aiox-core 5.0.0 → 5.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (91) hide show
  1. package/.aiox-core/data/entity-registry.yaml +5297 -1814
  2. package/.aiox-core/data/registry-update-log.jsonl +2 -0
  3. package/.aiox-core/development/templates/service-template/README.md.hbs +158 -158
  4. package/.aiox-core/development/templates/service-template/__tests__/index.test.ts.hbs +237 -237
  5. package/.aiox-core/development/templates/service-template/client.ts.hbs +403 -403
  6. package/.aiox-core/development/templates/service-template/errors.ts.hbs +182 -182
  7. package/.aiox-core/development/templates/service-template/index.ts.hbs +120 -120
  8. package/.aiox-core/development/templates/service-template/package.json.hbs +87 -87
  9. package/.aiox-core/development/templates/service-template/types.ts.hbs +145 -145
  10. package/.aiox-core/development/templates/squad-template/LICENSE +21 -21
  11. package/.aiox-core/infrastructure/scripts/tool-resolver.js +4 -4
  12. package/.aiox-core/infrastructure/templates/aiox-sync.yaml.template +182 -182
  13. package/.aiox-core/infrastructure/templates/coderabbit.yaml.template +279 -279
  14. package/.aiox-core/infrastructure/templates/github-workflows/ci.yml.template +169 -169
  15. package/.aiox-core/infrastructure/templates/github-workflows/pr-automation.yml.template +330 -330
  16. package/.aiox-core/infrastructure/templates/github-workflows/release.yml.template +196 -196
  17. package/.aiox-core/infrastructure/templates/gitignore/gitignore-aiox-base.tmpl +63 -63
  18. package/.aiox-core/infrastructure/templates/gitignore/gitignore-brownfield-merge.tmpl +18 -18
  19. package/.aiox-core/infrastructure/templates/gitignore/gitignore-node.tmpl +85 -85
  20. package/.aiox-core/infrastructure/templates/gitignore/gitignore-python.tmpl +145 -145
  21. package/.aiox-core/install-manifest.yaml +58 -58
  22. package/.aiox-core/local-config.yaml.template +71 -71
  23. package/.aiox-core/monitor/hooks/lib/__init__.py +1 -1
  24. package/.aiox-core/monitor/hooks/lib/enrich.py +58 -58
  25. package/.aiox-core/monitor/hooks/lib/send_event.py +47 -47
  26. package/.aiox-core/monitor/hooks/notification.py +29 -29
  27. package/.aiox-core/monitor/hooks/post_tool_use.py +45 -45
  28. package/.aiox-core/monitor/hooks/pre_compact.py +29 -29
  29. package/.aiox-core/monitor/hooks/pre_tool_use.py +40 -40
  30. package/.aiox-core/monitor/hooks/stop.py +29 -29
  31. package/.aiox-core/monitor/hooks/subagent_stop.py +29 -29
  32. package/.aiox-core/monitor/hooks/user_prompt_submit.py +38 -38
  33. package/.aiox-core/product/templates/adr.hbs +125 -125
  34. package/.aiox-core/product/templates/dbdr.hbs +241 -241
  35. package/.aiox-core/product/templates/engine/elicitation.js +2 -3
  36. package/.aiox-core/product/templates/epic.hbs +212 -212
  37. package/.aiox-core/product/templates/pmdr.hbs +186 -186
  38. package/.aiox-core/product/templates/prd-v2.0.hbs +216 -216
  39. package/.aiox-core/product/templates/prd.hbs +201 -201
  40. package/.aiox-core/product/templates/story.hbs +263 -263
  41. package/.aiox-core/product/templates/task.hbs +170 -170
  42. package/.aiox-core/product/templates/tmpl-comment-on-examples.sql +158 -158
  43. package/.aiox-core/product/templates/tmpl-migration-script.sql +91 -91
  44. package/.aiox-core/product/templates/tmpl-rls-granular-policies.sql +104 -104
  45. package/.aiox-core/product/templates/tmpl-rls-kiss-policy.sql +10 -10
