@lssm/example.kb-update-pipeline 0.0.0-canary-20251220041653 → 0.0.0-canary-20251221114240
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.turbo/turbo-build$colon$bundle.log +51 -48
- package/.turbo/turbo-build.log +51 -48
- package/CHANGELOG.md +5 -5
- package/dist/events.d.ts +21 -21
- package/dist/events.d.ts.map +1 -1
- package/dist/handlers/memory.handlers.d.ts.map +1 -1
- package/dist/index.d.ts +1 -1
- package/dist/index.js +2 -2
- package/dist/libs/contracts/dist/docs/tech/contracts/openapi-export.docblock.js +6 -6
- package/dist/libs/contracts/dist/docs/tech/contracts/openapi-export.docblock.js.map +1 -1
- package/dist/libs/contracts/dist/index.js +3 -1
- package/dist/libs/contracts/dist/integrations/contracts.js +1 -1
- package/dist/libs/contracts/dist/integrations/contracts.js.map +1 -1
- package/dist/libs/contracts/dist/integrations/openbanking/contracts/accounts.js +1 -1
- package/dist/libs/contracts/dist/integrations/openbanking/contracts/accounts.js.map +1 -1
- package/dist/libs/contracts/dist/integrations/openbanking/contracts/balances.js +1 -1
- package/dist/libs/contracts/dist/integrations/openbanking/contracts/balances.js.map +1 -1
- package/dist/libs/contracts/dist/integrations/openbanking/contracts/transactions.js +1 -1
- package/dist/libs/contracts/dist/integrations/openbanking/contracts/transactions.js.map +1 -1
- package/dist/libs/contracts/dist/knowledge/contracts.js +1 -1
- package/dist/libs/contracts/dist/knowledge/contracts.js.map +1 -1
- package/dist/libs/contracts/dist/llm/exporters.js.map +1 -1
- package/dist/libs/contracts/dist/onboarding-base.js +1 -1
- package/dist/libs/contracts/dist/onboarding-base.js.map +1 -1
- package/dist/libs/contracts/dist/{spec.js → operation.js} +2 -2
- package/dist/libs/contracts/dist/operation.js.map +1 -0
- package/dist/libs/contracts/dist/workspace-config/contractsrc-schema.js +98 -0
- package/dist/libs/contracts/dist/workspace-config/contractsrc-schema.js.map +1 -0
- package/dist/libs/contracts/dist/workspace-config/index.js +1 -0
- package/dist/operations/pipeline.d.ts +137 -0
- package/dist/operations/pipeline.d.ts.map +1 -0
- package/dist/{contracts → operations}/pipeline.js +2 -2
- package/dist/operations/pipeline.js.map +1 -0
- package/package.json +9 -9
- package/src/index.ts +1 -1
- package/tsconfig.tsbuildinfo +1 -1
- package/dist/contracts/pipeline.d.ts +0 -137
- package/dist/contracts/pipeline.d.ts.map +0 -1
- package/dist/contracts/pipeline.js.map +0 -1
- package/dist/libs/contracts/dist/spec.js.map +0 -1
- /package/dist/{contracts → operations}/index.d.ts +0 -0
- /package/dist/{contracts → operations}/index.js +0 -0
- /package/src/{contracts → operations}/index.ts +0 -0
- /package/src/{contracts → operations}/pipeline.ts +0 -0
|
@@ -1,137 +0,0 @@
