web-agent-bridge 3.0.0 → 3.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +72 -21
- package/README.ar.md +1286 -1073
- package/README.md +1764 -1535
- package/bin/agent-runner.js +474 -474
- package/bin/cli.js +237 -138
- package/bin/wab.js +80 -80
- package/examples/bidi-agent.js +119 -119
- package/examples/cross-site-agent.js +91 -91
- package/examples/mcp-agent.js +94 -94
- package/examples/next-app-router/README.md +44 -44
- package/examples/puppeteer-agent.js +108 -108
- package/examples/saas-dashboard/README.md +55 -55
- package/examples/shopify-hydrogen/README.md +74 -74
- package/examples/vision-agent.js +171 -171
- package/examples/wordpress-elementor/README.md +77 -77
- package/package.json +17 -3
- package/public/.well-known/agent-tools.json +180 -180
- package/public/.well-known/ai-assets.json +59 -59
- package/public/.well-known/ai-plugin.json +28 -0
- package/public/.well-known/security.txt +8 -0
- package/public/agent-workspace.html +349 -347
- package/public/ai.html +198 -196
- package/public/api.html +413 -0
- package/public/browser.html +486 -484
- package/public/commander-dashboard.html +243 -243
- package/public/cookies.html +210 -208
- package/public/css/agent-workspace.css +1713 -1713
- package/public/css/premium.css +317 -317
- package/public/css/styles.css +1235 -1235
- package/public/dashboard.html +706 -704
- package/public/demo.html +1770 -1
- package/public/dns.html +507 -0
- package/public/docs.html +587 -585
- package/public/feed.xml +89 -89
- package/public/growth.html +463 -0
- package/public/index.html +341 -9
- package/public/integrations.html +556 -0
- package/public/js/agent-workspace.js +1740 -1740
- package/public/js/auth-nav.js +31 -31
- package/public/js/auth-redirect.js +12 -12
- package/public/js/cookie-consent.js +56 -56
- package/public/js/wab-demo-page.js +721 -721
- package/public/js/ws-client.js +74 -74
- package/public/llms-full.txt +360 -309
- package/public/llms.txt +125 -86
- package/public/login.html +85 -83
- package/public/mesh-dashboard.html +328 -328
- package/public/openapi.json +580 -580
- package/public/phone-shield.html +281 -0
- package/public/premium-dashboard.html +2489 -2487
- package/public/premium.html +793 -791
- package/public/privacy.html +297 -295
- package/public/register.html +105 -103
- package/public/robots.txt +87 -87
- package/public/script/wab-consent.d.ts +36 -36
- package/public/script/wab-consent.js +104 -104
- package/public/script/wab-schema.js +131 -131
- package/public/script/wab.d.ts +108 -108
- package/public/script/wab.min.js +580 -580
- package/public/security.txt +8 -0
- package/public/terms.html +256 -254
- package/script/ai-agent-bridge.js +1754 -1754
- package/sdk/README.md +99 -99
- package/sdk/agent-mesh.js +449 -449
- package/sdk/commander.js +262 -262
- package/sdk/index.d.ts +464 -464
- package/sdk/index.js +18 -1
- package/sdk/multi-agent.js +318 -318
- package/sdk/package.json +12 -1
- package/sdk/safety-shield.js +219 -0
- package/sdk/schema-discovery.js +83 -83
- package/server/adapters/index.js +520 -520
- package/server/config/plans.js +367 -367
- package/server/config/secrets.js +102 -102
- package/server/control-plane/index.js +301 -301
- package/server/data-plane/index.js +354 -354
- package/server/index.js +175 -19
- package/server/llm/index.js +404 -404
- package/server/middleware/adminAuth.js +35 -35
- package/server/middleware/auth.js +50 -50
- package/server/middleware/featureGate.js +88 -88
- package/server/middleware/rateLimits.js +100 -100
- package/server/middleware/sensitiveAction.js +157 -0
- package/server/migrations/001_add_analytics_indexes.sql +7 -7
- package/server/migrations/002_premium_features.sql +418 -418
- package/server/migrations/003_ads_integer_cents.sql +33 -33
- package/server/migrations/004_agent_os.sql +158 -158
- package/server/migrations/005_marketplace_metering.sql +126 -126
- package/server/models/adapters/index.js +33 -33
- package/server/models/adapters/mysql.js +183 -183
- package/server/models/adapters/postgresql.js +172 -172
- package/server/models/adapters/sqlite.js +7 -7
- package/server/models/db.js +681 -681
- package/server/observability/failure-analysis.js +337 -337
- package/server/observability/index.js +394 -394
- package/server/protocol/capabilities.js +223 -223
- package/server/protocol/index.js +243 -243
- package/server/protocol/schema.js +584 -584
- package/server/registry/certification.js +271 -271
- package/server/registry/index.js +326 -326
- package/server/routes/admin-premium.js +671 -671
- package/server/routes/admin.js +261 -261
- package/server/routes/ads.js +130 -130
- package/server/routes/agent-workspace.js +540 -378
- package/server/routes/api.js +150 -150
- package/server/routes/auth.js +71 -71
- package/server/routes/billing.js +45 -45
- package/server/routes/commander.js +316 -316
- package/server/routes/demo-showcase.js +332 -0
- package/server/routes/demo-store.js +154 -0
- package/server/routes/discovery.js +417 -406
- package/server/routes/gateway.js +173 -0
- package/server/routes/license.js +251 -240
- package/server/routes/mesh.js +469 -469
- package/server/routes/noscript.js +543 -543
- package/server/routes/premium-v2.js +686 -686
- package/server/routes/premium.js +724 -724
- package/server/routes/runtime.js +2148 -2147
- package/server/routes/sovereign.js +465 -385
- package/server/routes/universal.js +200 -177
- package/server/routes/wab-api.js +850 -491
- package/server/runtime/container-worker.js +111 -111
- package/server/runtime/container.js +448 -448
