@fuzdev/fuz_app 0.55.0 → 0.57.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (333) hide show
  1. package/dist/actions/CLAUDE.md +211 -155
  2. package/dist/actions/action_bridge.d.ts +8 -5
  3. package/dist/actions/action_bridge.d.ts.map +1 -1
  4. package/dist/actions/action_bridge.js +1 -11
  5. package/dist/actions/action_codegen.d.ts +19 -0
  6. package/dist/actions/action_codegen.d.ts.map +1 -1
  7. package/dist/actions/action_codegen.js +20 -14
  8. package/dist/actions/action_registry.d.ts.map +1 -1
  9. package/dist/actions/action_registry.js +5 -2
  10. package/dist/actions/action_rpc.d.ts +110 -44
  11. package/dist/actions/action_rpc.d.ts.map +1 -1
  12. package/dist/actions/action_rpc.js +92 -287
  13. package/dist/actions/action_spec.d.ts +55 -16
  14. package/dist/actions/action_spec.d.ts.map +1 -1
  15. package/dist/actions/action_spec.js +16 -11
  16. package/dist/actions/action_types.d.ts +28 -60
  17. package/dist/actions/action_types.d.ts.map +1 -1
  18. package/dist/actions/action_types.js +13 -5
  19. package/dist/actions/broadcast_api.d.ts +2 -2
  20. package/dist/actions/broadcast_api.js +2 -2
  21. package/dist/actions/compile_action_registry.d.ts +50 -0
  22. package/dist/actions/compile_action_registry.d.ts.map +1 -0
  23. package/dist/actions/compile_action_registry.js +69 -0
  24. package/dist/actions/heartbeat.d.ts +8 -4
  25. package/dist/actions/heartbeat.d.ts.map +1 -1
  26. package/dist/actions/heartbeat.js +5 -4
  27. package/dist/actions/perform_action.d.ts +145 -0
  28. package/dist/actions/perform_action.d.ts.map +1 -0
  29. package/dist/actions/perform_action.js +258 -0
  30. package/dist/actions/register_action_ws.d.ts +44 -38
  31. package/dist/actions/register_action_ws.d.ts.map +1 -1
  32. package/dist/actions/register_action_ws.js +101 -159
  33. package/dist/actions/register_ws_endpoint.d.ts +2 -10
  34. package/dist/actions/register_ws_endpoint.d.ts.map +1 -1
  35. package/dist/actions/register_ws_endpoint.js +32 -10
  36. package/dist/actions/transports_ws_auth_guard.d.ts +1 -1
  37. package/dist/actions/transports_ws_auth_guard.js +1 -1
  38. package/dist/actions/transports_ws_backend.d.ts +1 -1
  39. package/dist/actions/transports_ws_backend.js +1 -1
  40. package/dist/auth/CLAUDE.md +673 -442
  41. package/dist/auth/account_action_specs.d.ts +28 -7
  42. package/dist/auth/account_action_specs.d.ts.map +1 -1
  43. package/dist/auth/account_action_specs.js +7 -7
  44. package/dist/auth/account_actions.d.ts +8 -14
  45. package/dist/auth/account_actions.d.ts.map +1 -1
  46. package/dist/auth/account_actions.js +26 -32
  47. package/dist/auth/account_queries.d.ts +46 -13
  48. package/dist/auth/account_queries.d.ts.map +1 -1
  49. package/dist/auth/account_queries.js +73 -33
  50. package/dist/auth/account_routes.d.ts +4 -3
  51. package/dist/auth/account_routes.d.ts.map +1 -1
  52. package/dist/auth/account_routes.js +58 -33
  53. package/dist/auth/account_schema.d.ts +46 -54
  54. package/dist/auth/account_schema.d.ts.map +1 -1
  55. package/dist/auth/account_schema.js +21 -48
  56. package/dist/auth/admin_action_specs.d.ts +55 -21
  57. package/dist/auth/admin_action_specs.d.ts.map +1 -1
  58. package/dist/auth/admin_action_specs.js +42 -26
  59. package/dist/auth/admin_actions.d.ts +14 -21
  60. package/dist/auth/admin_actions.d.ts.map +1 -1
  61. package/dist/auth/admin_actions.js +47 -44
  62. package/dist/auth/audit_emitter.d.ts +160 -0
  63. package/dist/auth/audit_emitter.d.ts.map +1 -0
  64. package/dist/auth/audit_emitter.js +83 -0
  65. package/dist/auth/audit_log_queries.d.ts +17 -87
  66. package/dist/auth/audit_log_queries.d.ts.map +1 -1
  67. package/dist/auth/audit_log_queries.js +17 -96
  68. package/dist/auth/audit_log_routes.d.ts +1 -1
  69. package/dist/auth/audit_log_routes.d.ts.map +1 -1
  70. package/dist/auth/audit_log_routes.js +7 -3
  71. package/dist/auth/audit_log_schema.d.ts +48 -42
  72. package/dist/auth/audit_log_schema.d.ts.map +1 -1
  73. package/dist/auth/audit_log_schema.js +56 -43
  74. package/dist/auth/auth_guard_resolver.d.ts +44 -0
  75. package/dist/auth/auth_guard_resolver.d.ts.map +1 -0
  76. package/dist/auth/auth_guard_resolver.js +56 -0
  77. package/dist/auth/bootstrap_account.d.ts +7 -7
  78. package/dist/auth/bootstrap_account.d.ts.map +1 -1
  79. package/dist/auth/bootstrap_account.js +7 -7
  80. package/dist/auth/bootstrap_routes.d.ts.map +1 -1
  81. package/dist/auth/bootstrap_routes.js +11 -10
  82. package/dist/auth/cleanup.d.ts +20 -26
  83. package/dist/auth/cleanup.d.ts.map +1 -1
  84. package/dist/auth/cleanup.js +33 -47
  85. package/dist/auth/credential_type_schema.d.ts +115 -0
  86. package/dist/auth/credential_type_schema.d.ts.map +1 -0
  87. package/dist/auth/credential_type_schema.js +127 -0
  88. package/dist/auth/daemon_token_middleware.d.ts +1 -1
  89. package/dist/auth/daemon_token_middleware.js +3 -3
  90. package/dist/auth/ddl.d.ts +2 -2
  91. package/dist/auth/ddl.d.ts.map +1 -1
  92. package/dist/auth/ddl.js +6 -6
  93. package/dist/auth/deps.d.ts +7 -32
  94. package/dist/auth/deps.d.ts.map +1 -1
  95. package/dist/auth/grant_path_schema.d.ts +117 -0
  96. package/dist/auth/grant_path_schema.d.ts.map +1 -0
  97. package/dist/auth/grant_path_schema.js +137 -0
  98. package/dist/auth/invite_queries.d.ts +12 -1
  99. package/dist/auth/invite_queries.d.ts.map +1 -1
  100. package/dist/auth/invite_queries.js +12 -1
  101. package/dist/auth/invite_schema.d.ts +1 -1
  102. package/dist/auth/invite_schema.d.ts.map +1 -1
  103. package/dist/auth/invite_schema.js +1 -1
  104. package/dist/auth/middleware.d.ts.map +1 -1
  105. package/dist/auth/middleware.js +5 -2
  106. package/dist/auth/migrations.d.ts +22 -7
  107. package/dist/auth/migrations.d.ts.map +1 -1
  108. package/dist/auth/migrations.js +64 -25
  109. package/dist/auth/request_context.d.ts +157 -170
  110. package/dist/auth/request_context.d.ts.map +1 -1
  111. package/dist/auth/request_context.js +224 -268
  112. package/dist/auth/{permit_offer_action_specs.d.ts → role_grant_offer_action_specs.d.ts} +130 -100
  113. package/dist/auth/role_grant_offer_action_specs.d.ts.map +1 -0
  114. package/dist/auth/role_grant_offer_action_specs.js +262 -0
  115. package/dist/auth/role_grant_offer_actions.d.ts +104 -0
  116. package/dist/auth/role_grant_offer_actions.d.ts.map +1 -0
  117. package/dist/auth/{permit_offer_actions.js → role_grant_offer_actions.js} +153 -140
  118. package/dist/auth/{permit_offer_notifications.d.ts → role_grant_offer_notifications.d.ts} +80 -70
  119. package/dist/auth/role_grant_offer_notifications.d.ts.map +1 -0
  120. package/dist/auth/role_grant_offer_notifications.js +182 -0
  121. package/dist/auth/{permit_offer_queries.d.ts → role_grant_offer_queries.d.ts} +64 -64
  122. package/dist/auth/role_grant_offer_queries.d.ts.map +1 -0
  123. package/dist/auth/{permit_offer_queries.js → role_grant_offer_queries.js} +136 -123
  124. package/dist/auth/role_grant_offer_schema.d.ts +150 -0
  125. package/dist/auth/role_grant_offer_schema.d.ts.map +1 -0
  126. package/dist/auth/{permit_offer_schema.js → role_grant_offer_schema.js} +55 -36
  127. package/dist/auth/role_grant_queries.d.ts +231 -0
  128. package/dist/auth/role_grant_queries.d.ts.map +1 -0
  129. package/dist/auth/role_grant_queries.js +320 -0
  130. package/dist/auth/role_schema.d.ts +150 -40
  131. package/dist/auth/role_schema.d.ts.map +1 -1
  132. package/dist/auth/role_schema.js +144 -45
  133. package/dist/auth/scope_kind_schema.d.ts +96 -0
  134. package/dist/auth/scope_kind_schema.d.ts.map +1 -0
  135. package/dist/auth/scope_kind_schema.js +94 -0
  136. package/dist/auth/self_service_role_action_specs.d.ts +4 -1
  137. package/dist/auth/self_service_role_action_specs.d.ts.map +1 -1
  138. package/dist/auth/self_service_role_action_specs.js +2 -2
  139. package/dist/auth/self_service_role_actions.d.ts +35 -29
  140. package/dist/auth/self_service_role_actions.d.ts.map +1 -1
  141. package/dist/auth/self_service_role_actions.js +58 -48
  142. package/dist/auth/session_cookie.d.ts +43 -6
  143. package/dist/auth/session_cookie.d.ts.map +1 -1
  144. package/dist/auth/session_cookie.js +31 -5
  145. package/dist/auth/session_middleware.d.ts +37 -3
  146. package/dist/auth/session_middleware.d.ts.map +1 -1
  147. package/dist/auth/session_middleware.js +33 -7
  148. package/dist/auth/signup_routes.d.ts.map +1 -1
  149. package/dist/auth/signup_routes.js +48 -19