  46. package/.aiox-core/product/templates/tmpl-rls-roles.sql +135 -135
  47. package/.aiox-core/product/templates/tmpl-rls-simple.sql +77 -77
  48. package/.aiox-core/product/templates/tmpl-rls-tenant.sql +152 -152
  49. package/.aiox-core/product/templates/tmpl-rollback-script.sql +77 -77
  50. package/.aiox-core/product/templates/tmpl-seed-data.sql +140 -140
  51. package/.aiox-core/product/templates/tmpl-smoke-test.sql +16 -16
  52. package/.aiox-core/product/templates/tmpl-staging-copy-merge.sql +139 -139
  53. package/.aiox-core/product/templates/tmpl-stored-proc.sql +140 -140
  54. package/.aiox-core/product/templates/tmpl-trigger.sql +152 -152
  55. package/.aiox-core/product/templates/tmpl-view-materialized.sql +133 -133
  56. package/.aiox-core/product/templates/tmpl-view.sql +177 -177
  57. package/.aiox-core/scripts/pm.sh +0 -0
  58. package/.claude/hooks/code-intel-pretool.cjs +107 -0
  59. package/.claude/hooks/enforce-architecture-first.py +196 -196
  60. package/.claude/hooks/mind-clone-governance.py +192 -192
  61. package/.claude/hooks/read-protection.py +151 -151
  62. package/.claude/hooks/slug-validation.py +176 -176
  63. package/.claude/hooks/sql-governance.py +182 -182
  64. package/.claude/hooks/write-path-validation.py +194 -194
  65. package/LICENSE +33 -33
  66. package/bin/aiox-graph.js +0 -0
  67. package/bin/aiox-minimal.js +0 -0
  68. package/bin/aiox.js +0 -0
  69. package/docs/guides/aios-workflows/README.md +247 -0
  70. package/docs/guides/aios-workflows/bob-orchestrator-workflow.md +1536 -0
  71. package/package.json +1 -1
  72. package/packages/aiox-install/bin/aiox-install.js +0 -0
  73. package/packages/aiox-install/bin/edmcp.js +0 -0
  74. package/packages/aiox-pro-cli/bin/aiox-pro.js +0 -0
  75. package/packages/installer/src/wizard/pro-setup.js +210 -123
  76. package/pro/README.md +66 -0
  77. package/pro/license/degradation.js +220 -0
  78. package/pro/license/errors.js +450 -0
  79. package/pro/license/feature-gate.js +354 -0
  80. package/pro/license/index.js +181 -0
  81. package/pro/license/license-api.js +679 -0
  82. package/pro/license/license-cache.js +523 -0
  83. package/pro/license/license-crypto.js +303 -0
  84. package/scripts/check-markdown-links.py +352 -352
  85. package/scripts/dashboard-parallel-dev.sh +0 -0
  86. package/scripts/dashboard-parallel-phase3.sh +0 -0
  87. package/scripts/dashboard-parallel-phase4.sh +0 -0
  88. package/scripts/glue/README.md +355 -0
  89. package/scripts/glue/compose-agent-prompt.cjs +362 -0
  90. package/scripts/install-monitor-hooks.sh +0 -0
  91. package/.aiox-core/lib/build.json +0 -1
@@ -1,91 +1,91 @@
1
- -- Migration Script Template
2
- -- Migration: :migration_name
3
- -- Created: :created_date
4
- -- Author: :author
5
- -- Description: :description
6
- --
7
- -- IMPORTANT: Run in transaction, test with dry-run first
8
- -- ROLLBACK: See tmpl-rollback-script.sql for corresponding rollback
9
-
10
- BEGIN;
11
-
12
- -- =============================================================================
13
- -- PRE-MIGRATION CHECKS
14
- -- =============================================================================
15
-
16
- -- Verify prerequisites are met
17
- DO $$
18
- BEGIN
19
- -- Add any precondition checks here
20
- -- Example: ASSERT (SELECT EXISTS (SELECT 1 FROM :prerequisite_table));
21
- RAISE NOTICE 'Pre-migration checks passed';
22
- END $$;
23
-
24
