@stigmer/protos 0.0.34
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +190 -0
- package/README.md +35 -0
- package/ai/stigmer/agentic/agent/v1/api_pb.d.ts +53 -0
- package/ai/stigmer/agentic/agent/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/agent/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/command_connect.d.ts +60 -0
- package/ai/stigmer/agentic/agent/v1/command_connect.js +66 -0
- package/ai/stigmer/agentic/agent/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/command_pb.d.ts +60 -0
- package/ai/stigmer/agentic/agent/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/agent/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/io_pb.d.ts +22 -0
- package/ai/stigmer/agentic/agent/v1/io_pb.js +15 -0
- package/ai/stigmer/agentic/agent/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/query_connect.d.ts +32 -0
- package/ai/stigmer/agentic/agent/v1/query_connect.js +38 -0
- package/ai/stigmer/agentic/agent/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/query_pb.d.ts +35 -0
- package/ai/stigmer/agentic/agent/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/agent/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/spec_pb.d.ts +373 -0
- package/ai/stigmer/agentic/agent/v1/spec_pb.js +38 -0
- package/ai/stigmer/agentic/agent/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/status_pb.d.ts +34 -0
- package/ai/stigmer/agentic/agent/v1/status_pb.js +15 -0
- package/ai/stigmer/agentic/agent/v1/status_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/api_pb.d.ts +296 -0
- package/ai/stigmer/agentic/agentexecution/v1/api_pb.js +35 -0
- package/ai/stigmer/agentic/agentexecution/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/approval_pb.d.ts +206 -0
- package/ai/stigmer/agentic/agentexecution/v1/approval_pb.js +19 -0
- package/ai/stigmer/agentic/agentexecution/v1/approval_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/artifact_pb.d.ts +91 -0
- package/ai/stigmer/agentic/agentexecution/v1/artifact_pb.js +16 -0
- package/ai/stigmer/agentic/agentexecution/v1/artifact_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_connect.d.ts +413 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_connect.js +419 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_pb.d.ts +407 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_pb.js +21 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/context_pb.d.ts +403 -0
- package/ai/stigmer/agentic/agentexecution/v1/context_pb.js +30 -0
- package/ai/stigmer/agentic/agentexecution/v1/context_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/enum_pb.d.ts +526 -0
- package/ai/stigmer/agentic/agentexecution/v1/enum_pb.js +538 -0
- package/ai/stigmer/agentic/agentexecution/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/io_pb.d.ts +1335 -0
- package/ai/stigmer/agentic/agentexecution/v1/io_pb.js +148 -0
- package/ai/stigmer/agentic/agentexecution/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/message_pb.d.ts +316 -0
- package/ai/stigmer/agentic/agentexecution/v1/message_pb.js +27 -0
- package/ai/stigmer/agentic/agentexecution/v1/message_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_connect.d.ts +146 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_connect.js +152 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_pb.d.ts +142 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_pb.js +19 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/spec_pb.d.ts +562 -0
- package/ai/stigmer/agentic/agentexecution/v1/spec_pb.js +31 -0
- package/ai/stigmer/agentic/agentexecution/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/subagent_pb.d.ts +129 -0
- package/ai/stigmer/agentic/agentexecution/v1/subagent_pb.js +20 -0
- package/ai/stigmer/agentic/agentexecution/v1/subagent_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/usage_pb.d.ts +413 -0
- package/ai/stigmer/agentic/agentexecution/v1/usage_pb.js +24 -0
- package/ai/stigmer/agentic/agentexecution/v1/usage_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/api_pb.d.ts +52 -0
- package/ai/stigmer/agentic/agentinstance/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/agentinstance/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_connect.d.ts +71 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_connect.js +77 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_pb.d.ts +71 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_pb.js +20 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/io_pb.d.ts +74 -0
- package/ai/stigmer/agentic/agentinstance/v1/io_pb.js +27 -0
- package/ai/stigmer/agentic/agentinstance/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_connect.d.ts +46 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_connect.js +52 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_pb.d.ts +48 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/spec_pb.d.ts +42 -0
- package/ai/stigmer/agentic/agentinstance/v1/spec_pb.js +16 -0
- package/ai/stigmer/agentic/agentinstance/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/api_pb.d.ts +54 -0
- package/ai/stigmer/agentic/environment/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/environment/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/command_connect.d.ts +56 -0
- package/ai/stigmer/agentic/environment/v1/command_connect.js +62 -0
- package/ai/stigmer/agentic/environment/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/command_pb.d.ts +56 -0
- package/ai/stigmer/agentic/environment/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/environment/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/io_pb.d.ts +22 -0
- package/ai/stigmer/agentic/environment/v1/io_pb.js +15 -0
- package/ai/stigmer/agentic/environment/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/query_connect.d.ts +32 -0
- package/ai/stigmer/agentic/environment/v1/query_connect.js +38 -0
- package/ai/stigmer/agentic/environment/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/query_pb.d.ts +34 -0
- package/ai/stigmer/agentic/environment/v1/query_pb.js +19 -0
- package/ai/stigmer/agentic/environment/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/spec_pb.d.ts +79 -0
- package/ai/stigmer/agentic/environment/v1/spec_pb.js +19 -0
- package/ai/stigmer/agentic/environment/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/api_pb.d.ts +54 -0
- package/ai/stigmer/agentic/executioncontext/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/executioncontext/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_connect.d.ts +46 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_connect.js +52 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_pb.d.ts +47 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_pb.js +20 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/io_pb.d.ts +44 -0
- package/ai/stigmer/agentic/executioncontext/v1/io_pb.js +20 -0
- package/ai/stigmer/agentic/executioncontext/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_connect.d.ts +54 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_connect.js +60 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_pb.d.ts +56 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/spec_pb.d.ts +69 -0
- package/ai/stigmer/agentic/executioncontext/v1/spec_pb.js +20 -0
- package/ai/stigmer/agentic/executioncontext/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/api_pb.d.ts +129 -0
- package/ai/stigmer/agentic/mcpserver/v1/api_pb.js +23 -0
- package/ai/stigmer/agentic/mcpserver/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_connect.d.ts +136 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_connect.js +142 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_pb.d.ts +136 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_pb.js +29 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/io_pb.d.ts +62 -0
- package/ai/stigmer/agentic/mcpserver/v1/io_pb.js +21 -0
- package/ai/stigmer/agentic/mcpserver/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_connect.d.ts +59 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_connect.js +65 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_pb.d.ts +61 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_pb.js +25 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/spec_pb.d.ts +332 -0
- package/ai/stigmer/agentic/mcpserver/v1/spec_pb.js +31 -0
- package/ai/stigmer/agentic/mcpserver/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/status_pb.d.ts +290 -0
- package/ai/stigmer/agentic/mcpserver/v1/status_pb.js +104 -0
- package/ai/stigmer/agentic/mcpserver/v1/status_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/api_pb.d.ts +52 -0
- package/ai/stigmer/agentic/session/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/session/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/command_connect.d.ts +57 -0
- package/ai/stigmer/agentic/session/v1/command_connect.js +63 -0
- package/ai/stigmer/agentic/session/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/command_pb.d.ts +57 -0
- package/ai/stigmer/agentic/session/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/session/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/io_pb.d.ts +123 -0
- package/ai/stigmer/agentic/session/v1/io_pb.js +36 -0
- package/ai/stigmer/agentic/session/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/query_connect.d.ts +43 -0
- package/ai/stigmer/agentic/session/v1/query_connect.js +49 -0
- package/ai/stigmer/agentic/session/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/query_pb.d.ts +44 -0
- package/ai/stigmer/agentic/session/v1/query_pb.js +19 -0
- package/ai/stigmer/agentic/session/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/spec_pb.d.ts +66 -0
- package/ai/stigmer/agentic/session/v1/spec_pb.js +16 -0
- package/ai/stigmer/agentic/session/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/workspace_pb.d.ts +167 -0
- package/ai/stigmer/agentic/session/v1/workspace_pb.js +30 -0
- package/ai/stigmer/agentic/session/v1/workspace_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/api_pb.d.ts +85 -0
- package/ai/stigmer/agentic/skill/v1/api_pb.js +23 -0
- package/ai/stigmer/agentic/skill/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/command_connect.d.ts +50 -0
- package/ai/stigmer/agentic/skill/v1/command_connect.js +56 -0
- package/ai/stigmer/agentic/skill/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/command_pb.d.ts +52 -0
