@sanctuary-framework/mcp-server 0.5.5 → 0.5.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli.cjs +2345 -1624
- package/dist/cli.cjs.map +1 -1
- package/dist/cli.js +2345 -1624
- package/dist/cli.js.map +1 -1
- package/dist/index.cjs +2149 -1455
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +155 -48
- package/dist/index.d.ts +155 -48
- package/dist/index.js +2147 -1456
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
package/dist/index.d.cts
CHANGED
|
@@ -1954,6 +1954,53 @@ declare class FilesystemStorage implements StorageBackend {
|
|
|
1954
1954
|
*/
|
|
1955
1955
|
declare function loadPrincipalPolicy(storagePath: string): Promise<PrincipalPolicy>;
|
|
1956
1956
|
|
|
1957
|
+
/**
|
|
1958
|
+
* Sanctuary MCP Server — L1 Cognitive Sovereignty: Tool Definitions
|
|
1959
|
+
*
|
|
1960
|
+
* MCP tool wrappers for StateStore and IdentityRoot operations.
|
|
1961
|
+
* These tools are the public API that agents interact with.
|
|
1962
|
+
*/
|
|
1963
|
+
|
|
1964
|
+
/** Manages all identities — provides storage and retrieval */
|
|
1965
|
+
declare class IdentityManager {
|
|
1966
|
+
private storage;
|
|
1967
|
+
private masterKey;
|
|
1968
|
+
private identities;
|
|
1969
|
+
private primaryIdentityId;
|
|
1970
|
+
constructor(storage: StorageBackend, masterKey: Uint8Array);
|
|
1971
|
+
private get encryptionKey();
|
|
1972
|
+
/** Load identities from storage on startup */
|
|
1973
|
+
load(): Promise<void>;
|
|
1974
|
+
/** Save an identity to storage */
|
|
1975
|
+
save(identity: StoredIdentity): Promise<void>;
|
|
1976
|
+
get(id: string): StoredIdentity | undefined;
|
|
1977
|
+
getDefault(): StoredIdentity | undefined;
|
|
1978
|
+
list(): PublicIdentity[];
|
|
1979
|
+
}
|
|
1980
|
+
|
|
1981
|
+
/**
|
|
1982
|
+
* Sanctuary MCP Server — SHR Generator
|
|
1983
|
+
*
|
|
1984
|
+
* Generates a Sovereignty Health Report from current server state,
|
|
1985
|
+
* signs it with a specified identity, and returns the complete signed SHR.
|
|
1986
|
+
*/
|
|
1987
|
+
|
|
1988
|
+
interface SHRGeneratorOptions {
|
|
1989
|
+
config: SanctuaryConfig;
|
|
1990
|
+
identityManager: IdentityManager;
|
|
1991
|
+
masterKey: Uint8Array;
|
|
1992
|
+
/** Override validity window (milliseconds). Default: 1 hour. */
|
|
1993
|
+
validityMs?: number;
|
|
1994
|
+
}
|
|
1995
|
+
/**
|
|
1996
|
+
* Generate and sign a Sovereignty Health Report.
|
|
1997
|
+
*
|
|
1998
|
+
* @param identityId - Which identity to sign with (defaults to primary)
|
|
1999
|
+
* @param opts - Generator dependencies
|
|
2000
|
+
* @returns The signed SHR, or an error string
|
|
2001
|
+
*/
|
|
2002
|
+
declare function generateSHR(identityId: string | undefined, opts: SHRGeneratorOptions): SignedSHR | string;
|
|
2003
|
+
|
|
1957
2004
|
/**
|
|
1958
2005
|
* Sanctuary MCP Server — Principal Dashboard
|
|
1959
2006
|
*
|
|
@@ -1999,6 +2046,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
|
|
|
1999
2046
|
private policy;
|
|
2000
2047
|
private baseline;
|
|
2001
2048
|
private auditLog;
|
|
2049
|
+
private identityManager;
|
|
2050
|
+
private handshakeResults;
|
|
2051
|
+
private shrOpts;
|
|
2052
|
+
private _sanctuaryConfig;
|
|
2002
2053
|
private dashboardHTML;
|
|
2003
2054
|
private loginHTML;
|
|
2004
2055
|
private authToken;
|
|
@@ -2019,6 +2070,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
|
|
|
2019
2070
|
policy: PrincipalPolicy;
|
|
2020
2071
|
baseline: BaselineTracker;
|
|
2021
2072
|
auditLog: AuditLog;
|
|
2073
|
+
identityManager?: IdentityManager;
|
|
2074
|
+
handshakeResults?: Map<string, HandshakeResult>;
|
|
2075
|
+
shrOpts?: SHRGeneratorOptions;
|
|
2076
|
+
sanctuaryConfig?: SanctuaryConfig;
|
|
2022
2077
|
}): void;
|
|
2023
2078
|
/**
|
|
2024
2079
|
* Start the HTTP(S) server for the dashboard.
