@the-ai-company/cbio-node-runtime 1.48.6 → 1.49.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +40 -25
- package/dist/clients/agent/client.d.ts +8 -6
- package/dist/clients/agent/client.js +67 -49
- package/dist/clients/agent/client.js.map +1 -1
- package/dist/clients/agent/contracts.d.ts +13 -1
- package/dist/clients/agent/index.d.ts +1 -1
- package/dist/clients/owner/client.d.ts +20 -14
- package/dist/clients/owner/client.js +136 -51
- package/dist/clients/owner/client.js.map +1 -1
- package/dist/clients/owner/contracts.d.ts +58 -26
- package/dist/clients/owner/index.d.ts +1 -1
- package/dist/runtime/index.d.ts +4 -3
- package/dist/runtime/index.js +5 -1
- package/dist/runtime/index.js.map +1 -1
- package/dist/vault-core/contracts.d.ts +90 -3
- package/dist/vault-core/contracts.js +3 -0
- package/dist/vault-core/contracts.js.map +1 -1
- package/dist/vault-core/core.d.ts +44 -25
- package/dist/vault-core/core.js +290 -73
- package/dist/vault-core/core.js.map +1 -1
- package/dist/vault-core/defaults.d.ts +9 -1
- package/dist/vault-core/defaults.js +39 -6
- package/dist/vault-core/defaults.js.map +1 -1
- package/dist/vault-core/index.d.ts +3 -3
- package/dist/vault-core/index.js +1 -1
- package/dist/vault-core/index.js.map +1 -1
- package/dist/vault-core/persistence.d.ts +1 -0
- package/dist/vault-core/persistence.js +7 -1
- package/dist/vault-core/persistence.js.map +1 -1
- package/dist/vault-core/ports.d.ts +8 -0
- package/dist/vault-ingress/defaults.d.ts +4 -1
- package/dist/vault-ingress/defaults.js +12 -3
- package/dist/vault-ingress/defaults.js.map +1 -1
- package/dist/vault-ingress/index.d.ts +137 -21
- package/dist/vault-ingress/index.js +156 -46
- package/dist/vault-ingress/index.js.map +1 -1
- package/dist/vault-ingress/remote-transport.d.ts +7 -2
- package/dist/vault-ingress/remote-transport.js +61 -3
- package/dist/vault-ingress/remote-transport.js.map +1 -1
- package/dist/vault-ingress/server-utils.d.ts +2 -1
- package/dist/vault-ingress/server-utils.js +42 -1
- package/dist/vault-ingress/server-utils.js.map +1 -1
- package/docs/REFERENCE.md +46 -17
- package/docs/api/README.md +10 -3
- package/docs/api/classes/IdentityError.md +1 -1
- package/docs/api/classes/VaultCore.md +258 -102
- package/docs/api/classes/VaultCoreError.md +1 -1
- package/docs/api/enumerations/IdentityErrorCode.md +1 -1
- package/docs/api/functions/createAgentClient.md +1 -1
- package/docs/api/functions/createIdentity.md +1 -1
- package/docs/api/functions/createOwnerHttpFlowBoundary.md +1 -1
- package/docs/api/functions/createPersistentVaultCoreDependencies.md +1 -1
- package/docs/api/functions/createStandardAcquireBoundary.md +1 -1
- package/docs/api/functions/createStandardDispatchBoundary.md +1 -1
- package/docs/api/functions/createVault.md +1 -1
- package/docs/api/functions/createVaultClient.md +1 -1
- package/docs/api/functions/createVaultCore.md +1 -1
- package/docs/api/functions/createVaultCoreDependencies.md +1 -1
- package/docs/api/functions/createVaultService.md +1 -1
