"gateway.auth.requireExplicitRateLimit",
|
|
1400
|
+
auth.requireExplicitRateLimit
|
|
1401
|
+
],
|
|
1402
|
+
[
|
|
1403
|
+
"gateway/controlUi/allowInsecure",
|
|
1404
|
+
"gateway.controlUi.allowInsecure",
|
|
1405
|
+
controlUi.allowInsecure
|
|
1406
|
+
],
|
|
1407
|
+
[
|
|
1408
|
+
"gateway/remote/allow",
|
|
1409
|
+
"gateway.remote.allow",
|
|
1410
|
+
remote.allow
|
|
1411
|
+
],
|
|
1412
|
+
[
|
|
1413
|
+
"gateway/http/requireUrlAllowlists",
|
|
1414
|
+
"gateway.http.requireUrlAllowlists",
|
|
1415
|
+
http.requireUrlAllowlists
|
|
1416
|
+
]
|
|
1417
|
+
];
|
|
1418
|
+
for (const [target, property, ruleValue] of booleanRules) if (ruleValue !== void 0 && typeof ruleValue !== "boolean") return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/${target}`, `${params.policyPath} ${property} must be a boolean.`, `Fix ${params.policyPath} so ${property} is true or false.`);
|
|
1419
|
+
const denyEndpoints = http.denyEndpoints;
|
|
1420
|
+
if (denyEndpoints !== void 0 && !Array.isArray(denyEndpoints)) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/gateway/http/denyEndpoints`, `${params.policyPath} gateway.http.denyEndpoints must be an array.`, "Use an array of endpoint ids such as [\"responses\"] or remove gateway.http.denyEndpoints.");
|
|
1421
|
+
if (Array.isArray(denyEndpoints)) {
|
|
1422
|
+
const invalidIndex = denyEndpoints.findIndex((entry) => typeof entry !== "string" || !SUPPORTED_GATEWAY_HTTP_ENDPOINTS.includes(entry.trim()));
|
|
1423
|
+
if (invalidIndex >= 0) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/gateway/http/denyEndpoints/#${invalidIndex}`, `${params.policyPath} gateway.http.denyEndpoints[${invalidIndex}] must be a supported endpoint id.`, `Use supported endpoint ids: ${SUPPORTED_GATEWAY_HTTP_ENDPOINTS.join(", ")}.`);
|
|
1424
|
+
}
|
|
1425
|
+
}
|
|
1426
|
+
function policyStringArrayShapeFinding(value, params) {
|
|
1427
|
+
if (value === void 0) return;
|
|
1428
|
+
if (!isRecord(value)) return policyShapeFinding(params.policyPath, `oc://${params.policyDocName}/${params.target}`, `${params.policyPath} ${params.property} must be an object.`, `Fix ${params.policyPath} so ${params.property} is an object.`);
|
|
1429
|
+
for (const key of ["allow", "deny"]) {
|
|
1430
|
+
const entries = value[key];
|
|
1431
|
+
if (entries === void 0) continue;
|
|
1432
|
+
const target = `oc://${params.policyDocName}/${params.target}/${key}`;
|
|
1433
|
+
if (!Array.isArray(entries)) return policyShapeFinding(params.policyPath, target, `${params.policyPath} ${params.property}.${key} must be an array.`, `Fix ${params.policyPath} so ${params.property}.${key} is an array of ${params.valueName}s.`);
|
|
1434
|
+
const invalidIndex = entries.findIndex((entry) => typeof entry !== "string" || entry.trim() === "");
|
|
1435
|
+
if (invalidIndex >= 0) return policyShapeFinding(params.policyPath, `${target}/#${invalidIndex}`, `${params.policyPath} ${params.property}.${key}[${invalidIndex}] must be a non-empty string.`, `Fix ${params.policyPath} so each ${params.property}.${key} entry is a ${params.valueName}.`);
|
|
1436
|
+
}
|
|
1437
|
+
}
|
|
1438
|
+
function policyShapeFinding(policyPath, target, message, fixHint) {
|
|
1439
|
+
return {
|
|
1440
|
+
checkId: CHECK_IDS.policyInvalidFile,
|
|
1441
|
+
severity: "error",
|
|
1442
|
+
message,
|
|
1443
|
+
source: "policy",
|
|
1444
|
+
path: policyPath,
|
|
1445
|
+
target,
|
|
1446
|
+
fixHint
|
|
1447
|
+
};
|
|
1448
|
+
}
|
|
1449
|
+
function authProfileMetadataRequirementFindings(policy, policyPath, policyDocName) {
|
|
1450
|
+
if (!isRecord(policy) || !isRecord(policy.auth) || !isRecord(policy.auth.profiles) || policy.auth.profiles.requireMetadata === void 0) return [];
|
|
1451
|
+
if (!Array.isArray(policy.auth.profiles.requireMetadata)) return [{
|
|
1452
|
+
checkId: CHECK_IDS.policyInvalidFile,
|
|
1453
|
+
severity: "error",
|
|
1454
|
+
message: `${policyPath} auth.profiles.requireMetadata must be an array of metadata keys.`,
|
|
1455
|
+
source: "policy",
|
|
1456
|
+
path: policyPath,
|
|
1457
|
+
target: `oc://${policyDocName}/auth/profiles/requireMetadata`,
|
|
1458
|
+
fixHint: `Use supported metadata keys: ${SUPPORTED_AUTH_PROFILE_METADATA.join(", ")}.`
|
|
1459
|
+
}];
|
|
1460
|
+
const invalidIndex = policy.auth.profiles.requireMetadata.findIndex((entry) => typeof entry !== "string" || !SUPPORTED_AUTH_PROFILE_METADATA.includes(entry.trim().toLowerCase()));
|
|
1461
|
+
if (invalidIndex < 0) return [];
|
|
1462
|
+
return [{
|
|
1463
|
+
checkId: CHECK_IDS.policyInvalidFile,
|
|
1464
|
+
severity: "error",
|
|
1465
|
+
message: `${policyPath} auth.profiles.requireMetadata[${invalidIndex}] must be a supported metadata key.`,
|
|
1466
|
+
source: "policy",
|
|
1467
|
+
path: policyPath,
|
|
1468
|
+
target: `oc://${policyDocName}/auth/profiles/requireMetadata/#${invalidIndex}`,
|
|
1469
|
+
fixHint: `Use supported metadata keys: ${SUPPORTED_AUTH_PROFILE_METADATA.join(", ")}.`
|
|
1470
|
+
}];
|
|
1471
|
+
}
|
|
1472
|
+
function invalidChannelDenyRuleFindings(policy, policyPath, policyDocName) {
|
|
1473
|
+
if (!isRecord(policy) || !isRecord(policy.channels) || policy.channels.denyRules === void 0) return [];
|
|
1474
|
+
if (!Array.isArray(policy.channels.denyRules)) return [{
|
|
1475
|
+
checkId: CHECK_IDS.policyInvalidFile,
|
|
1476
|
+
severity: "error",
|
|
1477
|
+
message: `${policyPath} channels.denyRules must be an array.`,
|
|
1478
|
+
source: "policy",
|
|
1479
|
+
path: policyPath,
|
|
1480
|
+
target: `oc://${policyDocName}/channels/denyRules`,
