@lssm/lib.identity-rbac 0.0.0-canary-20251217063201 → 0.0.0-canary-20251217073102

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (143) hide show
  1. package/dist/contracts/dist/capabilities/openbanking.js +88 -1
  2. package/dist/contracts/dist/client/index.js +5 -1
  3. package/dist/contracts/dist/client/react/feature-render.js +2 -1
  4. package/dist/contracts/dist/client/react/form-render.js +4 -1
  5. package/dist/contracts/dist/client/react/index.js +4 -1
  6. package/dist/contracts/dist/contract-registry/index.js +1 -1
  7. package/dist/contracts/dist/contract-registry/schemas.js +60 -1
  8. package/dist/contracts/dist/docs/PUBLISHING.docblock.js +16 -76
  9. package/dist/contracts/dist/docs/accessibility_wcag_compliance_specs.docblock.js +16 -350
  10. package/dist/contracts/dist/docs/index.js +29 -1
  11. package/dist/contracts/dist/docs/presentations.js +71 -1
  12. package/dist/contracts/dist/docs/registry.js +44 -1
  13. package/dist/contracts/dist/docs/tech/PHASE_1_QUICKSTART.docblock.js +16 -383
  14. package/dist/contracts/dist/docs/tech/PHASE_2_AI_NATIVE_OPERATIONS.docblock.js +16 -68
  15. package/dist/contracts/dist/docs/tech/PHASE_3_AUTO_EVOLUTION.docblock.js +16 -140
  16. package/dist/contracts/dist/docs/tech/PHASE_4_PERSONALIZATION_ENGINE.docblock.js +16 -86
  17. package/dist/contracts/dist/docs/tech/PHASE_5_ZERO_TOUCH_OPERATIONS.docblock.js +16 -1
  18. package/dist/contracts/dist/docs/tech/auth/better-auth-nextjs.docblock.js +24 -2
  19. package/dist/contracts/dist/docs/tech/contracts/openapi-export.docblock.js +21 -2
  20. package/dist/contracts/dist/docs/tech/lifecycle-stage-system.docblock.js +16 -213
  21. package/dist/contracts/dist/docs/tech/llm/llm-integration.docblock.js +73 -5
  22. package/dist/contracts/dist/docs/tech/mcp-endpoints.docblock.js +37 -1
  23. package/dist/contracts/dist/docs/tech/presentation-runtime.docblock.js +16 -1
  24. package/dist/contracts/dist/docs/tech/schema/README.docblock.js +20 -262
  25. package/dist/contracts/dist/docs/tech/studio/learning-events.docblock.js +48 -1
  26. package/dist/contracts/dist/docs/tech/studio/learning-journeys.docblock.js +24 -2
  27. package/dist/contracts/dist/docs/tech/studio/platform-admin-panel.docblock.js +23 -2
  28. package/dist/contracts/dist/docs/tech/studio/project-access-teams.docblock.js +25 -16
  29. package/dist/contracts/dist/docs/tech/studio/project-routing.docblock.js +67 -1
  30. package/dist/contracts/dist/docs/tech/studio/sandbox-unlogged.docblock.js +22 -2
  31. package/dist/contracts/dist/docs/tech/studio/team-invitations.docblock.js +40 -36
  32. package/dist/contracts/dist/docs/tech/studio/workspace-ops.docblock.js +47 -1
  33. package/dist/contracts/dist/docs/tech/studio/workspaces.docblock.js +23 -2
  34. package/dist/contracts/dist/docs/tech/telemetry-ingest.docblock.js +36 -3
  35. package/dist/contracts/dist/docs/tech/templates/runtime.docblock.js +20 -1
  36. package/dist/contracts/dist/docs/tech/vscode-extension.docblock.js +36 -3
  37. package/dist/contracts/dist/docs/tech/workflows/overview.docblock.js +20 -1
  38. package/dist/contracts/dist/events.js +10 -1
  39. package/dist/contracts/dist/experiments/evaluator.js +1 -1
  40. package/dist/contracts/dist/index.js +71 -1
  41. package/dist/contracts/dist/install.js +2 -1
  42. package/dist/contracts/dist/integrations/contracts.js +377 -1
  43. package/dist/contracts/dist/integrations/index.js +18 -1
  44. package/dist/contracts/dist/integrations/openbanking/contracts/accounts.js +228 -1
  45. package/dist/contracts/dist/integrations/openbanking/contracts/balances.js +159 -1
  46. package/dist/contracts/dist/integrations/openbanking/contracts/index.js +3 -1
  47. package/dist/contracts/dist/integrations/openbanking/contracts/transactions.js +210 -1
  48. package/dist/contracts/dist/integrations/openbanking/models.js +242 -1
  49. package/dist/contracts/dist/integrations/openbanking/telemetry.js +13 -1
  50. package/dist/contracts/dist/integrations/providers/elevenlabs.js +52 -1
  51. package/dist/contracts/dist/integrations/providers/gcs-storage.js +75 -1
  52. package/dist/contracts/dist/integrations/providers/gmail.js +87 -1
  53. package/dist/contracts/dist/integrations/providers/google-calendar.js +66 -1
  54. package/dist/contracts/dist/integrations/providers/index.js +11 -1
  55. package/dist/contracts/dist/integrations/providers/mistral.js +68 -1
  56. package/dist/contracts/dist/integrations/providers/postmark.js +68 -1
  57. package/dist/contracts/dist/integrations/providers/powens.js +116 -1
