@vess-id/ai-identity 0.3.2 → 0.4.1-alpha.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +175 -68
- package/dist/client.d.ts +1 -4
- package/dist/client.d.ts.map +1 -1
- package/dist/constraint/__tests__/fixtures/constraint.fixtures.d.ts +1 -1
- package/dist/constraint/__tests__/fixtures/constraint.fixtures.d.ts.map +1 -1
- package/dist/constraint/constraint-evaluator.d.ts +33 -2
- package/dist/constraint/constraint-evaluator.d.ts.map +1 -1
- package/dist/did/agent.d.ts +1 -1
- package/dist/did/agent.d.ts.map +1 -1
- package/dist/grant/grant-manager.d.ts +1 -1
- package/dist/grant/grant-manager.d.ts.map +1 -1
- package/dist/identity/device-enroll-manager.d.ts +6 -0
- package/dist/identity/device-enroll-manager.d.ts.map +1 -1
- package/dist/identity/user-identity-manager.d.ts +1 -1
- package/dist/identity/user-identity-manager.d.ts.map +1 -1
- package/dist/index.d.mts +7731 -0
- package/dist/index.d.ts +7 -7
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +1721 -1060
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +1665 -1073
- package/dist/index.mjs.map +1 -1
- package/dist/registry/access-orchestrator.d.ts +3 -2
- package/dist/registry/access-orchestrator.d.ts.map +1 -1
- package/dist/registry/action-aliases.d.ts +37 -0
- package/dist/registry/action-aliases.d.ts.map +1 -0
- package/dist/registry/action-normalizer.d.ts +47 -0
- package/dist/registry/action-normalizer.d.ts.map +1 -0
- package/dist/registry/action-registry-json.d.ts +2338 -587
- package/dist/registry/action-registry-json.d.ts.map +1 -1
- package/dist/registry/action-registry.d.ts +5 -3
- package/dist/registry/action-registry.d.ts.map +1 -1
- package/dist/registry/index.d.ts +6 -1
- package/dist/registry/index.d.ts.map +1 -1
- package/dist/registry/providers.d.ts +32 -0
- package/dist/registry/providers.d.ts.map +1 -0
- package/dist/registry/resource-types.d.ts +40 -0
- package/dist/registry/resource-types.d.ts.map +1 -0
- package/dist/resolver/target-resolver.d.ts +20 -0
- package/dist/resolver/target-resolver.d.ts.map +1 -0
- package/dist/tool/tool-manager.d.ts +1 -1
- package/dist/tool/tool-manager.d.ts.map +1 -1
- package/dist/types/agent.d.ts +139 -0
- package/dist/types/agent.d.ts.map +1 -0
- package/dist/types/audit.d.ts +23 -0
- package/dist/types/audit.d.ts.map +1 -0
- package/dist/types/connector-plugin.d.ts +184 -0
- package/dist/types/connector-plugin.d.ts.map +1 -0
- package/dist/types/connectors.d.ts +39 -0
- package/dist/types/connectors.d.ts.map +1 -0
- package/dist/types/context.d.ts +152 -0
- package/dist/types/context.d.ts.map +1 -0
- package/dist/types/did.d.ts +18 -0
- package/dist/types/did.d.ts.map +1 -0
- package/dist/types/errors.d.ts +24 -0
- package/dist/types/errors.d.ts.map +1 -0
- package/dist/types/grant.d.ts +435 -0
- package/dist/types/grant.d.ts.map +1 -0
- package/dist/types/index.d.ts +21 -0
- package/dist/types/index.d.ts.map +1 -0
- package/dist/types/intent.d.ts +133 -0
- package/dist/types/intent.d.ts.map +1 -0
- package/dist/types/invitation.d.ts +97 -0
- package/dist/types/invitation.d.ts.map +1 -0
- package/dist/types/jira.d.ts +291 -0
- package/dist/types/jira.d.ts.map +1 -0
- package/dist/types/oauth.d.ts +72 -0
- package/dist/types/oauth.d.ts.map +1 -0
- package/dist/types/organization.d.ts +77 -0
- package/dist/types/organization.d.ts.map +1 -0
- package/dist/types/permission-mode.d.ts +138 -0
- package/dist/types/permission-mode.d.ts.map +1 -0
- package/dist/types/permission-vc.d.ts +350 -0
- package/dist/types/permission-vc.d.ts.map +1 -0
- package/dist/types/receipt.d.ts +133 -0
- package/dist/types/receipt.d.ts.map +1 -0
- package/dist/types/target-binding.d.ts +159 -0
- package/dist/types/target-binding.d.ts.map +1 -0
- package/dist/types/tier.d.ts +13 -0
- package/dist/types/tier.d.ts.map +1 -0
- package/dist/types/vc.d.ts +203 -0
- package/dist/types/vc.d.ts.map +1 -0
- package/dist/types/vp.d.ts +25 -0
- package/dist/types/vp.d.ts.map +1 -0
- package/dist/utils/action-classifier.d.ts +13 -0
- package/dist/utils/action-classifier.d.ts.map +1 -0
- package/dist/utils/sdjwt-client.d.ts +10 -0
- package/dist/utils/sdjwt-client.d.ts.map +1 -1
- package/dist/utils/sdjwt-disclosure.d.ts +13 -0
- package/dist/utils/sdjwt-disclosure.d.ts.map +1 -0
- package/dist/utils/tier-utils.d.ts +15 -0
- package/dist/utils/tier-utils.d.ts.map +1 -0
- package/dist/vc/api-vc-manager.d.ts +2 -4
- package/dist/vc/api-vc-manager.d.ts.map +1 -1
- package/dist/vc/vc-manager.d.ts +1 -1
- package/dist/vc/vc-manager.d.ts.map +1 -1
- package/dist/vp/vp-manager.d.ts +1 -1
- package/dist/vp/vp-manager.d.ts.map +1 -1
- package/package.json +16 -5
- package/dist/organization/disclosure-config-manager.d.ts +0 -61
- package/dist/organization/disclosure-config-manager.d.ts.map +0 -1
- package/dist/organization/key-rotation-manager.d.ts +0 -63
- package/dist/organization/key-rotation-manager.d.ts.map +0 -1
- package/dist/organization/organization-manager.d.ts +0 -38
- package/dist/organization/organization-manager.d.ts.map +0 -1
- package/dist/revocation/revocation-manager.d.ts +0 -98
- package/dist/revocation/revocation-manager.d.ts.map +0 -1
package/README.md
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# @vess-id/ai-identity
|
|
2
2
|
|
|
3
|
-
TypeScript SDK for AI Identity Layer
|
|
3
|
+
TypeScript SDK for AI Identity Layer — secure delegation and permission management for AI agents using W3C Verifiable Credentials (VCs), Verifiable Presentations (VPs), and SD-JWT.
