@blue-repository/types 1.0.0-rc.3 → 1.0.0-rc.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (272) hide show
  1. package/README.md +1 -1
  2. package/dist/meta.d.ts +2 -2
  3. package/dist/meta.d.ts.map +1 -1
  4. package/dist/meta.js +1 -2
  5. package/dist/meta.js.map +1 -1
  6. package/dist/packages/conversation/blue-ids.d.ts +0 -1
  7. package/dist/packages/conversation/blue-ids.d.ts.map +1 -1
  8. package/dist/packages/conversation/blue-ids.js +0 -1
  9. package/dist/packages/conversation/blue-ids.js.map +1 -1
  10. package/dist/packages/conversation/contents/index.d.ts +0 -24
  11. package/dist/packages/conversation/contents/index.d.ts.map +1 -1
  12. package/dist/packages/conversation/contents/index.js +0 -3
  13. package/dist/packages/conversation/contents/index.js.map +1 -1
  14. package/dist/packages/conversation/index.d.ts +0 -64
  15. package/dist/packages/conversation/index.d.ts.map +1 -1
  16. package/dist/packages/conversation/meta.d.ts +0 -10
  17. package/dist/packages/conversation/meta.d.ts.map +1 -1
  18. package/dist/packages/conversation/meta.js +0 -12
  19. package/dist/packages/conversation/meta.js.map +1 -1
  20. package/dist/packages/conversation/schemas/index.d.ts +0 -32
  21. package/dist/packages/conversation/schemas/index.d.ts.map +1 -1
  22. package/dist/packages/conversation/schemas/index.js +0 -3
  23. package/dist/packages/conversation/schemas/index.js.map +1 -1
  24. package/dist/packages/myos/blue-ids.d.ts +37 -38
  25. package/dist/packages/myos/blue-ids.d.ts.map +1 -1
  26. package/dist/packages/myos/blue-ids.js +37 -38
  27. package/dist/packages/myos/blue-ids.js.map +1 -1
  28. package/dist/packages/myos/contents/AddingParticipantRequested.d.ts +3 -0
  29. package/dist/packages/myos/contents/AddingParticipantRequested.d.ts.map +1 -1
  30. package/dist/packages/myos/contents/AddingParticipantRequested.js +3 -0
  31. package/dist/packages/myos/contents/AddingParticipantRequested.js.map +1 -1
  32. package/dist/packages/myos/contents/AddingParticipantResponded.d.ts +4 -1
  33. package/dist/packages/myos/contents/AddingParticipantResponded.d.ts.map +1 -1
  34. package/dist/packages/myos/contents/AddingParticipantResponded.js +4 -1
  35. package/dist/packages/myos/contents/AddingParticipantResponded.js.map +1 -1
  36. package/dist/packages/myos/contents/Agent.d.ts +0 -5
  37. package/dist/packages/myos/contents/Agent.d.ts.map +1 -1
  38. package/dist/packages/myos/contents/Agent.js +0 -5
  39. package/dist/packages/myos/contents/Agent.js.map +1 -1
  40. package/dist/packages/myos/contents/AnchorAutomationTemplate.d.ts +1 -1
  41. package/dist/packages/myos/contents/AnchorAutomationTemplate.js +1 -1
  42. package/dist/packages/myos/contents/AnchorAutomationTemplate.js.map +1 -1
  43. package/dist/packages/myos/contents/ChatGPTConnectorAgent.d.ts +4 -4
  44. package/dist/packages/myos/contents/ChatGPTConnectorAgent.js +4 -4
  45. package/dist/packages/myos/contents/DocumentSessionBootstrap.d.ts +2 -2
  46. package/dist/packages/myos/contents/DocumentSessionBootstrap.js +2 -2
  47. package/dist/packages/myos/contents/DocumentSessionBootstrap.js.map +1 -1
  48. package/dist/packages/myos/contents/InformUserToInstallMyOSPackage.d.ts +1 -1
  49. package/dist/packages/myos/contents/InformUserToInstallMyOSPackage.js +1 -1
  50. package/dist/packages/myos/contents/MyOSPackage.d.ts +2 -2
  51. package/dist/packages/myos/contents/MyOSPackage.js +2 -2
  52. package/dist/packages/myos/contents/RemovingParticipantRequested.d.ts +3 -0
  53. package/dist/packages/myos/contents/RemovingParticipantRequested.d.ts.map +1 -1
  54. package/dist/packages/myos/contents/RemovingParticipantRequested.js +3 -0
  55. package/dist/packages/myos/contents/RemovingParticipantRequested.js.map +1 -1
  56. package/dist/packages/myos/contents/RemovingParticipantResponded.d.ts +4 -1
  57. package/dist/packages/myos/contents/RemovingParticipantResponded.d.ts.map +1 -1
  58. package/dist/packages/myos/contents/RemovingParticipantResponded.js +4 -1
  59. package/dist/packages/myos/contents/RemovingParticipantResponded.js.map +1 -1
  60. package/dist/packages/myos/contents/SingleDocumentPermissionGrantRequested.d.ts +1 -1
  61. package/dist/packages/myos/contents/SingleDocumentPermissionGrantRequested.js +1 -1
  62. package/dist/packages/myos/contents/SingleDocumentPermissionGrantResponded.d.ts +1 -1
  63. package/dist/packages/myos/contents/SingleDocumentPermissionGrantResponded.js +1 -1
  64. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.d.ts +1 -1
  65. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.js +1 -1
  66. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToAccount.js.map +1 -1
  67. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.d.ts +1 -1
  68. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.js +1 -1
  69. package/dist/packages/myos/contents/SingleDocumentPermissionGrantToDocument.js.map +1 -1
  70. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.d.ts +1 -1
  71. package/dist/packages/myos/contents/SingleDocumentPermissionGranted.js +1 -1
  72. package/dist/packages/myos/contents/SingleDocumentPermissionGrantingInProgress.d.ts +1 -1
  73. package/dist/packages/myos/contents/SingleDocumentPermissionGrantingInProgress.js +1 -1
  74. package/dist/packages/myos/contents/SingleDocumentPermissionRejected.d.ts +1 -1
  75. package/dist/packages/myos/contents/SingleDocumentPermissionRejected.js +1 -1
  76. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.d.ts +1 -1
  77. package/dist/packages/myos/contents/SingleDocumentPermissionRevokeRequested.js +1 -1
  78. package/dist/packages/myos/contents/SingleDocumentPermissionRevoked.d.ts +1 -1
  79. package/dist/packages/myos/contents/SingleDocumentPermissionRevoked.js +1 -1
  80. package/dist/packages/myos/contents/SingleDocumentPermissionRevokingInProgress.d.ts +1 -1
  81. package/dist/packages/myos/contents/SingleDocumentPermissionRevokingInProgress.js +1 -1
  82. package/dist/packages/myos/contents/SingleDocumentPermissionValidated.d.ts +1 -1
  83. package/dist/packages/myos/contents/SingleDocumentPermissionValidated.js +1 -1
  84. package/dist/packages/myos/contents/StartWorkerSessionRequested.d.ts +1 -1
  85. package/dist/packages/myos/contents/StartWorkerSessionRequested.js +1 -1
  86. package/dist/packages/myos/contents/SubscribeToSessionRequested.d.ts +1 -1
  87. package/dist/packages/myos/contents/SubscribeToSessionRequested.js +1 -1
  88. package/dist/packages/myos/contents/SubscriptionToSessionFailed.d.ts +1 -1
  89. package/dist/packages/myos/contents/SubscriptionToSessionFailed.js +1 -1
  90. package/dist/packages/myos/contents/SubscriptionToSessionInitiated.d.ts +1 -1
  91. package/dist/packages/myos/contents/SubscriptionToSessionInitiated.js +1 -1
  92. package/dist/packages/myos/contents/SubscriptionToSessionRevoked.d.ts +1 -1
  93. package/dist/packages/myos/contents/SubscriptionToSessionRevoked.js +1 -1
  94. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.d.ts +1 -1
  95. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.js +1 -1
  96. package/dist/packages/myos/contents/WorkerAgencyPermissionGrant.js.map +1 -1
  97. package/dist/packages/myos/contents/WorkerAgencyPermissionGrantRequested.d.ts +1 -1
  98. package/dist/packages/myos/contents/WorkerAgencyPermissionGrantRequested.js +1 -1
  99. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.d.ts +1 -1
  100. package/dist/packages/myos/contents/WorkerAgencyPermissionGranted.js +1 -1
  101. package/dist/packages/myos/contents/WorkerAgencyPermissionGrantingInProgress.d.ts +1 -1
  102. package/dist/packages/myos/contents/WorkerAgencyPermissionGrantingInProgress.js +1 -1
  103. package/dist/packages/myos/contents/WorkerAgencyPermissionInvalid.d.ts +1 -1
  104. package/dist/packages/myos/contents/WorkerAgencyPermissionInvalid.js +1 -1
  105. package/dist/packages/myos/contents/WorkerAgencyPermissionRejected.d.ts +1 -1
  106. package/dist/packages/myos/contents/WorkerAgencyPermissionRejected.js +1 -1
  107. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.d.ts +1 -1
