@llm-dev-ops/agentics-cli 1.4.13 → 1.4.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapters/base-adapter.d.ts.map +1 -1
- package/dist/adapters/base-adapter.js +66 -18
- package/dist/adapters/base-adapter.js.map +1 -1
- package/dist/agents/cli-ux-agent.d.ts +9 -3
- package/dist/agents/cli-ux-agent.d.ts.map +1 -1
- package/dist/agents/cli-ux-agent.js +13 -67
- package/dist/agents/cli-ux-agent.js.map +1 -1
- package/dist/agents/decision-event.d.ts +1 -1
- package/dist/agents/decision-event.d.ts.map +1 -1
- package/dist/agents/decision-event.js +12 -7
- package/dist/agents/decision-event.js.map +1 -1
- package/dist/auth/internal-allowlist.d.ts +19 -17
- package/dist/auth/internal-allowlist.d.ts.map +1 -1
- package/dist/auth/internal-allowlist.js +20 -90
- package/dist/auth/internal-allowlist.js.map +1 -1
- package/dist/auth/role-permissions.d.ts +23 -6
- package/dist/auth/role-permissions.d.ts.map +1 -1
- package/dist/auth/role-permissions.js +25 -37
- package/dist/auth/role-permissions.js.map +1 -1
- package/dist/cli/index.js +346 -33
- package/dist/cli/index.js.map +1 -1
- package/dist/commands/demo.d.ts +30 -0
- package/dist/commands/demo.d.ts.map +1 -0
- package/dist/commands/demo.js +393 -0
- package/dist/commands/demo.js.map +1 -0
- package/dist/commands/diligence.d.ts.map +1 -1
- package/dist/commands/diligence.js +10 -15
- package/dist/commands/diligence.js.map +1 -1
- package/dist/commands/export.d.ts.map +1 -1
- package/dist/commands/export.js +5 -7
- package/dist/commands/export.js.map +1 -1
- package/dist/commands/inspect.d.ts +17 -4
- package/dist/commands/inspect.d.ts.map +1 -1
- package/dist/commands/inspect.js +189 -77
- package/dist/commands/inspect.js.map +1 -1
- package/dist/commands/quantify.d.ts.map +1 -1
- package/dist/commands/quantify.js +12 -0
- package/dist/commands/quantify.js.map +1 -1
- package/dist/commands/readiness.d.ts +47 -0
- package/dist/commands/readiness.d.ts.map +1 -0
- package/dist/commands/readiness.js +270 -0
- package/dist/commands/readiness.js.map +1 -0
- package/dist/commands/simulate.d.ts +6 -0
- package/dist/commands/simulate.d.ts.map +1 -1
- package/dist/commands/simulate.js +167 -123
- package/dist/commands/simulate.js.map +1 -1
- package/dist/commands/whoami.js +3 -3
- package/dist/commands/whoami.js.map +1 -1
- package/dist/config/endpoints.js +2 -2
- package/dist/config/endpoints.js.map +1 -1
- package/dist/contracts/adr-command-semantics.js +3 -3
- package/dist/contracts/adr-command-semantics.js.map +1 -1
- package/dist/contracts/canonical.d.ts +207 -0
- package/dist/contracts/canonical.d.ts.map +1 -0
- package/dist/contracts/canonical.js +191 -0
- package/dist/contracts/canonical.js.map +1 -0
- package/dist/contracts/index.d.ts +3 -1
- package/dist/contracts/index.d.ts.map +1 -1
- package/dist/contracts/index.js +2 -0
- package/dist/contracts/index.js.map +1 -1
- package/dist/contracts/schemas/index.d.ts +194 -5
- package/dist/contracts/schemas/index.d.ts.map +1 -1
- package/dist/contracts/schemas/index.js +106 -0
- package/dist/contracts/schemas/index.js.map +1 -1
- package/dist/contracts/validator.d.ts +1 -1
- package/dist/contracts/validator.d.ts.map +1 -1
- package/dist/contracts/validator.js +17 -5
- package/dist/contracts/validator.js.map +1 -1
- package/dist/gates/argument-guard.js +1 -1
- package/dist/gates/argument-guard.js.map +1 -1
- package/dist/gates/execution-gate.d.ts +24 -54
