aira-sdk 0.3.1 → 0.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +228 -159
- package/dist/client.d.ts +2 -0
- package/dist/client.js +2 -0
- package/dist/session.d.ts +2 -0
- package/dist/types.d.ts +8 -0
- package/package.json +2 -2
package/README.md
CHANGED
|
@@ -1,30 +1,22 @@
|
|
|
1
1
|
# Aira TypeScript SDK
|
|
2
2
|
|
|
3
|
-
**AI
|
|
3
|
+
**AI governance infrastructure.**
|
|
4
4
|
|
|
5
5
|
[](https://www.npmjs.com/package/aira-sdk)
|
|
6
6
|
[](https://opensource.org/licenses/MIT)
|
|
7
7
|
|
|
8
|
-
|
|
8
|
+
Policies evaluate every agent action. Humans approve high-stakes decisions. Cryptographic receipts prove it all. Rules, AI, and multi-model consensus govern what your agents can do — with Ed25519 signatures, RFC 3161 timestamps, and W3C DID identity. Built for EU AI Act, SR 11-7, and GDPR compliance.
|
|
9
9
|
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
Drop Aira into your existing agent framework with one import:
|
|
15
|
-
|
|
16
|
-
| Framework | Import | Integration |
|
|
17
|
-
|---|---|---|
|
|
18
|
-
| **LangChain.js** | `import { AiraCallbackHandler } from "aira-sdk/extras/langchain"` | Callback handler |
|
|
19
|
-
| **Vercel AI** | `import { AiraVercelMiddleware } from "aira-sdk/extras/vercel-ai"` | Middleware |
|
|
20
|
-
| **OpenAI Agents** | `import { AiraGuardrail } from "aira-sdk/extras/openai-agents"` | Guardrail |
|
|
21
|
-
| **MCP** | `import { createServer } from "aira-sdk/extras/mcp"` | MCP Server |
|
|
22
|
-
| **Webhooks** | `import { verifySignature } from "aira-sdk/extras/webhooks"` | Verification |
|
|
10
|
+
```bash
|
|
11
|
+
npm install aira-sdk
|
|
12
|
+
```
|
|
23
13
|
|
|
24
|
-
|
|
14
|
+
Framework integrations use sub-imports — just make sure the peer dependency is installed:
|
|
25
15
|
|
|
26
16
|
```bash
|
|
27
|
-
npm install aira-sdk
|
|
17
|
+
npm install aira-sdk langchain # for LangChain.js
|
|
18
|
+
npm install aira-sdk ai # for Vercel AI
|
|
19
|
+
npm install aira-sdk @openai/agents # for OpenAI Agents
|
|
28
20
|
```
|
|
29
21
|
|
|
30
22
|
---
|
|
@@ -53,154 +45,13 @@ console.log(receipt.action_id); // uuid — publicly verifiable
|
|
|
53
45
|
|
|
54
46
|
---
|
|
55
47
|
|
|
56
|
-
## Framework Integrations
|
|
57
|
-
|
|
58
|
-
### LangChain.js
|
|
59
|
-
|
|
60
|
-
`AiraCallbackHandler` notarizes every tool call, chain completion, and LLM invocation with a cryptographic receipt. No changes to your chain logic.
|
|
61
|
-
|
|
62
|
-
```typescript
|
|
63
|
-
import { Aira } from "aira-sdk";
|
|
64
|
-
import { AiraCallbackHandler } from "aira-sdk/extras/langchain";
|
|
65
|
-
|
|
66
|
-
const aira = new Aira({ apiKey: "aira_live_xxx" });
|
|
67
|
-
const handler = new AiraCallbackHandler({ client: aira, agentId: "research-agent", modelId: "gpt-5.2" });
|
|
68
|
-
|
|
69
|
-
// Every tool call and chain completion gets a signed receipt
|
|
70
|
-
const result = await chain.invoke({ input: "Analyze Q1 revenue" }, { callbacks: [handler] });
|
|
71
|
-
```
|
|
72
|
-
|
|
73
|
-
### Vercel AI
|
|
74
|
-
|
|
75
|
-
`AiraVercelMiddleware` wraps your Vercel AI `streamText` / `generateText` calls so every model invocation is notarized with a tamper-proof receipt.