|
|
1481
|
+
fixHint: `Fix ${policyPath} so channel deny rules are an array.`
|
|
1482
|
+
}];
|
|
1483
|
+
const invalid = policy.channels.denyRules.findIndex((rule) => !isChannelDenyRule(rule));
|
|
1484
|
+
if (invalid < 0) return [];
|
|
1485
|
+
return [{
|
|
1486
|
+
checkId: CHECK_IDS.policyInvalidFile,
|
|
1487
|
+
severity: "error",
|
|
1488
|
+
message: `${policyPath} channels.denyRules[${invalid}] must define when.provider as a string.`,
|
|
1489
|
+
source: "policy",
|
|
1490
|
+
path: policyPath,
|
|
1491
|
+
target: `oc://${policyDocName}/channels/denyRules/#${invalid}`,
|
|
1492
|
+
fixHint: `Fix ${policyPath} so each channel deny rule has a provider match.`
|
|
1493
|
+
}];
|
|
1494
|
+
}
|
|
1495
|
+
function mcpServerFindings(policy, policyDocName, evidence) {
|
|
1496
|
+
const denied = new Set(readStringList(policy, [
|
|
1497
|
+
"mcp",
|
|
1498
|
+
"servers",
|
|
1499
|
+
"deny"
|
|
1500
|
+
], { lowercase: false }));
|
|
1501
|
+
const allowed = readStringList(policy, [
|
|
1502
|
+
"mcp",
|
|
1503
|
+
"servers",
|
|
1504
|
+
"allow"
|
|
1505
|
+
], { lowercase: false });
|
|
1506
|
+
const allowedSet = new Set(allowed);
|
|
1507
|
+
const findings = [];
|
|
1508
|
+
for (const server of evidence.mcpServers) {
|
|
1509
|
+
if (denied.has(server.id)) {
|
|
1510
|
+
findings.push({
|
|
1511
|
+
checkId: CHECK_IDS.policyDeniedMcpServer,
|
|
1512
|
+
severity: "error",
|
|
1513
|
+
message: `MCP server '${server.id}' is denied by policy.`,
|
|
1514
|
+
source: "policy",
|
|
1515
|
+
path: "daocore config",
|
|
1516
|
+
ocPath: server.source,
|
|
1517
|
+
target: server.source,
|
|
1518
|
+
requirement: `oc://${policyDocName}/mcp/servers/deny`,
|
|
1519
|
+
fixHint: "Remove this configured MCP server or update the policy after review."
|
|
1520
|
+
});
|
|
1521
|
+
continue;
|
|
1522
|
+
}
|
|
1523
|
+
if (allowedSet.size > 0 && !allowedSet.has(server.id)) findings.push({
|
|
1524
|
+
checkId: CHECK_IDS.policyUnapprovedMcpServer,
|
|
1525
|
+
severity: "error",
|
|
1526
|
+
message: `MCP server '${server.id}' is not in the policy allowlist.`,
|
|
1527
|
+
source: "policy",
|
|
1528
|
+
path: "daocore config",
|
|
1529
|
+
ocPath: server.source,
|
|
1530
|
+
target: server.source,
|
|
1531
|
+
requirement: `oc://${policyDocName}/mcp/servers/allow`,
|
|
1532
|
+
fixHint: "Use an approved MCP server or update the policy after review."
|
|
1533
|
+
});
|
|
1534
|
+
}
|
|
1535
|
+
return findings;
|
|
1536
|
+
}
|
|
1537
|
+
function modelProviderFindings(policy, policyDocName, evidence) {
|
|
1538
|
+
const denied = new Set(readModelProviderPolicyList(policy, [
|
|
1539
|
+
"models",
|
|
1540
|
+
"providers",
|
|
1541
|
+
"deny"
|
|
1542
|
+
]));
|
|
1543
|
+
const allowed = readModelProviderPolicyList(policy, [
|
|
1544
|
+
"models",
|
|
1545
|
+
"providers",
|
|
1546
|
+
"allow"
|
|
1547
|
+
]);
|
|
1548
|
+
const allowedSet = new Set(allowed);
|
|
1549
|
+
const findings = [];
|
|
1550
|
+
for (const provider of evidence.modelProviders) findings.push(...modelProviderConformanceFindings(provider, denied, allowedSet, policyDocName));
|
|
1551
|
+
for (const modelRef of evidence.modelRefs) findings.push(...modelRefConformanceFindings(modelRef, denied, allowedSet, policyDocName));
|
|
1552
|
+
return findings;
|
|
1553
|
+
}
|
|
1554
|
+
function readModelProviderPolicyList(policy, path) {
|
|
1555
|
+
return readStringList(policy, path).map((provider) => normalizeProviderId(provider));
|
|
1556
|
+
}
|
|
1557
|
+
function modelProviderConformanceFindings(provider, denied, allowed, policyDocName) {
|
|
1558
|
+
const findings = [];
|
|
1559
|
+
if (denied.has(provider.id)) findings.push({
|
|
1560
|
+
checkId: CHECK_IDS.policyDeniedModelProvider,
|
|
1561
|
+
severity: "error",
|
|
1562
|
+
message: `Model provider '${provider.id}' is denied by policy.`,
|
|
1563
|
+
source: "policy",
|
|
1564
|
+
path: "daocore config",
|
|
1565
|
+
ocPath: provider.source,
|
|
1566
|
+
target: provider.source,
|
|
1567
|
+
requirement: `oc://${policyDocName}/models/providers/deny`,
|
|
1568
|
+
fixHint: "Remove this configured provider or update the policy after review."
|
|
1569
|
+
});
|
|
1570
|
+
if (!denied.has(provider.id) && allowed.size > 0 && !allowed.has(provider.id)) findings.push({
|
|
1571
|
+
checkId: CHECK_IDS.policyUnapprovedModelProvider,
|
|
1572
|
+
severity: "error",
|
|
1573
|
+
message: `Model provider '${provider.id}' is not in the policy allowlist.`,
|
|
1574
|
+
source: "policy",
|
|
1575
|
+
path: "daocore config",
|
|
1576
|
+
ocPath: provider.source,
|
|
1577
|
+
target: provider.source,
|
|
1578
|
+
requirement: `oc://${policyDocName}/models/providers/allow`,
|
|
1579
|
+
fixHint: "Use an approved model provider or update the policy after review."
|
|
1580
|
+
});
|
|
1581
|
+
return findings;
|
|
1582
|
+
}
|
|
1583
|
+
function modelRefConformanceFindings(modelRef, denied, allowed, policyDocName) {
|
|
1584
|
+
const findings = [];
|
|
1585
|
+
if (denied.has(modelRef.provider)) findings.push({
|
|
1586
|
+
checkId: CHECK_IDS.policyDeniedModelProvider,
|
|
1587
|
+
severity: "error",
|
|
1588
|
+
message: `Model ref '${modelRef.ref}' uses denied provider '${modelRef.provider}'.`,
|
|
1589
|
+
source: "policy",
|
|
1590
|
+
path: "daocore config",
|
|
1591
|
+
ocPath: modelRef.source,
|
|
1592
|
+
target: modelRef.source,
|
|
1593
|
+
requirement: `oc://${policyDocName}/models/providers/deny`,
|
|
1594
|
+
fixHint: "Select an approved model provider or update the policy after review."