|
|
@@ -2097,6 +2152,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
|
|
|
2097
2152
|
private handlePendingList;
|
|
2098
2153
|
private handleAuditLog;
|
|
2099
2154
|
private handleDecision;
|
|
2155
|
+
private handleSovereignty;
|
|
2156
|
+
private handleIdentity;
|
|
2157
|
+
private handleHandshakes;
|
|
2158
|
+
private handleSHR;
|
|
2100
2159
|
broadcastSSE(event: string, data: unknown): void;
|
|
2101
2160
|
/**
|
|
2102
2161
|
* Broadcast an audit entry to connected dashboards.
|
|
@@ -2246,53 +2305,6 @@ declare class WebhookApprovalChannel implements ApprovalChannel {
|
|
|
2246
2305
|
get pendingCount(): number;
|
|
2247
2306
|
}
|
|
2248
2307
|
|
|
2249
|
-
/**
|
|
2250
|
-
* Sanctuary MCP Server — L1 Cognitive Sovereignty: Tool Definitions
|
|
2251
|
-
*
|
|
2252
|
-
* MCP tool wrappers for StateStore and IdentityRoot operations.
|
|
2253
|
-
* These tools are the public API that agents interact with.
|
|
2254
|
-
*/
|
|
2255
|
-
|
|
2256
|
-
/** Manages all identities — provides storage and retrieval */
|
|
2257
|
-
declare class IdentityManager {
|
|
2258
|
-
private storage;
|
|
2259
|
-
private masterKey;
|
|
2260
|
-
private identities;
|
|
2261
|
-
private primaryIdentityId;
|
|
2262
|
-
constructor(storage: StorageBackend, masterKey: Uint8Array);
|
|
2263
|
-
private get encryptionKey();
|
|
2264
|
-
/** Load identities from storage on startup */
|
|
2265
|
-
load(): Promise<void>;
|
|
2266
|
-
/** Save an identity to storage */
|
|
2267
|
-
save(identity: StoredIdentity): Promise<void>;
|
|
2268
|
-
get(id: string): StoredIdentity | undefined;
|
|
2269
|
-
getDefault(): StoredIdentity | undefined;
|
|
2270
|
-
list(): PublicIdentity[];
|
|
2271
|
-
}
|
|
2272
|
-
|
|
2273
|
-
/**
|
|
2274
|
-
* Sanctuary MCP Server — SHR Generator
|
|
2275
|
-
*
|
|
2276
|
-
* Generates a Sovereignty Health Report from current server state,
|
|
2277
|
-
* signs it with a specified identity, and returns the complete signed SHR.
|
|
2278
|
-
*/
|
|
2279
|
-
|
|
2280
|
-
interface SHRGeneratorOptions {
|
|
2281
|
-
config: SanctuaryConfig;
|
|
2282
|
-
identityManager: IdentityManager;
|
|
2283
|
-
masterKey: Uint8Array;
|
|
2284
|
-
/** Override validity window (milliseconds). Default: 1 hour. */
|
|
2285
|
-
validityMs?: number;
|
|
2286
|
-
}
|
|
2287
|
-
/**
|
|
2288
|
-
* Generate and sign a Sovereignty Health Report.
|
|
2289
|
-
*
|
|
2290
|
-
* @param identityId - Which identity to sign with (defaults to primary)
|
|
2291
|
-
* @param opts - Generator dependencies
|
|
2292
|
-
* @returns The signed SHR, or an error string
|
|
2293
|
-
*/
|
|
2294
|
-
declare function generateSHR(identityId: string | undefined, opts: SHRGeneratorOptions): SignedSHR | string;
|
|
2295
|
-
|
|
2296
2308
|
/**
|
|
2297
2309
|
* Sanctuary MCP Server — SHR Verifier
|
|
2298
2310
|
*
|
|
@@ -2354,6 +2366,101 @@ declare function completeHandshake(response: HandshakeResponse, session: Handsha
|
|
|
2354
2366
|
*/
|
|
2355
2367
|
declare function verifyCompletion(completion: HandshakeCompletion, session: HandshakeSession): HandshakeResult;
|
|
2356
2368
|
|
|
2369
|
+
/**
|
|
2370
|
+
* Sanctuary MCP Server — Sovereignty Attestation Artifacts
|
|
2371
|
+
*
|
|
2372
|
+
* Signed, shareable artifacts proving sovereignty verification between agents.
|
|
2373
|
+
* Used for one-shot SHR exchanges and as portable proof of handshake completion.
