@blue-repository/types 0.23.0 → 0.24.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (116) hide show
  1. package/README.md +1 -1
  2. package/dist/meta.d.ts +2 -2
  3. package/dist/meta.d.ts.map +1 -1
  4. package/dist/meta.js +1 -13
  5. package/dist/meta.js.map +1 -1
  6. package/dist/packages/common/index.d.ts +1 -1
  7. package/dist/packages/common/meta.d.ts +1 -1
  8. package/dist/packages/common/meta.js +1 -1
  9. package/dist/packages/common/meta.js.map +1 -1
  10. package/dist/packages/conversation/index.d.ts +11 -11
  11. package/dist/packages/conversation/meta.d.ts +11 -11
  12. package/dist/packages/conversation/meta.js +11 -11
  13. package/dist/packages/conversation/meta.js.map +1 -1
  14. package/dist/packages/myos/blue-ids.d.ts +11 -11
  15. package/dist/packages/myos/blue-ids.js +11 -11
  16. package/dist/packages/myos/blue-ids.js.map +1 -1
  17. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.d.ts +25 -6
  18. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.d.ts.map +1 -1
  19. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.js +28 -6
  20. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.js.map +1 -1
  21. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.d.ts +4 -4
  22. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.d.ts.map +1 -1
  23. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.js +4 -4
  24. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.js.map +1 -1
  25. package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.d.ts +6 -0
  26. package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.d.ts.map +1 -1
  27. package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.js +6 -0
  28. package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.js.map +1 -1
  29. package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.d.ts +7 -1
  30. package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.d.ts.map +1 -1
  31. package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.js +7 -1
  32. package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.js.map +1 -1
  33. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.d.ts +25 -6
  34. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.d.ts.map +1 -1
  35. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.js +28 -6
  36. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.js.map +1 -1
  37. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.d.ts +5 -5
  38. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.d.ts.map +1 -1
  39. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.js +5 -5
  40. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.js.map +1 -1
  41. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.d.ts +6 -0
  42. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.d.ts.map +1 -1
  43. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.js +6 -0
  44. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.js.map +1 -1
  45. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.d.ts +7 -1
  46. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.d.ts.map +1 -1
  47. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.js +7 -1
  48. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.js.map +1 -1
  49. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.d.ts +3 -3
  50. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.d.ts.map +1 -1
  51. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.js +3 -3
  52. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.js.map +1 -1
  53. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.d.ts +6 -0
  54. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.d.ts.map +1 -1
  55. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.js +6 -0
  56. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.js.map +1 -1
  57. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.d.ts +7 -1
  58. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.d.ts.map +1 -1
  59. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.js +7 -1
  60. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.js.map +1 -1
  61. package/dist/packages/myos/contents/index.d.ts +726 -652
  62. package/dist/packages/myos/contents/index.d.ts.map +1 -1
  63. package/dist/packages/myos/contents/index.js +33 -33
  64. package/dist/packages/myos/contents/index.js.map +1 -1
  65. package/dist/packages/myos/index.d.ts +996 -806
  66. package/dist/packages/myos/index.d.ts.map +1 -1
  67. package/dist/packages/myos/meta.d.ts +43 -51
  68. package/dist/packages/myos/meta.d.ts.map +1 -1
  69. package/dist/packages/myos/meta.js +32 -42
  70. package/dist/packages/myos/meta.js.map +1 -1
  71. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.d.ts +58 -5
  72. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.d.ts.map +1 -1
  73. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.js +3 -1
  74. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.js.map +1 -1