- package/server/runtime/distributed-worker.js +362 -362
- package/server/runtime/event-bus.js +210 -210
- package/server/runtime/index.js +253 -253
- package/server/runtime/queue.js +599 -599
- package/server/runtime/replay.js +666 -666
- package/server/runtime/sandbox.js +266 -266
- package/server/runtime/scheduler.js +534 -534
- package/server/runtime/session-engine.js +293 -293
- package/server/runtime/state-manager.js +188 -188
- package/server/security/cross-site-redactor.js +196 -0
- package/server/security/dry-run.js +180 -0
- package/server/security/human-gate-rate-limit.js +147 -0
- package/server/security/human-gate-transports.js +178 -0
- package/server/security/human-gate.js +281 -0
- package/server/security/index.js +368 -368
- package/server/security/intent-engine.js +245 -0
- package/server/security/reward-guard.js +171 -0
- package/server/security/rollback-store.js +239 -0
- package/server/security/token-scope.js +404 -0
- package/server/security/url-policy.js +139 -0
- package/server/services/agent-chat.js +506 -506
- package/server/services/agent-learning.js +601 -575
- package/server/services/agent-memory.js +625 -625
- package/server/services/agent-mesh.js +555 -539
- package/server/services/agent-symphony.js +717 -717
- package/server/services/agent-tasks.js +1807 -1807
- package/server/services/api-key-engine.js +292 -0
- package/server/services/cluster.js +894 -894
- package/server/services/commander.js +738 -738
- package/server/services/edge-compute.js +440 -440
- package/server/services/email.js +204 -204
- package/server/services/hosted-runtime.js +205 -205
- package/server/services/lfd.js +635 -616
- package/server/services/local-ai.js +389 -389
- package/server/services/marketplace.js +270 -270
- package/server/services/metering.js +182 -182
- package/server/services/modules/affiliate-intelligence.js +93 -0
- package/server/services/modules/agent-firewall.js +90 -0
- package/server/services/modules/bounty.js +89 -0
- package/server/services/modules/collective-bargaining.js +92 -0
- package/server/services/modules/dark-pattern.js +66 -0
- package/server/services/modules/gov-intelligence.js +45 -0
- package/server/services/modules/neural.js +55 -0
- package/server/services/modules/notary.js +49 -0
- package/server/services/modules/price-time-machine.js +86 -0
- package/server/services/modules/protocol.js +104 -0
- package/server/services/negotiation.js +439 -439
- package/server/services/plugins.js +771 -771
- package/server/services/premium.js +1 -1
- package/server/services/price-intelligence.js +566 -565
- package/server/services/price-shield.js +1137 -1137
- package/server/services/reputation.js +465 -465
- package/server/services/search-engine.js +357 -357
- package/server/services/security.js +513 -513
- package/server/services/self-healing.js +843 -843
- package/server/services/sovereign-shield.js +542 -0
- package/server/services/stripe.js +192 -192
- package/server/services/swarm.js +788 -788
- package/server/services/universal-scraper.js +662 -661
- package/server/services/verification.js +481 -481
- package/server/services/vision.js +1163 -1163
- package/server/utils/cache.js +125 -125
- package/server/utils/migrate.js +81 -81
- package/server/utils/safe-fetch.js +228 -0
- package/server/utils/secureFields.js +50 -50
- package/server/ws.js +161 -161
- package/templates/artisan-marketplace.yaml +104 -104
- package/templates/book-price-scout.yaml +98 -98
- package/templates/electronics-price-tracker.yaml +108 -108
- package/templates/flight-deal-hunter.yaml +113 -113
- package/templates/freelancer-direct.yaml +116 -116
- package/templates/grocery-price-compare.yaml +93 -93
- package/templates/hotel-direct-booking.yaml +113 -113
- package/templates/local-services.yaml +98 -98
- package/templates/olive-oil-tunisia.yaml +88 -88
- package/templates/organic-farm-fresh.yaml +101 -101
- package/templates/restaurant-direct.yaml +97 -97
- package/server/services/fairness-engine.js +0 -409
- package/server/services/fairness.js +0 -420
|
@@ -0,0 +1,245 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* WAB Safety Shield — Intent Analysis Engine (SPEC §8.12)
|
|
5
|
+
*
|
|
6
|
+
* Deterministic, dependency-free risk scorer that runs on every agent
|
|
7
|
+
* action AFTER scope/dry-run/human-gate. The engine looks at the
|
|
8
|
+
* COMPOSITION of the request (verb class, target environment, magnitude,
|
|
9
|
+
* danger tokens in params, recent agent behaviour) and decides whether
|
|
10
|
+
* to ALLOW, escalate to DRY_RUN, escalate to HUMAN_GATE, or BLOCK.
|
|
11
|
+
*
|
|
12
|
+
* Why a separate layer?
|
|
13
|
+
* - Scope tokens enforce *what the token is allowed to do*.
|
|
14
|
+
* - Dry-run forces a 2-step preview for known destructive verbs.
|
|
15
|
+
* - Human gate adds OOB approval for Pro+ deployments.
|
|
16
|
+
* - The Intent Engine catches panic patterns that pass all three:
|
|
17
|
+
* e.g. an agent that just got an error tries `delete-all + force`
|
|
18
|
+
* on a production database — score=critical → block, even if the
|
|
19
|
+
* token has admin scope.
|
|
20
|
+
*
|
|
21
|
+
* Scoring is bounded 0..100. The engine returns the highest-severity
|
|
22
|
+
* required gate; the route is responsible for enforcing it.
|
|
23
|
+
*
|
|
24
|
+
* The engine is intentionally pure & synchronous so it can run on the
|
|
25
|
+
* hot path without I/O. A tiny in-memory ring buffer tracks per-actor
|
|
26
|
+
* velocity & burst patterns over the last 60 seconds.
