@djangocfg/api 2.1.366 → 2.1.368

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/auth.cjs.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/auth/index.ts","../src/auth/constants.ts","../src/auth/utils/env.ts","../src/auth/context/AuthContext.tsx","../src/auth/hooks/useCfgRouter.ts","../src/auth/hooks/useQueryParams.ts","../src/auth/hooks/useAuthFormState.ts","../src/auth/hooks/useAuthValidation.ts","../src/auth/hooks/useAuthForm.ts","../src/auth/utils/logger.ts","../src/auth/hooks/useAutoAuth.ts","../src/auth/hooks/useTwoFactor.ts","../src/_api/generated/helpers/errors.ts","../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/core/bodySerializer.gen.ts","../src/_api/generated/core/params.gen.ts","../src/_api/generated/core/serverSentEvents.gen.ts","../src/_api/generated/core/pathSerializer.gen.ts","../src/_api/generated/core/utils.gen.ts","../src/_api/generated/core/auth.gen.ts","../src/_api/generated/client/utils.gen.ts","../src/_api/generated/client/client.gen.ts","../src/_api/generated/client.gen.ts","../src/_api/generated/sdk.gen.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts","../src/auth/utils/analytics.ts","../src/auth/hooks/useGithubAuth.ts","../src/auth/hooks/useTwoFactorSetup.ts","../src/auth/hooks/useTwoFactorStatus.ts","../src/auth/hooks/useSessionStorage.ts","../src/auth/hooks/useAuthRedirect.ts","../src/auth/hooks/useAuthGuard.ts","../src/auth/hooks/useLocalStorage.ts","../src/auth/hooks/useBase64.ts","../src/auth/hooks/useProfileCache.ts","../src/auth/hooks/useTokenRefresh.ts","../src/auth/hooks/useDeleteAccount.ts","../src/auth/context/AccountsContext.tsx","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsApiKeyRegenerateCreate.ts","../src/_api/generated/_cfg_accounts/schemas/APIKeyRegenerate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsApiKeyRetrieve.ts","../src/_api/generated/_cfg_accounts/schemas/APIKey.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsApiKeyTestCreate.ts","../src/_api/generated/_cfg_accounts/schemas/APIKeyTestResult.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthConnectionsList.ts","../src/_api/generated/_cfg_accounts/schemas/cfg_accounts_oauth_connections_response_200_AutoRef.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthConnection.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthProviderEnum.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthDisconnectCreate.ts","../src/_api/generated/_cfg_accounts/schemas/cfg_accounts_oauth_disconnect_response_200_AutoRef.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthGithubAuthorizeCreate.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthAuthorizeResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthGithubCallbackCreate.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthTokenResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthProvidersRetrieve.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthProvidersResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOtpRequestCreate.ts","../src/_api/generated/_cfg_accounts/schemas/OTPRequestResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOtpVerifyCreate.ts","../src/_api/generated/_cfg_accounts/schemas/OTPVerifyResponse.ts","../src/_api/generated/_cfg_accounts/schemas/User.ts","../src/_api/generated/_cfg_accounts/schemas/CentrifugoToken.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileAvatarCreate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileDeleteCreate.ts","../src/_api/generated/_cfg_accounts/schemas/AccountDeleteResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfilePartialPartialUpdate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfilePartialUpdate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileRetrieve.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileUpdatePartialUpdate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileUpdateUpdate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsTokenRefreshCreate.ts","../src/_api/generated/_cfg_accounts/schemas/TokenRefresh.ts","../src/_api/generated/_cfg_accounts/schemas/APIKeyRequest.ts","../src/_api/generated/_cfg_accounts/schemas/APIKeyTestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/CfgUserUpdateRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthAuthorizeRequestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthCallbackRequestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthDisconnectRequestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthError.ts","../src/_api/generated/_cfg_accounts/schemas/OTPErrorResponse.ts","../src/_api/generated/_cfg_accounts/schemas/OTPRequestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OTPVerifyRequest.ts","../src/_api/generated/_cfg_accounts/schemas/PatchedCfgUserUpdateRequest.ts","../src/_api/generated/_cfg_accounts/schemas/TokenRefreshRequest.ts","../src/auth/utils/validation.ts","../src/auth/utils/errors.ts"],"sourcesContent":["/**\n * @djangocfg/api/auth\n *\n * Authentication module with contexts, hooks and utilities.\n * Use this entry point in client components.\n *\n * @example\n * ```tsx\n * 'use client';\n * import { AuthProvider, useAuth } from '@djangocfg/api/auth';\n *\n * export function MyApp({ children }) {\n * return (\n * <AuthProvider>\n * {children}\n * </AuthProvider>\n * );\n * }\n *\n * export function Profile() {\n * const { user, logout } = useAuth();\n * return <div>{user?.email}</div>;\n * }\n * ```\n */\n\n// Constants\nexport * from './constants';\n\n// Contexts\nexport * from './context';\n\n// Hooks\nexport * from './hooks';\n\n// Types (single source of truth)\nexport * from './types';\n\n// Utils (validation, errors, analytics)\nexport * from './utils';\n","/**\n * Auth-related constants shared across the frontend.\n * Single source of truth — do not redefine these elsewhere.\n */\n\nexport const AUTH_CONSTANTS = {\n /** Email OTP code length (numeric). */\n EMAIL_OTP_LENGTH: 4,\n /** TOTP code length (RFC 6238 — authenticator apps). */\n TOTP_LENGTH: 6,\n /** Backup code max length. */\n BACKUP_CODE_MAX_LENGTH: 12,\n} as const;\n","export const isDev = process.env.NODE_ENV === 'development';\nexport const isProd = !isDev;\nexport const isBrowser = typeof window !== 'undefined';\n","// @ts-nocheck\n'use client';\n\nimport { isDev, isBrowser } from \"../utils/env\";\nimport { usePathname } from 'next/navigation';\nimport React, {\n createContext, memo, ReactNode, useCallback, useContext, useEffect, useMemo, useRef, useState\n} from 'react';\nimport { SWRConfig } from 'swr';\n\nimport { useCfgRouter, useLocalStorage, useQueryParams } from '../hooks';\n\nimport { api as apiAccounts } from '../../';\nimport { APIError } from '../../_api/generated/helpers';\nimport { clearProfileCache, getCachedProfile } from '../hooks/useProfileCache';\nimport { useAuthRedirectManager } from '../hooks/useAuthRedirect';\nimport { useTokenRefresh } from '../hooks/useTokenRefresh';\nimport { Analytics, AnalyticsCategory, AnalyticsEvent } from '../utils/analytics';\nimport { authLogger } from '../utils/logger';\nimport { AccountsProvider, useAccountsContext } from './AccountsContext';\n\nimport type { AuthConfig, AuthContextType, AuthProviderProps, UserProfile } from './types';\n\n// Default routes\nconst defaultRoutes = {\n auth: '/auth',\n defaultCallback: '/dashboard',\n defaultAuthCallback: '/auth',\n};\n\nconst AuthContext = createContext<AuthContextType | undefined>(undefined);\n\n// Constants\nconst EMAIL_STORAGE_KEY = 'auth_email';\n\nconst hasValidTokens = (): boolean => {\n if (typeof window === 'undefined') return false;\n return apiAccounts.isAuthenticated();\n};\n\n// Internal provider that uses AccountsContext\nconst AuthProviderInternal: React.FC<AuthProviderProps> = ({ children, config }) => {\n const accounts = useAccountsContext();\n\n // Redirect URL manager for saving URL before auth redirect\n const redirectManager = useAuthRedirectManager({\n fallbackUrl: config?.routes?.defaultCallback || defaultRoutes.defaultCallback,\n clearOnUse: true,\n });\n\n // Smart initial loading state: only true if we don't have tokens yet\n const [isLoading, setIsLoading] = useState(() => {\n // If we already have tokens and profile, don't show loading\n if (typeof window !== 'undefined') {\n const hasTokens = hasValidTokens();\n // Only show loading on initial mount if no tokens\n return !hasTokens;\n }\n return true;\n });\n\n const [initialized, setInitialized] = useState(false);\n const router = useCfgRouter();\n const pathname = usePathname();\n const queryParams = useQueryParams();\n\n // Use localStorage hook for email\n const [storedEmail, setStoredEmail, clearStoredEmail] = useLocalStorage<string | null>(EMAIL_STORAGE_KEY, null);\n\n // Automatic token refresh - refreshes token before expiry, on focus, and on network reconnect\n useTokenRefresh({\n enabled: true,\n onRefresh: (newToken) => {\n authLogger.info('Token auto-refreshed successfully');\n },\n onRefreshError: (error) => {\n authLogger.warn('Token auto-refresh failed:', error.message);\n // Don't logout on refresh error - user might still have valid session\n },\n });\n\n // Map AccountsContext profile to UserProfile\n const user = accounts.profile as UserProfile | null;\n\n // Use refs to avoid dependency issues\n const userRef = useRef(user);\n const configRef = useRef(config);\n const isLoadingProfileRef = useRef(false);\n\n // Update refs when values change\n useEffect(() => {\n userRef.current = user;\n }, [user]);\n\n useEffect(() => {\n configRef.current = config;\n }, [config]);\n\n // Note: API URL is configured in BaseClient, not at runtime\n\n // Common function to clear auth state\n const clearAuthState = useCallback((caller: string) => {\n authLogger.info('clearAuthState >> caller', caller);\n apiAccounts.clearToken();\n clearProfileCache(); // Clear profile cache from localStorage\n // Note: user is now managed by AccountsContext, will auto-update\n setInitialized(true);\n setIsLoading(false);\n }, []);\n\n // Global error handler for auth-related errors\n // Only clears auth on actual authentication errors (401), not on any API error\n const handleGlobalAuthError = useCallback((error: any, context: string = 'API Request') => {\n // Only clear auth on actual authentication errors (401)\n // Don't logout on validation errors, server errors, network issues, etc.\n const isAuthError = error?.status === 401 ||\n error?.statusCode === 401 ||\n error?.code === 'token_not_valid' ||\n error?.code === 'authentication_failed';\n\n if (isAuthError) {\n authLogger.warn(`Authentication error in ${context}, clearing tokens`);\n clearAuthState(`globalAuthError:${context}`);\n return true;\n }\n\n // Log but don't logout for other errors\n if (error?.success === false) {\n authLogger.warn(`Non-auth error in ${context} (not clearing session):`, error?.message || error);\n }\n\n return false;\n }, [clearAuthState]);\n\n // SWR onError: auto-logout on 401 from any SWR hook\n const isAutoLoggingOutRef = useRef(false);\n const swrOnError = useCallback((error: any) => {\n const isAuthError = error?.status === 401 ||\n error?.statusCode === 401 ||\n error?.code === 'token_not_valid' ||\n error?.code === 'authentication_failed';\n\n if (isAuthError && !isAutoLoggingOutRef.current) {\n isAutoLoggingOutRef.current = true;\n authLogger.warn('SWR 401 error detected, auto-logout');\n clearAuthState('swrOnError:401');\n\n const authCallbackUrl = configRef.current?.routes?.defaultAuthCallback || defaultRoutes.defaultAuthCallback;\n router.hardReplace(authCallbackUrl);\n }\n }, [clearAuthState, router]);\n const swrConfig = useMemo(() => ({ onError: swrOnError }), [swrOnError]);\n\n // Simple profile loading without retry - now uses AccountsContext with memoization\n const loadCurrentProfile = useCallback(async (callerId?: string): Promise<void> => {\n const finalCallerId = callerId || 'AuthContext.loadCurrentProfile';\n\n // Check if profile loading is already in progress\n if (isLoadingProfileRef.current) {\n authLogger.debug(`Profile loading already in progress, skipping duplicate call from: ${finalCallerId}`);\n return;\n }\n\n authLogger.debug(`loadCurrentProfile called by: ${finalCallerId}`);\n\n try {\n isLoadingProfileRef.current = true;\n\n // Ensure API clients are properly initialized with current token\n const isAuth = apiAccounts.isAuthenticated();\n const token = apiAccounts.getToken();\n // authLogger.debug('isAuthenticated:', isAuth, 'token:', token ? token.substring(0, 20) + '...' : 'null');\n\n if (!isAuth) {\n authLogger.warn('No valid authentication token, throwing error');\n throw new Error('No valid authentication token');\n }\n\n // Check if profile is already loaded in AccountsContext to prevent duplicate API calls\n if (accounts.profile && !accounts.isLoadingProfile) {\n authLogger.debug('Profile already loaded in AccountsContext, skipping API call');\n setInitialized(true);\n return;\n }\n\n // Refresh profile from AccountsContext\n const refreshedProfile = await accounts.refreshProfile({ callerId: finalCallerId });\n\n if (refreshedProfile) {\n authLogger.info('Profile loaded successfully:', refreshedProfile.id);\n } else {\n authLogger.warn('Profile refresh returned undefined - but keeping tokens');\n }\n\n // Always mark as initialized if we have valid tokens\n // Don't clear tokens just because profile fetch failed\n setInitialized(true);\n } catch (error: any) {\n authLogger.error('Failed to load profile:', error);\n // Only clear auth state on actual authentication errors (401)\n // Don't logout on network errors, server errors, etc.\n const isAuthError = error?.status === 401 ||\n error?.statusCode === 401 ||\n error?.code === 'token_not_valid' ||\n error?.code === 'authentication_failed';\n\n if (isAuthError) {\n authLogger.warn('Authentication error, clearing session');\n clearAuthState('loadCurrentProfile:authError');\n } else {\n // Keep tokens, mark as initialized - user can retry\n authLogger.warn('Profile load failed but keeping session (non-auth error)');\n setInitialized(true);\n }\n } finally {\n isLoadingProfileRef.current = false;\n }\n }, [clearAuthState, handleGlobalAuthError, accounts]);\n\n // Initialize auth state once\n useEffect(() => {\n if (initialized) return;\n\n const initializeAuth = async () => {\n authLogger.info('Initializing auth...');\n\n // Check if running in iframe (AdminLayout will handle auth via postMessage)\n const isInIframe = typeof window !== 'undefined' && window.self !== window.top;\n authLogger.info('Is in iframe:', isInIframe);\n\n // Debug token state\n const token = apiAccounts.getToken();\n const refreshToken = apiAccounts.getRefreshToken();\n authLogger.info('Token from API:', token ? `${token.substring(0, 20)}...` : 'null');\n authLogger.info('Refresh token from API:', refreshToken ? `${refreshToken.substring(0, 20)}...` : 'null');\n authLogger.info('localStorage keys:', Object.keys(localStorage).filter(k => k.includes('token') || k.includes('auth')));\n\n const hasTokens = hasValidTokens();\n authLogger.info('Has tokens:', hasTokens);\n\n // Check if profile is already loaded from cache (AccountsContext initialization)\n if (userRef.current) {\n authLogger.info('Profile already loaded from AccountsContext cache, skipping API request');\n setInitialized(true);\n setIsLoading(false);\n return;\n }\n\n // Check if cache exists in localStorage (before userRef updates)\n const cachedProfile = getCachedProfile();\n if (cachedProfile) {\n authLogger.info('Profile found in localStorage cache, skipping API request');\n setInitialized(true);\n setIsLoading(false);\n return;\n }\n\n // In iframe mode WITHOUT tokens yet - wait for AdminLayout to receive them via postMessage\n // Don't initialize yet - AdminLayout.handleAuthToken will call loadCurrentProfile\n if (isInIframe && !hasTokens) {\n authLogger.info('Running in iframe without tokens - waiting for parent to send via postMessage');\n authLogger.info('AdminLayout will handle auth initialization, skipping AuthContext init');\n setInitialized(true); // Mark as initialized to prevent re-initialization\n setIsLoading(false);\n return;\n }\n\n if (hasTokens) {\n setIsLoading(true);\n try {\n authLogger.info('No cached profile found, loading from API...');\n await loadCurrentProfile('AuthContext.initializeAuth');\n } catch (error: any) {\n authLogger.error('Failed to load profile during initialization:', error);\n // Only clear on 401 auth error, otherwise keep session\n const isAuthError = error?.status === 401 ||\n error?.statusCode === 401 ||\n error?.code === 'token_not_valid' ||\n error?.code === 'authentication_failed';\n\n if (isAuthError) {\n clearAuthState('initializeAuth:authError');\n } else {\n authLogger.warn('Init profile load failed but keeping session');\n setInitialized(true);\n }\n }\n setIsLoading(false);\n } else {\n setInitialized(true);\n setIsLoading(false);\n }\n };\n\n initializeAuth();\n // eslint-disable-next-line react-hooks/exhaustive-deps\n }, [initialized]);\n\n // Redirect logic - only for unauthenticated users on protected pages\n useEffect(() => {\n if (!initialized) return;\n\n // Consider authenticated if we have valid tokens, even without profile\n const isAuthenticated = apiAccounts.isAuthenticated();\n const authRoute = config?.routes?.auth || defaultRoutes.auth;\n const isAuthPage = pathname === authRoute;\n const flowParam = queryParams.get('flow');\n\n // Only redirect authenticated users away from auth page if they're not in a flow\n // This prevents interference with OTP verification flow\n if (isAuthenticated && isAuthPage && !flowParam) {\n const callbackUrl = config?.routes?.defaultCallback || defaultRoutes.defaultCallback;\n router.push(callbackUrl);\n }\n }, [initialized, pathname, queryParams, config?.routes]);\n\n const pushToDefaultCallbackUrl = useCallback(() => {\n const callbackUrl = config?.routes?.defaultCallback || defaultRoutes.defaultCallback;\n router.push(callbackUrl);\n }, [config?.routes, router]);\n\n const pushToDefaultAuthCallbackUrl = useCallback(() => {\n const authCallbackUrl = config?.routes?.defaultAuthCallback || defaultRoutes.defaultAuthCallback;\n router.push(authCallbackUrl);\n }, [config?.routes, router]);\n\n // Memoized checkAuthAndRedirect function\n const checkAuthAndRedirect = useCallback(async () => {\n try {\n setIsLoading(true);\n const isAuthenticated = apiAccounts.isAuthenticated();\n\n if (isAuthenticated) {\n await loadCurrentProfile();\n if (userRef.current) {\n pushToDefaultCallbackUrl();\n }\n } else {\n pushToDefaultAuthCallbackUrl();\n }\n } catch (error) {\n authLogger.error('Failed to check authentication:', error);\n // Use global error handler first\n if (!handleGlobalAuthError(error, 'checkAuthAndRedirect')) {\n clearAuthState('checkAuthAndRedirect');\n }\n pushToDefaultAuthCallbackUrl();\n } finally {\n setIsLoading(false);\n }\n }, [loadCurrentProfile, clearAuthState, pushToDefaultCallbackUrl, pushToDefaultAuthCallbackUrl, handleGlobalAuthError]);\n\n // OTP methods - email only - now uses AccountsContext\n const requestOTP = useCallback(\n async (identifier: string, sourceUrl?: string): Promise<{ success: boolean; message: string; statusCode?: number; retryAfter?: number }> => {\n // Clear tokens before requesting OTP\n apiAccounts.clearToken();\n\n try {\n const result = await accounts.requestOTP({\n identifier,\n source_url: sourceUrl,\n });\n\n // Track OTP request\n Analytics.event(AnalyticsEvent.AUTH_OTP_REQUEST, {\n category: AnalyticsCategory.AUTH,\n label: 'email',\n });\n\n return {\n success: true,\n message: result.message || `OTP code sent to your email address`,\n };\n } catch (error) {\n authLogger.error('Request OTP error:', error);\n\n if (error instanceof APIError) {\n const retryAfter = error.response?.retry_after ?? error.response?.retryAfter;\n // Django returns { error, error_code, retry_after } — errorMessage reads 'detail'/'message' only\n const message = error.response?.error || error.response?.detail || error.response?.message || error.errorMessage;\n return {\n success: false,\n statusCode: error.statusCode,\n message,\n retryAfter: typeof retryAfter === 'number' ? retryAfter : undefined,\n };\n }\n\n return {\n success: false,\n message: 'Failed to send OTP',\n };\n }\n },\n [accounts],\n );\n\n const verifyOTP = useCallback(\n async (identifier: string, otpCode: string, sourceUrl?: string, redirectUrl?: string, skipRedirect?: boolean): Promise<{\n success: boolean;\n message: string;\n user?: UserProfile;\n requires_2fa?: boolean;\n session_id?: string | null;\n should_prompt_2fa?: boolean;\n }> => {\n try {\n // AccountsContext automatically saves tokens and refreshes profile\n const result = await accounts.verifyOTP({\n identifier,\n otp: otpCode,\n source_url: sourceUrl,\n });\n\n // Check if 2FA is required - return early with session info\n if (result.requires_2fa && result.session_id) {\n authLogger.info('2FA required, session:', result.session_id);\n return {\n success: true,\n message: 'OTP verified, 2FA required',\n requires_2fa: true,\n session_id: result.session_id,\n should_prompt_2fa: result.should_prompt_2fa,\n };\n }\n\n // Verify that we got valid tokens (only required when 2FA is not needed)\n if (!result.access || !result.refresh) {\n authLogger.error('Verify OTP returned invalid response:', result);\n return {\n success: false,\n message: 'Invalid OTP verification response',\n };\n }\n\n // Save email identifier\n if (identifier.includes('@')) {\n setStoredEmail(identifier);\n }\n\n // Small delay to ensure profile state is updated\n await new Promise(resolve => setTimeout(resolve, 200));\n\n // Track successful login\n Analytics.event(AnalyticsEvent.AUTH_LOGIN_SUCCESS, {\n category: AnalyticsCategory.AUTH,\n label: 'email',\n });\n\n // Set user ID for future tracking\n if (result.user?.id) {\n Analytics.setUser(String(result.user.id));\n }\n\n // Handle redirect logic (unless skipRedirect is true)\n if (!skipRedirect) {\n // Priority: provided redirectUrl > saved redirect > config default\n // Use hardPush for full page reload - ensures all React contexts reinitialize\n const savedRedirect = redirectManager.useAndClearRedirect();\n const finalRedirectUrl = redirectUrl || savedRedirect || config?.routes?.defaultCallback || defaultRoutes.defaultCallback;\n authLogger.info('Redirecting after auth to:', finalRedirectUrl);\n router.hardPush(finalRedirectUrl);\n }\n\n return {\n success: true,\n message: 'Login successful',\n user: result.user as UserProfile,\n should_prompt_2fa: result.should_prompt_2fa,\n };\n } catch (error) {\n authLogger.error('Verify OTP error:', error);\n\n // Track failed verification\n Analytics.event(AnalyticsEvent.AUTH_OTP_VERIFY_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: 'email',\n });\n\n if (error instanceof APIError) {\n const message = error.response?.error || error.response?.detail || error.response?.message || error.errorMessage;\n return { success: false, message };\n }\n return {\n success: false,\n message: 'Failed to verify OTP',\n };\n }\n },\n [setStoredEmail, config?.routes?.defaultCallback, accounts, router],\n );\n\n const refreshToken = useCallback(async (): Promise<{ success: boolean; message: string }> => {\n try {\n const refreshTokenValue = apiAccounts.getRefreshToken();\n if (!refreshTokenValue) {\n clearAuthState('refreshToken:noToken');\n\n // Track session expired\n Analytics.event(AnalyticsEvent.AUTH_SESSION_EXPIRED, {\n category: AnalyticsCategory.AUTH,\n });\n\n return {\n success: false,\n message: 'No refresh token available',\n };\n }\n\n await accounts.refreshToken(refreshTokenValue);\n\n // Track successful refresh\n Analytics.event(AnalyticsEvent.AUTH_TOKEN_REFRESH, {\n category: AnalyticsCategory.AUTH,\n });\n\n return {\n success: true,\n message: 'Token refreshed',\n };\n } catch (error) {\n authLogger.error('Refresh token error:', error);\n clearAuthState('refreshToken:error');\n\n // Track refresh failure\n Analytics.event(AnalyticsEvent.AUTH_TOKEN_REFRESH_FAIL, {\n category: AnalyticsCategory.AUTH,\n });\n\n return {\n success: false,\n message: 'Error refreshing token',\n };\n }\n }, [clearAuthState, accounts]);\n\n const logout = useCallback((): void => {\n // Track logout\n Analytics.event(AnalyticsEvent.AUTH_LOGOUT, {\n category: AnalyticsCategory.AUTH,\n });\n\n accounts.logout(); // Clear tokens and profile\n setInitialized(true);\n setIsLoading(false);\n\n // Use hardReplace for full page reload + replace history\n // This ensures contexts reinitialize AND back button won't return to protected page\n const authCallbackUrl = config?.routes?.defaultAuthCallback || defaultRoutes.defaultAuthCallback;\n router.hardReplace(authCallbackUrl);\n }, [accounts, config?.routes?.defaultAuthCallback, router]);\n\n // Computed: Is admin user (staff or superuser)\n const isAdminUser = useMemo(() => {\n return Boolean(user?.is_staff || user?.is_superuser);\n }, [user]);\n\n // Profile management: Update profile data\n const updateProfile = useCallback(\n async (data: { first_name?: string; last_name?: string; username?: string }): Promise<UserProfile> => {\n const result = await accounts.partialUpdateProfile(data);\n return result as UserProfile;\n },\n [accounts]\n );\n\n // Profile management: Upload avatar\n const uploadAvatar = useCallback(\n async (avatar: File | Blob): Promise<UserProfile> => {\n const result = await accounts.uploadAvatar(avatar);\n return result as UserProfile;\n },\n [accounts]\n );\n\n // Memoized context value\n const value = useMemo<AuthContextType>(\n () => ({\n user,\n isLoading,\n // Consider authenticated if we have valid tokens, even without user profile\n isAuthenticated: apiAccounts.isAuthenticated(),\n isAdminUser,\n loadCurrentProfile,\n checkAuthAndRedirect,\n getToken: () => apiAccounts.getToken(),\n getRefreshToken: () => apiAccounts.getRefreshToken(),\n getSavedEmail: () => storedEmail,\n saveEmail: setStoredEmail,\n clearSavedEmail: clearStoredEmail,\n requestOTP,\n verifyOTP,\n refreshToken,\n logout,\n // Redirect URL methods\n saveRedirectUrl: redirectManager.setRedirect,\n getRedirectUrl: redirectManager.getFinalRedirectUrl,\n clearRedirectUrl: redirectManager.clearRedirect,\n hasRedirectUrl: redirectManager.hasRedirect,\n // Profile management\n updateProfile,\n uploadAvatar,\n }),\n [\n user,\n isLoading,\n isAdminUser,\n loadCurrentProfile,\n checkAuthAndRedirect,\n storedEmail,\n setStoredEmail,\n clearStoredEmail,\n requestOTP,\n verifyOTP,\n refreshToken,\n logout,\n redirectManager,\n updateProfile,\n uploadAvatar,\n ],\n );\n\n return (\n <AuthContext.Provider value={value}>\n <SWRConfig value={swrConfig}>{children}</SWRConfig>\n </AuthContext.Provider>\n );\n};\n\n// Wrapper that provides AccountsContext\n/**\n * AuthProvider — wraps AccountsProvider + AuthProviderInternal.\n *\n * Memoised: re-renders only when `config` reference or `children` change.\n * Internal auth state is isolated inside AuthProviderInternal.\n */\nfunction AuthProviderRaw({ children, config }: AuthProviderProps) {\n return (\n <AccountsProvider>\n <AuthProviderInternal config={config}>\n {children}\n </AuthProviderInternal>\n </AccountsProvider>\n );\n}\n\nexport const AuthProvider = memo(AuthProviderRaw);\n\n/**\n * Default auth state for SSR/outside provider\n * Returns safe defaults that indicate \"not authenticated, not loading\"\n */\nconst defaultAuthState: AuthContextType = {\n user: null,\n isLoading: false,\n isAuthenticated: false,\n isAdminUser: false,\n loadCurrentProfile: async () => {\n authLogger.warn('useAuth: loadCurrentProfile called outside AuthProvider');\n },\n checkAuthAndRedirect: async () => {\n authLogger.warn('useAuth: checkAuthAndRedirect called outside AuthProvider');\n },\n getToken: () => null,\n getRefreshToken: () => null,\n getSavedEmail: () => null,\n saveEmail: () => {\n authLogger.warn('useAuth: saveEmail called outside AuthProvider');\n },\n clearSavedEmail: () => {},\n requestOTP: async () => {\n authLogger.warn('useAuth: requestOTP called outside AuthProvider');\n return { success: false, message: 'AuthProvider not available' };\n },\n verifyOTP: async () => {\n authLogger.warn('useAuth: verifyOTP called outside AuthProvider');\n return { success: false, message: 'AuthProvider not available' };\n },\n refreshToken: async () => {\n authLogger.warn('useAuth: refreshToken called outside AuthProvider');\n return { success: false, message: 'AuthProvider not available' };\n },\n logout: async (_options?: { skipConfirm?: boolean }) => {\n authLogger.warn('useAuth: logout called outside AuthProvider');\n },\n saveRedirectUrl: () => {},\n getRedirectUrl: () => null,\n clearRedirectUrl: () => {},\n hasRedirectUrl: () => false,\n updateProfile: async () => {\n authLogger.warn('useAuth: updateProfile called outside AuthProvider');\n return {} as UserProfile;\n },\n uploadAvatar: async () => {\n authLogger.warn('useAuth: uploadAvatar called outside AuthProvider');\n return {} as UserProfile;\n },\n};\n\n/**\n * Hook to access auth context\n *\n * SSR-safe: Returns default unauthenticated state when called outside AuthProvider\n * (e.g., during static page generation or server-side rendering)\n */\nexport const useAuth = (): AuthContextType => {\n const context = useContext(AuthContext);\n\n if (context === undefined) {\n // SSR or outside provider - return safe defaults\n // Log only in development to help debugging\n if (isBrowser && isDev) {\n authLogger.debug('useAuth called outside AuthProvider, returning default state');\n }\n return defaultAuthState;\n }\n\n return context;\n};\n\nexport default AuthContext; ","/**\n * Universal Router Hook with BasePath Support\n *\n * Wrapper around Next.js useRouter that automatically handles basePath\n * for static builds served via iframe or subdirectory\n * \n * IMPORTANT: In Next.js 15 App Router, router.push() does NOT automatically\n * handle basePath (unlike Pages Router). This is a breaking change in App Router.\n * \n * This hook ensures basePath is always included when navigating, especially\n * important for static exports served via iframe where basePath is critical.\n * \n * @see https://nextjs.org/docs/app/building-your-application/upgrading/app-router-migration\n */\n\n'use client';\n\nimport { useRouter as useNextRouter } from 'next/navigation';\nimport { useCallback, useMemo } from 'react';\n\n/**\n * Get base path from environment variable\n */\nfunction getBasePath(): string {\n if (typeof process === 'undefined') {\n return '';\n }\n return process.env.NEXT_PUBLIC_BASE_PATH || '';\n}\n\n/**\n * Add base path to a route path\n */\nfunction withBasePath(path: string, basePath: string): string {\n if (!basePath) {\n return path;\n }\n // Ensure path starts with /\n const normalizedPath = path.startsWith('/') ? path : `/${path}`;\n // Remove trailing slash from basePath\n const normalizedBasePath = basePath.replace(/\\/$/, '');\n return `${normalizedBasePath}${normalizedPath}`;\n}\n\n/**\n * Router with basePath support\n *\n * Automatically adds basePath to all navigation methods when basePath is configured.\n * In Next.js 15 App Router, router.push() doesn't handle basePath automatically,\n * so this hook uses window.location to ensure basePath is always included.\n *\n * @example\n * ```tsx\n * const router = useCfgRouter();\n *\n * // With basePath='/cfg/admin':\n * router.push('/dashboard'); // Client-side navigation to '/cfg/admin/dashboard'\n * router.replace('/auth'); // Client-side replace with '/cfg/admin/auth'\n * router.hardPush('/dashboard'); // Full page reload to '/cfg/admin/dashboard'\n * router.hardReplace('/auth'); // Full page replace with '/cfg/admin/auth'\n * ```\n */\nexport function useCfgRouter() {\n const router = useNextRouter();\n\n // Get basePath and check if we're in static build mode\n const basePath = useMemo(() => getBasePath(), []);\n const isStaticBuild = useMemo(() => {\n return typeof process !== 'undefined' && process.env.NEXT_PUBLIC_STATIC_BUILD === 'true';\n }, []);\n\n const push = useCallback((href: string, options?: { scroll?: boolean }) => {\n if (basePath) {\n // App Router doesn't handle basePath automatically, use window.location\n window.location.href = withBasePath(href, basePath);\n } else {\n // No basePath configured, use standard router\n router.push(href, options);\n }\n }, [router, basePath]);\n\n const replace = useCallback((href: string, options?: { scroll?: boolean }) => {\n if (basePath) {\n // App Router doesn't handle basePath automatically, use window.location\n window.location.replace(withBasePath(href, basePath));\n } else {\n // No basePath configured, use standard router\n router.replace(href, options);\n }\n }, [router, basePath]);\n\n /**\n * Hard push - always uses window.location.href for full page reload\n *\n * Use this for auth redirects where React contexts need to reinitialize.\n * Unlike push(), this ALWAYS triggers a full page reload, ensuring all\n * contexts are reinitialized with fresh state.\n *\n * @example\n * ```tsx\n * // After successful login - contexts need to reload with new auth state\n * router.hardPush('/dashboard');\n * ```\n */\n const hardPush = useCallback((href: string) => {\n window.location.href = withBasePath(href, basePath);\n }, [basePath]);\n\n /**\n * Hard replace - always uses window.location.replace for full page reload\n *\n * Same as hardPush but replaces current history entry.\n * Use for auth redirects where you don't want back button to return to login.\n *\n * @example\n * ```tsx\n * // After logout - replace so back button doesn't go to protected page\n * router.hardReplace('/auth');\n * ```\n */\n const hardReplace = useCallback((href: string) => {\n window.location.replace(withBasePath(href, basePath));\n }, [basePath]);\n\n const prefetch = useCallback((href: string) => {\n // Prefetch doesn't need basePath handling, Next.js handles it\n router.prefetch(href);\n }, [router]);\n\n const back = useCallback(() => {\n router.back();\n }, [router]);\n\n const forward = useCallback(() => {\n router.forward();\n }, [router]);\n\n const refresh = useCallback(() => {\n router.refresh();\n }, [router]);\n\n return {\n push,\n replace,\n hardPush,\n hardReplace,\n prefetch,\n back,\n forward,\n refresh,\n };\n}\n\n","/**\n * useQueryParams Hook\n * \n * Safe hook to access URL query parameters without requiring Suspense boundary.\n * Works on client-side only, returns empty URLSearchParams during SSR/prerendering.\n * \n * @example\n * ```tsx\n * const params = useQueryParams();\n * const flow = params.get('flow');\n * const hasFlow = params.has('flow');\n * const allTags = params.getAll('tags');\n * ```\n */\n\n'use client';\n\nimport { usePathname } from 'next/navigation';\nimport { useEffect, useRef, useState } from 'react';\n\n/**\n * Hook to safely access URL query parameters without useSearchParams()\n * \n * This hook reads query parameters directly from window.location.search,\n * avoiding the need for Suspense boundaries that useSearchParams() requires.\n * \n * Automatically updates when URL changes (navigation, back/forward, etc.)\n * Uses pathname from Next.js to detect route changes and polls for query param changes.\n * \n * Returns a URLSearchParams object with get(), getAll(), has(), etc.\n * \n * @returns URLSearchParams object (empty during SSR)\n */\nexport function useQueryParams(): URLSearchParams {\n const pathname = usePathname();\n const [queryParams, setQueryParams] = useState<URLSearchParams>(() => {\n if (typeof window === 'undefined') {\n return new URLSearchParams();\n }\n return new URLSearchParams(window.location.search);\n });\n const lastSearchRef = useRef<string>('');\n\n useEffect(() => {\n if (typeof window === 'undefined') return;\n\n const updateQueryParams = () => {\n const currentSearch = window.location.search;\n if (currentSearch !== lastSearchRef.current) {\n lastSearchRef.current = currentSearch;\n setQueryParams(new URLSearchParams(currentSearch));\n }\n };\n\n // Update when pathname changes (Next.js navigation)\n updateQueryParams();\n\n // Listen to popstate (back/forward navigation)\n window.addEventListener('popstate', updateQueryParams);\n\n // Poll for query param changes (for router.push with same pathname)\n // This handles cases where Next.js router.push updates query params without changing pathname\n const intervalId = setInterval(updateQueryParams, 100);\n\n return () => {\n window.removeEventListener('popstate', updateQueryParams);\n clearInterval(intervalId);\n };\n }, [pathname]);\n\n return queryParams;\n}\n\n","\"use client\"\n\nimport { useCallback, useEffect, useRef, useState } from 'react';\n\nimport type { AuthFormState, AuthFormStateHandlers, AuthStep } from '../types';\n\nconst formatCountdown = (s: number): string => {\n if (s <= 0) return '';\n const m = Math.floor(s / 60);\n return m > 0 ? `${m}:${String(s % 60).padStart(2, '0')}` : `${s}s`;\n};\n\nexport interface UseAuthFormStateReturn extends AuthFormState, AuthFormStateHandlers {}\n\n/**\n * Hook for auth form state management.\n * Pure state - no side effects, no API calls.\n */\nexport const useAuthFormState = (\n initialIdentifier = '',\n): UseAuthFormStateReturn => {\n const [identifier, setIdentifier] = useState(initialIdentifier);\n const [otp, setOtp] = useState('');\n const [isLoading, setIsLoading] = useState(false);\n const [acceptedTerms, setAcceptedTerms] = useState(true);\n const [step, setStep] = useState<AuthStep>('identifier');\n const [error, setError] = useState('');\n\n // 2FA state\n const [twoFactorSessionId, setTwoFactorSessionId] = useState<string | null>(null);\n const [shouldPrompt2FA, setShouldPrompt2FA] = useState(false);\n const [twoFactorCode, setTwoFactorCode] = useState('');\n const [useBackupCode, setUseBackupCode] = useState(false);\n\n // Rate limit countdown\n const [rateLimitSeconds, setRateLimitSeconds] = useState(0);\n const rateLimitTimerRef = useRef<ReturnType<typeof setInterval> | null>(null);\n\n const startRateLimitCountdown = useCallback((seconds: number) => {\n if (rateLimitTimerRef.current) clearInterval(rateLimitTimerRef.current);\n setRateLimitSeconds(seconds);\n rateLimitTimerRef.current = setInterval(() => {\n setRateLimitSeconds((prev) => {\n if (prev <= 1) {\n clearInterval(rateLimitTimerRef.current!);\n rateLimitTimerRef.current = null;\n return 0;\n }\n return prev - 1;\n });\n }, 1000);\n }, []);\n\n useEffect(() => () => {\n if (rateLimitTimerRef.current) clearInterval(rateLimitTimerRef.current);\n }, []);\n\n const clearError = useCallback(() => setError(''), []);\n\n return {\n // State\n identifier,\n otp,\n isLoading,\n acceptedTerms,\n step,\n error,\n twoFactorSessionId,\n shouldPrompt2FA,\n twoFactorCode,\n useBackupCode,\n rateLimitSeconds,\n isRateLimited: rateLimitSeconds > 0,\n rateLimitLabel: formatCountdown(rateLimitSeconds),\n // Handlers\n setIdentifier,\n setOtp,\n setAcceptedTerms,\n setError,\n clearError,\n setStep,\n setIsLoading,\n setTwoFactorSessionId,\n setShouldPrompt2FA,\n setTwoFactorCode,\n setUseBackupCode,\n startRateLimitCountdown,\n };\n};\n","\"use client\"\n\nimport { useCallback } from 'react';\n\nimport type { AuthFormValidation } from '../types';\n\nconst EMAIL_REGEX = /^[^\\s@]+@[^\\s@]+\\.[^\\s@]+$/;\n\nexport const useAuthValidation = (): AuthFormValidation => {\n const validateIdentifier = useCallback((id: string): boolean => {\n return EMAIL_REGEX.test(id);\n }, []);\n\n return { validateIdentifier };\n};\n\nexport const validateIdentifier = (id: string): boolean => EMAIL_REGEX.test(id);\n","\"use client\"\n\nimport { useCallback, useEffect, useRef } from 'react';\n\nimport { AUTH_CONSTANTS } from '../constants';\nimport { useAuth } from '../context';\nimport { authLogger } from '../utils/logger';\nimport { useAuthFormState } from './useAuthFormState';\nimport { useAuthValidation } from './useAuthValidation';\nimport { useAutoAuth } from './useAutoAuth';\nimport { useTwoFactor } from './useTwoFactor';\n\nimport type { AuthFormReturn, UseAuthFormOptions } from '../types';\n/**\n * Complete auth form hook.\n * Composes smaller hooks for state, validation, and submission.\n */\nexport const useAuthForm = (options: UseAuthFormOptions): AuthFormReturn => {\n const {\n onIdentifierSuccess,\n onOTPSuccess,\n onError,\n sourceUrl,\n redirectUrl,\n requireTermsAcceptance = false,\n authPath = '/auth',\n enable2FASetup = true,\n } = options;\n\n // Compose smaller hooks\n const formState = useAuthFormState();\n const validation = useAuthValidation();\n\n // Ref to track auto-submit from URL\n const isAutoSubmitFromUrlRef = useRef(false);\n\n // Auth context for API calls and storage\n const {\n requestOTP,\n verifyOTP,\n getSavedEmail,\n saveEmail,\n } = useAuth();\n\n // Destructure for convenience\n const {\n identifier,\n otp,\n isLoading,\n acceptedTerms,\n twoFactorSessionId,\n twoFactorCode,\n useBackupCode,\n setIdentifier,\n setOtp,\n setStep,\n setError,\n setIsLoading,\n clearError,\n setTwoFactorSessionId,\n setShouldPrompt2FA,\n setTwoFactorCode,\n setUseBackupCode,\n startRateLimitCountdown,\n } = formState;\n\n // 2FA verification hook - skip redirect so we can show success screen\n const twoFactor = useTwoFactor({\n onSuccess: () => {\n authLogger.info('2FA verification successful, showing success screen');\n setStep('success');\n onOTPSuccess?.();\n },\n onError: (error) => {\n setError(error);\n onError?.(error);\n },\n redirectUrl,\n skipRedirect: true, // We handle navigation via success step\n });\n\n const { validateIdentifier } = validation;\n\n // ─────────────────────────────────────────────────────────────────────────\n // Storage Helper\n // ─────────────────────────────────────────────────────────────────────────\n\n const saveIdentifierToStorage = useCallback((id: string) => {\n saveEmail(id);\n }, [saveEmail]);\n\n // ─────────────────────────────────────────────────────────────────────────\n // Effects\n // ─────────────────────────────────────────────────────────────────────────\n\n // Load saved identifier on mount\n useEffect(() => {\n const savedEmail = getSavedEmail();\n if (savedEmail) {\n setIdentifier(savedEmail);\n }\n // eslint-disable-next-line react-hooks/exhaustive-deps\n }, []);\n\n // ─────────────────────────────────────────────────────────────────────────\n // Submit Handlers\n // ─────────────────────────────────────────────────────────────────────────\n\n const handleIdentifierSubmit = useCallback(async (e: React.FormEvent) => {\n e.preventDefault();\n\n if (!identifier) {\n const msg = 'Please enter your email address';\n setError(msg);\n onError?.(msg);\n return;\n }\n\n if (!validateIdentifier(identifier)) {\n const msg = 'Please enter a valid email address';\n setError(msg);\n onError?.(msg);\n return;\n }\n\n if (requireTermsAcceptance && !acceptedTerms) {\n const msg = 'Please accept the Terms of Service and Privacy Policy';\n setError(msg);\n onError?.(msg);\n return;\n }\n\n setIsLoading(true);\n clearError();\n\n try {\n const result = await requestOTP(identifier, sourceUrl);\n\n if (result.success) {\n saveIdentifierToStorage(identifier);\n setStep('otp');\n onIdentifierSuccess?.(identifier);\n } else {\n if (result.retryAfter) {\n startRateLimitCountdown(result.retryAfter);\n clearError();\n } else {\n setError(result.message);\n onError?.(result.message);\n }\n }\n } catch {\n const msg = 'An unexpected error occurred';\n setError(msg);\n onError?.(msg);\n } finally {\n setIsLoading(false);\n }\n }, [\n identifier, acceptedTerms, requireTermsAcceptance,\n validateIdentifier, requestOTP, saveIdentifierToStorage,\n setError, setIsLoading, setStep, clearError,\n startRateLimitCountdown, onIdentifierSuccess, onError, sourceUrl,\n ]);\n\n // Core OTP submit - accepts explicit values to avoid stale closures\n const submitOTP = useCallback(async (\n submitIdentifier: string,\n submitOtp: string,\n ): Promise<boolean> => {\n if (!submitOtp || submitOtp.length < AUTH_CONSTANTS.EMAIL_OTP_LENGTH) {\n const msg = `Please enter the ${AUTH_CONSTANTS.EMAIL_OTP_LENGTH}-digit verification code`;\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n setIsLoading(true);\n clearError();\n\n try {\n // Skip redirect - we'll show success screen first\n const result = await verifyOTP(submitIdentifier, submitOtp, sourceUrl, redirectUrl, true);\n\n // Check if 2FA is required (user has TOTP device)\n if (result.requires_2fa && result.session_id) {\n authLogger.info('2FA required after OTP verification');\n setTwoFactorSessionId(result.session_id);\n setShouldPrompt2FA(result.should_prompt_2fa || false);\n setStep('2fa');\n saveIdentifierToStorage(submitIdentifier);\n return true; // OTP was successful, now need 2FA\n }\n\n if (result.success) {\n saveIdentifierToStorage(submitIdentifier);\n\n // Check if user should be prompted to set up 2FA\n // Only show 2FA setup prompt if enable2FASetup is true (default)\n if (result.should_prompt_2fa && enable2FASetup) {\n authLogger.info('OTP verification successful, prompting 2FA setup');\n setShouldPrompt2FA(true);\n setStep('2fa-setup');\n onOTPSuccess?.();\n return true;\n }\n\n // Skip 2FA setup prompt if enable2FASetup is false\n if (result.should_prompt_2fa && !enable2FASetup) {\n authLogger.info('OTP verification successful, skipping 2FA setup prompt (disabled)');\n } else {\n authLogger.info('OTP verification successful, showing success screen');\n }\n setStep('success');\n onOTPSuccess?.();\n return true;\n } else {\n setError(result.message);\n onError?.(result.message);\n return false;\n }\n } catch {\n const msg = 'An unexpected error occurred';\n setError(msg);\n onError?.(msg);\n return false;\n } finally {\n setIsLoading(false);\n }\n }, [verifyOTP, saveIdentifierToStorage, setError, setIsLoading, clearError, onOTPSuccess, onError, sourceUrl, redirectUrl, setTwoFactorSessionId, setShouldPrompt2FA, setStep, enable2FASetup]);\n\n const handleOTPSubmit = useCallback(async (e: React.FormEvent) => {\n e.preventDefault();\n await submitOTP(identifier, otp);\n }, [identifier, otp, submitOTP]);\n\n const handleResendOTP = useCallback(async () => {\n setIsLoading(true);\n clearError();\n\n try {\n const result = await requestOTP(identifier, sourceUrl);\n\n if (result.success) {\n saveIdentifierToStorage(identifier);\n setOtp('');\n } else {\n if (result.retryAfter) {\n startRateLimitCountdown(result.retryAfter);\n clearError(); // countdown in rateLimitLabel is enough feedback\n } else {\n setError(result.message);\n onError?.(result.message);\n }\n }\n } catch {\n const msg = 'Failed to resend verification code';\n setError(msg);\n onError?.(msg);\n } finally {\n setIsLoading(false);\n }\n }, [identifier, requestOTP, saveIdentifierToStorage, setOtp, setError, setIsLoading, clearError, startRateLimitCountdown, onError, sourceUrl]);\n\n const handleBackToIdentifier = useCallback(() => {\n setStep('identifier');\n clearError();\n }, [setStep, clearError]);\n\n const forceOTPStep = useCallback(() => {\n setStep('otp');\n clearError();\n }, [setStep, clearError]);\n\n // ─────────────────────────────────────────────────────────────────────────\n // 2FA Handlers\n // ─────────────────────────────────────────────────────────────────────────\n\n const handle2FASubmit = useCallback(async (e: React.FormEvent) => {\n e.preventDefault();\n\n if (!twoFactorSessionId) {\n const msg = 'Missing 2FA session';\n setError(msg);\n onError?.(msg);\n return;\n }\n\n if (useBackupCode) {\n await twoFactor.verifyBackupCode(twoFactorSessionId, twoFactorCode);\n } else {\n await twoFactor.verifyTOTP(twoFactorSessionId, twoFactorCode);\n }\n }, [twoFactorSessionId, twoFactorCode, useBackupCode, twoFactor, setError, onError]);\n\n const handleUseBackupCode = useCallback(() => {\n setUseBackupCode(true);\n setTwoFactorCode('');\n clearError();\n }, [setUseBackupCode, setTwoFactorCode, clearError]);\n\n const handleUseTOTP = useCallback(() => {\n setUseBackupCode(false);\n setTwoFactorCode('');\n clearError();\n }, [setUseBackupCode, setTwoFactorCode, clearError]);\n\n // ─────────────────────────────────────────────────────────────────────────\n // Auto-auth from URL\n // ─────────────────────────────────────────────────────────────────────────\n\n useAutoAuth({\n allowedPaths: [authPath],\n onOTPDetected: (detectedOtp: string) => {\n if (isAutoSubmitFromUrlRef.current || isLoading) return;\n isAutoSubmitFromUrlRef.current = true;\n\n authLogger.info('OTP detected from URL, auto-submitting');\n\n const savedEmail = getSavedEmail();\n const autoIdentifier = savedEmail || '';\n\n if (!autoIdentifier) {\n authLogger.warn('No saved identifier found for auto-submit');\n isAutoSubmitFromUrlRef.current = false;\n return;\n }\n\n // Update UI state\n setIdentifier(autoIdentifier);\n setOtp(detectedOtp);\n setStep('otp');\n\n // Submit with explicit values\n setTimeout(async () => {\n try {\n await submitOTP(autoIdentifier, detectedOtp);\n } finally {\n isAutoSubmitFromUrlRef.current = false;\n }\n }, 100);\n },\n cleanupUrl: true,\n });\n\n // ─────────────────────────────────────────────────────────────────────────\n // Return\n // ─────────────────────────────────────────────────────────────────────────\n\n return {\n // State\n ...formState,\n\n // Submit handlers\n handleIdentifierSubmit,\n handleOTPSubmit,\n handleResendOTP,\n handleBackToIdentifier,\n forceOTPStep,\n\n // 2FA handlers\n handle2FASubmit,\n handleUseBackupCode,\n handleUseTOTP,\n\n // Validation\n ...validation,\n\n // Auto-submit ref\n isAutoSubmittingFromUrl: isAutoSubmitFromUrlRef,\n\n // 2FA state from hook (for loading indicator)\n is2FALoading: twoFactor.isLoading,\n twoFactorWarning: twoFactor.warning,\n twoFactorAttemptsRemaining: twoFactor.attemptsRemaining,\n };\n};\n\n// Re-export types for convenience\nexport type { AuthFormReturn, UseAuthFormOptions } from '../types';\n","import { createConsola } from 'consola';\n\n/**\n * Universal logger for @djangocfg/api/auth\n * Uses consola for beautiful console logging\n *\n * Log levels:\n * - 0: silent\n * - 1: fatal, error\n * - 2: warn\n * - 3: log, info\n * - 4: debug\n * - 5: trace, verbose\n */\nimport { isDev as isDevelopment } from './env';\nconst isStaticBuild = process.env.NEXT_PUBLIC_STATIC_BUILD === 'true';\nconst showLogs = isDevelopment || isStaticBuild;\n\nexport const logger = createConsola({\n level: showLogs ? 4 : 1, // dev: debug, production: errors only\n}).withTag('api');\n\n/**\n * Auth-specific logger\n */\nexport const authLogger = logger.withTag('auth');\n\nexport default logger;\n","'use client';\n\nimport { usePathname } from 'next/navigation';\nimport { useEffect } from 'react';\n\nimport { AUTH_CONSTANTS } from '../constants';\nimport { authLogger } from '../utils/logger';\nimport { useCfgRouter } from './useCfgRouter';\nimport { useQueryParams } from './useQueryParams';\n\nexport interface UseAutoAuthOptions {\n onOTPDetected?: (otp: string) => void;\n cleanupUrl?: boolean;\n /** Paths where auto-auth should be active. Default: ['/auth'] */\n allowedPaths?: string[];\n}\n\n/**\n * Hook for automatic authentication from URL query parameters\n * Detects OTP from URL and triggers callback\n */\nexport const useAutoAuth = (options: UseAutoAuthOptions = {}) => {\n const { onOTPDetected, cleanupUrl = true, allowedPaths = ['/auth'] } = options;\n const queryParams = useQueryParams();\n const pathname = usePathname();\n const router = useCfgRouter();\n\n // Check if current path is in allowed paths\n const isAllowedPath = allowedPaths.some(path => pathname === path || pathname?.startsWith(path + '/'));\n\n const hasOTP = !!(queryParams.get('otp'));\n const isReady = !!pathname && hasOTP && isAllowedPath;\n\n useEffect(() => {\n if (!isReady) return;\n\n const queryOtp = queryParams.get('otp') as string;\n\n // Handle OTP detection - only on allowed paths to avoid conflicts with other pages\n // (e.g., /dashboard/device uses ?otp= for device authorization, not user auth)\n if (queryOtp && typeof queryOtp === 'string' && queryOtp.length === AUTH_CONSTANTS.EMAIL_OTP_LENGTH) {\n authLogger.info('OTP detected in URL on auth page:', queryOtp);\n onOTPDetected?.(queryOtp);\n }\n\n // Clean up URL to remove sensitive params for security\n // Use window.location.pathname to preserve the locale prefix (e.g. /ru/auth)\n // because usePathname() strips the locale, and router.push('/auth') would cause\n // next-intl middleware to redirect back to /ru/auth — triggering a full page reload\n // that loses the in-flight OTP submission.\n if (cleanupUrl && queryOtp) {\n const cleanQuery = Object.fromEntries(queryParams.entries());\n delete cleanQuery.otp;\n const queryString = new URLSearchParams(cleanQuery).toString();\n const realPathname = typeof window !== 'undefined' ? window.location.pathname : pathname;\n router.replace(queryString ? `${realPathname}?${queryString}` : realPathname);\n }\n }, [pathname, queryParams, onOTPDetected, cleanupUrl, router, isReady]);\n\n return {\n isReady,\n hasOTP,\n isAllowedPath,\n };\n};\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiAccounts, apiTotp } from '../../clients';\nimport { APIError } from '../../_api/generated/helpers';\nimport { CfgTotp, CfgTotpVerify } from '../../_api/generated/sdk.gen';\nimport { Analytics, AnalyticsCategory, AnalyticsEvent } from '../utils/analytics';\nimport { authLogger } from '../utils/logger';\nimport { useCfgRouter } from './useCfgRouter';\n\nexport interface UseTwoFactorOptions {\n /** Callback on successful 2FA verification */\n onSuccess?: (user: any) => void;\n /** Callback on error */\n onError?: (error: string) => void;\n /** URL to redirect after successful verification */\n redirectUrl?: string;\n /** Skip automatic redirect after success (caller handles navigation) */\n skipRedirect?: boolean;\n}\n\nexport interface UseTwoFactorReturn {\n /** Loading state */\n isLoading: boolean;\n /** Error message */\n error: string | null;\n /** Warning message (e.g., low backup codes) */\n warning: string | null;\n /** Remaining backup codes (if backup code was used) */\n remainingBackupCodes: number | null;\n /** Remaining verification attempts before lockout */\n attemptsRemaining: number | null;\n /** Verify TOTP code */\n verifyTOTP: (sessionId: string, code: string) => Promise<boolean>;\n /** Verify backup code */\n verifyBackupCode: (sessionId: string, backupCode: string) => Promise<boolean>;\n /** Clear error */\n clearError: () => void;\n}\n\n/**\n * Hook for 2FA verification during login.\n *\n * Usage:\n * 1. After OTP/OAuth verification returns requires_2fa=true and session_id\n * 2. Show 2FA form and collect TOTP code from user\n * 3. Call verifyTOTP(sessionId, code) to complete authentication\n *\n * @example\n * ```tsx\n * const { isLoading, error, verifyTOTP, verifyBackupCode } = useTwoFactor({\n * onSuccess: (user) => console.log('Logged in:', user),\n * onError: (error) => console.error(error),\n * redirectUrl: '/dashboard',\n * });\n *\n * const handleSubmit = async (code: string) => {\n * if (useBackupCode) {\n * await verifyBackupCode(sessionId, code);\n * } else {\n * await verifyTOTP(sessionId, code);\n * }\n * };\n * ```\n */\nexport const useTwoFactor = (options: UseTwoFactorOptions = {}): UseTwoFactorReturn => {\n const { onSuccess, onError, redirectUrl, skipRedirect = false } = options;\n const router = useCfgRouter();\n\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n const [warning, setWarning] = useState<string | null>(null);\n const [remainingBackupCodes, setRemainingBackupCodes] = useState<number | null>(null);\n const [attemptsRemaining, setAttemptsRemaining] = useState<number | null>(null);\n\n const clearError = useCallback(() => {\n setError(null);\n }, []);\n\n /**\n * Handle successful 2FA verification\n */\n const handleSuccess = useCallback((response: {\n access_token: string;\n refresh_token: string;\n user: any;\n warning?: string;\n remaining_backup_codes?: number;\n }) => {\n // Save tokens\n apiAccounts.setToken(response.access_token);\n apiAccounts.setRefreshToken(response.refresh_token);\n\n // Set warning if any\n if (response.warning) {\n setWarning(response.warning);\n }\n\n // Set remaining backup codes if provided\n if (response.remaining_backup_codes !== undefined) {\n setRemainingBackupCodes(response.remaining_backup_codes);\n }\n\n // Track successful 2FA\n Analytics.event(AnalyticsEvent.AUTH_LOGIN_SUCCESS, {\n category: AnalyticsCategory.AUTH,\n label: '2fa',\n });\n\n // Set user ID for tracking\n if (response.user?.id) {\n Analytics.setUser(String(response.user.id));\n }\n\n // Call success callback\n onSuccess?.(response.user);\n\n // Redirect (unless skipRedirect is true)\n if (!skipRedirect) {\n const finalRedirectUrl = redirectUrl || '/dashboard';\n authLogger.info('2FA successful, redirecting to:', finalRedirectUrl);\n router.hardPush(finalRedirectUrl);\n }\n }, [onSuccess, redirectUrl, router, skipRedirect]);\n\n /**\n * Verify TOTP code from authenticator app\n */\n const verifyTOTP = useCallback(async (sessionId: string, code: string): Promise<boolean> => {\n if (!sessionId) {\n const msg = 'Missing 2FA session ID';\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n if (!code || code.length !== 6) {\n const msg = 'Please enter a 6-digit code';\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Verifying TOTP code...');\n\n const result = await CfgTotpVerify.cfgTotpVerifyCreate({\n body: { session_id: sessionId, code },\n throwOnError: true,\n });\n const response = result.data;\n\n if (!response.access_token || !response.refresh_token) {\n throw new Error('Invalid response from 2FA verification');\n }\n\n handleSuccess(response);\n return true;\n\n } catch (err) {\n authLogger.error('2FA TOTP verification error:', err);\n const errorMessage = err instanceof APIError\n ? (err.response?.error || err.response?.detail || err.response?.message || err.errorMessage)\n : (err instanceof Error ? err.message : 'Invalid verification code');\n if (err instanceof APIError && typeof err.response?.attempts_remaining === 'number') {\n setAttemptsRemaining(err.response.attempts_remaining);\n }\n setError(errorMessage);\n onError?.(errorMessage);\n\n // Track failed 2FA\n Analytics.event(AnalyticsEvent.AUTH_OTP_VERIFY_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: '2fa-totp',\n });\n\n return false;\n } finally {\n setIsLoading(false);\n }\n }, [handleSuccess, onError]);\n\n /**\n * Verify backup recovery code\n */\n const verifyBackupCode = useCallback(async (sessionId: string, backupCode: string): Promise<boolean> => {\n if (!sessionId) {\n const msg = 'Missing 2FA session ID';\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n if (!backupCode || backupCode.length < 8) {\n const msg = 'Please enter your backup code';\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Verifying backup code...');\n\n const result = await CfgTotpVerify.cfgTotpVerifyBackupCreate({\n body: {\n session_id: sessionId,\n backup_code: backupCode.replace(/\\s+/g, ''),\n },\n throwOnError: true,\n });\n const response = result.data;\n\n if (!response.access_token || !response.refresh_token) {\n throw new Error('Invalid response from backup code verification');\n }\n\n handleSuccess(response);\n return true;\n\n } catch (err) {\n authLogger.error('2FA backup code verification error:', err);\n const errorMessage = err instanceof APIError\n ? (err.response?.error || err.response?.detail || err.response?.message || err.errorMessage)\n : (err instanceof Error ? err.message : 'Invalid backup code');\n if (err instanceof APIError && typeof err.response?.attempts_remaining === 'number') {\n setAttemptsRemaining(err.response.attempts_remaining);\n }\n setError(errorMessage);\n onError?.(errorMessage);\n\n // Track failed 2FA\n Analytics.event(AnalyticsEvent.AUTH_OTP_VERIFY_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: '2fa-backup',\n });\n\n return false;\n } finally {\n setIsLoading(false);\n }\n }, [handleSuccess, onError]);\n\n return {\n isLoading,\n error,\n warning,\n remainingBackupCodes,\n attemptsRemaining,\n verifyTOTP,\n verifyBackupCode,\n clearError,\n };\n};\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Typed error classes with DRF field-error support.