@blue-repository/types 0.23.0 → 0.25.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (234) hide show
  1. package/README.md +1 -1
  2. package/dist/meta.d.ts +2 -2
  3. package/dist/meta.d.ts.map +1 -1
  4. package/dist/meta.js +2 -13
  5. package/dist/meta.js.map +1 -1
  6. package/dist/packages/common/blue-ids.d.ts +13 -0
  7. package/dist/packages/common/blue-ids.d.ts.map +1 -1
  8. package/dist/packages/common/blue-ids.js +13 -0
  9. package/dist/packages/common/blue-ids.js.map +1 -1
  10. package/dist/packages/common/contents/Document.d.ts +11 -0
  11. package/dist/packages/common/contents/Document.d.ts.map +1 -0
  12. package/dist/packages/common/contents/Document.js +11 -0
  13. package/dist/packages/common/contents/Document.js.map +1 -0
  14. package/dist/packages/common/contents/DocumentAnchor.d.ts +8 -0
  15. package/dist/packages/common/contents/DocumentAnchor.d.ts.map +1 -0
  16. package/dist/packages/common/contents/DocumentAnchor.js +8 -0
  17. package/dist/packages/common/contents/DocumentAnchor.js.map +1 -0
  18. package/dist/packages/common/contents/DocumentAnchors.d.ts +14 -0
  19. package/dist/packages/common/contents/DocumentAnchors.d.ts.map +1 -0
  20. package/dist/packages/common/contents/DocumentAnchors.js +14 -0
  21. package/dist/packages/common/contents/DocumentAnchors.js.map +1 -0
  22. package/dist/packages/common/contents/Payment.d.ts +8 -0
  23. package/dist/packages/common/contents/Payment.d.ts.map +1 -0
  24. package/dist/packages/common/contents/Payment.js +8 -0
  25. package/dist/packages/common/contents/Payment.js.map +1 -0
  26. package/dist/packages/common/contents/PermissionGrant.d.ts +8 -0
  27. package/dist/packages/common/contents/PermissionGrant.d.ts.map +1 -0
  28. package/dist/packages/common/contents/PermissionGrant.js +8 -0
  29. package/dist/packages/common/contents/PermissionGrant.js.map +1 -0
  30. package/dist/packages/common/contents/Profile.d.ts +8 -0
  31. package/dist/packages/common/contents/Profile.d.ts.map +1 -0
  32. package/dist/packages/common/contents/Profile.js +8 -0
  33. package/dist/packages/common/contents/Profile.js.map +1 -0
  34. package/dist/packages/common/contents/Record.d.ts +8 -0
  35. package/dist/packages/common/contents/Record.d.ts.map +1 -0
  36. package/dist/packages/common/contents/Record.js +8 -0
  37. package/dist/packages/common/contents/Record.js.map +1 -0
  38. package/dist/packages/common/contents/Relationship.d.ts +8 -0
  39. package/dist/packages/common/contents/Relationship.d.ts.map +1 -0
  40. package/dist/packages/common/contents/Relationship.js +8 -0
  41. package/dist/packages/common/contents/Relationship.js.map +1 -0
  42. package/dist/packages/common/contents/Request.d.ts +8 -0
  43. package/dist/packages/common/contents/Request.d.ts.map +1 -0
  44. package/dist/packages/common/contents/Request.js +8 -0
  45. package/dist/packages/common/contents/Request.js.map +1 -0
  46. package/dist/packages/common/contents/Response.d.ts +8 -0
  47. package/dist/packages/common/contents/Response.d.ts.map +1 -0
  48. package/dist/packages/common/contents/Response.js +8 -0
  49. package/dist/packages/common/contents/Response.js.map +1 -0
  50. package/dist/packages/common/contents/Service.d.ts +17 -0
  51. package/dist/packages/common/contents/Service.d.ts.map +1 -0
  52. package/dist/packages/common/contents/Service.js +17 -0
  53. package/dist/packages/common/contents/Service.js.map +1 -0
  54. package/dist/packages/common/contents/Space.d.ts +20 -0
  55. package/dist/packages/common/contents/Space.d.ts.map +1 -0
  56. package/dist/packages/common/contents/Space.js +20 -0
  57. package/dist/packages/common/contents/Space.js.map +1 -0
  58. package/dist/packages/common/contents/Task.d.ts +8 -0
  59. package/dist/packages/common/contents/Task.d.ts.map +1 -0
  60. package/dist/packages/common/contents/Task.js +8 -0
  61. package/dist/packages/common/contents/Task.js.map +1 -0
  62. package/dist/packages/common/contents/index.d.ts +134 -0
  63. package/dist/packages/common/contents/index.d.ts.map +1 -1
  64. package/dist/packages/common/contents/index.js +39 -0
  65. package/dist/packages/common/contents/index.js.map +1 -1
  66. package/dist/packages/common/index.d.ts +544 -1
  67. package/dist/packages/common/index.d.ts.map +1 -1
  68. package/dist/packages/common/meta.d.ts +131 -1
  69. package/dist/packages/common/meta.d.ts.map +1 -1
  70. package/dist/packages/common/meta.js +144 -1
  71. package/dist/packages/common/meta.js.map +1 -1
  72. package/dist/packages/common/schemas/Document.d.ts +16 -0
  73. package/dist/packages/common/schemas/Document.d.ts.map +1 -0
  74. package/dist/packages/common/schemas/Document.js +9 -0
  75. package/dist/packages/common/schemas/Document.js.map +1 -0
  76. package/dist/packages/common/schemas/DocumentAnchor.d.ts +16 -0
  77. package/dist/packages/common/schemas/DocumentAnchor.d.ts.map +1 -0
  78. package/dist/packages/common/schemas/DocumentAnchor.js +9 -0
  79. package/dist/packages/common/schemas/DocumentAnchor.js.map +1 -0
  80. package/dist/packages/common/schemas/DocumentAnchors.d.ts +40 -0
  81. package/dist/packages/common/schemas/DocumentAnchors.d.ts.map +1 -0
  82. package/dist/packages/common/schemas/DocumentAnchors.js +6 -0
  83. package/dist/packages/common/schemas/DocumentAnchors.js.map +1 -0
  84. package/dist/packages/common/schemas/Payment.d.ts +19 -0
  85. package/dist/packages/common/schemas/Payment.d.ts.map +1 -0
  86. package/dist/packages/common/schemas/Payment.js +9 -0
  87. package/dist/packages/common/schemas/Payment.js.map +1 -0
  88. package/dist/packages/common/schemas/PermissionGrant.d.ts +19 -0
  89. package/dist/packages/common/schemas/PermissionGrant.d.ts.map +1 -0
  90. package/dist/packages/common/schemas/PermissionGrant.js +9 -0
  91. package/dist/packages/common/schemas/PermissionGrant.js.map +1 -0
  92. package/dist/packages/common/schemas/Profile.d.ts +19 -0
  93. package/dist/packages/common/schemas/Profile.d.ts.map +1 -0
  94. package/dist/packages/common/schemas/Profile.js +9 -0
  95. package/dist/packages/common/schemas/Profile.js.map +1 -0
  96. package/dist/packages/common/schemas/Record.d.ts +19 -0
  97. package/dist/packages/common/schemas/Record.d.ts.map +1 -0
  98. package/dist/packages/common/schemas/Record.js +9 -0
  99. package/dist/packages/common/schemas/Record.js.map +1 -0
  100. package/dist/packages/common/schemas/Relationship.d.ts +19 -0
  101. package/dist/packages/common/schemas/Relationship.d.ts.map +1 -0
  102. package/dist/packages/common/schemas/Relationship.js +9 -0
  103. package/dist/packages/common/schemas/Relationship.js.map +1 -0
  104. package/dist/packages/common/schemas/Request.d.ts +19 -0
  105. package/dist/packages/common/schemas/Request.d.ts.map +1 -0
  106. package/dist/packages/common/schemas/Request.js +9 -0
  107. package/dist/packages/common/schemas/Request.js.map +1 -0
  108. package/dist/packages/common/schemas/Response.d.ts +19 -0
  109. package/dist/packages/common/schemas/Response.d.ts.map +1 -0
  110. package/dist/packages/common/schemas/Response.js +9 -0
  111. package/dist/packages/common/schemas/Response.js.map +1 -0
  112. package/dist/packages/common/schemas/Service.d.ts +22 -0
  113. package/dist/packages/common/schemas/Service.d.ts.map +1 -0
  114. package/dist/packages/common/schemas/Service.js +10 -0
  115. package/dist/packages/common/schemas/Service.js.map +1 -0
  116. package/dist/packages/common/schemas/Space.d.ts +85 -0
  117. package/dist/packages/common/schemas/Space.d.ts.map +1 -0
  118. package/dist/packages/common/schemas/Space.js +12 -0
  119. package/dist/packages/common/schemas/Space.js.map +1 -0
  120. package/dist/packages/common/schemas/Task.d.ts +19 -0
  121. package/dist/packages/common/schemas/Task.d.ts.map +1 -0
  122. package/dist/packages/common/schemas/Task.js +9 -0
  123. package/dist/packages/common/schemas/Task.js.map +1 -0
  124. package/dist/packages/common/schemas/index.d.ts +305 -0
  125. package/dist/packages/common/schemas/index.d.ts.map +1 -1
  126. package/dist/packages/common/schemas/index.js +39 -0
  127. package/dist/packages/common/schemas/index.js.map +1 -1
  128. package/dist/packages/conversation/index.d.ts +11 -11
  129. package/dist/packages/conversation/meta.d.ts +11 -11
  130. package/dist/packages/conversation/meta.js +11 -11
  131. package/dist/packages/conversation/meta.js.map +1 -1
  132. package/dist/packages/myos/blue-ids.d.ts +11 -11
  133. package/dist/packages/myos/blue-ids.js +11 -11
  134. package/dist/packages/myos/blue-ids.js.map +1 -1
  135. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.d.ts +25 -6
  136. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.d.ts.map +1 -1
  137. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.js +28 -6
  138. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToAccount.js.map +1 -1
  139. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.d.ts +4 -4
  140. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.d.ts.map +1 -1
  141. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.js +4 -4
  142. package/dist/packages/myos/contents/LinkedDocumentsPermissionGrantToDocument.js.map +1 -1
  143. package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.d.ts +6 -0
  144. package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.d.ts.map +1 -1
  145. package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.js +6 -0
  146. package/dist/packages/myos/contents/LinkedDocumentsPermissionGranted.js.map +1 -1
  147. package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.d.ts +7 -1
  148. package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.d.ts.map +1 -1
  149. package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.js +7 -1
  150. package/dist/packages/myos/contents/LinkedDocumentsPermissionRevokeRequested.js.map +1 -1
  151. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.d.ts +25 -6
  152. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.d.ts.map +1 -1
  153. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.js +28 -6
  154. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.js.map +1 -1
  155. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.d.ts +5 -5
  156. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.d.ts.map +1 -1
  157. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.js +5 -5
  158. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.js.map +1 -1
  159. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.d.ts +6 -0
  160. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.d.ts.map +1 -1
  161. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.js +6 -0
  162. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.js.map +1 -1
  163. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.d.ts +7 -1
  164. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.d.ts.map +1 -1
  165. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.js +7 -1
  166. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.js.map +1 -1
  167. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.d.ts +3 -3
  168. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.d.ts.map +1 -1
  169. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.js +3 -3
  170. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.js.map +1 -1
  171. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.d.ts +6 -0
  172. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.d.ts.map +1 -1
  173. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.js +6 -0
  174. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.js.map +1 -1
  175. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.d.ts +7 -1
  176. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.d.ts.map +1 -1
