@superblocksteam/shared 0.9585.2 → 0.9586.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/observability/index.d.ts +1 -0
- package/dist/observability/index.d.ts.map +1 -1
- package/dist/observability/index.js +2 -1
- package/dist/observability/index.js.map +1 -1
- package/dist/types/ai/quota-paywall.d.ts +1 -1
- package/dist/types/ai/quota-paywall.d.ts.map +1 -1
- package/dist/types/ai/quota-paywall.js +23 -0
- package/dist/types/ai/quota-paywall.js.map +1 -1
- package/dist/types/ai/quota-paywall.test.d.ts +2 -0
- package/dist/types/ai/quota-paywall.test.d.ts.map +1 -0
- package/dist/types/ai/quota-paywall.test.js +69 -0
- package/dist/types/ai/quota-paywall.test.js.map +1 -0
- package/dist/types/application/index.d.ts +1 -1
- package/dist/types/application/index.d.ts.map +1 -1
- package/dist/types/application/index.js.map +1 -1
- package/dist/types/credentials/index.d.ts +253 -0
- package/dist/types/credentials/index.d.ts.map +1 -0
- package/dist/types/credentials/index.js +134 -0
- package/dist/types/credentials/index.js.map +1 -0
- package/dist/types/index.d.ts +1 -0
- package/dist/types/index.d.ts.map +1 -1
- package/dist/types/index.js +1 -0
- package/dist/types/index.js.map +1 -1
- package/dist/types/organization/index.d.ts +16 -0
- package/dist/types/organization/index.d.ts.map +1 -1
- package/dist/types/organization/index.js.map +1 -1
- package/dist/types/rbac/index.d.ts +4 -0
- package/dist/types/rbac/index.d.ts.map +1 -1
- package/dist/types/rbac/index.js +4 -0
- package/dist/types/rbac/index.js.map +1 -1
- package/dist-esm/observability/index.d.ts +1 -0
- package/dist-esm/observability/index.d.ts.map +1 -1
- package/dist-esm/observability/index.js +1 -0
- package/dist-esm/observability/index.js.map +1 -1
- package/dist-esm/types/ai/quota-paywall.d.ts +1 -1
- package/dist-esm/types/ai/quota-paywall.d.ts.map +1 -1
- package/dist-esm/types/ai/quota-paywall.js +23 -0
- package/dist-esm/types/ai/quota-paywall.js.map +1 -1
- package/dist-esm/types/ai/quota-paywall.test.d.ts +2 -0
- package/dist-esm/types/ai/quota-paywall.test.d.ts.map +1 -0
- package/dist-esm/types/ai/quota-paywall.test.js +67 -0
- package/dist-esm/types/ai/quota-paywall.test.js.map +1 -0
- package/dist-esm/types/application/index.d.ts +1 -1
- package/dist-esm/types/application/index.d.ts.map +1 -1
- package/dist-esm/types/application/index.js.map +1 -1
- package/dist-esm/types/credentials/index.d.ts +253 -0
- package/dist-esm/types/credentials/index.d.ts.map +1 -0
- package/dist-esm/types/credentials/index.js +128 -0
- package/dist-esm/types/credentials/index.js.map +1 -0
- package/dist-esm/types/index.d.ts +1 -0
- package/dist-esm/types/index.d.ts.map +1 -1
- package/dist-esm/types/index.js +1 -0
- package/dist-esm/types/index.js.map +1 -1
- package/dist-esm/types/organization/index.d.ts +16 -0
- package/dist-esm/types/organization/index.d.ts.map +1 -1
- package/dist-esm/types/organization/index.js.map +1 -1
- package/dist-esm/types/rbac/index.d.ts +4 -0
- package/dist-esm/types/rbac/index.d.ts.map +1 -1
- package/dist-esm/types/rbac/index.js +4 -0
- package/dist-esm/types/rbac/index.js.map +1 -1
- package/package.json +1 -1
- package/src/observability/index.ts +1 -0
- package/src/types/ai/quota-paywall.test.ts +81 -0
- package/src/types/ai/quota-paywall.ts +33 -1
- package/src/types/application/index.ts +1 -2
- package/src/types/credentials/index.ts +268 -0
- package/src/types/index.ts +1 -0
- package/src/types/organization/index.ts +17 -0
- package/src/types/rbac/index.ts +4 -0
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/types/application/index.ts"],"names":[],"mappings":"AAuHA,MAAM,CAAN,IAAY,cAUX;AAVD,WAAY,cAAc;IACxB,mCAAiB,CAAA;IACjB,+BAAa,CAAA;IACb,iCAAe,CAAA;IACf,qCAAmB,CAAA;IACnB,+BAAa,CAAA;IACb,+BAAa,CAAA;IACb,uCAAqB,CAAA;IACrB,mCAAiB,CAAA;IACjB,mCAAiB,CAAA;AACnB,CAAC,EAVW,cAAc,KAAd,cAAc,QAUzB;AAgBD,qGAAqG;AACrG,MAAM,CAAC,MAAM,gBAAgB,GAAG,YAAY,CAAC;AAE7C,yEAAyE;AACzE,MAAM,UAAU,eAAe,CAAC,MAAc;IAC5C,OAAO;QACL,EAAE,EAAE,gBAAgB;QACpB,MAAM;QACN,IAAI,EAAE,GAAG;KACV,CAAC;AACJ,CAAC;AAmBD,MAAM,CAAN,IAAY,SAIX;AAJD,WAAY,SAAS;IACnB,4BAAe,CAAA;IACf,0BAAa,CAAA;IACb,0BAAa,CAAA;AACf,CAAC,EAJW,SAAS,KAAT,SAAS,QAIpB;AA+FD,MAAM,CAAC,MAAM,2BAA2B,GAAG,QAAQ,CAAC;AAsEpD,MAAM,UAAU,6BAA6B,CAAC,mBAAwC;IACpF,OAAO;QACL,gBAAgB,EAAE,mBAAmB,CAAC,gBAAgB;QACtD,oBAAoB,EAAE,mBAAmB,CAAC,oBAAoB;QAC9D,KAAK,EAAE,mBAAmB,CAAC,KAAK;QAChC,WAAW,EAAE,mBAAmB,CAAC,WAAW;QAC5C,YAAY,EAAE,mBAAmB,CAAC,YAAY;QAC9C,UAAU,EAAE,mBAAmB,CAAC,UAAU;QAC1C,sBAAsB,EAAE,mBAAmB,CAAC,sBAAsB;QAClE,KAAK,EAAE,mBAAmB,CAAC,KAAK;KACjC,CAAC;AACJ,CAAC;AAED,MAAM,UAAU,iCAAiC,CAAC,mBAAyC;IACzF,IAAI,CAAC,mBAAmB,EAAE,CAAC;QACzB,OAAO;IACT,CAAC;IACD,OAAO;QACL,QAAQ,EAAE,mBAAmB,CAAC,QAAQ;KACvC,CAAC;AACJ,CAAC;AA2DD,MAAM,UAAU,sBAAsB,CAAC,KAAc;IACnD,OAAO,CACL,wBAAwB,CAAC,KAAK,CAAC;QAC/B,SAAS,IAAI,KAAK,CAAC,WAAW;QAC9B,SAAS,IAAI,KAAK,CAAC,WAAW;QAC9B,WAAW,IAAI,KAAK,CAAC,WAAW;QAChC,UAAU,IAAI,KAAK,CAAC,WAAW;QAC/B,YAAY,IAAI,KAAK,CAAC,WAAW;QACjC,UAAU,IAAI,KAAK,CAAC,WAAW;QAC/B,YAAY,IAAI,KAAK,CAAC,WAAW;QACjC,iBAAiB,IAAI,KAAK,CAAC,WAAW,CACvC,CAAC;AACJ,CAAC;AAED,MAAM,UAAU,wBAAwB,CAAC,KAAc;IACrD,OAAO,MAAM,CAAC,SAAS,CAAC,cAAc,CAAC,IAAI,CAAC,KAAK,EAAE,aAAa,CAAC,CAAC;AACpE,CAAC;AAiJD,MAAM,CAAN,IAAY,gBAIX;AAJD,WAAY,gBAAgB;IAC1B,+BAAW,CAAA;IACX,iCAAa,CAAA;IACb,qCAAiB,CAAA;AACnB,CAAC,EAJW,gBAAgB,KAAhB,gBAAgB,QAI3B;
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/types/application/index.ts"],"names":[],"mappings":"AAuHA,MAAM,CAAN,IAAY,cAUX;AAVD,WAAY,cAAc;IACxB,mCAAiB,CAAA;IACjB,+BAAa,CAAA;IACb,iCAAe,CAAA;IACf,qCAAmB,CAAA;IACnB,+BAAa,CAAA;IACb,+BAAa,CAAA;IACb,uCAAqB,CAAA;IACrB,mCAAiB,CAAA;IACjB,mCAAiB,CAAA;AACnB,CAAC,EAVW,cAAc,KAAd,cAAc,QAUzB;AAgBD,qGAAqG;AACrG,MAAM,CAAC,MAAM,gBAAgB,GAAG,YAAY,CAAC;AAE7C,yEAAyE;AACzE,MAAM,UAAU,eAAe,CAAC,MAAc;IAC5C,OAAO;QACL,EAAE,EAAE,gBAAgB;QACpB,MAAM;QACN,IAAI,EAAE,GAAG;KACV,CAAC;AACJ,CAAC;AAmBD,MAAM,CAAN,IAAY,SAIX;AAJD,WAAY,SAAS;IACnB,4BAAe,CAAA;IACf,0BAAa,CAAA;IACb,0BAAa,CAAA;AACf,CAAC,EAJW,SAAS,KAAT,SAAS,QAIpB;AA+FD,MAAM,CAAC,MAAM,2BAA2B,GAAG,QAAQ,CAAC;AAsEpD,MAAM,UAAU,6BAA6B,CAAC,mBAAwC;IACpF,OAAO;QACL,gBAAgB,EAAE,mBAAmB,CAAC,gBAAgB;QACtD,oBAAoB,EAAE,mBAAmB,CAAC,oBAAoB;QAC9D,KAAK,EAAE,mBAAmB,CAAC,KAAK;QAChC,WAAW,EAAE,mBAAmB,CAAC,WAAW;QAC5C,YAAY,EAAE,mBAAmB,CAAC,YAAY;QAC9C,UAAU,EAAE,mBAAmB,CAAC,UAAU;QAC1C,sBAAsB,EAAE,mBAAmB,CAAC,sBAAsB;QAClE,KAAK,EAAE,mBAAmB,CAAC,KAAK;KACjC,CAAC;AACJ,CAAC;AAED,MAAM,UAAU,iCAAiC,CAAC,mBAAyC;IACzF,IAAI,CAAC,mBAAmB,EAAE,CAAC;QACzB,OAAO;IACT,CAAC;IACD,OAAO;QACL,QAAQ,EAAE,mBAAmB,CAAC,QAAQ;KACvC,CAAC;AACJ,CAAC;AA2DD,MAAM,UAAU,sBAAsB,CAAC,KAAc;IACnD,OAAO,CACL,wBAAwB,CAAC,KAAK,CAAC;QAC/B,SAAS,IAAI,KAAK,CAAC,WAAW;QAC9B,SAAS,IAAI,KAAK,CAAC,WAAW;QAC9B,WAAW,IAAI,KAAK,CAAC,WAAW;QAChC,UAAU,IAAI,KAAK,CAAC,WAAW;QAC/B,YAAY,IAAI,KAAK,CAAC,WAAW;QACjC,UAAU,IAAI,KAAK,CAAC,WAAW;QAC/B,YAAY,IAAI,KAAK,CAAC,WAAW;QACjC,iBAAiB,IAAI,KAAK,CAAC,WAAW,CACvC,CAAC;AACJ,CAAC;AAED,MAAM,UAAU,wBAAwB,CAAC,KAAc;IACrD,OAAO,MAAM,CAAC,SAAS,CAAC,cAAc,CAAC,IAAI,CAAC,KAAK,EAAE,aAAa,CAAC,CAAC;AACpE,CAAC;AAiJD,MAAM,CAAN,IAAY,gBAIX;AAJD,WAAY,gBAAgB;IAC1B,+BAAW,CAAA;IACX,iCAAa,CAAA;IACb,qCAAiB,CAAA;AACnB,CAAC,EAJW,gBAAgB,KAAhB,gBAAgB,QAI3B;AAwCD;;;;;GAKG;AACH,MAAM,iBAAiB,GAAG,IAAI,GAAG,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC;AAErD,MAAM,UAAU,gBAAgB,CAAC,YAAuC;IACtE,IAAI,CAAC,YAAY;QAAE,OAAO,KAAK,CAAC;IAChC,OAAO,iBAAiB,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;AAC7C,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,MAAM,2BAA2B,GAAG,iBAAiB,CAAC;AAE7D;;;;;;;GAOG;AACH,MAAM,UAAU,2BAA2B,CAAC,kBAA6C;IACvF,OAAO,kBAAkB,IAAI,2BAA2B,CAAC;AAC3D,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,sBAAsB,CAAC,kBAA6C;IAClF,OAAO,gBAAgB,CAAC,2BAA2B,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAC3E,CAAC"}
|
|
@@ -0,0 +1,253 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Per-organization credential payloads, shared between server and UI.
