@spotify/backstage-plugin-rbac-common 0.6.1 → 0.6.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,18 @@
1
1
  # @spotify/backstage-plugin-rbac-common
2
2
 
3
+ ## 0.6.3
4
+
5
+ ### Patch Changes
6
+
7
+ - Update to Backstage `v1.33.3`
8
+ - Updated dependency `uuid` to `^11.0.0`.
9
+
10
+ ## 0.6.2
11
+
12
+ ### Patch Changes
13
+
14
+ - Update to Backstage v1.32.0
15
+
3
16
  ## 0.6.1
4
17
 
5
18
  ### Patch Changes
@@ -0,0 +1,2 @@
1
+ "use strict";var e=require("zod"),s=require("./permissionSchema.cjs.js"),r=require("./schema.cjs.js");const a=r.PolicyConfigParser,o=r.PolicyConfigParser.extend({name:r.PolicyTitleParser.optional(),options:r.PolicyConfigOptionsParser.optional(),roles:r.RolesParser.optional()}),t=e.z.object({description:e.z.string().optional(),update:o.optional()}),n=e.z.object({decision:s.PolicyDecisionParser,decisionOrigin:e.z.array(r.RoleDecisionParser)}),P=e.z.object({permission:s.PermissionParser,policyConfig:r.PolicyConfigParser,roleIds:e.z.array(e.z.string())}),c=e.z.object({id:e.z.string()}),l=e.z.object({authorized:e.z.boolean()}),i=e.z.object({name:e.z.string().optional(),type:e.z.enum(["user","group","all","unknown"]),entityRef:e.z.string()}),p=e.z.object({members:e.z.array(i)}),z=e.z.object({items:e.z.array(r.PolicyParser),nextCursor:e.z.string().optional(),prevCursor:e.z.string().optional(),totalItems:e.z.number()});exports.AuthorizeResponseParser=l,exports.CreateDraftRequestParser=a,exports.DraftResponseParser=c,exports.MemberResponseParser=i,exports.PolicyResponseParser=z,exports.PublishVersionRequestParser=t,exports.SearchMemberResponseParser=p,exports.TestPolicyDecisionRequestParser=P,exports.TestPolicyDecisionResponseParser=n,exports.UpdateDraftRequestParser=o;
2
+ //# sourceMappingURL=api.cjs.js.map
package/dist/index.cjs.js CHANGED
@@ -1,2 +1,2 @@
1
- "use strict";var e=require("zod"),a=require("@backstage/plugin-permission-common"),u=require("@backstage/catalog-model"),g=require("uuid");const f=(r,s)=>`${r} must be at least ${s} characters`,h=(r,s)=>`${r} must be less than ${s} characters`,b="Untitled policy",U=":backstageUser",R=e.z.object({rule:e.z.string(),params:e.z.record(e.z.any()).optional()}),c=e.z.lazy(()=>e.z.union([e.z.object({allOf:e.z.array(c).nonempty()}).strict(),e.z.object({anyOf:e.z.array(c).nonempty()}).strict(),e.z.object({not:c}).strict(),R])),m=e.z.object({pluginId:e.z.string().min(1).describe("Plugin ID that defines the permission and rules used."),resourceType:e.z.string().min(1).describe("Resource type associated with the conditions used."),conditions:c}),D=e.z.union([e.z.literal("allow"),e.z.literal("deny")]),d=e.z.union([D,m]),C=e.z.union([e.z.literal("*"),e.z.object({name:e.z.string().optional().describe("Name that must match the incoming permission request."),actions:e.z.array(e.z.string()).optional().describe("Actions that must be present on the incoming permission's attributes."),resourceType:e.z.string().min(1).optional().describe("Resource type that must match that of the incoming permission request.")})]),j=e.z.string().default(()=>g.v4().split("-")[0]).describe("ID of the permission."),A=e.z.object({id:j,match:C.describe("Values used to match against the incoming permission request."),decision:d.describe("Authorization result or conditions to send if this role permission applies.")}).refine(({decision:r,match:s})=>N(r)?s!=="*"&&s?.resourceType!==void 0:!0,{path:["match","resourceType"],message:"match.resourceType is required for conditional decisions."}),O=e.z.array(A).superRefine((r,s)=>{const i=y(r,"id");i>=0&&s.addIssue({code:e.z.ZodIssueCode.custom,message:"Permission ids must be unique",path:[i,"id"]})}).describe("Permission decisions used to determine authorization responses."),w=e.z.string().refine(L,{message:"Invalid entity ref for member.",path:[]}).transform(r=>u.stringifyEntityRef(u.parseEntityRef(r,{defaultKind:"group",defaultNamespace:"default"}))),T=e.z.string().default(()=>g.v4().split("-")[0]).describe("ID of the role."),q=e.z.object({name:e.z.string().min(1,{message:f("Role name",1)}).max(1024,{message:h("Role name",1024)}).describe("Name of the role."),id:T,members:e.z.union([e.z.literal("*"),e.z.array(w).min(1)]).describe("Entity references used to map users to this role. These entities don't need to exist in the catalog."),permissions:O}),P=e.z.array(q).default([]).superRefine((r,s)=>{const i=y(r,"name");i>=0&&s.addIssue({code:e.z.ZodIssueCode.custom,message:"Role names must be unique",path:[i,"name"]});const t=y(r,"id");t>=0&&s.addIssue({code:e.z.ZodIssueCode.custom,message:"Role ids must be unique",path:[t,"id"]})}),I=e.z.object({decision:d.describe("The authorization result or conditions the corresponding role resulted in"),roleId:T.describe("The id of the role that resulted in the decision"),rolePermissionId:j.describe("The id of the role permission that resulted in the decisions.")}),z=e.z.string().min(1,{message:f("Policy name",1)}).max(1024,{message:h("Policy name",1024)}).default(b).describe("Name of the policy."),v=e.z.union([e.z.literal("first-match"),e.z.literal("any-allow")]),p=e.z.object({resolutionStrategy:v}).default({resolutionStrategy:"first-match"}),o=e.z.object({name:z,options:p,roles:P}),B=o.default({roles:[]});function L(r){try{return u.parseEntityRef(r,{defaultKind:"group",defaultNamespace:"default"}),!0}catch{return!1}}function y(r,s){let i=0;const t=new Set;for(;i<r.length;){const n=r[i][s];if(t.has(n))return i;t.add(n),i++}return-1}function N(r){return typeof r!="string"}function $(r){const s=Object.entries(r);return s.length===1&&s[0][0]==="allOf"&&Array.isArray(s[0][1])}function V(r){const s=Object.entries(r);return s.length===1&&s[0][0]==="anyOf"&&Array.isArray(s[0][1])}function Z(r){const s=Object.entries(r);return s.length===1&&s[0][0]==="not"&&!Array.isArray(s[0][1])}const M=o.extend({id:e.z.string(),createdAt:e.z.string(),createdBy:e.z.string(),updatedAt:e.z.string(),updatedBy:e.z.string(),description:e.z.string().optional().nullable(),lastPublishedAt:e.z.string().optional().nullable(),lastPublishedBy:e.z.string().optional().nullable(),status:e.z.enum(["draft","active","inactive"])}),x=e.z.object({action:e.z.union([e.z.literal("create"),e.z.literal("read"),e.z.literal("update"),e.z.literal("delete")]).optional()}),K=e.z.union([e.z.object({type:e.z.literal("basic"),name:e.z.string(),attributes:x}),e.z.object({type:e.z.literal("resource"),name:e.z.string(),attributes:x,resourceType:e.z.string()})]),l=e.z.lazy(()=>e.z.object({rule:e.z.string(),resourceType:e.z.string(),params:e.z.record(e.z.any()).optional()}).or(e.z.object({anyOf:e.z.array(l).nonempty()})).or(e.z.object({allOf:e.z.array(l).nonempty()})).or(e.z.object({not:l}))),W=e.z.object({result:e.z.union([e.z.literal(a.AuthorizeResult.ALLOW),e.z.literal(a.AuthorizeResult.DENY)])}),Y=m.extend({result:e.z.literal(a.AuthorizeResult.CONDITIONAL),conditions:l}),F=e.z.union([W,Y]),G=o,E=o.extend({name:z.optional(),options:p.optional(),roles:P.optional()}),H=e.z.object({description:e.z.string().optional(),update:E.optional()}),J=e.z.object({decision:F,decisionOrigin:e.z.array(I)}),Q=e.z.object({permission:K,policyConfig:o,roleIds:e.z.array(e.z.string())}),X=e.z.object({id:e.z.string()}),_=e.z.object({authorized:e.z.boolean()}),S=e.z.object({name:e.z.string().optional(),type:e.z.enum(["user","group","all","unknown"]),entityRef:e.z.string()}),ee=e.z.object({members:e.z.array(S)}),se=e.z.object({items:e.z.array(M),nextCursor:e.z.string().optional(),prevCursor:e.z.string().optional(),totalItems:e.z.number()}),re=(r,s)=>s?s===r.name:!0,ie=(r,s)=>s?a.isResourcePermission(r)&&s===r.resourceType:!0,te=(r,s)=>s?s.some(i=>i===r.attributes.action):!0,k=(r,s)=>s==="*"?!0:re(r,s.name)&&ie(r,s.resourceType)&&te(r,s.actions),oe=(r,s)=>r.permissions.filter(({match:i})=>k(s,i)),ne=(r,s)=>r.kind!==s.kind||r.namespace!==s.namespace?!1:s.name==="*"?!0:r.name===s.name;function ae(r,s){const i={};if(r)for(const[t,n]of Object.entries(r))i[t]=s(n);return i}exports.AuthorizeResponseParser=_,exports.BackstageUserPlaceholder=U,exports.ConditionalDecisionParser=m,exports.CreateDraftRequestParser=G,exports.DefaultingPolicyConfigParser=B,exports.DraftResponseParser=X,exports.LiteralDecisionParser=D,exports.MemberResponseParser=S,exports.PermissionConditionParser=R,exports.PermissionDecisionParser=d,exports.PermissionMatchParser=C,exports.PolicyConfigOptionsParser=p,exports.PolicyConfigParser=o,exports.PolicyDefaultName=b,exports.PolicyParser=M,exports.PolicyResponseParser=se,exports.PolicyRoleResolutionStrategyParser=v,exports.PolicyTitleParser=z,exports.PublishVersionRequestParser=H,exports.RoleDecisionParser=I,exports.RoleParser=q,exports.RolePermissionParser=A,exports.RolePermissionsParser=O,exports.RolesParser=P,exports.SearchMemberResponseParser=ee,exports.TestPolicyDecisionRequestParser=Q,exports.TestPolicyDecisionResponseParser=J,exports.UpdateDraftRequestParser=E,exports.getMatchingRolePermissions=oe,exports.isAllOfPermissionCriteria=$,exports.isAnyOfPermissionCriteria=V,exports.isConditionalDecision=N,exports.isMatchingPermission=k,exports.isNotPermissionCriteria=Z,exports.mapParams=ae,exports.matchesEntityRef=ne;
