@contractspec/example.kb-update-pipeline 1.57.0 → 1.59.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.turbo/turbo-build.log +58 -60
- package/.turbo/turbo-prebuild.log +1 -0
- package/CHANGELOG.md +25 -0
- package/dist/browser/docs/index.js +43 -0
- package/dist/browser/docs/kb-update-pipeline.docblock.js +43 -0
- package/dist/browser/entities/index.js +56 -0
- package/dist/browser/entities/models.js +56 -0
- package/dist/browser/events.js +132 -0
- package/dist/browser/example.js +35 -0
- package/dist/browser/handlers/index.js +109 -0
- package/dist/browser/handlers/memory.handlers.js +109 -0
- package/dist/browser/index.js +646 -0
- package/dist/browser/kb-update-pipeline.feature.js +61 -0
- package/dist/browser/operations/index.js +199 -0
- package/dist/browser/operations/pipeline.js +199 -0
- package/dist/browser/presentations.js +120 -0
- package/dist/browser/tests/operations.test-spec.js +85 -0
- package/dist/docs/index.d.ts +2 -1
- package/dist/docs/index.d.ts.map +1 -0
- package/dist/docs/index.js +44 -1
- package/dist/docs/kb-update-pipeline.docblock.d.ts +2 -1
- package/dist/docs/kb-update-pipeline.docblock.d.ts.map +1 -0
- package/dist/docs/kb-update-pipeline.docblock.js +41 -28
- package/dist/entities/index.d.ts +2 -2
- package/dist/entities/index.d.ts.map +1 -0
- package/dist/entities/index.js +57 -3
- package/dist/entities/models.d.ts +53 -58
- package/dist/entities/models.d.ts.map +1 -1
- package/dist/entities/models.js +54 -71
- package/dist/events.d.ts +62 -68
- package/dist/events.d.ts.map +1 -1
- package/dist/events.js +122 -139
- package/dist/example.d.ts +2 -6
- package/dist/example.d.ts.map +1 -1
- package/dist/example.js +34 -47
- package/dist/handlers/index.d.ts +2 -2
- package/dist/handlers/index.d.ts.map +1 -0
- package/dist/handlers/index.js +110 -3
- package/dist/handlers/memory.handlers.d.ts +58 -60
- package/dist/handlers/memory.handlers.d.ts.map +1 -1
- package/dist/handlers/memory.handlers.js +104 -87
- package/dist/handlers/memory.handlers.test.d.ts +2 -0
- package/dist/handlers/memory.handlers.test.d.ts.map +1 -0
- package/dist/index.d.ts +14 -10
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +647 -12
- package/dist/kb-update-pipeline.feature.d.ts +1 -6
- package/dist/kb-update-pipeline.feature.d.ts.map +1 -1
- package/dist/kb-update-pipeline.feature.js +60 -140
- package/dist/node/docs/index.js +43 -0
- package/dist/node/docs/kb-update-pipeline.docblock.js +43 -0
- package/dist/node/entities/index.js +56 -0
- package/dist/node/entities/models.js +56 -0
- package/dist/node/events.js +132 -0
- package/dist/node/example.js +35 -0
- package/dist/node/handlers/index.js +109 -0
- package/dist/node/handlers/memory.handlers.js +109 -0
- package/dist/node/index.js +646 -0
- package/dist/node/kb-update-pipeline.feature.js +61 -0
- package/dist/node/operations/index.js +199 -0
- package/dist/node/operations/pipeline.js +199 -0
- package/dist/node/presentations.js +120 -0
- package/dist/node/tests/operations.test-spec.js +85 -0
- package/dist/operations/index.d.ts +2 -2
- package/dist/operations/index.d.ts.map +1 -0
- package/dist/operations/index.js +199 -2
- package/dist/operations/pipeline.d.ts +126 -132
- package/dist/operations/pipeline.d.ts.map +1 -1
- package/dist/operations/pipeline.js +189 -172