|
|
76
|
-
|
|
77
|
-
```typescript
|
|
78
|
-
import { Aira } from "aira-sdk";
|
|
79
|
-
import { AiraVercelMiddleware } from "aira-sdk/extras/vercel-ai";
|
|
80
|
-
|
|
81
|
-
const aira = new Aira({ apiKey: "aira_live_xxx" });
|
|
82
|
-
const middleware = new AiraVercelMiddleware({ client: aira, agentId: "assistant-agent" });
|
|
83
|
-
|
|
84
|
-
// Wrap your Vercel AI calls — receipts at invocation and completion
|
|
85
|
-
const result = await middleware.wrapGenerateText({
|
|
86
|
-
model: openai("gpt-5.2"),
|
|
87
|
-
prompt: "Summarize the contract terms",
|
|
88
|
-
});
|
|
89
|
-
```
|
|
90
|
-
|
|
91
|
-
### OpenAI Agents SDK
|
|
92
|
-
|
|
93
|
-
`AiraGuardrail` wraps any tool function to automatically notarize both invocation and result with cryptographic proof.
|
|
94
|
-
|
|
95
|
-
```typescript
|
|
96
|
-
import { Aira } from "aira-sdk";
|
|
97
|
-
import { AiraGuardrail } from "aira-sdk/extras/openai-agents";
|
|
98
|
-
|
|
99
|
-
const aira = new Aira({ apiKey: "aira_live_xxx" });
|
|
100
|
-
const guardrail = new AiraGuardrail({ client: aira, agentId: "assistant-agent" });
|
|
101
|
-
|
|
102
|
-
// Wrap tools — every call and result gets a signed receipt
|
|
103
|
-
const search = guardrail.wrapTool(searchTool, { toolName: "web_search" });
|
|
104
|
-
const execute = guardrail.wrapTool(codeExecutor, { toolName: "code_exec" });
|
|
105
|
-
```
|
|
106
|
-
|
|
107
|
-
---
|
|
108
|
-
|
|
109
|
-
## MCP Server
|
|
110
|
-
|
|
111
|
-
Expose Aira as an MCP tool server. Any MCP-compatible AI agent can notarize actions and verify receipts without SDK integration.
|
|
112
|
-
|
|
113
|
-
```typescript
|
|
114
|
-
import { createServer } from "aira-sdk/extras/mcp";
|
|
115
|
-
|
|
116
|
-
const server = createServer({ apiKey: "aira_live_xxx" });
|
|
117
|
-
server.listen(); // stdio transport
|
|
118
|
-
```
|
|
119
|
-
|
|
120
|
-
The server exposes three tools: `notarize_action`, `verify_action`, and `get_receipt` -- each producing cryptographically signed results.
|
|
121
|
-
|
|
122
|
-
Add to your MCP client config:
|
|
123
|
-
|
|
124
|
-
```json
|
|
125
|
-
{
|
|
126
|
-
"mcpServers": {
|
|
127
|
-
"aira": {
|
|
128
|
-
"command": "npx",
|
|
129
|
-
"args": ["aira-sdk", "mcp"],
|
|
130
|
-
"env": { "AIRA_API_KEY": "aira_live_xxx" }
|
|
131
|
-
}
|
|
132
|
-
}
|
|
133
|
-
}
|
|
134
|
-
```
|
|
135
|
-
|
|
136
|
-
---
|
|
137
|
-
|
|
138
|
-
## Session
|
|
139
|
-
|
|
140
|
-
Pre-fill defaults for a block of related actions. Every `notarize()` call within the session inherits the agent identity, producing receipts that share a common provenance chain.