  108. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokeRequested.js +1 -1
  109. package/dist/packages/myos/contents/WorkerAgencyPermissionRevoked.d.ts +1 -1
  110. package/dist/packages/myos/contents/WorkerAgencyPermissionRevoked.js +1 -1
  111. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokingInProgress.d.ts +1 -1
  112. package/dist/packages/myos/contents/WorkerAgencyPermissionRevokingInProgress.js +1 -1
  113. package/dist/packages/myos/contents/WorkerAgencyPermissionValidated.d.ts +1 -1
  114. package/dist/packages/myos/contents/WorkerAgencyPermissionValidated.js +1 -1
  115. package/dist/packages/myos/contents/WorkerSessionStarting.d.ts +1 -1
  116. package/dist/packages/myos/contents/WorkerSessionStarting.js +1 -1
  117. package/dist/packages/myos/contents/index.d.ts +1079 -1086
  118. package/dist/packages/myos/contents/index.d.ts.map +1 -1
  119. package/dist/packages/myos/contents/index.js +101 -104
  120. package/dist/packages/myos/contents/index.js.map +1 -1
  121. package/dist/packages/myos/index.d.ts +1400 -1245
  122. package/dist/packages/myos/index.d.ts.map +1 -1
  123. package/dist/packages/myos/meta.d.ts +110 -136
  124. package/dist/packages/myos/meta.d.ts.map +1 -1
  125. package/dist/packages/myos/meta.js +110 -142
  126. package/dist/packages/myos/meta.js.map +1 -1
  127. package/dist/packages/myos/schemas/AddingParticipantRequested.d.ts +13 -2
  128. package/dist/packages/myos/schemas/AddingParticipantRequested.d.ts.map +1 -1
  129. package/dist/packages/myos/schemas/AddingParticipantRequested.js +2 -1
  130. package/dist/packages/myos/schemas/AddingParticipantRequested.js.map +1 -1
  131. package/dist/packages/myos/schemas/AddingParticipantResponded.d.ts +30 -4
  132. package/dist/packages/myos/schemas/AddingParticipantResponded.d.ts.map +1 -1
  133. package/dist/packages/myos/schemas/AddingParticipantResponded.js +2 -1
  134. package/dist/packages/myos/schemas/AddingParticipantResponded.js.map +1 -1
  135. package/dist/packages/myos/schemas/Agent.d.ts +0 -3
  136. package/dist/packages/myos/schemas/Agent.d.ts.map +1 -1
  137. package/dist/packages/myos/schemas/Agent.js +0 -1
  138. package/dist/packages/myos/schemas/Agent.js.map +1 -1
  139. package/dist/packages/myos/schemas/ChatGPTConnectorAgent.d.ts +0 -3
  140. package/dist/packages/myos/schemas/ChatGPTConnectorAgent.d.ts.map +1 -1
  141. package/dist/packages/myos/schemas/InformUserToInstallMyOSPackage.d.ts +0 -5
  142. package/dist/packages/myos/schemas/InformUserToInstallMyOSPackage.d.ts.map +1 -1
  143. package/dist/packages/myos/schemas/MyOSPackage.d.ts +0 -3
  144. package/dist/packages/myos/schemas/MyOSPackage.d.ts.map +1 -1
  145. package/dist/packages/myos/schemas/RemovingParticipantRequested.d.ts +13 -2
  146. package/dist/packages/myos/schemas/RemovingParticipantRequested.d.ts.map +1 -1
  147. package/dist/packages/myos/schemas/RemovingParticipantRequested.js +2 -1
  148. package/dist/packages/myos/schemas/RemovingParticipantRequested.js.map +1 -1
  149. package/dist/packages/myos/schemas/RemovingParticipantResponded.d.ts +30 -4
  150. package/dist/packages/myos/schemas/RemovingParticipantResponded.d.ts.map +1 -1
  151. package/dist/packages/myos/schemas/RemovingParticipantResponded.js +2 -1
  152. package/dist/packages/myos/schemas/RemovingParticipantResponded.js.map +1 -1
  153. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantRequested.d.ts +7 -1
  154. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantRequested.d.ts.map +1 -1
  155. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantRequested.js +2 -2
  156. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantRequested.js.map +1 -1
  157. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantResponded.d.ts +7 -1
  158. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantResponded.d.ts.map +1 -1
  159. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantResponded.js +2 -2
  160. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantResponded.js.map +1 -1
  161. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.d.ts +7 -1
  162. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.d.ts.map +1 -1
  163. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.js +2 -2
  164. package/dist/packages/myos/schemas/SingleDocumentPermissionGranted.js.map +1 -1
  165. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantingInProgress.d.ts +9 -3
  166. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantingInProgress.d.ts.map +1 -1
  167. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantingInProgress.js +2 -2
  168. package/dist/packages/myos/schemas/SingleDocumentPermissionGrantingInProgress.js.map +1 -1
  169. package/dist/packages/myos/schemas/SingleDocumentPermissionRejected.d.ts +7 -1
  170. package/dist/packages/myos/schemas/SingleDocumentPermissionRejected.d.ts.map +1 -1
  171. package/dist/packages/myos/schemas/SingleDocumentPermissionRejected.js +2 -2
  172. package/dist/packages/myos/schemas/SingleDocumentPermissionRejected.js.map +1 -1
  173. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.d.ts +7 -1
  174. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.d.ts.map +1 -1
  175. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.js +2 -2
  176. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokeRequested.js.map +1 -1
  177. package/dist/packages/myos/schemas/SingleDocumentPermissionRevoked.d.ts +7 -1
  178. package/dist/packages/myos/schemas/SingleDocumentPermissionRevoked.d.ts.map +1 -1
  179. package/dist/packages/myos/schemas/SingleDocumentPermissionRevoked.js +2 -2
  180. package/dist/packages/myos/schemas/SingleDocumentPermissionRevoked.js.map +1 -1
  181. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokingInProgress.d.ts +9 -3
  182. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokingInProgress.d.ts.map +1 -1
  183. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokingInProgress.js +2 -2
  184. package/dist/packages/myos/schemas/SingleDocumentPermissionRevokingInProgress.js.map +1 -1
  185. package/dist/packages/myos/schemas/SingleDocumentPermissionValidated.d.ts +7 -1
  186. package/dist/packages/myos/schemas/SingleDocumentPermissionValidated.d.ts.map +1 -1
  187. package/dist/packages/myos/schemas/SingleDocumentPermissionValidated.js +2 -2
  188. package/dist/packages/myos/schemas/SingleDocumentPermissionValidated.js.map +1 -1
  189. package/dist/packages/myos/schemas/StartWorkerSessionRequested.d.ts +7 -1
  190. package/dist/packages/myos/schemas/StartWorkerSessionRequested.d.ts.map +1 -1
  191. package/dist/packages/myos/schemas/StartWorkerSessionRequested.js +2 -2
  192. package/dist/packages/myos/schemas/StartWorkerSessionRequested.js.map +1 -1
  193. package/dist/packages/myos/schemas/SubscribeToSessionRequested.d.ts +7 -1
  194. package/dist/packages/myos/schemas/SubscribeToSessionRequested.d.ts.map +1 -1
  195. package/dist/packages/myos/schemas/SubscribeToSessionRequested.js +2 -2
  196. package/dist/packages/myos/schemas/SubscribeToSessionRequested.js.map +1 -1
  197. package/dist/packages/myos/schemas/SubscriptionToSessionFailed.d.ts +7 -1
  198. package/dist/packages/myos/schemas/SubscriptionToSessionFailed.d.ts.map +1 -1
  199. package/dist/packages/myos/schemas/SubscriptionToSessionFailed.js +2 -2
  200. package/dist/packages/myos/schemas/SubscriptionToSessionFailed.js.map +1 -1
  201. package/dist/packages/myos/schemas/SubscriptionToSessionInitiated.d.ts +7 -1
  202. package/dist/packages/myos/schemas/SubscriptionToSessionInitiated.d.ts.map +1 -1
  203. package/dist/packages/myos/schemas/SubscriptionToSessionInitiated.js +2 -2
  204. package/dist/packages/myos/schemas/SubscriptionToSessionInitiated.js.map +1 -1
  205. package/dist/packages/myos/schemas/SubscriptionToSessionRevoked.d.ts +7 -1
  206. package/dist/packages/myos/schemas/SubscriptionToSessionRevoked.d.ts.map +1 -1
  207. package/dist/packages/myos/schemas/SubscriptionToSessionRevoked.js +2 -2
  208. package/dist/packages/myos/schemas/SubscriptionToSessionRevoked.js.map +1 -1
  209. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrantRequested.d.ts +7 -1