\n// DO NOT EDIT — re-run `make gen`.\n\n/**\n * HTTP API Error with DRF field-specific validation errors.\n */\nexport class APIError extends Error {\n constructor(\n public statusCode: number,\n public statusText: string,\n public response: any,\n public url: string,\n message?: string,\n ) {\n super(message || `HTTP ${statusCode}: ${statusText}`);\n this.name = \"APIError\";\n }\n\n get details(): Record<string, any> | null {\n if (typeof this.response === \"object\" && this.response !== null) {\n return this.response;\n }\n return null;\n }\n\n get fieldErrors(): Record<string, string[]> | null {\n const details = this.details;\n if (!details) return null;\n const fieldErrors: Record<string, string[]> = {};\n for (const [key, value] of Object.entries(details)) {\n if (Array.isArray(value)) fieldErrors[key] = value;\n }\n return Object.keys(fieldErrors).length > 0 ? fieldErrors : null;\n }\n\n get errorMessage(): string {\n const details = this.details;\n if (!details) return this.message;\n if (details.detail) {\n return Array.isArray(details.detail) ? details.detail.join(\", \") : String(details.detail);\n }\n if (details.error) return String(details.error);\n if (details.message) return String(details.message);\n const fieldErrors = this.fieldErrors;\n if (fieldErrors) {\n const firstField = Object.keys(fieldErrors)[0];\n if (firstField) return `${firstField}: ${fieldErrors[firstField]?.join(\", \")}`;\n }\n return this.message;\n }\n\n get isValidationError(): boolean { return this.statusCode === 400; }\n get isAuthError(): boolean { return this.statusCode === 401; }\n get isPermissionError(): boolean { return this.statusCode === 403; }\n get isNotFoundError(): boolean { return this.statusCode === 404; }\n get isServerError(): boolean { return this.statusCode >= 500 && this.statusCode < 600; }\n}\n\n/** Network Error (connection failed, timeout, etc.) */\nexport class NetworkError extends Error {\n constructor(\n message: string,\n public url: string,\n public originalError?: Error,\n ) {\n super(message);\n this.name = \"NetworkError\";\n }\n}\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nimport { APIError } from './errors';\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL`.\n *\n * Both browser and server use NEXT_PUBLIC_API_URL — requests go\n * directly to Django without Next.js proxy.\n */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`.\n *\n * In the browser: returns null — requests go through the Next.js rewrite\n * and the key is injected server-side (never exposed in the bundle).\n * On the server: reads NEXT_PUBLIC_API_KEY as a fallback for SSR calls\n * that bypass the rewrite (e.g. server components calling Django directly).\n */\nfunction defaultApiKey(): string | null {\n if (isBrowser) return null;\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * User-supplied refresh handler. Receives the current refresh token,\n * must return a fresh access (and optional refresh) pair or null on failure.\n * Set once at app bootstrap via `auth.setRefreshHandler(...)`.\n */\ntype RefreshResult = { access: string; refresh?: string } | null;\ntype RefreshHandler = (refreshToken: string) => Promise<RefreshResult>;\nlet _refreshHandler: RefreshHandler | null = null;\n\n/** Single-flight: every concurrent 401 awaits the same refresh. */\nlet _refreshInflight: Promise<string | null> | null = null;\n\n/** Marker header — set on retried requests so we never loop on 401. */\nconst RETRY_MARKER = 'X-Auth-Retry';\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n error: { use(fn: (err: unknown, res: Response | undefined, req: Request | undefined, opts: unknown) => unknown): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n /**\n * Fired when the server returns 401 AND no refresh path recovers it\n * (no refresh token, no refresh handler, refresh failed, or retry\n * still 401). The app should clear local state and redirect to login.\n *\n * NOT fired for 401 that gets transparently recovered by the refresh\n * handler — those are invisible to callers.\n */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n\n /**\n * Register the refresh strategy. The handler receives the current\n * refresh token and must call your refresh endpoint, returning\n * `{ access, refresh? }` on success or `null` on failure.\n *\n * @example\n * auth.setRefreshHandler(async (refresh) => {\n * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });\n * return data ? { access: data.access, refresh: data.refresh } : null;\n * });\n */\n setRefreshHandler(fn: RefreshHandler | null): void {\n _refreshHandler = fn;\n },\n};\n\n/**\n * Run the user-supplied refresh handler under single-flight, persist\n * the new tokens, and return the fresh access token (or null on any\n * failure path). All concurrent 401s share the same in-flight promise.\n */\nasync function tryRefresh(): Promise<string | null> {\n if (_refreshInflight) return _refreshInflight;\n if (!_refreshHandler) return null;\n const refresh = auth.getRefreshToken();\n if (!refresh) return null;\n\n _refreshInflight = (async () => {\n try {\n const result = await _refreshHandler!(refresh);\n if (!result?.access) return null;\n auth.setToken(result.access);\n if (result.refresh) auth.setRefreshToken(result.refresh);\n return result.access;\n } catch {\n return null;\n } finally {\n _refreshInflight = null;\n }\n })();\n\n return _refreshInflight;\n}\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n try {\n const tz = Intl.DateTimeFormat().resolvedOptions().timeZone;\n if (tz) request.headers.set('X-Timezone', tz);\n } catch {}\n request.headers.set('X-Client-Time', new Date().toISOString());\n\n return request;\n });\n\n // Wrap raw JSON error objects (thrown by hey-api on non-2xx responses) into\n // APIError so callers can do `error instanceof APIError` and read\n // `error.statusCode` / `error.response` consistently.\n client.interceptors.error.use((err, res, req) => {\n if (err instanceof APIError) return err;\n const url = (req as Request | undefined)?.url ?? '';\n const status = (res as Response | undefined)?.status ?? 0;\n const statusText = (res as Response | undefined)?.statusText ?? '';\n return new APIError(status, statusText, err, url);\n });\n\n client.interceptors.response.use(async (response, request) => {\n if (response.status !== 401) return response;\n\n // Already retried once — give up to avoid loops.\n if (request.headers.get(RETRY_MARKER)) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n const newToken = await tryRefresh();\n if (!newToken) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n // Retry the original request once with the new token. We mutate a\n // clone so the original Request body (already consumed by the\n // failed call) doesn't trip \"body already used\".\n const retry = request.clone();\n retry.headers.set('Authorization', `Bearer ${newToken}`);\n retry.headers.set(RETRY_MARKER, '1');\n try {\n const retried = await fetch(retry);\n if (retried.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(retried); } catch {}\n }\n return retried;\n } catch {\n // Network error on retry — surface the original 401.\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport type { ArrayStyle, ObjectStyle, SerializerOptions } from './pathSerializer.gen';\n\nexport type QuerySerializer = (query: Record<string, unknown>) => string;\n\nexport type BodySerializer = (body: unknown) => unknown;\n\ntype QuerySerializerOptionsObject = {\n allowReserved?: boolean;\n array?: Partial<SerializerOptions<ArrayStyle>>;\n object?: Partial<SerializerOptions<ObjectStyle>>;\n};\n\nexport type QuerySerializerOptions = QuerySerializerOptionsObject & {\n /**\n * Per-parameter serialization overrides. When provided, these settings\n * override the global array/object settings for specific parameter names.\n */\n parameters?: Record<string, QuerySerializerOptionsObject>;\n};\n\nconst serializeFormDataPair = (data: FormData, key: string, value: unknown): void => {\n if (typeof value === 'string' || value instanceof Blob) {\n data.append(key, value);\n } else if (value instanceof Date) {\n data.append(key, value.toISOString());\n } else {\n data.append(key, JSON.stringify(value));\n }\n};\n\nconst serializeUrlSearchParamsPair = (data: URLSearchParams, key: string, value: unknown): void => {\n if (typeof value === 'string') {\n data.append(key, value);\n } else {\n data.append(key, JSON.stringify(value));\n }\n};\n\nexport const formDataBodySerializer = {\n bodySerializer: (body: unknown): FormData => {\n const data = new FormData();\n\n Object.entries(body as Record<string, unknown>).forEach(([key, value]) => {\n if (value === undefined || value === null) {\n return;\n }\n if (Array.isArray(value)) {\n value.forEach((v) => serializeFormDataPair(data, key, v));\n } else {\n serializeFormDataPair(data, key, value);\n }\n });\n\n return data;\n },\n};\n\nexport const jsonBodySerializer = {\n bodySerializer: (body: unknown): string =>\n JSON.stringify(body, (_key, value) => (typeof value === 'bigint' ? value.toString() : value)),\n};\n\nexport const urlSearchParamsBodySerializer = {\n bodySerializer: (body: unknown): string => {\n const data = new URLSearchParams();\n\n Object.entries(body as Record<string, unknown>).forEach(([key, value]) => {\n if (value === undefined || value === null) {\n return;\n }\n if (Array.isArray(value)) {\n value.forEach((v) => serializeUrlSearchParamsPair(data, key, v));\n } else {\n serializeUrlSearchParamsPair(data, key, value);\n }\n });\n\n return data.toString();\n },\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\ntype Slot = 'body' | 'headers' | 'path' | 'query';\n\nexport type Field =\n | {\n in: Exclude<Slot, 'body'>;\n /**\n * Field name. This is the name we want the user to see and use.\n */\n key: string;\n /**\n * Field mapped name. This is the name we want to use in the request.\n * If omitted, we use the same value as `key`.\n */\n map?: string;\n }\n | {\n in: Extract<Slot, 'body'>;\n /**\n * Key isn't required for bodies.\n */\n key?: string;\n map?: string;\n }\n | {\n /**\n * Field name. This is the name we want the user to see and use.\n */\n key: string;\n /**\n * Field mapped name. This is the name we want to use in the request.\n * If `in` is omitted, `map` aliases `key` to the transport layer.\n */\n map: Slot;\n };\n\nexport interface Fields {\n allowExtra?: Partial<Record<Slot, boolean>>;\n args?: ReadonlyArray<Field>;\n}\n\nexport type FieldsConfig = ReadonlyArray<Field | Fields>;\n\nconst extraPrefixesMap: Record<string, Slot> = {\n $body_: 'body',\n $headers_: 'headers',\n $path_: 'path',\n $query_: 'query',\n};\nconst extraPrefixes = Object.entries(extraPrefixesMap);\n\ntype KeyMap = Map<\n string,\n | {\n in: Slot;\n map?: string;\n }\n | {\n in?: never;\n map: Slot;\n }\n>;\n\nconst buildKeyMap = (fields: FieldsConfig, map?: KeyMap): KeyMap => {\n if (!map) {\n map = new Map();\n }\n\n for (const config of fields) {\n if ('in' in config) {\n if (config.key) {\n map.set(config.key, {\n in: config.in,\n map: config.map,\n });\n }\n } else if ('key' in config) {\n map.set(config.key, {\n map: config.map,\n });\n } else if (config.args) {\n buildKeyMap(config.args, map);\n }\n }\n\n return map;\n};\n\ninterface Params {\n body: unknown;\n headers: Record<string, unknown>;\n path: Record<string, unknown>;\n query: Record<string, unknown>;\n}\n\nconst stripEmptySlots = (params: Params) => {\n for (const [slot, value] of Object.entries(params)) {\n if (value && typeof value === 'object' && !Array.isArray(value) && !Object.keys(value).length) {\n delete params[slot as Slot];\n }\n }\n};\n\nexport const buildClientParams = (args: ReadonlyArray<unknown>, fields: FieldsConfig) => {\n const params: Params = {\n body: {},\n headers: {},\n path: {},\n query: {},\n };\n\n const map = buildKeyMap(fields);\n\n let config: FieldsConfig[number] | undefined;\n\n for (const [index, arg] of args.entries()) {\n if (fields[index]) {\n config = fields[index];\n }\n\n if (!config) {\n continue;\n }\n\n if ('in' in config) {\n if (config.key) {\n const field = map.get(config.key)!;\n const name = field.map || config.key;\n if (field.in) {\n (params[field.in] as Record<string, unknown>)[name] = arg;\n }\n } else {\n params.body = arg;\n }\n } else {\n for (const [key, value] of Object.entries(arg ?? {})) {\n const field = map.get(key);\n\n if (field) {\n if (field.in) {\n const name = field.map || key;\n (params[field.in] as Record<string, unknown>)[name] = value;\n } else {\n params[field.map] = value;\n }\n } else {\n const extra = extraPrefixes.find(([prefix]) => key.startsWith(prefix));\n\n if (extra) {\n const [prefix, slot] = extra;\n (params[slot] as Record<string, unknown>)[key.slice(prefix.length)] = value;\n } else if ('allowExtra' in config && config.allowExtra) {\n for (const [slot, allowed] of Object.entries(config.allowExtra)) {\n if (allowed) {\n (params[slot as Slot] as Record<string, unknown>)[key] = value;\n break;\n }\n }\n }\n }\n }\n }\n }\n\n stripEmptySlots(params);\n\n return params;\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport type { Config } from './types.gen';\n\nexport type ServerSentEventsOptions<TData = unknown> = Omit<RequestInit, 'method'> &\n Pick<Config, 'method' | 'responseTransformer' | 'responseValidator'> & {\n /**\n * Fetch API implementation. You can use this option to provide a custom\n * fetch instance.\n *\n * @default globalThis.fetch\n */\n fetch?: typeof fetch;\n /**\n * Implementing clients can call request interceptors inside this hook.\n */\n onRequest?: (url: string, init: RequestInit) => Promise<Request>;\n /**\n * Callback invoked when a network or parsing error occurs during streaming.\n *\n * This option applies only if the endpoint returns a stream of events.\n *\n * @param error The error that occurred.\n */\n onSseError?: (error: unknown) => void;\n /**\n * Callback invoked when an event is streamed from the server.\n *\n * This option applies only if the endpoint returns a stream of events.\n *\n * @param event Event streamed from the server.\n * @returns Nothing (void).\n */\n onSseEvent?: (event: StreamEvent<TData>) => void;\n serializedBody?: RequestInit['body'];\n /**\n * Default retry delay in milliseconds.\n *\n * This option applies only if the endpoint returns a stream of events.\n *\n * @default 3000\n */\n sseDefaultRetryDelay?: number;\n /**\n * Maximum number of retry attempts before giving up.\n */\n sseMaxRetryAttempts?: number;\n /**\n * Maximum retry delay in milliseconds.\n *\n * Applies only when exponential backoff is used.\n *\n * This option applies only if the endpoint returns a stream of events.\n *\n * @default 30000\n */\n sseMaxRetryDelay?: number;\n /**\n * Optional sleep function for retry backoff.\n *\n * Defaults to using `setTimeout`.\n */\n sseSleepFn?: (ms: number) => Promise<void>;\n url: string;\n };\n\nexport interface StreamEvent<TData = unknown> {\n data: TData;\n event?: string;\n id?: string;\n retry?: number;\n}\n\nexport type ServerSentEventsResult<TData = unknown, TReturn = void, TNext = unknown> = {\n stream: AsyncGenerator<\n TData extends Record<string, unknown> ? TData[keyof TData] : TData,\n TReturn,\n TNext\n >;\n};\n\nexport function createSseClient<TData = unknown>({\n onRequest,\n onSseError,\n onSseEvent,\n responseTransformer,\n responseValidator,\n sseDefaultRetryDelay,\n sseMaxRetryAttempts,\n sseMaxRetryDelay,\n sseSleepFn,\n url,\n ...options\n}: ServerSentEventsOptions): ServerSentEventsResult<TData> {\n let lastEventId: string | undefined;\n\n const sleep = sseSleepFn ?? ((ms: number) => new Promise((resolve) => setTimeout(resolve, ms)));\n\n const createStream = async function* () {\n let retryDelay: number = sseDefaultRetryDelay ?? 3000;\n let attempt = 0;\n const signal = options.signal ?? new AbortController().signal;\n\n while (true) {\n if (signal.aborted) break;\n\n attempt++;\n\n const headers =\n options.headers instanceof Headers\n ? options.headers\n : new Headers(options.headers as Record<string, string> | undefined);\n\n if (lastEventId !== undefined) {\n headers.set('Last-Event-ID', lastEventId);\n }\n\n try {\n const requestInit: RequestInit = {\n redirect: 'follow',\n ...options,\n body: options.serializedBody,\n headers,\n signal,\n };\n let request = new Request(url, requestInit);\n if (onRequest) {\n request = await onRequest(url, requestInit);\n }\n // fetch must be assigned here, otherwise it would throw the error:\n // TypeError: Failed to execute 'fetch' on 'Window': Illegal invocation\n const _fetch = options.fetch ?? globalThis.fetch;\n const response = await _fetch(request);\n\n if (!response.ok) throw new Error(`SSE failed: ${response.status} ${response.statusText}`);\n\n if (!response.body) throw new Error('No body in SSE response');\n\n const reader = response.body.pipeThrough(new TextDecoderStream()).getReader();\n\n let buffer = '';\n\n const abortHandler = () => {\n try {\n reader.cancel();\n } catch {\n // noop\n }\n };\n\n signal.addEventListener('abort', abortHandler);\n\n try {\n while (true) {\n const { done, value } = await reader.read();\n if (done) break;\n buffer += value;\n buffer = buffer.replace(/\\r\\n?/g, '\\n'); // normalize line endings\n\n const chunks = buffer.split('\\n\\n');\n buffer = chunks.pop() ?? '';\n\n for (const chunk of chunks) {\n const lines = chunk.split('\\n');\n const dataLines: Array<string> = [];\n let eventName: string | undefined;\n\n for (const line of lines) {\n if (line.startsWith('data:')) {\n dataLines.push(line.replace(/^data:\\s*/, ''));\n } else if (line.startsWith('event:')) {\n eventName = line.replace(/^event:\\s*/, '');\n } else if (line.startsWith('id:')) {\n lastEventId = line.replace(/^id:\\s*/, '');\n } else if (line.startsWith('retry:')) {\n const parsed = Number.parseInt(line.replace(/^retry:\\s*/, ''), 10);\n if (!Number.isNaN(parsed)) {\n retryDelay = parsed;\n }\n }\n }\n\n let data: unknown;\n let parsedJson = false;\n\n if (dataLines.length) {\n const rawData = dataLines.join('\\n');\n try {\n data = JSON.parse(rawData);\n parsedJson = true;\n } catch {\n data = rawData;\n }\n }\n\n if (parsedJson) {\n if (responseValidator) {\n await responseValidator(data);\n }\n\n if (responseTransformer) {\n data = await responseTransformer(data);\n }\n }\n\n onSseEvent?.({\n data,\n event: eventName,\n id: lastEventId,\n retry: retryDelay,\n });\n\n if (dataLines.length) {\n yield data as any;\n }\n }\n }\n } finally {\n signal.removeEventListener('abort', abortHandler);\n reader.releaseLock();\n }\n\n break; // exit loop on normal completion\n } catch (error) {\n // connection failed or aborted; retry after delay\n onSseError?.(error);\n\n if (sseMaxRetryAttempts !== undefined && attempt >= sseMaxRetryAttempts) {\n break; // stop after firing error\n }\n\n // exponential backoff: double retry each attempt, cap at 30s\n const backoff = Math.min(retryDelay * 2 ** (attempt - 1), sseMaxRetryDelay ?? 30000);\n await sleep(backoff);\n }\n }\n };\n\n const stream = createStream();\n\n return { stream };\n}\n","// This file is auto-generated by @hey-api/openapi-ts\n\ninterface SerializeOptions<T> extends SerializePrimitiveOptions, SerializerOptions<T> {}\n\ninterface SerializePrimitiveOptions {\n allowReserved?: boolean;\n name: string;\n}\n\nexport interface SerializerOptions<T> {\n /**\n * @default true\n */\n explode: boolean;\n style: T;\n}\n\nexport type ArrayStyle = 'form' | 'spaceDelimited' | 'pipeDelimited';\nexport type ArraySeparatorStyle = ArrayStyle | MatrixStyle;\ntype MatrixStyle = 'label' | 'matrix' | 'simple';\nexport type ObjectStyle = 'form' | 'deepObject';\ntype ObjectSeparatorStyle = ObjectStyle | MatrixStyle;\n\ninterface SerializePrimitiveParam extends SerializePrimitiveOptions {\n value: string;\n}\n\nexport const separatorArrayExplode = (style: ArraySeparatorStyle) => {\n switch (style) {\n case 'label':\n return '.';\n case 'matrix':\n return ';';\n case 'simple':\n return ',';\n default:\n return '&';\n }\n};\n\nexport const separatorArrayNoExplode = (style: ArraySeparatorStyle) => {\n switch (style) {\n case 'form':\n return ',';\n case 'pipeDelimited':\n return '|';\n case 'spaceDelimited':\n return '%20';\n default:\n return ',';\n }\n};\n\nexport const separatorObjectExplode = (style: ObjectSeparatorStyle) => {\n switch (style) {\n case 'label':\n return '.';\n case 'matrix':\n return ';';\n case 'simple':\n return ',';\n default:\n return '&';\n }\n};\n\nexport const serializeArrayParam = ({\n allowReserved,\n explode,\n name,\n style,\n value,\n}: SerializeOptions<ArraySeparatorStyle> & {\n value: unknown[];\n}) => {\n if (!explode) {\n const joinedValues = (\n allowReserved ? value : value.map((v) => encodeURIComponent(v as string))\n ).join(separatorArrayNoExplode(style));\n switch (style) {\n case 'label':\n return `.${joinedValues}`;\n case 'matrix':\n return `;${name}=${joinedValues}`;\n case 'simple':\n return joinedValues;\n default:\n return `${name}=${joinedValues}`;\n }\n }\n\n const separator = separatorArrayExplode(style);\n const joinedValues = value\n .map((v) => {\n if (style === 'label' || style === 'simple') {\n return allowReserved ? v : encodeURIComponent(v as string);\n }\n\n return serializePrimitiveParam({\n allowReserved,\n name,\n value: v as string,\n });\n })\n .join(separator);\n return style === 'label' || style === 'matrix' ? separator + joinedValues : joinedValues;\n};\n\nexport const serializePrimitiveParam = ({\n allowReserved,\n name,\n value,\n}: SerializePrimitiveParam) => {\n if (value === undefined || value === null) {\n return '';\n }\n\n if (typeof value === 'object') {\n throw new Error(\n 'Deeply-nested arrays/objects aren’t supported. Provide your own `querySerializer()` to handle these.',\n );\n }\n\n return `${name}=${allowReserved ? value : encodeURIComponent(value)}`;\n};\n\nexport const serializeObjectParam = ({\n allowReserved,\n explode,\n name,\n style,\n value,\n valueOnly,\n}: SerializeOptions<ObjectSeparatorStyle> & {\n value: Record<string, unknown> | Date;\n valueOnly?: boolean;\n}) => {\n if (value instanceof Date) {\n return valueOnly ? value.toISOString() : `${name}=${value.toISOString()}`;\n }\n\n if (style !== 'deepObject' && !explode) {\n let values: string[] = [];\n Object.entries(value).forEach(([key, v]) => {\n values = [...values, key, allowReserved ? (v as string) : encodeURIComponent(v as string)];\n });\n const joinedValues = values.join(',');\n switch (style) {\n case 'form':\n return `${name}=${joinedValues}`;\n case 'label':\n return `.${joinedValues}`;\n case 'matrix':\n return `;${name}=${joinedValues}`;\n default:\n return joinedValues;\n }\n }\n\n const separator = separatorObjectExplode(style);\n const joinedValues = Object.entries(value)\n .map(([key, v]) =>\n serializePrimitiveParam({\n allowReserved,\n name: style === 'deepObject' ? `${name}[${key}]` : key,\n value: v as string,\n }),\n )\n .join(separator);\n return style === 'label' || style === 'matrix' ? separator + joinedValues : joinedValues;\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport type { BodySerializer, QuerySerializer } from './bodySerializer.gen';\nimport {\n type ArraySeparatorStyle,\n serializeArrayParam,\n serializeObjectParam,\n serializePrimitiveParam,\n} from './pathSerializer.gen';\n\nexport interface PathSerializer {\n path: Record<string, unknown>;\n url: string;\n}\n\nexport const PATH_PARAM_RE = /\\{[^{}]+\\}/g;\n\nexport const defaultPathSerializer = ({ path, url: _url }: PathSerializer) => {\n let url = _url;\n const matches = _url.match(PATH_PARAM_RE);\n if (matches) {\n for (const match of matches) {\n let explode = false;\n let name = match.substring(1, match.length - 1);\n let style: ArraySeparatorStyle = 'simple';\n\n if (name.endsWith('*')) {\n explode = true;\n name = name.substring(0, name.length - 1);\n }\n\n if (name.startsWith('.')) {\n name = name.substring(1);\n style = 'label';\n } else if (name.startsWith(';')) {\n name = name.substring(1);\n style = 'matrix';\n }\n\n const value = path[name];\n\n if (value === undefined || value === null) {\n continue;\n }\n\n if (Array.isArray(value)) {\n url = url.replace(match, serializeArrayParam({ explode, name, style, value }));\n continue;\n }\n\n if (typeof value === 'object') {\n url = url.replace(\n match,\n serializeObjectParam({\n explode,\n name,\n style,\n value: value as Record<string, unknown>,\n valueOnly: true,\n }),\n );\n continue;\n }\n\n if (style === 'matrix') {\n url = url.replace(\n match,\n `;${serializePrimitiveParam({\n name,\n value: value as string,\n })}`,\n );\n continue;\n }\n\n const replaceValue = encodeURIComponent(\n style === 'label' ? `.${value as string}` : (value as string),\n );\n url = url.replace(match, replaceValue);\n }\n }\n return url;\n};\n\nexport const getUrl = ({\n baseUrl,\n path,\n query,\n querySerializer,\n url: _url,\n}: {\n baseUrl?: string;\n path?: Record<string, unknown>;\n query?: Record<string, unknown>;\n querySerializer: QuerySerializer;\n url: string;\n}) => {\n const pathUrl = _url.startsWith('/') ? _url : `/${_url}`;\n let url = (baseUrl ?? '') + pathUrl;\n if (path) {\n url = defaultPathSerializer({ path, url });\n }\n let search = query ? querySerializer(query) : '';\n if (search.startsWith('?')) {\n search = search.substring(1);\n }\n if (search) {\n url += `?${search}`;\n }\n return url;\n};\n\nexport function getValidRequestBody(options: {\n body?: unknown;\n bodySerializer?: BodySerializer | null;\n serializedBody?: unknown;\n}) {\n const hasBody = options.body !== undefined;\n const isSerializedBody = hasBody && options.bodySerializer;\n\n if (isSerializedBody) {\n if ('serializedBody' in options) {\n const hasSerializedBody =\n options.serializedBody !== undefined && options.serializedBody !== '';\n\n return hasSerializedBody ? options.serializedBody : null;\n }\n\n // not all clients implement a serializedBody property (i.e., client-axios)\n return options.body !== '' ? options.body : null;\n }\n\n // plain/text body\n if (hasBody) {\n return options.body;\n }\n\n // no body was provided\n return undefined;\n}\n","// This file is auto-generated by @hey-api/openapi-ts\n\nexport type AuthToken = string | undefined;\n\nexport interface Auth {\n /**\n * Which part of the request do we use to send the auth?\n *\n * @default 'header'\n */\n in?: 'header' | 'query' | 'cookie';\n /**\n * Header or query parameter name.\n *\n * @default 'Authorization'\n */\n name?: string;\n scheme?: 'basic' | 'bearer';\n type: 'apiKey' | 'http';\n}\n\nexport const getAuthToken = async (\n auth: Auth,\n callback: ((auth: Auth) => Promise<AuthToken> | AuthToken) | AuthToken,\n): Promise<string | undefined> => {\n const token = typeof callback === 'function' ? await callback(auth) : callback;\n\n if (!token) {\n return;\n }\n\n if (auth.scheme === 'bearer') {\n return `Bearer ${token}`;\n }\n\n if (auth.scheme === 'basic') {\n return `Basic ${btoa(token)}`;\n }\n\n return token;\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport { getAuthToken } from '../core/auth.gen';\nimport type { QuerySerializerOptions } from '../core/bodySerializer.gen';\nimport { jsonBodySerializer } from '../core/bodySerializer.gen';\nimport {\n serializeArrayParam,\n serializeObjectParam,\n serializePrimitiveParam,\n} from '../core/pathSerializer.gen';\nimport { getUrl } from '../core/utils.gen';\nimport type { Client, ClientOptions, Config, RequestOptions } from './types.gen';\n\nexport const createQuerySerializer = <T = unknown>({\n parameters = {},\n ...args\n}: QuerySerializerOptions = {}) => {\n const querySerializer = (queryParams: T) => {\n const search: string[] = [];\n if (queryParams && typeof queryParams === 'object') {\n for (const name in queryParams) {\n const value = queryParams[name];\n\n if (value === undefined || value === null) {\n continue;\n }\n\n const options = parameters[name] || args;\n\n if (Array.isArray(value)) {\n const serializedArray = serializeArrayParam({\n allowReserved: options.allowReserved,\n explode: true,\n name,\n style: 'form',\n value,\n ...options.array,\n });\n if (serializedArray) search.push(serializedArray);\n } else if (typeof value === 'object') {\n const serializedObject = serializeObjectParam({\n allowReserved: options.allowReserved,\n explode: true,\n name,\n style: 'deepObject',\n value: value as Record<string, unknown>,\n ...options.object,\n });\n if (serializedObject) search.push(serializedObject);\n } else {\n const serializedPrimitive = serializePrimitiveParam({\n allowReserved: options.allowReserved,\n name,\n value: value as string,\n });\n if (serializedPrimitive) search.push(serializedPrimitive);\n }\n }\n }\n return search.join('&');\n };\n return querySerializer;\n};\n\n/**\n * Infers parseAs value from provided Content-Type header.\n */\nexport const getParseAs = (contentType: string | null): Exclude<Config['parseAs'], 'auto'> => {\n if (!contentType) {\n // If no Content-Type header is provided, the best we can do is return the raw response body,\n // which is effectively the same as the 'stream' option.\n return 'stream';\n }\n\n const cleanContent = contentType.split(';')[0]?.trim();\n\n if (!cleanContent) {\n return;\n }\n\n if (cleanContent.startsWith('application/json') || cleanContent.endsWith('+json')) {\n return 'json';\n }\n\n if (cleanContent === 'multipart/form-data') {\n return 'formData';\n }\n\n if (\n ['application/', 'audio/', 'image/', 'video/'].some((type) => cleanContent.startsWith(type))\n ) {\n return 'blob';\n }\n\n if (cleanContent.startsWith('text/')) {\n return 'text';\n }\n\n return;\n};\n\nconst checkForExistence = (\n options: Pick<RequestOptions, 'auth' | 'query'> & {\n headers: Headers;\n },\n name?: string,\n): boolean => {\n if (!name) {\n return false;\n }\n if (\n options.headers.has(name) ||\n options.query?.[name] ||\n options.headers.get('Cookie')?.includes(`${name}=`)\n ) {\n return true;\n }\n return false;\n};\n\nexport const setAuthParams = async ({\n security,\n ...options\n}: Pick<Required<RequestOptions>, 'security'> &\n Pick<RequestOptions, 'auth' | 'query'> & {\n headers: Headers;\n }) => {\n for (const auth of security) {\n if (checkForExistence(options, auth.name)) {\n continue;\n }\n\n const token = await getAuthToken(auth, options.auth);\n\n if (!token) {\n continue;\n }\n\n const name = auth.name ?? 'Authorization';\n\n switch (auth.in) {\n case 'query':\n if (!options.query) {\n options.query = {};\n }\n options.query[name] = token;\n break;\n case 'cookie':\n options.headers.append('Cookie', `${name}=${token}`);\n break;\n case 'header':\n default:\n options.headers.set(name, token);\n break;\n }\n }\n};\n\nexport const buildUrl: Client['buildUrl'] = (options) =>\n getUrl({\n baseUrl: options.baseUrl as string,\n path: options.path,\n query: options.query,\n querySerializer:\n typeof options.querySerializer === 'function'\n ? options.querySerializer\n : createQuerySerializer(options.querySerializer),\n url: options.url,\n });\n\nexport const mergeConfigs = (a: Config, b: Config): Config => {\n const config = { ...a, ...b };\n if (config.baseUrl?.endsWith('/')) {\n config.baseUrl = config.baseUrl.substring(0, config.baseUrl.length - 1);\n }\n config.headers = mergeHeaders(a.headers, b.headers);\n return config;\n};\n\nconst headersEntries = (headers: Headers): Array<[string, string]> => {\n const entries: Array<[string, string]> = [];\n headers.forEach((value, key) => {\n entries.push([key, value]);\n });\n return entries;\n};\n\nexport const mergeHeaders = (\n ...headers: Array<Required<Config>['headers'] | undefined>\n): Headers => {\n const mergedHeaders = new Headers();\n for (const header of headers) {\n if (!header) {\n continue;\n }\n\n const iterator = header instanceof Headers ? headersEntries(header) : Object.entries(header);\n\n for (const [key, value] of iterator) {\n if (value === null) {\n mergedHeaders.delete(key);\n } else if (Array.isArray(value)) {\n for (const v of value) {\n mergedHeaders.append(key, v as string);\n }\n } else if (value !== undefined) {\n // assume object headers are meant to be JSON stringified, i.e., their\n // content value in OpenAPI specification is 'application/json'\n mergedHeaders.set(\n key,\n typeof value === 'object' ? JSON.stringify(value) : (value as string),\n );\n }\n }\n }\n return mergedHeaders;\n};\n\ntype ErrInterceptor<Err, Res, Req, Options> = (\n error: Err,\n /** response may be undefined due to a network error where no response object is produced */\n response: Res | undefined,\n /** request may be undefined, because error may be from building the request object itself */\n request: Req | undefined,\n options: Options,\n) => Err | Promise<Err>;\n\ntype ReqInterceptor<Req, Options> = (request: Req, options: Options) => Req | Promise<Req>;\n\ntype ResInterceptor<Res, Req, Options> = (\n response: Res,\n request: Req,\n options: Options,\n) => Res | Promise<Res>;\n\nclass Interceptors<Interceptor> {\n fns: Array<Interceptor | null> = [];\n\n clear(): void {\n this.fns = [];\n }\n\n eject(id: number | Interceptor): void {\n const index = this.getInterceptorIndex(id);\n if (this.fns[index]) {\n this.fns[index] = null;\n }\n }\n\n exists(id: number | Interceptor): boolean {\n const index = this.getInterceptorIndex(id);\n return Boolean(this.fns[index]);\n }\n\n getInterceptorIndex(id: number | Interceptor): number {\n if (typeof id === 'number') {\n return this.fns[id] ? id : -1;\n }\n return this.fns.indexOf(id);\n }\n\n update(id: number | Interceptor, fn: Interceptor): number | Interceptor | false {\n const index = this.getInterceptorIndex(id);\n if (this.fns[index]) {\n this.fns[index] = fn;\n return id;\n }\n return false;\n }\n\n use(fn: Interceptor): number {\n this.fns.push(fn);\n return this.fns.length - 1;\n }\n}\n\nexport interface Middleware<Req, Res, Err, Options> {\n error: Interceptors<ErrInterceptor<Err, Res, Req, Options>>;\n request: Interceptors<ReqInterceptor<Req, Options>>;\n response: Interceptors<ResInterceptor<Res, Req, Options>>;\n}\n\nexport const createInterceptors = <Req, Res, Err, Options>(): Middleware<\n Req,\n Res,\n Err,\n Options\n> => ({\n error: new Interceptors<ErrInterceptor<Err, Res, Req, Options>>(),\n request: new Interceptors<ReqInterceptor<Req, Options>>(),\n response: new Interceptors<ResInterceptor<Res, Req, Options>>(),\n});\n\nconst defaultQuerySerializer = createQuerySerializer({\n allowReserved: false,\n array: {\n explode: true,\n style: 'form',\n },\n object: {\n explode: true,\n style: 'deepObject',\n },\n});\n\nconst defaultHeaders = {\n 'Content-Type': 'application/json',\n};\n\nexport const createConfig = <T extends ClientOptions = ClientOptions>(\n override: Config<Omit<ClientOptions, keyof T> & T> = {},\n): Config<Omit<ClientOptions, keyof T> & T> => ({\n ...jsonBodySerializer,\n headers: defaultHeaders,\n parseAs: 'auto',\n querySerializer: defaultQuerySerializer,\n ...override,\n});\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport { createSseClient } from '../core/serverSentEvents.gen';\nimport type { HttpMethod } from '../core/types.gen';\nimport { getValidRequestBody } from '../core/utils.gen';\nimport type { Client, Config, RequestOptions, ResolvedRequestOptions } from './types.gen';\nimport {\n buildUrl,\n createConfig,\n createInterceptors,\n getParseAs,\n mergeConfigs,\n mergeHeaders,\n setAuthParams,\n} from './utils.gen';\n\ntype ReqInit = Omit<RequestInit, 'body' | 'headers'> & {\n body?: any;\n headers: ReturnType<typeof mergeHeaders>;\n};\n\nexport const createClient = (config: Config = {}): Client => {\n let _config = mergeConfigs(createConfig(), config);\n\n const getConfig = (): Config => ({ ..._config });\n\n const setConfig = (config: Config): Config => {\n _config = mergeConfigs(_config, config);\n return getConfig();\n };\n\n const interceptors = createInterceptors<Request, Response, unknown, ResolvedRequestOptions>();\n\n const beforeRequest = async <\n TData = unknown,\n TResponseStyle extends 'data' | 'fields' = 'fields',\n ThrowOnError extends boolean = boolean,\n Url extends string = string,\n >(\n options: RequestOptions<TData, TResponseStyle, ThrowOnError, Url>,\n ) => {\n const opts = {\n ..._config,\n ...options,\n fetch: options.fetch ?? _config.fetch ?? globalThis.fetch,\n headers: mergeHeaders(_config.headers, options.headers),\n serializedBody: undefined as string | undefined,\n };\n\n if (opts.security) {\n await setAuthParams({\n ...opts,\n security: opts.security,\n });\n }\n\n if (opts.requestValidator) {\n await opts.requestValidator(opts);\n }\n\n if (opts.body !== undefined && opts.bodySerializer) {\n opts.serializedBody = opts.bodySerializer(opts.body) as string | undefined;\n }\n\n // remove Content-Type header if body is empty to avoid sending invalid requests\n if (opts.body === undefined || opts.serializedBody === '') {\n opts.headers.delete('Content-Type');\n }\n\n const resolvedOpts = opts as typeof opts &\n ResolvedRequestOptions<TResponseStyle, ThrowOnError, Url>;\n const url = buildUrl(resolvedOpts);\n\n return { opts: resolvedOpts, url };\n };\n\n const request: Client['request'] = async (options) => {\n const throwOnError = options.throwOnError ?? _config.throwOnError;\n const responseStyle = options.responseStyle ?? _config.responseStyle;\n\n let request: Request | undefined;\n let response: Response | undefined;\n\n try {\n const { opts, url } = await beforeRequest(options);\n const requestInit: ReqInit = {\n redirect: 'follow',\n ...opts,\n body: getValidRequestBody(opts),\n };\n\n request = new Request(url, requestInit);\n\n for (const fn of interceptors.request.fns) {\n if (fn) {\n request = await fn(request, opts);\n }\n }\n\n // fetch must be assigned here, otherwise it would throw the error:\n // TypeError: Failed to execute 'fetch' on 'Window': Illegal invocation\n const _fetch = opts.fetch!;\n\n response = await _fetch(request);\n\n for (const fn of interceptors.response.fns) {\n if (fn) {\n response = await fn(response, request, opts);\n }\n }\n\n const result = {\n request,\n response,\n };\n\n if (response.ok) {\n const parseAs =\n (opts.parseAs === 'auto'\n ? getParseAs(response.headers.get('Content-Type'))\n : opts.parseAs) ?? 'json';\n\n if (response.status === 204 || response.headers.get('Content-Length') === '0') {\n let emptyData: any;\n switch (parseAs) {\n case 'arrayBuffer':\n case 'blob':\n case 'text':\n emptyData = await response[parseAs]();\n break;\n case 'formData':\n emptyData = new FormData();\n break;\n case 'stream':\n emptyData = response.body;\n break;\n case 'json':\n default:\n emptyData = {};\n break;\n }\n return opts.responseStyle === 'data'\n ? emptyData\n : {\n data: emptyData,\n ...result,\n };\n }\n\n let data: any;\n switch (parseAs) {\n case 'arrayBuffer':\n case 'blob':\n case 'formData':\n case 'text':\n data = await response[parseAs]();\n break;\n case 'json': {\n // Some servers return 200 with no Content-Length and empty body.\n // response.json() would throw; read as text and parse if non-empty.\n const text = await response.text();\n data = text ? JSON.parse(text) : {};\n break;\n }\n case 'stream':\n return opts.responseStyle === 'data'\n ? response.body\n : {\n data: response.body,\n ...result,\n };\n }\n\n if (parseAs === 'json') {\n if (opts.responseValidator) {\n await opts.responseValidator(data);\n }\n\n if (opts.responseTransformer) {\n data = await opts.responseTransformer(data);\n }\n }\n\n return opts.responseStyle === 'data'\n ? data\n : {\n data,\n ...result,\n };\n }\n\n const textError = await response.text();\n let jsonError: unknown;\n\n try {\n jsonError = JSON.parse(textError);\n } catch {\n // noop\n }\n\n throw jsonError ?? textError;\n } catch (error) {\n let finalError = error;\n\n for (const fn of interceptors.error.fns) {\n if (fn) {\n finalError = await fn(finalError, response, request, options as ResolvedRequestOptions);\n }\n }\n\n finalError = finalError || {};\n\n if (throwOnError) {\n throw finalError;\n }\n\n // TODO: we probably want to return error and improve types\n return responseStyle === 'data'\n ? undefined\n : {\n error: finalError,\n request,\n response,\n };\n }\n };\n\n const makeMethodFn = (method: Uppercase<HttpMethod>) => (options: RequestOptions) =>\n request({ ...options, method });\n\n const makeSseFn = (method: Uppercase<HttpMethod>) => async (options: RequestOptions) => {\n const { opts, url } = await beforeRequest(options);\n return createSseClient({\n ...opts,\n body: opts.body as BodyInit | null | undefined,\n method,\n onRequest: async (url, init) => {\n let request = new Request(url, init);\n for (const fn of interceptors.request.fns) {\n if (fn) {\n request = await fn(request, opts);\n }\n }\n return request;\n },\n serializedBody: getValidRequestBody(opts) as BodyInit | null | undefined,\n url,\n });\n };\n\n const _buildUrl: Client['buildUrl'] = (options) => buildUrl({ ..._config, ...options });\n\n return {\n buildUrl: _buildUrl,\n connect: makeMethodFn('CONNECT'),\n delete: makeMethodFn('DELETE'),\n get: makeMethodFn('GET'),\n getConfig,\n head: makeMethodFn('HEAD'),\n interceptors,\n options: makeMethodFn('OPTIONS'),\n patch: makeMethodFn('PATCH'),\n post: makeMethodFn('POST'),\n put: makeMethodFn('PUT'),\n request,\n setConfig,\n sse: {\n connect: makeSseFn('CONNECT'),\n delete: makeSseFn('DELETE'),\n get: makeSseFn('GET'),\n head: makeSseFn('HEAD'),\n options: makeSseFn('OPTIONS'),\n patch: makeSseFn('PATCH'),\n post: makeSseFn('POST'),\n put: makeSseFn('PUT'),\n trace: makeSseFn('TRACE'),\n },\n trace: makeMethodFn('TRACE'),\n } as Client;\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport { type ClientOptions, type Config, createClient, createConfig } from './client';\nimport type { ClientOptions as ClientOptions2 } from './types.gen';\n\n/**\n * The `createClientConfig()` function will be called on client initialization\n * and the returned object will become the client's initial configuration.\n *\n * You may want to initialize your client this way instead of calling\n * `setConfig()`. This is useful for example if you're using Next.js\n * to ensure your client always has the correct values.\n */\nexport type CreateClientConfig<T extends ClientOptions = ClientOptions2> = (override?: Config<ClientOptions & T>) => Config<Required<ClientOptions> & T>;\n\nexport const client = createClient(createConfig<ClientOptions2>({ baseUrl: 'http://localhost:8000' }));\n\n// auto-init: install auth on client\nimport { installAuthOnClient } from './helpers/auth';\ninstallAuthOnClient(client);\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport { type Client, formDataBodySerializer, type Options as Options2, type TDataShape } from './client';\nimport { client } from './client.gen';\nimport type { CfgAccountsApiKeyRegenerateCreateData, CfgAccountsApiKeyRegenerateCreateErrors, CfgAccountsApiKeyRegenerateCreateResponses, CfgAccountsApiKeyRetrieveData, CfgAccountsApiKeyRetrieveErrors, CfgAccountsApiKeyRetrieveResponses, CfgAccountsApiKeyTestCreateData, CfgAccountsApiKeyTestCreateResponses, CfgAccountsOauthConnectionsListData, CfgAccountsOauthConnectionsListResponses, CfgAccountsOauthDisconnectCreateData, CfgAccountsOauthDisconnectCreateErrors, CfgAccountsOauthDisconnectCreateResponses, CfgAccountsOauthGithubAuthorizeCreateData, CfgAccountsOauthGithubAuthorizeCreateErrors, CfgAccountsOauthGithubAuthorizeCreateResponses, CfgAccountsOauthGithubCallbackCreateData, CfgAccountsOauthGithubCallbackCreateErrors, CfgAccountsOauthGithubCallbackCreateResponses, CfgAccountsOauthProvidersRetrieveData, CfgAccountsOauthProvidersRetrieveResponses, CfgAccountsOtpRequestCreateData, CfgAccountsOtpRequestCreateErrors, CfgAccountsOtpRequestCreateResponses, CfgAccountsOtpVerifyCreateData, CfgAccountsOtpVerifyCreateErrors, CfgAccountsOtpVerifyCreateResponses, CfgAccountsProfileAvatarCreateData, CfgAccountsProfileAvatarCreateErrors, CfgAccountsProfileAvatarCreateResponses, CfgAccountsProfileDeleteCreateData, CfgAccountsProfileDeleteCreateErrors, CfgAccountsProfileDeleteCreateResponses, CfgAccountsProfilePartialPartialUpdateData, CfgAccountsProfilePartialPartialUpdateErrors, CfgAccountsProfilePartialPartialUpdateResponses, CfgAccountsProfilePartialUpdateData, CfgAccountsProfilePartialUpdateErrors, CfgAccountsProfilePartialUpdateResponses, CfgAccountsProfileRetrieveData, CfgAccountsProfileRetrieveErrors, CfgAccountsProfileRetrieveResponses, CfgAccountsProfileUpdatePartialUpdateData, CfgAccountsProfileUpdatePartialUpdateErrors, CfgAccountsProfileUpdatePartialUpdateResponses, CfgAccountsProfileUpdateUpdateData, CfgAccountsProfileUpdateUpdateErrors, CfgAccountsProfileUpdateUpdateResponses, CfgAccountsTokenRefreshCreateData, CfgAccountsTokenRefreshCreateResponses, CfgCentrifugoAuthTokenRetrieveData, CfgCentrifugoAuthTokenRetrieveErrors, CfgCentrifugoAuthTokenRetrieveResponses, CfgTotpBackupCodesRegenerateCreateData, CfgTotpBackupCodesRegenerateCreateErrors, CfgTotpBackupCodesRegenerateCreateResponses, CfgTotpBackupCodesRetrieveData, CfgTotpBackupCodesRetrieveResponses, CfgTotpDevicesDestroyData, CfgTotpDevicesDestroyResponses, CfgTotpDevicesRetrieveData, CfgTotpDevicesRetrieveResponses, CfgTotpDisableCreateData, CfgTotpDisableCreateErrors, CfgTotpDisableCreateResponses, CfgTotpSetupConfirmCreateData, CfgTotpSetupConfirmCreateErrors, CfgTotpSetupConfirmCreateResponses, CfgTotpSetupCreateData, CfgTotpSetupCreateErrors, CfgTotpSetupCreateResponses, CfgTotpVerifyBackupCreateData, CfgTotpVerifyBackupCreateErrors, CfgTotpVerifyBackupCreateResponses, CfgTotpVerifyCreateData, CfgTotpVerifyCreateErrors, CfgTotpVerifyCreateResponses } from './types.gen';\n\nexport type Options<TData extends TDataShape = TDataShape, ThrowOnError extends boolean = boolean, TResponse = unknown> = Options2<TData, ThrowOnError, TResponse> & {\n /**\n * You can provide a client instance returned by `createClient()` instead of\n * individual options. This might be also useful if you want to implement a\n * custom client.\n */\n client?: Client;\n /**\n * You can pass arbitrary values through the `meta` object. This can be\n * used to access values that aren't defined as part of the SDK function.\n */\n meta?: Record<string, unknown>;\n};\n\nexport class CfgAccountsApiKey {\n /**\n * Get API key details\n *\n * Retrieve the current user's API key (masked) and metadata.\n */\n public static cfgAccountsApiKeyRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsApiKeyRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgAccountsApiKeyRetrieveResponses, CfgAccountsApiKeyRetrieveErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/api-key/',\n ...options\n });\n }\n \n /**\n * Regenerate API key\n *\n * Generate a new API key. The full key is returned only once.\n */\n public static cfgAccountsApiKeyRegenerateCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsApiKeyRegenerateCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsApiKeyRegenerateCreateResponses, CfgAccountsApiKeyRegenerateCreateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/api-key/regenerate/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * Test API key\n *\n * Test whether an API key is valid without consuming it.\n */\n public static cfgAccountsApiKeyTestCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsApiKeyTestCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsApiKeyTestCreateResponses, unknown, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/api-key/test/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgAccountsOauth {\n /**\n * List OAuth connections\n *\n * Get all OAuth connections for the current user.\n */\n public static cfgAccountsOauthConnectionsList<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsOauthConnectionsListData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgAccountsOauthConnectionsListResponses, unknown, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/oauth/connections/',\n ...options\n });\n }\n \n /**\n * Disconnect OAuth provider\n *\n * Remove OAuth connection for the specified provider.\n */\n public static cfgAccountsOauthDisconnectCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsOauthDisconnectCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsOauthDisconnectCreateResponses, CfgAccountsOauthDisconnectCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/oauth/disconnect/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * Start GitHub OAuth\n *\n * Generate GitHub OAuth authorization URL. Redirect user to this URL to start authentication.\n */\n public static cfgAccountsOauthGithubAuthorizeCreate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsOauthGithubAuthorizeCreateData, ThrowOnError>) {\n return (options?.client ?? client).post<CfgAccountsOauthGithubAuthorizeCreateResponses, CfgAccountsOauthGithubAuthorizeCreateErrors, ThrowOnError>({\n url: '/cfg/accounts/oauth/github/authorize/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Complete GitHub OAuth\n *\n * Exchange authorization code for JWT tokens. Call this after GitHub redirects back with code.\n */\n public static cfgAccountsOauthGithubCallbackCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsOauthGithubCallbackCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsOauthGithubCallbackCreateResponses, CfgAccountsOauthGithubCallbackCreateErrors, ThrowOnError>({\n url: '/cfg/accounts/oauth/github/callback/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * List OAuth providers\n *\n * Get list of available OAuth providers for authentication.\n */\n public static cfgAccountsOauthProvidersRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsOauthProvidersRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgAccountsOauthProvidersRetrieveResponses, unknown, ThrowOnError>({ url: '/cfg/accounts/oauth/providers/', ...options });\n }\n}\n\nexport class CfgAccounts {\n /**\n * Request OTP code to email.\n */\n public static cfgAccountsOtpRequestCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsOtpRequestCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsOtpRequestCreateResponses, CfgAccountsOtpRequestCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/otp/request/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * Verify OTP code and return JWT tokens or 2FA session.\n *\n * If user has 2FA enabled:\n * - Returns requires_2fa=True with session_id\n * - Client must complete 2FA verification at /cfg/totp/verify/\n *\n * If user has no 2FA:\n * - Returns JWT tokens and user data directly\n */\n public static cfgAccountsOtpVerifyCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsOtpVerifyCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsOtpVerifyCreateResponses, CfgAccountsOtpVerifyCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/otp/verify/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgAccountsProfile {\n /**\n * Get current user profile\n *\n * Retrieve the current authenticated user's profile information.\n */\n public static cfgAccountsProfileRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgAccountsProfileRetrieveResponses, CfgAccountsProfileRetrieveErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/',\n ...options\n });\n }\n \n /**\n * Upload user avatar\n *\n * Upload avatar image for the current authenticated user. Accepts multipart/form-data with 'avatar' field.\n */\n public static cfgAccountsProfileAvatarCreate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileAvatarCreateData, ThrowOnError>) {\n return (options?.client ?? client).post<CfgAccountsProfileAvatarCreateResponses, CfgAccountsProfileAvatarCreateErrors, ThrowOnError>({\n ...formDataBodySerializer,\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/profile/avatar/',\n ...options,\n headers: {\n 'Content-Type': null,\n ...options?.headers\n }\n });\n }\n \n /**\n * Delete user account\n *\n *\n * Permanently delete the current user's account.\n *\n * This operation:\n * - Deactivates the account (user cannot log in)\n * - Anonymizes personal data (GDPR compliance)\n * - Frees up the email address for re-registration\n * - Preserves audit trail\n *\n * The account can be restored by an administrator if needed.\n *\n */\n public static cfgAccountsProfileDeleteCreate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileDeleteCreateData, ThrowOnError>) {\n return (options?.client ?? client).post<CfgAccountsProfileDeleteCreateResponses, CfgAccountsProfileDeleteCreateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/delete/',\n ...options\n });\n }\n \n /**\n * Partial update user profile\n *\n * Partially update the current authenticated user's profile information. Supports avatar upload.\n */\n public static cfgAccountsProfilePartialPartialUpdate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfilePartialPartialUpdateData, ThrowOnError>) {\n return (options?.client ?? client).patch<CfgAccountsProfilePartialPartialUpdateResponses, CfgAccountsProfilePartialPartialUpdateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/partial/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Partial update user profile\n *\n * Partially update the current authenticated user's profile information. Supports avatar upload.\n */\n public static cfgAccountsProfilePartialUpdate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfilePartialUpdateData, ThrowOnError>) {\n return (options?.client ?? client).put<CfgAccountsProfilePartialUpdateResponses, CfgAccountsProfilePartialUpdateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/partial/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Update user profile\n *\n * Update the current authenticated user's profile information.\n */\n public static cfgAccountsProfileUpdatePartialUpdate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileUpdatePartialUpdateData, ThrowOnError>) {\n return (options?.client ?? client).patch<CfgAccountsProfileUpdatePartialUpdateResponses, CfgAccountsProfileUpdatePartialUpdateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/update/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Update user profile\n *\n * Update the current authenticated user's profile information.\n */\n public static cfgAccountsProfileUpdateUpdate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileUpdateUpdateData, ThrowOnError>) {\n return (options?.client ?? client).put<CfgAccountsProfileUpdateUpdateResponses, CfgAccountsProfileUpdateUpdateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/update/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n}\n\nexport class CfgAccountsAuth {\n /**\n * Refresh JWT token.\n */\n public static cfgAccountsTokenRefreshCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsTokenRefreshCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsTokenRefreshCreateResponses, unknown, ThrowOnError>({\n url: '/cfg/accounts/token/refresh/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgCentrifugo {\n /**\n * Get Centrifugo connection token\n *\n * Generate JWT token for WebSocket connection to Centrifugo. Token includes user's allowed channels based on their permissions. Requires authentication.\n */\n public static cfgCentrifugoAuthTokenRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgCentrifugoAuthTokenRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgCentrifugoAuthTokenRetrieveResponses, CfgCentrifugoAuthTokenRetrieveErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/centrifugo/auth/token/',\n ...options\n });\n }\n}\n\nexport class CfgTotpBackupCodes {\n /**\n * Get backup codes status for user.\n */\n public static cfgTotpBackupCodesRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgTotpBackupCodesRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgTotpBackupCodesRetrieveResponses, unknown, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/backup-codes/',\n ...options\n });\n }\n \n /**\n * Regenerate backup codes.\n *\n * Requires TOTP code for verification.\n * Invalidates all existing codes.\n */\n public static cfgTotpBackupCodesRegenerateCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpBackupCodesRegenerateCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpBackupCodesRegenerateCreateResponses, CfgTotpBackupCodesRegenerateCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/backup-codes/regenerate/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgTotp {\n /**\n * List all TOTP devices for user.\n */\n public static cfgTotpDevicesRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgTotpDevicesRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgTotpDevicesRetrieveResponses, unknown, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/devices/',\n ...options\n });\n }\n \n /**\n * Delete a TOTP device.\n *\n * Requires verification code if removing the last/primary device.\n */\n public static cfgTotpDevicesDestroy<ThrowOnError extends boolean = false>(options: Options<CfgTotpDevicesDestroyData, ThrowOnError>) {\n return (options.client ?? client).delete<CfgTotpDevicesDestroyResponses, unknown, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/devices/{id}/',\n ...options\n });\n }\n \n /**\n * Completely disable 2FA for account.\n *\n * Requires verification code.\n */\n public static cfgTotpDisableCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpDisableCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpDisableCreateResponses, CfgTotpDisableCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/disable/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgTotpSetup {\n /**\n * Start 2FA setup process.\n *\n * Creates a new TOTP device and returns QR code for scanning.\n */\n public static cfgTotpSetupCreate<ThrowOnError extends boolean = false>(options?: Options<CfgTotpSetupCreateData, ThrowOnError>) {\n return (options?.client ?? client).post<CfgTotpSetupCreateResponses, CfgTotpSetupCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/setup/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Confirm 2FA setup with first valid code.\n *\n * Activates the device and generates backup codes.\n */\n public static cfgTotpSetupConfirmCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpSetupConfirmCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpSetupConfirmCreateResponses, CfgTotpSetupConfirmCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/setup/confirm/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgTotpVerify {\n /**\n * Verify TOTP code for 2FA session.\n *\n * Completes authentication and returns JWT tokens on success.\n */\n public static cfgTotpVerifyCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpVerifyCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpVerifyCreateResponses, CfgTotpVerifyCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/verify/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * Verify backup recovery code for 2FA session.\n *\n * Alternative verification method when TOTP device unavailable.\n */\n public static cfgTotpVerifyBackupCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpVerifyBackupCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpVerifyBackupCreateResponses, CfgTotpVerifyBackupCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/verify/backup/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\nimport { CfgAccountsApiKey } from '../sdk.gen';\nimport { CfgAccountsOauth } from '../sdk.gen';\nimport { CfgAccounts } from '../sdk.gen';\nimport { CfgAccountsProfile } from '../sdk.gen';\nimport { CfgAccountsAuth } from '../sdk.gen';\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n readonly cfgAccountsApiKey = CfgAccountsApiKey;\n readonly cfgAccountsOauth = CfgAccountsOauth;\n readonly cfgAccounts = CfgAccounts;\n readonly cfgAccountsProfile = CfgAccountsProfile;\n readonly cfgAccountsAuth = CfgAccountsAuth;\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { CfgAccountsApiKey, CfgAccountsOauth, CfgAccounts, CfgAccountsProfile, CfgAccountsAuth };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\nimport { CfgCentrifugo } from '../sdk.gen';\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n readonly cfgCentrifugo = CfgCentrifugo;\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { CfgCentrifugo };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\nimport { CfgTotpBackupCodes } from '../sdk.gen';\nimport { CfgTotp } from '../sdk.gen';\nimport { CfgTotpSetup } from '../sdk.gen';\nimport { CfgTotpVerify } from '../sdk.gen';\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n readonly cfgTotpBackupCodes = CfgTotpBackupCodes;\n readonly cfgTotp = CfgTotp;\n readonly cfgTotpSetup = CfgTotpSetup;\n readonly cfgTotpVerify = CfgTotpVerify;\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { CfgTotpBackupCodes, CfgTotp, CfgTotpSetup, CfgTotpVerify };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n//\n// NOTE: classes whose name would collide with a barrel-level type\n// alias (e.g. `Auth`, which is also `type Auth = typeof auth`) are\n// re-exported under a `*SDK` suffix here. The original name is still\n// available via the per-group import: `import { Auth } from\n// '<api>/_auth'`. To remove the alias, rename the OpenAPI tag on the\n// backend so the SDK class doesn't collide.\nexport { CfgAccountsApiKey, CfgAccountsOauth, CfgAccounts, CfgAccountsProfile, CfgAccountsAuth } from './_cfg_accounts';\nexport { CfgCentrifugo } from './_cfg_centrifugo';\nexport { CfgTotpBackupCodes, CfgTotp, CfgTotpSetup, CfgTotpVerify } from './_cfg_totp';\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n","import { isDev } from \"./env\";\n/**\n * Analytics stub for @djangocfg/api/auth\n * Provides minimal analytics interface without external dependencies\n *\n * If you need full analytics, install @djangocfg/layouts and use its Analytics module\n */\n\nexport enum AnalyticsEvent {\n AUTH_OTP_REQUEST = 'auth_otp_request',\n AUTH_LOGIN_SUCCESS = 'auth_login_success',\n AUTH_OTP_VERIFY_FAIL = 'auth_otp_verify_fail',\n AUTH_SESSION_EXPIRED = 'auth_session_expired',\n AUTH_TOKEN_REFRESH = 'auth_token_refresh',\n AUTH_TOKEN_REFRESH_FAIL = 'auth_token_refresh_fail',\n AUTH_LOGOUT = 'auth_logout',\n AUTH_OAUTH_START = 'auth_oauth_start',\n AUTH_OAUTH_FAIL = 'auth_oauth_fail',\n}\n\nexport enum AnalyticsCategory {\n AUTH = 'auth',\n}\n\nexport type AnalyticsEventType = `${AnalyticsEvent}`;\nexport type AnalyticsCategoryType = `${AnalyticsCategory}`;\n\ninterface AnalyticsEventParams {\n category?: AnalyticsCategoryType;\n label?: string;\n value?: number;\n [key: string]: any;\n}\n\n/**\n * Minimal analytics implementation\n * Logs to console in development, silent in production\n */\nexport const Analytics = {\n /**\n * Track an analytics event\n */\n event(eventName: AnalyticsEventType, params?: AnalyticsEventParams) {\n if (isDev) {\n console.log('[Analytics]', eventName, params);\n }\n\n // You can extend this to send to your analytics service\n // Example: window.gtag?.('event', eventName, params);\n },\n\n /**\n * Set user ID for tracking\n */\n setUser(userId: string) {\n if (isDev) {\n console.log('[Analytics] Set user:', userId);\n }\n\n // You can extend this to send to your analytics service\n // Example: window.gtag?.('set', { user_id: userId });\n },\n};\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiAccounts } from '../../clients';\nimport { CfgAccountsOauth } from '../../_api/generated/sdk.gen';\nimport { Analytics, AnalyticsCategory, AnalyticsEvent } from '../utils/analytics';\nimport { authLogger } from '../utils/logger';\nimport { useCfgRouter } from './useCfgRouter';\n\nexport interface UseGithubAuthOptions {\n sourceUrl?: string;\n onSuccess?: (user: any, isNewUser: boolean) => void;\n onError?: (error: string) => void;\n /** Callback when 2FA is required */\n onRequires2FA?: (sessionId: string, shouldPrompt2FA: boolean) => void;\n redirectUrl?: string;\n /** Skip automatic redirect after success (caller handles navigation) */\n skipRedirect?: boolean;\n}\n\nexport interface UseGithubAuthReturn {\n isLoading: boolean;\n error: string | null;\n startGithubAuth: () => Promise<void>;\n handleGithubCallback: (code: string, state: string) => Promise<void>;\n}\n\n/**\n * Hook for GitHub OAuth authentication flow.\n *\n * Usage:\n * 1. Call startGithubAuth() to redirect user to GitHub\n * 2. After GitHub redirects back, call handleGithubCallback(code, state)\n *\n * @example\n * ```tsx\n * const { isLoading, error, startGithubAuth } = useGithubAuth({\n * onSuccess: (user) => router.push('/dashboard'),\n * onError: (error) => console.error(error),\n * });\n *\n * <Button onClick={startGithubAuth} disabled={isLoading}>\n * Continue with GitHub\n * </Button>\n * ```\n */\nexport const useGithubAuth = (options: UseGithubAuthOptions = {}): UseGithubAuthReturn => {\n const { sourceUrl, onSuccess, onError, onRequires2FA, redirectUrl, skipRedirect = false } = options;\n const router = useCfgRouter();\n\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n\n /**\n * Start GitHub OAuth flow - redirects user to GitHub authorization page.\n */\n const startGithubAuth = useCallback(async () => {\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Starting GitHub OAuth flow...');\n\n // Track OAuth start\n Analytics.event(AnalyticsEvent.AUTH_OAUTH_START, {\n category: AnalyticsCategory.AUTH,\n label: 'github',\n });\n\n // Call API to get authorization URL\n // The API will auto-generate redirect_uri from config if not provided\n const result = await CfgAccountsOauth.cfgAccountsOauthGithubAuthorizeCreate({\n body: {\n source_url: sourceUrl || (typeof window !== 'undefined' ? window.location.href : ''),\n },\n throwOnError: true,\n });\n const response = result.data;\n\n if (!response.authorization_url) {\n throw new Error('Failed to get authorization URL');\n }\n\n authLogger.info('Redirecting to GitHub...', response.authorization_url);\n\n if (typeof window !== 'undefined') {\n sessionStorage.setItem('oauth_state', response.state);\n sessionStorage.setItem('oauth_provider', 'github');\n }\n\n window.location.href = response.authorization_url;\n\n } catch (err) {\n const errorMessage = err instanceof Error ? err.message : 'Failed to start GitHub authentication';\n authLogger.error('GitHub OAuth start error:', err);\n setError(errorMessage);\n onError?.(errorMessage);\n\n // Track OAuth error\n Analytics.event(AnalyticsEvent.AUTH_OAUTH_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: 'github',\n });\n } finally {\n setIsLoading(false);\n }\n }, [sourceUrl, onError]);\n\n /**\n * Handle GitHub OAuth callback - exchanges code for JWT tokens.\n *\n * @param code - Authorization code from GitHub callback\n * @param state - State token for CSRF verification\n */\n const handleGithubCallback = useCallback(async (code: string, state: string) => {\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Processing GitHub OAuth callback...');\n\n // Verify state matches what we stored\n if (typeof window !== 'undefined') {\n const storedState = sessionStorage.getItem('oauth_state');\n if (storedState && storedState !== state) {\n throw new Error('Invalid OAuth state - possible CSRF attack');\n }\n // Clear stored state\n sessionStorage.removeItem('oauth_state');\n sessionStorage.removeItem('oauth_provider');\n }\n\n const result = await CfgAccountsOauth.cfgAccountsOauthGithubCallbackCreate({\n body: { code, state },\n throwOnError: true,\n });\n const response = result.data;\n\n // Check if 2FA is required\n if (response.requires_2fa && response.session_id) {\n authLogger.info('GitHub OAuth requires 2FA, session:', response.session_id);\n\n // Track 2FA requirement\n Analytics.event(AnalyticsEvent.AUTH_OAUTH_START, {\n category: AnalyticsCategory.AUTH,\n label: 'github-2fa-required',\n });\n\n // Call 2FA callback\n onRequires2FA?.(response.session_id, response.should_prompt_2fa || false);\n return;\n }\n\n if (!response.access || !response.refresh) {\n throw new Error('Invalid response from OAuth callback');\n }\n\n authLogger.info('GitHub OAuth successful, user:', response.user);\n\n apiAccounts.setToken(response.access);\n apiAccounts.setRefreshToken(response.refresh);\n\n // Track successful OAuth\n Analytics.event(AnalyticsEvent.AUTH_LOGIN_SUCCESS, {\n category: AnalyticsCategory.AUTH,\n label: 'github',\n });\n\n // Set user ID for future tracking\n if (response.user?.id) {\n Analytics.setUser(String(response.user.id));\n }\n\n // Call success callback\n onSuccess?.(response.user, response.is_new_user || false);\n\n // Redirect (unless skipRedirect is true)\n if (!skipRedirect) {\n // Use hardPush for full page reload - ensures all React contexts reinitialize\n const finalRedirectUrl = redirectUrl || '/dashboard';\n router.hardPush(finalRedirectUrl);\n }\n\n } catch (err) {\n const errorMessage = err instanceof Error ? err.message : 'GitHub authentication failed';\n authLogger.error('GitHub OAuth callback error:', err);\n setError(errorMessage);\n onError?.(errorMessage);\n\n // Track OAuth error\n Analytics.event(AnalyticsEvent.AUTH_OAUTH_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: 'github',\n });\n } finally {\n setIsLoading(false);\n }\n }, [onSuccess, onError, redirectUrl, router]);\n\n return {\n isLoading,\n error,\n startGithubAuth,\n handleGithubCallback,\n };\n};\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiTotp } from '../../clients';\nimport { CfgTotpSetup } from '../../_api/generated/sdk.gen';\nimport { authLogger } from '../utils/logger';\n\nexport interface TwoFactorSetupData {\n /** Device ID to use for confirmation */\n deviceId: string;\n /** Base32-encoded TOTP secret (for manual entry) */\n secret: string;\n /** otpauth:// URI for QR code generation */\n provisioningUri: string;\n /** Base64-encoded QR code image (data URI) */\n qrCodeBase64: string;\n /** Seconds until setup expires */\n expiresIn: number;\n}\n\nexport interface UseTwoFactorSetupOptions {\n /** Callback when setup is confirmed and backup codes are generated */\n onComplete?: (backupCodes: string[]) => void;\n /** Callback on error */\n onError?: (error: string) => void;\n}\n\nexport interface UseTwoFactorSetupReturn {\n /** Loading state */\n isLoading: boolean;\n /** Error message */\n error: string | null;\n /** Setup data (QR code, secret, etc.) */\n setupData: TwoFactorSetupData | null;\n /** Backup codes after confirmation */\n backupCodes: string[] | null;\n /** Warning message about backup codes */\n backupCodesWarning: string | null;\n /** Current setup step */\n setupStep: 'idle' | 'scanning' | 'confirming' | 'complete';\n /** Start 2FA setup - returns QR code data */\n startSetup: (deviceName?: string) => Promise<TwoFactorSetupData | null>;\n /** Confirm setup with TOTP code - returns backup codes */\n confirmSetup: (code: string) => Promise<string[] | null>;\n /** Reset setup state */\n resetSetup: () => void;\n /** Clear error */\n clearError: () => void;\n}\n\n/**\n * Hook for 2FA setup (enabling TOTP authentication).\n *\n * Flow:\n * 1. Call startSetup() to get QR code and provisioning URI\n * 2. User scans QR code with authenticator app\n * 3. Call confirmSetup(code) with the 6-digit code from app\n * 4. Show backup codes to user (they must save these!)\n *\n * @example\n * ```tsx\n * const {\n * isLoading,\n * error,\n * setupData,\n * backupCodes,\n * setupStep,\n * startSetup,\n * confirmSetup,\n * } = useTwoFactorSetup({\n * onComplete: (codes) => console.log('Backup codes:', codes),\n * onError: (error) => console.error(error),\n * });\n *\n * // Start setup\n * const data = await startSetup('My iPhone');\n *\n * // Show QR code\n * <QRCodeSVG value={data.provisioningUri} />\n *\n * // Confirm with code from app\n * const codes = await confirmSetup('123456');\n * ```\n */\nexport const useTwoFactorSetup = (options: UseTwoFactorSetupOptions = {}): UseTwoFactorSetupReturn => {\n const { onComplete, onError } = options;\n\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n const [setupData, setSetupData] = useState<TwoFactorSetupData | null>(null);\n const [backupCodes, setBackupCodes] = useState<string[] | null>(null);\n const [backupCodesWarning, setBackupCodesWarning] = useState<string | null>(null);\n const [setupStep, setSetupStep] = useState<'idle' | 'scanning' | 'confirming' | 'complete'>('idle');\n\n const clearError = useCallback(() => {\n setError(null);\n }, []);\n\n const resetSetup = useCallback(() => {\n setSetupData(null);\n setBackupCodes(null);\n setBackupCodesWarning(null);\n setSetupStep('idle');\n setError(null);\n }, []);\n\n /**\n * Start 2FA setup - generates QR code and secret\n */\n const startSetup = useCallback(async (deviceName?: string): Promise<TwoFactorSetupData | null> => {\n setIsLoading(true);\n setError(null);\n setSetupStep('scanning');\n\n try {\n authLogger.info('Starting 2FA setup...');\n\n const result = await CfgTotpSetup.cfgTotpSetupCreate({\n body: { device_name: deviceName },\n throwOnError: true,\n });\n const response = result.data;\n\n const data: TwoFactorSetupData = {\n deviceId: response.device_id,\n secret: response.secret,\n provisioningUri: response.provisioning_uri,\n qrCodeBase64: response.qr_code_base64,\n expiresIn: response.expires_in,\n };\n\n setSetupData(data);\n authLogger.info('2FA setup initiated, expires in:', data.expiresIn, 'seconds');\n\n return data;\n\n } catch (err) {\n const errorMessage = err instanceof Error ? err.message : 'Failed to start 2FA setup';\n authLogger.error('2FA setup error:', err);\n setError(errorMessage);\n setSetupStep('idle');\n onError?.(errorMessage);\n return null;\n } finally {\n setIsLoading(false);\n }\n }, [onError]);\n\n /**\n * Confirm 2FA setup with TOTP code from authenticator app\n */\n const confirmSetup = useCallback(async (code: string): Promise<string[] | null> => {\n if (!setupData) {\n const msg = 'Setup not started. Call startSetup() first.';\n setError(msg);\n onError?.(msg);\n return null;\n }\n\n if (!code || code.length !== 6) {\n const msg = 'Please enter a 6-digit code';\n setError(msg);\n onError?.(msg);\n return null;\n }\n\n setIsLoading(true);\n setError(null);\n setSetupStep('confirming');\n\n try {\n authLogger.info('Confirming 2FA setup...');\n\n const result = await CfgTotpSetup.cfgTotpSetupConfirmCreate({\n body: { device_id: setupData.deviceId, code },\n throwOnError: true,\n });\n const response = result.data;\n\n const codes = response.backup_codes;\n setBackupCodes(codes);\n setBackupCodesWarning(response.backup_codes_warning);\n setSetupStep('complete');\n\n authLogger.info('2FA setup confirmed, backup codes generated:', codes.length);\n\n // Call completion callback\n onComplete?.(codes);\n\n return codes;\n\n } catch (err) {\n const errorMessage = err instanceof Error ? err.message : 'Invalid code. Please try again.';\n authLogger.error('2FA setup confirmation error:', err);\n setError(errorMessage);\n setSetupStep('scanning'); // Go back to scanning step\n onError?.(errorMessage);\n return null;\n } finally {\n setIsLoading(false);\n }\n }, [setupData, onComplete, onError]);\n\n return {\n isLoading,\n error,\n setupData,\n backupCodes,\n backupCodesWarning,\n setupStep,\n startSetup,\n confirmSetup,\n resetSetup,\n clearError,\n };\n};\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiTotp } from '../../clients';\nimport { APIError } from '../../_api/generated/helpers';\nimport { CfgTotp } from '../../_api/generated/sdk.gen';\nimport { authLogger } from '../utils/logger';\n\nexport interface TwoFactorDevice {\n id: string;\n name: string;\n createdAt: string;\n lastUsedAt: string | null;\n isPrimary: boolean;\n}\n\nexport interface UseTwoFactorStatusReturn {\n /** Loading state */\n isLoading: boolean;\n /** Error message */\n error: string | null;\n /** Whether 2FA is enabled for user */\n has2FAEnabled: boolean | null;\n /** List of TOTP devices */\n devices: TwoFactorDevice[];\n /** Fetch 2FA status */\n fetchStatus: () => Promise<void>;\n /** Disable 2FA (requires TOTP code) */\n disable2FA: (code: string) => Promise<boolean>;\n /** Clear error */\n clearError: () => void;\n}\n\n/**\n * Hook for checking and managing 2FA status.\n *\n * @example\n * ```tsx\n * const { has2FAEnabled, devices, fetchStatus, disable2FA, isLoading } = useTwoFactorStatus();\n *\n * useEffect(() => {\n * fetchStatus();\n * }, [fetchStatus]);\n *\n * if (has2FAEnabled) {\n * // Show disable button\n * } else {\n * // Show enable button\n * }\n * ```\n */\n/** Extract a human-readable message from a thrown error. */\nfunction extractErrorMessage(err: unknown, fallback: string): string {\n if (err instanceof APIError) {\n const body = err.response as Record<string, unknown> | null;\n if (typeof body?.error === 'string') return body.error;\n if (typeof body?.detail === 'string') return body.detail;\n return err.message;\n }\n if (err instanceof Error) return err.message;\n return fallback;\n}\n\nexport const useTwoFactorStatus = (): UseTwoFactorStatusReturn => {\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n const [has2FAEnabled, setHas2FAEnabled] = useState<boolean | null>(null);\n const [devices, setDevices] = useState<TwoFactorDevice[]>([]);\n\n const clearError = useCallback(() => {\n setError(null);\n }, []);\n\n /**\n * Fetch current 2FA status and devices\n */\n const fetchStatus = useCallback(async (): Promise<void> => {\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Fetching 2FA status...');\n\n // API returns { devices: [...], has_2fa_enabled: bool }\n const result = await CfgTotp.cfgTotpDevicesRetrieve({ throwOnError: true });\n const response = result.data;\n\n const mappedDevices: TwoFactorDevice[] = response.devices.map((device) => ({\n id: device.id,\n name: device.name,\n createdAt: device.created_at,\n lastUsedAt: device.last_used_at ?? null,\n isPrimary: device.is_primary,\n }));\n\n setDevices(mappedDevices);\n setHas2FAEnabled(response.has_2fa_enabled);\n\n authLogger.info('2FA status:', response.has_2fa_enabled ? 'enabled' : 'disabled');\n\n } catch (err) {\n const errorMessage = extractErrorMessage(err, 'Failed to fetch 2FA status');\n authLogger.error('Failed to fetch 2FA status:', err);\n setError(errorMessage);\n } finally {\n setIsLoading(false);\n }\n }, []);\n\n /**\n * Disable 2FA for the account\n */\n const disable2FA = useCallback(async (code: string): Promise<boolean> => {\n if (!code || code.length !== 6) {\n setError('Please enter a 6-digit code');\n return false;\n }\n\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Disabling 2FA...');\n\n await CfgTotp.cfgTotpDisableCreate({ body: { code }, throwOnError: true });\n\n setHas2FAEnabled(false);\n setDevices([]);\n\n authLogger.info('2FA disabled successfully');\n return true;\n\n } catch (err: unknown) {\n const errorMessage = extractErrorMessage(err, 'Invalid verification code');\n authLogger.error('Failed to disable 2FA:', err);\n setError(errorMessage);\n return false;\n } finally {\n setIsLoading(false);\n }\n }, []);\n\n return {\n isLoading,\n error,\n has2FAEnabled,\n devices,\n fetchStatus,\n disable2FA,\n clearError,\n };\n};\n","'use client';\n\nimport { useState } from 'react';\n\nimport { authLogger } from '../utils/logger';\n\n/**\n * Simple sessionStorage hook with better error handling\n * @param key - Storage key\n * @param initialValue - Default value if key doesn't exist\n * @returns [value, setValue, removeValue] - Current value, setter function, and remove function\n */\nexport function useSessionStorage<T>(key: string, initialValue: T) {\n // Get initial value from sessionStorage or use provided initialValue\n const [storedValue, setStoredValue] = useState<T>(() => {\n if (typeof window === 'undefined') {\n return initialValue;\n }\n\n try {\n const item = window.sessionStorage.getItem(key);\n return item ? JSON.parse(item) : initialValue;\n } catch (error) {\n authLogger.error(`Error reading sessionStorage key \"${key}\":`, error);\n return initialValue;\n }\n });\n\n // Check data size and limit\n const checkDataSize = (data: any): boolean => {\n try {\n const jsonString = JSON.stringify(data);\n const sizeInBytes = new Blob([jsonString]).size;\n const sizeInKB = sizeInBytes / 1024;\n \n // Limit to 1MB per item\n if (sizeInKB > 1024) {\n authLogger.warn(`Data size (${sizeInKB.toFixed(2)}KB) exceeds 1MB limit for key \"${key}\"`);\n return false;\n }\n\n return true;\n } catch (error) {\n authLogger.error(`Error checking data size for key \"${key}\":`, error);\n return false;\n }\n };\n\n // Clear old data when sessionStorage is full\n const clearOldData = () => {\n try {\n const keys = Object.keys(sessionStorage).filter(key => key && typeof key === 'string');\n // Remove oldest items if we have more than 50 items\n if (keys.length > 50) {\n const itemsToRemove = Math.ceil(keys.length * 0.2);\n for (let i = 0; i < itemsToRemove; i++) {\n try {\n const key = keys[i];\n if (key) {\n sessionStorage.removeItem(key);\n sessionStorage.removeItem(`${key}_timestamp`);\n }\n } catch {\n // Ignore errors when removing items\n }\n }\n }\n } catch (error) {\n authLogger.error('Error clearing old sessionStorage data:', error);\n }\n };\n\n // Force clear all data if quota is exceeded\n const forceClearAll = () => {\n try {\n const keys = Object.keys(sessionStorage);\n for (const key of keys) {\n try {\n sessionStorage.removeItem(key);\n } catch {\n // Ignore errors when removing items\n }\n }\n } catch (error) {\n authLogger.error('Error force clearing sessionStorage:', error);\n }\n };\n\n // Update sessionStorage when value changes\n const setValue = (value: T | ((val: T) => T)) => {\n try {\n const valueToStore = value instanceof Function ? value(storedValue) : value;\n \n // Check data size before attempting to save\n if (!checkDataSize(valueToStore)) {\n authLogger.warn(`Data size too large for key \"${key}\", removing key`);\n // Remove the key if data is too large\n try {\n window.sessionStorage.removeItem(key);\n window.sessionStorage.removeItem(`${key}_timestamp`);\n } catch {\n // Ignore errors when removing\n }\n // Still update the state\n setStoredValue(valueToStore);\n return;\n }\n \n setStoredValue(valueToStore);\n\n if (typeof window !== 'undefined') {\n // Try to set the value\n try {\n window.sessionStorage.setItem(key, JSON.stringify(valueToStore));\n // Add timestamp for cleanup\n window.sessionStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (storageError: any) {\n // If quota exceeded, clear old data and try again\n if (storageError.name === 'QuotaExceededError' ||\n storageError.code === 22 ||\n storageError.message?.includes('quota')) {\n authLogger.warn('sessionStorage quota exceeded, clearing old data...');\n clearOldData();\n \n // Try again after clearing\n try {\n window.sessionStorage.setItem(key, JSON.stringify(valueToStore));\n window.sessionStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (retryError) {\n authLogger.error(`Failed to set sessionStorage key \"${key}\" after clearing old data:`, retryError);\n // If still fails, force clear all and try one more time\n try {\n forceClearAll();\n window.sessionStorage.setItem(key, JSON.stringify(valueToStore));\n window.sessionStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (finalError) {\n authLogger.error(`Failed to set sessionStorage key \"${key}\" after force clearing:`, finalError);\n // If still fails, just update the state without sessionStorage\n setStoredValue(valueToStore);\n }\n }\n } else {\n throw storageError;\n }\n }\n }\n } catch (error) {\n authLogger.error(`Error setting sessionStorage key \"${key}\":`, error);\n // Still update the state even if sessionStorage fails\n const valueToStore = value instanceof Function ? value(storedValue) : value;\n setStoredValue(valueToStore);\n }\n };\n\n // Remove value from sessionStorage\n const removeValue = () => {\n try {\n setStoredValue(initialValue);\n if (typeof window !== 'undefined') {\n try {\n window.sessionStorage.removeItem(key);\n window.sessionStorage.removeItem(`${key}_timestamp`);\n } catch (removeError: any) {\n // If removal fails due to quota, try to clear some data first\n if (removeError.name === 'QuotaExceededError' ||\n removeError.code === 22 ||\n removeError.message?.includes('quota')) {\n authLogger.warn('sessionStorage quota exceeded during removal, clearing old data...');\n clearOldData();\n \n try {\n window.sessionStorage.removeItem(key);\n window.sessionStorage.removeItem(`${key}_timestamp`);\n } catch (retryError) {\n authLogger.error(`Failed to remove sessionStorage key \"${key}\" after clearing:`, retryError);\n // If still fails, force clear all\n forceClearAll();\n }\n } else {\n throw removeError;\n }\n }\n }\n } catch (error) {\n authLogger.error(`Error removing sessionStorage key \"${key}\":`, error);\n }\n };\n\n return [storedValue, setValue, removeValue] as const;\n}\n","import { useSessionStorage } from './useSessionStorage';\n\nconst AUTH_REDIRECT_KEY = 'auth_redirect_url';\n\nexport interface AuthRedirectOptions {\n fallbackUrl?: string;\n clearOnUse?: boolean;\n}\n\n/**\n * Read redirect URL directly from sessionStorage (bypasses React state)\n * This is needed because different component instances have different React states\n */\nconst getRedirectFromStorage = (): string => {\n if (typeof window === 'undefined') return '';\n try {\n const item = window.sessionStorage.getItem(AUTH_REDIRECT_KEY);\n return item ? JSON.parse(item) : '';\n } catch {\n return '';\n }\n};\n\n/**\n * Clear redirect URL directly from sessionStorage\n */\nconst clearRedirectFromStorage = (): void => {\n if (typeof window === 'undefined') return;\n try {\n window.sessionStorage.removeItem(AUTH_REDIRECT_KEY);\n window.sessionStorage.removeItem(`${AUTH_REDIRECT_KEY}_timestamp`);\n } catch {\n // Ignore errors\n }\n};\n\nexport const useAuthRedirectManager = (options: AuthRedirectOptions = {}) => {\n const { fallbackUrl = '/dashboard', clearOnUse = true } = options;\n const [redirectUrl, setRedirectUrl, removeRedirectUrl] = useSessionStorage<string>(AUTH_REDIRECT_KEY, '');\n\n const setRedirect = (url: string) => {\n setRedirectUrl(url);\n };\n\n const getRedirect = () => {\n // Read directly from storage to get latest value across components\n return getRedirectFromStorage() || redirectUrl;\n };\n\n const clearRedirect = () => {\n removeRedirectUrl();\n clearRedirectFromStorage();\n };\n\n const hasRedirect = () => {\n const stored = getRedirectFromStorage();\n return stored.length > 0 || redirectUrl.length > 0;\n };\n\n const getFinalRedirectUrl = () => {\n // Read directly from storage to get latest value across components\n const stored = getRedirectFromStorage();\n return stored || redirectUrl || fallbackUrl;\n };\n\n const useAndClearRedirect = () => {\n // Read directly from storage to ensure we get the latest saved URL\n // even if it was saved by a different component instance\n const stored = getRedirectFromStorage();\n const finalUrl = stored || redirectUrl || fallbackUrl;\n\n if (clearOnUse) {\n clearRedirect();\n }\n return finalUrl;\n };\n\n return {\n redirectUrl,\n setRedirect,\n getRedirect,\n clearRedirect,\n hasRedirect,\n getFinalRedirectUrl,\n useAndClearRedirect\n };\n}; ","\"use client\"\n\nimport { useEffect, useState } from 'react';\n\nimport { useAuth } from '../context';\nimport { useCfgRouter } from './useCfgRouter';\n\ninterface UseAuthGuardOptions {\n redirectTo?: string;\n requireAuth?: boolean;\n /** Whether to save current URL for redirect after auth (default: true) */\n saveRedirectUrl?: boolean;\n}\n\nexport const useAuthGuard = (options: UseAuthGuardOptions = {}) => {\n const { redirectTo = '/auth', requireAuth = true, saveRedirectUrl: shouldSaveUrl = true } = options;\n const { isAuthenticated, isLoading, saveRedirectUrl } = useAuth();\n const router = useCfgRouter();\n const [isRedirecting, setIsRedirecting] = useState(false);\n\n useEffect(() => {\n if (!isLoading && requireAuth && !isAuthenticated && !isRedirecting) {\n // Save current URL before redirecting\n if (shouldSaveUrl && typeof window !== 'undefined') {\n const currentUrl = window.location.pathname + window.location.search;\n saveRedirectUrl(currentUrl);\n }\n\n setIsRedirecting(true);\n router.push(redirectTo);\n }\n }, [isAuthenticated, isLoading, router, redirectTo, requireAuth, isRedirecting, shouldSaveUrl, saveRedirectUrl]);\n\n return { isAuthenticated, isLoading, isRedirecting };\n}; ","'use client';\n\nimport { useEffect, useState } from 'react';\n\nimport { authLogger } from '../utils/logger';\n\n/**\n * Simple localStorage hook with better error handling\n * @param key - Storage key\n * @param initialValue - Default value if key doesn't exist\n * @returns [value, setValue, removeValue] - Current value, setter function, and remove function\n */\nexport function useLocalStorage<T>(key: string, initialValue: T) {\n // Get initial value from localStorage or use provided initialValue\n const [storedValue, setStoredValue] = useState<T>(() => {\n if (typeof window === 'undefined') {\n return initialValue;\n }\n\n try {\n const item = window.localStorage.getItem(key);\n if (item === null) {\n return initialValue;\n }\n \n // Try to parse as JSON first, fallback to string\n try {\n return JSON.parse(item);\n } catch {\n // If JSON.parse fails, return as string\n return item as T;\n }\n } catch (error) {\n authLogger.error(`Error reading localStorage key \"${key}\":`, error);\n return initialValue;\n }\n });\n\n // Check data size and limit\n const checkDataSize = (data: any): boolean => {\n try {\n const jsonString = JSON.stringify(data);\n const sizeInBytes = new Blob([jsonString]).size;\n const sizeInKB = sizeInBytes / 1024;\n \n // Limit to 1MB per item\n if (sizeInKB > 1024) {\n authLogger.warn(`Data size (${sizeInKB.toFixed(2)}KB) exceeds 1MB limit for key \"${key}\"`);\n return false;\n }\n\n return true;\n } catch (error) {\n authLogger.error(`Error checking data size for key \"${key}\":`, error);\n return false;\n }\n };\n\n // Clear old data when localStorage is full\n const clearOldData = () => {\n try {\n const keys = Object.keys(localStorage).filter(key => key && typeof key === 'string');\n // Remove oldest items if we have more than 50 items\n if (keys.length > 50) {\n const itemsToRemove = Math.ceil(keys.length * 0.2);\n for (let i = 0; i < itemsToRemove; i++) {\n try {\n const key = keys[i];\n if (key) {\n localStorage.removeItem(key);\n localStorage.removeItem(`${key}_timestamp`);\n }\n } catch {\n // Ignore errors when removing items\n }\n }\n }\n } catch (error) {\n authLogger.error('Error clearing old localStorage data:', error);\n }\n };\n\n // Force clear all data if quota is exceeded\n const forceClearAll = () => {\n try {\n const keys = Object.keys(localStorage);\n for (const key of keys) {\n try {\n localStorage.removeItem(key);\n } catch {\n // Ignore errors when removing items\n }\n }\n } catch (error) {\n authLogger.error('Error force clearing localStorage:', error);\n }\n };\n\n // Update localStorage when value changes\n const setValue = (value: T | ((val: T) => T)) => {\n try {\n const valueToStore = value instanceof Function ? value(storedValue) : value;\n \n // Check data size before attempting to save\n if (!checkDataSize(valueToStore)) {\n authLogger.warn(`Data size too large for key \"${key}\", removing key`);\n // Remove the key if data is too large\n try {\n window.localStorage.removeItem(key);\n window.localStorage.removeItem(`${key}_timestamp`);\n } catch {\n // Ignore errors when removing\n }\n // Still update the state\n setStoredValue(valueToStore);\n return;\n }\n \n setStoredValue(valueToStore);\n\n if (typeof window !== 'undefined') {\n // Try to set the value\n try {\n // For strings, store directly without JSON.stringify\n if (typeof valueToStore === 'string') {\n window.localStorage.setItem(key, valueToStore);\n } else {\n window.localStorage.setItem(key, JSON.stringify(valueToStore));\n }\n // Add timestamp for cleanup\n window.localStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (storageError: any) {\n // If quota exceeded, clear old data and try again\n if (storageError.name === 'QuotaExceededError' ||\n storageError.code === 22 ||\n storageError.message?.includes('quota')) {\n authLogger.warn('localStorage quota exceeded, clearing old data...');\n clearOldData();\n \n // Try again after clearing\n try {\n // For strings, store directly without JSON.stringify\n if (typeof valueToStore === 'string') {\n window.localStorage.setItem(key, valueToStore);\n } else {\n window.localStorage.setItem(key, JSON.stringify(valueToStore));\n }\n window.localStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (retryError) {\n authLogger.error(`Failed to set localStorage key \"${key}\" after clearing old data:`, retryError);\n // If still fails, force clear all and try one more time\n try {\n forceClearAll();\n // For strings, store directly without JSON.stringify\n if (typeof valueToStore === 'string') {\n window.localStorage.setItem(key, valueToStore);\n } else {\n window.localStorage.setItem(key, JSON.stringify(valueToStore));\n }\n window.localStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (finalError) {\n authLogger.error(`Failed to set localStorage key \"${key}\" after force clearing:`, finalError);\n // If still fails, just update the state without localStorage\n setStoredValue(valueToStore);\n }\n }\n } else {\n throw storageError;\n }\n }\n }\n } catch (error) {\n authLogger.error(`Error setting localStorage key \"${key}\":`, error);\n // Still update the state even if localStorage fails\n const valueToStore = value instanceof Function ? value(storedValue) : value;\n setStoredValue(valueToStore);\n }\n };\n\n // Remove value from localStorage\n const removeValue = () => {\n try {\n setStoredValue(initialValue);\n if (typeof window !== 'undefined') {\n try {\n window.localStorage.removeItem(key);\n window.localStorage.removeItem(`${key}_timestamp`);\n } catch (removeError: any) {\n // If removal fails due to quota, try to clear some data first\n if (removeError.name === 'QuotaExceededError' ||\n removeError.code === 22 ||\n removeError.message?.includes('quota')) {\n authLogger.warn('localStorage quota exceeded during removal, clearing old data...');\n clearOldData();\n \n try {\n window.localStorage.removeItem(key);\n window.localStorage.removeItem(`${key}_timestamp`);\n } catch (retryError) {\n authLogger.error(`Failed to remove localStorage key \"${key}\" after clearing:`, retryError);\n // If still fails, force clear all\n forceClearAll();\n }\n } else {\n throw removeError;\n }\n }\n }\n } catch (error) {\n authLogger.error(`Error removing localStorage key \"${key}\":`, error);\n }\n };\n\n return [storedValue, setValue, removeValue] as const;\n}\n","\"use client\"\n\n/**\n * Base64 Encoding/Decoding Hook\n *\n * Provides base64 encoding/decoding with dev mode detection:\n * - In production: encodes data to base64\n * - In development: returns data as-is (no encoding)\n */\n\nimport { isDev } from '../utils/env';\n\n/**\n * Encode string to base64\n * @param data - String data to encode\n * @returns Base64 encoded string (or original in dev mode)\n */\nexport function encodeBase64(data: string): string {\n if (isDev) {\n return data;\n }\n\n try {\n // Browser-safe base64 encoding\n if (typeof window !== 'undefined') {\n return btoa(encodeURIComponent(data).replace(/%([0-9A-F]{2})/g, (_, p1) => {\n return String.fromCharCode(parseInt(p1, 16));\n }));\n }\n // Node.js fallback\n return Buffer.from(data, 'utf-8').toString('base64');\n } catch (error) {\n console.error('Base64 encoding error:', error);\n return data; // Return original on error\n }\n}\n\n/**\n * Decode base64 to string\n * @param encoded - Base64 encoded string\n * @returns Decoded string (or original in dev mode)\n */\nexport function decodeBase64(encoded: string): string {\n if (isDev) {\n return encoded;\n }\n\n try {\n // Browser-safe base64 decoding\n if (typeof window !== 'undefined') {\n const binary = atob(encoded);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return decodeURIComponent(\n Array.from(bytes)\n .map(byte => '%' + ('00' + byte.toString(16)).slice(-2))\n .join('')\n );\n }\n // Node.js fallback\n return Buffer.from(encoded, 'base64').toString('utf-8');\n } catch (error) {\n console.error('Base64 decoding error:', error);\n return encoded; // Return original on error\n }\n}\n\n/**\n * Hook for base64 encoding/decoding\n * @returns Object with encode and decode functions\n */\nexport function useBase64() {\n return {\n encode: encodeBase64,\n decode: decodeBase64,\n isDev,\n };\n}\n","\"use client\"\n\n/**\n * Profile Cache Hook\n *\n * Provides localStorage-based caching for user profile with:\n * - TTL (Time To Live) - default 1 hour\n * - Version control for migrations\n * - Automatic invalidation on expiry\n */\n\nimport type { User } from '../../';\nimport { authLogger as profileLogger } from '../utils/logger';\nimport { decodeBase64, encodeBase64 } from './useBase64';\n\n// Cache configuration\nconst CACHE_KEY = 'user_profile_cache';\nconst CACHE_VERSION = 1;\nconst DEFAULT_TTL = 14400000; // 4 hours in milliseconds (reduced API calls, more resilient)\n\nexport interface ProfileCacheOptions {\n /** Time to live in milliseconds (default: 1 hour) */\n ttl?: number;\n}\n\ninterface CachedProfile {\n version: number;\n data: User;\n timestamp: number;\n ttl: number;\n}\n\n/**\n * Get cached profile from localStorage\n * @returns User profile if valid cache exists, null otherwise\n */\nexport function getCachedProfile(): User | null {\n try {\n if (typeof window === 'undefined') return null;\n\n const cached = localStorage.getItem(CACHE_KEY);\n if (!cached) {\n profileLogger.debug('No cached profile found');\n return null;\n }\n\n // Decode from base64\n const decoded = decodeBase64(cached);\n const cachedData: CachedProfile = JSON.parse(decoded);\n\n // Version check\n if (cachedData.version !== CACHE_VERSION) {\n profileLogger.warn('Cache version mismatch, clearing cache');\n clearProfileCache();\n return null;\n }\n\n // TTL check\n const now = Date.now();\n const age = now - cachedData.timestamp;\n if (age > cachedData.ttl) {\n profileLogger.info('Cache expired, clearing');\n clearProfileCache();\n return null;\n }\n\n profileLogger.debug('Cache hit, age:', Math.round(age / 1000), 'seconds');\n return cachedData.data;\n } catch (error) {\n profileLogger.error('Error reading cache:', error);\n clearProfileCache();\n return null;\n }\n}\n\n/**\n * Save profile to localStorage cache\n * @param profile - User profile to cache\n * @param options - Cache options (TTL)\n */\nexport function setCachedProfile(profile: User, options?: ProfileCacheOptions): void {\n try {\n if (typeof window === 'undefined') return;\n\n const cachedData: CachedProfile = {\n version: CACHE_VERSION,\n data: profile,\n timestamp: Date.now(),\n ttl: options?.ttl || DEFAULT_TTL,\n };\n\n // Encode to base64\n const encoded = encodeBase64(JSON.stringify(cachedData));\n localStorage.setItem(CACHE_KEY, encoded);\n profileLogger.debug('Profile cached, TTL:', cachedData.ttl / 1000, 'seconds');\n } catch (error) {\n profileLogger.error('Error writing cache:', error);\n }\n}\n\n/**\n * Clear profile cache from localStorage\n */\nexport function clearProfileCache(): void {\n try {\n if (typeof window === 'undefined') return;\n localStorage.removeItem(CACHE_KEY);\n profileLogger.debug('Cache cleared');\n } catch (error) {\n profileLogger.error('Error clearing cache:', error);\n }\n}\n\n/**\n * Check if cached profile is valid (exists and not expired)\n */\nexport function hasValidCache(): boolean {\n return getCachedProfile() !== null;\n}\n\n/**\n * Get cache metadata (age, TTL, etc.)\n */\nexport function getCacheMetadata(): {\n exists: boolean;\n age?: number;\n ttl?: number;\n expiresIn?: number;\n} | null {\n try {\n if (typeof window === 'undefined') return null;\n\n const cached = localStorage.getItem(CACHE_KEY);\n if (!cached) return { exists: false };\n\n // Decode from base64\n const decoded = decodeBase64(cached);\n const cachedData: CachedProfile = JSON.parse(decoded);\n const now = Date.now();\n const age = now - cachedData.timestamp;\n const expiresIn = cachedData.ttl - age;\n\n return {\n exists: true,\n age,\n ttl: cachedData.ttl,\n expiresIn: Math.max(0, expiresIn),\n };\n } catch (error) {\n profileLogger.error('Error reading metadata:', error);\n return null;\n }\n}\n","'use client';\n\n/**\n * Token Refresh Hook\n *\n * Provides automatic token refresh functionality:\n * - Proactively refreshes token before expiry\n * - Refreshes on window focus\n * - Refreshes on network reconnect\n */\n\nimport { useCallback, useEffect, useRef } from 'react';\n\nimport { api as apiAccounts } from '../../';\nimport { CfgAccountsAuth } from '../../_api/generated/sdk.gen';\nimport { authLogger } from '../utils/logger';\n\n// Configuration\nconst TOKEN_REFRESH_THRESHOLD_MS = 10 * 60 * 1000; // 10 minutes before expiry\nconst CHECK_INTERVAL_MS = 5 * 60 * 1000; // Check every 5 minutes\n\ninterface UseTokenRefreshOptions {\n /** Enable automatic token refresh (default: true) */\n enabled?: boolean;\n /** Callback when token is refreshed */\n onRefresh?: (newToken: string) => void;\n /** Callback when refresh fails */\n onRefreshError?: (error: Error) => void;\n}\n\n/**\n * Decode JWT and get expiry time\n */\nfunction getTokenExpiry(token: string): number | null {\n try {\n const payload = JSON.parse(atob(token.split('.')[1]));\n return payload.exp * 1000; // Convert to milliseconds\n } catch {\n return null;\n }\n}\n\n/**\n * Check if token is expiring soon\n */\nfunction isTokenExpiringSoon(token: string, thresholdMs: number): boolean {\n const expiry = getTokenExpiry(token);\n if (!expiry) return false;\n\n const timeUntilExpiry = expiry - Date.now();\n return timeUntilExpiry < thresholdMs;\n}\n\n/**\n * Hook for automatic token refresh\n */\nexport function useTokenRefresh(options: UseTokenRefreshOptions = {}) {\n const { enabled = true, onRefresh, onRefreshError } = options;\n const isRefreshingRef = useRef(false);\n\n /**\n * Refresh the token\n */\n const refreshToken = useCallback(async (): Promise<boolean> => {\n if (isRefreshingRef.current) {\n authLogger.debug('Token refresh already in progress');\n return false;\n }\n\n const refreshTokenValue = apiAccounts.getRefreshToken();\n if (!refreshTokenValue) {\n authLogger.warn('No refresh token available');\n return false;\n }\n\n isRefreshingRef.current = true;\n authLogger.info('Refreshing token...');\n\n try {\n // Use generated API client with correct URL (/cfg/accounts/token/refresh/)\n const result = await CfgAccountsAuth.cfgAccountsTokenRefreshCreate({\n body: { refresh: refreshTokenValue },\n throwOnError: true,\n });\n\n const newAccessToken = result.data.access;\n\n if (!newAccessToken) {\n throw new Error('No access token in refresh response');\n }\n\n apiAccounts.setToken(newAccessToken);\n apiAccounts.setRefreshToken(refreshTokenValue);\n authLogger.info('Token refreshed successfully');\n\n onRefresh?.(newAccessToken);\n return true;\n } catch (error) {\n authLogger.error('Token refresh error:', error);\n onRefreshError?.(error instanceof Error ? error : new Error(String(error)));\n return false;\n } finally {\n isRefreshingRef.current = false;\n }\n }, [onRefresh, onRefreshError]);\n\n /**\n * Check and refresh if needed\n */\n const checkAndRefresh = useCallback(async () => {\n const token = apiAccounts.getToken();\n if (!token) return;\n\n if (isTokenExpiringSoon(token, TOKEN_REFRESH_THRESHOLD_MS)) {\n authLogger.info('Token expiring soon, refreshing proactively');\n await refreshToken();\n }\n }, [refreshToken]);\n\n // Periodic check\n useEffect(() => {\n if (!enabled) return;\n\n // Check immediately\n checkAndRefresh();\n\n // Set up interval\n const intervalId = setInterval(checkAndRefresh, CHECK_INTERVAL_MS);\n\n return () => clearInterval(intervalId);\n }, [enabled, checkAndRefresh]);\n\n // Refresh on window focus\n useEffect(() => {\n if (!enabled) return;\n\n const handleFocus = () => {\n authLogger.debug('Window focused, checking token...');\n checkAndRefresh();\n };\n\n window.addEventListener('focus', handleFocus);\n return () => window.removeEventListener('focus', handleFocus);\n }, [enabled, checkAndRefresh]);\n\n // Refresh on network reconnect\n useEffect(() => {\n if (!enabled) return;\n\n const handleOnline = () => {\n authLogger.info('Network reconnected, checking token...');\n checkAndRefresh();\n };\n\n window.addEventListener('online', handleOnline);\n return () => window.removeEventListener('online', handleOnline);\n }, [enabled, checkAndRefresh]);\n\n return {\n refreshToken,\n checkAndRefresh,\n };\n}\n\nexport default useTokenRefresh;\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiAccounts } from '../../clients';\nimport { CfgAccountsProfile } from '../../_api/generated/sdk.gen';\nimport { useAuth } from '../context';\nimport { authLogger } from '../utils/logger';\n\nexport interface DeleteAccountResult {\n success: boolean;\n message: string;\n}\n\nexport interface UseDeleteAccountReturn {\n /** Loading state */\n isLoading: boolean;\n /** Error message */\n error: string | null;\n /** Delete the account */\n deleteAccount: () => Promise<DeleteAccountResult>;\n /** Clear error */\n clearError: () => void;\n}\n\n/**\n * Hook for deleting user account.\n *\n * This performs a soft delete - deactivates the account and anonymizes personal data.\n * The account can be restored by an administrator if needed.\n *\n * @example\n * ```tsx\n * const { deleteAccount, isLoading, error } = useDeleteAccount();\n *\n * const handleDelete = async () => {\n * const result = await deleteAccount();\n * if (result.success) {\n * // Account deleted, perform logout\n * await logout();\n * }\n * };\n * ```\n */\nexport const useDeleteAccount = (): UseDeleteAccountReturn => {\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n const { logout } = useAuth();\n\n const clearError = useCallback(() => {\n setError(null);\n }, []);\n\n /**\n * Delete the user account (soft delete)\n */\n const deleteAccount = useCallback(async (): Promise<DeleteAccountResult> => {\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Deleting account...');\n\n const result = await CfgAccountsProfile.cfgAccountsProfileDeleteCreate({ throwOnError: true });\n const response = result.data;\n\n if (!response.success) {\n authLogger.error('Failed to delete account:', response.message);\n setError(response.message);\n throw new Error(response.message);\n }\n\n } catch (error) {\n authLogger.error('Failed to delete account:', error);\n throw error;\n } finally {\n setIsLoading(false);\n }\n\n // Return success response\n\n await logout();\n return { success: true, message: 'Account deleted successfully' };\n }, []);\n\n return {\n isLoading,\n error,\n deleteAccount,\n clearError,\n };\n};\n","/**\n * CfgAccounts Context\n *\n * Manages user authentication and profile operations using generated SWR hooks.\n *\n * Features:\n * - OTP-based authentication\n * - User profile management\n * - Avatar upload\n * - Profile updates\n * - localStorage cache with TTL (1 hour)\n */\n\n\"use client\";\n\nimport {\n createContext, memo, ReactNode, useCallback, useContext, useEffect, useMemo, useRef, useState\n} from 'react';\n\nimport { CfgAccountsApi } from '../../';\nimport { CfgAccountsProfile } from '../../_api/generated/_cfg_accounts/sdk.gen';\nimport {\n useCfgAccountsOtpRequestCreate,\n useCfgAccountsOtpVerifyCreate,\n useCfgAccountsProfileAvatarCreate,\n useCfgAccountsProfilePartialUpdate,\n useCfgAccountsProfileUpdateUpdate,\n useCfgAccountsTokenRefreshCreate,\n} from '../../_api/generated/_cfg_accounts/hooks';\nimport { PatchedCfgUserUpdateRequestSchema } from '../../_api/generated/_cfg_accounts/schemas';\nimport { clearProfileCache, getCachedProfile, setCachedProfile } from '../hooks/useProfileCache';\nimport { authLogger } from '../utils/logger';\n\nimport type {\n User,\n CfgUserUpdateRequest,\n PatchedCfgUserUpdateRequest,\n OtpRequestRequest,\n OtpVerifyRequest,\n OtpRequestResponse,\n OtpVerifyResponse,\n TokenRefresh,\n TokenRefreshRequest,\n} from '../../_api/generated/_cfg_accounts/types.gen';\n\nexport { PatchedCfgUserUpdateRequestSchema };\nexport type { PatchedCfgUserUpdateRequest, User, CfgUserUpdateRequest as UserProfileUpdateRequest };\n\n// ─────────────────────────────────────────────────────────────────────────\n// Context Type\n// ─────────────────────────────────────────────────────────────────────────\n\nexport interface AccountsContextValue {\n profile?: User;\n isLoadingProfile: boolean;\n profileError: Error | null;\n\n updateProfile: (data: CfgUserUpdateRequest) => Promise<User>;\n partialUpdateProfile: (data: PatchedCfgUserUpdateRequest) => Promise<User>;\n uploadAvatar: (avatar: File | Blob) => Promise<User>;\n refreshProfile: (options?: { callerId?: string; force?: boolean }) => Promise<User | undefined>;\n\n requestOTP: (data: OtpRequestRequest) => Promise<OtpRequestResponse>;\n verifyOTP: (data: OtpVerifyRequest) => Promise<OtpVerifyResponse>;\n refreshToken: (refresh: string) => Promise<TokenRefresh>;\n logout: () => void;\n}\n\nconst AccountsContext = createContext<AccountsContextValue | undefined>(undefined);\n\ninterface AccountsProviderProps {\n children: ReactNode;\n}\n\nexport function AccountsProvider({ children }: AccountsProviderProps) {\n const [profile, setProfile] = useState<User | undefined>(() => {\n const cached = getCachedProfile() as User | null;\n return cached || undefined;\n });\n const [isLoadingProfile, setIsLoadingProfile] = useState(false);\n const [profileError, setProfileError] = useState<Error | null>(null);\n\n const profileRef = useRef<User | undefined>(profile);\n const isLoadingRef = useRef(false);\n\n useEffect(() => {\n profileRef.current = profile;\n }, [profile]);\n\n useEffect(() => {\n isLoadingRef.current = isLoadingProfile;\n }, [isLoadingProfile]);\n\n const { trigger: triggerProfileUpdate } = useCfgAccountsProfileUpdateUpdate();\n const { trigger: triggerProfilePartialUpdate } = useCfgAccountsProfilePartialUpdate();\n const { trigger: triggerAvatar } = useCfgAccountsProfileAvatarCreate();\n const { trigger: triggerOtpRequest } = useCfgAccountsOtpRequestCreate();\n const { trigger: triggerOtpVerify } = useCfgAccountsOtpVerifyCreate();\n const { trigger: triggerTokenRefresh } = useCfgAccountsTokenRefreshCreate();\n\n const refreshProfile = useCallback(async (options?: { callerId?: string; force?: boolean }): Promise<User | undefined> => {\n const { callerId, force } = options || {};\n\n if (isLoadingRef.current) {\n authLogger.debug(`Profile loading in progress, skipping (caller: ${callerId})`);\n return profileRef.current;\n }\n\n setIsLoadingProfile(true);\n isLoadingRef.current = true;\n setProfileError(null);\n try {\n authLogger.debug(`Fetching profile from API (caller: ${callerId}, force: ${force})`);\n const res = await CfgAccountsProfile.cfgAccountsProfileRetrieve({ throwOnError: true });\n const result = res.data;\n setProfile(result);\n profileRef.current = result;\n setCachedProfile(result);\n return result;\n } catch (error) {\n const err = error instanceof Error ? error : new Error('Failed to fetch profile');\n setProfileError(err);\n throw err;\n } finally {\n setIsLoadingProfile(false);\n isLoadingRef.current = false;\n }\n }, []);\n\n const updateProfile = async (data: CfgUserUpdateRequest): Promise<User> => {\n await triggerProfileUpdate({ body: data });\n const user = await refreshProfile({ callerId: 'updateProfile', force: true });\n return user as User;\n };\n\n const partialUpdateProfile = async (data: PatchedCfgUserUpdateRequest): Promise<User> => {\n await triggerProfilePartialUpdate({ body: data });\n const user = await refreshProfile({ callerId: 'partialUpdateProfile', force: true });\n return user as User;\n };\n\n const uploadAvatar = async (avatar: File | Blob): Promise<User> => {\n await triggerAvatar({ body: { avatar } });\n const user = await refreshProfile({ callerId: 'uploadAvatar', force: true });\n return user as User;\n };\n\n const requestOTP = async (data: OtpRequestRequest): Promise<OtpRequestResponse> => {\n const result = await triggerOtpRequest({ body: data });\n return result as OtpRequestResponse;\n };\n\n const verifyOTP = async (data: OtpVerifyRequest): Promise<OtpVerifyResponse> => {\n const result = (await triggerOtpVerify({ body: data })) as OtpVerifyResponse;\n\n if (result.requires_2fa && result.session_id) {\n authLogger.info('2FA required, session:', result.session_id);\n return result;\n }\n\n if (result.access && result.refresh) {\n CfgAccountsApi.setToken(result.access);\n CfgAccountsApi.setRefreshToken(result.refresh);\n try {\n await refreshProfile({ callerId: 'verifyOTP', force: true });\n } catch (profileError) {\n authLogger.warn('Profile refresh failed after OTP verify (tokens are saved):', profileError);\n }\n }\n\n return result;\n };\n\n const refreshToken = async (refresh: string): Promise<TokenRefresh> => {\n const body: TokenRefreshRequest = { refresh };\n const result = (await triggerTokenRefresh({ body })) as TokenRefresh;\n\n if (result.access) {\n CfgAccountsApi.setToken(result.access);\n CfgAccountsApi.setRefreshToken(refresh);\n }\n\n return result;\n };\n\n const logout = useCallback(() => {\n CfgAccountsApi.clearToken();\n setProfile(undefined);\n setProfileError(null);\n clearProfileCache();\n }, []);\n\n const value: AccountsContextValue = useMemo(() => ({\n profile,\n isLoadingProfile,\n profileError,\n updateProfile,\n partialUpdateProfile,\n uploadAvatar,\n refreshProfile,\n requestOTP,\n verifyOTP,\n refreshToken,\n logout,\n }), [\n profile,\n isLoadingProfile,\n profileError,\n updateProfile,\n partialUpdateProfile,\n uploadAvatar,\n refreshProfile,\n requestOTP,\n verifyOTP,\n refreshToken,\n logout,\n ]);\n\n return (\n <AccountsContext.Provider value={value}>\n {children}\n </AccountsContext.Provider>\n );\n}\n\nexport function useAccountsContext(): AccountsContextValue {\n const context = useContext(AccountsContext);\n if (!context) {\n throw new Error('useAccountsContext must be used within AccountsProvider');\n }\n return context;\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Regenerate API key\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsApiKey } from \"../../sdk.gen\";\nimport type { CfgAccountsApiKeyRegenerateCreateData, CfgAccountsApiKeyRegenerateCreateResponses } from \"../../types.gen\";\nimport { APIKeyRegenerateSchema } from \"../schemas/APIKeyRegenerate\";\n\ntype Args = Omit<CfgAccountsApiKeyRegenerateCreateData, \"url\">;\ntype Result = CfgAccountsApiKeyRegenerateCreateResponses[keyof CfgAccountsApiKeyRegenerateCreateResponses];\n\nexport function useCfgAccountsApiKeyRegenerateCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_api_key_regenerate_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_api_key_regenerate_create\"], Args>(\n [\"cfg_accounts_api_key_regenerate_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsApiKey.cfgAccountsApiKeyRegenerateCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = APIKeyRegenerateSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_api_key_regenerate_create\",\n method: \"POST\",\n path: \"/cfg/accounts/api-key/regenerate/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_api_key_regenerate_create\",\n method: \"POST\",\n path: \"/cfg/accounts/api-key/regenerate/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeyRegenerateSchema = z.object({\n key: z.string(),\n reissued_at: z.string().datetime({ offset: true }),\n});\n\nexport type APIKeyRegenerate = z.infer<typeof APIKeyRegenerateSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Get API key details\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWR from \"swr\";\nimport type { SWRConfiguration } from \"swr\";\nimport { CfgAccountsApiKey } from \"../../sdk.gen\";\nimport type { CfgAccountsApiKeyRetrieveData, CfgAccountsApiKeyRetrieveResponses } from \"../../types.gen\";\nimport { APIKeySchema } from \"../schemas/APIKey\";\n\ntype Result = CfgAccountsApiKeyRetrieveResponses[keyof CfgAccountsApiKeyRetrieveResponses];\n\nexport function useCfgAccountsApiKeyRetrieve(\n args?: Omit<CfgAccountsApiKeyRetrieveData, \"url\" | \"body\">,\n config?: SWRConfiguration<Result>,\n) {\n const key = [\"cfg_accounts_api_key_retrieve\", args ?? {}] as const;\n return useSWR<Result>(\n key,\n async () => {\n const res = await CfgAccountsApiKey.cfgAccountsApiKeyRetrieve({ ...(args ?? {}), throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = APIKeySchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_api_key_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/api-key/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_api_key_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/api-key/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeySchema = z.object({\n key: z.string(),\n reissued_at: z.string().datetime({ offset: true }).nullable(),\n created_at: z.string().datetime({ offset: true }),\n});\n\nexport type APIKey = z.infer<typeof APIKeySchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Test API key\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsApiKey } from \"../../sdk.gen\";\nimport type { CfgAccountsApiKeyTestCreateData, CfgAccountsApiKeyTestCreateResponses } from \"../../types.gen\";\nimport { APIKeyTestResultSchema } from \"../schemas/APIKeyTestResult\";\n\ntype Args = Omit<CfgAccountsApiKeyTestCreateData, \"url\">;\ntype Result = CfgAccountsApiKeyTestCreateResponses[keyof CfgAccountsApiKeyTestCreateResponses];\n\nexport function useCfgAccountsApiKeyTestCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_api_key_test_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_api_key_test_create\"], Args>(\n [\"cfg_accounts_api_key_test_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsApiKey.cfgAccountsApiKeyTestCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = APIKeyTestResultSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_api_key_test_create\",\n method: \"POST\",\n path: \"/cfg/accounts/api-key/test/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_api_key_test_create\",\n method: \"POST\",\n path: \"/cfg/accounts/api-key/test/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeyTestResultSchema = z.object({\n valid: z.boolean(),\n user_id: z.string().nullable(),\n});\n\nexport type APIKeyTestResult = z.infer<typeof APIKeyTestResultSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// List OAuth connections\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWR from \"swr\";\nimport type { SWRConfiguration } from \"swr\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthConnectionsListData, CfgAccountsOauthConnectionsListResponses } from \"../../types.gen\";\nimport { cfg_accounts_oauth_connections_response_200_AutoRefSchema } from \"../schemas/cfg_accounts_oauth_connections_response_200_AutoRef\";\n\ntype Result = CfgAccountsOauthConnectionsListResponses[keyof CfgAccountsOauthConnectionsListResponses];\n\nexport function useCfgAccountsOauthConnectionsList(\n args?: Omit<CfgAccountsOauthConnectionsListData, \"url\" | \"body\">,\n config?: SWRConfiguration<Result>,\n) {\n const key = [\"cfg_accounts_oauth_connections_list\", args ?? {}] as const;\n return useSWR<Result>(\n key,\n async () => {\n const res = await CfgAccountsOauth.cfgAccountsOauthConnectionsList({ ...