  58. package/dist/contracts/dist/integrations/providers/qdrant.js +73 -1
  59. package/dist/contracts/dist/integrations/providers/registry.js +10 -1
  60. package/dist/contracts/dist/integrations/providers/stripe.js +83 -1
  61. package/dist/contracts/dist/integrations/providers/twilio-sms.js +61 -1
  62. package/dist/contracts/dist/jsonschema.js +1 -1
  63. package/dist/contracts/dist/knowledge/contracts.js +306 -1
  64. package/dist/contracts/dist/knowledge/index.js +7 -1
  65. package/dist/contracts/dist/knowledge/spaces/email-threads.js +34 -1
  66. package/dist/contracts/dist/knowledge/spaces/financial-docs.js +34 -1
  67. package/dist/contracts/dist/knowledge/spaces/financial-overview.js +38 -1
  68. package/dist/contracts/dist/knowledge/spaces/index.js +6 -1
  69. package/dist/contracts/dist/knowledge/spaces/product-canon.js +34 -1
  70. package/dist/contracts/dist/knowledge/spaces/support-faq.js +37 -1
  71. package/dist/contracts/dist/knowledge/spaces/uploaded-docs.js +34 -1
  72. package/dist/contracts/dist/llm/exporters.js +19 -1
  73. package/dist/contracts/dist/llm/index.js +2 -1
  74. package/dist/contracts/dist/llm/prompts.js +1 -1
  75. package/dist/contracts/dist/onboarding-base.js +196 -1
  76. package/dist/contracts/dist/openapi.js +1 -1
  77. package/dist/contracts/dist/ownership.js +21 -1
  78. package/dist/contracts/dist/presentations.js +1 -1
  79. package/dist/contracts/dist/presentations.v2.js +11 -1
  80. package/dist/contracts/dist/prompt.js +1 -1
  81. package/dist/contracts/dist/promptRegistry.js +1 -1
  82. package/dist/contracts/dist/regenerator/index.js +1 -1
  83. package/dist/contracts/dist/regenerator/service.js +6 -1
  84. package/dist/contracts/dist/registry.js +2 -1
  85. package/dist/contracts/dist/resources.js +1 -1
  86. package/dist/contracts/dist/schema/dist/EnumType.js +2 -1
  87. package/dist/contracts/dist/schema/dist/FieldType.js +49 -1
  88. package/dist/contracts/dist/schema/dist/ScalarTypeEnum.js +236 -1
  89. package/dist/contracts/dist/schema/dist/SchemaModel.js +34 -1
  90. package/dist/contracts/dist/schema/dist/entity/defineEntity.js +1 -1
  91. package/dist/contracts/dist/schema/dist/entity/index.js +2 -1
  92. package/dist/contracts/dist/schema/dist/entity/types.js +1 -1
  93. package/dist/contracts/dist/schema/dist/index.js +6 -1
  94. package/dist/contracts/dist/server/graphql-pothos.js +6 -1
  95. package/dist/contracts/dist/server/index.js +8 -1
  96. package/dist/contracts/dist/server/mcp/createMcpServer.js +4 -1
  97. package/dist/contracts/dist/server/mcp/registerPresentations.js +2 -1
  98. package/dist/contracts/dist/server/mcp/registerPrompts.js +1 -1
  99. package/dist/contracts/dist/server/mcp/registerResources.js +2 -1
  100. package/dist/contracts/dist/server/mcp/registerTools.js +1 -1
  101. package/dist/contracts/dist/server/provider-mcp.js +1 -1
  102. package/dist/contracts/dist/server/rest-elysia.js +1 -1
  103. package/dist/contracts/dist/server/rest-express.js +1 -1
  104. package/dist/contracts/dist/server/rest-generic.js +1 -1
  105. package/dist/contracts/dist/server/rest-next-app.js +1 -1
  106. package/dist/contracts/dist/server/rest-next-pages.js +1 -1
  107. package/dist/contracts/dist/spec.js +34 -1
  108. package/dist/contracts/dist/telemetry/index.js +1 -1
  109. package/dist/contracts/dist/telemetry/tracker.js +1 -1
  110. package/dist/contracts/dist/tests/index.js +1 -1
  111. package/dist/contracts/dist/tests/runner.js +2 -1
  112. package/dist/contracts/dist/workflow/index.js +1 -1
  113. package/dist/contracts/dist/workflow/runner.js +1 -1
  114. package/dist/contracts/index.js +5 -1
  115. package/dist/contracts/organization.d.ts +193 -193
  116. package/dist/contracts/organization.js +607 -1
  117. package/dist/contracts/rbac.d.ts +126 -126
  118. package/dist/contracts/rbac.js +487 -1
  119. package/dist/contracts/user.d.ts +139 -139
  120. package/dist/contracts/user.js +335 -1
  121. package/dist/entities/index.d.ts +160 -160
  122. package/dist/entities/index.js +35 -1
  123. package/dist/entities/organization.d.ts +59 -59
  124. package/dist/entities/organization.js +151 -1
  125. package/dist/entities/rbac.d.ts +63 -63
  126. package/dist/entities/rbac.js +138 -1
  127. package/dist/entities/user.d.ts +67 -67
  128. package/dist/entities/user.js +194 -1
  129. package/dist/events.d.ts +174 -174
  130. package/dist/events.js +543 -1
  131. package/dist/identity-rbac.feature.js +186 -1
  132. package/dist/index.js +14 -1
  133. package/dist/policies/engine.js +167 -1
  134. package/dist/policies/index.js +3 -1