|
|
141
|
-
|
|
142
|
-
```typescript
|
|
143
|
-
const sess = aira.session("onboarding-agent", { modelId: "claude-sonnet-4-6" });
|
|
144
|
-
|
|
145
|
-
await sess.notarize({ actionType: "identity_verified", details: "Verified customer ID #4521" });
|
|
146
|
-
await sess.notarize({ actionType: "account_created", details: "Created account for customer #4521" });
|
|
147
|
-
await sess.notarize({ actionType: "welcome_sent", details: "Sent welcome email to customer #4521" });
|
|
148
|
-
```
|
|
149
|
-
|
|
150
|
-
---
|
|
151
|
-
|
|
152
|
-
## Offline Mode
|
|
153
|
-
|
|
154
|
-
Queue notarizations locally when connectivity is unavailable. Cryptographic receipts are generated server-side when you sync -- nothing is lost.
|
|
155
|
-
|
|
156
|
-
```typescript
|
|
157
|
-
const aira = new Aira({ apiKey: "aira_live_xxx", offline: true });
|
|
158
|
-
|
|
159
|
-
// These queue locally — no network calls
|
|
160
|
-
await aira.notarize({ actionType: "scan_completed", details: "Scanned document batch #77" });
|
|
161
|
-
await aira.notarize({ actionType: "classification_done", details: "Classified 142 documents" });
|
|
162
|
-
|
|
163
|
-
console.log(aira.pendingCount); // 2
|
|
164
|
-
|
|
165
|
-
// Flush to API when back online — receipts are generated for each action
|
|
166
|
-
const results = await aira.sync();
|
|
167
|
-
```
|
|
168
|
-
|
|
169
|
-
---
|
|
170
|
-
|
|
171
|
-
## Webhook Verification
|
|
172
|
-
|
|
173
|
-
Verify that incoming webhooks are authentic Aira events, not forged requests. HMAC-SHA256 signature verification ensures tamper-proof delivery.
|
|
174
|
-
|
|
175
|
-
```typescript
|
|
176
|
-
import { verifySignature, parseEvent } from "aira-sdk/extras/webhooks";
|
|
177
|
-
|
|
178
|
-
// Verify the webhook signature (HMAC-SHA256)
|
|
179
|
-
const isValid = verifySignature({
|
|
180
|
-
payload: request.body,
|
|
181
|
-
signature: request.headers["x-aira-signature"],
|
|
182
|
-
secret: "whsec_xxx",
|
|
183
|
-
});
|
|
184
|
-
|
|
185
|
-
if (isValid) {
|
|
186
|
-
const event = parseEvent(request.body);
|
|
187
|
-
console.log(event.eventType); // "action.notarized"
|
|
188
|
-
console.log(event.data); // Action data with cryptographic receipt
|
|
189
|
-
console.log(event.deliveryId); // Unique delivery ID
|
|
190
|
-
}
|
|
191
|
-
```
|
|
192
|
-
|
|
193
|
-
Supported event types: `action.notarized`, `action.authorized`, `agent.registered`, `agent.decommissioned`, `evidence.sealed`, `escrow.deposited`, `escrow.released`, `escrow.disputed`, `compliance.snapshot_created`, `case.complete`, `case.requires_human_review`.
|
|
194
|
-
|
|
195
|
-
---
|
|
196
|
-
|
|
197
48
|
## Core SDK Methods
|
|
198
49
|
|
|
199
50
|
All 52 methods on `Aira`. Every write operation produces a cryptographic receipt.
|
|
200
51
|
|
|
201
52
|
| Category | Method | Description |
|
|
202
53
|
|---|---|---|
|
|
203
|
-
| **Actions** | `notarize()` | Notarize an action -- returns Ed25519-signed receipt |
|
|
54
|
+
| **Actions** | `notarize()` | Notarize an action -- returns Ed25519-signed receipt (supports `requireApproval`) |
|
|
204
55
|
| | `getAction()` | Retrieve action details + receipt |
|
|
205
56
|
| | `listActions()` | List actions with filters (type, agent, status) |
|
|
206
57
|
| | `authorizeAction()` | Human co-signature on high-stakes action |
|
|
@@ -374,6 +225,224 @@ const handler = new AiraCallbackHandler(aira, "research-agent", {
|
|
|
374
225
|
|
|
375
226
|
---
|
|
376
227
|
|
|
228
|
+
## Session
|
|
229
|
+
|
|
230
|
+
Pre-fill defaults for a block of related actions. Every `notarize()` call within the session inherits the agent identity, producing receipts that share a common provenance chain.