|
|
3
|
+
*
|
|
4
|
+
* A credential row is canonically identified by the
|
|
5
|
+
* `(role, backend, auth_method)` tuple; the schema stores the tuple,
|
|
6
|
+
* not a dotted-string discriminator. The dotted form
|
|
7
|
+
* `<role>.<backend>.<auth-method>` clients see in `type` is a derived
|
|
8
|
+
* label projected from the tuple at DTO-build time. Always 3 segments
|
|
9
|
+
* — even when a backend has a single canonical auth method, it's
|
|
10
|
+
* recorded explicitly so the wire format and the schema stay in
|
|
11
|
+
* lockstep without a per-backend special case.
|
|
12
|
+
*
|
|
13
|
+
* Each row carries `{ secrets, metadata }`. The database enforces the
|
|
14
|
+
* split at the column level: `secrets` is encrypted, `metadata` is
|
|
15
|
+
* plaintext jsonb. The union below forces every new field to pick a
|
|
16
|
+
* side at authoring time — a future column cannot accidentally stuff
|
|
17
|
+
* a secret into `metadata` without the TS compiler flagging it,
|
|
18
|
+
* because the keys in each variant's `metadata` are fixed.
|
|
19
|
+
*
|
|
20
|
+
* The registry (`packages/server/src/db/repository/credential/registry.ts`)
|
|
21
|
+
* owns the matching zod validators, the runtime-plaintext-location
|
|
22
|
+
* pin, and the cardinality (`'singleton' | 'multi' | 'per-user'`).
|
|
23
|
+
* This file only expresses the shape both sides of the wire agree on.
|
|
24
|
+
*
|
|
25
|
+
* - `provisioning.*` — admin credentials a worker uses to create
|
|
26
|
+
* per-app logical databases in a customer's cloud.
|
|
27
|
+
* - `inference.*` — credentials used to call a managed inference API
|
|
28
|
+
* (Snowflake Cortex REST API, Databricks AI Gateway). Non-singleton
|
|
29
|
+
* so an org can keep separate dev/prod rows.
|
|
30
|
+
* - reserved: `authoring.*`, `runtime.*`, `connection.*`, `pat.*`,
|
|
31
|
+
* `trust.*`, `generator.*`.
|
|
32
|
+
*
|
|
33
|
+
* Trust and generator payload variants don't appear in the union yet —
|
|
34
|
+
* those land in the followup PR alongside their registry entries. The
|
|
35
|
+
* schema (and the CHECK constraint allowing `class IN ('stored', 'trust',
|
|
36
|
+
* 'generator')`) already supports them so the followup is registry-only.
|
|
37
|
+
*/
|
|
38
|
+
/**
|
|
39
|
+
* Secrets shape for `provisioning.snowflake.pat` and
|
|
40
|
+
* `inference.snowflake-cortex.pat`. Snowflake accepts either a
|
|
41
|
+
* programmatic access token (used as the `password` for `snowflake-sdk`,
|
|
42
|
+
* or as a bearer token against the REST API) or an RSA private key used
|
|
43
|
+
* to sign a short-lived JWT. Consumers branch on which shape is present.
|
|
44
|
+
*
|
|
45
|
+
* Note that the dotted label says `pat` even when the keypair branch is
|
|
46
|
+
* used; `pat` here is the identifier of the auth-method *family*,
|
|
47
|
+
* because Snowflake exposes both as a single endpoint that consumes a
|
|
48
|
+
* bearer token (the keypair JWT and the literal PAT are interchangeable
|
|
49
|
+
* at the request level). When a true second auth method lands (e.g.
|
|
50
|
+
* OAuth M2M) it gets its own tuple with a distinct auth_method segment.
|
|
51
|
+
*/
|
|
52
|
+
export type SnowflakeSecrets = {
|
|
53
|
+
pat: string;
|
|
54
|
+
} | {
|
|
55
|
+
privateKey: string;
|
|
56
|
+
privateKeyPassphrase?: string;
|
|
57
|
+
};
|
|
58
|
+
export type ProvisioningLakebasePayload = {
|
|
59
|
+
type: 'provisioning.lakebase.pat';
|
|
60
|
+
secrets: {
|
|
61
|
+
pat: string;
|
|
62
|
+
};
|
|
63
|
+
metadata: {
|
|
64
|
+
workspaceUrl?: string;
|
|
65
|
+
adminHost?: string;
|
|
66
|
+
adminPort?: number;
|
|
67
|
+
adminUsername?: string;
|
|
68
|
+
sslMode?: string;
|
|
69
|
+
};
|
|
70
|
+
};
|
|
71
|
+
export type ProvisioningSnowflakePayload = {
|
|
72
|
+
type: 'provisioning.snowflake.pat';
|
|
73
|
+
secrets: SnowflakeSecrets;
|
|
74
|
+
metadata: {
|
|
75
|
+
account: string;
|
|
76
|
+
username: string;
|
|
77
|
+
warehouse?: string;
|
|
78
|
+
role?: string;
|
|
79
|
+
schema?: string;
|
|
80
|
+
databasePrefix?: string;
|
|
81
|
+
};
|
|
82
|
+
};
|
|
83
|
+
/**
|
|
84
|
+
* Credentials used to call the Snowflake Cortex REST API. Same secret
|
|
85
|
+
* shapes as `provisioning.snowflake.pat` — the REST API accepts either
|
|
86
|
+
* a long-lived PAT as a bearer token or a short-lived JWT signed with
|
|
87
|
+
* an RSA private key. `cardinality: 'multi'` in the registry because
|
|
88
|
+
* orgs will plausibly want separate dev / prod Cortex identities.
|
|
89
|
+
*/
|
|
90
|
+
export type InferenceSnowflakeCortexPayload = {
|
|
91
|
+
type: 'inference.snowflake-cortex.pat';
|
|
92
|
+
secrets: SnowflakeSecrets;
|
|
93
|
+
metadata: {
|
|
94
|
+
/** Snowflake account identifier, e.g. `xy12345.us-east-1`. */
|
|
95
|
+
account: string;
|
|
96
|
+
/** Service user whose PAT or public key is installed on the Snowflake side. */
|
|
97
|
+
username: string;
|
|
98
|
+
/** Role the PAT is scoped to / the JWT should assume at call time. */
|
|
99
|
+
role?: string;
|
|
100
|
+
};
|
|
101
|
+
};
|
|
102
|
+
/**
|
|
103
|
+
* Databricks AI Gateway credential. AI Gateway only accepts Programmatic
|
|
104
|
+
* Access Tokens (PATs) as bearer credentials — there is no keypair or
|
|
105
|
+
* OAuth path comparable to Snowflake Cortex. `workspaceUrl` is validated
|
|
106
|
+
* at the registry with a strict https + known-suffix regex so a typo
|
|
107
|
+
* there can't silently point at the wrong workspace at call time.
|
|
108
|
+
*/
|
|
109
|
+
export type InferenceDatabricksAiGatewayPayload = {
|
|
110
|
+
type: 'inference.databricks-ai-gateway.pat';
|
|
111
|
+
secrets: {
|
|
112
|
+
pat: string;
|
|
113
|
+
};
|
|
114
|
+
metadata: {
|
|
115
|
+
/**
|
|
116
|
+
* Full workspace URL, e.g. `https://dbc-abcd1234-5678.cloud.databricks.com`
|
|
117
|
+
* or `https://adb-1234567890123456.7.azuredatabricks.net`. Must match
|
|
118
|
+
* the strict Databricks-host regex in the registry.
|
|
119
|
+
*/
|
|
120
|
+
workspaceUrl: string;
|
|
121
|
+
};
|
|
122
|
+
};
|
|
123
|
+
export type CredentialPayload = ProvisioningLakebasePayload | ProvisioningSnowflakePayload | InferenceSnowflakeCortexPayload | InferenceDatabricksAiGatewayPayload;
|
|
124
|
+
export type CredentialType = CredentialPayload['type'];
|
|
125
|
+
/**
|
|
126
|
+
* All known `<role>` prefixes. Used by callers to filter credentials by
|
|
127
|
+
* role (e.g. "list all provisioning credentials for this org"). Includes
|
|
128
|
+
* reserved-but-unused roles so adding a new one later is a registry +
|
|
129
|
+
* union change rather than a cross-cutting rename.
|
|
130
|
+
*
|
|
131
|
+
* `trust` and `generator` are reserved for the credential-class taxonomy
|
|
132
|
+
* (see `CredentialClass` below): trust-config rows like
|
|
133
|
+
* `trust.aws.iam-role-assume` will claim `role: 'trust'`, generator rows
|
|
134
|
+
* like `generator.snowflake.keypair-jwt` will claim `role: 'generator'`.
|
|
135
|
+
* They are not yet populated in the registry — these reserved values
|
|
136
|
+
* just keep the `(class, role, backend, auth_method)` tuple consistent
|
|
137
|
+
* so the followup PR's registrations are a code-only change.
|
|
138
|
+
*/
|
|
139
|
+
export declare const CREDENTIAL_ROLES: readonly ["provisioning", "authoring", "runtime", "connection", "inference", "pat", "trust", "generator"];
|
|
140
|
+
export type CredentialRole = (typeof CREDENTIAL_ROLES)[number];
|
|
141
|
+
/**
|
|
142
|
+
* Three credential classes, recorded on every row of the `credential`
|
|
143
|
+
* table:
|
|
144
|
+
* - `stored` — encrypted secret bytes are the credential
|
|
145
|
+
* (PATs, RSA private keys held for JWT signing).
|
|
146
|
+
* - `trust` — the credential is a trust assertion held in
|
|
147
|
+
* `metadata`; `encrypted_secrets` is NULL. The DB's
|
|
148
|
+
* `chk_credential_secrets_class` CHECK constraint
|
|
149
|
+
* enforces this.
|
|
150
|
+
* - `generator` — encrypted bytes are *generator material* (OAuth
|
|
151
|
+
* client_id+secret, RSA keypair) used to mint a
|
|
152
|
+
* short-lived runtime token. The minted token is
|
|
153
|
+
* never persisted; only the cache key tuple
|
|
154
|
+
* (orgId, credentialId, fingerprint, derivationKey)
|
|
155
|
+
* is.
|
|
156
|
+
*
|
|
157
|
+
* The class is denormalized onto the row so query paths can branch on
|
|
158
|
+
* it without joining the registry, and so the schema CHECK constraint
|
|
159
|
+
* can enforce the secrets-vs-no-secrets invariant. Only `'stored'`
|
|
160
|
+
* entries are registered today; `'trust'` and `'generator'` are
|
|
161
|
+
* reserved by the schema and the type system, awaiting their registry
|
|
162
|
+
* additions in the followup PR.
|
|
163
|
+
*/
|
|
164
|
+
export declare const CREDENTIAL_CLASSES: readonly ["stored", "trust", "generator"];
|
|
165
|
+
export type CredentialClass = (typeof CREDENTIAL_CLASSES)[number];
|
|
166
|
+
/**
|
|
167
|
+
* The process where a credential's plaintext (or its derived runtime
|
|
168
|
+
* token, for generator credentials) may legitimately exist.
|
|
169
|
+
*
|
|
170
|
+
* - `server` — the Superblocks control plane.
|
|
171
|
+
* - `orchestrator` — the customer's On-Premise Agent.
|
|
172
|
+
* - `worker` — the orchestrator's per-language sandboxed
|
|
173
|
+
* worker process (Go/JS/Python).
|
|
174
|
+
* - `customer-sm` — held in the customer's own secret manager
|
|
175
|
+
* (AWS Secrets Manager, GCP Secret Manager,
|
|
176
|
+
* Vault); the Superblocks control plane never
|
|
177
|
+
* touches it. Reserved.
