@vorionsys/contracts 0.1.1 → 0.1.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +44 -0
- package/LICENSE +190 -0
- package/README.md +373 -84
- package/dist/aci/index.d.ts +4 -70
- package/dist/aci/index.d.ts.map +1 -1
- package/dist/aci/index.js +18 -373
- package/dist/aci/index.js.map +1 -1
- package/dist/canonical/agent.d.ts +15 -15
- package/dist/canonical/agent.d.ts.map +1 -1
- package/dist/canonical/governance.d.ts +8 -8
- package/dist/canonical/intent.d.ts +18 -18
- package/dist/canonical/middleware.d.ts +4 -4
- package/dist/canonical/trust-signal.d.ts +48 -45
- package/dist/canonical/trust-signal.d.ts.map +1 -1
- package/dist/canonical/trust-signal.js +7 -2
- package/dist/canonical/trust-signal.js.map +1 -1
- package/dist/canonical/validation.d.ts +11 -26
- package/dist/canonical/validation.d.ts.map +1 -1
- package/dist/canonical/validation.js +30 -101
- package/dist/canonical/validation.js.map +1 -1
- package/dist/car/attestation.d.ts +30 -30
- package/dist/car/attestation.d.ts.map +1 -1
- package/dist/car/attestation.js +3 -1
- package/dist/car/attestation.js.map +1 -1
- package/dist/car/car-string.d.ts +47 -47
- package/dist/car/car-string.d.ts.map +1 -1
- package/dist/car/car-string.js +36 -36
- package/dist/car/car-string.js.map +1 -1
- package/dist/car/domains.d.ts +34 -18
- package/dist/car/domains.d.ts.map +1 -1
- package/dist/car/domains.js +53 -15
- package/dist/car/domains.js.map +1 -1
- package/dist/car/effective-permission.d.ts +61 -13
- package/dist/car/effective-permission.d.ts.map +1 -1
- package/dist/car/effective-permission.js +30 -2
- package/dist/car/effective-permission.js.map +1 -1
- package/dist/car/identity.d.ts +327 -108
- package/dist/car/identity.d.ts.map +1 -1
- package/dist/car/identity.js +112 -10
- package/dist/car/identity.js.map +1 -1
- package/dist/car/index.d.ts +3 -3
- package/dist/car/index.d.ts.map +1 -1
- package/dist/car/index.js +15 -7
- package/dist/car/index.js.map +1 -1
- package/dist/car/jwt-claims.d.ts +273 -273
- package/dist/car/jwt-claims.d.ts.map +1 -1
- package/dist/car/jwt-claims.js +39 -46
- package/dist/car/jwt-claims.js.map +1 -1
- package/dist/car/levels.d.ts +2 -2
- package/dist/car/mapping.d.ts +36 -36
- package/dist/car/mapping.d.ts.map +1 -1
- package/dist/car/mapping.js +107 -43
- package/dist/car/mapping.js.map +1 -1
- package/dist/car/skills.d.ts +4 -4
- package/dist/car/tiers.d.ts +7 -7
- package/dist/car/tiers.js +10 -10
- package/dist/car/tiers.js.map +1 -1
- package/dist/common/primitives.d.ts +2 -2
- package/dist/db/agents.d.ts +549 -9
- package/dist/db/agents.d.ts.map +1 -1
- package/dist/db/agents.js +4 -4
- package/dist/db/agents.js.map +1 -1
- package/dist/db/api-keys.d.ts +144 -3
- package/dist/db/api-keys.d.ts.map +1 -1
- package/dist/db/escalations.d.ts +156 -2
- package/dist/db/escalations.d.ts.map +1 -1
- package/dist/db/intents.d.ts +154 -3
- package/dist/db/intents.d.ts.map +1 -1
- package/dist/db/merkle.d.ts +134 -3
- package/dist/db/merkle.d.ts.map +1 -1
- package/dist/db/operations.d.ts +71 -2
- package/dist/db/operations.d.ts.map +1 -1
- package/dist/db/policy-versions.d.ts +38 -1
- package/dist/db/policy-versions.d.ts.map +1 -1
- package/dist/db/proofs.d.ts +119 -3
- package/dist/db/proofs.d.ts.map +1 -1
- package/dist/db/rbac.d.ts +233 -6
- package/dist/db/rbac.d.ts.map +1 -1
- package/dist/db/service-accounts.d.ts +218 -6
- package/dist/db/service-accounts.d.ts.map +1 -1
- package/dist/db/trust.d.ts +168 -2
- package/dist/db/trust.d.ts.map +1 -1
- package/dist/db/webhooks.d.ts +103 -1
- package/dist/db/webhooks.d.ts.map +1 -1
- package/dist/v2/enums.d.ts +5 -0
- package/dist/v2/enums.d.ts.map +1 -1
- package/dist/v2/enums.js +5 -0
- package/dist/v2/enums.js.map +1 -1
- package/dist/v2/evidence.d.ts +20 -20
- package/dist/v2/pre-action-gate.js +5 -5
- package/dist/v2/pre-action-gate.js.map +1 -1
- package/dist/v2/proof-event.d.ts +3 -1
- package/dist/v2/proof-event.d.ts.map +1 -1
- package/dist/v2/retention.d.ts +14 -14
- package/dist/v2/trust-delta.d.ts +6 -6
- package/dist/v2/trust-delta.d.ts.map +1 -1
- package/dist/v2/trust-profile.d.ts +116 -54
- package/dist/v2/trust-profile.d.ts.map +1 -1
- package/dist/v2/trust-profile.js +22 -17
- package/dist/v2/trust-profile.js.map +1 -1
- package/dist/validators/decision.d.ts +6 -6
- package/dist/validators/intent.d.ts +8 -8
- package/dist/validators/proof-event.d.ts +57 -54
- package/dist/validators/proof-event.d.ts.map +1 -1
- package/dist/validators/proof-event.js +2 -1
- package/dist/validators/proof-event.js.map +1 -1
- package/dist/validators/trust-profile.d.ts +76 -244
- package/dist/validators/trust-profile.d.ts.map +1 -1
- package/dist/validators/trust-profile.js +21 -35