|
|
231
|
+
|
|
232
|
+
```typescript
|
|
233
|
+
const sess = aira.session("onboarding-agent", { modelId: "claude-sonnet-4-6" });
|
|
234
|
+
|
|
235
|
+
await sess.notarize({ actionType: "identity_verified", details: "Verified customer ID #4521" });
|
|
236
|
+
await sess.notarize({ actionType: "account_created", details: "Created account for customer #4521" });
|
|
237
|
+
await sess.notarize({ actionType: "welcome_sent", details: "Sent welcome email to customer #4521" });
|
|
238
|
+
```
|
|
239
|
+
|
|
240
|
+
---
|
|
241
|
+
|
|
242
|
+
## Offline Mode
|
|
243
|
+
|
|
244
|
+
Queue notarizations locally when connectivity is unavailable. Cryptographic receipts are generated server-side when you sync -- nothing is lost.
|
|
245
|
+
|
|
246
|
+
```typescript
|
|
247
|
+
const aira = new Aira({ apiKey: "aira_live_xxx", offline: true });
|
|
248
|
+
|
|
249
|
+
// These queue locally — no network calls
|
|
250
|
+
await aira.notarize({ actionType: "scan_completed", details: "Scanned document batch #77" });
|
|
251
|
+
await aira.notarize({ actionType: "classification_done", details: "Classified 142 documents" });
|
|
252
|
+
|
|
253
|
+
console.log(aira.pendingCount); // 2
|
|
254
|
+
|
|
255
|
+
// Flush to API when back online — receipts are generated for each action
|
|
256
|
+
const results = await aira.sync();
|
|
257
|
+
```
|
|
258
|
+
|
|
259
|
+
---
|
|
260
|
+
|
|
261
|
+
## Human Approval
|
|
262
|
+
|
|
263
|
+
Hold high-stakes actions for human review before the cryptographic receipt is issued. Approvers receive an email with Approve/Deny buttons.
|
|
264
|
+
|
|
265
|
+
```typescript
|
|
266
|
+
const receipt = await aira.notarize({
|
|
267
|
+
actionType: "loan_decision",
|
|
268
|
+
details: "Approved €15,000 loan for Maria Schmidt",
|
|
269
|
+
agentId: "lending-agent",
|
|
270
|
+
requireApproval: true,
|
|
271
|
+
approvers: ["compliance@acme.com", "risk@acme.com"],
|
|
272
|
+
});
|
|
273
|
+
console.log(receipt.status); // "pending_approval"
|
|
274
|
+
console.log(receipt.receipt_id); // undefined — no receipt until approved
|
|
275
|
+
|
|
276
|
+
// Falls back to org default approvers (Settings → Approvers)
|
|
277
|
+
const receipt2 = await aira.notarize({
|
|
278
|
+
actionType: "wire_transfer",
|
|
279
|
+
details: "Transfer $50,000 to vendor account",
|
|
280
|
+
agentId: "payments-agent",
|
|
281
|
+
requireApproval: true,
|
|
282
|
+
});
|
|
283
|
+
```
|
|
284
|
+
|
|
285
|
+
The approver clicks "Approve" in the email → receipt is minted with Ed25519 signature + RFC 3161 timestamp → `action.approved` webhook fires.
|
|
286
|
+
|
|
287
|
+
Configure default approvers in the [dashboard](https://app.airaproof.com/dashboard/settings/approvers) or via the `/approvers` API.
|
|
288
|
+
|
|
289
|
+
### Automatic Policy Evaluation
|
|
290
|
+
|
|
291
|
+
Org admins configure policies in the dashboard — your code doesn't change. Every `notarize()` call is automatically evaluated against active policies before the receipt is issued.