- -- =============================================================================
25
- -- SCHEMA CHANGES
26
- -- =============================================================================
27
-
28
- -- Create new table (if needed)
29
- CREATE TABLE IF NOT EXISTS :table_name (
30
- id UUID PRIMARY KEY DEFAULT gen_random_uuid(),
31
- -- Add columns here
32
- :column_name :column_type :constraints,
33
-
34
- -- Standard audit columns
35
- created_at TIMESTAMPTZ NOT NULL DEFAULT NOW(),
36
- updated_at TIMESTAMPTZ NOT NULL DEFAULT NOW()
37
- );
38
-
39
- -- Add column to existing table (if needed)
40
- -- ALTER TABLE :existing_table ADD COLUMN IF NOT EXISTS :new_column :column_type;
41
-
42
- -- Create index (if needed)
43
- -- CREATE INDEX IF NOT EXISTS idx_:table_:column ON :table_name (:column_name);
44
-
45
- -- =============================================================================
46
- -- DATA MIGRATION (if needed)
47
- -- =============================================================================
48
-
49
- -- Migrate data from old structure to new
50
- -- INSERT INTO :new_table (col1, col2)
51
- -- SELECT old_col1, old_col2 FROM :old_table;
52
-
53
- -- =============================================================================
54
- -- POST-MIGRATION SETUP
55
- -- =============================================================================
56
-
57
- -- Add updated_at trigger
58
- CREATE OR REPLACE FUNCTION update_updated_at_column()
59
- RETURNS TRIGGER AS $$
60
- BEGIN
61
- NEW.updated_at = NOW();
62
- RETURN NEW;
63
- END;
64
- $$ LANGUAGE plpgsql;
65
-
66
- DROP TRIGGER IF EXISTS trigger_update_:table_name_updated_at ON :table_name;
67
- CREATE TRIGGER trigger_update_:table_name_updated_at
68
- BEFORE UPDATE ON :table_name
69
- FOR EACH ROW
70
- EXECUTE FUNCTION update_updated_at_column();
71
-
72
- -- Add table comments
73
- COMMENT ON TABLE :table_name IS ':table_description';
74
- COMMENT ON COLUMN :table_name.:column_name IS ':column_description';
75
-
76
- -- =============================================================================
77
- -- VERIFICATION
78
- -- =============================================================================
79
-
80
- DO $$
81
- BEGIN
82
- -- Verify migration was successful
83
- ASSERT (SELECT EXISTS (
84
- SELECT 1 FROM information_schema.tables
85
- WHERE table_name = ':table_name'
86
- )), 'Table :table_name was not created';
87
-
88
- RAISE NOTICE 'Migration completed successfully';
89
- END $$;
90
-
91
- COMMIT;
1
+ -- Migration Script Template
2
+ -- Migration: :migration_name
3
+ -- Created: :created_date
4
+ -- Author: :author
5
+ -- Description: :description
6
+ --
7
+ -- IMPORTANT: Run in transaction, test with dry-run first
8
+ -- ROLLBACK: See tmpl-rollback-script.sql for corresponding rollback
9
+
10
+ BEGIN;
11
+
12
+ -- =============================================================================
13
+ -- PRE-MIGRATION CHECKS
14
+ -- =============================================================================
15
+
16
+ -- Verify prerequisites are met
17
+ DO $$
18
+ BEGIN
19
+ -- Add any precondition checks here
20
+ -- Example: ASSERT (SELECT EXISTS (SELECT 1 FROM :prerequisite_table));
21
+ RAISE NOTICE 'Pre-migration checks passed';
22
+ END $$;
23
+
24
+ -- =============================================================================
25
+ -- SCHEMA CHANGES
26
+ -- =============================================================================