(args ?? {}), throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = cfg_accounts_oauth_connections_response_200_AutoRefSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_connections_list\",\n method: \"GET\",\n path: \"/cfg/accounts/oauth/connections/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_connections_list\",\n method: \"GET\",\n path: \"/cfg/accounts/oauth/connections/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { OAuthConnectionSchema } from \"./OAuthConnection\";\n\nexport const cfg_accounts_oauth_connections_response_200_AutoRefSchema = z.array(OAuthConnectionSchema);\n\nexport type cfg_accounts_oauth_connections_response_200_AutoRef = z.infer<typeof cfg_accounts_oauth_connections_response_200_AutoRefSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { OAuthProviderEnumSchema } from \"./OAuthProviderEnum\";\n\nexport const OAuthConnectionSchema = z.object({\n id: z.number().int(),\n provider: OAuthProviderEnumSchema,\n provider_display: z.string(),\n provider_username: z.string(),\n provider_email: z.email(),\n provider_avatar_url: z.string(),\n connected_at: z.string().datetime({ offset: true }),\n last_login_at: z.string().datetime({ offset: true }),\n});\n\nexport type OAuthConnection = z.infer<typeof OAuthConnectionSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthProviderEnumSchema = z.enum([\"github\"]);\n\nexport type OAuthProviderEnum = z.infer<typeof OAuthProviderEnumSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Disconnect OAuth provider\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthDisconnectCreateData, CfgAccountsOauthDisconnectCreateResponses } from \"../../types.gen\";\nimport { cfg_accounts_oauth_disconnect_response_200_AutoRefSchema } from \"../schemas/cfg_accounts_oauth_disconnect_response_200_AutoRef\";\n\ntype Args = Omit<CfgAccountsOauthDisconnectCreateData, \"url\">;\ntype Result = CfgAccountsOauthDisconnectCreateResponses[keyof CfgAccountsOauthDisconnectCreateResponses];\n\nexport function useCfgAccountsOauthDisconnectCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_oauth_disconnect_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_oauth_disconnect_create\"], Args>(\n [\"cfg_accounts_oauth_disconnect_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsOauth.cfgAccountsOauthDisconnectCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = cfg_accounts_oauth_disconnect_response_200_AutoRefSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_disconnect_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/disconnect/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_disconnect_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/disconnect/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const cfg_accounts_oauth_disconnect_response_200_AutoRefSchema = z.object({\n message: z.string().optional(),\n});\n\nexport type cfg_accounts_oauth_disconnect_response_200_AutoRef = z.infer<typeof cfg_accounts_oauth_disconnect_response_200_AutoRefSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Start GitHub OAuth\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthGithubAuthorizeCreateData, CfgAccountsOauthGithubAuthorizeCreateResponses } from \"../../types.gen\";\nimport { OAuthAuthorizeResponseSchema } from \"../schemas/OAuthAuthorizeResponse\";\n\ntype Args = Omit<CfgAccountsOauthGithubAuthorizeCreateData, \"url\">;\ntype Result = CfgAccountsOauthGithubAuthorizeCreateResponses[keyof CfgAccountsOauthGithubAuthorizeCreateResponses];\n\nexport function useCfgAccountsOauthGithubAuthorizeCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_oauth_github_authorize_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_oauth_github_authorize_create\"], Args>(\n [\"cfg_accounts_oauth_github_authorize_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsOauth.cfgAccountsOauthGithubAuthorizeCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OAuthAuthorizeResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_github_authorize_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/github/authorize/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_github_authorize_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/github/authorize/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthAuthorizeResponseSchema = z.object({\n authorization_url: z.string(),\n state: z.string(),\n});\n\nexport type OAuthAuthorizeResponse = z.infer<typeof OAuthAuthorizeResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Complete GitHub OAuth\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthGithubCallbackCreateData, CfgAccountsOauthGithubCallbackCreateResponses } from \"../../types.gen\";\nimport { OAuthTokenResponseSchema } from \"../schemas/OAuthTokenResponse\";\n\ntype Args = Omit<CfgAccountsOauthGithubCallbackCreateData, \"url\">;\ntype Result = CfgAccountsOauthGithubCallbackCreateResponses[keyof CfgAccountsOauthGithubCallbackCreateResponses];\n\nexport function useCfgAccountsOauthGithubCallbackCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_oauth_github_callback_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_oauth_github_callback_create\"], Args>(\n [\"cfg_accounts_oauth_github_callback_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsOauth.cfgAccountsOauthGithubCallbackCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OAuthTokenResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_github_callback_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/github/callback/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_github_callback_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/github/callback/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthTokenResponseSchema = z.object({\n requires_2fa: z.boolean().default(false).optional(),\n session_id: z.string().regex(/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i).nullable().optional(),\n access: z.string().nullable().optional(),\n refresh: z.string().nullable().optional(),\n user: z.object({}).passthrough().nullable().optional(),\n is_new_user: z.boolean(),\n is_new_connection: z.boolean(),\n should_prompt_2fa: z.boolean().optional(),\n});\n\nexport type OAuthTokenResponse = z.infer<typeof OAuthTokenResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// List OAuth providers\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWR from \"swr\";\nimport type { SWRConfiguration } from \"swr\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthProvidersRetrieveData, CfgAccountsOauthProvidersRetrieveResponses } from \"../../types.gen\";\nimport { OAuthProvidersResponseSchema } from \"../schemas/OAuthProvidersResponse\";\n\ntype Result = CfgAccountsOauthProvidersRetrieveResponses[keyof CfgAccountsOauthProvidersRetrieveResponses];\n\nexport function useCfgAccountsOauthProvidersRetrieve(\n args?: Omit<CfgAccountsOauthProvidersRetrieveData, \"url\" | \"body\">,\n config?: SWRConfiguration<Result>,\n) {\n const key = [\"cfg_accounts_oauth_providers_retrieve\", args ?? {}] as const;\n return useSWR<Result>(\n key,\n async () => {\n const res = await CfgAccountsOauth.cfgAccountsOauthProvidersRetrieve({ ...(args ?? {}), throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OAuthProvidersResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_providers_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/oauth/providers/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_providers_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/oauth/providers/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthProvidersResponseSchema = z.object({\n providers: z.array(z.object({}).passthrough()),\n});\n\nexport type OAuthProvidersResponse = z.infer<typeof OAuthProvidersResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// POST /cfg/accounts/otp/request/\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccounts } from \"../../sdk.gen\";\nimport type { CfgAccountsOtpRequestCreateData, CfgAccountsOtpRequestCreateResponses } from \"../../types.gen\";\nimport { OTPRequestResponseSchema } from \"../schemas/OTPRequestResponse\";\n\ntype Args = Omit<CfgAccountsOtpRequestCreateData, \"url\">;\ntype Result = CfgAccountsOtpRequestCreateResponses[keyof CfgAccountsOtpRequestCreateResponses];\n\nexport function useCfgAccountsOtpRequestCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_otp_request_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_otp_request_create\"], Args>(\n [\"cfg_accounts_otp_request_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccounts.cfgAccountsOtpRequestCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OTPRequestResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_otp_request_create\",\n method: \"POST\",\n path: \"/cfg/accounts/otp/request/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_otp_request_create\",\n method: \"POST\",\n path: \"/cfg/accounts/otp/request/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OTPRequestResponseSchema = z.object({\n message: z.string(),\n});\n\nexport type OTPRequestResponse = z.infer<typeof OTPRequestResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// POST /cfg/accounts/otp/verify/\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccounts } from \"../../sdk.gen\";\nimport type { CfgAccountsOtpVerifyCreateData, CfgAccountsOtpVerifyCreateResponses } from \"../../types.gen\";\nimport { OTPVerifyResponseSchema } from \"../schemas/OTPVerifyResponse\";\n\ntype Args = Omit<CfgAccountsOtpVerifyCreateData, \"url\">;\ntype Result = CfgAccountsOtpVerifyCreateResponses[keyof CfgAccountsOtpVerifyCreateResponses];\n\nexport function useCfgAccountsOtpVerifyCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_otp_verify_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_otp_verify_create\"], Args>(\n [\"cfg_accounts_otp_verify_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccounts.cfgAccountsOtpVerifyCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OTPVerifyResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_otp_verify_create\",\n method: \"POST\",\n path: \"/cfg/accounts/otp/verify/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_otp_verify_create\",\n method: \"POST\",\n path: \"/cfg/accounts/otp/verify/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { UserSchema } from \"./User\";\n\nexport const OTPVerifyResponseSchema = z.object({\n requires_2fa: z.boolean().default(false).optional(),\n session_id: z.string().regex(/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i).nullable().optional(),\n refresh: z.string().nullable().optional(),\n access: z.string().nullable().optional(),\n user: UserSchema.nullable().optional(),\n should_prompt_2fa: z.boolean().optional(),\n});\n\nexport type OTPVerifyResponse = z.infer<typeof OTPVerifyResponseSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { CentrifugoTokenSchema } from \"./CentrifugoToken\";\n\nexport const UserSchema = z.object({\n id: z.number().int(),\n email: z.email(),\n first_name: z.string().max(50).nullable().optional(),\n last_name: z.string().max(50).nullable().optional(),\n full_name: z.string(),\n initials: z.string(),\n display_username: z.string(),\n company: z.string().max(100).nullable().optional(),\n phone: z.string().max(20).nullable().optional(),\n position: z.string().max(100).nullable().optional(),\n language: z.string().max(10).nullable().optional(),\n timezone: z.string().max(64).nullable().optional(),\n avatar: z.string().nullable(),\n is_staff: z.boolean(),\n is_superuser: z.boolean(),\n date_joined: z.string().datetime({ offset: true }),\n last_login: z.string().datetime({ offset: true }).nullable(),\n unanswered_messages_count: z.number().int().default(0),\n centrifugo: CentrifugoTokenSchema.nullable(),\n api_key: z.string().nullable(),\n});\n\nexport type User = z.infer<typeof UserSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const CentrifugoTokenSchema = z.object({\n token: z.string(),\n centrifugo_url: z.string(),\n expires_at: z.string().datetime({ offset: true }),\n channels: z.array(z.string()),\n});\n\nexport type CentrifugoToken = z.infer<typeof CentrifugoTokenSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Upload user avatar\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileAvatarCreateData, CfgAccountsProfileAvatarCreateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfileAvatarCreateData, \"url\">;\ntype Result = CfgAccountsProfileAvatarCreateResponses[keyof CfgAccountsProfileAvatarCreateResponses];\n\nexport function useCfgAccountsProfileAvatarCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_avatar_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_avatar_create\"], Args>(\n [\"cfg_accounts_profile_avatar_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfileAvatarCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_avatar_create\",\n method: \"POST\",\n path: \"/cfg/accounts/profile/avatar/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_avatar_create\",\n method: \"POST\",\n path: \"/cfg/accounts/profile/avatar/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Delete user account\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileDeleteCreateData, CfgAccountsProfileDeleteCreateResponses } from \"../../types.gen\";\nimport { AccountDeleteResponseSchema } from \"../schemas/AccountDeleteResponse\";\n\ntype Args = Omit<CfgAccountsProfileDeleteCreateData, \"url\">;\ntype Result = CfgAccountsProfileDeleteCreateResponses[keyof CfgAccountsProfileDeleteCreateResponses];\n\nexport function useCfgAccountsProfileDeleteCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_delete_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_delete_create\"], Args>(\n [\"cfg_accounts_profile_delete_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfileDeleteCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = AccountDeleteResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_delete_create\",\n method: \"POST\",\n path: \"/cfg/accounts/profile/delete/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_delete_create\",\n method: \"POST\",\n path: \"/cfg/accounts/profile/delete/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const AccountDeleteResponseSchema = z.object({\n success: z.boolean(),\n message: z.string(),\n});\n\nexport type AccountDeleteResponse = z.infer<typeof AccountDeleteResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Partial update user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfilePartialPartialUpdateData, CfgAccountsProfilePartialPartialUpdateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfilePartialPartialUpdateData, \"url\">;\ntype Result = CfgAccountsProfilePartialPartialUpdateResponses[keyof CfgAccountsProfilePartialPartialUpdateResponses];\n\nexport function useCfgAccountsProfilePartialPartialUpdate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_partial_partial_update\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_partial_partial_update\"], Args>(\n [\"cfg_accounts_profile_partial_partial_update\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfilePartialPartialUpdate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_partial_partial_update\",\n method: \"PATCH\",\n path: \"/cfg/accounts/profile/partial/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_partial_partial_update\",\n method: \"PATCH\",\n path: \"/cfg/accounts/profile/partial/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Partial update user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfilePartialUpdateData, CfgAccountsProfilePartialUpdateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfilePartialUpdateData, \"url\">;\ntype Result = CfgAccountsProfilePartialUpdateResponses[keyof CfgAccountsProfilePartialUpdateResponses];\n\nexport function useCfgAccountsProfilePartialUpdate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_partial_update\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_partial_update\"], Args>(\n [\"cfg_accounts_profile_partial_update\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfilePartialUpdate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_partial_update\",\n method: \"PUT\",\n path: \"/cfg/accounts/profile/partial/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_partial_update\",\n method: \"PUT\",\n path: \"/cfg/accounts/profile/partial/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Get current user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWR from \"swr\";\nimport type { SWRConfiguration } from \"swr\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileRetrieveData, CfgAccountsProfileRetrieveResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Result = CfgAccountsProfileRetrieveResponses[keyof CfgAccountsProfileRetrieveResponses];\n\nexport function useCfgAccountsProfileRetrieve(\n args?: Omit<CfgAccountsProfileRetrieveData, \"url\" | \"body\">,\n config?: SWRConfiguration<Result>,\n) {\n const key = [\"cfg_accounts_profile_retrieve\", args ?? {}] as const;\n return useSWR<Result>(\n key,\n async () => {\n const res = await CfgAccountsProfile.cfgAccountsProfileRetrieve({ ...(args ?? {}), throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/profile/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/profile/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Update user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileUpdatePartialUpdateData, CfgAccountsProfileUpdatePartialUpdateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfileUpdatePartialUpdateData, \"url\">;\ntype Result = CfgAccountsProfileUpdatePartialUpdateResponses[keyof CfgAccountsProfileUpdatePartialUpdateResponses];\n\nexport function useCfgAccountsProfileUpdatePartialUpdate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_update_partial_update\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_update_partial_update\"], Args>(\n [\"cfg_accounts_profile_update_partial_update\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfileUpdatePartialUpdate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_update_partial_update\",\n method: \"PATCH\",\n path: \"/cfg/accounts/profile/update/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_update_partial_update\",\n method: \"PATCH\",\n path: \"/cfg/accounts/profile/update/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Update user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileUpdateUpdateData, CfgAccountsProfileUpdateUpdateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfileUpdateUpdateData, \"url\">;\ntype Result = CfgAccountsProfileUpdateUpdateResponses[keyof CfgAccountsProfileUpdateUpdateResponses];\n\nexport function useCfgAccountsProfileUpdateUpdate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_update_update\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_update_update\"], Args>(\n [\"cfg_accounts_profile_update_update\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfileUpdateUpdate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_update_update\",\n method: \"PUT\",\n path: \"/cfg/accounts/profile/update/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_update_update\",\n method: \"PUT\",\n path: \"/cfg/accounts/profile/update/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// POST /cfg/accounts/token/refresh/\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsAuth } from \"../../sdk.gen\";\nimport type { CfgAccountsTokenRefreshCreateData, CfgAccountsTokenRefreshCreateResponses } from \"../../types.gen\";\nimport { TokenRefreshSchema } from \"../schemas/TokenRefresh\";\n\ntype Args = Omit<CfgAccountsTokenRefreshCreateData, \"url\">;\ntype Result = CfgAccountsTokenRefreshCreateResponses[keyof CfgAccountsTokenRefreshCreateResponses];\n\nexport function useCfgAccountsTokenRefreshCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_token_refresh_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_token_refresh_create\"], Args>(\n [\"cfg_accounts_token_refresh_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsAuth.cfgAccountsTokenRefreshCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = TokenRefreshSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_token_refresh_create\",\n method: \"POST\",\n path: \"/cfg/accounts/token/refresh/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_token_refresh_create\",\n method: \"POST\",\n path: \"/cfg/accounts/token/refresh/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const TokenRefreshSchema = z.object({\n access: z.string(),\n refresh: z.string(),\n});\n\nexport type TokenRefresh = z.infer<typeof TokenRefreshSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeyRequestSchema = z.object({\n key: z.string().min(1),\n reissued_at: z.string().datetime({ offset: true }).nullable(),\n created_at: z.string().datetime({ offset: true }),\n});\n\nexport type APIKeyRequest = z.infer<typeof APIKeyRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeyTestRequestSchema = z.object({\n key: z.string().min(1),\n});\n\nexport type APIKeyTestRequest = z.infer<typeof APIKeyTestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const CfgUserUpdateRequestSchema = z.object({\n first_name: z.string().max(50).optional(),\n last_name: z.string().max(50).optional(),\n company: z.string().max(100).optional(),\n phone: z.string().max(20).optional(),\n position: z.string().max(100).optional(),\n language: z.string().max(10).optional(),\n timezone: z.string().max(64).optional(),\n});\n\nexport type CfgUserUpdateRequest = z.infer<typeof CfgUserUpdateRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthAuthorizeRequestRequestSchema = z.object({\n redirect_uri: z.string().optional(),\n source_url: z.string().optional(),\n});\n\nexport type OAuthAuthorizeRequestRequest = z.infer<typeof OAuthAuthorizeRequestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthCallbackRequestRequestSchema = z.object({\n code: z.string().min(10).max(500),\n state: z.string().min(20).max(100),\n redirect_uri: z.string().optional(),\n});\n\nexport type OAuthCallbackRequestRequest = z.infer<typeof OAuthCallbackRequestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { OAuthProviderEnumSchema } from \"./OAuthProviderEnum\";\n\nexport const OAuthDisconnectRequestRequestSchema = z.object({\n provider: OAuthProviderEnumSchema,\n});\n\nexport type OAuthDisconnectRequestRequest = z.infer<typeof OAuthDisconnectRequestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthErrorSchema = z.object({\n error: z.string(),\n error_description: z.string().optional(),\n});\n\nexport type OAuthError = z.infer<typeof OAuthErrorSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OTPErrorResponseSchema = z.object({\n error: z.string(),\n error_code: z.string().nullable().optional(),\n retry_after: z.number().int().nullable().optional(),\n});\n\nexport type OTPErrorResponse = z.infer<typeof OTPErrorResponseSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OTPRequestRequestSchema = z.object({\n identifier: z.string().min(1),\n source_url: z.string().optional(),\n});\n\nexport type OTPRequestRequest = z.infer<typeof OTPRequestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OTPVerifyRequestSchema = z.object({\n identifier: z.string().min(1),\n otp: z.string().min(4).max(4),\n source_url: z.string().optional(),\n});\n\nexport type OTPVerifyRequest = z.infer<typeof OTPVerifyRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const PatchedCfgUserUpdateRequestSchema = z.object({\n first_name: z.string().max(50).optional(),\n last_name: z.string().max(50).optional(),\n company: z.string().max(100).optional(),\n phone: z.string().max(20).optional(),\n position: z.string().max(100).optional(),\n language: z.string().max(10).optional(),\n timezone: z.string().max(64).optional(),\n});\n\nexport type PatchedCfgUserUpdateRequest = z.infer<typeof PatchedCfgUserUpdateRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const TokenRefreshRequestSchema = z.object({\n refresh: z.string().min(1),\n});\n\nexport type TokenRefreshRequest = z.infer<typeof TokenRefreshRequestSchema>;\n","/**\n * Email validation utility\n */\nexport const validateEmail = (email: string): boolean => {\n const emailRegex = /^[^\\s@]+@[^\\s@]+\\.[^\\s@]+$/;\n return emailRegex.test(email);\n};\n","/**\n * Format authentication error for display\n */\nexport const formatAuthError = (error: any): string => {\n if (typeof error === 'string') {\n return error;\n }\n\n if (error?.message) {\n return error.message;\n }\n\n if (error?.detail) {\n return error.detail;\n }\n\n if (error?.response?.data?.detail) {\n return error.response.data.detail;\n }\n\n return 'An unexpected error occurred';\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACKO,IAAM,iBAAiB;AAAA;AAAA,EAE5B,kBAAkB;AAAA;AAAA,EAElB,aAAa;AAAA;AAAA,EAEb,wBAAwB;AAC1B;;;ACZO,IAAM,QAAQ,yBAAyB;AAEvC,IAAM,YAAY,OAAO,WAAW;;;ACE3C,IAAAA,qBAA4B;AAC5B,IAAAC,iBAEO;AACP,IAAAC,cAA0B;;;ACS1B,wBAA2C;AAC3C,mBAAqC;AAKrC,SAAS,cAAsB;AAC7B,MAAI,OAAO,YAAY,aAAa;AAClC,WAAO;AAAA,EACT;AACA,SAAO,QAAQ,IAAI,yBAAyB;AAC9C;AALS;AAUT,SAAS,aAAa,MAAc,UAA0B;AAC5D,MAAI,CAAC,UAAU;AACb,WAAO;AAAA,EACT;AAEA,QAAM,iBAAiB,KAAK,WAAW,GAAG,IAAI,OAAO,IAAI,IAAI;AAE7D,QAAM,qBAAqB,SAAS,QAAQ,OAAO,EAAE;AACrD,SAAO,GAAG,kBAAkB,GAAG,cAAc;AAC/C;AATS;AA6BF,SAAS,eAAe;AAC7B,QAAM,aAAS,kBAAAC,WAAc;AAG7B,QAAM,eAAW,sBAAQ,MAAM,YAAY,GAAG,CAAC,CAAC;AAChD,QAAMC,qBAAgB,sBAAQ,MAAM;AAClC,WAAO,OAAO,YAAY,eAAe,QAAQ,IAAI,6BAA6B;AAAA,EACpF,GAAG,CAAC,CAAC;AAEL,QAAM,WAAO,0BAAY,CAAC,MAAc,YAAmC;AACzE,QAAI,UAAU;AAEZ,aAAO,SAAS,OAAO,aAAa,MAAM,QAAQ;AAAA,IACpD,OAAO;AAEL,aAAO,KAAK,MAAM,OAAO;AAAA,IAC3B;AAAA,EACF,GAAG,CAAC,QAAQ,QAAQ,CAAC;AAErB,QAAM,cAAU,0BAAY,CAAC,MAAc,YAAmC;AAC5E,QAAI,UAAU;AAEZ,aAAO,SAAS,QAAQ,aAAa,MAAM,QAAQ,CAAC;AAAA,IACtD,OAAO;AAEL,aAAO,QAAQ,MAAM,OAAO;AAAA,IAC9B;AAAA,EACF,GAAG,CAAC,QAAQ,QAAQ,CAAC;AAerB,QAAM,eAAW,0BAAY,CAAC,SAAiB;AAC7C,WAAO,SAAS,OAAO,aAAa,MAAM,QAAQ;AAAA,EACpD,GAAG,CAAC,QAAQ,CAAC;AAcb,QAAM,kBAAc,0BAAY,CAAC,SAAiB;AAChD,WAAO,SAAS,QAAQ,aAAa,MAAM,QAAQ,CAAC;AAAA,EACtD,GAAG,CAAC,QAAQ,CAAC;AAEb,QAAM,eAAW,0BAAY,CAAC,SAAiB;AAE7C,WAAO,SAAS,IAAI;AAAA,EACtB,GAAG,CAAC,MAAM,CAAC;AAEX,QAAM,WAAO,0BAAY,MAAM;AAC7B,WAAO,KAAK;AAAA,EACd,GAAG,CAAC,MAAM,CAAC;AAEX,QAAM,cAAU,0BAAY,MAAM;AAChC,WAAO,QAAQ;AAAA,EACjB,GAAG,CAAC,MAAM,CAAC;AAEX,QAAM,cAAU,0BAAY,MAAM;AAChC,WAAO,QAAQ;AAAA,EACjB,GAAG,CAAC,MAAM,CAAC;AAEX,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAzFgB;;;AC7ChB,IAAAC,qBAA4B;AAC5B,IAAAC,gBAA4C;AAerC,SAAS,iBAAkC;AAChD,QAAM,eAAW,gCAAY;AAC7B,QAAM,CAAC,aAAa,cAAc,QAAI,wBAA0B,MAAM;AACpE,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO,IAAI,gBAAgB;AAAA,IAC7B;AACA,WAAO,IAAI,gBAAgB,OAAO,SAAS,MAAM;AAAA,EACnD,CAAC;AACD,QAAM,oBAAgB,sBAAe,EAAE;AAEvC,+BAAU,MAAM;AACd,QAAI,OAAO,WAAW,YAAa;AAEnC,UAAM,oBAAoB,6BAAM;AAC9B,YAAM,gBAAgB,OAAO,SAAS;AACtC,UAAI,kBAAkB,cAAc,SAAS;AAC3C,sBAAc,UAAU;AACxB,uBAAe,IAAI,gBAAgB,aAAa,CAAC;AAAA,MACnD;AAAA,IACF,GAN0B;AAS1B,sBAAkB;AAGlB,WAAO,iBAAiB,YAAY,iBAAiB;AAIrD,UAAM,aAAa,YAAY,mBAAmB,GAAG;AAErD,WAAO,MAAM;AACX,aAAO,oBAAoB,YAAY,iBAAiB;AACxD,oBAAc,UAAU;AAAA,IAC1B;AAAA,EACF,GAAG,CAAC,QAAQ,CAAC;AAEb,SAAO;AACT;AAtCgB;;;AC/BhB,IAAAC,gBAAyD;AAIzD,IAAM,kBAAkB,wBAAC,MAAsB;AAC7C,MAAI,KAAK,EAAG,QAAO;AACnB,QAAM,IAAI,KAAK,MAAM,IAAI,EAAE;AAC3B,SAAO,IAAI,IAAI,GAAG,CAAC,IAAI,OAAO,IAAI,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,KAAK,GAAG,CAAC;AACjE,GAJwB;AAYjB,IAAM,mBAAmB,wBAC9B,oBAAoB,OACO;AAC3B,QAAM,CAAC,YAAY,aAAa,QAAI,wBAAS,iBAAiB;AAC9D,QAAM,CAAC,KAAK,MAAM,QAAI,wBAAS,EAAE;AACjC,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAS,KAAK;AAChD,QAAM,CAAC,eAAe,gBAAgB,QAAI,wBAAS,IAAI;AACvD,QAAM,CAAC,MAAM,OAAO,QAAI,wBAAmB,YAAY;AACvD,QAAM,CAAC,OAAO,QAAQ,QAAI,wBAAS,EAAE;AAGrC,QAAM,CAAC,oBAAoB,qBAAqB,QAAI,wBAAwB,IAAI;AAChF,QAAM,CAAC,iBAAiB,kBAAkB,QAAI,wBAAS,KAAK;AAC5D,QAAM,CAAC,eAAe,gBAAgB,QAAI,wBAAS,EAAE;AACrD,QAAM,CAAC,eAAe,gBAAgB,QAAI,wBAAS,KAAK;AAGxD,QAAM,CAAC,kBAAkB,mBAAmB,QAAI,wBAAS,CAAC;AAC1D,QAAM,wBAAoB,sBAA8C,IAAI;AAE5E,QAAM,8BAA0B,2BAAY,CAAC,YAAoB;AAC/D,QAAI,kBAAkB,QAAS,eAAc,kBAAkB,OAAO;AACtE,wBAAoB,OAAO;AAC3B,sBAAkB,UAAU,YAAY,MAAM;AAC5C,0BAAoB,CAAC,SAAS;AAC5B,YAAI,QAAQ,GAAG;AACb,wBAAc,kBAAkB,OAAQ;AACxC,4BAAkB,UAAU;AAC5B,iBAAO;AAAA,QACT;AACA,eAAO,OAAO;AAAA,MAChB,CAAC;AAAA,IACH,GAAG,GAAI;AAAA,EACT,GAAG,CAAC,CAAC;AAEL,+BAAU,MAAM,MAAM;AACpB,QAAI,kBAAkB,QAAS,eAAc,kBAAkB,OAAO;AAAA,EACxE,GAAG,CAAC,CAAC;AAEL,QAAM,iBAAa,2BAAY,MAAM,SAAS,EAAE,GAAG,CAAC,CAAC;AAErD,SAAO;AAAA;AAAA,IAEL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA,eAAe,mBAAmB;AAAA,IAClC,gBAAgB,gBAAgB,gBAAgB;AAAA;AAAA,IAEhD;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAtEgC;;;AChBhC,IAAAC,gBAA4B;AAI5B,IAAM,cAAc;AAEb,IAAM,oBAAoB,6BAA0B;AACzD,QAAMC,0BAAqB,2BAAY,CAAC,OAAwB;AAC9D,WAAO,YAAY,KAAK,EAAE;AAAA,EAC5B,GAAG,CAAC,CAAC;AAEL,SAAO,EAAE,oBAAAA,oBAAmB;AAC9B,GANiC;AAQ1B,IAAM,qBAAqB,wBAAC,OAAwB,YAAY,KAAK,EAAE,GAA5C;;;ACdlC,IAAAC,gBAA+C;;;ACF/C,qBAA8B;AAe9B,IAAM,gBAAgB,QAAQ,IAAI,6BAA6B;AAC/D,IAAM,WAAW,SAAiB;AAE3B,IAAM,aAAS,8BAAc;AAAA,EAClC,OAAO,WAAW,IAAI;AAAA;AACxB,CAAC,EAAE,QAAQ,KAAK;AAKT,IAAM,aAAa,OAAO,QAAQ,MAAM;;;ACvB/C,IAAAC,qBAA4B;AAC5B,IAAAC,gBAA0B;AAkBnB,IAAM,cAAc,wBAAC,UAA8B,CAAC,MAAM;AAC/D,QAAM,EAAE,eAAe,aAAa,MAAM,eAAe,CAAC,OAAO,EAAE,IAAI;AACvE,QAAM,cAAc,eAAe;AACnC,QAAM,eAAW,gCAAY;AAC7B,QAAM,SAAS,aAAa;AAG5B,QAAM,gBAAgB,aAAa,KAAK,UAAQ,aAAa,QAAQ,UAAU,WAAW,OAAO,GAAG,CAAC;AAErG,QAAM,SAAS,CAAC,CAAE,YAAY,IAAI,KAAK;AACvC,QAAM,UAAU,CAAC,CAAC,YAAY,UAAU;AAExC,+BAAU,MAAM;AACd,QAAI,CAAC,QAAS;AAEd,UAAM,WAAW,YAAY,IAAI,KAAK;AAItC,QAAI,YAAY,OAAO,aAAa,YAAY,SAAS,WAAW,eAAe,kBAAkB;AACnG,iBAAW,KAAK,qCAAqC,QAAQ;AAC7D,sBAAgB,QAAQ;AAAA,IAC1B;AAOA,QAAI,cAAc,UAAU;AAC1B,YAAM,aAAa,OAAO,YAAY,YAAY,QAAQ,CAAC;AAC3D,aAAO,WAAW;AAClB,YAAM,cAAc,IAAI,gBAAgB,UAAU,EAAE,SAAS;AAC7D,YAAM,eAAe,OAAO,WAAW,cAAc,OAAO,SAAS,WAAW;AAChF,aAAO,QAAQ,cAAc,GAAG,YAAY,IAAI,WAAW,KAAK,YAAY;AAAA,IAC9E;AAAA,EACF,GAAG,CAAC,UAAU,aAAa,eAAe,YAAY,QAAQ,OAAO,CAAC;AAEtE,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GA3C2B;;;ACnB3B,IAAAC,gBAAsC;;;ACK/B,IAAM,WAAN,cAAuB,MAAM;AAAA,EAClC,YACS,YACA,YACA,UACA,KACP,SACA;AACA,UAAM,WAAW,QAAQ,UAAU,KAAK,UAAU,EAAE;AAN7C;AACA;AACA;AACA;AAIP,SAAK,OAAO;AAAA,EACd;AAAA,EAjBF,OAOoC;AAAA;AAAA;AAAA,EAYlC,IAAI,UAAsC;AACxC,QAAI,OAAO,KAAK,aAAa,YAAY,KAAK,aAAa,MAAM;AAC/D,aAAO,KAAK;AAAA,IACd;AACA,WAAO;AAAA,EACT;AAAA,EAEA,IAAI,cAA+C;AACjD,UAAM,UAAU,KAAK;AACrB,QAAI,CAAC,QAAS,QAAO;AACrB,UAAM,cAAwC,CAAC;AAC/C,eAAW,CAAC,KAAK,KAAK,KAAK,OAAO,QAAQ,OAAO,GAAG;AAClD,UAAI,MAAM,QAAQ,KAAK,EAAG,aAAY,GAAG,IAAI;AAAA,IAC/C;AACA,WAAO,OAAO,KAAK,WAAW,EAAE,SAAS,IAAI,cAAc;AAAA,EAC7D;AAAA,EAEA,IAAI,eAAuB;AACzB,UAAM,UAAU,KAAK;AACrB,QAAI,CAAC,QAAS,QAAO,KAAK;AAC1B,QAAI,QAAQ,QAAQ;AAClB,aAAO,MAAM,QAAQ,QAAQ,MAAM,IAAI,QAAQ,OAAO,KAAK,IAAI,IAAI,OAAO,QAAQ,MAAM;AAAA,IAC1F;AACA,QAAI,QAAQ,MAAO,QAAO,OAAO,QAAQ,KAAK;AAC9C,QAAI,QAAQ,QAAS,QAAO,OAAO,QAAQ,OAAO;AAClD,UAAM,cAAc,KAAK;AACzB,QAAI,aAAa;AACf,YAAM,aAAa,OAAO,KAAK,WAAW,EAAE,CAAC;AAC7C,UAAI,WAAY,QAAO,GAAG,UAAU,KAAK,YAAY,UAAU,GAAG,KAAK,IAAI,CAAC;AAAA,IAC9E;AACA,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,IAAI,oBAA6B;AAAE,WAAO,KAAK,eAAe;AAAA,EAAK;AAAA,EACnE,IAAI,cAAuB;AAAE,WAAO,KAAK,eAAe;AAAA,EAAK;AAAA,EAC7D,IAAI,oBAA6B;AAAE,WAAO,KAAK,eAAe;AAAA,EAAK;AAAA,EACnE,IAAI,kBAA2B;AAAE,WAAO,KAAK,eAAe;AAAA,EAAK;AAAA,EACjE,IAAI,gBAAyB;AAAE,WAAO,KAAK,cAAc,OAAO,KAAK,aAAa;AAAA,EAAK;AACzF;;;ACjDA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAMC,aAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAACA,WAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAACA,WAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAACA,WAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAACA,WAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAkBT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAiBT,SAAS,gBAA+B;AACtC,MAAIA,WAAW,QAAO;AACtB,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAS7D,IAAI,kBAAyC;AAG7C,IAAI,mBAAkD;AAGtD,IAAM,eAAe;AAiBrB,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAWA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,kBAAkB,IAAiC;AACjD,sBAAkB;AAAA,EACpB;AACF;AAOA,eAAe,aAAqC;AAClD,MAAI,iBAAkB,QAAO;AAC7B,MAAI,CAAC,gBAAiB,QAAO;AAC7B,QAAM,UAAU,KAAK,gBAAgB;AACrC,MAAI,CAAC,QAAS,QAAO;AAErB,sBAAoB,YAAY;AAC9B,QAAI;AACF,YAAM,SAAS,MAAM,gBAAiB,OAAO;AAC7C,UAAI,CAAC,QAAQ,OAAQ,QAAO;AAC5B,WAAK,SAAS,OAAO,MAAM;AAC3B,UAAI,OAAO,QAAS,MAAK,gBAAgB,OAAO,OAAO;AACvD,aAAO,OAAO;AAAA,IAChB,QAAQ;AACN,aAAO;AAAA,IACT,UAAE;AACA,yBAAmB;AAAA,IACrB;AAAA,EACF,GAAG;AAEH,SAAO;AACT;AArBe;AAiCR,SAAS,oBAAoBC,SAAyB;AAC3D,MAAI,QAAS;AACb,YAAUA;AAEV,EAAAA,QAAO,UAAU;AAAA,IACf,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AAED,EAAAA,QAAO,aAAa,QAAQ,IAAI,CAAC,YAAY;AAC3C,UAAM,QAAQ,KAAK,SAAS;AAC5B,QAAI,MAAO,SAAQ,QAAQ,IAAI,iBAAiB,UAAU,KAAK,EAAE;AAEjE,UAAM,SAAS,KAAK,UAAU;AAC9B,QAAI,OAAQ,SAAQ,QAAQ,IAAI,mBAAmB,MAAM;AAEzD,UAAM,SAAS,KAAK,UAAU;AAC9B,QAAI,OAAQ,SAAQ,QAAQ,IAAI,aAAa,MAAM;AAEnD,QAAI;AACF,YAAM,KAAK,KAAK,eAAe,EAAE,gBAAgB,EAAE;AACnD,UAAI,GAAI,SAAQ,QAAQ,IAAI,cAAc,EAAE;AAAA,IAC9C,QAAQ;AAAA,IAAC;AACT,YAAQ,QAAQ,IAAI,kBAAiB,oBAAI,KAAK,GAAE,YAAY,CAAC;AAE7D,WAAO;AAAA,EACT,CAAC;AAKD,EAAAA,QAAO,aAAa,MAAM,IAAI,CAAC,KAAK,KAAK,QAAQ;AAC/C,QAAI,eAAe,SAAU,QAAO;AACpC,UAAM,MAAO,KAA6B,OAAO;AACjD,UAAM,SAAU,KAA8B,UAAU;AACxD,UAAM,aAAc,KAA8B,cAAc;AAChE,WAAO,IAAI,SAAS,QAAQ,YAAY,KAAK,GAAG;AAAA,EAClD,CAAC;AAED,EAAAA,QAAO,aAAa,SAAS,IAAI,OAAO,UAAU,YAAY;AAC5D,QAAI,SAAS,WAAW,IAAK,QAAO;AAGpC,QAAI,QAAQ,QAAQ,IAAI,YAAY,GAAG;AACrC,UAAI,iBAAiB;AACnB,YAAI;AAAE,0BAAgB,QAAQ;AAAA,QAAG,QAAQ;AAAA,QAAC;AAAA,MAC5C;AACA,aAAO;AAAA,IACT;AAEA,UAAM,WAAW,MAAM,WAAW;AAClC,QAAI,CAAC,UAAU;AACb,UAAI,iBAAiB;AACnB,YAAI;AAAE,0BAAgB,QAAQ;AAAA,QAAG,QAAQ;AAAA,QAAC;AAAA,MAC5C;AACA,aAAO;AAAA,IACT;AAKA,UAAM,QAAQ,QAAQ,MAAM;AAC5B,UAAM,QAAQ,IAAI,iBAAiB,UAAU,QAAQ,EAAE;AACvD,UAAM,QAAQ,IAAI,cAAc,GAAG;AACnC,QAAI;AACF,YAAM,UAAU,MAAM,MAAM,KAAK;AACjC,UAAI,QAAQ,WAAW,OAAO,iBAAiB;AAC7C,YAAI;AAAE,0BAAgB,OAAO;AAAA,QAAG,QAAQ;AAAA,QAAC;AAAA,MAC3C;AACA,aAAO;AAAA,IACT,QAAQ;AAEN,UAAI,iBAAiB;AACnB,YAAI;AAAE,0BAAgB,QAAQ;AAAA,QAAG,QAAQ;AAAA,QAAC;AAAA,MAC5C;AACA,aAAO;AAAA,IACT;AAAA,EACF,CAAC;AACH;AA9EgB;;;AC5RhB,IAAAC,kBAAoD;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,eAAW,+BAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACpG3C,IAAM,wBAAwB,wBAAC,MAAgB,KAAa,UAAyB;AACnF,MAAI,OAAO,UAAU,YAAY,iBAAiB,MAAM;AACtD,SAAK,OAAO,KAAK,KAAK;AAAA,EACxB,WAAW,iBAAiB,MAAM;AAChC,SAAK,OAAO,KAAK,MAAM,YAAY,CAAC;AAAA,EACtC,OAAO;AACL,SAAK,OAAO,KAAK,KAAK,UAAU,KAAK,CAAC;AAAA,EACxC;AACF,GAR8B;AAkBvB,IAAM,yBAAyB;AAAA,EACpC,gBAAgB,wBAAC,SAA4B;AAC3C,UAAM,OAAO,IAAI,SAAS;AAE1B,WAAO,QAAQ,IAA+B,EAAE,QAAQ,CAAC,CAAC,KAAK,KAAK,MAAM;AACxE,UAAI,UAAU,UAAa,UAAU,MAAM;AACzC;AAAA,MACF;AACA,UAAI,MAAM,QAAQ,KAAK,GAAG;AACxB,cAAM,QAAQ,CAAC,MAAM,sBAAsB,MAAM,KAAK,CAAC,CAAC;AAAA,MAC1D,OAAO;AACL,8BAAsB,MAAM,KAAK,KAAK;AAAA,MACxC;AAAA,IACF,CAAC;AAED,WAAO;AAAA,EACT,GAfgB;AAgBlB;AAEO,IAAM,qBAAqB;AAAA,EAChC,gBAAgB,wBAAC,SACf,KAAK,UAAU,MAAM,CAAC,MAAM,UAAW,OAAO,UAAU,WAAW,MAAM,SAAS,IAAI,KAAM,GAD9E;AAElB;;;AClBA,IAAM,mBAAyC;AAAA,EAC7C,QAAQ;AAAA,EACR,WAAW;AAAA,EACX,QAAQ;AAAA,EACR,SAAS;AACX;AACA,IAAM,gBAAgB,OAAO,QAAQ,gBAAgB;;;AC+B9C,SAAS,gBAAiC;AAAA,EAC/C;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA,GAAG;AACL,GAA2D;AACzD,MAAI;AAEJ,QAAM,QAAQ,eAAe,CAAC,OAAe,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,EAAE,CAAC;AAE7F,QAAM,eAAe,0CAAmB;AACtC,QAAI,aAAqB,wBAAwB;AACjD,QAAI,UAAU;AACd,UAAM,SAAS,QAAQ,UAAU,IAAI,gBAAgB,EAAE;AAEvD,WAAO,MAAM;AACX,UAAI,OAAO,QAAS;AAEpB;AAEA,YAAM,UACJ,QAAQ,mBAAmB,UACvB,QAAQ,UACR,IAAI,QAAQ,QAAQ,OAA6C;AAEvE,UAAI,gBAAgB,QAAW;AAC7B,gBAAQ,IAAI,iBAAiB,WAAW;AAAA,MAC1C;AAEA,UAAI;AACF,cAAM,cAA2B;AAAA,UAC/B,UAAU;AAAA,UACV,GAAG;AAAA,UACH,MAAM,QAAQ;AAAA,UACd;AAAA,UACA;AAAA,QACF;AACA,YAAI,UAAU,IAAI,QAAQ,KAAK,WAAW;AAC1C,YAAI,WAAW;AACb,oBAAU,MAAM,UAAU,KAAK,WAAW;AAAA,QAC5C;AAGA,cAAM,SAAS,QAAQ,SAAS,WAAW;AAC3C,cAAM,WAAW,MAAM,OAAO,OAAO;AAErC,YAAI,CAAC,SAAS,GAAI,OAAM,IAAI,MAAM,eAAe,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAEzF,YAAI,CAAC,SAAS,KAAM,OAAM,IAAI,MAAM,yBAAyB;AAE7D,cAAM,SAAS,SAAS,KAAK,YAAY,IAAI,kBAAkB,CAAC,EAAE,UAAU;AAE5E,YAAI,SAAS;AAEb,cAAM,eAAe,6BAAM;AACzB,cAAI;AACF,mBAAO,OAAO;AAAA,UAChB,QAAQ;AAAA,UAER;AAAA,QACF,GANqB;AAQrB,eAAO,iBAAiB,SAAS,YAAY;AAE7C,YAAI;AACF,iBAAO,MAAM;AACX,kBAAM,EAAE,MAAM,MAAM,IAAI,MAAM,OAAO,KAAK;AAC1C,gBAAI,KAAM;AACV,sBAAU;AACV,qBAAS,OAAO,QAAQ,UAAU,IAAI;AAEtC,kBAAM,SAAS,OAAO,MAAM,MAAM;AAClC,qBAAS,OAAO,IAAI,KAAK;AAEzB,uBAAW,SAAS,QAAQ;AAC1B,oBAAM,QAAQ,MAAM,MAAM,IAAI;AAC9B,oBAAM,YAA2B,CAAC;AAClC,kBAAI;AAEJ,yBAAW,QAAQ,OAAO;AACxB,oBAAI,KAAK,WAAW,OAAO,GAAG;AAC5B,4BAAU,KAAK,KAAK,QAAQ,aAAa,EAAE,CAAC;AAAA,gBAC9C,WAAW,KAAK,WAAW,QAAQ,GAAG;AACpC,8BAAY,KAAK,QAAQ,cAAc,EAAE;AAAA,gBAC3C,WAAW,KAAK,WAAW,KAAK,GAAG;AACjC,gCAAc,KAAK,QAAQ,WAAW,EAAE;AAAA,gBAC1C,WAAW,KAAK,WAAW,QAAQ,GAAG;AACpC,wBAAM,SAAS,OAAO,SAAS,KAAK,QAAQ,cAAc,EAAE,GAAG,EAAE;AACjE,sBAAI,CAAC,OAAO,MAAM,MAAM,GAAG;AACzB,iCAAa;AAAA,kBACf;AAAA,gBACF;AAAA,cACF;AAEA,kBAAI;AACJ,kBAAI,aAAa;AAEjB,kBAAI,UAAU,QAAQ;AACpB,sBAAM,UAAU,UAAU,KAAK,IAAI;AACnC,oBAAI;AACF,yBAAO,KAAK,MAAM,OAAO;AACzB,+BAAa;AAAA,gBACf,QAAQ;AACN,yBAAO;AAAA,gBACT;AAAA,cACF;AAEA,kBAAI,YAAY;AACd,oBAAI,mBAAmB;AACrB,wBAAM,kBAAkB,IAAI;AAAA,gBAC9B;AAEA,oBAAI,qBAAqB;AACvB,yBAAO,MAAM,oBAAoB,IAAI;AAAA,gBACvC;AAAA,cACF;AAEA,2BAAa;AAAA,gBACX;AAAA,gBACA,OAAO;AAAA,gBACP,IAAI;AAAA,gBACJ,OAAO;AAAA,cACT,CAAC;AAED,kBAAI,UAAU,QAAQ;AACpB,sBAAM;AAAA,cACR;AAAA,YACF;AAAA,UACF;AAAA,QACF,UAAE;AACA,iBAAO,oBAAoB,SAAS,YAAY;AAChD,iBAAO,YAAY;AAAA,QACrB;AAEA;AAAA,MACF,SAAS,OAAO;AAEd,qBAAa,KAAK;AAElB,YAAI,wBAAwB,UAAa,WAAW,qBAAqB;AACvE;AAAA,QACF;AAGA,cAAM,UAAU,KAAK,IAAI,aAAa,MAAM,UAAU,IAAI,oBAAoB,GAAK;AACnF,cAAM,MAAM,OAAO;AAAA,MACrB;AAAA,IACF;AAAA,EACF,GA1IqB;AA4IrB,QAAM,SAAS,aAAa;AAE5B,SAAO,EAAE,OAAO;AAClB;AAhKgB;;;ACtDT,IAAM,wBAAwB,wBAAC,UAA+B;AACnE,UAAQ,OAAO;AAAA,IACb,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT;AACE,aAAO;AAAA,EACX;AACF,GAXqC;AAa9B,IAAM,0BAA0B,wBAAC,UAA+B;AACrE,UAAQ,OAAO;AAAA,IACb,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT;AACE,aAAO;AAAA,EACX;AACF,GAXuC;AAahC,IAAM,yBAAyB,wBAAC,UAAgC;AACrE,UAAQ,OAAO;AAAA,IACb,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT;AACE,aAAO;AAAA,EACX;AACF,GAXsC;AAa/B,IAAM,sBAAsB,wBAAC;AAAA,EAClC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,MAEM;AACJ,MAAI,CAAC,SAAS;AACZ,UAAMC,iBACJ,gBAAgB,QAAQ,MAAM,IAAI,CAAC,MAAM,mBAAmB,CAAW,CAAC,GACxE,KAAK,wBAAwB,KAAK,CAAC;AACrC,YAAQ,OAAO;AAAA,MACb,KAAK;AACH,eAAO,IAAIA,aAAY;AAAA,MACzB,KAAK;AACH,eAAO,IAAI,IAAI,IAAIA,aAAY;AAAA,MACjC,KAAK;AACH,eAAOA;AAAA,MACT;AACE,eAAO,GAAG,IAAI,IAAIA,aAAY;AAAA,IAClC;AAAA,EACF;AAEA,QAAM,YAAY,sBAAsB,KAAK;AAC7C,QAAM,eAAe,MAClB,IAAI,CAAC,MAAM;AACV,QAAI,UAAU,WAAW,UAAU,UAAU;AAC3C,aAAO,gBAAgB,IAAI,mBAAmB,CAAW;AAAA,IAC3D;AAEA,WAAO,wBAAwB;AAAA,MAC7B;AAAA,MACA;AAAA,MACA,OAAO;AAAA,IACT,CAAC;AAAA,EACH,CAAC,EACA,KAAK,SAAS;AACjB,SAAO,UAAU,WAAW,UAAU,WAAW,YAAY,eAAe;AAC9E,GAxCmC;AA0C5B,IAAM,0BAA0B,wBAAC;AAAA,EACtC;AAAA,EACA;AAAA,EACA;AACF,MAA+B;AAC7B,MAAI,UAAU,UAAa,UAAU,MAAM;AACzC,WAAO;AAAA,EACT;AAEA,MAAI,OAAO,UAAU,UAAU;AAC7B,UAAM,IAAI;AAAA,MACR;AAAA,IACF;AAAA,EACF;AAEA,SAAO,GAAG,IAAI,IAAI,gBAAgB,QAAQ,mBAAmB,KAAK,CAAC;AACrE,GAhBuC;AAkBhC,IAAM,uBAAuB,wBAAC;AAAA,EACnC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,MAGM;AACJ,MAAI,iBAAiB,MAAM;AACzB,WAAO,YAAY,MAAM,YAAY,IAAI,GAAG,IAAI,IAAI,MAAM,YAAY,CAAC;AAAA,EACzE;AAEA,MAAI,UAAU,gBAAgB,CAAC,SAAS;AACtC,QAAI,SAAmB,CAAC;AACxB,WAAO,QAAQ,KAAK,EAAE,QAAQ,CAAC,CAAC,KAAK,CAAC,MAAM;AAC1C,eAAS,CAAC,GAAG,QAAQ,KAAK,gBAAiB,IAAe,mBAAmB,CAAW,CAAC;AAAA,IAC3F,CAAC;AACD,UAAMA,gBAAe,OAAO,KAAK,GAAG;AACpC,YAAQ,OAAO;AAAA,MACb,KAAK;AACH,eAAO,GAAG,IAAI,IAAIA,aAAY;AAAA,MAChC,KAAK;AACH,eAAO,IAAIA,aAAY;AAAA,MACzB,KAAK;AACH,eAAO,IAAI,IAAI,IAAIA,aAAY;AAAA,MACjC;AACE,eAAOA;AAAA,IACX;AAAA,EACF;AAEA,QAAM,YAAY,uBAAuB,KAAK;AAC9C,QAAM,eAAe,OAAO,QAAQ,KAAK,EACtC;AAAA,IAAI,CAAC,CAAC,KAAK,CAAC,MACX,wBAAwB;AAAA,MACtB;AAAA,MACA,MAAM,UAAU,eAAe,GAAG,IAAI,IAAI,GAAG,MAAM;AAAA,MACnD,OAAO;AAAA,IACT,CAAC;AAAA,EACH,EACC,KAAK,SAAS;AACjB,SAAO,UAAU,WAAW,UAAU,WAAW,YAAY,eAAe;AAC9E,GA5CoC;;;AC/G7B,IAAM,gBAAgB;AAEtB,IAAM,wBAAwB,wBAAC,EAAE,MAAM,KAAK,KAAK,MAAsB;AAC5E,MAAI,MAAM;AACV,QAAM,UAAU,KAAK,MAAM,aAAa;AACxC,MAAI,SAAS;AACX,eAAW,SAAS,SAAS;AAC3B,UAAI,UAAU;AACd,UAAI,OAAO,MAAM,UAAU,GAAG,MAAM,SAAS,CAAC;AAC9C,UAAI,QAA6B;AAEjC,UAAI,KAAK,SAAS,GAAG,GAAG;AACtB,kBAAU;AACV,eAAO,KAAK,UAAU,GAAG,KAAK,SAAS,CAAC;AAAA,MAC1C;AAEA,UAAI,KAAK,WAAW,GAAG,GAAG;AACxB,eAAO,KAAK,UAAU,CAAC;AACvB,gBAAQ;AAAA,MACV,WAAW,KAAK,WAAW,GAAG,GAAG;AAC/B,eAAO,KAAK,UAAU,CAAC;AACvB,gBAAQ;AAAA,MACV;AAEA,YAAM,QAAQ,KAAK,IAAI;AAEvB,UAAI,UAAU,UAAa,UAAU,MAAM;AACzC;AAAA,MACF;AAEA,UAAI,MAAM,QAAQ,KAAK,GAAG;AACxB,cAAM,IAAI,QAAQ,OAAO,oBAAoB,EAAE,SAAS,MAAM,OAAO,MAAM,CAAC,CAAC;AAC7E;AAAA,MACF;AAEA,UAAI,OAAO,UAAU,UAAU;AAC7B,cAAM,IAAI;AAAA,UACR;AAAA,UACA,qBAAqB;AAAA,YACnB;AAAA,YACA;AAAA,YACA;AAAA,YACA;AAAA,YACA,WAAW;AAAA,UACb,CAAC;AAAA,QACH;AACA;AAAA,MACF;AAEA,UAAI,UAAU,UAAU;AACtB,cAAM,IAAI;AAAA,UACR;AAAA,UACA,IAAI,wBAAwB;AAAA,YAC1B;AAAA,YACA;AAAA,UACF,CAAC,CAAC;AAAA,QACJ;AACA;AAAA,MACF;AAEA,YAAM,eAAe;AAAA,QACnB,UAAU,UAAU,IAAI,KAAe,KAAM;AAAA,MAC/C;AACA,YAAM,IAAI,QAAQ,OAAO,YAAY;AAAA,IACvC;AAAA,EACF;AACA,SAAO;AACT,GAjEqC;AAmE9B,IAAM,SAAS,wBAAC;AAAA,EACrB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA,KAAK;AACP,MAMM;AACJ,QAAM,UAAU,KAAK,WAAW,GAAG,IAAI,OAAO,IAAI,IAAI;AACtD,MAAI,OAAO,WAAW,MAAM;AAC5B,MAAI,MAAM;AACR,UAAM,sBAAsB,EAAE,MAAM,IAAI,CAAC;AAAA,EAC3C;AACA,MAAI,SAAS,QAAQ,gBAAgB,KAAK,IAAI;AAC9C,MAAI,OAAO,WAAW,GAAG,GAAG;AAC1B,aAAS,OAAO,UAAU,CAAC;AAAA,EAC7B;AACA,MAAI,QAAQ;AACV,WAAO,IAAI,MAAM;AAAA,EACnB;AACA,SAAO;AACT,GA1BsB;AA4Bf,SAAS,oBAAoB,SAIjC;AACD,QAAM,UAAU,QAAQ,SAAS;AACjC,QAAM,mBAAmB,WAAW,QAAQ;AAE5C,MAAI,kBAAkB;AACpB,QAAI,oBAAoB,SAAS;AAC/B,YAAM,oBACJ,QAAQ,mBAAmB,UAAa,QAAQ,mBAAmB;AAErE,aAAO,oBAAoB,QAAQ,iBAAiB;AAAA,IACtD;AAGA,WAAO,QAAQ,SAAS,KAAK,QAAQ,OAAO;AAAA,EAC9C;AAGA,MAAI,SAAS;AACX,WAAO,QAAQ;AAAA,EACjB;AAGA,SAAO;AACT;AA3BgB;;;AC3FT,IAAM,eAAe,8BAC1BC,OACA,aACgC;AAChC,QAAM,QAAQ,OAAO,aAAa,aAAa,MAAM,SAASA,KAAI,IAAI;AAEtE,MAAI,CAAC,OAAO;AACV;AAAA,EACF;AAEA,MAAIA,MAAK,WAAW,UAAU;AAC5B,WAAO,UAAU,KAAK;AAAA,EACxB;AAEA,MAAIA,MAAK,WAAW,SAAS;AAC3B,WAAO,SAAS,KAAK,KAAK,CAAC;AAAA,EAC7B;AAEA,SAAO;AACT,GAnB4B;;;ACRrB,IAAM,wBAAwB,wBAAc;AAAA,EACjD,aAAa,CAAC;AAAA,EACd,GAAG;AACL,IAA4B,CAAC,MAAM;AACjC,QAAM,kBAAkB,wBAAC,gBAAmB;AAC1C,UAAM,SAAmB,CAAC;AAC1B,QAAI,eAAe,OAAO,gBAAgB,UAAU;AAClD,iBAAW,QAAQ,aAAa;AAC9B,cAAM,QAAQ,YAAY,IAAI;AAE9B,YAAI,UAAU,UAAa,UAAU,MAAM;AACzC;AAAA,QACF;AAEA,cAAM,UAAU,WAAW,IAAI,KAAK;AAEpC,YAAI,MAAM,QAAQ,KAAK,GAAG;AACxB,gBAAM,kBAAkB,oBAAoB;AAAA,YAC1C,eAAe,QAAQ;AAAA,YACvB,SAAS;AAAA,YACT;AAAA,YACA,OAAO;AAAA,YACP;AAAA,YACA,GAAG,QAAQ;AAAA,UACb,CAAC;AACD,cAAI,gBAAiB,QAAO,KAAK,eAAe;AAAA,QAClD,WAAW,OAAO,UAAU,UAAU;AACpC,gBAAM,mBAAmB,qBAAqB;AAAA,YAC5C,eAAe,QAAQ;AAAA,YACvB,SAAS;AAAA,YACT;AAAA,YACA,OAAO;AAAA,YACP;AAAA,YACA,GAAG,QAAQ;AAAA,UACb,CAAC;AACD,cAAI,iBAAkB,QAAO,KAAK,gBAAgB;AAAA,QACpD,OAAO;AACL,gBAAM,sBAAsB,wBAAwB;AAAA,YAClD,eAAe,QAAQ;AAAA,YACvB;AAAA,YACA;AAAA,UACF,CAAC;AACD,cAAI,oBAAqB,QAAO,KAAK,mBAAmB;AAAA,QAC1D;AAAA,MACF;AAAA,IACF;AACA,WAAO,OAAO,KAAK,GAAG;AAAA,EACxB,GA3CwB;AA4CxB,SAAO;AACT,GAjDqC;AAsD9B,IAAM,aAAa,wBAAC,gBAAmE;AAC5F,MAAI,CAAC,aAAa;AAGhB,WAAO;AAAA,EACT;AAEA,QAAM,eAAe,YAAY,MAAM,GAAG,EAAE,CAAC,GAAG,KAAK;AAErD,MAAI,CAAC,cAAc;AACjB;AAAA,EACF;AAEA,MAAI,aAAa,WAAW,kBAAkB,KAAK,aAAa,SAAS,OAAO,GAAG;AACjF,WAAO;AAAA,EACT;AAEA,MAAI,iBAAiB,uBAAuB;AAC1C,WAAO;AAAA,EACT;AAEA,MACE,CAAC,gBAAgB,UAAU,UAAU,QAAQ,EAAE,KAAK,CAAC,SAAS,aAAa,WAAW,IAAI,CAAC,GAC3F;AACA,WAAO;AAAA,EACT;AAEA,MAAI,aAAa,WAAW,OAAO,GAAG;AACpC,WAAO;AAAA,EACT;AAEA;AACF,GAhC0B;AAkC1B,IAAM,oBAAoB,wBACxB,SAGA,SACY;AACZ,MAAI,CAAC,MAAM;AACT,WAAO;AAAA,EACT;AACA,MACE,QAAQ,QAAQ,IAAI,IAAI,KACxB,QAAQ,QAAQ,IAAI,KACpB,QAAQ,QAAQ,IAAI,QAAQ,GAAG,SAAS,GAAG,IAAI,GAAG,GAClD;AACA,WAAO;AAAA,EACT;AACA,SAAO;AACT,GAjB0B;AAmBnB,IAAM,gBAAgB,8BAAO;AAAA,EAClC;AAAA,EACA,GAAG;AACL,MAGQ;AACN,aAAWC,SAAQ,UAAU;AAC3B,QAAI,kBAAkB,SAASA,MAAK,IAAI,GAAG;AACzC;AAAA,IACF;AAEA,UAAM,QAAQ,MAAM,aAAaA,OAAM,QAAQ,IAAI;AAEnD,QAAI,CAAC,OAAO;AACV;AAAA,IACF;AAEA,UAAM,OAAOA,MAAK,QAAQ;AAE1B,YAAQA,MAAK,IAAI;AAAA,MACf,KAAK;AACH,YAAI,CAAC,QAAQ,OAAO;AAClB,kBAAQ,QAAQ,CAAC;AAAA,QACnB;AACA,gBAAQ,MAAM,IAAI,IAAI;AACtB;AAAA,MACF,KAAK;AACH,gBAAQ,QAAQ,OAAO,UAAU,GAAG,IAAI,IAAI,KAAK,EAAE;AACnD;AAAA,MACF,KAAK;AAAA,MACL;AACE,gBAAQ,QAAQ,IAAI,MAAM,KAAK;AAC/B;AAAA,IACJ;AAAA,EACF;AACF,GApC6B;AAsCtB,IAAM,WAA+B,wBAAC,YAC3C,OAAO;AAAA,EACL,SAAS,QAAQ;AAAA,EACjB,MAAM,QAAQ;AAAA,EACd,OAAO,QAAQ;AAAA,EACf,iBACE,OAAO,QAAQ,oBAAoB,aAC/B,QAAQ,kBACR,sBAAsB,QAAQ,eAAe;AAAA,EACnD,KAAK,QAAQ;AACf,CAAC,GAVyC;AAYrC,IAAM,eAAe,wBAAC,GAAW,MAAsB;AAC5D,QAAM,SAAS,EAAE,GAAG,GAAG,GAAG,EAAE;AAC5B,MAAI,OAAO,SAAS,SAAS,GAAG,GAAG;AACjC,WAAO,UAAU,OAAO,QAAQ,UAAU,GAAG,OAAO,QAAQ,SAAS,CAAC;AAAA,EACxE;AACA,SAAO,UAAU,aAAa,EAAE,SAAS,EAAE,OAAO;AAClD,SAAO;AACT,GAP4B;AAS5B,IAAM,iBAAiB,wBAAC,YAA8C;AACpE,QAAM,UAAmC,CAAC;AAC1C,UAAQ,QAAQ,CAAC,OAAO,QAAQ;AAC9B,YAAQ,KAAK,CAAC,KAAK,KAAK,CAAC;AAAA,EAC3B,CAAC;AACD,SAAO;AACT,GANuB;AAQhB,IAAM,eAAe,2BACvB,YACS;AACZ,QAAM,gBAAgB,IAAI,QAAQ;AAClC,aAAW,UAAU,SAAS;AAC5B,QAAI,CAAC,QAAQ;AACX;AAAA,IACF;AAEA,UAAM,WAAW,kBAAkB,UAAU,eAAe,MAAM,IAAI,OAAO,QAAQ,MAAM;AAE3F,eAAW,CAAC,KAAK,KAAK,KAAK,UAAU;AACnC,UAAI,UAAU,MAAM;AAClB,sBAAc,OAAO,GAAG;AAAA,MAC1B,WAAW,MAAM,QAAQ,KAAK,GAAG;AAC/B,mBAAW,KAAK,OAAO;AACrB,wBAAc,OAAO,KAAK,CAAW;AAAA,QACvC;AAAA,MACF,WAAW,UAAU,QAAW;AAG9B,sBAAc;AAAA,UACZ;AAAA,UACA,OAAO,UAAU,WAAW,KAAK,UAAU,KAAK,IAAK;AAAA,QACvD;AAAA,MACF;AAAA,IACF;AAAA,EACF;AACA,SAAO;AACT,GA7B4B;AAgD5B,IAAM,eAAN,MAAgC;AAAA,EA3OhC,OA2OgC;AAAA;AAAA;AAAA,EAC9B,MAAiC,CAAC;AAAA,EAElC,QAAc;AACZ,SAAK,MAAM,CAAC;AAAA,EACd;AAAA,EAEA,MAAM,IAAgC;AACpC,UAAM,QAAQ,KAAK,oBAAoB,EAAE;AACzC,QAAI,KAAK,IAAI,KAAK,GAAG;AACnB,WAAK,IAAI,KAAK,IAAI;AAAA,IACpB;AAAA,EACF;AAAA,EAEA,OAAO,IAAmC;AACxC,UAAM,QAAQ,KAAK,oBAAoB,EAAE;AACzC,WAAO,QAAQ,KAAK,IAAI,KAAK,CAAC;AAAA,EAChC;AAAA,EAEA,oBAAoB,IAAkC;AACpD,QAAI,OAAO,OAAO,UAAU;AAC1B,aAAO,KAAK,IAAI,EAAE,IAAI,KAAK;AAAA,IAC7B;AACA,WAAO,KAAK,IAAI,QAAQ,EAAE;AAAA,EAC5B;AAAA,EAEA,OAAO,IAA0B,IAA+C;AAC9E,UAAM,QAAQ,KAAK,oBAAoB,EAAE;AACzC,QAAI,KAAK,IAAI,KAAK,GAAG;AACnB,WAAK,IAAI,KAAK,IAAI;AAClB,aAAO;AAAA,IACT;AACA,WAAO;AAAA,EACT;AAAA,EAEA,IAAI,IAAyB;AAC3B,SAAK,IAAI,KAAK,EAAE;AAChB,WAAO,KAAK,IAAI,SAAS;AAAA,EAC3B;AACF;AAQO,IAAM,qBAAqB,8BAK5B;AAAA,EACJ,OAAO,IAAI,aAAqD;AAAA,EAChE,SAAS,IAAI,aAA2C;AAAA,EACxD,UAAU,IAAI,aAAgD;AAChE,IATkC;AAWlC,IAAM,yBAAyB,sBAAsB;AAAA,EACnD,eAAe;AAAA,EACf,OAAO;AAAA,IACL,SAAS;AAAA,IACT,OAAO;AAAA,EACT;AAAA,EACA,QAAQ;AAAA,IACN,SAAS;AAAA,IACT,OAAO;AAAA,EACT;AACF,CAAC;AAED,IAAM,iBAAiB;AAAA,EACrB,gBAAgB;AAClB;AAEO,IAAM,eAAe,wBAC1B,WAAqD,CAAC,OACR;AAAA,EAC9C,GAAG;AAAA,EACH,SAAS;AAAA,EACT,SAAS;AAAA,EACT,iBAAiB;AAAA,EACjB,GAAG;AACL,IAR4B;;;AChSrB,IAAM,eAAe,wBAAC,SAAiB,CAAC,MAAc;AAC3D,MAAI,UAAU,aAAa,aAAa,GAAG,MAAM;AAEjD,QAAM,YAAY,8BAAe,EAAE,GAAG,QAAQ,IAA5B;AAElB,QAAM,YAAY,wBAACC,YAA2B;AAC5C,cAAU,aAAa,SAASA,OAAM;AACtC,WAAO,UAAU;AAAA,EACnB,GAHkB;AAKlB,QAAM,eAAe,mBAAuE;AAE5F,QAAM,gBAAgB,8BAMpB,YACG;AACH,UAAM,OAAO;AAAA,MACX,GAAG;AAAA,MACH,GAAG;AAAA,MACH,OAAO,QAAQ,SAAS,QAAQ,SAAS,WAAW;AAAA,MACpD,SAAS,aAAa,QAAQ,SAAS,QAAQ,OAAO;AAAA,MACtD,gBAAgB;AAAA,IAClB;AAEA,QAAI,KAAK,UAAU;AACjB,YAAM,cAAc;AAAA,QAClB,GAAG;AAAA,QACH,UAAU,KAAK;AAAA,MACjB,CAAC;AAAA,IACH;AAEA,QAAI,KAAK,kBAAkB;AACzB,YAAM,KAAK,iBAAiB,IAAI;AAAA,IAClC;AAEA,QAAI,KAAK,SAAS,UAAa,KAAK,gBAAgB;AAClD,WAAK,iBAAiB,KAAK,eAAe,KAAK,IAAI;AAAA,IACrD;AAGA,QAAI,KAAK,SAAS,UAAa,KAAK,mBAAmB,IAAI;AACzD,WAAK,QAAQ,OAAO,cAAc;AAAA,IACpC;AAEA,UAAM,eAAe;AAErB,UAAM,MAAM,SAAS,YAAY;AAEjC,WAAO,EAAE,MAAM,cAAc,IAAI;AAAA,EACnC,GAzCsB;AA2CtB,QAAM,UAA6B,8BAAO,YAAY;AACpD,UAAM,eAAe,QAAQ,gBAAgB,QAAQ;AACrD,UAAM,gBAAgB,QAAQ,iBAAiB,QAAQ;AAEvD,QAAIC;AACJ,QAAI;AAEJ,QAAI;AACF,YAAM,EAAE,MAAM,IAAI,IAAI,MAAM,cAAc,OAAO;AACjD,YAAM,cAAuB;AAAA,QAC3B,UAAU;AAAA,QACV,GAAG;AAAA,QACH,MAAM,oBAAoB,IAAI;AAAA,MAChC;AAEA,MAAAA,WAAU,IAAI,QAAQ,KAAK,WAAW;AAEtC,iBAAW,MAAM,aAAa,QAAQ,KAAK;AACzC,YAAI,IAAI;AACN,UAAAA,WAAU,MAAM,GAAGA,UAAS,IAAI;AAAA,QAClC;AAAA,MACF;AAIA,YAAM,SAAS,KAAK;AAEpB,iBAAW,MAAM,OAAOA,QAAO;AAE/B,iBAAW,MAAM,aAAa,SAAS,KAAK;AAC1C,YAAI,IAAI;AACN,qBAAW,MAAM,GAAG,UAAUA,UAAS,IAAI;AAAA,QAC7C;AAAA,MACF;AAEA,YAAM,SAAS;AAAA,QACb,SAAAA;AAAA,QACA;AAAA,MACF;AAEA,UAAI,SAAS,IAAI;AACf,cAAM,WACH,KAAK,YAAY,SACd,WAAW,SAAS,QAAQ,IAAI,cAAc,CAAC,IAC/C,KAAK,YAAY;AAEvB,YAAI,SAAS,WAAW,OAAO,SAAS,QAAQ,IAAI,gBAAgB,MAAM,KAAK;AAC7E,cAAI;AACJ,kBAAQ,SAAS;AAAA,YACf,KAAK;AAAA,YACL,KAAK;AAAA,YACL,KAAK;AACH,0BAAY,MAAM,SAAS,OAAO,EAAE;AACpC;AAAA,YACF,KAAK;AACH,0BAAY,IAAI,SAAS;AACzB;AAAA,YACF,KAAK;AACH,0BAAY,SAAS;AACrB;AAAA,YACF,KAAK;AAAA,YACL;AACE,0BAAY,CAAC;AACb;AAAA,UACJ;AACA,iBAAO,KAAK,kBAAkB,SAC1B,YACA;AAAA,YACE,MAAM;AAAA,YACN,GAAG;AAAA,UACL;AAAA,QACN;AAEA,YAAI;AACJ,gBAAQ,SAAS;AAAA,UACf,KAAK;AAAA,UACL,KAAK;AAAA,UACL,KAAK;AAAA,UACL,KAAK;AACH,mBAAO,MAAM,SAAS,OAAO,EAAE;AAC/B;AAAA,UACF,KAAK,QAAQ;AAGX,kBAAM,OAAO,MAAM,SAAS,KAAK;AACjC,mBAAO,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAClC;AAAA,UACF;AAAA,UACA,KAAK;AACH,mBAAO,KAAK,kBAAkB,SAC1B,SAAS,OACT;AAAA,cACE,MAAM,SAAS;AAAA,cACf,GAAG;AAAA,YACL;AAAA,QACR;AAEA,YAAI,YAAY,QAAQ;AACtB,cAAI,KAAK,mBAAmB;AAC1B,kBAAM,KAAK,kBAAkB,IAAI;AAAA,UACnC;AAEA,cAAI,KAAK,qBAAqB;AAC5B,mBAAO,MAAM,KAAK,oBAAoB,IAAI;AAAA,UAC5C;AAAA,QACF;AAEA,eAAO,KAAK,kBAAkB,SAC1B,OACA;AAAA,UACE;AAAA,UACA,GAAG;AAAA,QACL;AAAA,MACN;AAEA,YAAM,YAAY,MAAM,SAAS,KAAK;AACtC,UAAI;AAEJ,UAAI;AACF,oBAAY,KAAK,MAAM,SAAS;AAAA,MAClC,QAAQ;AAAA,MAER;AAEA,YAAM,aAAa;AAAA,IACrB,SAAS,OAAO;AACd,UAAI,aAAa;AAEjB,iBAAW,MAAM,aAAa,MAAM,KAAK;AACvC,YAAI,IAAI;AACN,uBAAa,MAAM,GAAG,YAAY,UAAUA,UAAS,OAAiC;AAAA,QACxF;AAAA,MACF;AAEA,mBAAa,cAAc,CAAC;AAE5B,UAAI,cAAc;AAChB,cAAM;AAAA,MACR;AAGA,aAAO,kBAAkB,SACrB,SACA;AAAA,QACE,OAAO;AAAA,QACP,SAAAA;AAAA,QACA;AAAA,MACF;AAAA,IACN;AAAA,EACF,GArJmC;AAuJnC,QAAM,eAAe,wBAAC,WAAkC,CAAC,YACvD,QAAQ,EAAE,GAAG,SAAS,OAAO,CAAC,GADX;AAGrB,QAAM,YAAY,wBAAC,WAAkC,OAAO,YAA4B;AACtF,UAAM,EAAE,MAAM,IAAI,IAAI,MAAM,cAAc,OAAO;AACjD,WAAO,gBAAgB;AAAA,MACrB,GAAG;AAAA,MACH,MAAM,KAAK;AAAA,MACX;AAAA,MACA,WAAW,8BAAOC,MAAK,SAAS;AAC9B,YAAID,WAAU,IAAI,QAAQC,MAAK,IAAI;AACnC,mBAAW,MAAM,aAAa,QAAQ,KAAK;AACzC,cAAI,IAAI;AACN,YAAAD,WAAU,MAAM,GAAGA,UAAS,IAAI;AAAA,UAClC;AAAA,QACF;AACA,eAAOA;AAAA,MACT,GARW;AAAA,MASX,gBAAgB,oBAAoB,IAAI;AAAA,MACxC;AAAA,IACF,CAAC;AAAA,EACH,GAlBkB;AAoBlB,QAAM,YAAgC,wBAAC,YAAY,SAAS,EAAE,GAAG,SAAS,GAAG,QAAQ,CAAC,GAAhD;AAEtC,SAAO;AAAA,IACL,UAAU;AAAA,IACV,SAAS,aAAa,SAAS;AAAA,IAC/B,QAAQ,aAAa,QAAQ;AAAA,IAC7B,KAAK,aAAa,KAAK;AAAA,IACvB;AAAA,IACA,MAAM,aAAa,MAAM;AAAA,IACzB;AAAA,IACA,SAAS,aAAa,SAAS;AAAA,IAC/B,OAAO,aAAa,OAAO;AAAA,IAC3B,MAAM,aAAa,MAAM;AAAA,IACzB,KAAK,aAAa,KAAK;AAAA,IACvB;AAAA,IACA;AAAA,IACA,KAAK;AAAA,MACH,SAAS,UAAU,SAAS;AAAA,MAC5B,QAAQ,UAAU,QAAQ;AAAA,MAC1B,KAAK,UAAU,KAAK;AAAA,MACpB,MAAM,UAAU,MAAM;AAAA,MACtB,SAAS,UAAU,SAAS;AAAA,MAC5B,OAAO,UAAU,OAAO;AAAA,MACxB,MAAM,UAAU,MAAM;AAAA,MACtB,KAAK,UAAU,KAAK;AAAA,MACpB,OAAO,UAAU,OAAO;AAAA,IAC1B;AAAA,IACA,OAAO,aAAa,OAAO;AAAA,EAC7B;AACF,GAlQ4B;;;ACNrB,IAAM,SAAS,aAAa,aAA6B,EAAE,SAAS,wBAAwB,CAAC,CAAC;AAIrG,oBAAoB,MAAM;;;ACCnB,IAAM,oBAAN,MAAwB;AAAA,EApB/B,OAoB+B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAM3B,OAAc,0BAAgE,SAAgE;AAC1I,YAAQ,SAAS,UAAU,QAAQ,IAAuF;AAAA,MACtH,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,kCAAwE,SAAuE;AACzJ,YAAQ,QAAQ,UAAU,QAAQ,KAAwG;AAAA,MACtI,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,4BAAkE,SAAiE;AAC7I,YAAQ,QAAQ,UAAU,QAAQ,KAAkE;AAAA,MAChG,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,mBAAN,MAAuB;AAAA,EAjF9B,OAiF8B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAM1B,OAAc,gCAAsE,SAAsE;AACtJ,YAAQ,SAAS,UAAU,QAAQ,IAAqE;AAAA,MACpG,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,iCAAuE,SAAsE;AACvJ,YAAQ,QAAQ,UAAU,QAAQ,KAAsG;AAAA,MACpI,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,sCAA4E,SAA4E;AAClK,YAAQ,SAAS,UAAU,QAAQ,KAAgH;AAAA,MAC/I,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,qCAA2E,SAA0E;AAC/J,YAAQ,QAAQ,UAAU,QAAQ,KAA8G;AAAA,MAC5I,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,kCAAwE,SAAwE;AAC1J,YAAQ,SAAS,UAAU,QAAQ,IAAuE,EAAE,KAAK,kCAAkC,GAAG,QAAQ,CAAC;AAAA,EACnK;AACJ;AAEO,IAAM,cAAN,MAAkB;AAAA,EA1JzB,OA0JyB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAIrB,OAAc,4BAAkE,SAAiE;AAC7I,YAAQ,QAAQ,UAAU,QAAQ,KAA4F;AAAA,MAC1H,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAYA,OAAc,2BAAiE,SAAgE;AAC3I,YAAQ,QAAQ,UAAU,QAAQ,KAA0F;AAAA,MACxH,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,qBAAN,MAAyB;AAAA,EAjMhC,OAiMgC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAM5B,OAAc,2BAAiE,SAAiE;AAC5I,YAAQ,SAAS,UAAU,QAAQ,IAAyF;AAAA,MACxH,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,+BAAqE,SAAqE;AACpJ,YAAQ,SAAS,UAAU,QAAQ,KAAkG;AAAA,MACjI,GAAG;AAAA,MACH,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAiBA,OAAc,+BAAqE,SAAqE;AACpJ,YAAQ,SAAS,UAAU,QAAQ,KAAkG;AAAA,MACjI,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,uCAA6E,SAA6E;AACpK,YAAQ,SAAS,UAAU,QAAQ,MAAmH;AAAA,MAClJ,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,gCAAsE,SAAsE;AACtJ,YAAQ,SAAS,UAAU,QAAQ,IAAmG;AAAA,MAClI,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,sCAA4E,SAA4E;AAClK,YAAQ,SAAS,UAAU,QAAQ,MAAiH;AAAA,MAChJ,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,+BAAqE,SAAqE;AACpJ,YAAQ,SAAS,UAAU,QAAQ,IAAiG;AAAA,MAChI,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,kBAAN,MAAsB;AAAA,EArV7B,OAqV6B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAIzB,OAAc,8BAAoE,SAAmE;AACjJ,YAAQ,QAAQ,UAAU,QAAQ,KAAoE;AAAA,MAClG,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,gBAAN,MAAoB;AAAA,EArW3B,OAqW2B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAMvB,OAAc,+BAAqE,SAAqE;AACpJ,YAAQ,SAAS,UAAU,QAAQ,IAAiG;AAAA,MAChI,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,qBAAN,MAAyB;AAAA,EApXhC,OAoXgC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAI5B,OAAc,2BAAiE,SAAiE;AAC5I,YAAQ,SAAS,UAAU,QAAQ,IAAgE;AAAA,MAC/F,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,OAAc,mCAAyE,SAAwE;AAC3J,YAAQ,QAAQ,UAAU,QAAQ,KAA0G;AAAA,MACxI,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,UAAN,MAAc;AAAA,EAnZrB,OAmZqB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAIjB,OAAc,uBAA6D,SAA6D;AACpI,YAAQ,SAAS,UAAU,QAAQ,IAA4D;AAAA,MAC3F,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,sBAA4D,SAA2D;AACjI,YAAQ,QAAQ,UAAU,QAAQ,OAA8D;AAAA,MAC5F,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,qBAA2D,SAA0D;AAC/H,YAAQ,QAAQ,UAAU,QAAQ,KAA8E;AAAA,MAC5G,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,eAAN,MAAmB;AAAA,EA9b1B,OA8b0B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAMtB,OAAc,mBAAyD,SAAyD;AAC5H,YAAQ,SAAS,UAAU,QAAQ,KAA0E;AAAA,MACzG,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,0BAAgE,SAA+D;AACzI,YAAQ,QAAQ,UAAU,QAAQ,KAAwF;AAAA,MACtH,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,gBAAN,MAAoB;AAAA,EAle3B,OAke2B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAMvB,OAAc,oBAA0D,SAAyD;AAC7H,YAAQ,QAAQ,UAAU,QAAQ,KAA4E;AAAA,MAC1G,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,0BAAgE,SAA+D;AACzI,YAAQ,QAAQ,UAAU,QAAQ,KAAwF;AAAA,MACtH,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;;;AC/dO,IAAM,MAAN,MAAU;AAAA,EArCjB,OAqCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAEA,oBAAoB;AAAA,EACpB,mBAAmB;AAAA,EACnB,cAAc;AAAA,EACd,qBAAqB;AAAA,EACrB,kBAAkB;AAAA,EAE3B,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AClDO,IAAME,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAEA,gBAAgB;AAAA,EAEzB,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;ACvCO,IAAMC,OAAN,MAAU;AAAA,EApCjB,OAoCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAEA,qBAAqB;AAAA,EACrB,UAAU;AAAA,EACV,eAAe;AAAA,EACf,gBAAgB;AAAA,EAEzB,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AChEO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;;;ACXlC,IAAK,iBAAL,kBAAKC,oBAAL;AACL,EAAAA,gBAAA,sBAAmB;AACnB,EAAAA,gBAAA,wBAAqB;AACrB,EAAAA,gBAAA,0BAAuB;AACvB,EAAAA,gBAAA,0BAAuB;AACvB,EAAAA,gBAAA,wBAAqB;AACrB,EAAAA,gBAAA,6BAA0B;AAC1B,EAAAA,gBAAA,iBAAc;AACd,EAAAA,gBAAA,sBAAmB;AACnB,EAAAA,gBAAA,qBAAkB;AATR,SAAAA;AAAA,GAAA;AAYL,IAAK,oBAAL,kBAAKC,uBAAL;AACL,EAAAA,mBAAA,UAAO;AADG,SAAAA;AAAA,GAAA;AAkBL,IAAM,YAAY;AAAA;AAAA;AAAA;AAAA,EAIvB,MAAM,WAA+B,QAA+B;AAClE,QAAI,OAAO;AACT,cAAQ,IAAI,eAAe,WAAW,MAAM;AAAA,IAC9C;AAAA,EAIF;AAAA;AAAA;AAAA;AAAA,EAKA,QAAQ,QAAgB;AACtB,QAAI,OAAO;AACT,cAAQ,IAAI,yBAAyB,MAAM;AAAA,IAC7C;AAAA,EAIF;AACF;;;AlBIO,IAAM,eAAe,wBAAC,UAA+B,CAAC,MAA0B;AACrF,QAAM,EAAE,WAAW,SAAS,aAAa,eAAe,MAAM,IAAI;AAClE,QAAM,SAAS,aAAa;AAE5B,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,wBAAwB,IAAI;AACtD,QAAM,CAAC,SAAS,UAAU,QAAI,wBAAwB,IAAI;AAC1D,QAAM,CAAC,sBAAsB,uBAAuB,QAAI,wBAAwB,IAAI;AACpF,QAAM,CAAC,mBAAmB,oBAAoB,QAAI,wBAAwB,IAAI;AAE9E,QAAM,iBAAa,2BAAY,MAAM;AACnC,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAKL,QAAM,oBAAgB,2BAAY,CAAC,aAM7B;AAEJ,mBAAY,SAAS,SAAS,YAAY;AAC1C,mBAAY,gBAAgB,SAAS,aAAa;AAGlD,QAAI,SAAS,SAAS;AACpB,iBAAW,SAAS,OAAO;AAAA,IAC7B;AAGA,QAAI,SAAS,2BAA2B,QAAW;AACjD,8BAAwB,SAAS,sBAAsB;AAAA,IACzD;AAGA,cAAU,qDAAyC;AAAA,MACjD;AAAA,MACA,OAAO;AAAA,IACT,CAAC;AAGD,QAAI,SAAS,MAAM,IAAI;AACrB,gBAAU,QAAQ,OAAO,SAAS,KAAK,EAAE,CAAC;AAAA,IAC5C;AAGA,gBAAY,SAAS,IAAI;AAGzB,QAAI,CAAC,cAAc;AACjB,YAAM,mBAAmB,eAAe;AACxC,iBAAW,KAAK,mCAAmC,gBAAgB;AACnE,aAAO,SAAS,gBAAgB;AAAA,IAClC;AAAA,EACF,GAAG,CAAC,WAAW,aAAa,QAAQ,YAAY,CAAC;AAKjD,QAAM,iBAAa,2BAAY,OAAO,WAAmB,SAAmC;AAC1F,QAAI,CAAC,WAAW;AACd,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,wBAAwB;AAExC,YAAM,SAAS,MAAM,cAAc,oBAAoB;AAAA,QACrD,MAAM,EAAE,YAAY,WAAW,KAAK;AAAA,QACpC,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,UAAI,CAAC,SAAS,gBAAgB,CAAC,SAAS,eAAe;AACrD,cAAM,IAAI,MAAM,wCAAwC;AAAA,MAC1D;AAEA,oBAAc,QAAQ;AACtB,aAAO;AAAA,IAET,SAAS,KAAK;AACZ,iBAAW,MAAM,gCAAgC,GAAG;AACpD,YAAM,eAAe,eAAe,WAC/B,IAAI,UAAU,SAAS,IAAI,UAAU,UAAU,IAAI,UAAU,WAAW,IAAI,eAC5E,eAAe,QAAQ,IAAI,UAAU;AAC1C,UAAI,eAAe,YAAY,OAAO,IAAI,UAAU,uBAAuB,UAAU;AACnF,6BAAqB,IAAI,SAAS,kBAAkB;AAAA,MACtD;AACA,eAAS,YAAY;AACrB,gBAAU,YAAY;AAGtB,gBAAU,yDAA2C;AAAA,QACnD;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAED,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,eAAe,OAAO,CAAC;AAK3B,QAAM,uBAAmB,2BAAY,OAAO,WAAmB,eAAyC;AACtG,QAAI,CAAC,WAAW;AACd,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,cAAc,WAAW,SAAS,GAAG;AACxC,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,0BAA0B;AAE1C,YAAM,SAAS,MAAM,cAAc,0BAA0B;AAAA,QAC3D,MAAM;AAAA,UACJ,YAAY;AAAA,UACZ,aAAa,WAAW,QAAQ,QAAQ,EAAE;AAAA,QAC5C;AAAA,QACA,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,UAAI,CAAC,SAAS,gBAAgB,CAAC,SAAS,eAAe;AACrD,cAAM,IAAI,MAAM,gDAAgD;AAAA,MAClE;AAEA,oBAAc,QAAQ;AACtB,aAAO;AAAA,IAET,SAAS,KAAK;AACZ,iBAAW,MAAM,uCAAuC,GAAG;AAC3D,YAAM,eAAe,eAAe,WAC/B,IAAI,UAAU,SAAS,IAAI,UAAU,UAAU,IAAI,UAAU,WAAW,IAAI,eAC5E,eAAe,QAAQ,IAAI,UAAU;AAC1C,UAAI,eAAe,YAAY,OAAO,IAAI,UAAU,uBAAuB,UAAU;AACnF,6BAAqB,IAAI,SAAS,kBAAkB;AAAA,MACtD;AACA,eAAS,YAAY;AACrB,gBAAU,YAAY;AAGtB,gBAAU,yDAA2C;AAAA,QACnD;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAED,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,eAAe,OAAO,CAAC;AAE3B,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAjM4B;;;AHjDrB,IAAM,cAAc,wBAAC,YAAgD;AAC1E,QAAM;AAAA,IACJ;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA,yBAAyB;AAAA,IACzB,WAAW;AAAA,IACX,iBAAiB;AAAA,EACnB,IAAI;AAGJ,QAAM,YAAY,iBAAiB;AACnC,QAAM,aAAa,kBAAkB;AAGrC,QAAM,6BAAyB,sBAAO,KAAK;AAG3C,QAAM;AAAA,IACJ;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI,QAAQ;AAGZ,QAAM;AAAA,IACJ;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI;AAGJ,QAAM,YAAY,aAAa;AAAA,IAC7B,WAAW,6BAAM;AACf,iBAAW,KAAK,qDAAqD;AACrE,cAAQ,SAAS;AACjB,qBAAe;AAAA,IACjB,GAJW;AAAA,IAKX,SAAS,wBAAC,UAAU;AAClB,eAAS,KAAK;AACd,gBAAU,KAAK;AAAA,IACjB,GAHS;AAAA,IAIT;AAAA,IACA,cAAc;AAAA;AAAA,EAChB,CAAC;AAED,QAAM,EAAE,oBAAAC,oBAAmB,IAAI;AAM/B,QAAM,8BAA0B,2BAAY,CAAC,OAAe;AAC1D,cAAU,EAAE;AAAA,EACd,GAAG,CAAC,SAAS,CAAC;AAOd,+BAAU,MAAM;AACd,UAAM,aAAa,cAAc;AACjC,QAAI,YAAY;AACd,oBAAc,UAAU;AAAA,IAC1B;AAAA,EAEF,GAAG,CAAC,CAAC;AAML,QAAM,6BAAyB,2BAAY,OAAO,MAAuB;AACvE,MAAE,eAAe;AAEjB,QAAI,CAAC,YAAY;AACf,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb;AAAA,IACF;AAEA,QAAI,CAACA,oBAAmB,UAAU,GAAG;AACnC,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb;AAAA,IACF;AAEA,QAAI,0BAA0B,CAAC,eAAe;AAC5C,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb;AAAA,IACF;AAEA,iBAAa,IAAI;AACjB,eAAW;AAEX,QAAI;AACF,YAAM,SAAS,MAAM,WAAW,YAAY,SAAS;AAErD,UAAI,OAAO,SAAS;AAClB,gCAAwB,UAAU;AAClC,gBAAQ,KAAK;AACb,8BAAsB,UAAU;AAAA,MAClC,OAAO;AACL,YAAI,OAAO,YAAY;AACrB,kCAAwB,OAAO,UAAU;AACzC,qBAAW;AAAA,QACb,OAAO;AACL,mBAAS,OAAO,OAAO;AACvB,oBAAU,OAAO,OAAO;AAAA,QAC1B;AAAA,MACF;AAAA,IACF,QAAQ;AACN,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AAAA,IACf,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG;AAAA,IACD;AAAA,IAAY;AAAA,IAAe;AAAA,IAC3BA;AAAA,IAAoB;AAAA,IAAY;AAAA,IAChC;AAAA,IAAU;AAAA,IAAc;AAAA,IAAS;AAAA,IACjC;AAAA,IAAyB;AAAA,IAAqB;AAAA,IAAS;AAAA,EACzD,CAAC;AAGD,QAAM,gBAAY,2BAAY,OAC5B,kBACA,cACqB;AACrB,QAAI,CAAC,aAAa,UAAU,SAAS,eAAe,kBAAkB;AACpE,YAAM,MAAM,oBAAoB,eAAe,gBAAgB;AAC/D,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,eAAW;AAEX,QAAI;AAEF,YAAM,SAAS,MAAM,UAAU,kBAAkB,WAAW,WAAW,aAAa,IAAI;AAGxF,UAAI,OAAO,gBAAgB,OAAO,YAAY;AAC5C,mBAAW,KAAK,qCAAqC;AACrD,8BAAsB,OAAO,UAAU;AACvC,2BAAmB,OAAO,qBAAqB,KAAK;AACpD,gBAAQ,KAAK;AACb,gCAAwB,gBAAgB;AACxC,eAAO;AAAA,MACT;AAEA,UAAI,OAAO,SAAS;AAClB,gCAAwB,gBAAgB;AAIxC,YAAI,OAAO,qBAAqB,gBAAgB;AAC9C,qBAAW,KAAK,kDAAkD;AAClE,6BAAmB,IAAI;AACvB,kBAAQ,WAAW;AACnB,yBAAe;AACf,iBAAO;AAAA,QACT;AAGA,YAAI,OAAO,qBAAqB,CAAC,gBAAgB;AAC/C,qBAAW,KAAK,mEAAmE;AAAA,QACrF,OAAO;AACL,qBAAW,KAAK,qDAAqD;AAAA,QACvE;AACA,gBAAQ,SAAS;AACjB,uBAAe;AACf,eAAO;AAAA,MACT,OAAO;AACL,iBAAS,OAAO,OAAO;AACvB,kBAAU,OAAO,OAAO;AACxB,eAAO;AAAA,MACT;AAAA,IACF,QAAQ;AACN,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,WAAW,yBAAyB,UAAU,cAAc,YAAY,cAAc,SAAS,WAAW,aAAa,uBAAuB,oBAAoB,SAAS,cAAc,CAAC;AAE9L,QAAM,sBAAkB,2BAAY,OAAO,MAAuB;AAChE,MAAE,eAAe;AACjB,UAAM,UAAU,YAAY,GAAG;AAAA,EACjC,GAAG,CAAC,YAAY,KAAK,SAAS,CAAC;AAE/B,QAAM,sBAAkB,2BAAY,YAAY;AAC9C,iBAAa,IAAI;AACjB,eAAW;AAEX,QAAI;AACF,YAAM,SAAS,MAAM,WAAW,YAAY,SAAS;AAErD,UAAI,OAAO,SAAS;AAClB,gCAAwB,UAAU;AAClC,eAAO,EAAE;AAAA,MACX,OAAO;AACL,YAAI,OAAO,YAAY;AACrB,kCAAwB,OAAO,UAAU;AACzC,qBAAW;AAAA,QACb,OAAO;AACL,mBAAS,OAAO,OAAO;AACvB,oBAAU,OAAO,OAAO;AAAA,QAC1B;AAAA,MACF;AAAA,IACF,QAAQ;AACN,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AAAA,IACf,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,YAAY,YAAY,yBAAyB,QAAQ,UAAU,cAAc,YAAY,yBAAyB,SAAS,SAAS,CAAC;AAE7I,QAAM,6BAAyB,2BAAY,MAAM;AAC/C,YAAQ,YAAY;AACpB,eAAW;AAAA,EACb,GAAG,CAAC,SAAS,UAAU,CAAC;AAExB,QAAM,mBAAe,2BAAY,MAAM;AACrC,YAAQ,KAAK;AACb,eAAW;AAAA,EACb,GAAG,CAAC,SAAS,UAAU,CAAC;AAMxB,QAAM,sBAAkB,2BAAY,OAAO,MAAuB;AAChE,MAAE,eAAe;AAEjB,QAAI,CAAC,oBAAoB;AACvB,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb;AAAA,IACF;AAEA,QAAI,eAAe;AACjB,YAAM,UAAU,iBAAiB,oBAAoB,aAAa;AAAA,IACpE,OAAO;AACL,YAAM,UAAU,WAAW,oBAAoB,aAAa;AAAA,IAC9D;AAAA,EACF,GAAG,CAAC,oBAAoB,eAAe,eAAe,WAAW,UAAU,OAAO,CAAC;AAEnF,QAAM,0BAAsB,2BAAY,MAAM;AAC5C,qBAAiB,IAAI;AACrB,qBAAiB,EAAE;AACnB,eAAW;AAAA,EACb,GAAG,CAAC,kBAAkB,kBAAkB,UAAU,CAAC;AAEnD,QAAM,oBAAgB,2BAAY,MAAM;AACtC,qBAAiB,KAAK;AACtB,qBAAiB,EAAE;AACnB,eAAW;AAAA,EACb,GAAG,CAAC,kBAAkB,kBAAkB,UAAU,CAAC;AAMnD,cAAY;AAAA,IACV,cAAc,CAAC,QAAQ;AAAA,IACvB,eAAe,wBAAC,gBAAwB;AACtC,UAAI,uBAAuB,WAAW,UAAW;AACjD,6BAAuB,UAAU;AAEjC,iBAAW,KAAK,wCAAwC;AAExD,YAAM,aAAa,cAAc;AACjC,YAAM,iBAAiB,cAAc;AAErC,UAAI,CAAC,gBAAgB;AACnB,mBAAW,KAAK,2CAA2C;AAC3D,+BAAuB,UAAU;AACjC;AAAA,MACF;AAGA,oBAAc,cAAc;AAC5B,aAAO,WAAW;AAClB,cAAQ,KAAK;AAGb,iBAAW,YAAY;AACrB,YAAI;AACF,gBAAM,UAAU,gBAAgB,WAAW;AAAA,QAC7C,UAAE;AACA,iCAAuB,UAAU;AAAA,QACnC;AAAA,MACF,GAAG,GAAG;AAAA,IACR,GA5Be;AAAA,IA6Bf,YAAY;AAAA,EACd,CAAC;AAMD,SAAO;AAAA;AAAA,IAEL,GAAG;AAAA;AAAA,IAGH;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA;AAAA,IAGA;AAAA,IACA;AAAA,IACA;AAAA;AAAA,IAGA,GAAG;AAAA;AAAA,IAGH,yBAAyB;AAAA;AAAA,IAGzB,cAAc,UAAU;AAAA,IACxB,kBAAkB,UAAU;AAAA,IAC5B,4BAA4B,UAAU;AAAA,EACxC;AACF,GAvW2B;;;AsBf3B,IAAAC,gBAAsC;AA6C/B,IAAM,gBAAgB,wBAAC,UAAgC,CAAC,MAA2B;AACxF,QAAM,EAAE,WAAW,WAAW,SAAS,eAAe,aAAa,eAAe,MAAM,IAAI;AAC5F,QAAM,SAAS,aAAa;AAE5B,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,wBAAwB,IAAI;AAKtD,QAAM,sBAAkB,2BAAY,YAAY;AAC9C,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,+BAA+B;AAG/C,gBAAU,iDAAuC;AAAA,QAC/C;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAID,YAAM,SAAS,MAAM,iBAAiB,sCAAsC;AAAA,QAC1E,MAAM;AAAA,UACJ,YAAY,cAAc,OAAO,WAAW,cAAc,OAAO,SAAS,OAAO;AAAA,QACnF;AAAA,QACA,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,UAAI,CAAC,SAAS,mBAAmB;AAC/B,cAAM,IAAI,MAAM,iCAAiC;AAAA,MACnD;AAEA,iBAAW,KAAK,4BAA4B,SAAS,iBAAiB;AAEtE,UAAI,OAAO,WAAW,aAAa;AACjC,uBAAe,QAAQ,eAAe,SAAS,KAAK;AACpD,uBAAe,QAAQ,kBAAkB,QAAQ;AAAA,MACnD;AAEA,aAAO,SAAS,OAAO,SAAS;AAAA,IAElC,SAAS,KAAK;AACZ,YAAM,eAAe,eAAe,QAAQ,IAAI,UAAU;AAC1D,iBAAW,MAAM,6BAA6B,GAAG;AACjD,eAAS,YAAY;AACrB,gBAAU,YAAY;AAGtB,gBAAU,+CAAsC;AAAA,QAC9C;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAAA,IACH,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,WAAW,OAAO,CAAC;AAQvB,QAAM,2BAAuB,2BAAY,OAAO,MAAc,UAAkB;AAC9E,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,qCAAqC;AAGrD,UAAI,OAAO,WAAW,aAAa;AACjC,cAAM,cAAc,eAAe,QAAQ,aAAa;AACxD,YAAI,eAAe,gBAAgB,OAAO;AACxC,gBAAM,IAAI,MAAM,4CAA4C;AAAA,QAC9D;AAEA,uBAAe,WAAW,aAAa;AACvC,uBAAe,WAAW,gBAAgB;AAAA,MAC5C;AAEA,YAAM,SAAS,MAAM,iBAAiB,qCAAqC;AAAA,QACzE,MAAM,EAAE,MAAM,MAAM;AAAA,QACpB,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAGxB,UAAI,SAAS,gBAAgB,SAAS,YAAY;AAChD,mBAAW,KAAK,uCAAuC,SAAS,UAAU;AAG1E,kBAAU,iDAAuC;AAAA,UAC/C;AAAA,UACA,OAAO;AAAA,QACT,CAAC;AAGD,wBAAgB,SAAS,YAAY,SAAS,qBAAqB,KAAK;AACxE;AAAA,MACF;AAEA,UAAI,CAAC,SAAS,UAAU,CAAC,SAAS,SAAS;AACzC,cAAM,IAAI,MAAM,sCAAsC;AAAA,MACxD;AAEA,iBAAW,KAAK,kCAAkC,SAAS,IAAI;AAE/D,qBAAY,SAAS,SAAS,MAAM;AACpC,qBAAY,gBAAgB,SAAS,OAAO;AAG5C,gBAAU,qDAAyC;AAAA,QACjD;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAGD,UAAI,SAAS,MAAM,IAAI;AACrB,kBAAU,QAAQ,OAAO,SAAS,KAAK,EAAE,CAAC;AAAA,MAC5C;AAGA,kBAAY,SAAS,MAAM,SAAS,eAAe,KAAK;AAGxD,UAAI,CAAC,cAAc;AAEjB,cAAM,mBAAmB,eAAe;AACxC,eAAO,SAAS,gBAAgB;AAAA,MAClC;AAAA,IAEF,SAAS,KAAK;AACZ,YAAM,eAAe,eAAe,QAAQ,IAAI,UAAU;AAC1D,iBAAW,MAAM,gCAAgC,GAAG;AACpD,eAAS,YAAY;AACrB,gBAAU,YAAY;AAGtB,gBAAU,+CAAsC;AAAA,QAC9C;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAAA,IACH,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,WAAW,SAAS,aAAa,MAAM,CAAC;AAE5C,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GA/J6B;;;AC7C7B,IAAAC,gBAAsC;AAmF/B,IAAM,oBAAoB,wBAAC,UAAoC,CAAC,MAA+B;AACpG,QAAM,EAAE,YAAY,QAAQ,IAAI;AAEhC,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,wBAAwB,IAAI;AACtD,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAoC,IAAI;AAC1E,QAAM,CAAC,aAAa,cAAc,QAAI,wBAA0B,IAAI;AACpE,QAAM,CAAC,oBAAoB,qBAAqB,QAAI,wBAAwB,IAAI;AAChF,QAAM,CAAC,WAAW,YAAY,QAAI,wBAA0D,MAAM;AAElG,QAAM,iBAAa,2BAAY,MAAM;AACnC,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAEL,QAAM,iBAAa,2BAAY,MAAM;AACnC,iBAAa,IAAI;AACjB,mBAAe,IAAI;AACnB,0BAAsB,IAAI;AAC1B,iBAAa,MAAM;AACnB,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAKL,QAAM,iBAAa,2BAAY,OAAO,eAA4D;AAChG,iBAAa,IAAI;AACjB,aAAS,IAAI;AACb,iBAAa,UAAU;AAEvB,QAAI;AACF,iBAAW,KAAK,uBAAuB;AAEvC,YAAM,SAAS,MAAM,aAAa,mBAAmB;AAAA,QACnD,MAAM,EAAE,aAAa,WAAW;AAAA,QAChC,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,YAAM,OAA2B;AAAA,QAC/B,UAAU,SAAS;AAAA,QACnB,QAAQ,SAAS;AAAA,QACjB,iBAAiB,SAAS;AAAA,QAC1B,cAAc,SAAS;AAAA,QACvB,WAAW,SAAS;AAAA,MACtB;AAEA,mBAAa,IAAI;AACjB,iBAAW,KAAK,oCAAoC,KAAK,WAAW,SAAS;AAE7E,aAAO;AAAA,IAET,SAAS,KAAK;AACZ,YAAM,eAAe,eAAe,QAAQ,IAAI,UAAU;AAC1D,iBAAW,MAAM,oBAAoB,GAAG;AACxC,eAAS,YAAY;AACrB,mBAAa,MAAM;AACnB,gBAAU,YAAY;AACtB,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,OAAO,CAAC;AAKZ,QAAM,mBAAe,2BAAY,OAAO,SAA2C;AACjF,QAAI,CAAC,WAAW;AACd,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,aAAS,IAAI;AACb,iBAAa,YAAY;AAEzB,QAAI;AACF,iBAAW,KAAK,yBAAyB;AAEzC,YAAM,SAAS,MAAM,aAAa,0BAA0B;AAAA,QAC1D,MAAM,EAAE,WAAW,UAAU,UAAU,KAAK;AAAA,QAC5C,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,YAAM,QAAQ,SAAS;AACvB,qBAAe,KAAK;AACpB,4BAAsB,SAAS,oBAAoB;AACnD,mBAAa,UAAU;AAEvB,iBAAW,KAAK,gDAAgD,MAAM,MAAM;AAG5E,mBAAa,KAAK;AAElB,aAAO;AAAA,IAET,SAAS,KAAK;AACZ,YAAM,eAAe,eAAe,QAAQ,IAAI,UAAU;AAC1D,iBAAW,MAAM,iCAAiC,GAAG;AACrD,eAAS,YAAY;AACrB,mBAAa,UAAU;AACvB,gBAAU,YAAY;AACtB,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,WAAW,YAAY,OAAO,CAAC;AAEnC,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAnIiC;;;ACnFjC,IAAAC,iBAAsC;AAmDtC,SAAS,oBAAoB,KAAc,UAA0B;AACnE,MAAI,eAAe,UAAU;AAC3B,UAAM,OAAO,IAAI;AACjB,QAAI,OAAO,MAAM,UAAU,SAAU,QAAO,KAAK;AACjD,QAAI,OAAO,MAAM,WAAW,SAAU,QAAO,KAAK;AAClD,WAAO,IAAI;AAAA,EACb;AACA,MAAI,eAAe,MAAO,QAAO,IAAI;AACrC,SAAO;AACT;AATS;AAWF,IAAM,qBAAqB,6BAAgC;AAChE,QAAM,CAAC,WAAW,YAAY,QAAI,yBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,yBAAwB,IAAI;AACtD,QAAM,CAAC,eAAe,gBAAgB,QAAI,yBAAyB,IAAI;AACvE,QAAM,CAAC,SAAS,UAAU,QAAI,yBAA4B,CAAC,CAAC;AAE5D,QAAM,iBAAa,4BAAY,MAAM;AACnC,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAKL,QAAM,kBAAc,4BAAY,YAA2B;AACzD,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,wBAAwB;AAGxC,YAAM,SAAS,MAAM,QAAQ,uBAAuB,EAAE,cAAc,KAAK,CAAC;AAC1E,YAAM,WAAW,OAAO;AAExB,YAAM,gBAAmC,SAAS,QAAQ,IAAI,CAAC,YAAY;AAAA,QACzE,IAAI,OAAO;AAAA,QACX,MAAM,OAAO;AAAA,QACb,WAAW,OAAO;AAAA,QAClB,YAAY,OAAO,gBAAgB;AAAA,QACnC,WAAW,OAAO;AAAA,MACpB,EAAE;AAEF,iBAAW,aAAa;AACxB,uBAAiB,SAAS,eAAe;AAEzC,iBAAW,KAAK,eAAe,SAAS,kBAAkB,YAAY,UAAU;AAAA,IAElF,SAAS,KAAK;AACZ,YAAM,eAAe,oBAAoB,KAAK,4BAA4B;AAC1E,iBAAW,MAAM,+BAA+B,GAAG;AACnD,eAAS,YAAY;AAAA,IACvB,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,CAAC;AAKL,QAAM,iBAAa,4BAAY,OAAO,SAAmC;AACvE,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,eAAS,6BAA6B;AACtC,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,kBAAkB;AAElC,YAAM,QAAQ,qBAAqB,EAAE,MAAM,EAAE,KAAK,GAAG,cAAc,KAAK,CAAC;AAEzE,uBAAiB,KAAK;AACtB,iBAAW,CAAC,CAAC;AAEb,iBAAW,KAAK,2BAA2B;AAC3C,aAAO;AAAA,IAET,SAAS,KAAc;AACrB,YAAM,eAAe,oBAAoB,KAAK,2BAA2B;AACzE,iBAAW,MAAM,0BAA0B,GAAG;AAC9C,eAAS,YAAY;AACrB,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,CAAC;AAEL,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAxFkC;;;AC9DlC,IAAAC,iBAAyB;AAUlB,SAAS,kBAAqB,KAAa,cAAiB;AAEjE,QAAM,CAAC,aAAa,cAAc,QAAI,yBAAY,MAAM;AACtD,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO;AAAA,IACT;AAEA,QAAI;AACF,YAAM,OAAO,OAAO,eAAe,QAAQ,GAAG;AAC9C,aAAO,OAAO,KAAK,MAAM,IAAI,IAAI;AAAA,IACnC,SAAS,OAAO;AACd,iBAAW,MAAM,qCAAqC,GAAG,MAAM,KAAK;AACpE,aAAO;AAAA,IACT;AAAA,EACF,CAAC;AAGD,QAAM,gBAAgB,wBAAC,SAAuB;AAC5C,QAAI;AACF,YAAM,aAAa,KAAK,UAAU,IAAI;AACtC,YAAM,cAAc,IAAI,KAAK,CAAC,UAAU,CAAC,EAAE;AAC3C,YAAM,WAAW,cAAc;AAG/B,UAAI,WAAW,MAAM;AACnB,mBAAW,KAAK,cAAc,SAAS,QAAQ,CAAC,CAAC,kCAAkC,GAAG,GAAG;AACzF,eAAO;AAAA,MACT;AAEA,aAAO;AAAA,IACT,SAAS,OAAO;AACd,iBAAW,MAAM,qCAAqC,GAAG,MAAM,KAAK;AACpE,aAAO;AAAA,IACT;AAAA,EACF,GAjBsB;AAoBtB,QAAM,eAAe,6BAAM;AACzB,QAAI;AACF,YAAM,OAAO,OAAO,KAAK,cAAc,EAAE,OAAO,CAAAC,SAAOA,QAAO,OAAOA,SAAQ,QAAQ;AAErF,UAAI,KAAK,SAAS,IAAI;AACpB,cAAM,gBAAgB,KAAK,KAAK,KAAK,SAAS,GAAG;AACjD,iBAAS,IAAI,GAAG,IAAI,eAAe,KAAK;AACtC,cAAI;AACF,kBAAMA,OAAM,KAAK,CAAC;AAClB,gBAAIA,MAAK;AACP,6BAAe,WAAWA,IAAG;AAC7B,6BAAe,WAAW,GAAGA,IAAG,YAAY;AAAA,YAC9C;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,2CAA2C,KAAK;AAAA,IACnE;AAAA,EACF,GArBqB;AAwBrB,QAAM,gBAAgB,6BAAM;AAC1B,QAAI;AACF,YAAM,OAAO,OAAO,KAAK,cAAc;AACvC,iBAAWA,QAAO,MAAM;AACtB,YAAI;AACF,yBAAe,WAAWA,IAAG;AAAA,QAC/B,QAAQ;AAAA,QAER;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,wCAAwC,KAAK;AAAA,IAChE;AAAA,EACF,GAbsB;AAgBtB,QAAM,WAAW,wBAAC,UAA+B;AAC/C,QAAI;AACF,YAAM,eAAe,iBAAiB,WAAW,MAAM,WAAW,IAAI;AAGtE,UAAI,CAAC,cAAc,YAAY,GAAG;AAChC,mBAAW,KAAK,gCAAgC,GAAG,iBAAiB;AAEpE,YAAI;AACF,iBAAO,eAAe,WAAW,GAAG;AACpC,iBAAO,eAAe,WAAW,GAAG,GAAG,YAAY;AAAA,QACrD,QAAQ;AAAA,QAER;AAEA,uBAAe,YAAY;AAC3B;AAAA,MACF;AAEA,qBAAe,YAAY;AAE3B,UAAI,OAAO,WAAW,aAAa;AAEjC,YAAI;AACF,iBAAO,eAAe,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAE/D,iBAAO,eAAe,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,QACzE,SAAS,cAAmB;AAE1B,cAAI,aAAa,SAAS,wBACtB,aAAa,SAAS,MACtB,aAAa,SAAS,SAAS,OAAO,GAAG;AAC3C,uBAAW,KAAK,qDAAqD;AACrE,yBAAa;AAGb,gBAAI;AACF,qBAAO,eAAe,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAC/D,qBAAO,eAAe,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,YACzE,SAAS,YAAY;AACnB,yBAAW,MAAM,qCAAqC,GAAG,8BAA8B,UAAU;AAEjG,kBAAI;AACF,8BAAc;AACd,uBAAO,eAAe,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAC/D,uBAAO,eAAe,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,cACzE,SAAS,YAAY;AACnB,2BAAW,MAAM,qCAAqC,GAAG,2BAA2B,UAAU;AAE9F,+BAAe,YAAY;AAAA,cAC7B;AAAA,YACF;AAAA,UACF,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,qCAAqC,GAAG,MAAM,KAAK;AAEpE,YAAM,eAAe,iBAAiB,WAAW,MAAM,WAAW,IAAI;AACtE,qBAAe,YAAY;AAAA,IAC7B;AAAA,EACF,GA/DiB;AAkEjB,QAAM,cAAc,6BAAM;AACxB,QAAI;AACF,qBAAe,YAAY;AAC3B,UAAI,OAAO,WAAW,aAAa;AACjC,YAAI;AACF,iBAAO,eAAe,WAAW,GAAG;AACpC,iBAAO,eAAe,WAAW,GAAG,GAAG,YAAY;AAAA,QACrD,SAAS,aAAkB;AAEzB,cAAI,YAAY,SAAS,wBACrB,YAAY,SAAS,MACrB,YAAY,SAAS,SAAS,OAAO,GAAG;AAC1C,uBAAW,KAAK,oEAAoE;AACpF,yBAAa;AAEb,gBAAI;AACF,qBAAO,eAAe,WAAW,GAAG;AACpC,qBAAO,eAAe,WAAW,GAAG,GAAG,YAAY;AAAA,YACrD,SAAS,YAAY;AACnB,yBAAW,MAAM,wCAAwC,GAAG,qBAAqB,UAAU;AAE3F,4BAAc;AAAA,YAChB;AAAA,UACF,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,sCAAsC,GAAG,MAAM,KAAK;AAAA,IACvE;AAAA,EACF,GA/BoB;AAiCpB,SAAO,CAAC,aAAa,UAAU,WAAW;AAC5C;AAjLgB;;;ACVhB,IAAM,oBAAoB;AAW1B,IAAM,yBAAyB,6BAAc;AAC3C,MAAI,OAAO,WAAW,YAAa,QAAO;AAC1C,MAAI;AACF,UAAM,OAAO,OAAO,eAAe,QAAQ,iBAAiB;AAC5D,WAAO,OAAO,KAAK,MAAM,IAAI,IAAI;AAAA,EACnC,QAAQ;AACN,WAAO;AAAA,EACT;AACF,GAR+B;AAa/B,IAAM,2BAA2B,6BAAY;AAC3C,MAAI,OAAO,WAAW,YAAa;AACnC,MAAI;AACF,WAAO,eAAe,WAAW,iBAAiB;AAClD,WAAO,eAAe,WAAW,GAAG,iBAAiB,YAAY;AAAA,EACnE,QAAQ;AAAA,EAER;AACF,GARiC;AAU1B,IAAM,yBAAyB,wBAAC,UAA+B,CAAC,MAAM;AAC3E,QAAM,EAAE,cAAc,cAAc,aAAa,KAAK,IAAI;AAC1D,QAAM,CAAC,aAAa,gBAAgB,iBAAiB,IAAI,kBAA0B,mBAAmB,EAAE;AAExG,QAAM,cAAc,wBAAC,QAAgB;AACnC,mBAAe,GAAG;AAAA,EACpB,GAFoB;AAIpB,QAAM,cAAc,6BAAM;AAExB,WAAO,uBAAuB,KAAK;AAAA,EACrC,GAHoB;AAKpB,QAAM,gBAAgB,6BAAM;AAC1B,sBAAkB;AAClB,6BAAyB;AAAA,EAC3B,GAHsB;AAKtB,QAAM,cAAc,6BAAM;AACxB,UAAM,SAAS,uBAAuB;AACtC,WAAO,OAAO,SAAS,KAAK,YAAY,SAAS;AAAA,EACnD,GAHoB;AAKpB,QAAM,sBAAsB,6BAAM;AAEhC,UAAM,SAAS,uBAAuB;AACtC,WAAO,UAAU,eAAe;AAAA,EAClC,GAJ4B;AAM5B,QAAM,sBAAsB,6BAAM;AAGhC,UAAM,SAAS,uBAAuB;AACtC,UAAM,WAAW,UAAU,eAAe;AAE1C,QAAI,YAAY;AACd,oBAAc;AAAA,IAChB;AACA,WAAO;AAAA,EACT,GAV4B;AAY5B,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAlDsC;;;AClCtC,IAAAC,iBAAoC;AAY7B,IAAM,eAAe,wBAAC,UAA+B,CAAC,MAAM;AACjE,QAAM,EAAE,aAAa,SAAS,cAAc,MAAM,iBAAiB,gBAAgB,KAAK,IAAI;AAC5F,QAAM,EAAE,iBAAiB,WAAW,gBAAgB,IAAI,QAAQ;AAChE,QAAM,SAAS,aAAa;AAC5B,QAAM,CAAC,eAAe,gBAAgB,QAAI,yBAAS,KAAK;AAExD,gCAAU,MAAM;AACd,QAAI,CAAC,aAAa,eAAe,CAAC,mBAAmB,CAAC,eAAe;AAEnE,UAAI,iBAAiB,OAAO,WAAW,aAAa;AAClD,cAAM,aAAa,OAAO,SAAS,WAAW,OAAO,SAAS;AAC9D,wBAAgB,UAAU;AAAA,MAC5B;AAEA,uBAAiB,IAAI;AACrB,aAAO,KAAK,UAAU;AAAA,IACxB;AAAA,EACF,GAAG,CAAC,iBAAiB,WAAW,QAAQ,YAAY,aAAa,eAAe,eAAe,eAAe,CAAC;AAE/G,SAAO,EAAE,iBAAiB,WAAW,cAAc;AACrD,GApB4B;;;ACZ5B,IAAAC,iBAAoC;AAU7B,SAAS,gBAAmB,KAAa,cAAiB;AAE/D,QAAM,CAAC,aAAa,cAAc,QAAI,yBAAY,MAAM;AACtD,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO;AAAA,IACT;AAEA,QAAI;AACF,YAAM,OAAO,OAAO,aAAa,QAAQ,GAAG;AAC5C,UAAI,SAAS,MAAM;AACjB,eAAO;AAAA,MACT;AAGA,UAAI;AACF,eAAO,KAAK,MAAM,IAAI;AAAA,MACxB,QAAQ;AAEN,eAAO;AAAA,MACT;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,mCAAmC,GAAG,MAAM,KAAK;AAClE,aAAO;AAAA,IACT;AAAA,EACF,CAAC;AAGD,QAAM,gBAAgB,wBAAC,SAAuB;AAC5C,QAAI;AACF,YAAM,aAAa,KAAK,UAAU,IAAI;AACtC,YAAM,cAAc,IAAI,KAAK,CAAC,UAAU,CAAC,EAAE;AAC3C,YAAM,WAAW,cAAc;AAG/B,UAAI,WAAW,MAAM;AACnB,mBAAW,KAAK,cAAc,SAAS,QAAQ,CAAC,CAAC,kCAAkC,GAAG,GAAG;AACzF,eAAO;AAAA,MACT;AAEA,aAAO;AAAA,IACT,SAAS,OAAO;AACd,iBAAW,MAAM,qCAAqC,GAAG,MAAM,KAAK;AACpE,aAAO;AAAA,IACT;AAAA,EACF,GAjBsB;AAoBtB,QAAM,eAAe,6BAAM;AACzB,QAAI;AACF,YAAM,OAAO,OAAO,KAAK,YAAY,EAAE,OAAO,CAAAC,SAAOA,QAAO,OAAOA,SAAQ,QAAQ;AAEnF,UAAI,KAAK,SAAS,IAAI;AACpB,cAAM,gBAAgB,KAAK,KAAK,KAAK,SAAS,GAAG;AACjD,iBAAS,IAAI,GAAG,IAAI,eAAe,KAAK;AACtC,cAAI;AACF,kBAAMA,OAAM,KAAK,CAAC;AAClB,gBAAIA,MAAK;AACP,2BAAa,WAAWA,IAAG;AAC3B,2BAAa,WAAW,GAAGA,IAAG,YAAY;AAAA,YAC5C;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,yCAAyC,KAAK;AAAA,IACjE;AAAA,EACF,GArBqB;AAwBrB,QAAM,gBAAgB,6BAAM;AAC1B,QAAI;AACF,YAAM,OAAO,OAAO,KAAK,YAAY;AACrC,iBAAWA,QAAO,MAAM;AACtB,YAAI;AACF,uBAAa,WAAWA,IAAG;AAAA,QAC7B,QAAQ;AAAA,QAER;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,sCAAsC,KAAK;AAAA,IAC9D;AAAA,EACF,GAbsB;AAgBtB,QAAM,WAAW,wBAAC,UAA+B;AAC/C,QAAI;AACF,YAAM,eAAe,iBAAiB,WAAW,MAAM,WAAW,IAAI;AAGtE,UAAI,CAAC,cAAc,YAAY,GAAG;AAChC,mBAAW,KAAK,gCAAgC,GAAG,iBAAiB;AAEpE,YAAI;AACF,iBAAO,aAAa,WAAW,GAAG;AAClC,iBAAO,aAAa,WAAW,GAAG,GAAG,YAAY;AAAA,QACnD,QAAQ;AAAA,QAER;AAEA,uBAAe,YAAY;AAC3B;AAAA,MACF;AAEA,qBAAe,YAAY;AAE3B,UAAI,OAAO,WAAW,aAAa;AAEjC,YAAI;AAEF,cAAI,OAAO,iBAAiB,UAAU;AACpC,mBAAO,aAAa,QAAQ,KAAK,YAAY;AAAA,UAC/C,OAAO;AACL,mBAAO,aAAa,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAAA,UAC/D;AAEA,iBAAO,aAAa,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,QACvE,SAAS,cAAmB;AAE1B,cAAI,aAAa,SAAS,wBACtB,aAAa,SAAS,MACtB,aAAa,SAAS,SAAS,OAAO,GAAG;AAC3C,uBAAW,KAAK,mDAAmD;AACnE,yBAAa;AAGb,gBAAI;AAEF,kBAAI,OAAO,iBAAiB,UAAU;AACpC,uBAAO,aAAa,QAAQ,KAAK,YAAY;AAAA,cAC/C,OAAO;AACL,uBAAO,aAAa,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAAA,cAC/D;AACA,qBAAO,aAAa,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,YACvE,SAAS,YAAY;AACnB,yBAAW,MAAM,mCAAmC,GAAG,8BAA8B,UAAU;AAE/F,kBAAI;AACF,8BAAc;AAEd,oBAAI,OAAO,iBAAiB,UAAU;AACpC,yBAAO,aAAa,QAAQ,KAAK,YAAY;AAAA,gBAC/C,OAAO;AACL,yBAAO,aAAa,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAAA,gBAC/D;AACA,uBAAO,aAAa,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,cACvE,SAAS,YAAY;AACnB,2BAAW,MAAM,mCAAmC,GAAG,2BAA2B,UAAU;AAE5F,+BAAe,YAAY;AAAA,cAC7B;AAAA,YACF;AAAA,UACF,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,mCAAmC,GAAG,MAAM,KAAK;AAElE,YAAM,eAAe,iBAAiB,WAAW,MAAM,WAAW,IAAI;AACtE,qBAAe,YAAY;AAAA,IAC7B;AAAA,EACF,GA9EiB;AAiFjB,QAAM,cAAc,6BAAM;AACxB,QAAI;AACF,qBAAe,YAAY;AAC3B,UAAI,OAAO,WAAW,aAAa;AACjC,YAAI;AACF,iBAAO,aAAa,WAAW,GAAG;AAClC,iBAAO,aAAa,WAAW,GAAG,GAAG,YAAY;AAAA,QACnD,SAAS,aAAkB;AAEzB,cAAI,YAAY,SAAS,wBACrB,YAAY,SAAS,MACrB,YAAY,SAAS,SAAS,OAAO,GAAG;AAC1C,uBAAW,KAAK,kEAAkE;AAClF,yBAAa;AAEb,gBAAI;AACF,qBAAO,aAAa,WAAW,GAAG;AAClC,qBAAO,aAAa,WAAW,GAAG,GAAG,YAAY;AAAA,YACnD,SAAS,YAAY;AACnB,yBAAW,MAAM,sCAAsC,GAAG,qBAAqB,UAAU;AAEzF,4BAAc;AAAA,YAChB;AAAA,UACF,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,oCAAoC,GAAG,MAAM,KAAK;AAAA,IACrE;AAAA,EACF,GA/BoB;AAiCpB,SAAO,CAAC,aAAa,UAAU,WAAW;AAC5C;AA1MgB;;;ACKT,SAAS,aAAa,MAAsB;AACjD,MAAI,OAAO;AACT,WAAO;AAAA,EACT;AAEA,MAAI;AAEF,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO,KAAK,mBAAmB,IAAI,EAAE,QAAQ,mBAAmB,CAAC,GAAG,OAAO;AACzE,eAAO,OAAO,aAAa,SAAS,IAAI,EAAE,CAAC;AAAA,MAC7C,CAAC,CAAC;AAAA,IACJ;AAEA,WAAO,OAAO,KAAK,MAAM,OAAO,EAAE,SAAS,QAAQ;AAAA,EACrD,SAAS,OAAO;AACd,YAAQ,MAAM,0BAA0B,KAAK;AAC7C,WAAO;AAAA,EACT;AACF;AAlBgB;AAyBT,SAAS,aAAa,SAAyB;AACpD,MAAI,OAAO;AACT,WAAO;AAAA,EACT;AAEA,MAAI;AAEF,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,SAAS,KAAK,OAAO;AAC3B,YAAM,QAAQ,IAAI,WAAW,OAAO,MAAM;AAC1C,eAAS,IAAI,GAAG,IAAI,OAAO,QAAQ,KAAK;AACtC,cAAM,CAAC,IAAI,OAAO,WAAW,CAAC;AAAA,MAChC;AACA,aAAO;AAAA,QACL,MAAM,KAAK,KAAK,EACb,IAAI,UAAQ,OAAO,OAAO,KAAK,SAAS,EAAE,GAAG,MAAM,EAAE,CAAC,EACtD,KAAK,EAAE;AAAA,MACZ;AAAA,IACF;AAEA,WAAO,OAAO,KAAK,SAAS,QAAQ,EAAE,SAAS,OAAO;AAAA,EACxD,SAAS,OAAO;AACd,YAAQ,MAAM,0BAA0B,KAAK;AAC7C,WAAO;AAAA,EACT;AACF;AAzBgB;AA+BT,SAAS,YAAY;AAC1B,SAAO;AAAA,IACL,QAAQ;AAAA,IACR,QAAQ;AAAA,IACR;AAAA,EACF;AACF;AANgB;;;ACzDhB,IAAM,YAAY;AAClB,IAAM,gBAAgB;AACtB,IAAM,cAAc;AAkBb,SAAS,mBAAgC;AAC9C,MAAI;AACF,QAAI,OAAO,WAAW,YAAa,QAAO;AAE1C,UAAM,SAAS,aAAa,QAAQ,SAAS;AAC7C,QAAI,CAAC,QAAQ;AACX,iBAAc,MAAM,yBAAyB;AAC7C,aAAO;AAAA,IACT;AAGA,UAAM,UAAU,aAAa,MAAM;AACnC,UAAM,aAA4B,KAAK,MAAM,OAAO;AAGpD,QAAI,WAAW,YAAY,eAAe;AACxC,iBAAc,KAAK,wCAAwC;AAC3D,wBAAkB;AAClB,aAAO;AAAA,IACT;AAGA,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,MAAM,MAAM,WAAW;AAC7B,QAAI,MAAM,WAAW,KAAK;AACxB,iBAAc,KAAK,yBAAyB;AAC5C,wBAAkB;AAClB,aAAO;AAAA,IACT;AAEA,eAAc,MAAM,mBAAmB,KAAK,MAAM,MAAM,GAAI,GAAG,SAAS;AACxE,WAAO,WAAW;AAAA,EACpB,SAAS,OAAO;AACd,eAAc,MAAM,wBAAwB,KAAK;AACjD,sBAAkB;AAClB,WAAO;AAAA,EACT;AACF;AArCgB;AA4CT,SAAS,iBAAiB,SAAe,SAAqC;AACnF,MAAI;AACF,QAAI,OAAO,WAAW,YAAa;AAEnC,UAAM,aAA4B;AAAA,MAChC,SAAS;AAAA,MACT,MAAM;AAAA,MACN,WAAW,KAAK,IAAI;AAAA,MACpB,KAAK,SAAS,OAAO;AAAA,IACvB;AAGA,UAAM,UAAU,aAAa,KAAK,UAAU,UAAU,CAAC;AACvD,iBAAa,QAAQ,WAAW,OAAO;AACvC,eAAc,MAAM,wBAAwB,WAAW,MAAM,KAAM,SAAS;AAAA,EAC9E,SAAS,OAAO;AACd,eAAc,MAAM,wBAAwB,KAAK;AAAA,EACnD;AACF;AAlBgB;AAuBT,SAAS,oBAA0B;AACxC,MAAI;AACF,QAAI,OAAO,WAAW,YAAa;AACnC,iBAAa,WAAW,SAAS;AACjC,eAAc,MAAM,eAAe;AAAA,EACrC,SAAS,OAAO;AACd,eAAc,MAAM,yBAAyB,KAAK;AAAA,EACpD;AACF;AARgB;AAaT,SAAS,gBAAyB;AACvC,SAAO,iBAAiB,MAAM;AAChC;AAFgB;AAOT,SAAS,mBAKP;AACP,MAAI;AACF,QAAI,OAAO,WAAW,YAAa,QAAO;AAE1C,UAAM,SAAS,aAAa,QAAQ,SAAS;AAC7C,QAAI,CAAC,OAAQ,QAAO,EAAE,QAAQ,MAAM;AAGpC,UAAM,UAAU,aAAa,MAAM;AACnC,UAAM,aAA4B,KAAK,MAAM,OAAO;AACpD,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,MAAM,MAAM,WAAW;AAC7B,UAAM,YAAY,WAAW,MAAM;AAEnC,WAAO;AAAA,MACL,QAAQ;AAAA,MACR;AAAA,MACA,KAAK,WAAW;AAAA,MAChB,WAAW,KAAK,IAAI,GAAG,SAAS;AAAA,IAClC;AAAA,EACF,SAAS,OAAO;AACd,eAAc,MAAM,2BAA2B,KAAK;AACpD,WAAO;AAAA,EACT;AACF;AA7BgB;;;AChHhB,IAAAC,iBAA+C;AAO/C,IAAM,6BAA6B,KAAK,KAAK;AAC7C,IAAM,oBAAoB,IAAI,KAAK;AAcnC,SAAS,eAAe,OAA8B;AACpD,MAAI;AACF,UAAM,UAAU,KAAK,MAAM,KAAK,MAAM,MAAM,GAAG,EAAE,CAAC,CAAC,CAAC;AACpD,WAAO,QAAQ,MAAM;AAAA,EACvB,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAPS;AAYT,SAAS,oBAAoB,OAAe,aAA8B;AACxE,QAAM,SAAS,eAAe,KAAK;AACnC,MAAI,CAAC,OAAQ,QAAO;AAEpB,QAAM,kBAAkB,SAAS,KAAK,IAAI;AAC1C,SAAO,kBAAkB;AAC3B;AANS;AAWF,SAAS,gBAAgB,UAAkC,CAAC,GAAG;AACpE,QAAM,EAAE,UAAU,MAAM,WAAW,eAAe,IAAI;AACtD,QAAM,sBAAkB,uBAAO,KAAK;AAKpC,QAAM,mBAAe,4BAAY,YAA8B;AAC7D,QAAI,gBAAgB,SAAS;AAC3B,iBAAW,MAAM,mCAAmC;AACpD,aAAO;AAAA,IACT;AAEA,UAAM,oBAAoB,eAAY,gBAAgB;AACtD,QAAI,CAAC,mBAAmB;AACtB,iBAAW,KAAK,4BAA4B;AAC5C,aAAO;AAAA,IACT;AAEA,oBAAgB,UAAU;AAC1B,eAAW,KAAK,qBAAqB;AAErC,QAAI;AAEF,YAAM,SAAS,MAAM,gBAAgB,8BAA8B;AAAA,QACjE,MAAM,EAAE,SAAS,kBAAkB;AAAA,QACnC,cAAc;AAAA,MAChB,CAAC;AAED,YAAM,iBAAiB,OAAO,KAAK;AAEnC,UAAI,CAAC,gBAAgB;AACnB,cAAM,IAAI,MAAM,qCAAqC;AAAA,MACvD;AAEA,qBAAY,SAAS,cAAc;AACnC,qBAAY,gBAAgB,iBAAiB;AAC7C,iBAAW,KAAK,8BAA8B;AAE9C,kBAAY,cAAc;AAC1B,aAAO;AAAA,IACT,SAAS,OAAO;AACd,iBAAW,MAAM,wBAAwB,KAAK;AAC9C,uBAAiB,iBAAiB,QAAQ,QAAQ,IAAI,MAAM,OAAO,KAAK,CAAC,CAAC;AAC1E,aAAO;AAAA,IACT,UAAE;AACA,sBAAgB,UAAU;AAAA,IAC5B;AAAA,EACF,GAAG,CAAC,WAAW,cAAc,CAAC;AAK9B,QAAM,sBAAkB,4BAAY,YAAY;AAC9C,UAAM,QAAQ,eAAY,SAAS;AACnC,QAAI,CAAC,MAAO;AAEZ,QAAI,oBAAoB,OAAO,0BAA0B,GAAG;AAC1D,iBAAW,KAAK,6CAA6C;AAC7D,YAAM,aAAa;AAAA,IACrB;AAAA,EACF,GAAG,CAAC,YAAY,CAAC;AAGjB,gCAAU,MAAM;AACd,QAAI,CAAC,QAAS;AAGd,oBAAgB;AAGhB,UAAM,aAAa,YAAY,iBAAiB,iBAAiB;AAEjE,WAAO,MAAM,cAAc,UAAU;AAAA,EACvC,GAAG,CAAC,SAAS,eAAe,CAAC;AAG7B,gCAAU,MAAM;AACd,QAAI,CAAC,QAAS;AAEd,UAAM,cAAc,6BAAM;AACxB,iBAAW,MAAM,mCAAmC;AACpD,sBAAgB;AAAA,IAClB,GAHoB;AAKpB,WAAO,iBAAiB,SAAS,WAAW;AAC5C,WAAO,MAAM,OAAO,oBAAoB,SAAS,WAAW;AAAA,EAC9D,GAAG,CAAC,SAAS,eAAe,CAAC;AAG7B,gCAAU,MAAM;AACd,QAAI,CAAC,QAAS;AAEd,UAAM,eAAe,6BAAM;AACzB,iBAAW,KAAK,wCAAwC;AACxD,sBAAgB;AAAA,IAClB,GAHqB;AAKrB,WAAO,iBAAiB,UAAU,YAAY;AAC9C,WAAO,MAAM,OAAO,oBAAoB,UAAU,YAAY;AAAA,EAChE,GAAG,CAAC,SAAS,eAAe,CAAC;AAE7B,SAAO;AAAA,IACL;AAAA,IACA;AAAA,EACF;AACF;AA1GgB;;;ACtDhB,IAAAC,iBAAsC;AA0C/B,IAAM,mBAAmB,6BAA8B;AAC5D,QAAM,CAAC,WAAW,YAAY,QAAI,yBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,yBAAwB,IAAI;AACtD,QAAM,EAAE,OAAO,IAAI,QAAQ;AAE3B,QAAM,iBAAa,4BAAY,MAAM;AACnC,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAKL,QAAM,oBAAgB,4BAAY,YAA0C;AAC1E,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,qBAAqB;AAErC,YAAM,SAAS,MAAM,mBAAmB,+BAA+B,EAAE,cAAc,KAAK,CAAC;AAC7F,YAAM,WAAW,OAAO;AAExB,UAAI,CAAC,SAAS,SAAS;AACrB,mBAAW,MAAM,6BAA6B,SAAS,OAAO;AAC9D,iBAAS,SAAS,OAAO;AACzB,cAAM,IAAI,MAAM,SAAS,OAAO;AAAA,MAClC;AAAA,IAEF,SAASC,QAAO;AACd,iBAAW,MAAM,6BAA6BA,MAAK;AACnD,YAAMA;AAAA,IACR,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAIA,UAAM,OAAO;AACb,WAAO,EAAE,SAAS,MAAM,SAAS,+BAA+B;AAAA,EAClE,GAAG,CAAC,CAAC;AAEL,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GA/CgC;;;AC7BhC,IAAAC,iBAEO;;;ACXP,sBAA2B;;;ACF3B,iBAAkB;AAEX,IAAM,yBAAyB,aAAE,OAAO;AAAA,EAC7C,KAAK,aAAE,OAAO;AAAA,EACd,aAAa,aAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AACnD,CAAC;;;ACHD,iBAAmB;;;ACFnB,IAAAC,cAAkB;AAEX,IAAM,eAAe,cAAE,OAAO;AAAA,EACnC,KAAK,cAAE,OAAO;AAAA,EACd,aAAa,cAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC,EAAE,SAAS;AAAA,EAC5D,YAAY,cAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAClD,CAAC;;;ACJD,IAAAC,mBAA2B;;;ACF3B,IAAAC,cAAkB;AAEX,IAAM,yBAAyB,cAAE,OAAO;AAAA,EAC7C,OAAO,cAAE,QAAQ;AAAA,EACjB,SAAS,cAAE,OAAO,EAAE,SAAS;AAC/B,CAAC;;;ACHD,IAAAC,cAAmB;;;ACFnB,IAAAC,cAAkB;;;ACAlB,IAAAC,cAAkB;;;ACAlB,IAAAC,cAAkB;AAEX,IAAM,0BAA0B,cAAE,KAAK,CAAC,QAAQ,CAAC;;;ADCjD,IAAM,wBAAwB,cAAE,OAAO;AAAA,EAC5C,IAAI,cAAE,OAAO,EAAE,IAAI;AAAA,EACnB,UAAU;AAAA,EACV,kBAAkB,cAAE,OAAO;AAAA,EAC3B,mBAAmB,cAAE,OAAO;AAAA,EAC5B,gBAAgB,cAAE,MAAM;AAAA,EACxB,qBAAqB,cAAE,OAAO;AAAA,EAC9B,cAAc,cAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAAA,EAClD,eAAe,cAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AACrD,CAAC;;;ADTM,IAAM,4DAA4D,cAAE,MAAM,qBAAqB;;;AGDtG,IAAAC,mBAA2B;;;ACF3B,IAAAC,cAAkB;AAEX,IAAM,2DAA2D,cAAE,OAAO;AAAA,EAC/E,SAAS,cAAE,OAAO,EAAE,SAAS;AAC/B,CAAC;;;ACFD,IAAAC,mBAA2B;;;ACF3B,IAAAC,cAAkB;AAEX,IAAM,+BAA+B,cAAE,OAAO;AAAA,EACnD,mBAAmB,cAAE,OAAO;AAAA,EAC5B,OAAO,cAAE,OAAO;AAClB,CAAC;;;ACHD,IAAAC,mBAA2B;;;ACF3B,IAAAC,cAAkB;AAEX,IAAM,2BAA2B,cAAE,OAAO;AAAA,EAC/C,cAAc,cAAE,QAAQ,EAAE,QAAQ,KAAK,EAAE,SAAS;AAAA,EAClD,YAAY,cAAE,OAAO,EAAE,MAAM,iEAAiE,EAAE,SAAS,EAAE,SAAS;AAAA,EACpH,QAAQ,cAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EACvC,SAAS,cAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EACxC,MAAM,cAAE,OAAO,CAAC,CAAC,EAAE,YAAY,EAAE,SAAS,EAAE,SAAS;AAAA,EACrD,aAAa,cAAE,QAAQ;AAAA,EACvB,mBAAmB,cAAE,QAAQ;AAAA,EAC7B,mBAAmB,cAAE,QAAQ,EAAE,SAAS;AAC1C,CAAC;;;ACTD,IAAAC,cAAmB;;;ACFnB,IAAAC,eAAkB;AAEX,IAAM,+BAA+B,eAAE,OAAO;AAAA,EACnD,WAAW,eAAE,MAAM,eAAE,OAAO,CAAC,CAAC,EAAE,YAAY,CAAC;AAC/C,CAAC;;;ACFD,IAAAC,mBAA2B;;;ACF3B,IAAAC,eAAkB;AAEX,IAAM,2BAA2B,eAAE,OAAO;AAAA,EAC/C,SAAS,eAAE,OAAO;AACpB,CAAC;;;ADOM,SAAS,+BACd,QACA;AACA,aAAO,iBAAAC;AAAA,IACL,CAAC,iCAAiC;AAAA,IAClC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,YAAY,4BAA4B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AACjG,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,yBAAyB,UAAU,IAAI;AACtD,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;AEThB,IAAAC,mBAA2B;;;ACF3B,IAAAC,eAAkB;;;ACAlB,IAAAC,eAAkB;;;ACAlB,IAAAC,eAAkB;AAEX,IAAM,wBAAwB,eAAE,OAAO;AAAA,EAC5C,OAAO,eAAE,OAAO;AAAA,EAChB,gBAAgB,eAAE,OAAO;AAAA,EACzB,YAAY,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAAA,EAChD,UAAU,eAAE,MAAM,eAAE,OAAO,CAAC;AAC9B,CAAC;;;ADJM,IAAM,aAAa,eAAE,OAAO;AAAA,EACjC,IAAI,eAAE,OAAO,EAAE,IAAI;AAAA,EACnB,OAAO,eAAE,MAAM;AAAA,EACf,YAAY,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EACnD,WAAW,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EAClD,WAAW,eAAE,OAAO;AAAA,EACpB,UAAU,eAAE,OAAO;AAAA,EACnB,kBAAkB,eAAE,OAAO;AAAA,EAC3B,SAAS,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS,EAAE,SAAS;AAAA,EACjD,OAAO,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EAC9C,UAAU,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS,EAAE,SAAS;AAAA,EAClD,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EACjD,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EACjD,QAAQ,eAAE,OAAO,EAAE,SAAS;AAAA,EAC5B,UAAU,eAAE,QAAQ;AAAA,EACpB,cAAc,eAAE,QAAQ;AAAA,EACxB,aAAa,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAAA,EACjD,YAAY,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC,EAAE,SAAS;AAAA,EAC3D,2BAA2B,eAAE,OAAO,EAAE,IAAI,EAAE,QAAQ,CAAC;AAAA,EACrD,YAAY,sBAAsB,SAAS;AAAA,EAC3C,SAAS,eAAE,OAAO,EAAE,SAAS;AAC/B,CAAC;;;ADrBM,IAAM,0BAA0B,eAAE,OAAO;AAAA,EAC9C,cAAc,eAAE,QAAQ,EAAE,QAAQ,KAAK,EAAE,SAAS;AAAA,EAClD,YAAY,eAAE,OAAO,EAAE,MAAM,iEAAiE,EAAE,SAAS,EAAE,SAAS;AAAA,EACpH,SAAS,eAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EACxC,QAAQ,eAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EACvC,MAAM,WAAW,SAAS,EAAE,SAAS;AAAA,EACrC,mBAAmB,eAAE,QAAQ,EAAE,SAAS;AAC1C,CAAC;;;ADCM,SAAS,8BACd,QACA;AACA,aAAO,iBAAAC;AAAA,IACL,CAAC,gCAAgC;AAAA,IACjC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,YAAY,2BAA2B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AAChG,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,wBAAwB,UAAU,IAAI;AACrD,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;AIThB,IAAAC,mBAA2B;AASpB,SAAS,kCACd,QACA;AACA,aAAO,iBAAAC;AAAA,IACL,CAAC,oCAAoC;AAAA,IACrC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,mBAAmB,+BAA+B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AAC3G,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,WAAW,UAAU,IAAI;AACxC,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;ACThB,IAAAC,mBAA2B;;;ACF3B,IAAAC,eAAkB;AAEX,IAAM,8BAA8B,eAAE,OAAO;AAAA,EAClD,SAAS,eAAE,QAAQ;AAAA,EACnB,SAAS,eAAE,OAAO;AACpB,CAAC;;;ACHD,IAAAC,oBAA2B;;;ACA3B,IAAAC,oBAA2B;AASpB,SAAS,mCACd,QACA;AACA,aAAO,kBAAAC;AAAA,IACL,CAAC,qCAAqC;AAAA,IACtC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,mBAAmB,gCAAgC,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AAC5G,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,WAAW,UAAU,IAAI;AACxC,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;ACThB,IAAAC,cAAmB;;;ACAnB,IAAAC,oBAA2B;;;ACA3B,IAAAC,oBAA2B;AASpB,SAAS,kCACd,QACA;AACA,aAAO,kBAAAC;AAAA,IACL,CAAC,oCAAoC;AAAA,IACrC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,mBAAmB,+BAA+B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AAC3G,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,WAAW,UAAU,IAAI;AACxC,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;ACThB,IAAAC,oBAA2B;;;ACF3B,IAAAC,eAAkB;AAEX,IAAM,qBAAqB,eAAE,OAAO;AAAA,EACzC,QAAQ,eAAE,OAAO;AAAA,EACjB,SAAS,eAAE,OAAO;AACpB,CAAC;;;ADMM,SAAS,iCACd,QACA;AACA,aAAO,kBAAAC;AAAA,IACL,CAAC,mCAAmC;AAAA,IACpC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,gBAAgB,8BAA8B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AACvG,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,mBAAmB,UAAU,IAAI;AAChD,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;AEXhB,IAAAC,eAAkB;AAEX,IAAM,sBAAsB,eAAE,OAAO;AAAA,EAC1C,KAAK,eAAE,OAAO,EAAE,IAAI,CAAC;AAAA,EACrB,aAAa,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC,EAAE,SAAS;AAAA,EAC5D,YAAY,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAClD,CAAC;;;ACND,IAAAC,eAAkB;AAEX,IAAM,0BAA0B,eAAE,OAAO;AAAA,EAC9C,KAAK,eAAE,OAAO,EAAE,IAAI,CAAC;AACvB,CAAC;;;ACJD,IAAAC,eAAkB;AAEX,IAAM,6BAA6B,eAAE,OAAO;AAAA,EACjD,YAAY,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACxC,WAAW,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACvC,SAAS,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS;AAAA,EACtC,OAAO,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACnC,UAAU,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS;AAAA,EACvC,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACtC,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AACxC,CAAC;;;ACVD,IAAAC,eAAkB;AAEX,IAAM,qCAAqC,eAAE,OAAO;AAAA,EACzD,cAAc,eAAE,OAAO,EAAE,SAAS;AAAA,EAClC,YAAY,eAAE,OAAO,EAAE,SAAS;AAClC,CAAC;;;ACLD,IAAAC,eAAkB;AAEX,IAAM,oCAAoC,eAAE,OAAO;AAAA,EACxD,MAAM,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,IAAI,GAAG;AAAA,EAChC,OAAO,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,IAAI,GAAG;AAAA,EACjC,cAAc,eAAE,OAAO,EAAE,SAAS;AACpC,CAAC;;;ACND,IAAAC,eAAkB;AAGX,IAAM,sCAAsC,eAAE,OAAO;AAAA,EAC1D,UAAU;AACZ,CAAC;;;ACLD,IAAAC,eAAkB;AAEX,IAAM,mBAAmB,eAAE,OAAO;AAAA,EACvC,OAAO,eAAE,OAAO;AAAA,EAChB,mBAAmB,eAAE,OAAO,EAAE,SAAS;AACzC,CAAC;;;ACLD,IAAAC,eAAkB;AAEX,IAAM,yBAAyB,eAAE,OAAO;AAAA,EAC7C,OAAO,eAAE,OAAO;AAAA,EAChB,YAAY,eAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EAC3C,aAAa,eAAE,OAAO,EAAE,IAAI,EAAE,SAAS,EAAE,SAAS;AACpD,CAAC;;;ACND,IAAAC,eAAkB;AAEX,IAAM,0BAA0B,eAAE,OAAO;AAAA,EAC9C,YAAY,eAAE,OAAO,EAAE,IAAI,CAAC;AAAA,EAC5B,YAAY,eAAE,OAAO,EAAE,SAAS;AAClC,CAAC;;;ACLD,IAAAC,eAAkB;AAEX,IAAM,yBAAyB,eAAE,OAAO;AAAA,EAC7C,YAAY,eAAE,OAAO,EAAE,IAAI,CAAC;AAAA,EAC5B,KAAK,eAAE,OAAO,EAAE,IAAI,CAAC,EAAE,IAAI,CAAC;AAAA,EAC5B,YAAY,eAAE,OAAO,EAAE,SAAS;AAClC,CAAC;;;ACND,IAAAC,eAAkB;AAEX,IAAM,oCAAoC,eAAE,OAAO;AAAA,EACxD,YAAY,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACxC,WAAW,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACvC,SAAS,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS;AAAA,EACtC,OAAO,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACnC,UAAU,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS;AAAA,EACvC,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACtC,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AACxC,CAAC;;;ACVD,IAAAC,eAAkB;AAEX,IAAM,4BAA4B,eAAE,OAAO;AAAA,EAChD,SAAS,eAAE,OAAO,EAAE,IAAI,CAAC;AAC3B,CAAC;;;A9CmNG;AAvJJ,IAAM,sBAAkB,8BAAgD,MAAS;AAM1E,SAAS,iBAAiB,EAAE,SAAS,GAA0B;AACpE,QAAM,CAAC,SAAS,UAAU,QAAI,yBAA2B,MAAM;AAC7D,UAAM,SAAS,iBAAiB;AAChC,WAAO,UAAU;AAAA,EACnB,CAAC;AACD,QAAM,CAAC,kBAAkB,mBAAmB,QAAI,yBAAS,KAAK;AAC9D,QAAM,CAAC,cAAc,eAAe,QAAI,yBAAuB,IAAI;AAEnE,QAAM,iBAAa,uBAAyB,OAAO;AACnD,QAAM,mBAAe,uBAAO,KAAK;AAEjC,gCAAU,MAAM;AACd,eAAW,UAAU;AAAA,EACvB,GAAG,CAAC,OAAO,CAAC;AAEZ,gCAAU,MAAM;AACd,iBAAa,UAAU;AAAA,EACzB,GAAG,CAAC,gBAAgB,CAAC;AAErB,QAAM,EAAE,SAAS,qBAAqB,IAAI,kCAAkC;AAC5E,QAAM,EAAE,SAAS,4BAA4B,IAAI,mCAAmC;AACpF,QAAM,EAAE,SAAS,cAAc,IAAI,kCAAkC;AACrE,QAAM,EAAE,SAAS,kBAAkB,IAAI,+BAA+B;AACtE,QAAM,EAAE,SAAS,iBAAiB,IAAI,8BAA8B;AACpE,QAAM,EAAE,SAAS,oBAAoB,IAAI,iCAAiC;AAE1E,QAAM,qBAAiB,4BAAY,OAAO,YAAgF;AACxH,UAAM,EAAE,UAAU,MAAM,IAAI,WAAW,CAAC;AAExC,QAAI,aAAa,SAAS;AACxB,iBAAW,MAAM,kDAAkD,QAAQ,GAAG;AAC9E,aAAO,WAAW;AAAA,IACpB;AAEA,wBAAoB,IAAI;AACxB,iBAAa,UAAU;AACvB,oBAAgB,IAAI;AACpB,QAAI;AACF,iBAAW,MAAM,sCAAsC,QAAQ,YAAY,KAAK,GAAG;AACnF,YAAM,MAAM,MAAM,mBAAmB,2BAA2B,EAAE,cAAc,KAAK,CAAC;AACtF,YAAM,SAAS,IAAI;AACnB,iBAAW,MAAM;AACjB,iBAAW,UAAU;AACrB,uBAAiB,MAAM;AACvB,aAAO;AAAA,IACT,SAAS,OAAO;AACd,YAAM,MAAM,iBAAiB,QAAQ,QAAQ,IAAI,MAAM,yBAAyB;AAChF,sBAAgB,GAAG;AACnB,YAAM;AAAA,IACR,UAAE;AACA,0BAAoB,KAAK;AACzB,mBAAa,UAAU;AAAA,IACzB;AAAA,EACF,GAAG,CAAC,CAAC;AAEL,QAAM,gBAAgB,8BAAO,SAA8C;AACzE,UAAM,qBAAqB,EAAE,MAAM,KAAK,CAAC;AACzC,UAAM,OAAO,MAAM,eAAe,EAAE,UAAU,iBAAiB,OAAO,KAAK,CAAC;AAC5E,WAAO;AAAA,EACT,GAJsB;AAMtB,QAAM,uBAAuB,8BAAO,SAAqD;AACvF,UAAM,4BAA4B,EAAE,MAAM,KAAK,CAAC;AAChD,UAAM,OAAO,MAAM,eAAe,EAAE,UAAU,wBAAwB,OAAO,KAAK,CAAC;AACnF,WAAO;AAAA,EACT,GAJ6B;AAM7B,QAAM,eAAe,8BAAO,WAAuC;AACjE,UAAM,cAAc,EAAE,MAAM,EAAE,OAAO,EAAE,CAAC;AACxC,UAAM,OAAO,MAAM,eAAe,EAAE,UAAU,gBAAgB,OAAO,KAAK,CAAC;AAC3E,WAAO;AAAA,EACT,GAJqB;AAMrB,QAAM,aAAa,8BAAO,SAAyD;AACjF,UAAM,SAAS,MAAM,kBAAkB,EAAE,MAAM,KAAK,CAAC;AACrD,WAAO;AAAA,EACT,GAHmB;AAKnB,QAAM,YAAY,8BAAO,SAAuD;AAC9E,UAAM,SAAU,MAAM,iBAAiB,EAAE,MAAM,KAAK,CAAC;AAErD,QAAI,OAAO,gBAAgB,OAAO,YAAY;AAC5C,iBAAW,KAAK,0BAA0B,OAAO,UAAU;AAC3D,aAAO;AAAA,IACT;AAEA,QAAI,OAAO,UAAU,OAAO,SAAS;AACnC,qBAAe,SAAS,OAAO,MAAM;AACrC,qBAAe,gBAAgB,OAAO,OAAO;AAC7C,UAAI;AACF,cAAM,eAAe,EAAE,UAAU,aAAa,OAAO,KAAK,CAAC;AAAA,MAC7D,SAASC,eAAc;AACrB,mBAAW,KAAK,+DAA+DA,aAAY;AAAA,MAC7F;AAAA,IACF;AAEA,WAAO;AAAA,EACT,GAnBkB;AAqBlB,QAAM,eAAe,8BAAO,YAA2C;AACrE,UAAM,OAA4B,EAAE,QAAQ;AAC5C,UAAM,SAAU,MAAM,oBAAoB,EAAE,KAAK,CAAC;AAElD,QAAI,OAAO,QAAQ;AACjB,qBAAe,SAAS,OAAO,MAAM;AACrC,qBAAe,gBAAgB,OAAO;AAAA,IACxC;AAEA,WAAO;AAAA,EACT,GAVqB;AAYrB,QAAM,aAAS,4BAAY,MAAM;AAC/B,mBAAe,WAAW;AAC1B,eAAW,MAAS;AACpB,oBAAgB,IAAI;AACpB,sBAAkB;AAAA,EACpB,GAAG,CAAC,CAAC;AAEL,QAAM,YAA8B,wBAAQ,OAAO;AAAA,IACjD;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI;AAAA,IACF;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AAED,SACE,4CAAC,gBAAgB,UAAhB,EAAyB,OACvB,UACH;AAEJ;AArJgB;AAuJT,SAAS,qBAA2C;AACzD,QAAM,cAAU,2BAAW,eAAe;AAC1C,MAAI,CAAC,SAAS;AACZ,UAAM,IAAI,MAAM,yDAAyD;AAAA,EAC3E;AACA,SAAO;AACT;AANgB;;;AtCgZV,IAAAC,sBAAA;AAzlBN,IAAM,gBAAgB;AAAA,EACpB,MAAM;AAAA,EACN,iBAAiB;AAAA,EACjB,qBAAqB;AACvB;AAEA,IAAM,kBAAc,8BAA2C,MAAS;AAGxE,IAAM,oBAAoB;AAE1B,IAAM,iBAAiB,6BAAe;AACpC,MAAI,OAAO,WAAW,YAAa,QAAO;AAC1C,SAAO,eAAY,gBAAgB;AACrC,GAHuB;AAMvB,IAAM,uBAAoD,wBAAC,EAAE,UAAU,OAAO,MAAM;AAClF,QAAM,WAAW,mBAAmB;AAGpC,QAAM,kBAAkB,uBAAuB;AAAA,IAC7C,aAAa,QAAQ,QAAQ,mBAAmB,cAAc;AAAA,IAC9D,YAAY;AAAA,EACd,CAAC;AAGD,QAAM,CAAC,WAAW,YAAY,QAAI,yBAAS,MAAM;AAE/C,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,YAAY,eAAe;AAEjC,aAAO,CAAC;AAAA,IACV;AACA,WAAO;AAAA,EACT,CAAC;AAED,QAAM,CAAC,aAAa,cAAc,QAAI,yBAAS,KAAK;AACpD,QAAM,SAAS,aAAa;AAC5B,QAAM,eAAW,gCAAY;AAC7B,QAAM,cAAc,eAAe;AAGnC,QAAM,CAAC,aAAa,gBAAgB,gBAAgB,IAAI,gBAA+B,mBAAmB,IAAI;AAG9G,kBAAgB;AAAA,IACd,SAAS;AAAA,IACT,WAAW,wBAAC,aAAa;AACvB,iBAAW,KAAK,mCAAmC;AAAA,IACrD,GAFW;AAAA,IAGX,gBAAgB,wBAAC,UAAU;AACzB,iBAAW,KAAK,8BAA8B,MAAM,OAAO;AAAA,IAE7D,GAHgB;AAAA,EAIlB,CAAC;AAGD,QAAM,OAAO,SAAS;AAGtB,QAAM,cAAU,uBAAO,IAAI;AAC3B,QAAM,gBAAY,uBAAO,MAAM;AAC/B,QAAM,0BAAsB,uBAAO,KAAK;AAGxC,gCAAU,MAAM;AACd,YAAQ,UAAU;AAAA,EACpB,GAAG,CAAC,IAAI,CAAC;AAET,gCAAU,MAAM;AACd,cAAU,UAAU;AAAA,EACtB,GAAG,CAAC,MAAM,CAAC;AAKX,QAAM,qBAAiB,4BAAY,CAAC,WAAmB;AACrD,eAAW,KAAK,4BAA4B,MAAM;AAClD,mBAAY,WAAW;AACvB,sBAAkB;AAElB,mBAAe,IAAI;AACnB,iBAAa,KAAK;AAAA,EACpB,GAAG,CAAC,CAAC;AAIL,QAAM,4BAAwB,4BAAY,CAAC,OAAY,UAAkB,kBAAkB;AAGzF,UAAM,cAAc,OAAO,WAAW,OAClB,OAAO,eAAe,OACtB,OAAO,SAAS,qBAChB,OAAO,SAAS;AAEpC,QAAI,aAAa;AACf,iBAAW,KAAK,2BAA2B,OAAO,mBAAmB;AACrE,qBAAe,mBAAmB,OAAO,EAAE;AAC3C,aAAO;AAAA,IACT;AAGA,QAAI,OAAO,YAAY,OAAO;AAC5B,iBAAW,KAAK,qBAAqB,OAAO,4BAA4B,OAAO,WAAW,KAAK;AAAA,IACjG;AAEA,WAAO;AAAA,EACT,GAAG,CAAC,cAAc,CAAC;AAGnB,QAAM,0BAAsB,uBAAO,KAAK;AACxC,QAAM,iBAAa,4BAAY,CAAC,UAAe;AAC7C,UAAM,cAAc,OAAO,WAAW,OAClB,OAAO,eAAe,OACtB,OAAO,SAAS,qBAChB,OAAO,SAAS;AAEpC,QAAI,eAAe,CAAC,oBAAoB,SAAS;AAC/C,0BAAoB,UAAU;AAC9B,iBAAW,KAAK,qCAAqC;AACrD,qBAAe,gBAAgB;AAE/B,YAAM,kBAAkB,UAAU,SAAS,QAAQ,uBAAuB,cAAc;AACxF,aAAO,YAAY,eAAe;AAAA,IACpC;AAAA,EACF,GAAG,CAAC,gBAAgB,MAAM,CAAC;AAC3B,QAAM,gBAAY,wBAAQ,OAAO,EAAE,SAAS,WAAW,IAAI,CAAC,UAAU,CAAC;AAGvE,QAAM,yBAAqB,4BAAY,OAAO,aAAqC;AACjF,UAAM,gBAAgB,YAAY;AAGlC,QAAI,oBAAoB,SAAS;AAC/B,iBAAW,MAAM,sEAAsE,aAAa,EAAE;AACtG;AAAA,IACF;AAEA,eAAW,MAAM,iCAAiC,aAAa,EAAE;AAEjE,QAAI;AACF,0BAAoB,UAAU;AAG9B,YAAM,SAAS,eAAY,gBAAgB;AAC3C,YAAM,QAAQ,eAAY,SAAS;AAGnC,UAAI,CAAC,QAAQ;AACX,mBAAW,KAAK,+CAA+C;AAC/D,cAAM,IAAI,MAAM,+BAA+B;AAAA,MACjD;AAGA,UAAI,SAAS,WAAW,CAAC,SAAS,kBAAkB;AAClD,mBAAW,MAAM,8DAA8D;AAC/E,uBAAe,IAAI;AACnB;AAAA,MACF;AAGA,YAAM,mBAAmB,MAAM,SAAS,eAAe,EAAE,UAAU,cAAc,CAAC;AAElF,UAAI,kBAAkB;AACpB,mBAAW,KAAK,gCAAgC,iBAAiB,EAAE;AAAA,MACrE,OAAO;AACL,mBAAW,KAAK,yDAAyD;AAAA,MAC3E;AAIA,qBAAe,IAAI;AAAA,IACrB,SAAS,OAAY;AACnB,iBAAW,MAAM,2BAA2B,KAAK;AAGjD,YAAM,cAAc,OAAO,WAAW,OAClB,OAAO,eAAe,OACtB,OAAO,SAAS,qBAChB,OAAO,SAAS;AAEpC,UAAI,aAAa;AACf,mBAAW,KAAK,wCAAwC;AACxD,uBAAe,8BAA8B;AAAA,MAC/C,OAAO;AAEL,mBAAW,KAAK,0DAA0D;AAC1E,uBAAe,IAAI;AAAA,MACrB;AAAA,IACF,UAAE;AACA,0BAAoB,UAAU;AAAA,IAChC;AAAA,EACF,GAAG,CAAC,gBAAgB,uBAAuB,QAAQ,CAAC;AAGpD,gCAAU,MAAM;AACd,QAAI,YAAa;AAEjB,UAAM,iBAAiB,mCAAY;AACjC,iBAAW,KAAK,sBAAsB;AAGtC,YAAM,aAAa,OAAO,WAAW,eAAe,OAAO,SAAS,OAAO;AAC3E,iBAAW,KAAK,iBAAiB,UAAU;AAG3C,YAAM,QAAQ,eAAY,SAAS;AACnC,YAAMC,gBAAe,eAAY,gBAAgB;AACjD,iBAAW,KAAK,mBAAmB,QAAQ,GAAG,MAAM,UAAU,GAAG,EAAE,CAAC,QAAQ,MAAM;AAClF,iBAAW,KAAK,2BAA2BA,gBAAe,GAAGA,cAAa,UAAU,GAAG,EAAE,CAAC,QAAQ,MAAM;AACxG,iBAAW,KAAK,sBAAsB,OAAO,KAAK,YAAY,EAAE,OAAO,OAAK,EAAE,SAAS,OAAO,KAAK,EAAE,SAAS,MAAM,CAAC,CAAC;AAEtH,YAAM,YAAY,eAAe;AACjC,iBAAW,KAAK,eAAe,SAAS;AAGxC,UAAI,QAAQ,SAAS;AACnB,mBAAW,KAAK,yEAAyE;AACzF,uBAAe,IAAI;AACnB,qBAAa,KAAK;AAClB;AAAA,MACF;AAGA,YAAM,gBAAgB,iBAAiB;AACvC,UAAI,eAAe;AACjB,mBAAW,KAAK,2DAA2D;AAC3E,uBAAe,IAAI;AACnB,qBAAa,KAAK;AAClB;AAAA,MACF;AAIA,UAAI,cAAc,CAAC,WAAW;AAC5B,mBAAW,KAAK,+EAA+E;AAC/F,mBAAW,KAAK,wEAAwE;AACxF,uBAAe,IAAI;AACnB,qBAAa,KAAK;AAClB;AAAA,MACF;AAEA,UAAI,WAAW;AACb,qBAAa,IAAI;AACjB,YAAI;AACF,qBAAW,KAAK,8CAA8C;AAC9D,gBAAM,mBAAmB,4BAA4B;AAAA,QACvD,SAAS,OAAY;AACnB,qBAAW,MAAM,iDAAiD,KAAK;AAEvE,gBAAM,cAAc,OAAO,WAAW,OAClB,OAAO,eAAe,OACtB,OAAO,SAAS,qBAChB,OAAO,SAAS;AAEpC,cAAI,aAAa;AACf,2BAAe,0BAA0B;AAAA,UAC3C,OAAO;AACL,uBAAW,KAAK,8CAA8C;AAC9D,2BAAe,IAAI;AAAA,UACrB;AAAA,QACF;AACA,qBAAa,KAAK;AAAA,MACpB,OAAO;AACL,uBAAe,IAAI;AACnB,qBAAa,KAAK;AAAA,MACpB;AAAA,IACF,GArEuB;AAuEvB,mBAAe;AAAA,EAEjB,GAAG,CAAC,WAAW,CAAC;AAGhB,gCAAU,MAAM;AACd,QAAI,CAAC,YAAa;AAGlB,UAAM,kBAAkB,eAAY,gBAAgB;AACpD,UAAM,YAAY,QAAQ,QAAQ,QAAQ,cAAc;AACxD,UAAM,aAAa,aAAa;AAChC,UAAM,YAAY,YAAY,IAAI,MAAM;AAIxC,QAAI,mBAAmB,cAAc,CAAC,WAAW;AAC/C,YAAM,cAAc,QAAQ,QAAQ,mBAAmB,cAAc;AACrE,aAAO,KAAK,WAAW;AAAA,IACzB;AAAA,EACF,GAAG,CAAC,aAAa,UAAU,aAAa,QAAQ,MAAM,CAAC;AAEvD,QAAM,+BAA2B,4BAAY,MAAM;AACjD,UAAM,cAAc,QAAQ,QAAQ,mBAAmB,cAAc;AACrE,WAAO,KAAK,WAAW;AAAA,EACzB,GAAG,CAAC,QAAQ,QAAQ,MAAM,CAAC;AAE3B,QAAM,mCAA+B,4BAAY,MAAM;AACrD,UAAM,kBAAkB,QAAQ,QAAQ,uBAAuB,cAAc;AAC7E,WAAO,KAAK,eAAe;AAAA,EAC7B,GAAG,CAAC,QAAQ,QAAQ,MAAM,CAAC;AAG3B,QAAM,2BAAuB,4BAAY,YAAY;AACnD,QAAI;AACF,mBAAa,IAAI;AACjB,YAAM,kBAAkB,eAAY,gBAAgB;AAEpD,UAAI,iBAAiB;AACnB,cAAM,mBAAmB;AACzB,YAAI,QAAQ,SAAS;AACnB,mCAAyB;AAAA,QAC3B;AAAA,MACF,OAAO;AACL,qCAA6B;AAAA,MAC/B;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,mCAAmC,KAAK;AAEzD,UAAI,CAAC,sBAAsB,OAAO,sBAAsB,GAAG;AACzD,uBAAe,sBAAsB;AAAA,MACvC;AACA,mCAA6B;AAAA,IAC/B,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,oBAAoB,gBAAgB,0BAA0B,8BAA8B,qBAAqB,CAAC;AAGtH,QAAM,iBAAa;AAAA,IACjB,OAAO,YAAoB,cAAiH;AAE1I,qBAAY,WAAW;AAEvB,UAAI;AACF,cAAM,SAAS,MAAM,SAAS,WAAW;AAAA,UACvC;AAAA,UACA,YAAY;AAAA,QACd,CAAC;AAGD,kBAAU,iDAAuC;AAAA,UAC/C;AAAA,UACA,OAAO;AAAA,QACT,CAAC;AAED,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS,OAAO,WAAW;AAAA,QAC7B;AAAA,MACF,SAAS,OAAO;AACd,mBAAW,MAAM,sBAAsB,KAAK;AAE5C,YAAI,iBAAiB,UAAU;AAC7B,gBAAM,aAAa,MAAM,UAAU,eAAe,MAAM,UAAU;AAElE,gBAAM,UAAU,MAAM,UAAU,SAAS,MAAM,UAAU,UAAU,MAAM,UAAU,WAAW,MAAM;AACpG,iBAAO;AAAA,YACL,SAAS;AAAA,YACT,YAAY,MAAM;AAAA,YAClB;AAAA,YACA,YAAY,OAAO,eAAe,WAAW,aAAa;AAAA,UAC5D;AAAA,QACF;AAEA,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS;AAAA,QACX;AAAA,MACF;AAAA,IACF;AAAA,IACA,CAAC,QAAQ;AAAA,EACX;AAEA,QAAM,gBAAY;AAAA,IAChB,OAAO,YAAoB,SAAiB,WAAoB,aAAsB,iBAOhF;AACJ,UAAI;AAEF,cAAM,SAAS,MAAM,SAAS,UAAU;AAAA,UACtC;AAAA,UACA,KAAK;AAAA,UACL,YAAY;AAAA,QACd,CAAC;AAGD,YAAI,OAAO,gBAAgB,OAAO,YAAY;AAC5C,qBAAW,KAAK,0BAA0B,OAAO,UAAU;AAC3D,iBAAO;AAAA,YACL,SAAS;AAAA,YACT,SAAS;AAAA,YACT,cAAc;AAAA,YACd,YAAY,OAAO;AAAA,YACnB,mBAAmB,OAAO;AAAA,UAC5B;AAAA,QACF;AAGA,YAAI,CAAC,OAAO,UAAU,CAAC,OAAO,SAAS;AACrC,qBAAW,MAAM,yCAAyC,MAAM;AAChE,iBAAO;AAAA,YACL,SAAS;AAAA,YACT,SAAS;AAAA,UACX;AAAA,QACF;AAGA,YAAI,WAAW,SAAS,GAAG,GAAG;AAC5B,yBAAe,UAAU;AAAA,QAC3B;AAGA,cAAM,IAAI,QAAQ,aAAW,WAAW,SAAS,GAAG,CAAC;AAGrD,kBAAU,qDAAyC;AAAA,UACjD;AAAA,UACA,OAAO;AAAA,QACT,CAAC;AAGD,YAAI,OAAO,MAAM,IAAI;AACnB,oBAAU,QAAQ,OAAO,OAAO,KAAK,EAAE,CAAC;AAAA,QAC1C;AAGA,YAAI,CAAC,cAAc;AAGjB,gBAAM,gBAAgB,gBAAgB,oBAAoB;AAC1D,gBAAM,mBAAmB,eAAe,iBAAiB,QAAQ,QAAQ,mBAAmB,cAAc;AAC1G,qBAAW,KAAK,8BAA8B,gBAAgB;AAC9D,iBAAO,SAAS,gBAAgB;AAAA,QAClC;AAEA,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS;AAAA,UACT,MAAM,OAAO;AAAA,UACb,mBAAmB,OAAO;AAAA,QAC5B;AAAA,MACF,SAAS,OAAO;AACd,mBAAW,MAAM,qBAAqB,KAAK;AAG3C,kBAAU,yDAA2C;AAAA,UACnD;AAAA,UACA,OAAO;AAAA,QACT,CAAC;AAED,YAAI,iBAAiB,UAAU;AAC7B,gBAAM,UAAU,MAAM,UAAU,SAAS,MAAM,UAAU,UAAU,MAAM,UAAU,WAAW,MAAM;AACpG,iBAAO,EAAE,SAAS,OAAO,QAAQ;AAAA,QACnC;AACA,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS;AAAA,QACX;AAAA,MACF;AAAA,IACF;AAAA,IACA,CAAC,gBAAgB,QAAQ,QAAQ,iBAAiB,UAAU,MAAM;AAAA,EACpE;AAEA,QAAM,mBAAe,4BAAY,YAA4D;AAC3F,QAAI;AACF,YAAM,oBAAoB,eAAY,gBAAgB;AACtD,UAAI,CAAC,mBAAmB;AACtB,uBAAe,sBAAsB;AAGrC,kBAAU,yDAA2C;AAAA,UACnD;AAAA,QACF,CAAC;AAED,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS;AAAA,QACX;AAAA,MACF;AAEA,YAAM,SAAS,aAAa,iBAAiB;AAG7C,gBAAU,qDAAyC;AAAA,QACjD;AAAA,MACF,CAAC;AAED,aAAO;AAAA,QACL,SAAS;AAAA,QACT,SAAS;AAAA,MACX;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,wBAAwB,KAAK;AAC9C,qBAAe,oBAAoB;AAGnC,gBAAU,+DAA8C;AAAA,QACtD;AAAA,MACF,CAAC;AAED,aAAO;AAAA,QACL,SAAS;AAAA,QACT,SAAS;AAAA,MACX;AAAA,IACF;AAAA,EACF,GAAG,CAAC,gBAAgB,QAAQ,CAAC;AAE7B,QAAM,aAAS,4BAAY,MAAY;AAErC,cAAU,uCAAkC;AAAA,MAC1C;AAAA,IACF,CAAC;AAED,aAAS,OAAO;AAChB,mBAAe,IAAI;AACnB,iBAAa,KAAK;AAIlB,UAAM,kBAAkB,QAAQ,QAAQ,uBAAuB,cAAc;AAC7E,WAAO,YAAY,eAAe;AAAA,EACpC,GAAG,CAAC,UAAU,QAAQ,QAAQ,qBAAqB,MAAM,CAAC;AAG1D,QAAM,kBAAc,wBAAQ,MAAM;AAChC,WAAO,QAAQ,MAAM,YAAY,MAAM,YAAY;AAAA,EACrD,GAAG,CAAC,IAAI,CAAC;AAGT,QAAM,oBAAgB;AAAA,IACpB,OAAO,SAA+F;AACpG,YAAM,SAAS,MAAM,SAAS,qBAAqB,IAAI;AACvD,aAAO;AAAA,IACT;AAAA,IACA,CAAC,QAAQ;AAAA,EACX;AAGA,QAAM,mBAAe;AAAA,IACnB,OAAO,WAA8C;AACnD,YAAM,SAAS,MAAM,SAAS,aAAa,MAAM;AACjD,aAAO;AAAA,IACT;AAAA,IACA,CAAC,QAAQ;AAAA,EACX;AAGA,QAAM,YAAQ;AAAA,IACZ,OAAO;AAAA,MACL;AAAA,MACA;AAAA;AAAA,MAEA,iBAAiB,eAAY,gBAAgB;AAAA,MAC7C;AAAA,MACA;AAAA,MACA;AAAA,MACA,UAAU,6BAAM,eAAY,SAAS,GAA3B;AAAA,MACV,iBAAiB,6BAAM,eAAY,gBAAgB,GAAlC;AAAA,MACjB,eAAe,6BAAM,aAAN;AAAA,MACf,WAAW;AAAA,MACX,iBAAiB;AAAA,MACjB;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA;AAAA,MAEA,iBAAiB,gBAAgB;AAAA,MACjC,gBAAgB,gBAAgB;AAAA,MAChC,kBAAkB,gBAAgB;AAAA,MAClC,gBAAgB,gBAAgB;AAAA;AAAA,MAEhC;AAAA,MACA;AAAA,IACF;AAAA,IACA;AAAA,MACE;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,IACF;AAAA,EACF;AAEA,SACE,6CAAC,YAAY,UAAZ,EAAqB,OACpB,uDAAC,yBAAU,OAAO,WAAY,UAAS,GACzC;AAEJ,GA3kB0D;AAolB1D,SAAS,gBAAgB,EAAE,UAAU,OAAO,GAAsB;AAChE,SACE,6CAAC,oBACC,uDAAC,wBAAqB,QACnB,UACH,GACF;AAEJ;AARS;AAUF,IAAM,mBAAe,qBAAK,eAAe;AAMhD,IAAM,mBAAoC;AAAA,EACxC,MAAM;AAAA,EACN,WAAW;AAAA,EACX,iBAAiB;AAAA,EACjB,aAAa;AAAA,EACb,oBAAoB,mCAAY;AAC9B,eAAW,KAAK,yDAAyD;AAAA,EAC3E,GAFoB;AAAA,EAGpB,sBAAsB,mCAAY;AAChC,eAAW,KAAK,2DAA2D;AAAA,EAC7E,GAFsB;AAAA,EAGtB,UAAU,6BAAM,MAAN;AAAA,EACV,iBAAiB,6BAAM,MAAN;AAAA,EACjB,eAAe,6BAAM,MAAN;AAAA,EACf,WAAW,6BAAM;AACf,eAAW,KAAK,gDAAgD;AAAA,EAClE,GAFW;AAAA,EAGX,iBAAiB,6BAAM;AAAA,EAAC,GAAP;AAAA,EACjB,YAAY,mCAAY;AACtB,eAAW,KAAK,iDAAiD;AACjE,WAAO,EAAE,SAAS,OAAO,SAAS,6BAA6B;AAAA,EACjE,GAHY;AAAA,EAIZ,WAAW,mCAAY;AACrB,eAAW,KAAK,gDAAgD;AAChE,WAAO,EAAE,SAAS,OAAO,SAAS,6BAA6B;AAAA,EACjE,GAHW;AAAA,EAIX,cAAc,mCAAY;AACxB,eAAW,KAAK,mDAAmD;AACnE,WAAO,EAAE,SAAS,OAAO,SAAS,6BAA6B;AAAA,EACjE,GAHc;AAAA,EAId,QAAQ,8BAAO,aAAyC;AACtD,eAAW,KAAK,6CAA6C;AAAA,EAC/D,GAFQ;AAAA,EAGR,iBAAiB,6BAAM;AAAA,EAAC,GAAP;AAAA,EACjB,gBAAgB,6BAAM,MAAN;AAAA,EAChB,kBAAkB,6BAAM;AAAA,EAAC,GAAP;AAAA,EAClB,gBAAgB,6BAAM,OAAN;AAAA,EAChB,eAAe,mCAAY;AACzB,eAAW,KAAK,oDAAoD;AACpE,WAAO,CAAC;AAAA,EACV,GAHe;AAAA,EAIf,cAAc,mCAAY;AACxB,eAAW,KAAK,mDAAmD;AACnE,WAAO,CAAC;AAAA,EACV,GAHc;AAIhB;AAQO,IAAM,UAAU,6BAAuB;AAC5C,QAAM,cAAU,2BAAW,WAAW;AAEtC,MAAI,YAAY,QAAW;AAGzB,QAAI,aAAa,OAAO;AACtB,iBAAW,MAAM,8DAA8D;AAAA,IACjF;AACA,WAAO;AAAA,EACT;AAEA,SAAO;AACT,GAbuB;;;AqF/rBhB,IAAM,gBAAgB,wBAAC,UAA2B;AACvD,QAAM,aAAa;AACnB,SAAO,WAAW,KAAK,KAAK;AAC9B,GAH6B;;;ACAtB,IAAM,kBAAkB,wBAAC,UAAuB;AACrD,MAAI,OAAO,UAAU,UAAU;AAC7B,WAAO;AAAA,EACT;AAEA,MAAI,OAAO,SAAS;AAClB,WAAO,MAAM;AAAA,EACf;AAEA,MAAI,OAAO,QAAQ;AACjB,WAAO,MAAM;AAAA,EACf;AAEA,MAAI,OAAO,UAAU,MAAM,QAAQ;AACjC,WAAO,MAAM,SAAS,KAAK;AAAA,EAC7B;AAEA,SAAO;AACT,GAlB+B;","names":["import_navigation","import_react","import_swr","useNextRouter","isStaticBuild","import_navigation","import_react","import_react","import_react","validateIdentifier","import_react","import_navigation","import_react","import_react","isBrowser","client","import_consola","joinedValues","auth","auth","config","request","url","API","API","API","AnalyticsEvent","AnalyticsCategory","validateIdentifier","import_react","import_react","import_react","import_react","key","import_react","import_react","key","import_react","import_react","error","import_react","import_zod","import_mutation","import_zod","import_swr","import_zod","import_zod","import_zod","import_mutation","import_zod","import_mutation","import_zod","import_mutation","import_zod","import_swr","import_zod","import_mutation","import_zod","useSWRMutation","import_mutation","import_zod","import_zod","import_zod","useSWRMutation","import_mutation","useSWRMutation","import_mutation","import_zod","import_mutation","import_mutation","useSWRMutation","import_swr","import_mutation","import_mutation","useSWRMutation","import_mutation","import_zod","useSWRMutation","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","profileError","import_jsx_runtime","refreshToken"]}
1
+ {"version":3,"sources":["../src/auth/index.ts","../src/auth/constants.ts","../src/auth/utils/env.ts","../src/auth/context/AuthContext.tsx","../src/auth/hooks/useCfgRouter.ts","../src/auth/hooks/useQueryParams.ts","../src/auth/hooks/useAuthFormState.ts","../src/auth/hooks/useAuthValidation.ts","../src/auth/hooks/useAuthForm.ts","../src/auth/utils/logger.ts","../src/auth/hooks/useAutoAuth.ts","../src/auth/hooks/useTwoFactor.ts","../src/_api/generated/helpers/errors.ts","../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/core/bodySerializer.gen.ts","../src/_api/generated/core/params.gen.ts","../src/_api/generated/core/serverSentEvents.gen.ts","../src/_api/generated/core/pathSerializer.gen.ts","../src/_api/generated/core/utils.gen.ts","../src/_api/generated/core/auth.gen.ts","../src/_api/generated/client/utils.gen.ts","../src/_api/generated/client/client.gen.ts","../src/_api/generated/client.gen.ts","../src/_api/generated/sdk.gen.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts","../src/auth/utils/analytics.ts","../src/auth/hooks/useGithubAuth.ts","../src/auth/hooks/useTwoFactorSetup.ts","../src/auth/hooks/useTwoFactorStatus.ts","../src/auth/hooks/useSessionStorage.ts","../src/auth/hooks/useAuthRedirect.ts","../src/auth/hooks/useAuthGuard.ts","../src/auth/hooks/useLocalStorage.ts","../src/auth/hooks/useBase64.ts","../src/auth/hooks/useProfileCache.ts","../src/auth/hooks/useTokenRefresh.ts","../src/auth/hooks/useDeleteAccount.ts","../src/auth/context/AccountsContext.tsx","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsApiKeyRegenerateCreate.ts","../src/_api/generated/_cfg_accounts/schemas/APIKeyRegenerate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsApiKeyRetrieve.ts","../src/_api/generated/_cfg_accounts/schemas/APIKey.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsApiKeyTestCreate.ts","../src/_api/generated/_cfg_accounts/schemas/APIKeyTestResult.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthConnectionsList.ts","../src/_api/generated/_cfg_accounts/schemas/cfg_accounts_oauth_connections_response_200_AutoRef.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthConnection.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthProviderEnum.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthDisconnectCreate.ts","../src/_api/generated/_cfg_accounts/schemas/cfg_accounts_oauth_disconnect_response_200_AutoRef.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthGithubAuthorizeCreate.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthAuthorizeResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthGithubCallbackCreate.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthTokenResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOauthProvidersRetrieve.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthProvidersResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOtpRequestCreate.ts","../src/_api/generated/_cfg_accounts/schemas/OTPRequestResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsOtpVerifyCreate.ts","../src/_api/generated/_cfg_accounts/schemas/OTPVerifyResponse.ts","../src/_api/generated/_cfg_accounts/schemas/User.ts","../src/_api/generated/_cfg_accounts/schemas/CentrifugoToken.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileAvatarCreate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileDeleteCreate.ts","../src/_api/generated/_cfg_accounts/schemas/AccountDeleteResponse.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfilePartialPartialUpdate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfilePartialUpdate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileRetrieve.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileUpdatePartialUpdate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsProfileUpdateUpdate.ts","../src/_api/generated/_cfg_accounts/hooks/useCfgAccountsTokenRefreshCreate.ts","../src/_api/generated/_cfg_accounts/schemas/TokenRefresh.ts","../src/_api/generated/_cfg_accounts/schemas/APIKeyRequest.ts","../src/_api/generated/_cfg_accounts/schemas/APIKeyTestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/CfgUserUpdateRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthAuthorizeRequestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthCallbackRequestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthDisconnectRequestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OAuthError.ts","../src/_api/generated/_cfg_accounts/schemas/OTPErrorResponse.ts","../src/_api/generated/_cfg_accounts/schemas/OTPRequestRequest.ts","../src/_api/generated/_cfg_accounts/schemas/OTPVerifyRequest.ts","../src/_api/generated/_cfg_accounts/schemas/PatchedCfgUserUpdateRequest.ts","../src/_api/generated/_cfg_accounts/schemas/TokenRefreshRequest.ts","../src/auth/utils/validation.ts","../src/auth/utils/errors.ts"],"sourcesContent":["/**\n * @djangocfg/api/auth\n *\n * Authentication module with contexts, hooks and utilities.\n * Use this entry point in client components.\n *\n * @example\n * ```tsx\n * 'use client';\n * import { AuthProvider, useAuth } from '@djangocfg/api/auth';\n *\n * export function MyApp({ children }) {\n * return (\n * <AuthProvider>\n * {children}\n * </AuthProvider>\n * );\n * }\n *\n * export function Profile() {\n * const { user, logout } = useAuth();\n * return <div>{user?.email}</div>;\n * }\n * ```\n */\n\n// Constants\nexport * from './constants';\n\n// Contexts\nexport * from './context';\n\n// Hooks\nexport * from './hooks';\n\n// Types (single source of truth)\nexport * from './types';\n\n// Utils (validation, errors, analytics)\nexport * from './utils';\n","/**\n * Auth-related constants shared across the frontend.\n * Single source of truth — do not redefine these elsewhere.\n */\n\nexport const AUTH_CONSTANTS = {\n /** Email OTP code length (numeric). */\n EMAIL_OTP_LENGTH: 4,\n /** TOTP code length (RFC 6238 — authenticator apps). */\n TOTP_LENGTH: 6,\n /** Backup code max length. */\n BACKUP_CODE_MAX_LENGTH: 12,\n} as const;\n","export const isDev = process.env.NODE_ENV === 'development';\nexport const isProd = !isDev;\nexport const isBrowser = typeof window !== 'undefined';\n","// @ts-nocheck\n'use client';\n\nimport { isDev, isBrowser } from \"../utils/env\";\nimport { usePathname } from 'next/navigation';\nimport React, {\n createContext, memo, ReactNode, useCallback, useContext, useEffect, useMemo, useRef, useState\n} from 'react';\nimport { SWRConfig } from 'swr';\n\nimport { useCfgRouter, useLocalStorage, useQueryParams } from '../hooks';\n\nimport { api as apiAccounts } from '../../';\nimport { APIError } from '../../_api/generated/helpers';\nimport { clearProfileCache, getCachedProfile } from '../hooks/useProfileCache';\nimport { useAuthRedirectManager } from '../hooks/useAuthRedirect';\nimport { useTokenRefresh } from '../hooks/useTokenRefresh';\nimport { Analytics, AnalyticsCategory, AnalyticsEvent } from '../utils/analytics';\nimport { authLogger } from '../utils/logger';\nimport { AccountsProvider, useAccountsContext } from './AccountsContext';\n\nimport type { AuthConfig, AuthContextType, AuthProviderProps, UserProfile } from './types';\n\n// Default routes\nconst defaultRoutes = {\n auth: '/auth',\n defaultCallback: '/dashboard',\n defaultAuthCallback: '/auth',\n};\n\nconst AuthContext = createContext<AuthContextType | undefined>(undefined);\n\n// Constants\nconst EMAIL_STORAGE_KEY = 'auth_email';\n\nconst hasValidTokens = (): boolean => {\n if (typeof window === 'undefined') return false;\n return apiAccounts.isAuthenticated();\n};\n\n// Internal provider that uses AccountsContext\nconst AuthProviderInternal: React.FC<AuthProviderProps> = ({ children, config }) => {\n const accounts = useAccountsContext();\n\n // Redirect URL manager for saving URL before auth redirect\n const redirectManager = useAuthRedirectManager({\n fallbackUrl: config?.routes?.defaultCallback || defaultRoutes.defaultCallback,\n clearOnUse: true,\n });\n\n // Smart initial loading state: only true if we don't have tokens yet\n const [isLoading, setIsLoading] = useState(() => {\n // If we already have tokens and profile, don't show loading\n if (typeof window !== 'undefined') {\n const hasTokens = hasValidTokens();\n // Only show loading on initial mount if no tokens\n return !hasTokens;\n }\n return true;\n });\n\n const [initialized, setInitialized] = useState(false);\n const router = useCfgRouter();\n const pathname = usePathname();\n const queryParams = useQueryParams();\n\n // Use localStorage hook for email\n const [storedEmail, setStoredEmail, clearStoredEmail] = useLocalStorage<string | null>(EMAIL_STORAGE_KEY, null);\n\n // Automatic token refresh - refreshes token before expiry, on focus, and on network reconnect\n useTokenRefresh({\n enabled: true,\n onRefresh: (newToken) => {\n authLogger.info('Token auto-refreshed successfully');\n },\n onRefreshError: (error) => {\n authLogger.warn('Token auto-refresh failed:', error.message);\n // Don't logout on refresh error - user might still have valid session\n },\n });\n\n // Map AccountsContext profile to UserProfile\n const user = accounts.profile as UserProfile | null;\n\n // Use refs to avoid dependency issues\n const userRef = useRef(user);\n const configRef = useRef(config);\n const isLoadingProfileRef = useRef(false);\n\n // Update refs when values change\n useEffect(() => {\n userRef.current = user;\n }, [user]);\n\n useEffect(() => {\n configRef.current = config;\n }, [config]);\n\n // Note: API URL is configured in BaseClient, not at runtime\n\n // Common function to clear auth state\n const clearAuthState = useCallback((caller: string) => {\n authLogger.info('clearAuthState >> caller', caller);\n apiAccounts.clearToken();\n clearProfileCache(); // Clear profile cache from localStorage\n // Note: user is now managed by AccountsContext, will auto-update\n setInitialized(true);\n setIsLoading(false);\n }, []);\n\n // Global error handler for auth-related errors\n // Only clears auth on actual authentication errors (401), not on any API error\n const handleGlobalAuthError = useCallback((error: any, context: string = 'API Request') => {\n // Only clear auth on actual authentication errors (401)\n // Don't logout on validation errors, server errors, network issues, etc.\n const isAuthError = error?.status === 401 ||\n error?.statusCode === 401 ||\n error?.code === 'token_not_valid' ||\n error?.code === 'authentication_failed';\n\n if (isAuthError) {\n authLogger.warn(`Authentication error in ${context}, clearing tokens`);\n clearAuthState(`globalAuthError:${context}`);\n return true;\n }\n\n // Log but don't logout for other errors\n if (error?.success === false) {\n authLogger.warn(`Non-auth error in ${context} (not clearing session):`, error?.message || error);\n }\n\n return false;\n }, [clearAuthState]);\n\n // SWR onError: auto-logout on 401 from any SWR hook\n const isAutoLoggingOutRef = useRef(false);\n const swrOnError = useCallback((error: any) => {\n const isAuthError = error?.status === 401 ||\n error?.statusCode === 401 ||\n error?.code === 'token_not_valid' ||\n error?.code === 'authentication_failed';\n\n if (isAuthError && !isAutoLoggingOutRef.current) {\n isAutoLoggingOutRef.current = true;\n authLogger.warn('SWR 401 error detected, auto-logout');\n clearAuthState('swrOnError:401');\n\n const authCallbackUrl = configRef.current?.routes?.defaultAuthCallback || defaultRoutes.defaultAuthCallback;\n router.hardReplace(authCallbackUrl);\n }\n }, [clearAuthState, router]);\n const swrConfig = useMemo(() => ({ onError: swrOnError }), [swrOnError]);\n\n // Simple profile loading without retry - now uses AccountsContext with memoization\n const loadCurrentProfile = useCallback(async (callerId?: string): Promise<void> => {\n const finalCallerId = callerId || 'AuthContext.loadCurrentProfile';\n\n // Check if profile loading is already in progress\n if (isLoadingProfileRef.current) {\n authLogger.debug(`Profile loading already in progress, skipping duplicate call from: ${finalCallerId}`);\n return;\n }\n\n authLogger.debug(`loadCurrentProfile called by: ${finalCallerId}`);\n\n try {\n isLoadingProfileRef.current = true;\n\n // Ensure API clients are properly initialized with current token\n const isAuth = apiAccounts.isAuthenticated();\n const token = apiAccounts.getToken();\n // authLogger.debug('isAuthenticated:', isAuth, 'token:', token ? token.substring(0, 20) + '...' : 'null');\n\n if (!isAuth) {\n authLogger.warn('No valid authentication token, throwing error');\n throw new Error('No valid authentication token');\n }\n\n // Check if profile is already loaded in AccountsContext to prevent duplicate API calls\n if (accounts.profile && !accounts.isLoadingProfile) {\n authLogger.debug('Profile already loaded in AccountsContext, skipping API call');\n setInitialized(true);\n return;\n }\n\n // Refresh profile from AccountsContext\n const refreshedProfile = await accounts.refreshProfile({ callerId: finalCallerId });\n\n if (refreshedProfile) {\n authLogger.info('Profile loaded successfully:', refreshedProfile.id);\n } else {\n authLogger.warn('Profile refresh returned undefined - but keeping tokens');\n }\n\n // Always mark as initialized if we have valid tokens\n // Don't clear tokens just because profile fetch failed\n setInitialized(true);\n } catch (error: any) {\n authLogger.error('Failed to load profile:', error);\n // Only clear auth state on actual authentication errors (401)\n // Don't logout on network errors, server errors, etc.