@llm-dev-ops/agentics-cli 1.4.13 → 1.4.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (116) hide show
  1. package/dist/adapters/base-adapter.d.ts.map +1 -1
  2. package/dist/adapters/base-adapter.js +66 -18
  3. package/dist/adapters/base-adapter.js.map +1 -1
  4. package/dist/agents/cli-ux-agent.d.ts +9 -3
  5. package/dist/agents/cli-ux-agent.d.ts.map +1 -1
  6. package/dist/agents/cli-ux-agent.js +13 -67
  7. package/dist/agents/cli-ux-agent.js.map +1 -1
  8. package/dist/agents/decision-event.d.ts +1 -1
  9. package/dist/agents/decision-event.d.ts.map +1 -1
  10. package/dist/agents/decision-event.js +12 -7
  11. package/dist/agents/decision-event.js.map +1 -1
  12. package/dist/auth/internal-allowlist.d.ts +19 -17
  13. package/dist/auth/internal-allowlist.d.ts.map +1 -1
  14. package/dist/auth/internal-allowlist.js +20 -90
  15. package/dist/auth/internal-allowlist.js.map +1 -1
  16. package/dist/auth/role-permissions.d.ts +23 -6
  17. package/dist/auth/role-permissions.d.ts.map +1 -1
  18. package/dist/auth/role-permissions.js +25 -37
  19. package/dist/auth/role-permissions.js.map +1 -1
  20. package/dist/cli/index.js +346 -33
  21. package/dist/cli/index.js.map +1 -1
  22. package/dist/commands/demo.d.ts +30 -0
  23. package/dist/commands/demo.d.ts.map +1 -0
  24. package/dist/commands/demo.js +393 -0
  25. package/dist/commands/demo.js.map +1 -0
  26. package/dist/commands/diligence.d.ts.map +1 -1
  27. package/dist/commands/diligence.js +10 -15
  28. package/dist/commands/diligence.js.map +1 -1
  29. package/dist/commands/export.d.ts.map +1 -1
  30. package/dist/commands/export.js +5 -7
  31. package/dist/commands/export.js.map +1 -1
  32. package/dist/commands/inspect.d.ts +17 -4
  33. package/dist/commands/inspect.d.ts.map +1 -1
  34. package/dist/commands/inspect.js +189 -77
  35. package/dist/commands/inspect.js.map +1 -1
  36. package/dist/commands/quantify.d.ts.map +1 -1
  37. package/dist/commands/quantify.js +12 -0
  38. package/dist/commands/quantify.js.map +1 -1
  39. package/dist/commands/readiness.d.ts +47 -0
  40. package/dist/commands/readiness.d.ts.map +1 -0
  41. package/dist/commands/readiness.js +270 -0
  42. package/dist/commands/readiness.js.map +1 -0
  43. package/dist/commands/simulate.d.ts +6 -0
  44. package/dist/commands/simulate.d.ts.map +1 -1
  45. package/dist/commands/simulate.js +167 -123
  46. package/dist/commands/simulate.js.map +1 -1
  47. package/dist/commands/whoami.js +3 -3
  48. package/dist/commands/whoami.js.map +1 -1
  49. package/dist/config/endpoints.js +2 -2
  50. package/dist/config/endpoints.js.map +1 -1
  51. package/dist/contracts/adr-command-semantics.js +3 -3
  52. package/dist/contracts/adr-command-semantics.js.map +1 -1
  53. package/dist/contracts/canonical.d.ts +207 -0
  54. package/dist/contracts/canonical.d.ts.map +1 -0
  55. package/dist/contracts/canonical.js +191 -0
  56. package/dist/contracts/canonical.js.map +1 -0
  57. package/dist/contracts/index.d.ts +3 -1
  58. package/dist/contracts/index.d.ts.map +1 -1
  59. package/dist/contracts/index.js +2 -0
  60. package/dist/contracts/index.js.map +1 -1
  61. package/dist/contracts/schemas/index.d.ts +194 -5
