@blue-repository/types 0.23.0 → 0.24.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/dist/meta.d.ts +2 -2
- package/dist/meta.d.ts.map +1 -1
- package/dist/meta.js +1 -13
- package/dist/meta.js.map +1 -1
- package/dist/packages/common/index.d.ts +1 -1
- package/dist/packages/common/meta.d.ts +1 -1
- package/dist/packages/common/meta.js +1 -1
- package/dist/packages/common/meta.js.map +1 -1
- package/dist/packages/conversation/index.d.ts +11 -11
- package/dist/packages/conversation/meta.d.ts +11 -11
- package/dist/packages/conversation/meta.js +11 -11
- package/dist/packages/conversation/meta.js.map +1 -1
- package/dist/packages/myos/blue-ids.d.ts +11 -11
- package/dist/packages/myos/blue-ids.js +11 -11
- package/dist/packages/myos/blue-ids.js.map +1 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.d.ts +25 -6
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.d.ts.map +1 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.js +28 -6
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.js.map +1 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.d.ts +4 -4
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.d.ts.map +1 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.js +4 -4
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.js.map +1 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.d.ts +6 -0
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.d.ts.map +1 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.js +6 -0
- package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.js.map +1 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.d.ts +7 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.d.ts.map +1 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.js +7 -1
- package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.js.map +1 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.d.ts +25 -6
- package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.d.ts.map +1 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.js +28 -6
- package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.js.map +1 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.d.ts +5 -5
- package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.d.ts.map +1 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.js +5 -5
- package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.js.map +1 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionGranted.d.ts +6 -0
- package/dist/packages/myos/contents/SingleDocumentPermissionGranted.d.ts.map +1 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionGranted.js +6 -0
- package/dist/packages/myos/contents/SingleDocumentPermissionGranted.js.map +1 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.d.ts +7 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.d.ts.map +1 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.js +7 -1
- package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.js.map +1 -1
- package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.d.ts +3 -3
- package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.d.ts.map +1 -1
- package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.js +3 -3
- package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.js.map +1 -1
- package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.d.ts +6 -0
- package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.d.ts.map +1 -1
- package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.js +6 -0
- package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.js.map +1 -1
- package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.d.ts +7 -1
- package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.d.ts.map +1 -1
- package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.js +7 -1
- package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.js.map +1 -1
- package/dist/packages/myos/contents/index.d.ts +726 -652
- package/dist/packages/myos/contents/index.d.ts.map +1 -1
- package/dist/packages/myos/contents/index.js +33 -33
- package/dist/packages/myos/contents/index.js.map +1 -1
- package/dist/packages/myos/index.d.ts +996 -806
- package/dist/packages/myos/index.d.ts.map +1 -1
- package/dist/packages/myos/meta.d.ts +43 -51
- package/dist/packages/myos/meta.d.ts.map +1 -1
- package/dist/packages/myos/meta.js +32 -42
- package/dist/packages/myos/meta.js.map +1 -1
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.d.ts +58 -5
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.d.ts.map +1 -1
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.js +3 -1
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.js.map +1 -1