\n const isAuthError = error?.status === 401 ||\n error?.statusCode === 401 ||\n error?.code === 'token_not_valid' ||\n error?.code === 'authentication_failed';\n\n if (isAuthError) {\n authLogger.warn('Authentication error, clearing session');\n clearAuthState('loadCurrentProfile:authError');\n } else {\n // Keep tokens, mark as initialized - user can retry\n authLogger.warn('Profile load failed but keeping session (non-auth error)');\n setInitialized(true);\n }\n } finally {\n isLoadingProfileRef.current = false;\n }\n }, [clearAuthState, handleGlobalAuthError, accounts]);\n\n // Initialize auth state once\n useEffect(() => {\n if (initialized) return;\n\n const initializeAuth = async () => {\n authLogger.info('Initializing auth...');\n\n // Check if running in iframe (AdminLayout will handle auth via postMessage)\n const isInIframe = typeof window !== 'undefined' && window.self !== window.top;\n authLogger.info('Is in iframe:', isInIframe);\n\n // Debug token state\n const token = apiAccounts.getToken();\n const refreshToken = apiAccounts.getRefreshToken();\n authLogger.info('Token from API:', token ? `${token.substring(0, 20)}...` : 'null');\n authLogger.info('Refresh token from API:', refreshToken ? `${refreshToken.substring(0, 20)}...` : 'null');\n authLogger.info('localStorage keys:', Object.keys(localStorage).filter(k => k.includes('token') || k.includes('auth')));\n\n const hasTokens = hasValidTokens();\n authLogger.info('Has tokens:', hasTokens);\n\n // Check if profile is already loaded from cache (AccountsContext initialization)\n if (userRef.current) {\n authLogger.info('Profile already loaded from AccountsContext cache, skipping API request');\n setInitialized(true);\n setIsLoading(false);\n return;\n }\n\n // Check if cache exists in localStorage (before userRef updates)\n const cachedProfile = getCachedProfile();\n if (cachedProfile) {\n authLogger.info('Profile found in localStorage cache, skipping API request');\n setInitialized(true);\n setIsLoading(false);\n return;\n }\n\n // In iframe mode WITHOUT tokens yet - wait for AdminLayout to receive them via postMessage\n // Don't initialize yet - AdminLayout.handleAuthToken will call loadCurrentProfile\n if (isInIframe && !hasTokens) {\n authLogger.info('Running in iframe without tokens - waiting for parent to send via postMessage');\n authLogger.info('AdminLayout will handle auth initialization, skipping AuthContext init');\n setInitialized(true); // Mark as initialized to prevent re-initialization\n setIsLoading(false);\n return;\n }\n\n if (hasTokens) {\n setIsLoading(true);\n try {\n authLogger.info('No cached profile found, loading from API...');\n await loadCurrentProfile('AuthContext.initializeAuth');\n } catch (error: any) {\n authLogger.error('Failed to load profile during initialization:', error);\n // Only clear on 401 auth error, otherwise keep session\n const isAuthError = error?.status === 401 ||\n error?.statusCode === 401 ||\n error?.code === 'token_not_valid' ||\n error?.code === 'authentication_failed';\n\n if (isAuthError) {\n clearAuthState('initializeAuth:authError');\n } else {\n authLogger.warn('Init profile load failed but keeping session');\n setInitialized(true);\n }\n }\n setIsLoading(false);\n } else {\n setInitialized(true);\n setIsLoading(false);\n }\n };\n\n initializeAuth();\n // eslint-disable-next-line react-hooks/exhaustive-deps\n }, [initialized]);\n\n // Redirect logic - only for unauthenticated users on protected pages\n useEffect(() => {\n if (!initialized) return;\n\n // Consider authenticated if we have valid tokens, even without profile\n const isAuthenticated = apiAccounts.isAuthenticated();\n const authRoute = config?.routes?.auth || defaultRoutes.auth;\n const isAuthPage = pathname === authRoute;\n const flowParam = queryParams.get('flow');\n\n // Only redirect authenticated users away from auth page if they're not in a flow\n // This prevents interference with OTP verification flow\n if (isAuthenticated && isAuthPage && !flowParam) {\n const callbackUrl = config?.routes?.defaultCallback || defaultRoutes.defaultCallback;\n router.push(callbackUrl);\n }\n }, [initialized, pathname, queryParams, config?.routes]);\n\n const pushToDefaultCallbackUrl = useCallback(() => {\n const callbackUrl = config?.routes?.defaultCallback || defaultRoutes.defaultCallback;\n router.push(callbackUrl);\n }, [config?.routes, router]);\n\n const pushToDefaultAuthCallbackUrl = useCallback(() => {\n const authCallbackUrl = config?.routes?.defaultAuthCallback || defaultRoutes.defaultAuthCallback;\n router.push(authCallbackUrl);\n }, [config?.routes, router]);\n\n // Memoized checkAuthAndRedirect function\n const checkAuthAndRedirect = useCallback(async () => {\n try {\n setIsLoading(true);\n const isAuthenticated = apiAccounts.isAuthenticated();\n\n if (isAuthenticated) {\n await loadCurrentProfile();\n if (userRef.current) {\n pushToDefaultCallbackUrl();\n }\n } else {\n pushToDefaultAuthCallbackUrl();\n }\n } catch (error) {\n authLogger.error('Failed to check authentication:', error);\n // Use global error handler first\n if (!handleGlobalAuthError(error, 'checkAuthAndRedirect')) {\n clearAuthState('checkAuthAndRedirect');\n }\n pushToDefaultAuthCallbackUrl();\n } finally {\n setIsLoading(false);\n }\n }, [loadCurrentProfile, clearAuthState, pushToDefaultCallbackUrl, pushToDefaultAuthCallbackUrl, handleGlobalAuthError]);\n\n // OTP methods - email only - now uses AccountsContext\n const requestOTP = useCallback(\n async (identifier: string, sourceUrl?: string): Promise<{ success: boolean; message: string; statusCode?: number; retryAfter?: number }> => {\n // Clear tokens before requesting OTP\n apiAccounts.clearToken();\n\n try {\n const result = await accounts.requestOTP({\n identifier,\n source_url: sourceUrl,\n });\n\n // Track OTP request\n Analytics.event(AnalyticsEvent.AUTH_OTP_REQUEST, {\n category: AnalyticsCategory.AUTH,\n label: 'email',\n });\n\n return {\n success: true,\n message: result.message || `OTP code sent to your email address`,\n };\n } catch (error) {\n authLogger.error('Request OTP error:', error);\n\n if (error instanceof APIError) {\n const retryAfter = error.response?.retry_after ?? error.response?.retryAfter;\n // Django returns { error, error_code, retry_after } — errorMessage reads 'detail'/'message' only\n const message = error.response?.error || error.response?.detail || error.response?.message || error.errorMessage;\n return {\n success: false,\n statusCode: error.statusCode,\n message,\n retryAfter: typeof retryAfter === 'number' ? retryAfter : undefined,\n };\n }\n\n return {\n success: false,\n message: 'Failed to send OTP',\n };\n }\n },\n [accounts],\n );\n\n const verifyOTP = useCallback(\n async (identifier: string, otpCode: string, sourceUrl?: string, redirectUrl?: string, skipRedirect?: boolean): Promise<{\n success: boolean;\n message: string;\n user?: UserProfile;\n requires_2fa?: boolean;\n session_id?: string | null;\n should_prompt_2fa?: boolean;\n }> => {\n try {\n // AccountsContext automatically saves tokens and refreshes profile\n const result = await accounts.verifyOTP({\n identifier,\n otp: otpCode,\n source_url: sourceUrl,\n });\n\n // Check if 2FA is required - return early with session info\n if (result.requires_2fa && result.session_id) {\n authLogger.info('2FA required, session:', result.session_id);\n return {\n success: true,\n message: 'OTP verified, 2FA required',\n requires_2fa: true,\n session_id: result.session_id,\n should_prompt_2fa: result.should_prompt_2fa,\n };\n }\n\n // Verify that we got valid tokens (only required when 2FA is not needed)\n if (!result.access || !result.refresh) {\n authLogger.error('Verify OTP returned invalid response:', result);\n return {\n success: false,\n message: 'Invalid OTP verification response',\n };\n }\n\n // Save email identifier\n if (identifier.includes('@')) {\n setStoredEmail(identifier);\n }\n\n // Small delay to ensure profile state is updated\n await new Promise(resolve => setTimeout(resolve, 200));\n\n // Track successful login\n Analytics.event(AnalyticsEvent.AUTH_LOGIN_SUCCESS, {\n category: AnalyticsCategory.AUTH,\n label: 'email',\n });\n\n // Set user ID for future tracking\n if (result.user?.id) {\n Analytics.setUser(String(result.user.id));\n }\n\n // Handle redirect logic (unless skipRedirect is true)\n if (!skipRedirect) {\n // Priority: provided redirectUrl > saved redirect > config default\n // Use hardPush for full page reload - ensures all React contexts reinitialize\n const savedRedirect = redirectManager.useAndClearRedirect();\n const finalRedirectUrl = redirectUrl || savedRedirect || config?.routes?.defaultCallback || defaultRoutes.defaultCallback;\n authLogger.info('Redirecting after auth to:', finalRedirectUrl);\n router.hardPush(finalRedirectUrl);\n }\n\n return {\n success: true,\n message: 'Login successful',\n user: result.user as UserProfile,\n should_prompt_2fa: result.should_prompt_2fa,\n };\n } catch (error) {\n authLogger.error('Verify OTP error:', error);\n\n // Track failed verification\n Analytics.event(AnalyticsEvent.AUTH_OTP_VERIFY_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: 'email',\n });\n\n if (error instanceof APIError) {\n const message = error.response?.error || error.response?.detail || error.response?.message || error.errorMessage;\n return { success: false, message };\n }\n return {\n success: false,\n message: 'Failed to verify OTP',\n };\n }\n },\n [setStoredEmail, config?.routes?.defaultCallback, accounts, router],\n );\n\n const refreshToken = useCallback(async (): Promise<{ success: boolean; message: string }> => {\n try {\n const refreshTokenValue = apiAccounts.getRefreshToken();\n if (!refreshTokenValue) {\n clearAuthState('refreshToken:noToken');\n\n // Track session expired\n Analytics.event(AnalyticsEvent.AUTH_SESSION_EXPIRED, {\n category: AnalyticsCategory.AUTH,\n });\n\n return {\n success: false,\n message: 'No refresh token available',\n };\n }\n\n await accounts.refreshToken(refreshTokenValue);\n\n // Track successful refresh\n Analytics.event(AnalyticsEvent.AUTH_TOKEN_REFRESH, {\n category: AnalyticsCategory.AUTH,\n });\n\n return {\n success: true,\n message: 'Token refreshed',\n };\n } catch (error) {\n authLogger.error('Refresh token error:', error);\n clearAuthState('refreshToken:error');\n\n // Track refresh failure\n Analytics.event(AnalyticsEvent.AUTH_TOKEN_REFRESH_FAIL, {\n category: AnalyticsCategory.AUTH,\n });\n\n return {\n success: false,\n message: 'Error refreshing token',\n };\n }\n }, [clearAuthState, accounts]);\n\n const logout = useCallback((): void => {\n // Track logout\n Analytics.event(AnalyticsEvent.AUTH_LOGOUT, {\n category: AnalyticsCategory.AUTH,\n });\n\n accounts.logout(); // Clear tokens and profile\n setInitialized(true);\n setIsLoading(false);\n\n // Use hardReplace for full page reload + replace history\n // This ensures contexts reinitialize AND back button won't return to protected page\n const authCallbackUrl = config?.routes?.defaultAuthCallback || defaultRoutes.defaultAuthCallback;\n router.hardReplace(authCallbackUrl);\n }, [accounts, config?.routes?.defaultAuthCallback, router]);\n\n // Computed: Is admin user (staff or superuser)\n const isAdminUser = useMemo(() => {\n return Boolean(user?.is_staff || user?.is_superuser);\n }, [user]);\n\n // Profile management: Update profile data\n const updateProfile = useCallback(\n async (data: { first_name?: string; last_name?: string; username?: string }): Promise<UserProfile> => {\n const result = await accounts.partialUpdateProfile(data);\n return result as UserProfile;\n },\n [accounts]\n );\n\n // Profile management: Upload avatar\n const uploadAvatar = useCallback(\n async (avatar: File | Blob): Promise<UserProfile> => {\n const result = await accounts.uploadAvatar(avatar);\n return result as UserProfile;\n },\n [accounts]\n );\n\n // Memoized context value\n const value = useMemo<AuthContextType>(\n () => ({\n user,\n isLoading,\n // Consider authenticated if we have valid tokens, even without user profile\n isAuthenticated: apiAccounts.isAuthenticated(),\n isAdminUser,\n loadCurrentProfile,\n checkAuthAndRedirect,\n getToken: () => apiAccounts.getToken(),\n getRefreshToken: () => apiAccounts.getRefreshToken(),\n getSavedEmail: () => storedEmail,\n saveEmail: setStoredEmail,\n clearSavedEmail: clearStoredEmail,\n requestOTP,\n verifyOTP,\n refreshToken,\n logout,\n // Redirect URL methods\n saveRedirectUrl: redirectManager.setRedirect,\n getRedirectUrl: redirectManager.getFinalRedirectUrl,\n clearRedirectUrl: redirectManager.clearRedirect,\n hasRedirectUrl: redirectManager.hasRedirect,\n // Profile management\n updateProfile,\n uploadAvatar,\n }),\n [\n user,\n isLoading,\n isAdminUser,\n loadCurrentProfile,\n checkAuthAndRedirect,\n storedEmail,\n setStoredEmail,\n clearStoredEmail,\n requestOTP,\n verifyOTP,\n refreshToken,\n logout,\n redirectManager,\n updateProfile,\n uploadAvatar,\n ],\n );\n\n return (\n <AuthContext.Provider value={value}>\n <SWRConfig value={swrConfig}>{children}</SWRConfig>\n </AuthContext.Provider>\n );\n};\n\n// Wrapper that provides AccountsContext\n/**\n * AuthProvider — wraps AccountsProvider + AuthProviderInternal.\n *\n * Memoised: re-renders only when `config` reference or `children` change.\n * Internal auth state is isolated inside AuthProviderInternal.\n */\nfunction AuthProviderRaw({ children, config, enabled = true }: AuthProviderProps) {\n if (!enabled) return <>{children}</>;\n return (\n <AccountsProvider>\n <AuthProviderInternal config={config}>\n {children}\n </AuthProviderInternal>\n </AccountsProvider>\n );\n}\n\nexport const AuthProvider = memo(AuthProviderRaw);\n\n/**\n * Default auth state for SSR/outside provider\n * Returns safe defaults that indicate \"not authenticated, not loading\"\n */\nconst defaultAuthState: AuthContextType = {\n user: null,\n isLoading: false,\n isAuthenticated: false,\n isAdminUser: false,\n loadCurrentProfile: async () => {\n authLogger.warn('useAuth: loadCurrentProfile called outside AuthProvider');\n },\n checkAuthAndRedirect: async () => {\n authLogger.warn('useAuth: checkAuthAndRedirect called outside AuthProvider');\n },\n getToken: () => null,\n getRefreshToken: () => null,\n getSavedEmail: () => null,\n saveEmail: () => {\n authLogger.warn('useAuth: saveEmail called outside AuthProvider');\n },\n clearSavedEmail: () => {},\n requestOTP: async () => {\n authLogger.warn('useAuth: requestOTP called outside AuthProvider');\n return { success: false, message: 'AuthProvider not available' };\n },\n verifyOTP: async () => {\n authLogger.warn('useAuth: verifyOTP called outside AuthProvider');\n return { success: false, message: 'AuthProvider not available' };\n },\n refreshToken: async () => {\n authLogger.warn('useAuth: refreshToken called outside AuthProvider');\n return { success: false, message: 'AuthProvider not available' };\n },\n logout: async (_options?: { skipConfirm?: boolean }) => {\n authLogger.warn('useAuth: logout called outside AuthProvider');\n },\n saveRedirectUrl: () => {},\n getRedirectUrl: () => null,\n clearRedirectUrl: () => {},\n hasRedirectUrl: () => false,\n updateProfile: async () => {\n authLogger.warn('useAuth: updateProfile called outside AuthProvider');\n return {} as UserProfile;\n },\n uploadAvatar: async () => {\n authLogger.warn('useAuth: uploadAvatar called outside AuthProvider');\n return {} as UserProfile;\n },\n};\n\n/**\n * Hook to access auth context\n *\n * SSR-safe: Returns default unauthenticated state when called outside AuthProvider\n * (e.g., during static page generation or server-side rendering)\n */\nexport const useAuth = (): AuthContextType => {\n const context = useContext(AuthContext);\n\n if (context === undefined) {\n // SSR or outside provider - return safe defaults\n // Log only in development to help debugging\n if (isBrowser && isDev) {\n authLogger.debug('useAuth called outside AuthProvider, returning default state');\n }\n return defaultAuthState;\n }\n\n return context;\n};\n\nexport default AuthContext; ","/**\n * Universal Router Hook with BasePath Support\n *\n * Wrapper around Next.js useRouter that automatically handles basePath\n * for static builds served via iframe or subdirectory\n * \n * IMPORTANT: In Next.js 15 App Router, router.push() does NOT automatically\n * handle basePath (unlike Pages Router). This is a breaking change in App Router.\n * \n * This hook ensures basePath is always included when navigating, especially\n * important for static exports served via iframe where basePath is critical.\n * \n * @see https://nextjs.org/docs/app/building-your-application/upgrading/app-router-migration\n */\n\n'use client';\n\nimport { useRouter as useNextRouter } from 'next/navigation';\nimport { useCallback, useMemo } from 'react';\n\n/**\n * Get base path from environment variable\n */\nfunction getBasePath(): string {\n if (typeof process === 'undefined') {\n return '';\n }\n return process.env.NEXT_PUBLIC_BASE_PATH || '';\n}\n\n/**\n * Add base path to a route path\n */\nfunction withBasePath(path: string, basePath: string): string {\n if (!basePath) {\n return path;\n }\n // Ensure path starts with /\n const normalizedPath = path.startsWith('/') ? path : `/${path}`;\n // Remove trailing slash from basePath\n const normalizedBasePath = basePath.replace(/\\/$/, '');\n return `${normalizedBasePath}${normalizedPath}`;\n}\n\n/**\n * Router with basePath support\n *\n * Automatically adds basePath to all navigation methods when basePath is configured.\n * In Next.js 15 App Router, router.push() doesn't handle basePath automatically,\n * so this hook uses window.location to ensure basePath is always included.\n *\n * @example\n * ```tsx\n * const router = useCfgRouter();\n *\n * // With basePath='/cfg/admin':\n * router.push('/dashboard'); // Client-side navigation to '/cfg/admin/dashboard'\n * router.replace('/auth'); // Client-side replace with '/cfg/admin/auth'\n * router.hardPush('/dashboard'); // Full page reload to '/cfg/admin/dashboard'\n * router.hardReplace('/auth'); // Full page replace with '/cfg/admin/auth'\n * ```\n */\nexport function useCfgRouter() {\n const router = useNextRouter();\n\n // Get basePath and check if we're in static build mode\n const basePath = useMemo(() => getBasePath(), []);\n const isStaticBuild = useMemo(() => {\n return typeof process !== 'undefined' && process.env.NEXT_PUBLIC_STATIC_BUILD === 'true';\n }, []);\n\n const push = useCallback((href: string, options?: { scroll?: boolean }) => {\n if (basePath) {\n // App Router doesn't handle basePath automatically, use window.location\n window.location.href = withBasePath(href, basePath);\n } else {\n // No basePath configured, use standard router\n router.push(href, options);\n }\n }, [router, basePath]);\n\n const replace = useCallback((href: string, options?: { scroll?: boolean }) => {\n if (basePath) {\n // App Router doesn't handle basePath automatically, use window.location\n window.location.replace(withBasePath(href, basePath));\n } else {\n // No basePath configured, use standard router\n router.replace(href, options);\n }\n }, [router, basePath]);\n\n /**\n * Hard push - always uses window.location.href for full page reload\n *\n * Use this for auth redirects where React contexts need to reinitialize.\n * Unlike push(), this ALWAYS triggers a full page reload, ensuring all\n * contexts are reinitialized with fresh state.\n *\n * @example\n * ```tsx\n * // After successful login - contexts need to reload with new auth state\n * router.hardPush('/dashboard');\n * ```\n */\n const hardPush = useCallback((href: string) => {\n window.location.href = withBasePath(href, basePath);\n }, [basePath]);\n\n /**\n * Hard replace - always uses window.location.replace for full page reload\n *\n * Same as hardPush but replaces current history entry.\n * Use for auth redirects where you don't want back button to return to login.\n *\n * @example\n * ```tsx\n * // After logout - replace so back button doesn't go to protected page\n * router.hardReplace('/auth');\n * ```\n */\n const hardReplace = useCallback((href: string) => {\n window.location.replace(withBasePath(href, basePath));\n }, [basePath]);\n\n const prefetch = useCallback((href: string) => {\n // Prefetch doesn't need basePath handling, Next.js handles it\n router.prefetch(href);\n }, [router]);\n\n const back = useCallback(() => {\n router.back();\n }, [router]);\n\n const forward = useCallback(() => {\n router.forward();\n }, [router]);\n\n const refresh = useCallback(() => {\n router.refresh();\n }, [router]);\n\n return {\n push,\n replace,\n hardPush,\n hardReplace,\n prefetch,\n back,\n forward,\n refresh,\n };\n}\n\n","/**\n * useQueryParams Hook\n * \n * Safe hook to access URL query parameters without requiring Suspense boundary.\n * Works on client-side only, returns empty URLSearchParams during SSR/prerendering.\n * \n * @example\n * ```tsx\n * const params = useQueryParams();\n * const flow = params.get('flow');\n * const hasFlow = params.has('flow');\n * const allTags = params.getAll('tags');\n * ```\n */\n\n'use client';\n\nimport { usePathname } from 'next/navigation';\nimport { useEffect, useRef, useState } from 'react';\n\n/**\n * Hook to safely access URL query parameters without useSearchParams()\n * \n * This hook reads query parameters directly from window.location.search,\n * avoiding the need for Suspense boundaries that useSearchParams() requires.\n * \n * Automatically updates when URL changes (navigation, back/forward, etc.)\n * Uses pathname from Next.js to detect route changes and polls for query param changes.\n * \n * Returns a URLSearchParams object with get(), getAll(), has(), etc.\n * \n * @returns URLSearchParams object (empty during SSR)\n */\nexport function useQueryParams(): URLSearchParams {\n const pathname = usePathname();\n const [queryParams, setQueryParams] = useState<URLSearchParams>(() => {\n if (typeof window === 'undefined') {\n return new URLSearchParams();\n }\n return new URLSearchParams(window.location.search);\n });\n const lastSearchRef = useRef<string>('');\n\n useEffect(() => {\n if (typeof window === 'undefined') return;\n\n const updateQueryParams = () => {\n const currentSearch = window.location.search;\n if (currentSearch !== lastSearchRef.current) {\n lastSearchRef.current = currentSearch;\n setQueryParams(new URLSearchParams(currentSearch));\n }\n };\n\n // Update when pathname changes (Next.js navigation)\n updateQueryParams();\n\n // Listen to popstate (back/forward navigation)\n window.addEventListener('popstate', updateQueryParams);\n\n // Poll for query param changes (for router.push with same pathname)\n // This handles cases where Next.js router.push updates query params without changing pathname\n const intervalId = setInterval(updateQueryParams, 100);\n\n return () => {\n window.removeEventListener('popstate', updateQueryParams);\n clearInterval(intervalId);\n };\n }, [pathname]);\n\n return queryParams;\n}\n\n","\"use client\"\n\nimport { useCallback, useEffect, useRef, useState } from 'react';\n\nimport type { AuthFormState, AuthFormStateHandlers, AuthStep } from '../types';\n\nconst formatCountdown = (s: number): string => {\n if (s <= 0) return '';\n const m = Math.floor(s / 60);\n return m > 0 ? `${m}:${String(s % 60).padStart(2, '0')}` : `${s}s`;\n};\n\nexport interface UseAuthFormStateReturn extends AuthFormState, AuthFormStateHandlers {}\n\n/**\n * Hook for auth form state management.\n * Pure state - no side effects, no API calls.\n */\nexport const useAuthFormState = (\n initialIdentifier = '',\n): UseAuthFormStateReturn => {\n const [identifier, setIdentifier] = useState(initialIdentifier);\n const [otp, setOtp] = useState('');\n const [isLoading, setIsLoading] = useState(false);\n const [acceptedTerms, setAcceptedTerms] = useState(true);\n const [step, setStep] = useState<AuthStep>('identifier');\n const [error, setError] = useState('');\n\n // 2FA state\n const [twoFactorSessionId, setTwoFactorSessionId] = useState<string | null>(null);\n const [shouldPrompt2FA, setShouldPrompt2FA] = useState(false);\n const [twoFactorCode, setTwoFactorCode] = useState('');\n const [useBackupCode, setUseBackupCode] = useState(false);\n\n // Rate limit countdown\n const [rateLimitSeconds, setRateLimitSeconds] = useState(0);\n const rateLimitTimerRef = useRef<ReturnType<typeof setInterval> | null>(null);\n\n const startRateLimitCountdown = useCallback((seconds: number) => {\n if (rateLimitTimerRef.current) clearInterval(rateLimitTimerRef.current);\n setRateLimitSeconds(seconds);\n rateLimitTimerRef.current = setInterval(() => {\n setRateLimitSeconds((prev) => {\n if (prev <= 1) {\n clearInterval(rateLimitTimerRef.current!);\n rateLimitTimerRef.current = null;\n return 0;\n }\n return prev - 1;\n });\n }, 1000);\n }, []);\n\n useEffect(() => () => {\n if (rateLimitTimerRef.current) clearInterval(rateLimitTimerRef.current);\n }, []);\n\n const clearError = useCallback(() => setError(''), []);\n\n return {\n // State\n identifier,\n otp,\n isLoading,\n acceptedTerms,\n step,\n error,\n twoFactorSessionId,\n shouldPrompt2FA,\n twoFactorCode,\n useBackupCode,\n rateLimitSeconds,\n isRateLimited: rateLimitSeconds > 0,\n rateLimitLabel: formatCountdown(rateLimitSeconds),\n // Handlers\n setIdentifier,\n setOtp,\n setAcceptedTerms,\n setError,\n clearError,\n setStep,\n setIsLoading,\n setTwoFactorSessionId,\n setShouldPrompt2FA,\n setTwoFactorCode,\n setUseBackupCode,\n startRateLimitCountdown,\n };\n};\n","\"use client\"\n\nimport { useCallback } from 'react';\n\nimport type { AuthFormValidation } from '../types';\n\nconst EMAIL_REGEX = /^[^\\s@]+@[^\\s@]+\\.[^\\s@]+$/;\n\nexport const useAuthValidation = (): AuthFormValidation => {\n const validateIdentifier = useCallback((id: string): boolean => {\n return EMAIL_REGEX.test(id);\n }, []);\n\n return { validateIdentifier };\n};\n\nexport const validateIdentifier = (id: string): boolean => EMAIL_REGEX.test(id);\n","\"use client\"\n\nimport { useCallback, useEffect, useRef } from 'react';\n\nimport { AUTH_CONSTANTS } from '../constants';\nimport { useAuth } from '../context';\nimport { authLogger } from '../utils/logger';\nimport { useAuthFormState } from './useAuthFormState';\nimport { useAuthValidation } from './useAuthValidation';\nimport { useAutoAuth } from './useAutoAuth';\nimport { useTwoFactor } from './useTwoFactor';\n\nimport type { AuthFormReturn, UseAuthFormOptions } from '../types';\n/**\n * Complete auth form hook.\n * Composes smaller hooks for state, validation, and submission.\n */\nexport const useAuthForm = (options: UseAuthFormOptions): AuthFormReturn => {\n const {\n onIdentifierSuccess,\n onOTPSuccess,\n onError,\n sourceUrl,\n redirectUrl,\n requireTermsAcceptance = false,\n authPath = '/auth',\n enable2FASetup = true,\n } = options;\n\n // Compose smaller hooks\n const formState = useAuthFormState();\n const validation = useAuthValidation();\n\n // Ref to track auto-submit from URL\n const isAutoSubmitFromUrlRef = useRef(false);\n\n // Auth context for API calls and storage\n const {\n requestOTP,\n verifyOTP,\n getSavedEmail,\n saveEmail,\n } = useAuth();\n\n // Destructure for convenience\n const {\n identifier,\n otp,\n isLoading,\n acceptedTerms,\n twoFactorSessionId,\n twoFactorCode,\n useBackupCode,\n setIdentifier,\n setOtp,\n setStep,\n setError,\n setIsLoading,\n clearError,\n setTwoFactorSessionId,\n setShouldPrompt2FA,\n setTwoFactorCode,\n setUseBackupCode,\n startRateLimitCountdown,\n } = formState;\n\n // 2FA verification hook - skip redirect so we can show success screen\n const twoFactor = useTwoFactor({\n onSuccess: () => {\n authLogger.info('2FA verification successful, showing success screen');\n setStep('success');\n onOTPSuccess?.();\n },\n onError: (error) => {\n setError(error);\n onError?.(error);\n },\n redirectUrl,\n skipRedirect: true, // We handle navigation via success step\n });\n\n const { validateIdentifier } = validation;\n\n // ─────────────────────────────────────────────────────────────────────────\n // Storage Helper\n // ─────────────────────────────────────────────────────────────────────────\n\n const saveIdentifierToStorage = useCallback((id: string) => {\n saveEmail(id);\n }, [saveEmail]);\n\n // ─────────────────────────────────────────────────────────────────────────\n // Effects\n // ─────────────────────────────────────────────────────────────────────────\n\n // Load saved identifier on mount\n useEffect(() => {\n const savedEmail = getSavedEmail();\n if (savedEmail) {\n setIdentifier(savedEmail);\n }\n // eslint-disable-next-line react-hooks/exhaustive-deps\n }, []);\n\n // ─────────────────────────────────────────────────────────────────────────\n // Submit Handlers\n // ─────────────────────────────────────────────────────────────────────────\n\n const handleIdentifierSubmit = useCallback(async (e: React.FormEvent) => {\n e.preventDefault();\n\n if (!identifier) {\n const msg = 'Please enter your email address';\n setError(msg);\n onError?.(msg);\n return;\n }\n\n if (!validateIdentifier(identifier)) {\n const msg = 'Please enter a valid email address';\n setError(msg);\n onError?.(msg);\n return;\n }\n\n if (requireTermsAcceptance && !acceptedTerms) {\n const msg = 'Please accept the Terms of Service and Privacy Policy';\n setError(msg);\n onError?.(msg);\n return;\n }\n\n setIsLoading(true);\n clearError();\n\n try {\n const result = await requestOTP(identifier, sourceUrl);\n\n if (result.success) {\n saveIdentifierToStorage(identifier);\n setStep('otp');\n onIdentifierSuccess?.(identifier);\n } else {\n if (result.retryAfter) {\n startRateLimitCountdown(result.retryAfter);\n clearError();\n } else {\n setError(result.message);\n onError?.(result.message);\n }\n }\n } catch {\n const msg = 'An unexpected error occurred';\n setError(msg);\n onError?.(msg);\n } finally {\n setIsLoading(false);\n }\n }, [\n identifier, acceptedTerms, requireTermsAcceptance,\n validateIdentifier, requestOTP, saveIdentifierToStorage,\n setError, setIsLoading, setStep, clearError,\n startRateLimitCountdown, onIdentifierSuccess, onError, sourceUrl,\n ]);\n\n // Core OTP submit - accepts explicit values to avoid stale closures\n const submitOTP = useCallback(async (\n submitIdentifier: string,\n submitOtp: string,\n ): Promise<boolean> => {\n if (!submitOtp || submitOtp.length < AUTH_CONSTANTS.EMAIL_OTP_LENGTH) {\n const msg = `Please enter the ${AUTH_CONSTANTS.EMAIL_OTP_LENGTH}-digit verification code`;\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n setIsLoading(true);\n clearError();\n\n try {\n // Skip redirect - we'll show success screen first\n const result = await verifyOTP(submitIdentifier, submitOtp, sourceUrl, redirectUrl, true);\n\n // Check if 2FA is required (user has TOTP device)\n if (result.requires_2fa && result.session_id) {\n authLogger.info('2FA required after OTP verification');\n setTwoFactorSessionId(result.session_id);\n setShouldPrompt2FA(result.should_prompt_2fa || false);\n setStep('2fa');\n saveIdentifierToStorage(submitIdentifier);\n return true; // OTP was successful, now need 2FA\n }\n\n if (result.success) {\n saveIdentifierToStorage(submitIdentifier);\n\n // Check if user should be prompted to set up 2FA\n // Only show 2FA setup prompt if enable2FASetup is true (default)\n if (result.should_prompt_2fa && enable2FASetup) {\n authLogger.info('OTP verification successful, prompting 2FA setup');\n setShouldPrompt2FA(true);\n setStep('2fa-setup');\n onOTPSuccess?.();\n return true;\n }\n\n // Skip 2FA setup prompt if enable2FASetup is false\n if (result.should_prompt_2fa && !enable2FASetup) {\n authLogger.info('OTP verification successful, skipping 2FA setup prompt (disabled)');\n } else {\n authLogger.info('OTP verification successful, showing success screen');\n }\n setStep('success');\n onOTPSuccess?.();\n return true;\n } else {\n setError(result.message);\n onError?.(result.message);\n return false;\n }\n } catch {\n const msg = 'An unexpected error occurred';\n setError(msg);\n onError?.(msg);\n return false;\n } finally {\n setIsLoading(false);\n }\n }, [verifyOTP, saveIdentifierToStorage, setError, setIsLoading, clearError, onOTPSuccess, onError, sourceUrl, redirectUrl, setTwoFactorSessionId, setShouldPrompt2FA, setStep, enable2FASetup]);\n\n const handleOTPSubmit = useCallback(async (e: React.FormEvent) => {\n e.preventDefault();\n await submitOTP(identifier, otp);\n }, [identifier, otp, submitOTP]);\n\n const handleResendOTP = useCallback(async () => {\n setIsLoading(true);\n clearError();\n\n try {\n const result = await requestOTP(identifier, sourceUrl);\n\n if (result.success) {\n saveIdentifierToStorage(identifier);\n setOtp('');\n } else {\n if (result.retryAfter) {\n startRateLimitCountdown(result.retryAfter);\n clearError(); // countdown in rateLimitLabel is enough feedback\n } else {\n setError(result.message);\n onError?.(result.message);\n }\n }\n } catch {\n const msg = 'Failed to resend verification code';\n setError(msg);\n onError?.(msg);\n } finally {\n setIsLoading(false);\n }\n }, [identifier, requestOTP, saveIdentifierToStorage, setOtp, setError, setIsLoading, clearError, startRateLimitCountdown, onError, sourceUrl]);\n\n const handleBackToIdentifier = useCallback(() => {\n setStep('identifier');\n clearError();\n }, [setStep, clearError]);\n\n const forceOTPStep = useCallback(() => {\n setStep('otp');\n clearError();\n }, [setStep, clearError]);\n\n // ─────────────────────────────────────────────────────────────────────────\n // 2FA Handlers\n // ─────────────────────────────────────────────────────────────────────────\n\n const handle2FASubmit = useCallback(async (e: React.FormEvent) => {\n e.preventDefault();\n\n if (!twoFactorSessionId) {\n const msg = 'Missing 2FA session';\n setError(msg);\n onError?.(msg);\n return;\n }\n\n if (useBackupCode) {\n await twoFactor.verifyBackupCode(twoFactorSessionId, twoFactorCode);\n } else {\n await twoFactor.verifyTOTP(twoFactorSessionId, twoFactorCode);\n }\n }, [twoFactorSessionId, twoFactorCode, useBackupCode, twoFactor, setError, onError]);\n\n const handleUseBackupCode = useCallback(() => {\n setUseBackupCode(true);\n setTwoFactorCode('');\n clearError();\n }, [setUseBackupCode, setTwoFactorCode, clearError]);\n\n const handleUseTOTP = useCallback(() => {\n setUseBackupCode(false);\n setTwoFactorCode('');\n clearError();\n }, [setUseBackupCode, setTwoFactorCode, clearError]);\n\n // ─────────────────────────────────────────────────────────────────────────\n // Auto-auth from URL\n // ─────────────────────────────────────────────────────────────────────────\n\n useAutoAuth({\n allowedPaths: [authPath],\n onOTPDetected: (detectedOtp: string) => {\n if (isAutoSubmitFromUrlRef.current || isLoading) return;\n isAutoSubmitFromUrlRef.current = true;\n\n authLogger.info('OTP detected from URL, auto-submitting');\n\n const savedEmail = getSavedEmail();\n const autoIdentifier = savedEmail || '';\n\n if (!autoIdentifier) {\n authLogger.warn('No saved identifier found for auto-submit');\n isAutoSubmitFromUrlRef.current = false;\n return;\n }\n\n // Update UI state\n setIdentifier(autoIdentifier);\n setOtp(detectedOtp);\n setStep('otp');\n\n // Submit with explicit values\n setTimeout(async () => {\n try {\n await submitOTP(autoIdentifier, detectedOtp);\n } finally {\n isAutoSubmitFromUrlRef.current = false;\n }\n }, 100);\n },\n cleanupUrl: true,\n });\n\n // ─────────────────────────────────────────────────────────────────────────\n // Return\n // ─────────────────────────────────────────────────────────────────────────\n\n return {\n // State\n ...formState,\n\n // Submit handlers\n handleIdentifierSubmit,\n handleOTPSubmit,\n handleResendOTP,\n handleBackToIdentifier,\n forceOTPStep,\n\n // 2FA handlers\n handle2FASubmit,\n handleUseBackupCode,\n handleUseTOTP,\n\n // Validation\n ...validation,\n\n // Auto-submit ref\n isAutoSubmittingFromUrl: isAutoSubmitFromUrlRef,\n\n // 2FA state from hook (for loading indicator)\n is2FALoading: twoFactor.isLoading,\n twoFactorWarning: twoFactor.warning,\n twoFactorAttemptsRemaining: twoFactor.attemptsRemaining,\n };\n};\n\n// Re-export types for convenience\nexport type { AuthFormReturn, UseAuthFormOptions } from '../types';\n","import { createConsola } from 'consola';\n\n/**\n * Universal logger for @djangocfg/api/auth\n * Uses consola for beautiful console logging\n *\n * Log levels:\n * - 0: silent\n * - 1: fatal, error\n * - 2: warn\n * - 3: log, info\n * - 4: debug\n * - 5: trace, verbose\n */\nimport { isDev as isDevelopment } from './env';\nconst isStaticBuild = process.env.NEXT_PUBLIC_STATIC_BUILD === 'true';\nconst showLogs = isDevelopment || isStaticBuild;\n\nexport const logger = createConsola({\n level: showLogs ? 4 : 1, // dev: debug, production: errors only\n}).withTag('api');\n\n/**\n * Auth-specific logger\n */\nexport const authLogger = logger.withTag('auth');\n\nexport default logger;\n","'use client';\n\nimport { usePathname } from 'next/navigation';\nimport { useEffect } from 'react';\n\nimport { AUTH_CONSTANTS } from '../constants';\nimport { authLogger } from '../utils/logger';\nimport { useCfgRouter } from './useCfgRouter';\nimport { useQueryParams } from './useQueryParams';\n\nexport interface UseAutoAuthOptions {\n onOTPDetected?: (otp: string) => void;\n cleanupUrl?: boolean;\n /** Paths where auto-auth should be active. Default: ['/auth'] */\n allowedPaths?: string[];\n}\n\n/**\n * Hook for automatic authentication from URL query parameters\n * Detects OTP from URL and triggers callback\n */\nexport const useAutoAuth = (options: UseAutoAuthOptions = {}) => {\n const { onOTPDetected, cleanupUrl = true, allowedPaths = ['/auth'] } = options;\n const queryParams = useQueryParams();\n const pathname = usePathname();\n const router = useCfgRouter();\n\n // Check if current path is in allowed paths\n const isAllowedPath = allowedPaths.some(path => pathname === path || pathname?.startsWith(path + '/'));\n\n const hasOTP = !!(queryParams.get('otp'));\n const isReady = !!pathname && hasOTP && isAllowedPath;\n\n useEffect(() => {\n if (!isReady) return;\n\n const queryOtp = queryParams.get('otp') as string;\n\n // Handle OTP detection - only on allowed paths to avoid conflicts with other pages\n // (e.g., /dashboard/device uses ?otp= for device authorization, not user auth)\n if (queryOtp && typeof queryOtp === 'string' && queryOtp.length === AUTH_CONSTANTS.EMAIL_OTP_LENGTH) {\n authLogger.info('OTP detected in URL on auth page:', queryOtp);\n onOTPDetected?.(queryOtp);\n }\n\n // Clean up URL to remove sensitive params for security\n // Use window.location.pathname to preserve the locale prefix (e.g. /ru/auth)\n // because usePathname() strips the locale, and router.push('/auth') would cause\n // next-intl middleware to redirect back to /ru/auth — triggering a full page reload\n // that loses the in-flight OTP submission.\n if (cleanupUrl && queryOtp) {\n const cleanQuery = Object.fromEntries(queryParams.entries());\n delete cleanQuery.otp;\n const queryString = new URLSearchParams(cleanQuery).toString();\n const realPathname = typeof window !== 'undefined' ? window.location.pathname : pathname;\n router.replace(queryString ? `${realPathname}?${queryString}` : realPathname);\n }\n }, [pathname, queryParams, onOTPDetected, cleanupUrl, router, isReady]);\n\n return {\n isReady,\n hasOTP,\n isAllowedPath,\n };\n};\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiAccounts, apiTotp } from '../../clients';\nimport { APIError } from '../../_api/generated/helpers';\nimport { CfgTotp, CfgTotpVerify } from '../../_api/generated/sdk.gen';\nimport { Analytics, AnalyticsCategory, AnalyticsEvent } from '../utils/analytics';\nimport { authLogger } from '../utils/logger';\nimport { useCfgRouter } from './useCfgRouter';\n\nexport interface UseTwoFactorOptions {\n /** Callback on successful 2FA verification */\n onSuccess?: (user: any) => void;\n /** Callback on error */\n onError?: (error: string) => void;\n /** URL to redirect after successful verification */\n redirectUrl?: string;\n /** Skip automatic redirect after success (caller handles navigation) */\n skipRedirect?: boolean;\n}\n\nexport interface UseTwoFactorReturn {\n /** Loading state */\n isLoading: boolean;\n /** Error message */\n error: string | null;\n /** Warning message (e.g., low backup codes) */\n warning: string | null;\n /** Remaining backup codes (if backup code was used) */\n remainingBackupCodes: number | null;\n /** Remaining verification attempts before lockout */\n attemptsRemaining: number | null;\n /** Verify TOTP code */\n verifyTOTP: (sessionId: string, code: string) => Promise<boolean>;\n /** Verify backup code */\n verifyBackupCode: (sessionId: string, backupCode: string) => Promise<boolean>;\n /** Clear error */\n clearError: () => void;\n}\n\n/**\n * Hook for 2FA verification during login.\n *\n * Usage:\n * 1. After OTP/OAuth verification returns requires_2fa=true and session_id\n * 2. Show 2FA form and collect TOTP code from user\n * 3. Call verifyTOTP(sessionId, code) to complete authentication\n *\n * @example\n * ```tsx\n * const { isLoading, error, verifyTOTP, verifyBackupCode } = useTwoFactor({\n * onSuccess: (user) => console.log('Logged in:', user),\n * onError: (error) => console.error(error),\n * redirectUrl: '/dashboard',\n * });\n *\n * const handleSubmit = async (code: string) => {\n * if (useBackupCode) {\n * await verifyBackupCode(sessionId, code);\n * } else {\n * await verifyTOTP(sessionId, code);\n * }\n * };\n * ```\n */\nexport const useTwoFactor = (options: UseTwoFactorOptions = {}): UseTwoFactorReturn => {\n const { onSuccess, onError, redirectUrl, skipRedirect = false } = options;\n const router = useCfgRouter();\n\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n const [warning, setWarning] = useState<string | null>(null);\n const [remainingBackupCodes, setRemainingBackupCodes] = useState<number | null>(null);\n const [attemptsRemaining, setAttemptsRemaining] = useState<number | null>(null);\n\n const clearError = useCallback(() => {\n setError(null);\n }, []);\n\n /**\n * Handle successful 2FA verification\n */\n const handleSuccess = useCallback((response: {\n access_token: string;\n refresh_token: string;\n user: any;\n warning?: string;\n remaining_backup_codes?: number;\n }) => {\n // Save tokens\n apiAccounts.setToken(response.access_token);\n apiAccounts.setRefreshToken(response.refresh_token);\n\n // Set warning if any\n if (response.warning) {\n setWarning(response.warning);\n }\n\n // Set remaining backup codes if provided\n if (response.remaining_backup_codes !== undefined) {\n setRemainingBackupCodes(response.remaining_backup_codes);\n }\n\n // Track successful 2FA\n Analytics.event(AnalyticsEvent.AUTH_LOGIN_SUCCESS, {\n category: AnalyticsCategory.AUTH,\n label: '2fa',\n });\n\n // Set user ID for tracking\n if (response.user?.id) {\n Analytics.setUser(String(response.user.id));\n }\n\n // Call success callback\n onSuccess?.(response.user);\n\n // Redirect (unless skipRedirect is true)\n if (!skipRedirect) {\n const finalRedirectUrl = redirectUrl || '/dashboard';\n authLogger.info('2FA successful, redirecting to:', finalRedirectUrl);\n router.hardPush(finalRedirectUrl);\n }\n }, [onSuccess, redirectUrl, router, skipRedirect]);\n\n /**\n * Verify TOTP code from authenticator app\n */\n const verifyTOTP = useCallback(async (sessionId: string, code: string): Promise<boolean> => {\n if (!sessionId) {\n const msg = 'Missing 2FA session ID';\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n if (!code || code.length !== 6) {\n const msg = 'Please enter a 6-digit code';\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Verifying TOTP code...');\n\n const result = await CfgTotpVerify.cfgTotpVerifyCreate({\n body: { session_id: sessionId, code },\n throwOnError: true,\n });\n const response = result.data;\n\n if (!response.access_token || !response.refresh_token) {\n throw new Error('Invalid response from 2FA verification');\n }\n\n handleSuccess(response);\n return true;\n\n } catch (err) {\n authLogger.error('2FA TOTP verification error:', err);\n const errorMessage = err instanceof APIError\n ? (err.response?.error || err.response?.detail || err.response?.message || err.errorMessage)\n : (err instanceof Error ? err.message : 'Invalid verification code');\n if (err instanceof APIError && typeof err.response?.attempts_remaining === 'number') {\n setAttemptsRemaining(err.response.attempts_remaining);\n }\n setError(errorMessage);\n onError?.(errorMessage);\n\n // Track failed 2FA\n Analytics.event(AnalyticsEvent.AUTH_OTP_VERIFY_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: '2fa-totp',\n });\n\n return false;\n } finally {\n setIsLoading(false);\n }\n }, [handleSuccess, onError]);\n\n /**\n * Verify backup recovery code\n */\n const verifyBackupCode = useCallback(async (sessionId: string, backupCode: string): Promise<boolean> => {\n if (!sessionId) {\n const msg = 'Missing 2FA session ID';\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n if (!backupCode || backupCode.length < 8) {\n const msg = 'Please enter your backup code';\n setError(msg);\n onError?.(msg);\n return false;\n }\n\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Verifying backup code...');\n\n const result = await CfgTotpVerify.cfgTotpVerifyBackupCreate({\n body: {\n session_id: sessionId,\n backup_code: backupCode.replace(/\\s+/g, ''),\n },\n throwOnError: true,\n });\n const response = result.data;\n\n if (!response.access_token || !response.refresh_token) {\n throw new Error('Invalid response from backup code verification');\n }\n\n handleSuccess(response);\n return true;\n\n } catch (err) {\n authLogger.error('2FA backup code verification error:', err);\n const errorMessage = err instanceof APIError\n ? (err.response?.error || err.response?.detail || err.response?.message || err.errorMessage)\n : (err instanceof Error ? err.message : 'Invalid backup code');\n if (err instanceof APIError && typeof err.response?.attempts_remaining === 'number') {\n setAttemptsRemaining(err.response.attempts_remaining);\n }\n setError(errorMessage);\n onError?.(errorMessage);\n\n // Track failed 2FA\n Analytics.event(AnalyticsEvent.AUTH_OTP_VERIFY_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: '2fa-backup',\n });\n\n return false;\n } finally {\n setIsLoading(false);\n }\n }, [handleSuccess, onError]);\n\n return {\n isLoading,\n error,\n warning,\n remainingBackupCodes,\n attemptsRemaining,\n verifyTOTP,\n verifyBackupCode,\n clearError,\n };\n};\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Typed error classes with DRF field-error support.\n// DO NOT EDIT — re-run `make gen`.\n\n/**\n * HTTP API Error with DRF field-specific validation errors.\n */\nexport class APIError extends Error {\n constructor(\n public statusCode: number,\n public statusText: string,\n public response: any,\n public url: string,\n message?: string,\n ) {\n super(message || `HTTP ${statusCode}: ${statusText}`);\n this.name = \"APIError\";\n }\n\n get details(): Record<string, any> | null {\n if (typeof this.response === \"object\" && this.response !== null) {\n return this.response;\n }\n return null;\n }\n\n get fieldErrors(): Record<string, string[]> | null {\n const details = this.details;\n if (!details) return null;\n const fieldErrors: Record<string, string[]> = {};\n for (const [key, value] of Object.entries(details)) {\n if (Array.isArray(value)) fieldErrors[key] = value;\n }\n return Object.keys(fieldErrors).length > 0 ? fieldErrors : null;\n }\n\n get errorMessage(): string {\n const details = this.details;\n if (!details) return this.message;\n if (details.detail) {\n return Array.isArray(details.detail) ? details.detail.join(\", \") : String(details.detail);\n }\n if (details.error) return String(details.error);\n if (details.message) return String(details.message);\n const fieldErrors = this.fieldErrors;\n if (fieldErrors) {\n const firstField = Object.keys(fieldErrors)[0];\n if (firstField) return `${firstField}: ${fieldErrors[firstField]?.join(\", \")}`;\n }\n return this.message;\n }\n\n get isValidationError(): boolean { return this.statusCode === 400; }\n get isAuthError(): boolean { return this.statusCode === 401; }\n get isPermissionError(): boolean { return this.statusCode === 403; }\n get isNotFoundError(): boolean { return this.statusCode === 404; }\n get isServerError(): boolean { return this.statusCode >= 500 && this.statusCode < 600; }\n}\n\n/** Network Error (connection failed, timeout, etc.) */\nexport class NetworkError extends Error {\n constructor(\n message: string,\n public url: string,\n public originalError?: Error,\n ) {\n super(message);\n this.name = \"NetworkError\";\n }\n}\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nimport { APIError } from './errors';\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL`.\n *\n * Both browser and server use NEXT_PUBLIC_API_URL — requests go\n * directly to Django without Next.js proxy.\n */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`.\n *\n * In the browser: returns null — requests go through the Next.js rewrite\n * and the key is injected server-side (never exposed in the bundle).\n * On the server: reads NEXT_PUBLIC_API_KEY as a fallback for SSR calls\n * that bypass the rewrite (e.g. server components calling Django directly).\n */\nfunction defaultApiKey(): string | null {\n if (isBrowser) return null;\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * User-supplied refresh handler. Receives the current refresh token,\n * must return a fresh access (and optional refresh) pair or null on failure.\n * Set once at app bootstrap via `auth.setRefreshHandler(...)`.\n */\ntype RefreshResult = { access: string; refresh?: string } | null;\ntype RefreshHandler = (refreshToken: string) => Promise<RefreshResult>;\nlet _refreshHandler: RefreshHandler | null = null;\n\n/** Single-flight: every concurrent 401 awaits the same refresh. */\nlet _refreshInflight: Promise<string | null> | null = null;\n\n/** Marker header — set on retried requests so we never loop on 401. */\nconst RETRY_MARKER = 'X-Auth-Retry';\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n error: { use(fn: (err: unknown, res: Response | undefined, req: Request | undefined, opts: unknown) => unknown): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n /**\n * Fired when the server returns 401 AND no refresh path recovers it\n * (no refresh token, no refresh handler, refresh failed, or retry\n * still 401). The app should clear local state and redirect to login.\n *\n * NOT fired for 401 that gets transparently recovered by the refresh\n * handler — those are invisible to callers.\n */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n\n /**\n * Register the refresh strategy. The handler receives the current\n * refresh token and must call your refresh endpoint, returning\n * `{ access, refresh? }` on success or `null` on failure.\n *\n * @example\n * auth.setRefreshHandler(async (refresh) => {\n * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });\n * return data ? { access: data.access, refresh: data.refresh } : null;\n * });\n */\n setRefreshHandler(fn: RefreshHandler | null): void {\n _refreshHandler = fn;\n },\n};\n\n/**\n * Run the user-supplied refresh handler under single-flight, persist\n * the new tokens, and return the fresh access token (or null on any\n * failure path). All concurrent 401s share the same in-flight promise.\n */\nasync function tryRefresh(): Promise<string | null> {\n if (_refreshInflight) return _refreshInflight;\n if (!_refreshHandler) return null;\n const refresh = auth.getRefreshToken();\n if (!refresh) return null;\n\n _refreshInflight = (async () => {\n try {\n const result = await _refreshHandler!(refresh);\n if (!result?.access) return null;\n auth.setToken(result.access);\n if (result.refresh) auth.setRefreshToken(result.refresh);\n return result.access;\n } catch {\n return null;\n } finally {\n _refreshInflight = null;\n }\n })();\n\n return _refreshInflight;\n}\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n try {\n const tz = Intl.DateTimeFormat().resolvedOptions().timeZone;\n if (tz) request.headers.set('X-Timezone', tz);\n } catch {}\n request.headers.set('X-Client-Time', new Date().toISOString());\n\n return request;\n });\n\n // Wrap raw JSON error objects (thrown by hey-api on non-2xx responses) into\n // APIError so callers can do `error instanceof APIError` and read\n // `error.statusCode` / `error.response` consistently.\n client.interceptors.error.use((err, res, req) => {\n if (err instanceof APIError) return err;\n const url = (req as Request | undefined)?.url ?? '';\n const status = (res as Response | undefined)?.status ?? 0;\n const statusText = (res as Response | undefined)?.statusText ?? '';\n return new APIError(status, statusText, err, url);\n });\n\n client.interceptors.response.use(async (response, request) => {\n if (response.status !== 401) return response;\n\n // Already retried once — give up to avoid loops.\n if (request.headers.get(RETRY_MARKER)) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n const newToken = await tryRefresh();\n if (!newToken) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n // Retry the original request once with the new token. We mutate a\n // clone so the original Request body (already consumed by the\n // failed call) doesn't trip \"body already used\".\n const retry = request.clone();\n retry.headers.set('Authorization', `Bearer ${newToken}`);\n retry.headers.set(RETRY_MARKER, '1');\n try {\n const retried = await fetch(retry);\n if (retried.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(retried); } catch {}\n }\n return retried;\n } catch {\n // Network error on retry — surface the original 401.\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport type { ArrayStyle, ObjectStyle, SerializerOptions } from './pathSerializer.gen';\n\nexport type QuerySerializer = (query: Record<string, unknown>) => string;\n\nexport type BodySerializer = (body: unknown) => unknown;\n\ntype QuerySerializerOptionsObject = {\n allowReserved?: boolean;\n array?: Partial<SerializerOptions<ArrayStyle>>;\n object?: Partial<SerializerOptions<ObjectStyle>>;\n};\n\nexport type QuerySerializerOptions = QuerySerializerOptionsObject & {\n /**\n * Per-parameter serialization overrides. When provided, these settings\n * override the global array/object settings for specific parameter names.\n */\n parameters?: Record<string, QuerySerializerOptionsObject>;\n};\n\nconst serializeFormDataPair = (data: FormData, key: string, value: unknown): void => {\n if (typeof value === 'string' || value instanceof Blob) {\n data.append(key, value);\n } else if (value instanceof Date) {\n data.append(key, value.toISOString());\n } else {\n data.append(key, JSON.stringify(value));\n }\n};\n\nconst serializeUrlSearchParamsPair = (data: URLSearchParams, key: string, value: unknown): void => {\n if (typeof value === 'string') {\n data.append(key, value);\n } else {\n data.append(key, JSON.stringify(value));\n }\n};\n\nexport const formDataBodySerializer = {\n bodySerializer: (body: unknown): FormData => {\n const data = new FormData();\n\n Object.entries(body as Record<string, unknown>).forEach(([key, value]) => {\n if (value === undefined || value === null) {\n return;\n }\n if (Array.isArray(value)) {\n value.forEach((v) => serializeFormDataPair(data, key, v));\n } else {\n serializeFormDataPair(data, key, value);\n }\n });\n\n return data;\n },\n};\n\nexport const jsonBodySerializer = {\n bodySerializer: (body: unknown): string =>\n JSON.stringify(body, (_key, value) => (typeof value === 'bigint' ? value.toString() : value)),\n};\n\nexport const urlSearchParamsBodySerializer = {\n bodySerializer: (body: unknown): string => {\n const data = new URLSearchParams();\n\n Object.entries(body as Record<string, unknown>).forEach(([key, value]) => {\n if (value === undefined || value === null) {\n return;\n }\n if (Array.isArray(value)) {\n value.forEach((v) => serializeUrlSearchParamsPair(data, key, v));\n } else {\n serializeUrlSearchParamsPair(data, key, value);\n }\n });\n\n return data.toString();\n },\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\ntype Slot = 'body' | 'headers' | 'path' | 'query';\n\nexport type Field =\n | {\n in: Exclude<Slot, 'body'>;\n /**\n * Field name. This is the name we want the user to see and use.\n */\n key: string;\n /**\n * Field mapped name. This is the name we want to use in the request.\n * If omitted, we use the same value as `key`.\n */\n map?: string;\n }\n | {\n in: Extract<Slot, 'body'>;\n /**\n * Key isn't required for bodies.\n */\n key?: string;\n map?: string;\n }\n | {\n /**\n * Field name. This is the name we want the user to see and use.\n */\n key: string;\n /**\n * Field mapped name. This is the name we want to use in the request.\n * If `in` is omitted, `map` aliases `key` to the transport layer.\n */\n map: Slot;\n };\n\nexport interface Fields {\n allowExtra?: Partial<Record<Slot, boolean>>;\n args?: ReadonlyArray<Field>;\n}\n\nexport type FieldsConfig = ReadonlyArray<Field | Fields>;\n\nconst extraPrefixesMap: Record<string, Slot> = {\n $body_: 'body',\n $headers_: 'headers',\n $path_: 'path',\n $query_: 'query',\n};\nconst extraPrefixes = Object.entries(extraPrefixesMap);\n\ntype KeyMap = Map<\n string,\n | {\n in: Slot;\n map?: string;\n }\n | {\n in?: never;\n map: Slot;\n }\n>;\n\nconst buildKeyMap = (fields: FieldsConfig, map?: KeyMap): KeyMap => {\n if (!map) {\n map = new Map();\n }\n\n for (const config of fields) {\n if ('in' in config) {\n if (config.key) {\n map.set(config.key, {\n in: config.in,\n map: config.map,\n });\n }\n } else if ('key' in config) {\n map.set(config.key, {\n map: config.map,\n });\n } else if (config.args) {\n buildKeyMap(config.args, map);\n }\n }\n\n return map;\n};\n\ninterface Params {\n body: unknown;\n headers: Record<string, unknown>;\n path: Record<string, unknown>;\n query: Record<string, unknown>;\n}\n\nconst stripEmptySlots = (params: Params) => {\n for (const [slot, value] of Object.entries(params)) {\n if (value && typeof value === 'object' && !Array.isArray(value) && !Object.keys(value).length) {\n delete params[slot as Slot];\n }\n }\n};\n\nexport const buildClientParams = (args: ReadonlyArray<unknown>, fields: FieldsConfig) => {\n const params: Params = {\n body: {},\n headers: {},\n path: {},\n query: {},\n };\n\n const map = buildKeyMap(fields);\n\n let config: FieldsConfig[number] | undefined;\n\n for (const [index, arg] of args.entries()) {\n if (fields[index]) {\n config = fields[index];\n }\n\n if (!config) {\n continue;\n }\n\n if ('in' in config) {\n if (config.key) {\n const field = map.get(config.key)!;\n const name = field.map || config.key;\n if (field.in) {\n (params[field.in] as Record<string, unknown>)[name] = arg;\n }\n } else {\n params.body = arg;\n }\n } else {\n for (const [key, value] of Object.entries(arg ?? {})) {\n const field = map.get(key);\n\n if (field) {\n if (field.in) {\n const name = field.map || key;\n (params[field.in] as Record<string, unknown>)[name] = value;\n } else {\n params[field.map] = value;\n }\n } else {\n const extra = extraPrefixes.find(([prefix]) => key.startsWith(prefix));\n\n if (extra) {\n const [prefix, slot] = extra;\n (params[slot] as Record<string, unknown>)[key.slice(prefix.length)] = value;\n } else if ('allowExtra' in config && config.allowExtra) {\n for (const [slot, allowed] of Object.entries(config.allowExtra)) {\n if (allowed) {\n (params[slot as Slot] as Record<string, unknown>)[key] = value;\n break;\n }\n }\n }\n }\n }\n }\n }\n\n stripEmptySlots(params);\n\n return params;\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport type { Config } from './types.gen';\n\nexport type ServerSentEventsOptions<TData = unknown> = Omit<RequestInit, 'method'> &\n Pick<Config, 'method' | 'responseTransformer' | 'responseValidator'> & {\n /**\n * Fetch API implementation. You can use this option to provide a custom\n * fetch instance.