- package/docs/api/functions/createWorkspaceStorage.md +1 -1
- package/docs/api/functions/deriveIdentityId.md +1 -1
- package/docs/api/functions/deriveVaultWorkingKeyFromPassword.md +1 -1
- package/docs/api/functions/getDefaultWorkspaceDir.md +1 -1
- package/docs/api/functions/handleVaultAgentControlHttp.md +21 -0
- package/docs/api/functions/handleVaultHttpDispatch.md +1 -1
- package/docs/api/functions/initializeVaultCustody.md +1 -1
- package/docs/api/functions/listVaults.md +1 -1
- package/docs/api/functions/readVaultProfile.md +1 -1
- package/docs/api/functions/recoverVault.md +1 -1
- package/docs/api/functions/recoverVaultWorkingKey.md +1 -1
- package/docs/api/functions/restoreIdentity.md +1 -1
- package/docs/api/functions/updateVaultMetadata.md +1 -1
- package/docs/api/functions/wrapVaultCoreAsVaultService.md +1 -1
- package/docs/api/functions/writeVaultProfile.md +1 -1
- package/docs/api/interfaces/AgentClient.md +41 -5
- package/docs/api/interfaces/AgentDispatchIntent.md +1 -1
- package/docs/api/interfaces/AgentDispatchTransport.md +51 -3
- package/docs/api/interfaces/AgentIdentity.md +1 -1
- package/docs/api/interfaces/AgentSigner.md +1 -1
- package/docs/api/interfaces/AgentSubmitCapabilityRequestInput.md +41 -0
- package/docs/api/interfaces/CbioRuntime.md +21 -1
- package/docs/api/interfaces/CreateAgentClientOptions.md +3 -9
- package/docs/api/interfaces/CreateIdentityOptions.md +1 -1
- package/docs/api/interfaces/CreatePersistentVaultCoreDependenciesOptions.md +1 -1
- package/docs/api/interfaces/CreateVaultClientOptions.md +1 -1
- package/docs/api/interfaces/CreateVaultOptions.md +1 -1
- package/docs/api/interfaces/CreatedVault.md +1 -1
- package/docs/api/interfaces/DefaultPolicyEngineOptions.md +1 -1
- package/docs/api/interfaces/IStorageProvider.md +1 -1
- package/docs/api/interfaces/InitializeVaultCustodyOptions.md +1 -1
- package/docs/api/interfaces/InitializedVaultCustody.md +1 -1
- package/docs/api/interfaces/OwnerAgentProvisionResult.md +17 -0
- package/docs/api/interfaces/OwnerDefineSecretTargetsInput.md +1 -1
- package/docs/api/interfaces/OwnerSecretTargetBinding.md +1 -1
- package/docs/api/interfaces/OwnerStoreSecretInput.md +1 -1
- package/docs/api/interfaces/OwnerWriteSecretInput.md +1 -1
- package/docs/api/interfaces/RecoverVaultOptions.md +1 -1
- package/docs/api/interfaces/RecoveredVault.md +1 -1
- package/docs/api/interfaces/RestoreIdentityOptions.md +1 -1
- package/docs/api/interfaces/Signer.md +1 -1
- package/docs/api/interfaces/VaultApproveCapabilityRequestInput.md +23 -0
- package/docs/api/interfaces/VaultAuditQueryInput.md +1 -1
- package/docs/api/interfaces/VaultClient.md +123 -33
- package/docs/api/interfaces/VaultCoreDependenciesOptions.md +1 -1
- package/docs/api/interfaces/VaultCreateAgentInput.md +1 -1
- package/docs/api/interfaces/VaultDeleteSecretInput.md +1 -1
- package/docs/api/interfaces/VaultExportSecretInput.md +1 -1
- package/docs/api/interfaces/VaultGrantCapabilityInput.md +13 -19
