@stigmer/protos 0.0.34
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +190 -0
- package/README.md +35 -0
- package/ai/stigmer/agentic/agent/v1/api_pb.d.ts +53 -0
- package/ai/stigmer/agentic/agent/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/agent/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/command_connect.d.ts +60 -0
- package/ai/stigmer/agentic/agent/v1/command_connect.js +66 -0
- package/ai/stigmer/agentic/agent/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/command_pb.d.ts +60 -0
- package/ai/stigmer/agentic/agent/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/agent/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/io_pb.d.ts +22 -0
- package/ai/stigmer/agentic/agent/v1/io_pb.js +15 -0
- package/ai/stigmer/agentic/agent/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/query_connect.d.ts +32 -0
- package/ai/stigmer/agentic/agent/v1/query_connect.js +38 -0
- package/ai/stigmer/agentic/agent/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/query_pb.d.ts +35 -0
- package/ai/stigmer/agentic/agent/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/agent/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/spec_pb.d.ts +373 -0
- package/ai/stigmer/agentic/agent/v1/spec_pb.js +38 -0
- package/ai/stigmer/agentic/agent/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/agent/v1/status_pb.d.ts +34 -0
- package/ai/stigmer/agentic/agent/v1/status_pb.js +15 -0
- package/ai/stigmer/agentic/agent/v1/status_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/api_pb.d.ts +296 -0
- package/ai/stigmer/agentic/agentexecution/v1/api_pb.js +35 -0
- package/ai/stigmer/agentic/agentexecution/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/approval_pb.d.ts +206 -0
- package/ai/stigmer/agentic/agentexecution/v1/approval_pb.js +19 -0
- package/ai/stigmer/agentic/agentexecution/v1/approval_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/artifact_pb.d.ts +91 -0
- package/ai/stigmer/agentic/agentexecution/v1/artifact_pb.js +16 -0
- package/ai/stigmer/agentic/agentexecution/v1/artifact_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_connect.d.ts +413 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_connect.js +419 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_pb.d.ts +407 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_pb.js +21 -0
- package/ai/stigmer/agentic/agentexecution/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/context_pb.d.ts +403 -0
- package/ai/stigmer/agentic/agentexecution/v1/context_pb.js +30 -0
- package/ai/stigmer/agentic/agentexecution/v1/context_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/enum_pb.d.ts +526 -0
- package/ai/stigmer/agentic/agentexecution/v1/enum_pb.js +538 -0
- package/ai/stigmer/agentic/agentexecution/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/io_pb.d.ts +1335 -0
- package/ai/stigmer/agentic/agentexecution/v1/io_pb.js +148 -0
- package/ai/stigmer/agentic/agentexecution/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/message_pb.d.ts +316 -0
- package/ai/stigmer/agentic/agentexecution/v1/message_pb.js +27 -0
- package/ai/stigmer/agentic/agentexecution/v1/message_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_connect.d.ts +146 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_connect.js +152 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_pb.d.ts +142 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_pb.js +19 -0
- package/ai/stigmer/agentic/agentexecution/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/spec_pb.d.ts +562 -0
- package/ai/stigmer/agentic/agentexecution/v1/spec_pb.js +31 -0
- package/ai/stigmer/agentic/agentexecution/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/subagent_pb.d.ts +129 -0
- package/ai/stigmer/agentic/agentexecution/v1/subagent_pb.js +20 -0
- package/ai/stigmer/agentic/agentexecution/v1/subagent_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentexecution/v1/usage_pb.d.ts +413 -0
- package/ai/stigmer/agentic/agentexecution/v1/usage_pb.js +24 -0
- package/ai/stigmer/agentic/agentexecution/v1/usage_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/api_pb.d.ts +52 -0
- package/ai/stigmer/agentic/agentinstance/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/agentinstance/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_connect.d.ts +71 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_connect.js +77 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_pb.d.ts +71 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_pb.js +20 -0
- package/ai/stigmer/agentic/agentinstance/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/io_pb.d.ts +74 -0
- package/ai/stigmer/agentic/agentinstance/v1/io_pb.js +27 -0
- package/ai/stigmer/agentic/agentinstance/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_connect.d.ts +46 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_connect.js +52 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_pb.d.ts +48 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/agentinstance/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/agentinstance/v1/spec_pb.d.ts +42 -0
- package/ai/stigmer/agentic/agentinstance/v1/spec_pb.js +16 -0
- package/ai/stigmer/agentic/agentinstance/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/api_pb.d.ts +54 -0
- package/ai/stigmer/agentic/environment/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/environment/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/command_connect.d.ts +56 -0
- package/ai/stigmer/agentic/environment/v1/command_connect.js +62 -0
- package/ai/stigmer/agentic/environment/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/command_pb.d.ts +56 -0
- package/ai/stigmer/agentic/environment/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/environment/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/io_pb.d.ts +22 -0
- package/ai/stigmer/agentic/environment/v1/io_pb.js +15 -0
- package/ai/stigmer/agentic/environment/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/query_connect.d.ts +32 -0
- package/ai/stigmer/agentic/environment/v1/query_connect.js +38 -0
- package/ai/stigmer/agentic/environment/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/query_pb.d.ts +34 -0
- package/ai/stigmer/agentic/environment/v1/query_pb.js +19 -0
- package/ai/stigmer/agentic/environment/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/environment/v1/spec_pb.d.ts +79 -0
- package/ai/stigmer/agentic/environment/v1/spec_pb.js +19 -0
- package/ai/stigmer/agentic/environment/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/api_pb.d.ts +54 -0
- package/ai/stigmer/agentic/executioncontext/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/executioncontext/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_connect.d.ts +46 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_connect.js +52 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_pb.d.ts +47 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_pb.js +20 -0
- package/ai/stigmer/agentic/executioncontext/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/io_pb.d.ts +44 -0
- package/ai/stigmer/agentic/executioncontext/v1/io_pb.js +20 -0
- package/ai/stigmer/agentic/executioncontext/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_connect.d.ts +54 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_connect.js +60 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_pb.d.ts +56 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/executioncontext/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/executioncontext/v1/spec_pb.d.ts +69 -0
- package/ai/stigmer/agentic/executioncontext/v1/spec_pb.js +20 -0
- package/ai/stigmer/agentic/executioncontext/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/api_pb.d.ts +129 -0
- package/ai/stigmer/agentic/mcpserver/v1/api_pb.js +23 -0
- package/ai/stigmer/agentic/mcpserver/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_connect.d.ts +136 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_connect.js +142 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_pb.d.ts +136 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_pb.js +29 -0
- package/ai/stigmer/agentic/mcpserver/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/io_pb.d.ts +62 -0
- package/ai/stigmer/agentic/mcpserver/v1/io_pb.js +21 -0
- package/ai/stigmer/agentic/mcpserver/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_connect.d.ts +59 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_connect.js +65 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_pb.d.ts +61 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_pb.js +25 -0
- package/ai/stigmer/agentic/mcpserver/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/spec_pb.d.ts +332 -0
- package/ai/stigmer/agentic/mcpserver/v1/spec_pb.js +31 -0
- package/ai/stigmer/agentic/mcpserver/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/mcpserver/v1/status_pb.d.ts +290 -0
- package/ai/stigmer/agentic/mcpserver/v1/status_pb.js +104 -0
- package/ai/stigmer/agentic/mcpserver/v1/status_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/api_pb.d.ts +52 -0
- package/ai/stigmer/agentic/session/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/session/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/command_connect.d.ts +57 -0
- package/ai/stigmer/agentic/session/v1/command_connect.js +63 -0
- package/ai/stigmer/agentic/session/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/command_pb.d.ts +57 -0
- package/ai/stigmer/agentic/session/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/session/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/io_pb.d.ts +123 -0
- package/ai/stigmer/agentic/session/v1/io_pb.js +36 -0
- package/ai/stigmer/agentic/session/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/query_connect.d.ts +43 -0
- package/ai/stigmer/agentic/session/v1/query_connect.js +49 -0
- package/ai/stigmer/agentic/session/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/query_pb.d.ts +44 -0
- package/ai/stigmer/agentic/session/v1/query_pb.js +19 -0
- package/ai/stigmer/agentic/session/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/spec_pb.d.ts +66 -0
- package/ai/stigmer/agentic/session/v1/spec_pb.js +16 -0
- package/ai/stigmer/agentic/session/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/session/v1/workspace_pb.d.ts +167 -0
- package/ai/stigmer/agentic/session/v1/workspace_pb.js +30 -0
- package/ai/stigmer/agentic/session/v1/workspace_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/api_pb.d.ts +85 -0
- package/ai/stigmer/agentic/skill/v1/api_pb.js +23 -0
- package/ai/stigmer/agentic/skill/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/command_connect.d.ts +50 -0