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToDocument.d.ts +12 -12
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.d.ts +3 -0
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.d.ts.map +1 -1
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.js +1 -0
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.js.map +1 -1
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.d.ts +3 -0
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.d.ts.map +1 -1
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.js +1 -0
- package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.js.map +1 -1
- package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.d.ts +58 -5
- package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.d.ts.map +1 -1
- package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.js +3 -1
- package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.js.map +1 -1
- package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToDocument.d.ts +12 -12
- package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.d.ts +3 -0
- package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.d.ts.map +1 -1
- package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.js +1 -0
- package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.js.map +1 -1
- package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.d.ts +3 -0
- package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.d.ts.map +1 -1
- package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.js +1 -0
- package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.js.map +1 -1
- package/dist/packages/myos/schemas/WorkerAgencyPermissionGrant.d.ts +12 -12
- package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.d.ts +3 -0
- package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.d.ts.map +1 -1
- package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.js +1 -0
- package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.js.map +1 -1
- package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.d.ts +3 -0
- package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.d.ts.map +1 -1
- package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.js +1 -0
- package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.js.map +1 -1
- package/dist/packages/myos/schemas/index.d.ts +181 -57
- package/dist/packages/myos/schemas/index.d.ts.map +1 -1
- package/dist/packages/myos/schemas/index.js +11 -11
- package/dist/packages/myos/schemas/index.js.map +1 -1
- package/dist/packages/paynote/index.d.ts +21 -21
- package/dist/packages/paynote/meta.d.ts +21 -21
- package/dist/packages/paynote/meta.js +21 -21
- package/dist/packages/paynote/meta.js.map +1 -1
- package/dist/repository.d.ts +1008 -818
- package/dist/repository.d.ts.map +1 -1
- package/package.json +2 -2
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LinkedDocumentsPermissionGrantToAccount.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,uCAAuC
|
|
1
|
+
{"version":3,"file":"LinkedDocumentsPermissionGrantToAccount.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,uCAAuC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAoJ1C,CAAC"}
|
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
export const LinkedDocumentsPermissionGrantToAccount = {
|
|
2
2
|
contracts: {
|
|
3
3
|
granteeChannel: {
|
|
4
|
-
description: 'Grantee’s timeline
|
|
4
|
+
description: 'Grantee’s timeline',
|
|
5
5
|
type: {
|
|
6
6
|
blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
|
|
7
7
|
},
|
|
8
8
|
},
|
|
9
9
|
granterChannel: {
|
|
10
|
-
description: 'Granter/owner’s timeline
|
|
10
|
+
description: 'Granter/owner’s timeline',
|
|
11
11
|
type: {
|
|
12
12
|
blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
|
|
13
13
|
},
|
|
@@ -27,9 +27,9 @@ export const LinkedDocumentsPermissionGrantToAccount = {
|
|
|
27
27
|
type: {
|
|
28
28
|
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
29
29
|
},
|
|
30
|
-
value: '
|
|
30
|
+
value: 'revokeAccessChannel',
|
|
31
31
|
},
|
|
32
|
-
description: 'Granter or grantee indicates the grant should be revoked (MyOS Admin will handle)',
|
|
32
|
+
description: 'Granter or grantee indicates the grant should be revoked (MyOS Admin will handle).',
|
|
33
33
|
request: {
|
|
34
34
|
description: 'Optional human-readable reason',
|
|
35
35
|
type: {
|
|
@@ -40,7 +40,29 @@ export const LinkedDocumentsPermissionGrantToAccount = {
|
|
|
40
40
|
blueId: 'BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC',
|
|
41
41
|
},
|
|
42
42
|
},
|
|
43
|
-
|
|
43
|
+
revokeAccessChannel: {
|
|
44