  62. package/dist/contracts/schemas/index.d.ts.map +1 -1
  63. package/dist/contracts/schemas/index.js +106 -0
  64. package/dist/contracts/schemas/index.js.map +1 -1
  65. package/dist/contracts/validator.d.ts +1 -1
  66. package/dist/contracts/validator.d.ts.map +1 -1
  67. package/dist/contracts/validator.js +17 -5
  68. package/dist/contracts/validator.js.map +1 -1
  69. package/dist/gates/argument-guard.js +1 -1
  70. package/dist/gates/argument-guard.js.map +1 -1
  71. package/dist/gates/execution-gate.d.ts +24 -54
  72. package/dist/gates/execution-gate.d.ts.map +1 -1
  73. package/dist/gates/execution-gate.js +79 -166
  74. package/dist/gates/execution-gate.js.map +1 -1
  75. package/dist/gates/index.d.ts +6 -0
  76. package/dist/gates/index.d.ts.map +1 -1
  77. package/dist/gates/index.js +8 -0
  78. package/dist/gates/index.js.map +1 -1
  79. package/dist/gates/meta-simulation-detector.d.ts +48 -0
  80. package/dist/gates/meta-simulation-detector.d.ts.map +1 -0
  81. package/dist/gates/meta-simulation-detector.js +45 -0
  82. package/dist/gates/meta-simulation-detector.js.map +1 -0
  83. package/dist/gates/readiness-gate.d.ts +108 -0
  84. package/dist/gates/readiness-gate.d.ts.map +1 -0
  85. package/dist/gates/readiness-gate.js +194 -0
  86. package/dist/gates/readiness-gate.js.map +1 -0
  87. package/dist/gates/ruvector-acceptance-gate.d.ts +78 -0
  88. package/dist/gates/ruvector-acceptance-gate.d.ts.map +1 -0
  89. package/dist/gates/ruvector-acceptance-gate.js +191 -0
  90. package/dist/gates/ruvector-acceptance-gate.js.map +1 -0
  91. package/dist/modules/artifact-handoff.d.ts.map +1 -1
  92. package/dist/modules/artifact-handoff.js +26 -0
  93. package/dist/modules/artifact-handoff.js.map +1 -1
  94. package/dist/modules/command-parser.d.ts +1 -1
  95. package/dist/modules/command-parser.d.ts.map +1 -1
  96. package/dist/modules/command-parser.js +3 -1
  97. package/dist/modules/command-parser.js.map +1 -1
  98. package/dist/modules/output-renderer.d.ts +13 -1
  99. package/dist/modules/output-renderer.d.ts.map +1 -1
  100. package/dist/modules/output-renderer.js +68 -0
  101. package/dist/modules/output-renderer.js.map +1 -1
  102. package/dist/runtime/claude-code-runner.d.ts.map +1 -1
  103. package/dist/runtime/claude-code-runner.js +165 -0
  104. package/dist/runtime/claude-code-runner.js.map +1 -1
  105. package/dist/synthesis/dynamic-router.d.ts +80 -0
  106. package/dist/synthesis/dynamic-router.d.ts.map +1 -0
  107. package/dist/synthesis/dynamic-router.js +63 -0
  108. package/dist/synthesis/dynamic-router.js.map +1 -0
  109. package/dist/synthesis/prompts/index.d.ts.map +1 -1
  110. package/dist/synthesis/prompts/index.js +100 -23
  111. package/dist/synthesis/prompts/index.js.map +1 -1
  112. package/dist/types/index.d.ts +59 -0
  113. package/dist/types/index.d.ts.map +1 -1
  114. package/dist/types/index.js +8 -0
  115. package/dist/types/index.js.map +1 -1
  116. package/package.json +1 -1
@@ -1,27 +1,29 @@
1
1
  /**
2
- * Internal Email Allowlist
2
+ * Internal Email Allowlist — Deprecated (Platform-Side)
3
3
  *
4
- * Determines if an email address belongs to an approved internal user.