|
|
27
|
+
*/
|
|
28
|
+
|
|
29
|
+
const DEFAULT_THRESHOLDS = Object.freeze({
|
|
30
|
+
low: 30, // 0-29 → allow
|
|
31
|
+
medium: 70, // 30-69 → require dry-run
|
|
32
|
+
high: 90, // 70-89 → require human gate
|
|
33
|
+
// 90+ → block outright
|
|
34
|
+
});
|
|
35
|
+
|
|
36
|
+
const DANGER_TOKENS = [
|
|
37
|
+
'force', 'skip-checks', 'skip_checks', 'no-backup', 'no_backup',
|
|
38
|
+
'permanent', 'permanently', 'irrecoverable', 'cascade', 'recursive',
|
|
39
|
+
'all', 'everything', 'wildcard', '--force', '--yes', 'confirm-destroy',
|
|
40
|
+
];
|
|
41
|
+
|
|
42
|
+
const DESTRUCTIVE_VERB_PATTERNS = [
|
|
43
|
+
/^(delete|drop|destroy|wipe|purge|truncate|remove|erase|annihilate)/i,
|
|
44
|
+
/^(uninstall|deprovision|terminate)/i,
|
|
45
|
+
];
|
|
46
|
+
|
|
47
|
+
const WRITE_VERB_PATTERNS = [
|
|
48
|
+
/^(create|update|modify|patch|set|write|insert|put|post|publish|deploy|merge|push)/i,
|
|
49
|
+
];
|
|
50
|
+
|
|
51
|
+
const ENV_WEIGHTS = Object.freeze({
|
|
52
|
+
production: 30,
|
|
53
|
+
prod: 30,
|
|
54
|
+
live: 30,
|
|
55
|
+
staging: 10,
|
|
56
|
+
preview: 5,
|
|
57
|
+
development: 0,
|
|
58
|
+
dev: 0,
|
|
59
|
+
test: 0,
|
|
60
|
+
});
|
|
61
|
+
|
|
62
|
+
// ─── per-actor velocity tracker ──────────────────────────────────────
|
|
63
|
+
// actorKey -> [{ ts, action, env, score }]
|
|
64
|
+
const _history = new Map();
|
|
65
|
+
const HISTORY_WINDOW_MS = 60_000;
|
|
66
|
+
const HISTORY_MAX_PER_ACTOR = 50;
|
|
67
|
+
|
|
68
|
+
function _trim(arr) {
|
|
69
|
+
const cutoff = Date.now() - HISTORY_WINDOW_MS;
|
|
70
|
+
while (arr.length && arr[0].ts < cutoff) arr.shift();
|
|
71
|
+
while (arr.length > HISTORY_MAX_PER_ACTOR) arr.shift();
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
function _record(actorKey, entry) {
|
|
75
|
+
if (!actorKey) return;
|
|
76
|
+
let arr = _history.get(actorKey);
|
|
77
|
+
if (!arr) { arr = []; _history.set(actorKey, arr); }
|
|
78
|
+
arr.push(entry);
|
|
79
|
+
_trim(arr);
|
|
80
|
+
}
|
|
81
|
+
|
|
82
|
+
function _getHistory(actorKey) {
|
|
83
|
+
if (!actorKey) return [];
|
|
84
|
+
const arr = _history.get(actorKey);
|
|
85
|
+
if (!arr) return [];
|
|
86
|
+
_trim(arr);
|
|
87
|
+
return arr;
|
|
88
|
+
}
|
|
89
|
+
|
|
90
|
+
// ─── helpers ─────────────────────────────────────────────────────────
|
|
91
|
+
|
|
92
|
+
function _classifyVerb(actionName) {
|
|
93
|
+
if (!actionName) return 'unknown';
|
|
94
|
+
if (DESTRUCTIVE_VERB_PATTERNS.some((re) => re.test(actionName))) return 'destructive';
|
|
95
|
+
if (WRITE_VERB_PATTERNS.some((re) => re.test(actionName))) return 'write';
|
|
96
|
+
return 'read';
|
|
97
|
+
}
|
|
98
|
+
|
|
99
|
+
function _envWeight(env) {
|
|
100
|
+
return ENV_WEIGHTS[String(env || 'production').toLowerCase()] ?? 30;
|
|
101
|
+
}
|
|
102
|
+
|
|
103
|
+
function _flatStrings(value, out = [], depth = 0) {
|
|
104
|
+
if (depth > 4 || value == null) return out;
|
|
105
|
+
if (typeof value === 'string') { out.push(value.toLowerCase()); return out; }
|
|
106
|
+
if (typeof value === 'number' || typeof value === 'boolean') { out.push(String(value).toLowerCase()); return out; }
|
|
107
|
+
if (Array.isArray(value)) { for (const v of value) _flatStrings(v, out, depth + 1); return out; }
|
|
108
|
+
if (typeof value === 'object') {
|
|
109
|
+
for (const [k, v] of Object.entries(value)) {
|
|
110
|
+
out.push(String(k).toLowerCase());
|
|
111
|
+
_flatStrings(v, out, depth + 1);
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
return out;
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
function _detectDangerTokens(params) {
|
|
118
|
+
const flat = _flatStrings(params || {});
|
|
119
|
+
const found = new Set();
|
|
120
|
+
for (const s of flat) {
|
|
121
|
+
if (s === 'true') continue;
|
|
122
|
+
for (const t of DANGER_TOKENS) {
|
|
123
|
+
if (s === t || s.includes(t)) { found.add(t); break; }
|
|
124
|
+
}
|
|
125
|
+
}
|
|
126
|
+
return [...found];
|
|
127
|
+
}
|
|
128
|
+
|
|
129
|
+
function _magnitudeSignal(params) {
|
|
130
|
+
const flat = _flatStrings(params || {});
|
|
131
|
+
let score = 0;
|
|
132
|
+
const reasons = [];
|
|
133
|
+
// Wildcards
|
|
134
|
+
for (const s of flat) {
|
|
135
|
+
if (s === '*' || s === '%' || s === 'all' || s === 'everything') {
|
|
136
|
+
score += 15; reasons.push(`wildcard:"${s}"`); break;
|
|
137
|
+
}
|
|
138
|
+
}
|
|
139
|
+
// Large arrays anywhere → bulk operation
|
|
140
|
+
function walk(v, depth = 0) {
|
|
141
|
+
if (depth > 4 || v == null) return;
|
|
142
|
+
if (Array.isArray(v)) {
|
|
143
|
+
if (v.length >= 20) { score += 10; reasons.push(`large_array:${v.length}`); }
|
|
144
|
+
for (const x of v) walk(x, depth + 1);
|
|
145
|
+
} else if (typeof v === 'object') {
|
|
146
|
+
for (const x of Object.values(v)) walk(x, depth + 1);
|
|
147
|
+
}
|
|
148
|
+
}
|
|
149
|
+
walk(params || {});
|
|
150
|
+
return { score: Math.min(score, 30), reasons };