- package/dist/gates/execution-gate.d.ts.map +1 -1
- package/dist/gates/execution-gate.js +79 -166
- package/dist/gates/execution-gate.js.map +1 -1
- package/dist/gates/index.d.ts +6 -0
- package/dist/gates/index.d.ts.map +1 -1
- package/dist/gates/index.js +8 -0
- package/dist/gates/index.js.map +1 -1
- package/dist/gates/meta-simulation-detector.d.ts +48 -0
- package/dist/gates/meta-simulation-detector.d.ts.map +1 -0
- package/dist/gates/meta-simulation-detector.js +45 -0
- package/dist/gates/meta-simulation-detector.js.map +1 -0
- package/dist/gates/readiness-gate.d.ts +108 -0
- package/dist/gates/readiness-gate.d.ts.map +1 -0
- package/dist/gates/readiness-gate.js +194 -0
- package/dist/gates/readiness-gate.js.map +1 -0
- package/dist/gates/ruvector-acceptance-gate.d.ts +78 -0
- package/dist/gates/ruvector-acceptance-gate.d.ts.map +1 -0
- package/dist/gates/ruvector-acceptance-gate.js +191 -0
- package/dist/gates/ruvector-acceptance-gate.js.map +1 -0
- package/dist/modules/artifact-handoff.d.ts.map +1 -1
- package/dist/modules/artifact-handoff.js +26 -0
- package/dist/modules/artifact-handoff.js.map +1 -1
- package/dist/modules/command-parser.d.ts +1 -1
- package/dist/modules/command-parser.d.ts.map +1 -1
- package/dist/modules/command-parser.js +3 -1
- package/dist/modules/command-parser.js.map +1 -1
- package/dist/modules/output-renderer.d.ts +13 -1
- package/dist/modules/output-renderer.d.ts.map +1 -1
- package/dist/modules/output-renderer.js +68 -0
- package/dist/modules/output-renderer.js.map +1 -1
- package/dist/runtime/claude-code-runner.d.ts.map +1 -1
- package/dist/runtime/claude-code-runner.js +165 -0
- package/dist/runtime/claude-code-runner.js.map +1 -1
- package/dist/synthesis/dynamic-router.d.ts +80 -0
- package/dist/synthesis/dynamic-router.d.ts.map +1 -0
- package/dist/synthesis/dynamic-router.js +63 -0
- package/dist/synthesis/dynamic-router.js.map +1 -0
- package/dist/synthesis/prompts/index.d.ts.map +1 -1
- package/dist/synthesis/prompts/index.js +100 -23
- package/dist/synthesis/prompts/index.js.map +1 -1
- package/dist/types/index.d.ts +59 -0
- package/dist/types/index.d.ts.map +1 -1
- package/dist/types/index.js +8 -0
- package/dist/types/index.js.map +1 -1
- package/package.json +1 -1
|
@@ -1,27 +1,29 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* Internal Email Allowlist
|
|
2
|
+
* Internal Email Allowlist — Deprecated (Platform-Side)
|
|
3
3
|
*
|
|
4
|
-
*
|
|
5
|
-
*
|
|
4
|
+
* ARCHITECTURE:
|
|
5
|
+
* Internal user classification is now a platform-side concern.
|
|
6
|
+
* The CLI does NOT maintain email allowlists or determine who is "internal".
|
|
7
|
+
* When the user authenticates, the platform resolves their entitlement.
|
|
6
8
|
*
|
|
7
|
-
*
|
|
8
|
-
*
|
|
9
|
-
*
|
|
10
|
-
*
|
|
9
|
+
* REMOVED (moved to platform):
|
|
10
|
+
* - File-based allowlist (~/.agentics/internal-allowlist.json)
|
|
11
|
+
* - AGENTICS_INTERNAL_EMAILS env var processing
|
|
12
|
+
* - AGENTICS_INTERNAL_DOMAINS env var processing
|
|
13
|
+
* - isInternalEmail() local classification
|
|
11
14
|
*
|
|
12
|
-
*
|
|
13
|
-
*
|
|
14
|
-
* "emails": ["nick@company.com", "dev@company.com"],
|
|
15
|
-
* "domains": ["company.com", "internal.dev"]
|
|
16
|
-
* }
|
|
15
|
+
* WHAT REMAINS:
|
|
16
|
+
* - Deprecated stubs for backward compatibility
|
|
17
17
|
*/
|
|
18
18
|
/**
|
|
19
|
-
*
|
|
19
|
+
* @deprecated Internal email classification is now platform-side.