|
|
178
|
+
*
|
|
179
|
+
* The repository's `assertProcessCanHandle` guard reads a process-level
|
|
180
|
+
* `PROCESS_LOCATION` constant and rejects with
|
|
181
|
+
* `WrongProcessForCredentialError` if a row's
|
|
182
|
+
* `runtimePlaintextLocation` excludes the current process. Replaces
|
|
183
|
+
* the implicit "this code path lives server-side, so the secret must
|
|
184
|
+
* be decryptable here" convention with a typed check.
|
|
185
|
+
*/
|
|
186
|
+
export declare const RUNTIME_PLAINTEXT_LOCATIONS: readonly ["server", "orchestrator", "worker", "customer-sm"];
|
|
187
|
+
export type RuntimePlaintextLocation = (typeof RUNTIME_PLAINTEXT_LOCATIONS)[number];
|
|
188
|
+
/**
|
|
189
|
+
* Format a `(role, backend, authMethod)` tuple into the dotted
|
|
190
|
+
* `CredentialType` label that clients see on the wire. The schema
|
|
191
|
+
* stores the tuple; this is the canonical projection for DTOs and
|
|
192
|
+
* registry-by-label lookups. Always 3 segments.
|
|
193
|
+
*/
|
|
194
|
+
export declare function formatCredentialType(role: string, backend: string, authMethod: string): CredentialType;
|
|
195
|
+
/**
|
|
196
|
+
* Inverse of `formatCredentialType`. Returns `null` when the input
|
|
197
|
+
* doesn't have exactly three dotted segments — the caller decides
|
|
198
|
+
* whether that's a hard error or a soft signal. Backend and auth-method
|
|
199
|
+
* identifiers may contain hyphens but never dots, so a length-3 split
|
|
200
|
+
* is unambiguous.
|
|
201
|
+
*/
|
|
202
|
+
export declare function parseCredentialType(type: string): {
|
|
203
|
+
role: string;
|
|
204
|
+
backend: string;
|
|
205
|
+
authMethod: string;
|
|
206
|
+
} | null;
|
|
207
|
+
/**
|
|
208
|
+
* Convenience: extract the role segment of a `CredentialType`. The
|
|
209
|
+
* full tuple round-trip is `parseCredentialType`.
|
|
210
|
+
*/
|
|
211
|
+
export declare function credentialRole(type: CredentialType): CredentialRole;
|
|
212
|
+
/**
|
|
213
|
+
* Non-secret projection returned from list / GET endpoints. Never contains
|
|
214
|
+
* `secrets`. `metadata` is the same shape the client POSTed under that key.
|
|
215
|
+
*
|
|
216
|
+
* `class`, `role`, `backend`, `authMethod`, and `runtimePlaintextLocation`
|
|
217
|
+
* come from columns on the row (the canonical tuple plus the registry-
|
|
218
|
+
* pinned class and process-location). `type` is the dotted label
|
|
219
|
+
* projected from `(role, backend, authMethod)` — kept on the DTO as
|
|
220
|
+
* an API-stable identifier so existing clients don't have to assemble
|
|
221
|
+
* it themselves.
|
|
222
|
+
*/
|
|
223
|
+
export interface CredentialDto {
|
|
224
|
+
id: string;
|
|
225
|
+
organizationId: string;
|
|
226
|
+
/** Derived label `${role}.${backend}.${authMethod}`; not stored. */
|
|
227
|
+
type: CredentialType;
|
|
228
|
+
/** `null` when the registry marks the tuple as a singleton. */
|
|
229
|
+
name: string | null;
|
|
230
|
+
metadata: CredentialPayload['metadata'];
|
|
231
|
+
/** First 8 hex of SHA-256 over the decrypted secrets object at write time. */
|
|
232
|
+
fingerprint: string;
|
|
233
|
+
/** See `CredentialClass`. Pinned by the registry on write. */
|
|
234
|
+
class: CredentialClass;
|
|
235
|
+
/** See `CREDENTIAL_ROLES`. First segment of the canonical tuple. */
|
|
236
|
+
role: CredentialRole;
|
|
237
|
+
/** Short backend identifier, e.g. `lakebase`, `snowflake`, `aws`. */
|
|
238
|
+
backend: string;
|
|
239
|
+
/** Short auth-method identifier, e.g. `pat`, `keypair`, `oauth-m2m`. */
|
|
240
|
+
authMethod: string;
|
|
241
|
+
/** See `RuntimePlaintextLocation`. Pinned by the registry on write. */
|
|
242
|
+
runtimePlaintextLocation: RuntimePlaintextLocation;
|
|
243
|
+
createdAt: string;
|
|
244
|
+
updatedAt: string;
|
|
245
|
+
createdBy: string | null;
|
|
246
|
+
}
|
|
247
|
+
export interface UpsertCredentialRequest {
|
|
248
|
+
type: CredentialType;
|
|
249
|
+
name?: string | null;
|
|
250
|
+
secrets: CredentialPayload['secrets'];
|
|
251
|
+
metadata: CredentialPayload['metadata'];
|
|
252
|
+
}
|
|
253
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/types/credentials/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoCG;AAEH;;;;;;;;;;;;;GAaG;AACH,MAAM,MAAM,gBAAgB,GAAG;IAAE,GAAG,EAAE,MAAM,CAAA;CAAE,GAAG;IAAE,UAAU,EAAE,MAAM,CAAC;IAAC,oBAAoB,CAAC,EAAE,MAAM,CAAA;CAAE,CAAC;AAEvG,MAAM,MAAM,2BAA2B,GAAG;IACxC,IAAI,EAAE,2BAA2B,CAAC;IAClC,OAAO,EAAE;QAAE,GAAG,EAAE,MAAM,CAAA;KAAE,CAAC;IACzB,QAAQ,EAAE;QACR,YAAY,CAAC,EAAE,MAAM,CAAC;QACtB,SAAS,CAAC,EAAE,MAAM,CAAC;QACnB,SAAS,CAAC,EAAE,MAAM,CAAC;QACnB,aAAa,CAAC,EAAE,MAAM,CAAC;QACvB,OAAO,CAAC,EAAE,MAAM,CAAC;KAClB,CAAC;CACH,CAAC;AAEF,MAAM,MAAM,4BAA4B,GAAG;IACzC,IAAI,EAAE,4BAA4B,CAAC;IACnC,OAAO,EAAE,gBAAgB,CAAC;IAC1B,QAAQ,EAAE;QACR,OAAO,EAAE,MAAM,CAAC;QAChB,QAAQ,EAAE,MAAM,CAAC;QACjB,SAAS,CAAC,EAAE,MAAM,CAAC;QACnB,IAAI,CAAC,EAAE,MAAM,CAAC;QACd,MAAM,CAAC,EAAE,MAAM,CAAC;QAChB,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB,CAAC;CACH,CAAC;AAEF;;;;;;GAMG;AACH,MAAM,MAAM,+BAA+B,GAAG;IAC5C,IAAI,EAAE,gCAAgC,CAAC;IACvC,OAAO,EAAE,gBAAgB,CAAC;IAC1B,QAAQ,EAAE;QACR,8DAA8D;QAC9D,OAAO,EAAE,MAAM,CAAC;QAChB,+EAA+E;QAC/E,QAAQ,EAAE,MAAM,CAAC;QACjB,sEAAsE;QACtE,IAAI,CAAC,EAAE,MAAM,CAAC;KACf,CAAC;CACH,CAAC;AAEF;;;;;;GAMG;AACH,MAAM,MAAM,mCAAmC,GAAG;IAChD,IAAI,EAAE,qCAAqC,CAAC;IAC5C,OAAO,EAAE;QAAE,GAAG,EAAE,MAAM,CAAA;KAAE,CAAC;IACzB,QAAQ,EAAE;QACR;;;;WAIG;QACH,YAAY,EAAE,MAAM,CAAC;KACtB,CAAC;CACH,CAAC;AAEF,MAAM,MAAM,iBAAiB,GACzB,2BAA2B,GAC3B,4BAA4B,GAC5B,+BAA+B,GAC/B,mCAAmC,CAAC;AAExC,MAAM,MAAM,cAAc,GAAG,iBAAiB,CAAC,MAAM,CAAC,CAAC;AAEvD;;;;;;;;;;;;;GAaG;AACH,eAAO,MAAM,gBAAgB,2GAA4G,CAAC;AAC1I,MAAM,MAAM,cAAc,GAAG,CAAC,OAAO,gBAAgB,CAAC,CAAC,MAAM,CAAC,CAAC;AAE/D;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,eAAO,MAAM,kBAAkB,2CAA4C,CAAC;AAC5E,MAAM,MAAM,eAAe,GAAG,CAAC,OAAO,kBAAkB,CAAC,CAAC,MAAM,CAAC,CAAC;AAElE;;;;;;;;;;;;;;;;;;;GAmBG;AACH,eAAO,MAAM,2BAA2B,8DAA+D,CAAC;AACxG,MAAM,MAAM,wBAAwB,GAAG,CAAC,OAAO,2BAA2B,CAAC,CAAC,MAAM,CAAC,CAAC;AAEpF;;;;;GAKG;AACH,wBAAgB,oBAAoB,CAAC,IAAI,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,GAAG,cAAc,CAEtG;AAED;;;;;;GAMG;AACH,wBAAgB,mBAAmB,CAAC,IAAI,EAAE,MAAM,GAAG;IAAE,IAAI,EAAE,MAAM,CAAC;IAAC,OAAO,EAAE,MAAM,CAAC;IAAC,UAAU,EAAE,MAAM,CAAA;CAAE,GAAG,IAAI,CAM9G;AAED;;;GAGG;AACH,wBAAgB,cAAc,CAAC,IAAI,EAAE,cAAc,GAAG,cAAc,CAEnE;AAED;;;;;;;;;;GAUG;AACH,MAAM,WAAW,aAAa;IAC5B,EAAE,EAAE,MAAM,CAAC;IACX,cAAc,EAAE,MAAM,CAAC;IACvB,oEAAoE;IACpE,IAAI,EAAE,cAAc,CAAC;IACrB,+DAA+D;IAC/D,IAAI,EAAE,MAAM,GAAG,IAAI,CAAC;IACpB,QAAQ,EAAE,iBAAiB,CAAC,UAAU,CAAC,CAAC;IACxC,8EAA8E;IAC9E,WAAW,EAAE,MAAM,CAAC;IACpB,8DAA8D;IAC9D,KAAK,EAAE,eAAe,CAAC;IACvB,oEAAoE;IACpE,IAAI,EAAE,cAAc,CAAC;IACrB,qEAAqE;IACrE,OAAO,EAAE,MAAM,CAAC;IAChB,wEAAwE;IACxE,UAAU,EAAE,MAAM,CAAC;IACnB,uEAAuE;IACvE,wBAAwB,EAAE,wBAAwB,CAAC;IACnD,SAAS,EAAE,MAAM,CAAC;IAClB,SAAS,EAAE,MAAM,CAAC;IAClB,SAAS,EAAE,MAAM,GAAG,IAAI,CAAC;CAC1B;AAED,MAAM,WAAW,uBAAuB;IACtC,IAAI,EAAE,cAAc,CAAC;IACrB,IAAI,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACrB,OAAO,EAAE,iBAAiB,CAAC,SAAS,CAAC,CAAC;IACtC,QAAQ,EAAE,iBAAiB,CAAC,UAAU,CAAC,CAAC;CACzC"}
|
|
@@ -0,0 +1,128 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Per-organization credential payloads, shared between server and UI.
|
|
3
|
+
*
|
|
4
|
+
* A credential row is canonically identified by the
|
|
5
|
+
* `(role, backend, auth_method)` tuple; the schema stores the tuple,
|
|
6
|
+
* not a dotted-string discriminator. The dotted form
|
|
7
|
+
* `<role>.<backend>.<auth-method>` clients see in `type` is a derived
|
|
8
|
+
* label projected from the tuple at DTO-build time. Always 3 segments
|
|
9
|
+
* — even when a backend has a single canonical auth method, it's
|
|
10
|
+
* recorded explicitly so the wire format and the schema stay in
|
|
11
|
+
* lockstep without a per-backend special case.
|
|
12
|
+
*
|
|
13
|
+
* Each row carries `{ secrets, metadata }`. The database enforces the
|
|
14
|
+
* split at the column level: `secrets` is encrypted, `metadata` is
|
|
15
|
+
* plaintext jsonb. The union below forces every new field to pick a
|
|
16
|
+
* side at authoring time — a future column cannot accidentally stuff
|
|
17
|
+
* a secret into `metadata` without the TS compiler flagging it,
|
|
18
|
+
* because the keys in each variant's `metadata` are fixed.