- package/ai/stigmer/agentic/skill/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/skill/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/io_pb.d.ts +118 -0
- package/ai/stigmer/agentic/skill/v1/io_pb.js +31 -0
- package/ai/stigmer/agentic/skill/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/query_connect.d.ts +57 -0
- package/ai/stigmer/agentic/skill/v1/query_connect.js +63 -0
- package/ai/stigmer/agentic/skill/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/query_pb.d.ts +59 -0
- package/ai/stigmer/agentic/skill/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/skill/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/spec_pb.d.ts +59 -0
- package/ai/stigmer/agentic/skill/v1/spec_pb.js +15 -0
- package/ai/stigmer/agentic/skill/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/status_pb.d.ts +146 -0
- package/ai/stigmer/agentic/skill/v1/status_pb.js +57 -0
- package/ai/stigmer/agentic/skill/v1/status_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/synth_pb.d.ts +125 -0
- package/ai/stigmer/agentic/skill/v1/synth_pb.js +24 -0
- package/ai/stigmer/agentic/skill/v1/synth_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/api_pb.d.ts +53 -0
- package/ai/stigmer/agentic/workflow/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/workflow/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/command_connect.d.ts +60 -0
- package/ai/stigmer/agentic/workflow/v1/command_connect.js +66 -0
- package/ai/stigmer/agentic/workflow/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/command_pb.d.ts +60 -0
- package/ai/stigmer/agentic/workflow/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/workflow/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/enum_pb.d.ts +138 -0
- package/ai/stigmer/agentic/workflow/v1/enum_pb.js +143 -0
- package/ai/stigmer/agentic/workflow/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/io_pb.d.ts +22 -0
- package/ai/stigmer/agentic/workflow/v1/io_pb.js +15 -0
- package/ai/stigmer/agentic/workflow/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/query_connect.d.ts +32 -0
- package/ai/stigmer/agentic/workflow/v1/query_connect.js +38 -0
- package/ai/stigmer/agentic/workflow/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/query_pb.d.ts +35 -0
- package/ai/stigmer/agentic/workflow/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/workflow/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/serverless/validation_pb.d.ts +119 -0
- package/ai/stigmer/agentic/workflow/v1/serverless/validation_pb.js +63 -0
- package/ai/stigmer/agentic/workflow/v1/serverless/validation_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/spec_pb.d.ts +222 -0
- package/ai/stigmer/agentic/workflow/v1/spec_pb.js +39 -0
- package/ai/stigmer/agentic/workflow/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/status_pb.d.ts +48 -0
- package/ai/stigmer/agentic/workflow/v1/status_pb.js +16 -0
- package/ai/stigmer/agentic/workflow/v1/status_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/agent_call_pb.d.ts +153 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/agent_call_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/agent_call_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/call_activity_pb.d.ts +45 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/call_activity_pb.js +17 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/call_activity_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/for_pb.d.ts +58 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/for_pb.js +17 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/for_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/fork_pb.d.ts +77 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/fork_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/fork_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/grpc_call_pb.d.ts +53 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/grpc_call_pb.js +17 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/grpc_call_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/http_call_pb.d.ts +87 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/http_call_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/http_call_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/listen_pb.d.ts +90 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/listen_pb.js +26 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/listen_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/raise_pb.d.ts +41 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/raise_pb.js +16 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/raise_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/run_pb.d.ts +43 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/run_pb.js +17 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/run_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/set_pb.d.ts +39 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/set_pb.js +16 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/set_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/switch_pb.d.ts +71 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/switch_pb.js +21 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/switch_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/try_pb.d.ts +80 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/try_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/try_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/wait_pb.d.ts +121 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/wait_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/wait_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/api_pb.d.ts +716 -0
- package/ai/stigmer/agentic/workflowexecution/v1/api_pb.js +31 -0
- package/ai/stigmer/agentic/workflowexecution/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_connect.d.ts +833 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_connect.js +839 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_pb.d.ts +827 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_pb.js +33 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/enum_pb.d.ts +693 -0
- package/ai/stigmer/agentic/workflowexecution/v1/enum_pb.js +700 -0
- package/ai/stigmer/agentic/workflowexecution/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/io_pb.d.ts +1198 -0
- package/ai/stigmer/agentic/workflowexecution/v1/io_pb.js +211 -0
- package/ai/stigmer/agentic/workflowexecution/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_connect.d.ts +391 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_connect.js +397 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_pb.d.ts +391 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_pb.js +32 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/spec_pb.d.ts +332 -0
- package/ai/stigmer/agentic/workflowexecution/v1/spec_pb.js +15 -0
- package/ai/stigmer/agentic/workflowexecution/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/api_pb.d.ts +82 -0
- package/ai/stigmer/agentic/workflowinstance/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/workflowinstance/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_connect.d.ts +139 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_connect.js +145 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_pb.d.ts +139 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_pb.js +29 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/io_pb.d.ts +119 -0
- package/ai/stigmer/agentic/workflowinstance/v1/io_pb.js +27 -0
- package/ai/stigmer/agentic/workflowinstance/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_connect.d.ts +142 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_connect.js +148 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_pb.d.ts +144 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_pb.js +30 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/spec_pb.d.ts +97 -0
- package/ai/stigmer/agentic/workflowinstance/v1/spec_pb.js +16 -0
- package/ai/stigmer/agentic/workflowinstance/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_group_pb.d.ts +68 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_group_pb.js +53 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_group_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_kind_pb.d.ts +253 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_kind_pb.js +199 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_kind_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/authorization_config_pb.d.ts +257 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/authorization_config_pb.js +128 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/authorization_config_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/enum_pb.d.ts +122 -0
- package/ai/stigmer/commons/apiresource/enum_pb.js +129 -0
- package/ai/stigmer/commons/apiresource/enum_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/field_options_pb.d.ts +48 -0
- package/ai/stigmer/commons/apiresource/field_options_pb.js +52 -0
- package/ai/stigmer/commons/apiresource/field_options_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/io_pb.d.ts +185 -0
- package/ai/stigmer/commons/apiresource/io_pb.js +37 -0
- package/ai/stigmer/commons/apiresource/io_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/metadata_pb.d.ts +115 -0
- package/ai/stigmer/commons/apiresource/metadata_pb.js +21 -0
- package/ai/stigmer/commons/apiresource/metadata_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/rpc_service_options_pb.d.ts +11 -0
- package/ai/stigmer/commons/apiresource/rpc_service_options_pb.js +15 -0
- package/ai/stigmer/commons/apiresource/rpc_service_options_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/status_pb.d.ts +115 -0
- package/ai/stigmer/commons/apiresource/status_pb.js +30 -0
- package/ai/stigmer/commons/apiresource/status_pb.js.map +1 -0
- package/ai/stigmer/commons/rpc/pagination_pb.d.ts +49 -0
- package/ai/stigmer/commons/rpc/pagination_pb.js +19 -0
- package/ai/stigmer/commons/rpc/pagination_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/api_pb.d.ts +74 -0
- package/ai/stigmer/iam/apikey/v1/api_pb.js +24 -0
- package/ai/stigmer/iam/apikey/v1/api_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/command_connect.d.ts +43 -0
- package/ai/stigmer/iam/apikey/v1/command_connect.js +49 -0
- package/ai/stigmer/iam/apikey/v1/command_connect.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/command_pb.d.ts +44 -0