- package/ai/stigmer/agentic/skill/v1/command_connect.js +56 -0
- package/ai/stigmer/agentic/skill/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/command_pb.d.ts +52 -0
- package/ai/stigmer/agentic/skill/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/skill/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/io_pb.d.ts +118 -0
- package/ai/stigmer/agentic/skill/v1/io_pb.js +31 -0
- package/ai/stigmer/agentic/skill/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/query_connect.d.ts +57 -0
- package/ai/stigmer/agentic/skill/v1/query_connect.js +63 -0
- package/ai/stigmer/agentic/skill/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/query_pb.d.ts +59 -0
- package/ai/stigmer/agentic/skill/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/skill/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/spec_pb.d.ts +59 -0
- package/ai/stigmer/agentic/skill/v1/spec_pb.js +15 -0
- package/ai/stigmer/agentic/skill/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/status_pb.d.ts +146 -0
- package/ai/stigmer/agentic/skill/v1/status_pb.js +57 -0
- package/ai/stigmer/agentic/skill/v1/status_pb.js.map +1 -0
- package/ai/stigmer/agentic/skill/v1/synth_pb.d.ts +125 -0
- package/ai/stigmer/agentic/skill/v1/synth_pb.js +24 -0
- package/ai/stigmer/agentic/skill/v1/synth_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/api_pb.d.ts +53 -0
- package/ai/stigmer/agentic/workflow/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/workflow/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/command_connect.d.ts +60 -0
- package/ai/stigmer/agentic/workflow/v1/command_connect.js +66 -0
- package/ai/stigmer/agentic/workflow/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/command_pb.d.ts +60 -0
- package/ai/stigmer/agentic/workflow/v1/command_pb.js +19 -0
- package/ai/stigmer/agentic/workflow/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/enum_pb.d.ts +138 -0
- package/ai/stigmer/agentic/workflow/v1/enum_pb.js +143 -0
- package/ai/stigmer/agentic/workflow/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/io_pb.d.ts +22 -0
- package/ai/stigmer/agentic/workflow/v1/io_pb.js +15 -0
- package/ai/stigmer/agentic/workflow/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/query_connect.d.ts +32 -0
- package/ai/stigmer/agentic/workflow/v1/query_connect.js +38 -0
- package/ai/stigmer/agentic/workflow/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/query_pb.d.ts +35 -0
- package/ai/stigmer/agentic/workflow/v1/query_pb.js +20 -0
- package/ai/stigmer/agentic/workflow/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/serverless/validation_pb.d.ts +119 -0
- package/ai/stigmer/agentic/workflow/v1/serverless/validation_pb.js +63 -0
- package/ai/stigmer/agentic/workflow/v1/serverless/validation_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/spec_pb.d.ts +222 -0
- package/ai/stigmer/agentic/workflow/v1/spec_pb.js +39 -0
- package/ai/stigmer/agentic/workflow/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/status_pb.d.ts +48 -0
- package/ai/stigmer/agentic/workflow/v1/status_pb.js +16 -0
- package/ai/stigmer/agentic/workflow/v1/status_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/agent_call_pb.d.ts +153 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/agent_call_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/agent_call_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/call_activity_pb.d.ts +45 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/call_activity_pb.js +17 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/call_activity_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/for_pb.d.ts +58 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/for_pb.js +17 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/for_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/fork_pb.d.ts +77 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/fork_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/fork_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/grpc_call_pb.d.ts +53 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/grpc_call_pb.js +17 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/grpc_call_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/http_call_pb.d.ts +87 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/http_call_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/http_call_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/listen_pb.d.ts +90 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/listen_pb.js +26 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/listen_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/raise_pb.d.ts +41 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/raise_pb.js +16 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/raise_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/run_pb.d.ts +43 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/run_pb.js +17 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/run_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/set_pb.d.ts +39 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/set_pb.js +16 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/set_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/switch_pb.d.ts +71 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/switch_pb.js +21 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/switch_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/try_pb.d.ts +80 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/try_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/try_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/wait_pb.d.ts +121 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/wait_pb.js +22 -0
- package/ai/stigmer/agentic/workflow/v1/tasks/wait_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/api_pb.d.ts +716 -0
- package/ai/stigmer/agentic/workflowexecution/v1/api_pb.js +31 -0
- package/ai/stigmer/agentic/workflowexecution/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_connect.d.ts +833 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_connect.js +839 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_pb.d.ts +827 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_pb.js +33 -0
- package/ai/stigmer/agentic/workflowexecution/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/enum_pb.d.ts +693 -0
- package/ai/stigmer/agentic/workflowexecution/v1/enum_pb.js +700 -0
- package/ai/stigmer/agentic/workflowexecution/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/io_pb.d.ts +1198 -0
- package/ai/stigmer/agentic/workflowexecution/v1/io_pb.js +211 -0
- package/ai/stigmer/agentic/workflowexecution/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_connect.d.ts +391 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_connect.js +397 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_pb.d.ts +391 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_pb.js +32 -0
- package/ai/stigmer/agentic/workflowexecution/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowexecution/v1/spec_pb.d.ts +332 -0
- package/ai/stigmer/agentic/workflowexecution/v1/spec_pb.js +15 -0
- package/ai/stigmer/agentic/workflowexecution/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/api_pb.d.ts +82 -0
- package/ai/stigmer/agentic/workflowinstance/v1/api_pb.js +18 -0
- package/ai/stigmer/agentic/workflowinstance/v1/api_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_connect.d.ts +139 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_connect.js +145 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_pb.d.ts +139 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_pb.js +29 -0
- package/ai/stigmer/agentic/workflowinstance/v1/command_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/io_pb.d.ts +119 -0
- package/ai/stigmer/agentic/workflowinstance/v1/io_pb.js +27 -0
- package/ai/stigmer/agentic/workflowinstance/v1/io_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_connect.d.ts +142 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_connect.js +148 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_connect.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_pb.d.ts +144 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_pb.js +30 -0
- package/ai/stigmer/agentic/workflowinstance/v1/query_pb.js.map +1 -0
- package/ai/stigmer/agentic/workflowinstance/v1/spec_pb.d.ts +97 -0
- package/ai/stigmer/agentic/workflowinstance/v1/spec_pb.js +16 -0
- package/ai/stigmer/agentic/workflowinstance/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_group_pb.d.ts +68 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_group_pb.js +53 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_group_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_kind_pb.d.ts +253 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_kind_pb.js +199 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/api_resource_kind_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/authorization_config_pb.d.ts +257 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/authorization_config_pb.js +128 -0
- package/ai/stigmer/commons/apiresource/apiresourcekind/authorization_config_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/enum_pb.d.ts +122 -0
- package/ai/stigmer/commons/apiresource/enum_pb.js +129 -0
- package/ai/stigmer/commons/apiresource/enum_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/field_options_pb.d.ts +48 -0
- package/ai/stigmer/commons/apiresource/field_options_pb.js +52 -0
- package/ai/stigmer/commons/apiresource/field_options_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/io_pb.d.ts +185 -0
- package/ai/stigmer/commons/apiresource/io_pb.js +37 -0
- package/ai/stigmer/commons/apiresource/io_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/metadata_pb.d.ts +115 -0
- package/ai/stigmer/commons/apiresource/metadata_pb.js +21 -0
- package/ai/stigmer/commons/apiresource/metadata_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/rpc_service_options_pb.d.ts +11 -0
- package/ai/stigmer/commons/apiresource/rpc_service_options_pb.js +15 -0
- package/ai/stigmer/commons/apiresource/rpc_service_options_pb.js.map +1 -0
- package/ai/stigmer/commons/apiresource/status_pb.d.ts +115 -0
- package/ai/stigmer/commons/apiresource/status_pb.js +30 -0
- package/ai/stigmer/commons/apiresource/status_pb.js.map +1 -0
- package/ai/stigmer/commons/rpc/pagination_pb.d.ts +49 -0
- package/ai/stigmer/commons/rpc/pagination_pb.js +19 -0
- package/ai/stigmer/commons/rpc/pagination_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/api_pb.d.ts +74 -0
- package/ai/stigmer/iam/apikey/v1/api_pb.js +24 -0