  177. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.js +7 -1
  178. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.js.map +1 -1
  179. package/dist/packages/myos/contents/index.d.ts +726 -652
  180. package/dist/packages/myos/contents/index.d.ts.map +1 -1
  181. package/dist/packages/myos/contents/index.js +33 -33
  182. package/dist/packages/myos/contents/index.js.map +1 -1
  183. package/dist/packages/myos/index.d.ts +996 -806
  184. package/dist/packages/myos/index.d.ts.map +1 -1
  185. package/dist/packages/myos/meta.d.ts +43 -51
  186. package/dist/packages/myos/meta.d.ts.map +1 -1
  187. package/dist/packages/myos/meta.js +32 -42
  188. package/dist/packages/myos/meta.js.map +1 -1
  189. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.d.ts +58 -5
  190. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.d.ts.map +1 -1
  191. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.js +3 -1
  192. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToAccount.js.map +1 -1
  193. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGrantToDocument.d.ts +12 -12
  194. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.d.ts +3 -0
  195. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.d.ts.map +1 -1
  196. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.js +1 -0
  197. package/dist/packages/myos/schemas/LinkedDocumentsPermissionGranted.js.map +1 -1
  198. package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.d.ts +3 -0
  199. package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.d.ts.map +1 -1
  200. package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.js +1 -0
  201. package/dist/packages/myos/schemas/LinkedDocumentsPermissionRevokeRequested.js.map +1 -1
  202. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.d.ts +58 -5
  203. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.d.ts.map +1 -1
  204. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.js +3 -1
  205. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToAccount.js.map +1 -1
  206. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantToDocument.d.ts +12 -12
  207. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.d.ts +3 -0
  208. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.d.ts.map +1 -1
  209. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.js +1 -0
  210. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.js.map +1 -1
  211. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.d.ts +3 -0
  212. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.d.ts.map +1 -1
  213. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.js +1 -0
  214. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.js.map +1 -1
  215. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrant.d.ts +12 -12
  216. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.d.ts +3 -0
  217. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.d.ts.map +1 -1
  218. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.js +1 -0
  219. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.js.map +1 -1
  220. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.d.ts +3 -0
  221. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.d.ts.map +1 -1
  222. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.js +1 -0
  223. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.js.map +1 -1
  224. package/dist/packages/myos/schemas/index.d.ts +181 -57
  225. package/dist/packages/myos/schemas/index.d.ts.map +1 -1
  226. package/dist/packages/myos/schemas/index.js +11 -11
  227. package/dist/packages/myos/schemas/index.js.map +1 -1
  228. package/dist/packages/paynote/index.d.ts +21 -21
  229. package/dist/packages/paynote/meta.d.ts +21 -21
  230. package/dist/packages/paynote/meta.js +21 -21
  231. package/dist/packages/paynote/meta.js.map +1 -1
  232. package/dist/repository.d.ts +2499 -1766
  233. package/dist/repository.d.ts.map +1 -1
  234. package/package.json +2 -2
@@ -1,17 +1,21 @@
1
1
  export { SingleDocumentPermissionRevoked } from './SingleDocumentPermissionRevoked.js';
2
2
  export { WorkerAgencyPermissionInvalid } from './WorkerAgencyPermissionInvalid.js';
3
+ export { WorkerAgencyPermissionGrant } from './WorkerAgencyPermissionGrant.js';
3
4
  export { SubscriptionUpdate } from './SubscriptionUpdate.js';
4
5
  export { MyOSTimeline } from './MyOSTimeline.js';
5
6
  export { WorkerSessionStarting } from './WorkerSessionStarting.js';
6
7
  export { StartWorkerSessionRequested } from './StartWorkerSessionRequested.js';
7
8
  export { CallOperationResponded } from './CallOperationResponded.js';
8
9
  export { AgentActor } from './AgentActor.js';
10
+ export { SingleDocumentPermissionGrantToDocument } from './SingleDocumentPermissionGrantToDocument.js';
9
11
  export { ChatGPTConnectorAgent } from './ChatGPTConnectorAgent.js';
10
12
  export { DocumentLinks } from './DocumentLinks.js';
11
13
  export { MyOSAgentChannel } from './MyOSAgentChannel.js';
12
14
  export { MyOSWorkerAgency } from './MyOSWorkerAgency.js';
13
15
  export { DocumentSessionBootstrap } from './DocumentSessionBootstrap.js';
14
16
  export { SubscriptionToSessionInitiated } from './SubscriptionToSessionInitiated.js';
17
+ export { LinkedDocumentsPermissionRevokeRequested } from './LinkedDocumentsPermissionRevokeRequested.js';
18
+ export { SingleDocumentPermissionRevokeRequested } from './SingleDocumentPermissionRevokeRequested.js';
15
19
  export { SingleDocumentPermissionInvalid } from './SingleDocumentPermissionInvalid.js';
16
20
  export { MyOSPackage } from './MyOSPackage.js';
17
21
  export { SingleDocumentPermissionGrantingInProgress } from './SingleDocumentPermissionGrantingInProgress.js';
@@ -19,37 +23,32 @@ export { PrincipalActor } from './PrincipalActor.js';
19
23
  export { WorkerAgencyPermission } from './WorkerAgencyPermission.js';
20
24
  export { SingleDocumentPermissionGrantResponded } from './SingleDocumentPermissionGrantResponded.js';
21
25
  export { SearchContract } from './SearchContract.js';
26
+ export { WorkerAgencyPermissionRevokeRequested } from './WorkerAgencyPermissionRevokeRequested.js';
22
27
  export { WorkerAgencyPermissionRevokingInProgress } from './WorkerAgencyPermissionRevokingInProgress.js';
23
28
  export { RemovingParticipantResponded } from './RemovingParticipantResponded.js';
24
- export { SingleDocumentPermissionGrantToDocument } from './SingleDocumentPermissionGrantToDocument.js';
25
- export { LinkedDocumentsPermissionRevokeRequested } from './LinkedDocumentsPermissionRevokeRequested.js';
29
+ export { LinkedDocumentsPermissionGranted } from './LinkedDocumentsPermissionGranted.js';
26
30
  export { MyOSParticipantsOrchestration } from './MyOSParticipantsOrchestration.js';
31
+ export { WorkerAgencyPermissionGranted } from './WorkerAgencyPermissionGranted.js';
27
32
  export { LinkedDocumentsPermissionSet } from './LinkedDocumentsPermissionSet.js';
28
33
  export { DocumentAnchors } from './DocumentAnchors.js';
29
34
  export { MyOSAgent } from './MyOSAgent.js';
30
35
  export { AnchorAutomationTemplate } from './AnchorAutomationTemplate.js';
31
- export { WorkerAgencyPermissionGranted } from './WorkerAgencyPermissionGranted.js';
32
36
  export { MyOSDocumentSessionReference } from './MyOSDocumentSessionReference.js';
33
37
  export { RemovingParticipantRequested } from './RemovingParticipantRequested.js';
34
38
  export { LinkedDocumentsPermissionGrantingInProgress } from './LinkedDocumentsPermissionGrantingInProgress.js';
35
39
  export { Agent } from './Agent.js';
36
- export { SingleDocumentPermissionGranted } from './SingleDocumentPermissionGranted.js';
37
40
  export { AddingParticipantRequested } from './AddingParticipantRequested.js';
38
41
  export { SessionEpochAdvanced } from './SessionEpochAdvanced.js';
39
42
  export { BootstrapFailed } from './BootstrapFailed.js';
40
43
  export { LinkedDocumentsPermissionRevoked } from './LinkedDocumentsPermissionRevoked.js';
41
- export { LinkedDocumentsPermissionGrantToDocument } from './LinkedDocumentsPermissionGrantToDocument.js';
42
- export { WorkerAgencyPermissionGrant } from './WorkerAgencyPermissionGrant.js';
43
- export { WorkerAgencyPermissionRevokeRequested } from './WorkerAgencyPermissionRevokeRequested.js';
44
- export { LinkedDocumentsPermissionGrantToAccount } from './LinkedDocumentsPermissionGrantToAccount.js';
45
44
  export { SingleDocumentPermissionValidated } from './SingleDocumentPermissionValidated.js';
46
45
  export { WorkerAgencyPermissionRevoked } from './WorkerAgencyPermissionRevoked.js';
47
46
  export { CallOperationFailed } from './CallOperationFailed.js';
48
47
  export { DocumentLink } from './DocumentLink.js';
49
- export { LinkedDocumentsPermissionGranted } from './LinkedDocumentsPermissionGranted.js';
50
48
  export { SubscribeToSessionRequested } from './SubscribeToSessionRequested.js';
51
49
  export { AddingParticipantResponded } from './AddingParticipantResponded.js';
52
50
  export { MyOSAdminBase } from './MyOSAdminBase.js';
51
+ export { SingleDocumentPermissionGranted } from './SingleDocumentPermissionGranted.js';
53
52
  export { MyOSSessionInteraction } from './MyOSSessionInteraction.js';
54
53
  export { LinkedDocumentsPermissionRejected } from './LinkedDocumentsPermissionRejected.js';
55
54
  export { ParticipantActivationState } from './ParticipantActivationState.js';
@@ -63,7 +62,7 @@ export { CallOperationAccepted } from './CallOperationAccepted.js';
63
62
  export { LinkedDocumentsPermissionValidated } from './LinkedDocumentsPermissionValidated.js';
64
63
  export { LLMAgent } from './LLMAgent.js';
65
64
  export { SingleDocumentPermissionSet } from './SingleDocumentPermissionSet.js';
66
- export { SingleDocumentPermissionRevokeRequested } from './SingleDocumentPermissionRevokeRequested.js';
65
+ export { LinkedDocumentsPermissionGrantToDocument } from './LinkedDocumentsPermissionGrantToDocument.js';
67
66
  export { SingleDocumentPermissionGrantRequested } from './SingleDocumentPermissionGrantRequested.js';
68
67
  export { LinkedDocumentsPermissionInvalid } from './LinkedDocumentsPermissionInvalid.js';
69
68
  export { ParticipantActivated } from './ParticipantActivated.js';
@@ -72,8 +71,8 @@ export { CallOperationRequested } from './CallOperationRequested.js';
72
71
  export { AllParticipantsReady } from './AllParticipantsReady.js';
73
72
  export { TargetDocumentSessionStarted } from './TargetDocumentSessionStarted.js';
74
73
  export { MyOSTimelineEntry } from './MyOSTimelineEntry.js';
75
- export { SingleDocumentPermissionGrantToAccount } from './SingleDocumentPermissionGrantToAccount.js';
76
74
  export { WorkerAgencyPermissionRejected } from './WorkerAgencyPermissionRejected.js';
75
+ export { LinkedDocumentsPermissionGrantToAccount } from './LinkedDocumentsPermissionGrantToAccount.js';
77
76
  export { SubscriptionToSessionRevoked } from './SubscriptionToSessionRevoked.js';
78
77
  export { MyOSAgentEvent } from './MyOSAgentEvent.js';
79
78
  export { WorkerAgencyPermissionValidated } from './WorkerAgencyPermissionValidated.js';
@@ -85,6 +84,7 @@ export { WorkerAgencyPermissionGrantingInProgress } from './WorkerAgencyPermissi
85
84
  export { SingleDocumentPermissionRejected } from './SingleDocumentPermissionRejected.js';
86
85
  export { Participant } from './Participant.js';
87
86
  export { SubscriptionToSessionFailed } from './SubscriptionToSessionFailed.js';
87
+ export { SingleDocumentPermissionGrantToAccount } from './SingleDocumentPermissionGrantToAccount.js';
88
88
  export declare const contents: {
89
89
  readonly '29JSV8DwY6x3zfvAqiM7xNc96i46sKcunFYgfywBkF2f': {
90
90
  readonly description: "Rights granted by this PGD have been retracted.";
@@ -108,6 +108,111 @@ export declare const contents: {
108
108
  readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
109
109
  };
110
110
  };
111
+ readonly '2ARFPC2YDspfN86MT897RDzGUtEEw1B7Lbdvy8Z3ZFQx': {
112
+ readonly allowedWorkerAgencyPermissions: {
113
+ readonly itemType: {
114
+ readonly blueId: "5J3RXNnALK1ZYAQBrjGwCQ4WpL3YUGHvz9WcGos6mMSp";
115
+ };
116
+ readonly type: {
117
+ readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
118
+ };
119
+ };
120
+ readonly contracts: {
121
+ readonly granterChannel: {
122
+ readonly description: "Granter/owner’s timeline (direct grant-document revoke lives here).";
123
+ readonly type: {
124
+ readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
125
+ };
126
+ };
127
+ readonly initLifecycleChannel: {
128
+ readonly event: {
129
+ readonly type: {
130
+ readonly blueId: "BrpmpNt5JkapeUvPqYcxgXZrHNZX3R757dRwuXXdfNM2";
131
+ };
132
+ };
133
+ readonly type: {
134
+ readonly blueId: "H2aCCTUcLMTJozWkn7HPUjyFBFxamraw1q8DyWk87zxr";
135
+ };
136
+ };
137
+ readonly revoke: {
138
+ readonly channel: {
139
+ readonly type: {
140
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
141
+ };
142
+ readonly value: "granterChannel";
143
+ };
144
+ readonly description: "Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.";
145
+ readonly request: {
146
+ readonly description: "Optional human-readable reason";
147
+ readonly type: {
148
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
149
+ };
150
+ };
151
+ readonly type: {
152
+ readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
153
+ };
154
+ };
155
+ readonly revokeImplGranter: {
156
+ readonly operation: {
157
+ readonly type: {
158
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
159
+ };
160
+ readonly value: "revoke";
161
+ };
162
+ readonly steps: {
163
+ readonly items: readonly [{
164
+ readonly code: {
165
+ readonly type: {
166
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
167
+ };
168
+ readonly value: "return {\n events: [\n {\n type: \"MyOS/Worker Agency Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
169
+ };
170
+ readonly name: "EmitRevokeRequested";
171
+ readonly type: {
172
+ readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
173
+ };
174
+ }];
175
+ };
176
+ readonly type: {
177
+ readonly blueId: "CGdxkNjPcsdescqLPz6SNLsMyak6demQQr7RoKNHbCyv";
178
+ };
179
+ };
180
+ readonly validateOnInit: {
181
+ readonly channel: {
182
+ readonly type: {
183
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
184
+ };
185
+ readonly value: "initLifecycleChannel";
186
+ };
187
+ readonly steps: {
188
+ readonly items: readonly [{
189
+ readonly code: {
190
+ readonly type: {
191
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
192
+ };
193
+ readonly value: "const issues = [];\n\nconst unwrapText = value => {\n if (typeof value === 'string') {\n const trimmed = value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'string') {\n const trimmed = value.value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.workerType === 'string') {\n const trimmed = value.workerType.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.name === 'string') {\n const trimmed = value.name.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n }\n return undefined;\n};\n\nconst unwrapBoolean = value => {\n if (typeof value === 'boolean') {\n return value;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return value.value;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return value.value.value;\n }\n }\n return undefined;\n};\n\nconst hasBooleanValue = value => {\n if (typeof value === 'boolean') {\n return true;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return true;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return true;\n }\n }\n return false;\n};\n\nconst unwrapArray = value => {\n if (Array.isArray(value)) {\n return value;\n }\n if (value && typeof value === 'object' && Array.isArray(value.items)) {\n return value.items;\n }\n return [];\n};\n\nconst unwrapRecord = value => {\n if (value && typeof value === 'object' && !Array.isArray(value)) {\n if (value.value && typeof value.value === 'object') {\n return value.value;\n }\n return value;\n }\n return {};\n};\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) {\n issues.push(\"granterChannel must be bound to an accountId\");\n}\n\nconst granteeDocumentId = document('/granteeDocumentId');\nif (\n typeof granteeDocumentId !== 'string' ||\n granteeDocumentId.trim().length === 0\n) {\n issues.push(\"granteeDocumentId must be a non-empty string\");\n}\n\nconst list = document('/allowedWorkerAgencyPermissions');\nif (!Array.isArray(list) || list.length === 0) {\n issues.push(\"allowedWorkerAgencyPermissions must be a non-empty array\");\n} else {\n const validateSDPS = (p, path) => {\n const record = unwrapRecord(p);\n if (Object.keys(record).length === 0) {\n issues.push(`${path} must be an object`);\n return;\n }\n const read = unwrapBoolean(record.read);\n if (read !== true) {\n issues.push(`${path}.read must be true`);\n }\n const share = record.share;\n const shareValue = unwrapBoolean(share);\n if (hasBooleanValue(share) && typeof shareValue !== 'boolean') {\n issues.push(`${path}.share must be boolean if provided`);\n }\n const allOps = record.allOps;\n const allOpsValue = unwrapBoolean(allOps);\n if (hasBooleanValue(allOps) && typeof allOpsValue !== 'boolean') {\n issues.push(`${path}.allOps must be boolean if provided`);\n }\n const singleOpsRaw = unwrapArray(record.singleOps)\n .map(entry => unwrapText(entry))\n .filter(Boolean);\n const hasSingle = singleOpsRaw.length > 0;\n if (hasSingle) {\n const bad = singleOpsRaw.length !== unwrapArray(record.singleOps).length;\n if (bad) issues.push(`${path}.singleOps must contain only non-empty strings`);\n }\n if (allOpsValue === true && hasSingle) {\n issues.push(`${path}.allOps=true and ${path}.singleOps are mutually exclusive`);\n }\n };\n const seenTypes = new Set();\n list.forEach((item, idx) => {\n const itemPath = `/allowedWorkerAgencyPermissions[${idx}]`;\n if (typeof item !== 'object' || item === null) {\n issues.push(`${itemPath} must be an object`);\n return;\n }\n const workerType = unwrapText(item.workerType);\n if (!workerType) {\n issues.push(`${itemPath}.workerType must be a non-empty string`);\n } else {\n if (seenTypes.has(workerType)) {\n issues.push(`duplicate workerType '${workerType}' in allowedWorkerAgencyPermissions`);\n } else {\n seenTypes.add(workerType);\n }\n }\n const perms = item.permissions;\n if (typeof perms === 'undefined') {\n issues.push(`${itemPath}.permissions is required`);\n } else {\n validateSDPS(perms, `${itemPath}.permissions`);\n }\n });\n}\nif (issues.length > 0) {\n return { events: [ { type: \"MyOS/Worker Agency Permission Invalid\", issues } ] };\n} else {\n return { events: [ { type: \"MyOS/Worker Agency Permission Validated\" } ] };\n}\n";
194
+ };
195
+ readonly name: "ValidateBasicShape";
196
+ readonly type: {
197
+ readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
198
+ };
199
+ }];
200
+ };
201
+ readonly type: {
202
+ readonly blueId: "7X3LkN54Yp88JgZbppPhP6hM3Jqiqv8Z2i4kS7phXtQe";
203
+ };
204
+ };
205
+ };
206
+ readonly granteeDocumentId: {
207
+ readonly type: {
208
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
209
+ };
210
+ };
211
+ readonly name: "Worker Agency Permission Grant";
212
+ readonly type: {
213
+ readonly blueId: "Bu4YETSKYW8hHMwVy6zUUoBAGZPxX3KVXfKN9uoCUoJj";
214
+ };
215
+ };
111
216
  readonly '2gc8djtKGGRPjGfMQzvJZMviaXm4ytM1nA4DVbfyjkrW': {
112
217
  readonly description: "Update to a subscription.";
113
218
  readonly name: "Subscription Update";
@@ -260,6 +365,128 @@ export declare const contents: {
260
365
  readonly blueId: "CN5efWVizJbRsMCw8YWRfT2q9vM9XfeGDN9wFvYcvMnQ";
261
366
  };
262
367
  };
368
+ readonly '3SQR9pgQoY8rE9XhSmDDbKdHwe7ZZDaX4hPkYirhjYmD': {
369
+ readonly contracts: {
370
+ readonly granterChannel: {
371
+ readonly description: "Granter/owner’s timeline (direct grant-document revoke lives here).";
372
+ readonly type: {
373
+ readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
374
+ };
375
+ };
376
+ readonly initLifecycleChannel: {
377
+ readonly event: {
378
+ readonly type: {
379
+ readonly blueId: "BrpmpNt5JkapeUvPqYcxgXZrHNZX3R757dRwuXXdfNM2";
380
+ };
381
+ };
382
+ readonly type: {
383
+ readonly blueId: "H2aCCTUcLMTJozWkn7HPUjyFBFxamraw1q8DyWk87zxr";
384
+ };
385
+ };
386
+ readonly revoke: {
387
+ readonly channel: {
388
+ readonly type: {
389
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
390
+ };
391
+ readonly value: "granterChannel";
392
+ };
393
+ readonly description: "Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.";
394
+ readonly request: {
395
+ readonly description: "Optional human-readable reason";
396
+ readonly type: {
397
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
398
+ };
399
+ };
400
+ readonly type: {
401
+ readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
402
+ };
403
+ };
404
+ readonly revokeImplGranter: {
405
+ readonly operation: {
406
+ readonly type: {
407
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
408
+ };
409
+ readonly value: "revoke";
410
+ };
411
+ readonly steps: {
412
+ readonly items: readonly [{
413
+ readonly code: {
414
+ readonly type: {
415
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
416
+ };
417
+ readonly value: "return {\n events: [\n {\n type: \"MyOS/Single Document Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
418
+ };
419
+ readonly name: "EmitRevokeRequested";
420
+ readonly type: {
421
+ readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
422
+ };
423
+ }];
424
+ };
425
+ readonly type: {
426
+ readonly blueId: "CGdxkNjPcsdescqLPz6SNLsMyak6demQQr7RoKNHbCyv";
427
+ };
428
+ };
429
+ readonly validateOnInit: {
430
+ readonly channel: {
431
+ readonly type: {
432
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
433
+ };
434
+ readonly value: "initLifecycleChannel";
435
+ };
436
+ readonly steps: {
437
+ readonly items: readonly [{
438
+ readonly code: {
439
+ readonly type: {
440
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
441
+ };
442
+ readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
443
+ };
444
+ readonly name: "ValidateBasicShape";
445
+ readonly type: {
446
+ readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
447
+ };
448
+ }];
449
+ };
450
+ readonly type: {
451
+ readonly blueId: "7X3LkN54Yp88JgZbppPhP6hM3Jqiqv8Z2i4kS7phXtQe";
452
+ };
453
+ };
454
+ };
455
+ readonly granteeDocumentId: {
456
+ readonly description: "Required original document id (blueId) that will act as the grantee principal ('document').";
457
+ readonly type: {
458
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
459
+ };
460
+ };
461
+ readonly granterDocumentSessionId: {
462
+ readonly description: "Optional. If set, MyOS should evaluate authority using this document session as the principal (instead of granter accountId).";
463
+ readonly type: {
464
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
465
+ };
466
+ };
467
+ readonly name: "Single Document Permission Grant To Document";
468
+ readonly permissions: {
469
+ readonly description: "Rights to grant on the target session (READ required; allOps and singleOps are mutually exclusive; singleOps is optional but must be non-empty if provided).";
470
+ readonly type: {
471
+ readonly blueId: "DRDQcve5AjwBK9z6Njfa4MNERko7Uf4ucvARFdC6sL54";
472
+ };
473
+ };
474
+ readonly skipValidation: {
475
+ readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).";
476
+ readonly type: {
477
+ readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
478
+ };
479
+ };
480
+ readonly targetSessionId: {
481
+ readonly description: "Target document session id to grant access to";
482
+ readonly type: {
483