- package/dist/validators/trust-profile.js.map +1 -1
- package/package.json +26 -11
- package/dist/aci/aci-string.d.ts +0 -539
- package/dist/aci/aci-string.d.ts.map +0 -1
- package/dist/aci/aci-string.js +0 -581
- package/dist/aci/aci-string.js.map +0 -1
- package/dist/aci/attestation.d.ts +0 -648
- package/dist/aci/attestation.d.ts.map +0 -1
- package/dist/aci/attestation.js +0 -299
- package/dist/aci/attestation.js.map +0 -1
- package/dist/aci/domains.d.ts +0 -260
- package/dist/aci/domains.d.ts.map +0 -1
- package/dist/aci/domains.js +0 -340
- package/dist/aci/domains.js.map +0 -1
- package/dist/aci/effective-permission.d.ts +0 -371
- package/dist/aci/effective-permission.d.ts.map +0 -1
- package/dist/aci/effective-permission.js +0 -364
- package/dist/aci/effective-permission.js.map +0 -1
- package/dist/aci/identity.d.ts +0 -1100
- package/dist/aci/identity.d.ts.map +0 -1
- package/dist/aci/identity.js +0 -338
- package/dist/aci/identity.js.map +0 -1
- package/dist/aci/jwt-claims.d.ts +0 -756
- package/dist/aci/jwt-claims.d.ts.map +0 -1
- package/dist/aci/jwt-claims.js +0 -345
- package/dist/aci/jwt-claims.js.map +0 -1
- package/dist/aci/levels.d.ts +0 -279
- package/dist/aci/levels.d.ts.map +0 -1
- package/dist/aci/levels.js +0 -486
- package/dist/aci/levels.js.map +0 -1
- package/dist/aci/mapping.d.ts +0 -291
- package/dist/aci/mapping.d.ts.map +0 -1
- package/dist/aci/mapping.js +0 -447
- package/dist/aci/mapping.js.map +0 -1
- package/dist/aci/skills.d.ts +0 -314
- package/dist/aci/skills.d.ts.map +0 -1
- package/dist/aci/skills.js +0 -426
- package/dist/aci/skills.js.map +0 -1
- package/dist/aci/tiers.d.ts +0 -403
- package/dist/aci/tiers.d.ts.map +0 -1
- package/dist/aci/tiers.js +0 -686
- package/dist/aci/tiers.js.map +0 -1
package/README.md
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# @vorionsys/contracts
|
|
2
2
|
|
|
3
|
-
Shared schemas, types, and validators for the Vorion platform
|
|
3
|
+
Shared schemas, types, and validators for the Vorion platform -- the single source of truth for trust profiles, intents, decisions, proof events, governance types, and feature flags used across all Vorion services.
|
|
4
4
|
|
|
5
5
|
## Installation
|
|
6
6
|
|
|
@@ -8,139 +8,428 @@ Shared schemas, types, and validators for the Vorion platform. Provides Zod-vali
|
|
|
8
8
|
npm install @vorionsys/contracts
|
|
9
9
|
```
|
|
10
10
|
|
|
11
|
+
**Peer dependency:** TypeScript >= 5.0 (required for type inference).
|
|
12
|
+
|
|
13
|
+
## What This Package Provides
|
|
14
|
+
|
|
15
|
+
| Category | Description |
|
|
16
|
+
|---|---|
|
|
17
|
+
| **v2 Contract Types** | TypeScript interfaces for Intent, Decision, TrustProfile, ProofEvent, PolicyBundle, CanaryProbe, PreActionGate, Evidence, and Retention |
|
|
18
|
+
| **Enums & Constants** | `TrustBand`, `ObservationTier`, `DecisionTier`, `ActionType`, `DataSensitivity`, `ProofEventType`, `RiskLevel`, and more |
|
|
19
|
+
| **Canonical Agent Types** | Zod-validated schemas for agent lifecycle, runtime status, capabilities, permissions, tasks, configuration, and governance |
|
|
20
|
+
| **CAR (Categorical Agentic Registry)** | Agent identity, CAR string parsing/generation, capability levels (L0-L7), certification/runtime tiers (T0-T7), attestations, JWT claims, effective permissions, domain/skill bitmasks |
|
|
21
|
+
| **Validators** | Zod schemas for runtime validation of intents, decisions, trust profiles, and proof events |
|
|
22
|
+
| **Common Primitives** | UUID, SemVer, Timestamp, Hash, Actor, TrustBand, AutonomyLevel, Severity, and RiskLevel schemas |
|
|
23
|
+
| **Feature Flags** | Centralized `FLAGS` registry with metadata, categories, and utility functions |
|
|
24
|
+
| **Database Schemas** | Drizzle ORM table definitions for agents, tenants, attestations, proofs, and more |
|
|
25
|
+
|
|
11
26
|
## Quick Start
|
|
12
27
|
|
|
13
28
|
```typescript
|
|
14
29
|
import {
|
|
15
|
-
|
|
16
|
-
IntentSchema,
|
|
17
|
-
DecisionSchema,
|
|
30
|
+
// Enums
|
|
18
31
|
ObservationTier,
|
|
19
|
-
|
|
32
|
+
TrustBand,
|
|
33
|
+
DecisionTier,
|
|
34
|
+
ActionType,
|
|
35
|
+
|
|
36
|
+
// Interfaces (v2 contracts)
|
|
37
|
+
type Intent,
|
|
38
|
+
type Decision,
|
|
39
|
+
type TrustProfile,
|
|
40
|
+
type ProofEvent,
|
|
41
|
+
|
|
42
|
+
// Canonical agent schemas (Zod)
|
|
43
|
+
agentConfigSchema,
|
|
44
|
+
agentLifecycleStatusSchema,
|
|
45
|
+
|
|
46
|
+
// Feature flags
|
|
47
|
+
FLAGS,
|
|
48
|
+
isFeatureEnabled,
|
|
49
|
+
|
|
50
|
+
// Canonical namespace
|
|
51
|
+
Canonical,
|
|
20
52
|
} from '@vorionsys/contracts';
|
|
21
53
|
|
|
22
|
-
//
|
|
23
|
-
const
|
|
24
|
-
|
|
54
|
+