- package/ai/stigmer/iam/apikey/v1/command_pb.js +19 -0
- package/ai/stigmer/iam/apikey/v1/command_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/io_pb.d.ts +55 -0
- package/ai/stigmer/iam/apikey/v1/io_pb.js +26 -0
- package/ai/stigmer/iam/apikey/v1/io_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/query_connect.d.ts +46 -0
- package/ai/stigmer/iam/apikey/v1/query_connect.js +52 -0
- package/ai/stigmer/iam/apikey/v1/query_connect.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/query_pb.d.ts +48 -0
- package/ai/stigmer/iam/apikey/v1/query_pb.js +20 -0
- package/ai/stigmer/iam/apikey/v1/query_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/spec_pb.d.ts +46 -0
- package/ai/stigmer/iam/apikey/v1/spec_pb.js +16 -0
- package/ai/stigmer/iam/apikey/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/api_pb.d.ts +81 -0
- package/ai/stigmer/iam/iampolicy/v1/api_pb.js +23 -0
- package/ai/stigmer/iam/iampolicy/v1/api_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/command_connect.d.ts +225 -0
- package/ai/stigmer/iam/iampolicy/v1/command_connect.js +231 -0
- package/ai/stigmer/iam/iampolicy/v1/command_connect.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/command_pb.d.ts +225 -0
- package/ai/stigmer/iam/iampolicy/v1/command_pb.js +34 -0
- package/ai/stigmer/iam/iampolicy/v1/command_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/io_pb.d.ts +555 -0
- package/ai/stigmer/iam/iampolicy/v1/io_pb.js +122 -0
- package/ai/stigmer/iam/iampolicy/v1/io_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/query_connect.d.ts +91 -0
- package/ai/stigmer/iam/iampolicy/v1/query_connect.js +97 -0
- package/ai/stigmer/iam/iampolicy/v1/query_connect.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/query_pb.d.ts +91 -0
- package/ai/stigmer/iam/iampolicy/v1/query_pb.js +19 -0
- package/ai/stigmer/iam/iampolicy/v1/query_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission_pb.d.ts +171 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission_pb.js +176 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/io_pb.d.ts +58 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/io_pb.js +16 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/io_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/method_options_pb.d.ts +19 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/method_options_pb.js +23 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/method_options_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/spec_pb.d.ts +105 -0
- package/ai/stigmer/iam/iampolicy/v1/spec_pb.js +20 -0
- package/ai/stigmer/iam/iampolicy/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/api_pb.d.ts +51 -0
- package/ai/stigmer/iam/identityaccount/v1/api_pb.js +18 -0
- package/ai/stigmer/iam/identityaccount/v1/api_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/command_connect.d.ts +59 -0
- package/ai/stigmer/iam/identityaccount/v1/command_connect.js +65 -0
- package/ai/stigmer/iam/identityaccount/v1/command_connect.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/command_pb.d.ts +60 -0
- package/ai/stigmer/iam/identityaccount/v1/command_pb.js +20 -0
- package/ai/stigmer/iam/identityaccount/v1/command_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/enum_pb.d.ts +40 -0
- package/ai/stigmer/iam/identityaccount/v1/enum_pb.js +45 -0
- package/ai/stigmer/iam/identityaccount/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/io_pb.d.ts +138 -0
- package/ai/stigmer/iam/identityaccount/v1/io_pb.js +47 -0
- package/ai/stigmer/iam/identityaccount/v1/io_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/query_connect.d.ts +79 -0
- package/ai/stigmer/iam/identityaccount/v1/query_connect.js +85 -0
- package/ai/stigmer/iam/identityaccount/v1/query_connect.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/query_pb.d.ts +80 -0
- package/ai/stigmer/iam/identityaccount/v1/query_pb.js +21 -0
- package/ai/stigmer/iam/identityaccount/v1/query_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/spec_pb.d.ts +95 -0
- package/ai/stigmer/iam/identityaccount/v1/spec_pb.js +17 -0
- package/ai/stigmer/iam/identityaccount/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/webhook_pb.d.ts +50 -0
- package/ai/stigmer/iam/identityaccount/v1/webhook_pb.js +14 -0
- package/ai/stigmer/iam/identityaccount/v1/webhook_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/api_pb.d.ts +72 -0
- package/ai/stigmer/iam/identityprovider/v1/api_pb.js +18 -0
- package/ai/stigmer/iam/identityprovider/v1/api_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/command_connect.d.ts +59 -0
- package/ai/stigmer/iam/identityprovider/v1/command_connect.js +65 -0
- package/ai/stigmer/iam/identityprovider/v1/command_connect.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/command_pb.d.ts +59 -0
- package/ai/stigmer/iam/identityprovider/v1/command_pb.js +19 -0
- package/ai/stigmer/iam/identityprovider/v1/command_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/io_pb.d.ts +65 -0
- package/ai/stigmer/iam/identityprovider/v1/io_pb.js +26 -0
- package/ai/stigmer/iam/identityprovider/v1/io_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/query_connect.d.ts +32 -0
- package/ai/stigmer/iam/identityprovider/v1/query_connect.js +38 -0
- package/ai/stigmer/iam/identityprovider/v1/query_connect.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/query_pb.d.ts +34 -0
- package/ai/stigmer/iam/identityprovider/v1/query_pb.js +19 -0
- package/ai/stigmer/iam/identityprovider/v1/query_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/spec_pb.d.ts +106 -0
- package/ai/stigmer/iam/identityprovider/v1/spec_pb.js +15 -0
- package/ai/stigmer/iam/identityprovider/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/search/v1/io_pb.d.ts +320 -0
- package/ai/stigmer/search/v1/io_pb.js +29 -0
- package/ai/stigmer/search/v1/io_pb.js.map +1 -0
- package/ai/stigmer/search/v1/query_connect.d.ts +67 -0
- package/ai/stigmer/search/v1/query_connect.js +73 -0
- package/ai/stigmer/search/v1/query_connect.js.map +1 -0
- package/ai/stigmer/search/v1/query_pb.d.ts +69 -0
- package/ai/stigmer/search/v1/query_pb.js +40 -0
- package/ai/stigmer/search/v1/query_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/api_pb.d.ts +54 -0
- package/ai/stigmer/tenancy/organization/v1/api_pb.js +18 -0
- package/ai/stigmer/tenancy/organization/v1/api_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/command_connect.d.ts +61 -0
- package/ai/stigmer/tenancy/organization/v1/command_connect.js +67 -0
- package/ai/stigmer/tenancy/organization/v1/command_connect.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/command_pb.d.ts +61 -0
- package/ai/stigmer/tenancy/organization/v1/command_pb.js +19 -0
- package/ai/stigmer/tenancy/organization/v1/command_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/enum_pb.d.ts +34 -0
- package/ai/stigmer/tenancy/organization/v1/enum_pb.js +39 -0
- package/ai/stigmer/tenancy/organization/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/io_pb.d.ts +91 -0
- package/ai/stigmer/tenancy/organization/v1/io_pb.js +32 -0
- package/ai/stigmer/tenancy/organization/v1/io_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/query_connect.d.ts +61 -0
- package/ai/stigmer/tenancy/organization/v1/query_connect.js +67 -0
- package/ai/stigmer/tenancy/organization/v1/query_connect.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/query_pb.d.ts +63 -0
- package/ai/stigmer/tenancy/organization/v1/query_pb.js +21 -0
- package/ai/stigmer/tenancy/organization/v1/query_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/spec_pb.d.ts +61 -0
- package/ai/stigmer/tenancy/organization/v1/spec_pb.js +17 -0
- package/ai/stigmer/tenancy/organization/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/api_pb.d.ts +91 -0
- package/ai/stigmer/tenancy/project/v1/api_pb.js +18 -0
- package/ai/stigmer/tenancy/project/v1/api_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/command_connect.d.ts +60 -0
- package/ai/stigmer/tenancy/project/v1/command_connect.js +66 -0
- package/ai/stigmer/tenancy/project/v1/command_connect.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/command_pb.d.ts +60 -0
- package/ai/stigmer/tenancy/project/v1/command_pb.js +19 -0
- package/ai/stigmer/tenancy/project/v1/command_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/io_pb.d.ts +22 -0
- package/ai/stigmer/tenancy/project/v1/io_pb.js +15 -0
- package/ai/stigmer/tenancy/project/v1/io_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/query_connect.d.ts +33 -0
- package/ai/stigmer/tenancy/project/v1/query_connect.js +39 -0
- package/ai/stigmer/tenancy/project/v1/query_connect.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/query_pb.d.ts +36 -0
- package/ai/stigmer/tenancy/project/v1/query_pb.js +20 -0
- package/ai/stigmer/tenancy/project/v1/query_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/spec_pb.d.ts +84 -0
- package/ai/stigmer/tenancy/project/v1/spec_pb.js +15 -0
- package/ai/stigmer/tenancy/project/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/status_pb.d.ts +89 -0
- package/ai/stigmer/tenancy/project/v1/status_pb.js +21 -0
- package/ai/stigmer/tenancy/project/v1/status_pb.js.map +1 -0
- package/buf/validate/validate_pb.d.ts +4766 -0
- package/buf/validate/validate_pb.js +357 -0
- package/buf/validate/validate_pb.js.map +1 -0
- package/package.json +32 -0
|
@@ -0,0 +1,46 @@
|
|
|
1
|
+
import type { GenFile, GenMessage } from "@bufbuild/protobuf/codegenv1";
|
|
2
|
+
import type { Timestamp } from "@bufbuild/protobuf/wkt";
|
|
3
|
+
import type { Message } from "@bufbuild/protobuf";
|
|
4
|
+
/**
|
|
5
|
+
* Describes the file ai/stigmer/iam/apikey/v1/spec.proto.
|
|
6
|
+
*/
|
|
7
|
+
export declare const file_ai_stigmer_iam_apikey_v1_spec: GenFile;
|
|
8
|
+
/**
|
|
9
|
+
* api-key spec
|
|
10
|
+
*
|
|
11
|
+
* @generated from message ai.stigmer.iam.apikey.v1.ApiKeySpec
|
|
12
|
+
*/
|
|
13
|
+
export type ApiKeySpec = Message<"ai.stigmer.iam.apikey.v1.ApiKeySpec"> & {
|
|
14
|
+
/**
|
|
15
|
+
* SHA-256/Bcrypt hash of the raw key generated by the system during.
|
|
16
|
+
* the system returns the actual key in this field in create response but the
|
|
17
|
+
* actual key itself is never persisted in the database.
|
|
18
|
+
* only the last 6 chars of the key are persisted in the fingerprint field for UI presentation.