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
484
+ };
485
+ };
486
+ readonly type: {
487
+ readonly blueId: "Bu4YETSKYW8hHMwVy6zUUoBAGZPxX3KVXfKN9uoCUoJj";
488
+ };
489
+ };
263
490
  readonly '3SULZSU6Yvi6rVuhGsRX7znRuyt6oWnx1Hdyu6QhdhFj': {
264
491
  readonly contracts: {
265
492
  readonly ownerChannel: {
@@ -767,29 +994,65 @@ export declare const contents: {
767
994
  readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
768
995
  };
769
996
  };
770
- readonly '567voUMtKJQoqru6ZVPYb4EGwdeV99rUSAqsnod7gqfd': {
771
- readonly description: "Emitted on initialise when local shape checks fail.";
772
- readonly issues: {
773
- readonly itemType: {
997
+ readonly '4XzYndDA5v9yL5LYBq1Jk7ibA5x2ebN8vbSbEAoRrjaG': {
998
+ readonly description: "Emitted either by revoke operation on the grant document or by grantee-document self-revoke flow when grantDocumentId is provided.";
999
+ readonly grantDocumentId: {
1000
+ readonly description: "Optional. If present, MyOS Admin must revoke the referenced permission grant after validating that the requesting document matches the grant granteeDocumentId. If absent, revoke applies to the grant document that emitted the event.";
1001
+ readonly type: {
774
1002
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
775
1003
  };
1004
+ };
1005
+ readonly name: "Linked Documents Permission Revoke Requested";
1006
+ readonly reason: {
776
1007
  readonly type: {
777
- readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
1008
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
778
1009
  };
779
1010
  };
780
- readonly name: "Single Document Permission Invalid";
781
1011
  readonly type: {
782
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
1012
+ readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
783
1013
  };
784
1014
  };
785
- readonly '5cg55kgH8ckRVji4oWSBBxthJQFYmB5Lb1Pea7achyNr': {
786
- readonly agentStoreDescription: {
787
- readonly description: "Human-readable description for stores/directories";
1015
+ readonly '53Kbf5fymxzBCJgf5BdCYCjCb6o5nWS1KWCzL8GkBF42': {
1016
+ readonly description: "Emitted either by revoke operation on the grant document or by grantee-document self-revoke flow when grantDocumentId is provided.";
1017
+ readonly grantDocumentId: {
1018
+ readonly description: "Optional. If present, MyOS Admin must revoke the referenced permission grant after validating that the requesting document matches the grant granteeDocumentId. If absent, revoke applies to the grant document that emitted the event.";
788
1019
  readonly type: {
789
1020
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
790
1021
  };
791
1022
  };
792
- readonly automationTemplate: {
1023
+ readonly name: "Single Document Permission Revoke Requested";
1024
+ readonly reason: {
1025
+ readonly type: {
1026
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1027
+ };
1028
+ };
1029
+ readonly type: {
1030
+ readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
1031
+ };
1032
+ };
1033
+ readonly '567voUMtKJQoqru6ZVPYb4EGwdeV99rUSAqsnod7gqfd': {
1034
+ readonly description: "Emitted on initialise when local shape checks fail.";
1035
+ readonly issues: {
1036
+ readonly itemType: {
1037
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1038
+ };
1039
+ readonly type: {
1040
+ readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
1041
+ };
1042
+ };
1043
+ readonly name: "Single Document Permission Invalid";
1044
+ readonly type: {
1045
+ readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
1046
+ };
1047
+ };
1048
+ readonly '5cg55kgH8ckRVji4oWSBBxthJQFYmB5Lb1Pea7achyNr': {
1049
+ readonly agentStoreDescription: {
1050
+ readonly description: "Human-readable description for stores/directories";
1051
+ readonly type: {
1052
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1053
+ };
1054
+ };
1055
+ readonly automationTemplate: {
793
1056
  readonly description: "Optional automation template to start post-creation";
794
1057
  readonly type: {
795
1058
  readonly blueId: "8eyv5ogjHbTqUeaJKWHMenLs3MaCnpGSQkbPrCqvk2Ga";
@@ -972,6 +1235,24 @@ export declare const contents: {
972
1235
  readonly blueId: "7QACj919YMRvFCTELCf6jfQTp41RVhtHdE6bPazLUZQ6";
973
1236
  };
974
1237
  };
1238
+ readonly '5sLtygzt8kxjzDwJLjVcSZj5GCXFyUXKuXxF8UFjfmm7': {
1239
+ readonly description: "Emitted either by revoke operation on the grant document or by grantee-document self-revoke flow when grantDocumentId is provided.";
1240
+ readonly grantDocumentId: {
1241
+ readonly description: "Optional. If present, MyOS Admin must revoke the referenced permission grant after validating that the requesting document matches the grant granteeDocumentId. If absent, revoke applies to the grant document that emitted the event.";
1242
+ readonly type: {
1243
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1244
+ };
1245
+ };
1246
+ readonly name: "Worker Agency Permission Revoke Requested";
1247
+ readonly reason: {
1248
+ readonly type: {
1249
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1250
+ };
1251
+ };
1252
+ readonly type: {
1253
+ readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
1254
+ };
1255
+ };
975
1256
  readonly '5zNb9H63xeG2RjZ1gzJwyGxvTVzWdyNBb2Te6g8UXd72': {
976
1257
  readonly allowedWorkerAgencyPermissions: {
977
1258
  readonly itemType: {
@@ -1013,143 +1294,58 @@ export declare const contents: {
1013
1294
  readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1014
1295
  };
1015
1296
  };
1016
- readonly '6fEj6jD4eEVJwjH9Z2aQ9HsqdaCzbppfsYL2mFLx32YP': {
1017
- readonly contracts: {
1018
- readonly granterChannel: {
1019
- readonly description: "Granter/owner’s timeline (actor allowed to request revoke)";
1020
- readonly type: {
1021
- readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
1022
- };
1023
- };
1024
- readonly initLifecycleChannel: {
1025
- readonly event: {
1026
- readonly type: {
1027
- readonly blueId: "BrpmpNt5JkapeUvPqYcxgXZrHNZX3R757dRwuXXdfNM2";
1028
- };
1029
- };
1030
- readonly type: {
1031
- readonly blueId: "H2aCCTUcLMTJozWkn7HPUjyFBFxamraw1q8DyWk87zxr";
1032
- };
1033
- };
1034
- readonly revoke: {
1035
- readonly channel: {
1036
- readonly type: {
1037
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1038
- };
1039
- readonly value: "granterChannel";
1040
- };
1041
- readonly description: "Granter requests revocation (handled by MyOS Admin)";
1042
- readonly request: {
1043
- readonly description: "Optional human-readable reason";
1044
- readonly type: {
1045
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1046
- };
1047
- };
1048
- readonly type: {
1049
- readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
1050
- };
1051
- };
1052
- readonly revokeImplGranter: {
1053
- readonly operation: {
1054
- readonly type: {
1055
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1056
- };
1057
- readonly value: "revoke";
1058
- };
1059
- readonly steps: {
1060
- readonly items: readonly [{
1061
- readonly code: {
1062
- readonly type: {
1063
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1064
- };
1065
- readonly value: "return {\n events: [\n {\n type: \"MyOS/Single Document Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
1066
- };
1067
- readonly name: "EmitRevokeRequested";
1068
- readonly type: {
1069
- readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1070
- };
1071
- }];
1072
- };
1073
- readonly type: {
1074
- readonly blueId: "CGdxkNjPcsdescqLPz6SNLsMyak6demQQr7RoKNHbCyv";
1075
- };
1076
- };
1077
- readonly validateOnInit: {
1078
- readonly channel: {
1079
- readonly type: {
1080
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1081
- };
1082
- readonly value: "initLifecycleChannel";
1083
- };
1084
- readonly steps: {
1085
- readonly items: readonly [{
1086
- readonly code: {
1087
- readonly type: {
1088
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1089
- };
1090
- readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\n// Permissions\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
1091
- };
1092
- readonly name: "ValidateBasicShape";
1093
- readonly type: {
1094
- readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1095
- };
1096
- }];
1097
- };
1098
- readonly type: {
1099
- readonly blueId: "7X3LkN54Yp88JgZbppPhP6hM3Jqiqv8Z2i4kS7phXtQe";
1100
- };
1101
- };
1102
- };
1103
- readonly granteeDocumentId: {
1104
- readonly description: "Required original document id (blueId) that will act as the grantee principal ('document')";
1297
+ readonly '6kUamSN8Yq4L46PRaKRVc2BnG6xN7HCpmyG2STW3hecZ': {
1298
+ readonly description: "All initial rights from this LDPG have been persisted.";
1299
+ readonly grantDocumentId: {
1300
+ readonly description: "Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.";
1105
1301
  readonly type: {
1106
1302
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1107
1303
  };
1108
1304
  };
1109
- readonly granterDocumentSessionId: {
1110
- readonly description: "Optional. If set, MyOS should evaluate authority using this document session as the principal (instead of granter accountId).";
1305
+ readonly links: {
1111
1306
  readonly type: {
1112
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1307
+ readonly blueId: "75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5";
1113
1308
  };
1114
1309
  };
1115
- readonly name: "Single Document Permission Grant To Document";
1116
- readonly permissions: {
1117
- readonly description: "Rights to grant on the target session (READ required; allOps and singleOps are mutually exclusive; singleOps is optional but must be non-empty if provided).";
1310
+ readonly name: "Linked Documents Permission Granted";
1311
+ readonly targetSessionId: {
1118
1312
  readonly type: {
1119
- readonly blueId: "DRDQcve5AjwBK9z6Njfa4MNERko7Uf4ucvARFdC6sL54";
1313
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1120
1314
  };
1121
1315
  };
1122
- readonly skipValidation: {
1123
- readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)";
1316
+ readonly type: {
1317
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1318
+ };
1319
+ };
1320
+ readonly '6tzp2YX1rei3aAXg22SqYbeiiteGthj1LesTNCWm7wbU': {
1321
+ readonly name: "MyOS Participants Orchestration";
1322
+ };
1323
+ readonly '75TkZZcfwGMnD8ReqQg1KhBkdEV9U637TS5bGSv9n2Xn': {
1324
+ readonly allowedWorkerAgencyPermissions: {
1325
+ readonly itemType: {
1326
+ readonly blueId: "5J3RXNnALK1ZYAQBrjGwCQ4WpL3YUGHvz9WcGos6mMSp";
1327
+ };
1124
1328
  readonly type: {
1125
- readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
1329
+ readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
1126
1330
  };
1127
1331
  };
1128
- readonly targetSessionId: {
1129
- readonly description: "Target document session id to grant access to";
1332
+ readonly description: "DB rows written; rights are effective.";
1333
+ readonly grantDocumentId: {
1334
+ readonly description: "Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.";
1130
1335
  readonly type: {
1131
1336
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1132
1337
  };
1133
1338
  };
1134
- readonly type: {
1135
- readonly blueId: "Bu4YETSKYW8hHMwVy6zUUoBAGZPxX3KVXfKN9uoCUoJj";
1136
- };
1137
- };
1138
- readonly '6fTSbBwfj3zkin6EjGevF16QzokKa1xNXrDjdQwbDir7': {
1139
- readonly description: "Emitted by revoke operation";
1140
- readonly name: "Linked Documents Permission Revoke Requested";
1141
- readonly reason: {
1339
+ readonly granteeDocumentId: {
1142
1340
  readonly type: {
1143
1341
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1144
1342
  };
1145
1343
  };
1344
+ readonly name: "Worker Agency Permission Granted";
1146
1345
  readonly type: {
1147
- readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
1346
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1148
1347