|
|
19
|
+
*
|
|
20
|
+
* The registry (`packages/server/src/db/repository/credential/registry.ts`)
|
|
21
|
+
* owns the matching zod validators, the runtime-plaintext-location
|
|
22
|
+
* pin, and the cardinality (`'singleton' | 'multi' | 'per-user'`).
|
|
23
|
+
* This file only expresses the shape both sides of the wire agree on.
|
|
24
|
+
*
|
|
25
|
+
* - `provisioning.*` — admin credentials a worker uses to create
|
|
26
|
+
* per-app logical databases in a customer's cloud.
|
|
27
|
+
* - `inference.*` — credentials used to call a managed inference API
|
|
28
|
+
* (Snowflake Cortex REST API, Databricks AI Gateway). Non-singleton
|
|
29
|
+
* so an org can keep separate dev/prod rows.
|
|
30
|
+
* - reserved: `authoring.*`, `runtime.*`, `connection.*`, `pat.*`,
|
|
31
|
+
* `trust.*`, `generator.*`.
|
|
32
|
+
*
|
|
33
|
+
* Trust and generator payload variants don't appear in the union yet —
|
|
34
|
+
* those land in the followup PR alongside their registry entries. The
|
|
35
|
+
* schema (and the CHECK constraint allowing `class IN ('stored', 'trust',
|
|
36
|
+
* 'generator')`) already supports them so the followup is registry-only.
|
|
37
|
+
*/
|
|
38
|
+
/**
|
|
39
|
+
* All known `<role>` prefixes. Used by callers to filter credentials by
|
|
40
|
+
* role (e.g. "list all provisioning credentials for this org"). Includes
|
|
41
|
+
* reserved-but-unused roles so adding a new one later is a registry +
|
|
42
|
+
* union change rather than a cross-cutting rename.
|
|
43
|
+
*
|
|
44
|
+
* `trust` and `generator` are reserved for the credential-class taxonomy
|
|
45
|
+
* (see `CredentialClass` below): trust-config rows like
|
|
46
|
+
* `trust.aws.iam-role-assume` will claim `role: 'trust'`, generator rows
|
|
47
|
+
* like `generator.snowflake.keypair-jwt` will claim `role: 'generator'`.
|
|
48
|
+
* They are not yet populated in the registry — these reserved values
|
|
49
|
+
* just keep the `(class, role, backend, auth_method)` tuple consistent
|
|
50
|
+
* so the followup PR's registrations are a code-only change.
|
|
51
|
+
*/
|
|
52
|
+
export const CREDENTIAL_ROLES = ['provisioning', 'authoring', 'runtime', 'connection', 'inference', 'pat', 'trust', 'generator'];
|
|
53
|
+
/**
|
|
54
|
+
* Three credential classes, recorded on every row of the `credential`
|
|
55
|
+
* table:
|
|
56
|
+
* - `stored` — encrypted secret bytes are the credential
|
|
57
|
+
* (PATs, RSA private keys held for JWT signing).
|
|
58
|
+
* - `trust` — the credential is a trust assertion held in
|
|
59
|
+
* `metadata`; `encrypted_secrets` is NULL. The DB's
|
|
60
|
+
* `chk_credential_secrets_class` CHECK constraint
|
|
61
|
+
* enforces this.
|
|
62
|
+
* - `generator` — encrypted bytes are *generator material* (OAuth
|
|
63
|
+
* client_id+secret, RSA keypair) used to mint a
|
|
64
|
+
* short-lived runtime token. The minted token is
|
|
65
|
+
* never persisted; only the cache key tuple
|
|
66
|
+
* (orgId, credentialId, fingerprint, derivationKey)
|
|
67
|
+
* is.
|
|
68
|
+
*
|
|
69
|
+
* The class is denormalized onto the row so query paths can branch on
|
|
70
|
+
* it without joining the registry, and so the schema CHECK constraint
|
|
71
|
+
* can enforce the secrets-vs-no-secrets invariant. Only `'stored'`
|
|
72
|
+
* entries are registered today; `'trust'` and `'generator'` are
|
|
73
|
+
* reserved by the schema and the type system, awaiting their registry
|
|
74
|
+
* additions in the followup PR.
|
|
75
|
+
*/
|
|
76
|
+
export const CREDENTIAL_CLASSES = ['stored', 'trust', 'generator'];
|
|
77
|
+
/**
|
|
78
|
+
* The process where a credential's plaintext (or its derived runtime
|
|
79
|
+
* token, for generator credentials) may legitimately exist.
|
|
80
|
+
*
|
|
81
|
+
* - `server` — the Superblocks control plane.
|
|
82
|
+
* - `orchestrator` — the customer's On-Premise Agent.
|
|
83
|
+
* - `worker` — the orchestrator's per-language sandboxed
|
|
84
|
+
* worker process (Go/JS/Python).
|
|
85
|
+
* - `customer-sm` — held in the customer's own secret manager
|
|
86
|
+
* (AWS Secrets Manager, GCP Secret Manager,
|
|
87
|
+
* Vault); the Superblocks control plane never
|
|
88
|
+
* touches it. Reserved.
|
|
89
|
+
*
|
|
90
|
+
* The repository's `assertProcessCanHandle` guard reads a process-level
|
|
91
|
+
* `PROCESS_LOCATION` constant and rejects with
|
|
92
|
+
* `WrongProcessForCredentialError` if a row's
|
|
93
|
+
* `runtimePlaintextLocation` excludes the current process. Replaces
|
|
94
|
+
* the implicit "this code path lives server-side, so the secret must
|
|
95
|
+
* be decryptable here" convention with a typed check.
|
|
96
|
+
*/
|
|
97
|
+
export const RUNTIME_PLAINTEXT_LOCATIONS = ['server', 'orchestrator', 'worker', 'customer-sm'];
|
|
98
|
+
/**
|
|
99
|
+
* Format a `(role, backend, authMethod)` tuple into the dotted
|
|
100
|
+
* `CredentialType` label that clients see on the wire. The schema
|
|
101
|
+
* stores the tuple; this is the canonical projection for DTOs and
|
|
102
|
+
* registry-by-label lookups. Always 3 segments.
|
|
103
|
+
*/
|
|
104
|
+
export function formatCredentialType(role, backend, authMethod) {
|
|
105
|
+
return `${role}.${backend}.${authMethod}`;
|
|
106
|
+
}
|
|
107
|
+
/**
|
|
108
|
+
* Inverse of `formatCredentialType`. Returns `null` when the input
|
|
109
|
+
* doesn't have exactly three dotted segments — the caller decides
|
|
110
|
+
* whether that's a hard error or a soft signal. Backend and auth-method
|
|
111
|
+
* identifiers may contain hyphens but never dots, so a length-3 split
|
|
112
|
+
* is unambiguous.
|
|
113
|
+
*/
|
|
114
|
+
export function parseCredentialType(type) {
|
|
115
|
+
const parts = type.split('.');
|
|
116
|
+
if (parts.length !== 3) {
|
|
117
|
+
return null;
|
|
118
|
+
}
|
|
119
|
+
return { role: parts[0], backend: parts[1], authMethod: parts[2] };
|
|
120
|
+
}
|
|
121
|
+
/**
|
|
122
|
+
* Convenience: extract the role segment of a `CredentialType`. The
|
|
123
|
+
* full tuple round-trip is `parseCredentialType`.
|
|
124
|
+
*/
|
|
125
|
+
export function credentialRole(type) {
|
|
126
|
+
return type.split('.')[0];
|
|
127
|
+
}
|
|
128
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/types/credentials/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoCG;AA2FH;;;;;;;;;;;;;GAaG;AACH,MAAM,CAAC,MAAM,gBAAgB,GAAG,CAAC,cAAc,EAAE,WAAW,EAAE,SAAS,EAAE,YAAY,EAAE,WAAW,EAAE,KAAK,EAAE,OAAO,EAAE,WAAW,CAAU,CAAC;AAG1I;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAM,CAAC,MAAM,kBAAkB,GAAG,CAAC,QAAQ,EAAE,OAAO,EAAE,WAAW,CAAU,CAAC;AAG5E;;;;;;;;;;;;;;;;;;;GAmBG;AACH,MAAM,CAAC,MAAM,2BAA2B,GAAG,CAAC,QAAQ,EAAE,cAAc,EAAE,QAAQ,EAAE,aAAa,CAAU,CAAC;AAGxG;;;;;GAKG;AACH,MAAM,UAAU,oBAAoB,CAAC,IAAY,EAAE,OAAe,EAAE,UAAkB;IACpF,OAAO,GAAG,IAAI,IAAI,OAAO,IAAI,UAAU,EAAoB,CAAC;AAC9D,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,mBAAmB,CAAC,IAAY;IAC9C,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IAC9B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACvB,OAAO,IAAI,CAAC;IACd,CAAC;IACD,OAAO,EAAE,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,EAAE,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC,EAAE,UAAU,EAAE,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC;AACrE,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,cAAc,CAAC,IAAoB;IACjD,OAAO,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAmB,CAAC;AAC9C,CAAC"}