|
|
19
|
+
*
|
|
20
|
+
* @generated from field: string key_hash = 1;
|
|
21
|
+
*/
|
|
22
|
+
keyHash: string;
|
|
23
|
+
/**
|
|
24
|
+
* UI-visible fingerprint (e.g. last 6 chars)
|
|
25
|
+
*
|
|
26
|
+
* @generated from field: string fingerprint = 2;
|
|
27
|
+
*/
|
|
28
|
+
fingerprint: string;
|
|
29
|
+
/**
|
|
30
|
+
* absolute expiry time (null if neverExpires = true)
|
|
31
|
+
*
|
|
32
|
+
* @generated from field: google.protobuf.Timestamp expires_at = 3;
|
|
33
|
+
*/
|
|
34
|
+
expiresAt?: Timestamp;
|
|
35
|
+
/**
|
|
36
|
+
* never expire flag (forces expires_at to be ignored)
|
|
37
|
+
*
|
|
38
|
+
* @generated from field: bool never_expires = 4;
|
|
39
|
+
*/
|
|
40
|
+
neverExpires: boolean;
|
|
41
|
+
};
|
|
42
|
+
/**
|
|
43
|
+
* Describes the message ai.stigmer.iam.apikey.v1.ApiKeySpec.
|
|
44
|
+
* Use `create(ApiKeySpecSchema)` to create a new message.
|
|
45
|
+
*/
|
|
46
|
+
export declare const ApiKeySpecSchema: GenMessage<ApiKeySpec>;
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
// @generated by protoc-gen-es v2.2.2 with parameter "target=ts"
|
|
2
|
+
// @generated from file ai/stigmer/iam/apikey/v1/spec.proto (package ai.stigmer.iam.apikey.v1, syntax proto3)
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
import { fileDesc, messageDesc } from "@bufbuild/protobuf/codegenv1";
|
|
5
|
+
import { file_ai_stigmer_commons_apiresource_field_options } from "../../../commons/apiresource/field_options_pb";
|
|
6
|
+
import { file_google_protobuf_timestamp } from "@bufbuild/protobuf/wkt";
|
|
7
|
+
/**
|
|
8
|
+
* Describes the file ai/stigmer/iam/apikey/v1/spec.proto.
|
|
9
|
+
*/
|
|
10
|
+
export const file_ai_stigmer_iam_apikey_v1_spec = /*@__PURE__*/ fileDesc("CiNhaS9zdGlnbWVyL2lhbS9hcGlrZXkvdjEvc3BlYy5wcm90bxIYYWkuc3RpZ21lci5pYW0uYXBpa2V5LnYxIoYBCgpBcGlLZXlTcGVjEhYKCGtleV9oYXNoGAEgASgJQgTIhSwBEhkKC2ZpbmdlcnByaW50GAIgASgJQgTIhSwBEi4KCmV4cGlyZXNfYXQYAyABKAsyGi5nb29nbGUucHJvdG9idWYuVGltZXN0YW1wEhUKDW5ldmVyX2V4cGlyZXMYBCABKAhiBnByb3RvMw", [file_ai_stigmer_commons_apiresource_field_options, file_google_protobuf_timestamp]);
|
|
11
|
+
/**
|
|
12
|
+
* Describes the message ai.stigmer.iam.apikey.v1.ApiKeySpec.
|
|
13
|
+
* Use `create(ApiKeySpecSchema)` to create a new message.
|
|
14
|
+
*/
|
|
15
|
+
export const ApiKeySpecSchema = /*@__PURE__*/ messageDesc(file_ai_stigmer_iam_apikey_v1_spec, 0);
|
|
16
|
+
//# sourceMappingURL=spec_pb.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"spec_pb.js","sourceRoot":"","sources":["../../../../../../ai/stigmer/iam/apikey/v1/spec_pb.ts"],"names":[],"mappings":"AAAA,gEAAgE;AAChE,6GAA6G;AAC7G,oBAAoB;AAGpB,OAAO,EAAE,QAAQ,EAAE,WAAW,EAAE,MAAM,8BAA8B,CAAC;AACrE,OAAO,EAAE,iDAAiD,EAAE,MAAM,+CAA+C,CAAC;AAElH,OAAO,EAAE,8BAA8B,EAAE,MAAM,wBAAwB,CAAC;AAGxE;;GAEG;AACH,MAAM,CAAC,MAAM,kCAAkC,GAAY,aAAa,CACtE,QAAQ,CAAC,wRAAwR,EAAE,CAAC,iDAAiD,EAAE,8BAA8B,CAAC,CAAC,CAAC;AAwC1X;;;GAGG;AACH,MAAM,CAAC,MAAM,gBAAgB,GAA2B,aAAa,CACnE,WAAW,CAAC,kCAAkC,EAAE,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1,81 @@
|
|
|
1
|
+
import type { GenFile, GenMessage } from "@bufbuild/protobuf/codegenv1";
|
|
2
|
+
import type { ApiResourceMetadata } from "../../../commons/apiresource/metadata_pb";
|
|
3
|
+
import type { ApiResourceAudit } from "../../../commons/apiresource/status_pb";
|
|
4
|
+
import type { IamPolicySpec } from "./spec_pb";
|
|
5
|
+
import type { Message } from "@bufbuild/protobuf";
|
|
6
|
+
/**
|
|
7
|
+
* Describes the file ai/stigmer/iam/iampolicy/v1/api.proto.
|
|
8
|
+
*/
|
|
9
|
+
export declare const file_ai_stigmer_iam_iampolicy_v1_api: GenFile;
|
|
10
|
+
/**
|
|
11
|
+
* IamPolicy represents a binding between a principal (who), a resource (what),
|
|
12
|
+
* and a relation/permission (how).
|
|
13
|
+
*
|
|
14
|
+
* An IAM policy grants a specific permission (relation) to a principal on a resource.
|
|
15
|
+
* For example: "Grant 'admin' permission to user 'john@example.com' on VPC 'vpc-123'"
|
|
16
|
+
*
|
|
17
|
+
* The policy is the source of truth for authorization and is synced to the
|
|
18
|
+
* authorization backend (OpenFGA) as FGA tuples.
|
|
19
|
+
*
|
|
20
|
+
* @generated from message ai.stigmer.iam.iampolicy.v1.IamPolicy
|
|
21
|
+
*/
|
|
22
|
+
export type IamPolicy = Message<"ai.stigmer.iam.iampolicy.v1.IamPolicy"> & {
|
|
23
|
+
/**
|
|
24
|
+
* api-version
|
|
25
|
+
*
|
|
26
|
+
* @generated from field: string api_version = 1;
|
|
27
|
+
*/
|
|
28
|
+
apiVersion: string;
|
|
29
|
+
/**
|
|
30
|
+
* resource-kind
|
|
31
|
+
*
|
|
32
|
+
* @generated from field: string kind = 2;
|
|
33
|
+
*/
|
|
34
|
+
kind: string;
|
|
35
|
+
/**
|
|
36
|
+
* metadata
|
|
37
|
+
* id format: iamp-<ulid>
|
|
38
|
+
* name: human-readable identifier (e.g., "john-vpc-admin")
|
|
39
|
+
* org: organization this policy belongs to
|
|
40
|
+
*
|
|
41
|
+
* @generated from field: ai.stigmer.commons.apiresource.ApiResourceMetadata metadata = 3;
|
|
42
|
+
*/
|
|
43
|
+
metadata?: ApiResourceMetadata;
|
|
44
|
+
/**
|
|
45
|
+
* spec
|
|
46
|
+
*
|
|
47
|
+
* @generated from field: ai.stigmer.iam.iampolicy.v1.IamPolicySpec spec = 4;
|
|
48
|
+
*/
|
|
49
|
+
spec?: IamPolicySpec;
|
|
50
|
+
/**
|
|
51
|
+
* status
|
|
52
|
+
*
|
|
53
|
+
* @generated from field: ai.stigmer.iam.iampolicy.v1.IamPolicyStatus status = 5;
|
|
54
|
+
*/
|
|
55
|
+
status?: IamPolicyStatus;
|
|
56
|
+
};
|
|
57
|
+
/**
|
|
58
|
+
* Describes the message ai.stigmer.iam.iampolicy.v1.IamPolicy.
|
|
59
|
+
* Use `create(IamPolicySchema)` to create a new message.
|
|
60
|
+
*/
|
|
61
|
+
export declare const IamPolicySchema: GenMessage<IamPolicy>;
|
|
62
|
+
/**
|
|
63
|
+
* IamPolicyStatus represents the runtime state of the IAM policy.
|
|
64
|
+
* It contains information about the policy's lifecycle and sync status with
|
|
65
|
+
* the authorization backend.