  135. package/dist/schema/dist/EnumType.js +2 -1
  136. package/dist/schema/dist/FieldType.js +49 -1
  137. package/dist/schema/dist/ScalarTypeEnum.js +236 -1
  138. package/dist/schema/dist/SchemaModel.js +34 -1
  139. package/dist/schema/dist/entity/defineEntity.js +236 -1
  140. package/dist/schema/dist/entity/index.js +2 -1
  141. package/dist/schema/dist/entity/types.js +1 -1
  142. package/dist/schema/dist/index.js +6 -1
  143. package/package.json +5 -5
@@ -1 +1,186 @@
1
- const e={meta:{key:`identity-rbac`,title:`Identity & RBAC`,description:`User identity, organization management, and role-based access control`,domain:`platform`,owners:[`@platform.identity-rbac`],tags:[`identity`,`rbac`,`users`,`organizations`,`permissions`],stability:`stable`},operations:[{name:`identity.user.create`,version:1},{name:`identity.user.update`,version:1},{name:`identity.user.delete`,version:1},{name:`identity.user.me`,version:1},{name:`identity.user.list`,version:1},{name:`identity.org.create`,version:1},{name:`identity.org.update`,version:1},{name:`identity.org.get`,version:1},{name:`identity.org.list`,version:1},{name:`identity.org.invite`,version:1},{name:`identity.org.invite.accept`,version:1},{name:`identity.org.member.remove`,version:1},{name:`identity.org.members.list`,version:1},{name:`identity.rbac.role.create`,version:1},{name:`identity.rbac.role.update`,version:1},{name:`identity.rbac.role.delete`,version:1},{name:`identity.rbac.role.list`,version:1},{name:`identity.rbac.assign`,version:1},{name:`identity.rbac.revoke`,version:1},{name:`identity.rbac.check`,version:1},{name:`identity.rbac.permissions`,version:1}],events:[{name:`user.created`,version:1},{name:`user.updated`,version:1},{name:`user.deleted`,version:1},{name:`user.email_verified`,version:1},{name:`org.created`,version:1},{name:`org.updated`,version:1},{name:`org.deleted`,version:1},{name:`org.member.added`,version:1},{name:`org.member.removed`,version:1},{name:`org.member.role_changed`,version:1},{name:`org.invite.sent`,version:1},{name:`org.invite.accepted`,version:1},{name:`org.invite.declined`,version:1},{name:`role.assigned`,version:1},{name:`role.revoked`,version:1}],presentations:[],opToPresentation:[],presentationsTargets:[],capabilities:{provides:[{key:`identity`,version:1},{key:`rbac`,version:1}],requires:[]}};export{e as IdentityRbacFeature};
1
+ //#region src/identity-rbac.feature.ts
2
+ /**
3
+ * Identity RBAC feature module that bundles user, organization,
4
+ * and role-based access control capabilities.
5
+ */
6
+ const IdentityRbacFeature = {
7
+ meta: {
8
+ key: "identity-rbac",
9
+ title: "Identity & RBAC",
10
+ description: "User identity, organization management, and role-based access control",
11
+ domain: "platform",
12
+ owners: ["@platform.identity-rbac"],
13
+ tags: [
14
+ "identity",
15
+ "rbac",
16
+ "users",
17
+ "organizations",
18
+ "permissions"
19
+ ],
20
+ stability: "stable"
21
+ },
22
+ operations: [
23
+ {
24
+ name: "identity.user.create",
25
+ version: 1
26
+ },
27
+ {
28
+ name: "identity.user.update",
29
+ version: 1
30
+ },
31
+ {
32
+ name: "identity.user.delete",
33
+ version: 1
34
+ },
35
+ {
36
+ name: "identity.user.me",
37
+ version: 1
38
+ },
39
+ {
40
+ name: "identity.user.list",
41
+ version: 1
42
+ },
43
+ {
44
+ name: "identity.org.create",
45
+ version: 1
46
+ },
47
+ {
48
+ name: "identity.org.update",
49
+ version: 1
50
+ },
51
+ {
52
+ name: "identity.org.get",
53
+ version: 1
54
+ },
55
+ {
56
+ name: "identity.org.list",
57
+ version: 1
58
+ },
59
+ {
60
+ name: "identity.org.invite",
61
+ version: 1
62
+ },
63
+ {
64
+ name: "identity.org.invite.accept",
65
+ version: 1
66
+ },
67
+ {
68
+ name: "identity.org.member.remove",
69
+ version: 1
70
+ },
71
+ {
72
+ name: "identity.org.members.list",
73
+ version: 1
74
+ },
75
+ {
76
+ name: "identity.rbac.role.create",
77
+ version: 1
78
+ },
79
+ {
80
+ name: "identity.rbac.role.update",
81
+ version: 1
82
+ },
83
+ {
84
+ name: "identity.rbac.role.delete",
85
+ version: 1
86
+ },
87
+ {
88
+ name: "identity.rbac.role.list",
89
+ version: 1
90
+ },
91
+ {
92
+ name: "identity.rbac.assign",
93
+ version: 1
94
+ },
95
+ {
96
+ name: "identity.rbac.revoke",
97
+ version: 1
98
+ },
99
+ {
100
+ name: "identity.rbac.check",
101
+ version: 1
102
+ },
103
+ {
104
+ name: "identity.rbac.permissions",
105
+ version: 1
106
+ }
107
+ ],
108
+ events: [
109
+ {
110
+ name: "user.created",
111
+ version: 1
112
+ },
113
+ {
114
+ name: "user.updated",
115
+ version: 1
116
+ },
117
+ {
118
+ name: "user.deleted",
119
+ version: 1
120
+ },
121