  };
1149
1348
  };
1150
- readonly '6tzp2YX1rei3aAXg22SqYbeiiteGthj1LesTNCWm7wbU': {
1151
- readonly name: "MyOS Participants Orchestration";
1152
- };
1153
1349
  readonly '75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5': {
1154
1350
  readonly description: "Map from anchor name to permissions that will be granted for documents linked to the base document via that anchor.";
1155
1351
  readonly keyType: {
@@ -1190,26 +1386,6 @@ export declare const contents: {
1190
1386
  readonly description: "Template payload that can be included in a MyOS package to optionally start an automation after the Agent session is created.\n";
1191
1387
  readonly name: "Anchor Automation Template";
1192
1388
  };
1193
- readonly '8GNc7HmPKXmURG12ZBY8iXYEP7CTfBLsfXvpLcQ6EMwS': {
1194
- readonly allowedWorkerAgencyPermissions: {
1195
- readonly itemType: {
1196
- readonly blueId: "5J3RXNnALK1ZYAQBrjGwCQ4WpL3YUGHvz9WcGos6mMSp";
1197
- };
1198
- readonly type: {
1199
- readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
1200
- };
1201
- };
1202
- readonly description: "DB rows written; rights are effective.";
1203
- readonly granteeDocumentId: {
1204
- readonly type: {
1205
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1206
- };
1207
- };
1208
- readonly name: "Worker Agency Permission Granted";
1209
- readonly type: {
1210
- readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1211
- };
1212
- };
1213
1389
  readonly '8jCUCDoX7LUd5UaktCD7i4xxEheCWFQDkTbbNTEdYVZ9': {
1214
1390
  readonly description: "A reference to a specific, live document processing session on the MyOS platform.";
1215
1391
  readonly documentId: {
@@ -1259,23 +1435,6 @@ export declare const contents: {
1259
1435
  readonly description: "Marker type for a specialized Blue document that MyOS treats as an Agent, enabling richer UI and behaviors while remaining a standard Blue document.";
1260
1436
  readonly name: "Agent";
1261
1437
  };
1262
- readonly '8XYzJ3BrgB5uoAWU5HvZ7Gej9RXNG5r52ccneLZxMAQd': {
1263
- readonly description: "DB rows written; rights are effective.";
1264
- readonly name: "Single Document Permission Granted";
1265
- readonly permissions: {
1266
- readonly type: {
1267
- readonly blueId: "DRDQcve5AjwBK9z6Njfa4MNERko7Uf4ucvARFdC6sL54";
1268
- };
1269
- };
1270
- readonly targetSessionId: {
1271
- readonly type: {
1272
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1273
- };
1274
- };
1275
- readonly type: {
1276
- readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1277
- };
1278
- };
1279
1438
  readonly '98JmkF189jZpQRyzaiQxLbc2rRUqnRy2o6bH2qCRaBg3': {
1280
1439
  readonly channelName: {
1281
1440
  readonly description: "The abstract channel name for the new participant.";
@@ -1359,388 +1518,33 @@ export declare const contents: {
1359
1518
  readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1360
1519
  };
1361
1520
  };
1362
- readonly A2dveyQFp6dYJgigdRuZW3dsbdeiG2HzHnjaobAHJCvY: {
1363
- readonly contracts: {
1364
- readonly granterChannel: {
1365
- readonly description: "Granter/owner’s timeline (actor allowed to request revoke)";
1366
- readonly type: {
1367
- readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
1368
- };
1521
+ readonly AG6fiGy88gX5eKoUcHS2BV17EfMssiYZj99kx9RcpKEX: {
1522
+ readonly description: "Emitted on initialise when local shape checks pass.";
1523
+ readonly name: "Single Document Permission Validated";
1524
+ readonly type: {
1525
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1526
+ };
1527
+ };
1528
+ readonly AMNPp7uGYBgygbnmMS649m6Gf5bNULaEK8aSQ3b4xdrf: {
1529
+ readonly description: "Rights granted by this WAG have been retracted.";
1530
+ readonly name: "Worker Agency Permission Revoked";
1531
+ readonly type: {
1532
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1533
+ };
1534
+ };
1535
+ readonly BaNmvStTGdsBsSHiHbqdhrrC7vfwiQdDK6NYiyRbJowx: {
1536
+ readonly description: "MyOS Admin could not invoke the requested operation.";
1537
+ readonly name: "Call Operation Failed";
1538
+ readonly operation: {
1539
+ readonly description: "Operation name that was attempted.";
1540
+ readonly type: {
1541
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1369
1542
  };
1370
- readonly initLifecycleChannel: {
1371
- readonly event: {
1372
- readonly type: {
1373
- readonly blueId: "BrpmpNt5JkapeUvPqYcxgXZrHNZX3R757dRwuXXdfNM2";
1374
- };
1375
- };
1376
- readonly type: {
1377
- readonly blueId: "H2aCCTUcLMTJozWkn7HPUjyFBFxamraw1q8DyWk87zxr";
1378
- };
1379
- };
1380
- readonly revoke: {
1381
- readonly channel: {
1382
- readonly type: {
1383
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1384
- };
1385
- readonly value: "granterChannel";
1386
- };
1387
- readonly description: "Granter indicates the grant should be revoked (MyOS Admin will handle)";
1388
- readonly request: {
1389
- readonly description: "Optional human-readable reason";
1390
- readonly type: {
1391
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1392
- };
1393
- };
1394
- readonly type: {
1395
- readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
1396
- };
1397
- };
1398
- readonly revokeImplGranter: {
1399
- readonly operation: {
1400
- readonly type: {
1401
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1402
- };
1403
- readonly value: "revoke";
1404
- };
1405
- readonly steps: {
1406
- readonly items: readonly [{
1407
- readonly code: {
1408
- readonly type: {
1409
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1410
- };
1411
- readonly value: "return {\n events: [\n {\n type: \"MyOS/Linked Documents Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
1412
- };
1413
- readonly name: "EmitRevokeRequested";
1414
- readonly type: {
1415
- readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1416
- };
1417
- }];
1418
- };
1419
- readonly type: {
1420
- readonly blueId: "CGdxkNjPcsdescqLPz6SNLsMyak6demQQr7RoKNHbCyv";
1421
- };
1422
- };
1423
- readonly validateOnInit: {
1424
- readonly channel: {
1425
- readonly type: {
1426
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1427
- };
1428
- readonly value: "initLifecycleChannel";
1429
- };
1430
- readonly steps: {
1431
- readonly items: readonly [{
1432
- readonly code: {
1433
- readonly type: {
1434
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1435
- };
1436
- readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string\");\n\n// Required: links\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n";
1437
- };
1438
- readonly name: "ValidateBasicShape";
1439
- readonly type: {
1440
- readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1441
- };
1442
- }];
1443
- };
1444
- readonly type: {
1445
- readonly blueId: "7X3LkN54Yp88JgZbppPhP6hM3Jqiqv8Z2i4kS7phXtQe";
1446
- };
1447
- };
1448
- };
1449
- readonly granteeDocumentId: {
1450
- readonly description: "Required original document id (blueId) that will act as the 'document' principal.";
1451
- readonly type: {
1452
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1453
- };
1454
- };
1455
- readonly granterDocumentSessionId: {
1456
- readonly description: "Optional. If set, MyOS should evaluate authority as this document session\n(principalType='document', granteeId=documentId of this session),\ninstead of the granter accountId.\n";
1457
- readonly type: {
1458
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1459
- };
1460
- };
1461
- readonly links: {
1462
- readonly description: "Map from anchor name to permissions that will be granted for documents linked to the base document via that anchor.";
1463
- readonly type: {
1464
- readonly blueId: "75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5";
1465
- };
1466
- };
1467
- readonly name: "Linked Documents Permission Grant To Document";
1468
- readonly skipValidation: {
1469
- readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant)";
1470
- readonly type: {
1471
- readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
1472
- };
1473
- };
1474
- readonly targetSessionId: {
1475
- readonly description: "Base document session id whose anchors define the scope of this grant.";
1476
- readonly type: {
1477
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1478
- };
1479
- };
1480
- readonly type: {
1481
- readonly blueId: "Bu4YETSKYW8hHMwVy6zUUoBAGZPxX3KVXfKN9uoCUoJj";
1482
- };
1483
- };
1484
- readonly A73AVDR9GWAshFUC2Me2qXNns2HECzbadtsgp5zxCjGx: {
1485
- readonly allowedWorkerAgencyPermissions: {
1486
- readonly itemType: {
1487
- readonly blueId: "5J3RXNnALK1ZYAQBrjGwCQ4WpL3YUGHvz9WcGos6mMSp";
1488
- };
1489
- readonly type: {
1490
- readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
1491
- };
1492
- };
1493
- readonly contracts: {
1494
- readonly granterChannel: {
1495
- readonly description: "Granter/owner’s timeline (actor allowed to request revoke)";
1496
- readonly type: {
1497
- readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
1498
- };
1499
- };
1500
- readonly initLifecycleChannel: {
1501
- readonly event: {
1502
- readonly type: {
1503
- readonly blueId: "BrpmpNt5JkapeUvPqYcxgXZrHNZX3R757dRwuXXdfNM2";
1504
- };
1505
- };
1506
- readonly type: {
1507
- readonly blueId: "H2aCCTUcLMTJozWkn7HPUjyFBFxamraw1q8DyWk87zxr";
1508
- };
1509
- };
1510
- readonly revoke: {
1511
- readonly channel: {
1512
- readonly type: {
1513
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1514
- };
1515
- readonly value: "granterChannel";
1516
- };
1517
- readonly description: "Granter requests revocation (handled by MyOS Admin)";
1518
- readonly request: {
1519
- readonly description: "Optional human-readable reason";
1520
- readonly type: {
1521
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1522
- };
1523
- };
1524
- readonly type: {
1525
- readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
1526
- };
1527
- };
1528
- readonly revokeImplGranter: {
1529
- readonly operation: {
1530
- readonly type: {
1531
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1532
- };
1533
- readonly value: "revoke";
1534
- };
1535
- readonly steps: {
1536
- readonly items: readonly [{
1537
- readonly code: {
1538
- readonly type: {
1539
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1540
- };
1541
- readonly value: "return {\n events: [\n {\n type: \"MyOS/Worker Agency Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
1542
- };
1543
- readonly name: "EmitRevokeRequested";
1544
- readonly type: {
1545
- readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1546
- };
1547
- }];
1548
- };
1549
- readonly type: {
1550
- readonly blueId: "CGdxkNjPcsdescqLPz6SNLsMyak6demQQr7RoKNHbCyv";
1551
- };
1552
- };
1553
- readonly validateOnInit: {
1554
- readonly channel: {
1555
- readonly type: {
1556
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1557
- };
1558
- readonly value: "initLifecycleChannel";
1559
- };
1560
- readonly steps: {
1561
- readonly items: readonly [{
1562
- readonly code: {
1563
- readonly type: {
1564
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1565
- };
1566