- package/docs/api/interfaces/VaultIdentity.md +1 -1
- package/docs/api/interfaces/{VaultRegisterAgentInput.md → VaultImportAgentInput.md} +4 -10
- package/docs/api/interfaces/VaultListAgentsInput.md +1 -1
- package/docs/api/interfaces/VaultListCapabilitiesInput.md +1 -1
- package/docs/api/interfaces/VaultListSecretsInput.md +11 -0
- package/docs/api/interfaces/VaultMetadata.md +1 -1
- package/docs/api/interfaces/VaultObject.md +1 -1
- package/docs/api/interfaces/VaultProfile.md +1 -1
- package/docs/api/interfaces/VaultRegisterFlowInput.md +1 -1
- package/docs/api/interfaces/VaultRevokeCapabilityInput.md +1 -1
- package/docs/api/interfaces/VaultSigner.md +1 -1
- package/docs/api/interfaces/VaultSubmitCapabilityRequestInput.md +79 -0
- package/docs/api/type-aliases/AgentCapabilityEnvelope.md +1 -1
- package/docs/api/type-aliases/AgentVisibleSecretRecord.md +7 -0
- package/docs/api/type-aliases/CbioRuntimeModule.md +1 -1
- package/docs/api/variables/DEFAULT_VAULT_KEY_CUSTODY_BLOB_KEY.md +1 -1
- package/examples/process-isolation.ts +24 -15
- package/package.json +1 -1
|
@@ -147,9 +147,8 @@ export interface AgentCapability {
|
|
|
147
147
|
secretAliases?: readonly string[];
|
|
148
148
|
operation: "dispatch_http" | "custom_http";
|
|
149
149
|
customFlowId?: string;
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
allowedPaths?: readonly string[];
|
|
150
|
+
scope: string;
|
|
151
|
+
methods: readonly string[];
|
|
153
152
|
issuedAt: string;
|
|
154
153
|
expiresAt?: string;
|
|
155
154
|
revocationVersion?: number;
|
|
@@ -166,6 +165,50 @@ export interface AgentProof {
|
|
|
166
165
|
signature?: string;
|
|
167
166
|
token?: string;
|
|
168
167
|
}
|
|
168
|
+
export interface AgentVisibleSecretRecord {
|
|
169
|
+
vaultId: VaultId;
|
|
170
|
+
secretId: SecretId;
|
|
171
|
+
alias: SecretAlias;
|
|
172
|
+
issuerId: string | null;
|
|
173
|
+
targetBindings: VaultTargetBinding[];
|
|
174
|
+
createdAt: string;
|
|
175
|
+
updatedAt: string;
|
|
176
|
+
isAuthorizedForAgent?: boolean;
|
|
177
|
+
authorizedCapabilities?: readonly {
|
|
178
|
+
capabilityId: string;
|
|
179
|
+
scope: string;
|
|
180
|
+
methods: readonly string[];
|
|
181
|
+
}[];
|
|
182
|
+
}
|
|
183
|
+
export interface AgentListCapabilitiesRequest {
|
|
184
|
+
vaultId: VaultId;
|
|
185
|
+
requestId: string;
|
|
186
|
+
requestedAt: string;
|
|
187
|
+
agent: VaultPrincipal & {
|
|
188
|
+
kind: "agent";
|
|
189
|
+
};
|
|
190
|
+
proof: AgentProof;
|
|
191
|
+
}
|
|
192
|
+
export interface AgentListSecretsRequest {
|
|
193
|
+
vaultId: VaultId;
|
|
194
|
+
requestId: string;
|
|
195
|
+
requestedAt: string;
|
|
196
|
+
agent: VaultPrincipal & {
|
|
197
|
+
kind: "agent";
|
|
198
|
+
};
|
|
199
|
+
proof: AgentProof;
|
|
200
|
+
}
|
|
201
|
+
export interface AgentSubmitCapabilityRequestCommand {
|
|
202
|
+
vaultId: VaultId;
|
|
203
|
+
requestId: string;
|
|
204
|
+
requestedAt: string;
|
|
205
|
+
agent: VaultPrincipal & {
|
|
206
|
+
kind: "agent";
|
|
207
|
+
};