+ {
122
+ name: "user.email_verified",
123
+ version: 1
124
+ },
125
+ {
126
+ name: "org.created",
127
+ version: 1
128
+ },
129
+ {
130
+ name: "org.updated",
131
+ version: 1
132
+ },
133
+ {
134
+ name: "org.deleted",
135
+ version: 1
136
+ },
137
+ {
138
+ name: "org.member.added",
139
+ version: 1
140
+ },
141
+ {
142
+ name: "org.member.removed",
143
+ version: 1
144
+ },
145
+ {
146
+ name: "org.member.role_changed",
147
+ version: 1
148
+ },
149
+ {
150
+ name: "org.invite.sent",
151
+ version: 1
152
+ },
153
+ {
154
+ name: "org.invite.accepted",
155
+ version: 1
156
+ },
157
+ {
158
+ name: "org.invite.declined",
159
+ version: 1
160
+ },
161
+ {
162
+ name: "role.assigned",
163
+ version: 1
164
+ },
165
+ {
166
+ name: "role.revoked",
167
+ version: 1
168
+ }
169
+ ],
170
+ presentations: [],
171
+ opToPresentation: [],
172
+ presentationsTargets: [],
173
+ capabilities: {
174
+ provides: [{
175
+ key: "identity",
176
+ version: 1
177
+ }, {
178
+ key: "rbac",
179
+ version: 1
180
+ }],
181
+ requires: []
182
+ }
183
+ };
184
+
185
+ //#endregion
186
+ export { IdentityRbacFeature };
package/dist/index.js CHANGED
@@ -1 +1,14 @@
1
- import{IdentityRbacEvents as e,OrgCreatedEvent as t,OrgDeletedEvent as n,OrgInviteAcceptedEvent as r,OrgInviteDeclinedEvent as i,OrgInviteSentEvent as a,OrgMemberAddedEvent as o,OrgMemberRemovedEvent as s,OrgMemberRoleChangedEvent as c,OrgUpdatedEvent as l,RoleAssignedEvent as u,RoleRevokedEvent as d,UserCreatedEvent as f,UserDeletedEvent as p,UserEmailVerifiedEvent as m,UserUpdatedEvent as h}from"./events.js";import{IdentityRbacFeature as g}from"./identity-rbac.feature.js";import{AccountEntity as _,SessionEntity as v,UserEntity as y,VerificationEntity as b}from"./entities/user.js";import{InvitationEntity as x,MemberEntity as S,OrganizationEntity as C,OrganizationTypeEnum as w,TeamEntity as T,TeamMemberEntity as E}from"./entities/organization.js";import{ApiKeyEntity as D,PasskeyEntity as O,PermissionEntity as k,PolicyBindingEntity as A,RoleEntity as j}from"./entities/rbac.js";import{identityRbacEntities as M,identityRbacSchemaContribution as N}from"./entities/index.js";import{CreateUserContract as P,CreateUserInputModel as F,DeleteUserContract as I,DeleteUserInputModel as L,GetCurrentUserContract as R,ListUsersContract as z,ListUsersInputModel as B,ListUsersOutputModel as V,SuccessResultModel as H,UpdateUserContract as U,UpdateUserInputModel as W,UserDeletedPayloadModel as G,UserProfileModel as K}from"./contracts/user.js";import{AcceptInviteContract as q,AcceptInviteInputModel as J,CreateOrgContract as Y,CreateOrgInputModel as X,GetOrgContract as Z,GetOrgInputModel as Q,InvitationModel as $,InviteMemberContract as ee,InviteMemberInputModel as te,ListMembersContract as ne,ListMembersInputModel as re,ListMembersOutputModel as ie,ListUserOrgsContract as ae,ListUserOrgsOutputModel as oe,MemberModel as se,MemberRemovedPayloadModel as ce,MemberUserModel as le,OrganizationModel as ue,OrganizationWithRoleModel as de,RemoveMemberContract as fe,RemoveMemberInputModel as pe,UpdateOrgContract as me,UpdateOrgInputModel as he}from"./contracts/organization.js";import{AssignRoleContract as ge,AssignRoleInputModel as _e,BindingIdPayloadModel as ve,CheckPermissionContract as ye,CheckPermissionInputModel as be,CreateRoleContract as xe,CreateRoleInputModel as Se,DeleteRoleContract as Ce,DeleteRoleInputModel as we,ListRolesContract as Te,ListRolesOutputModel as Ee,ListUserPermissionsContract as De,ListUserPermissionsInputModel as Oe,ListUserPermissionsOutputModel as ke,PermissionCheckResultModel as Ae,PolicyBindingModel as je,RevokeRoleContract as Me,RevokeRoleInputModel as Ne,RoleModel as Pe,UpdateRoleContract as Fe,UpdateRoleInputModel as Ie}from"./contracts/rbac.js";import"./contracts/index.js";import{Permission as Le,RBACPolicyEngine as Re,StandardRole as ze,createRBACEngine as Be}from"./policies/engine.js";import"./policies/index.js";export{q as AcceptInviteContract,J as AcceptInviteInputModel,_ as AccountEntity,D as ApiKeyEntity,ge as AssignRoleContract,_e as AssignRoleInputModel,ve as BindingIdPayloadModel,ye as CheckPermissionContract,be as CheckPermissionInputModel,Y as CreateOrgContract,X as CreateOrgInputModel,xe as CreateRoleContract,Se as CreateRoleInputModel,P as CreateUserContract,F as CreateUserInputModel,Ce as DeleteRoleContract,we as DeleteRoleInputModel,I as DeleteUserContract,L as DeleteUserInputModel,R as GetCurrentUserContract,Z as GetOrgContract,Q as GetOrgInputModel,e as IdentityRbacEvents,g as IdentityRbacFeature,x as InvitationEntity,$ as InvitationModel,ee