27
+
28
+ -- Create new table (if needed)
29
+ CREATE TABLE IF NOT EXISTS :table_name (
30
+ id UUID PRIMARY KEY DEFAULT gen_random_uuid(),
31
+ -- Add columns here
32
+ :column_name :column_type :constraints,
33
+
34
+ -- Standard audit columns
35
+ created_at TIMESTAMPTZ NOT NULL DEFAULT NOW(),
36
+ updated_at TIMESTAMPTZ NOT NULL DEFAULT NOW()
37
+ );
38
+
39
+ -- Add column to existing table (if needed)
40
+ -- ALTER TABLE :existing_table ADD COLUMN IF NOT EXISTS :new_column :column_type;
41
+
42
+ -- Create index (if needed)
43
+ -- CREATE INDEX IF NOT EXISTS idx_:table_:column ON :table_name (:column_name);
44
+
45
+ -- =============================================================================
46
+ -- DATA MIGRATION (if needed)
47
+ -- =============================================================================
48
+
49
+ -- Migrate data from old structure to new
50
+ -- INSERT INTO :new_table (col1, col2)
51
+ -- SELECT old_col1, old_col2 FROM :old_table;
52
+
53
+ -- =============================================================================
54
+ -- POST-MIGRATION SETUP
55
+ -- =============================================================================
56
+
57
+ -- Add updated_at trigger
58
+ CREATE OR REPLACE FUNCTION update_updated_at_column()
59
+ RETURNS TRIGGER AS $$
60
+ BEGIN
61
+ NEW.updated_at = NOW();
62
+ RETURN NEW;
63
+ END;
64
+ $$ LANGUAGE plpgsql;
65
+
66
+ DROP TRIGGER IF EXISTS trigger_update_:table_name_updated_at ON :table_name;
67
+ CREATE TRIGGER trigger_update_:table_name_updated_at
68
+ BEFORE UPDATE ON :table_name
69
+ FOR EACH ROW
70
+ EXECUTE FUNCTION update_updated_at_column();
71
+
72
+ -- Add table comments
73
+ COMMENT ON TABLE :table_name IS ':table_description';
74
+ COMMENT ON COLUMN :table_name.:column_name IS ':column_description';
75
+
76
+ -- =============================================================================
77
+ -- VERIFICATION
78
+ -- =============================================================================
79
+
80
+ DO $$
81
+ BEGIN
82
+ -- Verify migration was successful
83
+ ASSERT (SELECT EXISTS (
84
+ SELECT 1 FROM information_schema.tables
85
+ WHERE table_name = ':table_name'
86
+ )), 'Table :table_name was not created';
87
+
88
+ RAISE NOTICE 'Migration completed successfully';
89
+ END $$;
90
+
91
+ COMMIT;
@@ -1,104 +1,104 @@
1
- -- Granular RLS Policies Template
2
- -- Table: :table_name
3
- -- Security Model: Granular (separate policies per operation)
4
- -- Created: :created_date
5
- --
6
- -- This template creates separate policies for SELECT, INSERT, UPDATE, DELETE
7
- -- Useful when different users have different permissions per operation
8
-
9
- -- Enable RLS on table
10
- ALTER TABLE :table_name ENABLE ROW LEVEL SECURITY;
11
-
12
- -- Force RLS for table owner too (recommended for security)
13
- ALTER TABLE :table_name FORCE ROW LEVEL SECURITY;
14
-
15
- -- =============================================================================
16
- -- SELECT POLICY - Who can read rows
17
- -- =============================================================================
18
- DROP POLICY IF EXISTS ":table_name_select" ON :table_name;
19
- CREATE POLICY ":table_name_select"
20
- ON :table_name
21
- FOR SELECT
22
- TO authenticated
23
- USING (
24
- -- Owner can read their own rows
25
- auth.uid() = user_id
26
- -- OR user has read permission via role
27
- OR EXISTS (
28