|
|
@@ -9,6 +9,7 @@ export * from './ai/index.js';
|
|
|
9
9
|
export * from './commit/index.js';
|
|
10
10
|
export * from './branch/index.js';
|
|
11
11
|
export * from './common/index.js';
|
|
12
|
+
export * from './credentials/index.js';
|
|
12
13
|
export * from './datasource/index.js';
|
|
13
14
|
export * from './degradedMode/index.js';
|
|
14
15
|
export * from './deployment/index.js';
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/types/index.ts"],"names":[],"mappings":"AAAA,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,gBAAgB,CAAC;AAC/B,cAAc,wBAAwB,CAAC;AACvC,cAAc,kBAAkB,CAAC;AACjC,cAAc,iBAAiB,CAAC;AAChC,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,mBAAmB,CAAC;AAClC,cAAc,mBAAmB,CAAC;AAClC,cAAc,uBAAuB,CAAC;AACtC,cAAc,yBAAyB,CAAC;AACxC,cAAc,uBAAuB,CAAC;AACtC,cAAc,kBAAkB,CAAC;AACjC,cAAc,mBAAmB,CAAC;AAClC,cAAc,kBAAkB,CAAC;AACjC,cAAc,iBAAiB,CAAC;AAChC,cAAc,wBAAwB,CAAC;AACvC,cAAc,iBAAiB,CAAC;AAChC,cAAc,0BAA0B,CAAC;AACzC,cAAc,yBAAyB,CAAC;AACxC,cAAc,iBAAiB,CAAC;AAChC,cAAc,mBAAmB,CAAC;AAClC,cAAc,oBAAoB,CAAC;AACnC,cAAc,iBAAiB,CAAC;AAChC,cAAc,qBAAqB,CAAC;AACpC,cAAc,yBAAyB,CAAC;AACxC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kCAAkC,CAAC;AACjD,cAAc,iBAAiB,CAAC;AAChC,cAAc,sBAAsB,CAAC;AACrC,cAAc,oBAAoB,CAAC;AACnC,cAAc,2BAA2B,CAAC;AAC1C,cAAc,uBAAuB,CAAC;AACtC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,qBAAqB,CAAC;AACpC,cAAc,qBAAqB,CAAC;AACpC,cAAc,qBAAqB,CAAC;AACpC,cAAc,oBAAoB,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/types/index.ts"],"names":[],"mappings":"AAAA,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,gBAAgB,CAAC;AAC/B,cAAc,wBAAwB,CAAC;AACvC,cAAc,kBAAkB,CAAC;AACjC,cAAc,iBAAiB,CAAC;AAChC,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,mBAAmB,CAAC;AAClC,cAAc,mBAAmB,CAAC;AAClC,cAAc,wBAAwB,CAAC;AACvC,cAAc,uBAAuB,CAAC;AACtC,cAAc,yBAAyB,CAAC;AACxC,cAAc,uBAAuB,CAAC;AACtC,cAAc,kBAAkB,CAAC;AACjC,cAAc,mBAAmB,CAAC;AAClC,cAAc,kBAAkB,CAAC;AACjC,cAAc,iBAAiB,CAAC;AAChC,cAAc,wBAAwB,CAAC;AACvC,cAAc,iBAAiB,CAAC;AAChC,cAAc,0BAA0B,CAAC;AACzC,cAAc,yBAAyB,CAAC;AACxC,cAAc,iBAAiB,CAAC;AAChC,cAAc,mBAAmB,CAAC;AAClC,cAAc,oBAAoB,CAAC;AACnC,cAAc,iBAAiB,CAAC;AAChC,cAAc,qBAAqB,CAAC;AACpC,cAAc,yBAAyB,CAAC;AACxC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kCAAkC,CAAC;AACjD,cAAc,iBAAiB,CAAC;AAChC,cAAc,sBAAsB,CAAC;AACrC,cAAc,oBAAoB,CAAC;AACnC,cAAc,2BAA2B,CAAC;AAC1C,cAAc,uBAAuB,CAAC;AACtC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,qBAAqB,CAAC;AACpC,cAAc,qBAAqB,CAAC;AACpC,cAAc,qBAAqB,CAAC;AACpC,cAAc,oBAAoB,CAAC"}
|
package/dist-esm/types/index.js
CHANGED
|
@@ -9,6 +9,7 @@ export * from './ai/index.js';
|
|
|
9
9
|
export * from './commit/index.js';
|
|
10
10
|
export * from './branch/index.js';
|
|
11
11
|
export * from './common/index.js';
|
|
12
|
+
export * from './credentials/index.js';
|
|
12
13
|
export * from './datasource/index.js';
|
|
13
14
|
export * from './degradedMode/index.js';
|
|
14
15
|
export * from './deployment/index.js';
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/types/index.ts"],"names":[],"mappings":"AAAA,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,gBAAgB,CAAC;AAC/B,cAAc,wBAAwB,CAAC;AACvC,cAAc,kBAAkB,CAAC;AACjC,cAAc,iBAAiB,CAAC;AAChC,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,mBAAmB,CAAC;AAClC,cAAc,mBAAmB,CAAC;AAClC,cAAc,uBAAuB,CAAC;AACtC,cAAc,yBAAyB,CAAC;AACxC,cAAc,uBAAuB,CAAC;AACtC,cAAc,kBAAkB,CAAC;AACjC,cAAc,mBAAmB,CAAC;AAClC,cAAc,kBAAkB,CAAC;AACjC,cAAc,iBAAiB,CAAC;AAChC,cAAc,wBAAwB,CAAC;AACvC,cAAc,iBAAiB,CAAC;AAChC,cAAc,0BAA0B,CAAC;AACzC,cAAc,yBAAyB,CAAC;AACxC,cAAc,iBAAiB,CAAC;AAChC,cAAc,mBAAmB,CAAC;AAClC,cAAc,oBAAoB,CAAC;AACnC,cAAc,iBAAiB,CAAC;AAChC,cAAc,qBAAqB,CAAC;AACpC,cAAc,yBAAyB,CAAC;AACxC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kCAAkC,CAAC;AACjD,cAAc,iBAAiB,CAAC;AAChC,cAAc,sBAAsB,CAAC;AACrC,cAAc,oBAAoB,CAAC;AACnC,cAAc,2BAA2B,CAAC;AAC1C,cAAc,uBAAuB,CAAC;AACtC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,qBAAqB,CAAC;AACpC,cAAc,qBAAqB,CAAC;AACpC,cAAc,qBAAqB,CAAC;AACpC,cAAc,oBAAoB,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/types/index.ts"],"names":[],"mappings":"AAAA,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,gBAAgB,CAAC;AAC/B,cAAc,wBAAwB,CAAC;AACvC,cAAc,kBAAkB,CAAC;AACjC,cAAc,iBAAiB,CAAC;AAChC,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,mBAAmB,CAAC;AAClC,cAAc,mBAAmB,CAAC;AAClC,cAAc,wBAAwB,CAAC;AACvC,cAAc,uBAAuB,CAAC;AACtC,cAAc,yBAAyB,CAAC;AACxC,cAAc,uBAAuB,CAAC;AACtC,cAAc,kBAAkB,CAAC;AACjC,cAAc,mBAAmB,CAAC;AAClC,cAAc,kBAAkB,CAAC;AACjC,cAAc,iBAAiB,CAAC;AAChC,cAAc,wBAAwB,CAAC;AACvC,cAAc,iBAAiB,CAAC;AAChC,cAAc,0BAA0B,CAAC;AACzC,cAAc,yBAAyB,CAAC;AACxC,cAAc,iBAAiB,CAAC;AAChC,cAAc,mBAAmB,CAAC;AAClC,cAAc,oBAAoB,CAAC;AACnC,cAAc,iBAAiB,CAAC;AAChC,cAAc,qBAAqB,CAAC;AACpC,cAAc,yBAAyB,CAAC;AACxC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kCAAkC,CAAC;AACjD,cAAc,iBAAiB,CAAC;AAChC,cAAc,sBAAsB,CAAC;AACrC,cAAc,oBAAoB,CAAC;AACnC,cAAc,2BAA2B,CAAC;AAC1C,cAAc,uBAAuB,CAAC;AACtC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,qBAAqB,CAAC;AACpC,cAAc,qBAAqB,CAAC;AACpC,cAAc,qBAAqB,CAAC;AACpC,cAAc,oBAAoB,CAAC"}
|
|
@@ -15,6 +15,21 @@ export declare const SUPERBLOCKS_SUPPORT = "Superblocks Support";
|
|
|
15
15
|
export declare const SUPERBLOCKS_SUPPORT_EMAIL = "support@superblocks.com";
|
|
16
16
|
export declare const VISITOR_ORG_NAME = "visitor";
|
|
17
17
|
export declare const VISITOR_ORG_ID = "aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa";
|
|
18
|
+
/**
|
|
19
|
+
* Snapshot of the org's app-inference configuration, embedded on `/me` so the UI
|
|
20
|
+
* bootstrap gets it without a second round trip to
|
|
21
|
+
* `/api/v1/organizations/:id/app-inference-configuration`.
|
|
22
|
+
*
|
|
23
|
+
* Tri-state semantics on `Organization.appInferenceConfiguration`:
|
|
24
|
+
* - `undefined` → feature unavailable (gate flag off for the org)
|
|
25
|
+
* - `null` → feature available, admin has not configured anything
|
|
26
|
+
* - populated → feature available, admin has configured a preferred integration
|
|
27
|
+
*/
|
|
28
|
+
export interface OrganizationAppInferenceConfiguration {
|
|
29
|
+
preferredIntegrationId: string;
|
|
30
|
+
updatedBy: string | null;
|
|
31
|
+
updated: string;
|
|
32
|
+
}
|
|
18
33
|
export interface Organization {
|
|
19
34
|
id: string;
|
|
20
35
|
name: string;
|
|
@@ -29,6 +44,7 @@ export interface Organization {
|
|
|
29
44
|
profiles?: Profile[];
|
|
30
45
|
created: Date;
|
|
31
46
|
version?: OrgVersionType;
|
|
47
|
+
appInferenceConfiguration?: OrganizationAppInferenceConfiguration | null;
|
|
32
48
|
}
|
|
33
49
|
export type OrgBriefDto = {
|
|
34
50
|
id: string;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/types/organization/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AACxD,OAAO,EAAE,yBAAyB,EAAE,MAAM,yBAAyB,CAAC;AACpE,OAAO,EAAE,OAAO,EAAE,MAAM,qBAAqB,CAAC;AAC9C,OAAO,EAAE,UAAU,EAAE,MAAM,mBAAmB,CAAC;AAC/C,OAAO,EAAE,uBAAuB,EAAE,MAAM,oBAAoB,CAAC;AAC7D,OAAO,EAAE,OAAO,EAAE,MAAM,qBAAqB,CAAC;AAC9C,OAAO,EAAE,KAAK,EAAE,SAAS,EAAE,MAAM,YAAY,CAAC;AAE9C,eAAO,MAAM,gCAAgC,2BAA2B,CAAC;AAEzE,eAAO,MAAM,yBAAyB,8BAA8B,CAAC;AAErE,eAAO,MAAM,0BAA0B,+BAA+B,CAAC;AAEvE,eAAO,MAAM,4BAA4B,oCAAoC,CAAC;AAE9E,eAAO,MAAM,6BAA6B,qCAAqC,CAAC;AAEhF,eAAO,MAAM,gCAAgC,wBAAwB,CAAC;AACtE,eAAO,MAAM,mBAAmB,wBAAwB,CAAC;AACzD,eAAO,MAAM,yBAAyB,4BAA4B,CAAC;AAEnE,eAAO,MAAM,gBAAgB,YAAY,CAAC;AAC1C,eAAO,MAAM,cAAc,yCAAyC,CAAC;AAErE,MAAM,WAAW,YAAY;IAC3B,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,EAAE,CAAC;IACnB,MAAM,CAAC,EAAE,KAAK,EAAE,CAAC;IACjB,MAAM,EAAE,MAAM,CAAC;IACf,SAAS,EAAE,SAAS,CAAC;IACrB,uBAAuB,EAAE,MAAM,CAAC;IAChC,uBAAuB,CAAC,EAAE,uBAAuB,CAAC;IAClD,MAAM,EAAE,UAAU,EAAE,CAAC;IACrB,OAAO,EAAE,OAAO,CAAC;IACjB,QAAQ,CAAC,EAAE,OAAO,EAAE,CAAC;IACrB,OAAO,EAAE,IAAI,CAAC;IACd,OAAO,CAAC,EAAE,cAAc,CAAC;