  210. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrantRequested.d.ts.map +1 -1
  211. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrantRequested.js +2 -2
  212. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrantRequested.js.map +1 -1
  213. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.d.ts +7 -1
  214. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.d.ts.map +1 -1
  215. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.js +2 -2
  216. package/dist/packages/myos/schemas/WorkerAgencyPermissionGranted.js.map +1 -1
  217. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrantingInProgress.d.ts +9 -3
  218. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrantingInProgress.d.ts.map +1 -1
  219. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrantingInProgress.js +2 -2
  220. package/dist/packages/myos/schemas/WorkerAgencyPermissionGrantingInProgress.js.map +1 -1
  221. package/dist/packages/myos/schemas/WorkerAgencyPermissionInvalid.d.ts +7 -1
  222. package/dist/packages/myos/schemas/WorkerAgencyPermissionInvalid.d.ts.map +1 -1
  223. package/dist/packages/myos/schemas/WorkerAgencyPermissionInvalid.js +2 -2
  224. package/dist/packages/myos/schemas/WorkerAgencyPermissionInvalid.js.map +1 -1
  225. package/dist/packages/myos/schemas/WorkerAgencyPermissionRejected.d.ts +7 -1
  226. package/dist/packages/myos/schemas/WorkerAgencyPermissionRejected.d.ts.map +1 -1
  227. package/dist/packages/myos/schemas/WorkerAgencyPermissionRejected.js +2 -2
  228. package/dist/packages/myos/schemas/WorkerAgencyPermissionRejected.js.map +1 -1
  229. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.d.ts +7 -1
  230. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.d.ts.map +1 -1
  231. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.js +2 -2
  232. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokeRequested.js.map +1 -1
  233. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevoked.d.ts +7 -1
  234. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevoked.d.ts.map +1 -1
  235. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevoked.js +2 -2
  236. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevoked.js.map +1 -1
  237. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokingInProgress.d.ts +9 -3
  238. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokingInProgress.d.ts.map +1 -1
  239. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokingInProgress.js +2 -2
  240. package/dist/packages/myos/schemas/WorkerAgencyPermissionRevokingInProgress.js.map +1 -1
  241. package/dist/packages/myos/schemas/WorkerAgencyPermissionValidated.d.ts +7 -1
  242. package/dist/packages/myos/schemas/WorkerAgencyPermissionValidated.d.ts.map +1 -1
  243. package/dist/packages/myos/schemas/WorkerAgencyPermissionValidated.js +2 -2
  244. package/dist/packages/myos/schemas/WorkerAgencyPermissionValidated.js.map +1 -1
  245. package/dist/packages/myos/schemas/WorkerSessionStarting.d.ts +7 -1
  246. package/dist/packages/myos/schemas/WorkerSessionStarting.d.ts.map +1 -1
  247. package/dist/packages/myos/schemas/WorkerSessionStarting.js +2 -2
  248. package/dist/packages/myos/schemas/WorkerSessionStarting.js.map +1 -1
  249. package/dist/packages/myos/schemas/index.d.ts +271 -85
  250. package/dist/packages/myos/schemas/index.d.ts.map +1 -1
  251. package/dist/packages/myos/schemas/index.js +37 -40
  252. package/dist/packages/myos/schemas/index.js.map +1 -1
  253. package/dist/repository.d.ts +1440 -1349
  254. package/dist/repository.d.ts.map +1 -1
  255. package/dist/repository.js.map +1 -1
  256. package/package.json +2 -2
  257. package/dist/packages/conversation/contents/TimelineChannelV2.d.ts +0 -24
  258. package/dist/packages/conversation/contents/TimelineChannelV2.d.ts.map +0 -1
  259. package/dist/packages/conversation/contents/TimelineChannelV2.js +0 -24
  260. package/dist/packages/conversation/contents/TimelineChannelV2.js.map +0 -1
  261. package/dist/packages/conversation/schemas/TimelineChannelV2.d.ts +0 -34
  262. package/dist/packages/conversation/schemas/TimelineChannelV2.d.ts.map +0 -1
  263. package/dist/packages/conversation/schemas/TimelineChannelV2.js +0 -12
  264. package/dist/packages/conversation/schemas/TimelineChannelV2.js.map +0 -1
  265. package/dist/packages/myos/contents/AgentLLM.d.ts +0 -14
  266. package/dist/packages/myos/contents/AgentLLM.d.ts.map +0 -1
  267. package/dist/packages/myos/contents/AgentLLM.js +0 -14
  268. package/dist/packages/myos/contents/AgentLLM.js.map +0 -1
  269. package/dist/packages/myos/schemas/AgentLLM.d.ts +0 -20
  270. package/dist/packages/myos/schemas/AgentLLM.d.ts.map +0 -1
  271. package/dist/packages/myos/schemas/AgentLLM.js +0 -10
  272. package/dist/packages/myos/schemas/AgentLLM.js.map +0 -1
@@ -81,7 +81,7 @@ export const SingleDocumentPermissionGrantToAccount = {
81
81
  type: {
82
82
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
83
83
  },
84
- value: 'const issues = [];\n\n// Required: target session\nconst target = document(\'/targetSessionId\');\nif (!target || typeof target !== \'string\') issues.push("targetSessionId is missing or invalid");\n\n// Required: bound identities\nconst granterId = document(\'/contracts/granterChannel/accountId\');\nif (typeof granterId !== \'string\' || granterId.length === 0) issues.push("granterChannel must be bound to an accountId");\nconst granteeId = document(\'/contracts/granteeChannel/accountId\');\nif (typeof granteeId !== \'string\' || granteeId.length === 0) issues.push("granteeChannel must be bound to an accountId");\n\n// Permissions\nconst perms = document(\'/permissions\');\nif (!perms || typeof perms !== \'object\') {\n issues.push("permissions block is missing");\n} else {\n if (perms.read !== true) issues.push("permissions.read must be true for SDPG");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== \'string\' || x.trim().length === 0)) {\n issues.push("permissions.singleOps must contain only non-empty strings");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push("permissions.allOps=true and permissions.singleOps are mutually exclusive");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: "Single Document Permission Invalid", issues } ] };\nreturn { events: [ { type: "Single Document Permission Validated" } ] };\n',
84
+ value: 'const issues = [];\n\n// Required: target session\nconst target = document(\'/targetSessionId\');\nif (!target || typeof target !== \'string\') issues.push("targetSessionId is missing or invalid");\n\n// Required: bound identities\nconst granterId = document(\'/contracts/granterChannel/accountId\');\nif (typeof granterId !== \'string\' || granterId.length === 0) issues.push("granterChannel must be bound to an accountId");\nconst granteeId = document(\'/contracts/granteeChannel/accountId\');\nif (typeof granteeId !== \'string\' || granteeId.length === 0) issues.push("granteeChannel must be bound to an accountId");\n\n// Permissions\nconst perms = document(\'/permissions\');\nif (!perms || typeof perms !== \'object\') {\n issues.push("permissions block is missing");\n} else {\n if (perms.read !== true) issues.push("permissions.read must be true for SDPG");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== \'string\' || x.trim().length === 0)) {\n issues.push("permissions.singleOps must contain only non-empty strings");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push("permissions.allOps=true and permissions.singleOps are mutually exclusive");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: "MyOS/Single Document Permission Invalid", issues } ] };\nreturn { events: [ { type: "MyOS/Single Document Permission Validated" } ] };\n',
85
85
  },
86
86
  name: 'ValidateBasicShape',
87
87
  type: {
@@ -1 +1 @@
1