- SELECT 1 FROM user_roles
29
- WHERE user_id = auth.uid()
30
- AND role IN ('admin', 'reader')
31
- )
32
- );
33
-
34
- -- =============================================================================
35
- -- INSERT POLICY - Who can create rows
36
- -- =============================================================================
37
- DROP POLICY IF EXISTS ":table_name_insert" ON :table_name;
38
- CREATE POLICY ":table_name_insert"
39
- ON :table_name
40
- FOR INSERT
41
- TO authenticated
42
- WITH CHECK (
43
- -- User can only insert rows they will own
44
- auth.uid() = user_id
45
- -- OR user has creator permission
46
- OR EXISTS (
47
- SELECT 1 FROM user_roles
48
- WHERE user_id = auth.uid()
49
- AND role IN ('admin', 'creator')
50
- )
51
- );
52
-
53
- -- =============================================================================
54
- -- UPDATE POLICY - Who can modify rows
55
- -- =============================================================================
56
- DROP POLICY IF EXISTS ":table_name_update" ON :table_name;
57
- CREATE POLICY ":table_name_update"
58
- ON :table_name
59
- FOR UPDATE
60
- TO authenticated
61
- USING (
62
- -- Can only see rows to update if owner
63
- auth.uid() = user_id
64
- OR EXISTS (
65
- SELECT 1 FROM user_roles
66
- WHERE user_id = auth.uid()
67
- AND role IN ('admin', 'editor')
68
- )
69
- )
70
- WITH CHECK (
71
- -- Can only update to valid state
72
- auth.uid() = user_id
73
- OR EXISTS (
74
- SELECT 1 FROM user_roles
75
- WHERE user_id = auth.uid()
76
- AND role IN ('admin', 'editor')
77
- )
78
- );
79
-
80
- -- =============================================================================
81
- -- DELETE POLICY - Who can delete rows
82
- -- =============================================================================
83
- DROP POLICY IF EXISTS ":table_name_delete" ON :table_name;
84
- CREATE POLICY ":table_name_delete"
85
- ON :table_name
86
- FOR DELETE
87
- TO authenticated
88
- USING (
89
- -- Only owner or admin can delete
90
- auth.uid() = user_id
91
- OR EXISTS (
92
- SELECT 1 FROM user_roles
93
- WHERE user_id = auth.uid()
94
- AND role = 'admin'
95
- )
96
- );
97
-
98
- -- =============================================================================
99
- -- VERIFICATION
100
- -- =============================================================================
101
- -- Test these policies with:
102
- -- SET LOCAL ROLE authenticated;
103
- -- SET LOCAL request.jwt.claims = '{"sub": "user-uuid-here"}';
104
- -- SELECT * FROM :table_name; -- Should only return authorized rows
1
+ -- Granular RLS Policies Template
2
+ -- Table: :table_name
3
+ -- Security Model: Granular (separate policies per operation)
4
+ -- Created: :created_date
5
+ --
6
+ -- This template creates separate policies for SELECT, INSERT, UPDATE, DELETE
7
+ -- Useful when different users have different permissions per operation
8
+
9
+ -- Enable RLS on table
10
+ ALTER TABLE :table_name ENABLE ROW LEVEL SECURITY;
11
+
12
+ -- Force RLS for table owner too (recommended for security)
13
+ ALTER TABLE :table_name FORCE ROW LEVEL SECURITY;
14
+
15
+ -- =============================================================================
16
+ -- SELECT POLICY - Who can read rows
17
+ -- =============================================================================
18
+ DROP POLICY IF EXISTS ":table_name_select" ON :table_name;
19
+ CREATE POLICY ":table_name_select"
20
+ ON :table_name