|
|
|
1
|
-
import * as _lssm_lib_schema18 from "@lssm/lib.schema";
|
|
2
|
-
import * as _lssm_lib_contracts4 from "@lssm/lib.contracts";
|
|
3
|
-
|
|
4
|
-
//#region src/contracts/pipeline.d.ts
|
|
5
|
-
declare const KbPipelineRunWatchContract: _lssm_lib_contracts4.ContractSpec<_lssm_lib_schema18.SchemaModel<{
|
|
6
|
-
jurisdiction: {
|
|
7
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
8
|
-
isOptional: false;
|
|
9
|
-
};
|
|
10
|
-
}>, _lssm_lib_schema18.SchemaModel<{
|
|
11
|
-
candidates: {
|
|
12
|
-
type: _lssm_lib_schema18.SchemaModel<{
|
|
13
|
-
id: {
|
|
14
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
15
|
-
isOptional: false;
|
|
16
|
-
};
|
|
17
|
-
sourceDocumentId: {
|
|
18
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
19
|
-
isOptional: false;
|
|
20
|
-
};
|
|
21
|
-
detectedAt: {
|
|
22
|
-
type: _lssm_lib_schema18.FieldType<Date, string>;
|
|
23
|
-
isOptional: false;
|
|
24
|
-
};
|
|
25
|
-
diffSummary: {
|
|
26
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
27
|
-
isOptional: false;
|
|
28
|
-
};
|
|
29
|
-
riskLevel: {
|
|
30
|
-
type: _lssm_lib_schema18.EnumType<[string, string, string]>;
|
|
31
|
-
isOptional: false;
|
|
32
|
-
};
|
|
33
|
-
}>;
|
|
34
|
-
isArray: true;
|
|
35
|
-
isOptional: false;
|
|
36
|
-
};
|
|
37
|
-
}>, undefined>;
|
|
38
|
-
declare const KbPipelineCreateReviewTaskContract: _lssm_lib_contracts4.ContractSpec<_lssm_lib_schema18.SchemaModel<{
|
|
39
|
-
changeCandidateId: {
|
|
40
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
41
|
-
isOptional: false;
|
|
42
|
-
};
|
|
43
|
-
}>, _lssm_lib_schema18.SchemaModel<{
|
|
44
|
-
id: {
|
|
45
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
46
|
-
isOptional: false;
|
|
47
|
-
};
|
|
48
|
-
changeCandidateId: {
|
|
49
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
50
|
-
isOptional: false;
|
|
51
|
-
};
|
|
52
|
-
status: {
|
|
53
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
54
|
-
isOptional: false;
|
|
55
|
-
};
|
|
56
|
-
assignedRole: {
|
|
57
|
-
type: _lssm_lib_schema18.EnumType<[string, string]>;
|
|
58
|
-
isOptional: false;
|
|
59
|
-
};
|
|
60
|
-
decision: {
|
|
61
|
-
type: _lssm_lib_schema18.EnumType<[string, string]>;
|
|
62
|
-
isOptional: true;
|
|
63
|
-
};
|
|
64
|
-
decidedAt: {
|
|
65
|
-
type: _lssm_lib_schema18.FieldType<Date, string>;
|
|
66
|
-
isOptional: true;
|
|
67
|
-
};
|
|
68
|
-
decidedBy: {
|
|
69
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
70
|
-
isOptional: true;
|
|
71
|
-
};
|
|
72
|
-
}>, undefined>;
|
|
73
|
-
declare const KbPipelineSubmitDecisionContract: _lssm_lib_contracts4.ContractSpec<_lssm_lib_schema18.SchemaModel<{
|
|
74
|
-
reviewTaskId: {
|
|
75
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
76
|
-