- {"version":3,"file":"SingleDocumentPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,sCAAsC,GAAG;IACpD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,8CAA8C;YAC3D,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EACT,mFAAmF;YACrF,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,28CAA28C;yBAC98C;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,6CAA6C;IACnD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"SingleDocumentPermissionGrantToAccount.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToAccount.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,sCAAsC,GAAG;IACpD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,8CAA8C;YAC3D,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EACT,mFAAmF;YACrF,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,q9CAAq9C;yBACx9C;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,6CAA6C;IACnD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
@@ -72,7 +72,7 @@ export declare const SingleDocumentPermissionGrantToDocument: {
72
72
  readonly type: {
73
73
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
74
74
  };
75
- readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\n// Permissions\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"Single Document Permission Validated\" } ] };\n";
75
+ readonly value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\n// Permissions\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n";
76
76
  };
77
77
  readonly name: "ValidateBasicShape";
78
78
  readonly type: {
@@ -75,7 +75,7 @@ export const SingleDocumentPermissionGrantToDocument = {
75
75
  type: {
76
76
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
77
77
  },
78
- value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\n// Permissions\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"Single Document Permission Validated\" } ] };\n",
78
+ value: "const skipValidation = document('/skipValidation');\nif (skipValidation === true) return { events: [] };\n\nconst issues = [];\n\n// Required: target session\nconst target = document('/targetSessionId');\nif (!target || typeof target !== 'string') issues.push(\"targetSessionId is missing or invalid\");\n\n// Required: bound granter identity\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) issues.push(\"granterChannel must be bound to an accountId\");\n\n// Required: grantee document id\nconst gdoc = document('/granteeDocumentId');\nif (typeof gdoc !== 'string' || gdoc.trim().length === 0) issues.push(\"granteeDocumentId must be a non-empty string (originalBlueId)\");\n\n// Permissions\nconst perms = document('/permissions');\nif (!perms || typeof perms !== 'object') {\n issues.push(\"permissions block is missing\");\n} else {\n if (perms.read !== true) issues.push(\"permissions.read must be true for SDPG\");\n const hasSingle = Array.isArray(perms?.singleOps) && perms.singleOps.length > 0;\n if (hasSingle) {\n if (perms.singleOps.some(x => typeof x !== 'string' || x.trim().length === 0)) {\n issues.push(\"permissions.singleOps must contain only non-empty strings\");\n }\n }\n if (perms.allOps === true && hasSingle) {\n issues.push(\"permissions.allOps=true and permissions.singleOps are mutually exclusive\");\n }\n}\n\nif (issues.length > 0) return { events: [ { type: \"MyOS/Single Document Permission Invalid\", issues } ] };\nreturn { events: [ { type: \"MyOS/Single Document Permission Validated\" } ] };\n",
79
79
  },
80
80
  name: 'ValidateBasicShape',
81
81
  type: {
@@ -1 +1 @@
1
- {"version":3,"file":"SingleDocumentPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EAAE,qDAAqD;YAClE,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,ylDAAylD;yBAC5lD;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,WAAW,EACT,4FAA4F;QAC9F,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,cAAc,EAAE;QACd,WAAW,EACT,oGAAoG;QACtG,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"SingleDocumentPermissionGrantToDocument.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/SingleDocumentPermissionGrantToDocument.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,uCAAuC,GAAG;IACrD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EAAE,qDAAqD;YAClE,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,sJAAsJ;yBACzJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,mmDAAmmD;yBACtmD;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,WAAW,EACT,4FAA4F;QAC9F,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,wBAAwB,EAAE;QACxB,WAAW,EACT,+HAA+H;QACjI,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,8CAA8C;IACpD,WAAW,EAAE;QACX,WAAW,EACT,8JAA8J;QAChK,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,cAAc,EAAE;QACd,WAAW,EACT,oGAAoG;QACtG,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,eAAe,EAAE;QACf,WAAW,EAAE,+CAA+C;QAC5D,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
@@ -12,7 +12,7 @@ export declare const SingleDocumentPermissionGranted: {
12
12
  };
13
13
  };
14
14
  readonly type: {
15
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
15
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
16
16
  };
17
17
  };
18
18
  //# sourceMappingURL=SingleDocumentPermissionGranted.d.ts.map
@@ -12,7 +12,7 @@ export const SingleDocumentPermissionGranted = {
12
12
  },
13
13
  },
14
14
  type: {
15
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
15
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
16
16
  },
17
17
  };
18
18
  //# sourceMappingURL=SingleDocumentPermissionGranted.js.map
@@ -17,7 +17,7 @@ export declare const SingleDocumentPermissionGrantingInProgress: {
17
17
  };
18
18
  };
19
19
  readonly type: {
20
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
20
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
21
21
  };
22
22
  };
23
23
  //# sourceMappingURL=SingleDocumentPermissionGrantingInProgress.d.ts.map
@@ -17,7 +17,7 @@ export const SingleDocumentPermissionGrantingInProgress = {
17
17
  },
18
18
  },
19
19
  type: {
20
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
20
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
21
21
  },
22
22
  };
23
23
  //# sourceMappingURL=SingleDocumentPermissionGrantingInProgress.js.map
@@ -17,7 +17,7 @@ export declare const SingleDocumentPermissionRejected: {
17
17
  };
18
18
  };
19
19
  readonly type: {
20
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
20
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
21
21
  };
22
22
  };
23
23
  //# sourceMappingURL=SingleDocumentPermissionRejected.d.ts.map
@@ -17,7 +17,7 @@ export const SingleDocumentPermissionRejected = {
17
17
  },
18
18
  },
19
19
  type: {
20
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
20
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
21
21
  },
22
22
  };
23
23
  //# sourceMappingURL=SingleDocumentPermissionRejected.js.map
@@ -7,7 +7,7 @@ export declare const SingleDocumentPermissionRevokeRequested: {
7
7
  };
8
8
  };
9
9
  readonly type: {
10
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
10
+ readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
11
11
  };
12
12
  };
13
13
  //# sourceMappingURL=SingleDocumentPermissionRevokeRequested.d.ts.map
@@ -7,7 +7,7 @@ export const SingleDocumentPermissionRevokeRequested = {
7
7
  },
8
8
  },
9
9
  type: {
10
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
10
+ blueId: '8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n',
11
11
  },
12
12
  };
13
13
  //# sourceMappingURL=SingleDocumentPermissionRevokeRequested.js.map
@@ -2,7 +2,7 @@ export declare const SingleDocumentPermissionRevoked: {
2
2
  readonly description: "Rights granted by this PGD have been retracted.";
3
3
  readonly name: "Single Document Permission Revoked";
4
4
  readonly type: {
5
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
5
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
6
6
  };
7
7
  };
8
8
  //# sourceMappingURL=SingleDocumentPermissionRevoked.d.ts.map
@@ -2,7 +2,7 @@ export const SingleDocumentPermissionRevoked = {
2
2
  description: 'Rights granted by this PGD have been retracted.',
3
3
  name: 'Single Document Permission Revoked',
4
4
  type: {
5
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
5
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
6
6
  },
7
7
  };
8
8
  //# sourceMappingURL=SingleDocumentPermissionRevoked.js.map
@@ -17,7 +17,7 @@ export declare const SingleDocumentPermissionRevokingInProgress: {
17
17
  };
18
18
  };
19
19
  readonly type: {
20
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
20