|
|
2374
|
+
*
|
|
2375
|
+
* An attestation artifact contains:
|
|
2376
|
+
* - Both parties' SHRs
|
|
2377
|
+
* - Verification results (sovereignty level, trust tier)
|
|
2378
|
+
* - Ed25519 signature over the canonical artifact body
|
|
2379
|
+
* - Human-readable summary for social/public posting
|
|
2380
|
+
*/
|
|
2381
|
+
|
|
2382
|
+
/** Attestation artifact version */
|
|
2383
|
+
declare const ATTESTATION_VERSION: "1.0";
|
|
2384
|
+
/** The signed body of an attestation artifact */
|
|
2385
|
+
interface AttestationBody {
|
|
2386
|
+
attestation_version: typeof ATTESTATION_VERSION;
|
|
2387
|
+
/** Who generated this attestation */
|
|
2388
|
+
attester_id: string;
|
|
2389
|
+
/** Who was verified */
|
|
2390
|
+
subject_id: string;
|
|
2391
|
+
/** Attester's SHR at time of attestation */
|
|
2392
|
+
attester_shr: SignedSHR;
|
|
2393
|
+
/** Subject's SHR that was verified */
|
|
2394
|
+
subject_shr: SignedSHR;
|
|
2395
|
+
/** Verification results */
|
|
2396
|
+
verification: {
|
|
2397
|
+
subject_shr_valid: boolean;
|
|
2398
|
+
subject_sovereignty_level: SovereigntyLevel;
|
|
2399
|
+
subject_trust_tier: TrustTier;
|
|
2400
|
+
/** Whether subject also verified attester (mutual exchange) */
|
|
2401
|
+
mutual: boolean;
|
|
2402
|
+
errors: string[];
|
|
2403
|
+
warnings: string[];
|
|
2404
|
+
};
|
|
2405
|
+
/** When this attestation was generated */
|
|
2406
|
+
attested_at: string;
|
|
2407
|
+
/** When this attestation expires (min of both SHR expiries) */
|
|
2408
|
+
expires_at: string;
|
|
2409
|
+
}
|
|
2410
|
+
/** Complete signed attestation artifact */
|
|
2411
|
+
interface SignedAttestation {
|
|
2412
|
+
body: AttestationBody;
|
|
2413
|
+
/** Attester's public key (base64url) */
|
|
2414
|
+
signed_by: string;
|
|
2415
|
+
/** Ed25519 signature over canonical body (base64url) */
|
|
2416
|
+
signature: string;
|
|
2417
|
+
/** Human-readable summary for social posting */
|
|
2418
|
+
summary: string;
|
|
2419
|
+
}
|
|
2420
|
+
interface AttestationOptions {
|
|
2421
|
+
/** Our signed SHR */
|
|
2422
|
+
attesterSHR: SignedSHR;
|
|
2423
|
+
/** Counterparty's signed SHR */
|
|
2424
|
+
subjectSHR: SignedSHR;
|
|
2425
|
+
/** Result from verifySHR(subjectSHR) */
|
|
2426
|
+
verificationResult: SHRVerificationResult;
|
|
2427
|
+
/** Whether this is a mutual exchange (both sides verify) */
|
|
2428
|
+
mutual?: boolean;
|
|
2429
|
+
/** Identity manager for signing */
|
|
2430
|
+
identityManager: IdentityManager;
|
|
2431
|
+
/** Master key for key derivation */
|
|
2432
|
+
masterKey: Uint8Array;
|
|
2433
|
+
/** Identity to sign with (defaults to primary) */
|
|
2434
|
+
identityId?: string;
|
|
2435
|
+
}
|
|
2436
|
+
/**
|
|
2437
|
+
* Generate a signed attestation artifact.
|
|
2438
|
+
*
|
|
2439
|
+
* The artifact is a portable, verifiable proof that one agent
|
|
2440
|
+
* verified another's sovereignty posture. It includes both SHRs,
|
|
2441
|
+
* the verification outcome, and a human-readable summary.
|
|
2442
|
+
*/
|
|
2443
|
+
declare function generateAttestation(opts: AttestationOptions): SignedAttestation | {
|
|
2444
|
+
error: string;
|
|
2445
|
+
};
|
|
2446
|
+
interface AttestationVerificationResult {
|
|
2447
|
+
valid: boolean;
|
|
2448
|
+
errors: string[];
|
|
2449
|
+
attester_id: string;
|
|
2450
|
+
subject_id: string;
|
|
2451
|
+
trust_tier: TrustTier;
|
|
2452
|
+
expired: boolean;
|
|
2453
|
+
}
|
|
2454
|
+
/**
|
|
2455
|
+
* Verify a signed attestation artifact.