|
|
292
|
+
|
|
293
|
+
Three evaluation modes:
|
|
294
|
+
|
|
295
|
+
- **Rules**: Deterministic conditions — instant, no LLM call
|
|
296
|
+
- **AI**: Single LLM evaluates action against a natural language policy (1-5s)
|
|
297
|
+
- **Consensus**: Multiple LLMs evaluate independently — disagreement triggers human review (3-10s)
|
|
298
|
+
|
|
299
|
+
```typescript
|
|
300
|
+
// Your code stays the same — policies evaluate automatically
|
|
301
|
+
const receipt = await aira.notarize({
|
|
302
|
+
actionType: "wire_transfer",
|
|
303
|
+
details: "Transfer $50,000 to vendor account",
|
|
304
|
+
agentId: "billing-agent",
|
|
305
|
+
});
|
|
306
|
+
|
|
307
|
+
// If a policy triggers "require_approval":
|
|
308
|
+
console.log(receipt.status); // "pending_approval"
|
|
309
|
+
console.log(receipt.policy_evaluation); // { policy_name: "Wire transfers need approval", decision: "require_approval", ... }
|
|
310
|
+
|
|
311
|
+
// If a policy triggers "deny":
|
|
312
|
+
import { AiraError } from "aira-sdk";
|
|
313
|
+
try {
|
|
314
|
+
await aira.notarize({ actionType: "data_deletion", details: "Delete customer records" });
|
|
315
|
+
} catch (e) {
|
|
316
|
+
if (e instanceof AiraError && e.code === "POLICY_DENIED") {
|
|
317
|
+
console.log(e.message); // "Action denied by policy 'Block deletions': ..."
|
|
318
|
+
}
|
|
319
|
+
}
|
|
320
|
+
```
|
|
321
|
+
|
|
322
|
+
Every policy evaluation produces a cryptographic receipt — proof the policy was checked. The SDK `requireApproval: true` override still works and skips policy evaluation entirely.
|
|
323
|
+
|
|
324
|
+
Configure policies at [Settings → Policies](https://app.airaproof.com/dashboard/policies).
|
|
325
|
+
|
|
326
|
+
---
|
|
327
|
+
|
|
328
|
+
## Framework Integrations
|
|
329
|
+
|
|
330
|
+
Drop Aira into your existing agent framework with one import:
|
|
331
|
+
|
|
332
|
+
| Framework | Import | Integration |
|
|
333
|
+
|---|---|---|
|
|
334
|
+
| **LangChain.js** | `import { AiraCallbackHandler } from "aira-sdk/extras/langchain"` | Callback handler |
|
|
335
|
+
| **Vercel AI** | `import { AiraVercelMiddleware } from "aira-sdk/extras/vercel-ai"` | Middleware |
|
|
336
|
+
| **OpenAI Agents** | `import { AiraGuardrail } from "aira-sdk/extras/openai-agents"` | Guardrail |
|
|
337
|
+
| **MCP** | `import { createServer } from "aira-sdk/extras/mcp"` | MCP Server |
|
|
338
|
+
| **Webhooks** | `import { verifySignature } from "aira-sdk/extras/webhooks"` | Verification |
|
|
339
|
+
|
|
340
|
+
### LangChain.js
|
|
341
|
+
|
|
342
|
+
`AiraCallbackHandler` notarizes every tool call, chain completion, and LLM invocation with a cryptographic receipt. No changes to your chain logic.
|
|
343
|
+
|
|
344
|
+
```typescript
|
|
345
|
+
import { Aira } from "aira-sdk";
|
|
346
|
+
import { AiraCallbackHandler } from "aira-sdk/extras/langchain";
|
|
347
|
+
|
|
348
|
+
const aira = new Aira({ apiKey: "aira_live_xxx" });
|
|
349
|
+
const handler = new AiraCallbackHandler({ client: aira, agentId: "research-agent", modelId: "gpt-5.2" });
|
|
350
|
+
|
|
351
|
+
// Every tool call and chain completion gets a signed receipt
|
|
352
|
+
const result = await chain.invoke({ input: "Analyze Q1 revenue" }, { callbacks: [handler] });
|
|
353
|
+
```
|
|
354
|
+
|
|
355
|
+
### Vercel AI
|
|
356
|
+
|
|
357
|
+
`AiraVercelMiddleware` wraps your Vercel AI `streamText` / `generateText` calls so every model invocation is notarized with a tamper-proof receipt.