21
+ FOR SELECT
22
+ TO authenticated
23
+ USING (
24
+ -- Owner can read their own rows
25
+ auth.uid() = user_id
26
+ -- OR user has read permission via role
27
+ OR EXISTS (
28
+ SELECT 1 FROM user_roles
29
+ WHERE user_id = auth.uid()
30
+ AND role IN ('admin', 'reader')
31
+ )
32
+ );
33
+
34
+ -- =============================================================================
35
+ -- INSERT POLICY - Who can create rows
36
+ -- =============================================================================
37
+ DROP POLICY IF EXISTS ":table_name_insert" ON :table_name;
38
+ CREATE POLICY ":table_name_insert"
39
+ ON :table_name
40
+ FOR INSERT
41
+ TO authenticated
42
+ WITH CHECK (
43
+ -- User can only insert rows they will own
44
+ auth.uid() = user_id
45
+ -- OR user has creator permission
46
+ OR EXISTS (
47
+ SELECT 1 FROM user_roles
48
+ WHERE user_id = auth.uid()
49
+ AND role IN ('admin', 'creator')
50
+ )
51
+ );
52
+
53
+ -- =============================================================================
54
+ -- UPDATE POLICY - Who can modify rows
55
+ -- =============================================================================
56
+ DROP POLICY IF EXISTS ":table_name_update" ON :table_name;
57
+ CREATE POLICY ":table_name_update"
58
+ ON :table_name
59
+ FOR UPDATE
60
+ TO authenticated
61
+ USING (
62
+ -- Can only see rows to update if owner
63
+ auth.uid() = user_id
64
+ OR EXISTS (
65
+ SELECT 1 FROM user_roles
66
+ WHERE user_id = auth.uid()
67
+ AND role IN ('admin', 'editor')
68
+ )
69
+ )
70
+ WITH CHECK (
71
+ -- Can only update to valid state
72
+ auth.uid() = user_id
73
+ OR EXISTS (
74
+ SELECT 1 FROM user_roles
75
+ WHERE user_id = auth.uid()
76
+ AND role IN ('admin', 'editor')
77
+ )
78
+ );
79
+
80
+ -- =============================================================================
81
+ -- DELETE POLICY - Who can delete rows
82
+ -- =============================================================================
83
+ DROP POLICY IF EXISTS ":table_name_delete" ON :table_name;
84
+ CREATE POLICY ":table_name_delete"
85
+ ON :table_name
86
+ FOR DELETE
87
+ TO authenticated
88
+ USING (
89
+ -- Only owner or admin can delete
90
+ auth.uid() = user_id
91
+ OR EXISTS (
92
+ SELECT 1 FROM user_roles
93
+ WHERE user_id = auth.uid()
94
+ AND role = 'admin'
95
+ )
96
+ );
97
+
98
+ -- =============================================================================
99
+ -- VERIFICATION
100
+ -- =============================================================================
101
+ -- Test these policies with:
102
+ -- SET LOCAL ROLE authenticated;
103
+ -- SET LOCAL request.jwt.claims = '{"sub": "user-uuid-here"}';
104
+ -- SELECT * FROM :table_name; -- Should only return authorized rows
@@ -1,10 +1,10 @@
1
- -- KISS single FOR ALL policy template (owner-only by column user_id)
2
- ALTER TABLE :table ENABLE ROW LEVEL SECURITY;
3
-
4
- DROP POLICY IF EXISTS ":table_kiss_all" ON :table;
5
- CREATE POLICY ":table_kiss_all"
6
- ON :table
7
- FOR ALL
8
- TO authenticated
9
- USING (auth.uid() = user_id)
10
- WITH CHECK (auth.uid() = user_id);
1
+ -- KISS single FOR ALL policy template (owner-only by column user_id)
2
+ ALTER TABLE :table ENABLE ROW LEVEL SECURITY;
3
+
4
+ DROP POLICY IF EXISTS ":table_kiss_all" ON :table;
5
+ CREATE POLICY ":table_kiss_all"
6
+ ON :table
7
+ FOR ALL
8
+ TO authenticated
9
+ USING (auth.uid() = user_id)
10
+ WITH CHECK (auth.uid() = user_id);