  150. package/dist/auth/standard_action_specs.d.ts +2 -2
  151. package/dist/auth/standard_action_specs.js +4 -4
  152. package/dist/auth/standard_rpc_actions.d.ts +23 -19
  153. package/dist/auth/standard_rpc_actions.d.ts.map +1 -1
  154. package/dist/auth/standard_rpc_actions.js +12 -12
  155. package/dist/db/migrate.d.ts +1 -1
  156. package/dist/db/migrate.js +1 -1
  157. package/dist/dev/setup.d.ts +2 -2
  158. package/dist/dev/setup.d.ts.map +1 -1
  159. package/dist/dev/setup.js +4 -4
  160. package/dist/env/load.d.ts +1 -1
  161. package/dist/env/load.js +1 -1
  162. package/dist/hono_context.d.ts +27 -45
  163. package/dist/hono_context.d.ts.map +1 -1
  164. package/dist/hono_context.js +14 -28
  165. package/dist/http/CLAUDE.md +235 -121
  166. package/dist/http/auth_shape.d.ts +191 -0
  167. package/dist/http/auth_shape.d.ts.map +1 -0
  168. package/dist/http/auth_shape.js +237 -0
  169. package/dist/http/common_routes.js +3 -3
  170. package/dist/http/db_routes.d.ts +4 -0
  171. package/dist/http/db_routes.d.ts.map +1 -1
  172. package/dist/http/db_routes.js +44 -7
  173. package/dist/http/error_schemas.d.ts +72 -39
  174. package/dist/http/error_schemas.d.ts.map +1 -1
  175. package/dist/http/error_schemas.js +81 -33
  176. package/dist/http/pending_effects.d.ts +71 -18
  177. package/dist/http/pending_effects.d.ts.map +1 -1
  178. package/dist/http/pending_effects.js +87 -18
  179. package/dist/http/proxy.d.ts +52 -5
  180. package/dist/http/proxy.d.ts.map +1 -1
  181. package/dist/http/proxy.js +92 -14
  182. package/dist/http/route_spec.d.ts +89 -75
  183. package/dist/http/route_spec.d.ts.map +1 -1
  184. package/dist/http/route_spec.js +54 -72
  185. package/dist/http/schema_helpers.d.ts +3 -14
  186. package/dist/http/schema_helpers.d.ts.map +1 -1
  187. package/dist/http/schema_helpers.js +2 -14
  188. package/dist/http/surface.d.ts +2 -10
  189. package/dist/http/surface.d.ts.map +1 -1
  190. package/dist/http/surface.js +3 -4
  191. package/dist/http/surface_query.d.ts +39 -35
  192. package/dist/http/surface_query.d.ts.map +1 -1
  193. package/dist/http/surface_query.js +79 -36
  194. package/dist/primitive_schemas.d.ts +39 -0
  195. package/dist/primitive_schemas.d.ts.map +1 -0
  196. package/dist/primitive_schemas.js +40 -0
  197. package/dist/realtime/sse_auth_guard.d.ts +5 -5
  198. package/dist/realtime/sse_auth_guard.js +9 -9
  199. package/dist/runtime/mock.d.ts +1 -1
  200. package/dist/runtime/mock.js +1 -1
  201. package/dist/server/app_backend.d.ts +14 -11
  202. package/dist/server/app_backend.d.ts.map +1 -1
  203. package/dist/server/app_backend.js +12 -8
  204. package/dist/server/app_server.d.ts +7 -7
  205. package/dist/server/app_server.d.ts.map +1 -1
  206. package/dist/server/app_server.js +35 -40
  207. package/dist/server/validate_nginx.d.ts +1 -1
  208. package/dist/server/validate_nginx.js +1 -1
  209. package/dist/testing/CLAUDE.md +50 -38
  210. package/dist/testing/admin_integration.d.ts +5 -6
  211. package/dist/testing/admin_integration.d.ts.map +1 -1
  212. package/dist/testing/admin_integration.js +87 -85
  213. package/dist/testing/app_server.d.ts +11 -14
  214. package/dist/testing/app_server.d.ts.map +1 -1
  215. package/dist/testing/app_server.js +16 -15
  216. package/dist/testing/assertions.d.ts.map +1 -1
  217. package/dist/testing/assertions.js +2 -1
  218. package/dist/testing/attack_surface.d.ts.map +1 -1
  219. package/dist/testing/attack_surface.js +15 -9
  220. package/dist/testing/audit_completeness.d.ts +2 -2
  221. package/dist/testing/audit_completeness.d.ts.map +1 -1
  222. package/dist/testing/audit_completeness.js +36 -36
  223. package/dist/testing/auth_apps.d.ts +5 -4
  224. package/dist/testing/auth_apps.d.ts.map +1 -1
  225. package/dist/testing/auth_apps.js +22 -19
  226. package/dist/testing/data_exposure.d.ts.map +1 -1
  227. package/dist/testing/data_exposure.js +5 -5
  228. package/dist/testing/db.d.ts +1 -1
  229. package/dist/testing/db.d.ts.map +1 -1
  230. package/dist/testing/db.js +4 -4
  231. package/dist/testing/db_entities.d.ts +22 -0
  232. package/dist/testing/db_entities.d.ts.map +1 -0
  233. package/dist/testing/db_entities.js +28 -0
  234. package/dist/testing/entities.d.ts +8 -7
  235. package/dist/testing/entities.d.ts.map +1 -1
  236. package/dist/testing/entities.js +21 -18
  237. package/dist/testing/integration.d.ts.map +1 -1
  238. package/dist/testing/integration.js +13 -14
  239. package/dist/testing/integration_helpers.d.ts +4 -4
  240. package/dist/testing/integration_helpers.d.ts.map +1 -1
  241. package/dist/testing/integration_helpers.js +20 -18
  242. package/dist/testing/middleware.d.ts +4 -4
  243. package/dist/testing/middleware.d.ts.map +1 -1
  244. package/dist/testing/middleware.js +12 -11
  245. package/dist/testing/rpc_attack_surface.d.ts.map +1 -1
  246. package/dist/testing/rpc_attack_surface.js +40 -24
  247. package/dist/testing/rpc_round_trip.d.ts +1 -1
  248. package/dist/testing/rpc_round_trip.d.ts.map +1 -1
  249. package/dist/testing/rpc_round_trip.js +14 -13
  250. package/dist/testing/sse_round_trip.d.ts +3 -4
  251. package/dist/testing/sse_round_trip.d.ts.map +1 -1
  252. package/dist/testing/sse_round_trip.js +7 -11
  253. package/dist/testing/standard.d.ts +1 -1
  254. package/dist/testing/stubs.d.ts +25 -0
  255. package/dist/testing/stubs.d.ts.map +1 -1
  256. package/dist/testing/stubs.js +43 -2
  257. package/dist/testing/surface_invariants.d.ts +14 -6
  258. package/dist/testing/surface_invariants.d.ts.map +1 -1
  259. package/dist/testing/surface_invariants.js +119 -43
  260. package/dist/testing/ws_round_trip.d.ts +12 -13
  261. package/dist/testing/ws_round_trip.d.ts.map +1 -1
  262. package/dist/testing/ws_round_trip.js +19 -11
  263. package/dist/ui/AdminAccounts.svelte +23 -20
  264. package/dist/ui/AdminOverview.svelte +15 -13
  265. package/dist/ui/AdminOverview.svelte.d.ts.map +1 -1
  266. package/dist/ui/{AdminPermitHistory.svelte → AdminRoleGrantHistory.svelte} +12 -12
  267. package/dist/ui/AdminRoleGrantHistory.svelte.d.ts +4 -0
  268. package/dist/ui/AdminRoleGrantHistory.svelte.d.ts.map +1 -0
  269. package/dist/ui/BootstrapForm.svelte +1 -1
  270. package/dist/ui/CLAUDE.md +60 -60
  271. package/dist/ui/{PermitOfferForm.svelte → RoleGrantOfferForm.svelte} +27 -26
  272. package/dist/ui/{PermitOfferForm.svelte.d.ts → RoleGrantOfferForm.svelte.d.ts} +7 -7
  273. package/dist/ui/RoleGrantOfferForm.svelte.d.ts.map +1 -0
  274. package/dist/ui/{PermitOfferHistory.svelte → RoleGrantOfferHistory.svelte} +12 -12
  275. package/dist/ui/{PermitOfferHistory.svelte.d.ts → RoleGrantOfferHistory.svelte.d.ts} +4 -4
  276. package/dist/ui/RoleGrantOfferHistory.svelte.d.ts.map +1 -0
  277. package/dist/ui/{PermitOfferInbox.svelte → RoleGrantOfferInbox.svelte} +14 -14
  278. package/dist/ui/{PermitOfferInbox.svelte.d.ts → RoleGrantOfferInbox.svelte.d.ts} +4 -4
  279. package/dist/ui/RoleGrantOfferInbox.svelte.d.ts.map +1 -0
  280. package/dist/ui/SignupForm.svelte +1 -1
  281. package/dist/ui/SurfaceExplorer.svelte +35 -15
  282. package/dist/ui/SurfaceExplorer.svelte.d.ts.map +1 -1
  283. package/dist/ui/account_sessions_state.svelte.d.ts +2 -3
  284. package/dist/ui/account_sessions_state.svelte.d.ts.map +1 -1
  285. package/dist/ui/account_sessions_state.svelte.js +2 -3
  286. package/dist/ui/admin_accounts_state.svelte.d.ts +18 -18
  287. package/dist/ui/admin_accounts_state.svelte.d.ts.map +1 -1
  288. package/dist/ui/admin_accounts_state.svelte.js +16 -16
  289. package/dist/ui/admin_rpc_adapters.d.ts +20 -20
  290. package/dist/ui/admin_rpc_adapters.d.ts.map +1 -1
  291. package/dist/ui/admin_rpc_adapters.js +17 -17
  292. package/dist/ui/admin_sessions_state.svelte.d.ts +2 -2
  293. package/dist/ui/admin_sessions_state.svelte.js +2 -2
  294. package/dist/ui/audit_log_state.svelte.d.ts +7 -7
  295. package/dist/ui/audit_log_state.svelte.d.ts.map +1 -1
  296. package/dist/ui/audit_log_state.svelte.js +6 -6
  297. package/dist/ui/auth_state.svelte.d.ts +3 -3
  298. package/dist/ui/auth_state.svelte.d.ts.map +1 -1
  299. package/dist/ui/auth_state.svelte.js +6 -6
  300. package/dist/ui/format_scope.d.ts +2 -2
  301. package/dist/ui/format_scope.js +2 -2
  302. package/dist/ui/{permit_offers_state.svelte.d.ts → role_grant_offers_state.svelte.d.ts} +30 -30
  303. package/dist/ui/role_grant_offers_state.svelte.d.ts.map +1 -0