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
21
21
  };
22
22
  };
23
23
  //# sourceMappingURL=SingleDocumentPermissionRevokingInProgress.d.ts.map
@@ -17,7 +17,7 @@ export const SingleDocumentPermissionRevokingInProgress = {
17
17
  },
18
18
  },
19
19
  type: {
20
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
20
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
21
21
  },
22
22
  };
23
23
  //# sourceMappingURL=SingleDocumentPermissionRevokingInProgress.js.map
@@ -2,7 +2,7 @@ export declare const SingleDocumentPermissionValidated: {
2
2
  readonly description: "Emitted on initialise when local shape checks pass.";
3
3
  readonly name: "Single Document Permission Validated";
4
4
  readonly type: {
5
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
5
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
6
6
  };
7
7
  };
8
8
  //# sourceMappingURL=SingleDocumentPermissionValidated.d.ts.map
@@ -2,7 +2,7 @@ export const SingleDocumentPermissionValidated = {
2
2
  description: 'Emitted on initialise when local shape checks pass.',
3
3
  name: 'Single Document Permission Validated',
4
4
  type: {
5
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
5
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
6
6
  },
7
7
  };
8
8
  //# sourceMappingURL=SingleDocumentPermissionValidated.js.map
@@ -55,7 +55,7 @@ export declare const StartWorkerSessionRequested: {
55
55
  };
56
56
  };
57
57
  readonly type: {
58
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
58
+ readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
59
59
  };
60
60
  };
61
61
  //# sourceMappingURL=StartWorkerSessionRequested.d.ts.map
@@ -55,7 +55,7 @@ export const StartWorkerSessionRequested = {
55
55
  },
56
56
  },
57
57
  type: {
58
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
58
+ blueId: '8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n',
59
59
  },
60
60
  };
61
61
  //# sourceMappingURL=StartWorkerSessionRequested.js.map
@@ -22,7 +22,7 @@ export declare const SubscribeToSessionRequested: {
22
22
  };
23
23
  };
24
24
  readonly type: {
25
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
25
+ readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
26
26
  };
27
27
  };
28
28
  //# sourceMappingURL=SubscribeToSessionRequested.d.ts.map
@@ -22,7 +22,7 @@ export const SubscribeToSessionRequested = {
22
22
  },
23
23
  },
24
24
  type: {
25
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
25
+ blueId: '8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n',
26
26
  },
27
27
  };
28
28
  //# sourceMappingURL=SubscribeToSessionRequested.js.map
@@ -20,7 +20,7 @@ export declare const SubscriptionToSessionFailed: {
20
20
  };
21
21
  };
22
22
  readonly type: {
23
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
23
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
24
24
  };
25
25
  };
26
26
  //# sourceMappingURL=SubscriptionToSessionFailed.d.ts.map
@@ -20,7 +20,7 @@ export const SubscriptionToSessionFailed = {
20
20
  },
21
21
  },
22
22
  type: {
23
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
23
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
24
24
  },
25
25
  };
26
26
  //# sourceMappingURL=SubscriptionToSessionFailed.js.map
@@ -20,7 +20,7 @@ export declare const SubscriptionToSessionInitiated: {
20
20
  };
21
21
  };
22
22
  readonly type: {
23
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
23
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
24
24
  };
25
25
  };
26
26
  //# sourceMappingURL=SubscriptionToSessionInitiated.d.ts.map
@@ -20,7 +20,7 @@ export const SubscriptionToSessionInitiated = {
20
20
  },
21
21
  },
22
22
  type: {
23
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
23
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
24
24
  },
25
25
  };
26
26
  //# sourceMappingURL=SubscriptionToSessionInitiated.js.map
@@ -20,7 +20,7 @@ export declare const SubscriptionToSessionRevoked: {
20
20
  };
21
21
  };
22
22
  readonly type: {
23
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
23
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
24
24
  };
25
25
  };
26
26
  //# sourceMappingURL=SubscriptionToSessionRevoked.d.ts.map
@@ -20,7 +20,7 @@ export const SubscriptionToSessionRevoked = {
20
20
  },
21
21
  },
22
22
  type: {
23
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
23
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
24
24
  },
25
25
  };
26
26
  //# sourceMappingURL=SubscriptionToSessionRevoked.js.map
@@ -80,7 +80,7 @@ export declare const WorkerAgencyPermissionGrant: {
80
80
  readonly type: {
81
81
  readonly blueId: "DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K";
82
82
  };
83
- readonly value: "const issues = [];\n\nconst unwrapText = value => {\n if (typeof value === 'string') {\n const trimmed = value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'string') {\n const trimmed = value.value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.workerType === 'string') {\n const trimmed = value.workerType.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.name === 'string') {\n const trimmed = value.name.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n }\n return undefined;\n};\n\nconst unwrapBoolean = value => {\n if (typeof value === 'boolean') {\n return value;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return value.value;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return value.value.value;\n }\n }\n return undefined;\n};\n\nconst hasBooleanValue = value => {\n if (typeof value === 'boolean') {\n return true;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return true;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return true;\n }\n }\n return false;\n};\n\nconst unwrapArray = value => {\n if (Array.isArray(value)) {\n return value;\n }\n if (value && typeof value === 'object' && Array.isArray(value.items)) {\n return value.items;\n }\n return [];\n};\n\nconst unwrapRecord = value => {\n if (value && typeof value === 'object' && !Array.isArray(value)) {\n if (value.value && typeof value.value === 'object') {\n return value.value;\n }\n return value;\n }\n return {};\n};\n\n// --- granter binding (owner account) ---\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) {\n issues.push(\"granterChannel must be bound to an accountId\");\n}\n// --- grantee (parent worker) session id ---\nconst granteeDocumentId = document('/granteeDocumentId');\nif (\n typeof granteeDocumentId !== 'string' ||\n granteeDocumentId.trim().length === 0\n) {\n issues.push(\"granteeDocumentId must be a non-empty string\");\n}\n// --- allowedWorkerAgencyPermissions : list of { workerType, permissions } ---\nconst list = document('/allowedWorkerAgencyPermissions');\nif (!Array.isArray(list) || list.length === 0) {\n issues.push(\"allowedWorkerAgencyPermissions must be a non-empty array\");\n} else {\n // helper: validate Single Document Permission Set\n const validateSDPS = (p, path) => {\n const record = unwrapRecord(p);\n if (Object.keys(record).length === 0) {\n issues.push(`${path} must be an object`);\n return;\n }\n // read must be true to allow any access at all\n const read = unwrapBoolean(record.read);\n if (read !== true) {\n issues.push(`${path}.read must be true`);\n }\n const share = record.share;\n const shareValue = unwrapBoolean(share);\n if (hasBooleanValue(share) && typeof shareValue !== 'boolean') {\n issues.push(`${path}.share must be boolean if provided`);\n }\n const allOps = record.allOps;\n const allOpsValue = unwrapBoolean(allOps);\n if (hasBooleanValue(allOps) && typeof allOpsValue !== 'boolean') {\n issues.push(`${path}.allOps must be boolean if provided`);\n }\n const singleOpsRaw = unwrapArray(record.singleOps)\n .map(entry => unwrapText(entry))\n .filter(Boolean);\n const hasSingle = singleOpsRaw.length > 0;\n if (hasSingle) {\n const bad = singleOpsRaw.length !== unwrapArray(record.singleOps).length;\n if (bad) issues.push(`${path}.singleOps must contain only non-empty strings`);\n }\n if (allOpsValue === true && hasSingle) {\n issues.push(`${path}.allOps=true and ${path}.singleOps are mutually exclusive`);\n }\n // Note: it is valid to have read=true with neither allOps nor singleOps (read-only template)\n };\n const seenTypes = new Set();\n list.forEach((item, idx) => {\n const itemPath = `/allowedWorkerAgencyPermissions[${idx}]`;\n // shape\n if (typeof item !== 'object' || item === null) {\n issues.push(`${itemPath} must be an object`);\n return;\n }\n // workerType\n const workerType = unwrapText(item.workerType);\n if (!workerType) {\n issues.push(`${itemPath}.workerType must be a non-empty string`);\n } else {\n if (seenTypes.has(workerType)) {\n issues.push(`duplicate workerType '${workerType}' in allowedWorkerAgencyPermissions`);\n } else {\n seenTypes.add(workerType);\n }\n }\n // permissions (Single Document Permission Set)\n const perms = item.permissions;\n if (typeof perms === 'undefined') {\n issues.push(`${itemPath}.permissions is required`);\n } else {\n validateSDPS(perms, `${itemPath}.permissions`);\n }\n });\n}\nif (issues.length > 0) {\n return { events: [ { type: \"Worker Agency Permission Invalid\", issues } ] };\n} else {\n return { events: [ { type: \"Worker Agency Permission Validated\" } ] };\n}\n";