- package/dist/presentations.d.ts +3 -8
- package/dist/presentations.d.ts.map +1 -1
- package/dist/presentations.js +117 -67
- package/dist/tests/operations.test-spec.d.ts +3 -8
- package/dist/tests/operations.test-spec.d.ts.map +1 -1
- package/dist/tests/operations.test-spec.js +82 -90
- package/package.json +157 -41
- package/tsdown.config.js +1 -2
- package/.turbo/turbo-build$colon$bundle.log +0 -60
- package/dist/docs/kb-update-pipeline.docblock.js.map +0 -1
- package/dist/entities/models.js.map +0 -1
- package/dist/events.js.map +0 -1
- package/dist/example.js.map +0 -1
- package/dist/handlers/memory.handlers.js.map +0 -1
- package/dist/kb-update-pipeline.feature.js.map +0 -1
- package/dist/operations/pipeline.js.map +0 -1
- package/dist/presentations.js.map +0 -1
- package/dist/tests/operations.test-spec.js.map +0 -1
- package/tsconfig.tsbuildinfo +0 -1
|
@@ -1,142 +1,62 @@
|
|
|
1
|
+
// @bun
|
|
2
|
+
// src/kb-update-pipeline.feature.ts
|
|
1
3
|
import { defineFeature } from "@contractspec/lib.contracts";
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
key: "kb.review.decided",
|
|
58
|
-
version: "1.0.0"
|
|
59
|
-
}
|
|
60
|
-
],
|
|
61
|
-
presentations: [
|
|
62
|
-
{
|
|
63
|
-
key: "kb.dashboard",
|
|
64
|
-
version: "1.0.0"
|
|
65
|
-
},
|
|
66
|
-
{
|
|
67
|
-
key: "kb.review.list",
|
|
68
|
-
version: "1.0.0"
|
|
69
|
-
},
|
|
70
|
-
{
|
|
71
|
-
key: "kb.review.form",
|
|
72
|
-
version: "1.0.0"
|
|
73
|
-
}
|
|
74
|
-
],
|
|
75
|
-
opToPresentation: [
|
|
76
|
-
{
|
|
77
|
-
op: {
|
|
78
|
-
key: "kbPipeline.runWatch",
|
|
79
|
-
version: "1.0.0"
|
|
80
|
-
},
|
|
81
|
-
pres: {
|
|
82
|
-
key: "kb.dashboard",
|
|
83
|
-
version: "1.0.0"
|
|
84
|
-
}
|
|
85
|
-
},
|
|
86
|
-
{
|
|
87
|
-
op: {
|
|
88
|
-
key: "kbPipeline.createReviewTask",
|
|
89
|
-
version: "1.0.0"
|
|
90
|
-
},
|
|
91
|
-
pres: {
|
|
92
|
-
key: "kb.review.list",
|
|
93
|
-
version: "1.0.0"
|
|
94
|
-
}
|
|
95
|
-
},
|
|
96
|
-
{
|
|
97
|
-
op: {
|
|
98
|
-
key: "kbPipeline.submitDecision",
|
|
99
|
-
version: "1.0.0"
|
|
100
|
-
},
|
|
101
|
-
pres: {
|
|
102
|
-
key: "kb.review.form",
|
|
103
|
-
version: "1.0.0"
|
|
104
|
-
}
|
|
105
|
-
}
|
|
106
|
-
],
|
|
107
|
-
presentationsTargets: [
|
|
108
|
-
{
|
|
109
|
-
key: "kb.dashboard",
|
|
110
|
-
version: "1.0.0",
|
|
111
|
-
targets: ["react", "markdown"]
|
|
112
|
-
},
|
|
113
|
-
{
|
|
114
|
-
key: "kb.review.list",
|
|
115
|
-
version: "1.0.0",
|
|
116
|
-
targets: ["react", "markdown"]
|
|
117
|
-
},
|
|
118
|
-
{
|
|
119
|
-
key: "kb.review.form",
|
|
120
|
-
version: "1.0.0",
|
|
121
|
-
targets: ["react"]
|
|
122
|
-
}
|
|
123
|
-
],
|
|
124
|
-
capabilities: { requires: [
|
|
125
|
-
{
|
|
126
|
-
key: "identity",
|
|
127
|
-
version: "1.0.0"
|
|
128
|
-
},
|
|
129
|
-
{
|
|
130
|
-
key: "notifications",
|
|
131
|
-
version: "1.0.0"
|
|
132
|
-
},
|
|
133
|
-
{
|
|
134
|
-
key: "audit-trail",
|
|
135
|
-
version: "1.0.0"
|
|
136
|
-
}
|
|
137
|
-
] }
|
|
4
|
+
var KbUpdatePipelineFeature = defineFeature({
|
|
5
|
+
meta: {
|
|
6
|
+
key: "kb-update-pipeline",
|
|
7
|
+
version: "1.0.0",
|
|
8
|
+
title: "KB Update Pipeline (HITL)",
|
|
9
|
+
description: "Automation proposes KB patches; humans verify; publishing is blocked until approvals are complete.",
|
|
10
|
+