|
|
1595
|
+
});
|
|
1596
|
+
if (!denied.has(modelRef.provider) && allowed.size > 0 && !allowed.has(modelRef.provider)) findings.push({
|
|
1597
|
+
checkId: CHECK_IDS.policyUnapprovedModelProvider,
|
|
1598
|
+
severity: "error",
|
|
1599
|
+
message: `Model ref '${modelRef.ref}' uses unapproved provider '${modelRef.provider}'.`,
|
|
1600
|
+
source: "policy",
|
|
1601
|
+
path: "daocore config",
|
|
1602
|
+
ocPath: modelRef.source,
|
|
1603
|
+
target: modelRef.source,
|
|
1604
|
+
requirement: `oc://${policyDocName}/models/providers/allow`,
|
|
1605
|
+
fixHint: "Select an approved model provider or update the policy after review."
|
|
1606
|
+
});
|
|
1607
|
+
return findings;
|
|
1608
|
+
}
|
|
1609
|
+
function networkFindings(policy, policyDocName, evidence) {
|
|
1610
|
+
if (readPolicyBoolean(policy, [
|
|
1611
|
+
"network",
|
|
1612
|
+
"privateNetwork",
|
|
1613
|
+
"allow"
|
|
1614
|
+
]) !== false) return [];
|
|
1615
|
+
return evidence.network.filter((setting) => setting.value).map((setting) => {
|
|
1616
|
+
return {
|
|
1617
|
+
checkId: CHECK_IDS.policyPrivateNetworkAccess,
|
|
1618
|
+
severity: "error",
|
|
1619
|
+
message: `Network setting '${setting.id}' allows private-network access.`,
|
|
1620
|
+
source: "policy",
|
|
1621
|
+
path: "daocore config",
|
|
1622
|
+
ocPath: setting.source,
|
|
1623
|
+
target: setting.source,
|
|
1624
|
+
requirement: `oc://${policyDocName}/network/privateNetwork/allow`,
|
|
1625
|
+
fixHint: "Disable this private-network access setting or update policy after review."
|
|
1626
|
+
};
|
|
1627
|
+
});
|
|
1628
|
+
}
|
|
1629
|
+
function gatewayExposureFindings(policy, policyDocName, evidence) {
|
|
1630
|
+
return [
|
|
1631
|
+
...gatewayNonLoopbackBindFindings(policy, policyDocName, evidence),
|
|
1632
|
+
...gatewayAuthFindings(policy, policyDocName, evidence),
|
|
1633
|
+
...gatewayControlUiFindings(policy, policyDocName, evidence),
|
|
1634
|
+
...gatewayTailscaleFindings(policy, policyDocName, evidence),
|
|
1635
|
+
...gatewayRemoteFindings(policy, policyDocName, evidence),
|
|
1636
|
+
...gatewayHttpEndpointFindings(policy, policyDocName, evidence),
|
|
1637
|
+
...gatewayHttpUrlFetchFindings(policy, policyDocName, evidence)
|
|
1638
|
+
];
|
|
1639
|
+
}
|
|
1640
|
+
function gatewayNonLoopbackBindFindings(policy, policyDocName, evidence) {
|
|
1641
|
+
if (readPolicyBoolean(policy, [
|
|
1642
|
+
"gateway",
|
|
1643
|
+
"exposure",
|
|
1644
|
+
"allowNonLoopbackBind"
|
|
1645
|
+
]) !== false) return [];
|
|
1646
|
+
return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "bind" && entry.nonLoopback === true).map((entry) => {
|
|
1647
|
+
return {
|
|
1648
|
+
checkId: CHECK_IDS.policyGatewayNonLoopbackBind,
|
|
1649
|
+
severity: "error",
|
|
1650
|
+
message: entry.explicit === false ? "Gateway bind is omitted while the runtime default can permit non-loopback exposure." : `Gateway bind setting '${entry.id}' permits non-loopback exposure.`,
|
|
1651
|
+
source: "policy",
|
|
1652
|
+
path: "daocore config",
|
|
1653
|
+
ocPath: entry.source,
|
|
1654
|
+
target: entry.source,
|
|
1655
|
+
requirement: `oc://${policyDocName}/gateway/exposure/allowNonLoopbackBind`,
|
|
1656
|
+
fixHint: "Use gateway.bind=loopback or update policy after review."
|
|
1657
|
+
};
|
|
1658
|
+
});
|
|
1659
|
+
}
|
|
1660
|
+
function gatewayAuthFindings(policy, policyDocName, evidence) {
|
|
1661
|
+
const findings = [];
|
|
1662
|
+
if (readPolicyBoolean(policy, [
|
|
1663
|
+
"gateway",
|
|
1664
|
+
"auth",
|
|
1665
|
+
"requireAuth"
|
|
1666
|
+
]) === true) findings.push(...(evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "auth" && entry.value === "none").map((entry) => {
|
|
1667
|
+
return {
|
|
1668
|
+
checkId: CHECK_IDS.policyGatewayAuthDisabled,
|
|
1669
|
+
severity: "error",
|
|
1670
|
+
message: "Gateway authentication is disabled.",
|
|
1671
|
+
source: "policy",
|
|
1672
|
+
path: "daocore config",
|
|
1673
|
+
ocPath: entry.source,
|
|
1674
|
+
target: entry.source,
|
|
1675
|
+
requirement: `oc://${policyDocName}/gateway/auth/requireAuth`,
|
|
1676
|
+
fixHint: "Set gateway.auth.mode to token, password, or trusted-proxy."
|
|
1677
|
+
};
|
|
1678
|
+
}));
|
|
1679
|
+
if (readPolicyBoolean(policy, [
|
|
1680
|
+
"gateway",
|
|
1681
|
+
"auth",
|
|
1682
|
+
"requireExplicitRateLimit"
|
|
1683
|
+
]) === true) findings.push(...(evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "authRateLimit" && entry.explicit !== true).map((entry) => {
|
|
1684
|
+
return {
|
|
1685
|
+
checkId: CHECK_IDS.policyGatewayRateLimitMissing,
|
|
1686
|
+
severity: "error",
|
|
1687
|
+
message: "Gateway authentication rate-limit posture is not explicit.",
|
|
1688
|
+
source: "policy",
|
|
1689
|
+
path: "daocore config",
|
|
1690
|
+
ocPath: entry.source,
|
|
1691
|
+
target: entry.source,
|
|
1692
|
+
requirement: `oc://${policyDocName}/gateway/auth/requireExplicitRateLimit`,
|
|
1693
|
+
fixHint: "Configure gateway.auth.rateLimit or update policy after review."