83
+ readonly value: "const issues = [];\n\nconst unwrapText = value => {\n if (typeof value === 'string') {\n const trimmed = value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'string') {\n const trimmed = value.value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.workerType === 'string') {\n const trimmed = value.workerType.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.name === 'string') {\n const trimmed = value.name.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n }\n return undefined;\n};\n\nconst unwrapBoolean = value => {\n if (typeof value === 'boolean') {\n return value;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return value.value;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return value.value.value;\n }\n }\n return undefined;\n};\n\nconst hasBooleanValue = value => {\n if (typeof value === 'boolean') {\n return true;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return true;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return true;\n }\n }\n return false;\n};\n\nconst unwrapArray = value => {\n if (Array.isArray(value)) {\n return value;\n }\n if (value && typeof value === 'object' && Array.isArray(value.items)) {\n return value.items;\n }\n return [];\n};\n\nconst unwrapRecord = value => {\n if (value && typeof value === 'object' && !Array.isArray(value)) {\n if (value.value && typeof value.value === 'object') {\n return value.value;\n }\n return value;\n }\n return {};\n};\n\n// --- granter binding (owner account) ---\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) {\n issues.push(\"granterChannel must be bound to an accountId\");\n}\n// --- grantee (parent worker) session id ---\nconst granteeDocumentId = document('/granteeDocumentId');\nif (\n typeof granteeDocumentId !== 'string' ||\n granteeDocumentId.trim().length === 0\n) {\n issues.push(\"granteeDocumentId must be a non-empty string\");\n}\n// --- allowedWorkerAgencyPermissions : list of { workerType, permissions } ---\nconst list = document('/allowedWorkerAgencyPermissions');\nif (!Array.isArray(list) || list.length === 0) {\n issues.push(\"allowedWorkerAgencyPermissions must be a non-empty array\");\n} else {\n // helper: validate Single Document Permission Set\n const validateSDPS = (p, path) => {\n const record = unwrapRecord(p);\n if (Object.keys(record).length === 0) {\n issues.push(`${path} must be an object`);\n return;\n }\n // read must be true to allow any access at all\n const read = unwrapBoolean(record.read);\n if (read !== true) {\n issues.push(`${path}.read must be true`);\n }\n const share = record.share;\n const shareValue = unwrapBoolean(share);\n if (hasBooleanValue(share) && typeof shareValue !== 'boolean') {\n issues.push(`${path}.share must be boolean if provided`);\n }\n const allOps = record.allOps;\n const allOpsValue = unwrapBoolean(allOps);\n if (hasBooleanValue(allOps) && typeof allOpsValue !== 'boolean') {\n issues.push(`${path}.allOps must be boolean if provided`);\n }\n const singleOpsRaw = unwrapArray(record.singleOps)\n .map(entry => unwrapText(entry))\n .filter(Boolean);\n const hasSingle = singleOpsRaw.length > 0;\n if (hasSingle) {\n const bad = singleOpsRaw.length !== unwrapArray(record.singleOps).length;\n if (bad) issues.push(`${path}.singleOps must contain only non-empty strings`);\n }\n if (allOpsValue === true && hasSingle) {\n issues.push(`${path}.allOps=true and ${path}.singleOps are mutually exclusive`);\n }\n // Note: it is valid to have read=true with neither allOps nor singleOps (read-only template)\n };\n const seenTypes = new Set();\n list.forEach((item, idx) => {\n const itemPath = `/allowedWorkerAgencyPermissions[${idx}]`;\n // shape\n if (typeof item !== 'object' || item === null) {\n issues.push(`${itemPath} must be an object`);\n return;\n }\n // workerType\n const workerType = unwrapText(item.workerType);\n if (!workerType) {\n issues.push(`${itemPath}.workerType must be a non-empty string`);\n } else {\n if (seenTypes.has(workerType)) {\n issues.push(`duplicate workerType '${workerType}' in allowedWorkerAgencyPermissions`);\n } else {\n seenTypes.add(workerType);\n }\n }\n // permissions (Single Document Permission Set)\n const perms = item.permissions;\n if (typeof perms === 'undefined') {\n issues.push(`${itemPath}.permissions is required`);\n } else {\n validateSDPS(perms, `${itemPath}.permissions`);\n }\n });\n}\nif (issues.length > 0) {\n return { events: [ { type: \"MyOS/Worker Agency Permission Invalid\", issues } ] };\n} else {\n return { events: [ { type: \"MyOS/Worker Agency Permission Validated\" } ] };\n}\n";
84
84
  };
85
85
  readonly name: "ValidateBasicShape";
86
86
  readonly type: {
@@ -83,7 +83,7 @@ export const WorkerAgencyPermissionGrant = {
83
83
  type: {
84
84
  blueId: 'DLRQwz7MQeCrzjy9bohPNwtCxKEBbKaMK65KBrwjfG6K',
85
85
  },
86
- value: "const issues = [];\n\nconst unwrapText = value => {\n if (typeof value === 'string') {\n const trimmed = value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'string') {\n const trimmed = value.value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.workerType === 'string') {\n const trimmed = value.workerType.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.name === 'string') {\n const trimmed = value.name.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n }\n return undefined;\n};\n\nconst unwrapBoolean = value => {\n if (typeof value === 'boolean') {\n return value;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return value.value;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return value.value.value;\n }\n }\n return undefined;\n};\n\nconst hasBooleanValue = value => {\n if (typeof value === 'boolean') {\n return true;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return true;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return true;\n }\n }\n return false;\n};\n\nconst unwrapArray = value => {\n if (Array.isArray(value)) {\n return value;\n }\n if (value && typeof value === 'object' && Array.isArray(value.items)) {\n return value.items;\n }\n return [];\n};\n\nconst unwrapRecord = value => {\n if (value && typeof value === 'object' && !Array.isArray(value)) {\n if (value.value && typeof value.value === 'object') {\n return value.value;\n }\n return value;\n }\n return {};\n};\n\n// --- granter binding (owner account) ---\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) {\n issues.push(\"granterChannel must be bound to an accountId\");\n}\n// --- grantee (parent worker) session id ---\nconst granteeDocumentId = document('/granteeDocumentId');\nif (\n typeof granteeDocumentId !