  75. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToDocument.d.ts +12 -12
  76. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.d.ts +3 -0
  77. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.d.ts.map +1 -1
  78. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.js +1 -0
  79. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.js.map +1 -1
  80. package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.d.ts +3 -0
  81. package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.d.ts.map +1 -1
  82. package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.js +1 -0
  83. package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.js.map +1 -1
  84. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.d.ts +58 -5
  85. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.d.ts.map +1 -1
  86. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.js +3 -1
  87. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.js.map +1 -1
  88. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToDocument.d.ts +12 -12
  89. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.d.ts +3 -0
  90. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.d.ts.map +1 -1
  91. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.js +1 -0
  92. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.js.map +1 -1
  93. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.d.ts +3 -0
  94. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.d.ts.map +1 -1
  95. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.js +1 -0
  96. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.js.map +1 -1
  97. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrant.d.ts +12 -12
  98. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.d.ts +3 -0
  99. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.d.ts.map +1 -1
  100. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.js +1 -0
  101. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.js.map +1 -1
  102. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.d.ts +3 -0
  103. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.d.ts.map +1 -1
  104. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.js +1 -0
  105. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.js.map +1 -1
  106. package/dist/packages/myos/schemas/index.d.ts +181 -57
  107. package/dist/packages/myos/schemas/index.d.ts.map +1 -1
  108. package/dist/packages/myos/schemas/index.js +11 -11
  109. package/dist/packages/myos/schemas/index.js.map +1 -1
  110. package/dist/packages/paynote/index.d.ts +21 -21
  111. package/dist/packages/paynote/meta.d.ts +21 -21
  112. package/dist/packages/paynote/meta.js +21 -21
  113. package/dist/packages/paynote/meta.js.map +1 -1
  114. package/dist/repository.d.ts +1008 -818
  115. package/dist/repository.d.ts.map +1 -1
  116. package/package.json +2 -2
@@ -1 +1 @@
1
- {"version":3,"file":"LinkedDocumentsPermissionGrantToAccount.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,uCAAuC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CA6H1C,CAAC"}
1
+ {"version":3,"file":"LinkedDocumentsPermissionGrantToAccount.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,uCAAuC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAoJ1C,CAAC"}
@@ -1,13 +1,13 @@
1
1
  export const LinkedDocumentsPermissionGrantToAccount = {
2
2
  contracts: {
3
3
  granteeChannel: {
4
- description: 'Grantee’s timeline (recipient of the rights)',
4
+ description: 'Grantee’s timeline',
5
5
  type: {
6
6
  blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
7
7
  },
8
8
  },
9
9
  granterChannel: {
10
- description: 'Granter/owner’s timeline (actor allowed to request revoke)',
10
+ description: 'Granter/owner’s timeline',
11
11
  type: {
12
12
  blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
13
13
  },
@@ -27,9 +27,9 @@ export const LinkedDocumentsPermissionGrantToAccount = {
27
27
  type: {
28
28
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
29
29
  },
30
- value: 'granterChannel',
30
+ value: 'revokeAccessChannel',
31
31
  },
32
- description: 'Granter or grantee indicates the grant should be revoked (MyOS Admin will handle)',
32
+ description: 'Granter or grantee indicates the grant should be revoked (MyOS Admin will handle).',
33
33
  request: {
34
34
  description: 'Optional human-readable reason',
35
35
  type: {
@@ -40,7 +40,29 @@ export const LinkedDocumentsPermissionGrantToAccount = {
40
40
  blueId: 'BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC',
41
41
  },
42
42
  },
43
- revokeImplGranter: {
43
+ revokeAccessChannel: {
44
+ channels: {
45
+ items: [
46
+ {
47
+ type: {
48
+ blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
49
+ },
50
+ value: 'granterChannel',
51
+ },
52
+ {
53
+ type: {
54
+ blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
55
+ },
56
+ value: 'granteeChannel',
57
+ },
58
+ ],
59
+ },
60