5
- * Internal users get `payment_status: 'paid'` automatically no payment required.
4
+ * ARCHITECTURE:
5
+ * Internal user classification is now a platform-side concern.
6
+ * The CLI does NOT maintain email allowlists or determine who is "internal".
7
+ * When the user authenticates, the platform resolves their entitlement.
6
8
  *
7
- * Resolution order:
8
- * 1. ~/.agentics/internal-allowlist.json (file-based, operator-managed)
9
- * 2. AGENTICS_INTERNAL_EMAILS env var (comma-separated emails)
10
- * 3. AGENTICS_INTERNAL_DOMAINS env var (comma-separated domains)
9
+ * REMOVED (moved to platform):
10
+ * - File-based allowlist (~/.agentics/internal-allowlist.json)
11
+ * - AGENTICS_INTERNAL_EMAILS env var processing
12
+ * - AGENTICS_INTERNAL_DOMAINS env var processing
13
+ * - isInternalEmail() local classification
11
14
  *
12
- * File format (~/.agentics/internal-allowlist.json):
13
- * {
14
- * "emails": ["nick@company.com", "dev@company.com"],
15
- * "domains": ["company.com", "internal.dev"]
16
- * }
15
+ * WHAT REMAINS:
16
+ * - Deprecated stubs for backward compatibility
17
17
  */
18
18
  /**
19
- * Check if an email is on the internal allowlist.
19
+ * @deprecated Internal email classification is now platform-side.
20
+ * The CLI does not determine who is "internal" — the platform does.
21
+ * Always returns false; the platform resolves entitlement on auth.
20
22
  */
21
- export declare function isInternalEmail(email: string): boolean;
23
+ export declare function isInternalEmail(_email: string): boolean;
22
24
  /**
23
- * Initialize the allowlist file with the given emails/domains.
24
- * Creates ~/.agentics/ if needed.
25
+ * @deprecated Allowlist management is now platform-side.
26
+ * Returns empty string — no local file is written.
25
27
  */
26
- export declare function initAllowlist(emails: string[], domains: string[]): string;
28
+ export declare function initAllowlist(_emails: string[], _domains: string[]): string;
27
29
  //# sourceMappingURL=internal-allowlist.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"internal-allowlist.d.ts","sourceRoot":"","sources":["../../src/auth/internal-allowlist.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AA0DH;;GAEG;AACH,wBAAgB,eAAe,CAAC,KAAK,EAAE,MAAM,GAAG,OAAO,CAkBtD;AAED;;;GAGG;AACH,wBAAgB,aAAa,CAAC,MAAM,EAAE,MAAM,EAAE,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,MAAM,CAezE"}
1
+ {"version":3,"file":"internal-allowlist.d.ts","sourceRoot":"","sources":["../../src/auth/internal-allowlist.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAEH;;;;GAIG;AACH,wBAAgB,eAAe,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAEvD;AAED;;;GAGG;AACH,wBAAgB,aAAa,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,MAAM,CAE3E"}
@@ -1,103 +1,33 @@
1
1
  /**
2
- * Internal Email Allowlist
2
+ * Internal Email Allowlist — Deprecated (Platform-Side)
3
3
  *
4
- * Determines if an email address belongs to an approved internal user.
5
- * Internal users get `payment_status: 'paid'` automatically no payment required.
4
+ * ARCHITECTURE:
5
+ * Internal user classification is now a platform-side concern.
6
+ * The CLI does NOT maintain email allowlists or determine who is "internal".
7
+ * When the user authenticates, the platform resolves their entitlement.