domain: "knowledge",
|
|
11
|
+
owners: ["@examples"],
|
|
12
|
+
tags: ["knowledge", "pipeline", "hitl", "audit", "notifications"],
|
|
13
|
+
stability: "experimental"
|
|
14
|
+
},
|
|
15
|
+
operations: [
|
|
16
|
+
{ key: "kbPipeline.runWatch", version: "1.0.0" },
|
|
17
|
+
{ key: "kbPipeline.createReviewTask", version: "1.0.0" },
|
|
18
|
+
{ key: "kbPipeline.submitDecision", version: "1.0.0" },
|
|
19
|
+
{ key: "kbPipeline.publishIfReady", version: "1.0.0" }
|
|
20
|
+
],
|
|
21
|
+
events: [
|
|
22
|
+
{ key: "kb.change.detected", version: "1.0.0" },
|
|
23
|
+
{ key: "kb.change.summarized", version: "1.0.0" },
|
|
24
|
+
{ key: "kb.patch.proposed", version: "1.0.0" },
|
|
25
|
+
{ key: "kb.review.requested", version: "1.0.0" },
|
|
26
|
+
{ key: "kb.review.decided", version: "1.0.0" }
|
|
27
|
+
],
|
|
28
|
+
presentations: [
|
|
29
|
+
{ key: "kb.dashboard", version: "1.0.0" },
|
|
30
|
+
{ key: "kb.review.list", version: "1.0.0" },
|
|
31
|
+
{ key: "kb.review.form", version: "1.0.0" }
|
|
32
|
+
],
|
|
33
|
+
opToPresentation: [
|
|
34
|
+
{
|
|
35
|
+
op: { key: "kbPipeline.runWatch", version: "1.0.0" },
|
|
36
|
+
pres: { key: "kb.dashboard", version: "1.0.0" }
|
|
37
|
+
},
|
|
38
|
+
{
|
|
39
|
+
op: { key: "kbPipeline.createReviewTask", version: "1.0.0" },
|
|
40
|
+
pres: { key: "kb.review.list", version: "1.0.0" }
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
op: { key: "kbPipeline.submitDecision", version: "1.0.0" },
|
|
44
|
+
pres: { key: "kb.review.form", version: "1.0.0" }
|
|
45
|
+
}
|
|
46
|
+
],
|
|
47
|
+
presentationsTargets: [
|
|
48
|
+
{ key: "kb.dashboard", version: "1.0.0", targets: ["react", "markdown"] },
|
|
49
|
+
{ key: "kb.review.list", version: "1.0.0", targets: ["react", "markdown"] },
|
|
50
|
+
{ key: "kb.review.form", version: "1.0.0", targets: ["react"] }
|
|
51
|
+
],
|
|
52
|
+
capabilities: {
|
|
53
|
+
requires: [
|
|
54
|
+
{ key: "identity", version: "1.0.0" },
|
|
55
|
+
{ key: "notifications", version: "1.0.0" },
|
|
56
|
+
{ key: "audit-trail", version: "1.0.0" }
|
|
57
|
+
]
|
|
58
|
+
}
|
|
138
59
|
});
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
//# sourceMappingURL=kb-update-pipeline.feature.js.map
|
|
60
|
+
export {
|
|
61
|
+
KbUpdatePipelineFeature
|
|
62
|
+
};
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
// src/docs/kb-update-pipeline.docblock.ts
|
|
2
|
+
import { registerDocBlocks } from "@contractspec/lib.contracts/docs";
|
|
3
|
+
var docBlocks = [
|
|
4
|
+
{
|
|
5
|
+
id: "docs.examples.kb-update-pipeline.goal",
|
|
6
|
+
title: "KB Update Pipeline — Goal",
|
|
7
|
+
summary: "Automation proposes KB patches; humans verify; publishing is blocked until approvals are complete.",
|
|
8
|
+
kind: "goal",
|
|
9
|
+
visibility: "public",
|
|
10
|
+
route: "/docs/examples/kb-update-pipeline/goal",
|
|
11
|
+
tags: ["knowledge", "pipeline", "hitl", "audit"],
|
|
12
|
+
body: `## Why it matters
|
|
13
|
+
- Keeps humans as the verifiers (HITL) while automation does the busywork.
|
|
14
|
+
- Produces an auditable chain: source change -> diff -> proposal -> review -> publish.
|
|
15
|
+
|
|
16
|
+
## Guardrails
|
|
17
|
+
- High-risk changes require expert approval.
|
|
18
|
+
- Publishing fails if any included rule versions are not approved.