|
|
1694
|
+
};
|
|
1695
|
+
}));
|
|
1696
|
+
return findings;
|
|
1697
|
+
}
|
|
1698
|
+
function gatewayControlUiFindings(policy, policyDocName, evidence) {
|
|
1699
|
+
if (readPolicyBoolean(policy, [
|
|
1700
|
+
"gateway",
|
|
1701
|
+
"controlUi",
|
|
1702
|
+
"allowInsecure"
|
|
1703
|
+
]) !== false) return [];
|
|
1704
|
+
return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "controlUi" && entry.value === true && (entry.id === "gateway-control-ui-insecure-auth" || entry.id === "gateway-control-ui-device-auth-disabled" || entry.id === "gateway-control-ui-host-origin-fallback")).map((entry) => {
|
|
1705
|
+
return {
|
|
1706
|
+
checkId: CHECK_IDS.policyGatewayControlUiInsecure,
|
|
1707
|
+
severity: "error",
|
|
1708
|
+
message: `Gateway Control UI insecure toggle '${entry.id}' is enabled.`,
|
|
1709
|
+
source: "policy",
|
|
1710
|
+
path: "daocore config",
|
|
1711
|
+
ocPath: entry.source,
|
|
1712
|
+
target: entry.source,
|
|
1713
|
+
requirement: `oc://${policyDocName}/gateway/controlUi/allowInsecure`,
|
|
1714
|
+
fixHint: "Disable the insecure Control UI toggle or update policy after review."
|
|
1715
|
+
};
|
|
1716
|
+
});
|
|
1717
|
+
}
|
|
1718
|
+
function gatewayTailscaleFindings(policy, policyDocName, evidence) {
|
|
1719
|
+
if (readPolicyBoolean(policy, [
|
|
1720
|
+
"gateway",
|
|
1721
|
+
"exposure",
|
|
1722
|
+
"allowTailscaleFunnel"
|
|
1723
|
+
]) !== false) return [];
|
|
1724
|
+
return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "tailscale" && entry.value === "funnel").map((entry) => {
|
|
1725
|
+
return {
|
|
1726
|
+
checkId: CHECK_IDS.policyGatewayTailscaleFunnel,
|
|
1727
|
+
severity: "error",
|
|
1728
|
+
message: "Gateway Tailscale Funnel exposure is enabled.",
|
|
1729
|
+
source: "policy",
|
|
1730
|
+
path: "daocore config",
|
|
1731
|
+
ocPath: entry.source,
|
|
1732
|
+
target: entry.source,
|
|
1733
|
+
requirement: `oc://${policyDocName}/gateway/exposure/allowTailscaleFunnel`,
|
|
1734
|
+
fixHint: "Use tailscale serve/off or update policy after review."
|
|
1735
|
+
};
|
|
1736
|
+
});
|
|
1737
|
+
}
|
|
1738
|
+
function gatewayRemoteFindings(policy, policyDocName, evidence) {
|
|
1739
|
+
if (readPolicyBoolean(policy, [
|
|
1740
|
+
"gateway",
|
|
1741
|
+
"remote",
|
|
1742
|
+
"allow"
|
|
1743
|
+
]) !== false) return [];
|
|
1744
|
+
return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "remote").map((entry) => {
|
|
1745
|
+
return {
|
|
1746
|
+
checkId: CHECK_IDS.policyGatewayRemoteEnabled,
|
|
1747
|
+
severity: "error",
|
|
1748
|
+
message: `Gateway remote posture '${entry.id}' is enabled.`,
|
|
1749
|
+
source: "policy",
|
|
1750
|
+
path: "daocore config",
|
|
1751
|
+
ocPath: entry.source,
|
|
1752
|
+
target: entry.source,
|
|
1753
|
+
requirement: `oc://${policyDocName}/gateway/remote/allow`,
|
|
1754
|
+
fixHint: "Disable remote gateway mode/config or update policy after review."
|
|
1755
|
+
};
|
|
1756
|
+
});
|
|
1757
|
+
}
|
|
1758
|
+
function gatewayHttpEndpointFindings(policy, policyDocName, evidence) {
|
|
1759
|
+
const denied = new Set(readStringList(policy, [
|
|
1760
|
+
"gateway",
|
|
1761
|
+
"http",
|
|
1762
|
+
"denyEndpoints"
|
|
1763
|
+
]).map((endpoint) => endpoint.toLowerCase()));
|
|
1764
|
+
if (denied.size === 0) return [];
|
|
1765
|
+
return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "httpEndpoint" && entry.endpoint !== void 0 && denied.has(entry.endpoint.toLowerCase())).map((entry) => {
|
|
1766
|
+
return {
|
|
1767
|
+
checkId: CHECK_IDS.policyGatewayHttpEndpointEnabled,
|
|
1768
|
+
severity: "error",
|
|
1769
|
+
message: `Gateway HTTP endpoint '${entry.endpoint ?? entry.id}' is denied by policy.`,
|
|
1770
|
+
source: "policy",
|
|
1771
|
+
path: "daocore config",
|
|
1772
|
+
ocPath: entry.source,
|
|
1773
|
+
target: entry.source,
|
|
1774
|
+
requirement: `oc://${policyDocName}/gateway/http/denyEndpoints`,
|
|
1775
|
+
fixHint: "Disable the HTTP endpoint or update policy after review."
|
|
1776
|
+
};
|
|
1777
|
+
});
|
|
1778
|
+
}
|
|
1779
|
+
function gatewayHttpUrlFetchFindings(policy, policyDocName, evidence) {
|
|
1780
|
+
if (readPolicyBoolean(policy, [
|
|
1781
|
+
"gateway",
|
|
1782
|
+
"http",
|
|
1783
|
+
"requireUrlAllowlists"
|
|
1784
|
+
]) !== true) return [];
|
|
1785
|
+
return (evidence.gatewayExposure ?? []).filter((entry) => entry.kind === "httpUrlFetch" && entry.hasAllowlist !== true).map((entry) => {
|
|
1786
|
+
return {
|
|
1787
|
+
checkId: CHECK_IDS.policyGatewayHttpUrlFetchUnrestricted,
|
|
1788
|
+
severity: "error",
|
|
1789
|
+
message: `Gateway HTTP URL-fetch input '${entry.id}' has no URL allowlist.`,
|
|
1790
|
+
source: "policy",
|
|
1791
|
+
path: "daocore config",
|
|
1792
|
+
ocPath: entry.source,
|
|
1793
|
+
target: entry.source,
|
|
1794
|
+
requirement: `oc://${policyDocName}/gateway/http/requireUrlAllowlists`,
|
|
1795
|
+
fixHint: "Add a urlAllowlist for this URL-fetch input or update policy after review."