1
+ "use strict";var s=require("./api.cjs.js"),r=require("./matching.cjs.js"),e=require("./schema.cjs.js"),i=require("./utils.cjs.js");exports.AuthorizeResponseParser=s.AuthorizeResponseParser,exports.CreateDraftRequestParser=s.CreateDraftRequestParser,exports.DraftResponseParser=s.DraftResponseParser,exports.MemberResponseParser=s.MemberResponseParser,exports.PolicyResponseParser=s.PolicyResponseParser,exports.PublishVersionRequestParser=s.PublishVersionRequestParser,exports.SearchMemberResponseParser=s.SearchMemberResponseParser,exports.TestPolicyDecisionRequestParser=s.TestPolicyDecisionRequestParser,exports.TestPolicyDecisionResponseParser=s.TestPolicyDecisionResponseParser,exports.UpdateDraftRequestParser=s.UpdateDraftRequestParser,exports.getMatchingRolePermissions=r.getMatchingRolePermissions,exports.isMatchingPermission=r.isMatchingPermission,exports.matchesEntityRef=r.matchesEntityRef,exports.BackstageUserPlaceholder=e.BackstageUserPlaceholder,exports.ConditionalDecisionParser=e.ConditionalDecisionParser,exports.DefaultingPolicyConfigParser=e.DefaultingPolicyConfigParser,exports.LiteralDecisionParser=e.LiteralDecisionParser,exports.PermissionConditionParser=e.PermissionConditionParser,exports.PermissionDecisionParser=e.PermissionDecisionParser,exports.PermissionMatchParser=e.PermissionMatchParser,exports.PolicyConfigOptionsParser=e.PolicyConfigOptionsParser,exports.PolicyConfigParser=e.PolicyConfigParser,exports.PolicyDefaultName=e.PolicyDefaultName,exports.PolicyParser=e.PolicyParser,exports.PolicyRoleResolutionStrategyParser=e.PolicyRoleResolutionStrategyParser,exports.PolicyTitleParser=e.PolicyTitleParser,exports.RoleDecisionParser=e.RoleDecisionParser,exports.RoleParser=e.RoleParser,exports.RolePermissionParser=e.RolePermissionParser,exports.RolePermissionsParser=e.RolePermissionsParser,exports.RolesParser=e.RolesParser,exports.isAllOfPermissionCriteria=e.isAllOfPermissionCriteria,exports.isAnyOfPermissionCriteria=e.isAnyOfPermissionCriteria,exports.isConditionalDecision=e.isConditionalDecision,exports.isNotPermissionCriteria=e.isNotPermissionCriteria,exports.mapParams=i.mapParams;
2
2
  //# sourceMappingURL=index.cjs.js.map
package/dist/index.d.ts CHANGED
@@ -1,3 +1,4 @@
1
+ import * as _backstage_plugin_permission_common_index from '@backstage/plugin-permission-common/index';
1
2
  import * as _backstage_plugin_permission_common from '@backstage/plugin-permission-common';
2
3
  import { PermissionCondition, PermissionCriteria, AllOfCriteria, AnyOfCriteria, NotCriteria, Permission, PermissionRuleParam, PermissionRuleParams } from '@backstage/plugin-permission-common';
3
4
  import { z } from 'zod';
@@ -1414,13 +1415,13 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1414
1415
  decision: z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"allow">, z.ZodLiteral<"deny">]>, z.ZodObject<{
1415
1416
  pluginId: z.ZodString;
1416
1417
  resourceType: z.ZodString;
1417
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>>;
1418
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>>;
1418
1419
  }, "strip", z.ZodTypeAny, {
1419
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1420
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1420
1421
  pluginId: string;
1421
1422
  resourceType: string;
1422
1423
  }, {
1423
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1424
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1424
1425
  pluginId: string;
1425
1426
  resourceType: string;
1426
1427
  }>]>;
@@ -1432,7 +1433,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1432
1433
  resourceType?: string | undefined;
1433
1434
  };
1434
1435
  decision: "allow" | {
1435
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1436
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1436
1437
  pluginId: string;
1437
1438
  resourceType: string;
1438
1439
  } | "deny";
@@ -1443,7 +1444,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1443
1444
  resourceType?: string | undefined;
1444
1445
  };
1445
1446
  decision: "allow" | {
1446
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1447
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1447
1448
  pluginId: string;
1448
1449
  resourceType: string;
1449
1450
  } | "deny";
@@ -1456,7 +1457,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1456
1457
  resourceType?: string | undefined;
1457
1458
  };
1458
1459
  decision: "allow" | {
1459
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1460
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1460
1461
  pluginId: string;
1461
1462
  resourceType: string;
1462
1463
  } | "deny";
@@ -1467,7 +1468,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1467
1468
  resourceType?: string | undefined;
1468
1469
  };
1469
1470
  decision: "allow" | {
1470
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1471
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1471
1472
  pluginId: string;
1472
1473
  resourceType: string;
1473
1474
  } | "deny";
@@ -1480,7 +1481,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1480
1481
  resourceType?: string | undefined;
1481
1482
  };
1482
1483
  decision: "allow" | {
1483
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1484
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1484
1485
  pluginId: string;
1485
1486
  resourceType: string;
1486
1487
  } | "deny";
@@ -1491,7 +1492,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1491
1492
  resourceType?: string | undefined;
1492
1493
  };
1493
1494
  decision: "allow" | {
1494
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1495
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1495
1496
  pluginId: string;
1496
1497
  resourceType: string;
1497
1498
  } | "deny";
@@ -1509,7 +1510,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1509
1510
  resourceType?: string | undefined;
1510
1511
  };
1511
1512
  decision: "allow" | {
1512
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1513
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1513
1514
  pluginId: string;
1514
1515
  resourceType: string;
1515
1516
  } | "deny";
@@ -1524,7 +1525,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1524
1525
  resourceType?: string | undefined;
1525
1526
  };
1526
1527
  decision: "allow" | {
1527
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1528
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1528
1529
  pluginId: string;
1529
1530
  resourceType: string;
1530
1531
  } | "deny";
@@ -1543,7 +1544,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1543
1544
  resourceType?: string | undefined;
1544
1545
  };
1545
1546
  decision: "allow" | {
1546
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1547
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1547
1548
  pluginId: string;
1548
1549
  resourceType: string;
1549
1550
  } | "deny";
@@ -1558,7 +1559,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1558
1559
  resourceType?: string | undefined;
1559
1560
  };
1560
1561
  decision: "allow" | {
1561
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1562
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1562
1563
  pluginId: string;
1563
1564
  resourceType: string;
1564
1565
  } | "deny";
@@ -1583,7 +1584,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1583
1584
  resourceType?: string | undefined;
1584
1585
  };
1585
1586
  decision: "allow" | {
1586
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1587
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1587
1588
  pluginId: string;
1588
1589
  resourceType: string;
1589
1590
  } | "deny";
@@ -1604,7 +1605,7 @@ declare const CreateDraftRequestParser: z.ZodObject<{
1604
1605
  resourceType?: string | undefined;
1605
1606
  };
1606
1607
  decision: "allow" | {
1607
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1608
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1608
1609
  pluginId: string;
1609
1610
  resourceType: string;
1610
1611
  } | "deny";
@@ -1645,13 +1646,13 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1645