|
+
channels: {
|
|
45
|
+
items: [
|
|
46
|
+
{
|
|
47
|
+
type: {
|
|
48
|
+
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
49
|
+
},
|
|
50
|
+
value: 'granterChannel',
|
|
51
|
+
},
|
|
52
|
+
{
|
|
53
|
+
type: {
|
|
54
|
+
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
55
|
+
},
|
|
56
|
+
value: 'granteeChannel',
|
|
57
|
+
},
|
|
58
|
+
],
|
|
59
|
+
},
|
|
60
|
+
description: 'Either grant side can invoke revoke on this grant document.',
|
|
61
|
+
type: {
|
|
62
|
+
blueId: 'HsNatiPt2YvmkWQoqtfrFCbdp75ZUBLBUkWeq84WTfnr',
|
|
63
|
+
},
|
|
64
|
+
},
|
|
65
|
+
revokeImpl: {
|
|
44
66
|
operation: {
|
|
45
67
|
type: {
|
|
46
68
|
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
@@ -81,7 +103,7 @@ export const LinkedDocumentsPermissionGrantToAccount = {
|
|
|
81
103
|
type: {
|
|
82
104
|
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
83
105
|
},
|
|
84
|
-
value: "const issues = [];\n\
|
|
106
|
+
value: "const issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n",
|
|
85
107
|
},
|
|
86
108
|
name: 'ValidateBasicShape',
|
|
87
109
|
type: {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LinkedDocumentsPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,
|
|
1
|
+
{"version":3,"file":"LinkedDocumentsPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,oBAAoB;YACjC,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,WAAW,EAAE,0BAA0B;YACvC,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,qBAAqB;aAC7B;YACD,WAAW,EACT,oFAAoF;YACtF,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,mBAAmB,EAAE;YACnB,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;wBACD,KAAK,EAAE,gBAAgB;qBACxB;oBACD;wBACE,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;wBACD,KAAK,EAAE,gBAAgB;qBACxB;iBACF;aACF;YACD,WAAW,EACT,6DAA6D;YAC/D,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,UAAU,EAAE;YACV,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,uJAAuJ;yBAC1J;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,yoDAAyoD;yBAC5oD;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,mLAAmL;QACrL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,KAAK,EAAE;QACL,WAAW,EACT,qHAAqH;QACvH,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,eAAe,EAAE;QACf,WAAW,EACT,wEAAwE;QAC1E,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
export declare const LinkedDocumentsPermissionGrantToDocument: {
|
|
2
2
|
readonly contracts: {
|
|
3
3
|
readonly granterChannel: {
|
|
4
|
-
readonly description: "Granter/owner’s timeline (
|
|
4
|
+
readonly description: "Granter/owner’s timeline (direct grant-document revoke lives here).";
|
|
5
5
|
readonly type: {
|
|
6
6
|
readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
|
|
7
7
|
};
|
|
@@ -23,7 +23,7 @@ export declare const LinkedDocumentsPermissionGrantToDocument: {
|
|
|
23
23
|
};
|
|
24
24
|
readonly value: "granterChannel";
|
|
25
25
|
};
|
|
26
|
-
readonly description: "Granter
|
|
26
|
+
readonly description: "Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.";
|
|
27
27
|
readonly request: {
|
|
28
28
|
readonly description: "Optional human-readable reason";
|
|
29
29
|
readonly type: {
|
|
@@ -72,7 +72,7 @@ export declare const LinkedDocumentsPermissionGrantToDocument: {
|
|
|
72
72
|
readonly type: {
|
|
73
73
|
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
74
74
|
};
|
|
75
|
-
readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\
|
|
75
|
+
readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string\");\n\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n";
|
|
76
76
|
};
|
|
77
77
|
readonly name: "ValidateBasicShape";
|
|
78
78
|
readonly type: {
|
|
@@ -105,7 +105,7 @@ export declare const LinkedDocumentsPermissionGrantToDocument: {
|
|
|
105
105
|
};
|
|
106
106
|
readonly name: "Linked Documents Permission Grant To Document";
|
|
107
107
|
readonly skipValidation: {
|
|
108
|
-
readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)";
|
|
108
|
+
readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).";
|
|
109
109
|
readonly type: {
|
|
110
110
|
readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
|
|
111
111
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LinkedDocumentsPermissionGrantToDocument.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,wCAAwC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
|
|
1
|
+
{"version":3,"file":"LinkedDocumentsPermissionGrantToDocument.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,wCAAwC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAsI3C,CAAC"}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