  304. package/dist/ui/{permit_offers_state.svelte.js → role_grant_offers_state.svelte.js} +18 -18
  305. package/dist/ui/ui_format.js +2 -2
  306. package/package.json +3 -3
  307. package/dist/auth/permit_offer_action_specs.d.ts.map +0 -1
  308. package/dist/auth/permit_offer_action_specs.js +0 -258
  309. package/dist/auth/permit_offer_actions.d.ts +0 -110
  310. package/dist/auth/permit_offer_actions.d.ts.map +0 -1
  311. package/dist/auth/permit_offer_notifications.d.ts.map +0 -1
  312. package/dist/auth/permit_offer_notifications.js +0 -182
  313. package/dist/auth/permit_offer_queries.d.ts.map +0 -1
  314. package/dist/auth/permit_offer_schema.d.ts +0 -125
  315. package/dist/auth/permit_offer_schema.d.ts.map +0 -1
  316. package/dist/auth/permit_queries.d.ts +0 -222
  317. package/dist/auth/permit_queries.d.ts.map +0 -1
  318. package/dist/auth/permit_queries.js +0 -305
  319. package/dist/auth/require_keeper.d.ts +0 -20
  320. package/dist/auth/require_keeper.d.ts.map +0 -1
  321. package/dist/auth/require_keeper.js +0 -35
  322. package/dist/auth/route_guards.d.ts +0 -27
  323. package/dist/auth/route_guards.d.ts.map +0 -1
  324. package/dist/auth/route_guards.js +0 -38
  325. package/dist/auth/session_lifecycle.d.ts +0 -37
  326. package/dist/auth/session_lifecycle.d.ts.map +0 -1
  327. package/dist/auth/session_lifecycle.js +0 -29
  328. package/dist/ui/AdminPermitHistory.svelte.d.ts +0 -4
  329. package/dist/ui/AdminPermitHistory.svelte.d.ts.map +0 -1
  330. package/dist/ui/PermitOfferForm.svelte.d.ts.map +0 -1
  331. package/dist/ui/PermitOfferHistory.svelte.d.ts.map +0 -1
  332. package/dist/ui/PermitOfferInbox.svelte.d.ts.map +0 -1
  333. package/dist/ui/permit_offers_state.svelte.d.ts.map +0 -1
@@ -7,11 +7,11 @@
7
7
  * admin shell layout wire everything.
8
8
  *
9
9
  * Intentionally admin-only despite the backend-side
10
- * `create_standard_rpc_actions` rename (admin + permit-offer + account).
10
+ * `create_standard_rpc_actions` rename (admin + role-grant-offer + account).
11
11
  * Account-surface methods flow through `account_sessions_rpc_context`
12
- * (wired at the self-service layout), and permit-offer methods that
13
- * surface in the admin UI (`permit_offer_create`, `permit_revoke`,
14
- * `permit_offer_retract`) live inside the `AdminAccountsRpc` interface —
12
+ * (wired at the self-service layout), and role-grant-offer methods that
13
+ * surface in the admin UI (`role_grant_offer_create`, `role_grant_revoke`,
14
+ * `role_grant_offer_retract`) live inside the `AdminAccountsRpc` interface —
15
15
  * they belong to the admin UX, not a separate wire pairing. The UI side
16
16
  * and backend factory names diverge by design.
17
17
  *
@@ -21,8 +21,8 @@
21
21
  * ```
22
22
  *
23
23
  * The throwing Proxy spreads the JSON-RPC `{code, message, data?}` onto
24
- * the thrown `Error` so form components (e.g. `ui/PermitOfferForm.svelte`)
25
- * can match on `error.data?.reason` via `ERROR_OFFER_*` constants —
24
+ * the thrown `Error` so form components (e.g. `ui/RoleGrantOfferForm.svelte`)
25
+ * can match on `error.data?.reason` via `ERROR_ROLE_GRANT_OFFER_*` constants —
26
26
  * optional chaining is required because JSON-RPC `data` is spec-level
27
27
  * optional. Consumers that need a custom unwrap strategy can construct
28
28
  * their own object satisfying `AdminRpcApi` and pass it directly.
@@ -32,8 +32,8 @@
32
32
  *
33
33
  * @module
34
34
  */
35
- import type { AdminAccountListOutput, AdminSessionListOutput, AdminSessionRevokeAllInput, AdminSessionRevokeAllOutput, AdminTokenRevokeAllInput, AdminTokenRevokeAllOutput, AuditLogListInput, AuditLogListOutput, AuditLogPermitHistoryInput, AuditLogPermitHistoryOutput, InviteCreateInput, InviteCreateOutput, InviteDeleteInput, InviteDeleteOutput, InviteListOutput, AppSettingsGetOutput, AppSettingsUpdateInput, AppSettingsUpdateOutput } from '../auth/admin_action_specs.js';
36
- import type { PermitOfferCreateInput, PermitOfferCreateOutput, PermitOfferRetractInput, PermitOfferOkOutput, PermitRevokeInput, PermitRevokeOutput } from '../auth/permit_offer_action_specs.js';
35
+ import type { AdminAccountListOutput, AdminSessionListOutput, AdminSessionRevokeAllInput, AdminSessionRevokeAllOutput, AdminTokenRevokeAllInput, AdminTokenRevokeAllOutput, AuditLogListInput, AuditLogListOutput, AuditLogRoleGrantHistoryInput, AuditLogRoleGrantHistoryOutput, InviteCreateInput, InviteCreateOutput, InviteDeleteInput, InviteDeleteOutput, InviteListOutput, AppSettingsGetOutput, AppSettingsUpdateInput, AppSettingsUpdateOutput } from '../auth/admin_action_specs.js';
36
+ import type { RoleGrantOfferCreateInput, RoleGrantOfferCreateOutput, RoleGrantOfferRetractInput, RoleGrantOfferOkOutput, RoleGrantRevokeInput, RoleGrantRevokeOutput } from '../auth/role_grant_offer_action_specs.js';
37
37
  import { type AdminAccountsRpc } from './admin_accounts_state.svelte.js';
38
38
  import { type AdminInvitesRpc } from './admin_invites_state.svelte.js';
39
39
  import { type AuditLogRpc } from './audit_log_state.svelte.js';
@@ -56,15 +56,15 @@ export interface AdminRpcApi {
56
56
  admin_session_revoke_all: (input: AdminSessionRevokeAllInput) => Promise<AdminSessionRevokeAllOutput>;
57
57
  admin_token_revoke_all: (input: AdminTokenRevokeAllInput) => Promise<AdminTokenRevokeAllOutput>;
58
58
  audit_log_list: (input: AuditLogListInput) => Promise<AuditLogListOutput>;
59
- audit_log_permit_history: (input: AuditLogPermitHistoryInput) => Promise<AuditLogPermitHistoryOutput>;
59
+ audit_log_role_grant_history: (input: AuditLogRoleGrantHistoryInput) => Promise<AuditLogRoleGrantHistoryOutput>;
60
60
  invite_list: () => Promise<InviteListOutput>;
61
61
  invite_create: (input: InviteCreateInput) => Promise<InviteCreateOutput>;
62
62
  invite_delete: (input: InviteDeleteInput) => Promise<InviteDeleteOutput>;
63
63
  app_settings_get: () => Promise<AppSettingsGetOutput>;
64
64
  app_settings_update: (input: AppSettingsUpdateInput) => Promise<AppSettingsUpdateOutput>;
65
- permit_offer_create: (input: PermitOfferCreateInput) => Promise<PermitOfferCreateOutput>;
66
- permit_offer_retract: (input: PermitOfferRetractInput) => Promise<PermitOfferOkOutput>;
67
- permit_revoke: (input: PermitRevokeInput) => Promise<PermitRevokeOutput>;
65
+ role_grant_offer_create: (input: RoleGrantOfferCreateInput) => Promise<RoleGrantOfferCreateOutput>;
66
+ role_grant_offer_retract: (input: RoleGrantOfferRetractInput) => Promise<RoleGrantOfferOkOutput>;
67
+ role_grant_revoke: (input: RoleGrantRevokeInput) => Promise<RoleGrantRevokeOutput>;
68
68
  }
69
69
  /** The four admin RPC adapters assembled from a shared `api`. */
70
70
  export interface AdminRpcAdapters {
@@ -82,16 +82,16 @@ export interface AdminRpcAdapters {
82
82
  * | ----------------------------------- | ---------------------------- |
83
83
  * | `admin_accounts.list_accounts` | `admin_account_list` |
84
84
  * | `admin_accounts.list_sessions` | `admin_session_list` |
85
- * | `admin_accounts.grant_permit` | `permit_offer_create` |
86
- * | `admin_accounts.revoke_permit` | `permit_revoke` |
87
- * | `admin_accounts.retract_offer` | `permit_offer_retract` |
85
+ * | `admin_accounts.create_role_grant` | `role_grant_offer_create` |
86
+ * | `admin_accounts.revoke_role_grant` | `role_grant_revoke` |
87
+ * | `admin_accounts.retract_offer` | `role_grant_offer_retract` |
88
88
  * | `admin_accounts.session_revoke_all` | `admin_session_revoke_all` |
89
89
  * | `admin_accounts.token_revoke_all` | `admin_token_revoke_all` |
90
90
  * | `admin_invites.list` | `invite_list` |
91
91
  * | `admin_invites.create` | `invite_create` |
92
92
  * | `admin_invites.delete` | `invite_delete` |
93
93
  * | `audit_log.list` | `audit_log_list` |
94
- * | `audit_log.permit_history` | `audit_log_permit_history` |
94
+ * | `audit_log.role_grant_history` | `audit_log_role_grant_history` |
95
95
  * | `app_settings.get` | `app_settings_get` |
96
96
  * | `app_settings.update` | `app_settings_update` |
97
97
  *
@@ -103,7 +103,7 @@ export declare const create_admin_rpc_adapters: (api: AdminRpcApi) => AdminRpcAd
103
103
  /** Optional knobs alongside the adapters when wiring admin contexts. */
104
104
  export interface ProvideAdminRpcContextsOptions {
105
105
  /**
106
- * Render `{scope_id, role}` as a human label across permit-display
106
+ * Render `{scope_id, role}` as a human label across role-grant-display
107
107
  * components. Omit (or return `null`) to fall back to the raw uuid.