1646
  decision: z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"allow">, z.ZodLiteral<"deny">]>, z.ZodObject<{
1646
1647
  pluginId: z.ZodString;
1647
1648
  resourceType: z.ZodString;
1648
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>>;
1649
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>>;
1649
1650
  }, "strip", z.ZodTypeAny, {
1650
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1651
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1651
1652
  pluginId: string;
1652
1653
  resourceType: string;
1653
1654
  }, {
1654
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1655
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1655
1656
  pluginId: string;
1656
1657
  resourceType: string;
1657
1658
  }>]>;
@@ -1663,7 +1664,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1663
1664
  resourceType?: string | undefined;
1664
1665
  };
1665
1666
  decision: "allow" | {
1666
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1667
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1667
1668
  pluginId: string;
1668
1669
  resourceType: string;
1669
1670
  } | "deny";
@@ -1674,7 +1675,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1674
1675
  resourceType?: string | undefined;
1675
1676
  };
1676
1677
  decision: "allow" | {
1677
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1678
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1678
1679
  pluginId: string;
1679
1680
  resourceType: string;
1680
1681
  } | "deny";
@@ -1687,7 +1688,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1687
1688
  resourceType?: string | undefined;
1688
1689
  };
1689
1690
  decision: "allow" | {
1690
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1691
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1691
1692
  pluginId: string;
1692
1693
  resourceType: string;
1693
1694
  } | "deny";
@@ -1698,7 +1699,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1698
1699
  resourceType?: string | undefined;
1699
1700
  };
1700
1701
  decision: "allow" | {
1701
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1702
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1702
1703
  pluginId: string;
1703
1704
  resourceType: string;
1704
1705
  } | "deny";
@@ -1711,7 +1712,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1711
1712
  resourceType?: string | undefined;
1712
1713
  };
1713
1714
  decision: "allow" | {
1714
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1715
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1715
1716
  pluginId: string;
1716
1717
  resourceType: string;
1717
1718
  } | "deny";
@@ -1722,7 +1723,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1722
1723
  resourceType?: string | undefined;
1723
1724
  };
1724
1725
  decision: "allow" | {
1725
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1726
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1726
1727
  pluginId: string;
1727
1728
  resourceType: string;
1728
1729
  } | "deny";
@@ -1740,7 +1741,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1740
1741
  resourceType?: string | undefined;
1741
1742
  };
1742
1743
  decision: "allow" | {
1743
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1744
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1744
1745
  pluginId: string;
1745
1746
  resourceType: string;
1746
1747
  } | "deny";
@@ -1755,7 +1756,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1755
1756
  resourceType?: string | undefined;
1756
1757
  };
1757
1758
  decision: "allow" | {
1758
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1759
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1759
1760
  pluginId: string;
1760
1761
  resourceType: string;
1761
1762
  } | "deny";
@@ -1774,7 +1775,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1774
1775
  resourceType?: string | undefined;
1775
1776
  };
1776
1777
  decision: "allow" | {
1777
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1778
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1778
1779
  pluginId: string;
1779
1780
  resourceType: string;
1780
1781
  } | "deny";
@@ -1789,7 +1790,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1789
1790
  resourceType?: string | undefined;
1790
1791
  };
1791
1792
  decision: "allow" | {
1792
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1793
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1793
1794
  pluginId: string;
1794
1795
  resourceType: string;
1795
1796
  } | "deny";
@@ -1828,13 +1829,13 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1828
1829
  decision: z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"allow">, z.ZodLiteral<"deny">]>, z.ZodObject<{
1829
1830
  pluginId: z.ZodString;
1830
1831
  resourceType: z.ZodString;
1831
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>>;
1832
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>>;
1832
1833
  }, "strip", z.ZodTypeAny, {
1833
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1834
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1834
1835
  pluginId: string;
1835
1836
  resourceType: string;
1836
1837
  }, {
1837
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1838
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1838
1839
  pluginId: string;
1839
1840
  resourceType: string;
1840
1841
  }>]>;
@@ -1846,7 +1847,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1846
1847
  resourceType?: string | undefined;
1847
1848
  };
1848
1849
  decision: "allow" | {
1849
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1850
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1850
1851
  pluginId: string;
1851
1852
  resourceType: string;
1852
1853
  } | "deny";
@@ -1857,7 +1858,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1857
1858
  resourceType?: string | undefined;
1858
1859
  };
1859
1860
  decision: "allow" | {
1860
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1861
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1861
1862
  pluginId: string;
1862
1863
  resourceType: string;
1863
1864
  } | "deny";
@@ -1870,7 +1871,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1870
1871
  resourceType?: string | undefined;
1871
1872
  };
1872
1873
  decision: "allow" | {
1873
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1874
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1874
1875
  pluginId: string;
1875
1876
  resourceType: string;
1876
1877
  } | "deny";
@@ -1881,7 +1882,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1881
1882
  resourceType?: string | undefined;
1882
1883
  };
1883
1884
  decision: "allow" | {
1884
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1885
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1885
1886
  pluginId: string;
1886
1887
  resourceType: string;
1887
1888
  } | "deny";
@@ -1894,7 +1895,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1894
1895
  resourceType?: string | undefined;
1895
1896
  };
1896
1897
  decision: "allow" | {
1897
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1898
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1898
1899
  pluginId: string;
1899
1900
  resourceType: string;
1900
1901
  } | "deny";
@@ -1905,7 +1906,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1905
1906
  resourceType?: string | undefined;
1906
1907
  };
1907
1908
  decision: "allow" | {
1908
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1909
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1909
1910
  pluginId: string;
1910
1911
  resourceType: string;
1911
1912
  } | "deny";
@@ -1923,7 +1924,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1923
1924
  resourceType?: string | undefined;
1924
1925
  };
1925
1926
  decision: "allow" | {
1926
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1927
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1927
1928
  pluginId: string;
1928
1929
  resourceType: string;
1929
1930
  } | "deny";
@@ -1938,7 +1939,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1938
1939
  resourceType?: string | undefined;
1939
1940
  };
1940
1941
  decision: "allow" | {
1941
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1942
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1942
1943
  pluginId: string;
1943
1944
  resourceType: string;
1944
1945
  } | "deny";
@@ -1957,7 +1958,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1957
1958
  resourceType?: string | undefined;
1958
1959
  };
1959
1960
  decision: "allow" | {
1960
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1961
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1961
1962
  pluginId: string;
1962
1963