export const LinkedDocumentsPermissionGrantToDocument = {
|
|
2
2
|
contracts: {
|
|
3
3
|
granterChannel: {
|
|
4
|
-
description: 'Granter/owner’s timeline (
|
|
4
|
+
description: 'Granter/owner’s timeline (direct grant-document revoke lives here).',
|
|
5
5
|
type: {
|
|
6
6
|
blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
|
|
7
7
|
},
|
|
@@ -23,7 +23,7 @@ export const LinkedDocumentsPermissionGrantToDocument = {
|
|
|
23
23
|
},
|
|
24
24
|
value: 'granterChannel',
|
|
25
25
|
},
|
|
26
|
-
description: 'Granter
|
|
26
|
+
description: 'Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.',
|
|
27
27
|
request: {
|
|
28
28
|
description: 'Optional human-readable reason',
|
|
29
29
|
type: {
|
|
@@ -75,7 +75,7 @@ export const LinkedDocumentsPermissionGrantToDocument = {
|
|
|
75
75
|
type: {
|
|
76
76
|
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
77
77
|
},
|
|
78
|
-
value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\
|
|
78
|
+
value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string\");\n\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n",
|
|
79
79
|
},
|
|
80
80
|
name: 'ValidateBasicShape',
|
|
81
81
|
type: {
|
|
@@ -109,7 +109,7 @@ export const LinkedDocumentsPermissionGrantToDocument = {
|
|
|
109
109
|
},
|
|
110
110
|
name: 'Linked Documents Permission Grant To Document',
|
|
111
111
|
skipValidation: {
|
|
112
|
-
description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)",
|
|
112
|
+
description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).",
|
|
113
113
|
type: {
|
|
114
114
|
blueId: '4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u',
|
|
115
115
|
},
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LinkedDocumentsPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,wCAAwC,GAAG;IACtD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,
|
|
1
|
+
{"version":3,"file":"LinkedDocumentsPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,wCAAwC,GAAG;IACtD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EACT,qEAAqE;YACvE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EACT,uLAAuL;YACzL,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,uJAAuJ;yBAC1J;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,8tDAA8tD;yBACjuD;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,WAAW,EACT,mFAAmF;QACrF,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,mLAAmL;QACrL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,KAAK,EAAE;QACL,WAAW,EACT,qHAAqH;QACvH,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,+CAA+C;IACrD,cAAc,EAAE;QACd,WAAW,EACT,qGAAqG;QACvG,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EACT,wEAAwE;QAC1E,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
|
|
@@ -1,5 +1,11 @@
|
|
|
1
1
|
export declare const LinkedDocumentsPermissionGranted: {
|
|
2
2
|
readonly description: "All initial rights from this LDPG have been persisted.";
|
|
3
|
+
readonly grantDocumentId: {
|
|
4
|
+
readonly description: "Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.";
|
|
5
|
+
readonly type: {
|
|
6
|
+
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
7
|
+
};
|
|
8
|
+
};
|
|
3
9
|
readonly links: {
|
|
4
10
|
readonly type: {
|
|
5
11
|
readonly blueId: "75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5";
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LinkedDocumentsPermissionGranted.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGranted.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,gCAAgC
|
|
1
|
+
{"version":3,"file":"LinkedDocumentsPermissionGranted.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGranted.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,gCAAgC;;;;;;;;;;;;;;;;;;;;;;CAuBnC,CAAC"}
|
|
@@ -1,5 +1,11 @@
|
|
|
1
1
|
export const LinkedDocumentsPermissionGranted = {
|
|
2
2
|
description: 'All initial rights from this LDPG have been persisted.',
|
|
3
|
+
grantDocumentId: {
|
|
4
|
+
description: 'Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.',
|
|
5
|
+
type: {
|
|
6
|
+
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
7
|
+
},
|
|
8
|
+
},
|
|
3
9
|
links: {
|
|
4
10
|
type: {
|
|
5
11
|
blueId: '75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5',
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LinkedDocumentsPermissionGranted.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGranted.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,gCAAgC,GAAG;IAC9C,WAAW,EAAE,wDAAwD;IACrE,KAAK,EAAE;QACL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,qCAAqC;IAC3C,eAAe,EAAE;QACf,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
|
|
1
|
+