// Use enums directly
|
|
55
|
+
const band = TrustBand.T4_STANDARD;
|
|
56
|
+
const tier = ObservationTier.GRAY_BOX;
|
|
57
|
+
|
|
58
|
+
// Validate agent config with Zod
|
|
59
|
+
const config = agentConfigSchema.parse({
|
|
60
|
+
agentId: 'agent-001',
|
|
61
|
+
userId: 'user-001',
|
|
62
|
+
userRole: 'operator',
|
|
63
|
+
status: 'active',
|
|
25
64
|
trustScore: 750,
|
|
26
|
-
|
|
27
|
-
|
|
65
|
+
name: 'Invoice Processor',
|
|
66
|
+
capabilities: ['execute', 'external'],
|
|
28
67
|
});
|
|
29
68
|
|
|
30
|
-
//
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
timestamp: new Date().toISOString(),
|
|
35
|
-
});
|
|
69
|
+
// Check feature flags
|
|
70
|
+
if (isFeatureEnabled(FLAGS.TRUST_EDGE_CACHE)) {
|
|
71
|
+
// edge caching is enabled
|
|
72
|
+
}
|
|
36
73
|
```
|
|
37
74
|
|
|
38
|
-
## Features
|
|
39
|
-
|
|
40
|
-
- **Zod Runtime Validation**: All types have corresponding Zod schemas for runtime safety
|
|
41
|
-
- **v2 Contract Types**: Intent, Decision, TrustProfile, ProofEvent, PolicyBundle, and more
|
|
42
|
-
- **Canonical Types**: Governance schemas for agent classification and compliance
|
|
43
|
-
- **ACI Contracts**: Agent Classification Identifier schemas
|
|
44
|
-
- **CAR Types**: Categorical Agentic Registry type definitions
|
|
45
|
-
- **Database Schemas**: Shared database type definitions
|
|
46
|
-
- **Feature Flags**: Centralized feature flag type contracts
|
|
47
|
-
|
|
48
75
|
## Subpath Imports
|
|
49
76
|
|
|
77
|
+
The package exposes granular entry points so you only import what you need:
|
|
78
|
+
|
|
50
79
|
```typescript
|
|
51
|
-
//
|
|
52
|
-
import {
|
|
80
|
+
// Root -- v2 types + canonical agent types + feature flags
|
|
81
|
+
import { TrustBand, ObservationTier, FLAGS } from '@vorionsys/contracts';
|
|
53
82
|
|
|
54
|
-
// Common shared types
|
|
55
|
-
import {
|
|
83
|
+
// Common shared primitives and legacy types
|
|
84
|
+
import { UUIDSchema, ActorSchema, TrustBandSchema } from '@vorionsys/contracts/common';
|
|
56
85
|
|
|
57
86
|
// v2 contract types
|
|
58
|
-
import {
|
|
59
|
-
|
|
60
|
-
// Validators
|
|
61
|
-
import { ... } from '@vorionsys/contracts/validators';
|
|
87
|
+
import type { Intent, Decision, TrustProfile } from '@vorionsys/contracts/v2';
|
|
62
88
|
|
|
63
|
-
//
|
|
64
|
-
import {
|
|
89
|
+
// Zod validators for v2 types
|
|
90
|
+
import {
|
|
91
|
+
intentSchema,
|
|
92
|
+
decisionSchema,
|
|
93
|
+
trustProfileSchema,
|
|
94
|
+
validate,
|
|
95
|
+
safeValidate,
|
|
96
|
+
} from '@vorionsys/contracts/validators';
|
|
97
|
+
|
|
98
|
+
// CAR (Categorical Agentic Registry) -- identity, capabilities, tiers
|
|
99
|
+
import {
|
|
100
|
+
parseCAR,
|
|
101
|
+
generateCAR,
|
|
102
|
+
CapabilityLevel,
|
|
103
|
+
CertificationTier,
|
|
104
|
+
RuntimeTier,
|
|
105
|
+
calculateEffectivePermission,
|
|
106
|
+
} from '@vorionsys/contracts/car';
|
|
65
107
|
|
|
66
108
|
// Canonical governance types
|
|
67
|
-
import {
|
|
109
|
+
import {
|
|
110
|
+
type TrustBandName,
|
|
111
|
+
type TrustScoreRange,
|
|
112
|
+
type RiskLevel,
|
|
113
|
+
} from '@vorionsys/contracts/canonical';
|
|
68
114
|
|
|
69
|
-
//
|
|
70
|
-
import { ... } from '@vorionsys/contracts/
|
|
115
|
+
// Canonical governance (direct subpath)
|
|
116
|
+
import { ... } from '@vorionsys/contracts/canonical/governance';
|
|
71
117
|
|
|
72
|
-
//
|
|
73
|
-
import {
|
|
118
|
+
// Database schemas (Drizzle ORM)
|
|
119
|
+
import { agents, tenants, type Agent } from '@vorionsys/contracts/db';
|
|
74
120
|
```
|
|
75
121
|
|
|
76
|
-
##
|
|
122
|
+
## Usage Examples
|
|
77
123
|
|
|
78
|
-
###
|
|
124
|
+
### Validating Data with Zod Schemas
|
|
79
125
|
|
|
80
|
-
|
|
126
|
+
```typescript
|
|
127
|
+
import {
|
|
128
|
+
intentSchema,
|
|
129
|
+
validate,
|
|
130
|
+
safeValidate,
|
|
131
|
+
formatValidationErrors,
|
|
132
|
+
} from '@vorionsys/contracts/validators';
|
|
81
133
|
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
- **Intent**: Agent action requests with resource and parameters
|
|
85
|
-
- **Decision**: Governance decisions (ALLOW/DENY/ESCALATE) with reasoning
|
|
86
|
-
- **TrustDelta**: Trust score changes from signals
|
|
87
|
-
- **ProofEvent**: Immutable audit trail entries
|
|
88
|
-
- **PolicyBundle**: Governance policy definitions
|
|
89
|
-
- **CanaryProbe**: ATSF v2.0 canary probe definitions
|
|
90
|
-
- **PreActionGate**: ATSF v2.0 pre-action gate contracts
|
|
91
|
-
- **Evidence/Retention**: ERPL compliance types
|
|
134
|
+
// Throws ZodError on invalid data
|
|
135
|
+
const intent = validate(intentSchema, incomingData);
|
|
92
136
|
|
|
93
|
-
|
|
137
|
+
// Returns a result object instead of throwing