- package/ai/stigmer/iam/apikey/v1/api_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/command_connect.d.ts +43 -0
- package/ai/stigmer/iam/apikey/v1/command_connect.js +49 -0
- package/ai/stigmer/iam/apikey/v1/command_connect.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/command_pb.d.ts +44 -0
- package/ai/stigmer/iam/apikey/v1/command_pb.js +19 -0
- package/ai/stigmer/iam/apikey/v1/command_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/io_pb.d.ts +55 -0
- package/ai/stigmer/iam/apikey/v1/io_pb.js +26 -0
- package/ai/stigmer/iam/apikey/v1/io_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/query_connect.d.ts +46 -0
- package/ai/stigmer/iam/apikey/v1/query_connect.js +52 -0
- package/ai/stigmer/iam/apikey/v1/query_connect.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/query_pb.d.ts +48 -0
- package/ai/stigmer/iam/apikey/v1/query_pb.js +20 -0
- package/ai/stigmer/iam/apikey/v1/query_pb.js.map +1 -0
- package/ai/stigmer/iam/apikey/v1/spec_pb.d.ts +46 -0
- package/ai/stigmer/iam/apikey/v1/spec_pb.js +16 -0
- package/ai/stigmer/iam/apikey/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/api_pb.d.ts +81 -0
- package/ai/stigmer/iam/iampolicy/v1/api_pb.js +23 -0
- package/ai/stigmer/iam/iampolicy/v1/api_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/command_connect.d.ts +225 -0
- package/ai/stigmer/iam/iampolicy/v1/command_connect.js +231 -0
- package/ai/stigmer/iam/iampolicy/v1/command_connect.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/command_pb.d.ts +225 -0
- package/ai/stigmer/iam/iampolicy/v1/command_pb.js +34 -0
- package/ai/stigmer/iam/iampolicy/v1/command_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/io_pb.d.ts +555 -0
- package/ai/stigmer/iam/iampolicy/v1/io_pb.js +122 -0
- package/ai/stigmer/iam/iampolicy/v1/io_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/query_connect.d.ts +91 -0
- package/ai/stigmer/iam/iampolicy/v1/query_connect.js +97 -0
- package/ai/stigmer/iam/iampolicy/v1/query_connect.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/query_pb.d.ts +91 -0
- package/ai/stigmer/iam/iampolicy/v1/query_pb.js +19 -0
- package/ai/stigmer/iam/iampolicy/v1/query_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission_pb.d.ts +171 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission_pb.js +176 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/io_pb.d.ts +58 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/io_pb.js +16 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/io_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/method_options_pb.d.ts +19 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/method_options_pb.js +23 -0
- package/ai/stigmer/iam/iampolicy/v1/rpcauthorization/method_options_pb.js.map +1 -0
- package/ai/stigmer/iam/iampolicy/v1/spec_pb.d.ts +105 -0
- package/ai/stigmer/iam/iampolicy/v1/spec_pb.js +20 -0
- package/ai/stigmer/iam/iampolicy/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/api_pb.d.ts +51 -0
- package/ai/stigmer/iam/identityaccount/v1/api_pb.js +18 -0
- package/ai/stigmer/iam/identityaccount/v1/api_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/command_connect.d.ts +59 -0
- package/ai/stigmer/iam/identityaccount/v1/command_connect.js +65 -0
- package/ai/stigmer/iam/identityaccount/v1/command_connect.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/command_pb.d.ts +60 -0
- package/ai/stigmer/iam/identityaccount/v1/command_pb.js +20 -0
- package/ai/stigmer/iam/identityaccount/v1/command_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/enum_pb.d.ts +40 -0
- package/ai/stigmer/iam/identityaccount/v1/enum_pb.js +45 -0
- package/ai/stigmer/iam/identityaccount/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/io_pb.d.ts +138 -0
- package/ai/stigmer/iam/identityaccount/v1/io_pb.js +47 -0
- package/ai/stigmer/iam/identityaccount/v1/io_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/query_connect.d.ts +79 -0
- package/ai/stigmer/iam/identityaccount/v1/query_connect.js +85 -0
- package/ai/stigmer/iam/identityaccount/v1/query_connect.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/query_pb.d.ts +80 -0
- package/ai/stigmer/iam/identityaccount/v1/query_pb.js +21 -0
- package/ai/stigmer/iam/identityaccount/v1/query_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/spec_pb.d.ts +95 -0
- package/ai/stigmer/iam/identityaccount/v1/spec_pb.js +17 -0
- package/ai/stigmer/iam/identityaccount/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/iam/identityaccount/v1/webhook_pb.d.ts +50 -0
- package/ai/stigmer/iam/identityaccount/v1/webhook_pb.js +14 -0
- package/ai/stigmer/iam/identityaccount/v1/webhook_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/api_pb.d.ts +72 -0
- package/ai/stigmer/iam/identityprovider/v1/api_pb.js +18 -0
- package/ai/stigmer/iam/identityprovider/v1/api_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/command_connect.d.ts +59 -0
- package/ai/stigmer/iam/identityprovider/v1/command_connect.js +65 -0
- package/ai/stigmer/iam/identityprovider/v1/command_connect.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/command_pb.d.ts +59 -0
- package/ai/stigmer/iam/identityprovider/v1/command_pb.js +19 -0
- package/ai/stigmer/iam/identityprovider/v1/command_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/io_pb.d.ts +65 -0
- package/ai/stigmer/iam/identityprovider/v1/io_pb.js +26 -0
- package/ai/stigmer/iam/identityprovider/v1/io_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/query_connect.d.ts +32 -0
- package/ai/stigmer/iam/identityprovider/v1/query_connect.js +38 -0
- package/ai/stigmer/iam/identityprovider/v1/query_connect.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/query_pb.d.ts +34 -0
- package/ai/stigmer/iam/identityprovider/v1/query_pb.js +19 -0
- package/ai/stigmer/iam/identityprovider/v1/query_pb.js.map +1 -0
- package/ai/stigmer/iam/identityprovider/v1/spec_pb.d.ts +106 -0
- package/ai/stigmer/iam/identityprovider/v1/spec_pb.js +15 -0
- package/ai/stigmer/iam/identityprovider/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/search/v1/io_pb.d.ts +320 -0
- package/ai/stigmer/search/v1/io_pb.js +29 -0
- package/ai/stigmer/search/v1/io_pb.js.map +1 -0
- package/ai/stigmer/search/v1/query_connect.d.ts +67 -0
- package/ai/stigmer/search/v1/query_connect.js +73 -0
- package/ai/stigmer/search/v1/query_connect.js.map +1 -0
- package/ai/stigmer/search/v1/query_pb.d.ts +69 -0
- package/ai/stigmer/search/v1/query_pb.js +40 -0
- package/ai/stigmer/search/v1/query_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/api_pb.d.ts +54 -0
- package/ai/stigmer/tenancy/organization/v1/api_pb.js +18 -0
- package/ai/stigmer/tenancy/organization/v1/api_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/command_connect.d.ts +61 -0
- package/ai/stigmer/tenancy/organization/v1/command_connect.js +67 -0
- package/ai/stigmer/tenancy/organization/v1/command_connect.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/command_pb.d.ts +61 -0
- package/ai/stigmer/tenancy/organization/v1/command_pb.js +19 -0
- package/ai/stigmer/tenancy/organization/v1/command_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/enum_pb.d.ts +34 -0
- package/ai/stigmer/tenancy/organization/v1/enum_pb.js +39 -0
- package/ai/stigmer/tenancy/organization/v1/enum_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/io_pb.d.ts +91 -0
- package/ai/stigmer/tenancy/organization/v1/io_pb.js +32 -0
- package/ai/stigmer/tenancy/organization/v1/io_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/query_connect.d.ts +61 -0
- package/ai/stigmer/tenancy/organization/v1/query_connect.js +67 -0
- package/ai/stigmer/tenancy/organization/v1/query_connect.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/query_pb.d.ts +63 -0
- package/ai/stigmer/tenancy/organization/v1/query_pb.js +21 -0
- package/ai/stigmer/tenancy/organization/v1/query_pb.js.map +1 -0
- package/ai/stigmer/tenancy/organization/v1/spec_pb.d.ts +61 -0
- package/ai/stigmer/tenancy/organization/v1/spec_pb.js +17 -0
- package/ai/stigmer/tenancy/organization/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/api_pb.d.ts +91 -0
- package/ai/stigmer/tenancy/project/v1/api_pb.js +18 -0
- package/ai/stigmer/tenancy/project/v1/api_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/command_connect.d.ts +60 -0
- package/ai/stigmer/tenancy/project/v1/command_connect.js +66 -0
- package/ai/stigmer/tenancy/project/v1/command_connect.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/command_pb.d.ts +60 -0
- package/ai/stigmer/tenancy/project/v1/command_pb.js +19 -0
- package/ai/stigmer/tenancy/project/v1/command_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/io_pb.d.ts +22 -0
- package/ai/stigmer/tenancy/project/v1/io_pb.js +15 -0
- package/ai/stigmer/tenancy/project/v1/io_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/query_connect.d.ts +33 -0
- package/ai/stigmer/tenancy/project/v1/query_connect.js +39 -0
- package/ai/stigmer/tenancy/project/v1/query_connect.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/query_pb.d.ts +36 -0
- package/ai/stigmer/tenancy/project/v1/query_pb.js +20 -0
- package/ai/stigmer/tenancy/project/v1/query_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/spec_pb.d.ts +84 -0
- package/ai/stigmer/tenancy/project/v1/spec_pb.js +15 -0
- package/ai/stigmer/tenancy/project/v1/spec_pb.js.map +1 -0
- package/ai/stigmer/tenancy/project/v1/status_pb.d.ts +89 -0
- package/ai/stigmer/tenancy/project/v1/status_pb.js +21 -0
- package/ai/stigmer/tenancy/project/v1/status_pb.js.map +1 -0
- package/buf/validate/validate_pb.d.ts +4766 -0
- package/buf/validate/validate_pb.js +357 -0
- package/buf/validate/validate_pb.js.map +1 -0
- package/package.json +32 -0
|
@@ -0,0 +1,91 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* iam-policy query controller
|
|
3
|
+
*
|
|
4
|
+
* @generated from service ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController
|
|
5
|
+
*/
|
|
6
|
+
export declare const IamPolicyQueryController: {
|
|
7
|
+
readonly typeName: "ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController";
|
|
8
|
+
readonly methods: {
|
|
9
|
+
/**
|
|
10
|
+
* lookup iam-policy by id
|
|
11
|
+
*
|
|
12
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.get
|
|
13
|
+
*/
|
|
14
|
+
readonly get: {
|
|
15
|
+
readonly name: "get";
|
|
16
|
+
readonly I: any;
|
|
17
|
+
readonly O: any;
|
|
18
|
+
readonly kind: any;
|
|
19
|
+
};
|
|
20
|
+
/**
|
|
21
|
+
* Check if a principal is authorized to perform a relation on a resource
|
|
22
|
+
*
|
|
23
|
+
* This is the fundamental authorization check RPC that answers the question:
|
|
24
|
+
* "Does principal X have permission Y on resource Z?"