|
|
1796
|
+
};
|
|
1797
|
+
});
|
|
1798
|
+
}
|
|
1799
|
+
function secretAuthProvenanceFindings(policy, policyPath, policyDocName, evidence) {
|
|
1800
|
+
const secretShapeFindings = secretPolicyShapeFindings(policy, policyPath, policyDocName);
|
|
1801
|
+
const authShapeFindings = authProfileAllowModesShapeFindings(policy, policyPath, policyDocName);
|
|
1802
|
+
return [...secretShapeFindings.length > 0 ? secretShapeFindings : [
|
|
1803
|
+
...secretManagedProviderFindings(policy, policyDocName, evidence),
|
|
1804
|
+
...secretDeniedSourceFindings(policy, policyDocName, evidence),
|
|
1805
|
+
...secretInsecureProviderFindings(policy, policyDocName, evidence)
|
|
1806
|
+
], ...authShapeFindings.length > 0 ? authShapeFindings : [...authProfileMetadataFindings(policy, policyDocName, evidence), ...authProfileModeFindings(policy, policyDocName, evidence)]];
|
|
1807
|
+
}
|
|
1808
|
+
function policyHasSecretRules(policy) {
|
|
1809
|
+
if (!isRecord(policy) || !isRecord(policy.secrets)) return false;
|
|
1810
|
+
return policy.secrets.requireManagedProviders !== void 0 || policy.secrets.denySources !== void 0 || policy.secrets.allowInsecureProviders !== void 0;
|
|
1811
|
+
}
|
|
1812
|
+
function policyHasAuthProfileRules(policy) {
|
|
1813
|
+
return isRecord(policy) && isRecord(policy.auth) && isRecord(policy.auth.profiles) && (policy.auth.profiles.requireMetadata !== void 0 || policy.auth.profiles.allowModes !== void 0);
|
|
1814
|
+
}
|
|
1815
|
+
function policyHasGatewayRules(policy) {
|
|
1816
|
+
if (!isRecord(policy) || !isRecord(policy.gateway)) return false;
|
|
1817
|
+
const gateway = policy.gateway;
|
|
1818
|
+
return isRecord(gateway.exposure) && (gateway.exposure.allowNonLoopbackBind !== void 0 || gateway.exposure.allowTailscaleFunnel !== void 0) || isRecord(gateway.auth) && (gateway.auth.requireAuth !== void 0 || gateway.auth.requireExplicitRateLimit !== void 0) || isRecord(gateway.controlUi) && gateway.controlUi.allowInsecure !== void 0 || isRecord(gateway.remote) && gateway.remote.allow !== void 0 || isRecord(gateway.http) && (gateway.http.denyEndpoints !== void 0 || gateway.http.requireUrlAllowlists !== void 0);
|
|
1819
|
+
}
|
|
1820
|
+
function secretPolicyShapeFindings(policy, policyPath, policyDocName) {
|
|
1821
|
+
if (!isRecord(policy) || !isRecord(policy.secrets)) return [];
|
|
1822
|
+
const findings = [];
|
|
1823
|
+
for (const key of ["requireManagedProviders", "allowInsecureProviders"]) if (policy.secrets[key] !== void 0 && typeof policy.secrets[key] !== "boolean") findings.push(policyShapeFinding(policyPath, `oc://${policyDocName}/secrets/${key}`, `${policyPath} secrets.${key} must be a boolean.`, `Set secrets.${key} to true or false.`));
|
|
1824
|
+
if (policy.secrets.denySources !== void 0 && !Array.isArray(policy.secrets.denySources)) findings.push(policyShapeFinding(policyPath, `oc://${policyDocName}/secrets/denySources`, `${policyPath} secrets.denySources must be an array of source names.`, "Use an array such as [\"exec\"] or remove secrets.denySources."));
|
|
1825
|
+
else if (Array.isArray(policy.secrets.denySources)) {
|
|
1826
|
+
const invalidIndex = policy.secrets.denySources.findIndex((entry) => typeof entry !== "string" || entry.trim() === "");
|
|
1827
|
+
if (invalidIndex >= 0) findings.push(policyShapeFinding(policyPath, `oc://${policyDocName}/secrets/denySources/#${invalidIndex}`, `${policyPath} secrets.denySources[${invalidIndex}] must be a non-empty source name.`, "Use non-empty source names such as env, file, exec, or daocore."));
|
|
1828
|
+
}
|
|
1829
|
+
return findings;
|
|
1830
|
+
}
|
|
1831
|
+
function authProfileAllowModesShapeFindings(policy, policyPath, policyDocName) {
|
|
1832
|
+
if (!isRecord(policy) || !isRecord(policy.auth) || !isRecord(policy.auth.profiles) || policy.auth.profiles.allowModes === void 0) return [];
|
|
1833
|
+
if (!Array.isArray(policy.auth.profiles.allowModes)) return [policyShapeFinding(policyPath, `oc://${policyDocName}/auth/profiles/allowModes`, `${policyPath} auth.profiles.allowModes must be an array of auth modes.`, `Use supported auth modes: ${SUPPORTED_AUTH_PROFILE_MODES.join(", ")}.`)];
|
|
1834
|
+
const invalidIndex = policy.auth.profiles.allowModes.findIndex((entry) => typeof entry !== "string" || !SUPPORTED_AUTH_PROFILE_MODES.includes(entry.trim().toLowerCase()));
|
|
1835
|
+
if (invalidIndex < 0) return [];
|
|
1836
|
+
return [policyShapeFinding(policyPath, `oc://${policyDocName}/auth/profiles/allowModes/#${invalidIndex}`, `${policyPath} auth.profiles.allowModes[${invalidIndex}] must be a supported auth mode.`, `Use supported auth modes: ${SUPPORTED_AUTH_PROFILE_MODES.join(", ")}.`)];
|
|
1837
|
+
}
|
|
1838
|
+
function secretManagedProviderFindings(policy, policyDocName, evidence) {
|
|
1839
|
+
if (readPolicyBoolean(policy, ["secrets", "requireManagedProviders"]) !== true) return [];
|
|
1840
|
+
const secrets = evidence.secrets ?? [];
|
|
1841
|
+
const providerKeys = new Set(secrets.filter((secret) => secret.kind === "provider" && secret.providerSource !== void 0).map((secret) => `${secret.providerSource}:${secret.id}`));
|
|
1842
|
+
return secrets.filter((secret) => secret.kind === "input" && secret.provenance === "secretRef" && (secret.refProvider === void 0 || secret.refSource === void 0 || !providerKeys.has(`${secret.refSource}:${secret.refProvider}`))).map((secret) => {
|
|
1843
|
+
return {
|
|
1844
|
+
checkId: CHECK_IDS.policySecretsUnmanagedProvider,
|
|
1845
|
+
severity: "error",
|
|
1846
|
+
message: `SecretRef uses unmanaged provider '${secret.refProvider ?? "default"}'.`,
|
|
1847
|
+
source: "policy",
|
|
1848
|
+
path: "daocore config",
|
|
1849
|
+
ocPath: secret.source,
|
|
1850
|
+
target: secret.source,
|
|
1851
|
+
requirement: `oc://${policyDocName}/secrets/requireManagedProviders`,
|
|
1852
|
+
fixHint: "Declare the referenced provider under secrets.providers or update policy after review."