\n *\n * @default globalThis.fetch\n */\n fetch?: typeof fetch;\n /**\n * Implementing clients can call request interceptors inside this hook.\n */\n onRequest?: (url: string, init: RequestInit) => Promise<Request>;\n /**\n * Callback invoked when a network or parsing error occurs during streaming.\n *\n * This option applies only if the endpoint returns a stream of events.\n *\n * @param error The error that occurred.\n */\n onSseError?: (error: unknown) => void;\n /**\n * Callback invoked when an event is streamed from the server.\n *\n * This option applies only if the endpoint returns a stream of events.\n *\n * @param event Event streamed from the server.\n * @returns Nothing (void).\n */\n onSseEvent?: (event: StreamEvent<TData>) => void;\n serializedBody?: RequestInit['body'];\n /**\n * Default retry delay in milliseconds.\n *\n * This option applies only if the endpoint returns a stream of events.\n *\n * @default 3000\n */\n sseDefaultRetryDelay?: number;\n /**\n * Maximum number of retry attempts before giving up.\n */\n sseMaxRetryAttempts?: number;\n /**\n * Maximum retry delay in milliseconds.\n *\n * Applies only when exponential backoff is used.\n *\n * This option applies only if the endpoint returns a stream of events.\n *\n * @default 30000\n */\n sseMaxRetryDelay?: number;\n /**\n * Optional sleep function for retry backoff.\n *\n * Defaults to using `setTimeout`.\n */\n sseSleepFn?: (ms: number) => Promise<void>;\n url: string;\n };\n\nexport interface StreamEvent<TData = unknown> {\n data: TData;\n event?: string;\n id?: string;\n retry?: number;\n}\n\nexport type ServerSentEventsResult<TData = unknown, TReturn = void, TNext = unknown> = {\n stream: AsyncGenerator<\n TData extends Record<string, unknown> ? TData[keyof TData] : TData,\n TReturn,\n TNext\n >;\n};\n\nexport function createSseClient<TData = unknown>({\n onRequest,\n onSseError,\n onSseEvent,\n responseTransformer,\n responseValidator,\n sseDefaultRetryDelay,\n sseMaxRetryAttempts,\n sseMaxRetryDelay,\n sseSleepFn,\n url,\n ...options\n}: ServerSentEventsOptions): ServerSentEventsResult<TData> {\n let lastEventId: string | undefined;\n\n const sleep = sseSleepFn ?? ((ms: number) => new Promise((resolve) => setTimeout(resolve, ms)));\n\n const createStream = async function* () {\n let retryDelay: number = sseDefaultRetryDelay ?? 3000;\n let attempt = 0;\n const signal = options.signal ?? new AbortController().signal;\n\n while (true) {\n if (signal.aborted) break;\n\n attempt++;\n\n const headers =\n options.headers instanceof Headers\n ? options.headers\n : new Headers(options.headers as Record<string, string> | undefined);\n\n if (lastEventId !== undefined) {\n headers.set('Last-Event-ID', lastEventId);\n }\n\n try {\n const requestInit: RequestInit = {\n redirect: 'follow',\n ...options,\n body: options.serializedBody,\n headers,\n signal,\n };\n let request = new Request(url, requestInit);\n if (onRequest) {\n request = await onRequest(url, requestInit);\n }\n // fetch must be assigned here, otherwise it would throw the error:\n // TypeError: Failed to execute 'fetch' on 'Window': Illegal invocation\n const _fetch = options.fetch ?? globalThis.fetch;\n const response = await _fetch(request);\n\n if (!response.ok) throw new Error(`SSE failed: ${response.status} ${response.statusText}`);\n\n if (!response.body) throw new Error('No body in SSE response');\n\n const reader = response.body.pipeThrough(new TextDecoderStream()).getReader();\n\n let buffer = '';\n\n const abortHandler = () => {\n try {\n reader.cancel();\n } catch {\n // noop\n }\n };\n\n signal.addEventListener('abort', abortHandler);\n\n try {\n while (true) {\n const { done, value } = await reader.read();\n if (done) break;\n buffer += value;\n buffer = buffer.replace(/\\r\\n?/g, '\\n'); // normalize line endings\n\n const chunks = buffer.split('\\n\\n');\n buffer = chunks.pop() ?? '';\n\n for (const chunk of chunks) {\n const lines = chunk.split('\\n');\n const dataLines: Array<string> = [];\n let eventName: string | undefined;\n\n for (const line of lines) {\n if (line.startsWith('data:')) {\n dataLines.push(line.replace(/^data:\\s*/, ''));\n } else if (line.startsWith('event:')) {\n eventName = line.replace(/^event:\\s*/, '');\n } else if (line.startsWith('id:')) {\n lastEventId = line.replace(/^id:\\s*/, '');\n } else if (line.startsWith('retry:')) {\n const parsed = Number.parseInt(line.replace(/^retry:\\s*/, ''), 10);\n if (!Number.isNaN(parsed)) {\n retryDelay = parsed;\n }\n }\n }\n\n let data: unknown;\n let parsedJson = false;\n\n if (dataLines.length) {\n const rawData = dataLines.join('\\n');\n try {\n data = JSON.parse(rawData);\n parsedJson = true;\n } catch {\n data = rawData;\n }\n }\n\n if (parsedJson) {\n if (responseValidator) {\n await responseValidator(data);\n }\n\n if (responseTransformer) {\n data = await responseTransformer(data);\n }\n }\n\n onSseEvent?.({\n data,\n event: eventName,\n id: lastEventId,\n retry: retryDelay,\n });\n\n if (dataLines.length) {\n yield data as any;\n }\n }\n }\n } finally {\n signal.removeEventListener('abort', abortHandler);\n reader.releaseLock();\n }\n\n break; // exit loop on normal completion\n } catch (error) {\n // connection failed or aborted; retry after delay\n onSseError?.(error);\n\n if (sseMaxRetryAttempts !== undefined && attempt >= sseMaxRetryAttempts) {\n break; // stop after firing error\n }\n\n // exponential backoff: double retry each attempt, cap at 30s\n const backoff = Math.min(retryDelay * 2 ** (attempt - 1), sseMaxRetryDelay ?? 30000);\n await sleep(backoff);\n }\n }\n };\n\n const stream = createStream();\n\n return { stream };\n}\n","// This file is auto-generated by @hey-api/openapi-ts\n\ninterface SerializeOptions<T> extends SerializePrimitiveOptions, SerializerOptions<T> {}\n\ninterface SerializePrimitiveOptions {\n allowReserved?: boolean;\n name: string;\n}\n\nexport interface SerializerOptions<T> {\n /**\n * @default true\n */\n explode: boolean;\n style: T;\n}\n\nexport type ArrayStyle = 'form' | 'spaceDelimited' | 'pipeDelimited';\nexport type ArraySeparatorStyle = ArrayStyle | MatrixStyle;\ntype MatrixStyle = 'label' | 'matrix' | 'simple';\nexport type ObjectStyle = 'form' | 'deepObject';\ntype ObjectSeparatorStyle = ObjectStyle | MatrixStyle;\n\ninterface SerializePrimitiveParam extends SerializePrimitiveOptions {\n value: string;\n}\n\nexport const separatorArrayExplode = (style: ArraySeparatorStyle) => {\n switch (style) {\n case 'label':\n return '.';\n case 'matrix':\n return ';';\n case 'simple':\n return ',';\n default:\n return '&';\n }\n};\n\nexport const separatorArrayNoExplode = (style: ArraySeparatorStyle) => {\n switch (style) {\n case 'form':\n return ',';\n case 'pipeDelimited':\n return '|';\n case 'spaceDelimited':\n return '%20';\n default:\n return ',';\n }\n};\n\nexport const separatorObjectExplode = (style: ObjectSeparatorStyle) => {\n switch (style) {\n case 'label':\n return '.';\n case 'matrix':\n return ';';\n case 'simple':\n return ',';\n default:\n return '&';\n }\n};\n\nexport const serializeArrayParam = ({\n allowReserved,\n explode,\n name,\n style,\n value,\n}: SerializeOptions<ArraySeparatorStyle> & {\n value: unknown[];\n}) => {\n if (!explode) {\n const joinedValues = (\n allowReserved ? value : value.map((v) => encodeURIComponent(v as string))\n ).join(separatorArrayNoExplode(style));\n switch (style) {\n case 'label':\n return `.${joinedValues}`;\n case 'matrix':\n return `;${name}=${joinedValues}`;\n case 'simple':\n return joinedValues;\n default:\n return `${name}=${joinedValues}`;\n }\n }\n\n const separator = separatorArrayExplode(style);\n const joinedValues = value\n .map((v) => {\n if (style === 'label' || style === 'simple') {\n return allowReserved ? v : encodeURIComponent(v as string);\n }\n\n return serializePrimitiveParam({\n allowReserved,\n name,\n value: v as string,\n });\n })\n .join(separator);\n return style === 'label' || style === 'matrix' ? separator + joinedValues : joinedValues;\n};\n\nexport const serializePrimitiveParam = ({\n allowReserved,\n name,\n value,\n}: SerializePrimitiveParam) => {\n if (value === undefined || value === null) {\n return '';\n }\n\n if (typeof value === 'object') {\n throw new Error(\n 'Deeply-nested arrays/objects aren’t supported. Provide your own `querySerializer()` to handle these.',\n );\n }\n\n return `${name}=${allowReserved ? value : encodeURIComponent(value)}`;\n};\n\nexport const serializeObjectParam = ({\n allowReserved,\n explode,\n name,\n style,\n value,\n valueOnly,\n}: SerializeOptions<ObjectSeparatorStyle> & {\n value: Record<string, unknown> | Date;\n valueOnly?: boolean;\n}) => {\n if (value instanceof Date) {\n return valueOnly ? value.toISOString() : `${name}=${value.toISOString()}`;\n }\n\n if (style !== 'deepObject' && !explode) {\n let values: string[] = [];\n Object.entries(value).forEach(([key, v]) => {\n values = [...values, key, allowReserved ? (v as string) : encodeURIComponent(v as string)];\n });\n const joinedValues = values.join(',');\n switch (style) {\n case 'form':\n return `${name}=${joinedValues}`;\n case 'label':\n return `.${joinedValues}`;\n case 'matrix':\n return `;${name}=${joinedValues}`;\n default:\n return joinedValues;\n }\n }\n\n const separator = separatorObjectExplode(style);\n const joinedValues = Object.entries(value)\n .map(([key, v]) =>\n serializePrimitiveParam({\n allowReserved,\n name: style === 'deepObject' ? `${name}[${key}]` : key,\n value: v as string,\n }),\n )\n .join(separator);\n return style === 'label' || style === 'matrix' ? separator + joinedValues : joinedValues;\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport type { BodySerializer, QuerySerializer } from './bodySerializer.gen';\nimport {\n type ArraySeparatorStyle,\n serializeArrayParam,\n serializeObjectParam,\n serializePrimitiveParam,\n} from './pathSerializer.gen';\n\nexport interface PathSerializer {\n path: Record<string, unknown>;\n url: string;\n}\n\nexport const PATH_PARAM_RE = /\\{[^{}]+\\}/g;\n\nexport const defaultPathSerializer = ({ path, url: _url }: PathSerializer) => {\n let url = _url;\n const matches = _url.match(PATH_PARAM_RE);\n if (matches) {\n for (const match of matches) {\n let explode = false;\n let name = match.substring(1, match.length - 1);\n let style: ArraySeparatorStyle = 'simple';\n\n if (name.endsWith('*')) {\n explode = true;\n name = name.substring(0, name.length - 1);\n }\n\n if (name.startsWith('.')) {\n name = name.substring(1);\n style = 'label';\n } else if (name.startsWith(';')) {\n name = name.substring(1);\n style = 'matrix';\n }\n\n const value = path[name];\n\n if (value === undefined || value === null) {\n continue;\n }\n\n if (Array.isArray(value)) {\n url = url.replace(match, serializeArrayParam({ explode, name, style, value }));\n continue;\n }\n\n if (typeof value === 'object') {\n url = url.replace(\n match,\n serializeObjectParam({\n explode,\n name,\n style,\n value: value as Record<string, unknown>,\n valueOnly: true,\n }),\n );\n continue;\n }\n\n if (style === 'matrix') {\n url = url.replace(\n match,\n `;${serializePrimitiveParam({\n name,\n value: value as string,\n })}`,\n );\n continue;\n }\n\n const replaceValue = encodeURIComponent(\n style === 'label' ? `.${value as string}` : (value as string),\n );\n url = url.replace(match, replaceValue);\n }\n }\n return url;\n};\n\nexport const getUrl = ({\n baseUrl,\n path,\n query,\n querySerializer,\n url: _url,\n}: {\n baseUrl?: string;\n path?: Record<string, unknown>;\n query?: Record<string, unknown>;\n querySerializer: QuerySerializer;\n url: string;\n}) => {\n const pathUrl = _url.startsWith('/') ? _url : `/${_url}`;\n let url = (baseUrl ?? '') + pathUrl;\n if (path) {\n url = defaultPathSerializer({ path, url });\n }\n let search = query ? querySerializer(query) : '';\n if (search.startsWith('?')) {\n search = search.substring(1);\n }\n if (search) {\n url += `?${search}`;\n }\n return url;\n};\n\nexport function getValidRequestBody(options: {\n body?: unknown;\n bodySerializer?: BodySerializer | null;\n serializedBody?: unknown;\n}) {\n const hasBody = options.body !== undefined;\n const isSerializedBody = hasBody && options.bodySerializer;\n\n if (isSerializedBody) {\n if ('serializedBody' in options) {\n const hasSerializedBody =\n options.serializedBody !== undefined && options.serializedBody !== '';\n\n return hasSerializedBody ? options.serializedBody : null;\n }\n\n // not all clients implement a serializedBody property (i.e., client-axios)\n return options.body !== '' ? options.body : null;\n }\n\n // plain/text body\n if (hasBody) {\n return options.body;\n }\n\n // no body was provided\n return undefined;\n}\n","// This file is auto-generated by @hey-api/openapi-ts\n\nexport type AuthToken = string | undefined;\n\nexport interface Auth {\n /**\n * Which part of the request do we use to send the auth?\n *\n * @default 'header'\n */\n in?: 'header' | 'query' | 'cookie';\n /**\n * Header or query parameter name.\n *\n * @default 'Authorization'\n */\n name?: string;\n scheme?: 'basic' | 'bearer';\n type: 'apiKey' | 'http';\n}\n\nexport const getAuthToken = async (\n auth: Auth,\n callback: ((auth: Auth) => Promise<AuthToken> | AuthToken) | AuthToken,\n): Promise<string | undefined> => {\n const token = typeof callback === 'function' ? await callback(auth) : callback;\n\n if (!token) {\n return;\n }\n\n if (auth.scheme === 'bearer') {\n return `Bearer ${token}`;\n }\n\n if (auth.scheme === 'basic') {\n return `Basic ${btoa(token)}`;\n }\n\n return token;\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport { getAuthToken } from '../core/auth.gen';\nimport type { QuerySerializerOptions } from '../core/bodySerializer.gen';\nimport { jsonBodySerializer } from '../core/bodySerializer.gen';\nimport {\n serializeArrayParam,\n serializeObjectParam,\n serializePrimitiveParam,\n} from '../core/pathSerializer.gen';\nimport { getUrl } from '../core/utils.gen';\nimport type { Client, ClientOptions, Config, RequestOptions } from './types.gen';\n\nexport const createQuerySerializer = <T = unknown>({\n parameters = {},\n ...args\n}: QuerySerializerOptions = {}) => {\n const querySerializer = (queryParams: T) => {\n const search: string[] = [];\n if (queryParams && typeof queryParams === 'object') {\n for (const name in queryParams) {\n const value = queryParams[name];\n\n if (value === undefined || value === null) {\n continue;\n }\n\n const options = parameters[name] || args;\n\n if (Array.isArray(value)) {\n const serializedArray = serializeArrayParam({\n allowReserved: options.allowReserved,\n explode: true,\n name,\n style: 'form',\n value,\n ...options.array,\n });\n if (serializedArray) search.push(serializedArray);\n } else if (typeof value === 'object') {\n const serializedObject = serializeObjectParam({\n allowReserved: options.allowReserved,\n explode: true,\n name,\n style: 'deepObject',\n value: value as Record<string, unknown>,\n ...options.object,\n });\n if (serializedObject) search.push(serializedObject);\n } else {\n const serializedPrimitive = serializePrimitiveParam({\n allowReserved: options.allowReserved,\n name,\n value: value as string,\n });\n if (serializedPrimitive) search.push(serializedPrimitive);\n }\n }\n }\n return search.join('&');\n };\n return querySerializer;\n};\n\n/**\n * Infers parseAs value from provided Content-Type header.\n */\nexport const getParseAs = (contentType: string | null): Exclude<Config['parseAs'], 'auto'> => {\n if (!contentType) {\n // If no Content-Type header is provided, the best we can do is return the raw response body,\n // which is effectively the same as the 'stream' option.\n return 'stream';\n }\n\n const cleanContent = contentType.split(';')[0]?.trim();\n\n if (!cleanContent) {\n return;\n }\n\n if (cleanContent.startsWith('application/json') || cleanContent.endsWith('+json')) {\n return 'json';\n }\n\n if (cleanContent === 'multipart/form-data') {\n return 'formData';\n }\n\n if (\n ['application/', 'audio/', 'image/', 'video/'].some((type) => cleanContent.startsWith(type))\n ) {\n return 'blob';\n }\n\n if (cleanContent.startsWith('text/')) {\n return 'text';\n }\n\n return;\n};\n\nconst checkForExistence = (\n options: Pick<RequestOptions, 'auth' | 'query'> & {\n headers: Headers;\n },\n name?: string,\n): boolean => {\n if (!name) {\n return false;\n }\n if (\n options.headers.has(name) ||\n options.query?.[name] ||\n options.headers.get('Cookie')?.includes(`${name}=`)\n ) {\n return true;\n }\n return false;\n};\n\nexport const setAuthParams = async ({\n security,\n ...options\n}: Pick<Required<RequestOptions>, 'security'> &\n Pick<RequestOptions, 'auth' | 'query'> & {\n headers: Headers;\n }) => {\n for (const auth of security) {\n if (checkForExistence(options, auth.name)) {\n continue;\n }\n\n const token = await getAuthToken(auth, options.auth);\n\n if (!token) {\n continue;\n }\n\n const name = auth.name ?? 'Authorization';\n\n switch (auth.in) {\n case 'query':\n if (!options.query) {\n options.query = {};\n }\n options.query[name] = token;\n break;\n case 'cookie':\n options.headers.append('Cookie', `${name}=${token}`);\n break;\n case 'header':\n default:\n options.headers.set(name, token);\n break;\n }\n }\n};\n\nexport const buildUrl: Client['buildUrl'] = (options) =>\n getUrl({\n baseUrl: options.baseUrl as string,\n path: options.path,\n query: options.query,\n querySerializer:\n typeof options.querySerializer === 'function'\n ? options.querySerializer\n : createQuerySerializer(options.querySerializer),\n url: options.url,\n });\n\nexport const mergeConfigs = (a: Config, b: Config): Config => {\n const config = { ...a, ...b };\n if (config.baseUrl?.endsWith('/')) {\n config.baseUrl = config.baseUrl.substring(0, config.baseUrl.length - 1);\n }\n config.headers = mergeHeaders(a.headers, b.headers);\n return config;\n};\n\nconst headersEntries = (headers: Headers): Array<[string, string]> => {\n const entries: Array<[string, string]> = [];\n headers.forEach((value, key) => {\n entries.push([key, value]);\n });\n return entries;\n};\n\nexport const mergeHeaders = (\n ...headers: Array<Required<Config>['headers'] | undefined>\n): Headers => {\n const mergedHeaders = new Headers();\n for (const header of headers) {\n if (!header) {\n continue;\n }\n\n const iterator = header instanceof Headers ? headersEntries(header) : Object.entries(header);\n\n for (const [key, value] of iterator) {\n if (value === null) {\n mergedHeaders.delete(key);\n } else if (Array.isArray(value)) {\n for (const v of value) {\n mergedHeaders.append(key, v as string);\n }\n } else if (value !== undefined) {\n // assume object headers are meant to be JSON stringified, i.e., their\n // content value in OpenAPI specification is 'application/json'\n mergedHeaders.set(\n key,\n typeof value === 'object' ? JSON.stringify(value) : (value as string),\n );\n }\n }\n }\n return mergedHeaders;\n};\n\ntype ErrInterceptor<Err, Res, Req, Options> = (\n error: Err,\n /** response may be undefined due to a network error where no response object is produced */\n response: Res | undefined,\n /** request may be undefined, because error may be from building the request object itself */\n request: Req | undefined,\n options: Options,\n) => Err | Promise<Err>;\n\ntype ReqInterceptor<Req, Options> = (request: Req, options: Options) => Req | Promise<Req>;\n\ntype ResInterceptor<Res, Req, Options> = (\n response: Res,\n request: Req,\n options: Options,\n) => Res | Promise<Res>;\n\nclass Interceptors<Interceptor> {\n fns: Array<Interceptor | null> = [];\n\n clear(): void {\n this.fns = [];\n }\n\n eject(id: number | Interceptor): void {\n const index = this.getInterceptorIndex(id);\n if (this.fns[index]) {\n this.fns[index] = null;\n }\n }\n\n exists(id: number | Interceptor): boolean {\n const index = this.getInterceptorIndex(id);\n return Boolean(this.fns[index]);\n }\n\n getInterceptorIndex(id: number | Interceptor): number {\n if (typeof id === 'number') {\n return this.fns[id] ? id : -1;\n }\n return this.fns.indexOf(id);\n }\n\n update(id: number | Interceptor, fn: Interceptor): number | Interceptor | false {\n const index = this.getInterceptorIndex(id);\n if (this.fns[index]) {\n this.fns[index] = fn;\n return id;\n }\n return false;\n }\n\n use(fn: Interceptor): number {\n this.fns.push(fn);\n return this.fns.length - 1;\n }\n}\n\nexport interface Middleware<Req, Res, Err, Options> {\n error: Interceptors<ErrInterceptor<Err, Res, Req, Options>>;\n request: Interceptors<ReqInterceptor<Req, Options>>;\n response: Interceptors<ResInterceptor<Res, Req, Options>>;\n}\n\nexport const createInterceptors = <Req, Res, Err, Options>(): Middleware<\n Req,\n Res,\n Err,\n Options\n> => ({\n error: new Interceptors<ErrInterceptor<Err, Res, Req, Options>>(),\n request: new Interceptors<ReqInterceptor<Req, Options>>(),\n response: new Interceptors<ResInterceptor<Res, Req, Options>>(),\n});\n\nconst defaultQuerySerializer = createQuerySerializer({\n allowReserved: false,\n array: {\n explode: true,\n style: 'form',\n },\n object: {\n explode: true,\n style: 'deepObject',\n },\n});\n\nconst defaultHeaders = {\n 'Content-Type': 'application/json',\n};\n\nexport const createConfig = <T extends ClientOptions = ClientOptions>(\n override: Config<Omit<ClientOptions, keyof T> & T> = {},\n): Config<Omit<ClientOptions, keyof T> & T> => ({\n ...jsonBodySerializer,\n headers: defaultHeaders,\n parseAs: 'auto',\n querySerializer: defaultQuerySerializer,\n ...override,\n});\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport { createSseClient } from '../core/serverSentEvents.gen';\nimport type { HttpMethod } from '../core/types.gen';\nimport { getValidRequestBody } from '../core/utils.gen';\nimport type { Client, Config, RequestOptions, ResolvedRequestOptions } from './types.gen';\nimport {\n buildUrl,\n createConfig,\n createInterceptors,\n getParseAs,\n mergeConfigs,\n mergeHeaders,\n setAuthParams,\n} from './utils.gen';\n\ntype ReqInit = Omit<RequestInit, 'body' | 'headers'> & {\n body?: any;\n headers: ReturnType<typeof mergeHeaders>;\n};\n\nexport const createClient = (config: Config = {}): Client => {\n let _config = mergeConfigs(createConfig(), config);\n\n const getConfig = (): Config => ({ ..._config });\n\n const setConfig = (config: Config): Config => {\n _config = mergeConfigs(_config, config);\n return getConfig();\n };\n\n const interceptors = createInterceptors<Request, Response, unknown, ResolvedRequestOptions>();\n\n const beforeRequest = async <\n TData = unknown,\n TResponseStyle extends 'data' | 'fields' = 'fields',\n ThrowOnError extends boolean = boolean,\n Url extends string = string,\n >(\n options: RequestOptions<TData, TResponseStyle, ThrowOnError, Url>,\n ) => {\n const opts = {\n ..._config,\n ...options,\n fetch: options.fetch ?? _config.fetch ?? globalThis.fetch,\n headers: mergeHeaders(_config.headers, options.headers),\n serializedBody: undefined as string | undefined,\n };\n\n if (opts.security) {\n await setAuthParams({\n ...opts,\n security: opts.security,\n });\n }\n\n if (opts.requestValidator) {\n await opts.requestValidator(opts);\n }\n\n if (opts.body !== undefined && opts.bodySerializer) {\n opts.serializedBody = opts.bodySerializer(opts.body) as string | undefined;\n }\n\n // remove Content-Type header if body is empty to avoid sending invalid requests\n if (opts.body === undefined || opts.serializedBody === '') {\n opts.headers.delete('Content-Type');\n }\n\n const resolvedOpts = opts as typeof opts &\n ResolvedRequestOptions<TResponseStyle, ThrowOnError, Url>;\n const url = buildUrl(resolvedOpts);\n\n return { opts: resolvedOpts, url };\n };\n\n const request: Client['request'] = async (options) => {\n const throwOnError = options.throwOnError ?? _config.throwOnError;\n const responseStyle = options.responseStyle ?? _config.responseStyle;\n\n let request: Request | undefined;\n let response: Response | undefined;\n\n try {\n const { opts, url } = await beforeRequest(options);\n const requestInit: ReqInit = {\n redirect: 'follow',\n ...opts,\n body: getValidRequestBody(opts),\n };\n\n request = new Request(url, requestInit);\n\n for (const fn of interceptors.request.fns) {\n if (fn) {\n request = await fn(request, opts);\n }\n }\n\n // fetch must be assigned here, otherwise it would throw the error:\n // TypeError: Failed to execute 'fetch' on 'Window': Illegal invocation\n const _fetch = opts.fetch!;\n\n response = await _fetch(request);\n\n for (const fn of interceptors.response.fns) {\n if (fn) {\n response = await fn(response, request, opts);\n }\n }\n\n const result = {\n request,\n response,\n };\n\n if (response.ok) {\n const parseAs =\n (opts.parseAs === 'auto'\n ? getParseAs(response.headers.get('Content-Type'))\n : opts.parseAs) ?? 'json';\n\n if (response.status === 204 || response.headers.get('Content-Length') === '0') {\n let emptyData: any;\n switch (parseAs) {\n case 'arrayBuffer':\n case 'blob':\n case 'text':\n emptyData = await response[parseAs]();\n break;\n case 'formData':\n emptyData = new FormData();\n break;\n case 'stream':\n emptyData = response.body;\n break;\n case 'json':\n default:\n emptyData = {};\n break;\n }\n return opts.responseStyle === 'data'\n ? emptyData\n : {\n data: emptyData,\n ...result,\n };\n }\n\n let data: any;\n switch (parseAs) {\n case 'arrayBuffer':\n case 'blob':\n case 'formData':\n case 'text':\n data = await response[parseAs]();\n break;\n case 'json': {\n // Some servers return 200 with no Content-Length and empty body.\n // response.json() would throw; read as text and parse if non-empty.\n const text = await response.text();\n data = text ? JSON.parse(text) : {};\n break;\n }\n case 'stream':\n return opts.responseStyle === 'data'\n ? response.body\n : {\n data: response.body,\n ...result,\n };\n }\n\n if (parseAs === 'json') {\n if (opts.responseValidator) {\n await opts.responseValidator(data);\n }\n\n if (opts.responseTransformer) {\n data = await opts.responseTransformer(data);\n }\n }\n\n return opts.responseStyle === 'data'\n ? data\n : {\n data,\n ...result,\n };\n }\n\n const textError = await response.text();\n let jsonError: unknown;\n\n try {\n jsonError = JSON.parse(textError);\n } catch {\n // noop\n }\n\n throw jsonError ?? textError;\n } catch (error) {\n let finalError = error;\n\n for (const fn of interceptors.error.fns) {\n if (fn) {\n finalError = await fn(finalError, response, request, options as ResolvedRequestOptions);\n }\n }\n\n finalError = finalError || {};\n\n if (throwOnError) {\n throw finalError;\n }\n\n // TODO: we probably want to return error and improve types\n return responseStyle === 'data'\n ? undefined\n : {\n error: finalError,\n request,\n response,\n };\n }\n };\n\n const makeMethodFn = (method: Uppercase<HttpMethod>) => (options: RequestOptions) =>\n request({ ...options, method });\n\n const makeSseFn = (method: Uppercase<HttpMethod>) => async (options: RequestOptions) => {\n const { opts, url } = await beforeRequest(options);\n return createSseClient({\n ...opts,\n body: opts.body as BodyInit | null | undefined,\n method,\n onRequest: async (url, init) => {\n let request = new Request(url, init);\n for (const fn of interceptors.request.fns) {\n if (fn) {\n request = await fn(request, opts);\n }\n }\n return request;\n },\n serializedBody: getValidRequestBody(opts) as BodyInit | null | undefined,\n url,\n });\n };\n\n const _buildUrl: Client['buildUrl'] = (options) => buildUrl({ ..._config, ...options });\n\n return {\n buildUrl: _buildUrl,\n connect: makeMethodFn('CONNECT'),\n delete: makeMethodFn('DELETE'),\n get: makeMethodFn('GET'),\n getConfig,\n head: makeMethodFn('HEAD'),\n interceptors,\n options: makeMethodFn('OPTIONS'),\n patch: makeMethodFn('PATCH'),\n post: makeMethodFn('POST'),\n put: makeMethodFn('PUT'),\n request,\n setConfig,\n sse: {\n connect: makeSseFn('CONNECT'),\n delete: makeSseFn('DELETE'),\n get: makeSseFn('GET'),\n head: makeSseFn('HEAD'),\n options: makeSseFn('OPTIONS'),\n patch: makeSseFn('PATCH'),\n post: makeSseFn('POST'),\n put: makeSseFn('PUT'),\n trace: makeSseFn('TRACE'),\n },\n trace: makeMethodFn('TRACE'),\n } as Client;\n};\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport { type ClientOptions, type Config, createClient, createConfig } from './client';\nimport type { ClientOptions as ClientOptions2 } from './types.gen';\n\n/**\n * The `createClientConfig()` function will be called on client initialization\n * and the returned object will become the client's initial configuration.\n *\n * You may want to initialize your client this way instead of calling\n * `setConfig()`. This is useful for example if you're using Next.js\n * to ensure your client always has the correct values.\n */\nexport type CreateClientConfig<T extends ClientOptions = ClientOptions2> = (override?: Config<ClientOptions & T>) => Config<Required<ClientOptions> & T>;\n\nexport const client = createClient(createConfig<ClientOptions2>({ baseUrl: 'http://localhost:8000' }));\n\n// auto-init: install auth on client\nimport { installAuthOnClient } from './helpers/auth';\ninstallAuthOnClient(client);\n","// This file is auto-generated by @hey-api/openapi-ts\n\nimport { type Client, formDataBodySerializer, type Options as Options2, type TDataShape } from './client';\nimport { client } from './client.gen';\nimport type { CfgAccountsApiKeyRegenerateCreateData, CfgAccountsApiKeyRegenerateCreateErrors, CfgAccountsApiKeyRegenerateCreateResponses, CfgAccountsApiKeyRetrieveData, CfgAccountsApiKeyRetrieveErrors, CfgAccountsApiKeyRetrieveResponses, CfgAccountsApiKeyTestCreateData, CfgAccountsApiKeyTestCreateResponses, CfgAccountsOauthConnectionsListData, CfgAccountsOauthConnectionsListResponses, CfgAccountsOauthDisconnectCreateData, CfgAccountsOauthDisconnectCreateErrors, CfgAccountsOauthDisconnectCreateResponses, CfgAccountsOauthGithubAuthorizeCreateData, CfgAccountsOauthGithubAuthorizeCreateErrors, CfgAccountsOauthGithubAuthorizeCreateResponses, CfgAccountsOauthGithubCallbackCreateData, CfgAccountsOauthGithubCallbackCreateErrors, CfgAccountsOauthGithubCallbackCreateResponses, CfgAccountsOauthProvidersRetrieveData, CfgAccountsOauthProvidersRetrieveResponses, CfgAccountsOtpRequestCreateData, CfgAccountsOtpRequestCreateErrors, CfgAccountsOtpRequestCreateResponses, CfgAccountsOtpVerifyCreateData, CfgAccountsOtpVerifyCreateErrors, CfgAccountsOtpVerifyCreateResponses, CfgAccountsProfileAvatarCreateData, CfgAccountsProfileAvatarCreateErrors, CfgAccountsProfileAvatarCreateResponses, CfgAccountsProfileDeleteCreateData, CfgAccountsProfileDeleteCreateErrors, CfgAccountsProfileDeleteCreateResponses, CfgAccountsProfilePartialPartialUpdateData, CfgAccountsProfilePartialPartialUpdateErrors, CfgAccountsProfilePartialPartialUpdateResponses, CfgAccountsProfilePartialUpdateData, CfgAccountsProfilePartialUpdateErrors, CfgAccountsProfilePartialUpdateResponses, CfgAccountsProfileRetrieveData, CfgAccountsProfileRetrieveErrors, CfgAccountsProfileRetrieveResponses, CfgAccountsProfileUpdatePartialUpdateData, CfgAccountsProfileUpdatePartialUpdateErrors, CfgAccountsProfileUpdatePartialUpdateResponses, CfgAccountsProfileUpdateUpdateData, CfgAccountsProfileUpdateUpdateErrors, CfgAccountsProfileUpdateUpdateResponses, CfgAccountsTokenRefreshCreateData, CfgAccountsTokenRefreshCreateResponses, CfgCentrifugoAuthTokenRetrieveData, CfgCentrifugoAuthTokenRetrieveErrors, CfgCentrifugoAuthTokenRetrieveResponses, CfgTotpBackupCodesRegenerateCreateData, CfgTotpBackupCodesRegenerateCreateErrors, CfgTotpBackupCodesRegenerateCreateResponses, CfgTotpBackupCodesRetrieveData, CfgTotpBackupCodesRetrieveResponses, CfgTotpDevicesDestroyData, CfgTotpDevicesDestroyResponses, CfgTotpDevicesRetrieveData, CfgTotpDevicesRetrieveResponses, CfgTotpDisableCreateData, CfgTotpDisableCreateErrors, CfgTotpDisableCreateResponses, CfgTotpSetupConfirmCreateData, CfgTotpSetupConfirmCreateErrors, CfgTotpSetupConfirmCreateResponses, CfgTotpSetupCreateData, CfgTotpSetupCreateErrors, CfgTotpSetupCreateResponses, CfgTotpVerifyBackupCreateData, CfgTotpVerifyBackupCreateErrors, CfgTotpVerifyBackupCreateResponses, CfgTotpVerifyCreateData, CfgTotpVerifyCreateErrors, CfgTotpVerifyCreateResponses } from './types.gen';\n\nexport type Options<TData extends TDataShape = TDataShape, ThrowOnError extends boolean = boolean, TResponse = unknown> = Options2<TData, ThrowOnError, TResponse> & {\n /**\n * You can provide a client instance returned by `createClient()` instead of\n * individual options. This might be also useful if you want to implement a\n * custom client.\n */\n client?: Client;\n /**\n * You can pass arbitrary values through the `meta` object. This can be\n * used to access values that aren't defined as part of the SDK function.\n */\n meta?: Record<string, unknown>;\n};\n\nexport class CfgAccountsApiKey {\n /**\n * Get API key details\n *\n * Retrieve the current user's API key (masked) and metadata.\n */\n public static cfgAccountsApiKeyRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsApiKeyRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgAccountsApiKeyRetrieveResponses, CfgAccountsApiKeyRetrieveErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/api-key/',\n ...options\n });\n }\n \n /**\n * Regenerate API key\n *\n * Generate a new API key. The full key is returned only once.\n */\n public static cfgAccountsApiKeyRegenerateCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsApiKeyRegenerateCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsApiKeyRegenerateCreateResponses, CfgAccountsApiKeyRegenerateCreateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/api-key/regenerate/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * Test API key\n *\n * Test whether an API key is valid without consuming it.\n */\n public static cfgAccountsApiKeyTestCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsApiKeyTestCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsApiKeyTestCreateResponses, unknown, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/api-key/test/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgAccountsOauth {\n /**\n * List OAuth connections\n *\n * Get all OAuth connections for the current user.\n */\n public static cfgAccountsOauthConnectionsList<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsOauthConnectionsListData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgAccountsOauthConnectionsListResponses, unknown, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/oauth/connections/',\n ...options\n });\n }\n \n /**\n * Disconnect OAuth provider\n *\n * Remove OAuth connection for the specified provider.\n */\n public static cfgAccountsOauthDisconnectCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsOauthDisconnectCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsOauthDisconnectCreateResponses, CfgAccountsOauthDisconnectCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/oauth/disconnect/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * Start GitHub OAuth\n *\n * Generate GitHub OAuth authorization URL. Redirect user to this URL to start authentication.\n */\n public static cfgAccountsOauthGithubAuthorizeCreate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsOauthGithubAuthorizeCreateData, ThrowOnError>) {\n return (options?.client ?? client).post<CfgAccountsOauthGithubAuthorizeCreateResponses, CfgAccountsOauthGithubAuthorizeCreateErrors, ThrowOnError>({\n url: '/cfg/accounts/oauth/github/authorize/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Complete GitHub OAuth\n *\n * Exchange authorization code for JWT tokens. Call this after GitHub redirects back with code.\n */\n public static cfgAccountsOauthGithubCallbackCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsOauthGithubCallbackCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsOauthGithubCallbackCreateResponses, CfgAccountsOauthGithubCallbackCreateErrors, ThrowOnError>({\n url: '/cfg/accounts/oauth/github/callback/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * List OAuth providers\n *\n * Get list of available OAuth providers for authentication.\n */\n public static cfgAccountsOauthProvidersRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsOauthProvidersRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgAccountsOauthProvidersRetrieveResponses, unknown, ThrowOnError>({ url: '/cfg/accounts/oauth/providers/', ...options });\n }\n}\n\nexport class CfgAccounts {\n /**\n * Request OTP code to email.\n */\n public static cfgAccountsOtpRequestCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsOtpRequestCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsOtpRequestCreateResponses, CfgAccountsOtpRequestCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/otp/request/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * Verify OTP code and return JWT tokens or 2FA session.\n *\n * If user has 2FA enabled:\n * - Returns requires_2fa=True with session_id\n * - Client must complete 2FA verification at /cfg/totp/verify/\n *\n * If user has no 2FA:\n * - Returns JWT tokens and user data directly\n */\n public static cfgAccountsOtpVerifyCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsOtpVerifyCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsOtpVerifyCreateResponses, CfgAccountsOtpVerifyCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/otp/verify/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgAccountsProfile {\n /**\n * Get current user profile\n *\n * Retrieve the current authenticated user's profile information.\n */\n public static cfgAccountsProfileRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgAccountsProfileRetrieveResponses, CfgAccountsProfileRetrieveErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/',\n ...options\n });\n }\n \n /**\n * Upload user avatar\n *\n * Upload avatar image for the current authenticated user. Accepts multipart/form-data with 'avatar' field.\n */\n public static cfgAccountsProfileAvatarCreate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileAvatarCreateData, ThrowOnError>) {\n return (options?.client ?? client).post<CfgAccountsProfileAvatarCreateResponses, CfgAccountsProfileAvatarCreateErrors, ThrowOnError>({\n ...formDataBodySerializer,\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/accounts/profile/avatar/',\n ...options,\n headers: {\n 'Content-Type': null,\n ...options?.headers\n }\n });\n }\n \n /**\n * Delete user account\n *\n *\n * Permanently delete the current user's account.\n *\n * This operation:\n * - Deactivates the account (user cannot log in)\n * - Anonymizes personal data (GDPR compliance)\n * - Frees up the email address for re-registration\n * - Preserves audit trail\n *\n * The account can be restored by an administrator if needed.\n *\n */\n public static cfgAccountsProfileDeleteCreate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileDeleteCreateData, ThrowOnError>) {\n return (options?.client ?? client).post<CfgAccountsProfileDeleteCreateResponses, CfgAccountsProfileDeleteCreateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/delete/',\n ...options\n });\n }\n \n /**\n * Partial update user profile\n *\n * Partially update the current authenticated user's profile information. Supports avatar upload.\n */\n public static cfgAccountsProfilePartialPartialUpdate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfilePartialPartialUpdateData, ThrowOnError>) {\n return (options?.client ?? client).patch<CfgAccountsProfilePartialPartialUpdateResponses, CfgAccountsProfilePartialPartialUpdateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/partial/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Partial update user profile\n *\n * Partially update the current authenticated user's profile information. Supports avatar upload.\n */\n public static cfgAccountsProfilePartialUpdate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfilePartialUpdateData, ThrowOnError>) {\n return (options?.client ?? client).put<CfgAccountsProfilePartialUpdateResponses, CfgAccountsProfilePartialUpdateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/partial/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Update user profile\n *\n * Update the current authenticated user's profile information.\n */\n public static cfgAccountsProfileUpdatePartialUpdate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileUpdatePartialUpdateData, ThrowOnError>) {\n return (options?.client ?? client).patch<CfgAccountsProfileUpdatePartialUpdateResponses, CfgAccountsProfileUpdatePartialUpdateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/update/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Update user profile\n *\n * Update the current authenticated user's profile information.\n */\n public static cfgAccountsProfileUpdateUpdate<ThrowOnError extends boolean = false>(options?: Options<CfgAccountsProfileUpdateUpdateData, ThrowOnError>) {\n return (options?.client ?? client).put<CfgAccountsProfileUpdateUpdateResponses, CfgAccountsProfileUpdateUpdateErrors, ThrowOnError>({\n security: [{ scheme: 'bearer', type: 'http' }, {\n in: 'cookie',\n name: 'sessionid',\n type: 'apiKey'\n }],\n url: '/cfg/accounts/profile/update/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n}\n\nexport class CfgAccountsAuth {\n /**\n * Refresh JWT token.\n */\n public static cfgAccountsTokenRefreshCreate<ThrowOnError extends boolean = false>(options: Options<CfgAccountsTokenRefreshCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgAccountsTokenRefreshCreateResponses, unknown, ThrowOnError>({\n url: '/cfg/accounts/token/refresh/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgCentrifugo {\n /**\n * Get Centrifugo connection token\n *\n * Generate JWT token for WebSocket connection to Centrifugo. Token includes user's allowed channels based on their permissions. Requires authentication.\n */\n public static cfgCentrifugoAuthTokenRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgCentrifugoAuthTokenRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgCentrifugoAuthTokenRetrieveResponses, CfgCentrifugoAuthTokenRetrieveErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/centrifugo/auth/token/',\n ...options\n });\n }\n}\n\nexport class CfgTotpBackupCodes {\n /**\n * Get backup codes status for user.\n */\n public static cfgTotpBackupCodesRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgTotpBackupCodesRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgTotpBackupCodesRetrieveResponses, unknown, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/backup-codes/',\n ...options\n });\n }\n \n /**\n * Regenerate backup codes.\n *\n * Requires TOTP code for verification.\n * Invalidates all existing codes.\n */\n public static cfgTotpBackupCodesRegenerateCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpBackupCodesRegenerateCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpBackupCodesRegenerateCreateResponses, CfgTotpBackupCodesRegenerateCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/backup-codes/regenerate/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgTotp {\n /**\n * List all TOTP devices for user.\n */\n public static cfgTotpDevicesRetrieve<ThrowOnError extends boolean = false>(options?: Options<CfgTotpDevicesRetrieveData, ThrowOnError>) {\n return (options?.client ?? client).get<CfgTotpDevicesRetrieveResponses, unknown, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/devices/',\n ...options\n });\n }\n \n /**\n * Delete a TOTP device.\n *\n * Requires verification code if removing the last/primary device.\n */\n public static cfgTotpDevicesDestroy<ThrowOnError extends boolean = false>(options: Options<CfgTotpDevicesDestroyData, ThrowOnError>) {\n return (options.client ?? client).delete<CfgTotpDevicesDestroyResponses, unknown, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/devices/{id}/',\n ...options\n });\n }\n \n /**\n * Completely disable 2FA for account.\n *\n * Requires verification code.\n */\n public static cfgTotpDisableCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpDisableCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpDisableCreateResponses, CfgTotpDisableCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/disable/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgTotpSetup {\n /**\n * Start 2FA setup process.\n *\n * Creates a new TOTP device and returns QR code for scanning.\n */\n public static cfgTotpSetupCreate<ThrowOnError extends boolean = false>(options?: Options<CfgTotpSetupCreateData, ThrowOnError>) {\n return (options?.client ?? client).post<CfgTotpSetupCreateResponses, CfgTotpSetupCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/setup/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options?.headers\n }\n });\n }\n \n /**\n * Confirm 2FA setup with first valid code.\n *\n * Activates the device and generates backup codes.\n */\n public static cfgTotpSetupConfirmCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpSetupConfirmCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpSetupConfirmCreateResponses, CfgTotpSetupConfirmCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/setup/confirm/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n\nexport class CfgTotpVerify {\n /**\n * Verify TOTP code for 2FA session.\n *\n * Completes authentication and returns JWT tokens on success.\n */\n public static cfgTotpVerifyCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpVerifyCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpVerifyCreateResponses, CfgTotpVerifyCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/verify/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n \n /**\n * Verify backup recovery code for 2FA session.\n *\n * Alternative verification method when TOTP device unavailable.\n */\n public static cfgTotpVerifyBackupCreate<ThrowOnError extends boolean = false>(options: Options<CfgTotpVerifyBackupCreateData, ThrowOnError>) {\n return (options.client ?? client).post<CfgTotpVerifyBackupCreateResponses, CfgTotpVerifyBackupCreateErrors, ThrowOnError>({\n security: [{ name: 'X-API-Key', type: 'apiKey' }, { scheme: 'bearer', type: 'http' }],\n url: '/cfg/totp/verify/backup/',\n ...options,\n headers: {\n 'Content-Type': 'application/json',\n ...options.headers\n }\n });\n }\n}\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\nimport { CfgAccountsApiKey } from '../sdk.gen';\nimport { CfgAccountsOauth } from '../sdk.gen';\nimport { CfgAccounts } from '../sdk.gen';\nimport { CfgAccountsProfile } from '../sdk.gen';\nimport { CfgAccountsAuth } from '../sdk.gen';\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n readonly cfgAccountsApiKey = CfgAccountsApiKey;\n readonly cfgAccountsOauth = CfgAccountsOauth;\n readonly cfgAccounts = CfgAccounts;\n readonly cfgAccountsProfile = CfgAccountsProfile;\n readonly cfgAccountsAuth = CfgAccountsAuth;\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { CfgAccountsApiKey, CfgAccountsOauth, CfgAccounts, CfgAccountsProfile, CfgAccountsAuth };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\nimport { CfgCentrifugo } from '../sdk.gen';\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n readonly cfgCentrifugo = CfgCentrifugo;\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { CfgCentrifugo };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\nimport { CfgTotpBackupCodes } from '../sdk.gen';\nimport { CfgTotp } from '../sdk.gen';\nimport { CfgTotpSetup } from '../sdk.gen';\nimport { CfgTotpVerify } from '../sdk.gen';\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n readonly cfgTotpBackupCodes = CfgTotpBackupCodes;\n readonly cfgTotp = CfgTotp;\n readonly cfgTotpSetup = CfgTotpSetup;\n readonly cfgTotpVerify = CfgTotpVerify;\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { CfgTotpBackupCodes, CfgTotp, CfgTotpSetup, CfgTotpVerify };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n//\n// NOTE: classes whose name would collide with a barrel-level type\n// alias (e.g. `Auth`, which is also `type Auth = typeof auth`) are\n// re-exported under a `*SDK` suffix here. The original name is still\n// available via the per-group import: `import { Auth } from\n// '<api>/_auth'`. To remove the alias, rename the OpenAPI tag on the\n// backend so the SDK class doesn't collide.\nexport { CfgAccountsApiKey, CfgAccountsOauth, CfgAccounts, CfgAccountsProfile, CfgAccountsAuth } from './_cfg_accounts';\nexport { CfgCentrifugo } from './_cfg_centrifugo';\nexport { CfgTotpBackupCodes, CfgTotp, CfgTotpSetup, CfgTotpVerify } from './_cfg_totp';\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n","import { isDev } from \"./env\";\n/**\n * Analytics stub for @djangocfg/api/auth\n * Provides minimal analytics interface without external dependencies\n *\n * If you need full analytics, install @djangocfg/layouts and use its Analytics module\n */\n\nexport enum AnalyticsEvent {\n AUTH_OTP_REQUEST = 'auth_otp_request',\n AUTH_LOGIN_SUCCESS = 'auth_login_success',\n AUTH_OTP_VERIFY_FAIL = 'auth_otp_verify_fail',\n AUTH_SESSION_EXPIRED = 'auth_session_expired',\n AUTH_TOKEN_REFRESH = 'auth_token_refresh',\n AUTH_TOKEN_REFRESH_FAIL = 'auth_token_refresh_fail',\n AUTH_LOGOUT = 'auth_logout',\n AUTH_OAUTH_START = 'auth_oauth_start',\n AUTH_OAUTH_FAIL = 'auth_oauth_fail',\n}\n\nexport enum AnalyticsCategory {\n AUTH = 'auth',\n}\n\nexport type AnalyticsEventType = `${AnalyticsEvent}`;\nexport type AnalyticsCategoryType = `${AnalyticsCategory}`;\n\ninterface AnalyticsEventParams {\n category?: AnalyticsCategoryType;\n label?: string;\n value?: number;\n [key: string]: any;\n}\n\n/**\n * Minimal analytics implementation\n * Logs to console in development, silent in production\n */\nexport const Analytics = {\n /**\n * Track an analytics event\n */\n event(eventName: AnalyticsEventType, params?: AnalyticsEventParams) {\n if (isDev) {\n console.log('[Analytics]', eventName, params);\n }\n\n // You can extend this to send to your analytics service\n // Example: window.gtag?.('event', eventName, params);\n },\n\n /**\n * Set user ID for tracking\n */\n setUser(userId: string) {\n if (isDev) {\n console.log('[Analytics] Set user:', userId);\n }\n\n // You can extend this to send to your analytics service\n // Example: window.gtag?.('set', { user_id: userId });\n },\n};\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiAccounts } from '../../clients';\nimport { CfgAccountsOauth } from '../../_api/generated/sdk.gen';\nimport { Analytics, AnalyticsCategory, AnalyticsEvent } from '../utils/analytics';\nimport { authLogger } from '../utils/logger';\nimport { useCfgRouter } from './useCfgRouter';\n\nexport interface UseGithubAuthOptions {\n sourceUrl?: string;\n onSuccess?: (user: any, isNewUser: boolean) => void;\n onError?: (error: string) => void;\n /** Callback when 2FA is required */\n onRequires2FA?: (sessionId: string, shouldPrompt2FA: boolean) => void;\n redirectUrl?: string;\n /** Skip automatic redirect after success (caller handles navigation) */\n skipRedirect?: boolean;\n}\n\nexport interface UseGithubAuthReturn {\n isLoading: boolean;\n error: string | null;\n startGithubAuth: () => Promise<void>;\n handleGithubCallback: (code: string, state: string) => Promise<void>;\n}\n\n/**\n * Hook for GitHub OAuth authentication flow.\n *\n * Usage:\n * 1. Call startGithubAuth() to redirect user to GitHub\n * 2. After GitHub redirects back, call handleGithubCallback(code, state)\n *\n * @example\n * ```tsx\n * const { isLoading, error, startGithubAuth } = useGithubAuth({\n * onSuccess: (user) => router.push('/dashboard'),\n * onError: (error) => console.error(error),\n * });\n *\n * <Button onClick={startGithubAuth} disabled={isLoading}>\n * Continue with GitHub\n * </Button>\n * ```\n */\nexport const useGithubAuth = (options: UseGithubAuthOptions = {}): UseGithubAuthReturn => {\n const { sourceUrl, onSuccess, onError, onRequires2FA, redirectUrl, skipRedirect = false } = options;\n const router = useCfgRouter();\n\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n\n /**\n * Start GitHub OAuth flow - redirects user to GitHub authorization page.\n */\n const startGithubAuth = useCallback(async () => {\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Starting GitHub OAuth flow...');\n\n // Track OAuth start\n Analytics.event(AnalyticsEvent.AUTH_OAUTH_START, {\n category: AnalyticsCategory.AUTH,\n label: 'github',\n });\n\n // Call API to get authorization URL\n // The API will auto-generate redirect_uri from config if not provided\n const result = await CfgAccountsOauth.cfgAccountsOauthGithubAuthorizeCreate({\n body: {\n source_url: sourceUrl || (typeof window !== 'undefined' ? window.location.href : ''),\n },\n throwOnError: true,\n });\n const response = result.data;\n\n if (!response.authorization_url) {\n throw new Error('Failed to get authorization URL');\n }\n\n authLogger.info('Redirecting to GitHub...', response.authorization_url);\n\n if (typeof window !== 'undefined') {\n sessionStorage.setItem('oauth_state', response.state);\n sessionStorage.setItem('oauth_provider', 'github');\n }\n\n window.location.href = response.authorization_url;\n\n } catch (err) {\n const errorMessage = err instanceof Error ? err.message : 'Failed to start GitHub authentication';\n authLogger.error('GitHub OAuth start error:', err);\n setError(errorMessage);\n onError?.(errorMessage);\n\n // Track OAuth error\n Analytics.event(AnalyticsEvent.AUTH_OAUTH_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: 'github',\n });\n } finally {\n setIsLoading(false);\n }\n }, [sourceUrl, onError]);\n\n /**\n * Handle GitHub OAuth callback - exchanges code for JWT tokens.\n *\n * @param code - Authorization code from GitHub callback\n * @param state - State token for CSRF verification\n */\n const handleGithubCallback = useCallback(async (code: string, state: string) => {\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Processing GitHub OAuth callback...');\n\n // Verify state matches what we stored\n if (typeof window !== 'undefined') {\n const storedState = sessionStorage.getItem('oauth_state');\n if (storedState && storedState !== state) {\n throw new Error('Invalid OAuth state - possible CSRF attack');\n }\n // Clear stored state\n sessionStorage.removeItem('oauth_state');\n sessionStorage.removeItem('oauth_provider');\n }\n\n const result = await CfgAccountsOauth.cfgAccountsOauthGithubCallbackCreate({\n body: { code, state },\n throwOnError: true,\n });\n const response = result.data;\n\n // Check if 2FA is required\n if (response.requires_2fa && response.session_id) {\n authLogger.info('GitHub OAuth requires 2FA, session:', response.session_id);\n\n // Track 2FA requirement\n Analytics.event(AnalyticsEvent.AUTH_OAUTH_START, {\n category: AnalyticsCategory.AUTH,\n label: 'github-2fa-required',\n });\n\n // Call 2FA callback\n onRequires2FA?.(response.session_id, response.should_prompt_2fa || false);\n return;\n }\n\n if (!response.access || !response.refresh) {\n throw new Error('Invalid response from OAuth callback');\n }\n\n authLogger.info('GitHub OAuth successful, user:', response.user);\n\n apiAccounts.setToken(response.access);\n apiAccounts.setRefreshToken(response.refresh);\n\n // Track successful OAuth\n Analytics.event(AnalyticsEvent.AUTH_LOGIN_SUCCESS, {\n category: AnalyticsCategory.AUTH,\n label: 'github',\n });\n\n // Set user ID for future tracking\n if (response.user?.id) {\n Analytics.setUser(String(response.user.id));\n }\n\n // Call success callback\n onSuccess?.(response.user, response.is_new_user || false);\n\n // Redirect (unless skipRedirect is true)\n if (!skipRedirect) {\n // Use hardPush for full page reload - ensures all React contexts reinitialize\n const finalRedirectUrl = redirectUrl || '/dashboard';\n router.hardPush(finalRedirectUrl);\n }\n\n } catch (err) {\n const errorMessage = err instanceof Error ? err.message : 'GitHub authentication failed';\n authLogger.error('GitHub OAuth callback error:', err);\n setError(errorMessage);\n onError?.(errorMessage);\n\n // Track OAuth error\n Analytics.event(AnalyticsEvent.AUTH_OAUTH_FAIL, {\n category: AnalyticsCategory.AUTH,\n label: 'github',\n });\n } finally {\n setIsLoading(false);\n }\n }, [onSuccess, onError, redirectUrl, router]);\n\n return {\n isLoading,\n error,\n startGithubAuth,\n handleGithubCallback,\n };\n};\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiTotp } from '../../clients';\nimport { CfgTotpSetup } from '../../_api/generated/sdk.gen';\nimport { authLogger } from '../utils/logger';\n\nexport interface TwoFactorSetupData {\n /** Device ID to use for confirmation */\n deviceId: string;\n /** Base32-encoded TOTP secret (for manual entry) */\n secret: string;\n /** otpauth:// URI for QR code generation */\n provisioningUri: string;\n /** Base64-encoded QR code image (data URI) */\n qrCodeBase64: string;\n /** Seconds until setup expires */\n expiresIn: number;\n}\n\nexport interface UseTwoFactorSetupOptions {\n /** Callback when setup is confirmed and backup codes are generated */\n onComplete?: (backupCodes: string[]) => void;\n /** Callback on error */\n onError?: (error: string) => void;\n}\n\nexport interface UseTwoFactorSetupReturn {\n /** Loading state */\n isLoading: boolean;\n /** Error message */\n error: string | null;\n /** Setup data (QR code, secret, etc.) */\n setupData: TwoFactorSetupData | null;\n /** Backup codes after confirmation */\n backupCodes: string[] | null;\n /** Warning message about backup codes */\n backupCodesWarning: string | null;\n /** Current setup step */\n setupStep: 'idle' | 'scanning' | 'confirming' | 'complete';\n /** Start 2FA setup - returns QR code data */\n startSetup: (deviceName?: string) => Promise<TwoFactorSetupData | null>;\n /** Confirm setup with TOTP code - returns backup codes */\n confirmSetup: (code: string) => Promise<string[] | null>;\n /** Reset setup state */\n resetSetup: () => void;\n /** Clear error */\n clearError: () => void;\n}\n\n/**\n * Hook for 2FA setup (enabling TOTP authentication).\n *\n * Flow:\n * 1. Call startSetup() to get QR code and provisioning URI\n * 2. User scans QR code with authenticator app\n * 3. Call confirmSetup(code) with the 6-digit code from app\n * 4. Show backup codes to user (they must save these!)\n *\n * @example\n * ```tsx\n * const {\n * isLoading,\n * error,\n * setupData,\n * backupCodes,\n * setupStep,\n * startSetup,\n * confirmSetup,\n * } = useTwoFactorSetup({\n * onComplete: (codes) => console.log('Backup codes:', codes),\n * onError: (error) => console.error(error),\n * });\n *\n * // Start setup\n * const data = await startSetup('My iPhone');\n *\n * // Show QR code\n * <QRCodeSVG value={data.provisioningUri} />\n *\n * // Confirm with code from app\n * const codes = await confirmSetup('123456');\n * ```\n */\nexport const useTwoFactorSetup = (options: UseTwoFactorSetupOptions = {}): UseTwoFactorSetupReturn => {\n const { onComplete, onError } = options;\n\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n const [setupData, setSetupData] = useState<TwoFactorSetupData | null>(null);\n const [backupCodes, setBackupCodes] = useState<string[] | null>(null);\n const [backupCodesWarning, setBackupCodesWarning] = useState<string | null>(null);\n const [setupStep, setSetupStep] = useState<'idle' | 'scanning' | 'confirming' | 'complete'>('idle');\n\n const clearError = useCallback(() => {\n setError(null);\n }, []);\n\n const resetSetup = useCallback(() => {\n setSetupData(null);\n setBackupCodes(null);\n setBackupCodesWarning(null);\n setSetupStep('idle');\n setError(null);\n }, []);\n\n /**\n * Start 2FA setup - generates QR code and secret\n */\n const startSetup = useCallback(async (deviceName?: string): Promise<TwoFactorSetupData | null> => {\n setIsLoading(true);\n setError(null);\n setSetupStep('scanning');\n\n try {\n authLogger.info('Starting 2FA setup...');\n\n const result = await CfgTotpSetup.cfgTotpSetupCreate({\n body: { device_name: deviceName },\n throwOnError: true,\n });\n const response = result.data;\n\n const data: TwoFactorSetupData = {\n deviceId: response.device_id,\n secret: response.secret,\n provisioningUri: response.provisioning_uri,\n qrCodeBase64: response.qr_code_base64,\n expiresIn: response.expires_in,\n };\n\n setSetupData(data);\n authLogger.info('2FA setup initiated, expires in:', data.expiresIn, 'seconds');\n\n return data;\n\n } catch (err) {\n const errorMessage = err instanceof Error ? err.message : 'Failed to start 2FA setup';\n authLogger.error('2FA setup error:', err);\n setError(errorMessage);\n setSetupStep('idle');\n onError?.