|
|
25
|
+
*
|
|
26
|
+
* It provides a simple boolean answer based on the complete authorization state,
|
|
27
|
+
* including existing IAM policies, inherited permissions, and group memberships.
|
|
28
|
+
*
|
|
29
|
+
* Use Cases:
|
|
30
|
+
* - Pre-flight UI checks before showing buttons/actions
|
|
31
|
+
* - API request authorization before processing operations
|
|
32
|
+
* - Service-to-service authorization
|
|
33
|
+
* - Team-based access checks
|
|
34
|
+
*
|
|
35
|
+
* Input: CheckAuthorizationInput with policy spec and optional contextual policies
|
|
36
|
+
* Output: CheckAuthorizationResult with is_authorized boolean
|
|
37
|
+
*
|
|
38
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.checkAuthorization
|
|
39
|
+
*/
|
|
40
|
+
readonly checkAuthorization: {
|
|
41
|
+
readonly name: "checkAuthorization";
|
|
42
|
+
readonly I: any;
|
|
43
|
+
readonly O: any;
|
|
44
|
+
readonly kind: any;
|
|
45
|
+
};
|
|
46
|
+
/**
|
|
47
|
+
* List all resource IDs of a specific kind that a principal is authorized to access
|
|
48
|
+
*
|
|
49
|
+
* This RPC answers: "What are all the [resource-kind] that [principal] can [relation] on?"
|
|
50
|
+
* Essential for building permission-aware UIs and filtering resource lists.
|
|
51
|
+
*
|
|
52
|
+
* Use Cases:
|
|
53
|
+
* - Resource list filtering in dropdowns
|
|
54
|
+
* - Permission-based navigation
|
|
55
|
+
* - Bulk authorization checks
|
|
56
|
+
*
|
|
57
|
+
* Input: ListAuthorizedResourceIdsInput with principal, resource_kind, and relation
|
|
58
|
+
* Output: AuthorizedResourceIdsList containing all accessible resource IDs
|
|
59
|
+
*
|
|
60
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.listAuthorizedResourceIds
|
|
61
|
+
*/
|
|
62
|
+
readonly listAuthorizedResourceIds: {
|
|
63
|
+
readonly name: "listAuthorizedResourceIds";
|
|
64
|
+
readonly I: any;
|
|
65
|
+
readonly O: any;
|
|
66
|
+
readonly kind: any;
|
|
67
|
+
};
|
|
68
|
+
/**
|
|
69
|
+
* List all principal IDs of a specific kind that are authorized to access a resource
|
|
70
|
+
*
|
|
71
|
+
* This RPC answers: "What are all the [principal-kind] that have [relation] access on [resource]?"
|
|
72
|
+
* Inverse of listAuthorizedResourceIds.
|
|
73
|
+
*
|
|
74
|
+
* Use Cases:
|
|
75
|
+
* - Resource access audit (who can access this?)
|
|
76
|
+
* - Team discovery for resources
|
|
77
|
+
* - Compliance and security audits
|
|
78
|
+
*
|
|
79
|
+
* Input: ListAuthorizedPrincipalIdsInput with resource, principal_kind, and relation
|
|
80
|
+
* Output: AuthorizedPrincipalIdsList containing all authorized principal IDs
|
|
81
|
+
*
|
|
82
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.listAuthorizedPrincipalIds
|
|
83
|
+
*/
|
|
84
|
+
readonly listAuthorizedPrincipalIds: {
|
|
85
|
+
readonly name: "listAuthorizedPrincipalIds";
|
|
86
|
+
readonly I: any;
|
|
87
|
+
readonly O: any;
|
|
88
|
+
readonly kind: any;
|
|
89
|
+
};
|
|
90
|
+
};
|
|
91
|
+
};
|
|
@@ -0,0 +1,97 @@
|
|
|
1
|
+
// @generated by protoc-gen-connect-es v1.6.1 with parameter "target=ts"
|
|
2
|
+
// @generated from file ai/stigmer/iam/iampolicy/v1/query.proto (package ai.stigmer.iam.iampolicy.v1, syntax proto3)
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
// @ts-nocheck
|
|
5
|
+
import { MethodKind } from "@bufbuild/protobuf";
|
|
6
|
+
/**
|
|
7
|
+
* iam-policy query controller
|
|
8
|
+
*
|
|
9
|
+
* @generated from service ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController
|
|
10
|
+
*/
|
|
11
|
+
export const IamPolicyQueryController = {
|
|
12
|
+
typeName: "ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController",
|
|
13
|
+
methods: {
|
|
14
|
+
/**
|
|
15
|
+
* lookup iam-policy by id
|
|
16
|
+
*
|
|
17
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.get
|
|
18
|
+
*/
|
|
19
|
+
get: {
|
|
20
|
+
name: "get",
|
|
21
|
+
I: IamPolicyId,
|
|
22
|
+
O: IamPolicy,
|
|
23
|
+
kind: MethodKind.Unary,
|
|
24
|
+
},
|
|
25
|
+
/**
|
|
26
|
+
* Check if a principal is authorized to perform a relation on a resource
|
|
27
|
+
*
|
|
28
|
+
* This is the fundamental authorization check RPC that answers the question:
|
|
29
|
+
* "Does principal X have permission Y on resource Z?"
|
|
30
|
+
*
|
|
31
|
+
* It provides a simple boolean answer based on the complete authorization state,
|
|
32
|
+
* including existing IAM policies, inherited permissions, and group memberships.
|
|
33
|
+
*
|
|
34
|
+
* Use Cases:
|
|
35
|
+
* - Pre-flight UI checks before showing buttons/actions
|
|
36
|
+
* - API request authorization before processing operations
|
|
37
|
+
* - Service-to-service authorization
|
|
38
|
+
* - Team-based access checks
|
|
39
|
+
*
|
|
40
|
+
* Input: CheckAuthorizationInput with policy spec and optional contextual policies
|
|
41
|
+
* Output: CheckAuthorizationResult with is_authorized boolean
|
|
42
|
+
*
|
|
43
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.checkAuthorization
|
|
44
|
+
*/
|
|
45
|
+
checkAuthorization: {
|
|
46
|
+
name: "checkAuthorization",
|
|
47
|
+
I: CheckAuthorizationInput,
|
|
48
|
+
O: CheckAuthorizationResult,
|
|
49
|
+
kind: MethodKind.Unary,
|
|
50
|
+
},
|
|
51
|
+
/**
|
|
52
|
+
* List all resource IDs of a specific kind that a principal is authorized to access
|
|
53
|
+
*
|
|
54
|
+
* This RPC answers: "What are all the [resource-kind] that [principal] can [relation] on?"