108
108
  */
109
109
  format_scope?: FormatScope;
@@ -120,9 +120,9 @@ export interface ProvideAdminRpcContextsOptions {
120
120
  * whole adapter set requires calling `provide_admin_rpc_contexts` again
121
121
  * during init — in practice this is one-shot at layout mount.
122
122
  *
123
- * Pass `options.format_scope` to render permit/offer `scope_id` values as
124
- * human labels across `AdminAccounts`, `AdminPermitHistory`,
125
- * `PermitOfferInbox`, `PermitOfferForm`, and `PermitOfferHistory`.
123
+ * Pass `options.format_scope` to render role_grant/offer `scope_id` values as
124
+ * human labels across `AdminAccounts`, `AdminRoleGrantHistory`,
125
+ * `RoleGrantOfferInbox`, `RoleGrantOfferForm`, and `RoleGrantOfferHistory`.
126
126
  * Components that accept a `format_scope` prop honor the prop first; the
127
127
  * context is the fallback.
128
128
  */
@@ -1 +1 @@
1
- {"version":3,"file":"admin_rpc_adapters.d.ts","sourceRoot":"../src/lib/","sources":["../../src/lib/ui/admin_rpc_adapters.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AAEH,OAAO,KAAK,EACX,sBAAsB,EACtB,sBAAsB,EACtB,0BAA0B,EAC1B,2BAA2B,EAC3B,wBAAwB,EACxB,yBAAyB,EACzB,iBAAiB,EACjB,kBAAkB,EAClB,0BAA0B,EAC1B,2BAA2B,EAC3B,iBAAiB,EACjB,kBAAkB,EAClB,iBAAiB,EACjB,kBAAkB,EAClB,gBAAgB,EAChB,oBAAoB,EACpB,sBAAsB,EACtB,uBAAuB,EACvB,MAAM,+BAA+B,CAAC;AACvC,OAAO,KAAK,EACX,sBAAsB,EACtB,uBAAuB,EACvB,uBAAuB,EACvB,mBAAmB,EACnB,iBAAiB,EACjB,kBAAkB,EAClB,MAAM,sCAAsC,CAAC;AAC9C,OAAO,EAA6B,KAAK,gBAAgB,EAAC,MAAM,kCAAkC,CAAC;AACnG,OAAO,EAA4B,KAAK,eAAe,EAAC,MAAM,iCAAiC,CAAC;AAChG,OAAO,EAAwB,KAAK,WAAW,EAAC,MAAM,6BAA6B,CAAC;AACpF,OAAO,EAA2B,KAAK,cAAc,EAAC,MAAM,gCAAgC,CAAC;AAC7F,OAAO,EAAuB,KAAK,WAAW,EAAC,MAAM,mBAAmB,CAAC;AAEzE;;;;;;;;;;GAUG;AACH,MAAM,WAAW,WAAW;IAC3B,kBAAkB,EAAE,MAAM,OAAO,CAAC,sBAAsB,CAAC,CAAC;IAC1D,kBAAkB,EAAE,MAAM,OAAO,CAAC,sBAAsB,CAAC,CAAC;IAC1D,wBAAwB,EAAE,CACzB,KAAK,EAAE,0BAA0B,KAC7B,OAAO,CAAC,2BAA2B,CAAC,CAAC;IAC1C,sBAAsB,EAAE,CAAC,KAAK,EAAE,wBAAwB,KAAK,OAAO,CAAC,yBAAyB,CAAC,CAAC;IAChG,cAAc,EAAE,CAAC,KAAK,EAAE,iBAAiB,KAAK,OAAO,CAAC,kBAAkB,CAAC,CAAC;IAC1E,wBAAwB,EAAE,CACzB,KAAK,EAAE,0BAA0B,KAC7B,OAAO,CAAC,2BAA2B,CAAC,CAAC;IAC1C,WAAW,EAAE,MAAM,OAAO,CAAC,gBAAgB,CAAC,CAAC;IAC7C,aAAa,EAAE,CAAC,KAAK,EAAE,iBAAiB,KAAK,OAAO,CAAC,kBAAkB,CAAC,CAAC;IACzE,aAAa,EAAE,CAAC,KAAK,EAAE,iBAAiB,KAAK,OAAO,CAAC,kBAAkB,CAAC,CAAC;IACzE,gBAAgB,EAAE,MAAM,OAAO,CAAC,oBAAoB,CAAC,CAAC;IACtD,mBAAmB,EAAE,CAAC,KAAK,EAAE,sBAAsB,KAAK,OAAO,CAAC,uBAAuB,CAAC,CAAC;IACzF,mBAAmB,EAAE,CAAC,KAAK,EAAE,sBAAsB,KAAK,OAAO,CAAC,uBAAuB,CAAC,CAAC;IACzF,oBAAoB,EAAE,CAAC,KAAK,EAAE,uBAAuB,KAAK,OAAO,CAAC,mBAAmB,CAAC,CAAC;IACvF,aAAa,EAAE,CAAC,KAAK,EAAE,iBAAiB,KAAK,OAAO,CAAC,kBAAkB,CAAC,CAAC;CACzE;AAED,iEAAiE;AACjE,MAAM,WAAW,gBAAgB;IAChC,cAAc,EAAE,gBAAgB,CAAC;IACjC,aAAa,EAAE,eAAe,CAAC;IAC/B,SAAS,EAAE,WAAW,CAAC;IACvB,YAAY,EAAE,cAAc,CAAC;CAC7B;AAED;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,eAAO,MAAM,yBAAyB,GAAI,KAAK,WAAW,KAAG,gBAuB3D,CAAC;AAEH,wEAAwE;AACxE,MAAM,WAAW,8BAA8B;IAC9C;;;OAGG;IACH,YAAY,CAAC,EAAE,WAAW,CAAC;CAC3B;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,0BAA0B,GACtC,UAAU,gBAAgB,EAC1B,UAAU,8BAA8B,KACtC,IASF,CAAC"}
1
+ {"version":3,"file":"admin_rpc_adapters.d.ts","sourceRoot":"../src/lib/","sources":["../../src/lib/ui/admin_rpc_adapters.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AAEH,OAAO,KAAK,EACX,sBAAsB,EACtB,sBAAsB,EACtB,0BAA0B,EAC1B,2BAA2B,EAC3B,wBAAwB,EACxB,yBAAyB,EACzB,iBAAiB,EACjB,kBAAkB,EAClB,6BAA6B,EAC7B,8BAA8B,EAC9B,iBAAiB,EACjB,kBAAkB,EAClB,iBAAiB,EACjB,kBAAkB,EAClB,gBAAgB,EAChB,oBAAoB,EACpB,sBAAsB,EACtB,uBAAuB,EACvB,MAAM,+BAA+B,CAAC;AACvC,OAAO,KAAK,EACX,yBAAyB,EACzB,0BAA0B,EAC1B,0BAA0B,EAC1B,sBAAsB,EACtB,oBAAoB,EACpB,qBAAqB,EACrB,MAAM,0CAA0C,CAAC;AAClD,OAAO,EAA6B,KAAK,gBAAgB,EAAC,MAAM,kCAAkC,CAAC;AACnG,OAAO,EAA4B,KAAK,eAAe,EAAC,MAAM,iCAAiC,CAAC;AAChG,OAAO,EAAwB,KAAK,WAAW,EAAC,MAAM,6BAA6B,CAAC;AACpF,OAAO,EAA2B,KAAK,cAAc,EAAC,MAAM,gCAAgC,CAAC;AAC7F,OAAO,EAAuB,KAAK,WAAW,EAAC,MAAM,mBAAmB,CAAC;AAEzE;;;;;;;;;;GAUG;AACH,MAAM,WAAW,WAAW;IAC3B,kBAAkB,EAAE,MAAM,OAAO,CAAC,sBAAsB,CAAC,CAAC;IAC1D,kBAAkB,EAAE,MAAM,OAAO,CAAC,sBAAsB,CAAC,CAAC;IAC1D,wBAAwB,EAAE,CACzB,KAAK,EAAE,0BAA0B,KAC7B,OAAO,CAAC,2BAA2B,CAAC,CAAC;IAC1C,sBAAsB,EAAE,CAAC,KAAK,EAAE,wBAAwB,KAAK,OAAO,CAAC,yBAAyB,CAAC,CAAC;IAChG,cAAc,EAAE,CAAC,KAAK,EAAE,iBAAiB,KAAK,OAAO,CAAC,kBAAkB,CAAC,CAAC;IAC1E,4BAA4B,EAAE,CAC7B,KAAK,EAAE,6BAA6B,KAChC,OAAO,CAAC,8BAA8B,CAAC,CAAC;IAC7C,WAAW,EAAE,MAAM,OAAO,CAAC,gBAAgB,CAAC,CAAC;IAC7C,aAAa,EAAE,CAAC,KAAK,EAAE,iBAAiB,KAAK,OAAO,CAAC,kBAAkB,CAAC,CAAC;IACzE,aAAa,EAAE,CAAC,KAAK,EAAE,iBAAiB,KAAK,OAAO,CAAC,kBAAkB,CAAC,CAAC;IACzE,gBAAgB,EAAE,MAAM,OAAO,CAAC,oBAAoB,CAAC,CAAC;IACtD,mBAAmB,EAAE,CAAC,KAAK,EAAE,sBAAsB,KAAK,OAAO,CAAC,uBAAuB,CAAC,CAAC;IACzF,uBAAuB,EAAE,CACxB,KAAK,EAAE,yBAAyB,KAC5B,OAAO,CAAC,0BAA0B,CAAC,CAAC;IACzC,wBAAwB,EAAE,CAAC,KAAK,EAAE,0BAA0B,KAAK,OAAO,CAAC,sBAAsB,CAAC,CAAC;IACjG,iBAAiB,EAAE,CAAC,KAAK,EAAE,oBAAoB,KAAK,OAAO,CAAC,qBAAqB,CAAC,CAAC;CACnF;AAED,iEAAiE;AACjE,MAAM,WAAW,gBAAgB;IAChC,cAAc,EAAE,gBAAgB,CAAC;IACjC,aAAa,EAAE,eAAe,CAAC;IAC/B,SAAS,EAAE,WAAW,CAAC;IACvB,YAAY,EAAE,cAAc,CAAC;CAC7B;AAED;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,eAAO,MAAM,yBAAyB,GAAI,KAAK,WAAW,KAAG,gBAuB3D,CAAC;AAEH,wEAAwE;AACxE,MAAM,WAAW,8BAA8B;IAC9C;;;OAGG;IACH,YAAY,CAAC,EAAE,WAAW,CAAC;CAC3B;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,eAAO,MAAM,0BAA0B,GACtC,UAAU,gBAAgB,EAC1B,UAAU,8BAA8B,KACtC,IASF,CAAC"}
@@ -7,11 +7,11 @@
7
7
  * admin shell layout wire everything.