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/types/organization/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AACxD,OAAO,EAAE,yBAAyB,EAAE,MAAM,yBAAyB,CAAC;AACpE,OAAO,EAAE,OAAO,EAAE,MAAM,qBAAqB,CAAC;AAC9C,OAAO,EAAE,UAAU,EAAE,MAAM,mBAAmB,CAAC;AAC/C,OAAO,EAAE,uBAAuB,EAAE,MAAM,oBAAoB,CAAC;AAC7D,OAAO,EAAE,OAAO,EAAE,MAAM,qBAAqB,CAAC;AAC9C,OAAO,EAAE,KAAK,EAAE,SAAS,EAAE,MAAM,YAAY,CAAC;AAE9C,eAAO,MAAM,gCAAgC,2BAA2B,CAAC;AAEzE,eAAO,MAAM,yBAAyB,8BAA8B,CAAC;AAErE,eAAO,MAAM,0BAA0B,+BAA+B,CAAC;AAEvE,eAAO,MAAM,4BAA4B,oCAAoC,CAAC;AAE9E,eAAO,MAAM,6BAA6B,qCAAqC,CAAC;AAEhF,eAAO,MAAM,gCAAgC,wBAAwB,CAAC;AACtE,eAAO,MAAM,mBAAmB,wBAAwB,CAAC;AACzD,eAAO,MAAM,yBAAyB,4BAA4B,CAAC;AAEnE,eAAO,MAAM,gBAAgB,YAAY,CAAC;AAC1C,eAAO,MAAM,cAAc,yCAAyC,CAAC;AAErE;;;;;;;;;GASG;AACH,MAAM,WAAW,qCAAqC;IACpD,sBAAsB,EAAE,MAAM,CAAC;IAC/B,SAAS,EAAE,MAAM,GAAG,IAAI,CAAC;IACzB,OAAO,EAAE,MAAM,CAAC;CACjB;AAED,MAAM,WAAW,YAAY;IAC3B,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,EAAE,CAAC;IACnB,MAAM,CAAC,EAAE,KAAK,EAAE,CAAC;IACjB,MAAM,EAAE,MAAM,CAAC;IACf,SAAS,EAAE,SAAS,CAAC;IACrB,uBAAuB,EAAE,MAAM,CAAC;IAChC,uBAAuB,CAAC,EAAE,uBAAuB,CAAC;IAClD,MAAM,EAAE,UAAU,EAAE,CAAC;IACrB,OAAO,EAAE,OAAO,CAAC;IACjB,QAAQ,CAAC,EAAE,OAAO,EAAE,CAAC;IACrB,OAAO,EAAE,IAAI,CAAC;IACd,OAAO,CAAC,EAAE,cAAc,CAAC;IACzB,yBAAyB,CAAC,EAAE,qCAAqC,GAAG,IAAI,CAAC;CAC1E;AAED,MAAM,MAAM,WAAW,GAAG;IACxB,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;CACd,CAAC;AAEF,MAAM,WAAW,gBAAgB;IAC/B,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;IACb,KAAK,EAAE,MAAM,CAAC;IACd,IAAI,EAAE,MAAM,CAAC;IACb,OAAO,EAAE,MAAM,CAAC;IAChB,GAAG,EAAE,OAAO,CAAC;IACb,eAAe,EAAE,MAAM,EAAE,CAAC;IAE1B,MAAM,EAAE,KAAK,EAAE,GAAG,SAAS,CAAC;IAC5B,uBAAuB,EAAE,uBAAuB,CAAC;IACjD,uBAAuB,EAAE,MAAM,CAAC;IAChC,OAAO,CAAC,EAAE,cAAc,CAAC;CAC1B;AAED,MAAM,WAAW,8BAA8B;IAC7C,YAAY,EAAE,gBAAgB,CAAC;IAC/B,YAAY,EAAE,yBAAyB,EAAE,CAAC;CAC3C;AAED,cAAc,cAAc,CAAC;AAC7B,cAAc,YAAY,CAAC;AAC3B,cAAc,aAAa,CAAC;AAC5B,cAAc,YAAY,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/types/organization/index.ts"],"names":[],"mappings":"AAQA,MAAM,CAAC,MAAM,gCAAgC,GAAG,wBAAwB,CAAC;AACzE,6BAA6B;AAC7B,MAAM,CAAC,MAAM,yBAAyB,GAAG,2BAA2B,CAAC;AACrE,6BAA6B;AAC7B,MAAM,CAAC,MAAM,0BAA0B,GAAG,4BAA4B,CAAC;AACvE,6BAA6B;AAC7B,MAAM,CAAC,MAAM,4BAA4B,GAAG,iCAAiC,CAAC;AAC9E,6BAA6B;AAC7B,MAAM,CAAC,MAAM,6BAA6B,GAAG,kCAAkC,CAAC;AAChF,qBAAqB;AACrB,MAAM,CAAC,MAAM,gCAAgC,GAAG,qBAAqB,CAAC;AACtE,MAAM,CAAC,MAAM,mBAAmB,GAAG,qBAAqB,CAAC;AACzD,MAAM,CAAC,MAAM,yBAAyB,GAAG,yBAAyB,CAAC;AAEnE,MAAM,CAAC,MAAM,gBAAgB,GAAG,SAAS,CAAC;AAC1C,MAAM,CAAC,MAAM,cAAc,GAAG,sCAAsC,CAAC;
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/types/organization/index.ts"],"names":[],"mappings":"AAQA,MAAM,CAAC,MAAM,gCAAgC,GAAG,wBAAwB,CAAC;AACzE,6BAA6B;AAC7B,MAAM,CAAC,MAAM,yBAAyB,GAAG,2BAA2B,CAAC;AACrE,6BAA6B;AAC7B,MAAM,CAAC,MAAM,0BAA0B,GAAG,4BAA4B,CAAC;AACvE,6BAA6B;AAC7B,MAAM,CAAC,MAAM,4BAA4B,GAAG,iCAAiC,CAAC;AAC9E,6BAA6B;AAC7B,MAAM,CAAC,MAAM,6BAA6B,GAAG,kCAAkC,CAAC;AAChF,qBAAqB;AACrB,MAAM,CAAC,MAAM,gCAAgC,GAAG,qBAAqB,CAAC;AACtE,MAAM,CAAC,MAAM,mBAAmB,GAAG,qBAAqB,CAAC;AACzD,MAAM,CAAC,MAAM,yBAAyB,GAAG,yBAAyB,CAAC;AAEnE,MAAM,CAAC,MAAM,gBAAgB,GAAG,SAAS,CAAC;AAC1C,MAAM,CAAC,MAAM,cAAc,GAAG,sCAAsC,CAAC;AA4DrE,cAAc,cAAc,CAAC;AAC7B,cAAc,YAAY,CAAC;AAC3B,cAAc,aAAa,CAAC;AAC5B,cAAc,YAAY,CAAC"}
|
|
@@ -112,6 +112,7 @@ export declare enum ResourceTypeEnum {
|
|
|
112
112
|
GROUPS = "groups",
|
|
113
113
|
GROUPS_MEMBERS = "groups.members",
|
|
114
114
|
INTEGRATIONS = "integrations",
|
|
115
|
+
INTEGRATIONS_DEFAULT_AI = "integrations.default_ai",
|
|
115
116
|
LOGS = "logs",
|
|
116
117
|
LOGS_STREAMS = "logs.streams",
|
|
117
118
|
ORGANIZATION = "org",
|
|
@@ -151,6 +152,9 @@ export declare const ActionTypeByResourceType: {
|
|
|
151
152
|
readonly READ: ActionTypeEnum.READ;
|
|
152
153
|
readonly MANAGE: ActionTypeEnum.MANAGE;
|
|
153
154
|
};
|
|
155
|
+
readonly INTEGRATIONS_DEFAULT_AI: {
|
|
156
|
+
readonly MANAGE: ActionTypeEnum.MANAGE;
|
|
157
|
+
};
|
|
154
158
|
readonly BILLING: {
|
|
155
159
|
readonly MANAGE: ActionTypeEnum.MANAGE;
|
|
156
160
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/types/rbac/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAChD,OAAO,EAAE,UAAU,EAAE,MAAM,mBAAmB,CAAC;AAC/C,OAAO,EAAE,qBAAqB,EAAE,MAAM,kBAAkB,CAAC;AAEzD,oBAAY,sBAAsB;IAChC,MAAM,WAAW;CAClB;AAED,oBAAY,UAAU;IACpB,IAAI,SAAS;IACb,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,KAAK,UAAU;IACf,KAAK,UAAU;IACf,OAAO,YAAY;IACnB,KAAK,UAAU;CAChB;AAED,oBAAY,eAAe;IACzB,IAAI,SAAS;IACb,MAAM,WAAW;IACjB,MAAM,WAAW;CAClB;AAED,oBAAY,QAAQ;IAClB,MAAM,WAAW;IACjB,OAAO,YAAY;IACnB,YAAY,iBAAiB;IAC7B,KAAK,UAAU;IACf,IAAI,SAAS;IACb,QAAQ,aAAa;CACtB;AAGD,oBAAY,oBAAoB;IAC9B,WAAW,gBAAgB;IAC3B,cAAc,mBAAmB;IACjC,MAAM,WAAW;IACjB,GAAG,QAAQ;IACX,YAAY,iBAAiB;IAC7B;;OAEG;IACH,UAAU,eAAe;IACzB,WAAW,gBAAgB;IAC3B,YAAY,iBAAiB;CAC9B;AAGD,oBAAY,oBAAoB;IAC9B,WAAW,gBAAgB;IAC3B,cAAc,mBAAmB;IACjC,QAAQ,aAAa;IACrB,aAAa,kBAAkB;IAC/B;;OAEG;IACH,UAAU,eAAe;IACzB,WAAW,gBAAgB;CAC5B;AAED,KAAK,iBAAiB,GAAG;IACvB,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,QAAQ,CAAC;IACf,IAAI,EAAE,MAAM,CAAC;IACb,OAAO,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF,MAAM,MAAM,iBAAiB,GAAG,iBAAiB,GAAG;IAClD,IAAI,EAAE,MAAM,CAAC;IACb,KAAK,EAAE,MAAM,CAAC;IACd,MAAM,EAAE,qBAAqB,CAAC;CAC/B,CAAC;AAEF,MAAM,MAAM,kBAAkB,GAAG,iBAAiB,GAAG;IACnD,IAAI,EAAE,OAAO,CAAC;IACd,IAAI,CAAC,EAAE,MAAM,CAAC;CACf,CAAC;AAEF,MAAM,MAAM,aAAa,GAAG,iBAAiB,GAAG,kBAAkB,CAAC;AAEnE,eAAO,MAAM,gBAAgB,GAAI,YAAY,aAAa,KAAG,UAAU,IAAI,iBAA+C,CAAC;AAC3H,eAAO,MAAM,iBAAiB,GAAI,YAAY,aAAa,KAAG,UAAU,IAAI,kBAAiD,CAAC;AAG9H,MAAM,MAAM,qBAAqB,GAAG;IAElC,QAAQ,EAAE,MAAM,CAAC;IACjB,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC;IACvB,IAAI,EAAE,QAAQ,CAAC;CAChB,CAAC;AAEF,KAAK,oBAAoB,GAAG;IAC1B,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,oBAAoB,CAAC;IAC3B,IAAI,EAAE,MAAM,CAAC;CACd,CAAC;AAEF,MAAM,MAAM,iBAAiB,GAAG,oBAAoB,CAAC;AAErD,MAAM,MAAM,cAAc,GAAG,oBAAoB,CAAC;AAClD,KAAK,SAAS,GAAG,oBAAoB,CAAC;AACtC;;GAEG;AACH,KAAK,gBAAgB,GAAG,oBAAoB,CAAC;AAC7C,MAAM,MAAM,iBAAiB,GAAG,oBAAoB,CAAC;AAErD,MAAM,MAAM,gBAAgB,GAAG,iBAAiB,GAAG,cAAc,GAAG,SAAS,GAAG,gBAAgB,GAAG,iBAAiB,CAAC;AAGrH,MAAM,MAAM,oBAAoB,GAAG;IACjC,MAAM,EAAE,gBAAgB,CAAC;IACzB,WAAW,EAAE,aAAa,EAAE,CAAC;CAC9B,CAAC;AAIF,oBAAY,kBAAkB;IAC5B,IAAI,SAAS;IACb,UAAU,eAAe;CAC1B;AAED,oBAAY,iBAAiB;IAC3B,KAAK,UAAU;IACf,IAAI,SAAS;CAGd;AAED,oBAAY,gBAAgB;IAC1B,aAAa,kBAAkB;IAC/B,MAAM,WAAW;IACjB,YAAY,SAAS;IACrB,iBAAiB,cAAc;IAC/B,kBAAkB,eAAe;IACjC,OAAO,YAAY;IACnB,OAAO,YAAY;IACnB,MAAM,WAAW;IACjB,cAAc,mBAAmB;IACjC,YAAY,iBAAiB;IAC7B,IAAI,SAAS;IACb,YAAY,iBAAiB;IAC7B,YAAY,QAAQ;IAEpB,kBAAkB,cAAc;IAChC,aAAa,kBAAkB;IAC/B,QAAQ,aAAa;IACrB,YAAY,UAAU;IACtB,KAAK,UAAU;IACf,cAAc,SAAS;IACvB,cAAc,mBAAmB;IACjC,SAAS,cAAc;CACxB;AAID,oBAAY,YAAY;IACtB,YAAY,SAAS;IAErB,YAAY,iBAAiB;IAC7B,YAAY,QAAQ,CAAE,+HAA+H;IAErJ,cAAc,SAAS;IAEvB,SAAS,cAAc;CACxB;AAED,oBAAY,cAAc;IACxB,KAAK,UAAU;IACf,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,eAAe,oBAAoB;IACnC,iBAAiB,sBAAsB;IACvC,OAAO,YAAY;IACnB,IAAI,SAAS;IACb,GAAG,QAAQ;IACX,KAAK,UAAU;IACf,MAAM,WAAW;IACjB,IAAI,SAAS;CACd;AAED,eAAO,MAAM,wBAAwB