|
|
19
|
+
- Review requests emit notifications/events.`
|
|
20
|
+
},
|
|
21
|
+
{
|
|
22
|
+
id: "docs.examples.kb-update-pipeline.reference",
|
|
23
|
+
title: "KB Update Pipeline — Reference",
|
|
24
|
+
summary: "Entities, contracts, and events for the KB update pipeline example.",
|
|
25
|
+
kind: "reference",
|
|
26
|
+
visibility: "public",
|
|
27
|
+
route: "/docs/examples/kb-update-pipeline",
|
|
28
|
+
tags: ["knowledge", "reference"],
|
|
29
|
+
body: `## Contracts
|
|
30
|
+
- kbPipeline.runWatch
|
|
31
|
+
- kbPipeline.createReviewTask
|
|
32
|
+
- kbPipeline.submitDecision
|
|
33
|
+
- kbPipeline.publishIfReady
|
|
34
|
+
|
|
35
|
+
## Events
|
|
36
|
+
- kb.change.detected
|
|
37
|
+
- kb.change.summarized
|
|
38
|
+
- kb.patch.proposed
|
|
39
|
+
- kb.review.requested
|
|
40
|
+
- kb.review.decided`
|
|
41
|
+
}
|
|
42
|
+
];
|
|
43
|
+
registerDocBlocks(docBlocks);
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
// src/docs/kb-update-pipeline.docblock.ts
|
|
2
|
+
import { registerDocBlocks } from "@contractspec/lib.contracts/docs";
|
|
3
|
+
var docBlocks = [
|
|
4
|
+
{
|
|
5
|
+
id: "docs.examples.kb-update-pipeline.goal",
|
|
6
|
+
title: "KB Update Pipeline — Goal",
|
|
7
|
+
summary: "Automation proposes KB patches; humans verify; publishing is blocked until approvals are complete.",
|
|
8
|
+
kind: "goal",
|
|
9
|
+
visibility: "public",
|
|
10
|
+
route: "/docs/examples/kb-update-pipeline/goal",
|
|
11
|
+
tags: ["knowledge", "pipeline", "hitl", "audit"],
|
|
12
|
+
body: `## Why it matters
|
|
13
|
+
- Keeps humans as the verifiers (HITL) while automation does the busywork.
|
|
14
|
+
- Produces an auditable chain: source change -> diff -> proposal -> review -> publish.
|
|
15
|
+
|
|
16
|
+
## Guardrails
|
|
17
|
+
- High-risk changes require expert approval.
|
|
18
|
+
- Publishing fails if any included rule versions are not approved.
|
|
19
|
+
- Review requests emit notifications/events.`
|
|
20
|
+
},
|
|
21
|
+
{
|
|
22
|
+
id: "docs.examples.kb-update-pipeline.reference",
|
|
23
|
+
title: "KB Update Pipeline — Reference",
|
|
24
|
+
summary: "Entities, contracts, and events for the KB update pipeline example.",
|
|
25
|
+
kind: "reference",
|
|
26
|
+
visibility: "public",
|
|
27
|
+
route: "/docs/examples/kb-update-pipeline",
|
|
28
|
+
tags: ["knowledge", "reference"],
|
|
29
|
+
body: `## Contracts
|
|
30
|
+
- kbPipeline.runWatch
|
|
31
|
+
- kbPipeline.createReviewTask
|
|
32
|
+
- kbPipeline.submitDecision
|
|
33
|
+
- kbPipeline.publishIfReady
|
|
34
|
+
|
|
35
|
+
## Events
|
|
36
|
+
- kb.change.detected
|
|
37
|
+
- kb.change.summarized
|
|
38
|
+
- kb.patch.proposed
|
|
39
|
+
- kb.review.requested
|
|
40
|
+
- kb.review.decided`
|
|
41
|
+
}
|
|
42
|
+
];
|
|
43
|
+
registerDocBlocks(docBlocks);
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
// src/entities/models.ts
|
|
2
|
+
import {
|
|
3
|
+
ScalarTypeEnum,
|
|
4
|
+
defineEnum,
|
|
5
|
+
defineSchemaModel
|
|
6
|
+
} from "@contractspec/lib.schema";
|
|
7
|
+
var ChangeRiskLevelEnum = defineEnum("ChangeRiskLevel", [
|
|
8
|
+
"low",
|
|
9
|
+
"medium",
|
|
10
|
+
"high"
|
|
11
|
+
]);
|
|
12
|
+
var ReviewAssignedRoleEnum = defineEnum("ReviewAssignedRole", [
|
|
13
|
+
"curator",
|
|
14
|
+
"expert"
|
|
15
|
+
]);
|
|
16
|
+
var ReviewDecisionEnum = defineEnum("ReviewDecision", [
|
|
17
|
+
"approve",
|
|
18
|
+
"reject"
|
|
19
|
+
]);
|
|
20
|
+
var ChangeCandidateModel = defineSchemaModel({
|
|
21
|
+
name: "ChangeCandidate",
|
|
22
|
+
description: "Candidate change detected in a source document.",