|
|
208
|
+
proof: AgentProof;
|
|
209
|
+
scope: CapabilityRequestScope;
|
|
210
|
+
justification?: string;
|
|
211
|
+
}
|
|
169
212
|
export interface PendingDispatchRecord {
|
|
170
213
|
requestId: string;
|
|
171
214
|
agentId: string;
|
|
@@ -190,6 +233,47 @@ export interface OwnerRejectDispatchCommand {
|
|
|
190
233
|
requestId: string;
|
|
191
234
|
owner: VaultPrincipal;
|
|
192
235
|
}
|
|
236
|
+
export interface CapabilityRequestScope {
|
|
237
|
+
operation: "dispatch_http" | "custom_http";
|
|
238
|
+
secretAliases?: readonly string[];
|
|
239
|
+
scope: string;
|
|
240
|
+
methods: readonly string[];
|
|
241
|
+
rateLimit?: {
|
|
242
|
+
maxRequests: number;
|
|
243
|
+
windowMs: number;
|
|
244
|
+
};
|
|
245
|
+
skipAudit?: boolean;
|
|
246
|
+
expiresAt?: string;
|
|
247
|
+
}
|
|
248
|
+
export interface SubmitCapabilityRequestCommand {
|
|
249
|
+
vaultId: VaultId;
|
|
250
|
+
requestId: string;
|
|
251
|
+
requester: VaultPrincipal;
|
|
252
|
+
agentId: string;
|
|
253
|
+
scope: CapabilityRequestScope;
|
|
254
|
+
justification?: string;
|
|
255
|
+
requestedAt: string;
|
|
256
|
+
}
|
|
257
|
+
export interface PendingCapabilityRequestRecord {
|
|
258
|
+
vaultId: VaultId;
|
|
259
|
+
requestId: string;
|
|
260
|
+
requester: VaultPrincipal;
|
|
261
|
+
agentId: string;
|
|
262
|
+
scope: CapabilityRequestScope;
|
|
263
|
+
justification?: string;
|
|
264
|
+
requestedAt: string;
|
|
265
|
+
}
|
|
266
|
+
export interface OwnerApproveCapabilityRequestCommand {
|
|
267
|
+
vaultId: VaultId;
|
|
268
|
+
requestId: string;
|
|
269
|
+
owner: VaultPrincipal;
|
|
270
|
+
capabilityId?: string;
|
|
271
|
+
}
|
|
272
|
+
export interface OwnerRejectCapabilityRequestCommand {
|
|
273
|
+
vaultId: VaultId;
|
|
274
|
+
requestId: string;
|
|
275
|
+
owner: VaultPrincipal;
|
|
276
|
+
}
|
|
193
277
|
export interface DispatchRequest {
|
|
194
278
|
vaultId: VaultId;
|
|
195
279
|
requestId: string;
|
|
@@ -250,6 +334,9 @@ export declare enum AuditAction {
|
|
|
250
334
|
REGISTER_AGENT_IDENTITY = "REGISTER_AGENT_IDENTITY",
|
|
251
335
|
REGISTER_CUSTOM_FLOW = "REGISTER_CUSTOM_FLOW",
|
|
252
336
|
REGISTER_CAPABILITY = "REGISTER_CAPABILITY",
|
|
337
|
+
SUBMIT_CAPABILITY_REQUEST = "SUBMIT_CAPABILITY_REQUEST",
|
|
338
|
+
APPROVE_CAPABILITY_REQUEST = "APPROVE_CAPABILITY_REQUEST",
|
|
339
|
+
REJECT_CAPABILITY_REQUEST = "REJECT_CAPABILITY_REQUEST",
|
|
253
340
|
REVOKE_CAPABILITY = "REVOKE_CAPABILITY",
|
|
254
341
|
WRITE_SECRET = "WRITE_SECRET",
|
|
255
342
|
DEFINE_SECRET_TARGETS = "DEFINE_SECRET_TARGETS",
|
|
@@ -11,6 +11,9 @@ export var AuditAction;
|
|
|
11
11
|
AuditAction["REGISTER_AGENT_IDENTITY"] = "REGISTER_AGENT_IDENTITY";
|
|
12
12
|
AuditAction["REGISTER_CUSTOM_FLOW"] = "REGISTER_CUSTOM_FLOW";
|
|
13
13
|
AuditAction["REGISTER_CAPABILITY"] = "REGISTER_CAPABILITY";
|
|
14
|
+
AuditAction["SUBMIT_CAPABILITY_REQUEST"] = "SUBMIT_CAPABILITY_REQUEST";
|
|
15
|
+
AuditAction["APPROVE_CAPABILITY_REQUEST"] = "APPROVE_CAPABILITY_REQUEST";