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/types/rbac/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAChD,OAAO,EAAE,UAAU,EAAE,MAAM,mBAAmB,CAAC;AAC/C,OAAO,EAAE,qBAAqB,EAAE,MAAM,kBAAkB,CAAC;AAEzD,oBAAY,sBAAsB;IAChC,MAAM,WAAW;CAClB;AAED,oBAAY,UAAU;IACpB,IAAI,SAAS;IACb,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,KAAK,UAAU;IACf,KAAK,UAAU;IACf,OAAO,YAAY;IACnB,KAAK,UAAU;CAChB;AAED,oBAAY,eAAe;IACzB,IAAI,SAAS;IACb,MAAM,WAAW;IACjB,MAAM,WAAW;CAClB;AAED,oBAAY,QAAQ;IAClB,MAAM,WAAW;IACjB,OAAO,YAAY;IACnB,YAAY,iBAAiB;IAC7B,KAAK,UAAU;IACf,IAAI,SAAS;IACb,QAAQ,aAAa;CACtB;AAGD,oBAAY,oBAAoB;IAC9B,WAAW,gBAAgB;IAC3B,cAAc,mBAAmB;IACjC,MAAM,WAAW;IACjB,GAAG,QAAQ;IACX,YAAY,iBAAiB;IAC7B;;OAEG;IACH,UAAU,eAAe;IACzB,WAAW,gBAAgB;IAC3B,YAAY,iBAAiB;CAC9B;AAGD,oBAAY,oBAAoB;IAC9B,WAAW,gBAAgB;IAC3B,cAAc,mBAAmB;IACjC,QAAQ,aAAa;IACrB,aAAa,kBAAkB;IAC/B;;OAEG;IACH,UAAU,eAAe;IACzB,WAAW,gBAAgB;CAC5B;AAED,KAAK,iBAAiB,GAAG;IACvB,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,QAAQ,CAAC;IACf,IAAI,EAAE,MAAM,CAAC;IACb,OAAO,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF,MAAM,MAAM,iBAAiB,GAAG,iBAAiB,GAAG;IAClD,IAAI,EAAE,MAAM,CAAC;IACb,KAAK,EAAE,MAAM,CAAC;IACd,MAAM,EAAE,qBAAqB,CAAC;CAC/B,CAAC;AAEF,MAAM,MAAM,kBAAkB,GAAG,iBAAiB,GAAG;IACnD,IAAI,EAAE,OAAO,CAAC;IACd,IAAI,CAAC,EAAE,MAAM,CAAC;CACf,CAAC;AAEF,MAAM,MAAM,aAAa,GAAG,iBAAiB,GAAG,kBAAkB,CAAC;AAEnE,eAAO,MAAM,gBAAgB,GAAI,YAAY,aAAa,KAAG,UAAU,IAAI,iBAA+C,CAAC;AAC3H,eAAO,MAAM,iBAAiB,GAAI,YAAY,aAAa,KAAG,UAAU,IAAI,kBAAiD,CAAC;AAG9H,MAAM,MAAM,qBAAqB,GAAG;IAElC,QAAQ,EAAE,MAAM,CAAC;IACjB,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC;IACvB,IAAI,EAAE,QAAQ,CAAC;CAChB,CAAC;AAEF,KAAK,oBAAoB,GAAG;IAC1B,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,oBAAoB,CAAC;IAC3B,IAAI,EAAE,MAAM,CAAC;CACd,CAAC;AAEF,MAAM,MAAM,iBAAiB,GAAG,oBAAoB,CAAC;AAErD,MAAM,MAAM,cAAc,GAAG,oBAAoB,CAAC;AAClD,KAAK,SAAS,GAAG,oBAAoB,CAAC;AACtC;;GAEG;AACH,KAAK,gBAAgB,GAAG,oBAAoB,CAAC;AAC7C,MAAM,MAAM,iBAAiB,GAAG,oBAAoB,CAAC;AAErD,MAAM,MAAM,gBAAgB,GAAG,iBAAiB,GAAG,cAAc,GAAG,SAAS,GAAG,gBAAgB,GAAG,iBAAiB,CAAC;AAGrH,MAAM,MAAM,oBAAoB,GAAG;IACjC,MAAM,EAAE,gBAAgB,CAAC;IACzB,WAAW,EAAE,aAAa,EAAE,CAAC;CAC9B,CAAC;AAIF,oBAAY,kBAAkB;IAC5B,IAAI,SAAS;IACb,UAAU,eAAe;CAC1B;AAED,oBAAY,iBAAiB;IAC3B,KAAK,UAAU;IACf,IAAI,SAAS;CAGd;AAED,oBAAY,gBAAgB;IAC1B,aAAa,kBAAkB;IAC/B,MAAM,WAAW;IACjB,YAAY,SAAS;IACrB,iBAAiB,cAAc;IAC/B,kBAAkB,eAAe;IACjC,OAAO,YAAY;IACnB,OAAO,YAAY;IACnB,MAAM,WAAW;IACjB,cAAc,mBAAmB;IACjC,YAAY,iBAAiB;IAC7B,uBAAuB,4BAA4B;IACnD,IAAI,SAAS;IACb,YAAY,iBAAiB;IAC7B,YAAY,QAAQ;IAEpB,kBAAkB,cAAc;IAChC,aAAa,kBAAkB;IAC/B,QAAQ,aAAa;IACrB,YAAY,UAAU;IACtB,KAAK,UAAU;IACf,cAAc,SAAS;IACvB,cAAc,mBAAmB;IACjC,SAAS,cAAc;CACxB;AAID,oBAAY,YAAY;IACtB,YAAY,SAAS;IAErB,YAAY,iBAAiB;IAC7B,YAAY,QAAQ,CAAE,+HAA+H;IAErJ,cAAc,SAAS;IAEvB,SAAS,cAAc;CACxB;AAED,oBAAY,cAAc;IACxB,KAAK,UAAU;IACf,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,MAAM,WAAW;IACjB,eAAe,oBAAoB;IACnC,iBAAiB,sBAAsB;IACvC,OAAO,YAAY;IACnB,IAAI,SAAS;IACb,GAAG,QAAQ;IACX,KAAK,UAAU;IACf,MAAM,WAAW;IACjB,IAAI,SAAS;CACd;AAED,eAAO,MAAM,wBAAwB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAqG3B,CAAC;AAEX,KAAK,aAAa,GAAG;IACnB,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;CACd,CAAC;AAEF,MAAM,MAAM,aAAa,GAAG;IAC1B,EAAE,EAAE,MAAM,CAAC;IACX,OAAO,EAAE,IAAI,CAAC;IACd,YAAY,EAAE,MAAM,CAAC;IACrB,cAAc,EAAE,kBAAkB,CAAC;IACnC,WAAW,EAAE,MAAM,CAAC;IACpB,aAAa,EAAE,iBAAiB,CAAC;IACjC,UAAU,EAAE,MAAM,CAAC;IACnB,YAAY,EAAE,gBAAgB,CAAC;IAG/B,IAAI,CAAC,EAAE,OAAO,CAAC;IACf,UAAU,CAAC,EAAE,aAAa,CAAC;IAG3B,KAAK,CAAC,EAAE,UAAU,CAAC;IACnB,IAAI,CAAC,EAAE;QACL,EAAE,EAAE,MAAM,CAAC;QACX,IAAI,EAAE,MAAM,CAAC;QACb,KAAK,EAAE,MAAM,CAAC;QACd,MAAM,EAAE,qBAAqB,CAAC;KAC/B,CAAC;IACF,GAAG,CAAC,EAAE,aAAa,GAAG;QAAE,WAAW,EAAE,cAAc,CAAA;KAAE,CAAC;IACtD,WAAW,CAAC,EAAE,aAAa,GAAG;QAAE,aAAa,EAAE,OAAO,CAAA;KAAE,CAAC;IACzD,WAAW,CAAC,EAAE,aAAa,CAAC;CAC7B,CAAC;AAEF,MAAM,MAAM,OAAO,GAAG;IACpB,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;IACb,WAAW,EAAE,MAAM,CAAC;IACpB,IAAI,EAAE,YAAY,CAAC;IACnB,cAAc,EAAE,MAAM,GAAG,IAAI,CAAC;IAC9B,WAAW,CAAC,EAAE,aAAa,EAAE,CAAC;CAC/B,CAAC;AAEF,MAAM,MAAM,aAAa,GAAG;IAC1B,EAAE,EAAE,MAAM,CAAC;IACX,UAAU,EAAE,cAAc,CAAC;IAC3B,YAAY,EAAE,gBAAgB,CAAC;IAC/B,WAAW,EAAE,MAAM,CAAC;CACrB,CAAC;AAEF,MAAM,MAAM,mBAAmB,GAAG;IAChC,UAAU,EAAE,cAAc,CAAC;IAC3B,YAAY,EAAE,gBAAgB,CAAC;CAChC,CAAC;AAEF,MAAM,MAAM,mBAAmB,GAAG;IAChC,WAAW,EAAE,cAAc,EAAE,CAAC;CAC/B,CAAC;AAEF,qBAAa,eAAe;IAC1B,CAAC,YAAY,CAAC,YAAY,CAAC,CAAC,EAAE;QAC5B,QAAQ,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;KAC1B,CAAC;IAEF,CAAC,YAAY,CAAC,YAAY,CAAC,CAAC,EAAE;QAC5B,IAAI,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;QACrB,OAAO,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;KACzB,CAAC;IAOF,CAAC,YAAY,CAAC,YAAY,CAAC,CAAC,EAAE;QAC5B,IAAI,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;QACrB,OAAO,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;KACzB,CAAC;IAEF,CAAC,YAAY,CAAC,cAAc,CAAC,CAAC,EAAE;QAC9B,IAAI,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;QACrB,OAAO,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;KACzB,CAAC;IAEF,CAAC,YAAY,CAAC,SAAS,CAAC,CAAC,EAAE;QACzB,IAAI,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;QACrB,OAAO,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;KACzB,CAAC;gBAGA,YAAY,EAAE;QACZ,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC;QACtB,QAAQ,EAAE,YAAY,CAAC;QACvB,WAAW,EAAE,mBAAmB,CAAC;KAClC,EAAE;CAWN;AAED,oBAAY,mBAAmB;IAC7B,QAAQ,aAAa;IACrB,IAAI,SAAS;IACb,OAAO,YAAY;CACpB;AAED,MAAM,MAAM,UAAU,GAAG;IACvB,EAAE,EAAE,MAAM,CAAC;IACX,KAAK,EAAE,MAAM,CAAC;IACd,IAAI,EAAE,MAAM,CAAC;CACd,CAAC"}
|
|
@@ -84,6 +84,7 @@ export var ResourceTypeEnum;
|
|
|
84
84
|
ResourceTypeEnum["GROUPS"] = "groups";
|
|
85
85
|
ResourceTypeEnum["GROUPS_MEMBERS"] = "groups.members";
|
|
86
86
|
ResourceTypeEnum["INTEGRATIONS"] = "integrations";
|
|
87
|
+
ResourceTypeEnum["INTEGRATIONS_DEFAULT_AI"] = "integrations.default_ai";
|
|
87
88
|
ResourceTypeEnum["LOGS"] = "logs";
|
|
88
89
|
ResourceTypeEnum["LOGS_STREAMS"] = "logs.streams";
|
|
89
90
|
ResourceTypeEnum["ORGANIZATION"] = "org";
|
|
@@ -131,6 +132,9 @@ export const ActionTypeByResourceType = {
|
|
|
131
132
|
READ: ActionTypeEnum.READ,
|
|
132
133
|
MANAGE: ActionTypeEnum.MANAGE
|
|
133
134
|
},
|
|
135
|
+
INTEGRATIONS_DEFAULT_AI: {
|
|
136
|
+
MANAGE: ActionTypeEnum.MANAGE
|
|
137
|
+
},
|
|
134
138
|
BILLING: {
|
|
135
139
|
MANAGE: ActionTypeEnum.MANAGE
|
|
136
140
|
},