|
|
66
|
+
*
|
|
67
|
+
* @generated from message ai.stigmer.iam.iampolicy.v1.IamPolicyStatus
|
|
68
|
+
*/
|
|
69
|
+
export type IamPolicyStatus = Message<"ai.stigmer.iam.iampolicy.v1.IamPolicyStatus"> & {
|
|
70
|
+
/**
|
|
71
|
+
* Standard audit status containing created_by, created_at, updated_by, updated_at
|
|
72
|
+
*
|
|
73
|
+
* @generated from field: ai.stigmer.commons.apiresource.ApiResourceAudit audit = 1;
|
|
74
|
+
*/
|
|
75
|
+
audit?: ApiResourceAudit;
|
|
76
|
+
};
|
|
77
|
+
/**
|
|
78
|
+
* Describes the message ai.stigmer.iam.iampolicy.v1.IamPolicyStatus.
|
|
79
|
+
* Use `create(IamPolicyStatusSchema)` to create a new message.
|
|
80
|
+
*/
|
|
81
|
+
export declare const IamPolicyStatusSchema: GenMessage<IamPolicyStatus>;
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
// @generated by protoc-gen-es v2.2.2 with parameter "target=ts"
|
|
2
|
+
// @generated from file ai/stigmer/iam/iampolicy/v1/api.proto (package ai.stigmer.iam.iampolicy.v1, syntax proto3)
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
import { fileDesc, messageDesc } from "@bufbuild/protobuf/codegenv1";
|
|
5
|
+
import { file_ai_stigmer_commons_apiresource_metadata } from "../../../commons/apiresource/metadata_pb";
|
|
6
|
+
import { file_ai_stigmer_commons_apiresource_status } from "../../../commons/apiresource/status_pb";
|
|
7
|
+
import { file_ai_stigmer_iam_iampolicy_v1_spec } from "./spec_pb";
|
|
8
|
+
import { file_buf_validate_validate } from "../../../../../buf/validate/validate_pb";
|
|
9
|
+
/**
|
|
10
|
+
* Describes the file ai/stigmer/iam/iampolicy/v1/api.proto.
|
|
11
|
+
*/
|
|
12
|
+
export const file_ai_stigmer_iam_iampolicy_v1_api = /*@__PURE__*/ fileDesc("CiVhaS9zdGlnbWVyL2lhbS9pYW1wb2xpY3kvdjEvYXBpLnByb3RvEhthaS5zdGlnbWVyLmlhbS5pYW1wb2xpY3kudjEimQIKCUlhbVBvbGljeRItCgthcGlfdmVyc2lvbhgBIAEoCUIYukgVchMKEWlhbS5zdGlnbWVyLmFpL3YxEh4KBGtpbmQYAiABKAlCELpIDXILCglJYW1Qb2xpY3kSRQoIbWV0YWRhdGEYAyABKAsyMy5haS5zdGlnbWVyLmNvbW1vbnMuYXBpcmVzb3VyY2UuQXBpUmVzb3VyY2VNZXRhZGF0YRI4CgRzcGVjGAQgASgLMiouYWkuc3RpZ21lci5pYW0uaWFtcG9saWN5LnYxLklhbVBvbGljeVNwZWMSPAoGc3RhdHVzGAUgASgLMiwuYWkuc3RpZ21lci5pYW0uaWFtcG9saWN5LnYxLklhbVBvbGljeVN0YXR1cyJSCg9JYW1Qb2xpY3lTdGF0dXMSPwoFYXVkaXQYASABKAsyMC5haS5zdGlnbWVyLmNvbW1vbnMuYXBpcmVzb3VyY2UuQXBpUmVzb3VyY2VBdWRpdGIGcHJvdG8z", [file_ai_stigmer_commons_apiresource_metadata, file_ai_stigmer_commons_apiresource_status, file_ai_stigmer_iam_iampolicy_v1_spec, file_buf_validate_validate]);
|
|
13
|
+
/**
|
|
14
|
+
* Describes the message ai.stigmer.iam.iampolicy.v1.IamPolicy.
|
|
15
|
+
* Use `create(IamPolicySchema)` to create a new message.
|
|
16
|
+
*/
|
|
17
|
+
export const IamPolicySchema = /*@__PURE__*/ messageDesc(file_ai_stigmer_iam_iampolicy_v1_api, 0);
|
|
18
|
+
/**
|
|
19
|
+
* Describes the message ai.stigmer.iam.iampolicy.v1.IamPolicyStatus.
|
|
20
|
+
* Use `create(IamPolicyStatusSchema)` to create a new message.
|
|
21
|
+
*/
|
|
22
|
+
export const IamPolicyStatusSchema = /*@__PURE__*/ messageDesc(file_ai_stigmer_iam_iampolicy_v1_api, 1);
|
|
23
|
+
//# sourceMappingURL=api_pb.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"api_pb.js","sourceRoot":"","sources":["../../../../../../ai/stigmer/iam/iampolicy/v1/api_pb.ts"],"names":[],"mappings":"AAAA,gEAAgE;AAChE,kHAAkH;AAClH,oBAAoB;AAGpB,OAAO,EAAE,QAAQ,EAAE,WAAW,EAAE,MAAM,8BAA8B,CAAC;AAErE,OAAO,EAAE,4CAA4C,EAAE,MAAM,0CAA0C,CAAC;AAExG,OAAO,EAAE,0CAA0C,EAAE,MAAM,wCAAwC,CAAC;AAEpG,OAAO,EAAE,qCAAqC,EAAE,MAAM,WAAW,CAAC;AAClE,OAAO,EAAE,0BAA0B,EAAE,MAAM,yCAAyC,CAAC;AAGrF;;GAEG;AACH,MAAM,CAAC,MAAM,oCAAoC,GAAY,aAAa,CACxE,QAAQ,CAAC,klBAAklB,EAAE,CAAC,4CAA4C,EAAE,0CAA0C,EAAE,qCAAqC,EAAE,0BAA0B,CAAC,CAAC,CAAC;AAsD9vB;;;GAGG;AACH,MAAM,CAAC,MAAM,eAAe,GAA0B,aAAa,CACjE,WAAW,CAAC,oCAAoC,EAAE,CAAC,CAAC,CAAC;AAkBvD;;;GAGG;AACH,MAAM,CAAC,MAAM,qBAAqB,GAAgC,aAAa,CAC7E,WAAW,CAAC,oCAAoC,EAAE,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1,225 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* IAM Policy Command Controller
|
|
3
|
+
*
|
|
4
|
+
* This service manages the lifecycle of IAM policies in Stigmer.
|
|
5
|
+
* IAM policies define access control rules by connecting three key elements:
|
|
6
|
+
* - Principal: WHO gets access (user, team, etc.)
|
|
7
|
+
* - Resource: WHAT is being accessed (any API resource)
|
|
8
|
+
* - Relation: HOW they can access it (viewer, admin, user, etc.)
|
|
9
|
+
*
|
|
10
|
+
* Under the hood, each IAM policy creates an OpenFGA tuple that enforces
|
|
11
|
+
* the permission in the authorization system.
|
|
12
|
+
*
|
|
13
|
+
* Common Use Cases:
|
|
14
|
+
* - Granting users access to organizations
|
|
15
|
+
* - Setting up team-based access control
|
|
16
|
+
* - Managing fine-grained permissions on any resource
|
|
17
|
+
*
|
|
18
|
+
* @generated from service ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController
|
|
19
|
+
*/
|
|
20
|
+
export declare const IamPolicyCommandController: {
|
|
21
|
+
readonly typeName: "ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController";
|
|
22
|
+
readonly methods: {
|
|
23
|
+
/**
|
|
24
|
+
* Create a new IAM policy
|
|
25
|
+
*
|
|
26
|
+
* Creates a single IAM policy that grants a principal access to a resource with a specific relation.
|
|
27
|
+
* This is the fundamental operation for establishing permissions.
|
|
28
|
+
*
|
|
29
|
+
* The operation:
|
|
30
|
+
* 1. Validates the input (principal, resource, relation are all valid)
|
|
31
|
+
* 2. Checks for duplicates (skips if the exact policy already exists, idempotent)
|
|
32
|
+
* 3. Creates the policy in the database with auto-generated ID and metadata
|
|
33
|
+
* 4. Writes the corresponding tuple to OpenFGA (where authorization is enforced)
|
|
34
|
+
*
|
|
35
|
+
* Authorization:
|
|
36
|
+
* - Caller must have 'can_grant_access' permission on the RESOURCE being shared
|
|
37
|
+
* - This ensures only resource owners/admins can grant access to their resources
|
|
38
|
+
*
|
|
39
|
+
* Example:
|
|
40
|
+
* Input:
|
|
41
|
+
* principal: {kind: "identity_account", id: "ia-alice-123"}
|
|
42
|
+
* resource: {kind: "organization", id: "org-demo-456"}
|
|
43
|
+
* relation: "viewer"
|
|
44
|
+
* Result:
|
|
45
|
+
* Created IamPolicy with auto-generated ID (e.g., "iamp-01HQ...")