isOptional: false;
|
|
77
|
-
};
|
|
78
|
-
decision: {
|
|
79
|
-
type: _lssm_lib_schema18.EnumType<[string, string]>;
|
|
80
|
-
isOptional: false;
|
|
81
|
-
};
|
|
82
|
-
decidedBy: {
|
|
83
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
84
|
-
isOptional: false;
|
|
85
|
-
};
|
|
86
|
-
decidedByRole: {
|
|
87
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
88
|
-
isOptional: false;
|
|
89
|
-
};
|
|
90
|
-
}>, _lssm_lib_schema18.SchemaModel<{
|
|
91
|
-
id: {
|
|
92
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
93
|
-
isOptional: false;
|
|
94
|
-
};
|
|
95
|
-
changeCandidateId: {
|
|
96
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
97
|
-
isOptional: false;
|
|
98
|
-
};
|
|
99
|
-
status: {
|
|
100
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
101
|
-
isOptional: false;
|
|
102
|
-
};
|
|
103
|
-
assignedRole: {
|
|
104
|
-
type: _lssm_lib_schema18.EnumType<[string, string]>;
|
|
105
|
-
isOptional: false;
|
|
106
|
-
};
|
|
107
|
-
decision: {
|
|
108
|
-
type: _lssm_lib_schema18.EnumType<[string, string]>;
|
|
109
|
-
isOptional: true;
|
|
110
|
-
};
|
|
111
|
-
decidedAt: {
|
|
112
|
-
type: _lssm_lib_schema18.FieldType<Date, string>;
|
|
113
|
-
isOptional: true;
|
|
114
|
-
};
|
|
115
|
-
decidedBy: {
|
|
116
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
117
|
-
isOptional: true;
|
|
118
|
-
};
|
|
119
|
-
}>, undefined>;
|
|
120
|
-
declare const KbPipelinePublishIfReadyContract: _lssm_lib_contracts4.ContractSpec<_lssm_lib_schema18.SchemaModel<{
|
|
121
|
-
jurisdiction: {
|
|
122
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
123
|
-
isOptional: false;
|
|
124
|
-
};
|
|
125
|
-
}>, _lssm_lib_schema18.SchemaModel<{
|
|
126
|
-
published: {
|
|
127
|
-
type: _lssm_lib_schema18.FieldType<boolean, boolean>;
|
|
128
|
-
isOptional: false;
|
|
129
|
-
};
|
|
130
|
-
reason: {
|
|
131
|
-
type: _lssm_lib_schema18.FieldType<string, string>;
|
|
132
|
-
isOptional: true;
|
|
133
|
-
};
|
|
134
|
-
}>, undefined>;
|
|
135
|
-
//#endregion
|
|
136
|
-
export { KbPipelineCreateReviewTaskContract, KbPipelinePublishIfReadyContract, KbPipelineRunWatchContract, KbPipelineSubmitDecisionContract };
|
|
137
|
-
//# sourceMappingURL=pipeline.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"pipeline.d.ts","names":[],"sources":["../../src/contracts/pipeline.ts"],"sourcesContent":[],"mappings":";;;;cAwEa,iDAA0B,gCAAA;;UAarC,kBAAA,CAAA;;EAbW,CAAA;CAaX,CAAA,gCAAA,CAAA;;IAbqC,IAAA,gCAAA,CAAA;;cAAA,kBAAA,CAAA;;;;;;;MAAA,UAAA,EAAA;QAe1B,IAAA,8BAaX,KAAA,EAAA,MAAA,CAAA;QAAA,UAAA,EAAA,KAAA;;MAb6C,WAAA,EAAA;;;;;;;;;;IAAA,UAAA,EAAA,KAAA;EAelC,CAAA;CA8BX,CAAA,EAAA,SAAA,CAAA;cA7CW,yDAAkC,gCAAA;;UAa7C,kBAAA,CAAA;gBAE2C,KAAA;EAAA,CAAA;;;UAfE,kBAAA,CAAA;;;;;;;EAeF,MAAA,EAAA;IAgChC,IAAA,8BAwBX,CAAA,MAAA,