|
|
2456
|
+
*
|
|
2457
|
+
* Checks:
|
|
2458
|
+
* 1. Signature validity (Ed25519 over canonical body)
|
|
2459
|
+
* 2. Temporal validity (not expired)
|
|
2460
|
+
* 3. Structural integrity (version, required fields)
|
|
2461
|
+
*/
|
|
2462
|
+
declare function verifyAttestation(attestation: SignedAttestation, now?: Date): AttestationVerificationResult;
|
|
2463
|
+
|
|
2357
2464
|
/**
|
|
2358
2465
|
* Sanctuary MCP Server — Concordia Bridge: Type Definitions
|
|
2359
2466
|
*
|
|
@@ -2559,4 +2666,4 @@ declare function createSanctuaryServer(options?: {
|
|
|
2559
2666
|
storage?: StorageBackend;
|
|
2560
2667
|
}): Promise<SanctuaryServer>;
|
|
2561
2668
|
|
|
2562
|
-
export { ApprovalGate, AuditLog, AutoApproveChannel, BaselineTracker, type BridgeAttestationRequest, type BridgeAttestationResult, type BridgeCommitment, type BridgeVerificationResult, TEMPLATES as CONTEXT_GATE_TEMPLATES, CallbackApprovalChannel, CommitmentStore, type ConcordiaOutcome, type ContextAction, type ContextFilterResult, ContextGateEnforcer, type ContextGatePolicy, ContextGatePolicyStore, type ContextGateRule, type ContextGateTemplate, DashboardApprovalChannel, type DashboardConfig, type DetectionResult, type EnforcerConfig, type FederationCapabilities, type FederationPeer, FederationRegistry, type FieldClassification, type FieldFilterResult, FilesystemStorage, type GateResult, type HandshakeChallenge, type HandshakeCompletion, type HandshakeResponse, type HandshakeResult, InjectionDetector, type InjectionDetectorConfig, type InjectionSignal, MemoryStorage, type PedersenCommitment, type PeerTrustEvaluation, type PolicyRecommendation, PolicyStore, type PrincipalPolicy, type ProviderCategory, ReputationStore, type SHRBody, type SHRVerificationResult, type SanctuaryConfig, type SanctuaryServer, type SignedSHR, type SovereigntyTier, StateStore, StderrApprovalChannel, TIER_WEIGHTS, type TierMetadata, type TieredAttestation, WebhookApprovalChannel, type WebhookCallbackPayload, type WebhookConfig, type WebhookPayload, type ZKProofOfKnowledge, type ZKRangeProof, canonicalize, classifyField, completeHandshake, computeWeightedScore, createBridgeCommitment, createPedersenCommitment, createProofOfKnowledge, createRangeProof, createSanctuaryServer, evaluateField, filterContext, generateSHR, getTemplate, initiateHandshake, listTemplateIds, loadConfig, loadPrincipalPolicy, recommendPolicy, resolveTier, respondToHandshake, signPayload, tierDistribution, verifyBridgeCommitment, verifyCompletion, verifyPedersenCommitment, verifyProofOfKnowledge, verifyRangeProof, verifySHR, verifySignature };
|
|
2669
|
+
export { ATTESTATION_VERSION, ApprovalGate, type AttestationBody, type AttestationVerificationResult, AuditLog, AutoApproveChannel, BaselineTracker, type BridgeAttestationRequest, type BridgeAttestationResult, type BridgeCommitment, type BridgeVerificationResult, TEMPLATES as CONTEXT_GATE_TEMPLATES, CallbackApprovalChannel, CommitmentStore, type ConcordiaOutcome, type ContextAction, type ContextFilterResult, ContextGateEnforcer, type ContextGatePolicy, ContextGatePolicyStore, type ContextGateRule, type ContextGateTemplate, DashboardApprovalChannel, type DashboardConfig, type DetectionResult, type EnforcerConfig, type FederationCapabilities, type FederationPeer, FederationRegistry, type FieldClassification, type FieldFilterResult, FilesystemStorage, type GateResult, type HandshakeChallenge, type HandshakeCompletion, type HandshakeResponse, type HandshakeResult, InjectionDetector, type InjectionDetectorConfig, type InjectionSignal, MemoryStorage, type PedersenCommitment, type PeerTrustEvaluation, type PolicyRecommendation, PolicyStore, type PrincipalPolicy, type ProviderCategory, ReputationStore, type SHRBody, type SHRGeneratorOptions, type SHRVerificationResult, type SanctuaryConfig, type SanctuaryServer, type SignedAttestation, type SignedSHR, type SovereigntyTier, StateStore, StderrApprovalChannel, TIER_WEIGHTS, type TierMetadata, type TieredAttestation, WebhookApprovalChannel, type WebhookCallbackPayload, type WebhookConfig, type WebhookPayload, type ZKProofOfKnowledge, type ZKRangeProof, canonicalize, classifyField, completeHandshake, computeWeightedScore, createBridgeCommitment, createPedersenCommitment, createProofOfKnowledge, createRangeProof, createSanctuaryServer, evaluateField, filterContext, generateAttestation, generateSHR, getTemplate, initiateHandshake, listTemplateIds, loadConfig, loadPrincipalPolicy, recommendPolicy, resolveTier, respondToHandshake, signPayload, tierDistribution, verifyAttestation, verifyBridgeCommitment, verifyCompletion, verifyPedersenCommitment, verifyProofOfKnowledge, verifyRangeProof, verifySHR, verifySignature };
|
package/dist/index.d.ts
CHANGED
|
@@ -1954,6 +1954,53 @@ declare class FilesystemStorage implements StorageBackend {
|
|
|
1954
1954
|
*/
|
|
1955
1955
|
declare function loadPrincipalPolicy(storagePath: string): Promise<PrincipalPolicy>;
|
|
1956
1956
|
|
|
1957
|
+
/**
|
|
1958
|
+
* Sanctuary MCP Server — L1 Cognitive Sovereignty: Tool Definitions
|
|
1959
|
+
*
|
|
1960
|
+
* MCP tool wrappers for StateStore and IdentityRoot operations.