|
|
1853
|
+
};
|
|
1854
|
+
});
|
|
1855
|
+
}
|
|
1856
|
+
function secretDeniedSourceFindings(policy, policyDocName, evidence) {
|
|
1857
|
+
const deniedSources = new Set(readStringList(policy, ["secrets", "denySources"]));
|
|
1858
|
+
if (deniedSources.size === 0) return [];
|
|
1859
|
+
return (evidence.secrets ?? []).filter((secret) => {
|
|
1860
|
+
const source = secret.kind === "provider" ? secret.providerSource : secret.refSource;
|
|
1861
|
+
return source !== void 0 && deniedSources.has(source);
|
|
1862
|
+
}).map((secret) => {
|
|
1863
|
+
const source = secret.kind === "provider" ? secret.providerSource : secret.refSource;
|
|
1864
|
+
return {
|
|
1865
|
+
checkId: CHECK_IDS.policySecretsDeniedProviderSource,
|
|
1866
|
+
severity: "error",
|
|
1867
|
+
message: `Secret ${secret.kind} '${secret.id}' uses denied source '${source}'.`,
|
|
1868
|
+
source: "policy",
|
|
1869
|
+
path: "daocore config",
|
|
1870
|
+
ocPath: secret.source,
|
|
1871
|
+
target: secret.source,
|
|
1872
|
+
requirement: `oc://${policyDocName}/secrets/denySources`,
|
|
1873
|
+
fixHint: "Move this secret to an approved source or update policy after review."
|
|
1874
|
+
};
|
|
1875
|
+
});
|
|
1876
|
+
}
|
|
1877
|
+
function secretInsecureProviderFindings(policy, policyDocName, evidence) {
|
|
1878
|
+
if (readPolicyBoolean(policy, ["secrets", "allowInsecureProviders"]) !== false) return [];
|
|
1879
|
+
return (evidence.secrets ?? []).filter((secret) => secret.kind === "provider" && (secret.insecure?.length ?? 0) > 0).map((secret) => {
|
|
1880
|
+
return {
|
|
1881
|
+
checkId: CHECK_IDS.policySecretsInsecureProvider,
|
|
1882
|
+
severity: "error",
|
|
1883
|
+
message: `Secret provider '${secret.id}' enables insecure posture: ${(secret.insecure ?? []).join(", ")}.`,
|
|
1884
|
+
source: "policy",
|
|
1885
|
+
path: "daocore config",
|
|
1886
|
+
ocPath: secret.source,
|
|
1887
|
+
target: secret.source,
|
|
1888
|
+
requirement: `oc://${policyDocName}/secrets/allowInsecureProviders`,
|
|
1889
|
+
fixHint: "Remove insecure provider overrides or update policy after review."
|
|
1890
|
+
};
|
|
1891
|
+
});
|
|
1892
|
+
}
|
|
1893
|
+
function authProfileMetadataFindings(policy, policyDocName, evidence) {
|
|
1894
|
+
const requiredMetadata = requiredAuthProfileMetadata(policy);
|
|
1895
|
+
if (requiredMetadata.size === 0) return [];
|
|
1896
|
+
return (evidence.authProfiles ?? []).flatMap((profile) => {
|
|
1897
|
+
const missing = [...requiredMetadata].filter((metadata) => !authProfileHasMetadata(profile, metadata));
|
|
1898
|
+
if (missing.length === 0) return [];
|
|
1899
|
+
return [{
|
|
1900
|
+
checkId: CHECK_IDS.policyAuthProfileInvalidMetadata,
|
|
1901
|
+
severity: "error",
|
|
1902
|
+
message: `Auth profile '${profile.id}' is missing required metadata: ${missing.join(", ")}.`,
|
|
1903
|
+
source: "policy",
|
|
1904
|
+
path: "daocore config",
|
|
1905
|
+
ocPath: profile.source,
|
|
1906
|
+
target: profile.source,
|
|
1907
|
+
requirement: `oc://${policyDocName}/auth/profiles/requireMetadata`,
|
|
1908
|
+
fixHint: "Set auth.profiles.<id>.provider and a supported auth profile mode."
|
|
1909
|
+
}];
|
|
1910
|
+
});
|
|
1911
|
+
}
|
|
1912
|
+
function authProfileModeFindings(policy, policyDocName, evidence) {
|
|
1913
|
+
const allowedModes = new Set(readStringList(policy, [
|
|
1914
|
+
"auth",
|
|
1915
|
+
"profiles",
|
|
1916
|
+
"allowModes"
|
|
1917
|
+
]));
|
|
1918
|
+
if (allowedModes.size === 0) return [];
|
|
1919
|
+
return (evidence.authProfiles ?? []).filter((profile) => profile.mode !== void 0 && !allowedModes.has(profile.mode)).map((profile) => {
|
|
1920
|
+
return {
|
|
1921
|
+
checkId: CHECK_IDS.policyAuthProfileUnapprovedMode,
|
|
1922
|
+
severity: "error",
|
|
1923
|
+
message: `Auth profile '${profile.id}' uses mode '${profile.mode}' outside the policy allowlist.`,
|
|
1924
|
+
source: "policy",
|
|
1925
|
+
path: "daocore config",
|
|
1926
|
+
ocPath: profile.source,
|
|
1927
|
+
target: profile.source,
|
|
1928
|
+
requirement: `oc://${policyDocName}/auth/profiles/allowModes`,
|
|
1929
|
+
fixHint: "Change the auth profile mode or update policy after review."
|
|
1930
|
+
};
|
|
1931
|
+
});
|
|
1932
|
+
}
|
|
1933
|
+
function toolRiskFindings(policyDocName, evidence) {
|
|
1934
|
+
return (evidence.tools ?? []).filter((tool) => tool.risk === void 0).map((tool) => {
|
|
1935
|
+
return {
|
|
1936
|
+
checkId: CHECK_IDS.policyMissingToolRisk,
|
|
1937
|
+
severity: "error",
|
|
1938
|
+
message: `TOOLS.md tool '${tool.id}' has no explicit risk classification.`,
|
|
1939
|
+
source: "policy",
|
|
1940
|
+
path: "TOOLS.md",
|
|
1941
|
+
line: tool.line,
|
|
1942
|
+
ocPath: tool.source,
|
|
1943
|
+
target: tool.source,
|
|
1944
|
+
requirement: `oc://${policyDocName}/tools/requireMetadata`,
|
|
1945
|
+
fixHint: "Declare risk:low, risk:medium, risk:high, risk:critical, or an R0-R5 review alias."