|
|
23
|
+
fields: {
|
|
24
|
+
id: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
25
|
+
sourceDocumentId: {
|
|
26
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
27
|
+
isOptional: false
|
|
28
|
+
},
|
|
29
|
+
detectedAt: { type: ScalarTypeEnum.DateTime(), isOptional: false },
|
|
30
|
+
diffSummary: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
31
|
+
riskLevel: { type: ChangeRiskLevelEnum, isOptional: false }
|
|
32
|
+
}
|
|
33
|
+
});
|
|
34
|
+
var ReviewTaskModel = defineSchemaModel({
|
|
35
|
+
name: "ReviewTask",
|
|
36
|
+
description: "Human verification task for a change candidate.",
|
|
37
|
+
fields: {
|
|
38
|
+
id: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
39
|
+
changeCandidateId: {
|
|
40
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
41
|
+
isOptional: false
|
|
42
|
+
},
|
|
43
|
+
status: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
44
|
+
assignedRole: { type: ReviewAssignedRoleEnum, isOptional: false },
|
|
45
|
+
decision: { type: ReviewDecisionEnum, isOptional: true },
|
|
46
|
+
decidedAt: { type: ScalarTypeEnum.DateTime(), isOptional: true },
|
|
47
|
+
decidedBy: { type: ScalarTypeEnum.String_unsecure(), isOptional: true }
|
|
48
|
+
}
|
|
49
|
+
});
|
|
50
|
+
export {
|
|
51
|
+
ReviewTaskModel,
|
|
52
|
+
ReviewDecisionEnum,
|
|
53
|
+
ReviewAssignedRoleEnum,
|
|
54
|
+
ChangeRiskLevelEnum,
|
|
55
|
+
ChangeCandidateModel
|
|
56
|
+
};
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
// src/entities/models.ts
|
|
2
|
+
import {
|
|
3
|
+
ScalarTypeEnum,
|
|
4
|
+
defineEnum,
|
|
5
|
+
defineSchemaModel
|
|
6
|
+
} from "@contractspec/lib.schema";
|
|
7
|
+
var ChangeRiskLevelEnum = defineEnum("ChangeRiskLevel", [
|
|
8
|
+
"low",
|
|
9
|
+
"medium",
|
|
10
|
+
"high"
|
|
11
|
+
]);
|
|
12
|
+
var ReviewAssignedRoleEnum = defineEnum("ReviewAssignedRole", [
|
|
13
|
+
"curator",
|
|
14
|
+
"expert"
|
|
15
|
+
]);
|
|
16
|
+
var ReviewDecisionEnum = defineEnum("ReviewDecision", [
|
|
17
|
+
"approve",
|
|
18
|
+
"reject"
|
|
19
|
+
]);
|
|
20
|
+
var ChangeCandidateModel = defineSchemaModel({
|
|
21
|
+
name: "ChangeCandidate",
|
|
22
|
+
description: "Candidate change detected in a source document.",
|
|
23
|
+
fields: {
|
|
24
|
+
id: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
25
|
+
sourceDocumentId: {
|
|
26
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
27
|
+
isOptional: false
|
|
28
|
+
},
|
|
29
|
+
detectedAt: { type: ScalarTypeEnum.DateTime(), isOptional: false },
|
|
30
|
+
diffSummary: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
31
|
+
riskLevel: { type: ChangeRiskLevelEnum, isOptional: false }
|
|
32
|
+
}
|
|
33
|
+
});
|
|
34
|
+
var ReviewTaskModel = defineSchemaModel({
|
|
35
|
+
name: "ReviewTask",
|
|
36
|
+
description: "Human verification task for a change candidate.",
|
|
37
|
+
fields: {
|
|
38
|
+
id: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
39
|
+
changeCandidateId: {
|
|
40
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
41
|
+
isOptional: false
|
|
42
|
+
},
|
|
43
|
+
status: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
44
|
+
assignedRole: { type: ReviewAssignedRoleEnum, isOptional: false },
|
|
45
|
+
decision: { type: ReviewDecisionEnum, isOptional: true },
|
|
46
|
+
decidedAt: { type: ScalarTypeEnum.DateTime(), isOptional: true },
|
|
47
|
+
decidedBy: { type: ScalarTypeEnum.String_unsecure(), isOptional: true }
|
|
48
|
+
}
|
|
49
|
+
});
|
|
50
|
+
export {
|
|
51
|
+
ReviewTaskModel,
|
|
52
|
+
ReviewDecisionEnum,