|
|
358
|
+
|
|
359
|
+
```typescript
|
|
360
|
+
import { Aira } from "aira-sdk";
|
|
361
|
+
import { AiraVercelMiddleware } from "aira-sdk/extras/vercel-ai";
|
|
362
|
+
|
|
363
|
+
const aira = new Aira({ apiKey: "aira_live_xxx" });
|
|
364
|
+
const middleware = new AiraVercelMiddleware({ client: aira, agentId: "assistant-agent" });
|
|
365
|
+
|
|
366
|
+
// Wrap your Vercel AI calls — receipts at invocation and completion
|
|
367
|
+
const result = await middleware.wrapGenerateText({
|
|
368
|
+
model: openai("gpt-5.2"),
|
|
369
|
+
prompt: "Summarize the contract terms",
|
|
370
|
+
});
|
|
371
|
+
```
|
|
372
|
+
|
|
373
|
+
### OpenAI Agents SDK
|
|
374
|
+
|
|
375
|
+
`AiraGuardrail` wraps any tool function to automatically notarize both invocation and result with cryptographic proof.
|
|
376
|
+
|
|
377
|
+
```typescript
|
|
378
|
+
import { Aira } from "aira-sdk";
|
|
379
|
+
import { AiraGuardrail } from "aira-sdk/extras/openai-agents";
|
|
380
|
+
|
|
381
|
+
const aira = new Aira({ apiKey: "aira_live_xxx" });
|
|
382
|
+
const guardrail = new AiraGuardrail({ client: aira, agentId: "assistant-agent" });
|
|
383
|
+
|
|
384
|
+
// Wrap tools — every call and result gets a signed receipt
|
|
385
|
+
const search = guardrail.wrapTool(searchTool, { toolName: "web_search" });
|
|
386
|
+
const execute = guardrail.wrapTool(codeExecutor, { toolName: "code_exec" });
|
|
387
|
+
```
|
|
388
|
+
|
|
389
|
+
---
|
|
390
|
+
|
|
391
|
+
## MCP Server
|
|
392
|
+
|
|
393
|
+
Expose Aira as an MCP tool server. Any MCP-compatible AI agent can notarize actions and verify receipts without SDK integration.
|
|
394
|
+
|
|
395
|
+
```typescript
|
|
396
|
+
import { createServer } from "aira-sdk/extras/mcp";
|
|
397
|
+
|
|
398
|
+
const server = createServer({ apiKey: "aira_live_xxx" });
|
|
399
|
+
server.listen(); // stdio transport
|
|
400
|
+
```
|
|
401
|
+
|
|
402
|
+
The server exposes three tools: `notarize_action`, `verify_action`, and `get_receipt` -- each producing cryptographically signed results.
|
|
403
|
+
|
|
404
|
+
Add to your MCP client config:
|
|
405
|
+
|
|
406
|
+
```json
|
|
407
|
+
{
|
|
408
|
+
"mcpServers": {
|
|
409
|
+
"aira": {
|
|
410
|
+
"command": "npx",
|
|
411
|
+
"args": ["aira-sdk", "mcp"],
|
|
412
|
+
"env": { "AIRA_API_KEY": "aira_live_xxx" }
|
|
413
|
+
}
|
|
414
|
+
}
|
|
415
|
+
}
|
|
416
|
+
```
|
|
417
|
+
|
|
418
|
+
---
|
|
419
|
+
|
|
420
|
+
## Webhook Verification
|
|
421
|
+
|
|
422
|
+
Verify that incoming webhooks are authentic Aira events, not forged requests. HMAC-SHA256 signature verification ensures tamper-proof delivery.