+ description: 'Either grant side can invoke revoke on this grant document.',
61
+ type: {
62
+ blueId: 'HsNatiPt2YvmkWQoqtfrFCbdp75ZUBLBUkWeq84WTfnr',
63
+ },
64
+ },
65
+ revokeImpl: {
44
66
  operation: {
45
67
  type: {
46
68
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
@@ -81,7 +103,7 @@ export const LinkedDocumentsPermissionGrantToAccount = {
81
103
  type: {
82
104
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
83
105
  },
84
- value: "const issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound identities\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\n// Required: links\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n",
106
+ value: "const issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n",
85
107
  },
86
108
  name: 'ValidateBasicShape',
87
109
  type: {
@@ -1 +1 @@
1
- {"version":3,"file":"LinkedDocumentsPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,8CAA8C;YAC3D,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EACT,mFAAmF;YACrF,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,uJAAuJ;yBAC1J;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,ytDAAytD;yBAC5tD;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,mLAAmL;QACrL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,KAAK,EAAE;QACL,WAAW,EACT,qHAAqH;QACvH,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,eAAe,EAAE;QACf,WAAW,EACT,wEAAwE;QAC1E,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"LinkedDocumentsPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,oBAAoB;YACjC,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,WAAW,EAAE,0BAA0B;YACvC,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,qBAAqB;aAC7B;YACD,WAAW,EACT,oFAAoF;YACtF,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,mBAAmB,EAAE;YACnB,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;wBACD,KAAK,EAAE,gBAAgB;qBACxB;oBACD;wBACE,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;wBACD,KAAK,EAAE,gBAAgB;qBACxB;iBACF;aACF;YACD,WAAW,EACT,6DAA6D;YAC/D,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,UAAU,EAAE;YACV,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,uJAAuJ;yBAC1J;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,yoDAAyoD;yBAC5oD;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,mLAAmL;QACrL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,KAAK,EAAE;QACL,WAAW,EACT,qHAAqH;QACvH,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,eAAe,EAAE;QACf,WAAW,EACT,wEAAwE;QAC1E,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
@@ -1,7 +1,7 @@
1
1
  export declare const LinkedDocumentsPermissionGrantToDocument: {
2
2
  readonly contracts: {
3
3
  readonly granterChannel: {
4
- readonly description: "Granter/owner’s timeline (actor allowed to request revoke)";
4
+ readonly description: "Granter/owner’s timeline (direct grant-document revoke lives here).";
5
5
  readonly type: {
6
6
  readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
7
7
  };
@@ -23,7 +23,7 @@ export declare const LinkedDocumentsPermissionGrantToDocument: {
23
23
  };
24
24
  readonly value: "granterChannel";
25
25
  };
26
- readonly description: "Granter indicates the grant should be revoked (MyOS Admin will handle)";
26
+ readonly description: "Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.";
27
27
  readonly request: {
28
28
  readonly description: "Optional human-readable reason";
29
29
  readonly type: {
@@ -72,7 +72,7 @@ export declare const LinkedDocumentsPermissionGrantToDocument: {
72
72
  readonly type: {
73
73
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
74
74
  };
75
- readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string\");\n\n// Required: links\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n";
75
+ readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string\");\n\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n";
76
76
  };
77
77
  readonly name: "ValidateBasicShape";
78
78
  readonly type: {
@@ -105,7 +105,7 @@ export declare const LinkedDocumentsPermissionGrantToDocument: {
105
105
  };
106
106
  readonly name: "Linked Documents Permission Grant To Document";
107
107
  readonly skipValidation: {
108
- readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)";
108
+ readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).";
109
109
  readonly type: {
110
110
  readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
111
111
  };
@@ -1 +1 @@
1
- {"version":3,"file":"LinkedDocumentsPermissionGrantToDocument.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,wCAAwC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAqI3C,CAAC"}
1
+ {"version":3,"file":"LinkedDocumentsPermissionGrantToDocument.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,wCAAwC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAsI3C,CAAC"}
@@ -1,7 +1,7 @@
1
1
  export const LinkedDocumentsPermissionGrantToDocument = {
2
2
  contracts: {
3
3
  granterChannel: {
4