8
8
  *
9
9
  * Intentionally admin-only despite the backend-side
10
- * `create_standard_rpc_actions` rename (admin + permit-offer + account).
10
+ * `create_standard_rpc_actions` rename (admin + role-grant-offer + account).
11
11
  * Account-surface methods flow through `account_sessions_rpc_context`
12
- * (wired at the self-service layout), and permit-offer methods that
13
- * surface in the admin UI (`permit_offer_create`, `permit_revoke`,
14
- * `permit_offer_retract`) live inside the `AdminAccountsRpc` interface —
12
+ * (wired at the self-service layout), and role-grant-offer methods that
13
+ * surface in the admin UI (`role_grant_offer_create`, `role_grant_revoke`,
14
+ * `role_grant_offer_retract`) live inside the `AdminAccountsRpc` interface —
15
15
  * they belong to the admin UX, not a separate wire pairing. The UI side
16
16
  * and backend factory names diverge by design.
17
17
  *
@@ -21,8 +21,8 @@
21
21
  * ```
22
22
  *
23
23
  * The throwing Proxy spreads the JSON-RPC `{code, message, data?}` onto
24
- * the thrown `Error` so form components (e.g. `ui/PermitOfferForm.svelte`)
25
- * can match on `error.data?.reason` via `ERROR_OFFER_*` constants —
24
+ * the thrown `Error` so form components (e.g. `ui/RoleGrantOfferForm.svelte`)
25
+ * can match on `error.data?.reason` via `ERROR_ROLE_GRANT_OFFER_*` constants —
26
26
  * optional chaining is required because JSON-RPC `data` is spec-level
27
27
  * optional. Consumers that need a custom unwrap strategy can construct
28
28
  * their own object satisfying `AdminRpcApi` and pass it directly.
@@ -46,16 +46,16 @@ import { format_scope_context } from './format_scope.js';
46
46
  * | ----------------------------------- | ---------------------------- |
47
47
  * | `admin_accounts.list_accounts` | `admin_account_list` |
48
48
  * | `admin_accounts.list_sessions` | `admin_session_list` |
49
- * | `admin_accounts.grant_permit` | `permit_offer_create` |
50
- * | `admin_accounts.revoke_permit` | `permit_revoke` |
51
- * | `admin_accounts.retract_offer` | `permit_offer_retract` |
49
+ * | `admin_accounts.create_role_grant` | `role_grant_offer_create` |
50
+ * | `admin_accounts.revoke_role_grant` | `role_grant_revoke` |
51
+ * | `admin_accounts.retract_offer` | `role_grant_offer_retract` |
52
52
  * | `admin_accounts.session_revoke_all` | `admin_session_revoke_all` |
53
53
  * | `admin_accounts.token_revoke_all` | `admin_token_revoke_all` |
54
54
  * | `admin_invites.list` | `invite_list` |
55
55
  * | `admin_invites.create` | `invite_create` |
56
56
  * | `admin_invites.delete` | `invite_delete` |
57
57
  * | `audit_log.list` | `audit_log_list` |
58
- * | `audit_log.permit_history` | `audit_log_permit_history` |
58
+ * | `audit_log.role_grant_history` | `audit_log_role_grant_history` |
59
59
  * | `app_settings.get` | `app_settings_get` |
60
60
  * | `app_settings.update` | `app_settings_update` |
61
61
  *
@@ -67,9 +67,9 @@ export const create_admin_rpc_adapters = (api) => ({
67
67
  admin_accounts: {
68
68
  list_accounts: () => api.admin_account_list(),
69
69
  list_sessions: () => api.admin_session_list(),
70
- grant_permit: (params) => api.permit_offer_create(params),
71
- revoke_permit: (params) => api.permit_revoke(params),
72
- retract_offer: (offer_id) => api.permit_offer_retract({ offer_id }),
70
+ create_role_grant: (params) => api.role_grant_offer_create(params),
71
+ revoke_role_grant: (params) => api.role_grant_revoke(params),
72
+ retract_offer: (offer_id) => api.role_grant_offer_retract({ offer_id }),
73
73
  session_revoke_all: (params) => api.admin_session_revoke_all(params),
74
74
  token_revoke_all: (params) => api.admin_token_revoke_all(params),
75
75
  },
@@ -80,7 +80,7 @@ export const create_admin_rpc_adapters = (api) => ({
80
80
  },
81
81
  audit_log: {
82
82
  list: (options) => api.audit_log_list(options ?? {}),
83
- permit_history: (params) => api.audit_log_permit_history(params ?? {}),
83
+ role_grant_history: (params) => api.audit_log_role_grant_history(params ?? {}),
84
84
  },
85
85
  app_settings: {
86
86
  get: () => api.app_settings_get(),
@@ -99,9 +99,9 @@ export const create_admin_rpc_adapters = (api) => ({
99
99
  * whole adapter set requires calling `provide_admin_rpc_contexts` again
100
100
  * during init — in practice this is one-shot at layout mount.
101
101
  *
102
- * Pass `options.format_scope` to render permit/offer `scope_id` values as
103
- * human labels across `AdminAccounts`, `AdminPermitHistory`,
104
- * `PermitOfferInbox`, `PermitOfferForm`, and `PermitOfferHistory`.
102
+ * Pass `options.format_scope` to render role_grant/offer `scope_id` values as
103
+ * human labels across `AdminAccounts`, `AdminRoleGrantHistory`,
104
+ * `RoleGrantOfferInbox`, `RoleGrantOfferForm`, and `RoleGrantOfferHistory`.
105
105
  * Components that accept a `format_scope` prop honor the prop first; the
106
106
  * context is the fallback.
107
107
  */
@@ -3,8 +3,8 @@
3
3
  *
4
4
  * Both the listing and the two revoke-all mutations flow through the shared
5
5
  * `AdminAccountsRpc` adapter (`list_sessions`, `session_revoke_all`,
6
- * `token_revoke_all`). The former REST `GET /api/admin/sessions` route moved
7
- * to the `admin_session_list` RPC method in the 2026-04-23 migration.
6
+ * `token_revoke_all`); the listing wraps the `admin_session_list` RPC
7
+ * method.
8
8
  *
9
9
  * @module
10
10
  */
@@ -3,8 +3,8 @@
3
3
  *
4
4
  * Both the listing and the two revoke-all mutations flow through the shared
5
5
  * `AdminAccountsRpc` adapter (`list_sessions`, `session_revoke_all`,
6
- * `token_revoke_all`). The former REST `GET /api/admin/sessions` route moved
7
- * to the `admin_session_list` RPC method in the 2026-04-23 migration.
6
+ * `token_revoke_all`); the listing wraps the `admin_session_list` RPC
7
+ * method.
8
8
  *
9
9
  * @module
10
10
  */
@@ -1,7 +1,7 @@
1
1
  /**
2
2
  * Reactive state for the audit log viewer.
3
3
  *
4
- * Two fetch primitives (`fetch` for events, `fetch_permit_history` for the
4
+ * Two fetch primitives (`fetch` for events, `fetch_role_grant_history` for the
5
5
  * grant/revoke shortcut) flow through an injected RPC adapter; the SSE
6
6
  * stream continues to use `EventSource` directly — streams aren't an RPC
7
7
  * concern.
@@ -9,8 +9,8 @@
9
9
  * @module
10
10
  */
11
11
  import { Loadable } from './loadable.svelte.js';
12
- import type { AuditLogEventWithUsernamesJson, PermitHistoryEventJson } from '../auth/audit_log_schema.js';
13
- import type { AuditLogListInput, AuditLogListOutput, AuditLogPermitHistoryInput, AuditLogPermitHistoryOutput } from '../auth/admin_action_specs.js';
12
+ import type { AuditLogEventWithUsernamesJson, RoleGrantHistoryEventJson } from '../auth/audit_log_schema.js';
13
+ import type { AuditLogListInput, AuditLogListOutput, AuditLogRoleGrantHistoryInput, AuditLogRoleGrantHistoryOutput } from '../auth/admin_action_specs.js';
14
14
  /**
15
15
  * Narrow RPC surface consumed by `AuditLogState`. Consumers adapt their typed
16
16
  * RPC client to this shape. Mirrors `AdminAccountsRpc` / `AdminInvitesRpc`.
