INTEGRATIONS
Documentation Map
-
Integrations
-
Channel:
stable -
Source repo:
JaddaHelpifyr/jhf-keystore
INTEGRATIONS
Internal Helpifyr Integrations
Helpifyr access model contracts
- Direction: outgoing read-only
- Type: contract-doc set
- Surface:
docs/ACCESS_MODEL.md,contracts/README.md,contracts/identity-claims.schema.json,contracts/entitlement-model.schema.json,contracts/vaultwarden-projection.schema.json,contracts/reconcile-events.schema.json,contracts/local-consumption.schema.json,contracts/revocation-rules.md,contracts/breakglass-bootstrap.md,contracts/secret-lifecycle.md,contracts/orphan-dangling-state.md,contracts/race-and-versioning.md,contracts/environment-separation.md,contracts/deprovisioning.md,contracts/approval-and-audit.md,contracts/agent-authentication.md,contracts/owner-model.md - Auth: none for checked-in docs and schemas
- Stability: stable
- Versioning: follows repository version and the current access-model contract set
- Owner:
jhf-keystoreas consumer boundary, upstream policy and identity repos as truth sources
Implemented:
- the repository now ships a canonical access-model document and explicit contract files for downstream consumers.
Planned:
- no repo-local provisioning or identity authority
- no remote write surface
- no additional local truth family beyond the checked-in contracts
OpenClaw exec secret consumer
- Direction: incoming
- Type: execution-contract
- Surface:
scripts/run.sh,python3 -m vaultwarden_oc_keystore,examples/openclaw/gateway.secrets.yaml - Auth: local
bwauthentication at runtime - Stability: stable
- Versioning: follows repository version and the current
vw://item/...secret-ref contract - Owner:
jhf-keystoreas local tool boundary,OpenClawas consumer
Implemented:
- OpenClaw can consume the local CLI contract through
source: exec.
Planned:
- no broader runtime surface is planned in this repository.
Helpifyr Fabric manifest intake
- Direction: outgoing read-only
- Type: repo-read
- Surface:
fabric-manifest.json,docs/FABRIC_TOOL_PROFILE.md,docs/CAPABILITIES.md,docs/ACCESS_MODEL.md,contracts/README.md,scripts/export-fabric-metadata.py,scripts/fabric-selfcheck.sh - Auth: none for checked-in metadata; local execution only for script paths
- Stability: stable
- Versioning: follows repository version and the shared Fabric tool standard
- Owner:
jhf-keystoreas source repo,helpifyr-fabricas reader
Implemented:
- the checked-in manifest now carries the shared baseline fields required by the tool standard.
- the manifest and docs now point to the canonical access-model and contract set.
- Fabric can read a conservative repository contract without runtime access.
Planned:
- no runtime control surface is implemented here.
Helpifyr Fabric contract adoption
- Direction: outgoing read-only
- Type: adoption-contract
- Surface:
docs/FABRIC_CONTRACT_ADOPTION.md,contracts/fabric-contract-adoption.json,fabric-manifest.json - Fabric surfaces:
GET /api/v1/contracts/matrix,GET /api/v1/contracts/docs-standard - Auth: none for checked-in adoption declarations; live readback is operator-triggered only
- Stability: stable
- Versioning: follows the accepted Fabric contract families declared in the adoption contract
- Owner:
jhf-keystoreas consumer boundary,helpifyr-fabricas family owner
Implemented:
- the repository now declares the Fabric contract families it consumes and the accepted versions for each family.
- the docs-standard alignment and the wiki-governance adoption are recorded in one explicit repo-owned contract declaration.
Planned:
- no local Fabric family truth beyond the adoption declaration
- no implicit version fallback outside the declared compatibility window
Helpifyr Fabric combination profile intake
- Direction: outgoing read-only
- Type: repo-read
- Surface:
fabric-manifest.json,docs/FABRIC_TOOL_PROFILE.md,docs/INTEGRATIONS.md,docs/ACCESS_MODEL.md - Fabric endpoint:
api/v1 - Auth: none for the published combination profile truth
- Stability: stable
- Versioning: follows the Fabric bundle profile contract; this repository does not define combination truth locally
- Owner:
helpifyr-fabricas truth source,jhf-keystoreas consumer
Implemented:
- the repository now records the Fabric bundle-profile endpoint as a read-only consumer surface.