- description: 'Granter/owner’s timeline (actor allowed to request revoke)',
4
+ description: 'Granter/owner’s timeline (direct grant-document revoke lives here).',
5
5
  type: {
6
6
  blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
7
7
  },
@@ -23,7 +23,7 @@ export const LinkedDocumentsPermissionGrantToDocument = {
23
23
  },
24
24
  value: 'granterChannel',
25
25
  },
26
- description: 'Granter indicates the grant should be revoked (MyOS Admin will handle)',
26
+ description: 'Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.',
27
27
  request: {
28
28
  description: 'Optional human-readable reason',
29
29
  type: {
@@ -75,7 +75,7 @@ export const LinkedDocumentsPermissionGrantToDocument = {
75
75
  type: {
76
76
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
77
77
  },
78
- value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string\");\n\n// Required: links\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n",
78
+ value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string\");\n\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n",
79
79
  },
80
80
  name: 'ValidateBasicShape',
81
81
  type: {
@@ -109,7 +109,7 @@ export const LinkedDocumentsPermissionGrantToDocument = {
109
109
  },
110
110
  name: 'Linked Documents Permission Grant To Document',
111
111
  skipValidation: {
112
- description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)",
112
+ description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).",
113
113
  type: {
114
114
  blueId: '4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u',
115
115
  },
@@ -1 +1 @@
1
- {"version":3,"file":"LinkedDocumentsPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,wCAAwC,GAAG;IACtD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EACT,wEAAwE;YAC1E,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,uJAAuJ;yBAC1J;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,s1DAAs1D;yBACz1D;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,WAAW,EACT,mFAAmF;QACrF,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,mLAAmL;QACrL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,KAAK,EAAE;QACL,WAAW,EACT,qHAAqH;QACvH,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,+CAA+C;IACrD,cAAc,EAAE;QACd,WAAW,EACT,oGAAoG;QACtG,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EACT,wEAAwE;QAC1E,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"LinkedDocumentsPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,wCAAwC,GAAG;IACtD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EACT,qEAAqE;YACvE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EACT,uLAAuL;YACzL,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,uJAAuJ;yBAC1J;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,8tDAA8tD;yBACjuD;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,WAAW,EACT,mFAAmF;QACrF,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,mLAAmL;QACrL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,KAAK,EAAE;QACL,WAAW,EACT,qHAAqH;QACvH,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,+CAA+C;IACrD,cAAc,EAAE;QACd,WAAW,EACT,qGAAqG;QACvG,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EACT,wEAAwE;QAC1E,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
@@ -1,5 +1,11 @@
1
1
  export declare const LinkedDocumentsPermissionGranted: {
2
2
  readonly description: "All initial rights from this LDPG have been persisted.";
3
+ readonly grantDocumentId: {
4
+ readonly description: "Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.";
5
+ readonly type: {
6
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
7
+ };
8
+ };
3
9
  readonly links: {
4
10
  readonly type: {
5
11
  readonly blueId: "75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5";
@@ -1 +1 @@
1
- {"version":3,"file":"LinkedDocumentsPermissionGranted.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGranted.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,gCAAgC;;;;;;;;;;;;;;;;CAgBnC,CAAC"}
1
+ {"version":3,"file":"LinkedDocumentsPermissionGranted.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGranted.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,gCAAgC;;;;;;;;;;;;;;;;;;;;;;CAuBnC,CAAC"}
@@ -1,5 +1,11 @@
1
1
  export const LinkedDocumentsPermissionGranted = {
2
2
  description: 'All initial rights from this LDPG have been persisted.',
3
+ grantDocumentId: {
4
+ description: 'Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.',
5
+ type: {
6
+ blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
7
+ },
8
+ },
3
9
  links: {
4
10
  type: {
5
11
  blueId: '75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5',
@@ -1 +1 @@
1
