You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix(spec): address PR review feedback on security specification
- Rewrite to Requirement:/Scenario: format with RFC 2119 keywords (SHALL/MUST/SHOULD)
- Fix broken GFM table (double pipe in Design Decisions header separator)
- Remove implementation details (file paths, function names) from spec
- Use "Project" consistently instead of "namespace" for Ambient boundary; add terminology note
- Register api/ and security/ domains in specs/index.spec.md
- Fix BOOKMARKS.md domain label (sessions -> api)
- Remove Draft/Authors/Last Updated metadata header to match other specs
- Replace fragile §N anchors with descriptive anchor links in model spec cross-refs
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
Copy file name to clipboardExpand all lines: specs/api/ambient-model.spec.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -747,7 +747,7 @@ GET /api/ambient/v1/projects/{id}/credentials/{cred_id}/token fetch
747
747
748
748
`token` is accepted on `POST` and `PATCH` but **never returned** by standard read endpoints.
749
749
`GET .../token` is gated by `credential:token-reader`. See
750
-
[Security Spec §4](../security/security.spec.md#4-credential-authorization-model) for
750
+
[Security Spec — Token Reader Role Grant](../security/security.spec.md#requirement-token-reader-role-grant) for
751
751
runtime authorization semantics.
752
752
753
753
#### Provider Enum
@@ -790,7 +790,7 @@ Effective permissions = union of all applicable bindings (global ∪ project ∪
790
790
#### Credential Access — Project-Scoped by Default
791
791
792
792
Credentials belong to a project. All agents in the project share them automatically.
793
-
See [Security Spec §4](../security/security.spec.md#4-credential-authorization-model) for
793
+
See [Security Spec — Project-Scoped Credential Sharing](../security/security.spec.md#requirement-project-scoped-credential-sharing) for
794
794
sharing model, K8s analogy, and named patterns.
795
795
796
796
### Built-in Roles
@@ -843,7 +843,7 @@ GET /api/ambient/v1/sessions/{id}/role_bindings
843
843
```
844
844
845
845
The `credential:token-reader` role is platform-internal. See
846
-
[Security Spec §4](../security/security.spec.md#credentialtoken-reader-runtime-grant) for
846
+
[Security Spec — Token Reader Role Grant](../security/security.spec.md#requirement-token-reader-role-grant) for
847
847
grant semantics and CRUD authorization rules.
848
848
849
849
---
@@ -869,7 +869,7 @@ GET /api/ambient/v1/projects/{id}/scheduled-sessions/{sched_id}/runs
869
869
870
870
All backend paths not mapped to a native `/api/ambient/v1/...` endpoint are forwarded
871
871
verbatim to the backend service. See
872
-
[Security Spec §4](../security/security.spec.md#api-server-proxy-authentication) for
872
+
[Security Spec — Proxy Authentication](../security/security.spec.md#requirement-proxy-authentication) for
873
873
authentication and credential injection behavior.
874
874
875
875
This allows SDK and CLI clients to reach the full backend surface through a single
@@ -1087,7 +1087,7 @@ This structure means you can define and compose bespoke agent suites — entire
1087
1087
| This document is the spec | A reconciler will compare the spec (this doc) against code status and surface gaps |
1088
1088
|`labels` / `annotations` are JSONB, not strings | Enables GIN-indexed key/value queries (`@>` operator) without joins; every row carries its own metadata without a separate EAV table. `labels` = queryable tags; `annotations` = freeform notes. Applied to first-class Kinds: User, Project, Agent, Session. Not applied to Inbox, SessionMessage, Role/RoleBinding. |
1089
1089
1090
-
Security and credential design decisions (RBAC scoping, write-only tokens, role catalog rationale) are in [Security Spec §5](../security/security.spec.md#5-design-decisions).
1090
+
Security and credential design decisions (RBAC scoping, write-only tokens, role catalog rationale) are in the [Security Spec — Design Decisions](../security/security.spec.md#design-decisions).
0 commit comments