|
|
46
|
+
* Alice can view (but not modify) the organization
|
|
47
|
+
*
|
|
48
|
+
* Input: IamPolicySpec containing principal, resource, and relation
|
|
49
|
+
* Output: The created IamPolicy with generated ID and metadata
|
|
50
|
+
*
|
|
51
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.create
|
|
52
|
+
*/
|
|
53
|
+
readonly create: {
|
|
54
|
+
readonly name: "create";
|
|
55
|
+
readonly I: any;
|
|
56
|
+
readonly O: any;
|
|
57
|
+
readonly kind: any;
|
|
58
|
+
};
|
|
59
|
+
/**
|
|
60
|
+
* Delete a single IAM policy by spec
|
|
61
|
+
*
|
|
62
|
+
* Removes an existing IAM policy by matching the principal, resource, and relation.
|
|
63
|
+
* This is a surgical operation - it removes one specific policy without affecting others.
|
|
64
|
+
*
|
|
65
|
+
* The operation:
|
|
66
|
+
* 1. Finds the policy by matching principal+resource+relation
|
|
67
|
+
* 2. Removes it from the database
|
|
68
|
+
* 3. Deletes the corresponding tuple from OpenFGA
|
|
69
|
+
* 4. If no matching policy exists, the operation is idempotent (no error)
|
|
70
|
+
*
|
|
71
|
+
* Authorization:
|
|
72
|
+
* - Caller must have 'can_grant_access' permission on the RESOURCE referenced in the policy
|
|
73
|
+
*
|
|
74
|
+
* Use Cases:
|
|
75
|
+
* - Revoking a specific permission from a user
|
|
76
|
+
* - Removing access after a team member leaves
|
|
77
|
+
* - Cleaning up individual policies
|
|
78
|
+
*
|
|
79
|
+
* Example:
|
|
80
|
+
* Input:
|
|
81
|
+
* principal: {kind: "identity_account", id: "ia-alice-123"}
|
|
82
|
+
* resource: {kind: "organization", id: "org-demo-456"}
|
|
83
|
+
* relation: "viewer"
|
|
84
|
+
* Result: The policy granting Alice viewer access to the organization is deleted
|
|
85
|
+
*
|
|
86
|
+
* Input: IamPolicySpec identifying the policy to delete (principal, resource, relation)
|
|
87
|
+
* Output: The deleted IamPolicy object (for audit/confirmation purposes)
|
|
88
|
+
*
|
|
89
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.delete
|
|
90
|
+
*/
|
|
91
|
+
readonly delete: {
|
|
92
|
+
readonly name: "delete";
|
|
93
|
+
readonly I: any;
|
|
94
|
+
readonly O: any;
|
|
95
|
+
readonly kind: any;
|
|
96
|
+
};
|
|
97
|
+
/**
|
|
98
|
+
* Create platform link policy (operator-only)
|
|
99
|
+
*
|
|
100
|
+
* Creates a platform link policy that associates an identity account with the platform.
|
|
101
|
+
* This is a privileged operation that can only be called by platform operators.
|
|
102
|
+
*
|
|
103
|
+
* The operation:
|
|
104
|
+
* 1. Validates that caller has operator permission on platform:stigmer
|
|
105
|
+
* 2. Validates the input is a platform link (principal=platform, relation=platform)
|
|
106
|
+
* 3. Checks for duplicates (idempotent if already exists)
|
|
107
|
+
* 4. Creates the policy in the database with auto-generated ID and metadata
|
|
108
|
+
* 5. Writes the corresponding tuple to OpenFGA
|
|
109
|
+
*
|
|
110
|
+
* Authorization:
|
|
111
|
+
* - Caller must have 'operator' permission on platform:stigmer
|
|
112
|
+
* - This is typically only granted to machine accounts (service-to-service)
|
|
113
|
+
*
|
|
114
|
+
* Use Cases:
|
|
115
|
+
* - Bootstrapping new identity accounts
|
|
116
|
+
* - Initial permission setup when standard authorization cannot work yet
|
|
117
|
+
* - Establishing platform-level relationships for new resources
|
|
118
|
+
*
|
|
119
|
+
* Example:
|
|
120
|
+
* Input:
|
|
121
|
+
* principal: {kind: "platform", id: "stigmer"}
|
|
122
|
+
* resource: {kind: "identity_account", id: "ida-alice-123"}
|
|
123
|
+
* relation: "platform"
|
|
124
|
+
* Result:
|
|
125
|
+
* Created IamPolicy linking the identity account to the platform
|
|
126
|
+
* Machine accounts with operator permission can now manage this account
|
|
127
|
+
*
|
|
128
|
+
* Input: IamPolicySpec with principal=platform:stigmer, relation=platform, resource=identity_account:{id}
|
|
129
|
+
* Output: The created IamPolicy with generated ID and metadata
|
|
130
|
+
*
|
|
131
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.createPlatformLink
|
|
132
|
+
*/
|
|
133
|
+
readonly createPlatformLink: {
|
|
134
|
+
readonly name: "createPlatformLink";
|
|
135
|
+
readonly I: any;
|
|
136
|
+
readonly O: any;
|
|
137
|
+
readonly kind: any;
|
|
138
|
+
};
|
|
139
|
+
/**
|
|
140
|
+
* Bootstrap IAM policy during resource creation (operator-only)
|
|
141
|
+
*
|
|
142
|
+
* Creates IAM policies during resource creation when standard authorization cannot work yet
|
|
143
|
+
* because no tuples exist. This solves the chicken-and-egg problem where creating the first
|
|
144
|
+
* policy for a resource requires authorization, but authorization requires that first policy.
|
|
145
|
+
*
|
|
146
|
+
* The operation:
|
|
147
|
+
* 1. Validates that caller has operator permission on platform:stigmer
|
|
148
|
+
* 2. Validates the input (principal, resource, relation are all valid)
|
|
149
|
+
* 3. Checks for duplicates (skips if the exact policy already exists, idempotent)
|
|
150
|
+
* 4. Creates the policy in the database with auto-generated ID and metadata
|
|
151
|
+
* 5. Writes the corresponding tuple to OpenFGA (where authorization is enforced)
|
|
152
|
+
*
|
|
153
|
+
* Authorization:
|
|
154
|
+
* - Caller must have 'operator' permission on platform:stigmer
|
|
155
|
+
* - This is typically only called by resource creation handlers running as machine accounts
|
|
156
|
+
*
|
|
157
|
+
* Use Cases:
|
|
158
|
+
* - Creating scope links (agent#organization@organization:acme) during agent creation
|
|
159
|
+
* - Creating owner relations (agent#owner@identity_account:alice) during agent creation
|
|
160
|
+
* - Establishing initial authorization tuples for any newly created resource
|
|
161
|
+
*
|
|
162
|
+
* Example:
|
|
163
|
+
* Input:
|
|
164
|
+
* principal: {kind: "organization", id: "org-demo-123"}
|
|
165
|
+
* resource: {kind: "agent", id: "agt-abc-456"}
|
|
166
|
+
* relation: "organization"
|
|
167
|
+
* Result:
|
|
168
|
+
* Created IamPolicy establishing agent's organization scope
|
|
169
|
+
* Subsequent IAM policy operations can now use standard authorization
|
|
170
|
+
*
|
|
171
|
+
* Note: After the bootstrap policies are created, subsequent IAM policy modifications
|
|
172
|
+
* must use the standard 'create' RPC which requires 'can_grant_access' permission.