as InviteMemberContract,te as InviteMemberInputModel,ne as ListMembersContract,re as ListMembersInputModel,ie as ListMembersOutputModel,Te as ListRolesContract,Ee as ListRolesOutputModel,ae as ListUserOrgsContract,oe as ListUserOrgsOutputModel,De as ListUserPermissionsContract,Oe as ListUserPermissionsInputModel,ke as ListUserPermissionsOutputModel,z as ListUsersContract,B as ListUsersInputModel,V as ListUsersOutputModel,S as MemberEntity,se as MemberModel,ce as MemberRemovedPayloadModel,le as MemberUserModel,t as OrgCreatedEvent,n as OrgDeletedEvent,r as OrgInviteAcceptedEvent,i as OrgInviteDeclinedEvent,a as OrgInviteSentEvent,o as OrgMemberAddedEvent,s as OrgMemberRemovedEvent,c as OrgMemberRoleChangedEvent,l as OrgUpdatedEvent,C as OrganizationEntity,ue as OrganizationModel,w as OrganizationTypeEnum,de as OrganizationWithRoleModel,O as PasskeyEntity,Le as Permission,Ae as PermissionCheckResultModel,k as PermissionEntity,A as PolicyBindingEntity,je as PolicyBindingModel,Re as RBACPolicyEngine,fe as RemoveMemberContract,pe as RemoveMemberInputModel,Me as RevokeRoleContract,Ne as RevokeRoleInputModel,u as RoleAssignedEvent,j as RoleEntity,Pe as RoleModel,d as RoleRevokedEvent,v as SessionEntity,ze as StandardRole,H as SuccessResultModel,T as TeamEntity,E as TeamMemberEntity,me as UpdateOrgContract,he as UpdateOrgInputModel,Fe as UpdateRoleContract,Ie as UpdateRoleInputModel,U as UpdateUserContract,W as UpdateUserInputModel,f as UserCreatedEvent,p as UserDeletedEvent,G as UserDeletedPayloadModel,m as UserEmailVerifiedEvent,y as UserEntity,K as UserProfileModel,h as UserUpdatedEvent,b as VerificationEntity,Be as createRBACEngine,M as identityRbacEntities,N as identityRbacSchemaContribution};
1
+ import { IdentityRbacEvents, OrgCreatedEvent, OrgDeletedEvent, OrgInviteAcceptedEvent, OrgInviteDeclinedEvent, OrgInviteSentEvent, OrgMemberAddedEvent, OrgMemberRemovedEvent, OrgMemberRoleChangedEvent, OrgUpdatedEvent, RoleAssignedEvent, RoleRevokedEvent, UserCreatedEvent, UserDeletedEvent, UserEmailVerifiedEvent, UserUpdatedEvent } from "./events.js";
2
+ import { IdentityRbacFeature } from "./identity-rbac.feature.js";
3
+ import { AccountEntity, SessionEntity, UserEntity, VerificationEntity } from "./entities/user.js";
4
+ import { InvitationEntity, MemberEntity, OrganizationEntity, OrganizationTypeEnum, TeamEntity, TeamMemberEntity } from "./entities/organization.js";
5
+ import { ApiKeyEntity, PasskeyEntity, PermissionEntity, PolicyBindingEntity, RoleEntity } from "./entities/rbac.js";
6
+ import { identityRbacEntities, identityRbacSchemaContribution } from "./entities/index.js";
7
+ import { CreateUserContract, CreateUserInputModel, DeleteUserContract, DeleteUserInputModel, GetCurrentUserContract, ListUsersContract, ListUsersInputModel, ListUsersOutputModel, SuccessResultModel, UpdateUserContract, UpdateUserInputModel, UserDeletedPayloadModel, UserProfileModel } from "./contracts/user.js";
8
+ import { AcceptInviteContract, AcceptInviteInputModel, CreateOrgContract, CreateOrgInputModel, GetOrgContract, GetOrgInputModel, InvitationModel, InviteMemberContract, InviteMemberInputModel, ListMembersContract, ListMembersInputModel, ListMembersOutputModel, ListUserOrgsContract, ListUserOrgsOutputModel, MemberModel, MemberRemovedPayloadModel, MemberUserModel, OrganizationModel, OrganizationWithRoleModel, RemoveMemberContract, RemoveMemberInputModel, UpdateOrgContract, UpdateOrgInputModel } from "./contracts/organization.js";
9
+ import { AssignRoleContract, AssignRoleInputModel, BindingIdPayloadModel, CheckPermissionContract, CheckPermissionInputModel, CreateRoleContract, CreateRoleInputModel, DeleteRoleContract, DeleteRoleInputModel, ListRolesContract, ListRolesOutputModel, ListUserPermissionsContract, ListUserPermissionsInputModel, ListUserPermissionsOutputModel, PermissionCheckResultModel, PolicyBindingModel, RevokeRoleContract, RevokeRoleInputModel, RoleModel, UpdateRoleContract, UpdateRoleInputModel } from "./contracts/rbac.js";
10
+ import "./contracts/index.js";
11
+ import { Permission, RBACPolicyEngine, StandardRole, createRBACEngine } from "./policies/engine.js";
12
+ import "./policies/index.js";
13
+
14