|
|
55
|
+
* Essential for building permission-aware UIs and filtering resource lists.
|
|
56
|
+
*
|
|
57
|
+
* Use Cases:
|
|
58
|
+
* - Resource list filtering in dropdowns
|
|
59
|
+
* - Permission-based navigation
|
|
60
|
+
* - Bulk authorization checks
|
|
61
|
+
*
|
|
62
|
+
* Input: ListAuthorizedResourceIdsInput with principal, resource_kind, and relation
|
|
63
|
+
* Output: AuthorizedResourceIdsList containing all accessible resource IDs
|
|
64
|
+
*
|
|
65
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.listAuthorizedResourceIds
|
|
66
|
+
*/
|
|
67
|
+
listAuthorizedResourceIds: {
|
|
68
|
+
name: "listAuthorizedResourceIds",
|
|
69
|
+
I: ListAuthorizedResourceIdsInput,
|
|
70
|
+
O: AuthorizedResourceIdsList,
|
|
71
|
+
kind: MethodKind.Unary,
|
|
72
|
+
},
|
|
73
|
+
/**
|
|
74
|
+
* List all principal IDs of a specific kind that are authorized to access a resource
|
|
75
|
+
*
|
|
76
|
+
* This RPC answers: "What are all the [principal-kind] that have [relation] access on [resource]?"
|
|
77
|
+
* Inverse of listAuthorizedResourceIds.
|
|
78
|
+
*
|
|
79
|
+
* Use Cases:
|
|
80
|
+
* - Resource access audit (who can access this?)
|
|
81
|
+
* - Team discovery for resources
|
|
82
|
+
* - Compliance and security audits
|
|
83
|
+
*
|
|
84
|
+
* Input: ListAuthorizedPrincipalIdsInput with resource, principal_kind, and relation
|
|
85
|
+
* Output: AuthorizedPrincipalIdsList containing all authorized principal IDs
|
|
86
|
+
*
|
|
87
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.listAuthorizedPrincipalIds
|
|
88
|
+
*/
|
|
89
|
+
listAuthorizedPrincipalIds: {
|
|
90
|
+
name: "listAuthorizedPrincipalIds",
|
|
91
|
+
I: ListAuthorizedPrincipalIdsInput,
|
|
92
|
+
O: AuthorizedPrincipalIdsList,
|
|
93
|
+
kind: MethodKind.Unary,
|
|
94
|
+
},
|
|
95
|
+
}
|
|
96
|
+
};
|
|
97
|
+
//# sourceMappingURL=query_connect.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"query_connect.js","sourceRoot":"","sources":["../../../../../../ai/stigmer/iam/iampolicy/v1/query_connect.ts"],"names":[],"mappings":"AAAA,wEAAwE;AACxE,oHAAoH;AACpH,oBAAoB;AACpB,cAAc;AAId,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAEhD;;;;GAIG;AACH,MAAM,CAAC,MAAM,wBAAwB,GAAG;IACtC,QAAQ,EAAE,sDAAsD;IAChE,OAAO,EAAE;QACP;;;;WAIG;QACH,GAAG,EAAE;YACH,IAAI,EAAE,KAAK;YACX,CAAC,EAAE,WAAW;YACd,CAAC,EAAE,SAAS;YACZ,IAAI,EAAE,UAAU,CAAC,KAAK;SACvB;QACD;;;;;;;;;;;;;;;;;;;WAmBG;QACH,kBAAkB,EAAE;YAClB,IAAI,EAAE,oBAAoB;YAC1B,CAAC,EAAE,uBAAuB;YAC1B,CAAC,EAAE,wBAAwB;YAC3B,IAAI,EAAE,UAAU,CAAC,KAAK;SACvB;QACD;;;;;;;;;;;;;;;WAeG;QACH,yBAAyB,EAAE;YACzB,IAAI,EAAE,2BAA2B;YACjC,CAAC,EAAE,8BAA8B;YACjC,CAAC,EAAE,yBAAyB;YAC5B,IAAI,EAAE,UAAU,CAAC,KAAK;SACvB;QACD;;;;;;;;;;;;;;;WAeG;QACH,0BAA0B,EAAE;YAC1B,IAAI,EAAE,4BAA4B;YAClC,CAAC,EAAE,+BAA+B;YAClC,CAAC,EAAE,0BAA0B;YAC7B,IAAI,EAAE,UAAU,CAAC,KAAK;SACvB;KACF;CACO,CAAC"}
|
|
@@ -0,0 +1,91 @@
|
|
|
1
|
+
import type { GenFile, GenService } from "@bufbuild/protobuf/codegenv1";
|
|
2
|
+
import type { IamPolicySchema } from "./api_pb";
|
|
3
|
+
import type { AuthorizedPrincipalIdsListSchema, AuthorizedResourceIdsListSchema, CheckAuthorizationInputSchema, CheckAuthorizationResultSchema, IamPolicyIdSchema, ListAuthorizedPrincipalIdsInputSchema, ListAuthorizedResourceIdsInputSchema } from "./io_pb";
|
|
4
|
+
/**
|
|
5
|
+
* Describes the file ai/stigmer/iam/iampolicy/v1/query.proto.
|
|
6
|
+
*/
|
|
7
|
+
export declare const file_ai_stigmer_iam_iampolicy_v1_query: GenFile;
|
|
8
|
+
/**
|
|
9
|
+
* iam-policy query controller
|
|
10
|
+
*
|
|
11
|
+
* @generated from service ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController
|
|
12
|
+
*/
|
|
13
|
+
export declare const IamPolicyQueryController: GenService<{
|
|
14
|
+
/**
|
|
15
|
+
* lookup iam-policy by id
|
|
16
|
+
*
|
|
17
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.get
|
|
18
|
+
*/
|
|
19
|
+
get: {
|
|
20
|
+
methodKind: "unary";
|
|
21
|
+
input: typeof IamPolicyIdSchema;
|
|
22
|
+
output: typeof IamPolicySchema;
|
|
23
|
+
};
|
|
24
|
+
/**
|
|
25
|
+
* Check if a principal is authorized to perform a relation on a resource
|
|
26
|
+
*
|
|
27
|
+
* This is the fundamental authorization check RPC that answers the question:
|
|
28
|
+
* "Does principal X have permission Y on resource Z?"
|
|
29
|
+
*
|
|
30
|
+
* It provides a simple boolean answer based on the complete authorization state,
|
|
31
|
+
* including existing IAM policies, inherited permissions, and group memberships.
|
|
32
|
+
*
|
|
33
|
+
* Use Cases:
|
|
34
|
+
* - Pre-flight UI checks before showing buttons/actions
|
|
35
|
+
* - API request authorization before processing operations
|
|
36
|
+
* - Service-to-service authorization
|
|
37
|
+
* - Team-based access checks
|
|
38
|
+
*
|
|
39
|
+
* Input: CheckAuthorizationInput with policy spec and optional contextual policies
|
|
40
|
+
* Output: CheckAuthorizationResult with is_authorized boolean
|
|
41
|
+
*
|
|
42
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.checkAuthorization
|
|
43
|
+
*/
|
|
44
|
+
checkAuthorization: {
|
|
45
|
+
methodKind: "unary";
|
|
46
|
+
input: typeof CheckAuthorizationInputSchema;
|
|
47
|
+
output: typeof CheckAuthorizationResultSchema;
|
|
48
|
+
};
|
|
49
|
+
/**
|
|
50
|
+
* List all resource IDs of a specific kind that a principal is authorized to access
|
|
51
|
+
*
|
|
52
|
+
* This RPC answers: "What are all the [resource-kind] that [principal] can [relation] on?"
|
|
53
|
+
* Essential for building permission-aware UIs and filtering resource lists.
|
|
54
|
+
*
|
|
55
|
+
* Use Cases:
|
|
56
|
+
* - Resource list filtering in dropdowns
|
|
57
|
+
* - Permission-based navigation
|
|
58
|
+
* - Bulk authorization checks
|
|
59
|
+
*
|
|
60
|
+
* Input: ListAuthorizedResourceIdsInput with principal, resource_kind, and relation
|
|
61
|
+
* Output: AuthorizedResourceIdsList containing all accessible resource IDs
|
|
62
|
+
*
|
|
63
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.listAuthorizedResourceIds
|
|
64
|
+
*/
|
|
65
|
+
listAuthorizedResourceIds: {
|
|
66
|
+
methodKind: "unary";
|
|
67
|
+
input: typeof ListAuthorizedResourceIdsInputSchema;
|
|
68
|
+
output: typeof AuthorizedResourceIdsListSchema;
|
|
69
|
+
};
|
|
70
|
+
/**
|
|
71
|
+
* List all principal IDs of a specific kind that are authorized to access a resource
|
|
72
|
+
*
|
|
73
|
+
* This RPC answers: "What are all the [principal-kind] that have [relation] access on [resource]?"