|
|
53
|
+
ReviewAssignedRoleEnum,
|
|
54
|
+
ChangeRiskLevelEnum,
|
|
55
|
+
ChangeCandidateModel
|
|
56
|
+
};
|
|
@@ -0,0 +1,132 @@
|
|
|
1
|
+
// src/events.ts
|
|
2
|
+
import {
|
|
3
|
+
defineEvent,
|
|
4
|
+
defineSchemaModel,
|
|
5
|
+
StabilityEnum
|
|
6
|
+
} from "@contractspec/lib.contracts";
|
|
7
|
+
import { ScalarTypeEnum } from "@contractspec/lib.schema";
|
|
8
|
+
var KbChangeDetectedPayload = defineSchemaModel({
|
|
9
|
+
name: "KbChangeDetectedPayload",
|
|
10
|
+
description: "Emitted when a source change is detected.",
|
|
11
|
+
fields: {
|
|
12
|
+
changeCandidateId: {
|
|
13
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
14
|
+
isOptional: false
|
|
15
|
+
},
|
|
16
|
+
sourceDocumentId: {
|
|
17
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
18
|
+
isOptional: false
|
|
19
|
+
},
|
|
20
|
+
riskLevel: { type: ScalarTypeEnum.String_unsecure(), isOptional: false }
|
|
21
|
+
}
|
|
22
|
+
});
|
|
23
|
+
var KbChangeDetectedEvent = defineEvent({
|
|
24
|
+
meta: {
|
|
25
|
+
key: "kb.change.detected",
|
|
26
|
+
version: "1.0.0",
|
|
27
|
+
description: "KB source change detected.",
|
|
28
|
+
stability: StabilityEnum.Experimental,
|
|
29
|
+
owners: [],
|
|
30
|
+
tags: []
|
|
31
|
+
},
|
|
32
|
+
payload: KbChangeDetectedPayload
|
|
33
|
+
});
|
|
34
|
+
var KbChangeSummarizedPayload = defineSchemaModel({
|
|
35
|
+
name: "KbChangeSummarizedPayload",
|
|
36
|
+
description: "Emitted when a change summary is produced.",
|
|
37
|
+
fields: {
|
|
38
|
+
changeCandidateId: {
|
|
39
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
40
|
+
isOptional: false
|
|
41
|
+
},
|
|
42
|
+
summary: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
43
|
+
riskLevel: { type: ScalarTypeEnum.String_unsecure(), isOptional: false }
|
|
44
|
+
}
|
|
45
|
+
});
|
|
46
|
+
var KbChangeSummarizedEvent = defineEvent({
|
|
47
|
+
meta: {
|
|
48
|
+
key: "kb.change.summarized",
|
|
49
|
+
version: "1.0.0",
|
|
50
|
+
description: "KB change summarized.",
|
|
51
|
+
stability: StabilityEnum.Experimental,
|
|
52
|
+
owners: [],
|
|
53
|
+
tags: []
|
|
54
|
+
},
|
|
55
|
+
payload: KbChangeSummarizedPayload
|
|
56
|
+
});
|
|
57
|
+
var KbPatchProposedPayload = defineSchemaModel({
|
|
58
|
+
name: "KbPatchProposedPayload",
|
|
59
|
+
description: "Emitted when draft rule patches are proposed.",
|
|
60
|
+
fields: {
|
|
61
|
+
changeCandidateId: {
|
|
62
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
63
|
+
isOptional: false
|
|
64
|
+
},
|
|
65
|
+
proposedRuleVersionIds: {
|
|
66
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
67
|
+
isArray: true,
|
|
68
|
+
isOptional: false
|
|
69
|
+
}
|
|
70
|
+
}
|
|
71
|
+
});
|
|
72
|
+
var KbPatchProposedEvent = defineEvent({
|
|
73
|
+
meta: {
|
|
74
|
+
key: "kb.patch.proposed",
|
|
75
|
+
version: "1.0.0",
|
|
76
|
+
description: "KB rule patch proposed (draft versions created).",
|
|
77
|
+
stability: StabilityEnum.Experimental,
|
|
78
|
+
owners: [],
|
|
79
|
+
tags: []
|
|
80
|
+
},
|
|
81
|
+
payload: KbPatchProposedPayload
|
|
82
|
+
});
|
|
83
|
+
var KbReviewRequestedPayload = defineSchemaModel({
|
|
84
|
+
name: "KbReviewRequestedPayload",
|
|
85
|
+
description: "Emitted when a review is requested.",
|
|
86
|
+
fields: {
|
|
87
|
+
reviewTaskId: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
88
|
+
changeCandidateId: {
|
|
89
|
+
type: ScalarTypeEnum.String_unsecure(),
|
|
90
|
+
isOptional: false
|
|
91
|
+
},
|
|
92
|
+
assignedRole: { type: ScalarTypeEnum.String_unsecure(), isOptional: false }
|
|
93
|
+
}