|
|
1961
|
+
* These tools are the public API that agents interact with.
|
|
1962
|
+
*/
|
|
1963
|
+
|
|
1964
|
+
/** Manages all identities — provides storage and retrieval */
|
|
1965
|
+
declare class IdentityManager {
|
|
1966
|
+
private storage;
|
|
1967
|
+
private masterKey;
|
|
1968
|
+
private identities;
|
|
1969
|
+
private primaryIdentityId;
|
|
1970
|
+
constructor(storage: StorageBackend, masterKey: Uint8Array);
|
|
1971
|
+
private get encryptionKey();
|
|
1972
|
+
/** Load identities from storage on startup */
|
|
1973
|
+
load(): Promise<void>;
|
|
1974
|
+
/** Save an identity to storage */
|
|
1975
|
+
save(identity: StoredIdentity): Promise<void>;
|
|
1976
|
+
get(id: string): StoredIdentity | undefined;
|
|
1977
|
+
getDefault(): StoredIdentity | undefined;
|
|
1978
|
+
list(): PublicIdentity[];
|
|
1979
|
+
}
|
|
1980
|
+
|
|
1981
|
+
/**
|
|
1982
|
+
* Sanctuary MCP Server — SHR Generator
|
|
1983
|
+
*
|
|
1984
|
+
* Generates a Sovereignty Health Report from current server state,
|
|
1985
|
+
* signs it with a specified identity, and returns the complete signed SHR.
|
|
1986
|
+
*/
|
|
1987
|
+
|
|
1988
|
+
interface SHRGeneratorOptions {
|
|
1989
|
+
config: SanctuaryConfig;
|
|
1990
|
+
identityManager: IdentityManager;
|
|
1991
|
+
masterKey: Uint8Array;
|
|
1992
|
+
/** Override validity window (milliseconds). Default: 1 hour. */
|
|
1993
|
+
validityMs?: number;
|
|
1994
|
+
}
|
|
1995
|
+
/**
|
|
1996
|
+
* Generate and sign a Sovereignty Health Report.
|
|
1997
|
+
*
|
|
1998
|
+
* @param identityId - Which identity to sign with (defaults to primary)
|
|
1999
|
+
* @param opts - Generator dependencies
|
|
2000
|
+
* @returns The signed SHR, or an error string
|
|
2001
|
+
*/
|
|
2002
|
+
declare function generateSHR(identityId: string | undefined, opts: SHRGeneratorOptions): SignedSHR | string;
|
|
2003
|
+
|
|
1957
2004
|
/**
|
|
1958
2005
|
* Sanctuary MCP Server — Principal Dashboard
|
|
1959
2006
|
*
|
|
@@ -1999,6 +2046,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
|
|
|
1999
2046
|
private policy;
|
|
2000
2047
|
private baseline;
|
|
2001
2048
|
private auditLog;
|
|
2049
|
+
private identityManager;
|
|
2050
|
+
private handshakeResults;
|
|
2051
|
+
private shrOpts;
|
|
2052
|
+
private _sanctuaryConfig;
|
|
2002
2053
|
private dashboardHTML;
|
|
2003
2054
|
private loginHTML;
|
|
2004
2055
|
private authToken;
|
|
@@ -2019,6 +2070,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
|
|
|
2019
2070
|
policy: PrincipalPolicy;
|
|
2020
2071
|
baseline: BaselineTracker;
|
|
2021
2072
|
auditLog: AuditLog;
|
|
2073
|
+
identityManager?: IdentityManager;
|
|
2074
|
+
handshakeResults?: Map<string, HandshakeResult>;
|
|
2075
|
+
shrOpts?: SHRGeneratorOptions;
|
|
2076
|
+
sanctuaryConfig?: SanctuaryConfig;
|
|
2022
2077
|
}): void;
|
|
2023
2078
|
/**
|
|
2024
2079
|
* Start the HTTP(S) server for the dashboard.