+ export { AcceptInviteContract, AcceptInviteInputModel, AccountEntity, ApiKeyEntity, AssignRoleContract, AssignRoleInputModel, BindingIdPayloadModel, CheckPermissionContract, CheckPermissionInputModel, CreateOrgContract, CreateOrgInputModel, CreateRoleContract, CreateRoleInputModel, CreateUserContract, CreateUserInputModel, DeleteRoleContract, DeleteRoleInputModel, DeleteUserContract, DeleteUserInputModel, GetCurrentUserContract, GetOrgContract, GetOrgInputModel, IdentityRbacEvents, IdentityRbacFeature, InvitationEntity, InvitationModel, InviteMemberContract, InviteMemberInputModel, ListMembersContract, ListMembersInputModel, ListMembersOutputModel, ListRolesContract, ListRolesOutputModel, ListUserOrgsContract, ListUserOrgsOutputModel, ListUserPermissionsContract, ListUserPermissionsInputModel, ListUserPermissionsOutputModel, ListUsersContract, ListUsersInputModel, ListUsersOutputModel, MemberEntity, MemberModel, MemberRemovedPayloadModel, MemberUserModel, OrgCreatedEvent, OrgDeletedEvent, OrgInviteAcceptedEvent, OrgInviteDeclinedEvent, OrgInviteSentEvent, OrgMemberAddedEvent, OrgMemberRemovedEvent, OrgMemberRoleChangedEvent, OrgUpdatedEvent, OrganizationEntity, OrganizationModel, OrganizationTypeEnum, OrganizationWithRoleModel, PasskeyEntity, Permission, PermissionCheckResultModel, PermissionEntity, PolicyBindingEntity, PolicyBindingModel, RBACPolicyEngine, RemoveMemberContract, RemoveMemberInputModel, RevokeRoleContract, RevokeRoleInputModel, RoleAssignedEvent, RoleEntity, RoleModel, RoleRevokedEvent, SessionEntity, StandardRole, SuccessResultModel, TeamEntity, TeamMemberEntity, UpdateOrgContract, UpdateOrgInputModel, UpdateRoleContract, UpdateRoleInputModel, UpdateUserContract, UpdateUserInputModel, UserCreatedEvent, UserDeletedEvent, UserDeletedPayloadModel, UserEmailVerifiedEvent, UserEntity, UserProfileModel, UserUpdatedEvent, VerificationEntity, createRBACEngine, identityRbacEntities, identityRbacSchemaContribution };
@@ -1 +1,167 @@
1
- const e={USER_CREATE:`user.create`,USER_READ:`user.read`,USER_UPDATE:`user.update`,USER_DELETE:`user.delete`,USER_LIST:`user.list`,USER_MANAGE:`user.manage`,ORG_CREATE:`org.create`,ORG_READ:`org.read`,ORG_UPDATE:`org.update`,ORG_DELETE:`org.delete`,ORG_LIST:`org.list`,MEMBER_INVITE:`member.invite`,MEMBER_REMOVE:`member.remove`,MEMBER_UPDATE_ROLE:`member.update_role`,MEMBER_LIST:`member.list`,MANAGE_MEMBERS:`org.manage_members`,TEAM_CREATE:`team.create`,TEAM_UPDATE:`team.update`,TEAM_DELETE:`team.delete`,TEAM_MANAGE:`team.manage`,ROLE_CREATE:`role.create`,ROLE_UPDATE:`role.update`,ROLE_DELETE:`role.delete`,ROLE_ASSIGN:`role.assign`,ROLE_REVOKE:`role.revoke`,BILLING_VIEW:`billing.view`,BILLING_MANAGE:`billing.manage`,PROJECT_CREATE:`project.create`,PROJECT_READ:`project.read`,PROJECT_UPDATE:`project.update`,PROJECT_DELETE:`project.delete`,PROJECT_MANAGE:`project.manage`,ADMIN_ACCESS:`admin.access`,ADMIN_IMPERSONATE:`admin.impersonate`},t={OWNER:{name:`owner`,description:`Organization owner with full access`,permissions:Object.values(e)},ADMIN:{name:`admin`,description:`Administrator with most permissions`,permissions:[e.USER_READ,e.USER_LIST,e.ORG_READ,e.ORG_UPDATE,e.MEMBER_INVITE,e.MEMBER_REMOVE,e.MEMBER_UPDATE_ROLE,e.MEMBER_LIST,e.MANAGE_MEMBERS,e.TEAM_CREATE,e.TEAM_UPDATE,e.TEAM_DELETE,e.TEAM_MANAGE,e.PROJECT_CREATE,e.PROJECT_READ,e.PROJECT_UPDATE,e.PROJECT_DELETE,e.PROJECT_MANAGE,e.BILLING_VIEW]},MEMBER:{name:`member`,description:`Regular organization member`,permissions:[e.USER_READ,e.ORG_READ,e.MEMBER_LIST,e.PROJECT_READ,e.PROJECT_CREATE]},VIEWER:{name:`viewer`,description:`Read-only access`,permissions:[e.USER_READ,e.ORG_READ,e.MEMBER_LIST,e.PROJECT_READ]}};var n=class{roleCache=new Map;bindingCache=new Map;async checkPermission(e,t){let{userId:n,orgId:r,permission:i}=e,a=new Date,o=t.filter(e=>e.targetType===`user`&&e.targetId===n),s=r?t.filter(e=>e.targetType===`organization`&&e.targetId===r):[],c=[...o,...s].filter(e=>!e.expiresAt||e.expiresAt>a);if(c.length===0)return{allowed:!1,reason:`No active role bindings found`};for(let e of c)if(e.role.permissions.includes(i))return{allowed:!0,matchedRole:e.role.name};return{allowed:!1,reason:`No role grants the "${i}" permission`}}async getPermissions(e,t,n){let r=new Date,i=n.filter(t=>t.targetType===`user`&&t.targetId===e),a=t?n.filter(e=>e.targetType===`organization`&&e.targetId===t):[],o=[...i,...a].filter(e=>!e.expiresAt||e.expiresAt>r),s=new Set,c=[];for(let e of o){c.push(e.role);for(let t of e.role.permissions)s.add(t)}return{permissions:s,roles:c}}async hasAnyPermission(e,t,n,r){let{permissions:i}=await this.getPermissions(e,t,r);return n.some(e=>i.has(e))}async hasAllPermissions(e,t,n,r){let{permissions:i}=await this.getPermissions(e,t,r);return n.every(e=>i.has(e))}};function r(){return new n}export{e as Permission,n as RBACPolicyEngine,t as StandardRole,r as createRBACEngine};
1
+ //#region src/policies/engine.ts
2
+ /**
3
+ * Standard permissions for identity-rbac module.