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
// ─── public API ──────────────────────────────────────────────────────
|
|
154
|
+
|
|
155
|
+
/**
|
|
156
|
+
* Score a request. Returns:
|
|
157
|
+
* {
|
|
158
|
+
* score: number (0..100, capped),
|
|
159
|
+
* level: 'low' | 'medium' | 'high' | 'critical',
|
|
160
|
+
* verb_class:'read'|'write'|'destructive'|'unknown',
|
|
161
|
+
* required_gate: null | 'dry_run' | 'human_gate' | 'block',
|
|
162
|
+
* reasons: string[],
|
|
163
|
+
* rewrites: Array<{from:string, to:string, reason:string}>,
|
|
164
|
+
* }
|
|
165
|
+
*
|
|
166
|
+
* Inputs:
|
|
167
|
+
* ctx = { actorId, sessionToken, siteId, actionName, params, env, tier }
|
|
168
|
+
* siteConfig may override thresholds via siteConfig.intentEngine = {
|
|
169
|
+
* thresholds:{ low,medium,high }, weights:{...},
|
|
170
|
+
* dangerTokens:[...], rewrites:{ from->to }
|
|
171
|
+
* }
|
|
172
|
+
*/
|
|
173
|
+
function score(ctx, siteConfig = {}) {
|
|
174
|
+
const cfg = siteConfig.intentEngine || {};
|
|
175
|
+
const thresholds = { ...DEFAULT_THRESHOLDS, ...(cfg.thresholds || {}) };
|
|
176
|
+
const reasons = [];
|
|
177
|
+
const rewrites = [];
|
|
178
|
+
let s = 0;
|
|
179
|
+
|
|
180
|
+
const verb = _classifyVerb(ctx.actionName);
|
|
181
|
+
if (verb === 'destructive') { s += 50; reasons.push('verb:destructive'); }
|
|
182
|
+
else if (verb === 'write') { s += 10; reasons.push('verb:write'); }
|
|
183
|
+
|
|
184
|
+
const env = ctx.env || siteConfig.environment || 'production';
|
|
185
|
+
const ew = _envWeight(env);
|
|
186
|
+
// Reads on production are not by themselves risky — only weight env for write/destructive.
|
|
187
|
+
if (ew > 0 && verb !== 'read') { s += ew; reasons.push(`env:${env}(+${ew})`); }
|
|
188
|
+
|
|
189
|
+
const danger = _detectDangerTokens(ctx.params);
|
|
190
|
+
if (danger.length) { s += Math.min(30, danger.length * 15); reasons.push(`danger_tokens:${danger.join(',')}`); }
|
|
191
|
+
|
|
192
|
+
const mag = _magnitudeSignal(ctx.params);
|
|
193
|
+
if (mag.score) { s += mag.score; reasons.push(...mag.reasons); }
|
|
194
|
+
|
|
195
|
+
// Burst / velocity: count similar destructive actions in window
|
|
196
|
+
const actorKey = ctx.actorId || ctx.sessionToken || ctx.siteId || 'anon';
|
|
197
|
+
const history = _getHistory(actorKey);
|
|
198
|
+
const recentDestructive = history.filter((h) => h.verb === 'destructive').length;
|
|
199
|
+
if (recentDestructive >= 3) { s += 15; reasons.push(`burst:${recentDestructive}_destructive_in_60s`); }
|
|
200
|
+
const last = history[history.length - 1];
|
|
201
|
+
if (last && Date.now() - last.ts < 1000 && verb !== 'read') {
|
|
202
|
+
s += 10; reasons.push('velocity:<1s_since_last');
|
|
203
|
+
}
|
|
204
|
+
|
|
205
|
+
// Optional site rewrites: e.g. "delete-account" -> "deactivate-account"
|
|
206
|
+
const rwMap = cfg.rewrites || {};
|
|
207
|
+
if (rwMap[ctx.actionName]) {
|
|
208
|
+
rewrites.push({
|
|
209
|
+
from: ctx.actionName, to: rwMap[ctx.actionName],
|
|
210
|
+
reason: 'site policy prefers a reversible alternative',
|
|
211
|
+
});
|
|
212
|
+
}
|
|
213
|
+
|
|
214
|
+
// Heuristic safe-rewrite for destructive verbs touching well-known nouns.
|
|
215
|
+
if (verb === 'destructive' && /account|user|invoice|order/i.test(ctx.actionName) && !rwMap[ctx.actionName]) {
|
|
216
|
+
const safe = ctx.actionName.replace(/^(delete|destroy|wipe|purge|remove)/i, 'archive');
|
|
217
|
+
if (safe !== ctx.actionName) rewrites.push({ from: ctx.actionName, to: safe, reason: 'archive-instead-of-delete fallback' });
|
|
218
|
+
}
|
|
219
|
+
|
|
220
|
+
// Cap and classify
|
|
221
|
+
s = Math.min(100, Math.max(0, Math.round(s)));
|
|
222
|
+
let level = 'low';
|
|
223
|
+
let required_gate = null;
|
|
224
|
+
if (s >= thresholds.high) { level = 'critical'; required_gate = 'block'; }
|
|
225
|
+
else if (s >= thresholds.medium) { level = 'high'; required_gate = 'human_gate'; }
|
|
226
|
+
else if (s >= thresholds.low) { level = 'medium'; required_gate = 'dry_run'; }
|
|
227
|
+
|
|
228
|
+
// Record for next call
|
|
229
|
+
_record(actorKey, { ts: Date.now(), action: ctx.actionName, env, verb, score: s });
|
|
230
|
+
|
|
231
|
+
return { score: s, level, verb_class: verb, required_gate, reasons, rewrites };
|
|
232
|
+
}
|
|
233
|
+
|
|
234
|
+
function _resetForTests() {
|
|
235
|
+
_history.clear();
|
|
236
|
+
}
|
|
237
|
+
|
|
238
|
+
module.exports = {
|
|
239
|
+
score,
|
|
240
|
+
_classifyVerb,
|
|
241
|
+
_detectDangerTokens,
|
|
242
|
+
_resetForTests,
|
|
243
|
+
DEFAULT_THRESHOLDS,
|
|
244
|
+
DANGER_TOKENS,
|
|
245
|
+
};
|
|
@@ -0,0 +1,171 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* Reward Guard — defenses against reward-hacking in the local RL engine.
|
|
5
|
+
*
|
|
6
|
+
* Threats addressed:
|
|
7
|
+
* 1. Out-of-bounds rewards (writers stuffing huge positive numbers).