@@ -19,7 +19,7 @@ import type { AuditLogListInput, AuditLogListOutput, AuditLogPermitHistoryInput,
19
19
  */
20
20
  export interface AuditLogRpc {
21
21
  list: (input?: AuditLogListInput) => Promise<AuditLogListOutput>;
22
- permit_history: (input?: AuditLogPermitHistoryInput) => Promise<AuditLogPermitHistoryOutput>;
22
+ role_grant_history: (input?: AuditLogRoleGrantHistoryInput) => Promise<AuditLogRoleGrantHistoryOutput>;
23
23
  }
24
24
  /**
25
25
  * Svelte context carrying the reactive `AuditLogRpc` accessor. Mirrors
@@ -41,15 +41,15 @@ export interface AuditLogStateOptions {
41
41
  export declare class AuditLogState extends Loadable {
42
42
  #private;
43
43
  events: Array<AuditLogEventWithUsernamesJson>;
44
- permit_history_events: Array<PermitHistoryEventJson>;
44
+ role_grant_history_events: Array<RoleGrantHistoryEventJson>;
45
45
  readonly count: number;
46
46
  /** Whether the SSE stream is currently connected. */
47
47
  connected: boolean;
48
48
  constructor(options?: AuditLogStateOptions);
49
- /** True when an RPC adapter is wired. `fetch`/`fetch_permit_history` no-op without it. */
49
+ /** True when an RPC adapter is wired. `fetch`/`fetch_role_grant_history` no-op without it. */
50
50
  get has_rpc(): boolean;
51
51
  fetch(options?: AuditLogListInput): Promise<void>;
52
- fetch_permit_history(limit?: number, offset?: number): Promise<void>;
52
+ fetch_role_grant_history(limit?: number, offset?: number): Promise<void>;
53
53
  /**
54
54
  * Connect to the SSE stream for realtime audit events.
55
55
  *
@@ -1 +1 @@
1
- {"version":3,"file":"audit_log_state.svelte.d.ts","sourceRoot":"../src/lib/","sources":["../../src/lib/ui/audit_log_state.svelte.ts"],"names":[],"mappings":"AAAA;;;;;;;;;GASG;AAKH,OAAO,EAAC,QAAQ,EAAC,MAAM,sBAAsB,CAAC;AAC9C,OAAO,KAAK,EAEX,8BAA8B,EAC9B,sBAAsB,EACtB,MAAM,6BAA6B,CAAC;AACrC,OAAO,KAAK,EACX,iBAAiB,EACjB,kBAAkB,EAClB,0BAA0B,EAC1B,2BAA2B,EAC3B,MAAM,+BAA+B,CAAC;AAGvC;;;;;GAKG;AACH,MAAM,WAAW,WAAW;IAC3B,IAAI,EAAE,CAAC,KAAK,CAAC,EAAE,iBAAiB,KAAK,OAAO,CAAC,kBAAkB,CAAC,CAAC;IACjE,cAAc,EAAE,CAAC,KAAK,CAAC,EAAE,0BAA0B,KAAK,OAAO,CAAC,2BAA2B,CAAC,CAAC;CAC7F;AAED;;;GAGG;AACH,eAAO,MAAM,qBAAqB;qBAAwB,WAAW,GAAG,IAAI;yBAAlB,WAAW,GAAG,IAAI,wBAAlB,WAAW,GAAG,IAAI;CAAmB,CAAC;AAEhG,MAAM,WAAW,oBAAoB;IACpC;;;OAGG;IACH,OAAO,CAAC,EAAE,MAAM,WAAW,GAAG,IAAI,CAAC;IACnC,4EAA4E;IAC5E,UAAU,CAAC,EAAE,MAAM,CAAC;CACpB;AAED,qBAAa,aAAc,SAAQ,QAAQ;;IAG1C,MAAM,EAAE,KAAK,CAAC,8BAA8B,CAAC,CAAkB;IAC/D,qBAAqB,EAAE,KAAK,CAAC,sBAAsB,CAAC,CAAkB;IAEtE,QAAQ,CAAC,KAAK,SAAgC;IAE9C,qDAAqD;IACrD,SAAS,UAAqB;gBAWlB,OAAO,CAAC,EAAE,oBAAoB;IAM1C,0FAA0F;IAC1F,IAAI,OAAO,IAAI,OAAO,CAErB;IAEK,KAAK,CAAC,OAAO,CAAC,EAAE,iBAAiB,GAAG,OAAO,CAAC,IAAI,CAAC;IAajD,oBAAoB,CAAC,KAAK,CAAC,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAY1E;;;;;;;;OAQG;IACH,SAAS,IAAI,MAAM,IAAI;IA0CvB;;;;OAIG;IACH,UAAU,IAAI,IAAI;CAiClB"}
1
+ {"version":3,"file":"audit_log_state.svelte.d.ts","sourceRoot":"../src/lib/","sources":["../../src/lib/ui/audit_log_state.svelte.ts"],"names":[],"mappings":"AAAA;;;;;;;;;GASG;AAKH,OAAO,EAAC,QAAQ,EAAC,MAAM,sBAAsB,CAAC;AAC9C,OAAO,KAAK,EAEX,8BAA8B,EAC9B,yBAAyB,EACzB,MAAM,6BAA6B,CAAC;AACrC,OAAO,KAAK,EACX,iBAAiB,EACjB,kBAAkB,EAClB,6BAA6B,EAC7B,8BAA8B,EAC9B,MAAM,+BAA+B,CAAC;AAGvC;;;;;GAKG;AACH,MAAM,WAAW,WAAW;IAC3B,IAAI,EAAE,CAAC,KAAK,CAAC,EAAE,iBAAiB,KAAK,OAAO,CAAC,kBAAkB,CAAC,CAAC;IACjE,kBAAkB,EAAE,CACnB,KAAK,CAAC,EAAE,6BAA6B,KACjC,OAAO,CAAC,8BAA8B,CAAC,CAAC;CAC7C;AAED;;;GAGG;AACH,eAAO,MAAM,qBAAqB;qBAAwB,WAAW,GAAG,IAAI;yBAAlB,WAAW,GAAG,IAAI,wBAAlB,WAAW,GAAG,IAAI;CAAmB,CAAC;AAEhG,MAAM,WAAW,oBAAoB;IACpC;;;OAGG;IACH,OAAO,CAAC,EAAE,MAAM,WAAW,GAAG,IAAI,CAAC;IACnC,4EAA4E;IAC5E,UAAU,CAAC,EAAE,MAAM,CAAC;CACpB;AAED,qBAAa,aAAc,SAAQ,QAAQ;;IAG1C,MAAM,EAAE,KAAK,CAAC,8BAA8B,CAAC,CAAkB;IAC/D,yBAAyB,EAAE,KAAK,CAAC,yBAAyB,CAAC,CAAkB;IAE7E,QAAQ,CAAC,KAAK,SAAgC;IAE9C,qDAAqD;IACrD,SAAS,UAAqB;gBAWlB,OAAO,CAAC,EAAE,oBAAoB;IAM1C,8FAA8F;IAC9F,IAAI,OAAO,IAAI,OAAO,CAErB;IAEK,KAAK,CAAC,OAAO,CAAC,EAAE,iBAAiB,GAAG,OAAO,CAAC,IAAI,CAAC;IAajD,wBAAwB,CAAC,KAAK,CAAC,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAY9E;;;;;;;;OAQG;IACH,SAAS,IAAI,MAAM,IAAI;IA0CvB;;;;OAIG;IACH,UAAU,IAAI,IAAI;CAiClB"}
@@ -1,7 +1,7 @@
1
1
  /**
2
2
  * Reactive state for the audit log viewer.
3
3
  *
4
- * Two fetch primitives (`fetch` for events, `fetch_permit_history` for the
4
+ * Two fetch primitives (`fetch` for events, `fetch_role_grant_history` for the
5
5
  * grant/revoke shortcut) flow through an injected RPC adapter; the SSE
6
6
  * stream continues to use `EventSource` directly — streams aren't an RPC
7
7
  * concern.
@@ -19,7 +19,7 @@ export const audit_log_rpc_context = create_context(() => () => null);
19
19
  export class AuditLogState extends Loadable {
20
20
  #get_rpc;
21
21
  events = $state.raw([]);
22
- permit_history_events = $state.raw([]);
22
+ role_grant_history_events = $state.raw([]);
23
23
  count = $derived(this.events.length);
24
24
  /** Whether the SSE stream is currently connected. */
25
25
  connected = $state.raw(false);
@@ -34,7 +34,7 @@ export class AuditLogState extends Loadable {
34
34
  this.#get_rpc = options?.get_rpc ?? (() => null);
35
35
  this.#stream_url = options?.stream_url ?? '/api/admin/audit/stream';
36
36
  }
37
- /** True when an RPC adapter is wired. `fetch`/`fetch_permit_history` no-op without it. */
37
+ /** True when an RPC adapter is wired. `fetch`/`fetch_role_grant_history` no-op without it. */
38
38
  get has_rpc() {
39
39
  return this.#get_rpc() !== null;
40
40
  }
@@ -50,15 +50,15 @@ export class AuditLogState extends Loadable {
50
50
  this.#update_last_seq(this.events);
51
51
  });
52
52
  }
53
- async fetch_permit_history(limit, offset) {
53
+ async fetch_role_grant_history(limit, offset) {
54
54
  const rpc = this.#get_rpc();
55
55
  if (!rpc) {
56
56
  this.error = 'rpc adapter not wired';
57
57
  return;
58
58
  }
59
59
  await this.run(async () => {
60
- const { events } = await rpc.permit_history({ limit, offset });
61
- this.permit_history_events = events;
60
+ const { events } = await rpc.role_grant_history({ limit, offset });
61
+ this.role_grant_history_events = events;
62
62
  });
63
63
  }
64
64
  /**
@@ -31,7 +31,7 @@
31
31
  *
32
32
  * @module
33
33
  */
34
- import { type ActorSummaryJson, type PermitSummaryJson, type SessionAccount } from '../auth/account_schema.js';
34
+ import { type ActorSummaryJson, type RoleGrantSummaryJson, type SessionAccount } from '../auth/account_schema.js';
35
35
  /**
36
36
  * Svelte context for `AuthState`.