|
|
94
|
+
});
|
|
95
|
+
var KbReviewRequestedEvent = defineEvent({
|
|
96
|
+
meta: {
|
|
97
|
+
key: "kb.review.requested",
|
|
98
|
+
version: "1.0.0",
|
|
99
|
+
description: "KB review requested.",
|
|
100
|
+
stability: StabilityEnum.Experimental,
|
|
101
|
+
owners: [],
|
|
102
|
+
tags: []
|
|
103
|
+
},
|
|
104
|
+
payload: KbReviewRequestedPayload
|
|
105
|
+
});
|
|
106
|
+
var KbReviewDecidedPayload = defineSchemaModel({
|
|
107
|
+
name: "KbReviewDecidedPayload",
|
|
108
|
+
description: "Emitted when a review task is decided.",
|
|
109
|
+
fields: {
|
|
110
|
+
reviewTaskId: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
111
|
+
decision: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },
|
|
112
|
+
decidedBy: { type: ScalarTypeEnum.String_unsecure(), isOptional: false }
|
|
113
|
+
}
|
|
114
|
+
});
|
|
115
|
+
var KbReviewDecidedEvent = defineEvent({
|
|
116
|
+
meta: {
|
|
117
|
+
key: "kb.review.decided",
|
|
118
|
+
version: "1.0.0",
|
|
119
|
+
description: "KB review decided.",
|
|
120
|
+
stability: StabilityEnum.Experimental,
|
|
121
|
+
owners: [],
|
|
122
|
+
tags: []
|
|
123
|
+
},
|
|
124
|
+
payload: KbReviewDecidedPayload
|
|
125
|
+
});
|
|
126
|
+
export {
|
|
127
|
+
KbReviewRequestedEvent,
|
|
128
|
+
KbReviewDecidedEvent,
|
|
129
|
+
KbPatchProposedEvent,
|
|
130
|
+
KbChangeSummarizedEvent,
|
|
131
|
+
KbChangeDetectedEvent
|
|
132
|
+
};
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
// src/example.ts
|
|
2
|
+
import { defineExample } from "@contractspec/lib.contracts";
|
|
3
|
+
var example = defineExample({
|
|
4
|
+
meta: {
|
|
5
|
+
key: "kb-update-pipeline",
|
|
6
|
+
version: "1.0.0",
|
|
7
|
+
title: "KB Update Pipeline",
|
|
8
|
+
description: "Automation proposes KB updates; humans verify; everything audited and notified.",
|
|
9
|
+
kind: "knowledge",
|
|
10
|
+
visibility: "public",
|
|
11
|
+
stability: "experimental",
|
|
12
|
+
owners: ["@platform.core"],
|
|
13
|
+
tags: ["knowledge", "pipeline", "hitl", "audit"]
|
|
14
|
+
},
|
|
15
|
+
docs: {
|
|
16
|
+
rootDocId: "docs.examples.kb-update-pipeline"
|
|
17
|
+
},
|
|
18
|
+
entrypoints: {
|
|
19
|
+
packageName: "@contractspec/example.kb-update-pipeline",
|
|
20
|
+
feature: "./feature",
|
|
21
|
+
contracts: "./contracts",
|
|
22
|
+
handlers: "./handlers",
|
|
23
|
+
docs: "./docs"
|
|
24
|
+
},
|
|
25
|
+
surfaces: {
|
|
26
|
+
templates: true,
|
|
27
|
+
sandbox: { enabled: true, modes: ["markdown", "specs", "builder"] },
|
|
28
|
+
studio: { enabled: true, installable: true },
|
|
29
|
+
mcp: { enabled: true }
|
|
30
|
+
}
|
|
31
|
+
});
|
|
32
|
+
var example_default = example;
|
|
33
|
+
export {
|
|
34
|
+
example_default as default
|
|
35
|
+
};
|
|
@@ -0,0 +1,109 @@
|
|
|
1
|
+
// src/handlers/memory.handlers.ts
|
|
2
|
+
function createPipelineMemoryStore() {
|
|
3
|
+
return {
|
|
4
|
+
candidates: new Map,
|
|
5
|
+
reviewTasks: new Map,
|
|
6
|
+
proposedRuleVersionIdsByCandidate: new Map,
|
|
7
|
+
approvedRuleVersionIds: new Set,
|
|
8
|
+
notifications: []
|
|
9
|
+
};
|
|
10
|
+
}
|
|
11
|
+
function stableId(prefix, value) {
|
|
12
|
+
return `${prefix}_${value.replace(/[^a-zA-Z0-9_-]/g, "_")}`;
|
|
13
|
+
}
|
|
14
|
+
function createPipelineMemoryHandlers(store) {
|
|
15
|
+
async function runWatch(input) {
|
|
16
|
+
const candidates = [...store.candidates.values()].filter((c) => c.sourceDocumentId.startsWith(`${input.jurisdiction}_`) || true);
|
|
17
|
+
return { candidates };
|
|
18
|
+
}
|
|
19
|
+
async function createReviewTask(input) {
|
|
20
|
+