|
|
4
4
|
|
|
5
5
|
## Installation
|
|
6
6
|
|
|
@@ -18,114 +18,226 @@ import { AIdentityClient } from '@vess-id/ai-identity'
|
|
|
18
18
|
// Initialize client
|
|
19
19
|
const client = new AIdentityClient({
|
|
20
20
|
proxyApi: {
|
|
21
|
-
baseUrl: 'http://localhost:3000',
|
|
21
|
+
baseUrl: 'http://localhost:3000',
|
|
22
22
|
},
|
|
23
23
|
})
|
|
24
24
|
|
|
25
|
-
// Create agent
|
|
25
|
+
// Create agent with its own did:jwk identity
|
|
26
26
|
const agent = await client.setup()
|
|
27
27
|
|
|
28
|
-
// Issue permission VC
|
|
29
|
-
const vc = await client.issueToolPermission('slack', '
|
|
28
|
+
// Issue a tool permission VC
|
|
29
|
+
const vc = await client.issueToolPermission('slack', 'message.post', {
|
|
30
30
|
subjectDid: agent.did,
|
|
31
31
|
resourceScope: { channel: 'C123456' },
|
|
32
32
|
expiresIn: '1h',
|
|
33
33
|
})
|
|
34
34
|
|
|
35
|
-
//
|
|
35
|
+
// Invoke tool with VC authorization
|
|
36
36
|
const result = await client.invokeTool(
|
|
37
37
|
'slack',
|
|
38
|
-
'
|
|
39
|
-
{
|
|
40
|
-
channel: 'C123456',
|
|
41
|
-
text: 'Hello from AI Agent!',
|
|
42
|
-
},
|
|
38
|
+
'message.post',
|
|
39
|
+
{ channel: 'C123456', text: 'Hello from AI Agent!' },
|
|
43
40
|
[vc]
|
|
44
41
|
)
|
|
45
42
|
```
|
|
46
43
|
|
|
47
|
-
##
|
|
44
|
+
## Architecture
|
|
48
45
|
|
|
49
|
-
|
|
46
|
+
```
|
|
47
|
+
User (Issuer) Agent (Subject) Service
|
|
48
|
+
│ │ │
|
|
49
|
+
├─── issue VC ──────────────►│ │
|
|
50
|
+
│ (permission grant) │ │
|
|
51
|
+
│ ├─── present VP ───────────►│
|
|
52
|
+
│ │ (prove permission) │
|
|
53
|
+
│ │◄──── response ────────────┤
|
|
54
|
+
```
|
|
50
55
|
|
|
51
|
-
|
|
56
|
+
- **Users** issue Verifiable Credentials to delegate permissions to agents
|
|
57
|
+
- **Agents** create Verifiable Presentations to prove their permissions
|
|
58
|
+
- **Services** verify VPs before executing operations
|
|
52
59
|
|
|
53
|
-
|
|
54
|
-
- Public/private key pair for signing
|
|
55
|
-
- Local encrypted key storage
|
|
60
|
+
## Core Modules
|
|
56
61
|
|
|
57
|
-
###
|
|
62
|
+
### AIdentityClient
|
|
58
63
|
|
|
59
|
-
|
|
64
|
+
The main orchestrator that provides access to all managers:
|
|
60
65
|
|
|
61
|
-
|
|
62
|
-
|
|
66
|
+
```typescript
|
|
67
|
+
const client = new AIdentityClient(config?, password?)
|
|
68
|
+
|
|
69
|
+
client.agent // AgentManager — agent creation, export/import, lifecycle
|
|
70
|
+
client.user // UserIdentityManager — user DID management
|
|
71
|
+
client.vc // VCManager — VC issuance (SD-JWT)
|
|
72
|
+
client.vp // VPManager — VP creation and verification
|
|
73
|
+
client.tool // ToolManager — tool invocation with VP authorization
|
|
74
|
+
client.memory // MemoryManager — vector-backed memory storage
|
|
75
|
+
client.grant // GrantManager — grant suggestion and confirmation
|
|
76
|
+
```
|
|
63
77
|
|
|
64
|
-
###
|
|
78
|
+
### Agent Management
|
|
65
79
|
|
|
66
|
-
|
|
80
|
+
```typescript
|
|
81
|
+
// Create agent with did:jwk identity
|
|
82
|
+
const agent = await client.setup()
|
|
67
83
|
|
|
68
|
-
|
|
84
|
+
// List agents
|
|
85
|
+
const agents = await client.agent.list()
|
|
69
86
|
|
|
70
|
-
|
|
87
|
+
// Export/import agent (including private key)
|
|
88
|
+
const backup = await client.agent.export(agent.did)
|
|
89
|
+
await client.agent.import(backup.agent, backup.privateKey)
|
|
90
|
+
```
|
|
91
|
+
|
|
92
|
+
Agent types: `autonomous`, `sub_agent`, `tool_agent`, `assistant`, `proxy`
|
|
93
|
+
|
|
94
|
+
### Verifiable Credentials
|
|
95
|
+
|
|
96
|
+
Issue SD-JWT VCs with selective disclosure:
|
|
97
|
+
|
|
98
|
+
```typescript
|
|
99
|
+
// Tool permission
|
|
100
|
+
const vc = await client.issueToolPermission('github', 'issue.create', {
|
|
101
|
+
subjectDid: agent.did,
|
|
102
|
+
expiresIn: '24h',
|
|
103
|
+
})
|
|
104
|
+
|
|
105
|
+
// Data access
|
|
106
|
+
const vc = await client.issueDataAccess('slack:channel', ['read'], {
|
|
107
|
+
subjectDid: agent.did,
|
|
108
|
+
})
|
|
109
|
+
```
|
|
110
|
+
|
|
111
|
+
VC types: `ToolAccessCredential`, `ProjectAccessCredential`, `DeveloperCredential`, `TemporaryCredential`, `AdminCredential`, `ReceiptCredential`
|
|
112
|
+
|
|
113
|
+
### Verifiable Presentations
|
|
114
|
+
|
|
115
|
+
```typescript
|
|
116
|
+
// Create VP (with holder binding via KB-JWT)
|
|
117
|
+
const vp = await client.vp.create([vc1, vc2], {
|
|
118
|
+
holderDid: agent.did,
|
|
119
|
+
challenge: 'nonce-123',
|
|
120
|
+
domain: 'api.example.com',
|
|
121
|
+
})
|
|
122
|
+
|
|
123
|
+
// Verify VP
|
|
124
|
+
const result = await client.vp.verify(vp, {
|
|
125
|
+
expectedChallenge: 'nonce-123',
|
|
126
|
+
expectedDomain: 'api.example.com',
|
|
127
|
+
})
|
|
128
|
+
```
|
|
71
129
|
|
|
72
|
-
|
|
130
|
+
### Tool Invocation
|
|
73
131
|
|
|
74
132
|
```typescript
|
|
75
|
-
|
|
133
|
+
const result = await client.invokeTool<SlackResponse>(
|
|
134
|
+
'slack',
|
|
135
|
+
'message.post',
|
|
136
|
+
{ channel: 'C123456', text: 'Hello!' },
|
|
137
|
+
[vc]
|
|
138
|
+
)
|
|
76
139
|
```
|
|
77
140
|
|
|
78
|
-
|
|
141
|
+
### Memory
|
|
79
142
|
|
|
80
|
-
|
|
143
|
+
Vector-backed memory with VC authorization:
|
|
81
144
|
|
|
82
|
-
|
|
145
|
+
```typescript
|
|
146
|
+
await client.writeMemory('Meeting notes: ...', 'project-alpha', [vc], {
|
|
147
|
+
type: 'meeting-notes',
|
|
148
|
+
})
|
|
83
149
|
|
|
84
|
-
|
|
150
|
+
const results = await client.queryMemory('latest meeting decisions', [vc], {
|
|
151
|
+
namespace: 'project-alpha',
|
|
152
|
+
limit: 10,
|
|
153
|
+
})
|
|
154
|
+
```
|
|
85
155
|
|
|
86
|
-
|
|
156
|
+
## Action Registry
|
|
87
157
|
|
|
88
|
-
|
|
158
|
+
All supported actions are defined in `ACTION_REGISTRY` using `provider.resource.operation` format:
|
|
89
159
|
|
|
90
|
-
|
|
160
|
+
| Provider | Actions |
|
|
161
|
+
|----------|---------|
|
|
162
|
+
| **Slack** | `message.post`, `message.read`, `message.update`, `message.delete`, `channel.read`, `user.read`, `batch.read` |
|
|
163
|
+
| **GitHub** | `issue.create`, `issue.list`, `issue.read`, `issue.update` |
|
|
164
|
+
| **Gmail** | `message.search`, `message.read`, `message.send`, `label.read`, `batch.read` |
|
|
165
|
+
| **Calendar** | Calendar operations |
|
|
166
|
+
| **JIRA** | Issue management |
|
|
167
|
+
| **OS** | Local operations |
|
|
91
168
|
|
|
92
|
-
|
|
169
|
+
Each action defines: risk level, required relations, required scopes, input schema, constraints, and effects.