- readonly value: "const issues = [];\n\nconst unwrapText = value => {\n if (typeof value === 'string') {\n const trimmed = value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'string') {\n const trimmed = value.value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.workerType === 'string') {\n const trimmed = value.workerType.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.name === 'string') {\n const trimmed = value.name.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n }\n return undefined;\n};\n\nconst unwrapBoolean = value => {\n if (typeof value === 'boolean') {\n return value;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return value.value;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return value.value.value;\n }\n }\n return undefined;\n};\n\nconst hasBooleanValue = value => {\n if (typeof value === 'boolean') {\n return true;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return true;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return true;\n }\n }\n return false;\n};\n\nconst unwrapArray = value => {\n if (Array.isArray(value)) {\n return value;\n }\n if (value && typeof value === 'object' && Array.isArray(value.items)) {\n return value.items;\n }\n return [];\n};\n\nconst unwrapRecord = value => {\n if (value && typeof value === 'object' && !Array.isArray(value)) {\n if (value.value && typeof value.value === 'object') {\n return value.value;\n }\n return value;\n }\n return {};\n};\n\n// --- granter binding (owner account) ---\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) {\n issues.push(\"granterChannel must be bound to an accountId\");\n}\n// --- grantee (parent worker) session id ---\nconst granteeDocumentId = document('/granteeDocumentId');\nif (\n typeof granteeDocumentId !== 'string' ||\n granteeDocumentId.trim().length === 0\n) {\n issues.push(\"granteeDocumentId must be a non-empty string\");\n}\n// --- allowedWorkerAgencyPermissions : list of { workerType, permissions } ---\nconst list = document('/allowedWorkerAgencyPermissions');\nif (!Array.isArray(list) || list.length === 0) {\n issues.push(\"allowedWorkerAgencyPermissions must be a non-empty array\");\n} else {\n // helper: validate Single Document Permission Set\n const validateSDPS = (p, path) => {\n const record = unwrapRecord(p);\n if (Object.keys(record).length === 0) {\n issues.push(`${path} must be an object`);\n return;\n }\n // read must be true to allow any access at all\n const read = unwrapBoolean(record.read);\n if (read !== true) {\n issues.push(`${path}.read must be true`);\n }\n const share = record.share;\n const shareValue = unwrapBoolean(share);\n if (hasBooleanValue(share) && typeof shareValue !== 'boolean') {\n issues.push(`${path}.share must be boolean if provided`);\n }\n const allOps = record.allOps;\n const allOpsValue = unwrapBoolean(allOps);\n if (hasBooleanValue(allOps) && typeof allOpsValue !== 'boolean') {\n issues.push(`${path}.allOps must be boolean if provided`);\n }\n const singleOpsRaw = unwrapArray(record.singleOps)\n .map(entry => unwrapText(entry))\n .filter(Boolean);\n const hasSingle = singleOpsRaw.length > 0;\n if (hasSingle) {\n const bad = singleOpsRaw.length !== unwrapArray(record.singleOps).length;\n if (bad) issues.push(`${path}.singleOps must contain only non-empty strings`);\n }\n if (allOpsValue === true && hasSingle) {\n issues.push(`${path}.allOps=true and ${path}.singleOps are mutually exclusive`);\n }\n // Note: it is valid to have read=true with neither allOps nor singleOps (read-only template)\n };\n const seenTypes = new Set();\n list.forEach((item, idx) => {\n const itemPath = `/allowedWorkerAgencyPermissions[${idx}]`;\n // shape\n if (typeof item !== 'object' || item === null) {\n issues.push(`${itemPath} must be an object`);\n return;\n }\n // workerType\n const workerType = unwrapText(item.workerType);\n if (!workerType) {\n issues.push(`${itemPath}.workerType must be a non-empty string`);\n } else {\n if (seenTypes.has(workerType)) {\n issues.push(`duplicate workerType '${workerType}' in allowedWorkerAgencyPermissions`);\n } else {\n seenTypes.add(workerType);\n }\n }\n // permissions (Single Document Permission Set)\n const perms = item.permissions;\n if (typeof perms === 'undefined') {\n issues.push(`${itemPath}.permissions is required`);\n } else {\n validateSDPS(perms, `${itemPath}.permissions`);\n }\n });\n}\nif (issues.length > 0) {\n return { events: [ { type: \"MyOS/Worker Agency Permission Invalid\", issues } ] };\n} else {\n return { events: [ { type: \"MyOS/Worker Agency Permission Validated\" } ] };\n}\n";
1567
- };
1568
- readonly name: "ValidateBasicShape";
1569
- readonly type: {
1570
- readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1571
- };
1572
- }];
1573
- };
1574
- readonly type: {
1575
- readonly blueId: "7X3LkN54Yp88JgZbppPhP6hM3Jqiqv8Z2i4kS7phXtQe";
1576
- };
1577
- };
1578
- };
1579
- readonly granteeDocumentId: {
1580
- readonly type: {
1581
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1582
- };
1583
- };
1584
- readonly name: "Worker Agency Permission Grant";
1585
- readonly type: {
1586
- readonly blueId: "Bu4YETSKYW8hHMwVy6zUUoBAGZPxX3KVXfKN9uoCUoJj";
1587
- };
1588
- };
1589
- readonly ABJ7njZbfTXNP173SCoMytQtVfMXCEwPdFhSJ7F3Vbx9: {
1590
- readonly description: "Emitted by revoke operation";
1591
- readonly name: "Worker Agency Permission Revoke Requested";
1592
- readonly reason: {
1593
- readonly type: {
1594
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1595
- };
1596
- };
1597
- readonly type: {
1598
- readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
1599
- };
1600
- };
1601
- readonly AFX9ct4gYywCbqPUJWaTz4JXS74RxxNPUMNzBMzNGD8c: {
1602
- readonly contracts: {
1603
- readonly granteeChannel: {
1604
- readonly description: "Grantee’s timeline (recipient of the rights)";
1605
- readonly type: {
1606
- readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
1607
- };
1608
- };
1609
- readonly granterChannel: {
1610
- readonly description: "Granter/owner’s timeline (actor allowed to request revoke)";
1611
- readonly type: {
1612
- readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
1613
- };
1614
- };
1615
- readonly initLifecycleChannel: {
1616
- readonly event: {
1617
- readonly type: {
1618
- readonly blueId: "BrpmpNt5JkapeUvPqYcxgXZrHNZX3R757dRwuXXdfNM2";
1619
- };
1620
- };
1621
- readonly type: {
1622
- readonly blueId: "H2aCCTUcLMTJozWkn7HPUjyFBFxamraw1q8DyWk87zxr";
1623
- };
1624
- };
1625
- readonly revoke: {
1626
- readonly channel: {
1627
- readonly type: {
1628
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1629
- };
1630
- readonly value: "granterChannel";
1631
- };
1632
- readonly description: "Granter or grantee indicates the grant should be revoked (MyOS Admin will handle)";
1633
- readonly request: {
1634
- readonly description: "Optional human-readable reason";
1635
- readonly type: {
1636
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1637
- };
1638
- };
1639
- readonly type: {
1640
- readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
1641
- };
1642
- };
1643
- readonly revokeImplGranter: {
1644
- readonly operation: {
1645
- readonly type: {
1646
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1647
- };
1648
- readonly value: "revoke";
1649
- };
1650
- readonly steps: {
1651
- readonly items: readonly [{
1652
- readonly code: {
1653
- readonly type: {
1654
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1655
- };
1656
- readonly value: "return {\n events: [\n {\n type: \"MyOS/Linked Documents Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
1657
- };
1658
- readonly name: "EmitRevokeRequested";
1659
- readonly type: {
1660
- readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1661
- };
1662
- }];
1663
- };
1664
- readonly type: {
1665
- readonly blueId: "CGdxkNjPcsdescqLPz6SNLsMyak6demQQr7RoKNHbCyv";
1666
- };
1667
- };
1668
- readonly validateOnInit: {
1669
- readonly channel: {
1670
- readonly type: {
1671
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1672
- };
1673
- readonly value: "initLifecycleChannel";
1674
- };
1675
- readonly steps: {
1676
- readonly items: readonly [{
1677
- readonly code: {
1678
- readonly type: {
1679
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1680
- };
1681
- readonly value: "const issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound identities\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\n// Required: links\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n";
1682
- };
1683
- readonly name: "ValidateBasicShape";
1684
- readonly type: {
1685
- readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1686
- };
1687
- }];
1688
- };
1689
- readonly type: {
1690
- readonly blueId: "7X3LkN54Yp88JgZbppPhP6hM3Jqiqv8Z2i4kS7phXtQe";
1691
- };
1692
- };
1693
- };
1694
- readonly granterDocumentSessionId: {
1695
- readonly description: "Optional. If set, MyOS should evaluate authority as this document session\n(principalType='document', granteeId=documentId of this session),\ninstead of the granter accountId.\n";
1696
- readonly type: {
1697
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1698
- };
1699
- };
1700
- readonly links: {
1701
- readonly description: "Map from anchor name to permissions that will be granted for documents linked to the base document via that anchor.";
1702
- readonly type: {
1703
- readonly blueId: "75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5";
1704
- };
1705
- };
1706
- readonly name: "Linked Documents Permission Grant To Account";
1707
- readonly targetSessionId: {
1708
- readonly description: "Base document session id whose anchors define the scope of this grant.";
1709
- readonly type: {
1710
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1711
- };
1712
- };
1713
- readonly type: {
1714
- readonly blueId: "Bu4YETSKYW8hHMwVy6zUUoBAGZPxX3KVXfKN9uoCUoJj";
1715
- };
1716
- };
1717
- readonly AG6fiGy88gX5eKoUcHS2BV17EfMssiYZj99kx9RcpKEX: {
1718
- readonly description: "Emitted on initialise when local shape checks pass.";
1719
- readonly name: "Single Document Permission Validated";
1720
- readonly type: {
1721
- readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1722
- };
1723
- };
1724
- readonly AMNPp7uGYBgygbnmMS649m6Gf5bNULaEK8aSQ3b4xdrf: {
1725
- readonly description: "Rights granted by this WAG have been retracted.";
1726
- readonly name: "Worker Agency Permission Revoked";
1727
- readonly type: {
1728
- readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1729
- };
1730
- };
1731
- readonly BaNmvStTGdsBsSHiHbqdhrrC7vfwiQdDK6NYiyRbJowx: {
1732
- readonly description: "MyOS Admin could not invoke the requested operation.";
1733
- readonly name: "Call Operation Failed";
1734
- readonly operation: {
1735
- readonly description: "Operation name that was attempted.";
1736
- readonly type: {
1737
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1738
- };
1739
- };
1740
- readonly reason: {
1741
- readonly description: "Failure reason code (permission_denied, execution_error, invalid_request, target_not_found).";
1742
- readonly type: {
1743
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1543
+ };
1544
+ readonly reason: {
1545
+ readonly description: "Failure reason code (permission_denied, execution_error, invalid_request, target_not_found).";
1546
+ readonly type: {
1547
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1744
1548
  };
1745
1549
  };
1746
1550
  readonly targetSessionId: {
@@ -1766,23 +1570,6 @@ export declare const contents: {
1766
1570
  readonly blueId: "D2ERUvbpn6R6PR7hjFsGofwQsu9bkRfc6wbSYHcfJtMD";
1767
1571
  };
1768
1572
  };
1769
- readonly BM9qSFkhY9CV4BwHFP6DrrB9VbFZhTfwxCeS8Kh96o5N: {
1770
- readonly description: "All initial rights from this LDPG have been persisted.";
1771
- readonly links: {
1772
- readonly type: {
1773
- readonly blueId: "75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5";
1774
- };
1775
- };
1776
- readonly name: "Linked Documents Permission Granted";
1777
- readonly targetSessionId: {
1778
- readonly type: {
1779
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1780
- };
1781
- };
1782
- readonly type: {
1783
- readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1784
- };
1785
- };
1786
1573
  readonly BnrAcFrEHzoARE2yqKmRv7jrPWCbJsVBqSoXwWCaTtrk: {
1787
1574
  readonly description: "Document asks MyOS Admin to mediate a subscription to a target session it can READ.";
1788
1575
  readonly name: "Subscribe to Session Requested";
@@ -1876,6 +1663,29 @@ export declare const contents: {
1876