EAAA,MAAA,CAAA;IAAA,UAAA,EAAA,KAAA;;EAxB2C,YAAA,EAAA;;;;EAAA,QAAA,EAAA;;;;;;;;;;;;;cAhChC,uDAAgC,gCAAA;;UA8B3C,kBAAA,CAAA;;;;;;;;;;;;;;;;;UA9B2C,kBAAA,CAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAgChC,uDAAgC,gCAAA;;UAwB3C,kBAAA,CAAA;;;;;UAxB2C,kBAAA,CAAA"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"pipeline.js","names":["defineSchemaModel","ScalarTypeEnum"],"sources":["../../src/contracts/pipeline.ts"],"sourcesContent":["import { defineCommand } from '@lssm/lib.contracts';\nimport { ScalarTypeEnum, defineSchemaModel } from '@lssm/lib.schema';\n\nimport {\n ChangeCandidateModel,\n ReviewDecisionEnum,\n ReviewTaskModel,\n} from '../entities/models';\n\nconst RunWatchInput = defineSchemaModel({\n name: 'KbPipelineRunWatchInput',\n description: 'Trigger a watch cycle for KB sources (demo).',\n fields: {\n jurisdiction: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },\n },\n});\n\nconst RunWatchOutput = defineSchemaModel({\n name: 'KbPipelineRunWatchOutput',\n description: 'Output containing detected changes.',\n fields: {\n candidates: {\n type: ChangeCandidateModel,\n isArray: true,\n isOptional: false,\n },\n },\n});\n\nconst CreateReviewTaskInput = defineSchemaModel({\n name: 'KbPipelineCreateReviewTaskInput',\n description: 'Create a review task for a change candidate.',\n fields: {\n changeCandidateId: {\n type: ScalarTypeEnum.String_unsecure(),\n isOptional: false,\n },\n },\n});\n\nconst SubmitDecisionInput = defineSchemaModel({\n name: 'KbPipelineSubmitDecisionInput',\n description: 'Submit a decision for a review task.',\n fields: {\n reviewTaskId: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },\n decision: { type: ReviewDecisionEnum, isOptional: false },\n decidedBy: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },\n decidedByRole: {\n type: ScalarTypeEnum.String_unsecure(),\n isOptional: false,\n },\n },\n});\n\nconst PublishIfReadyInput = defineSchemaModel({\n name: 'KbPipelinePublishIfReadyInput',\n description:\n 'Publish snapshot if approvals are satisfied for a jurisdiction.',\n fields: {\n jurisdiction: { type: ScalarTypeEnum.String_unsecure(), isOptional: false },\n },\n});\n\nconst PublishIfReadyOutput = defineSchemaModel({\n name: 'KbPipelinePublishIfReadyOutput',\n description: 'Output for publish-if-ready operation.',\n fields: {\n published: { type: ScalarTypeEnum.Boolean(), isOptional: false },\n reason: { type: ScalarTypeEnum.String_unsecure(), isOptional: true },\n },\n});\n\nexport const KbPipelineRunWatchContract = defineCommand({\n meta: {\n name: 'kbPipeline.runWatch',\n version: 1,\n stability: 'experimental',\n owners: ['examples'],\n tags: ['knowledge', 'pipeline', 'jobs'],\n description: 'Detect source changes and create change candidates.',\n goal: 'Automate