|
|
93
170
|
|
|
94
|
-
|
|
171
|
+
```typescript
|
|
172
|
+
import { ACTION_REGISTRY, indexActions } from '@vess-id/ai-identity'
|
|
95
173
|
|
|
96
|
-
|
|
174
|
+
const actions = indexActions(ACTION_REGISTRY)
|
|
175
|
+
const slackPost = actions.get('slack.message.post')
|
|
176
|
+
// { risk: 'high', required_relations: ['editor', 'admin', ...], ... }
|
|
177
|
+
```
|
|
97
178
|
|
|
98
|
-
|
|
179
|
+
## Permission Constraints
|
|
99
180
|
|
|
100
|
-
|
|
181
|
+
Fine-grained access control on VCs:
|
|
101
182
|
|
|
102
|
-
|
|
183
|
+
```typescript
|
|
184
|
+
interface PermissionConstraints {
|
|
185
|
+
time?: {
|
|
186
|
+
not_before?: number // Unix timestamp
|
|
187
|
+
not_after?: number
|
|
188
|
+
recurring_start?: string // "09:00"
|
|
189
|
+
recurring_end?: string // "17:00"
|
|
190
|
+
days_of_week?: number[] // [1,2,3,4,5] (Mon-Fri)
|
|
191
|
+
timezone?: string
|
|
192
|
+
}
|
|
193
|
+
max_invocations?: number
|
|
194
|
+
rate_limit_per_min?: number
|
|
195
|
+
}
|
|
196
|
+
```
|
|
103
197
|
|
|
104
|
-
|
|
198
|
+
The `ConstraintEvaluator` checks: expiration, invocation limits, time windows, IP allowlists, and risk thresholds.
|
|
105
199
|
|
|
106
|
-
|
|
200
|
+
## Registry Utilities
|
|
107
201
|
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
202
|
+
```typescript
|
|
203
|
+
import {
|
|
204
|
+
// Action normalization (MCP interop)
|
|
205
|
+
normalizeMcpActionName,
|
|
206
|
+
getAllValidMcpActionNames,
|
|
207
|
+
|
|
208
|
+
// Action aliases
|
|
209
|
+
canonicalizeAction,
|
|
210
|
+
isActionEquivalent,
|
|
211
|
+
|
|
212
|
+
// Providers
|
|
213
|
+
resolveProvider,
|
|
214
|
+
CANONICAL_PROVIDERS, // 'slack' | 'github' | 'gmail' | 'calendar' | 'jira' | 'os'
|
|
215
|
+
|
|
216
|
+
// Access orchestration (ABAC/ReBAC)
|
|
217
|
+
resolveActionsFromSelection,
|
|
218
|
+
planDelegationForVC,
|
|
219
|
+
checkPermissionWithVP,
|
|
220
|
+
} from '@vess-id/ai-identity'
|
|
221
|
+
```
|
|
111
222
|
|
|
112
|
-
|
|
223
|
+
## Gateway Client
|
|
113
224
|
|
|
114
|
-
-
|
|
115
|
-
- `listIssues`: List repository issues
|
|
116
|
-
- `getRepo`: Get repository information
|
|
225
|
+
Event-based communication for CLI and daemon:
|
|
117
226
|
|
|
118
|
-
|
|
227
|
+
```typescript
|
|
228
|
+
import { GatewayClient } from '@vess-id/ai-identity'
|
|
119
229
|
|
|
120
|
-
|
|
121
|
-
- `listMails`: List email messages
|
|
122
|
-
- `getLabels`: Get available labels
|
|
230
|
+
const gateway = new GatewayClient({ baseUrl: 'https://app.vesslabs.ai' })
|
|
123
231
|
|
|
124
|
-
|
|
232
|
+
// Long-poll for events
|
|
233
|
+
const { events, cursor } = await gateway.getEvents({
|
|
234
|
+
cursor: lastCursor,
|
|
235
|
+
waitSeconds: 30,
|
|
236
|
+
})
|
|
125
237
|
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
238
|
+
// Acknowledge processed event
|
|
239
|
+
await gateway.ackEvent(event.id)
|
|
240
|
+
```
|
|
129
241
|
|
|
130
242
|
## Configuration
|
|
131
243
|
|
|
@@ -150,24 +262,19 @@ interface AIdentityConfig {
|
|
|
150
262
|
baseUrl: string
|
|
151
263
|
}
|
|
152
264
|
storage?: {
|
|
153
|
-
keyStorePath?: string
|
|
265
|
+
keyStorePath?: string // Default: ~/.vess-aidentity/keys
|
|
154
266
|
}
|
|
155
267
|
}
|
|
156
268
|
```
|
|
157
269
|
|
|
158
|
-
## Examples
|
|
159
|
-
|
|
160
|
-
See the `examples/` directory for complete usage examples:
|
|
161
|
-
|
|
162
|
-
- `basic-usage.ts`: Basic SDK usage
|
|
163
|
-
- `github-integration.ts`: GitHub integration example
|
|
164
|
-
|
|
165
270
|
## Security
|
|
166
271
|
|
|
167
|
-
-
|
|
168
|
-
-
|
|
272
|
+
- Agents use `did:jwk` identifiers with EC P-256 key pairs
|
|
273
|
+
- Private keys are stored locally with optional password encryption
|
|
274
|
+
- VCs use SD-JWT format with selective disclosure
|
|
169
275
|
- VPs include nonce and domain binding to prevent replay attacks
|
|
170
|
-
- All tool invocations require
|
|
276
|
+
- All tool invocations require valid VP authorization
|
|
277
|
+
- Constraint evaluation enforces time windows, invocation limits, IP allowlists, and risk thresholds
|
|
171
278
|
|
|
172
279
|
## License
|
|
173
280
|
|
package/dist/client.d.ts
CHANGED
|
@@ -5,9 +5,8 @@ import { VCManager } from './vc/vc-manager';
|
|
|
5
5
|
import { VPManager } from './vp/vp-manager';
|
|
6
6
|