|
|
@@ -2097,6 +2152,10 @@ declare class DashboardApprovalChannel implements ApprovalChannel {
|
|
|
2097
2152
|
private handlePendingList;
|
|
2098
2153
|
private handleAuditLog;
|
|
2099
2154
|
private handleDecision;
|
|
2155
|
+
private handleSovereignty;
|
|
2156
|
+
private handleIdentity;
|
|
2157
|
+
private handleHandshakes;
|
|
2158
|
+
private handleSHR;
|
|
2100
2159
|
broadcastSSE(event: string, data: unknown): void;
|
|
2101
2160
|
/**
|
|
2102
2161
|
* Broadcast an audit entry to connected dashboards.
|
|
@@ -2246,53 +2305,6 @@ declare class WebhookApprovalChannel implements ApprovalChannel {
|
|
|
2246
2305
|
get pendingCount(): number;
|
|
2247
2306
|
}
|
|
2248
2307
|
|
|
2249
|
-
/**
|
|
2250
|
-
* Sanctuary MCP Server — L1 Cognitive Sovereignty: Tool Definitions
|
|
2251
|
-
*
|
|
2252
|
-
* MCP tool wrappers for StateStore and IdentityRoot operations.
|
|
2253
|
-
* These tools are the public API that agents interact with.
|
|
2254
|
-
*/
|
|
2255
|
-
|
|
2256
|
-
/** Manages all identities — provides storage and retrieval */
|
|
2257
|
-
declare class IdentityManager {
|
|
2258
|
-
private storage;
|
|
2259
|
-
private masterKey;
|
|
2260
|
-
private identities;
|
|
2261
|
-
private primaryIdentityId;
|
|
2262
|
-
constructor(storage: StorageBackend, masterKey: Uint8Array);
|
|
2263
|
-
private get encryptionKey();
|
|
2264
|
-
/** Load identities from storage on startup */
|
|
2265
|
-
load(): Promise<void>;
|
|
2266
|
-
/** Save an identity to storage */
|
|
2267
|
-
save(identity: StoredIdentity): Promise<void>;
|
|
2268
|
-
get(id: string): StoredIdentity | undefined;
|
|
2269
|
-
getDefault(): StoredIdentity | undefined;
|
|
2270
|
-
list(): PublicIdentity[];
|
|
2271
|
-
}
|
|
2272
|
-
|
|
2273
|
-
/**
|
|
2274
|
-
* Sanctuary MCP Server — SHR Generator
|
|
2275
|
-
*
|
|
2276
|
-
* Generates a Sovereignty Health Report from current server state,
|
|
2277
|
-
* signs it with a specified identity, and returns the complete signed SHR.
|
|
2278
|
-
*/
|
|
2279
|
-
|
|
2280
|
-
interface SHRGeneratorOptions {
|
|
2281
|
-
config: SanctuaryConfig;
|
|
2282
|
-
identityManager: IdentityManager;
|
|
2283
|
-
masterKey: Uint8Array;
|
|
2284
|
-
/** Override validity window (milliseconds). Default: 1 hour. */
|
|
2285
|
-
validityMs?: number;
|
|
2286
|
-
}
|
|
2287
|
-
/**
|
|
2288
|
-
* Generate and sign a Sovereignty Health Report.
|
|
2289
|
-
*
|
|
2290
|
-
* @param identityId - Which identity to sign with (defaults to primary)
|
|
2291
|
-
* @param opts - Generator dependencies
|
|
2292
|
-
* @returns The signed SHR, or an error string
|
|
2293
|
-
*/
|
|
2294
|
-
declare function generateSHR(identityId: string | undefined, opts: SHRGeneratorOptions): SignedSHR | string;
|
|
2295
|
-
|
|
2296
2308
|
/**
|
|
2297
2309
|
* Sanctuary MCP Server — SHR Verifier
|
|
2298
2310
|
*
|
|
@@ -2354,6 +2366,101 @@ declare function completeHandshake(response: HandshakeResponse, session: Handsha
|
|
|
2354
2366
|
*/
|
|
2355
2367
|
declare function verifyCompletion(completion: HandshakeCompletion, session: HandshakeSession): HandshakeResult;
|
|
2356
2368
|
|
|
2369
|
+
/**
|
|
2370
|
+
* Sanctuary MCP Server — Sovereignty Attestation Artifacts
|
|
2371
|
+
*
|
|
2372
|
+
* Signed, shareable artifacts proving sovereignty verification between agents.
|
|
2373
|
+
* Used for one-shot SHR exchanges and as portable proof of handshake completion.