4
+ */
5
+ const Permission = {
6
+ USER_CREATE: "user.create",
7
+ USER_READ: "user.read",
8
+ USER_UPDATE: "user.update",
9
+ USER_DELETE: "user.delete",
10
+ USER_LIST: "user.list",
11
+ USER_MANAGE: "user.manage",
12
+ ORG_CREATE: "org.create",
13
+ ORG_READ: "org.read",
14
+ ORG_UPDATE: "org.update",
15
+ ORG_DELETE: "org.delete",
16
+ ORG_LIST: "org.list",
17
+ MEMBER_INVITE: "member.invite",
18
+ MEMBER_REMOVE: "member.remove",
19
+ MEMBER_UPDATE_ROLE: "member.update_role",
20
+ MEMBER_LIST: "member.list",
21
+ MANAGE_MEMBERS: "org.manage_members",
22
+ TEAM_CREATE: "team.create",
23
+ TEAM_UPDATE: "team.update",
24
+ TEAM_DELETE: "team.delete",
25
+ TEAM_MANAGE: "team.manage",
26
+ ROLE_CREATE: "role.create",
27
+ ROLE_UPDATE: "role.update",
28
+ ROLE_DELETE: "role.delete",
29
+ ROLE_ASSIGN: "role.assign",
30
+ ROLE_REVOKE: "role.revoke",
31
+ BILLING_VIEW: "billing.view",
32
+ BILLING_MANAGE: "billing.manage",
33
+ PROJECT_CREATE: "project.create",
34
+ PROJECT_READ: "project.read",
35
+ PROJECT_UPDATE: "project.update",
36
+ PROJECT_DELETE: "project.delete",
37
+ PROJECT_MANAGE: "project.manage",
38
+ ADMIN_ACCESS: "admin.access",
39
+ ADMIN_IMPERSONATE: "admin.impersonate"
40
+ };
41
+ /**
42
+ * Standard role definitions.
43
+ */
44
+ const StandardRole = {
45
+ OWNER: {
46
+ name: "owner",
47
+ description: "Organization owner with full access",
48
+ permissions: Object.values(Permission)
49
+ },
50
+ ADMIN: {
51
+ name: "admin",
52
+ description: "Administrator with most permissions",
53
+ permissions: [
54
+ Permission.USER_READ,
55
+ Permission.USER_LIST,
56
+ Permission.ORG_READ,
57
+ Permission.ORG_UPDATE,
58
+ Permission.MEMBER_INVITE,
59
+ Permission.MEMBER_REMOVE,
60
+ Permission.MEMBER_UPDATE_ROLE,
61
+ Permission.MEMBER_LIST,
62
+ Permission.MANAGE_MEMBERS,
63
+ Permission.TEAM_CREATE,
64
+ Permission.TEAM_UPDATE,
65
+ Permission.TEAM_DELETE,
66
+ Permission.TEAM_MANAGE,
67
+ Permission.PROJECT_CREATE,
68
+ Permission.PROJECT_READ,
69
+ Permission.PROJECT_UPDATE,
70
+ Permission.PROJECT_DELETE,
71
+ Permission.PROJECT_MANAGE,
72
+ Permission.BILLING_VIEW
73
+ ]
74
+ },
75
+ MEMBER: {
76
+ name: "member",
77
+ description: "Regular organization member",
78
+ permissions: [
79
+ Permission.USER_READ,
80
+ Permission.ORG_READ,
81
+ Permission.MEMBER_LIST,
82
+ Permission.PROJECT_READ,
83
+ Permission.PROJECT_CREATE
84
+ ]
85
+ },
86
+ VIEWER: {
87
+ name: "viewer",
88
+ description: "Read-only access",
89
+ permissions: [
90
+ Permission.USER_READ,
91
+ Permission.ORG_READ,
92
+ Permission.MEMBER_LIST,
93
+ Permission.PROJECT_READ
94
+ ]
95
+ }
96
+ };
97
+ /**
98
+ * RBAC Policy Engine for permission checks.
99
+ */
100
+ var RBACPolicyEngine = class {
101
+ roleCache = /* @__PURE__ */ new Map();
102
+ bindingCache = /* @__PURE__ */ new Map();
103
+ /**
104
+ * Check if a user has a specific permission.
105
+ */
106
+ async checkPermission(input, bindings) {
107
+ const { userId, orgId, permission } = input;
108
+ const now = /* @__PURE__ */ new Date();
109
+ const userBindings = bindings.filter((b) => b.targetType === "user" && b.targetId === userId);
110
+ const orgBindings = orgId ? bindings.filter((b) => b.targetType === "organization" && b.targetId === orgId) : [];
111
+ const activeBindings = [...userBindings, ...orgBindings].filter((b) => !b.expiresAt || b.expiresAt > now);
112
+ if (activeBindings.length === 0) return {
113
+ allowed: false,
114
+ reason: "No active role bindings found"
115
+ };
116
+ for (const binding of activeBindings) if (binding.role.permissions.includes(permission)) return {
117
+ allowed: true,
118
+ matchedRole: binding.role.name
119
+ };
120
+ return {
121
+ allowed: false,
122
+ reason: `No role grants the "${permission}" permission`
123
+ };
124
+ }
125
+ /**
126
+ * Get all permissions for a user in a context.