discovery of updates needing review.',\n context: 'Scheduled job or manual trigger in demos.',\n },\n io: { input: RunWatchInput, output: RunWatchOutput },\n policy: { auth: 'user' },\n});\n\nexport const KbPipelineCreateReviewTaskContract = defineCommand({\n meta: {\n name: 'kbPipeline.createReviewTask',\n version: 1,\n stability: 'experimental',\n owners: ['examples'],\n tags: ['knowledge', 'pipeline', 'hitl'],\n description: 'Create a review task for a detected change.',\n goal: 'Route work to human verifiers.',\n context: 'Called after change detection or manual selection.',\n },\n io: { input: CreateReviewTaskInput, output: ReviewTaskModel },\n policy: { auth: 'user' },\n});\n\nexport const KbPipelineSubmitDecisionContract = defineCommand({\n meta: {\n name: 'kbPipeline.submitDecision',\n version: 1,\n stability: 'experimental',\n owners: ['examples'],\n tags: ['knowledge', 'pipeline', 'hitl', 'rbac'],\n description: 'Submit approve/reject decision for a review task.',\n goal: 'Ensure humans verify before publishing.',\n context: 'Curator/expert reviews and decides.',\n },\n io: {\n input: SubmitDecisionInput,\n output: ReviewTaskModel,\n errors: {\n FORBIDDEN_ROLE: {\n description: 'Role not allowed to approve the given risk level',\n http: 403,\n gqlCode: 'FORBIDDEN_ROLE',\n when: 'curator attempts to approve a high-risk change',\n },\n REVIEW_TASK_NOT_FOUND: {\n description: 'Review task not found',\n http: 404,\n gqlCode: 'REVIEW_TASK_NOT_FOUND',\n when: 'reviewTaskId is invalid',\n },\n },\n },\n policy: { auth: 'user' },\n});\n\nexport const KbPipelinePublishIfReadyContract = defineCommand({\n meta: {\n name: 'kbPipeline.publishIfReady',\n version: 1,\n stability: 'experimental',\n owners: ['examples'],\n tags: ['knowledge', 'pipeline', 'publishing'],\n description: 'Publish snapshot if ready (all approvals satisfied).',\n goal: 'Prevent publishing until all required approvals exist.',\n context: 'Called by job or UI to attempt publish.',\n },\n io: {\n input: PublishIfReadyInput,\n output: PublishIfReadyOutput,\n errors: {\n NOT_READY: {\n description: 'Publishing is blocked because approvals are incomplete',\n http: 409,\n gqlCode: 'NOT_READY',\n when: 'there are open review tasks or unapproved rule versions',\n },\n },\n },\n policy: { auth: 'user' },\n});\n"],"mappings":";;;;;;AASA,MAAM,gBAAgBA,GAAkB;CACtC,MAAM;CACN,aAAa;CACb,QAAQ,EACN,cAAc;EAAE,MAAMC,GAAe,iBAAiB;EAAE,YAAY;EAAO,EAC5E;CACF,CAAC;AAEF,MAAM,iBAAiBD,GAAkB;CACvC,MAAM;CACN,aAAa;CACb,QAAQ,EACN,YAAY;EACV,MAAM;EACN,SAAS;EACT,YAAY;EACb,EACF;CACF,CAAC;AAEF,MAAM,wBAAwBA,GAAkB;CAC9C,MAAM;CACN,aAAa;CACb,QAAQ,EACN,mBAAmB;EACjB,MAAMC,GAAe,iBAAiB;EACtC,YAAY;EACb,EACF;CACF,CAAC;AAEF,MAAM,sBAAsBD,GAAkB;CAC5C,MAAM;CACN,aAAa;CACb,QAAQ;EACN,cAAc;GAAE,MAAMC,GAAe,iBAAiB;GAAE,YAAY;GAAO;EAC3E,UAAU;GAAE,MAAM;GAAoB,YAAY;GAAO;EACzD,WAAW;GAAE,MAAMA,GAAe,iBAAiB;GAAE,YAAY;GAAO;EACxE,eAAe;GACb,MAAMA,GAAe,iBAAiB;GACtC,YAAY;GACb;EACF;CACF,CAAC;AAEF,MAAM,sBAAsBD,GAAkB;CAC5C,MAAM;CACN,aACE;CACF,QAAQ,EACN,cAAc;EAAE,MAAMC,GAAe,iBAAiB;EAAE,YAAY;EAAO,EAC5E;CACF,CAAC;AAEF,MAAM,uBAAuBD,GAAkB;CAC7C,MAAM;CACN,aAAa;CACb,QAAQ;EACN,WAAW;GAAE,MAAMC,GAAe,SAAS;GAAE,YAAY;GAAO;EAChE,QAAQ;GAAE,MAAMA,GAAe,iBAAiB;GAAE,YAAY;GAAM;EACrE;CACF,CAAC;AAEF,MAAa,6BAA6B,cAAc;CACtD,MAAM;EACJ,MAAM;EACN,SAAS;EACT,WAAW;EACX,QAAQ,CAAC,WAAW;EACpB,MAAM;GAAC;GAAa;GAAY;GAAO;EACvC,aAAa;EACb,MAAM;EACN,SAAS;EACV;CACD,IAAI;EAAE,OAAO;EAAe,QAAQ;EAAgB;CACpD,QAAQ,EAAE,MAAM,QAAQ;CACzB,CAAC;AAEF,MAAa,qCAAqC,cAAc;CAC9D,MAAM;EACJ,MAAM;EACN,SAAS;EACT,WAAW;EACX,QAAQ,CAAC,WAAW;EACpB,MAAM;GAAC;GAAa;GAAY;GAAO;EACvC,aAAa;EACb,MAAM;EACN,SAAS;EACV;CACD,IAAI;EAAE,OAAO;EAAuB,QAAQ;EAAiB;CAC7D,QAAQ,EAAE,MAAM,QAAQ;CACzB,CAAC;AAEF,MAAa,mCAAmC,cAAc;CAC5D,MAAM;EACJ,MAAM;EACN,SAAS;EACT,WAAW;EACX,QAAQ,CAAC,WAAW;EACpB,MAAM;GAAC;GAAa;GAAY;GAAQ;GAAO;EAC/C,aAAa;EACb,MAAM;EACN,SAAS;EACV;CACD,IAAI;EACF,OAAO;EACP,QAAQ;EACR,QAAQ;GACN,gBAAgB;IACd,aAAa;IACb,MAAM;IACN,SAAS;IACT,MAAM;IACP;GACD,uBAAuB;IACrB,aAAa;IACb,MAAM;IACN,SAAS;IACT,MAAM;IACP;GACF;EACF;CACD,QAAQ,EAAE,MAAM,QAAQ;CACzB,CAAC;AAEF,MAAa,mCAAmC,cAAc;CAC5D,MAAM;EACJ,MAAM;EACN,SAAS;EACT,WAAW;EACX,QAAQ,CAAC,WAAW;EACpB,MAAM;GAAC;GAAa;GAAY;GAAa;EAC7C,aAAa;EACb,MAAM;EACN,SAAS;EACV;CACD,IAAI;EACF,OAAO;EACP,QAAQ;EACR,QAAQ,EACN,WAAW;GACT,aAAa;GACb,MAAM;GACN,SAAS;GACT,MAAM;GACP,EACF;EACF;CACD,QAAQ,EAAE,MAAM,QAAQ;CACzB,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"spec.js","names":[],"sources":["../../../../../../libs/contracts/dist/spec.js"],"sourcesContent":["//#region src/spec.ts\nconst isEmitDeclRef = (e) => \"ref\" in e;\n/**\n* Helper to define a Command (write operation).\n* Sets `kind: 'command'` and defaults `idempotent: false`.\n*/\nconst defineCommand = (spec) => ({\n\t...spec,\n\tmeta: {\n\t\t...spec.meta,\n\t\tkind: \"command\"\n\t},\n\tpolicy: {\n\t\t...spec.policy,\n\t\tidempotent: spec.policy?.[\"policy\"]?.idempotent ?? false\n\t}\n});\n/**\n* Helper to define a Query (read-only operation).\n* Sets `kind: 'query'` and forces `idempotent: true`.\n*/\nconst defineQuery = (spec) => ({\n\t...spec,\n\tmeta: {\n\t\t...spec.meta,\n\t\tkind: \"query\"\n\t},\n\tpolicy: {\n\t\t...spec.policy,\n\t\tidempotent: true\n\t}\n});\n\n//#endregion\nexport { defineCommand, defineQuery, isEmitDeclRef };"],"mappings":";;;;;AAMA,MAAM,iBAAiB,UAAU;CAChC,GAAG;CACH,MAAM;EACL,GAAG,KAAK;EACR,MAAM;EACN;CACD,QAAQ;EACP,GAAG,KAAK;EACR,YAAY,KAAK,SAAS,WAAW,cAAc;EACnD;CACD;;;;;AAKD,MAAM,eAAe,UAAU;CAC9B,GAAG;CACH,MAAM;EACL,GAAG,KAAK;EACR,MAAM;EACN;CACD,QAAQ;EACP,GAAG,KAAK;EACR,YAAY;EACZ;CACD"}
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|