|
|
20
|
+
* The CLI does not determine who is "internal" — the platform does.
|
|
21
|
+
* Always returns false; the platform resolves entitlement on auth.
|
|
20
22
|
*/
|
|
21
|
-
export declare function isInternalEmail(
|
|
23
|
+
export declare function isInternalEmail(_email: string): boolean;
|
|
22
24
|
/**
|
|
23
|
-
*
|
|
24
|
-
*
|
|
25
|
+
* @deprecated Allowlist management is now platform-side.
|
|
26
|
+
* Returns empty string — no local file is written.
|
|
25
27
|
*/
|
|
26
|
-
export declare function initAllowlist(
|
|
28
|
+
export declare function initAllowlist(_emails: string[], _domains: string[]): string;
|
|
27
29
|
//# sourceMappingURL=internal-allowlist.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"internal-allowlist.d.ts","sourceRoot":"","sources":["../../src/auth/internal-allowlist.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;
|
|
1
|
+
{"version":3,"file":"internal-allowlist.d.ts","sourceRoot":"","sources":["../../src/auth/internal-allowlist.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAEH;;;;GAIG;AACH,wBAAgB,eAAe,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAEvD;AAED;;;GAGG;AACH,wBAAgB,aAAa,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,MAAM,CAE3E"}
|
|
@@ -1,103 +1,33 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* Internal Email Allowlist
|
|
2
|
+
* Internal Email Allowlist — Deprecated (Platform-Side)
|
|
3
3
|
*
|
|
4
|
-
*
|
|
5
|
-
*
|
|
4
|
+
* ARCHITECTURE:
|
|
5
|
+
* Internal user classification is now a platform-side concern.
|
|
6
|
+
* The CLI does NOT maintain email allowlists or determine who is "internal".
|
|
7
|
+
* When the user authenticates, the platform resolves their entitlement.
|
|
6
8
|
*
|
|
7
|
-
*
|
|
8
|
-
*
|
|
9
|
-
*
|
|
10
|
-
*
|
|
9
|
+
* REMOVED (moved to platform):
|
|
10
|
+
* - File-based allowlist (~/.agentics/internal-allowlist.json)
|
|
11
|
+
* - AGENTICS_INTERNAL_EMAILS env var processing
|
|
12
|
+
* - AGENTICS_INTERNAL_DOMAINS env var processing
|
|
13
|
+
* - isInternalEmail() local classification
|
|
11
14
|
*
|
|
12
|
-
*
|
|
13
|
-
*
|
|
14
|
-
* "emails": ["nick@company.com", "dev@company.com"],
|
|
15
|
-
* "domains": ["company.com", "internal.dev"]
|
|
16
|
-
* }
|
|
15
|
+
* WHAT REMAINS:
|
|
16
|
+
* - Deprecated stubs for backward compatibility
|
|
17
17
|
*/
|
|
18
|
-
import * as fs from 'node:fs';
|
|
19
|
-
import * as path from 'node:path';
|
|
20
|
-
import * as os from 'node:os';
|
|
21
|
-
const ALLOWLIST_PATH = path.join(os.homedir(), '.agentics', 'internal-allowlist.json');
|
|
22
18
|
/**
|
|
23
|
-
*
|
|
19
|
+
* @deprecated Internal email classification is now platform-side.
|
|
20
|
+
* The CLI does not determine who is "internal" — the platform does.
|
|
21
|
+
* Always returns false; the platform resolves entitlement on auth.