|
|
16
|
+
AuditAction["REJECT_CAPABILITY_REQUEST"] = "REJECT_CAPABILITY_REQUEST";
|
|
14
17
|
AuditAction["REVOKE_CAPABILITY"] = "REVOKE_CAPABILITY";
|
|
15
18
|
AuditAction["WRITE_SECRET"] = "WRITE_SECRET";
|
|
16
19
|
AuditAction["DEFINE_SECRET_TARGETS"] = "DEFINE_SECRET_TARGETS";
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"contracts.js","sourceRoot":"","sources":["../../src/vault-core/contracts.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"contracts.js","sourceRoot":"","sources":["../../src/vault-core/contracts.ts"],"names":[],"mappings":"AAwUA,MAAM,CAAN,IAAY,cAMX;AAND,WAAY,cAAc;IACxB,yCAAuB,CAAA;IACvB,mCAAiB,CAAA;IACjB,mCAAiB,CAAA;IACjB,qCAAmB,CAAA;IACnB,qCAAmB,CAAA;AACrB,CAAC,EANW,cAAc,KAAd,cAAc,QAMzB;AAoBD,MAAM,CAAN,IAAY,WAuBX;AAvBD,WAAY,WAAW;IACrB,kEAAmD,CAAA;IACnD,4DAA6C,CAAA;IAC7C,0DAA2C,CAAA;IAC3C,sEAAuD,CAAA;IACvD,wEAAyD,CAAA;IACzD,sEAAuD,CAAA;IACvD,sDAAuC,CAAA;IACvC,4CAA6B,CAAA;IAC7B,8DAA+C,CAAA;IAC/C,8CAA+B,CAAA;IAC/B,gDAAiC,CAAA;IACjC,8CAA+B,CAAA;IAC/B,wDAAyC,CAAA;IACzC,kDAAmC,CAAA;IACnC,0CAA2B,CAAA;IAC3B,sDAAuC,CAAA;IACvC,wCAAyB,CAAA;IACzB,0DAA2C,CAAA;IAC3C,4DAA6C,CAAA;IAC7C,oDAAqC,CAAA;IACrC,kDAAmC,CAAA;IACnC,gDAAiC,CAAA;AACnC,CAAC,EAvBW,WAAW,KAAX,WAAW,QAuBtB;AAED,MAAM,CAAN,IAAY,YAMX;AAND,WAAY,YAAY;IACtB,mCAAmB,CAAA;IACnB,iCAAiB,CAAA;IACjB,uCAAuB,CAAA;IACvB,iCAAiB,CAAA;IACjB,mCAAmB,CAAA;AACrB,CAAC,EANW,YAAY,KAAZ,YAAY,QAMvB"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import type { AuditEntry, AuditQuery, CustomHttpFlowDefinition, DispatchAuthorization, DispatchRequest, DispatchResult, OwnerDefineSecretTargetsCommand, OwnerIssueSessionTokenRequest, OwnerDeleteSecretCommand, OwnerExportSecretRequest, OwnerRegisterAgentIdentityCommand, OwnerRegisterCapabilityCommand, OwnerRegisterCustomHttpFlowCommand, OwnerRevokeCapabilityCommand, OwnerListAgentsRequest, OwnerListCapabilitiesRequest, OwnerSecretExport, OwnerSessionToken, SecretRecord, VaultId, VaultPrincipal, VaultWriteSecretCommand, AgentIdentityRecord, AgentCapability } from "./contracts.js";
|
|
1
|
+
import type { AgentListCapabilitiesRequest, AgentListSecretsRequest, AgentSubmitCapabilityRequestCommand, AgentVisibleSecretRecord, AuditEntry, AuditQuery, CustomHttpFlowDefinition, DispatchAuthorization, DispatchRequest, DispatchResult, OwnerApproveCapabilityRequestCommand, OwnerDefineSecretTargetsCommand, OwnerIssueSessionTokenRequest, OwnerRejectCapabilityRequestCommand, OwnerDeleteSecretCommand, OwnerExportSecretRequest, OwnerRegisterAgentIdentityCommand, OwnerRegisterCapabilityCommand, OwnerRegisterCustomHttpFlowCommand, OwnerRevokeCapabilityCommand, OwnerListAgentsRequest, OwnerListCapabilitiesRequest, OwnerSecretExport, OwnerSessionToken, PendingCapabilityRequestRecord, SecretRecord, SubmitCapabilityRequestCommand, VaultId, VaultPrincipal, VaultWriteSecretCommand, AgentIdentityRecord, AgentCapability } from "./contracts.js";
|
|
2
2
|
import type { VaultCoreDependencies } from "./ports.js";
|
|
3
3
|
/**
|
|
4
4
|
* The Sovereign Vault Core.