== 'string' ||\n granteeDocumentId.trim().length === 0\n) {\n issues.push(\"granteeDocumentId must be a non-empty string\");\n}\n// --- allowedWorkerAgencyPermissions : list of { workerType, permissions } ---\nconst list = document('/allowedWorkerAgencyPermissions');\nif (!Array.isArray(list) || list.length === 0) {\n issues.push(\"allowedWorkerAgencyPermissions must be a non-empty array\");\n} else {\n // helper: validate Single Document Permission Set\n const validateSDPS = (p, path) => {\n const record = unwrapRecord(p);\n if (Object.keys(record).length === 0) {\n issues.push(`${path} must be an object`);\n return;\n }\n // read must be true to allow any access at all\n const read = unwrapBoolean(record.read);\n if (read !== true) {\n issues.push(`${path}.read must be true`);\n }\n const share = record.share;\n const shareValue = unwrapBoolean(share);\n if (hasBooleanValue(share) && typeof shareValue !== 'boolean') {\n issues.push(`${path}.share must be boolean if provided`);\n }\n const allOps = record.allOps;\n const allOpsValue = unwrapBoolean(allOps);\n if (hasBooleanValue(allOps) && typeof allOpsValue !== 'boolean') {\n issues.push(`${path}.allOps must be boolean if provided`);\n }\n const singleOpsRaw = unwrapArray(record.singleOps)\n .map(entry => unwrapText(entry))\n .filter(Boolean);\n const hasSingle = singleOpsRaw.length > 0;\n if (hasSingle) {\n const bad = singleOpsRaw.length !== unwrapArray(record.singleOps).length;\n if (bad) issues.push(`${path}.singleOps must contain only non-empty strings`);\n }\n if (allOpsValue === true && hasSingle) {\n issues.push(`${path}.allOps=true and ${path}.singleOps are mutually exclusive`);\n }\n // Note: it is valid to have read=true with neither allOps nor singleOps (read-only template)\n };\n const seenTypes = new Set();\n list.forEach((item, idx) => {\n const itemPath = `/allowedWorkerAgencyPermissions[${idx}]`;\n // shape\n if (typeof item !== 'object' || item === null) {\n issues.push(`${itemPath} must be an object`);\n return;\n }\n // workerType\n const workerType = unwrapText(item.workerType);\n if (!workerType) {\n issues.push(`${itemPath}.workerType must be a non-empty string`);\n } else {\n if (seenTypes.has(workerType)) {\n issues.push(`duplicate workerType '${workerType}' in allowedWorkerAgencyPermissions`);\n } else {\n seenTypes.add(workerType);\n }\n }\n // permissions (Single Document Permission Set)\n const perms = item.permissions;\n if (typeof perms === 'undefined') {\n issues.push(`${itemPath}.permissions is required`);\n } else {\n validateSDPS(perms, `${itemPath}.permissions`);\n }\n });\n}\nif (issues.length > 0) {\n return { events: [ { type: \"Worker Agency Permission Invalid\", issues } ] };\n} else {\n return { events: [ { type: \"Worker Agency Permission Validated\" } ] };\n}\n",
86
+ value: "const issues = [];\n\nconst unwrapText = value => {\n if (typeof value === 'string') {\n const trimmed = value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'string') {\n const trimmed = value.value.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.workerType === 'string') {\n const trimmed = value.workerType.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n if (typeof value.name === 'string') {\n const trimmed = value.name.trim();\n return trimmed.length > 0 ? trimmed : undefined;\n }\n }\n return undefined;\n};\n\nconst unwrapBoolean = value => {\n if (typeof value === 'boolean') {\n return value;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return value.value;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return value.value.value;\n }\n }\n return undefined;\n};\n\nconst hasBooleanValue = value => {\n if (typeof value === 'boolean') {\n return true;\n }\n if (value && typeof value === 'object') {\n if (typeof value.value === 'boolean') {\n return true;\n }\n if (\n value.value &&\n typeof value.value === 'object' &&\n typeof value.value.value === 'boolean'\n ) {\n return true;\n }\n }\n return false;\n};\n\nconst unwrapArray = value => {\n if (Array.isArray(value)) {\n return value;\n }\n if (value && typeof value === 'object' && Array.isArray(value.items)) {\n return value.items;\n }\n return [];\n};\n\nconst unwrapRecord = value => {\n if (value && typeof value === 'object' && !Array.isArray(value)) {\n if (value.value && typeof value.value === 'object') {\n return value.value;\n }\n return value;\n }\n return {};\n};\n\n// --- granter binding (owner account) ---\nconst granterId = document('/contracts/granterChannel/accountId');\nif (typeof granterId !== 'string' || granterId.length === 0) {\n issues.push(\"granterChannel must be bound to an accountId\");\n}\n// --- grantee (parent worker) session id ---\nconst granteeDocumentId = document('/granteeDocumentId');\nif (\n typeof granteeDocumentId !== 'string' ||\n granteeDocumentId.trim().length === 0\n) {\n issues.push(\"granteeDocumentId must be a non-empty string\");\n}\n// --- allowedWorkerAgencyPermissions : list of { workerType, permissions } ---\nconst list = document('/allowedWorkerAgencyPermissions');\nif (!Array.isArray(list) || list.length === 0) {\n issues.push(\"allowedWorkerAgencyPermissions must be a non-empty array\");\n} else {\n // helper: validate Single Document Permission Set\n const validateSDPS = (p, path) => {\n const record = unwrapRecord(p);\n if (Object.keys(record).length === 0) {\n issues.push(`${path} must be an object`);\n return;\n }\n // read must be true to allow any access at all\n const read = unwrapBoolean(record.read);\n if (read !== true) {\n issues.push(`${path}.read must be true`);\n }\n const share = record.share;\n const shareValue = unwrapBoolean(share);\n if (hasBooleanValue(share) && typeof shareValue !== 'boolean') {\n issues.push(`${path}.share must be boolean if provided`);\n }\n const allOps = record.allOps;\n const allOpsValue = unwrapBoolean(allOps);\n if (hasBooleanValue(allOps) && typeof allOpsValue !== 'boolean') {\n issues.push(`${path}.allOps must be boolean if provided`);\n }\n const singleOpsRaw = unwrapArray(record.singleOps)\n .map(entry => unwrapText(entry))\n .filter(Boolean);\n const hasSingle = singleOpsRaw.length > 0;\n if (hasSingle) {\n const bad = singleOpsRaw.length !== unwrapArray(record.singleOps).length;\n if (bad) issues.push(`${path}.singleOps must contain only non-empty strings`);\n }\n if (allOpsValue === true && hasSingle) {\n issues.push(`${path}.allOps=true and ${path}.singleOps are mutually exclusive`);\n }\n // Note: it is valid to have read=true with neither allOps nor singleOps (read-only template)\n };\n const seenTypes = new Set();\n list.forEach((item, idx) => {\n const itemPath = `/allowedWorkerAgencyPermissions[${idx}]`;\n // shape\n if (typeof item !== 'object' || item === null) {\n issues.push(`${itemPath} must be an object`);\n return;\n }\n // workerType\n const workerType = unwrapText(item.workerType);\n if (!workerType) {\n issues.push(`${itemPath}.workerType must be a non-empty string`);\n } else {\n if (seenTypes.has(workerType)) {\n issues.push(`duplicate workerType '${workerType}' in allowedWorkerAgencyPermissions`);\n } else {\n seenTypes.add(workerType);\n }\n }\n // permissions (Single Document Permission Set)\n const perms = item.permissions;\n if (typeof perms === 'undefined') {\n issues.push(`${itemPath}.permissions is required`);\n } else {\n validateSDPS(perms, `${itemPath}.permissions`);\n }\n });\n}\nif (issues.length > 0) {\n return { events: [ { type: \"MyOS/Worker Agency Permission Invalid\", issues } ] };\n} else {\n return { events: [ { type: \"MyOS/Worker Agency Permission Validated\" } ] };\n}\n",
87
87
  },
88
88
  name: 'ValidateBasicShape',
89
89
  type: {
@@ -1 +1 @@
1
- {"version":3,"file":"WorkerAgencyPermissionGrant.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/WorkerAgencyPermissionGrant.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,2BAA2B,GAAG;IACzC,8BAA8B,EAAE;QAC9B,QAAQ,EAAE;YACR,MAAM,EAAE,8CAA8C;SACvD;QACD,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EAAE,qDAAqD;YAClE,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,oJAAoJ;yBACvJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,2xKAA2xK;yBAC9xK;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,gCAAgC;IACtC,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
1