127
+ */
128
+ async getPermissions(userId, orgId, bindings) {
129
+ const now = /* @__PURE__ */ new Date();
130
+ const userBindings = bindings.filter((b) => b.targetType === "user" && b.targetId === userId);
131
+ const orgBindings = orgId ? bindings.filter((b) => b.targetType === "organization" && b.targetId === orgId) : [];
132
+ const activeBindings = [...userBindings, ...orgBindings].filter((b) => !b.expiresAt || b.expiresAt > now);
133
+ const permissions = /* @__PURE__ */ new Set();
134
+ const roles = [];
135
+ for (const binding of activeBindings) {
136
+ roles.push(binding.role);
137
+ for (const perm of binding.role.permissions) permissions.add(perm);
138
+ }
139
+ return {
140
+ permissions,
141
+ roles
142
+ };
143
+ }
144
+ /**
145
+ * Check if user has any of the specified permissions.
146
+ */
147
+ async hasAnyPermission(userId, orgId, permissions, bindings) {
148
+ const { permissions: userPerms } = await this.getPermissions(userId, orgId, bindings);
149
+ return permissions.some((p) => userPerms.has(p));
150
+ }
151
+ /**
152
+ * Check if user has all of the specified permissions.
153
+ */
154
+ async hasAllPermissions(userId, orgId, permissions, bindings) {
155
+ const { permissions: userPerms } = await this.getPermissions(userId, orgId, bindings);
156
+ return permissions.every((p) => userPerms.has(p));
157
+ }
158
+ };
159
+ /**
160
+ * Create a new RBAC policy engine instance.
161
+ */
162
+ function createRBACEngine() {
163
+ return new RBACPolicyEngine();
164
+ }
165
+
166
+ //#endregion
167
+ export { Permission, RBACPolicyEngine, StandardRole, createRBACEngine };
@@ -1 +1,3 @@
1
- import{Permission as e,RBACPolicyEngine as t,StandardRole as n,createRBACEngine as r}from"./engine.js";export{e as Permission,t as RBACPolicyEngine,n as StandardRole,r as createRBACEngine};
1
+ import { Permission, RBACPolicyEngine, StandardRole, createRBACEngine } from "./engine.js";
2
+
3
+ export { Permission, RBACPolicyEngine, StandardRole, createRBACEngine };
@@ -1 +1,2 @@
1
- import"zod";import"graphql";
1
+ import "zod";
2
+ import "graphql";
@@ -1 +1,49 @@
1
- import"zod";import{GraphQLScalarType as e}from"graphql";var t=class extends e{zodSchema;jsonSchemaDef;constructor(e){super(e),this.zodSchema=e.zod,this.jsonSchemaDef=e.jsonSchema}getZod(){return this.zodSchema}getPothos(){return this}getJson(){return typeof this.jsonSchemaDef==`function`?this.jsonSchemaDef():this.jsonSchemaDef}getJsonSchemaDef(){return this.jsonSchemaDef}getJsonSchema(){let e=t=>{let n=typeof t==`function`?t():t;if(Array.isArray(n))return n.map(t=>e(t));if(n&&typeof n==`object`){let t={};for(let[r,i]of Object.entries(n))t[r]=e(i);return t}return n};return e(this.getJson())}};export{t};
1
+ import "zod";
2
+ import { GraphQLScalarType } from "graphql";
3
+
4
+ //#region ../schema/dist/FieldType.js
5
+ /**
6
+ * GraphQL scalar wrapper that carries zod and JSON Schema metadata.
7
+ *
8
+ * TInternal is the runtime representation; TExternal is the GraphQL output.
9
+ */
10
+ var FieldType = class extends GraphQLScalarType {
11
+ zodSchema;
12
+ jsonSchemaDef;
13
+ constructor(config) {
14
+ super(config);
15
+ this.zodSchema = config.zod;
16
+ this.jsonSchemaDef = config.jsonSchema;
17
+ }
18
+ /** Return the attached zod schema for validation. */
19
+ getZod() {
20
+ return this.zodSchema;
21
+ }
22
+ /** GraphQL scalar instance usable by Pothos or vanilla GraphQL. */
23
+ getPothos() {
24
+ return this;
25
+ }
26
+ /** Return the JSON Schema (evaluates factory if provided). */
27
+ getJson() {
28
+ return typeof this.jsonSchemaDef === "function" ? this.jsonSchemaDef() : this.jsonSchemaDef;
29
+ }
30
+ getJsonSchemaDef() {
31
+ return this.jsonSchemaDef;
32
+ }
33
+ getJsonSchema() {
34
+ const deepResolve = (v) => {
35
+ const value = typeof v === "function" ? v() : v;
36
+ if (Array.isArray(value)) return value.map((item) => deepResolve(item));
37
+ if (value && typeof value === "object") {
38
+ const obj = {};
39
+ for (const [k, val] of Object.entries(value)) obj[k] = deepResolve(val);
40
+ return obj;
41
+ }
42
+ return value;
43
+ };
44
+ return deepResolve(this.getJson());
45
+ }
46
+ };
47
+
48
+ //#endregion
49
+ export { FieldType };