6
8
  *
7
- * Resolution order:
8
- * 1. ~/.agentics/internal-allowlist.json (file-based, operator-managed)
9
- * 2. AGENTICS_INTERNAL_EMAILS env var (comma-separated emails)
10
- * 3. AGENTICS_INTERNAL_DOMAINS env var (comma-separated domains)
9
+ * REMOVED (moved to platform):
10
+ * - File-based allowlist (~/.agentics/internal-allowlist.json)
11
+ * - AGENTICS_INTERNAL_EMAILS env var processing
12
+ * - AGENTICS_INTERNAL_DOMAINS env var processing
13
+ * - isInternalEmail() local classification
11
14
  *
12
- * File format (~/.agentics/internal-allowlist.json):
13
- * {
14
- * "emails": ["nick@company.com", "dev@company.com"],
15
- * "domains": ["company.com", "internal.dev"]
16
- * }
15
+ * WHAT REMAINS:
16
+ * - Deprecated stubs for backward compatibility
17
17
  */
18
- import * as fs from 'node:fs';
19
- import * as path from 'node:path';
20
- import * as os from 'node:os';
21
- const ALLOWLIST_PATH = path.join(os.homedir(), '.agentics', 'internal-allowlist.json');
22
18
  /**
23
- * Load the allowlist from file + env vars.
19
+ * @deprecated Internal email classification is now platform-side.
20
+ * The CLI does not determine who is "internal" — the platform does.
21
+ * Always returns false; the platform resolves entitlement on auth.
24
22
  */
25
- function loadAllowlist() {
26
- const emails = new Set();
27
- const domains = new Set();
28
- // Source 1: File
29
- try {
30
- const raw = fs.readFileSync(ALLOWLIST_PATH, 'utf-8');
31
- const config = JSON.parse(raw);
32
- if (Array.isArray(config.emails)) {
33
- for (const e of config.emails)
34
- emails.add(e.toLowerCase().trim());
35
- }
36
- if (Array.isArray(config.domains)) {
37
- for (const d of config.domains)
38
- domains.add(d.toLowerCase().trim());
39
- }
40
- }
41
- catch {
42
- // File doesn't exist or is invalid — that's fine
43
- }
44
- // Source 2: AGENTICS_INTERNAL_EMAILS env var
45
- const envEmails = process.env['AGENTICS_INTERNAL_EMAILS'];
46
- if (envEmails) {
47
- for (const e of envEmails.split(',')) {
48
- const trimmed = e.toLowerCase().trim();
49
- if (trimmed)
50
- emails.add(trimmed);
51
- }
52
- }
53
- // Source 3: AGENTICS_INTERNAL_DOMAINS env var
54
- const envDomains = process.env['AGENTICS_INTERNAL_DOMAINS'];
55
- if (envDomains) {
56
- for (const d of envDomains.split(',')) {
57
- const trimmed = d.toLowerCase().trim();
58
- if (trimmed)
59
- domains.add(trimmed);
60
- }
61
- }
62
- return {
63
- emails: [...emails],
64
- domains: [...domains],
65
- };
66
- }
67
- /**
68
- * Check if an email is on the internal allowlist.
69
- */
70
- export function isInternalEmail(email) {
71
- if (!email)
72
- return false;
73
- const normalized = email.toLowerCase().trim();
74
- const allowlist = loadAllowlist();
75
- // Exact email match
76
- if (allowlist.emails?.includes(normalized)) {
77
- return true;
78
- }
79
- // Domain match
80
- const domain = normalized.split('@')[1];
81
- if (domain && allowlist.domains?.includes(domain)) {
82
- return true;
83
- }
23
+ export function isInternalEmail(_email) {
84
24
  return false;
85
25
  }
86
26
  /**
87
- * Initialize the allowlist file with the given emails/domains.
88
- * Creates ~/.agentics/ if needed.
27
+ * @deprecated Allowlist management is now platform-side.
28
+ * Returns empty string — no local file is written.