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/types/rbac/index.ts"],"names":[],"mappings":"AAIA,MAAM,CAAN,IAAY,sBAEX;AAFD,WAAY,sBAAsB;IAChC,2CAAiB,CAAA;AACnB,CAAC,EAFW,sBAAsB,KAAtB,sBAAsB,QAEjC;AAED,MAAM,CAAN,IAAY,UAUX;AAVD,WAAY,UAAU;IACpB,2BAAa,CAAA;IACb,+BAAiB,CAAA;IACjB,+BAAiB,CAAA;IACjB,+BAAiB,CAAA;IACjB,+BAAiB,CAAA;IACjB,6BAAe,CAAA;IACf,6BAAe,CAAA;IACf,iCAAmB,CAAA;IACnB,6BAAe,CAAA;AACjB,CAAC,EAVW,UAAU,KAAV,UAAU,QAUrB;AAED,MAAM,CAAN,IAAY,eAIX;AAJD,WAAY,eAAe;IACzB,gCAAa,CAAA;IACb,oCAAiB,CAAA;IACjB,oCAAiB,CAAA;AACnB,CAAC,EAJW,eAAe,KAAf,eAAe,QAI1B;AAED,MAAM,CAAN,IAAY,QAOX;AAPD,WAAY,QAAQ;IAClB,6BAAiB,CAAA;IACjB,+BAAmB,CAAA;IACnB,yCAA6B,CAAA;IAC7B,2BAAe,CAAA;IACf,yBAAa,CAAA;IACb,iCAAqB,CAAA,CAAC,cAAc;AACtC,CAAC,EAPW,QAAQ,KAAR,QAAQ,QAOnB;AAED,+CAA+C;AAC/C,MAAM,CAAN,IAAY,oBAYX;AAZD,WAAY,oBAAoB;IAC9B,mDAA2B,CAAA;IAC3B,yDAAiC,CAAA;IACjC,yCAAiB,CAAA;IACjB,mCAAW,CAAA;IACX,qDAA6B,CAAA;IAC7B;;OAEG;IACH,iDAAyB,CAAA;IACzB,mDAA2B,CAAA;IAC3B,qDAA6B,CAAA;AAC/B,CAAC,EAZW,oBAAoB,KAApB,oBAAoB,QAY/B;AAED,+BAA+B;AAC/B,MAAM,CAAN,IAAY,oBAUX;AAVD,WAAY,oBAAoB;IAC9B,mDAA2B,CAAA;IAC3B,yDAAiC,CAAA;IACjC,6CAAqB,CAAA;IACrB,uDAA+B,CAAA;IAC/B;;OAEG;IACH,iDAAyB,CAAA;IACzB,mDAA2B,CAAA;AAC7B,CAAC,EAVW,oBAAoB,KAApB,oBAAoB,QAU/B;AAsBD,MAAM,CAAC,MAAM,gBAAgB,GAAG,CAAC,UAAyB,EAAmC,EAAE,CAAC,UAAU,CAAC,IAAI,KAAK,MAAM,CAAC;AAC3H,MAAM,CAAC,MAAM,iBAAiB,GAAG,CAAC,UAAyB,EAAoC,EAAE,CAAC,UAAU,CAAC,IAAI,KAAK,OAAO,CAAC;AAkC9H,2BAA2B;AAE3B,MAAM,CAAN,IAAY,kBAGX;AAHD,WAAY,kBAAkB;IAC5B,mCAAa,CAAA;IACb,+CAAyB,CAAA;AAC3B,CAAC,EAHW,kBAAkB,KAAlB,kBAAkB,QAG7B;AAED,MAAM,CAAN,IAAY,iBAKX;AALD,WAAY,iBAAiB;IAC3B,oCAAe,CAAA;IACf,kCAAa,CAAA;IACb,iCAAiC;IACjC,sBAAsB;AACxB,CAAC,EALW,iBAAiB,KAAjB,iBAAiB,QAK5B;AAED,MAAM,CAAN,IAAY,
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/types/rbac/index.ts"],"names":[],"mappings":"AAIA,MAAM,CAAN,IAAY,sBAEX;AAFD,WAAY,sBAAsB;IAChC,2CAAiB,CAAA;AACnB,CAAC,EAFW,sBAAsB,KAAtB,sBAAsB,QAEjC;AAED,MAAM,CAAN,IAAY,UAUX;AAVD,WAAY,UAAU;IACpB,2BAAa,CAAA;IACb,+BAAiB,CAAA;IACjB,+BAAiB,CAAA;IACjB,+BAAiB,CAAA;IACjB,+BAAiB,CAAA;IACjB,6BAAe,CAAA;IACf,6BAAe,CAAA;IACf,iCAAmB,CAAA;IACnB,6BAAe,CAAA;AACjB,CAAC,EAVW,UAAU,KAAV,UAAU,QAUrB;AAED,MAAM,CAAN,IAAY,eAIX;AAJD,WAAY,eAAe;IACzB,gCAAa,CAAA;IACb,oCAAiB,CAAA;IACjB,oCAAiB,CAAA;AACnB,CAAC,EAJW,eAAe,KAAf,eAAe,QAI1B;AAED,MAAM,CAAN,IAAY,QAOX;AAPD,WAAY,QAAQ;IAClB,6BAAiB,CAAA;IACjB,+BAAmB,CAAA;IACnB,yCAA6B,CAAA;IAC7B,2BAAe,CAAA;IACf,yBAAa,CAAA;IACb,iCAAqB,CAAA,CAAC,cAAc;AACtC,CAAC,EAPW,QAAQ,KAAR,QAAQ,QAOnB;AAED,+CAA+C;AAC/C,MAAM,CAAN,IAAY,oBAYX;AAZD,WAAY,oBAAoB;IAC9B,mDAA2B,CAAA;IAC3B,yDAAiC,CAAA;IACjC,yCAAiB,CAAA;IACjB,mCAAW,CAAA;IACX,qDAA6B,CAAA;IAC7B;;OAEG;IACH,iDAAyB,CAAA;IACzB,mDAA2B,CAAA;IAC3B,qDAA6B,CAAA;AAC/B,CAAC,EAZW,oBAAoB,KAApB,oBAAoB,QAY/B;AAED,+BAA+B;AAC/B,MAAM,CAAN,IAAY,oBAUX;AAVD,WAAY,oBAAoB;IAC9B,mDAA2B,CAAA;IAC3B,yDAAiC,CAAA;IACjC,6CAAqB,CAAA;IACrB,uDAA+B,CAAA;IAC/B;;OAEG;IACH,iDAAyB,CAAA;IACzB,mDAA2B,CAAA;AAC7B,CAAC,EAVW,oBAAoB,KAApB,oBAAoB,QAU/B;AAsBD,MAAM,CAAC,MAAM,gBAAgB,GAAG,CAAC,UAAyB,EAAmC,EAAE,CAAC,UAAU,CAAC,IAAI,KAAK,MAAM,CAAC;AAC3H,MAAM,CAAC,MAAM,iBAAiB,GAAG,CAAC,UAAyB,EAAoC,EAAE,CAAC,UAAU,CAAC,IAAI,KAAK,OAAO,CAAC;AAkC9H,2BAA2B;AAE3B,MAAM,CAAN,IAAY,kBAGX;AAHD,WAAY,kBAAkB;IAC5B,mCAAa,CAAA;IACb,+CAAyB,CAAA;AAC3B,CAAC,EAHW,kBAAkB,KAAlB,kBAAkB,QAG7B;AAED,MAAM,CAAN,IAAY,iBAKX;AALD,WAAY,iBAAiB;IAC3B,oCAAe,CAAA;IACf,kCAAa,CAAA;IACb,iCAAiC;IACjC,sBAAsB;AACxB,CAAC,EALW,iBAAiB,KAAjB,iBAAiB,QAK5B;AAED,MAAM,CAAN,IAAY,gBAwBX;AAxBD,WAAY,gBAAgB;IAC1B,mDAA+B,CAAA;IAC/B,qCAAiB,CAAA;IACjB,yCAAqB,CAAA;IACrB,mDAA+B,CAAA;IAC/B,qDAAiC,CAAA;IACjC,uCAAmB,CAAA;IACnB,uCAAmB,CAAA;IACnB,qCAAiB,CAAA;IACjB,qDAAiC,CAAA;IACjC,iDAA6B,CAAA;IAC7B,uEAAmD,CAAA;IACnD,iCAAa,CAAA;IACb,iDAA6B,CAAA;IAC7B,wCAAoB,CAAA;IACpB,0CAA0C;IAC1C,oDAAgC,CAAA;IAChC,mDAA+B,CAAA;IAC/B,yCAAqB,CAAA;IACrB,0CAAsB,CAAA;IACtB,mCAAe,CAAA;IACf,2CAAuB,CAAA;IACvB,qDAAiC,CAAA;IACjC,2CAAuB,CAAA;AACzB,CAAC,EAxBW,gBAAgB,KAAhB,gBAAgB,QAwB3B;AAED,2FAA2F;AAC3F,iBAAiB;AACjB,MAAM,CAAN,IAAY,YASX;AATD,WAAY,YAAY;IACtB,qCAAqB,CAAA;IACrB,qBAAqB;IACrB,6CAA6B,CAAA;IAC7B,oCAAoB,CAAA;IACpB,yBAAyB;IACzB,uCAAuB,CAAA;IACvB,qCAAqC;IACrC,uCAAuB,CAAA;AACzB,CAAC,EATW,YAAY,KAAZ,YAAY,QASvB;AAED,MAAM,CAAN,IAAY,cAcX;AAdD,WAAY,cAAc;IACxB,iCAAe,CAAA;IACf,mCAAiB,CAAA;IACjB,mCAAiB,CAAA;IACjB,mCAAiB,CAAA;IACjB,mCAAiB,CAAA;IACjB,qDAAmC,CAAA;IACnC,yDAAuC,CAAA;IACvC,qCAAmB,CAAA;IACnB,+BAAa,CAAA;IACb,6BAAW,CAAA;IACX,iCAAe,CAAA;IACf,mCAAiB,CAAA;IACjB,+BAAa,CAAA;AACf,CAAC,EAdW,cAAc,KAAd,cAAc,QAczB;AAED,MAAM,CAAC,MAAM,wBAAwB,GAAG;IACtC,MAAM,EAAE;QACN,IAAI,EAAE,cAAc,CAAC,IAAI;QACzB,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,uBAAuB,EAAE;QACvB,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,OAAO,EAAE;QACP,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,SAAS,EAAE;QACT,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,KAAK,EAAE,cAAc,CAAC,KAAK;KAC5B;IACD,aAAa,EAAE;QACb,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,KAAK,EAAE,cAAc,CAAC,KAAK;QAC3B,KAAK,EAAE,cAAc,CAAC,KAAK;KAC5B;IACD,YAAY,EAAE;QACZ,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,IAAI,EAAE,cAAc,CAAC,IAAI;KAC1B;IACD,QAAQ,EAAE;QACR,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,KAAK,EAAE;QACL,IAAI,EAAE,cAAc,CAAC,IAAI;QACzB,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,KAAK,EAAE;QACL,IAAI,EAAE,cAAc,CAAC,IAAI;QACzB,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,MAAM,EAAE;QACN,IAAI,EAAE,cAAc,CAAC,IAAI;QACzB,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,aAAa,EAAE;QACb,IAAI,EAAE,cAAc,CAAC,IAAI;QACzB,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,YAAY,EAAE;QACZ,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,IAAI,EAAE,cAAc,CAAC,IAAI;KAC1B;IACD,kBAAkB,EAAE;QAClB,IAAI,EAAE,cAAc,CAAC,IAAI;QACzB,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,aAAa,EAAE;QACb,IAAI,EAAE,cAAc,CAAC,IAAI;QACzB,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,YAAY,EAAE;QACZ,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,iBAAiB,EAAE,cAAc,CAAC,iBAAiB;QACnD,OAAO,EAAE,cAAc,CAAC,OAAO;QAC/B,KAAK,EAAE,cAAc,CAAC,KAAK;QAC3B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,IAAI,EAAE,cAAc,CAAC,IAAI;KAC1B;IACD,OAAO,EAAE;QACP,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,YAAY,EAAE;QACZ,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,KAAK,EAAE,cAAc,CAAC,KAAK;QAC3B,KAAK,EAAE,cAAc,CAAC,KAAK;QAC3B,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,IAAI,EAAE;QACJ,IAAI,EAAE,cAAc,CAAC,IAAI;KAC1B;IACD,YAAY,EAAE;QACZ,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,IAAI,EAAE,cAAc,CAAC,IAAI;KAC1B;IACD,cAAc,EAAE;QACd,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,eAAe,EAAE,cAAc,CAAC,eAAe;QAC/C,GAAG,EAAE,cAAc,CAAC,GAAG;QACvB,KAAK,EAAE,cAAc,CAAC,KAAK;QAC3B,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;IACD,aAAa,EAAE;QACb,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;QAC7B,MAAM,EAAE,cAAc,CAAC,MAAM;KAC9B;CACO,CAAC;AA2DX,MAAM,OAAO,eAAe;IAC1B,CAAC,YAAY,CAAC,YAAY,CAAC,CAEzB;IAEF,CAAC,YAAY,CAAC,YAAY,CAAC,CAGzB;IAEF;;;QAGI;IAEJ,CAAC,YAAY,CAAC,YAAY,CAAC,CAGzB;IAEF,CAAC,YAAY,CAAC,cAAc,CAAC,CAG3B;IAEF,CAAC,YAAY,CAAC,SAAS,CAAC,CAGtB;IAEF,YACE,YAIG;QAEH,KAAK,MAAM,WAAW,IAAI,YAAY,EAAE,CAAC;YACvC,MAAM,QAAQ,GAAG,WAAW,CAAC,QAAQ,CAAC;YACtC,MAAM,WAAW,GAAG,WAAW,CAAC,WAAW,CAAC;YAC5C,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACpB,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;YACtB,CAAC;YACD,IAAI,CAAC,QAAQ,CAAE,CAAC,WAAW,CAAC,GAAG,WAAW,CAAC,MAAM,CAAC;QACpD,CAAC;IACH,CAAC;CACF;AAED,MAAM,CAAN,IAAY,mBAIX;AAJD,WAAY,mBAAmB;IAC7B,4CAAqB,CAAA;IACrB,oCAAa,CAAA;IACb,0CAAmB,CAAA;AACrB,CAAC,EAJW,mBAAmB,KAAnB,mBAAmB,QAI9B"}
|
package/package.json
CHANGED
|
@@ -74,6 +74,7 @@ export const OBS_TAG_NET_PEER_IP = SEMATTRS_NET_PEER_IP;
|
|
|
74
74
|
export const OBS_TAG_HTTP_HOST = SEMATTRS_HTTP_HOST;
|
|
75
75
|
export const OBS_TAG_SUPERBLOCKS_ENV = 'superblocks.environment';
|
|
76
76
|
export const OBS_TAG_SUPERBLOCKS_REGION = 'superblocks.region';
|
|
77
|
+
export const OBS_TAG_SUPERBLOCKS_ORIGIN = 'superblocks.origin';
|
|
77
78
|
|
|
78
79
|
// WS specific tags
|
|
79
80
|
export const OBS_TAG_APPLICATION_ID = 'application-id';
|