Planned:
- no local bundle truth
- no local detection truth
- no profile override semantics in this repository
Access-model upstream contract intake
- Direction: incoming read-only
- Type: contract-consumer
- Surface:
contracts/identity-claims.schema.json,contracts/entitlement-model.schema.json,contracts/vaultwarden-projection.schema.json,contracts/reconcile-events.schema.json,contracts/local-consumption.schema.json,docs/ACCESS_MODEL.md - Auth: none for checked-in contract files; live read validation still requires local operator auth
- Stability: stable
- Versioning: follows the checked-in contract set, the repo-local acceptance matrix, and the ERP cross-repo acceptance matrix version in this repository
- Owner: upstream truth remains with
jhf-heddle,helpifyr-fabric, andjhf-deployment;jhf-keystoreis the read-only consumer
Implemented:
- the repository now states exactly which upstream access-model truth it consumes
- contract validation is repo-local and deterministic through
python3 scripts/validate-access-model.py contracts/consumed-upstream-contracts.jsonrecords the concrete sibling-repo inputs used for optional workspace-level validation- the canonical identity claim language is pinned read-only to
jhf-heddle/config/identity/claim-vocabulary.v2.yaml contracts/identity-claim-consumption.jsonrecords which claim fields may be read and which local reinterpretations are forbiddencontracts/access-verification-model.jsonrecords the local personal/department/company/agent verification families and their required Fabric/Deployment truthcontracts/vault-metadata-inventory.jsonrecords metadata-only Vault inventory posture and machine-readable sensitivity classescontracts/operator-verdicts.jsonrecords severity, escalation, and next-step context for drift/security incidentscontracts/erp-identity-access-acceptance-matrix.jsonrecords the operator-facing cross-repo pass/fail and evidence contract
Planned:
- no local ownership of identity, entitlement, or projection truth
- no remote fetch of upstream contracts in the default gate
Vaultwarden admitted SSO consumer contract intake
- Direction: incoming read-only
- Type: admitted-surface-contract-consumer
- Surface:
contracts/vaultwarden-sso-consumer-runtime.json,contracts/consumed-upstream-contracts.json,scripts/verify-vaultwarden-sso-consumer-contract.sh - Upstream sources:
jhf-heddle/config/clients/admitted-surfaces.v1.yaml,jhf-heddle/config/clients/vaultwarden-keystore-client-template.yaml,jhf-spindle/docs/contracts/surface-access-posture-model.json - Auth: none for checked-in contracts; live verify is operator-triggered only
- Stability: stable
- Versioning: follows SSO v4 admitted-surface contract versions in upstream owner repos
- Owner: upstream truth remains with
jhf-heddle,helpifyr-fabric, andjhf-spindle;jhf-keystoreis read-only consumer
Implemented:
- admitted Vaultwarden surface posture is now explicit and versioned in-repo without local shadow truth.
- login/admin/revoke posture is covered by a deterministic repo verify script and an optional live verify path.
Planned:
- no local OIDC client authoring
- no local role or revocation truth
SSO v4 cross-surface acceptance suite
- Direction: incoming read-only plus local deterministic verification
- Type: acceptance-suite-contract
- Surface:
contracts/sso-v4-cross-surface-acceptance.json,contracts/operator-verdicts.json,scripts/verify-sso-v4-cross-surface-acceptance.sh - Upstream sources:
jhf-heddle/config/clients/admitted-surfaces.v1.yaml, disable/delete fail-closed contracts, owner-runtime evidence from owning repos - Auth: none for contract checks; live add-on is operator-triggered and keystore-surface-scoped
- Stability: stable
- Versioning: follows SSO v4 wave contracts and repo acceptance contract version
- Owner:
jhf-keystoreowns acceptance contract/verifier; truth remains in upstream owner repos
Implemented:
- one canonical acceptance matrix now covers all admitted surface keys.
- superadmin disable/delete propagation checks are explicit and fail-closed.
- drift routing and operator verdicts are explicit for missing truth and broken runtime auth wiring.
Planned:
- no local runtime execution for non-keystore surface owners.
- no local identity/policy/projection shadow truth.
Helpifyr Fabric wiki intake
- Direction: outgoing read-only
- Type: repo-read
- Surface:
docs/OVERVIEW.md,docs/SOLUTION_OVERVIEW_DE.md,docs/FABRIC_TOOL_PROFILE.md,docs/INTEGRATIONS.md,docs/CAPABILITIES.md - Auth: none for checked-in documentation
- Stability: stable
- Versioning: follows repository version and the shared wiki aggregation contract
- Owner:
jhf-keystoreas source repo,helpifyr-fabricas reader
Implemented:
- documentation is structured for shared aggregation without inventing a repo-local wiki layer.