import { ToolManager } from './tool/tool-manager';
|
|
7
7
|
import { MemoryManager } from './memory/memory-manager';
|
|
8
|
-
import { OrganizationManager } from './organization/organization-manager';
|
|
9
8
|
import { GrantManager } from './grant/grant-manager';
|
|
10
|
-
import { Agent, ConnectorResponse } from '
|
|
9
|
+
import { Agent, ConnectorResponse } from './types';
|
|
11
10
|
export declare class AIdentityClient {
|
|
12
11
|
readonly agent: AgentManager;
|
|
13
12
|
readonly user: UserIdentityManager;
|
|
@@ -15,7 +14,6 @@ export declare class AIdentityClient {
|
|
|
15
14
|
readonly vp: VPManager;
|
|
16
15
|
readonly tool: ToolManager;
|
|
17
16
|
readonly memory: MemoryManager;
|
|
18
|
-
readonly organization: OrganizationManager;
|
|
19
17
|
readonly grant: GrantManager;
|
|
20
18
|
private keyManager;
|
|
21
19
|
private currentAgent?;
|
|
@@ -75,6 +73,5 @@ export declare class AIdentityClient {
|
|
|
75
73
|
}): Promise<import("./memory/memory-manager").MemoryQueryResult>;
|
|
76
74
|
}
|
|
77
75
|
export declare function getClient(config?: AIdentityConfig, password?: string): AIdentityClient;
|
|
78
|
-
export * from '@vess-id/ai-identity-types';
|
|
79
76
|
export { configure, AIdentityConfig } from './config';
|
|
80
77
|
//# sourceMappingURL=client.d.ts.map
|
package/dist/client.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAa,MAAM,UAAU,CAAA;AACrD,OAAO,EAAE,YAAY,EAAE,MAAM,aAAa,CAAA;AAE1C,OAAO,EAAE,mBAAmB,EAAE,MAAM,kCAAkC,CAAA;AACtE,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAA;AAC3C,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAA;AAC3C,OAAO,EAAE,WAAW,EAAE,MAAM,qBAAqB,CAAA;AACjD,OAAO,EAAE,aAAa,EAAE,MAAM,yBAAyB,CAAA;AACvD,OAAO,EAAE,
|
|
1
|
+
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAa,MAAM,UAAU,CAAA;AACrD,OAAO,EAAE,YAAY,EAAE,MAAM,aAAa,CAAA;AAE1C,OAAO,EAAE,mBAAmB,EAAE,MAAM,kCAAkC,CAAA;AACtE,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAA;AAC3C,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAA;AAC3C,OAAO,EAAE,WAAW,EAAE,MAAM,qBAAqB,CAAA;AACjD,OAAO,EAAE,aAAa,EAAE,MAAM,yBAAyB,CAAA;AACvD,OAAO,EAAE,YAAY,EAAE,MAAM,uBAAuB,CAAA;AACpD,OAAO,EAAE,KAAK,EAAE,iBAAiB,EAAE,MAAM,SAAS,CAAA;AAElD,qBAAa,eAAe;IAC1B,SAAgB,KAAK,EAAE,YAAY,CAAA;IACnC,SAAgB,IAAI,EAAE,mBAAmB,CAAA;IACzC,SAAgB,EAAE,EAAE,SAAS,CAAA;IAC7B,SAAgB,EAAE,EAAE,SAAS,CAAA;IAC7B,SAAgB,IAAI,EAAE,WAAW,CAAA;IACjC,SAAgB,MAAM,EAAE,aAAa,CAAA;IACrC,SAAgB,KAAK,EAAE,YAAY,CAAA;IAEnC,OAAO,CAAC,UAAU,CAAY;IAC9B,OAAO,CAAC,YAAY,CAAC,CAAO;gBAEhB,MAAM,CAAC,EAAE,eAAe,EAAE,QAAQ,CAAC,EAAE,MAAM;IAkBvD;;OAEG;IACG,KAAK,CAAC,GAAG,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,KAAK,CAAC;IAWzC;;OAEG;IACH,eAAe,IAAI,KAAK,GAAG,SAAS;IAIpC;;OAEG;IACG,iBAAiB,IAAI,OAAO,CAAC,MAAM,CAAC;IAI1C;;OAEG;IACG,iBAAiB,IAAI,OAAO,CAAC,MAAM,CAAC;IAI1C;;;OAGG;IACG,mBAAmB,CACvB,IAAI,EAAE,MAAM,EACZ,MAAM,EAAE,MAAM,EACd,OAAO,EAAE;QACP,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,OAAO,CAAC,EAAE,MAAM,CAAA;QAChB,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB,aAAa,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAA;QACnC,SAAS,CAAC,EAAE,MAAM,CAAA;KACnB,GACA,OAAO,CAAC,MAAM,CAAC;IAiBlB;;;OAGG;IACG,eAAe,CACnB,QAAQ,EAAE,MAAM,EAChB,OAAO,EAAE,CAAC,MAAM,GAAG,OAAO,GAAG,QAAQ,CAAC,EAAE,EACxC,OAAO,EAAE;QACP,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,OAAO,CAAC,EAAE,MAAM,CAAA;QAChB,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB,SAAS,CAAC,EAAE,MAAM,CAAA;KACnB,GACA,OAAO,CAAC,MAAM,CAAC;IAgBlB;;OAEG;IACG,UAAU,CAAC,CAAC,GAAG,GAAG,EACtB,IAAI,EAAE,MAAM,EACZ,MAAM,EAAE,MAAM,EACd,MAAM,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EAC3B,GAAG,EAAE,MAAM,EAAE,GACZ,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC,CAAC;IAYhC;;OAEG;IACG,WAAW,CACf,OAAO,EAAE,MAAM,EACf,SAAS,EAAE,MAAM,EACjB,GAAG,EAAE,MAAM,EAAE,EACb,QAAQ,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC;IAehC;;OAEG;IACG,WAAW,CACf,KAAK,EAAE,MAAM,EACb,GAAG,EAAE,MAAM,EAAE,EACb,OAAO,CAAC,EAAE;QACR,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB,KAAK,CAAC,EAAE,MAAM,CAAA;QACd,MAAM,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAA;KAC7B;CAaJ;AAKD,wBAAgB,SAAS,CAAC,MAAM,CAAC,EAAE,eAAe,EAAE,QAAQ,CAAC,EAAE,MAAM,GAAG,eAAe,CAKtF;AAED,OAAO,EAAE,SAAS,EAAE,eAAe,EAAE,MAAM,UAAU,CAAA"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { GrantConstraints, TimeWindowConstraint, EvaluationContext } from '