89
29
  */
90
- export function initAllowlist(emails, domains) {
91
- const dir = path.dirname(ALLOWLIST_PATH);
92
- fs.mkdirSync(dir, { recursive: true, mode: 0o700 });
93
- const config = {
94
- emails: emails.map(e => e.toLowerCase().trim()),
95
- domains: domains.map(d => d.toLowerCase().trim()),
96
- };
97
- fs.writeFileSync(ALLOWLIST_PATH, JSON.stringify(config, null, 2), {
98
- encoding: 'utf-8',
99
- mode: 0o600,
100
- });
101
- return ALLOWLIST_PATH;
30
+ export function initAllowlist(_emails, _domains) {
31
+ return '';
102
32
  }
103
33
  //# sourceMappingURL=internal-allowlist.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"internal-allowlist.js","sourceRoot":"","sources":["../../src/auth/internal-allowlist.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAEH,OAAO,KAAK,EAAE,MAAM,SAAS,CAAC;AAC9B,OAAO,KAAK,IAAI,MAAM,WAAW,CAAC;AAClC,OAAO,KAAK,EAAE,MAAM,SAAS,CAAC;AAO9B,MAAM,cAAc,GAAG,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,OAAO,EAAE,EAAE,WAAW,EAAE,yBAAyB,CAAC,CAAC;AAEvF;;GAEG;AACH,SAAS,aAAa;IACpB,MAAM,MAAM,GAAG,IAAI,GAAG,EAAU,CAAC;IACjC,MAAM,OAAO,GAAG,IAAI,GAAG,EAAU,CAAC;IAElC,iBAAiB;IACjB,IAAI,CAAC;QACH,MAAM,GAAG,GAAG,EAAE,CAAC,YAAY,CAAC,cAAc,EAAE,OAAO,CAAC,CAAC;QACrD,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAoB,CAAC;QAClD,IAAI,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC;YACjC,KAAK,MAAM,CAAC,IAAI,MAAM,CAAC,MAAM;gBAAE,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,CAAC,CAAC;QACpE,CAAC;QACD,IAAI,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,EAAE,CAAC;YAClC,KAAK,MAAM,CAAC,IAAI,MAAM,CAAC,OAAO;gBAAE,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,CAAC,CAAC;QACtE,CAAC;IACH,CAAC;IAAC,MAAM,CAAC;QACP,iDAAiD;IACnD,CAAC;IAED,6CAA6C;IAC7C,MAAM,SAAS,GAAG,OAAO,CAAC,GAAG,CAAC,0BAA0B,CAAC,CAAC;IAC1D,IAAI,SAAS,EAAE,CAAC;QACd,KAAK,MAAM,CAAC,IAAI,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE,CAAC;YACrC,MAAM,OAAO,GAAG,CAAC,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,CAAC;YACvC,IAAI,OAAO;gBAAE,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;QACnC,CAAC;IACH,CAAC;IAED,8CAA8C;IAC9C,MAAM,UAAU,GAAG,OAAO,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;IAC5D,IAAI,UAAU,EAAE,CAAC;QACf,KAAK,MAAM,CAAC,IAAI,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE,CAAC;YACtC,MAAM,OAAO,GAAG,CAAC,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,CAAC;YACvC,IAAI,OAAO;gBAAE,OAAO,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;QACpC,CAAC;IACH,CAAC;IAED,OAAO;QACL,MAAM,EAAE,CAAC,GAAG,MAAM,CAAC;QACnB,OAAO,EAAE,CAAC,GAAG,OAAO,CAAC;KACtB,CAAC;AACJ,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,eAAe,CAAC,KAAa;IAC3C,IAAI,CAAC,KAAK;QAAE,OAAO,KAAK,CAAC;IAEzB,MAAM,UAAU,GAAG,KAAK,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,CAAC;IAC9C,MAAM,SAAS,GAAG,aAAa,EAAE,CAAC;IAElC,oBAAoB;IACpB,IAAI,SAAS,CAAC,MAAM,EAAE,QAAQ,CAAC,UAAU,CAAC,EAAE,CAAC;QAC3C,OAAO,IAAI,CAAC;IACd,CAAC;IAED,eAAe;IACf,MAAM,MAAM,GAAG,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;IACxC,IAAI,MAAM,IAAI,SAAS,CAAC,OAAO,EAAE,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;QAClD,OAAO,IAAI,CAAC;IACd,CAAC;IAED,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,aAAa,CAAC,MAAgB,EAAE,OAAiB;IAC/D,MAAM,GAAG,GAAG,IAAI,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;IACzC,EAAE,CAAC,SAAS,CAAC,GAAG,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,IAAI,EAAE,KAAK,EAAE,CAAC,CAAC;IAEpD,MAAM,MAAM,GAAoB;QAC9B,MAAM,EAAE,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,CAAC;QAC/C,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,CAAC;KAClD,CAAC;IAEF,EAAE,CAAC,aAAa,CAAC,cAAc,EAAE,IAAI,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC,EAAE;QAChE,QAAQ,EAAE,OAAO;QACjB,IAAI,EAAE,KAAK;KACZ,CAAC,CAAC;IAEH,OAAO,cAAc,CAAC;AACxB,CAAC"}
1
+ {"version":3,"file":"internal-allowlist.js","sourceRoot":"","sources":["../../src/auth/internal-allowlist.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAEH;;;;GAIG;AACH,MAAM,UAAU,eAAe,CAAC,MAAc;IAC5C,OAAO,KAAK,CAAC;AACf,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,aAAa,CAAC,OAAiB,EAAE,QAAkB;IACjE,OAAO,EAAE,CAAC;AACZ,CAAC"}
@@ -1,12 +1,29 @@
1
1
  /**
2
- * Role Permissions
2
+ * Role Permissions — Deprecated (Platform-Side)
3
3
  *
4
- * Lookup table for role-based access control.
5
- * Three roles: owner, admin, member.
6
- * Permissions enforced server-side.
4
+ * ARCHITECTURE:
5
+ * Role-based access control is a platform-side concern.
6
+ * The CLI does NOT enforce permissions — it sends the request
7
+ * with credentials, and the platform returns 403 if unauthorized.
8
+ *
9
+ * REMOVED (moved to platform):
10
+ * - ROLE_PERMISSIONS matrix (owner/admin/member mappings)
11
+ * - hasPermission() local enforcement
12
+ *
13
+ * WHAT REMAINS:
14
+ * - Type definitions (for contract compatibility)
15
+ * - Deprecated stubs
7
16
  */
8
17
  import type { OrgRole } from '../types/index.js';
9
18
  export type Permission = 'plan:read' | 'plan:create' | 'plan:delete' | 'plan:approve' | 'simulate:read' | 'simulate:create' | 'simulate:run' | 'simulate:delete' | 'deploy:read' | 'deploy:create' | 'deploy:run' | 'deploy:rollback' | 'export:read' | 'export:create' | 'policy:read' | 'policy:create' | 'policy:edit' | 'policy:delete' | 'org:read' | 'org:manage' | 'usage:read' | 'usage:reset';
10
- export declare function hasPermission(role: OrgRole, permission: Permission): boolean;
11
- export declare function getPermissions(role: OrgRole): ReadonlySet<Permission>;
19
+ /**
20
+ * @deprecated Permission checks are now platform-side.
21
+ * The CLI does not enforce RBAC — the platform does.
22
+ * Always returns true; the platform will reject unauthorized requests.
23
+ */
24
+ export declare function hasPermission(_role: OrgRole, _permission: Permission): boolean;
25
+ /**
26
+ * @deprecated Permission lookups are now platform-side.