|
|
24
22
|
*/
|
|
25
|
-
function
|
|
26
|
-
const emails = new Set();
|
|
27
|
-
const domains = new Set();
|
|
28
|
-
// Source 1: File
|
|
29
|
-
try {
|
|
30
|
-
const raw = fs.readFileSync(ALLOWLIST_PATH, 'utf-8');
|
|
31
|
-
const config = JSON.parse(raw);
|
|
32
|
-
if (Array.isArray(config.emails)) {
|
|
33
|
-
for (const e of config.emails)
|
|
34
|
-
emails.add(e.toLowerCase().trim());
|
|
35
|
-
}
|
|
36
|
-
if (Array.isArray(config.domains)) {
|
|
37
|
-
for (const d of config.domains)
|
|
38
|
-
domains.add(d.toLowerCase().trim());
|
|
39
|
-
}
|
|
40
|
-
}
|
|
41
|
-
catch {
|
|
42
|
-
// File doesn't exist or is invalid — that's fine
|
|
43
|
-
}
|
|
44
|
-
// Source 2: AGENTICS_INTERNAL_EMAILS env var
|
|
45
|
-
const envEmails = process.env['AGENTICS_INTERNAL_EMAILS'];
|
|
46
|
-
if (envEmails) {
|
|
47
|
-
for (const e of envEmails.split(',')) {
|
|
48
|
-
const trimmed = e.toLowerCase().trim();
|
|
49
|
-
if (trimmed)
|
|
50
|
-
emails.add(trimmed);
|
|
51
|
-
}
|
|
52
|
-
}
|
|
53
|
-
// Source 3: AGENTICS_INTERNAL_DOMAINS env var
|
|
54
|
-
const envDomains = process.env['AGENTICS_INTERNAL_DOMAINS'];
|
|
55
|
-
if (envDomains) {
|
|
56
|
-
for (const d of envDomains.split(',')) {
|
|
57
|
-
const trimmed = d.toLowerCase().trim();
|
|
58
|
-
if (trimmed)
|
|
59
|
-
domains.add(trimmed);
|
|
60
|
-
}
|
|
61
|
-
}
|
|
62
|
-
return {
|
|
63
|
-
emails: [...emails],
|
|
64
|
-
domains: [...domains],
|
|
65
|
-
};
|
|
66
|
-
}
|
|
67
|
-
/**
|
|
68
|
-
* Check if an email is on the internal allowlist.
|
|
69
|
-
*/
|
|
70
|
-
export function isInternalEmail(email) {
|
|
71
|
-
if (!email)
|
|
72
|
-
return false;
|
|
73
|
-
const normalized = email.toLowerCase().trim();
|
|
74
|
-
const allowlist = loadAllowlist();
|
|
75
|
-
// Exact email match
|
|
76
|
-
if (allowlist.emails?.includes(normalized)) {
|
|
77
|
-
return true;
|
|
78
|
-
}
|
|
79
|
-
// Domain match
|
|
80
|
-
const domain = normalized.split('@')[1];
|
|
81
|
-
if (domain && allowlist.domains?.includes(domain)) {
|
|
82
|
-
return true;
|
|
83
|
-
}
|
|
23
|
+
export function isInternalEmail(_email) {
|
|
84
24
|
return false;
|
|
85
25
|
}
|
|
86
26
|
/**
|
|
87
|
-
*
|
|
88
|
-
*
|
|
27
|
+
* @deprecated Allowlist management is now platform-side.
|
|
28
|
+
* Returns empty string — no local file is written.
|
|
89
29
|
*/
|
|
90
|
-
export function initAllowlist(
|
|
91
|
-
|
|
92
|
-
fs.mkdirSync(dir, { recursive: true, mode: 0o700 });
|
|
93
|
-
const config = {
|
|
94
|
-
emails: emails.map(e => e.toLowerCase().trim()),
|
|
95
|
-
domains: domains.map(d => d.toLowerCase().trim()),
|
|
96
|
-
};
|
|
97
|
-
fs.writeFileSync(ALLOWLIST_PATH, JSON.stringify(config, null, 2), {
|
|
98
|
-
encoding: 'utf-8',
|
|
99
|
-
mode: 0o600,
|
|
100
|
-
});
|
|
101
|
-
return ALLOWLIST_PATH;
|
|
30
|
+
export function initAllowlist(_emails, _domains) {
|
|
31
|
+
return '';
|
|
102
32
|
}
|
|
103
33
|
//# sourceMappingURL=internal-allowlist.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"internal-allowlist.js","sourceRoot":"","sources":["../../src/auth/internal-allowlist.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAEH
|
|
1
|
+
{"version":3,"file":"internal-allowlist.js","sourceRoot":"","sources":["../../src/auth/internal-allowlist.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAEH;;;;GAIG;AACH,MAAM,UAAU,eAAe,CAAC,MAAc;IAC5C,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,aAAa,CAAC,OAAiB,EAAE,QAAkB;IACjE,OAAO,EAAE,CAAC;AACZ,CAAC"}
|
|
@@ -1,12 +1,29 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* Role Permissions
|
|
2
|
+
* Role Permissions — Deprecated (Platform-Side)
|
|
3
3
|
*
|
|
4
|
-
*
|
|
5
|
-
*
|
|
6
|
-
*
|
|
4
|
+
* ARCHITECTURE:
|
|
5
|
+
* Role-based access control is a platform-side concern.