|
|
8
|
+
* 2. Sudden gradient explosions (sequence of large positive rewards on
|
|
9
|
+
* previously-low-confidence actions, indicative of a feedback loop).
|
|
10
|
+
* 3. Per-actor abuse (one user/agent flooding rewards to skew a policy).
|
|
11
|
+
* 4. Rewards on sensitive actions without HITL approval.
|
|
12
|
+
*
|
|
13
|
+
* Defenses:
|
|
14
|
+
* - Clamp reward to [REWARD_MIN, REWARD_MAX].
|
|
15
|
+
* - Per-(site,agent,domain) sliding window with EMA + variance check.
|
|
16
|
+
* - Per-actor rate limit (default 60 reward writes / 5 min).
|
|
17
|
+
* - Block rewards on actions in the SENSITIVE_VERBS set unless an
|
|
18
|
+
* `approvedBy` field is present and references a human user id.
|
|
19
|
+
* - Append-only `reward_audit` table for human review.
|
|
20
|
+
*/
|
|
21
|
+
|
|
22
|
+
const crypto = require('crypto');
|
|
23
|
+
const { db } = require('../models/db');
|
|
24
|
+
const { SENSITIVE_VERBS } = require('../middleware/sensitiveAction');
|
|
25
|
+
|
|
26
|
+
const REWARD_MIN = -1.0;
|
|
27
|
+
const REWARD_MAX = 1.0;
|
|
28
|
+
const ANOMALY_Z_SCORE = 4.0; // |reward - mean| / std > 4 → anomaly
|
|
29
|
+
const RATE_LIMIT_WINDOW_MS = 5 * 60 * 1000;
|
|
30
|
+
const RATE_LIMIT_MAX = 60;
|
|
31
|
+
|
|
32
|
+
db.exec(`
|
|
33
|
+
CREATE TABLE IF NOT EXISTS reward_audit (
|
|
34
|
+
id TEXT PRIMARY KEY,
|
|
35
|
+
site_id TEXT,
|
|
36
|
+
agent_id TEXT,
|
|
37
|
+
domain TEXT,
|
|
38
|
+
action TEXT,
|
|
39
|
+
raw_reward REAL,
|
|
40
|
+
final_reward REAL,
|
|
41
|
+
decision TEXT NOT NULL CHECK(decision IN ('accepted','clamped','blocked','flagged')),
|
|
42
|
+
reason TEXT,
|
|
43
|
+
actor_id TEXT,
|
|
44
|
+
approved_by TEXT,
|
|
45
|
+
created_at TEXT DEFAULT (datetime('now'))
|
|
46
|
+
);
|
|
47
|
+
CREATE INDEX IF NOT EXISTS idx_reward_audit_site ON reward_audit(site_id, agent_id);
|
|
48
|
+
CREATE INDEX IF NOT EXISTS idx_reward_audit_decision ON reward_audit(decision);
|
|
49
|
+
`);
|
|
50
|
+
|
|
51
|
+
const _rateBuckets = new Map(); // actorKey → [{ts}, ...]
|
|
52
|
+
const _emaState = new Map(); // bucketKey → { mean, var, n }
|
|
53
|
+
|
|
54
|
+
function _bucketKey(siteId, agentId, domain) {
|
|
55
|
+
return `${siteId || ''}::${agentId || ''}::${domain || ''}`;
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
function _checkRate(actorKey) {
|
|
59
|
+
const now = Date.now();
|
|
60
|
+
const bucket = _rateBuckets.get(actorKey) || [];
|
|
61
|
+
const fresh = bucket.filter((t) => now - t < RATE_LIMIT_WINDOW_MS);
|
|
62
|
+
fresh.push(now);
|
|
63
|
+
_rateBuckets.set(actorKey, fresh);
|
|
64
|
+
return fresh.length <= RATE_LIMIT_MAX;
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
function _updateEma(bucketKey, x) {
|
|
68
|
+
// Welford-style streaming mean/variance.
|
|
69
|
+
const s = _emaState.get(bucketKey) || { mean: 0, m2: 0, n: 0 };
|
|
70
|
+
s.n += 1;
|
|
71
|
+
const delta = x - s.mean;
|
|
72
|
+
s.mean += delta / s.n;
|
|
73
|
+
s.m2 += delta * (x - s.mean);
|
|
74
|
+
_emaState.set(bucketKey, s);
|
|
75
|
+
const variance = s.n > 1 ? s.m2 / (s.n - 1) : 1;
|
|
76
|
+
return { mean: s.mean, std: Math.sqrt(Math.max(variance, 1e-6)), n: s.n };
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
function _audit(row) {
|
|
80
|
+
db.prepare(`INSERT INTO reward_audit
|
|
81
|
+
(id, site_id, agent_id, domain, action, raw_reward, final_reward, decision, reason, actor_id, approved_by)
|
|
82
|
+
VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)`).run(
|
|
83
|
+
crypto.randomUUID(), row.siteId || null, row.agentId || null, row.domain || null,
|
|
84
|
+
row.action || null, row.rawReward, row.finalReward, row.decision, row.reason || null,
|
|
85
|
+
row.actorId || null, row.approvedBy || null
|
|
86
|
+
);
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
function _isSensitive(action) {
|
|
90
|
+
if (!action) return false;
|
|
91
|
+
const tokens = String(action).toLowerCase().split(/[\s.\-_/:]+/);
|
|
92
|
+
return tokens.some((t) => SENSITIVE_VERBS.has(t));
|
|
93
|
+
}
|
|
94
|
+
|
|
95
|
+
/**
|
|
96
|
+
* Sanitize a reward emitted by an agent. Returns a `{ reward, decision }`
|
|
97
|
+
* tuple. Always logs to reward_audit.