|
|
1
|
+
import { GrantConstraints, TimeWindowConstraint, EvaluationContext } from '../../../types';
|
|
2
2
|
export declare const mockExecutorDid = "did:key:z6MkiY62766b1LJkExWMsM3QG4WtX23zJpRgVLwZBKQhyt6d";
|
|
3
3
|
/**
|
|
4
4
|
* Create mock time window constraint
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"constraint.fixtures.d.ts","sourceRoot":"","sources":["../../../../src/constraint/__tests__/fixtures/constraint.fixtures.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,gBAAgB,EAChB,oBAAoB,EACpB,iBAAiB,EAClB,MAAM,
|
|
1
|
+
{"version":3,"file":"constraint.fixtures.d.ts","sourceRoot":"","sources":["../../../../src/constraint/__tests__/fixtures/constraint.fixtures.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,gBAAgB,EAChB,oBAAoB,EACpB,iBAAiB,EAClB,MAAM,gBAAgB,CAAA;AAGvB,eAAO,MAAM,eAAe,6DAA6D,CAAA;AAEzF;;GAEG;AACH,eAAO,MAAM,oBAAoB,GAAI,YAAW,OAAO,CAAC,oBAAoB,CAAM,KAAG,oBAMnF,CAAA;AAEF;;GAEG;AACH,eAAO,MAAM,qBAAqB,GAAI,YAAW,OAAO,CAAC,gBAAgB,CAAM,KAAG,gBAOhF,CAAA;AAEF;;GAEG;AACH,eAAO,MAAM,iBAAiB,GAAI,YAAW,OAAO,CAAC,iBAAiB,CAAM,KAAG,iBAc7E,CAAA;AAEF;;GAEG;AACH,eAAO,MAAM,wBAAwB,QAAO,gBAW1C,CAAA;AAEF;;GAEG;AACH,eAAO,MAAM,kCAAkC,QAAO,gBAOpD,CAAA;AAEF;;GAEG;AACH,eAAO,MAAM,0BAA0B,QAAO,gBAE5C,CAAA;AAEF;;GAEG;AACH,eAAO,MAAM,6BAA6B,QAAO,gBAE/C,CAAA;AAEF;;GAEG;AACH,eAAO,MAAM,yBAAyB,QAAO,oBAK3C,CAAA;AAEF;;GAEG;AACH,eAAO,MAAM,OAAO;;;;;;;CAOnB,CAAA;AAED;;GAEG;AACH,eAAO,MAAM,oBAAoB;;;;;;CAchC,CAAA"}
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
* ConstraintEvaluator
|
|
3
3
|
* Grant制約の評価ロジック
|
|
4
4
|
*/
|
|
5
|
-
import { GrantConstraints, TimeWindowConstraint, EvaluationContext, ConstraintEvaluationResult, ConstraintViolation, ConstraintWarning } from '
|
|
5
|
+
import { GrantConstraints, TimeWindowConstraint, EvaluationContext, ConstraintEvaluationResult, ConstraintViolation, ConstraintWarning, PermissionConstraints, PermissionTimeConstraint } from '../types';
|
|
6
6
|
export interface ConstraintEvaluatorOptions {
|
|
7
7
|
/** 警告を発する残り実行回数の閾値 */
|
|
8
8
|
invocationWarningThreshold?: number;
|
|
@@ -54,11 +54,42 @@ export declare class ConstraintEvaluator {
|
|
|
54
54
|
violation?: ConstraintViolation;
|
|
55
55
|
warning?: ConstraintWarning;
|
|
56
56
|
};
|
|
57
|
+
/**
|
|
58
|
+
* Evaluate PermissionConstraints from a PermissionRule.
|
|
59
|
+
*
|
|
60
|
+
* This is the VC-level constraint evaluator that works with the
|
|
61
|
+
* normalized PermissionConstraints format (as opposed to GrantConstraints).
|
|
62
|
+
*
|
|
63
|
+
* Used by the PolicyEvaluator after rule matching to verify
|
|
64
|
+
* rule-level constraints are satisfied.
|
|
65
|
+
*/
|
|
66
|
+
evaluatePermissionConstraints(constraints: PermissionConstraints, context: {
|
|
67
|
+
now: number;
|
|
68
|
+
ipAddress?: string;
|
|
69
|
+
riskScore?: number;
|
|
70
|
+
invocationCount?: number;
|
|
71
|
+
}): {
|
|
72
|
+
allowed: boolean;
|
|
73
|
+
violations: ConstraintViolation[];
|
|
74
|
+
warnings: ConstraintWarning[];
|
|
75
|
+
};
|
|
76
|
+
/**
|
|
77
|
+
* Check PermissionTimeConstraint (supports both absolute and recurring)
|
|
78
|
+
*/
|
|
79
|
+
checkPermissionTimeConstraint(time: PermissionTimeConstraint, currentTime: Date): {
|
|
80
|
+
violation?: ConstraintViolation;
|
|
81
|
+
warning?: ConstraintWarning;
|
|
82
|
+
};
|
|
57
83
|
private getDayOfWeekInTimezone;
|
|
58
84
|
private getTimeInTimezone;
|
|
59
85
|
private getDayName;
|
|
60
86
|
private timeToMinutes;
|
|
61
|
-
|
|
87
|
+
/**
|
|
88
|
+
* Check if an IP address is within a CIDR range or matches exactly.
|
|
89
|
+
* Uses unsigned 32-bit arithmetic to avoid sign-bit issues.
|
|
90
|
+
* Public for reuse by other services (e.g., LocalPolicyEvaluatorService).
|
|
91
|
+
*/
|
|
92
|
+
isIpInCidr(ip: string, cidr: string): boolean;
|
|
62
93
|
private ipToNumber;
|
|
63
94
|
}
|
|
64
95
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"constraint-evaluator.d.ts","sourceRoot":"","sources":["../../src/constraint/constraint-evaluator.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,OAAO,EACL,gBAAgB,EAChB,oBAAoB,EACpB,iBAAiB,EACjB,0BAA0B,EAC1B,mBAAmB,EACnB,iBAAiB,
|
|
1
|
+