+ {"version":3,"file":"WorkerAgencyPermissionGrant.js","sourceRoot":"","sources":["../../../../src/packages/myos/contents/WorkerAgencyPermissionGrant.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,2BAA2B,GAAG;IACzC,8BAA8B,EAAE;QAC9B,QAAQ,EAAE;YACR,MAAM,EAAE,8CAA8C;SACvD;QACD,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,SAAS,EAAE;QACT,cAAc,EAAE;YACd,WAAW,EAAE,4DAA4D;YACzE,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,oBAAoB,EAAE;YACpB,KAAK,EAAE;gBACL,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,MAAM,EAAE;YACN,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,gBAAgB;aACxB;YACD,WAAW,EAAE,qDAAqD;YAClE,OAAO,EAAE;gBACP,WAAW,EAAE,gCAAgC;gBAC7C,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,iBAAiB,EAAE;YACjB,SAAS,EAAE;gBACT,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,QAAQ;aAChB;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,oJAAoJ;yBACvJ;wBACD,IAAI,EAAE,qBAAqB;wBAC3B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;QACD,cAAc,EAAE;YACd,OAAO,EAAE;gBACP,IAAI,EAAE;oBACJ,MAAM,EAAE,8CAA8C;iBACvD;gBACD,KAAK,EAAE,sBAAsB;aAC9B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE;oBACL;wBACE,IAAI,EAAE;4BACJ,IAAI,EAAE;gCACJ,MAAM,EAAE,8CAA8C;6BACvD;4BACD,KAAK,EACH,qyKAAqyK;yBACxyK;wBACD,IAAI,EAAE,oBAAoB;wBAC1B,IAAI,EAAE;4BACJ,MAAM,EAAE,8CAA8C;yBACvD;qBACF;iBACF;aACF;YACD,IAAI,EAAE;gBACJ,MAAM,EAAE,8CAA8C;aACvD;SACF;KACF;IACD,iBAAiB,EAAE;QACjB,IAAI,EAAE;YACJ,MAAM,EAAE,8CAA8C;SACvD;KACF;IACD,IAAI,EAAE,gCAAgC;IACtC,IAAI,EAAE;QACJ,MAAM,EAAE,8CAA8C;KACvD;CACO,CAAC"}
@@ -15,7 +15,7 @@ export declare const WorkerAgencyPermissionGrantRequested: {
15
15
  };
16
16
  };
17
17
  readonly type: {
18
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
18
+ readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
19
19
  };
20
20
  };
21
21
  //# sourceMappingURL=WorkerAgencyPermissionGrantRequested.d.ts.map
@@ -15,7 +15,7 @@ export const WorkerAgencyPermissionGrantRequested = {
15
15
  },
16
16
  },
17
17
  type: {
18
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
18
+ blueId: '8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n',
19
19
  },
20
20
  };
21
21
  //# sourceMappingURL=WorkerAgencyPermissionGrantRequested.js.map
@@ -15,7 +15,7 @@ export declare const WorkerAgencyPermissionGranted: {
15
15
  };
16
16
  readonly name: "Worker Agency Permission Granted";
17
17
  readonly type: {
18
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
18
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
19
19
  };
20
20
  };
21
21
  //# sourceMappingURL=WorkerAgencyPermissionGranted.d.ts.map
@@ -15,7 +15,7 @@ export const WorkerAgencyPermissionGranted = {
15
15
  },
16
16
  name: 'Worker Agency Permission Granted',
17
17
  type: {
18
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
18
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
19
19
  },
20
20
  };
21
21
  //# sourceMappingURL=WorkerAgencyPermissionGranted.js.map
@@ -20,7 +20,7 @@ export declare const WorkerAgencyPermissionGrantingInProgress: {
20
20
  };
21
21
  };
22
22
  readonly type: {
23
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
23
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
24
24
  };
25
25
  };
26
26
  //# sourceMappingURL=WorkerAgencyPermissionGrantingInProgress.d.ts.map
@@ -20,7 +20,7 @@ export const WorkerAgencyPermissionGrantingInProgress = {
20
20
  },
21
21
  },
22
22
  type: {
23
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
23
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
24
24
  },
25
25
  };
26
26
  //# sourceMappingURL=WorkerAgencyPermissionGrantingInProgress.js.map
@@ -10,7 +10,7 @@ export declare const WorkerAgencyPermissionInvalid: {
10
10
  };
11
11
  readonly name: "Worker Agency Permission Invalid";
12
12
  readonly type: {
13
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
13
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
14
14
  };
15
15
  };
16
16
  //# sourceMappingURL=WorkerAgencyPermissionInvalid.d.ts.map
@@ -10,7 +10,7 @@ export const WorkerAgencyPermissionInvalid = {
10
10
  },
11
11
  name: 'Worker Agency Permission Invalid',
12
12
  type: {
13
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
13
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
14
14
  },
15
15
  };
16
16
  //# sourceMappingURL=WorkerAgencyPermissionInvalid.js.map
@@ -20,7 +20,7 @@ export declare const WorkerAgencyPermissionRejected: {
20
20
  };
21
21
  };
22
22
  readonly type: {
23
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
23
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
24
24
  };
25
25
  };
26
26
  //# sourceMappingURL=WorkerAgencyPermissionRejected.d.ts.map
@@ -20,7 +20,7 @@ export const WorkerAgencyPermissionRejected = {
20
20
  },
21
21
  },
22
22
  type: {
23
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
23
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
24
24
  },
25
25
  };
26
26
  //# sourceMappingURL=WorkerAgencyPermissionRejected.js.map
@@ -7,7 +7,7 @@ export declare const WorkerAgencyPermissionRevokeRequested: {
7
7
  };
8
8
  };
9
9
  readonly type: {
10
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
10
+ readonly blueId: "8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n";
11
11
  };
12
12
  };
13
13
  //# sourceMappingURL=WorkerAgencyPermissionRevokeRequested.d.ts.map
@@ -7,7 +7,7 @@ export const WorkerAgencyPermissionRevokeRequested = {
7
7
  },
8
8
  },
9
9
  type: {
10
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
10
+ blueId: '8f9UhHMbRe62sFgzQVheToaJPYi7t7HPNVvpQTbqfL5n',
11
11
  },
12
12
  };
13
13
  //# sourceMappingURL=WorkerAgencyPermissionRevokeRequested.js.map
@@ -2,7 +2,7 @@ export declare const WorkerAgencyPermissionRevoked: {
2
2
  readonly description: "Rights granted by this WAG have been retracted.";
3
3
  readonly name: "Worker Agency Permission Revoked";
4
4
  readonly type: {
5
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
5
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
6
6
  };
7
7
  };
8
8
  //# sourceMappingURL=WorkerAgencyPermissionRevoked.d.ts.map
@@ -2,7 +2,7 @@ export const WorkerAgencyPermissionRevoked = {
2
2
  description: 'Rights granted by this WAG have been retracted.',
3
3
  name: 'Worker Agency Permission Revoked',
4
4
  type: {
5
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
5
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
6
6
  },
7
7
  };
8
8
  //# sourceMappingURL=WorkerAgencyPermissionRevoked.js.map
@@ -20,7 +20,7 @@ export declare const WorkerAgencyPermissionRevokingInProgress: {
20
20
  };
21
21
  };
22
22
  readonly type: {
23
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
23
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
24
24
  };
25
25
  };
26
26
  //# sourceMappingURL=WorkerAgencyPermissionRevokingInProgress.d.ts.map
@@ -20,7 +20,7 @@ export const WorkerAgencyPermissionRevokingInProgress = {
20
20
  },
21
21
  },
22
22
  type: {
23
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
23
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
24
24
  },
25
25
  };
26
26
  //# sourceMappingURL=WorkerAgencyPermissionRevokingInProgress.js.map
@@ -2,7 +2,7 @@ export declare const WorkerAgencyPermissionValidated: {
2
2
  readonly description: "Emitted on initialise when local shape checks pass.";
3
3
  readonly name: "Worker Agency Permission Validated";
4
4
  readonly type: {
5
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
5
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
6
6
  };
7
7
  };
8
8
  //# sourceMappingURL=WorkerAgencyPermissionValidated.d.ts.map
@@ -2,7 +2,7 @@ export const WorkerAgencyPermissionValidated = {
2
2
  description: 'Emitted on initialise when local shape checks pass.',
3
3
  name: 'Worker Agency Permission Validated',
4
4
  type: {
5
- blueId: '5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we',
5
+ blueId: '36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp',
6
6
  },
7
7
  };
8
8
  //# sourceMappingURL=WorkerAgencyPermissionValidated.js.map
@@ -12,7 +12,7 @@ export declare const WorkerSessionStarting: {
12
12
  };
13
13
  };
14
14
  readonly type: {
15
- readonly blueId: "5Wz4G9qcnBJnntYRkz4dgLK5bSuoMpYJZj4j5M59z4we";
15
+ readonly blueId: "36epvrpVHZLjapbeZsNodz2NDnm7XZeNZcnkWHgkP1pp";
16
16
  };
17
17
  };
18
18
  //# sourceMappingURL=WorkerSessionStarting.d.ts.map