|
|
98
|
+
*
|
|
99
|
+
* @param {object} input
|
|
100
|
+
* @param {string} input.siteId
|
|
101
|
+
* @param {string} input.agentId
|
|
102
|
+
* @param {string} input.domain
|
|
103
|
+
* @param {string} input.action
|
|
104
|
+
* @param {number} input.reward
|
|
105
|
+
* @param {string} [input.actorId]
|
|
106
|
+
* @param {string} [input.approvedBy] - human user id approving the reward
|
|
107
|
+
*/
|
|
108
|
+
function sanitizeReward(input) {
|
|
109
|
+
const { siteId, agentId, domain, action, reward, actorId, approvedBy } = input;
|
|
110
|
+
const raw = Number(reward);
|
|
111
|
+
|
|
112
|
+
if (!Number.isFinite(raw)) {
|
|
113
|
+
_audit({ ...input, rawReward: reward, finalReward: 0, decision: 'blocked', reason: 'non-finite reward' });
|
|
114
|
+
return { reward: 0, decision: 'blocked', reason: 'non-finite reward' };
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
const actorKey = actorId || agentId || 'anon';
|
|
118
|
+
if (!_checkRate(actorKey)) {
|
|
119
|
+
_audit({ ...input, rawReward: raw, finalReward: 0, decision: 'blocked', reason: 'rate limit exceeded' });
|
|
120
|
+
return { reward: 0, decision: 'blocked', reason: 'reward rate limit exceeded' };
|
|
121
|
+
}
|
|
122
|
+
|
|
123
|
+
if (_isSensitive(action) && !approvedBy) {
|
|
124
|
+
_audit({ ...input, rawReward: raw, finalReward: 0, decision: 'blocked', reason: 'sensitive action without HITL approval' });
|
|
125
|
+
return { reward: 0, decision: 'blocked', reason: 'sensitive action requires approvedBy' };
|
|
126
|
+
}
|
|
127
|
+
|
|
128
|
+
// Clamp.
|
|
129
|
+
let clamped = Math.max(REWARD_MIN, Math.min(REWARD_MAX, raw));
|
|
130
|
+
let decision = clamped === raw ? 'accepted' : 'clamped';
|
|
131
|
+
let reason = decision === 'clamped' ? `clamped from ${raw}` : null;
|
|
132
|
+
|
|
133
|
+
// Anomaly detection vs rolling distribution.
|
|
134
|
+
const stats = _updateEma(_bucketKey(siteId, agentId, domain), clamped);
|
|
135
|
+
if (stats.n >= 10) {
|
|
136
|
+
const z = Math.abs(clamped - stats.mean) / stats.std;
|
|
137
|
+
if (z > ANOMALY_Z_SCORE) {
|
|
138
|
+
decision = 'flagged';
|
|
139
|
+
reason = `anomaly z=${z.toFixed(2)} (mean=${stats.mean.toFixed(3)}, std=${stats.std.toFixed(3)})`;
|
|
140
|
+
// Pull large positive flagged values toward the mean to limit damage.
|
|
141
|
+
if (clamped > stats.mean) clamped = stats.mean + stats.std * 2;
|
|
142
|
+
}
|
|
143
|
+
}
|
|
144
|
+
|
|
145
|
+
_audit({ ...input, rawReward: raw, finalReward: clamped, decision, reason });
|
|
146
|
+
return { reward: clamped, decision, reason };
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
function getRecentAudits(limit = 100, decision) {
|
|
150
|
+
if (decision) {
|
|
151
|
+
return db.prepare(`SELECT * FROM reward_audit WHERE decision = ? ORDER BY rowid DESC LIMIT ?`).all(decision, limit);
|
|
152
|
+
}
|
|
153
|
+
return db.prepare(`SELECT * FROM reward_audit ORDER BY rowid DESC LIMIT ?`).all(limit);
|
|
154
|
+
}
|
|
155
|
+
|
|
156
|
+
function getStats() {
|
|
157
|
+
const counts = db.prepare(`SELECT decision, COUNT(*) as n FROM reward_audit GROUP BY decision`).all();
|
|
158
|
+
return {
|
|
159
|
+
bounds: { min: REWARD_MIN, max: REWARD_MAX, anomalyZ: ANOMALY_Z_SCORE },
|
|
160
|
+
rateLimit: { windowMs: RATE_LIMIT_WINDOW_MS, max: RATE_LIMIT_MAX },
|
|
161
|
+
counts: counts.reduce((acc, r) => ({ ...acc, [r.decision]: r.n }), {}),
|
|
162
|
+
};
|
|
163
|
+
}
|
|
164
|
+
|
|
165
|
+
module.exports = {
|
|
166
|
+
sanitizeReward,
|
|
167
|
+
getRecentAudits,
|
|
168
|
+
getStats,
|
|
169
|
+
REWARD_MIN,
|
|
170
|
+
REWARD_MAX,
|
|
171
|
+
};
|
|
@@ -0,0 +1,239 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
/**
|
|
4
|
+
* WAB Safety Shield — Snapshot & Rollback Store (SPEC §8.13)
|
|
5
|
+
*
|
|
6
|
+
* Persists a "before-image" snapshot for every destructive action that
|
|
7
|
+
* site adapters opt into, plus a forward audit linking the snapshot to
|
|
8
|
+
* the agent action that created it. Operators (or the site admin UI)
|
|
9
|
+
* can then `restore` a snapshot to undo agent damage.
|
|
10
|
+
*
|
|
11
|
+
* The snapshot payload is opaque JSON provided by the site adapter
|
|
12
|
+
* (e.g. a serialized DB row, a tombstoned file URL, an S3 version-id).
|
|
13
|
+
* This module owns ONLY the durable index + lifecycle; it does not
|
|
14
|
+
* know how to actually restore site data — that contract is delegated
|
|
15
|
+
* to a per-site `restorer` callable registered via `setRestorer`.
|
|
16
|
+
*
|
|
17
|
+
* Tier: Enterprise.
|
|
18
|
+
*/
|
|
19
|
+
|
|
20
|
+
const crypto = require('crypto');
|
|
21
|
+
const { db } = require('../models/db');
|
|
22
|
+
|
|
23
|
+
// Schema is created lazily so this module can be required even on
|
|
24
|
+
// installations that do not enable rollback.