|
|
138
|
+
const result = safeValidate(intentSchema, incomingData);
|
|
139
|
+
if (result.success) {
|
|
140
|
+
console.log('Valid intent:', result.data);
|
|
141
|
+
} else {
|
|
142
|
+
console.error(formatValidationErrors(result.errors));
|
|
143
|
+
}
|
|
144
|
+
```
|
|
94
145
|
|
|
95
|
-
|
|
146
|
+
### Canonical Agent Configuration
|
|
96
147
|
|
|
97
148
|
```typescript
|
|
98
|
-
import
|
|
149
|
+
import {
|
|
150
|
+
agentConfigSchema,
|
|
151
|
+
agentCapabilitySchema,
|
|
152
|
+
type AgentConfig,
|
|
153
|
+
type AgentLifecycleStatus,
|
|
154
|
+
canTransitionLifecycleStatus,
|
|
155
|
+
} from '@vorionsys/contracts';
|
|
99
156
|
|
|
100
|
-
//
|
|
101
|
-
|
|
102
|
-
```
|
|
157
|
+
// Validate and narrow types
|
|
158
|
+
const config: AgentConfig = agentConfigSchema.parse(rawData);
|
|
103
159
|
|
|
104
|
-
|
|
160
|
+
// Check lifecycle transitions
|
|
161
|
+
const canActivate = canTransitionLifecycleStatus('training', 'active'); // true
|
|
162
|
+
const canArchive = canTransitionLifecycleStatus('archived', 'active'); // false
|
|
163
|
+
```
|
|
105
164
|
|
|
106
|
-
|
|
165
|
+
### CAR String Parsing and Generation
|
|
107
166
|
|
|
108
167
|
```typescript
|
|
109
|
-
import {
|
|
168
|
+
import {
|
|
169
|
+
parseCAR,
|
|
170
|
+
generateCAR,
|
|
171
|
+
CapabilityLevel,
|
|
172
|
+
calculateEffectivePermission,
|
|
173
|
+
CertificationTier,
|
|
174
|
+
RuntimeTier,
|
|
175
|
+
} from '@vorionsys/contracts/car';
|
|
176
|
+
|
|
177
|
+
// Parse a CAR string into its components
|
|
178
|
+
const parsed = parseCAR('a3i.acme-corp.invoice-bot:ABF-L3@1.0.0');
|
|
179
|
+
// => { registry: 'a3i', organization: 'acme-corp', agentClass: 'invoice-bot',
|
|
180
|
+
// domains: ['A', 'B', 'F'], level: 3, version: '1.0.0' }
|
|
181
|
+
|
|
182
|
+
// Generate a CAR string
|
|
183
|
+
const car = generateCAR({
|
|
184
|
+
registry: 'a3i',
|
|
185
|
+
organization: 'acme-corp',
|
|
186
|
+
agentClass: 'invoice-bot',
|
|
187
|
+
domains: ['A', 'B', 'F'],
|
|
188
|
+
level: CapabilityLevel.L3_EXECUTE,
|
|
189
|
+
version: '1.0.0',
|
|
190
|
+
});
|
|
191
|
+
// => 'a3i.acme-corp.invoice-bot:ABF-L3@1.0.0'
|
|
192
|
+
|
|
193
|
+
// Calculate effective permission
|
|
194
|
+
const permission = calculateEffectivePermission({
|
|
195
|
+
certificationTier: CertificationTier.T3_MONITORED,
|
|
196
|
+
competenceLevel: CapabilityLevel.L4_STANDARD,
|
|
197
|
+
runtimeTier: RuntimeTier.T3_MONITORED,
|
|
198
|
+
observabilityCeiling: 4,
|
|
199
|
+
contextPolicyCeiling: 3,
|
|
200
|
+
});
|
|
201
|
+
```
|
|
110
202
|
|
|
111
|
-
|
|
112
|
-
const intent = IntentSchema.parse(data);
|
|
203
|
+
### Feature Flags
|
|
113
204
|
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
205
|
+
```typescript
|
|
206
|
+
import {
|
|
207
|
+
FLAGS,
|
|
208
|
+
isFeatureEnabled,
|
|
209
|
+
getEnabledFeatures,
|
|
210
|
+
getFlagsByCategory,
|
|
211
|
+
getFlagMeta,
|
|
212
|
+
type FeatureFlag,
|
|
213
|
+
} from '@vorionsys/contracts';
|
|
214
|
+
|
|
215
|
+
// Check a flag (uses defaultEnabled from metadata)
|
|
216
|
+
if (isFeatureEnabled(FLAGS.PROOF_STREAMING)) {
|
|
217
|
+
// enable streaming proof pipeline
|
|
120
218
|
}
|
|
121
219
|
|
|
122
|
-
//
|
|
123
|
-
|
|
220
|
+
// Check with overrides (useful for testing)
|
|
221
|
+
const enabled = isFeatureEnabled(FLAGS.ZK_PROOFS, {
|
|
222
|
+
[FLAGS.ZK_PROOFS]: true,
|
|
223
|
+
});
|
|
224
|
+
|
|
225
|
+
// Get all trust-related flags
|
|
226
|
+
const trustFlags = getFlagsByCategory('trust');
|
|
227
|
+
|
|
228
|
+
// Get metadata for a flag
|
|
229
|
+
const meta = getFlagMeta(FLAGS.MERKLE_PROOFS);
|
|
230
|
+
// => { flag: 'merkle_proofs', name: 'Merkle Proofs', category: 'crypto', phase: 7, ... }
|
|
231
|
+
```
|
|
232
|
+
|
|
233
|
+
### Common Primitives
|
|
234
|
+
|
|
235
|
+
```typescript
|
|
236
|
+
import {
|
|
237
|
+
UUIDSchema,
|
|
238
|
+
TimestampSchema,
|
|
239
|
+
HashSchema,
|
|
240
|
+
ActorSchema,
|
|
241
|
+
TrustBandSchema,
|
|
242
|
+
DecisionOutcomeSchema,
|
|
243
|
+
type Actor,
|
|
244
|
+
type UUID,
|
|
245
|
+
} from '@vorionsys/contracts/common';
|
|
246
|
+
|
|
247
|
+
// Validate a UUID
|
|
248
|
+
const id: UUID = UUIDSchema.parse('550e8400-e29b-41d4-a716-446655440000');
|
|
249
|
+
|
|
250
|
+
// Validate an actor
|
|
251
|
+
const actor: Actor = ActorSchema.parse({
|
|
252
|
+
type: 'AGENT',
|
|
253
|
+
id: 'agent-001',
|
|
254
|
+
name: 'Invoice Bot',
|
|
255
|
+
});
|
|
124
256
|
```
|
|
125
257
|
|
|
258
|
+
## API Reference
|
|
259
|
+
|
|
260
|
+
### Root Exports (`@vorionsys/contracts`)
|
|
261
|
+
|
|
262
|
+
Re-exports everything from v2 contracts, canonical agent types, and feature flags.