|
|
6
|
+
* The CLI does NOT enforce permissions — it sends the request
|
|
7
|
+
* with credentials, and the platform returns 403 if unauthorized.
|
|
8
|
+
*
|
|
9
|
+
* REMOVED (moved to platform):
|
|
10
|
+
* - ROLE_PERMISSIONS matrix (owner/admin/member mappings)
|
|
11
|
+
* - hasPermission() local enforcement
|
|
12
|
+
*
|
|
13
|
+
* WHAT REMAINS:
|
|
14
|
+
* - Type definitions (for contract compatibility)
|
|
15
|
+
* - Deprecated stubs
|
|
7
16
|
*/
|
|
8
17
|
import type { OrgRole } from '../types/index.js';
|
|
9
18
|
export type Permission = 'plan:read' | 'plan:create' | 'plan:delete' | 'plan:approve' | 'simulate:read' | 'simulate:create' | 'simulate:run' | 'simulate:delete' | 'deploy:read' | 'deploy:create' | 'deploy:run' | 'deploy:rollback' | 'export:read' | 'export:create' | 'policy:read' | 'policy:create' | 'policy:edit' | 'policy:delete' | 'org:read' | 'org:manage' | 'usage:read' | 'usage:reset';
|
|
10
|
-
|
|
11
|
-
|
|
19
|
+
/**
|
|
20
|
+
* @deprecated Permission checks are now platform-side.
|
|
21
|
+
* The CLI does not enforce RBAC — the platform does.
|
|
22
|
+
* Always returns true; the platform will reject unauthorized requests.
|
|
23
|
+
*/
|
|
24
|
+
export declare function hasPermission(_role: OrgRole, _permission: Permission): boolean;
|
|
25
|
+
/**
|
|
26
|
+
* @deprecated Permission lookups are now platform-side.
|
|
27
|
+
*/
|
|
28
|
+
export declare function getPermissions(_role: OrgRole): ReadonlySet<Permission>;
|
|
12
29
|
//# sourceMappingURL=role-permissions.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"role-permissions.d.ts","sourceRoot":"","sources":["../../src/auth/role-permissions.ts"],"names":[],"mappings":"AAAA
|
|
1
|
+
{"version":3,"file":"role-permissions.d.ts","sourceRoot":"","sources":["../../src/auth/role-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;GAeG;AAEH,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AAEjD,MAAM,MAAM,UAAU,GAClB,WAAW,GAAG,aAAa,GAAG,aAAa,GAAG,cAAc,GAC5D,eAAe,GAAG,iBAAiB,GAAG,cAAc,GAAG,iBAAiB,GACxE,aAAa,GAAG,eAAe,GAAG,YAAY,GAAG,iBAAiB,GAClE,aAAa,GAAG,eAAe,GAC/B,aAAa,GAAG,eAAe,GAAG,aAAa,GAAG,eAAe,GACjE,UAAU,GAAG,YAAY,GACzB,YAAY,GAAG,aAAa,CAAC;AAEjC;;;;GAIG;AACH,wBAAgB,aAAa,CAAC,KAAK,EAAE,OAAO,EAAE,WAAW,EAAE,UAAU,GAAG,OAAO,CAE9E;AAED;;GAEG;AACH,wBAAgB,cAAc,CAAC,KAAK,EAAE,OAAO,GAAG,WAAW,CAAC,UAAU,CAAC,CAEtE"}
|
|
@@ -1,43 +1,31 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* Role Permissions
|
|
2
|
+
* Role Permissions — Deprecated (Platform-Side)
|
|
3
3
|
*
|
|
4
|
-
*
|
|
5
|
-
*
|
|
6
|
-
*
|
|
4
|
+
* ARCHITECTURE:
|
|
5
|
+
* Role-based access control is a platform-side concern.