|
|
25
|
+
let _initialized = false;
|
|
26
|
+
function _ensureSchema() {
|
|
27
|
+
if (_initialized) return;
|
|
28
|
+
db.exec(`
|
|
29
|
+
CREATE TABLE IF NOT EXISTS wab_snapshots (
|
|
30
|
+
id TEXT PRIMARY KEY,
|
|
31
|
+
site_id TEXT NOT NULL,
|
|
32
|
+
action_name TEXT NOT NULL,
|
|
33
|
+
actor_id TEXT,
|
|
34
|
+
actor_type TEXT NOT NULL DEFAULT 'agent',
|
|
35
|
+
session_fingerprint TEXT,
|
|
36
|
+
params_hash TEXT,
|
|
37
|
+
snapshot TEXT NOT NULL,
|
|
38
|
+
meta TEXT DEFAULT '{}',
|
|
39
|
+
reversible INTEGER NOT NULL DEFAULT 1,
|
|
40
|
+
status TEXT NOT NULL DEFAULT 'recorded'
|
|
41
|
+
CHECK(status IN ('recorded','restored','expired','failed')),
|
|
42
|
+
created_at TEXT NOT NULL DEFAULT (datetime('now')),
|
|
43
|
+
restored_at TEXT,
|
|
44
|
+
expires_at TEXT
|
|
45
|
+
);
|
|
46
|
+
CREATE INDEX IF NOT EXISTS idx_wab_snapshots_site ON wab_snapshots (site_id, created_at DESC);
|
|
47
|
+
CREATE INDEX IF NOT EXISTS idx_wab_snapshots_status ON wab_snapshots (status);
|
|
48
|
+
`);
|
|
49
|
+
_initialized = true;
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
// ─── per-site restorers ──────────────────────────────────────────────
|
|
53
|
+
const _restorers = new Map();
|
|
54
|
+
|
|
55
|
+
/**
|
|
56
|
+
* Register a restorer for a site. The function receives
|
|
57
|
+
* `{ snapshot, action_name, params_hash, meta }` and must return either
|
|
58
|
+
* `{ ok:true }` or `{ ok:false, error }`.
|
|
59
|
+
*/
|
|
60
|
+
function setRestorer(siteId, fn) {
|
|
61
|
+
if (typeof fn !== 'function') throw new TypeError('restorer must be a function');
|
|
62
|
+
_restorers.set(String(siteId), fn);
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
function _getRestorer(siteId) {
|
|
66
|
+
return _restorers.get(String(siteId)) || null;
|
|
67
|
+
}
|
|
68
|
+
|
|
69
|
+
// ─── helpers ─────────────────────────────────────────────────────────
|
|
70
|
+
|
|
71
|
+
function _hashParams(params) {
|
|
72
|
+
const canon = JSON.stringify(_canonicalize(params || {}));
|
|
73
|
+
return crypto.createHash('sha256').update(canon).digest('hex').slice(0, 24);
|
|
74
|
+
}
|
|
75
|
+
function _canonicalize(value) {
|
|
76
|
+
if (value === null || typeof value !== 'object') return value;
|
|
77
|
+
if (Array.isArray(value)) return value.map(_canonicalize);
|
|
78
|
+
const out = {};
|
|
79
|
+
for (const k of Object.keys(value).sort()) out[k] = _canonicalize(value[k]);
|
|
80
|
+
return out;
|
|
81
|
+
}
|
|
82
|
+
function _fingerprint(token) {
|
|
83
|
+
if (!token) return null;
|
|
84
|
+
return crypto.createHash('sha256').update(String(token)).digest('hex').slice(0, 16);
|
|
85
|
+
}
|
|
86
|
+
function _genId() { return 'wabs_' + crypto.randomBytes(16).toString('hex'); }
|
|
87
|
+
|
|
88
|
+
// ─── public API ──────────────────────────────────────────────────────
|
|
89
|
+
|
|
90
|
+
/**
|
|
91
|
+
* Record a snapshot just BEFORE the destructive action runs.
|
|
92
|
+
*
|
|
93
|
+
* @param {object} ctx { siteId, actionName, actorId, sessionToken, params }
|
|
94
|
+
* @param {object} payload { snapshot, meta?, reversible?, ttlMs? }
|
|
95
|
+
* @returns { snapshot_id, expires_at }
|
|
96
|
+
*/
|
|
97
|
+
function recordSnapshot(ctx, payload) {
|
|
98
|
+
_ensureSchema();
|
|
99
|
+
const id = _genId();
|
|
100
|
+
const now = Date.now();
|
|
101
|
+
const ttlMs = Math.max(0, payload.ttlMs || 30 * 24 * 60 * 60 * 1000); // 30 days default
|
|
102
|
+
const expiresAt = ttlMs > 0 ? new Date(now + ttlMs).toISOString() : null;
|
|
103
|
+
|
|
104
|
+
db.prepare(`
|
|
105
|
+
INSERT INTO wab_snapshots
|
|
106
|
+
(id, site_id, action_name, actor_id, actor_type, session_fingerprint, params_hash,
|
|
107
|
+
snapshot, meta, reversible, status, expires_at)
|
|
108
|
+
VALUES (?, ?, ?, ?, 'agent', ?, ?, ?, ?, ?, 'recorded', ?)