37
37
  * Use `auth_state_context.set(state)` in the provider and `auth_state_context.get()` to access.
@@ -47,8 +47,8 @@ export declare class AuthState {
47
47
  verify_error: string | null;
48
48
  account: SessionAccount | null;
49
49
  actor: ActorSummaryJson | null;
50
- permits: Array<PermitSummaryJson>;
51
- readonly active_permits: Array<PermitSummaryJson>;
50
+ role_grants: Array<RoleGrantSummaryJson>;
51
+ readonly active_role_grants: Array<RoleGrantSummaryJson>;
52
52
  readonly roles: Array<string>;
53
53
  /** True when bootstrap is available (no accounts exist yet). */
54
54
  needs_bootstrap: boolean;
@@ -1 +1 @@
1
- {"version":3,"file":"auth_state.svelte.d.ts","sourceRoot":"../src/lib/","sources":["../../src/lib/ui/auth_state.svelte.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgCG;AAKH,OAAO,EACN,KAAK,gBAAgB,EAErB,KAAK,iBAAiB,EACtB,KAAK,cAAc,EACnB,MAAM,2BAA2B,CAAC;AAEnC;;;GAGG;AACH,eAAO,MAAM,kBAAkB;;;;CAA8B,CAAC;AAE9D,qBAAa,SAAS;IACrB,SAAS,UAAqB;IAC9B,QAAQ,UAAqB;IAC7B,YAAY,EAAE,MAAM,GAAG,IAAI,CAAoB;IAC/C,OAAO,EAAE,cAAc,GAAG,IAAI,CAAoB;IAClD,KAAK,EAAE,gBAAgB,GAAG,IAAI,CAAoB;IAClD,OAAO,EAAE,KAAK,CAAC,iBAAiB,CAAC,CAAkB;IACnD,QAAQ,CAAC,cAAc,EAAE,KAAK,CAAC,iBAAiB,CAAC,CAE/C;IACF,QAAQ,CAAC,KAAK,EAAE,KAAK,CAAC,MAAM,CAAC,CAAoD;IAEjF,gEAAgE;IAChE,eAAe,UAAqB;IAEpC;;;;;;;;OAQG;IACG,aAAa,IAAI,OAAO,CAAC,IAAI,CAAC;IA6BpC;;;;;;;OAOG;IACG,KAAK,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAwCjE;;;;;OAKG;IACG,SAAS,CAAC,KAAK,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAiCpF;;;;;;;OAOG;IACG,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,EAAE,KAAK,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IA4ClF;;;;;OAKG;IACG,MAAM,IAAI,OAAO,CAAC,IAAI,CAAC;CAW7B"}
1
+ {"version":3,"file":"auth_state.svelte.d.ts","sourceRoot":"../src/lib/","sources":["../../src/lib/ui/auth_state.svelte.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgCG;AAKH,OAAO,EACN,KAAK,gBAAgB,EAErB,KAAK,oBAAoB,EACzB,KAAK,cAAc,EACnB,MAAM,2BAA2B,CAAC;AAEnC;;;GAGG;AACH,eAAO,MAAM,kBAAkB;;;;CAA8B,CAAC;AAE9D,qBAAa,SAAS;IACrB,SAAS,UAAqB;IAC9B,QAAQ,UAAqB;IAC7B,YAAY,EAAE,MAAM,GAAG,IAAI,CAAoB;IAC/C,OAAO,EAAE,cAAc,GAAG,IAAI,CAAoB;IAClD,KAAK,EAAE,gBAAgB,GAAG,IAAI,CAAoB;IAClD,WAAW,EAAE,KAAK,CAAC,oBAAoB,CAAC,CAAkB;IAC1D,QAAQ,CAAC,kBAAkB,EAAE,KAAK,CAAC,oBAAoB,CAAC,CAEtD;IACF,QAAQ,CAAC,KAAK,EAAE,KAAK,CAAC,MAAM,CAAC,CAAwD;IAErF,gEAAgE;IAChE,eAAe,UAAqB;IAEpC;;;;;;;;OAQG;IACG,aAAa,IAAI,OAAO,CAAC,IAAI,CAAC;IA6BpC;;;;;;;OAOG;IACG,KAAK,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAwCjE;;;;;OAKG;IACG,SAAS,CAAC,KAAK,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAiCpF;;;;;;;OAOG;IACG,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,EAAE,KAAK,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IA4ClF;;;;;OAKG;IACG,MAAM,IAAI,OAAO,CAAC,IAAI,CAAC;CAW7B"}
@@ -33,7 +33,7 @@
33
33
  */
34
34
  import { create_context } from '@fuzdev/fuz_ui/context_helpers.js';
35
35
  import { ui_fetch } from './ui_fetch.js';
36
- import { is_permit_active, } from '../auth/account_schema.js';
36
+ import { is_role_grant_active, } from '../auth/account_schema.js';
37
37
  /**
38
38
  * Svelte context for `AuthState`.
39
39
  * Use `auth_state_context.set(state)` in the provider and `auth_state_context.get()` to access.
@@ -45,9 +45,9 @@ export class AuthState {
45
45
  verify_error = $state.raw(null);
46
46
  account = $state.raw(null);
47
47
  actor = $state.raw(null);
48
- permits = $state.raw([]);
49
- active_permits = $derived(this.permits.filter((p) => is_permit_active(p)));
50
- roles = $derived(this.active_permits.map((p) => p.role));
48
+ role_grants = $state.raw([]);
49
+ active_role_grants = $derived(this.role_grants.filter((p) => is_role_grant_active(p)));
50
+ roles = $derived(this.active_role_grants.map((p) => p.role));
51
51
  /** True when bootstrap is available (no accounts exist yet). */
52
52
  needs_bootstrap = $state.raw(false);
53
53
  /**
@@ -68,7 +68,7 @@ export class AuthState {
68
68
  this.verified = true;
69
69
  this.account = data.account ?? null;
70
70
  this.actor = data.actor ?? null;
71
- this.permits = data.permits ?? [];
71
+ this.role_grants = data.role_grants ?? [];
72
72
  this.needs_bootstrap = false;
73
73
  }
74
74
  else {
@@ -248,6 +248,6 @@ export class AuthState {
248
248
  this.verified = false;
249
249
  this.account = null;
250
250
  this.actor = null;
251
- this.permits = [];
251
+ this.role_grants = [];
252
252
  }
253
253
  }
@@ -1,7 +1,7 @@
1
1
  /**
2
- * Shared `format_scope` callback contract for permit-display components.
2
+ * Shared `format_scope` callback contract for role-grant-display components.
3
3
  *
4
- * Permits and offers carry a `scope_id` that names a consumer-owned resource
4
+ * Role grants and offers carry a `scope_id` that names a consumer-owned resource
5
5
  * (e.g. a classroom uuid). The default render is the raw uuid. Consumers wire
6
6
  * a `FormatScope` via context to render a human label without per-page
7
7
  * lookup or forking the components.
@@ -1,7 +1,7 @@
1
1
  /**
2
- * Shared `format_scope` callback contract for permit-display components.
2
+ * Shared `format_scope` callback contract for role-grant-display components.
3
3
  *
4
- * Permits and offers carry a `scope_id` that names a consumer-owned resource
4
+ * Role grants and offers carry a `scope_id` that names a consumer-owned resource
5
5
  * (e.g. a classroom uuid). The default render is the raw uuid. Consumers wire
6
6
  * a `FormatScope` via context to render a human label without per-page
7
7
  * lookup or forking the components.
@@ -1,8 +1,8 @@
1
1
  /**
2
- * Reactive state for the consentful-permits offer flow.
2
+ * Reactive state for the consentful-role-grants offer flow.
3
3
  *
4
4
  * Maintains one offer cache keyed by id, seeded by the RPC list/history
5
- * actions and kept live by the six permit-offer WebSocket notifications.
5
+ * actions and kept live by the six role-grant-offer WebSocket notifications.
6
6
  * `incoming` (recipient-side pending) and `outgoing` (grantor-side pending)
7
7
  * are derived views; `history` is the full cache ordered newest-first for
8
8
  * the grantor/admin history view.
@@ -16,32 +16,32 @@
16
16
  * @module
17
17
  */
18
18
  import { Loadable } from './loadable.svelte.js';
19
- import type { PermitOfferJson } from '../auth/permit_offer_schema.js';
19
+ import type { RoleGrantOfferJson } from '../auth/role_grant_offer_schema.js';
20
20
  /**
21
- * Svelte context for `PermitOffersState`.
22
- * Use `permit_offers_state_context.set(state)` in the provider and
23
- * `permit_offers_state_context.get()` to access.
21
+ * Svelte context for `RoleGrantOffersState`.
22
+ * Use `role_grant_offers_state_context.set(state)` in the provider and
23
+ * `role_grant_offers_state_context.get()` to access.
24
24
  */
25
- export declare const permit_offers_state_context: {
26
- get: (error_message?: string) => PermitOffersState;
27
- get_maybe: () => PermitOffersState | undefined;
28
- set: (value: PermitOffersState) => PermitOffersState;
25
+ export declare const role_grant_offers_state_context: {
26
+ get: (error_message?: string) => RoleGrantOffersState;
27
+ get_maybe: () => RoleGrantOffersState | undefined;
28
+ set: (value: RoleGrantOffersState) => RoleGrantOffersState;
29
29
  };
30
30
  /**
31
- * Narrow RPC surface consumed by `PermitOffersState`. Consumers adapt their
31
+ * Narrow RPC surface consumed by `RoleGrantOffersState`. Consumers adapt their
32
32
  * typed client (e.g. a `create_rpc_client` Proxy) to this shape — the state
33
33
  * class stays decoupled from the client's `Result` return type so tests can
34
34
  * inject plain-function stubs.