27
+ */
28
+ export declare function getPermissions(_role: OrgRole): ReadonlySet<Permission>;
12
29
  //# sourceMappingURL=role-permissions.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"role-permissions.d.ts","sourceRoot":"","sources":["../../src/auth/role-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AAEjD,MAAM,MAAM,UAAU,GAClB,WAAW,GAAG,aAAa,GAAG,aAAa,GAAG,cAAc,GAC5D,eAAe,GAAG,iBAAiB,GAAG,cAAc,GAAG,iBAAiB,GACxE,aAAa,GAAG,eAAe,GAAG,YAAY,GAAG,iBAAiB,GAClE,aAAa,GAAG,eAAe,GAC/B,aAAa,GAAG,eAAe,GAAG,aAAa,GAAG,eAAe,GACjE,UAAU,GAAG,YAAY,GACzB,YAAY,GAAG,aAAa,CAAC;AAgCjC,wBAAgB,aAAa,CAAC,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,UAAU,GAAG,OAAO,CAE5E;AAED,wBAAgB,cAAc,CAAC,IAAI,EAAE,OAAO,GAAG,WAAW,CAAC,UAAU,CAAC,CAErE"}
1
+ {"version":3,"file":"role-permissions.d.ts","sourceRoot":"","sources":["../../src/auth/role-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;GAeG;AAEH,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AAEjD,MAAM,MAAM,UAAU,GAClB,WAAW,GAAG,aAAa,GAAG,aAAa,GAAG,cAAc,GAC5D,eAAe,GAAG,iBAAiB,GAAG,cAAc,GAAG,iBAAiB,GACxE,aAAa,GAAG,eAAe,GAAG,YAAY,GAAG,iBAAiB,GAClE,aAAa,GAAG,eAAe,GAC/B,aAAa,GAAG,eAAe,GAAG,aAAa,GAAG,eAAe,GACjE,UAAU,GAAG,YAAY,GACzB,YAAY,GAAG,aAAa,CAAC;AAEjC;;;;GAIG;AACH,wBAAgB,aAAa,CAAC,KAAK,EAAE,OAAO,EAAE,WAAW,EAAE,UAAU,GAAG,OAAO,CAE9E;AAED;;GAEG;AACH,wBAAgB,cAAc,CAAC,KAAK,EAAE,OAAO,GAAG,WAAW,CAAC,UAAU,CAAC,CAEtE"}
@@ -1,43 +1,31 @@
1
1
  /**
2
- * Role Permissions
2
+ * Role Permissions — Deprecated (Platform-Side)
3
3
  *
4
- * Lookup table for role-based access control.
5
- * Three roles: owner, admin, member.
6
- * Permissions enforced server-side.
4
+ * ARCHITECTURE:
5
+ * Role-based access control is a platform-side concern.
6
+ * The CLI does NOT enforce permissions — it sends the request
7
+ * with credentials, and the platform returns 403 if unauthorized.
8
+ *
9
+ * REMOVED (moved to platform):
10
+ * - ROLE_PERMISSIONS matrix (owner/admin/member mappings)
11
+ * - hasPermission() local enforcement
12
+ *
13
+ * WHAT REMAINS:
14
+ * - Type definitions (for contract compatibility)
15
+ * - Deprecated stubs
16
+ */
17
+ /**
18
+ * @deprecated Permission checks are now platform-side.
19
+ * The CLI does not enforce RBAC — the platform does.
20
+ * Always returns true; the platform will reject unauthorized requests.
7
21
  */
8
- const ROLE_PERMISSIONS = {
9
- owner: new Set([
10
- 'plan:read', 'plan:create', 'plan:delete', 'plan:approve',
11
- 'simulate:read', 'simulate:create', 'simulate:run', 'simulate:delete',
12
- 'deploy:read', 'deploy:create', 'deploy:run', 'deploy:rollback',
13
- 'export:read', 'export:create',
14
- 'policy:read', 'policy:create', 'policy:edit', 'policy:delete',
15
- 'org:read', 'org:manage',
16
- 'usage:read', 'usage:reset',
17
- ]),
18
- admin: new Set([
19
- 'plan:read', 'plan:create', 'plan:delete', 'plan:approve',
20
- 'simulate:read', 'simulate:create', 'simulate:run', 'simulate:delete',
21
- 'deploy:read', 'deploy:create', 'deploy:run', 'deploy:rollback',
22
- 'export:read', 'export:create',
23
- 'policy:read', 'policy:create', 'policy:edit', 'policy:delete',
24
- 'org:read',
25
- 'usage:read',
26
- ]),
27
- member: new Set([
28
- 'plan:read', 'plan:create',
29
- 'simulate:read', 'simulate:create', 'simulate:run',
30
- 'deploy:read',
31
- 'export:read', 'export:create',
32
- 'policy:read',
33
- 'org:read',
34
- 'usage:read',
35
- ]),
36
- };
37
- export function hasPermission(role, permission) {
38
- return ROLE_PERMISSIONS[role]?.has(permission) ?? false;
22
+ export function hasPermission(_role, _permission) {
23
+ return true;
39
24
  }
40
- export function getPermissions(role) {
41
- return ROLE_PERMISSIONS[role] ?? new Set();
25
+ /**
26
+ * @deprecated Permission lookups are now platform-side.