{"version":3,"file":"constraint-evaluator.d.ts","sourceRoot":"","sources":["../../src/constraint/constraint-evaluator.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,OAAO,EACL,gBAAgB,EAChB,oBAAoB,EACpB,iBAAiB,EACjB,0BAA0B,EAC1B,mBAAmB,EACnB,iBAAiB,EACjB,qBAAqB,EACrB,wBAAwB,EACzB,MAAM,UAAU,CAAA;AAEjB,MAAM,WAAW,0BAA0B;IACzC,sBAAsB;IACtB,0BAA0B,CAAC,EAAE,MAAM,CAAA;IACnC,2CAA2C;IAC3C,gBAAgB,CAAC,EAAE,MAAM,CAAA;IACzB,kBAAkB;IAClB,eAAe,CAAC,EAAE,MAAM,CAAA;CACzB;AAQD;;GAEG;AACH,qBAAa,mBAAmB;IAC9B,OAAO,CAAC,OAAO,CAA4B;gBAE/B,OAAO,CAAC,EAAE,OAAO,CAAC,0BAA0B,CAAC;IAIzD;;OAEG;IACH,QAAQ,CACN,WAAW,EAAE,gBAAgB,EAC7B,OAAO,EAAE,iBAAiB,EAC1B,kBAAkB,EAAE,MAAM,EAC1B,SAAS,CAAC,EAAE,IAAI,GACf,0BAA0B;IAgE7B;;OAEG;IACH,eAAe,CACb,cAAc,CAAC,EAAE,IAAI,EACrB,mBAAmB,CAAC,EAAE,MAAM,GAC3B;QAAE,SAAS,CAAC,EAAE,mBAAmB,CAAA;KAAE;IA4BtC;;OAEG;IACH,oBAAoB,CAClB,cAAc,CAAC,EAAE,MAAM,EACvB,kBAAkB,CAAC,EAAE,MAAM,GAC1B;QAAE,SAAS,CAAC,EAAE,mBAAmB,CAAC;QAAC,OAAO,CAAC,EAAE,iBAAiB,CAAA;KAAE;IA8BnE;;OAEG;IACH,eAAe,CACb,UAAU,EAAE,oBAAoB,EAChC,WAAW,EAAE,IAAI,GAChB;QAAE,SAAS,CAAC,EAAE,mBAAmB,CAAC;QAAC,OAAO,CAAC,EAAE,iBAAiB,CAAA;KAAE;IAoEnE;;OAEG;IACH,gBAAgB,CACd,SAAS,EAAE,MAAM,EAAE,EACnB,SAAS,EAAE,MAAM,GAChB;QAAE,SAAS,CAAC,EAAE,mBAAmB,CAAA;KAAE;IA6BtC;;OAEG;IACH,kBAAkB,CAChB,SAAS,EAAE,MAAM,EACjB,YAAY,EAAE,MAAM,GACnB;QAAE,SAAS,CAAC,EAAE,mBAAmB,CAAC;QAAC,OAAO,CAAC,EAAE,iBAAiB,CAAA;KAAE;IA6BnE;;;;;;;;OAQG;IACH,6BAA6B,CAC3B,WAAW,EAAE,qBAAqB,EAClC,OAAO,EAAE;QACP,GAAG,EAAE,MAAM,CAAA;QACX,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB,eAAe,CAAC,EAAE,MAAM,CAAA;KACzB,GACA;QAAE,OAAO,EAAE,OAAO,CAAC;QAAC,UAAU,EAAE,mBAAmB,EAAE,CAAC;QAAC,QAAQ,EAAE,iBAAiB,EAAE,CAAA;KAAE;IA4CzF;;OAEG;IACH,6BAA6B,CAC3B,IAAI,EAAE,wBAAwB,EAC9B,WAAW,EAAE,IAAI,GAChB;QAAE,SAAS,CAAC,EAAE,mBAAmB,CAAC;QAAC,OAAO,CAAC,EAAE,iBAAiB,CAAA;KAAE;IAsDnE,OAAO,CAAC,sBAAsB;IAW9B,OAAO,CAAC,iBAAiB;IAczB,OAAO,CAAC,UAAU;IAKlB,OAAO,CAAC,aAAa;IAKrB;;;;OAIG;IACH,UAAU,CAAC,EAAE,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO;IAoB7C,OAAO,CAAC,UAAU;CAWnB;AAED;;GAEG;AACH,eAAO,MAAM,0BAA0B,qBAA4B,CAAA;AAEnE;;GAEG;AACH,wBAAgB,mBAAmB,CACjC,WAAW,EAAE,gBAAgB,EAC7B,OAAO,EAAE,iBAAiB,EAC1B,kBAAkB,EAAE,MAAM,EAC1B,SAAS,CAAC,EAAE,IAAI,GACf,0BAA0B,CAE5B"}
|
package/dist/did/agent.d.ts
CHANGED
package/dist/did/agent.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"agent.d.ts","sourceRoot":"","sources":["../../src/did/agent.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,EAAE,WAAW,EAAE,MAAM,
|
|
1
|
+
{"version":3,"file":"agent.d.ts","sourceRoot":"","sources":["../../src/did/agent.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,EAAE,WAAW,EAAE,MAAM,UAAU,CAAA;AAE7C,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAA;AAI1C,qBAAa,YAAY;IACvB,OAAO,CAAC,UAAU,CAAY;IAC9B,OAAO,CAAC,eAAe,CAAiB;gBAE5B,UAAU,CAAC,EAAE,UAAU;IAKnC;;OAEG;IACG,MAAM,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,GAAG,OAAO,CAAC,KAAK,GAAG;QAAE,EAAE,EAAE,MAAM,CAAA;KAAE,CAAC;IA8B7E;;OAEG;IACG,WAAW,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAInD;;OAEG;IACG,QAAQ,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,KAAK,GAAG;QAAE,EAAE,EAAE,MAAM,CAAA;KAAE,CAAC;IAYhE;;OAEG;IACG,WAAW,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAIjD;;OAEG;IACG,OAAO,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,WAAW,CAAC;IAuBhD;;OAEG;IACG,MAAM,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC;QAAE,KAAK,EAAE,KAAK,CAAC;QAAC,UAAU,EAAE,GAAG,CAAA;KAAE,CAAC;IAiBrE;;OAEG;IACG,MAAM,CAAC,KAAK,EAAE,KAAK,EAAE,UAAU,EAAE,GAAG,GAAG,OAAO,CAAC,IAAI,CAAC;IAI1D;;OAEG;IACG,IAAI,IAAI,OAAO,CAAC,KAAK,CAAC,KAAK,GAAG;QAAE,EAAE,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IAqBlD,OAAO,CAAC,iBAAiB;IAqB3B,OAAO,CAAC,oBAAoB;YAQd,WAAW;CAK1B"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { VPManager } from '../vp/vp-manager';
|
|
2
|
-
import { Grant, GrantStatus, CreateGrantRequest, UpdateGrantRequest, CheckGrantPermissionRequest, CheckGrantPermissionResult } from '
|
|
2
|
+
import { Grant, GrantStatus, CreateGrantRequest, UpdateGrantRequest, CheckGrantPermissionRequest, CheckGrantPermissionResult } from '../types';
|
|
3
3
|
/**
|
|
4
4
|
* Grant提案レスポンス
|
|
5
5
|
*/
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"grant-manager.d.ts","sourceRoot":"","sources":["../../src/grant/grant-manager.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,kBAAkB,CAAA;AAE5C,OAAO,EACL,KAAK,EACL,WAAW,EACX,kBAAkB,EAClB,kBAAkB,EAClB,2BAA2B,EAC3B,0BAA0B,EAC3B,MAAM,
|
|
1
|
+