|
|
109
|
+
`).run(
|
|
110
|
+
id,
|
|
111
|
+
String(ctx.siteId),
|
|
112
|
+
String(ctx.actionName),
|
|
113
|
+
ctx.actorId || null,
|
|
114
|
+
_fingerprint(ctx.sessionToken),
|
|
115
|
+
_hashParams(ctx.params),
|
|
116
|
+
JSON.stringify(payload.snapshot ?? null),
|
|
117
|
+
JSON.stringify(payload.meta || {}),
|
|
118
|
+
payload.reversible === false ? 0 : 1,
|
|
119
|
+
expiresAt
|
|
120
|
+
);
|
|
121
|
+
|
|
122
|
+
return { snapshot_id: id, expires_at: expiresAt };
|
|
123
|
+
}
|
|
124
|
+
|
|
125
|
+
function getSnapshot(snapshotId) {
|
|
126
|
+
_ensureSchema();
|
|
127
|
+
const row = db.prepare(`SELECT * FROM wab_snapshots WHERE id = ?`).get(snapshotId);
|
|
128
|
+
if (!row) return null;
|
|
129
|
+
return _hydrate(row);
|
|
130
|
+
}
|
|
131
|
+
|
|
132
|
+
function listSnapshots(siteId, opts = {}) {
|
|
133
|
+
_ensureSchema();
|
|
134
|
+
const limit = Math.min(Math.max(opts.limit || 50, 1), 500);
|
|
135
|
+
const status = opts.status;
|
|
136
|
+
const rows = status
|
|
137
|
+
? db.prepare(`SELECT * FROM wab_snapshots WHERE site_id=? AND status=? ORDER BY created_at DESC, rowid DESC LIMIT ?`).all(siteId, status, limit)
|
|
138
|
+
: db.prepare(`SELECT * FROM wab_snapshots WHERE site_id=? ORDER BY created_at DESC, rowid DESC LIMIT ?`).all(siteId, limit);
|
|
139
|
+
return rows.map(_hydrate);
|
|
140
|
+
}
|
|
141
|
+
|
|
142
|
+
function _hydrate(row) {
|
|
143
|
+
let snapshot = null;
|
|
144
|
+
let meta = {};
|
|
145
|
+
try { snapshot = JSON.parse(row.snapshot); } catch (_) {}
|
|
146
|
+
try { meta = JSON.parse(row.meta || '{}'); } catch (_) {}
|
|
147
|
+
return {
|
|
148
|
+
id: row.id,
|
|
149
|
+
site_id: row.site_id,
|
|
150
|
+
action_name: row.action_name,
|
|
151
|
+
actor_id: row.actor_id,
|
|
152
|
+
actor_type: row.actor_type,
|
|
153
|
+
session_fingerprint: row.session_fingerprint,
|
|
154
|
+
params_hash: row.params_hash,
|
|
155
|
+
snapshot,
|
|
156
|
+
meta,
|
|
157
|
+
reversible: !!row.reversible,
|
|
158
|
+
status: row.status,
|
|
159
|
+
created_at: row.created_at,
|
|
160
|
+
restored_at: row.restored_at,
|
|
161
|
+
expires_at: row.expires_at,
|
|
162
|
+
};
|
|
163
|
+
}
|
|
164
|
+
|
|
165
|
+
/**
|
|
166
|
+
* Restore a snapshot. Returns { ok:true } on success, or
|
|
167
|
+
* { ok:false, code, message }. Restoration is single-use: a snapshot
|
|
168
|
+
* already in `restored` cannot be replayed.
|
|
169
|
+
*/
|
|
170
|
+
async function restoreSnapshot(snapshotId, opts = {}) {
|
|
171
|
+
_ensureSchema();
|
|
172
|
+
const row = db.prepare(`SELECT * FROM wab_snapshots WHERE id = ?`).get(snapshotId);
|
|
173
|
+
if (!row) return { ok: false, code: 'SNAPSHOT_NOT_FOUND' };
|
|
174
|
+
if (row.status === 'restored') return { ok: false, code: 'SNAPSHOT_ALREADY_RESTORED' };
|
|
175
|
+
if (row.status === 'expired') return { ok: false, code: 'SNAPSHOT_EXPIRED' };
|
|
176
|
+
if (!row.reversible) return { ok: false, code: 'SNAPSHOT_IRREVERSIBLE' };
|
|
177
|
+
if (row.expires_at && new Date(row.expires_at).getTime() < Date.now()) {
|
|
178
|
+
db.prepare(`UPDATE wab_snapshots SET status='expired' WHERE id=?`).run(snapshotId);
|
|
179
|
+
return { ok: false, code: 'SNAPSHOT_EXPIRED' };
|
|
180
|
+
}
|
|
181
|
+
|
|
182
|
+
const restorer = opts.restorer || _getRestorer(row.site_id);
|
|
183
|
+
if (!restorer) {
|
|
184
|
+
return { ok: false, code: 'NO_RESTORER', message: `no restorer registered for site ${row.site_id}` };
|
|
185
|
+
}
|
|
186
|
+
|
|
187
|
+
let result;
|
|
188
|
+
try {
|
|
189
|
+
result = await restorer({
|
|
190
|
+
snapshot_id: row.id,
|
|
191
|
+
site_id: row.site_id,
|
|
192
|
+
action_name: row.action_name,
|
|
193
|
+
params_hash: row.params_hash,
|
|
194
|
+
snapshot: JSON.parse(row.snapshot),
|
|
195
|
+
meta: JSON.parse(row.meta || '{}'),
|
|
196
|
+
});
|
|
197
|
+
} catch (err) {
|
|
198
|
+
db.prepare(`UPDATE wab_snapshots SET status='failed' WHERE id=?`).run(snapshotId);
|
|
199
|
+
return { ok: false, code: 'RESTORER_THREW', message: err.message };
|
|
200
|
+
}
|
|
201
|
+
|
|
202
|
+
if (!result || result.ok !== true) {
|
|
203
|
+
db.prepare(`UPDATE wab_snapshots SET status='failed' WHERE id=?`).run(snapshotId);
|
|
204
|
+
return { ok: false, code: 'RESTORER_FAILED', message: result?.error || 'restorer reported failure' };
|
|
205
|
+
}
|
|
206
|
+
|
|
207
|
+
db.prepare(`UPDATE wab_snapshots SET status='restored', restored_at=datetime('now') WHERE id=?`).run(snapshotId);
|
|
208
|
+
return { ok: true, snapshot_id: snapshotId };
|
|
209
|
+
}
|
|
210
|
+
|
|
211
|
+
/**
|
|
212
|
+
* Expire snapshots past their TTL. Returns the count expired.
|
|
213
|
+
*/
|
|
214
|
+
function expireOld() {
|
|
215
|
+
_ensureSchema();
|
|
216
|
+
const r = db.prepare(`
|
|
217
|
+
UPDATE wab_snapshots SET status='expired'
|
|
218
|
+
WHERE status='recorded' AND expires_at IS NOT NULL AND expires_at < datetime('now')
|
|
219
|
+
`).run();
|
|
220
|
+
return r.changes || 0;
|
|
221
|
+
}
|
|
222
|
+
|
|
223
|
+
function _resetForTests() {
|
|
224
|
+
_ensureSchema();
|
|
225
|
+
db.prepare(`DELETE FROM wab_snapshots`).run();
|
|
226
|
+
_restorers.clear();
|
|
227
|
+
}
|
|
228
|
+
|
|
229
|
+
module.exports = {
|
|
230
|
+
recordSnapshot,
|
|
231
|
+
getSnapshot,
|
|
232
|
+
listSnapshots,
|
|
233
|
+
restoreSnapshot,
|
|
234
|
+
expireOld,
|
|
235
|
+
setRestorer,
|
|
236
|
+
// test helpers
|
|
237
|
+
_resetForTests,
|
|
238
|
+
_hashParams,
|
|
239
|
+
};
|