|
|
2374
|
+
*
|
|
2375
|
+
* An attestation artifact contains:
|
|
2376
|
+
* - Both parties' SHRs
|
|
2377
|
+
* - Verification results (sovereignty level, trust tier)
|
|
2378
|
+
* - Ed25519 signature over the canonical artifact body
|
|
2379
|
+
* - Human-readable summary for social/public posting
|
|
2380
|
+
*/
|
|
2381
|
+
|
|
2382
|
+
/** Attestation artifact version */
|
|
2383
|
+
declare const ATTESTATION_VERSION: "1.0";
|
|
2384
|
+
/** The signed body of an attestation artifact */
|
|
2385
|
+
interface AttestationBody {
|
|
2386
|
+
attestation_version: typeof ATTESTATION_VERSION;
|
|
2387
|
+
/** Who generated this attestation */
|
|
2388
|
+
attester_id: string;
|
|
2389
|
+
/** Who was verified */
|
|
2390
|
+
subject_id: string;
|
|
2391
|
+
/** Attester's SHR at time of attestation */
|
|
2392
|
+
attester_shr: SignedSHR;
|
|
2393
|
+
/** Subject's SHR that was verified */
|
|
2394
|
+
subject_shr: SignedSHR;
|
|
2395
|
+
/** Verification results */
|
|
2396
|
+
verification: {
|
|
2397
|
+
subject_shr_valid: boolean;
|
|
2398
|
+
subject_sovereignty_level: SovereigntyLevel;
|
|
2399
|
+
subject_trust_tier: TrustTier;
|
|
2400
|
+
/** Whether subject also verified attester (mutual exchange) */
|
|
2401
|
+
mutual: boolean;
|
|
2402
|
+
errors: string[];
|
|
2403
|
+
warnings: string[];
|
|
2404
|
+
};
|
|
2405
|
+
/** When this attestation was generated */
|
|
2406
|
+
attested_at: string;
|
|
2407
|
+
/** When this attestation expires (min of both SHR expiries) */
|
|
2408
|
+
expires_at: string;
|
|
2409
|
+
}
|
|
2410
|
+
/** Complete signed attestation artifact */
|
|
2411
|
+
interface SignedAttestation {
|
|
2412
|
+
body: AttestationBody;
|
|
2413
|
+
/** Attester's public key (base64url) */
|
|
2414
|
+
signed_by: string;
|
|
2415
|
+
/** Ed25519 signature over canonical body (base64url) */
|
|
2416
|
+
signature: string;
|
|
2417
|
+
/** Human-readable summary for social posting */
|
|
2418
|
+
summary: string;
|
|
2419
|
+
}
|
|
2420
|
+
interface AttestationOptions {
|
|
2421
|
+
/** Our signed SHR */
|
|
2422
|
+
attesterSHR: SignedSHR;
|
|
2423
|
+
/** Counterparty's signed SHR */
|
|
2424
|
+
subjectSHR: SignedSHR;
|
|
2425
|
+
/** Result from verifySHR(subjectSHR) */
|
|
2426
|
+
verificationResult: SHRVerificationResult;
|
|
2427
|
+
/** Whether this is a mutual exchange (both sides verify) */
|
|
2428
|
+
mutual?: boolean;
|
|
2429
|
+
/** Identity manager for signing */
|
|
2430
|
+
identityManager: IdentityManager;
|
|
2431
|
+
/** Master key for key derivation */
|
|
2432
|
+
masterKey: Uint8Array;
|
|
2433
|
+
/** Identity to sign with (defaults to primary) */
|
|
2434
|
+
identityId?: string;
|
|
2435
|
+
}
|
|
2436
|
+
/**
|
|
2437
|
+
* Generate a signed attestation artifact.
|
|
2438
|
+
*
|
|
2439
|
+
* The artifact is a portable, verifiable proof that one agent
|
|
2440
|
+
* verified another's sovereignty posture. It includes both SHRs,
|
|
2441
|
+
* the verification outcome, and a human-readable summary.
|
|
2442
|
+
*/
|
|
2443
|
+
declare function generateAttestation(opts: AttestationOptions): SignedAttestation | {
|
|
2444
|
+
error: string;
|
|
2445
|
+
};
|
|
2446
|
+
interface AttestationVerificationResult {
|
|
2447
|
+
valid: boolean;
|
|
2448
|
+
errors: string[];
|
|
2449
|
+
attester_id: string;
|
|
2450
|
+
subject_id: string;
|
|
2451
|
+
trust_tier: TrustTier;
|
|
2452
|
+
expired: boolean;
|
|
2453
|
+
}
|
|
2454
|
+
/**
|
|
2455
|
+
* Verify a signed attestation artifact.