  resourceType: string;
1963
1964
  } | "deny";
@@ -1972,7 +1973,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1972
1973
  resourceType?: string | undefined;
1973
1974
  };
1974
1975
  decision: "allow" | {
1975
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
1976
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
1976
1977
  pluginId: string;
1977
1978
  resourceType: string;
1978
1979
  } | "deny";
@@ -1997,7 +1998,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
1997
1998
  resourceType?: string | undefined;
1998
1999
  };
1999
2000
  decision: "allow" | {
2000
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2001
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2001
2002
  pluginId: string;
2002
2003
  resourceType: string;
2003
2004
  } | "deny";
@@ -2018,7 +2019,7 @@ declare const UpdateDraftRequestParser: z.ZodObject<z.objectUtil.extendShape<{
2018
2019
  resourceType?: string | undefined;
2019
2020
  };
2020
2021
  decision: "allow" | {
2021
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2022
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2022
2023
  pluginId: string;
2023
2024
  resourceType: string;
2024
2025
  } | "deny";
@@ -2061,13 +2062,13 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2061
2062
  decision: z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"allow">, z.ZodLiteral<"deny">]>, z.ZodObject<{
2062
2063
  pluginId: z.ZodString;
2063
2064
  resourceType: z.ZodString;
2064
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>>;
2065
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>>;
2065
2066
  }, "strip", z.ZodTypeAny, {
2066
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2067
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2067
2068
  pluginId: string;
2068
2069
  resourceType: string;
2069
2070
  }, {
2070
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2071
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2071
2072
  pluginId: string;
2072
2073
  resourceType: string;
2073
2074
  }>]>;
@@ -2079,7 +2080,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2079
2080
  resourceType?: string | undefined;
2080
2081
  };
2081
2082
  decision: "allow" | {
2082
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2083
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2083
2084
  pluginId: string;
2084
2085
  resourceType: string;
2085
2086
  } | "deny";
@@ -2090,7 +2091,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2090
2091
  resourceType?: string | undefined;
2091
2092
  };
2092
2093
  decision: "allow" | {
2093
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2094
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2094
2095
  pluginId: string;
2095
2096
  resourceType: string;
2096
2097
  } | "deny";
@@ -2103,7 +2104,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2103
2104
  resourceType?: string | undefined;
2104
2105
  };
2105
2106
  decision: "allow" | {
2106
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2107
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2107
2108
  pluginId: string;
2108
2109
  resourceType: string;
2109
2110
  } | "deny";
@@ -2114,7 +2115,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2114
2115
  resourceType?: string | undefined;
2115
2116
  };
2116
2117
  decision: "allow" | {
2117
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2118
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2118
2119
  pluginId: string;
2119
2120
  resourceType: string;
2120
2121
  } | "deny";
@@ -2127,7 +2128,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2127
2128
  resourceType?: string | undefined;
2128
2129
  };
2129
2130
  decision: "allow" | {
2130
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2131
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2131
2132
  pluginId: string;
2132
2133
  resourceType: string;
2133
2134
  } | "deny";
@@ -2138,7 +2139,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2138
2139
  resourceType?: string | undefined;
2139
2140
  };
2140
2141
  decision: "allow" | {
2141
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2142
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2142
2143
  pluginId: string;
2143
2144
  resourceType: string;
2144
2145
  } | "deny";
@@ -2156,7 +2157,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2156
2157
  resourceType?: string | undefined;
2157
2158
  };
2158
2159
  decision: "allow" | {
2159
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2160
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2160
2161
  pluginId: string;
2161
2162
  resourceType: string;
2162
2163
  } | "deny";
@@ -2171,7 +2172,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2171
2172
  resourceType?: string | undefined;
2172
2173
  };
2173
2174
  decision: "allow" | {
2174
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2175
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2175
2176
  pluginId: string;
2176
2177
  resourceType: string;
2177
2178
  } | "deny";
@@ -2190,7 +2191,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2190
2191
  resourceType?: string | undefined;
2191
2192
  };
2192
2193
  decision: "allow" | {
2193
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2194
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2194
2195
  pluginId: string;
2195
2196
  resourceType: string;
2196
2197
  } | "deny";
@@ -2205,7 +2206,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2205
2206
  resourceType?: string | undefined;
2206
2207
  };
2207
2208
  decision: "allow" | {
2208
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2209
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2209
2210
  pluginId: string;
2210
2211
  resourceType: string;
2211
2212
  } | "deny";
@@ -2244,13 +2245,13 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2244
2245
  decision: z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"allow">, z.ZodLiteral<"deny">]>, z.ZodObject<{
2245
2246
  pluginId: z.ZodString;
2246
2247
  resourceType: z.ZodString;
2247
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>>;
2248
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>>;
2248
2249
  }, "strip", z.ZodTypeAny, {
2249
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2250
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2250
2251
  pluginId: string;
2251
2252
  resourceType: string;
2252
2253
  }, {
2253
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2254
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2254
2255
  pluginId: string;
2255
2256
  resourceType: string;
2256
2257
  }>]>;
@@ -2262,7 +2263,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2262
2263
  resourceType?: string | undefined;
2263
2264
  };
2264
2265
  decision: "allow" | {
2265
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2266
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2266
2267
  pluginId: string;
2267
2268
  resourceType: string;
2268
2269
  } | "deny";
@@ -2273,7 +2274,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2273
2274
  resourceType?: string | undefined;
2274
2275
  };
2275
2276
  decision: "allow" | {
2276
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2277
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2277
2278
  pluginId: string;
2278
2279
  resourceType: string;
2279
2280
  } | "deny";
@@ -2286,7 +2287,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2286
2287
  resourceType?: string | undefined;
2287
2288
  };
2288
2289
  decision: "allow" | {
2289
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2290
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2290
2291
  pluginId: string;
2291
2292
  resourceType: string;
2292
2293
  } | "deny";
@@ -2297,7 +2298,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2297
2298
  resourceType?: string | undefined;
2298
2299
  };
2299
2300
  decision: "allow" | {
2300
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2301
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2301
2302
  pluginId: string;
2302
2303
  resourceType: string;
2303
2304
  } | "deny";
@@ -2310,7 +2311,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2310
2311
  resourceType?: string | undefined;
2311
2312
  };
2312
2313
  decision: "allow" | {
2313
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2314
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2314
2315
  pluginId: string;
2315
2316
  resourceType: string;
2316
2317
  } | "deny";
@@ -2321,7 +2322,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2321
2322
  resourceType?: string | undefined;
2322
2323
  };
2323
2324
  decision: "allow" | {
2324