{"version":3,"file":"LinkedDocumentsPermissionGranted.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGranted.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,gCAAgC,GAAG;IAC9C,WAAW,EAAE,wDAAwD;IACrE,eAAe,EAAE;QACf,WAAW,EACT,+KAA+K;QACjL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,KAAK,EAAE;QACL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,qCAAqC;IAC3C,eAAe,EAAE;QACf,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
|
|
@@ -1,5 +1,11 @@
|
|
|
1
1
|
export declare const LinkedDocumentsPermissionRevokeRequested: {
|
|
2
|
-
readonly description: "Emitted by revoke operation";
|
|
2
|
+
readonly description: "Emitted either by revoke operation on the grant document or by grantee-document self-revoke flow when grantDocumentId is provided.";
|
|
3
|
+
readonly grantDocumentId: {
|
|
4
|
+
readonly description: "Optional. If present, MyOS Admin must revoke the referenced permission grant after validating that the requesting document matches the grant granteeDocumentId. If absent, revoke applies to the grant document that emitted the event.";
|
|
5
|
+
readonly type: {
|
|
6
|
+
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
7
|
+
};
|
|
8
|
+
};
|
|
3
9
|
readonly name: "Linked Documents Permission Revoke Requested";
|
|
4
10
|
readonly reason: {
|
|
5
11
|
readonly type: {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LinkedDocumentsPermissionRevokeRequested.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,wCAAwC
|
|
1
|
+
{"version":3,"file":"LinkedDocumentsPermissionRevokeRequested.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,wCAAwC;;;;;;;;;;;;;;;;;CAmB3C,CAAC"}
|
|
@@ -1,5 +1,11 @@
|
|
|
1
1
|
export const LinkedDocumentsPermissionRevokeRequested = {
|
|
2
|
-
description: 'Emitted by revoke operation',
|
|
2
|
+
description: 'Emitted either by revoke operation on the grant document or by grantee-document self-revoke flow when grantDocumentId is provided.',
|
|
3
|
+
grantDocumentId: {
|
|
4
|
+
description: 'Optional. If present, MyOS Admin must revoke the referenced permission grant after validating that the requesting document matches the grant granteeDocumentId. If absent, revoke applies to the grant document that emitted the event.',
|
|
5
|
+
type: {
|
|
6
|
+
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
7
|
+
},
|
|
8
|
+
},
|
|
3
9
|
name: 'Linked Documents Permission Revoke Requested',
|
|
4
10
|
reason: {
|
|
5
11
|
type: {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LinkedDocumentsPermissionRevokeRequested.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,wCAAwC,GAAG;IACtD,WAAW,EAAE,
|
|
1
|
+
{"version":3,"file":"LinkedDocumentsPermissionRevokeRequested.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,wCAAwC,GAAG;IACtD,WAAW,EACT,oIAAoI;IACtI,eAAe,EAAE;QACf,WAAW,EACT,yOAAyO;QAC3O,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,MAAM,EAAE;QACN,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
|
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
export declare const SingleDocumentPermissionGrantToAccount: {
|
|
2
2
|
readonly contracts: {
|
|
3
3
|
readonly granteeChannel: {
|
|
4
|
-
readonly description: "Grantee’s timeline
|
|
4
|
+
readonly description: "Grantee’s timeline";
|
|
5
5
|
readonly type: {
|
|
6
6
|
readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
|
|
7
7
|
};
|
|
8
8
|
};
|
|
9
9
|
readonly granterChannel: {
|
|
10
|
-
readonly description: "Granter/owner’s timeline
|
|
10
|
+
readonly description: "Granter/owner’s timeline";
|
|
11
11
|
readonly type: {
|
|
12
12
|
readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
|
|
13
13
|
};
|
|
@@ -27,9 +27,9 @@ export declare const SingleDocumentPermissionGrantToAccount: {
|
|
|
27
27
|
readonly type: {
|
|
28
28
|
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
29
29
|
};
|
|
30
|
-
readonly value: "
|
|
30
|
+
readonly value: "revokeAccessChannel";
|
|
31
31
|
};
|
|
32
|
-
readonly description: "Granter or grantee indicates the grant should be revoked (MyOS Admin will handle)";
|
|
32
|
+
readonly description: "Granter or grantee indicates the grant should be revoked (MyOS Admin will handle).";
|
|
33
33
|
readonly request: {
|
|
34
34
|
readonly description: "Optional human-readable reason";
|
|
35
35
|
readonly type: {
|
|
@@ -40,7 +40,26 @@ export declare const SingleDocumentPermissionGrantToAccount: {
|
|
|
40
40
|
readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
|
|
41
41
|
};
|
|
42
42
|
};
|
|
43
|
-
readonly
|
|
43
|
+
readonly revokeAccessChannel: {
|
|
44
|
+
readonly channels: {
|
|
45
|
+
readonly items: readonly [{
|
|
46