- {"version":3,"file":"LinkedDocumentsPermissionGranted.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGranted.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,gCAAgC,GAAG;IAC9C,WAAW,EAAE,wDAAwD;IACrE,KAAK,EAAE;QACL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,qCAAqC;IAC3C,eAAe,EAAE;QACf,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"LinkedDocumentsPermissionGranted.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionGranted.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,gCAAgC,GAAG;IAC9C,WAAW,EAAE,wDAAwD;IACrE,eAAe,EAAE;QACf,WAAW,EACT,+KAA+K;QACjL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,KAAK,EAAE;QACL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,qCAAqC;IAC3C,eAAe,EAAE;QACf,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
@@ -1,5 +1,11 @@
1
1
  export declare const LinkedDocumentsPermissionRevokeRequested: {
2
- readonly description: "Emitted by revoke operation";
2
+ readonly description: "Emitted either by revoke operation on the grant document or by grantee-document self-revoke flow when grantDocumentId is provided.";
3
+ readonly grantDocumentId: {
4
+ readonly description: "Optional. If present, MyOS Admin must revoke the referenced permission grant after validating that the requesting document matches the grant granteeDocumentId. If absent, revoke applies to the grant document that emitted the event.";
5
+ readonly type: {
6
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
7
+ };
8
+ };
3
9
  readonly name: "Linked Documents Permission Revoke Requested";
4
10
  readonly reason: {
5
11
  readonly type: {
@@ -1 +1 @@
1
- {"version":3,"file":"LinkedDocumentsPermissionRevokeRequested.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,wCAAwC;;;;;;;;;;;CAW3C,CAAC"}
1
+ {"version":3,"file":"LinkedDocumentsPermissionRevokeRequested.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,wCAAwC;;;;;;;;;;;;;;;;;CAmB3C,CAAC"}
@@ -1,5 +1,11 @@
1
1
  export const LinkedDocumentsPermissionRevokeRequested = {
2
- description: 'Emitted by revoke operation',
2
+ description: 'Emitted either by revoke operation on the grant document or by grantee-document self-revoke flow when grantDocumentId is provided.',
3
+ grantDocumentId: {
4
+ description: 'Optional. If present, MyOS Admin must revoke the referenced permission grant after validating that the requesting document matches the grant granteeDocumentId. If absent, revoke applies to the grant document that emitted the event.',
5
+ type: {
6
+ blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
7
+ },
8
+ },
3
9
  name: 'Linked Documents Permission Revoke Requested',
4
10
  reason: {
5
11
  type: {
@@ -1 +1 @@
1
- {"version":3,"file":"LinkedDocumentsPermissionRevokeRequested.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,wCAAwC,GAAG;IACtD,WAAW,EAAE,6BAA6B;IAC1C,IAAI,EAAE,8CAA8C;IACpD,MAAM,EAAE;QACN,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"LinkedDocumentsPermissionRevokeRequested.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,wCAAwC,GAAG;IACtD,WAAW,EACT,oIAAoI;IACtI,eAAe,EAAE;QACf,WAAW,EACT,yOAAyO;QAC3O,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,MAAM,EAAE;QACN,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
@@ -1,13 +1,13 @@
1
1
  export declare const SingleDocumentPermissionGrantToAccount: {
2
2
  readonly contracts: {
3
3
  readonly granteeChannel: {
4
- readonly description: "Grantee’s timeline (recipient of the rights)";
4
+ readonly description: "Grantee’s timeline";
5
5
  readonly type: {
6
6
  readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
7
7
  };
8
8
  };
9
9
  readonly granterChannel: {
10
- readonly description: "Granter/owner’s timeline (actor allowed to request revoke)";
10
+ readonly description: "Granter/owner’s timeline";
11
11
  readonly type: {
12
12
  readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
13
13
  };
@@ -27,9 +27,9 @@ export declare const SingleDocumentPermissionGrantToAccount: {
27
27
  readonly type: {
28
28
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
29
29
  };
30
- readonly value: "granterChannel";
30
+ readonly value: "revokeAccessChannel";
31
31
  };
32
- readonly description: "Granter or grantee indicates the grant should be revoked (MyOS Admin will handle)";
32
+ readonly description: "Granter or grantee indicates the grant should be revoked (MyOS Admin will handle).";
33
33
  readonly request: {
34
34
  readonly description: "Optional human-readable reason";
35
35
  readonly type: {
@@ -40,7 +40,26 @@ export declare const SingleDocumentPermissionGrantToAccount: {
40
40
  readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
41
41
  };
42
42
  };
43
- readonly revokeImplGranter: {
43
+ readonly revokeAccessChannel: {
44
+ readonly channels: {
45
+ readonly items: readonly [{
46
+ readonly type: {
47
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
48
+ };
49
+ readonly value: "granterChannel";
50
+ }, {
51
+ readonly type: {
52
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
53
+ };
54
+ readonly value: "granteeChannel";
55
+ }];
56
+ };
57
+ readonly description: "Either grant side can invoke revoke on this grant document.";
58
+ readonly type: {
59
+ readonly blueId: "HsNatiPt2YvmkWQoqtfrFCbdp75ZUBLBUkWeq84WTfnr";
