@company-semantics/contracts 0.75.0 → 0.77.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@company-semantics/contracts",
3
- "version": "0.75.0",
3
+ "version": "0.77.0",
4
4
  "private": false,
5
5
  "repository": {
6
6
  "type": "git",
@@ -40,9 +40,10 @@ export type IntegrationProvider = 'slack' | 'google' | 'zoom'
40
40
  * Maps to (provider, service) pair in the database:
41
41
  * - 'slack' → provider='slack', service=''
42
42
  * - 'google_drive' → provider='google', service='drive'
43
+ * - 'google_meet' → provider='google', service='meet'
43
44
  * - 'zoom' → provider='zoom', service=''
44
45
  */
45
- export type IntegrationKey = 'slack' | 'google_drive' | 'zoom'
46
+ export type IntegrationKey = 'slack' | 'google_drive' | 'google_meet' | 'zoom'
46
47
 
47
48
  /**
48
49
  * Content structure for integration artifacts.
@@ -94,6 +95,11 @@ export interface PreviewData {
94
95
  description?: string
95
96
  /** The artifacts that would be created/sent/modified */
96
97
  artifacts: PreviewArtifact[]
98
+ /** Action type for bridge routing and executor dispatch (e.g. 'update_profile', 'send_message', 'manage_integration') */
99
+ actionType?: string
100
+ /** Top-level execution target for bridge routing and executor dispatch.
101
+ * Distinct from PreviewArtifact.metadata.target (per-artifact UI metadata). */
102
+ target?: string
97
103
  }
98
104
 
99
105
  /**
package/src/org/types.ts CHANGED
@@ -396,12 +396,17 @@ export interface ChangeMemberRoleRequest {
396
396
  * INVARIANT: Auth policy changes do not affect existing sessions
397
397
  * (unless explicitly revoked via separate action).
398
398
  * @see Phase 3 Invariant #11: No retroactive enforcement
399
+ *
400
+ * EXCEPTION (ADR-BE-071): SSO credential reset or provider switch revokes
401
+ * SSO-authenticated sessions because the trust anchor is destroyed.
399
402
  */
400
403
  export interface OrgAuthPolicy {
401
404
  /** Whether SSO is required for all members */
402
405
  requireSSO: boolean;
403
406
  /** List of allowed authentication providers (e.g., 'google', 'microsoft', 'okta') */
404
407
  allowedProviders: string[];
408
+ /** True when the requesting admin's own SSO session was revoked by this operation (ADR-BE-071) */
409
+ selfRevoked?: boolean;
405
410
  }
406
411
 
407
412
  /**