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2325
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2325
2326
  pluginId: string;
2326
2327
  resourceType: string;
2327
2328
  } | "deny";
@@ -2339,7 +2340,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2339
2340
  resourceType?: string | undefined;
2340
2341
  };
2341
2342
  decision: "allow" | {
2342
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2343
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2343
2344
  pluginId: string;
2344
2345
  resourceType: string;
2345
2346
  } | "deny";
@@ -2354,7 +2355,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2354
2355
  resourceType?: string | undefined;
2355
2356
  };
2356
2357
  decision: "allow" | {
2357
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2358
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2358
2359
  pluginId: string;
2359
2360
  resourceType: string;
2360
2361
  } | "deny";
@@ -2373,7 +2374,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2373
2374
  resourceType?: string | undefined;
2374
2375
  };
2375
2376
  decision: "allow" | {
2376
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2377
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2377
2378
  pluginId: string;
2378
2379
  resourceType: string;
2379
2380
  } | "deny";
@@ -2388,7 +2389,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2388
2389
  resourceType?: string | undefined;
2389
2390
  };
2390
2391
  decision: "allow" | {
2391
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2392
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2392
2393
  pluginId: string;
2393
2394
  resourceType: string;
2394
2395
  } | "deny";
@@ -2413,7 +2414,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2413
2414
  resourceType?: string | undefined;
2414
2415
  };
2415
2416
  decision: "allow" | {
2416
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2417
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2417
2418
  pluginId: string;
2418
2419
  resourceType: string;
2419
2420
  } | "deny";
@@ -2434,7 +2435,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2434
2435
  resourceType?: string | undefined;
2435
2436
  };
2436
2437
  decision: "allow" | {
2437
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2438
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2438
2439
  pluginId: string;
2439
2440
  resourceType: string;
2440
2441
  } | "deny";
@@ -2462,7 +2463,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2462
2463
  resourceType?: string | undefined;
2463
2464
  };
2464
2465
  decision: "allow" | {
2465
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2466
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2466
2467
  pluginId: string;
2467
2468
  resourceType: string;
2468
2469
  } | "deny";
@@ -2486,7 +2487,7 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2486
2487
  resourceType?: string | undefined;
2487
2488
  };
2488
2489
  decision: "allow" | {
2489
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2490
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2490
2491
  pluginId: string;
2491
2492
  resourceType: string;
2492
2493
  } | "deny";
@@ -2499,26 +2500,26 @@ declare const PublishVersionRequestParser: z.ZodObject<{
2499
2500
  /** @public */
2500
2501
  declare const TestPolicyDecisionResponseParser: z.ZodObject<{
2501
2502
  decision: z.ZodUnion<[z.ZodObject<{
2502
- result: z.ZodUnion<[z.ZodLiteral<_backstage_plugin_permission_common.AuthorizeResult.ALLOW>, z.ZodLiteral<_backstage_plugin_permission_common.AuthorizeResult.DENY>]>;
2503
+ result: z.ZodUnion<[z.ZodLiteral<_backstage_plugin_permission_common_index.AuthorizeResult.ALLOW>, z.ZodLiteral<_backstage_plugin_permission_common_index.AuthorizeResult.DENY>]>;
2503
2504
  }, "strip", z.ZodTypeAny, {
2504
- result: _backstage_plugin_permission_common.AuthorizeResult.DENY | _backstage_plugin_permission_common.AuthorizeResult.ALLOW;
2505
+ result: _backstage_plugin_permission_common_index.AuthorizeResult.DENY | _backstage_plugin_permission_common_index.AuthorizeResult.ALLOW;
2505
2506
  }, {
2506
- result: _backstage_plugin_permission_common.AuthorizeResult.DENY | _backstage_plugin_permission_common.AuthorizeResult.ALLOW;
2507
+ result: _backstage_plugin_permission_common_index.AuthorizeResult.DENY | _backstage_plugin_permission_common_index.AuthorizeResult.ALLOW;
2507
2508
  }>, z.ZodObject<z.objectUtil.extendShape<{
2508
2509
  pluginId: z.ZodString;
2509
2510
  resourceType: z.ZodString;
2510
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>>;
2511
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>>;
2511
2512
  }, {
2512
- result: z.ZodLiteral<_backstage_plugin_permission_common.AuthorizeResult.CONDITIONAL>;
2513
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<_backstage_plugin_permission_common.PermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<_backstage_plugin_permission_common.PermissionCondition>>;
2513
+ result: z.ZodLiteral<_backstage_plugin_permission_common_index.AuthorizeResult.CONDITIONAL>;
2514
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<_backstage_plugin_permission_common_index.PermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<_backstage_plugin_permission_common_index.PermissionCondition>>;
2514
2515
  }>, "strip", z.ZodTypeAny, {
2515
- result: _backstage_plugin_permission_common.AuthorizeResult.CONDITIONAL;
2516
- conditions: _backstage_plugin_permission_common.PermissionCriteria<_backstage_plugin_permission_common.PermissionCondition>;
2516
+ result: _backstage_plugin_permission_common_index.AuthorizeResult.CONDITIONAL;
2517
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<_backstage_plugin_permission_common_index.PermissionCondition>;
2517
2518
  pluginId: string;
2518
2519
  resourceType: string;
2519
2520
  }, {
2520
- result: _backstage_plugin_permission_common.AuthorizeResult.CONDITIONAL;
2521
- conditions: _backstage_plugin_permission_common.PermissionCriteria<_backstage_plugin_permission_common.PermissionCondition>;
2521
+ result: _backstage_plugin_permission_common_index.AuthorizeResult.CONDITIONAL;
2522
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<_backstage_plugin_permission_common_index.PermissionCondition>;
2522
2523
  pluginId: string;
2523
2524
  resourceType: string;
2524
2525
  }>]>;
@@ -2526,13 +2527,13 @@ declare const TestPolicyDecisionResponseParser: z.ZodObject<{
2526
2527
  decision: z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"allow">, z.ZodLiteral<"deny">]>, z.ZodObject<{
2527
2528
  pluginId: z.ZodString;
2528
2529
  resourceType: z.ZodString;
2529
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>>;
2530
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>>;
2530
2531
  }, "strip", z.ZodTypeAny, {
2531
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2532
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2532
2533
  pluginId: string;
2533
2534
  resourceType: string;
2534
2535
  }, {
2535
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2536
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2536
2537
  pluginId: string;
2537
2538
  resourceType: string;
2538
2539
  }>]>;
@@ -2540,7 +2541,7 @@ declare const TestPolicyDecisionResponseParser: z.ZodObject<{
2540
2541
  rolePermissionId: z.ZodDefault<z.ZodString>;
2541
2542
  }, "strip", z.ZodTypeAny, {
2542
2543
  decision: "allow" | {
2543
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2544
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2544
2545
  pluginId: string;
2545
2546
  resourceType: string;
2546
2547
  } | "deny";
@@ -2548,7 +2549,7 @@ declare const TestPolicyDecisionResponseParser: z.ZodObject<{
2548
2549
  rolePermissionId: string;
2549
2550
  }, {
2550
2551
  decision: "allow" | {
2551
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2552
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2552
2553
  pluginId: string;
2553
2554
  resourceType: string;
2554
2555
  } | "deny";
@@ -2557,16 +2558,16 @@ declare const TestPolicyDecisionResponseParser: z.ZodObject<{
2557
2558
  }>, "many">;
2558
2559
  }, "strip", z.ZodTypeAny, {
2559
2560
  decision: {
2560
- result: _backstage_plugin_permission_common.AuthorizeResult.DENY | _backstage_plugin_permission_common.AuthorizeResult.ALLOW;
2561
+ result: _backstage_plugin_permission_common_index.AuthorizeResult.DENY | _backstage_plugin_permission_common_index.AuthorizeResult.ALLOW;
2561
2562
  } | {
2562
- result: _backstage_plugin_permission_common.AuthorizeResult.CONDITIONAL;
2563
- conditions: _backstage_plugin_permission_common.PermissionCriteria<_backstage_plugin_permission_common.PermissionCondition>;