|
|
263
|
+
|
|
264
|
+
#### Enums
|
|
265
|
+
|
|
266
|
+
| Export | Description |
|
|
267
|
+
|---|---|
|
|
268
|
+
| `TrustBand` | Trust bands T0 (Sandbox) through T7 (Autonomous) |
|
|
269
|
+
| `ObservationTier` | Observation tiers: BLACK_BOX, GRAY_BOX, WHITE_BOX, ATTESTED_BOX, VERIFIED_BOX |
|
|
270
|
+
| `DecisionTier` | Three-tier governance: GREEN, YELLOW, RED |
|
|
271
|
+
| `ActionType` | Action categories: read, write, delete, execute, communicate, transfer |
|
|
272
|
+
| `DataSensitivity` | Data classification: PUBLIC, INTERNAL, CONFIDENTIAL, RESTRICTED |
|
|
273
|
+
| `Reversibility` | Action reversibility: REVERSIBLE, PARTIALLY_REVERSIBLE, IRREVERSIBLE |
|
|
274
|
+
| `ProofEventType` | Proof event types: intent_received, decision_made, trust_delta, etc. |
|
|
275
|
+
| `ComponentType` | Component registry types: agent, service, adapter, policy_bundle |
|
|
276
|
+
| `ComponentStatus` | Lifecycle: active, deprecated, retired |
|
|
277
|
+
| `ApprovalType` | Approval types: none, human_review, automated_check, multi_party |
|
|
278
|
+
| `RefinementAction` | Refinement actions for YELLOW decisions |
|
|
279
|
+
| `WorkflowState` | Workflow lifecycle states |
|
|
280
|
+
| `DenialReason` | Structured denial reason codes |
|
|
281
|
+
| `RiskProfile` | Temporal risk profiles for outcome tracking |
|
|
282
|
+
|
|
283
|
+
#### Interfaces (v2 Contracts)
|
|
284
|
+
|
|
285
|
+
| Export | Description |
|
|
286
|
+
|---|---|
|
|
287
|
+
| `TrustProfile` | Complete agent trust state with dimensions, weights, and evidence |
|
|
288
|
+
| `TrustDimensions` | Five trust dimensions: CT, BT, GT, XT, AC |
|
|
289
|
+
| `Intent` | Agent action request with resource scope and context |
|
|
290
|
+
| `Decision` | Authorization result with constraints and reasoning |
|
|
291
|
+
| `FluidDecision` | Extended decision with GREEN/YELLOW/RED tiers and refinement |
|
|
292
|
+
| `ProofEvent` | Immutable hash-chained audit trail entry |
|
|
293
|
+
| `PolicyBundle` | Collection of governance policy rules |
|
|
294
|
+
| `CanaryProbe` | ATSF v2.0 continuous behavioral verification probe |
|
|
295
|
+
| `PreActionGateConfig` | Pre-action verification gate configuration |
|
|
296
|
+
| `WorkflowInstance` | Tracks intent lifecycle through governance |
|
|
297
|
+
|
|
298
|
+
#### Constants
|
|
299
|
+
|
|
300
|
+
| Export | Description |
|
|
301
|
+
|---|---|
|
|
302
|
+
| `OBSERVATION_CEILINGS` | Trust ceiling values per observation tier |
|
|
303
|
+
| `DEFAULT_TRUST_WEIGHTS` | Default weights for trust dimensions |
|
|
304
|
+
| `DEFAULT_BAND_THRESHOLDS` | Score thresholds for T0-T7 bands |
|
|
305
|
+
| `DEFAULT_TRUST_DYNAMICS` | Asymmetric trust gain/loss configuration |
|
|
306
|
+
| `DEFAULT_CANARY_CONFIG` | Canary probe injection defaults |
|
|
307
|
+
| `DEFAULT_GATE_CONFIG` | Pre-action gate defaults |
|
|
308
|
+
| `TRUST_THRESHOLDS` | Trust thresholds per risk level |
|
|
309
|
+
| `EVIDENCE_TYPE_MULTIPLIERS` | Weight multipliers per evidence type |
|
|
310
|
+
| `RISK_PROFILE_WINDOWS` | Outcome windows per risk profile |
|
|
311
|
+
|
|
312
|
+
#### Feature Flags
|
|
313
|
+
|
|
314
|
+
| Export | Description |
|
|
315
|
+
|---|---|
|
|
316
|
+
| `FLAGS` | Feature flag registry (const object) |
|
|
317
|
+
| `FLAG_METADATA` | Metadata for each flag (name, description, category, phase) |
|
|
318
|
+
| `FeatureFlag` | Type for flag string values |
|
|
319
|
+
| `FeatureFlagMeta` | Interface for flag metadata |
|
|
320
|
+
| `isFeatureEnabled(flag, overrides?)` | Check if a flag is enabled |
|
|
321
|
+
| `getEnabledFeatures(overrides?)` | Get all enabled flags |
|
|
322
|
+
| `getFlagsByCategory(category)` | Get flags by category |
|
|
323
|
+
| `getFlagsByPhase(phase)` | Get flags by implementation phase |
|
|
324
|
+
| `getFlagMeta(flag)` | Get metadata for a flag |
|
|
325
|
+
|
|
326
|
+
#### Canonical Agent Types
|
|
327
|
+
|
|
328
|
+
| Export | Description |
|
|
329
|
+
|---|---|
|
|
330
|
+
| `AgentLifecycleStatus` | draft, training, active, suspended, archived |
|
|
331
|
+
| `AgentRuntimeStatus` | IDLE, WORKING, PAUSED, ERROR, OFFLINE |
|
|
332
|
+
| `AgentPermission` | execute, external, delegate, spawn, admin |
|
|
333
|
+
| `AgentSpecialization` | core, security, development, operations, etc. |
|
|
334
|
+
| `AgentConfig` | Full agent configuration interface |
|
|
335
|
+
| `AgentTask` | Task assignment structure |
|
|
336
|
+
| `agentConfigSchema` | Zod schema for AgentConfig validation |
|
|
337
|
+
| `agentTaskSchema` | Zod schema for AgentTask validation |
|
|
338
|
+
| `agentCapabilitySchema` | Zod schema for AgentCapability validation |
|
|
339
|
+
| `canTransitionLifecycleStatus()` | Validates lifecycle state transitions |
|
|
340
|
+
|
|
341
|
+
### Validators (`@vorionsys/contracts/validators`)
|
|
342
|
+
|
|
343
|
+
| Export | Description |
|
|
344
|
+
|---|---|
|
|
345
|
+
| `intentSchema` | Zod schema for Intent validation |
|
|
346
|
+
| `decisionSchema` | Zod schema for Decision validation |
|
|
347
|
+
| `trustProfileSchema` | Zod schema for TrustProfile validation |
|
|
348
|
+
| `proofEventSchema` | Zod schema for ProofEvent validation |
|
|
349
|
+
| `trustDimensionsSchema` | Zod schema for TrustDimensions |