|
|
74
|
+
* Inverse of listAuthorizedResourceIds.
|
|
75
|
+
*
|
|
76
|
+
* Use Cases:
|
|
77
|
+
* - Resource access audit (who can access this?)
|
|
78
|
+
* - Team discovery for resources
|
|
79
|
+
* - Compliance and security audits
|
|
80
|
+
*
|
|
81
|
+
* Input: ListAuthorizedPrincipalIdsInput with resource, principal_kind, and relation
|
|
82
|
+
* Output: AuthorizedPrincipalIdsList containing all authorized principal IDs
|
|
83
|
+
*
|
|
84
|
+
* @generated from rpc ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController.listAuthorizedPrincipalIds
|
|
85
|
+
*/
|
|
86
|
+
listAuthorizedPrincipalIds: {
|
|
87
|
+
methodKind: "unary";
|
|
88
|
+
input: typeof ListAuthorizedPrincipalIdsInputSchema;
|
|
89
|
+
output: typeof AuthorizedPrincipalIdsListSchema;
|
|
90
|
+
};
|
|
91
|
+
}>;
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
// @generated by protoc-gen-es v2.2.2 with parameter "target=ts"
|
|
2
|
+
// @generated from file ai/stigmer/iam/iampolicy/v1/query.proto (package ai.stigmer.iam.iampolicy.v1, syntax proto3)
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
import { fileDesc, serviceDesc } from "@bufbuild/protobuf/codegenv1";
|
|
5
|
+
import { file_ai_stigmer_commons_apiresource_rpc_service_options } from "../../../commons/apiresource/rpc_service_options_pb";
|
|
6
|
+
import { file_ai_stigmer_iam_iampolicy_v1_api } from "./api_pb";
|
|
7
|
+
import { file_ai_stigmer_iam_iampolicy_v1_io } from "./io_pb";
|
|
8
|
+
import { file_ai_stigmer_iam_iampolicy_v1_rpcauthorization_method_options } from "./rpcauthorization/method_options_pb";
|
|
9
|
+
/**
|
|
10
|
+
* Describes the file ai/stigmer/iam/iampolicy/v1/query.proto.
|
|
11
|
+
*/
|
|
12
|
+
export const file_ai_stigmer_iam_iampolicy_v1_query = /*@__PURE__*/ fileDesc("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", [file_ai_stigmer_commons_apiresource_rpc_service_options, file_ai_stigmer_iam_iampolicy_v1_api, file_ai_stigmer_iam_iampolicy_v1_io, file_ai_stigmer_iam_iampolicy_v1_rpcauthorization_method_options]);
|
|
13
|
+
/**
|
|
14
|
+
* iam-policy query controller
|
|
15
|
+
*
|
|
16
|
+
* @generated from service ai.stigmer.iam.iampolicy.v1.IamPolicyQueryController
|
|
17
|
+
*/
|
|
18
|
+
export const IamPolicyQueryController = /*@__PURE__*/ serviceDesc(file_ai_stigmer_iam_iampolicy_v1_query, 0);
|
|
19
|
+
//# sourceMappingURL=query_pb.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"query_pb.js","sourceRoot":"","sources":["../../../../../../ai/stigmer/iam/iampolicy/v1/query_pb.ts"],"names":[],"mappings":"AAAA,gEAAgE;AAChE,oHAAoH;AACpH,oBAAoB;AAGpB,OAAO,EAAE,QAAQ,EAAE,WAAW,EAAE,MAAM,8BAA8B,CAAC;AACrE,OAAO,EAAE,uDAAuD,EAAE,MAAM,qDAAqD,CAAC;AAE9H,OAAO,EAAE,oCAAoC,EAAE,MAAM,UAAU,CAAC;AAEhE,OAAO,EAAE,mCAAmC,EAAE,MAAM,SAAS,CAAC;AAC9D,OAAO,EAAE,gEAAgE,EAAE,MAAM,sCAAsC,CAAC;AAExH;;GAEG;AACH,MAAM,CAAC,MAAM,sCAAsC,GAAY,aAAa,CAC1E,QAAQ,CAAC,oiCAAoiC,EAAE,CAAC,uDAAuD,EAAE,oCAAoC,EAAE,mCAAmC,EAAE,gEAAgE,CAAC,CAAC,CAAC;AAEzvC;;;;GAIG;AACH,MAAM,CAAC,MAAM,wBAAwB,GA8EhC,aAAa,CAChB,WAAW,CAAC,sCAAsC,EAAE,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1,171 @@
|
|
|
1
|
+
import type { GenEnum, GenFile } from "@bufbuild/protobuf/codegenv1";
|
|
2
|
+
/**
|
|
3
|
+
* Describes the file ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission.proto.
|
|
4
|
+
*/
|
|
5
|
+
export declare const file_ai_stigmer_iam_iampolicy_v1_rpcauthorization_iam_permission: GenFile;
|
|
6
|
+
/**
|
|
7
|
+
* ApiResourceIamPermission defines the core permissions used in the authorization model.
|
|
8
|
+
* This is a simplified set for a demo project, containing only essential permissions.
|
|
9
|
+
*
|
|
10
|
+
* @generated from enum ai.stigmer.iam.iampolicy.v1.rpcauthorization.ApiResourceIamPermission
|
|
11
|
+
*/
|
|
12
|
+
export declare enum ApiResourceIamPermission {
|
|
13
|
+
/**
|
|
14
|
+
* @generated from enum value: unspecified = 0;
|
|
15
|
+
*/
|
|
16
|
+
unspecified = 0,
|
|
17
|
+
/**
|
|
18
|
+
* Basic CRUD permissions
|
|
19
|
+
*
|
|
20
|
+
* @generated from enum value: create = 1;
|
|
21
|
+
*/
|
|
22
|
+
create = 1,
|
|
23
|
+
/**
|
|
24
|
+
* @generated from enum value: can_delete = 2;
|
|
25
|
+
*/
|
|
26
|
+
can_delete = 2,
|
|
27
|
+
/**
|
|
28
|
+
* @generated from enum value: can_view = 3;
|
|
29
|
+
*/
|
|
30
|
+
can_view = 3,
|
|
31
|
+
/**
|
|
32
|
+
* @generated from enum value: can_edit = 4;
|
|
33
|
+
*/
|
|
34
|
+
can_edit = 4,
|
|
35
|
+
/**
|
|
36
|
+
* Platform-level permissions
|
|
37
|
+
*
|
|
38
|
+
* Platform operator with elevated privileges
|
|
39
|
+
*
|
|
40
|
+
* @generated from enum value: operator = 5;
|
|
41
|
+
*/
|
|
42
|
+
operator = 5,
|
|
43
|
+
/**
|
|
44
|
+
* Platform-level access
|
|
45
|
+
*
|
|
46
|
+
* @generated from enum value: platform = 6;
|
|
47
|
+
*/
|
|
48
|
+
platform = 6,
|
|
49
|
+
/**
|
|
50
|
+
* Permission to login to back office
|
|
51
|
+
*
|
|
52
|
+
* @generated from enum value: login_to_back_office = 7;
|
|
53
|
+
*/
|
|
54
|
+
login_to_back_office = 7,
|
|
55
|
+
/**
|
|
56
|
+
* IAM policy management permissions (follows can_* pattern)
|
|
57
|
+
*
|
|
58
|
+
* Permission to grant/revoke access (create/delete IAM policies)
|
|
59
|
+
*
|
|
60
|
+
* @generated from enum value: can_grant_access = 8;
|
|
61
|
+
*/
|
|
62
|
+
can_grant_access = 8,
|
|
63
|
+
/**
|
|
64
|
+
* Permission to view who has access (view IAM policies)
|
|
65
|
+
*
|
|
66
|
+
* @generated from enum value: can_view_access = 9;
|
|
67
|
+
*/
|
|
68
|
+
can_view_access = 9,
|
|
69
|
+
/**
|
|
70
|
+
* Resource ownership and membership
|
|
71
|
+
*
|
|
72
|
+
* Resource owner
|
|
73
|
+
*
|
|
74
|
+
* @generated from enum value: owner = 10;
|
|
75
|
+
*/
|
|
76
|
+
owner = 10,
|
|
77
|
+
/**
|
|
78
|
+
* Resource member (for teams, organizations)
|
|
79
|
+
*
|
|
80
|
+
* @generated from enum value: member = 11;
|
|
81
|
+
*/
|
|
82
|
+
member = 11,
|
|
83
|
+
/**
|
|
84
|
+
* Structural relations (parent links)
|
|
85
|
+
*
|
|
86
|
+
* Link to identity account (user-scoped parent)
|
|
87
|
+
*
|
|
88
|
+
* @generated from enum value: identity_account = 12;
|
|
89
|
+
*/
|
|
90
|
+
identity_account = 12,
|
|
91
|
+
/**
|
|
92
|
+