|
+
readonly type: {
|
|
47
|
+
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
48
|
+
};
|
|
49
|
+
readonly value: "granterChannel";
|
|
50
|
+
}, {
|
|
51
|
+
readonly type: {
|
|
52
|
+
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
53
|
+
};
|
|
54
|
+
readonly value: "granteeChannel";
|
|
55
|
+
}];
|
|
56
|
+
};
|
|
57
|
+
readonly description: "Either grant side can invoke revoke on this grant document.";
|
|
58
|
+
readonly type: {
|
|
59
|
+
readonly blueId: "HsNatiPt2YvmkWQoqtfrFCbdp75ZUBLBUkWeq84WTfnr";
|
|
60
|
+
};
|
|
61
|
+
};
|
|
62
|
+
readonly revokeImpl: {
|
|
44
63
|
readonly operation: {
|
|
45
64
|
readonly type: {
|
|
46
65
|
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
@@ -78,7 +97,7 @@ export declare const SingleDocumentPermissionGrantToAccount: {
|
|
|
78
97
|
readonly type: {
|
|
79
98
|
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
80
99
|
};
|
|
81
|
-
readonly value: "const issues = [];\n\
|
|
100
|
+
readonly value: "const issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
|
|
82
101
|
};
|
|
83
102
|
readonly name: "ValidateBasicShape";
|
|
84
103
|
readonly type: {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SingleDocumentPermissionGrantToAccount.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,sCAAsC
|
|
1
|
+
{"version":3,"file":"SingleDocumentPermissionGrantToAccount.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,sCAAsC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAmJzC,CAAC"}
|
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
export const SingleDocumentPermissionGrantToAccount = {
|
|
2
2
|
contracts: {
|
|
3
3
|
granteeChannel: {
|
|
4
|
-
description: 'Grantee’s timeline
|
|
4
|
+
description: 'Grantee’s timeline',
|
|
5
5
|
type: {
|
|
6
6
|
blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
|
|
7
7
|
},
|
|
8
8
|
},
|
|
9
9
|
granterChannel: {
|
|
10
|
-
description: 'Granter/owner’s timeline
|
|
10
|
+
description: 'Granter/owner’s timeline',
|
|
11
11
|
type: {
|
|
12
12
|
blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
|
|
13
13
|
},
|
|
@@ -27,9 +27,9 @@ export const SingleDocumentPermissionGrantToAccount = {
|
|
|
27
27
|
type: {
|
|
28
28
|
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
29
29
|
},
|
|
30
|
-
value: '
|
|
30
|
+
value: 'revokeAccessChannel',
|
|
31
31
|
},
|
|
32
|
-
description: 'Granter or grantee indicates the grant should be revoked (MyOS Admin will handle)',
|
|
32
|
+
description: 'Granter or grantee indicates the grant should be revoked (MyOS Admin will handle).',
|
|
33
33
|
request: {
|
|
34
34
|
description: 'Optional human-readable reason',
|
|
35
35
|
type: {
|
|
@@ -40,7 +40,29 @@ export const SingleDocumentPermissionGrantToAccount = {
|
|
|
40
40
|
blueId: 'BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC',
|
|
41
41
|
},
|
|
42
42
|
},
|
|
43
|
-
|
|
43
|
+
revokeAccessChannel: {
|
|
44
|
+
channels: {
|
|
45
|
+
items: [
|
|
46
|
+
{
|
|
47
|
+
type: {
|
|
48
|
+
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
49
|
+
},
|
|
50
|
+
value: 'granterChannel',
|
|
51
|
+
},
|
|
52
|
+
{
|
|
53
|
+
type: {
|
|
54
|
+
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
55
|
+
},
|
|
56
|
+
value: 'granteeChannel',
|
|
57
|
+
},
|
|
58
|
+
],
|
|
59
|
+
},
|
|
60
|
+
description: 'Either grant side can invoke revoke on this grant document.',
|
|
61
|
+
type: {
|
|
62
|
+
blueId: 'HsNatiPt2YvmkWQoqtfrFCbdp75ZUBLBUkWeq84WTfnr',
|
|
63
|
+
},
|
|
64
|
+
},
|
|
65
|
+
revokeImpl: {
|
|
44
66
|
operation: {
|
|
45
67
|
type: {
|
|
46
68
|
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
@@ -81,7 +103,7 @@ export const SingleDocumentPermissionGrantToAccount = {
|
|
|
81
103
|
type: {
|
|
82
104
|
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
83
105
|
},
|
|
84
|
-
value: 'const issues = [];\n\
|
|
106
|
+
value: 'const issues = [];\n\nconst target = document(\'/targetSessionId\');\nif (!target || typeof target !== \'string\') issues.push("targetSessionId is missing or invalid");\n\nconst granterId = document(\'/contracts/granterChannel/accountId\');\nif (typeof granterId !== \'string\' || granterId.length === 0) issues.push("granterChannel must be bound to an accountId");\nconst granteeId = document(\'/contracts/granteeChannel/accountId\');\nif (typeof granteeId !== \'string\' || granteeId.length === 0) issues.push("granteeChannel must be bound to an accountId");\n\nconst perms = document(\'/permissions\');\nif (!perms || typeof perms !== \'object\') {\n issues.push("permissions block is missing");\n} else {\n if (perms.read !== true) issues.push("permissions.read must be true for SDPG");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== \'string\' || x.trim().length === 0)) {\n issues.push("permissions.singleOps must contain only non-empty strings");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push("permissions.allOps=true and permissions.singleOps are mutually exclusive");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: "MyOS/Single Document Permission Invalid", issues } ] };\nreturn { events: [ { type: "MyOS/Single Document Permission Validated" } ] };\n',