|
|
350
|
+
| `validate(schema, data)` | Validates and throws on failure |
|
|
351
|
+
| `safeValidate(schema, data)` | Validates and returns result object |
|
|
352
|
+
| `formatValidationErrors(errors)` | Formats ZodIssue[] for display |
|
|
353
|
+
|
|
354
|
+
### CAR Module (`@vorionsys/contracts/car`)
|
|
355
|
+
|
|
356
|
+
| Export | Description |
|
|
357
|
+
|---|---|
|
|
358
|
+
| `parseCAR(str)` / `tryParseCAR(str)` | Parse CAR strings into components |
|
|
359
|
+
| `generateCAR(options)` | Generate CAR string from components |
|
|
360
|
+
| `validateCAR(str)` / `isValidCAR(str)` | Validate CAR string format |
|
|
361
|
+
| `CapabilityLevel` | Enum: L0_NONE through L7_AUTONOMOUS |
|
|
362
|
+
| `CertificationTier` | Enum: T0_SANDBOX through T7_AUTONOMOUS |
|
|
363
|
+
| `RuntimeTier` | Enum: T0_SANDBOX through T7_AUTONOMOUS |
|
|
364
|
+
| `calculateEffectivePermission()` | Compute effective permission from context |
|
|
365
|
+
| `createAgentIdentity()` | Create a new AgentIdentity record |
|
|
366
|
+
| `generateJWTClaims()` | Generate OIDC JWT claims for an agent |
|
|
367
|
+
| `createAttestation()` / `verifyAttestation()` | Attestation management |
|
|
368
|
+
| `encodeDomains()` / `decodeDomains()` | Domain bitmask operations |
|
|
369
|
+
| `encodeSkills()` / `decodeSkills()` | Skill bitmask operations |
|
|
370
|
+
|
|
371
|
+
### Common Module (`@vorionsys/contracts/common`)
|
|
372
|
+
|
|
373
|
+
| Export | Description |
|
|
374
|
+
|---|---|
|
|
375
|
+
| `UUIDSchema` | Zod UUID validator |
|
|
376
|
+
| `SemVerSchema` | Zod SemVer string validator |
|
|
377
|
+
| `TimestampSchema` | Zod ISO datetime validator |
|
|
378
|
+
| `HashSchema` | Zod SHA-256 hex string validator |
|
|
379
|
+
| `ActorSchema` | Zod Actor object validator |
|
|
380
|
+
| `TrustBandSchema` | Zod TrustBand enum validator (T0-T7) |
|
|
381
|
+
| `AutonomyLevelSchema` | Zod AutonomyLevel enum validator |
|
|
382
|
+
| `DecisionOutcomeSchema` | Zod DecisionOutcome enum validator |
|
|
383
|
+
| `SeveritySchema` | Zod Severity level validator |
|
|
384
|
+
| `RiskLevelSchema` | Zod RiskLevel validator |
|
|
385
|
+
| `VorionError` | Base error class with code and details |
|
|
386
|
+
| `TrustInsufficientError` | Typed error for trust level failures |
|
|
387
|
+
|
|
388
|
+
### Canonical Module (`@vorionsys/contracts/canonical`)
|
|
389
|
+
|
|
390
|
+
Governance and agent classification schemas including trust bands, trust scores, risk levels, trust signals, governance rules, and middleware types with runtime Zod validation.
|
|
391
|
+
|
|
392
|
+
### Database Module (`@vorionsys/contracts/db`)
|
|
393
|
+
|
|
394
|
+
Drizzle ORM table definitions for the platform database: `agents`, `tenants`, `attestations`, `stateTransitions`, `approvalRequests`, `apiKeys`, `intents`, `operations`, `proofs`, `merkle`, `escalations`, `webhooks`, `policyVersions`, `rbac`, `trust`, and `serviceAccounts`.
|
|
395
|
+
|
|
126
396
|
## TypeScript
|
|
127
397
|
|
|
128
|
-
|
|
398
|
+
All interfaces are exported as TypeScript types. Zod schemas can be used for runtime validation and type inference:
|
|
129
399
|
|
|
130
400
|
```typescript
|
|
131
401
|
import type { z } from 'zod';
|
|
132
|
-
import {
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
402
|
+
import { intentSchema } from '@vorionsys/contracts/validators';
|
|
403
|
+
import { agentConfigSchema } from '@vorionsys/contracts';
|
|
404
|
+
|
|
405
|
+
// Infer types from Zod schemas
|
|
406
|
+
type ValidatedIntent = z.infer<typeof intentSchema>;
|
|
407
|
+
type ValidatedAgentConfig = z.infer<typeof agentConfigSchema>;
|
|
408
|
+
```
|
|
138
409
|
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
410
|
+
For v2 contract interfaces (non-Zod), import types directly:
|
|
411
|
+
|
|
412
|
+
```typescript
|
|
413
|
+
import type {
|
|
414
|
+
Intent,
|
|
415
|
+
Decision,
|
|
416
|
+
FluidDecision,
|
|
417
|
+
TrustProfile,
|
|
418
|
+
ProofEvent,
|
|
419
|
+
PolicyBundle,
|
|
420
|
+
} from '@vorionsys/contracts';
|
|
142
421
|
```
|
|
143
422
|
|
|
423
|
+
## Requirements
|
|
424
|
+
|
|
425
|
+
- Node.js >= 18.0.0
|
|
426
|
+
- TypeScript >= 5.0.0 (peer dependency)
|
|
427
|
+
- Runtime dependency: `zod` >= 3.24
|
|
428
|
+
|
|
144
429
|
## License
|
|
145
430
|
|
|
146
|
-
|
|
431
|
+
Apache-2.0
|
|
432
|
+
|
|
433
|
+
## Repository
|
|
434
|
+
|
|
435
|
+
[https://github.com/vorionsys/vorion](https://github.com/vorionsys/vorion)
|
package/dist/aci/index.d.ts
CHANGED
|
@@ -1,77 +1,11 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* @fileoverview ACI Types Module - DEPRECATED
|
|
3
3
|
*
|
|
4
|
-
* @deprecated
|
|
5
|
-
* ACI (
|
|
6
|
-
*
|
|
7
|
-
* Migration guide:
|
|
8
|
-
* - Replace imports from '@vorionsys/contracts/aci' with '@vorionsys/contracts/car'
|
|
9
|
-
* - Replace `parseACI` with `parseCAR`
|
|
10
|
-
* - Replace `generateACI` with `generateCAR`
|
|
11
|
-
* - Replace `ACIString` with `CARString`
|
|
12
|
-
*
|
|
13
|
-
* Original description:
|
|
14
|
-
* Comprehensive type definitions and utilities for the Agent Classification
|
|
15
|
-
* Identifier (ACI) specification, integrated with the Vorion Platform.