2563
+ result: _backstage_plugin_permission_common_index.AuthorizeResult.CONDITIONAL;
2564
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<_backstage_plugin_permission_common_index.PermissionCondition>;
2564
2565
  pluginId: string;
2565
2566
  resourceType: string;
2566
2567
  };
2567
2568
  decisionOrigin: {
2568
2569
  decision: "allow" | {
2569
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2570
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2570
2571
  pluginId: string;
2571
2572
  resourceType: string;
2572
2573
  } | "deny";
@@ -2575,16 +2576,16 @@ declare const TestPolicyDecisionResponseParser: z.ZodObject<{
2575
2576
  }[];
2576
2577
  }, {
2577
2578
  decision: {
2578
- result: _backstage_plugin_permission_common.AuthorizeResult.DENY | _backstage_plugin_permission_common.AuthorizeResult.ALLOW;
2579
+ result: _backstage_plugin_permission_common_index.AuthorizeResult.DENY | _backstage_plugin_permission_common_index.AuthorizeResult.ALLOW;
2579
2580
  } | {
2580
- result: _backstage_plugin_permission_common.AuthorizeResult.CONDITIONAL;
2581
- conditions: _backstage_plugin_permission_common.PermissionCriteria<_backstage_plugin_permission_common.PermissionCondition>;
2581
+ result: _backstage_plugin_permission_common_index.AuthorizeResult.CONDITIONAL;
2582
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<_backstage_plugin_permission_common_index.PermissionCondition>;
2582
2583
  pluginId: string;
2583
2584
  resourceType: string;
2584
2585
  };
2585
2586
  decisionOrigin: {
2586
2587
  decision: "allow" | {
2587
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2588
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2588
2589
  pluginId: string;
2589
2590
  resourceType: string;
2590
2591
  } | "deny";
@@ -2597,29 +2598,29 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2597
2598
  permission: z.ZodUnion<[z.ZodObject<{
2598
2599
  type: z.ZodLiteral<"basic">;
2599
2600
  name: z.ZodString;
2600
- attributes: z.ZodType<_backstage_plugin_permission_common.PermissionAttributes, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionAttributes>;
2601
+ attributes: z.ZodType<_backstage_plugin_permission_common_index.PermissionAttributes, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionAttributes>;
2601
2602
  }, "strip", z.ZodTypeAny, {
2602
2603
  type: "basic";
2603
2604
  name: string;
2604
- attributes: _backstage_plugin_permission_common.PermissionAttributes;
2605
+ attributes: _backstage_plugin_permission_common_index.PermissionAttributes;
2605
2606
  }, {
2606
2607
  type: "basic";
2607
2608
  name: string;
2608
- attributes: _backstage_plugin_permission_common.PermissionAttributes;
2609
+ attributes: _backstage_plugin_permission_common_index.PermissionAttributes;
2609
2610
  }>, z.ZodObject<{
2610
2611
  type: z.ZodLiteral<"resource">;
2611
2612
  name: z.ZodString;
2612
- attributes: z.ZodType<_backstage_plugin_permission_common.PermissionAttributes, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionAttributes>;
2613
+ attributes: z.ZodType<_backstage_plugin_permission_common_index.PermissionAttributes, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionAttributes>;
2613
2614
  resourceType: z.ZodString;
2614
2615
  }, "strip", z.ZodTypeAny, {
2615
2616
  type: "resource";
2616
2617
  name: string;
2617
- attributes: _backstage_plugin_permission_common.PermissionAttributes;
2618
+ attributes: _backstage_plugin_permission_common_index.PermissionAttributes;
2618
2619
  resourceType: string;
2619
2620
  }, {
2620
2621
  type: "resource";
2621
2622
  name: string;
2622
- attributes: _backstage_plugin_permission_common.PermissionAttributes;
2623
+ attributes: _backstage_plugin_permission_common_index.PermissionAttributes;
2623
2624
  resourceType: string;
2624
2625
  }>]>;
2625
2626
  policyConfig: z.ZodObject<{
@@ -2653,13 +2654,13 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2653
2654
  decision: z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"allow">, z.ZodLiteral<"deny">]>, z.ZodObject<{
2654
2655
  pluginId: z.ZodString;
2655
2656
  resourceType: z.ZodString;
2656
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>>;
2657
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>>;
2657
2658
  }, "strip", z.ZodTypeAny, {
2658
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2659
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2659
2660
  pluginId: string;
2660
2661
  resourceType: string;
2661
2662
  }, {
2662
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2663
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2663
2664
  pluginId: string;
2664
2665
  resourceType: string;
2665
2666
  }>]>;
@@ -2671,7 +2672,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2671
2672
  resourceType?: string | undefined;
2672
2673
  };
2673
2674
  decision: "allow" | {
2674
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2675
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2675
2676
  pluginId: string;
2676
2677
  resourceType: string;
2677
2678
  } | "deny";
@@ -2682,7 +2683,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2682
2683
  resourceType?: string | undefined;
2683
2684
  };
2684
2685
  decision: "allow" | {
2685
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2686
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2686
2687
  pluginId: string;
2687
2688
  resourceType: string;
2688
2689
  } | "deny";
@@ -2695,7 +2696,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2695
2696
  resourceType?: string | undefined;
2696
2697
  };
2697
2698
  decision: "allow" | {
2698
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2699
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2699
2700
  pluginId: string;
2700
2701
  resourceType: string;
2701
2702
  } | "deny";
@@ -2706,7 +2707,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2706
2707
  resourceType?: string | undefined;
2707
2708
  };
2708
2709
  decision: "allow" | {
2709
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2710
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2710
2711
  pluginId: string;
2711
2712
  resourceType: string;
2712
2713
  } | "deny";
@@ -2719,7 +2720,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2719
2720
  resourceType?: string | undefined;
2720
2721
  };
2721
2722
  decision: "allow" | {
2722
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2723
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2723
2724
  pluginId: string;
2724
2725
  resourceType: string;
2725
2726
  } | "deny";
@@ -2730,7 +2731,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2730
2731
  resourceType?: string | undefined;
2731
2732
  };
2732
2733
  decision: "allow" | {
2733
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2734
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2734
2735
  pluginId: string;
2735
2736
  resourceType: string;
2736
2737
  } | "deny";
@@ -2748,7 +2749,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2748
2749
  resourceType?: string | undefined;
2749
2750
  };
2750
2751
  decision: "allow" | {
2751
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2752
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2752
2753
  pluginId: string;
2753
2754
  resourceType: string;
2754
2755
  } | "deny";
@@ -2763,7 +2764,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2763
2764
  resourceType?: string | undefined;
2764
2765
  };
2765
2766
  decision: "allow" | {
2766
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2767
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2767
2768
  pluginId: string;
2768
2769
  resourceType: string;
2769
2770
  } | "deny";
@@ -2782,7 +2783,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2782
2783
  resourceType?: string | undefined;
2783
2784
  };
2784
2785
  decision: "allow" | {
2785
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2786
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2786
2787
  pluginId: string;
2787
2788
  resourceType: string;
2788
2789
  } | "deny";
@@ -2797,7 +2798,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2797
2798
  resourceType?: string | undefined;
2798
2799
  };
2799
2800
  decision: "allow" | {
2800
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2801
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2801
2802
  pluginId: string;
2802
2803
  resourceType: string;
2803
2804
  } | "deny";
@@ -2822,7 +2823,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2822
2823
  resourceType?: string | undefined;
2823
2824
  };
2824
2825