* Link to organization (org-scoped parent)
|
|
93
|
+
*
|
|
94
|
+
* @generated from enum value: organization = 13;
|
|
95
|
+
*/
|
|
96
|
+
organization = 13,
|
|
97
|
+
/**
|
|
98
|
+
* Link to session (agent execution parent)
|
|
99
|
+
*
|
|
100
|
+
* @generated from enum value: session = 14;
|
|
101
|
+
*/
|
|
102
|
+
session = 14,
|
|
103
|
+
/**
|
|
104
|
+
* Link to agent (agent instance parent)
|
|
105
|
+
*
|
|
106
|
+
* @generated from enum value: agent = 15;
|
|
107
|
+
*/
|
|
108
|
+
agent = 15,
|
|
109
|
+
/**
|
|
110
|
+
* Resource-specific creation permissions
|
|
111
|
+
*
|
|
112
|
+
* Permission to create agents in an organization
|
|
113
|
+
*
|
|
114
|
+
* @generated from enum value: can_create_agent = 16;
|
|
115
|
+
*/
|
|
116
|
+
can_create_agent = 16,
|
|
117
|
+
/**
|
|
118
|
+
* Permission to create workflows in an organization
|
|
119
|
+
*
|
|
120
|
+
* @generated from enum value: can_create_workflow = 17;
|
|
121
|
+
*/
|
|
122
|
+
can_create_workflow = 17,
|
|
123
|
+
/**
|
|
124
|
+
* Permission to create sessions in an organization
|
|
125
|
+
*
|
|
126
|
+
* @generated from enum value: can_create_session = 18;
|
|
127
|
+
*/
|
|
128
|
+
can_create_session = 18,
|
|
129
|
+
/**
|
|
130
|
+
* Permission to create agent executions in a session
|
|
131
|
+
*
|
|
132
|
+
* @generated from enum value: can_create_execution_in = 19;
|
|
133
|
+
*/
|
|
134
|
+
can_create_execution_in = 19,
|
|
135
|
+
/**
|
|
136
|
+
* Permission to create agent instances (derived from can_execute on parent agent)
|
|
137
|
+
*
|
|
138
|
+
* @generated from enum value: can_create_instance = 20;
|
|
139
|
+
*/
|
|
140
|
+
can_create_instance = 20,
|
|
141
|
+
/**
|
|
142
|
+
* Permission to create skills in an organization
|
|
143
|
+
*
|
|
144
|
+
* @generated from enum value: can_create_skill = 21;
|
|
145
|
+
*/
|
|
146
|
+
can_create_skill = 21,
|
|
147
|
+
/**
|
|
148
|
+
* Permission to create projects in an organization
|
|
149
|
+
*
|
|
150
|
+
* @generated from enum value: can_create_project = 23;
|
|
151
|
+
*/
|
|
152
|
+
can_create_project = 23,
|
|
153
|
+
/**
|
|
154
|
+
* Permission to create identity providers in an organization
|
|
155
|
+
*
|
|
156
|
+
* @generated from enum value: can_create_idp = 24;
|
|
157
|
+
*/
|
|
158
|
+
can_create_idp = 24,
|
|
159
|
+
/**
|
|
160
|
+
* Resource-specific operation permissions
|
|
161
|
+
*
|
|
162
|
+
* Permission to execute agent/session operations
|
|
163
|
+
*
|
|
164
|
+
* @generated from enum value: can_execute = 22;
|
|
165
|
+
*/
|
|
166
|
+
can_execute = 22
|
|
167
|
+
}
|
|
168
|
+
/**
|
|
169
|
+
* Describes the enum ai.stigmer.iam.iampolicy.v1.rpcauthorization.ApiResourceIamPermission.
|
|
170
|
+
*/
|
|
171
|
+
export declare const ApiResourceIamPermissionSchema: GenEnum<ApiResourceIamPermission>;
|
|
@@ -0,0 +1,176 @@
|
|
|
1
|
+
// @generated by protoc-gen-es v2.2.2 with parameter "target=ts"
|
|
2
|
+
// @generated from file ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission.proto (package ai.stigmer.iam.iampolicy.v1.rpcauthorization, syntax proto3)
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
import { enumDesc, fileDesc } from "@bufbuild/protobuf/codegenv1";
|
|
5
|
+
/**
|
|
6
|
+
* Describes the file ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission.proto.
|
|
7
|
+
*/
|
|
8
|
+
export const file_ai_stigmer_iam_iampolicy_v1_rpcauthorization_iam_permission = /*@__PURE__*/ fileDesc("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");
|
|
9
|
+
/**
|
|
10
|
+
* ApiResourceIamPermission defines the core permissions used in the authorization model.
|
|
11
|
+
* This is a simplified set for a demo project, containing only essential permissions.
|
|
12
|
+
*
|
|
13
|
+
* @generated from enum ai.stigmer.iam.iampolicy.v1.rpcauthorization.ApiResourceIamPermission
|
|
14
|
+
*/
|
|
15
|
+
export var ApiResourceIamPermission;
|
|
16
|
+
(function (ApiResourceIamPermission) {
|
|
17
|
+
/**
|
|
18
|
+
* @generated from enum value: unspecified = 0;
|
|
19
|
+
*/
|
|
20
|
+
ApiResourceIamPermission[ApiResourceIamPermission["unspecified"] = 0] = "unspecified";
|
|
21
|
+
/**
|
|
22
|
+
* Basic CRUD permissions
|
|
23
|
+
*
|
|
24
|
+
* @generated from enum value: create = 1;
|
|
25
|
+
*/
|
|
26
|
+
ApiResourceIamPermission[ApiResourceIamPermission["create"] = 1] = "create";
|
|
27
|
+
/**
|
|
28
|
+
* @generated from enum value: can_delete = 2;
|
|
29
|
+
*/
|
|
30
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_delete"] = 2] = "can_delete";
|
|
31
|
+
/**
|
|
32
|
+
* @generated from enum value: can_view = 3;
|
|
33
|
+
*/
|
|
34
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_view"] = 3] = "can_view";
|
|
35
|
+
/**
|
|
36
|
+
* @generated from enum value: can_edit = 4;
|
|
37
|
+
*/
|
|
38
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_edit"] = 4] = "can_edit";
|
|
39
|
+
/**
|
|
40
|
+
* Platform-level permissions
|
|
41
|
+
*
|
|
42
|
+
* Platform operator with elevated privileges
|
|
43
|
+
*
|
|
44
|
+
* @generated from enum value: operator = 5;
|
|
45
|
+
*/
|
|
46
|
+
ApiResourceIamPermission[ApiResourceIamPermission["operator"] = 5] = "operator";
|
|
47
|
+
/**
|
|
48
|
+
* Platform-level access
|
|
49
|
+
*
|
|
50
|
+
* @generated from enum value: platform = 6;
|
|
51
|
+
*/
|
|
52
|
+
ApiResourceIamPermission[ApiResourceIamPermission["platform"] = 6] = "platform";
|
|
53
|
+
/**
|
|
54
|
+
* Permission to login to back office
|
|
55
|
+
*
|
|
56
|
+
* @generated from enum value: login_to_back_office = 7;
|
|
57
|
+
*/
|
|
58
|
+
ApiResourceIamPermission[ApiResourceIamPermission["login_to_back_office"] = 7] = "login_to_back_office";
|
|
59
|
+
/**
|
|
60
|
+
* IAM policy management permissions (follows can_* pattern)
|
|
61
|
+
*
|
|
62
|
+
* Permission to grant/revoke access (create/delete IAM policies)
|
|
63
|
+
*
|
|
64
|
+
* @generated from enum value: can_grant_access = 8;
|
|
65
|
+
*/
|
|
66
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_grant_access"] = 8] = "can_grant_access";
|
|
67
|
+
/**
|
|
68
|
+
* Permission to view who has access (view IAM policies)
|
|
69
|
+
*
|
|
70
|
+
* @generated from enum value: can_view_access = 9;
|
|
71
|