|
|
1946
|
+
};
|
|
1947
|
+
});
|
|
1948
|
+
}
|
|
1949
|
+
function toolUnknownRiskFindings(policyDocName, evidence) {
|
|
1950
|
+
return (evidence.tools ?? []).filter((tool) => tool.risk !== void 0 && !KNOWN_RISK_LEVELS.includes(tool.risk)).map((tool) => {
|
|
1951
|
+
return {
|
|
1952
|
+
checkId: CHECK_IDS.policyUnknownToolRisk,
|
|
1953
|
+
severity: "error",
|
|
1954
|
+
message: `TOOLS.md tool '${tool.id}' declares unknown risk '${tool.risk}'.`,
|
|
1955
|
+
source: "policy",
|
|
1956
|
+
path: "TOOLS.md",
|
|
1957
|
+
line: tool.line,
|
|
1958
|
+
ocPath: tool.source,
|
|
1959
|
+
target: tool.source,
|
|
1960
|
+
requirement: `oc://${policyDocName}/tools/requireMetadata`,
|
|
1961
|
+
fixHint: `Use one of: ${KNOWN_RISK_LEVELS.join(", ")}.`
|
|
1962
|
+
};
|
|
1963
|
+
});
|
|
1964
|
+
}
|
|
1965
|
+
function toolSensitivityFindings(policyDocName, evidence) {
|
|
1966
|
+
return (evidence.tools ?? []).flatMap((tool) => {
|
|
1967
|
+
if (tool.sensitivity === void 0) return [{
|
|
1968
|
+
checkId: CHECK_IDS.policyMissingToolSensitivity,
|
|
1969
|
+
severity: "error",
|
|
1970
|
+
message: `TOOLS.md tool '${tool.id}' has no declared artifact sensitivity.`,
|
|
1971
|
+
source: "policy",
|
|
1972
|
+
path: "TOOLS.md",
|
|
1973
|
+
line: tool.line,
|
|
1974
|
+
ocPath: tool.source,
|
|
1975
|
+
target: tool.source,
|
|
1976
|
+
requirement: `oc://${policyDocName}/tools/requireMetadata`,
|
|
1977
|
+
fixHint: `Declare sensitivity as one of: ${KNOWN_SENSITIVITY_LEVELS.join(", ")}.`
|
|
1978
|
+
}];
|
|
1979
|
+
if (KNOWN_SENSITIVITY_LEVELS.includes(tool.sensitivity)) return [];
|
|
1980
|
+
return [{
|
|
1981
|
+
checkId: CHECK_IDS.policyUnknownToolSensitivity,
|
|
1982
|
+
severity: "error",
|
|
1983
|
+
message: `TOOLS.md tool '${tool.id}' declares unknown sensitivity '${tool.sensitivity}'.`,
|
|
1984
|
+
source: "policy",
|
|
1985
|
+
path: "TOOLS.md",
|
|
1986
|
+
line: tool.line,
|
|
1987
|
+
ocPath: tool.source,
|
|
1988
|
+
target: tool.source,
|
|
1989
|
+
requirement: `oc://${policyDocName}/tools/requireMetadata`,
|
|
1990
|
+
fixHint: `Use one of: ${KNOWN_SENSITIVITY_LEVELS.join(", ")}.`
|
|
1991
|
+
}];
|
|
1992
|
+
});
|
|
1993
|
+
}
|
|
1994
|
+
function toolOwnerFindings(policyDocName, evidence) {
|
|
1995
|
+
return (evidence.tools ?? []).filter((tool) => tool.owner === void 0).map((tool) => {
|
|
1996
|
+
return {
|
|
1997
|
+
checkId: CHECK_IDS.policyMissingToolOwner,
|
|
1998
|
+
severity: "error",
|
|
1999
|
+
message: `TOOLS.md tool '${tool.id}' has no declared owner.`,
|
|
2000
|
+
source: "policy",
|
|
2001
|
+
path: "TOOLS.md",
|
|
2002
|
+
line: tool.line,
|
|
2003
|
+
ocPath: tool.source,
|
|
2004
|
+
target: tool.source,
|
|
2005
|
+
requirement: `oc://${policyDocName}/tools/requireMetadata`,
|
|
2006
|
+
fixHint: "Declare owner:<team-or-person> for this tool."
|
|
2007
|
+
};
|
|
2008
|
+
});
|
|
2009
|
+
}
|
|
2010
|
+
async function readPolicyFile(ctx) {
|
|
2011
|
+
const displayName = policyDisplayName(ctx);
|
|
2012
|
+
const path = resolveWorkspacePath(ctx, policyPathSetting(ctx));
|
|
2013
|
+
try {
|
|
2014
|
+
return {
|
|
2015
|
+
raw: await (await import("node:fs/promises")).readFile(path, "utf-8"),
|
|
2016
|
+
path,
|
|
2017
|
+
displayName,
|
|
2018
|
+
ocDocName: basename(displayName)
|
|
2019
|
+
};
|
|
2020
|
+
} catch (err) {
|
|
2021
|
+
if (isNotFound(err)) return null;
|
|
2022
|
+
throw err;
|
|
2023
|
+
}
|
|
2024
|
+
}
|
|
2025
|
+
async function readWorkspaceFile(ctx, fileName) {
|
|
2026
|
+
const path = resolveWorkspacePath(ctx, fileName);
|
|
2027
|
+
try {
|
|
2028
|
+
return {
|
|
2029
|
+
raw: await (await import("node:fs/promises")).readFile(path, "utf-8"),
|
|
2030
|
+
path
|
|
2031
|
+
};
|
|
2032
|
+
} catch (err) {
|
|
2033
|
+
if (isNotFound(err)) return null;
|
|
2034
|
+
throw err;
|
|
2035
|
+
}
|
|
2036
|
+
}
|
|
2037
|
+
function resolveWorkspacePath(ctx, fileName) {
|
|
2038
|
+
if (isAbsolute(fileName)) return fileName;
|
|
2039
|
+
return resolve(ctx.cwd ?? process.cwd(), fileName);
|
|
2040
|
+
}
|
|
2041
|
+
function isNotFound(err) {
|
|
2042
|
+
return typeof err === "object" && err !== null && "code" in err && err.code === "ENOENT";
|
|
2043
|
+
}
|
|
2044
|
+
function parsePolicyFile(raw) {
|
|
2045
|
+
try {
|
|
2046
|
+
return {
|
|
2047
|
+
ok: true,
|
|
2048
|
+
value: JSON5.parse(raw)
|
|
2049
|
+
};
|
|
2050
|
+
} catch (err) {
|
|
2051
|
+
return {
|
|
2052
|
+
ok: false,
|
|
2053
|
+
message: err instanceof Error ? err.message : String(err)
|
|
2054
|
+
};
|
|
2055
|
+
}
|
|
2056
|
+
}
|
|
2057
|
+
function workspaceRepairsEnabled(ctx) {
|
|
2058
|
+
return policySettings(ctx).workspaceRepairs === true;
|
|
2059
|
+
}
|
|
2060
|
+
function workspaceRepairsDisabledResult(fileName) {
|
|
2061
|
+
return {
|
|
2062
|
+
status: "skipped",
|
|
2063
|
+
reason: "workspace repairs are disabled",
|
|
2064
|
+
changes: [],
|
|
2065
|
+
warnings: [`Skipped ${fileName} repair. Enable plugins.entries.policy.config.workspaceRepairs to let doctor --fix edit workspace files.`]
|
|
2066
|
+
};
|
|
2067
|
+
}
|
|
2068
|
+
function readChannelDenyRules(policy, policyDocName) {
|
|
2069
|
+