60
+ };
61
+ };
62
+ readonly revokeImpl: {
44
63
  readonly operation: {
45
64
  readonly type: {
46
65
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
@@ -78,7 +97,7 @@ export declare const SingleDocumentPermissionGrantToAccount: {
78
97
  readonly type: {
79
98
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
80
99
  };
81
- readonly value: "const issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound identities\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\n// Permissions\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
100
+ readonly value: "const issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
82
101
  };
83
102
  readonly name: "ValidateBasicShape";
84
103
  readonly type: {
@@ -1 +1 @@
1
- {"version":3,"file":"SingleDocumentPermissionGrantToAccount.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,sCAAsC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CA4HzC,CAAC"}
1
+ {"version":3,"file":"SingleDocumentPermissionGrantToAccount.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,sCAAsC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAmJzC,CAAC"}
@@ -1,13 +1,13 @@
1
1
  export const SingleDocumentPermissionGrantToAccount = {
2
2
  contracts: {
3
3
  granteeChannel: {
4
- description: 'Grantee’s timeline (recipient of the rights)',
4
+ description: 'Grantee’s timeline',
5
5
  type: {
6
6
  blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
7
7
  },
8
8
  },
9
9
  granterChannel: {
10
- description: 'Granter/owner’s timeline (actor allowed to request revoke)',
10
+ description: 'Granter/owner’s timeline',
11
11
  type: {
12
12
  blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
13
13
  },
@@ -27,9 +27,9 @@ export const SingleDocumentPermissionGrantToAccount = {
27
27
  type: {
28
28
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
29
29
  },
30
- value: 'granterChannel',
30
+ value: 'revokeAccessChannel',
31
31
  },
32
- description: 'Granter or grantee indicates the grant should be revoked (MyOS Admin will handle)',
32
+ description: 'Granter or grantee indicates the grant should be revoked (MyOS Admin will handle).',
33
33
  request: {
34
34
  description: 'Optional human-readable reason',
35
35
  type: {
@@ -40,7 +40,29 @@ export const SingleDocumentPermissionGrantToAccount = {
40
40
  blueId: 'BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC',
41
41
  },
42
42
  },
43
- revokeImplGranter: {
43
+ revokeAccessChannel: {
44
+ channels: {
45
+ items: [
46
+ {
47
+ type: {
48
+ blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
49
+ },
50
+ value: 'granterChannel',
51
+ },
52
+ {
53
+ type: {
54
+ blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
55
+ },
56
+ value: 'granteeChannel',
57
+ },
58
+ ],
59
+ },
60
+ description: 'Either grant side can invoke revoke on this grant document.',
61
+ type: {
62
+ blueId: 'HsNatiPt2YvmkWQoqtfrFCbdp75ZUBLBUkWeq84WTfnr',
63
+ },
64
+ },
65
+ revokeImpl: {
44
66
  operation: {
45
67
  type: {
46
68
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
@@ -81,7 +103,7 @@ export const SingleDocumentPermissionGrantToAccount = {
81
103
  type: {
82
104
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
83
105
  },
84
- value: 'const issues = [];\n\n// Required: target session\nconst target = document(\'/targetSessionId\');\nif (!target || typeof target !== \'string\') issues.push("targetSessionId is missing or invalid");\n\n// Required: bound identities\nconst granterId = document(\'/contracts/granterChannel/accountId\');\nif (typeof granterId !== \'string\' || granterId.length === 0) issues.push("granterChannel must be bound to an accountId");\nconst granteeId = document(\'/contracts/granteeChannel/accountId\');\nif (typeof granteeId !== \'string\' || granteeId.length === 0) issues.push("granteeChannel must be bound to an accountId");\n\n// Permissions\nconst perms = document(\'/permissions\');\nif (!perms || typeof perms !== \'object\') {\n issues.push("permissions block is missing");\n} else {\n if (perms.read !== true) issues.push("permissions.read must be true for SDPG");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== \'string\' || x.trim().length === 0)) {\n issues.push("permissions.singleOps must contain only non-empty strings");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push("permissions.allOps=true and permissions.singleOps are mutually exclusive");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: "MyOS/Single Document Permission Invalid", issues } ] };\nreturn { events: [ { type: "MyOS/Single Document Permission Validated" } ] };\n',
106