|
|
85
107
|
},
|
|
86
108
|
name: 'ValidateBasicShape',
|
|
87
109
|
type: {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SingleDocumentPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,sCAAsC,GAAG;IACpD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,
|
|
1
|
+
{"version":3,"file":"SingleDocumentPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,sCAAsC,GAAG;IACpD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,oBAAoB;YACjC,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,WAAW,EAAE,0BAA0B;YACvC,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,qBAAqB;aAC7B;YACD,WAAW,EACT,oFAAoF;YACtF,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,mBAAmB,EAAE;YACnB,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;wBACD,KAAK,EAAE,gBAAgB;qBACxB;oBACD;wBACE,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;wBACD,KAAK,EAAE,gBAAgB;qBACxB;iBACF;aACF;YACD,WAAW,EACT,6DAA6D;YAC/D,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,UAAU,EAAE;YACV,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,y4CAAy4C;yBAC54C;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,6CAA6C;IACnD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
export declare const SingleDocumentPermissionGrantToDocument: {
|
|
2
2
|
readonly contracts: {
|
|
3
3
|
readonly granterChannel: {
|
|
4
|
-
readonly description: "Granter/owner’s timeline (
|
|
4
|
+
readonly description: "Granter/owner’s timeline (direct grant-document revoke lives here).";
|
|
5
5
|
readonly type: {
|
|
6
6
|
readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
|
|
7
7
|
};
|
|
@@ -23,7 +23,7 @@ export declare const SingleDocumentPermissionGrantToDocument: {
|
|
|
23
23
|
};
|
|
24
24
|
readonly value: "granterChannel";
|
|
25
25
|
};
|
|
26
|
-
readonly description: "Granter requests revocation
|
|
26
|
+
readonly description: "Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.";
|
|
27
27
|
readonly request: {
|
|
28
28
|
readonly description: "Optional human-readable reason";
|
|
29
29
|
readonly type: {
|
|
@@ -72,7 +72,7 @@ export declare const SingleDocumentPermissionGrantToDocument: {
|
|
|
72
72
|
readonly type: {
|
|
73
73
|
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
74
74
|
};
|
|
75
|
-
readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\
|
|
75
|
+
readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
|
|
76
76
|
};
|
|
77
77
|
readonly name: "ValidateBasicShape";
|
|
78
78
|
readonly type: {
|
|
@@ -86,7 +86,7 @@ export declare const SingleDocumentPermissionGrantToDocument: {
|
|
|
86
86
|
};
|
|
87
87
|
};
|
|
88
88
|
readonly granteeDocumentId: {
|
|
89
|
-
readonly description: "Required original document id (blueId) that will act as the grantee principal ('document')";
|
|
89
|
+
readonly description: "Required original document id (blueId) that will act as the grantee principal ('document').";
|
|
90
90
|
readonly type: {
|
|
91
91
|
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
92
92
|
};
|
|
@@ -105,7 +105,7 @@ export declare const SingleDocumentPermissionGrantToDocument: {
|
|
|
105
105
|
};
|
|
106
106
|
};
|
|
107
107
|
readonly skipValidation: {
|
|
108
|
-
readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)";
|
|
108
|
+
readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).";
|
|
109
109
|
readonly type: {
|
|
110
110
|
readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
|
|
111
111
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SingleDocumentPermissionGrantToDocument.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,uCAAuC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
|
|
1
|
+
{"version":3,"file":"SingleDocumentPermissionGrantToDocument.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,uCAAuC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAqI1C,CAAC"}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
export const SingleDocumentPermissionGrantToDocument = {
|
|
2
2
|
contracts: {
|
|
3
3
|
granterChannel: {
|
|
4
|
-
description: 'Granter/owner’s timeline (
|
|
4
|
+