|
|
2456
|
+
*
|
|
2457
|
+
* Checks:
|
|
2458
|
+
* 1. Signature validity (Ed25519 over canonical body)
|
|
2459
|
+
* 2. Temporal validity (not expired)
|
|
2460
|
+
* 3. Structural integrity (version, required fields)
|
|
2461
|
+
*/
|
|
2462
|
+
declare function verifyAttestation(attestation: SignedAttestation, now?: Date): AttestationVerificationResult;
|
|
2463
|
+
|
|
2357
2464
|
/**
|
|
2358
2465
|
* Sanctuary MCP Server — Concordia Bridge: Type Definitions
|
|
2359
2466
|
*
|
|
@@ -2559,4 +2666,4 @@ declare function createSanctuaryServer(options?: {
|
|
|
2559
2666
|
storage?: StorageBackend;
|
|
2560
2667
|
}): Promise<SanctuaryServer>;
|
|
2561
2668
|
|
|
2562
|
-
export { ApprovalGate, AuditLog, AutoApproveChannel, BaselineTracker, type BridgeAttestationRequest, type BridgeAttestationResult, type BridgeCommitment, type BridgeVerificationResult, TEMPLATES as CONTEXT_GATE_TEMPLATES, CallbackApprovalChannel, CommitmentStore, type ConcordiaOutcome, type ContextAction, type ContextFilterResult, ContextGateEnforcer, type ContextGatePolicy, ContextGatePolicyStore, type ContextGateRule, type ContextGateTemplate, DashboardApprovalChannel, type DashboardConfig, type DetectionResult, type EnforcerConfig, type FederationCapabilities, type FederationPeer, FederationRegistry, type FieldClassification, type FieldFilterResult, FilesystemStorage, type GateResult, type HandshakeChallenge, type HandshakeCompletion, type HandshakeResponse, type HandshakeResult, InjectionDetector, type InjectionDetectorConfig, type InjectionSignal, MemoryStorage, type PedersenCommitment, type PeerTrustEvaluation, type PolicyRecommendation, PolicyStore, type PrincipalPolicy, type ProviderCategory, ReputationStore, type SHRBody, type SHRVerificationResult, type SanctuaryConfig, type SanctuaryServer, type SignedSHR, type SovereigntyTier, StateStore, StderrApprovalChannel, TIER_WEIGHTS, type TierMetadata, type TieredAttestation, WebhookApprovalChannel, type WebhookCallbackPayload, type WebhookConfig, type WebhookPayload, type ZKProofOfKnowledge, type ZKRangeProof, canonicalize, classifyField, completeHandshake, computeWeightedScore, createBridgeCommitment, createPedersenCommitment, createProofOfKnowledge, createRangeProof, createSanctuaryServer, evaluateField, filterContext, generateSHR, getTemplate, initiateHandshake, listTemplateIds, loadConfig, loadPrincipalPolicy, recommendPolicy, resolveTier, respondToHandshake, signPayload, tierDistribution, verifyBridgeCommitment, verifyCompletion, verifyPedersenCommitment, verifyProofOfKnowledge, verifyRangeProof, verifySHR, verifySignature };
|
|
2669
|
+
export { ATTESTATION_VERSION, ApprovalGate, type AttestationBody, type AttestationVerificationResult, AuditLog, AutoApproveChannel, BaselineTracker, type BridgeAttestationRequest, type BridgeAttestationResult, type BridgeCommitment, type BridgeVerificationResult, TEMPLATES as CONTEXT_GATE_TEMPLATES, CallbackApprovalChannel, CommitmentStore, type ConcordiaOutcome, type ContextAction, type ContextFilterResult, ContextGateEnforcer, type ContextGatePolicy, ContextGatePolicyStore, type ContextGateRule, type ContextGateTemplate, DashboardApprovalChannel, type DashboardConfig, type DetectionResult, type EnforcerConfig, type FederationCapabilities, type FederationPeer, FederationRegistry, type FieldClassification, type FieldFilterResult, FilesystemStorage, type GateResult, type HandshakeChallenge, type HandshakeCompletion, type HandshakeResponse, type HandshakeResult, InjectionDetector, type InjectionDetectorConfig, type InjectionSignal, MemoryStorage, type PedersenCommitment, type PeerTrustEvaluation, type PolicyRecommendation, PolicyStore, type PrincipalPolicy, type ProviderCategory, ReputationStore, type SHRBody, type SHRGeneratorOptions, type SHRVerificationResult, type SanctuaryConfig, type SanctuaryServer, type SignedAttestation, type SignedSHR, type SovereigntyTier, StateStore, StderrApprovalChannel, TIER_WEIGHTS, type TierMetadata, type TieredAttestation, WebhookApprovalChannel, type WebhookCallbackPayload, type WebhookConfig, type WebhookPayload, type ZKProofOfKnowledge, type ZKRangeProof, canonicalize, classifyField, completeHandshake, computeWeightedScore, createBridgeCommitment, createPedersenCommitment, createProofOfKnowledge, createRangeProof, createSanctuaryServer, evaluateField, filterContext, generateAttestation, generateSHR, getTemplate, initiateHandshake, listTemplateIds, loadConfig, loadPrincipalPolicy, recommendPolicy, resolveTier, respondToHandshake, signPayload, tierDistribution, verifyAttestation, verifyBridgeCommitment, verifyCompletion, verifyPedersenCommitment, verifyProofOfKnowledge, verifyRangeProof, verifySHR, verifySignature };
|