const candidate = store.candidates.get(input.changeCandidateId);
|
|
21
|
+
if (!candidate)
|
|
22
|
+
throw new Error("CHANGE_CANDIDATE_NOT_FOUND");
|
|
23
|
+
const assignedRole = candidate.riskLevel === "high" ? "expert" : "curator";
|
|
24
|
+
const id = stableId("review", input.changeCandidateId);
|
|
25
|
+
const task = {
|
|
26
|
+
id,
|
|
27
|
+
changeCandidateId: input.changeCandidateId,
|
|
28
|
+
status: "open",
|
|
29
|
+
assignedRole,
|
|
30
|
+
decision: undefined,
|
|
31
|
+
decidedAt: undefined,
|
|
32
|
+
decidedBy: undefined
|
|
33
|
+
};
|
|
34
|
+
store.reviewTasks.set(id, task);
|
|
35
|
+
store.notifications.push({
|
|
36
|
+
kind: "kb.review.requested",
|
|
37
|
+
reviewTaskId: id,
|
|
38
|
+
changeCandidateId: input.changeCandidateId,
|
|
39
|
+
assignedRole,
|
|
40
|
+
createdAt: new Date
|
|
41
|
+
});
|
|
42
|
+
return task;
|
|
43
|
+
}
|
|
44
|
+
async function proposeRulePatch(input) {
|
|
45
|
+
if (!store.candidates.has(input.changeCandidateId)) {
|
|
46
|
+
throw new Error("CHANGE_CANDIDATE_NOT_FOUND");
|
|
47
|
+
}
|
|
48
|
+
store.proposedRuleVersionIdsByCandidate.set(input.changeCandidateId, [
|
|
49
|
+
...input.proposedRuleVersionIds
|
|
50
|
+
]);
|
|
51
|
+
return { proposedRuleVersionIds: [...input.proposedRuleVersionIds] };
|
|
52
|
+
}
|
|
53
|
+
async function markRuleVersionApproved(input) {
|
|
54
|
+
store.approvedRuleVersionIds.add(input.ruleVersionId);
|
|
55
|
+
return { ruleVersionId: input.ruleVersionId };
|
|
56
|
+
}
|
|
57
|
+
async function submitDecision(input) {
|
|
58
|
+
const task = store.reviewTasks.get(input.reviewTaskId);
|
|
59
|
+
if (!task)
|
|
60
|
+
throw new Error("REVIEW_TASK_NOT_FOUND");
|
|
61
|
+
const candidate = store.candidates.get(task.changeCandidateId);
|
|
62
|
+
if (!candidate)
|
|
63
|
+
throw new Error("CHANGE_CANDIDATE_NOT_FOUND");
|
|
64
|
+
if (candidate.riskLevel === "high" && input.decision === "approve") {
|
|
65
|
+
if (input.decidedByRole !== "expert")
|
|
66
|
+
throw new Error("FORBIDDEN_ROLE");
|
|
67
|
+
}
|
|
68
|
+
const decided = {
|
|
69
|
+
...task,
|
|
70
|
+
status: "decided",
|
|
71
|
+
decision: input.decision,
|
|
72
|
+
decidedAt: new Date,
|
|
73
|
+
decidedBy: input.decidedBy
|
|
74
|
+
};
|
|
75
|
+
store.reviewTasks.set(decided.id, decided);
|
|
76
|
+
return decided;
|
|
77
|
+
}
|
|
78
|
+
async function publishIfReady(_input) {
|
|
79
|
+
const openTasks = [...store.reviewTasks.values()].filter((t) => t.status !== "decided");
|
|
80
|
+
if (openTasks.length) {
|
|
81
|
+
throw new Error("NOT_READY");
|
|
82
|
+
}
|
|
83
|
+
const rejected = [...store.reviewTasks.values()].some((t) => t.decision === "reject");
|
|
84
|
+
if (rejected)
|
|
85
|
+
return { published: false, reason: "REJECTED" };
|
|
86
|
+
for (const task of store.reviewTasks.values()) {
|
|
87
|
+
if (task.decision !== "approve")
|
|
88
|
+
continue;
|
|
89
|
+
const proposed = store.proposedRuleVersionIdsByCandidate.get(task.changeCandidateId) ?? [];
|
|
90
|
+
const unapproved = proposed.filter((id) => !store.approvedRuleVersionIds.has(id));
|
|
91
|
+
if (unapproved.length) {
|
|
92
|
+
throw new Error("NOT_READY");
|
|
93
|
+
}
|
|
94
|
+
}
|
|
95
|
+
return { published: true };
|
|
96
|
+
}
|
|
97
|
+
return {
|
|
98
|
+
runWatch,
|
|
99
|
+
createReviewTask,
|
|
100
|
+
proposeRulePatch,
|
|
101
|
+
markRuleVersionApproved,
|
|
102
|
+
submitDecision,
|
|
103
|
+
publishIfReady
|
|
104
|
+
};
|
|
105
|
+
}
|
|
106
|
+
export {
|
|
107
|
+
createPipelineMemoryStore,
|
|
108
|
+
createPipelineMemoryHandlers
|
|
109
|
+
};
|