1663
  readonly description: "Document base for MyOS Admin participant";
1877
1664
  readonly name: "MyOS Admin Base";
1878
1665
  };
1666
+ readonly BZPjcZmkuJpVFDYAZMexdG68KKFhgabnieBdG6DpHexR: {
1667
+ readonly description: "DB rows written; rights are effective.";
1668
+ readonly grantDocumentId: {
1669
+ readonly description: "Optional. Stable handle of the created permission grant document. Required in request/response document-grant flows that later support self-revoke from the grantee document.";
1670
+ readonly type: {
1671
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1672
+ };
1673
+ };
1674
+ readonly name: "Single Document Permission Granted";
1675
+ readonly permissions: {
1676
+ readonly type: {
1677
+ readonly blueId: "DRDQcve5AjwBK9z6Njfa4MNERko7Uf4ucvARFdC6sL54";
1678
+ };
1679
+ };
1680
+ readonly targetSessionId: {
1681
+ readonly type: {
1682
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1683
+ };
1684
+ };
1685
+ readonly type: {
1686
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1687
+ };
1688
+ };
1879
1689
  readonly CeWyRmXAMZqvWBvby2KbRUZWcS7Pdxs42vnMXgn9gg6H: {
1880
1690
  readonly name: "MyOS Session Interaction";
1881
1691
  };
@@ -2025,68 +1835,178 @@ export declare const contents: {
2025
1835
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2026
1836
  };
2027
1837
  };
2028
- readonly targetSessionId: {
2029
- readonly description: "Target document session that received the request.";
1838
+ readonly targetSessionId: {
1839
+ readonly description: "Target document session that received the request.";
1840
+ readonly type: {
1841
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1842
+ };
1843
+ };
1844
+ readonly type: {
1845
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1846
+ };
1847
+ };
1848
+ readonly DFMcBSRfNqK6NqdNLCF8b88soezajjq4gyBS8QRzSBhe: {
1849
+ readonly description: "Emitted when the LDPG passes local validation.";
1850
+ readonly name: "Linked Documents Permission Validated";
1851
+ readonly type: {
1852
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
1853
+ };
1854
+ };
1855
+ readonly DL73vQGQGdEFA53shnv58CkVJVVs5P5Hygc5qNghY5Zf: {
1856
+ readonly description: "Marker type for a specialized Blue document that MyOS treats as an Agent, enabling richer UI and behaviors while remaining a standard Blue document.";
1857
+ readonly name: "LLM Agent";
1858
+ readonly type: {
1859
+ readonly blueId: "8s2rAFDtiB6sCwqeURkT4Lq7fcc2FXBkmX9B9p7R4Boc";
1860
+ };
1861
+ };
1862
+ readonly DRDQcve5AjwBK9z6Njfa4MNERko7Uf4ucvARFdC6sL54: {
1863
+ readonly allOps: {
1864
+ readonly type: {
1865
+ readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
1866
+ };
1867
+ };
1868
+ readonly description: "Permissions that become effective for a single target session.";
1869
+ readonly name: "Single Document Permission Set";
1870
+ readonly read: {
1871
+ readonly type: {
1872
+ readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
1873
+ };
1874
+ readonly value: true;
1875
+ };
1876
+ readonly share: {
1877
+ readonly type: {
1878
+ readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
1879
+ };
1880
+ };
1881
+ readonly singleOps: {
1882
+ readonly itemType: {
1883
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1884
+ };
1885
+ readonly type: {
1886
+ readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
1887
+ };
1888
+ };
1889
+ };
1890
+ readonly DVuSpdSQzjj36rN9Eemu7oReooPe1YaqARx7aanQDppy: {
1891
+ readonly contracts: {
1892
+ readonly granterChannel: {
1893
+ readonly description: "Granter/owner’s timeline (direct grant-document revoke lives here).";
1894
+ readonly type: {
1895
+ readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
1896
+ };
1897
+ };
1898
+ readonly initLifecycleChannel: {
1899
+ readonly event: {
1900
+ readonly type: {
1901
+ readonly blueId: "BrpmpNt5JkapeUvPqYcxgXZrHNZX3R757dRwuXXdfNM2";
1902
+ };
1903
+ };
1904
+ readonly type: {
1905
+ readonly blueId: "H2aCCTUcLMTJozWkn7HPUjyFBFxamraw1q8DyWk87zxr";
1906
+ };
1907
+ };
1908
+ readonly revoke: {
1909
+ readonly channel: {
1910
+ readonly type: {
1911
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1912
+ };
1913
+ readonly value: "granterChannel";
1914
+ };
1915
+ readonly description: "Granter requests revocation on the grant document. Grantee-document self-revoke uses the existing revoke-request event with grantDocumentId emitted from the grantee document itself.";
1916
+ readonly request: {
1917
+ readonly description: "Optional human-readable reason";
1918
+ readonly type: {
1919
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1920
+ };
1921
+ };
1922
+ readonly type: {
1923
+ readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
1924
+ };
1925
+ };
1926
+ readonly revokeImplGranter: {
1927
+ readonly operation: {
1928
+ readonly type: {
1929
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1930
+ };
1931
+ readonly value: "revoke";
1932
+ };
1933
+ readonly steps: {
1934
+ readonly items: readonly [{
1935
+ readonly code: {
1936
+ readonly type: {
1937
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1938
+ };
1939
+ readonly value: "return {\n events: [\n {\n type: \"MyOS/Linked Documents Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
1940
+ };
1941
+ readonly name: "EmitRevokeRequested";
1942
+ readonly type: {
1943
+ readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1944
+ };
1945
+ }];
1946
+ };
1947
+ readonly type: {
1948
+ readonly blueId: "CGdxkNjPcsdescqLPz6SNLsMyak6demQQr7RoKNHbCyv";
1949
+ };
1950
+ };
1951
+ readonly validateOnInit: {
1952
+ readonly channel: {
1953
+ readonly type: {
1954
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1955
+ };
1956
+ readonly value: "initLifecycleChannel";
1957
+ };
1958
+ readonly steps: {
1959
+ readonly items: readonly [{
1960
+ readonly code: {
1961
+ readonly type: {
1962
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
1963
+ };
1964
+ readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string\");\n\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n";
1965
+ };
1966
+ readonly name: "ValidateBasicShape";
1967
+ readonly type: {
1968
+ readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
1969
+ };
1970
+ }];
1971
+ };
1972
+ readonly type: {
1973
+ readonly blueId: "7X3LkN54Yp88JgZbppPhP6hM3Jqiqv8Z2i4kS7phXtQe";
1974
+ };
1975
+ };
1976
+ };
1977
+ readonly granteeDocumentId: {
1978
+ readonly description: "Required original document id (blueId) that will act as the 'document' principal.";
2030
1979
  readonly type: {
2031
1980
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2032
1981
  };
2033
1982
  };
2034
- readonly type: {
2035
- readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
2036
- };
2037
- };
2038
- readonly DFMcBSRfNqK6NqdNLCF8b88soezajjq4gyBS8QRzSBhe: {
2039
- readonly description: "Emitted when the LDPG passes local validation.";
2040
- readonly name: "Linked Documents Permission Validated";
2041
- readonly type: {
2042
- readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
2043
- };
2044
- };
2045
- readonly DL73vQGQGdEFA53shnv58CkVJVVs5P5Hygc5qNghY5Zf: {
2046
- readonly description: "Marker type for a specialized Blue document that MyOS treats as an Agent, enabling richer UI and behaviors while remaining a standard Blue document.";
2047
- readonly name: "LLM Agent";
2048
- readonly type: {
2049
- readonly blueId: "8s2rAFDtiB6sCwqeURkT4Lq7fcc2FXBkmX9B9p7R4Boc";
2050
- };
2051
- };
2052
- readonly DRDQcve5AjwBK9z6Njfa4MNERko7Uf4ucvARFdC6sL54: {
2053
- readonly allOps: {
1983
+ readonly granterDocumentSessionId: {
1984
+ readonly description: "Optional. If set, MyOS should evaluate authority as this document session\n(principalType='document', granteeId=documentId of this session),\ninstead of the granter accountId.\n";
2054
1985
  readonly type: {
2055
- readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
1986
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2056
1987
  };
2057
1988
  };
2058
- readonly description: "Permissions that become effective for a single target session.";
2059
- readonly name: "Single Document Permission Set";
2060
- readonly read: {
1989
+ readonly links: {
1990
+ readonly description: "Map from anchor name to permissions that will be granted for documents linked to the base document via that anchor.";
2061
1991
  readonly type: {
2062
- readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
1992
+ readonly blueId: "75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5";
2063
1993
  };
2064
- readonly value: true;
2065
1994
  };
2066
- readonly share: {
1995
+ readonly name: "Linked Documents Permission Grant To Document";
1996
+ readonly skipValidation: {
1997
+ readonly description: "If true, the validation will be skipped (MyOS Admin won't be triggered to create permission grant).";
2067
1998
  readonly type: {
2068
1999
  readonly blueId: "4EzhSubEimSQD3zrYHRtobfPPWntUuhEz8YcdxHsi12u";
2069
2000
  };
2070
2001
  };
2071
- readonly singleOps: {
2072
- readonly itemType: {
2073
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2074
- };
2075
- readonly type: {
2076
- readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
2077
- };
2078
- };
2079
- };
2080
- readonly E4R5PmrxAtCHsQtUKtwxMjXgE5qNJWuuziArDMATudfb: {
2081
- readonly description: "Emitted by revoke operation";
2082
- readonly name: "Single Document Permission Revoke Requested";
2083
- readonly reason: {
2002
+ readonly targetSessionId: {
2003
+ readonly description: "Base document session id whose anchors define the scope of this grant.";
2084
2004
  readonly type: {
2085
2005
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2086
2006
  };
2087
2007
  };
2088
2008
  readonly type: {
2089
- readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
2009
+ readonly blueId: "Bu4YETSKYW8hHMwVy6zUUoBAGZPxX3KVXfKN9uoCUoJj";
2090
2010
  };
2091
2011
  };
2092
2012
  readonly Ef7EvcR5He11JtgBFtswYTHEfUKnTHmFysMTo3ZsoQby: {
@@ -2210,16 +2130,41 @@ export declare const contents: {
2210
2130
  readonly blueId: "EzDiC9Frs8V5yQBMtDYh1DobVnWtWpFemXDX5fGUULBn";
2211
2131
  };
2212
2132
  };
2213
- readonly FZLsSeuoLTki2FpqYTr5nmqnAtKgTnmi18qNaTnRGBs6: {
2133
+ readonly G1cW5kjZdJrmCwfrwiHXQcJfYfFAY5jEFZNA7u7pFdtY: {
2134
+ readonly allowedWorkerAgencyPermissions: {
2135
+ readonly itemType: {
2136
+ readonly blueId: "5J3RXNnALK1ZYAQBrjGwCQ4WpL3YUGHvz9WcGos6mMSp";
2137
+ };
2138
+ readonly type: {
2139
+ readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
2140
+ };
2141
+ };
2142
+ readonly description: "Grant could not be applied.";
2143
+ readonly granteeDocumentId: {
2144
+ readonly type: {
2145
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2146
+ };
2147
+ };
2148
+ readonly name: "Worker Agency Permission Rejected";
2149
+ readonly reason: {
2150
+ readonly type: {
2151
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2152
+ };
2153
+ };
2154
+ readonly type: {
2155
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
2156
+ };
2157
+ };
2158
+ readonly G5K5cSdn15yLJa6NBmjLuuZzJ5YShSU14kc4vitHpeHz: {
2214
2159
  readonly contracts: {
2215
2160
  readonly granteeChannel: {
2216
- readonly description: "Grantee’s timeline (recipient of the rights)";
2161
+ readonly description: "Grantee’s timeline";
2217
2162
  readonly type: {
2218
2163
  readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
2219
2164
  };
2220
2165
  };
2221
2166
  readonly granterChannel: {
2222
- readonly description: "Granter/owner’s timeline (actor allowed to request revoke)";
2167
+ readonly description: "Granter/owner’s timeline";
2223
2168
  readonly type: {
2224
2169
  readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
2225
2170
  };
@@ -2239,9 +2184,9 @@ export declare const contents: {
2239