+
*/
|
|
72
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_view_access"] = 9] = "can_view_access";
|
|
73
|
+
/**
|
|
74
|
+
* Resource ownership and membership
|
|
75
|
+
*
|
|
76
|
+
* Resource owner
|
|
77
|
+
*
|
|
78
|
+
* @generated from enum value: owner = 10;
|
|
79
|
+
*/
|
|
80
|
+
ApiResourceIamPermission[ApiResourceIamPermission["owner"] = 10] = "owner";
|
|
81
|
+
/**
|
|
82
|
+
* Resource member (for teams, organizations)
|
|
83
|
+
*
|
|
84
|
+
* @generated from enum value: member = 11;
|
|
85
|
+
*/
|
|
86
|
+
ApiResourceIamPermission[ApiResourceIamPermission["member"] = 11] = "member";
|
|
87
|
+
/**
|
|
88
|
+
* Structural relations (parent links)
|
|
89
|
+
*
|
|
90
|
+
* Link to identity account (user-scoped parent)
|
|
91
|
+
*
|
|
92
|
+
* @generated from enum value: identity_account = 12;
|
|
93
|
+
*/
|
|
94
|
+
ApiResourceIamPermission[ApiResourceIamPermission["identity_account"] = 12] = "identity_account";
|
|
95
|
+
/**
|
|
96
|
+
* Link to organization (org-scoped parent)
|
|
97
|
+
*
|
|
98
|
+
* @generated from enum value: organization = 13;
|
|
99
|
+
*/
|
|
100
|
+
ApiResourceIamPermission[ApiResourceIamPermission["organization"] = 13] = "organization";
|
|
101
|
+
/**
|
|
102
|
+
* Link to session (agent execution parent)
|
|
103
|
+
*
|
|
104
|
+
* @generated from enum value: session = 14;
|
|
105
|
+
*/
|
|
106
|
+
ApiResourceIamPermission[ApiResourceIamPermission["session"] = 14] = "session";
|
|
107
|
+
/**
|
|
108
|
+
* Link to agent (agent instance parent)
|
|
109
|
+
*
|
|
110
|
+
* @generated from enum value: agent = 15;
|
|
111
|
+
*/
|
|
112
|
+
ApiResourceIamPermission[ApiResourceIamPermission["agent"] = 15] = "agent";
|
|
113
|
+
/**
|
|
114
|
+
* Resource-specific creation permissions
|
|
115
|
+
*
|
|
116
|
+
* Permission to create agents in an organization
|
|
117
|
+
*
|
|
118
|
+
* @generated from enum value: can_create_agent = 16;
|
|
119
|
+
*/
|
|
120
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_create_agent"] = 16] = "can_create_agent";
|
|
121
|
+
/**
|
|
122
|
+
* Permission to create workflows in an organization
|
|
123
|
+
*
|
|
124
|
+
* @generated from enum value: can_create_workflow = 17;
|
|
125
|
+
*/
|
|
126
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_create_workflow"] = 17] = "can_create_workflow";
|
|
127
|
+
/**
|
|
128
|
+
* Permission to create sessions in an organization
|
|
129
|
+
*
|
|
130
|
+
* @generated from enum value: can_create_session = 18;
|
|
131
|
+
*/
|
|
132
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_create_session"] = 18] = "can_create_session";
|
|
133
|
+
/**
|
|
134
|
+
* Permission to create agent executions in a session
|
|
135
|
+
*
|
|
136
|
+
* @generated from enum value: can_create_execution_in = 19;
|
|
137
|
+
*/
|
|
138
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_create_execution_in"] = 19] = "can_create_execution_in";
|
|
139
|
+
/**
|
|
140
|
+
* Permission to create agent instances (derived from can_execute on parent agent)
|
|
141
|
+
*
|
|
142
|
+
* @generated from enum value: can_create_instance = 20;
|
|
143
|
+
*/
|
|
144
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_create_instance"] = 20] = "can_create_instance";
|
|
145
|
+
/**
|
|
146
|
+
* Permission to create skills in an organization
|
|
147
|
+
*
|
|
148
|
+
* @generated from enum value: can_create_skill = 21;
|
|
149
|
+
*/
|
|
150
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_create_skill"] = 21] = "can_create_skill";
|
|
151
|
+
/**
|
|
152
|
+
* Permission to create projects in an organization
|
|
153
|
+
*
|
|
154
|
+
* @generated from enum value: can_create_project = 23;
|
|
155
|
+
*/
|
|
156
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_create_project"] = 23] = "can_create_project";
|
|
157
|
+
/**
|
|
158
|
+
* Permission to create identity providers in an organization
|
|
159
|
+
*
|
|
160
|
+
* @generated from enum value: can_create_idp = 24;
|
|
161
|
+
*/
|
|
162
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_create_idp"] = 24] = "can_create_idp";
|
|
163
|
+
/**
|
|
164
|
+
* Resource-specific operation permissions
|
|
165
|
+
*
|
|
166
|
+
* Permission to execute agent/session operations
|
|
167
|
+
*
|
|
168
|
+
* @generated from enum value: can_execute = 22;
|
|
169
|
+
*/
|
|
170
|
+
ApiResourceIamPermission[ApiResourceIamPermission["can_execute"] = 22] = "can_execute";
|
|
171
|
+
})(ApiResourceIamPermission || (ApiResourceIamPermission = {}));
|
|
172
|
+
/**
|
|
173
|
+
* Describes the enum ai.stigmer.iam.iampolicy.v1.rpcauthorization.ApiResourceIamPermission.
|
|
174
|
+
*/
|
|
175
|
+
export const ApiResourceIamPermissionSchema = /*@__PURE__*/ enumDesc(file_ai_stigmer_iam_iampolicy_v1_rpcauthorization_iam_permission, 0);
|
|
176
|
+
//# sourceMappingURL=iam_permission_pb.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"iam_permission_pb.js","sourceRoot":"","sources":["../../../../../../../ai/stigmer/iam/iampolicy/v1/rpcauthorization/iam_permission_pb.ts"],"names":[],"mappings":"AAAA,gEAAgE;AAChE,+JAA+J;AAC/J,oBAAoB;AAGpB,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,8BAA8B,CAAC;AAElE;;GAEG;AACH,MAAM,CAAC,MAAM,gEAAgE,GAAY,aAAa,CACpG,QAAQ,CAAC,szBAAszB,CAAC,CAAC;AAEn0B;;;;;GAKG;AACH,MAAM,CAAN,IAAY,wBAmLX;AAnLD,WAAY,wBAAwB;IAClC;;OAEG;IACH,qFAAe,CAAA;IAEf;;;;OAIG;IACH,2EAAU,CAAA;IAEV;;OAEG;IACH,mFAAc,CAAA;IAEd;;OAEG;IACH,+EAAY,CAAA;IAEZ;;OAEG;IACH,+EAAY,CAAA;IAEZ;;;;;;OAMG;IACH,+EAAY,CAAA;IAEZ;;;;OAIG;IACH,+EAAY,CAAA;IAEZ;;;;OAIG;IACH,uGAAwB,CAAA;IAExB;;;;;;OAMG;IACH,+FAAoB,CAAA;IAEpB;;;;OAIG;IACH,6FAAmB,CAAA;IAEnB;;;;;;OAMG;IACH,0EAAU,CAAA;IAEV;;;;OAIG;IACH,4EAAW,CAAA;IAEX;;;;;;OAMG;IACH,gGAAqB,CAAA;IAErB;;;;OAIG;IACH,wFAAiB,CAAA;IAEjB;;;;OAIG;IACH,8EAAY,CAAA;IAEZ;;;;OAIG;IACH,0EAAU,CAAA;IAEV;;;;;;OAMG;IACH,gGAAqB,CAAA;IAErB;;;;OAIG;IACH,sGAAwB,CAAA;IAExB;;;;OAIG;IACH,oGAAuB,CAAA;IAEvB;;;;OAIG;IACH,8GAA4B,CAAA;IAE5B;;;;OAIG;IACH,sGAAwB,CAAA;IAExB;;;;OAIG;IACH,gGAAqB,CAAA;IAErB;;;;OAIG;IACH,oGAAuB,CAAA;IAEvB;;;;OAIG;IACH,4FAAmB,CAAA;IAEnB;;;;;;OAMG;IACH,sFAAgB,CAAA;AAClB,CAAC,EAnLW,wBAAwB,KAAxB,wBAAwB,QAmLnC;AAED;;GAEG;AACH,MAAM,CAAC,MAAM,8BAA8B,GAAsC,aAAa,CAC5F,QAAQ,CAAC,gEAAgE,EAAE,CAAC,CAAC,CAAC"}
|