  decision: "allow" | {
2825
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2826
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2826
2827
  pluginId: string;
2827
2828
  resourceType: string;
2828
2829
  } | "deny";
@@ -2843,7 +2844,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2843
2844
  resourceType?: string | undefined;
2844
2845
  };
2845
2846
  decision: "allow" | {
2846
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2847
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2847
2848
  pluginId: string;
2848
2849
  resourceType: string;
2849
2850
  } | "deny";
@@ -2857,11 +2858,11 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2857
2858
  permission: {
2858
2859
  type: "basic";
2859
2860
  name: string;
2860
- attributes: _backstage_plugin_permission_common.PermissionAttributes;
2861
+ attributes: _backstage_plugin_permission_common_index.PermissionAttributes;
2861
2862
  } | {
2862
2863
  type: "resource";
2863
2864
  name: string;
2864
- attributes: _backstage_plugin_permission_common.PermissionAttributes;
2865
+ attributes: _backstage_plugin_permission_common_index.PermissionAttributes;
2865
2866
  resourceType: string;
2866
2867
  };
2867
2868
  policyConfig: {
@@ -2881,7 +2882,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2881
2882
  resourceType?: string | undefined;
2882
2883
  };
2883
2884
  decision: "allow" | {
2884
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2885
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2885
2886
  pluginId: string;
2886
2887
  resourceType: string;
2887
2888
  } | "deny";
@@ -2893,11 +2894,11 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2893
2894
  permission: {
2894
2895
  type: "basic";
2895
2896
  name: string;
2896
- attributes: _backstage_plugin_permission_common.PermissionAttributes;
2897
+ attributes: _backstage_plugin_permission_common_index.PermissionAttributes;
2897
2898
  } | {
2898
2899
  type: "resource";
2899
2900
  name: string;
2900
- attributes: _backstage_plugin_permission_common.PermissionAttributes;
2901
+ attributes: _backstage_plugin_permission_common_index.PermissionAttributes;
2901
2902
  resourceType: string;
2902
2903
  };
2903
2904
  policyConfig: {
@@ -2915,7 +2916,7 @@ declare const TestPolicyDecisionRequestParser: z.ZodObject<{
2915
2916
  resourceType?: string | undefined;
2916
2917
  };
2917
2918
  decision: "allow" | {
2918
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
2919
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
2919
2920
  pluginId: string;
2920
2921
  resourceType: string;
2921
2922
  } | "deny";
@@ -3051,13 +3052,13 @@ declare const PolicyResponseParser: z.ZodObject<{
3051
3052
  decision: z.ZodUnion<[z.ZodUnion<[z.ZodLiteral<"allow">, z.ZodLiteral<"deny">]>, z.ZodObject<{
3052
3053
  pluginId: z.ZodString;
3053
3054
  resourceType: z.ZodString;
3054
- conditions: z.ZodType<_backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>>;
3055
+ conditions: z.ZodType<_backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>, z.ZodTypeDef, _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>>;
3055
3056
  }, "strip", z.ZodTypeAny, {
3056
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3057
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3057
3058
  pluginId: string;
3058
3059
  resourceType: string;
3059
3060
  }, {
3060
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3061
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3061
3062
  pluginId: string;
3062
3063
  resourceType: string;
3063
3064
  }>]>;
@@ -3069,7 +3070,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3069
3070
  resourceType?: string | undefined;
3070
3071
  };
3071
3072
  decision: "allow" | {
3072
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3073
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3073
3074
  pluginId: string;
3074
3075
  resourceType: string;
3075
3076
  } | "deny";
@@ -3080,7 +3081,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3080
3081
  resourceType?: string | undefined;
3081
3082
  };
3082
3083
  decision: "allow" | {
3083
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3084
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3084
3085
  pluginId: string;
3085
3086
  resourceType: string;
3086
3087
  } | "deny";
@@ -3093,7 +3094,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3093
3094
  resourceType?: string | undefined;
3094
3095
  };
3095
3096
  decision: "allow" | {
3096
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3097
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3097
3098
  pluginId: string;
3098
3099
  resourceType: string;
3099
3100
  } | "deny";
@@ -3104,7 +3105,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3104
3105
  resourceType?: string | undefined;
3105
3106
  };
3106
3107
  decision: "allow" | {
3107
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3108
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3108
3109
  pluginId: string;
3109
3110
  resourceType: string;
3110
3111
  } | "deny";
@@ -3117,7 +3118,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3117
3118
  resourceType?: string | undefined;
3118
3119
  };
3119
3120
  decision: "allow" | {
3120
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3121
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3121
3122
  pluginId: string;
3122
3123
  resourceType: string;
3123
3124
  } | "deny";
@@ -3128,7 +3129,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3128
3129
  resourceType?: string | undefined;
3129
3130
  };
3130
3131
  decision: "allow" | {
3131
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3132
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3132
3133
  pluginId: string;
3133
3134
  resourceType: string;
3134
3135
  } | "deny";
@@ -3146,7 +3147,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3146
3147
  resourceType?: string | undefined;
3147
3148
  };
3148
3149
  decision: "allow" | {
3149
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3150
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3150
3151
  pluginId: string;
3151
3152
  resourceType: string;
3152
3153
  } | "deny";
@@ -3161,7 +3162,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3161
3162
  resourceType?: string | undefined;
3162
3163
  };
3163
3164
  decision: "allow" | {
3164
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3165
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3165
3166
  pluginId: string;
3166
3167
  resourceType: string;
3167
3168
  } | "deny";
@@ -3180,7 +3181,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3180
3181
  resourceType?: string | undefined;
3181
3182
  };
3182
3183
  decision: "allow" | {
3183
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3184
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3184
3185
  pluginId: string;
3185
3186
  resourceType: string;
3186
3187
  } | "deny";
@@ -3195,7 +3196,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3195
3196
  resourceType?: string | undefined;
3196
3197
  };
3197
3198
  decision: "allow" | {
3198
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3199
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3199
3200
  pluginId: string;
3200
3201
  resourceType: string;
3201
3202
  } | "deny";
@@ -3234,7 +3235,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3234
3235
  resourceType?: string | undefined;
3235
3236
  };
3236
3237
  decision: "allow" | {
3237
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3238
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3238
3239
  pluginId: string;
3239
3240
  resourceType: string;
3240
3241
  } | "deny";
@@ -3267,7 +3268,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3267
3268
  resourceType?: string | undefined;
3268
3269
  };
3269
3270
  decision: "allow" | {
3270
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3271
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3271
3272
  pluginId: string;
3272
3273
  resourceType: string;
3273
3274
  } | "deny";
@@ -3303,7 +3304,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3303
3304
  resourceType?: string | undefined;
3304
3305
  };
3305
3306
  decision: "allow" | {
3306
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3307
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3307
3308
  pluginId: string;
3308
3309
  resourceType: string;
3309
3310
  } | "deny";
@@ -3341,7 +3342,7 @@ declare const PolicyResponseParser: z.ZodObject<{
3341
3342
  resourceType?: string | undefined;
3342
3343
  };
3343
3344
  decision: "allow" | {
3344
- conditions: _backstage_plugin_permission_common.PermissionCriteria<RBACPermissionCondition>;