+ value: 'const issues = [];\n\nconst target = document(\'/targetSessionId\');\nif (!target || typeof target !== \'string\') issues.push("targetSessionId is missing or invalid");\n\nconst granterId = document(\'/contracts/granterChannel/accountId\');\nif (typeof granterId !== \'string\' || granterId.length === 0) issues.push("granterChannel must be bound to an accountId");\nconst granteeId = document(\'/contracts/granteeChannel/accountId\');\nif (typeof granteeId !== \'string\' || granteeId.length === 0) issues.push("granteeChannel must be bound to an accountId");\n\nconst perms = document(\'/permissions\');\nif (!perms || typeof perms !== \'object\') {\n issues.push("permissions block is missing");\n} else {\n if (perms.read !== true) issues.push("permissions.read must be true for SDPG");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== \'string\' || x.trim().length === 0)) {\n issues.push("permissions.singleOps must contain only non-empty strings");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push("permissions.allOps=true and permissions.singleOps are mutually exclusive");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: "MyOS/Single Document Permission Invalid", issues } ] };\nreturn { events: [ { type: "MyOS/Single Document Permission Validated" } ] };\n',
85
107
  },
86
108
  name: 'ValidateBasicShape',
87
109
  type: {
@@ -1 +1 @@
1
- {"version":3,"file":"SingleDocumentPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,sCAAsC,GAAG;IACpD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,8CAA8C;YAC3D,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EACT,mFAAmF;YACrF,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,q9CAAq9C;yBACx9C;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,6CAA6C;IACnD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"SingleDocumentPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,sCAAsC,GAAG;IACpD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,oBAAoB;YACjC,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,WAAW,EAAE,0BAA0B;YACvC,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,qBAAqB;aAC7B;YACD,WAAW,EACT,oFAAoF;YACtF,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,mBAAmB,EAAE;YACnB,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;wBACD,KAAK,EAAE,gBAAgB;qBACxB;oBACD;wBACE,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;wBACD,KAAK,EAAE,gBAAgB;qBACxB;iBACF;aACF;YACD,WAAW,EACT,6DAA6D;YAC/D,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,UAAU,EAAE;YACV,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,y4CAAy4C;yBAC54C;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,6CAA6C;IACnD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
@@ -1,7 +1,7 @@
1
1
  export declare const SingleDocumentPermissionGrantToDocument: {
2
2
  readonly contracts: {
3
3
  readonly granterChannel: {
4
- readonly description: "Granter/owner’s timeline (actor allowed to request revoke)";
4
+ readonly description: "Granter/owner’s timeline (direct grant-document revoke lives here).";
5
5
  readonly type: {
6
6
  readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
7
7
  };
@@ -23,7 +23,7 @@ export declare const SingleDocumentPermissionGrantToDocument: {
23
23
  };
24
24
  readonly value: "granterChannel";
25
25
  };
26
- readonly description: "Granter requests revocation (handled by MyOS Admin)";
26
+ readonly description: "Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.";
27
27
  readonly request: {
28
28
  readonly description: "Optional human-readable reason";
29
29
  readonly type: {
@@ -72,7 +72,7 @@ export declare const SingleDocumentPermissionGrantToDocument: {
72
72
  readonly type: {
73
73
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
74
74
  };
75
- readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\n// Permissions\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
75
+ readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
76
76
  };
77
77
  readonly name: "ValidateBasicShape";
78
78
  readonly type: {
@@ -86,7 +86,7 @@ export declare const SingleDocumentPermissionGrantToDocument: {
86
86
  };
87
87
  };
88
88
  readonly granteeDocumentId: {
89
- readonly description: "Required original document id (blueId) that will act as the grantee principal ('document')";
89
+ readonly description: "Required original document id (blueId) that will act as the grantee principal ('document').";
90
90
  readonly type: {
91
91
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
92
92
  };
@@ -105,7 +105,7 @@ export declare const SingleDocumentPermissionGrantToDocument: {
105
105
  };
106
106
  };
107
107
  readonly skipValidation: {
108
- readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)";
108
+ readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).";
109
109
  readonly type: {
110
110
  readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
111
111
  };
@@ -1 +1 @@
1
- {"version":3,"file":"SingleDocumentPermissionGrantToDocument.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,uCAAuC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAmI1C,CAAC"}
1
+ {"version":3,"file":"SingleDocumentPermissionGrantToDocument.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,uCAAuC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;CAqI1C,CAAC"}