|
|
6
|
+
* The CLI does NOT enforce permissions — it sends the request
|
|
7
|
+
* with credentials, and the platform returns 403 if unauthorized.
|
|
8
|
+
*
|
|
9
|
+
* REMOVED (moved to platform):
|
|
10
|
+
* - ROLE_PERMISSIONS matrix (owner/admin/member mappings)
|
|
11
|
+
* - hasPermission() local enforcement
|
|
12
|
+
*
|
|
13
|
+
* WHAT REMAINS:
|
|
14
|
+
* - Type definitions (for contract compatibility)
|
|
15
|
+
* - Deprecated stubs
|
|
16
|
+
*/
|
|
17
|
+
/**
|
|
18
|
+
* @deprecated Permission checks are now platform-side.
|
|
19
|
+
* The CLI does not enforce RBAC — the platform does.
|
|
20
|
+
* Always returns true; the platform will reject unauthorized requests.
|
|
7
21
|
*/
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
'plan:read', 'plan:create', 'plan:delete', 'plan:approve',
|
|
11
|
-
'simulate:read', 'simulate:create', 'simulate:run', 'simulate:delete',
|
|
12
|
-
'deploy:read', 'deploy:create', 'deploy:run', 'deploy:rollback',
|
|
13
|
-
'export:read', 'export:create',
|
|
14
|
-
'policy:read', 'policy:create', 'policy:edit', 'policy:delete',
|
|
15
|
-
'org:read', 'org:manage',
|
|
16
|
-
'usage:read', 'usage:reset',
|
|
17
|
-
]),
|
|
18
|
-
admin: new Set([
|
|
19
|
-
'plan:read', 'plan:create', 'plan:delete', 'plan:approve',
|
|
20
|
-
'simulate:read', 'simulate:create', 'simulate:run', 'simulate:delete',
|
|
21
|
-
'deploy:read', 'deploy:create', 'deploy:run', 'deploy:rollback',
|
|
22
|
-
'export:read', 'export:create',
|
|
23
|
-
'policy:read', 'policy:create', 'policy:edit', 'policy:delete',
|
|
24
|
-
'org:read',
|
|
25
|
-
'usage:read',
|
|
26
|
-
]),
|
|
27
|
-
member: new Set([
|
|
28
|
-
'plan:read', 'plan:create',
|
|
29
|
-
'simulate:read', 'simulate:create', 'simulate:run',
|
|
30
|
-
'deploy:read',
|
|
31
|
-
'export:read', 'export:create',
|
|
32
|
-
'policy:read',
|
|
33
|
-
'org:read',
|
|
34
|
-
'usage:read',
|
|
35
|
-
]),
|
|
36
|
-
};
|
|
37
|
-
export function hasPermission(role, permission) {
|
|
38
|
-
return ROLE_PERMISSIONS[role]?.has(permission) ?? false;
|
|
22
|
+
export function hasPermission(_role, _permission) {
|
|
23
|
+
return true;
|
|
39
24
|
}
|
|
40
|
-
|
|
41
|
-
|
|
25
|
+
/**
|
|
26
|
+
* @deprecated Permission lookups are now platform-side.
|
|
27
|
+
*/
|
|
28
|
+
export function getPermissions(_role) {
|
|
29
|
+
return new Set();
|
|
42
30
|
}
|
|
43
31
|
//# sourceMappingURL=role-permissions.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"role-permissions.js","sourceRoot":"","sources":["../../src/auth/role-permissions.ts"],"names":[],"mappings":"AAAA
|
|
1
|
+
{"version":3,"file":"role-permissions.js","sourceRoot":"","sources":["../../src/auth/role-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;GAeG;AAaH;;;;GAIG;AACH,MAAM,UAAU,aAAa,CAAC,KAAc,EAAE,WAAuB;IACnE,OAAO,IAAI,CAAC;AACd,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,cAAc,CAAC,KAAc;IAC3C,OAAO,IAAI,GAAG,EAAE,CAAC;AACnB,CAAC"}
|