3345
+ conditions: _backstage_plugin_permission_common_index.PermissionCriteria<RBACPermissionCondition>;
3345
3346
  pluginId: string;
3346
3347
  resourceType: string;
3347
3348
  } | "deny";
@@ -0,0 +1,2 @@
1
+ "use strict";var t=require("@backstage/plugin-permission-common");const a=(i,s)=>s?s===i.name:!0,m=(i,s)=>s?t.isResourcePermission(i)&&s===i.resourceType:!0,o=(i,s)=>s?s.some(e=>e===i.attributes.action):!0,n=(i,s)=>s==="*"?!0:a(i,s.name)&&m(i,s.resourceType)&&o(i,s.actions),r=(i,s)=>i.permissions.filter(({match:e})=>n(s,e)),c=(i,s)=>i.kind!==s.kind||i.namespace!==s.namespace?!1:s.name==="*"?!0:i.name===s.name;exports.getMatchingRolePermissions=r,exports.isMatchingPermission=n,exports.matchesEntityRef=c;
2
+ //# sourceMappingURL=matching.cjs.js.map
@@ -0,0 +1,2 @@
1
+ "use strict";var i=require("@backstage/plugin-permission-common"),e=require("zod"),n=require("./schema.cjs.js");const t=e.z.object({action:e.z.union([e.z.literal("create"),e.z.literal("read"),e.z.literal("update"),e.z.literal("delete")]).optional()}),a=e.z.union([e.z.object({type:e.z.literal("basic"),name:e.z.string(),attributes:t}),e.z.object({type:e.z.literal("resource"),name:e.z.string(),attributes:t,resourceType:e.z.string()})]),r=e.z.lazy(()=>e.z.object({rule:e.z.string(),resourceType:e.z.string(),params:e.z.record(e.z.any()).optional()}).or(e.z.object({anyOf:e.z.array(r).nonempty()})).or(e.z.object({allOf:e.z.array(r).nonempty()})).or(e.z.object({not:r}))),o=e.z.object({result:e.z.union([e.z.literal(i.AuthorizeResult.ALLOW),e.z.literal(i.AuthorizeResult.DENY)])}),s=n.ConditionalDecisionParser.extend({result:e.z.literal(i.AuthorizeResult.CONDITIONAL),conditions:r}),l=e.z.union([o,s]);exports.ConditionalPolicyDecisionParser=s,exports.DefinitivePolicyDecisionParser=o,exports.PermissionAttributesParser=t,exports.PermissionCriteriaParser=r,exports.PermissionParser=a,exports.PolicyDecisionParser=l;
2
+ //# sourceMappingURL=permissionSchema.cjs.js.map
@@ -0,0 +1,2 @@
1
+ "use strict";var a=require("@backstage/catalog-model"),m=require("uuid"),e=require("zod"),o=require("./validationMessages.cjs.js");const P="Untitled policy",q=":backstageUser",f=e.z.object({rule:e.z.string(),params:e.z.record(e.z.any()).optional()}),n=e.z.lazy(()=>e.z.union([e.z.object({allOf:e.z.array(n).nonempty()}).strict(),e.z.object({anyOf:e.z.array(n).nonempty()}).strict(),e.z.object({not:n}).strict(),f])),h=e.z.object({pluginId:e.z.string().min(1).describe("Plugin ID that defines the permission and rules used."),resourceType:e.z.string().min(1).describe("Resource type associated with the conditions used."),conditions:n}),y=e.z.union([e.z.literal("allow"),e.z.literal("deny")]),c=e.z.union([y,h]),g=e.z.union([e.z.literal("*"),e.z.object({name:e.z.string().optional().describe("Name that must match the incoming permission request."),actions:e.z.array(e.z.string()).optional().describe("Actions that must be present on the incoming permission's attributes."),resourceType:e.z.string().min(1).optional().describe("Resource type that must match that of the incoming permission request.")})]),z=e.z.string().default(()=>m.v4().split("-")[0]).describe("ID of the permission."),p=e.z.object({id:z,match:g.describe("Values used to match against the incoming permission request."),decision:c.describe("Authorization result or conditions to send if this role permission applies.")}).refine(({decision:i,match:s})=>O(i)?s!=="*"&&s?.resourceType!==void 0:!0,{path:["match","resourceType"],message:"match.resourceType is required for conditional decisions."}),b=e.z.array(p).superRefine((i,s)=>{const r=d(i,"id");r>=0&&s.addIssue({code:e.z.ZodIssueCode.custom,message:"Permission ids must be unique",path:[r,"id"]})}).describe("Permission decisions used to determine authorization responses."),v=e.z.string().refine(x,{message:"Invalid entity ref for member.",path:[]}).transform(i=>a.stringifyEntityRef(a.parseEntityRef(i,{defaultKind:"group",defaultNamespace:"default"}))),C=e.z.string().default(()=>m.v4().split("-")[0]).describe("ID of the role."),R=e.z.object({name:e.z.string().min(1,{message:o.minCharacters("Role name",1)}).max(1024,{message:o.maxCharacters("Role name",1024)}).describe("Name of the role."),id:C,members:e.z.union([e.z.literal("*"),e.z.array(v).min(1)]).describe("Entity references used to map users to this role. These entities don't need to exist in the catalog."),permissions:b}),D=e.z.array(R).default([]).superRefine((i,s)=>{const r=d(i,"name");r>=0&&s.addIssue({code:e.z.ZodIssueCode.custom,message:"Role names must be unique",path:[r,"name"]});const t=d(i,"id");t>=0&&s.addIssue({code:e.z.ZodIssueCode.custom,message:"Role ids must be unique",path:[t,"id"]})}),T=e.z.object({decision:c.describe("The authorization result or conditions the corresponding role resulted in"),roleId:C.describe("The id of the role that resulted in the decision"),rolePermissionId:z.describe("The id of the role permission that resulted in the decisions.")}),A=e.z.string().min(1,{message:o.minCharacters("Policy name",1)}).max(1024,{message:o.maxCharacters("Policy name",1024)}).default(P).describe("Name of the policy."),j=e.z.union([e.z.literal("first-match"),e.z.literal("any-allow")]),I=e.z.object({resolutionStrategy:j}).default({resolutionStrategy:"first-match"}),l=e.z.object({name:A,options:I,roles:D}),N=l.default({roles:[]});function x(i){try{return a.parseEntityRef(i,{defaultKind:"group",defaultNamespace:"default"}),!0}catch{return!1}}function d(i,s){let r=0;const t=new Set;for(;r<i.length;){const u=i[r][s];if(t.has(u))return r;t.add(u),r++}return-1}function O(i){return typeof i!="string"}function B(i){const s=Object.entries(i);return s.length===1&&s[0][0]==="allOf"&&Array.isArray(s[0][1])}function S(i){const s=Object.entries(i);return s.length===1&&s[0][0]==="anyOf"&&Array.isArray(s[0][1])}function w(i){const s=Object.entries(i);return s.length===1&&s[0][0]==="not"&&!Array.isArray(s[0][1])}const E=l.extend({id:e.z.string(),createdAt:e.z.string(),createdBy:e.z.string(),updatedAt:e.z.string(),updatedBy:e.z.string(),description:e.z.string().optional().nullable(),lastPublishedAt:e.z.string().optional().nullable(),lastPublishedBy:e.z.string().optional().nullable(),status:e.z.enum(["draft","active","inactive"])});exports.BackstageUserPlaceholder=q,exports.ConditionalDecisionParser=h,exports.DefaultingPolicyConfigParser=N,exports.LiteralDecisionParser=y,exports.PermissionConditionParser=f,exports.PermissionDecisionParser=c,exports.PermissionMatchParser=g,exports.PolicyConfigOptionsParser=I,exports.PolicyConfigParser=l,exports.PolicyDefaultName=P,exports.PolicyParser=E,exports.PolicyRoleResolutionStrategyParser=j,exports.PolicyTitleParser=A,exports.RoleDecisionParser=T,exports.RoleParser=R,exports.RolePermissionParser=p,exports.RolePermissionsParser=b,exports.RolesParser=D,exports.isAllOfPermissionCriteria=B,exports.isAnyOfPermissionCriteria=S,exports.isConditionalDecision=O,exports.isNotPermissionCriteria=w;
2
+ //# sourceMappingURL=schema.cjs.js.map
@@ -0,0 +1,2 @@
1
+ "use strict";function c(r,t){const s={};if(r)for(const[n,a]of Object.entries(r))s[n]=t(a);return s}exports.mapParams=c;
2
+ //# sourceMappingURL=utils.cjs.js.map
@@ -0,0 +1,2 @@
1
+ "use strict";const t=(a,s)=>`${a} must be at least ${s} characters`,r=(a,s)=>`${a} must be less than ${s} characters`;exports.maxCharacters=r,exports.minCharacters=t;
2
+ //# sourceMappingURL=validationMessages.cjs.js.map
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@spotify/backstage-plugin-rbac-common",
3
3
  "description": "Control access to actions and data in Backstage with ease.",
4
- "version": "0.6.1",
4
+ "version": "0.6.3",
5
5
  "license": "SEE LICENSE IN LICENSE.md",
6
6
  "homepage": "https://backstage.spotify.com",
7
7
  "main": "dist/index.cjs.js",
@@ -31,18 +31,25 @@
31
31
  "postpack": "backstage-cli package postpack"
32
32
  },
33
33
  "dependencies": {
34
- "@backstage/catalog-model": "^1.7.0",
35
- "@backstage/plugin-permission-common": "^0.8.1",
36
- "@backstage/types": "^1.1.1",
37
- "uuid": "^10.0.0",
34
+ "@backstage/catalog-model": "^1.7.1",
35
+ "@backstage/plugin-permission-common": "^0.8.2",
36
+ "@backstage/types": "^1.2.0",
37
+ "uuid": "^11.0.0",
38
38
  "zod": "^3.20.0"
39
39
  },
40
40
  "devDependencies": {
41
- "@backstage/cli": "^0.27.1"
41
+ "@backstage/cli": "^0.29.2"
42
42
  },
43
43
  "files": [
44
44
  "dist",
45
45
  "!dist/**/*.map"
46
46
  ],
47
+ "typesVersions": {
48
+ "*": {
49
+ "index": [
50
+ "dist/index.d.ts"
51
+ ]
52
+ }
53
+ },
47
54
  "module": "dist/index.esm.js"
48
55
  }