if (!isRecord(policy) || !isRecord(policy.channels) || !Array.isArray(policy.channels.denyRules)) return [];
|
|
2070
|
+
return policy.channels.denyRules.map((rule, index) => ({
|
|
2071
|
+
rule,
|
|
2072
|
+
index
|
|
2073
|
+
})).filter((entry) => isChannelDenyRule(entry.rule)).map(({ rule, index }) => {
|
|
2074
|
+
const next = {
|
|
2075
|
+
when: rule.when,
|
|
2076
|
+
requirement: `oc://${policyDocName}/channels/denyRules/#${index}`
|
|
2077
|
+
};
|
|
2078
|
+
if (rule.id !== void 0) next.id = rule.id;
|
|
2079
|
+
if (rule.reason !== void 0) next.reason = rule.reason;
|
|
2080
|
+
return next;
|
|
2081
|
+
});
|
|
2082
|
+
}
|
|
2083
|
+
function isChannelDenyRule(value) {
|
|
2084
|
+
return isRecord(value) && (value.id === void 0 || typeof value.id === "string") && (value.reason === void 0 || typeof value.reason === "string") && isRecord(value.when) && typeof value.when.provider === "string";
|
|
2085
|
+
}
|
|
2086
|
+
function channelIdsFromFindings(findings) {
|
|
2087
|
+
return [...new Set(findings.filter((finding) => finding.checkId === CHECK_IDS.policyDeniedChannelProvider).map((finding) => finding.ocPath?.match(/^oc:\/\/daocore\.config\/channels\/(.+)$/)?.[1]).filter((id) => id !== void 0 && id !== ""))];
|
|
2088
|
+
}
|
|
2089
|
+
function disableChannels(cfg, channelIds) {
|
|
2090
|
+
if (!isRecord(cfg.channels)) return {
|
|
2091
|
+
config: cfg,
|
|
2092
|
+
changed: []
|
|
2093
|
+
};
|
|
2094
|
+
const channels = { ...cfg.channels };
|
|
2095
|
+
const changed = [];
|
|
2096
|
+
for (const id of channelIds) {
|
|
2097
|
+
const current = channels[id];
|
|
2098
|
+
if (!isRecord(current) || current.enabled === false) continue;
|
|
2099
|
+
channels[id] = {
|
|
2100
|
+
...current,
|
|
2101
|
+
enabled: false
|
|
2102
|
+
};
|
|
2103
|
+
changed.push(id);
|
|
2104
|
+
}
|
|
2105
|
+
if (changed.length === 0) return {
|
|
2106
|
+
config: cfg,
|
|
2107
|
+
changed
|
|
2108
|
+
};
|
|
2109
|
+
return {
|
|
2110
|
+
config: {
|
|
2111
|
+
...cfg,
|
|
2112
|
+
channels
|
|
2113
|
+
},
|
|
2114
|
+
changed
|
|
2115
|
+
};
|
|
2116
|
+
}
|
|
2117
|
+
function policySettings(ctx) {
|
|
2118
|
+
const pluginConfig = ctx.cfg.plugins?.entries?.["policy"]?.config;
|
|
2119
|
+
if (!isRecord(pluginConfig)) return {};
|
|
2120
|
+
return pluginConfig;
|
|
2121
|
+
}
|
|
2122
|
+
function policyChecksEnabled(ctx, settings) {
|
|
2123
|
+
const entry = ctx.cfg.plugins?.entries?.["policy"];
|
|
2124
|
+
if (!isRecord(entry) || entry.enabled === false) return false;
|
|
2125
|
+
return settings.enabled !== false;
|
|
2126
|
+
}
|
|
2127
|
+
function requiredToolMetadata(policy) {
|
|
2128
|
+
return new Set(readPolicyStringArray(policy, ["tools", "requireMetadata"]) ?? []);
|
|
2129
|
+
}
|
|
2130
|
+
function requiredAuthProfileMetadata(policy) {
|
|
2131
|
+
const entries = readPolicyStringArray(policy, [
|
|
2132
|
+
"auth",
|
|
2133
|
+
"profiles",
|
|
2134
|
+
"requireMetadata"
|
|
2135
|
+
]) ?? [];
|
|
2136
|
+
return new Set(entries.filter((entry) => SUPPORTED_AUTH_PROFILE_METADATA.includes(entry)));
|
|
2137
|
+
}
|
|
2138
|
+
function authProfileHasMetadata(profile, metadata) {
|
|
2139
|
+
if (metadata === "provider") return profile.provider !== void 0 && profile.provider.trim() !== "";
|
|
2140
|
+
return SUPPORTED_AUTH_PROFILE_MODES.includes(profile.mode);
|
|
2141
|
+
}
|
|
2142
|
+
function readPolicyStringArray(policy, path, options = {}) {
|
|
2143
|
+
let current = policy;
|
|
2144
|
+
for (const part of path) {
|
|
2145
|
+
if (!isRecord(current)) return;
|
|
2146
|
+
current = current[part];
|
|
2147
|
+
}
|
|
2148
|
+
if (!Array.isArray(current) || !current.every((entry) => typeof entry === "string")) return;
|
|
2149
|
+
const lowercase = options.lowercase ?? true;
|
|
2150
|
+
return current.map((entry) => {
|
|
2151
|
+
const trimmed = entry.trim();
|
|
2152
|
+
return lowercase ? trimmed.toLowerCase() : trimmed;
|
|
2153
|
+
}).filter(Boolean);
|
|
2154
|
+
}
|
|
2155
|
+
function readStringList(policy, path, options) {
|
|
2156
|
+
return readPolicyStringArray(policy, path, options) ?? [];
|
|
2157
|
+
}
|
|
2158
|
+
function readPolicyBoolean(policy, path) {
|
|
2159
|
+
let current = policy;
|
|
2160
|
+
for (const part of path) {
|
|
2161
|
+
if (!isRecord(current)) return;
|
|
2162
|
+
current = current[part];
|
|
2163
|
+
}
|
|
2164
|
+
return typeof current === "boolean" ? current : void 0;
|
|
2165
|
+
}
|
|
2166
|
+
function policyPathSetting(ctx) {
|
|
2167
|
+
const configured = policySettings(ctx).path;
|
|
2168
|
+
return typeof configured === "string" && configured.trim() !== "" ? configured.trim() : "policy.jsonc";
|
|
2169
|
+
}
|
|
2170
|
+
function policyDisplayName(ctx) {
|
|
2171
|
+
const configured = policyPathSetting(ctx);
|
|
2172
|
+
return isAbsolute(configured) ? basename(configured) : configured;
|
|
2173
|
+
}
|
|
2174
|
+
function isRecord(value) {
|
|
2175
|
+
return typeof value === "object" && value !== null && !Array.isArray(value);
|
|
2176
|
+
}
|
|
2177
|
+
//#endregion
|
|
2178
|
+
export { createPolicyAttestation as i, evaluatePolicy as n, registerPolicyDoctorChecks as r, POLICY_CHECK_IDS as t };
|