|
|
173
|
+
*
|
|
174
|
+
* Input: IamPolicySpec containing principal, resource, and relation
|
|
175
|
+
* Output: The created IamPolicy with generated ID and metadata
|
|
176
|
+
*
|
|
177
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.bootstrapPolicy
|
|
178
|
+
*/
|
|
179
|
+
readonly bootstrapPolicy: {
|
|
180
|
+
readonly name: "bootstrapPolicy";
|
|
181
|
+
readonly I: any;
|
|
182
|
+
readonly O: any;
|
|
183
|
+
readonly kind: any;
|
|
184
|
+
};
|
|
185
|
+
/**
|
|
186
|
+
* Cleanup all IAM policies for a deleted resource (operator-only)
|
|
187
|
+
*
|
|
188
|
+
* This is a system-level cleanup operation that removes all IAM policies
|
|
189
|
+
* associated with a deleted resource. It performs bidirectional cleanup:
|
|
190
|
+
* 1. Policies where resource is the TARGET (policies granting access TO this resource)
|
|
191
|
+
* 2. Policies where resource is the PRINCIPAL (policies where this resource HAS access)
|
|
192
|
+
*
|
|
193
|
+
* The operation:
|
|
194
|
+
* 1. Validates operator permission on platform:stigmer
|
|
195
|
+
* 2. Finds all policies where resource_id appears (as principal OR resource)
|
|
196
|
+
* 3. Deletes all matching policies from MongoDB
|
|
197
|
+
* 4. Removes all corresponding tuples from OpenFGA
|
|
198
|
+
* 5. Returns Empty (idempotent if no policies exist)
|
|
199
|
+
*
|
|
200
|
+
* Authorization:
|
|
201
|
+
* - Caller must have 'operator' permission on platform:stigmer
|
|
202
|
+
* - This is typically only granted to platform services
|
|
203
|
+
*
|
|
204
|
+
* Use Cases:
|
|
205
|
+
* - Resource deletion cleanup
|
|
206
|
+
* - Preventing orphaned FGA tuples
|
|
207
|
+
* - Maintaining authorization system integrity
|
|
208
|
+
*
|
|
209
|
+
* Example:
|
|
210
|
+
* Input: {kind: "organization", id: "org-demo-123"}
|
|
211
|
+
* Result: All policies referencing org-demo-123 are deleted
|
|
212
|
+
*
|
|
213
|
+
* Input: ApiResourceRef with resource kind and ID
|
|
214
|
+
* Output: Empty (google.protobuf.Empty)
|
|
215
|
+
*
|
|
216
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.cleanupResourcePolicies
|
|
217
|
+
*/
|
|
218
|
+
readonly cleanupResourcePolicies: {
|
|
219
|
+
readonly name: "cleanupResourcePolicies";
|
|
220
|
+
readonly I: any;
|
|
221
|
+
readonly O: any;
|
|
222
|
+
readonly kind: any;
|
|
223
|
+
};
|
|
224
|
+
};
|
|
225
|
+
};
|
|
@@ -0,0 +1,231 @@
|
|
|
1
|
+
// @generated by protoc-gen-connect-es v1.6.1 with parameter "target=ts"
|
|
2
|
+
// @generated from file ai/stigmer/iam/iampolicy/v1/command.proto (package ai.stigmer.iam.iampolicy.v1, syntax proto3)
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
// @ts-nocheck
|
|
5
|
+
import { Empty, MethodKind } from "@bufbuild/protobuf";
|
|
6
|
+
/**
|
|
7
|
+
* IAM Policy Command Controller
|
|
8
|
+
*
|
|
9
|
+
* This service manages the lifecycle of IAM policies in Stigmer.
|
|
10
|
+
* IAM policies define access control rules by connecting three key elements:
|
|
11
|
+
* - Principal: WHO gets access (user, team, etc.)
|
|
12
|
+
* - Resource: WHAT is being accessed (any API resource)
|
|
13
|
+
* - Relation: HOW they can access it (viewer, admin, user, etc.)
|
|
14
|
+
*
|
|
15
|
+
* Under the hood, each IAM policy creates an OpenFGA tuple that enforces
|
|
16
|
+
* the permission in the authorization system.
|
|
17
|
+
*
|
|
18
|
+
* Common Use Cases:
|
|
19
|
+
* - Granting users access to organizations
|
|
20
|
+
* - Setting up team-based access control
|
|
21
|
+
* - Managing fine-grained permissions on any resource
|
|
22
|
+
*
|
|
23
|
+
* @generated from service ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController
|
|
24
|
+
*/
|
|
25
|
+
export const IamPolicyCommandController = {
|
|
26
|
+
typeName: "ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController",
|
|
27
|
+
methods: {
|
|
28
|
+
/**
|
|
29
|
+
* Create a new IAM policy
|
|
30
|
+
*
|
|
31
|
+
* Creates a single IAM policy that grants a principal access to a resource with a specific relation.
|
|
32
|
+
* This is the fundamental operation for establishing permissions.
|
|
33
|
+
*
|
|
34
|
+
* The operation:
|
|
35
|
+
* 1. Validates the input (principal, resource, relation are all valid)
|
|
36
|
+
* 2. Checks for duplicates (skips if the exact policy already exists, idempotent)
|
|
37
|
+
* 3. Creates the policy in the database with auto-generated ID and metadata
|
|
38
|
+
* 4. Writes the corresponding tuple to OpenFGA (where authorization is enforced)
|
|
39
|
+
*
|
|
40
|
+
* Authorization:
|
|
41
|
+
* - Caller must have 'can_grant_access' permission on the RESOURCE being shared
|
|
42
|
+
* - This ensures only resource owners/admins can grant access to their resources
|
|
43
|
+
*
|
|
44
|
+
* Example:
|
|
45
|
+
* Input:
|
|
46
|
+
* principal: {kind: "identity_account", id: "ia-alice-123"}
|
|
47
|
+
* resource: {kind: "organization", id: "org-demo-456"}
|
|
48
|
+
* relation: "viewer"
|
|
49
|
+
* Result:
|
|
50
|
+
* Created IamPolicy with auto-generated ID (e.g., "iamp-01HQ...")
|
|
51
|
+
* Alice can view (but not modify) the organization
|
|
52
|
+
*
|
|
53
|
+
* Input: IamPolicySpec containing principal, resource, and relation
|
|
54
|
+
* Output: The created IamPolicy with generated ID and metadata
|
|
55
|
+
*
|
|
56
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.create
|
|
57
|
+
*/
|
|
58
|
+
create: {
|
|
59
|
+
name: "create",
|
|
60
|
+
I: IamPolicySpec,
|
|
61
|
+
O: IamPolicy,
|
|
62
|
+
kind: MethodKind.Unary,
|
|
63
|
+
},
|
|
64
|
+
/**
|
|
65
|
+
* Delete a single IAM policy by spec
|
|
66
|
+
*
|
|
67
|
+
* Removes an existing IAM policy by matching the principal, resource, and relation.
|
|
68
|
+
* This is a surgical operation - it removes one specific policy without affecting others.
|
|
69
|
+
*
|
|
70
|
+
* The operation:
|
|
71
|
+
* 1. Finds the policy by matching principal+resource+relation
|
|
72
|
+
* 2. Removes it from the database
|
|
73
|
+
* 3. Deletes the corresponding tuple from OpenFGA
|
|
74
|
+
* 4. If no matching policy exists, the operation is idempotent (no error)
|
|
75
|
+
*
|
|
76
|
+
* Authorization:
|
|
77
|
+
* - Caller must have 'can_grant_access' permission on the RESOURCE referenced in the policy
|
|
78
|
+
*
|
|
79
|
+
* Use Cases:
|
|
80
|
+
* - Revoking a specific permission from a user
|
|
81
|
+
* - Removing access after a team member leaves
|
|
82
|
+
* - Cleaning up individual policies
|
|
83
|
+
*
|
|
84
|
+
* Example:
|
|
85
|
+
* Input:
|
|
86
|
+
* principal: {kind: "identity_account", id: "ia-alice-123"}
|
|
87
|
+
* resource: {kind: "organization", id: "org-demo-456"}
|
|
88
|
+
* relation: "viewer"
|
|
89
|
+
* Result: The policy granting Alice viewer access to the organization is deleted
|
|
90
|
+
*
|
|
91
|
+
* Input: IamPolicySpec identifying the policy to delete (principal, resource, relation)
|
|
92
|
+
* Output: The deleted IamPolicy object (for audit/confirmation purposes)
|
|
93
|
+
*
|
|
94
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.delete
|
|
95
|
+
*/
|
|
96
|
+
delete: {
|
|
97
|
+
name: "delete",
|
|
98
|
+
I: IamPolicySpec,
|
|
99
|
+
O: IamPolicy,
|
|
100
|
+
kind: MethodKind.Unary,
|
|
101
|
+
},
|
|
102
|
+
/**
|
|
103
|
+
* Create platform link policy (operator-only)
|
|
104
|
+
*
|
|
105
|
+
* Creates a platform link policy that associates an identity account with the platform.
|
|
106
|
+
* This is a privileged operation that can only be called by platform operators.