27
+ */
28
+ export function getPermissions(_role) {
29
+ return new Set();
42
30
  }
43
31
  //# sourceMappingURL=role-permissions.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"role-permissions.js","sourceRoot":"","sources":["../../src/auth/role-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAaH,MAAM,gBAAgB,GAA6C;IACjE,KAAK,EAAE,IAAI,GAAG,CAAa;QACzB,WAAW,EAAE,aAAa,EAAE,aAAa,EAAE,cAAc;QACzD,eAAe,EAAE,iBAAiB,EAAE,cAAc,EAAE,iBAAiB;QACrE,aAAa,EAAE,eAAe,EAAE,YAAY,EAAE,iBAAiB;QAC/D,aAAa,EAAE,eAAe;QAC9B,aAAa,EAAE,eAAe,EAAE,aAAa,EAAE,eAAe;QAC9D,UAAU,EAAE,YAAY;QACxB,YAAY,EAAE,aAAa;KAC5B,CAAC;IACF,KAAK,EAAE,IAAI,GAAG,CAAa;QACzB,WAAW,EAAE,aAAa,EAAE,aAAa,EAAE,cAAc;QACzD,eAAe,EAAE,iBAAiB,EAAE,cAAc,EAAE,iBAAiB;QACrE,aAAa,EAAE,eAAe,EAAE,YAAY,EAAE,iBAAiB;QAC/D,aAAa,EAAE,eAAe;QAC9B,aAAa,EAAE,eAAe,EAAE,aAAa,EAAE,eAAe;QAC9D,UAAU;QACV,YAAY;KACb,CAAC;IACF,MAAM,EAAE,IAAI,GAAG,CAAa;QAC1B,WAAW,EAAE,aAAa;QAC1B,eAAe,EAAE,iBAAiB,EAAE,cAAc;QAClD,aAAa;QACb,aAAa,EAAE,eAAe;QAC9B,aAAa;QACb,UAAU;QACV,YAAY;KACb,CAAC;CACH,CAAC;AAEF,MAAM,UAAU,aAAa,CAAC,IAAa,EAAE,UAAsB;IACjE,OAAO,gBAAgB,CAAC,IAAI,CAAC,EAAE,GAAG,CAAC,UAAU,CAAC,IAAI,KAAK,CAAC;AAC1D,CAAC;AAED,MAAM,UAAU,cAAc,CAAC,IAAa;IAC1C,OAAO,gBAAgB,CAAC,IAAI,CAAC,IAAI,IAAI,GAAG,EAAE,CAAC;AAC7C,CAAC"}
1
+ {"version":3,"file":"role-permissions.js","sourceRoot":"","sources":["../../src/auth/role-permissions.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;GAeG;AAaH;;;;GAIG;AACH,MAAM,UAAU,aAAa,CAAC,KAAc,EAAE,WAAuB;IACnE,OAAO,IAAI,CAAC;AACd,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,cAAc,CAAC,KAAc;IAC3C,OAAO,IAAI,GAAG,EAAE,CAAC;AACnB,CAAC"}