|
|
16
|
-
*
|
|
17
|
-
* This module provides:
|
|
18
|
-
* - ACI string parsing and generation
|
|
19
|
-
* - Domain codes and bitmask operations
|
|
20
|
-
* - Capability levels (L0-L7)
|
|
21
|
-
* - Certification tiers (external attestation)
|
|
22
|
-
* - Runtime tiers (deployment autonomy)
|
|
23
|
-
* - Attestation types and verification
|
|
24
|
-
* - Agent identity types
|
|
25
|
-
* - JWT claims for OIDC integration
|
|
26
|
-
* - Effective permission calculation
|
|
27
|
-
* - Cross-system mappings
|
|
28
|
-
*
|
|
29
|
-
* @example
|
|
30
|
-
* ```typescript
|
|
31
|
-
* import {
|
|
32
|
-
* parseACI,
|
|
33
|
-
* generateACI,
|
|
34
|
-
* CapabilityLevel,
|
|
35
|
-
* CertificationTier,
|
|
36
|
-
* RuntimeTier,
|
|
37
|
-
* calculateEffectivePermission,
|
|
38
|
-
* } from '@vorionsys/contracts/aci';
|
|
39
|
-
*
|
|
40
|
-
* // Parse an ACI string
|
|
41
|
-
* const parsed = parseACI('a3i.acme-corp.invoice-bot:ABF-L3@1.0.0');
|
|
42
|
-
*
|
|
43
|
-
* // Generate an ACI string (trust is NOT embedded - computed at runtime)
|
|
44
|
-
* const aci = generateACI({
|
|
45
|
-
* registry: 'a3i',
|
|
46
|
-
* organization: 'acme-corp',
|
|
47
|
-
* agentClass: 'invoice-bot',
|
|
48
|
-
* domains: ['A', 'B', 'F'],
|
|
49
|
-
* level: CapabilityLevel.L3_EXECUTE,
|
|
50
|
-
* version: '1.0.0',
|
|
51
|
-
* });
|
|
52
|
-
* // Result: 'a3i.acme-corp.invoice-bot:ABF-L3@1.0.0'
|
|
53
|
-
*
|
|
54
|
-
* // Calculate effective permission
|
|
55
|
-
* const permission = calculateEffectivePermission({
|
|
56
|
-
* certificationTier: CertificationTier.T3_MONITORED,
|
|
57
|
-
* competenceLevel: CapabilityLevel.L4_STANDARD,
|
|
58
|
-
* runtimeTier: RuntimeTier.T3_MONITORED,
|
|
59
|
-
* observabilityCeiling: 4,
|
|
60
|
-
* contextPolicyCeiling: 3,
|
|
61
|
-
* });
|
|
62
|
-
* ```
|
|
4
|
+
* @deprecated Use '@vorionsys/contracts/car' instead.
|
|
5
|
+
* ACI (Categorical Agentic Registry) has been renamed to CAR (Categorical Agentic Registry).
|
|
6
|
+
* This module re-exports everything from the CAR module for backwards compatibility.
|
|
63
7
|
*
|
|
64
8
|
* @module @vorionsys/contracts/aci
|
|
65
|
-
* @packageDocumentation
|
|
66
9
|
*/
|
|
67
|
-
export
|
|
68
|
-
export { type SkillCode, type SkillCategory, type SkillDefinition, SKILL_CODES, SKILL_DEFINITIONS, SKILL_NAMES, ALL_SKILLS_BITMASK, SKILLS_BY_CATEGORY, LEGACY_ID_TO_SKILL, encodeSkills, decodeSkills, parseSkillString, formatSkillString, hasSkills, satisfiesSkillRequirements, intersectSkills, unionSkills, differenceSkills, getSkillDefinition, getSkillName, getSkillBit, getSkillCategory, getSkillsInCategory, countSkills, isSkillCode, isSkillCodeArray, legacyIdToSkillCode, legacyIdsToSkillCodes, skillCodeSchema, skillDefinitionSchema, skillCodeArraySchema, skillBitmaskSchema, skillStringSchema, } from './skills.js';
|
|
69
|
-
export { CapabilityLevel, type CapabilityLevelConfig, CAPABILITY_LEVELS, CAPABILITY_LEVEL_NAMES, CAPABILITY_LEVEL_CODES, CAPABILITY_LEVEL_DESCRIPTIONS, CAPABILITY_LEVEL_ABILITIES, CAPABILITY_LEVEL_CONFIGS, isLevelHigher, meetsLevel, compareLevels, minLevel, maxLevel, clampLevel, getLevelConfig, getLevelName, getLevelCode, getLevelDescription, hasAbility, requiresApproval, canOperateAutonomously, parseLevel, tryParseLevel, isCapabilityLevel, capabilityLevelSchema, capabilityLevelConfigSchema, levelStringSchema, } from './levels.js';
|
|
70
|
-
export { CertificationTier, RuntimeTier, type CertificationTierConfig, type RuntimeTierConfig, CERTIFICATION_TIERS, RUNTIME_TIERS, CERTIFICATION_TIER_NAMES, RUNTIME_TIER_NAMES, CERTIFICATION_TIER_DESCRIPTIONS, RUNTIME_TIER_DESCRIPTIONS, CERTIFICATION_TIER_SCORES, RUNTIME_TIER_SCORES, CERTIFICATION_TIER_CONFIGS, RUNTIME_TIER_CONFIGS, isCertificationTierHigher, meetsCertificationTier, compareCertificationTiers, isRuntimeTierHigher, meetsRuntimeTier, compareRuntimeTiers, scoreToCertificationTier, scoreToRuntimeTier, certificationTierToScore, runtimeTierToScore, getCertificationTierMinScore, getCertificationTierMaxScore, getRuntimeTierMinScore, getRuntimeTierMaxScore, getCertificationTierConfig, getRuntimeTierConfig, getCertificationTierName, getRuntimeTierName, getCertificationTierDescription, getRuntimeTierDescription, parseCertificationTier, parseRuntimeTier, isCertificationTier, isRuntimeTier, certificationTierSchema, runtimeTierSchema, certificationTierConfigSchema, runtimeTierConfigSchema, tierStringSchema, certificationTierStringSchema, runtimeTierStringSchema, } from './tiers.js';