@@ -1,7 +1,7 @@
1
1
  export const SingleDocumentPermissionGrantToDocument = {
2
2
  contracts: {
3
3
  granterChannel: {
4
- description: 'Granter/owner’s timeline (actor allowed to request revoke)',
4
+ description: 'Granter/owner’s timeline (direct grant-document revoke lives here).',
5
5
  type: {
6
6
  blueId: 'HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs',
7
7
  },
@@ -23,7 +23,7 @@ export const SingleDocumentPermissionGrantToDocument = {
23
23
  },
24
24
  value: 'granterChannel',
25
25
  },
26
- description: 'Granter requests revocation (handled by MyOS Admin)',
26
+ description: 'Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.',
27
27
  request: {
28
28
  description: 'Optional human-readable reason',
29
29
  type: {
@@ -75,7 +75,7 @@ export const SingleDocumentPermissionGrantToDocument = {
75
75
  type: {
76
76
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
77
77
  },
78
- value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\n// Permissions\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n",
78
+ value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n",
79
79
  },
80
80
  name: 'ValidateBasicShape',
81
81
  type: {
@@ -90,7 +90,7 @@ export const SingleDocumentPermissionGrantToDocument = {
90
90
  },
91
91
  },
92
92
  granteeDocumentId: {
93
- description: "Required original document id (blueId) that will act as the grantee principal ('document')",
93
+ description: "Required original document id (blueId) that will act as the grantee principal ('document').",
94
94
  type: {
95
95
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
96
96
  },
@@ -109,7 +109,7 @@ export const SingleDocumentPermissionGrantToDocument = {
109
109
  },
110
110
  },
111
111
  skipValidation: {
112
- description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)",
112
+ description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).",
113
113
  type: {
114
114
  blueId: '4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u',
115
115
  },
@@ -1 +1 @@
1
- {"version":3,"file":"SingleDocumentPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EAAE,qDAAqD;YAClE,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,mmDAAmmD;yBACtmD;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,WAAW,EACT,4FAA4F;QAC9F,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,cAAc,EAAE;QACd,WAAW,EACT,oGAAoG;QACtG,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"SingleDocumentPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EACT,qEAAqE;YACvE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EACT,uLAAuL;YACzL,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,++CAA++C;yBACl/C;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,WAAW,EACT,6FAA6F;QAC/F,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,cAAc,EAAE;QACd,WAAW,EACT,qGAAqG;QACvG,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
@@ -1,5 +1,11 @@
1
1
  export declare const SingleDocumentPermissionGranted: {
2
2
  readonly description: "DB rows written; rights are effective.";
3
+ readonly grantDocumentId: {
4
+ readonly description: "Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.";
5
+ readonly type: {
6
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
7
+ };
8
+ };
3
9
  readonly name: "Single Document Permission Granted";
4
10
  readonly permissions: {
5
11
  readonly type: {
@@ -1 +1 @@
1
- {"version":3,"file":"SingleDocumentPermissionGranted.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGranted.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,+BAA+B;;;;;;;;;;;;;;;;CAgBlC,CAAC"}
1
+ {"version":3,"file":"SingleDocumentPermissionGranted.d.ts","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGranted.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,+BAA+B;;;;;;;;;;;;;;;;;;;;;;CAuBlC,CAAC"}
@@ -1,5 +1,11 @@
1
1
  export const SingleDocumentPermissionGranted = {
2
2
  description: 'DB rows written; rights are effective.',
3
+ grantDocumentId: {
4
+ description: 'Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.',
5
+ type: {
6
+ blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
7
+ },
8
+ },
3
9
  name: 'Single Document Permission Granted',
4
10
  permissions: {
5
11
  type: {
@@ -1 +1 @@
1
- {"version":3,"file":"SingleDocumentPermissionGranted.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGranted.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,+BAA+B,GAAG;IAC7C,WAAW,EAAE,wCAAwC;IACrD,IAAI,EAAE,oCAAoC;IAC1C,WAAW,EAAE;QACX,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"SingleDocumentPermissionGranted.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGranted.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,+BAA+B,GAAG;IAC7C,WAAW,EAAE,wCAAwC;IACrD,eAAe,EAAE;QACf,WAAW,EACT,+KAA+K;QACjL,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,oCAAoC;IAC1C,WAAW,EAAE;QACX,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}