|
|
@@ -7,51 +7,70 @@ import type { VaultCoreDependencies } from "./ports.js";
|
|
|
7
7
|
export declare class VaultCore {
|
|
8
8
|
private readonly _deps;
|
|
9
9
|
private readonly _pendingObservers;
|
|
10
|
+
private readonly _pendingCapabilityObservers;
|
|
10
11
|
constructor(_deps: VaultCoreDependencies);
|
|
11
12
|
get vaultId(): VaultId;
|
|
12
|
-
private
|
|
13
|
-
private
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
13
|
+
private _appendAudit;
|
|
14
|
+
private _appendDecisionAudit;
|
|
15
|
+
private _verifyAgentControlProof;
|
|
16
|
+
private _listVisibleSecretsForAgent;
|
|
17
|
+
ownerOnPendingDispatch(callback: (record: import("./contracts.js").PendingDispatchRecord) => void): () => void;
|
|
18
|
+
ownerOnPendingCapabilityRequest(callback: (record: PendingCapabilityRequestRecord) => void): () => void;
|
|
19
|
+
ownerRegisterAgentIdentity(command: OwnerRegisterAgentIdentityCommand): Promise<void>;
|
|
20
|
+
ownerRegisterCapability(command: OwnerRegisterCapabilityCommand): Promise<void>;
|
|
21
|
+
ownerSubmitCapabilityRequest(command: SubmitCapabilityRequestCommand): Promise<PendingCapabilityRequestRecord>;
|
|
22
|
+
_getCapability(vaultId: import("./contracts.js").VaultId, agentId: string, capabilityId: string): Promise<AgentCapability | null>;
|
|
23
|
+
ownerRegisterCustomFlow(command: OwnerRegisterCustomHttpFlowCommand): Promise<void>;
|
|
24
|
+
_storeCustomFlowSecret(flow: CustomHttpFlowDefinition, alias: string, plaintext: string): Promise<SecretRecord>;
|
|
25
|
+
ownerWriteSecret(command: VaultWriteSecretCommand): Promise<SecretRecord>;
|
|
26
|
+
ownerDeleteSecret(command: OwnerDeleteSecretCommand): Promise<void>;
|
|
27
|
+
ownerDefineSecretTargets(command: OwnerDefineSecretTargetsCommand): Promise<SecretRecord>;
|
|
28
|
+
agentAuthorizeDispatch(request: DispatchRequest): Promise<DispatchAuthorization>;
|
|
29
|
+
agentDispatchSecret(request: DispatchRequest): Promise<DispatchResult>;
|
|
30
|
+
ownerReadAudit(actor: VaultPrincipal & {
|
|
26
31
|
kind: "owner";
|
|
27
32
|
}, query: AuditQuery, request?: Omit<import("./contracts.js").OwnerAuditRequest, "actor" | "query" | "vaultId">): Promise<readonly AuditEntry[]>;
|
|
28
|
-
|
|
33
|
+
ownerExportSecret(actor: VaultPrincipal & {
|
|
29
34
|
kind: "owner";
|
|
30
35
|
}, alias: string, request?: Omit<OwnerExportSecretRequest, "actor" | "alias" | "vaultId">): Promise<OwnerSecretExport>;
|
|
31
36
|
private isCapabilityMatch;
|
|
32
|
-
|
|
37
|
+
ownerListAgents(actor: VaultPrincipal & {
