Skip to content

Latest commit

 

History

History
54 lines (45 loc) · 3.08 KB

File metadata and controls

54 lines (45 loc) · 3.08 KB

Roadmap

v0.1

  • Manifest schema
  • Validation
  • Compile to standalone and scheduler targets
  • JSON output for every command
  • describe, inspect, and stdio JSON-RPC
  • Example manifest

v0.2

Shipped

  • Stable manifest versioning rules (v0.1 and v0.2 coexist, version field accepts both)
  • Richer trigger-condition schema
  • Local execution adapter for shell-only workflows
  • Basic sanitization for inspect output and agent-facing text
  • Identity profiles and provider system (none, env-bearer, oidc-client-credentials, oidc-token-exchange)
  • Trust levels (untrusted, restricted, supervised, autonomous) and escalation (fail, human-approval, log-and-proceed)
  • Authorization proof verification (jwt, certificate, detached-signature verifiers)
  • External authorization via OPA provider (Phase 4.5 hook point)
  • Evidence generation (ssh, none evidence providers, separate from v0.1 signing)
  • Credential handoff (downscope and transaction modes)
  • Audit enhancements (delegation chain, trust level, authorization decision, runtime instance attribution, handoff mode)
  • v0.1 to v0.2 conversion utility (agentcli convert)
  • v0.1/v0.2 dual-path execution (zero behavioral change for v0.1 manifests)
  • Provider discovery CLI and JSON-RPC (agentcli identity providers, agentcli identity validate-delegation)
  • Delegation chain validation with policy enforcement
  • Three-stage profile merge (profile, workflow, task) with tightening-only rules
  • Backend compilation preserves v0.2 identity, evidence, authorization proof, and authorization metadata
  • Enterprise identity providers: azure-managed-identity, aws-sts-assume-role, gcp-workload-identity, spiffe-jwt-svid
  • Comprehensive v0.2 profile validation with cross-reference checks for dangling refs
  • Converter produces proper identity profile refs (not inline blocks)
  • 591 total tests including 12 end-to-end integration tests
  • Local approval gate enforcement in agentcli exec with single-use ssh-signed grants (agentcli approve, agentcli approvals list|revoke, exec --approval-id); approval records stored at ~/.agentcli/state/approvals.ndjson; enforces approval.policy: manual and approval.policy: auto-reject

v0.3

  • Additional Entra Agent ID governance features (Conditional Access policy integration, agent lifecycle hooks)
  • Mid-execution credential refresh for long-running tasks (runtime-managed session renewal)
  • Agent registry export compatibility (structured identity profiles exportable for Entra Agent Registry, organizational CMDBs)
  • Multi-runtime credential handoff (cross-backend derived credential propagation)
  • CIBA-based human approval for trust escalation (out-of-band approval flow for require-escalation decisions)
  • Richer approval policy model building on the v0.2 local gate (approval quorum/multi-party, approver identity attribution beyond SSH principal, scheduler/local-gate unification)
  • Streaming watch / tail surfaces for runtime state
  • Scheduler lineage and causality queries

v0.4

  • MCP server
  • Event streaming / NDJSON output
  • Adapter/plugin boundary for non-scheduler runtimes