2184
  readonly type: {
2240
2185
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2241
2186
  };
2242
- readonly value: "granterChannel";
2187
+ readonly value: "revokeAccessChannel";
2243
2188
  };
2244
- readonly description: "Granter or grantee indicates the grant should be revoked (MyOS Admin will handle)";
2189
+ readonly description: "Granter or grantee indicates the grant should be revoked (MyOS Admin will handle).";
2245
2190
  readonly request: {
2246
2191
  readonly description: "Optional human-readable reason";
2247
2192
  readonly type: {
@@ -2252,7 +2197,26 @@ export declare const contents: {
2252
2197
  readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
2253
2198
  };
2254
2199
  };
2255
- readonly revokeImplGranter: {
2200
+ readonly revokeAccessChannel: {
2201
+ readonly channels: {
2202
+ readonly items: readonly [{
2203
+ readonly type: {
2204
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2205
+ };
2206
+ readonly value: "granterChannel";
2207
+ }, {
2208
+ readonly type: {
2209
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2210
+ };
2211
+ readonly value: "granteeChannel";
2212
+ }];
2213
+ };
2214
+ readonly description: "Either grant side can invoke revoke on this grant document.";
2215
+ readonly type: {
2216
+ readonly blueId: "HsNatiPt2YvmkWQoqtfrFCbdp75ZUBLBUkWeq84WTfnr";
2217
+ };
2218
+ };
2219
+ readonly revokeImpl: {
2256
2220
  readonly operation: {
2257
2221
  readonly type: {
2258
2222
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
@@ -2265,7 +2229,7 @@ export declare const contents: {
2265
2229
  readonly type: {
2266
2230
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2267
2231
  };
2268
- readonly value: "return {\n events: [\n {\n type: \"MyOS/Single Document Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
2232
+ readonly value: "return {\n events: [\n {\n type: \"MyOS/Linked Documents Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
2269
2233
  };
2270
2234
  readonly name: "EmitRevokeRequested";
2271
2235
  readonly type: {
@@ -2290,7 +2254,7 @@ export declare const contents: {
2290
2254
  readonly type: {
2291
2255
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2292
2256
  };
2293
- readonly value: "const issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound identities\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\n// Permissions\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
2257
+ readonly value: "const issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\nconst links = document('/links');\nif (!links || typeof links !== 'object') issues.push(\"links is missing or invalid\");\n\nconst anchors = Object.keys(links).filter(key => !['description', 'type', 'keyType', 'valueType'].includes(key));\nif (anchors.length === 0) {\n issues.push(\"links must have at least one anchor entry\");\n}\nfor (const anchor of anchors) {\n const perms = links[anchor];\n if (!perms || perms.read !== true) {\n issues.push(`links['${anchor}'].read must be true`);\n }\n const hasSingle = Array.isArray(perms.singleOps) && perms.singleOps.length > 0;\n if (hasSingle && perms.singleOps.some(x => typeof x !== \"string\" || x.trim().length === 0)) {\n issues.push(`links['${anchor}'].singleOps must contain only non-empty strings`);\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(`links['${anchor}'].allOps=true and singleOps are mutually exclusive`);\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Linked Documents Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Linked Documents Permission Validated\" } ] };\n";
2294
2258
  };
2295
2259
  readonly name: "ValidateBasicShape";
2296
2260
  readonly type: {
@@ -2304,20 +2268,20 @@ export declare const contents: {
2304
2268
  };
2305
2269
  };
2306
2270
  readonly granterDocumentSessionId: {
2307
- readonly description: "Optional. If set, MyOS should evaluate authority using this document session as the principal (instead of granter accountId).";
2271
+ readonly description: "Optional. If set, MyOS should evaluate authority as this document session\n(principalType='document', granteeId=documentId of this session),\ninstead of the granter accountId.\n";
2308
2272
  readonly type: {
2309
2273
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2310
2274
  };
2311
2275
  };
2312
- readonly name: "Single Document Permission Grant To Account";
2313
- readonly permissions: {
2314
- readonly description: "Rights to grant on the target session (READ required; allOps and singleOps are mutually exclusive; singleOps is optional but must be non-empty if provided).";
2276
+ readonly links: {
2277
+ readonly description: "Map from anchor name to permissions that will be granted for documents linked to the base document via that anchor.";
2315
2278
  readonly type: {
2316
- readonly blueId: "DRDQcve5AjwBK9z6Njfa4MNERko7Uf4ucvARFdC6sL54";
2279
+ readonly blueId: "75TXyy5E7vbexVAUZcjZ2vdQaG7fJJbAHAgrh8sMtTp5";
2317
2280
  };
2318
2281
  };
2282
+ readonly name: "Linked Documents Permission Grant To Account";
2319
2283
  readonly targetSessionId: {
2320
- readonly description: "Target document session id to grant access to";
2284
+ readonly description: "Base document session id whose anchors define the scope of this grant.";
2321
2285
  readonly type: {
2322
2286
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2323
2287
  };
@@ -2326,31 +2290,6 @@ export declare const contents: {
2326
2290
  readonly blueId: "Bu4YETSKYW8hHMwVy6zUUoBAGZPxX3KVXfKN9uoCUoJj";
2327
2291
  };
2328
2292
  };
2329
- readonly G1cW5kjZdJrmCwfrwiHXQcJfYfFAY5jEFZNA7u7pFdtY: {
2330
- readonly allowedWorkerAgencyPermissions: {
2331
- readonly itemType: {
2332
- readonly blueId: "5J3RXNnALK1ZYAQBrjGwCQ4WpL3YUGHvz9WcGos6mMSp";
2333
- };
2334
- readonly type: {
2335
- readonly blueId: "6aehfNAxHLC1PHHoDr3tYtFH3RWNbiWdFancJ1bypXEY";
2336
- };
2337
- };
2338
- readonly description: "Grant could not be applied.";
2339
- readonly granteeDocumentId: {
2340
- readonly type: {
2341
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2342
- };
2343
- };
2344
- readonly name: "Worker Agency Permission Rejected";
2345
- readonly reason: {
2346
- readonly type: {
2347
- readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2348
- };
2349
- };
2350
- readonly type: {
2351
- readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
2352
- };
2353
- };
2354
2293
  readonly GcotFgiqo3GMHp4xKrArDJi7AqciJGgYKvHodoAJwcWp: {
2355
2294
  readonly description: "Indicates MyOS Admin stopped forwarding updates for the subscription.";
2356
2295
  readonly name: "Subscription to Session Revoked";
@@ -2572,5 +2511,140 @@ export declare const contents: {
2572
2511
  readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
2573
2512
  };
2574
2513
  };
2514
+ readonly y6JF5WHZjDq9PokMtHpqKhxbY7W6RQ41PBymPx7kjLz: {
2515
+ readonly contracts: {
2516
+ readonly granteeChannel: {
2517
+ readonly description: "Grantee’s timeline";
2518
+ readonly type: {
2519
+ readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
2520
+ };
2521
+ };
2522
+ readonly granterChannel: {
2523
+ readonly description: "Granter/owner’s timeline";
2524
+ readonly type: {
2525
+ readonly blueId: "HCF8mXnX3dFjQ8osjxb4Wzm2Nm1DoXnTYuA5sPnV7NTs";
2526
+ };
2527
+ };
2528
+ readonly initLifecycleChannel: {
2529
+ readonly event: {
2530
+ readonly type: {
2531
+ readonly blueId: "BrpmpNt5JkapeUvPqYcxgXZrHNZX3R757dRwuXXdfNM2";
2532
+ };
2533
+ };
2534
+ readonly type: {
2535
+ readonly blueId: "H2aCCTUcLMTJozWkn7HPUjyFBFxamraw1q8DyWk87zxr";
2536
+ };
2537
+ };
2538
+ readonly revoke: {
2539
+ readonly channel: {
2540
+ readonly type: {
2541
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2542
+ };
2543
+ readonly value: "revokeAccessChannel";
2544
+ };
2545
+ readonly description: "Granter or grantee indicates the grant should be revoked (MyOS Admin will handle).";
2546
+ readonly request: {
2547
+ readonly description: "Optional human-readable reason";
2548
+ readonly type: {
2549
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2550
+ };
2551
+ };
2552
+ readonly type: {
2553
+ readonly blueId: "BoAiqVUZv9Fum3wFqaX2JnQMBHJLxJSo2V9U2UBmCfsC";
2554
+ };
2555
+ };
2556
+ readonly revokeAccessChannel: {
2557
+ readonly channels: {
2558
+ readonly items: readonly [{
2559
+ readonly type: {
2560
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2561
+ };
2562
+ readonly value: "granterChannel";
2563
+ }, {
2564
+ readonly type: {
2565
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2566
+ };
2567
+ readonly value: "granteeChannel";
2568
+ }];
2569
+ };
2570
+ readonly description: "Either grant side can invoke revoke on this grant document.";
2571
+ readonly type: {
2572
+ readonly blueId: "HsNatiPt2YvmkWQoqtfrFCbdp75ZUBLBUkWeq84WTfnr";
2573
+ };
2574
+ };
2575
+ readonly revokeImpl: {
2576
+ readonly operation: {
2577
+ readonly type: {
2578
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2579
+ };
2580
+ readonly value: "revoke";
2581
+ };
2582
+ readonly steps: {
2583
+ readonly items: readonly [{
2584
+ readonly code: {
2585
+ readonly type: {
2586
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2587
+ };
2588
+ readonly value: "return {\n events: [\n {\n type: \"MyOS/Single Document Permission Revoke Requested\",\n reason: event.message.request\n }\n ]\n};\n";
2589
+ };
2590
+ readonly name: "EmitRevokeRequested";
2591
+ readonly type: {
2592
+ readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
2593
+ };
2594
+ }];
2595
+ };
2596
+ readonly type: {
2597
+ readonly blueId: "CGdxkNjPcsdescqLPz6SNLsMyak6demQQr7RoKNHbCyv";
2598
+ };
2599
+ };
2600
+ readonly validateOnInit: {
2601
+ readonly channel: {
2602
+ readonly type: {
2603
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2604
+ };
2605
+ readonly value: "initLifecycleChannel";
2606
+ };
2607
+ readonly steps: {
2608
+ readonly items: readonly [{
2609
+ readonly code: {
2610
+ readonly type: {
2611
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2612
+ };
2613
+ readonly value: "const issues = [];\n\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\nconst granteeId = document('/contracts/granteeChannel/accountId');\nif (typeof granteeId !== 'string' || granteeId.length === 0) issues.push(\"granteeChannel must be bound to an accountId\");\n\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
2614
+ };
2615
+ readonly name: "ValidateBasicShape";
2616
+ readonly type: {
2617
+ readonly blueId: "ExZxT61PSpWHpEAtP2WKMXXqxEYN7Z13j7Zv36Dp99kS";
2618
+ };
2619
+ }];
2620
+ };
2621
+ readonly type: {
2622
+ readonly blueId: "7X3LkN54Yp88JgZbppPhP6hM3Jqiqv8Z2i4kS7phXtQe";
2623
+ };
2624
+ };
2625
+ };
2626
+ readonly granterDocumentSessionId: {
2627
+ readonly description: "Optional. If set, MyOS should evaluate authority using this document session as the principal (instead of granter accountId).";
2628
+ readonly type: {
2629
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2630
+ };
2631
+ };
2632
+ readonly name: "Single Document Permission Grant To Account";
2633
+ readonly permissions: {
2634
+ readonly description: "Rights to grant on the target session (READ required; allOps and singleOps are mutually exclusive; singleOps is optional but must be non-empty if provided).";
2635
+ readonly type: {
2636
+ readonly blueId: "DRDQcve5AjwBK9z6Njfa4MNERko7Uf4ucvARFdC6sL54";
2637
+ };
2638
+ };
2639
+ readonly targetSessionId: {
2640
+ readonly description: "Target document session id to grant access to";
2641
+ readonly type: {
2642
+ readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
2643
+ };
2644
+ };
2645
+ readonly type: {
2646
+ readonly blueId: "Bu4YETSKYW8hHMwVy6zUUoBAGZPxX3KVXfKN9uoCUoJj";
2647
+ };
2648
+ };
2575
2649
  };
2576
2650
  //# sourceMappingURL=index.d.ts.map