35
35
  */
36
- export interface PermitOffersRpc {
36
+ export interface RoleGrantOffersRpc {
37
37
  list: () => Promise<{
38
- offers: Array<PermitOfferJson>;
38
+ offers: Array<RoleGrantOfferJson>;
39
39
  }>;
40
40
  history: (options?: {
41
41
  limit?: number;
42
42
  offset?: number;
43
43
  }) => Promise<{
44
- offers: Array<PermitOfferJson>;
44
+ offers: Array<RoleGrantOfferJson>;
45
45
  }>;
46
46
  create: (params: {
47
47
  to_account_id: string;
@@ -50,11 +50,11 @@ export interface PermitOffersRpc {
50
50
  scope_id?: string | null;
51
51
  message?: string | null;
52
52
  }) => Promise<{
53
- offer: PermitOfferJson;
53
+ offer: RoleGrantOfferJson;
54
54
  }>;
55
55
  accept: (offer_id: string) => Promise<{
56
- permit_id: string;
57
- offer: PermitOfferJson;
56
+ role_grant_id: string;
57
+ offer: RoleGrantOfferJson;
58
58
  superseded_offer_ids: Array<string>;
59
59
  }>;
60
60
  decline: (offer_id: string, reason?: string | null) => Promise<{
@@ -65,14 +65,14 @@ export interface PermitOffersRpc {
65
65
  }>;
66
66
  }
67
67
  /** Narrow WS notification envelope — method + params, matching `JsonrpcNotification`. */
68
- export interface PermitOfferNotification {
68
+ export interface RoleGrantOfferNotification {
69
69
  method: string;
70
70
  params: unknown;
71
71
  }
72
72
  /** Subscription primitive — consumer wires their WS receiver; returns a disposer. */
73
- export type PermitOfferSubscribe = (handler: (notification: PermitOfferNotification) => void) => () => void;
74
- export interface PermitOffersStateOptions {
75
- rpc: PermitOffersRpc;
73
+ export type RoleGrantOfferSubscribe = (handler: (notification: RoleGrantOfferNotification) => void) => () => void;
74
+ export interface RoleGrantOffersStateOptions {
75
+ rpc: RoleGrantOffersRpc;
76
76
  /** Reactive accessor for the current account id; returns `null` when logged out. */
77
77
  account_id: () => string | null;
78
78
  /**
@@ -81,16 +81,16 @@ export interface PermitOffersStateOptions {
81
81
  */
82
82
  actor_id: () => string | null;
83
83
  }
84
- export declare class PermitOffersState extends Loadable {
84
+ export declare class RoleGrantOffersState extends Loadable {
85
85
  #private;
86
86
  /** Pending offers for the current account, soonest-expiring first. */
87
- readonly incoming: Array<PermitOfferJson>;
87
+ readonly incoming: Array<RoleGrantOfferJson>;
88
88
  /** Pending offers from the current actor, newest-created first. */
89
- readonly outgoing: Array<PermitOfferJson>;
89
+ readonly outgoing: Array<RoleGrantOfferJson>;
90
90
  /** Every offer known to this state, newest-created first. Feeds the history view. */
91
- readonly history: Array<PermitOfferJson>;
91
+ readonly history: Array<RoleGrantOfferJson>;
92
92
  readonly incoming_count: number;
93
- constructor(options: PermitOffersStateOptions);
93
+ constructor(options: RoleGrantOffersStateOptions);
94
94
  /** Seed the cache with the recipient-side pending inbox. */
95
95
  fetch(): Promise<void>;
96
96
  /** Seed both-directions history (includes terminal rows). */
@@ -111,7 +111,7 @@ export declare class PermitOffersState extends Loadable {
111
111
  role: string;
112
112
  scope_id?: string | null;
113
113
  message?: string | null;
114
- }): Promise<PermitOfferJson | undefined>;
114
+ }): Promise<RoleGrantOfferJson | undefined>;
115
115
  /** Accept an offer; stamps it terminal in the cache and drops any siblings the server superseded. */
116
116
  accept(offer_id: string): Promise<void>;
117
117
  decline(offer_id: string, reason?: string | null): Promise<void>;
@@ -120,7 +120,7 @@ export declare class PermitOffersState extends Loadable {
120
120
  * Wire a notification subscription. The handler dispatches each matching
121
121
  * notification into `apply_notification`; the returned disposer unwires.
122
122
  */
123
- subscribe(subscribe_fn: PermitOfferSubscribe): () => void;
123
+ subscribe(subscribe_fn: RoleGrantOfferSubscribe): () => void;
124
124
  /**
125
125
  * Reduce a single WS notification into the cache. Exposed so consumers
126
126
  * wiring their WS receiver directly (without `subscribe`) and tests can
@@ -128,8 +128,8 @@ export declare class PermitOffersState extends Loadable {
128
128
  *
129
129
  * @mutates `this`
130
130
  */
131
- apply_notification(notification: PermitOfferNotification): void;
131
+ apply_notification(notification: RoleGrantOfferNotification): void;
132
132
  /** Clear the cache and reset loading/error state. */
133
133
  reset(): void;
134
134
  }
135
- //# sourceMappingURL=permit_offers_state.svelte.d.ts.map
135
+ //# sourceMappingURL=role_grant_offers_state.svelte.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"role_grant_offers_state.svelte.d.ts","sourceRoot":"../src/lib/","sources":["../../src/lib/ui/role_grant_offers_state.svelte.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAIH,OAAO,EAAC,QAAQ,EAAC,MAAM,sBAAsB,CAAC;AAC9C,OAAO,KAAK,EAAC,kBAAkB,EAAC,MAAM,oCAAoC,CAAC;AAU3E;;;;GAIG;AACH,eAAO,MAAM,+BAA+B;;;;CAAyC,CAAC;AAEtF;;;;;GAKG;AACH,MAAM,WAAW,kBAAkB;IAClC,IAAI,EAAE,MAAM,OAAO,CAAC;QAAC,MAAM,EAAE,KAAK,CAAC,kBAAkB,CAAC,CAAA;KAAC,CAAC,CAAC;IACzD,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE;QACnB,KAAK,CAAC,EAAE,MAAM,CAAC;QACf,MAAM,CAAC,EAAE,MAAM,CAAC;KAChB,KAAK,OAAO,CAAC;QAAC,MAAM,EAAE,KAAK,CAAC,kBAAkB,CAAC,CAAA;KAAC,CAAC,CAAC;IACnD,MAAM,EAAE,CAAC,MAAM,EAAE;QAChB,aAAa,EAAE,MAAM,CAAC;QACtB,WAAW,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;QAC5B,IAAI,EAAE,MAAM,CAAC;QACb,QAAQ,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;QACzB,OAAO,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;KACxB,KAAK,OAAO,CAAC;QAAC,KAAK,EAAE,kBAAkB,CAAA;KAAC,CAAC,CAAC;IAC3C,MAAM,EAAE,CAAC,QAAQ,EAAE,MAAM,KAAK,OAAO,CAAC;QACrC,aAAa,EAAE,MAAM,CAAC;QACtB,KAAK,EAAE,kBAAkB,CAAC;QAC1B,oBAAoB,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;KACpC,CAAC,CAAC;IACH,OAAO,EAAE,CAAC,QAAQ,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,IAAI,KAAK,OAAO,CAAC;QAAC,EAAE,EAAE,IAAI,CAAA;KAAC,CAAC,CAAC;IAC3E,OAAO,EAAE,CAAC,QAAQ,EAAE,MAAM,KAAK,OAAO,CAAC;QAAC,EAAE,EAAE,IAAI,CAAA;KAAC,CAAC,CAAC;CACnD;AAED,yFAAyF;AACzF,MAAM,WAAW,0BAA0B;IAC1C,MAAM,EAAE,MAAM,CAAC;IACf,MAAM,EAAE,OAAO,CAAC;CAChB;AAED,qFAAqF;AACrF,MAAM,MAAM,uBAAuB,GAAG,CACrC,OAAO,EAAE,CAAC,YAAY,EAAE,0BAA0B,KAAK,IAAI,KACvD,MAAM,IAAI,CAAC;AAEhB,MAAM,WAAW,2BAA2B;IAC3C,GAAG,EAAE,kBAAkB,CAAC;IACxB,oFAAoF;IACpF,UAAU,EAAE,MAAM,MAAM,GAAG,IAAI,CAAC;IAChC;;;OAGG;IACH,QAAQ,EAAE,MAAM,MAAM,GAAG,IAAI,CAAC;CAC9B;AAQD,qBAAa,oBAAqB,SAAQ,QAAQ;;IAOjD,sEAAsE;IACtE,QAAQ,CAAC,QAAQ,EAAE,KAAK,CAAC,kBAAkB,CAAC,CAazC;IAEH,mEAAmE;IACnE,QAAQ,CAAC,QAAQ,EAAE,KAAK,CAAC,kBAAkB,CAAC,CAazC;IAEH,qFAAqF;IACrF,QAAQ,CAAC,OAAO,EAAE,KAAK,CAAC,kBAAkB,CAAC,CAIxC;IAEH,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAkC;gBAErD,OAAO,EAAE,2BAA2B;IAOhD,4DAA4D;IACtD,KAAK,IAAI,OAAO,CAAC,IAAI,CAAC;IAO5B,6DAA6D;IACvD,aAAa,CAAC,OAAO,CAAC,EAAE;QAAC,KAAK,CAAC,EAAE,MAAM,CAAC;QAAC,MAAM,CAAC,EAAE,MAAM,CAAA;KAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAO/E;;;;;;OAMG;IACG,MAAM,CAAC,MAAM,EAAE;QACpB,aAAa,EAAE,MAAM,CAAC;QACtB,WAAW,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;QAC5B,IAAI,EAAE,MAAM,CAAC;QACb,QAAQ,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;QACzB,OAAO,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;KACxB,GAAG,OAAO,CAAC,kBAAkB,GAAG,SAAS,CAAC;IAQ3C,qGAAqG;IAC/F,MAAM,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAavC,OAAO,CAAC,QAAQ,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,IAAI,GAAG,OAAO,CAAC,IAAI,CAAC;IAOhE,OAAO,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAO9C;;;OAGG;IACH,SAAS,CAAC,YAAY,EAAE,uBAAuB,GAAG,MAAM,IAAI;IAM5D;;;;;;OAMG;IACH,kBAAkB,CAAC,YAAY,EAAE,0BAA0B,GAAG,IAAI;IAwBlE,qDAAqD;IAC5C,KAAK,IAAI,IAAI;CAmBtB"}