|
|
33
38
|
kind: "owner";
|
|
34
39
|
}, request?: Omit<OwnerListAgentsRequest, "actor" | "vaultId">): Promise<readonly AgentIdentityRecord[]>;
|
|
35
|
-
|
|
40
|
+
ownerListCapabilities(actor: VaultPrincipal & {
|
|
36
41
|
kind: "owner";
|
|
37
42
|
}, agentId?: string, request?: Omit<OwnerListCapabilitiesRequest, "actor" | "agentId" | "vaultId">): Promise<readonly AgentCapability[]>;
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
43
|
+
ownerListSecrets(actor: VaultPrincipal & {
|
|
44
|
+
kind: "owner";
|
|
45
|
+
}, request?: {
|
|
46
|
+
requestId?: string;
|
|
47
|
+
}): Promise<readonly AgentVisibleSecretRecord[]>;
|
|
48
|
+
agentListCapabilities(request: AgentListCapabilitiesRequest): Promise<readonly AgentCapability[]>;
|
|
49
|
+
agentListSecrets(request: AgentListSecretsRequest): Promise<readonly AgentVisibleSecretRecord[]>;
|
|
50
|
+
agentSubmitCapabilityRequest(command: AgentSubmitCapabilityRequestCommand): Promise<PendingCapabilityRequestRecord>;
|
|
51
|
+
ownerRevokeCapability(command: OwnerRevokeCapabilityCommand): Promise<void>;
|
|
52
|
+
ownerIssueSessionToken(request: OwnerIssueSessionTokenRequest): Promise<OwnerSessionToken>;
|
|
53
|
+
ownerIssueAllAgentSessionTokens(actor: VaultPrincipal & {
|
|
41
54
|
kind: "owner";
|
|
42
55
|
}): Promise<OwnerSessionToken[]>;
|
|
43
|
-
|
|
56
|
+
ownerRevokeSessionToken(request: {
|
|
44
57
|
vaultId: VaultId;
|
|
45
58
|
actor: VaultPrincipal & {
|
|
46
59
|
kind: "owner";
|
|
47
60
|
};
|
|
48
61
|
token: string;
|
|
49
62
|
}): Promise<void>;
|
|
50
|
-
|
|
63
|
+
ownerListPendingDispatches(command: {
|
|
51
64
|
vaultId: VaultId;
|
|
52
65
|
owner: VaultPrincipal;
|
|
53
66
|
}): Promise<readonly import("./contracts.js").PendingDispatchRecord[]>;
|
|
54
|
-
|
|
55
|
-
|
|
67
|
+
ownerListPendingCapabilityRequests(command: {
|
|
68
|
+
vaultId: VaultId;
|
|
69
|
+
owner: VaultPrincipal;
|
|
70
|
+
}): Promise<readonly PendingCapabilityRequestRecord[]>;
|
|
71
|
+
ownerApproveCapabilityRequest(command: OwnerApproveCapabilityRequestCommand): Promise<AgentCapability>;
|
|
72
|
+
ownerRejectCapabilityRequest(command: OwnerRejectCapabilityRequestCommand): Promise<void>;
|
|
73
|
+
ownerApproveDispatch(command: import("./contracts.js").OwnerApproveDispatchCommand): Promise<DispatchResult>;
|
|
74
|
+
ownerRejectDispatch(command: import("./contracts.js").OwnerRejectDispatchCommand): Promise<void>;
|
|
56
75
|
}
|
|
57
76
|
export declare function createVaultCore(deps: VaultCoreDependencies): VaultCore;
|