Planned:
- no repo-local wiki system.
n8n governance reference
- Direction: bidirectional logical integration
- Type: compatibility-shim
- Surface:
examples/n8n/README.md - Auth: no runtime auth contract is implemented in this repository
- Stability: planned
- Versioning: documentation-only until a real runtime contract exists
- Owner:
jhf-keystorefor documentation, future runtime ownership unresolved
Implemented:
- documentation of the intended governance direction exists.
Planned:
- no real write-back integration is implemented.
- the future write-governance auth contract is document-only and tracked in Gitea issue
#30.
integrated-mode runtime registration
- Direction: incoming
- Type: registry-contract
- Surface: future Fabric-readable metadata only; no runtime endpoint
- Auth: none for checked-in metadata
- Stability: planned
- Versioning: will follow the future Fabric shared contract if and when it exists
- Owner:
jhf-keystorefor local documentation,helpifyr-fabricas external discovery consumer
Implemented:
- the repository currently remains standalone and read-first.
Planned:
- describe what Fabric may read for integrated-mode discovery
- keep runtime registration explicitly non-implemented
- do not add a service surface or remote control path
adopt-first standalone-to-integrated migration
- Direction: logical / operational
- Type: migration-contract
- Surface: documentation and runbook only
- Auth: operator-managed
- Stability: planned
- Versioning: tied to repository and Fabric contract evolution
- Owner:
jhf-keystorefor local guidance, operator for execution
Implemented:
- standalone operation is documented and reproducible.
Planned:
- document adopt / reconfigure / migrate / rebuild decisions
- keep migration read-only and non-automated in this repository
- no forced migration workflow or secret-write path
Warp dependency track
- Direction: outgoing read-only
- Type: contract-doc set
- Surface:
docs/WARP_DEPENDENCY_TRACK.md,contracts/warp-dependency-track.md,contracts/secret-lifecycle.md,contracts/revocation-rules.md,contracts/orphan-dangling-state.md,contracts/race-and-versioning.md,contracts/approval-and-audit.md - Auth: none for checked-in docs and schemas
- Stability: stable as a documentation boundary, not as a provisioning surface
- Versioning: follows repository version and the Warp dependency track contract
- Owner:
jhf-keystoreas consumer boundary,jhf-warp/ downstream operators as consumers of the contract
Implemented:
- the repository now spells out the secret authority, lease, delegation, rotation, invalidation, degraded-backend, and audit-evidence boundary expected by Warp-facing consumers.
Planned:
- no repo-local provisioning authority
- no remote secret lease service
- no live control plane surface for Warp
External Integrations
Bitwarden CLI
- Direction: outgoing
- Type: execution-contract
- Surface:
bw - Auth: local login/session basis
- Stability: stable
- Versioning: follows installed
bwCLI behavior and compatibility with the local workflow - Owner: external dependency, consumed by
jhf-keystore
Implemented:
- the repository resolves secrets through the local
bwprocess contract.
Vaultwarden or Bitwarden backend
- Direction: outgoing read-only
- Type: provider-contract
- Surface: backend access via
bw; no direct repository-defined endpoint - Auth: through
bw - Stability: experimental
- Versioning: depends on backend compatibility with the current
bwitem-resolution path - Owner: external backend boundary, consumed indirectly through
bw
Implemented:
- the current verify path is read-first only through the local CLI workflow.
Planned:
- no direct backend API contract is implemented in this repository.
Event Contracts
- none implemented
The repository does not publish or consume event-bus contracts today.
MCP Integration
- none implemented
The repository does not expose an MCP server or MCP-based callback surface today.
Planned Connections
Bounded live verification path
- Direction: outgoing read-only
- Type: operator-consumer
- Surface: future bounded operator/host-backed verification path; no checked-in runtime surface today
- Auth: operator-managed local credentials outside default CI
- Stability: planned
- Versioning: documentation and workflow only until a bounded path is approved
- Owner: operator/external verification boundary
Implemented:
- default CI remains repo-local and does not perform live secret resolution.
Planned:
- a separate non-default verification path may be documented later without widening the default gate.
- live drift detection expectations for Vaultwarden-backed reads are tracked in Gitea issue
#29.