|
|
107
|
+
*
|
|
108
|
+
* The operation:
|
|
109
|
+
* 1. Validates that caller has operator permission on platform:stigmer
|
|
110
|
+
* 2. Validates the input is a platform link (principal=platform, relation=platform)
|
|
111
|
+
* 3. Checks for duplicates (idempotent if already exists)
|
|
112
|
+
* 4. Creates the policy in the database with auto-generated ID and metadata
|
|
113
|
+
* 5. Writes the corresponding tuple to OpenFGA
|
|
114
|
+
*
|
|
115
|
+
* Authorization:
|
|
116
|
+
* - Caller must have 'operator' permission on platform:stigmer
|
|
117
|
+
* - This is typically only granted to machine accounts (service-to-service)
|
|
118
|
+
*
|
|
119
|
+
* Use Cases:
|
|
120
|
+
* - Bootstrapping new identity accounts
|
|
121
|
+
* - Initial permission setup when standard authorization cannot work yet
|
|
122
|
+
* - Establishing platform-level relationships for new resources
|
|
123
|
+
*
|
|
124
|
+
* Example:
|
|
125
|
+
* Input:
|
|
126
|
+
* principal: {kind: "platform", id: "stigmer"}
|
|
127
|
+
* resource: {kind: "identity_account", id: "ida-alice-123"}
|
|
128
|
+
* relation: "platform"
|
|
129
|
+
* Result:
|
|
130
|
+
* Created IamPolicy linking the identity account to the platform
|
|
131
|
+
* Machine accounts with operator permission can now manage this account
|
|
132
|
+
*
|
|
133
|
+
* Input: IamPolicySpec with principal=platform:stigmer, relation=platform, resource=identity_account:{id}
|
|
134
|
+
* Output: The created IamPolicy with generated ID and metadata
|
|
135
|
+
*
|
|
136
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.createPlatformLink
|
|
137
|
+
*/
|
|
138
|
+
createPlatformLink: {
|
|
139
|
+
name: "createPlatformLink",
|
|
140
|
+
I: IamPolicySpec,
|
|
141
|
+
O: IamPolicy,
|
|
142
|
+
kind: MethodKind.Unary,
|
|
143
|
+
},
|
|
144
|
+
/**
|
|
145
|
+
* Bootstrap IAM policy during resource creation (operator-only)
|
|
146
|
+
*
|
|
147
|
+
* Creates IAM policies during resource creation when standard authorization cannot work yet
|
|
148
|
+
* because no tuples exist. This solves the chicken-and-egg problem where creating the first
|
|
149
|
+
* policy for a resource requires authorization, but authorization requires that first policy.
|
|
150
|
+
*
|
|
151
|
+
* The operation:
|
|
152
|
+
* 1. Validates that caller has operator permission on platform:stigmer
|
|
153
|
+
* 2. Validates the input (principal, resource, relation are all valid)
|
|
154
|
+
* 3. Checks for duplicates (skips if the exact policy already exists, idempotent)
|
|
155
|
+
* 4. Creates the policy in the database with auto-generated ID and metadata
|
|
156
|
+
* 5. Writes the corresponding tuple to OpenFGA (where authorization is enforced)
|
|
157
|
+
*
|
|
158
|
+
* Authorization:
|
|
159
|
+
* - Caller must have 'operator' permission on platform:stigmer
|
|
160
|
+
* - This is typically only called by resource creation handlers running as machine accounts
|
|
161
|
+
*
|
|
162
|
+
* Use Cases:
|
|
163
|
+
* - Creating scope links (agent#organization@organization:acme) during agent creation
|
|
164
|
+
* - Creating owner relations (agent#owner@identity_account:alice) during agent creation
|
|
165
|
+
* - Establishing initial authorization tuples for any newly created resource
|
|
166
|
+
*
|
|
167
|
+
* Example:
|
|
168
|
+
* Input:
|
|
169
|
+
* principal: {kind: "organization", id: "org-demo-123"}
|
|
170
|
+
* resource: {kind: "agent", id: "agt-abc-456"}
|
|
171
|
+
* relation: "organization"
|
|
172
|
+
* Result:
|
|
173
|
+
* Created IamPolicy establishing agent's organization scope
|
|
174
|
+
* Subsequent IAM policy operations can now use standard authorization
|
|
175
|
+
*
|
|
176
|
+
* Note: After the bootstrap policies are created, subsequent IAM policy modifications
|
|
177
|
+
* must use the standard 'create' RPC which requires 'can_grant_access' permission.
|
|
178
|
+
*
|
|
179
|
+
* Input: IamPolicySpec containing principal, resource, and relation
|
|
180
|
+
* Output: The created IamPolicy with generated ID and metadata
|
|
181
|
+
*
|
|
182
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.bootstrapPolicy
|
|
183
|
+
*/
|
|
184
|
+
bootstrapPolicy: {
|
|
185
|
+
name: "bootstrapPolicy",
|
|
186
|
+
I: IamPolicySpec,
|
|
187
|
+
O: IamPolicy,
|
|
188
|
+
kind: MethodKind.Unary,
|
|
189
|
+
},
|
|
190
|
+
/**
|
|
191
|
+
* Cleanup all IAM policies for a deleted resource (operator-only)
|
|
192
|
+
*
|
|
193
|
+
* This is a system-level cleanup operation that removes all IAM policies
|
|
194
|
+
* associated with a deleted resource. It performs bidirectional cleanup:
|
|
195
|
+
* 1. Policies where resource is the TARGET (policies granting access TO this resource)
|
|
196
|
+
* 2. Policies where resource is the PRINCIPAL (policies where this resource HAS access)
|
|
197
|
+
*
|
|
198
|
+
* The operation:
|
|
199
|
+
* 1. Validates operator permission on platform:stigmer
|
|
200
|
+
* 2. Finds all policies where resource_id appears (as principal OR resource)
|
|
201
|
+
* 3. Deletes all matching policies from MongoDB
|
|
202
|
+
* 4. Removes all corresponding tuples from OpenFGA
|
|
203
|
+
* 5. Returns Empty (idempotent if no policies exist)
|
|
204
|
+
*
|
|
205
|
+
* Authorization:
|
|
206
|
+
* - Caller must have 'operator' permission on platform:stigmer
|
|
207
|
+
* - This is typically only granted to platform services
|
|
208
|
+
*
|
|
209
|
+
* Use Cases:
|
|
210
|
+
* - Resource deletion cleanup
|
|
211
|
+
* - Preventing orphaned FGA tuples
|
|
212
|
+
* - Maintaining authorization system integrity
|
|
213
|
+
*
|
|
214
|
+
* Example:
|
|
215
|
+
* Input: {kind: "organization", id: "org-demo-123"}
|
|
216
|
+
* Result: All policies referencing org-demo-123 are deleted
|
|
217
|
+
*
|
|
218
|
+
* Input: ApiResourceRef with resource kind and ID
|
|
219
|
+
* Output: Empty (google.protobuf.Empty)
|
|
220
|
+
*
|
|
221
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyCommandController.cleanupResourcePolicies
|
|
222
|
+
*/
|
|
223
|
+
cleanupResourcePolicies: {
|
|
224
|
+
name: "cleanupResourcePolicies",
|
|
225
|
+
I: ApiResourceRef,
|
|
226
|
+
O: Empty,
|
|
227
|
+
kind: MethodKind.Unary,
|
|
228
|
+
},
|
|
229
|
+
}
|
|
230
|
+
};
|
|
231
|
+
//# sourceMappingURL=command_connect.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"command_connect.js","sourceRoot":"","sources":["../../../../../../ai/stigmer/iam/iampolicy/v1/command_connect.ts"],"names":[],"mappings":"AAAA,wEAAwE;AACxE,sHAAsH;AACtH,oBAAoB;AACpB,cAAc;AAId,OAAO,EAAE,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAEvD;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAM,CAAC,MAAM,0BAA0B,GAAG;IACxC,QAAQ,EAAE,wDAAwD;IAClE,OAAO,EAAE;QACP;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WA6BG;QACH,MAAM,EAAE;YACN,IAAI,EAAE,QAAQ;YACd,CAAC,EAAE,aAAa;YAChB,CAAC,EAAE,SAAS;YACZ,IAAI,EAAE,UAAU,CAAC,KAAK;SACvB;QACD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WA+BG;QACH,MAAM,EAAE;YACN,IAAI,EAAE,QAAQ;YACd,CAAC,EAAE,aAAa;YAChB,CAAC,EAAE,SAAS;YACZ,IAAI,EAAE,UAAU,CAAC,KAAK;SACvB;QACD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WAmCG;QACH,kBAAkB,EAAE;YAClB,IAAI,EAAE,oBAAoB;YAC1B,CAAC,EAAE,aAAa;YAChB,CAAC,EAAE,SAAS;YACZ,IAAI,EAAE,UAAU,CAAC,KAAK;SACvB;QACD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WAuCG;QACH,eAAe,EAAE;YACf,IAAI,EAAE,iBAAiB;YACvB,CAAC,EAAE,aAAa;YAChB,CAAC,EAAE,SAAS;YACZ,IAAI,EAAE,UAAU,CAAC,KAAK;SACvB;QACD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;WAgCG;QACH,uBAAuB,EAAE;YACvB,IAAI,EAAE,yBAAyB;YAC/B,CAAC,EAAE,cAAc;YACjB,CAAC,EAAE,KAAK;YACR,IAAI,EAAE,UAAU,CAAC,KAAK;SACvB;KACF;CACO,CAAC"}
|