|
|
423
|
+
|
|
424
|
+
```typescript
|
|
425
|
+
import { verifySignature, parseEvent } from "aira-sdk/extras/webhooks";
|
|
426
|
+
|
|
427
|
+
// Verify the webhook signature (HMAC-SHA256)
|
|
428
|
+
const isValid = verifySignature({
|
|
429
|
+
payload: request.body,
|
|
430
|
+
signature: request.headers["x-aira-signature"],
|
|
431
|
+
secret: "whsec_xxx",
|
|
432
|
+
});
|
|
433
|
+
|
|
434
|
+
if (isValid) {
|
|
435
|
+
const event = parseEvent(request.body);
|
|
436
|
+
console.log(event.eventType); // "action.notarized"
|
|
437
|
+
console.log(event.data); // Action data with cryptographic receipt
|
|
438
|
+
console.log(event.deliveryId); // Unique delivery ID
|
|
439
|
+
}
|
|
440
|
+
```
|
|
441
|
+
|
|
442
|
+
Supported event types: `action.notarized`, `action.authorized`, `agent.registered`, `agent.decommissioned`, `evidence.sealed`, `escrow.deposited`, `escrow.released`, `escrow.disputed`, `compliance.snapshot_created`, `case.complete`, `case.requires_human_review`.
|
|
443
|
+
|
|
444
|
+
---
|
|
445
|
+
|
|
377
446
|
## Error Handling
|
|
378
447
|
|
|
379
448
|
```typescript
|
package/dist/client.d.ts
CHANGED
|
@@ -29,6 +29,8 @@ export declare class Aira {
|
|
|
29
29
|
parentActionId?: string;
|
|
30
30
|
storeDetails?: boolean;
|
|
31
31
|
idempotencyKey?: string;
|
|
32
|
+
requireApproval?: boolean;
|
|
33
|
+
approvers?: string[];
|
|
32
34
|
}): Promise<ActionReceipt>;
|
|
33
35
|
getAction(actionId: string): Promise<ActionDetail>;
|
|
34
36
|
listActions(params?: {
|
package/dist/client.js
CHANGED
|
@@ -91,6 +91,8 @@ class Aira {
|
|
|
91
91
|
parent_action_id: params.parentActionId,
|
|
92
92
|
store_details: params.storeDetails || undefined,
|
|
93
93
|
idempotency_key: params.idempotencyKey,
|
|
94
|
+
require_approval: params.requireApproval || undefined,
|
|
95
|
+
approvers: params.approvers,
|
|
94
96
|
});
|
|
95
97
|
return this.post("/actions", body);
|
|
96
98
|
}
|
package/dist/session.d.ts
CHANGED
package/dist/types.d.ts
CHANGED
|
@@ -7,9 +7,17 @@ export interface ActionReceipt {
|
|
|
7
7
|
timestamp_token: string | null;
|
|
8
8
|
created_at: string;
|
|
9
9
|
request_id: string;
|
|
10
|
+
status?: string;
|
|
10
11
|
action_type?: string;
|
|
11
12
|
agent_id?: string | null;
|
|
12
13
|
warnings?: string[] | null;
|
|
14
|
+
policy_evaluation?: {
|
|
15
|
+
policy_id: string;
|
|
16
|
+
policy_name: string;
|
|
17
|
+
decision: string;
|
|
18
|
+
reasoning: string | null;
|
|
19
|
+
confidence: number | null;
|
|
20
|
+
} | null;
|
|
13
21
|
}
|
|
14
22
|
/** Full action details including receipt and authorizations. */
|
|
15
23
|
export interface ActionDetail {
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "aira-sdk",
|
|
3
|
-
"version": "0.
|
|
4
|
-
"description": "TypeScript SDK for Aira —
|
|
3
|
+
"version": "0.4.0",
|
|
4
|
+
"description": "TypeScript SDK for Aira — AI governance infrastructure",
|
|
5
5
|
"main": "dist/index.js",
|
|
6
6
|
"types": "dist/index.d.ts",
|
|
7
7
|
"exports": {
|