{"version":3,"file":"grant-manager.d.ts","sourceRoot":"","sources":["../../src/grant/grant-manager.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,kBAAkB,CAAA;AAE5C,OAAO,EACL,KAAK,EACL,WAAW,EACX,kBAAkB,EAClB,kBAAkB,EAClB,2BAA2B,EAC3B,0BAA0B,EAC3B,MAAM,UAAU,CAAA;AAEjB;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B,EAAE,EAAE,MAAM,CAAA;IACV,YAAY,EAAE,MAAM,CAAA;IACpB,MAAM,CAAC,EAAE,MAAM,CAAA;IACf,SAAS,EAAE,MAAM,CAAA;IACjB,QAAQ,EAAE,MAAM,CAAA;IAChB,gBAAgB,EAAE,MAAM,EAAE,CAAA;IAC1B,kBAAkB,EAAE,KAAK,CAAC;QACxB,IAAI,EAAE,MAAM,CAAA;QACZ,EAAE,CAAC,EAAE,MAAM,CAAA;QACX,OAAO,CAAC,EAAE,MAAM,CAAA;QAChB,IAAI,CAAC,EAAE,MAAM,CAAA;KACd,CAAC,CAAA;IACF,QAAQ,EAAE;QACR,YAAY,EAAE,GAAG,CAAA;QACjB,MAAM,EAAE,MAAM,EAAE,CAAA;KACjB,CAAA;IACD,SAAS,EAAE,MAAM,CAAA;CAClB;AAED;;GAEG;AACH,MAAM,WAAW,mBAAmB;IAClC,YAAY,EAAE,MAAM,CAAA;IACpB,eAAe,EAAE,MAAM,EAAE,CAAA;IACzB,iBAAiB,EAAE,KAAK,CAAC;QACvB,IAAI,EAAE,MAAM,CAAA;QACZ,EAAE,CAAC,EAAE,MAAM,CAAA;QACX,OAAO,CAAC,EAAE,MAAM,CAAA;QAChB,IAAI,CAAC,EAAE,MAAM,CAAA;QACb,QAAQ,EAAE,OAAO,CAAA;KAClB,CAAC,CAAA;IACF,WAAW,EAAE;QACX,cAAc,CAAC,EAAE,MAAM,CAAA;QACvB,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB,UAAU,CAAC,EAAE;YACX,KAAK,EAAE,MAAM,CAAA;YACb,GAAG,EAAE,MAAM,CAAA;YACX,QAAQ,EAAE,MAAM,CAAA;YAChB,UAAU,EAAE,MAAM,EAAE,CAAA;SACrB,CAAA;KACF,CAAA;IACD,IAAI,CAAC,EAAE,MAAM,CAAA;IACb,WAAW,CAAC,EAAE,MAAM,CAAA;CACrB;AAED;;;GAGG;AACH,qBAAa,YAAY;gBACX,UAAU,EAAE,SAAS;IAIjC;;;;;;;OAOG;IACG,OAAO,CACX,OAAO,EAAE;QACP,YAAY,EAAE,MAAM,CAAA;QACpB,MAAM,EAAE,MAAM,CAAA;QACd,SAAS,EAAE,MAAM,CAAA;KAClB,EACD,WAAW,EAAE;QACX,KAAK,CAAC,EAAE,MAAM,CAAA;QACd,SAAS,CAAC,EAAE,MAAM,CAAA;KACnB,GACA,OAAO,CAAC,eAAe,CAAC;IA4B3B;;;;OAIG;IACG,OAAO,CACX,OAAO,EAAE,mBAAmB,EAC5B,WAAW,EAAE;QACX,KAAK,CAAC,EAAE,MAAM,CAAA;QACd,SAAS,CAAC,EAAE,MAAM,CAAA;KACnB,GACA,OAAO,CAAC,KAAK,CAAC;IA4BjB;;;;OAIG;IACG,MAAM,CACV,OAAO,EAAE,kBAAkB,EAC3B,WAAW,EAAE;QACX,KAAK,CAAC,EAAE,MAAM,CAAA;QACd,SAAS,CAAC,EAAE,MAAM,CAAA;KACnB,GACA,OAAO,CAAC,KAAK,CAAC;IA4BjB;;;;OAIG;IACG,WAAW,CACf,MAAM,EAAE,MAAM,EACd,MAAM,CAAC,EAAE,WAAW,GACnB,OAAO,CAAC;QAAE,MAAM,EAAE,KAAK,EAAE,CAAC;QAAC,KAAK,EAAE,MAAM,CAAA;KAAE,CAAC;IAuB9C;;;;OAIG;IACG,aAAa,CACjB,SAAS,EAAE,MAAM,EACjB,MAAM,CAAC,EAAE,WAAW,GACnB,OAAO,CAAC;QAAE,MAAM,EAAE,KAAK,EAAE,CAAC;QAAC,KAAK,EAAE,MAAM,CAAA;KAAE,CAAC;IAuB9C;;;OAGG;IACG,GAAG,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,KAAK,CAAC;IAkB1C;;;;;OAKG;IACG,MAAM,CACV,OAAO,EAAE,MAAM,EACf,MAAM,EAAE,MAAM,EACd,WAAW,EAAE;QACX,KAAK,CAAC,EAAE,MAAM,CAAA;QACd,SAAS,CAAC,EAAE,MAAM,CAAA;KACnB,GACA,OAAO,CAAC,KAAK,CAAC;IA4BjB;;;OAGG;IACG,eAAe,CACnB,OAAO,EAAE,2BAA2B,GACnC,OAAO,CAAC,0BAA0B,CAAC;IAmBtC;;;;;OAKG;IACG,MAAM,CACV,OAAO,EAAE,MAAM,EACf,OAAO,EAAE,kBAAkB,EAC3B,WAAW,EAAE;QACX,KAAK,CAAC,EAAE,MAAM,CAAA;QACd,SAAS,CAAC,EAAE,MAAM,CAAA;KACnB,GACA,OAAO,CAAC,KAAK,CAAC;CA2BlB"}
|
|
@@ -60,6 +60,12 @@ export interface DeviceEnrollPollResult {
|
|
|
60
60
|
export declare class DeviceEnrollManager {
|
|
61
61
|
private baseUrl;
|
|
62
62
|
constructor(baseUrl: string);
|
|
63
|
+
/**
|
|
64
|
+
* Build common headers for all API requests.
|
|
65
|
+
* Includes User-Agent and ngrok-skip-browser-warning to avoid
|
|
66
|
+
* ngrok free-tier interstitial pages blocking programmatic access.
|
|
67
|
+
*/
|
|
68
|
+
private buildHeaders;
|
|
63
69
|
/**
|
|
64
70
|
* Start the device enrollment flow.
|
|
65
71
|
* Sends the root DID public key to the Gateway and gets a user code.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"device-enroll-manager.d.ts","sourceRoot":"","sources":["../../src/identity/device-enroll-manager.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;GAiBG;AAEH,MAAM,WAAW,uBAAuB;IACtC,OAAO,EAAE,MAAM,CAAA;IACf,YAAY,EAAE;QACZ,GAAG,EAAE,MAAM,CAAA;QACX,GAAG,EAAE,MAAM,CAAA;QACX,CAAC,EAAE,MAAM,CAAA;QACT,CAAC,CAAC,EAAE,MAAM,CAAA;QACV,GAAG,CAAC,EAAE,MAAM,CAAA;QACZ,GAAG,CAAC,EAAE,MAAM,CAAA;KACb,CAAA;IACD,UAAU,CAAC,EAAE;QACX,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,EAAE,CAAC,EAAE,MAAM,CAAA;QACX,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,QAAQ,CAAC,EAAE,MAAM,CAAA;QACjB,CAAC,GAAG,EAAE,MAAM,GAAG,GAAG,CAAA;KACnB,CAAA;IACD,OAAO,CAAC,EAAE,MAAM,CAAA;CACjB;AAED,MAAM,WAAW,4BAA4B;IAC3C,UAAU,CAAC,EAAE;QACX,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,EAAE,CAAC,EAAE,MAAM,CAAA;QACX,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,QAAQ,CAAC,EAAE,MAAM,CAAA;QACjB,CAAC,GAAG,EAAE,MAAM,GAAG,GAAG,CAAA;KACnB,CAAA;IACD,OAAO,CAAC,EAAE,MAAM,CAAA;CACjB;AAED,MAAM,WAAW,uBAAuB;IACtC,SAAS,EAAE,MAAM,CAAA;IACjB,QAAQ,EAAE,MAAM,CAAA;IAChB,eAAe,EAAE,MAAM,CAAA;IACvB,SAAS,EAAE,MAAM,CAAA;CAClB;AAED,MAAM,WAAW,sBAAsB;IACrC,MAAM,EAAE,SAAS,GAAG,UAAU,GAAG,SAAS,GAAG,QAAQ,CAAA;IACrD,kBAAkB,CAAC,EAAE,MAAM,CAAA;IAC3B,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,OAAO,CAAC,EAAE,MAAM,CAAA;CACjB;AAED,qBAAa,mBAAmB;IAC9B,OAAO,CAAC,OAAO,CAAQ;gBAEX,OAAO,EAAE,MAAM;IAI3B;;;;;;OAMG;IACG,qBAAqB,CACzB,MAAM,EAAE,uBAAuB,GAC9B,OAAO,CAAC,uBAAuB,CAAC;IA2BnC;;;;;;;OAOG;IACG,yBAAyB,CAC7B,MAAM,EAAE,4BAA4B,GACnC,OAAO,CAAC,uBAAuB,CAAC;IA0BnC;;;;;;;OAOG;IACG,oBAAoB,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,sBAAsB,CAAC;IAsB9E;;;;;;;;OAQG;IACG,aAAa,CACjB,MAAM,EAAE,uBAAuB,EAC/B,UAAU,EAAE,CAAC,IAAI,EAAE,uBAAuB,KAAK,IAAI,EACnD,cAAc,GAAE,MAAa,EAC7B,QAAQ,GAAE,MAAY,GACrB,OAAO,CAAC,sBAAsB,CAAC;IAKlC;;;;;;;;OAQG;IACG,uBAAuB,CAC3B,MAAM,EAAE,4BAA4B,EACpC,UAAU,EAAE,CAAC,IAAI,EAAE,uBAAuB,KAAK,IAAI,EACnD,cAAc,GAAE,MAAa,EAC7B,QAAQ,GAAE,MAAY,GACrB,OAAO,CAAC,sBAAsB,CAAC;YAKpB,iBAAiB;CAoBhC"}
|
|
1
|
+
{"version":3,"file":"device-enroll-manager.d.ts","sourceRoot":"","sources":["../../src/identity/device-enroll-manager.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;GAiBG;AAEH,MAAM,WAAW,uBAAuB;IACtC,OAAO,EAAE,MAAM,CAAA;IACf,YAAY,EAAE;QACZ,GAAG,EAAE,MAAM,CAAA;QACX,GAAG,EAAE,MAAM,CAAA;QACX,CAAC,EAAE,MAAM,CAAA;QACT,CAAC,CAAC,EAAE,MAAM,CAAA;QACV,GAAG,CAAC,EAAE,MAAM,CAAA;QACZ,GAAG,CAAC,EAAE,MAAM,CAAA;KACb,CAAA;IACD,UAAU,CAAC,EAAE;QACX,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,EAAE,CAAC,EAAE,MAAM,CAAA;QACX,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,QAAQ,CAAC,EAAE,MAAM,CAAA;QACjB,CAAC,GAAG,EAAE,MAAM,GAAG,GAAG,CAAA;KACnB,CAAA;IACD,OAAO,CAAC,EAAE,MAAM,CAAA;CACjB;AAED,MAAM,WAAW,4BAA4B;IAC3C,UAAU,CAAC,EAAE;QACX,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,EAAE,CAAC,EAAE,MAAM,CAAA;QACX,UAAU,CAAC,EAAE,MAAM,CAAA;QACnB,QAAQ,CAAC,EAAE,MAAM,CAAA;QACjB,CAAC,GAAG,EAAE,MAAM,GAAG,GAAG,CAAA;KACnB,CAAA;IACD,OAAO,CAAC,EAAE,MAAM,CAAA;CACjB;AAED,MAAM,WAAW,uBAAuB;IACtC,SAAS,EAAE,MAAM,CAAA;IACjB,QAAQ,EAAE,MAAM,CAAA;IAChB,eAAe,EAAE,MAAM,CAAA;IACvB,SAAS,EAAE,MAAM,CAAA;CAClB;AAED,MAAM,WAAW,sBAAsB;IACrC,MAAM,EAAE,SAAS,GAAG,UAAU,GAAG,SAAS,GAAG,QAAQ,CAAA;IACrD,kBAAkB,CAAC,EAAE,MAAM,CAAA;IAC3B,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,OAAO,CAAC,EAAE,MAAM,CAAA;CACjB;AAED,qBAAa,mBAAmB;IAC9B,OAAO,CAAC,OAAO,CAAQ;gBAEX,OAAO,EAAE,MAAM;IAI3B;;;;OAIG;IACH,OAAO,CAAC,YAAY;IAQpB;;;;;;OAMG;IACG,qBAAqB,CACzB,MAAM,EAAE,uBAAuB,GAC9B,OAAO,CAAC,uBAAuB,CAAC;IA2BnC;;;;;;;OAOG;IACG,yBAAyB,CAC7B,MAAM,EAAE,4BAA4B,GACnC,OAAO,CAAC,uBAAuB,CAAC;IA0BnC;;;;;;;OAOG;IACG,oBAAoB,CAAC,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,sBAAsB,CAAC;IAsB9E;;;;;;;;OAQG;IACG,aAAa,CACjB,MAAM,EAAE,uBAAuB,EAC/B,UAAU,EAAE,CAAC,IAAI,EAAE,uBAAuB,KAAK,IAAI,EACnD,cAAc,GAAE,MAAa,EAC7B,QAAQ,GAAE,MAAY,GACrB,OAAO,CAAC,sBAAsB,CAAC;IAKlC;;;;;;;;OAQG;IACG,uBAAuB,CAC3B,MAAM,EAAE,4BAA4B,EACpC,UAAU,EAAE,CAAC,IAAI,EAAE,uBAAuB,KAAK,IAAI,EACnD,cAAc,GAAE,MAAa,EAC7B,QAAQ,GAAE,MAAY,GACrB,OAAO,CAAC,sBAAsB,CAAC;YAKpB,iBAAiB;CAoBhC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"user-identity-manager.d.ts","sourceRoot":"","sources":["../../src/identity/user-identity-manager.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAA;AAG/C,OAAO,EAAE,WAAW,EAAE,MAAM,
|
|
1
|
+
{"version":3,"file":"user-identity-manager.d.ts","sourceRoot":"","sources":["../../src/identity/user-identity-manager.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAA;AAG/C,OAAO,EAAE,WAAW,EAAE,MAAM,UAAU,CAAA;AAEtC;;;;GAIG;AACH,qBAAa,mBAAmB;IAC9B,OAAO,CAAC,UAAU,CAAY;IAC9B,OAAO,CAAC,cAAc,CAAsB;gBAEhC,UAAU,CAAC,EAAE,UAAU;IAInC;;;OAGG;IACG,iBAAiB,IAAI,OAAO,CAAC,MAAM,CAAC;IAgB1C;;OAEG;IACG,aAAa,IAAI,OAAO,CAAC,MAAM,CAAC;IAiBtC;;OAEG;IACG,cAAc,IAAI,OAAO,CAAC,GAAG,CAAC;IAcpC;;OAEG;IACG,cAAc,CAAC,GAAG,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,WAAW,CAAC;IAUxD;;OAEG;IACG,kBAAkB,IAAI,OAAO,CAAC;QAAE,GAAG,EAAE,MAAM,CAAC;QAAC,UAAU,EAAE,GAAG,CAAC;QAAC,WAAW,EAAE,WAAW,CAAA;KAAE,CAAC;IAY/F;;OAEG;IACG,kBAAkB,CAAC,MAAM,EAAE;QAAE,GAAG,EAAE,MAAM,CAAC;QAAC,UAAU,EAAE,GAAG,CAAA;KAAE,GAAG,OAAO,CAAC,IAAI,CAAC;IASjF;;OAEG;IACG,iBAAiB,IAAI,OAAO,CAAC,MAAM,CAAC;IAY1C;;OAEG;IACH,OAAO,CAAC,oBAAoB;IAK5B;;OAEG;IACH,OAAO,CAAC,iBAAiB;IAqBzB;;OAEG;YACW,WAAW;IAYzB;;OAEG;YACW,WAAW;IAczB;;OAEG;YACW,YAAY;CAa3B"}
|