description: 'Granter/owner’s timeline (direct grant-document revoke lives here).',
|
|
5
5
|
type: {
|
|
6
6
|
blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
|
|
7
7
|
},
|
|
@@ -23,7 +23,7 @@ export const SingleDocumentPermissionGrantToDocument = {
|
|
|
23
23
|
},
|
|
24
24
|
value: 'granterChannel',
|
|
25
25
|
},
|
|
26
|
-
description: 'Granter requests revocation
|
|
26
|
+
description: 'Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.',
|
|
27
27
|
request: {
|
|
28
28
|
description: 'Optional human-readable reason',
|
|
29
29
|
type: {
|
|
@@ -75,7 +75,7 @@ export const SingleDocumentPermissionGrantToDocument = {
|
|
|
75
75
|
type: {
|
|
76
76
|
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
77
77
|
},
|
|
78
|
-
value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\
|
|
78
|
+
value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n",
|
|
79
79
|
},
|
|
80
80
|
name: 'ValidateBasicShape',
|
|
81
81
|
type: {
|
|
@@ -90,7 +90,7 @@ export const SingleDocumentPermissionGrantToDocument = {
|
|
|
90
90
|
},
|
|
91
91
|
},
|
|
92
92
|
granteeDocumentId: {
|
|
93
|
-
description: "Required original document id (blueId) that will act as the grantee principal ('document')",
|
|
93
|
+
description: "Required original document id (blueId) that will act as the grantee principal ('document').",
|
|
94
94
|
type: {
|
|
95
95
|
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
96
96
|
},
|
|
@@ -109,7 +109,7 @@ export const SingleDocumentPermissionGrantToDocument = {
|
|
|
109
109
|
},
|
|
110
110
|
},
|
|
111
111
|
skipValidation: {
|
|
112
|
-
description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)",
|
|
112
|
+
description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).",
|
|
113
113
|
type: {
|
|
114
114
|
blueId: '4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u',
|
|
115
115
|
},
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SingleDocumentPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,
|
|
1
|
+
{"version":3,"file":"SingleDocumentPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EACT,qEAAqE;YACvE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EACT,uLAAuL;YACzL,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,++CAA++C;yBACl/C;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,WAAW,EACT,6FAA6F;QAC/F,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,cAAc,EAAE;QACd,WAAW,EACT,qGAAqG;QACvG,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
|
|
@@ -1,5 +1,11 @@
|
|
|
1
1
|
export declare const SingleDocumentPermissionGranted: {
|
|
2
2
|
readonly description: "DB rows written; rights are effective.";
|
|
3
|
+
readonly grantDocumentId: {
|
|
4
|
+
readonly description: "Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.";
|
|
5
|
+
readonly type: {
|
|
6
|
+
readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
|
|
7
|
+
};
|
|
8
|
+
};
|
|
3
9
|
readonly name: "Single Document Permission Granted";
|
|
4
10
|
readonly permissions: {
|
|
5
11
|
readonly type: {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SingleDocumentPermissionGranted.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGranted.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,+BAA+B
|
|
1
|
+
{"version":3,"file":"SingleDocumentPermissionGranted.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGranted.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,+BAA+B;;;;;;;;;;;;;;;;;;;;;;CAuBlC,CAAC"}
|
|
@@ -1,5 +1,11 @@
|
|
|
1
1
|
export const SingleDocumentPermissionGranted = {
|
|
2
2
|
description: 'DB rows written; rights are effective.',
|
|
3
|
+
grantDocumentId: {
|
|
4
|
+
description: 'Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.',
|
|
5
|
+
type: {
|
|
6
|
+
blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
|
|
7
|
+
},
|
|
8
|
+
},
|
|
3
9
|
name: 'Single Document Permission Granted',
|
|
4
10
|
permissions: {
|
|
5
11
|
type: {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"SingleDocumentPermissionGranted.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGranted.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,+BAA+B,GAAG;IAC7C,WAAW,EAAE,wCAAwC;IACrD,IAAI,EAAE,oCAAoC;IAC1C,WAAW,EAAE;QACX,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
|
|
1
|
+
{"version":3,"file":"SingleDocumentPermissionGranted.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGranted.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,+BAA+B,GAAG;IAC7C,WAAW,EAAE,wCAAwC;IACrD,eAAe,EAAE;QACf,WAAW,EACT,+KAA+K;QACjL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,oCAAoC;IAC1C,WAAW,EAAE;QACX,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
|