|
|
71
|
-
export { type ParsedACI, type ACIIdentity, type ACIParseErrorCode, type GenerateACIOptions, type ACIValidationError, type ACIValidationWarning, type ACIValidationResult, ACI_REGEX, ACI_PARTIAL_REGEX, ACI_LEGACY_REGEX, ACIParseError, parseACI, parseLegacyACI, tryParseACI, safeParseACI, generateACI, generateACIString, validateACI, isValidACI, isACIString, updateACI, addACIExtensions, removeACIExtensions, incrementACIVersion, getACIIdentity, parsedACISchema, aciStringSchema, aciSchema, generateACIOptionsSchema, aciValidationErrorSchema, aciValidationWarningSchema, aciValidationResultSchema, } from './aci-string.js';
|
|
72
|
-
export { type AttestationScope, type AttestationStatus, type AttestationEvidence, type AttestationProof, type Attestation, type AttestationVerificationResult, type AttestationVerificationError, type AttestationVerificationErrorCode, type AttestationVerificationWarning, type CreateAttestationOptions, ATTESTATION_SCOPES, ATTESTATION_SCOPE_DESCRIPTIONS, createAttestation, verifyAttestation, isAttestationValid, getAttestationRemainingValidity, attestationCoversDomain, isAttestationScope, isAttestationStatus, attestationScopeSchema, attestationStatusSchema, attestationEvidenceSchema, attestationProofSchema, attestationSchema, attestationVerificationErrorSchema, attestationVerificationWarningSchema, attestationVerificationResultSchema, } from './attestation.js';
|
|
73
|
-
export { type CapabilityVector, type AgentMetadata, type VerificationMethod, type ServiceEndpoint, type AgentIdentity, type AgentIdentitySummary, type AgentRegistrationOptions, type AgentMatchCriteria, createAgentIdentity, toAgentIdentitySummary, matchesAgentCriteria, capabilityVectorSatisfies, isCapabilityVector, isAgentIdentity, isAgentIdentitySummary, capabilityVectorSchema, agentMetadataSchema, verificationMethodSchema, serviceEndpointSchema, agentIdentitySchema, agentIdentitySummarySchema, agentRegistrationOptionsSchema, agentMatchCriteriaSchema, } from './identity.js';
|
|
74
|
-
export { type StandardJWTClaims, type ACIJWTClaims, type ACIAttestationClaim, type ACIConstraintsClaim, type JWTClaimsValidationError, type JWTClaimsErrorCode, type JWTClaimsValidationResult, type GenerateJWTClaimsOptions, generateJWTClaims, generateMinimalJWTClaims, validateJWTClaims, extractCapabilityFromClaims, extractIdentityFromClaims, claimsHaveDomain, claimsMeetRequirements, standardJWTClaimsSchema, aciAttestationClaimSchema, aciConstraintsClaimSchema, aciJWTClaimsSchema, jwtClaimsValidationOptionsSchema, jwtClaimsValidationErrorSchema, jwtClaimsValidationResultSchema, } from './jwt-claims.js';
|
|
75
|
-
export { type EffectivePermissionContext, type EffectivePermission, type ConstrainingFactor, type PermissionCeilings, type PermissionCheckResult, calculateEffectivePermission, permissionAllowsLevel, contextAllowsLevel, checkPermission, modifyContextCeiling, calculateRequiredChanges, createDefaultContext, createMaxPermissionContext, isEffectivePermissionContext, isEffectivePermission, effectivePermissionContextSchema, constrainingFactorSchema, permissionCeilingsSchema, effectivePermissionSchema, permissionCheckResultSchema, } from './effective-permission.js';
|
|
76
|
-
export { type VorionNamespace, type BidirectionalMap, TrustBand, VORION_NAMESPACES, DOMAIN_TO_NAMESPACE_MAP, NAMESPACE_TO_DOMAIN_MAP, CERTIFICATION_TO_RUNTIME_TIER_MAP, RUNTIME_TO_CERTIFICATION_TIER_MAP, domainNamespaceMap, certificationRuntimeMap, certificationTierToRuntimeTier, runtimeTierToCertificationTier, trustBandToCertificationTier, trustBandToRuntimeTier, certificationTierToTrustBand, runtimeTierToTrustBand, scoreToBothTiers, normalizeScoreBetweenScales, aciDomainToVorionNamespace, vorionNamespaceToAciDomain, aciDomainsToVorionNamespaces, vorionNamespacesToAciDomains, capabilityLevelToAutonomyDescription, capabilityLevelToMinRuntimeTier, createBidirectionalMap, isVorionNamespace, isTrustBand, trustBandSchema, vorionNamespaceSchema, tierMappingResultSchema, domainMappingResultSchema, } from './mapping.js';
|
|
10
|
+
export * from '../car/index.js';
|
|
77
11
|
//# sourceMappingURL=index.d.ts.map
|
package/dist/aci/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/aci/index.ts"],"names":[],"mappings":"AAAA
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/aci/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;GAQG;AAEH,cAAc,iBAAiB,CAAC"}
|