(errorMessage);\n return null;\n } finally {\n setIsLoading(false);\n }\n }, [onError]);\n\n /**\n * Confirm 2FA setup with TOTP code from authenticator app\n */\n const confirmSetup = useCallback(async (code: string): Promise<string[] | null> => {\n if (!setupData) {\n const msg = 'Setup not started. Call startSetup() first.';\n setError(msg);\n onError?.(msg);\n return null;\n }\n\n if (!code || code.length !== 6) {\n const msg = 'Please enter a 6-digit code';\n setError(msg);\n onError?.(msg);\n return null;\n }\n\n setIsLoading(true);\n setError(null);\n setSetupStep('confirming');\n\n try {\n authLogger.info('Confirming 2FA setup...');\n\n const result = await CfgTotpSetup.cfgTotpSetupConfirmCreate({\n body: { device_id: setupData.deviceId, code },\n throwOnError: true,\n });\n const response = result.data;\n\n const codes = response.backup_codes;\n setBackupCodes(codes);\n setBackupCodesWarning(response.backup_codes_warning);\n setSetupStep('complete');\n\n authLogger.info('2FA setup confirmed, backup codes generated:', codes.length);\n\n // Call completion callback\n onComplete?.(codes);\n\n return codes;\n\n } catch (err) {\n const errorMessage = err instanceof Error ? err.message : 'Invalid code. Please try again.';\n authLogger.error('2FA setup confirmation error:', err);\n setError(errorMessage);\n setSetupStep('scanning'); // Go back to scanning step\n onError?.(errorMessage);\n return null;\n } finally {\n setIsLoading(false);\n }\n }, [setupData, onComplete, onError]);\n\n return {\n isLoading,\n error,\n setupData,\n backupCodes,\n backupCodesWarning,\n setupStep,\n startSetup,\n confirmSetup,\n resetSetup,\n clearError,\n };\n};\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiTotp } from '../../clients';\nimport { APIError } from '../../_api/generated/helpers';\nimport { CfgTotp } from '../../_api/generated/sdk.gen';\nimport { authLogger } from '../utils/logger';\n\nexport interface TwoFactorDevice {\n id: string;\n name: string;\n createdAt: string;\n lastUsedAt: string | null;\n isPrimary: boolean;\n}\n\nexport interface UseTwoFactorStatusReturn {\n /** Loading state */\n isLoading: boolean;\n /** Error message */\n error: string | null;\n /** Whether 2FA is enabled for user */\n has2FAEnabled: boolean | null;\n /** List of TOTP devices */\n devices: TwoFactorDevice[];\n /** Fetch 2FA status */\n fetchStatus: () => Promise<void>;\n /** Disable 2FA (requires TOTP code) */\n disable2FA: (code: string) => Promise<boolean>;\n /** Clear error */\n clearError: () => void;\n}\n\n/**\n * Hook for checking and managing 2FA status.\n *\n * @example\n * ```tsx\n * const { has2FAEnabled, devices, fetchStatus, disable2FA, isLoading } = useTwoFactorStatus();\n *\n * useEffect(() => {\n * fetchStatus();\n * }, [fetchStatus]);\n *\n * if (has2FAEnabled) {\n * // Show disable button\n * } else {\n * // Show enable button\n * }\n * ```\n */\n/** Extract a human-readable message from a thrown error. */\nfunction extractErrorMessage(err: unknown, fallback: string): string {\n if (err instanceof APIError) {\n const body = err.response as Record<string, unknown> | null;\n if (typeof body?.error === 'string') return body.error;\n if (typeof body?.detail === 'string') return body.detail;\n return err.message;\n }\n if (err instanceof Error) return err.message;\n return fallback;\n}\n\nexport const useTwoFactorStatus = (): UseTwoFactorStatusReturn => {\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n const [has2FAEnabled, setHas2FAEnabled] = useState<boolean | null>(null);\n const [devices, setDevices] = useState<TwoFactorDevice[]>([]);\n\n const clearError = useCallback(() => {\n setError(null);\n }, []);\n\n /**\n * Fetch current 2FA status and devices\n */\n const fetchStatus = useCallback(async (): Promise<void> => {\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Fetching 2FA status...');\n\n // API returns { devices: [...], has_2fa_enabled: bool }\n const result = await CfgTotp.cfgTotpDevicesRetrieve({ throwOnError: true });\n const response = result.data;\n\n const mappedDevices: TwoFactorDevice[] = response.devices.map((device) => ({\n id: device.id,\n name: device.name,\n createdAt: device.created_at,\n lastUsedAt: device.last_used_at ?? null,\n isPrimary: device.is_primary,\n }));\n\n setDevices(mappedDevices);\n setHas2FAEnabled(response.has_2fa_enabled);\n\n authLogger.info('2FA status:', response.has_2fa_enabled ? 'enabled' : 'disabled');\n\n } catch (err) {\n const errorMessage = extractErrorMessage(err, 'Failed to fetch 2FA status');\n authLogger.error('Failed to fetch 2FA status:', err);\n setError(errorMessage);\n } finally {\n setIsLoading(false);\n }\n }, []);\n\n /**\n * Disable 2FA for the account\n */\n const disable2FA = useCallback(async (code: string): Promise<boolean> => {\n if (!code || code.length !== 6) {\n setError('Please enter a 6-digit code');\n return false;\n }\n\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Disabling 2FA...');\n\n await CfgTotp.cfgTotpDisableCreate({ body: { code }, throwOnError: true });\n\n setHas2FAEnabled(false);\n setDevices([]);\n\n authLogger.info('2FA disabled successfully');\n return true;\n\n } catch (err: unknown) {\n const errorMessage = extractErrorMessage(err, 'Invalid verification code');\n authLogger.error('Failed to disable 2FA:', err);\n setError(errorMessage);\n return false;\n } finally {\n setIsLoading(false);\n }\n }, []);\n\n return {\n isLoading,\n error,\n has2FAEnabled,\n devices,\n fetchStatus,\n disable2FA,\n clearError,\n };\n};\n","'use client';\n\nimport { useState } from 'react';\n\nimport { authLogger } from '../utils/logger';\n\n/**\n * Simple sessionStorage hook with better error handling\n * @param key - Storage key\n * @param initialValue - Default value if key doesn't exist\n * @returns [value, setValue, removeValue] - Current value, setter function, and remove function\n */\nexport function useSessionStorage<T>(key: string, initialValue: T) {\n // Get initial value from sessionStorage or use provided initialValue\n const [storedValue, setStoredValue] = useState<T>(() => {\n if (typeof window === 'undefined') {\n return initialValue;\n }\n\n try {\n const item = window.sessionStorage.getItem(key);\n return item ? JSON.parse(item) : initialValue;\n } catch (error) {\n authLogger.error(`Error reading sessionStorage key \"${key}\":`, error);\n return initialValue;\n }\n });\n\n // Check data size and limit\n const checkDataSize = (data: any): boolean => {\n try {\n const jsonString = JSON.stringify(data);\n const sizeInBytes = new Blob([jsonString]).size;\n const sizeInKB = sizeInBytes / 1024;\n \n // Limit to 1MB per item\n if (sizeInKB > 1024) {\n authLogger.warn(`Data size (${sizeInKB.toFixed(2)}KB) exceeds 1MB limit for key \"${key}\"`);\n return false;\n }\n\n return true;\n } catch (error) {\n authLogger.error(`Error checking data size for key \"${key}\":`, error);\n return false;\n }\n };\n\n // Clear old data when sessionStorage is full\n const clearOldData = () => {\n try {\n const keys = Object.keys(sessionStorage).filter(key => key && typeof key === 'string');\n // Remove oldest items if we have more than 50 items\n if (keys.length > 50) {\n const itemsToRemove = Math.ceil(keys.length * 0.2);\n for (let i = 0; i < itemsToRemove; i++) {\n try {\n const key = keys[i];\n if (key) {\n sessionStorage.removeItem(key);\n sessionStorage.removeItem(`${key}_timestamp`);\n }\n } catch {\n // Ignore errors when removing items\n }\n }\n }\n } catch (error) {\n authLogger.error('Error clearing old sessionStorage data:', error);\n }\n };\n\n // Force clear all data if quota is exceeded\n const forceClearAll = () => {\n try {\n const keys = Object.keys(sessionStorage);\n for (const key of keys) {\n try {\n sessionStorage.removeItem(key);\n } catch {\n // Ignore errors when removing items\n }\n }\n } catch (error) {\n authLogger.error('Error force clearing sessionStorage:', error);\n }\n };\n\n // Update sessionStorage when value changes\n const setValue = (value: T | ((val: T) => T)) => {\n try {\n const valueToStore = value instanceof Function ? value(storedValue) : value;\n \n // Check data size before attempting to save\n if (!checkDataSize(valueToStore)) {\n authLogger.warn(`Data size too large for key \"${key}\", removing key`);\n // Remove the key if data is too large\n try {\n window.sessionStorage.removeItem(key);\n window.sessionStorage.removeItem(`${key}_timestamp`);\n } catch {\n // Ignore errors when removing\n }\n // Still update the state\n setStoredValue(valueToStore);\n return;\n }\n \n setStoredValue(valueToStore);\n\n if (typeof window !== 'undefined') {\n // Try to set the value\n try {\n window.sessionStorage.setItem(key, JSON.stringify(valueToStore));\n // Add timestamp for cleanup\n window.sessionStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (storageError: any) {\n // If quota exceeded, clear old data and try again\n if (storageError.name === 'QuotaExceededError' ||\n storageError.code === 22 ||\n storageError.message?.includes('quota')) {\n authLogger.warn('sessionStorage quota exceeded, clearing old data...');\n clearOldData();\n \n // Try again after clearing\n try {\n window.sessionStorage.setItem(key, JSON.stringify(valueToStore));\n window.sessionStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (retryError) {\n authLogger.error(`Failed to set sessionStorage key \"${key}\" after clearing old data:`, retryError);\n // If still fails, force clear all and try one more time\n try {\n forceClearAll();\n window.sessionStorage.setItem(key, JSON.stringify(valueToStore));\n window.sessionStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (finalError) {\n authLogger.error(`Failed to set sessionStorage key \"${key}\" after force clearing:`, finalError);\n // If still fails, just update the state without sessionStorage\n setStoredValue(valueToStore);\n }\n }\n } else {\n throw storageError;\n }\n }\n }\n } catch (error) {\n authLogger.error(`Error setting sessionStorage key \"${key}\":`, error);\n // Still update the state even if sessionStorage fails\n const valueToStore = value instanceof Function ? value(storedValue) : value;\n setStoredValue(valueToStore);\n }\n };\n\n // Remove value from sessionStorage\n const removeValue = () => {\n try {\n setStoredValue(initialValue);\n if (typeof window !== 'undefined') {\n try {\n window.sessionStorage.removeItem(key);\n window.sessionStorage.removeItem(`${key}_timestamp`);\n } catch (removeError: any) {\n // If removal fails due to quota, try to clear some data first\n if (removeError.name === 'QuotaExceededError' ||\n removeError.code === 22 ||\n removeError.message?.includes('quota')) {\n authLogger.warn('sessionStorage quota exceeded during removal, clearing old data...');\n clearOldData();\n \n try {\n window.sessionStorage.removeItem(key);\n window.sessionStorage.removeItem(`${key}_timestamp`);\n } catch (retryError) {\n authLogger.error(`Failed to remove sessionStorage key \"${key}\" after clearing:`, retryError);\n // If still fails, force clear all\n forceClearAll();\n }\n } else {\n throw removeError;\n }\n }\n }\n } catch (error) {\n authLogger.error(`Error removing sessionStorage key \"${key}\":`, error);\n }\n };\n\n return [storedValue, setValue, removeValue] as const;\n}\n","import { useSessionStorage } from './useSessionStorage';\n\nconst AUTH_REDIRECT_KEY = 'auth_redirect_url';\n\nexport interface AuthRedirectOptions {\n fallbackUrl?: string;\n clearOnUse?: boolean;\n}\n\n/**\n * Read redirect URL directly from sessionStorage (bypasses React state)\n * This is needed because different component instances have different React states\n */\nconst getRedirectFromStorage = (): string => {\n if (typeof window === 'undefined') return '';\n try {\n const item = window.sessionStorage.getItem(AUTH_REDIRECT_KEY);\n return item ? JSON.parse(item) : '';\n } catch {\n return '';\n }\n};\n\n/**\n * Clear redirect URL directly from sessionStorage\n */\nconst clearRedirectFromStorage = (): void => {\n if (typeof window === 'undefined') return;\n try {\n window.sessionStorage.removeItem(AUTH_REDIRECT_KEY);\n window.sessionStorage.removeItem(`${AUTH_REDIRECT_KEY}_timestamp`);\n } catch {\n // Ignore errors\n }\n};\n\nexport const useAuthRedirectManager = (options: AuthRedirectOptions = {}) => {\n const { fallbackUrl = '/dashboard', clearOnUse = true } = options;\n const [redirectUrl, setRedirectUrl, removeRedirectUrl] = useSessionStorage<string>(AUTH_REDIRECT_KEY, '');\n\n const setRedirect = (url: string) => {\n setRedirectUrl(url);\n };\n\n const getRedirect = () => {\n // Read directly from storage to get latest value across components\n return getRedirectFromStorage() || redirectUrl;\n };\n\n const clearRedirect = () => {\n removeRedirectUrl();\n clearRedirectFromStorage();\n };\n\n const hasRedirect = () => {\n const stored = getRedirectFromStorage();\n return stored.length > 0 || redirectUrl.length > 0;\n };\n\n const getFinalRedirectUrl = () => {\n // Read directly from storage to get latest value across components\n const stored = getRedirectFromStorage();\n return stored || redirectUrl || fallbackUrl;\n };\n\n const useAndClearRedirect = () => {\n // Read directly from storage to ensure we get the latest saved URL\n // even if it was saved by a different component instance\n const stored = getRedirectFromStorage();\n const finalUrl = stored || redirectUrl || fallbackUrl;\n\n if (clearOnUse) {\n clearRedirect();\n }\n return finalUrl;\n };\n\n return {\n redirectUrl,\n setRedirect,\n getRedirect,\n clearRedirect,\n hasRedirect,\n getFinalRedirectUrl,\n useAndClearRedirect\n };\n}; ","\"use client\"\n\nimport { useEffect, useState } from 'react';\n\nimport { useAuth } from '../context';\nimport { useCfgRouter } from './useCfgRouter';\n\ninterface UseAuthGuardOptions {\n redirectTo?: string;\n requireAuth?: boolean;\n /** Whether to save current URL for redirect after auth (default: true) */\n saveRedirectUrl?: boolean;\n}\n\nexport const useAuthGuard = (options: UseAuthGuardOptions = {}) => {\n const { redirectTo = '/auth', requireAuth = true, saveRedirectUrl: shouldSaveUrl = true } = options;\n const { isAuthenticated, isLoading, saveRedirectUrl } = useAuth();\n const router = useCfgRouter();\n const [isRedirecting, setIsRedirecting] = useState(false);\n\n useEffect(() => {\n if (!isLoading && requireAuth && !isAuthenticated && !isRedirecting) {\n // Save current URL before redirecting\n if (shouldSaveUrl && typeof window !== 'undefined') {\n const currentUrl = window.location.pathname + window.location.search;\n saveRedirectUrl(currentUrl);\n }\n\n setIsRedirecting(true);\n router.push(redirectTo);\n }\n }, [isAuthenticated, isLoading, router, redirectTo, requireAuth, isRedirecting, shouldSaveUrl, saveRedirectUrl]);\n\n return { isAuthenticated, isLoading, isRedirecting };\n}; ","'use client';\n\nimport { useEffect, useState } from 'react';\n\nimport { authLogger } from '../utils/logger';\n\n/**\n * Simple localStorage hook with better error handling\n * @param key - Storage key\n * @param initialValue - Default value if key doesn't exist\n * @returns [value, setValue, removeValue] - Current value, setter function, and remove function\n */\nexport function useLocalStorage<T>(key: string, initialValue: T) {\n // Get initial value from localStorage or use provided initialValue\n const [storedValue, setStoredValue] = useState<T>(() => {\n if (typeof window === 'undefined') {\n return initialValue;\n }\n\n try {\n const item = window.localStorage.getItem(key);\n if (item === null) {\n return initialValue;\n }\n \n // Try to parse as JSON first, fallback to string\n try {\n return JSON.parse(item);\n } catch {\n // If JSON.parse fails, return as string\n return item as T;\n }\n } catch (error) {\n authLogger.error(`Error reading localStorage key \"${key}\":`, error);\n return initialValue;\n }\n });\n\n // Check data size and limit\n const checkDataSize = (data: any): boolean => {\n try {\n const jsonString = JSON.stringify(data);\n const sizeInBytes = new Blob([jsonString]).size;\n const sizeInKB = sizeInBytes / 1024;\n \n // Limit to 1MB per item\n if (sizeInKB > 1024) {\n authLogger.warn(`Data size (${sizeInKB.toFixed(2)}KB) exceeds 1MB limit for key \"${key}\"`);\n return false;\n }\n\n return true;\n } catch (error) {\n authLogger.error(`Error checking data size for key \"${key}\":`, error);\n return false;\n }\n };\n\n // Clear old data when localStorage is full\n const clearOldData = () => {\n try {\n const keys = Object.keys(localStorage).filter(key => key && typeof key === 'string');\n // Remove oldest items if we have more than 50 items\n if (keys.length > 50) {\n const itemsToRemove = Math.ceil(keys.length * 0.2);\n for (let i = 0; i < itemsToRemove; i++) {\n try {\n const key = keys[i];\n if (key) {\n localStorage.removeItem(key);\n localStorage.removeItem(`${key}_timestamp`);\n }\n } catch {\n // Ignore errors when removing items\n }\n }\n }\n } catch (error) {\n authLogger.error('Error clearing old localStorage data:', error);\n }\n };\n\n // Force clear all data if quota is exceeded\n const forceClearAll = () => {\n try {\n const keys = Object.keys(localStorage);\n for (const key of keys) {\n try {\n localStorage.removeItem(key);\n } catch {\n // Ignore errors when removing items\n }\n }\n } catch (error) {\n authLogger.error('Error force clearing localStorage:', error);\n }\n };\n\n // Update localStorage when value changes\n const setValue = (value: T | ((val: T) => T)) => {\n try {\n const valueToStore = value instanceof Function ? value(storedValue) : value;\n \n // Check data size before attempting to save\n if (!checkDataSize(valueToStore)) {\n authLogger.warn(`Data size too large for key \"${key}\", removing key`);\n // Remove the key if data is too large\n try {\n window.localStorage.removeItem(key);\n window.localStorage.removeItem(`${key}_timestamp`);\n } catch {\n // Ignore errors when removing\n }\n // Still update the state\n setStoredValue(valueToStore);\n return;\n }\n \n setStoredValue(valueToStore);\n\n if (typeof window !== 'undefined') {\n // Try to set the value\n try {\n // For strings, store directly without JSON.stringify\n if (typeof valueToStore === 'string') {\n window.localStorage.setItem(key, valueToStore);\n } else {\n window.localStorage.setItem(key, JSON.stringify(valueToStore));\n }\n // Add timestamp for cleanup\n window.localStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (storageError: any) {\n // If quota exceeded, clear old data and try again\n if (storageError.name === 'QuotaExceededError' ||\n storageError.code === 22 ||\n storageError.message?.includes('quota')) {\n authLogger.warn('localStorage quota exceeded, clearing old data...');\n clearOldData();\n \n // Try again after clearing\n try {\n // For strings, store directly without JSON.stringify\n if (typeof valueToStore === 'string') {\n window.localStorage.setItem(key, valueToStore);\n } else {\n window.localStorage.setItem(key, JSON.stringify(valueToStore));\n }\n window.localStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (retryError) {\n authLogger.error(`Failed to set localStorage key \"${key}\" after clearing old data:`, retryError);\n // If still fails, force clear all and try one more time\n try {\n forceClearAll();\n // For strings, store directly without JSON.stringify\n if (typeof valueToStore === 'string') {\n window.localStorage.setItem(key, valueToStore);\n } else {\n window.localStorage.setItem(key, JSON.stringify(valueToStore));\n }\n window.localStorage.setItem(`${key}_timestamp`, Date.now().toString());\n } catch (finalError) {\n authLogger.error(`Failed to set localStorage key \"${key}\" after force clearing:`, finalError);\n // If still fails, just update the state without localStorage\n setStoredValue(valueToStore);\n }\n }\n } else {\n throw storageError;\n }\n }\n }\n } catch (error) {\n authLogger.error(`Error setting localStorage key \"${key}\":`, error);\n // Still update the state even if localStorage fails\n const valueToStore = value instanceof Function ? value(storedValue) : value;\n setStoredValue(valueToStore);\n }\n };\n\n // Remove value from localStorage\n const removeValue = () => {\n try {\n setStoredValue(initialValue);\n if (typeof window !== 'undefined') {\n try {\n window.localStorage.removeItem(key);\n window.localStorage.removeItem(`${key}_timestamp`);\n } catch (removeError: any) {\n // If removal fails due to quota, try to clear some data first\n if (removeError.name === 'QuotaExceededError' ||\n removeError.code === 22 ||\n removeError.message?.includes('quota')) {\n authLogger.warn('localStorage quota exceeded during removal, clearing old data...');\n clearOldData();\n \n try {\n window.localStorage.removeItem(key);\n window.localStorage.removeItem(`${key}_timestamp`);\n } catch (retryError) {\n authLogger.error(`Failed to remove localStorage key \"${key}\" after clearing:`, retryError);\n // If still fails, force clear all\n forceClearAll();\n }\n } else {\n throw removeError;\n }\n }\n }\n } catch (error) {\n authLogger.error(`Error removing localStorage key \"${key}\":`, error);\n }\n };\n\n return [storedValue, setValue, removeValue] as const;\n}\n","\"use client\"\n\n/**\n * Base64 Encoding/Decoding Hook\n *\n * Provides base64 encoding/decoding with dev mode detection:\n * - In production: encodes data to base64\n * - In development: returns data as-is (no encoding)\n */\n\nimport { isDev } from '../utils/env';\n\n/**\n * Encode string to base64\n * @param data - String data to encode\n * @returns Base64 encoded string (or original in dev mode)\n */\nexport function encodeBase64(data: string): string {\n if (isDev) {\n return data;\n }\n\n try {\n // Browser-safe base64 encoding\n if (typeof window !== 'undefined') {\n return btoa(encodeURIComponent(data).replace(/%([0-9A-F]{2})/g, (_, p1) => {\n return String.fromCharCode(parseInt(p1, 16));\n }));\n }\n // Node.js fallback\n return Buffer.from(data, 'utf-8').toString('base64');\n } catch (error) {\n console.error('Base64 encoding error:', error);\n return data; // Return original on error\n }\n}\n\n/**\n * Decode base64 to string\n * @param encoded - Base64 encoded string\n * @returns Decoded string (or original in dev mode)\n */\nexport function decodeBase64(encoded: string): string {\n if (isDev) {\n return encoded;\n }\n\n try {\n // Browser-safe base64 decoding\n if (typeof window !== 'undefined') {\n const binary = atob(encoded);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return decodeURIComponent(\n Array.from(bytes)\n .map(byte => '%' + ('00' + byte.toString(16)).slice(-2))\n .join('')\n );\n }\n // Node.js fallback\n return Buffer.from(encoded, 'base64').toString('utf-8');\n } catch (error) {\n console.error('Base64 decoding error:', error);\n return encoded; // Return original on error\n }\n}\n\n/**\n * Hook for base64 encoding/decoding\n * @returns Object with encode and decode functions\n */\nexport function useBase64() {\n return {\n encode: encodeBase64,\n decode: decodeBase64,\n isDev,\n };\n}\n","\"use client\"\n\n/**\n * Profile Cache Hook\n *\n * Provides localStorage-based caching for user profile with:\n * - TTL (Time To Live) - default 1 hour\n * - Version control for migrations\n * - Automatic invalidation on expiry\n */\n\nimport type { User } from '../../';\nimport { authLogger as profileLogger } from '../utils/logger';\nimport { decodeBase64, encodeBase64 } from './useBase64';\n\n// Cache configuration\nconst CACHE_KEY = 'user_profile_cache';\nconst CACHE_VERSION = 1;\nconst DEFAULT_TTL = 14400000; // 4 hours in milliseconds (reduced API calls, more resilient)\n\nexport interface ProfileCacheOptions {\n /** Time to live in milliseconds (default: 1 hour) */\n ttl?: number;\n}\n\ninterface CachedProfile {\n version: number;\n data: User;\n timestamp: number;\n ttl: number;\n}\n\n/**\n * Get cached profile from localStorage\n * @returns User profile if valid cache exists, null otherwise\n */\nexport function getCachedProfile(): User | null {\n try {\n if (typeof window === 'undefined') return null;\n\n const cached = localStorage.getItem(CACHE_KEY);\n if (!cached) {\n profileLogger.debug('No cached profile found');\n return null;\n }\n\n // Decode from base64\n const decoded = decodeBase64(cached);\n const cachedData: CachedProfile = JSON.parse(decoded);\n\n // Version check\n if (cachedData.version !== CACHE_VERSION) {\n profileLogger.warn('Cache version mismatch, clearing cache');\n clearProfileCache();\n return null;\n }\n\n // TTL check\n const now = Date.now();\n const age = now - cachedData.timestamp;\n if (age > cachedData.ttl) {\n profileLogger.info('Cache expired, clearing');\n clearProfileCache();\n return null;\n }\n\n profileLogger.debug('Cache hit, age:', Math.round(age / 1000), 'seconds');\n return cachedData.data;\n } catch (error) {\n profileLogger.error('Error reading cache:', error);\n clearProfileCache();\n return null;\n }\n}\n\n/**\n * Save profile to localStorage cache\n * @param profile - User profile to cache\n * @param options - Cache options (TTL)\n */\nexport function setCachedProfile(profile: User, options?: ProfileCacheOptions): void {\n try {\n if (typeof window === 'undefined') return;\n\n const cachedData: CachedProfile = {\n version: CACHE_VERSION,\n data: profile,\n timestamp: Date.now(),\n ttl: options?.ttl || DEFAULT_TTL,\n };\n\n // Encode to base64\n const encoded = encodeBase64(JSON.stringify(cachedData));\n localStorage.setItem(CACHE_KEY, encoded);\n profileLogger.debug('Profile cached, TTL:', cachedData.ttl / 1000, 'seconds');\n } catch (error) {\n profileLogger.error('Error writing cache:', error);\n }\n}\n\n/**\n * Clear profile cache from localStorage\n */\nexport function clearProfileCache(): void {\n try {\n if (typeof window === 'undefined') return;\n localStorage.removeItem(CACHE_KEY);\n profileLogger.debug('Cache cleared');\n } catch (error) {\n profileLogger.error('Error clearing cache:', error);\n }\n}\n\n/**\n * Check if cached profile is valid (exists and not expired)\n */\nexport function hasValidCache(): boolean {\n return getCachedProfile() !== null;\n}\n\n/**\n * Get cache metadata (age, TTL, etc.)\n */\nexport function getCacheMetadata(): {\n exists: boolean;\n age?: number;\n ttl?: number;\n expiresIn?: number;\n} | null {\n try {\n if (typeof window === 'undefined') return null;\n\n const cached = localStorage.getItem(CACHE_KEY);\n if (!cached) return { exists: false };\n\n // Decode from base64\n const decoded = decodeBase64(cached);\n const cachedData: CachedProfile = JSON.parse(decoded);\n const now = Date.now();\n const age = now - cachedData.timestamp;\n const expiresIn = cachedData.ttl - age;\n\n return {\n exists: true,\n age,\n ttl: cachedData.ttl,\n expiresIn: Math.max(0, expiresIn),\n };\n } catch (error) {\n profileLogger.error('Error reading metadata:', error);\n return null;\n }\n}\n","'use client';\n\n/**\n * Token Refresh Hook\n *\n * Provides automatic token refresh functionality:\n * - Proactively refreshes token before expiry\n * - Refreshes on window focus\n * - Refreshes on network reconnect\n */\n\nimport { useCallback, useEffect, useRef } from 'react';\n\nimport { api as apiAccounts } from '../../';\nimport { CfgAccountsAuth } from '../../_api/generated/sdk.gen';\nimport { authLogger } from '../utils/logger';\n\n// Configuration\nconst TOKEN_REFRESH_THRESHOLD_MS = 10 * 60 * 1000; // 10 minutes before expiry\nconst CHECK_INTERVAL_MS = 5 * 60 * 1000; // Check every 5 minutes\n\ninterface UseTokenRefreshOptions {\n /** Enable automatic token refresh (default: true) */\n enabled?: boolean;\n /** Callback when token is refreshed */\n onRefresh?: (newToken: string) => void;\n /** Callback when refresh fails */\n onRefreshError?: (error: Error) => void;\n}\n\n/**\n * Decode JWT and get expiry time\n */\nfunction getTokenExpiry(token: string): number | null {\n try {\n const payload = JSON.parse(atob(token.split('.')[1]));\n return payload.exp * 1000; // Convert to milliseconds\n } catch {\n return null;\n }\n}\n\n/**\n * Check if token is expiring soon\n */\nfunction isTokenExpiringSoon(token: string, thresholdMs: number): boolean {\n const expiry = getTokenExpiry(token);\n if (!expiry) return false;\n\n const timeUntilExpiry = expiry - Date.now();\n return timeUntilExpiry < thresholdMs;\n}\n\n/**\n * Hook for automatic token refresh\n */\nexport function useTokenRefresh(options: UseTokenRefreshOptions = {}) {\n const { enabled = true, onRefresh, onRefreshError } = options;\n const isRefreshingRef = useRef(false);\n\n /**\n * Refresh the token\n */\n const refreshToken = useCallback(async (): Promise<boolean> => {\n if (isRefreshingRef.current) {\n authLogger.debug('Token refresh already in progress');\n return false;\n }\n\n const refreshTokenValue = apiAccounts.getRefreshToken();\n if (!refreshTokenValue) {\n authLogger.warn('No refresh token available');\n return false;\n }\n\n isRefreshingRef.current = true;\n authLogger.info('Refreshing token...');\n\n try {\n // Use generated API client with correct URL (/cfg/accounts/token/refresh/)\n const result = await CfgAccountsAuth.cfgAccountsTokenRefreshCreate({\n body: { refresh: refreshTokenValue },\n throwOnError: true,\n });\n\n const newAccessToken = result.data.access;\n\n if (!newAccessToken) {\n throw new Error('No access token in refresh response');\n }\n\n apiAccounts.setToken(newAccessToken);\n apiAccounts.setRefreshToken(refreshTokenValue);\n authLogger.info('Token refreshed successfully');\n\n onRefresh?.(newAccessToken);\n return true;\n } catch (error) {\n authLogger.error('Token refresh error:', error);\n onRefreshError?.(error instanceof Error ? error : new Error(String(error)));\n return false;\n } finally {\n isRefreshingRef.current = false;\n }\n }, [onRefresh, onRefreshError]);\n\n /**\n * Check and refresh if needed\n */\n const checkAndRefresh = useCallback(async () => {\n const token = apiAccounts.getToken();\n if (!token) return;\n\n if (isTokenExpiringSoon(token, TOKEN_REFRESH_THRESHOLD_MS)) {\n authLogger.info('Token expiring soon, refreshing proactively');\n await refreshToken();\n }\n }, [refreshToken]);\n\n // Periodic check\n useEffect(() => {\n if (!enabled) return;\n\n // Check immediately\n checkAndRefresh();\n\n // Set up interval\n const intervalId = setInterval(checkAndRefresh, CHECK_INTERVAL_MS);\n\n return () => clearInterval(intervalId);\n }, [enabled, checkAndRefresh]);\n\n // Refresh on window focus\n useEffect(() => {\n if (!enabled) return;\n\n const handleFocus = () => {\n authLogger.debug('Window focused, checking token...');\n checkAndRefresh();\n };\n\n window.addEventListener('focus', handleFocus);\n return () => window.removeEventListener('focus', handleFocus);\n }, [enabled, checkAndRefresh]);\n\n // Refresh on network reconnect\n useEffect(() => {\n if (!enabled) return;\n\n const handleOnline = () => {\n authLogger.info('Network reconnected, checking token...');\n checkAndRefresh();\n };\n\n window.addEventListener('online', handleOnline);\n return () => window.removeEventListener('online', handleOnline);\n }, [enabled, checkAndRefresh]);\n\n return {\n refreshToken,\n checkAndRefresh,\n };\n}\n\nexport default useTokenRefresh;\n","'use client';\n\nimport { useCallback, useState } from 'react';\n\nimport { apiAccounts } from '../../clients';\nimport { CfgAccountsProfile } from '../../_api/generated/sdk.gen';\nimport { useAuth } from '../context';\nimport { authLogger } from '../utils/logger';\n\nexport interface DeleteAccountResult {\n success: boolean;\n message: string;\n}\n\nexport interface UseDeleteAccountReturn {\n /** Loading state */\n isLoading: boolean;\n /** Error message */\n error: string | null;\n /** Delete the account */\n deleteAccount: () => Promise<DeleteAccountResult>;\n /** Clear error */\n clearError: () => void;\n}\n\n/**\n * Hook for deleting user account.\n *\n * This performs a soft delete - deactivates the account and anonymizes personal data.\n * The account can be restored by an administrator if needed.\n *\n * @example\n * ```tsx\n * const { deleteAccount, isLoading, error } = useDeleteAccount();\n *\n * const handleDelete = async () => {\n * const result = await deleteAccount();\n * if (result.success) {\n * // Account deleted, perform logout\n * await logout();\n * }\n * };\n * ```\n */\nexport const useDeleteAccount = (): UseDeleteAccountReturn => {\n const [isLoading, setIsLoading] = useState(false);\n const [error, setError] = useState<string | null>(null);\n const { logout } = useAuth();\n\n const clearError = useCallback(() => {\n setError(null);\n }, []);\n\n /**\n * Delete the user account (soft delete)\n */\n const deleteAccount = useCallback(async (): Promise<DeleteAccountResult> => {\n setIsLoading(true);\n setError(null);\n\n try {\n authLogger.info('Deleting account...');\n\n const result = await CfgAccountsProfile.cfgAccountsProfileDeleteCreate({ throwOnError: true });\n const response = result.data;\n\n if (!response.success) {\n authLogger.error('Failed to delete account:', response.message);\n setError(response.message);\n throw new Error(response.message);\n }\n\n } catch (error) {\n authLogger.error('Failed to delete account:', error);\n throw error;\n } finally {\n setIsLoading(false);\n }\n\n // Return success response\n\n await logout();\n return { success: true, message: 'Account deleted successfully' };\n }, []);\n\n return {\n isLoading,\n error,\n deleteAccount,\n clearError,\n };\n};\n","/**\n * CfgAccounts Context\n *\n * Manages user authentication and profile operations using generated SWR hooks.\n *\n * Features:\n * - OTP-based authentication\n * - User profile management\n * - Avatar upload\n * - Profile updates\n * - localStorage cache with TTL (1 hour)\n */\n\n\"use client\";\n\nimport {\n createContext, memo, ReactNode, useCallback, useContext, useEffect, useMemo, useRef, useState\n} from 'react';\n\nimport { CfgAccountsApi } from '../../';\nimport { CfgAccountsProfile } from '../../_api/generated/_cfg_accounts/sdk.gen';\nimport {\n useCfgAccountsOtpRequestCreate,\n useCfgAccountsOtpVerifyCreate,\n useCfgAccountsProfileAvatarCreate,\n useCfgAccountsProfilePartialUpdate,\n useCfgAccountsProfileUpdateUpdate,\n useCfgAccountsTokenRefreshCreate,\n} from '../../_api/generated/_cfg_accounts/hooks';\nimport { PatchedCfgUserUpdateRequestSchema } from '../../_api/generated/_cfg_accounts/schemas';\nimport { clearProfileCache, getCachedProfile, setCachedProfile } from '../hooks/useProfileCache';\nimport { authLogger } from '../utils/logger';\n\nimport type {\n User,\n CfgUserUpdateRequest,\n PatchedCfgUserUpdateRequest,\n OtpRequestRequest,\n OtpVerifyRequest,\n OtpRequestResponse,\n OtpVerifyResponse,\n TokenRefresh,\n TokenRefreshRequest,\n} from '../../_api/generated/_cfg_accounts/types.gen';\n\nexport { PatchedCfgUserUpdateRequestSchema };\nexport type { PatchedCfgUserUpdateRequest, User, CfgUserUpdateRequest as UserProfileUpdateRequest };\n\n// ─────────────────────────────────────────────────────────────────────────\n// Context Type\n// ─────────────────────────────────────────────────────────────────────────\n\nexport interface AccountsContextValue {\n profile?: User;\n isLoadingProfile: boolean;\n profileError: Error | null;\n\n updateProfile: (data: CfgUserUpdateRequest) => Promise<User>;\n partialUpdateProfile: (data: PatchedCfgUserUpdateRequest) => Promise<User>;\n uploadAvatar: (avatar: File | Blob) => Promise<User>;\n refreshProfile: (options?: { callerId?: string; force?: boolean }) => Promise<User | undefined>;\n\n requestOTP: (data: OtpRequestRequest) => Promise<OtpRequestResponse>;\n verifyOTP: (data: OtpVerifyRequest) => Promise<OtpVerifyResponse>;\n refreshToken: (refresh: string) => Promise<TokenRefresh>;\n logout: () => void;\n}\n\nconst AccountsContext = createContext<AccountsContextValue | undefined>(undefined);\n\ninterface AccountsProviderProps {\n children: ReactNode;\n}\n\nexport function AccountsProvider({ children }: AccountsProviderProps) {\n const [profile, setProfile] = useState<User | undefined>(() => {\n const cached = getCachedProfile() as User | null;\n return cached || undefined;\n });\n const [isLoadingProfile, setIsLoadingProfile] = useState(false);\n const [profileError, setProfileError] = useState<Error | null>(null);\n\n const profileRef = useRef<User | undefined>(profile);\n const isLoadingRef = useRef(false);\n\n useEffect(() => {\n profileRef.current = profile;\n }, [profile]);\n\n useEffect(() => {\n isLoadingRef.current = isLoadingProfile;\n }, [isLoadingProfile]);\n\n const { trigger: triggerProfileUpdate } = useCfgAccountsProfileUpdateUpdate();\n const { trigger: triggerProfilePartialUpdate } = useCfgAccountsProfilePartialUpdate();\n const { trigger: triggerAvatar } = useCfgAccountsProfileAvatarCreate();\n const { trigger: triggerOtpRequest } = useCfgAccountsOtpRequestCreate();\n const { trigger: triggerOtpVerify } = useCfgAccountsOtpVerifyCreate();\n const { trigger: triggerTokenRefresh } = useCfgAccountsTokenRefreshCreate();\n\n const refreshProfile = useCallback(async (options?: { callerId?: string; force?: boolean }): Promise<User | undefined> => {\n const { callerId, force } = options || {};\n\n if (isLoadingRef.current) {\n authLogger.debug(`Profile loading in progress, skipping (caller: ${callerId})`);\n return profileRef.current;\n }\n\n setIsLoadingProfile(true);\n isLoadingRef.current = true;\n setProfileError(null);\n try {\n authLogger.debug(`Fetching profile from API (caller: ${callerId}, force: ${force})`);\n const res = await CfgAccountsProfile.cfgAccountsProfileRetrieve({ throwOnError: true });\n const result = res.data;\n setProfile(result);\n profileRef.current = result;\n setCachedProfile(result);\n return result;\n } catch (error) {\n const err = error instanceof Error ? error : new Error('Failed to fetch profile');\n setProfileError(err);\n throw err;\n } finally {\n setIsLoadingProfile(false);\n isLoadingRef.current = false;\n }\n }, []);\n\n const updateProfile = async (data: CfgUserUpdateRequest): Promise<User> => {\n await triggerProfileUpdate({ body: data });\n const user = await refreshProfile({ callerId: 'updateProfile', force: true });\n return user as User;\n };\n\n const partialUpdateProfile = async (data: PatchedCfgUserUpdateRequest): Promise<User> => {\n await triggerProfilePartialUpdate({ body: data });\n const user = await refreshProfile({ callerId: 'partialUpdateProfile', force: true });\n return user as User;\n };\n\n const uploadAvatar = async (avatar: File | Blob): Promise<User> => {\n await triggerAvatar({ body: { avatar } });\n const user = await refreshProfile({ callerId: 'uploadAvatar', force: true });\n return user as User;\n };\n\n const requestOTP = async (data: OtpRequestRequest): Promise<OtpRequestResponse> => {\n const result = await triggerOtpRequest({ body: data });\n return result as OtpRequestResponse;\n };\n\n const verifyOTP = async (data: OtpVerifyRequest): Promise<OtpVerifyResponse> => {\n const result = (await triggerOtpVerify({ body: data })) as OtpVerifyResponse;\n\n if (result.requires_2fa && result.session_id) {\n authLogger.info('2FA required, session:', result.session_id);\n return result;\n }\n\n if (result.access && result.refresh) {\n CfgAccountsApi.setToken(result.access);\n CfgAccountsApi.setRefreshToken(result.refresh);\n try {\n await refreshProfile({ callerId: 'verifyOTP', force: true });\n } catch (profileError) {\n authLogger.warn('Profile refresh failed after OTP verify (tokens are saved):', profileError);\n }\n }\n\n return result;\n };\n\n const refreshToken = async (refresh: string): Promise<TokenRefresh> => {\n const body: TokenRefreshRequest = { refresh };\n const result = (await triggerTokenRefresh({ body })) as TokenRefresh;\n\n if (result.access) {\n CfgAccountsApi.setToken(result.access);\n CfgAccountsApi.setRefreshToken(refresh);\n }\n\n return result;\n };\n\n const logout = useCallback(() => {\n CfgAccountsApi.clearToken();\n setProfile(undefined);\n setProfileError(null);\n clearProfileCache();\n }, []);\n\n const value: AccountsContextValue = useMemo(() => ({\n profile,\n isLoadingProfile,\n profileError,\n updateProfile,\n partialUpdateProfile,\n uploadAvatar,\n refreshProfile,\n requestOTP,\n verifyOTP,\n refreshToken,\n logout,\n }), [\n profile,\n isLoadingProfile,\n profileError,\n updateProfile,\n partialUpdateProfile,\n uploadAvatar,\n refreshProfile,\n requestOTP,\n verifyOTP,\n refreshToken,\n logout,\n ]);\n\n return (\n <AccountsContext.Provider value={value}>\n {children}\n </AccountsContext.Provider>\n );\n}\n\nexport function useAccountsContext(): AccountsContextValue {\n const context = useContext(AccountsContext);\n if (!context) {\n throw new Error('useAccountsContext must be used within AccountsProvider');\n }\n return context;\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Regenerate API key\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsApiKey } from \"../../sdk.gen\";\nimport type { CfgAccountsApiKeyRegenerateCreateData, CfgAccountsApiKeyRegenerateCreateResponses } from \"../../types.gen\";\nimport { APIKeyRegenerateSchema } from \"../schemas/APIKeyRegenerate\";\n\ntype Args = Omit<CfgAccountsApiKeyRegenerateCreateData, \"url\">;\ntype Result = CfgAccountsApiKeyRegenerateCreateResponses[keyof CfgAccountsApiKeyRegenerateCreateResponses];\n\nexport function useCfgAccountsApiKeyRegenerateCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_api_key_regenerate_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_api_key_regenerate_create\"], Args>(\n [\"cfg_accounts_api_key_regenerate_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsApiKey.cfgAccountsApiKeyRegenerateCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = APIKeyRegenerateSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_api_key_regenerate_create\",\n method: \"POST\",\n path: \"/cfg/accounts/api-key/regenerate/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_api_key_regenerate_create\",\n method: \"POST\",\n path: \"/cfg/accounts/api-key/regenerate/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeyRegenerateSchema = z.object({\n key: z.string(),\n reissued_at: z.string().datetime({ offset: true }),\n});\n\nexport type APIKeyRegenerate = z.infer<typeof APIKeyRegenerateSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Get API key details\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWR from \"swr\";\nimport type { SWRConfiguration } from \"swr\";\nimport { CfgAccountsApiKey } from \"../../sdk.gen\";\nimport type { CfgAccountsApiKeyRetrieveData, CfgAccountsApiKeyRetrieveResponses } from \"../../types.gen\";\nimport { APIKeySchema } from \"../schemas/APIKey\";\n\ntype Result = CfgAccountsApiKeyRetrieveResponses[keyof CfgAccountsApiKeyRetrieveResponses];\n\nexport function useCfgAccountsApiKeyRetrieve(\n args?: Omit<CfgAccountsApiKeyRetrieveData, \"url\" | \"body\">,\n config?: SWRConfiguration<Result>,\n) {\n const key = [\"cfg_accounts_api_key_retrieve\", args ?? {}] as const;\n return useSWR<Result>(\n key,\n async () => {\n const res = await CfgAccountsApiKey.cfgAccountsApiKeyRetrieve({ ...(args ?? {}), throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = APIKeySchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_api_key_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/api-key/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_api_key_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/api-key/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeySchema = z.object({\n key: z.string(),\n reissued_at: z.string().datetime({ offset: true }).nullable(),\n created_at: z.string().datetime({ offset: true }),\n});\n\nexport type APIKey = z.infer<typeof APIKeySchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Test API key\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsApiKey } from \"../../sdk.gen\";\nimport type { CfgAccountsApiKeyTestCreateData, CfgAccountsApiKeyTestCreateResponses } from \"../../types.gen\";\nimport { APIKeyTestResultSchema } from \"../schemas/APIKeyTestResult\";\n\ntype Args = Omit<CfgAccountsApiKeyTestCreateData, \"url\">;\ntype Result = CfgAccountsApiKeyTestCreateResponses[keyof CfgAccountsApiKeyTestCreateResponses];\n\nexport function useCfgAccountsApiKeyTestCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_api_key_test_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_api_key_test_create\"], Args>(\n [\"cfg_accounts_api_key_test_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsApiKey.cfgAccountsApiKeyTestCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = APIKeyTestResultSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_api_key_test_create\",\n method: \"POST\",\n path: \"/cfg/accounts/api-key/test/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_api_key_test_create\",\n method: \"POST\",\n path: \"/cfg/accounts/api-key/test/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeyTestResultSchema = z.object({\n valid: z.boolean(),\n user_id: z.string().nullable(),\n});\n\nexport type APIKeyTestResult = z.infer<typeof APIKeyTestResultSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// List OAuth connections\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWR from \"swr\";\nimport type { SWRConfiguration } from \"swr\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthConnectionsListData, CfgAccountsOauthConnectionsListResponses } from \"../../types.gen\";\nimport { cfg_accounts_oauth_connections_response_200_AutoRefSchema } from \"../schemas/cfg_accounts_oauth_connections_response_200_AutoRef\";\n\ntype Result = CfgAccountsOauthConnectionsListResponses[keyof CfgAccountsOauthConnectionsListResponses];\n\nexport function useCfgAccountsOauthConnectionsList(\n args?: Omit<CfgAccountsOauthConnectionsListData, \"url\" | \"body\">,\n config?: SWRConfiguration<Result>,\n) {\n const key = [\"cfg_accounts_oauth_connections_list\", args ?? {}] as const;\n return useSWR<Result>(\n key,\n async () => {\n const res = await CfgAccountsOauth.cfgAccountsOauthConnectionsList({ ...(args ?? {}), throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = cfg_accounts_oauth_connections_response_200_AutoRefSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_connections_list\",\n method: \"GET\",\n path: \"/cfg/accounts/oauth/connections/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_connections_list\",\n method: \"GET\",\n path: \"/cfg/accounts/oauth/connections/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { OAuthConnectionSchema } from \"./OAuthConnection\";\n\nexport const cfg_accounts_oauth_connections_response_200_AutoRefSchema = z.array(OAuthConnectionSchema);\n\nexport type cfg_accounts_oauth_connections_response_200_AutoRef = z.infer<typeof cfg_accounts_oauth_connections_response_200_AutoRefSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { OAuthProviderEnumSchema } from \"./OAuthProviderEnum\";\n\nexport const OAuthConnectionSchema = z.object({\n id: z.number().int(),\n provider: OAuthProviderEnumSchema,\n provider_display: z.string(),\n provider_username: z.string(),\n provider_email: z.email(),\n provider_avatar_url: z.string(),\n connected_at: z.string().datetime({ offset: true }),\n last_login_at: z.string().datetime({ offset: true }),\n});\n\nexport type OAuthConnection = z.infer<typeof OAuthConnectionSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthProviderEnumSchema = z.enum([\"github\"]);\n\nexport type OAuthProviderEnum = z.infer<typeof OAuthProviderEnumSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Disconnect OAuth provider\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthDisconnectCreateData, CfgAccountsOauthDisconnectCreateResponses } from \"../../types.gen\";\nimport { cfg_accounts_oauth_disconnect_response_200_AutoRefSchema } from \"../schemas/cfg_accounts_oauth_disconnect_response_200_AutoRef\";\n\ntype Args = Omit<CfgAccountsOauthDisconnectCreateData, \"url\">;\ntype Result = CfgAccountsOauthDisconnectCreateResponses[keyof CfgAccountsOauthDisconnectCreateResponses];\n\nexport function useCfgAccountsOauthDisconnectCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_oauth_disconnect_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_oauth_disconnect_create\"], Args>(\n [\"cfg_accounts_oauth_disconnect_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsOauth.cfgAccountsOauthDisconnectCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = cfg_accounts_oauth_disconnect_response_200_AutoRefSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_disconnect_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/disconnect/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_disconnect_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/disconnect/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const cfg_accounts_oauth_disconnect_response_200_AutoRefSchema = z.object({\n message: z.string().optional(),\n});\n\nexport type cfg_accounts_oauth_disconnect_response_200_AutoRef = z.infer<typeof cfg_accounts_oauth_disconnect_response_200_AutoRefSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Start GitHub OAuth\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthGithubAuthorizeCreateData, CfgAccountsOauthGithubAuthorizeCreateResponses } from \"../../types.gen\";\nimport { OAuthAuthorizeResponseSchema } from \"../schemas/OAuthAuthorizeResponse\";\n\ntype Args = Omit<CfgAccountsOauthGithubAuthorizeCreateData, \"url\">;\ntype Result = CfgAccountsOauthGithubAuthorizeCreateResponses[keyof CfgAccountsOauthGithubAuthorizeCreateResponses];\n\nexport function useCfgAccountsOauthGithubAuthorizeCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_oauth_github_authorize_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_oauth_github_authorize_create\"], Args>(\n [\"cfg_accounts_oauth_github_authorize_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsOauth.cfgAccountsOauthGithubAuthorizeCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OAuthAuthorizeResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_github_authorize_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/github/authorize/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_github_authorize_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/github/authorize/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthAuthorizeResponseSchema = z.object({\n authorization_url: z.string(),\n state: z.string(),\n});\n\nexport type OAuthAuthorizeResponse = z.infer<typeof OAuthAuthorizeResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Complete GitHub OAuth\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthGithubCallbackCreateData, CfgAccountsOauthGithubCallbackCreateResponses } from \"../../types.gen\";\nimport { OAuthTokenResponseSchema } from \"../schemas/OAuthTokenResponse\";\n\ntype Args = Omit<CfgAccountsOauthGithubCallbackCreateData, \"url\">;\ntype Result = CfgAccountsOauthGithubCallbackCreateResponses[keyof CfgAccountsOauthGithubCallbackCreateResponses];\n\nexport function useCfgAccountsOauthGithubCallbackCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_oauth_github_callback_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_oauth_github_callback_create\"], Args>(\n [\"cfg_accounts_oauth_github_callback_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsOauth.cfgAccountsOauthGithubCallbackCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OAuthTokenResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_github_callback_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/github/callback/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_github_callback_create\",\n method: \"POST\",\n path: \"/cfg/accounts/oauth/github/callback/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthTokenResponseSchema = z.object({\n requires_2fa: z.boolean().default(false).optional(),\n session_id: z.string().regex(/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i).nullable().optional(),\n access: z.string().nullable().optional(),\n refresh: z.string().nullable().optional(),\n user: z.object({}).passthrough().nullable().optional(),\n is_new_user: z.boolean(),\n is_new_connection: z.boolean(),\n should_prompt_2fa: z.boolean().optional(),\n});\n\nexport type OAuthTokenResponse = z.infer<typeof OAuthTokenResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// List OAuth providers\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWR from \"swr\";\nimport type { SWRConfiguration } from \"swr\";\nimport { CfgAccountsOauth } from \"../../sdk.gen\";\nimport type { CfgAccountsOauthProvidersRetrieveData, CfgAccountsOauthProvidersRetrieveResponses } from \"../../types.gen\";\nimport { OAuthProvidersResponseSchema } from \"../schemas/OAuthProvidersResponse\";\n\ntype Result = CfgAccountsOauthProvidersRetrieveResponses[keyof CfgAccountsOauthProvidersRetrieveResponses];\n\nexport function useCfgAccountsOauthProvidersRetrieve(\n args?: Omit<CfgAccountsOauthProvidersRetrieveData, \"url\" | \"body\">,\n config?: SWRConfiguration<Result>,\n) {\n const key = [\"cfg_accounts_oauth_providers_retrieve\", args ?? {}] as const;\n return useSWR<Result>(\n key,\n async () => {\n const res = await CfgAccountsOauth.cfgAccountsOauthProvidersRetrieve({ ...(args ?? {}), throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OAuthProvidersResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_oauth_providers_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/oauth/providers/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_oauth_providers_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/oauth/providers/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthProvidersResponseSchema = z.object({\n providers: z.array(z.object({}).passthrough()),\n});\n\nexport type OAuthProvidersResponse = z.infer<typeof OAuthProvidersResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// POST /cfg/accounts/otp/request/\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccounts } from \"../../sdk.gen\";\nimport type { CfgAccountsOtpRequestCreateData, CfgAccountsOtpRequestCreateResponses } from \"../../types.gen\";\nimport { OTPRequestResponseSchema } from \"../schemas/OTPRequestResponse\";\n\ntype Args = Omit<CfgAccountsOtpRequestCreateData, \"url\">;\ntype Result = CfgAccountsOtpRequestCreateResponses[keyof CfgAccountsOtpRequestCreateResponses];\n\nexport function useCfgAccountsOtpRequestCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_otp_request_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_otp_request_create\"], Args>(\n [\"cfg_accounts_otp_request_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccounts.cfgAccountsOtpRequestCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OTPRequestResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_otp_request_create\",\n method: \"POST\",\n path: \"/cfg/accounts/otp/request/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_otp_request_create\",\n method: \"POST\",\n path: \"/cfg/accounts/otp/request/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OTPRequestResponseSchema = z.object({\n message: z.string(),\n});\n\nexport type OTPRequestResponse = z.infer<typeof OTPRequestResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// POST /cfg/accounts/otp/verify/\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccounts } from \"../../sdk.gen\";\nimport type { CfgAccountsOtpVerifyCreateData, CfgAccountsOtpVerifyCreateResponses } from \"../../types.gen\";\nimport { OTPVerifyResponseSchema } from \"../schemas/OTPVerifyResponse\";\n\ntype Args = Omit<CfgAccountsOtpVerifyCreateData, \"url\">;\ntype Result = CfgAccountsOtpVerifyCreateResponses[keyof CfgAccountsOtpVerifyCreateResponses];\n\nexport function useCfgAccountsOtpVerifyCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_otp_verify_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_otp_verify_create\"], Args>(\n [\"cfg_accounts_otp_verify_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccounts.cfgAccountsOtpVerifyCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = OTPVerifyResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_otp_verify_create\",\n method: \"POST\",\n path: \"/cfg/accounts/otp/verify/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_otp_verify_create\",\n method: \"POST\",\n path: \"/cfg/accounts/otp/verify/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { UserSchema } from \"./User\";\n\nexport const OTPVerifyResponseSchema = z.object({\n requires_2fa: z.boolean().default(false).optional(),\n session_id: z.string().regex(/^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i).nullable().optional(),\n refresh: z.string().nullable().optional(),\n access: z.string().nullable().optional(),\n user: UserSchema.nullable().optional(),\n should_prompt_2fa: z.boolean().optional(),\n});\n\nexport type OTPVerifyResponse = z.infer<typeof OTPVerifyResponseSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { CentrifugoTokenSchema } from \"./CentrifugoToken\";\n\nexport const UserSchema = z.object({\n id: z.number().int(),\n email: z.email(),\n first_name: z.string().max(50).nullable().optional(),\n last_name: z.string().max(50).nullable().optional(),\n full_name: z.string(),\n initials: z.string(),\n display_username: z.string(),\n company: z.string().max(100).nullable().optional(),\n phone: z.string().max(20).nullable().optional(),\n position: z.string().max(100).nullable().optional(),\n language: z.string().max(10).nullable().optional(),\n timezone: z.string().max(64).nullable().optional(),\n avatar: z.string().nullable(),\n is_staff: z.boolean(),\n is_superuser: z.boolean(),\n date_joined: z.string().datetime({ offset: true }),\n last_login: z.string().datetime({ offset: true }).nullable(),\n unanswered_messages_count: z.number().int().default(0),\n centrifugo: CentrifugoTokenSchema.nullable(),\n api_key: z.string().nullable(),\n});\n\nexport type User = z.infer<typeof UserSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const CentrifugoTokenSchema = z.object({\n token: z.string(),\n centrifugo_url: z.string(),\n expires_at: z.string().datetime({ offset: true }),\n channels: z.array(z.string()),\n});\n\nexport type CentrifugoToken = z.infer<typeof CentrifugoTokenSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Upload user avatar\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileAvatarCreateData, CfgAccountsProfileAvatarCreateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfileAvatarCreateData, \"url\">;\ntype Result = CfgAccountsProfileAvatarCreateResponses[keyof CfgAccountsProfileAvatarCreateResponses];\n\nexport function useCfgAccountsProfileAvatarCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_avatar_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_avatar_create\"], Args>(\n [\"cfg_accounts_profile_avatar_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfileAvatarCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_avatar_create\",\n method: \"POST\",\n path: \"/cfg/accounts/profile/avatar/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_avatar_create\",\n method: \"POST\",\n path: \"/cfg/accounts/profile/avatar/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Delete user account\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileDeleteCreateData, CfgAccountsProfileDeleteCreateResponses } from \"../../types.gen\";\nimport { AccountDeleteResponseSchema } from \"../schemas/AccountDeleteResponse\";\n\ntype Args = Omit<CfgAccountsProfileDeleteCreateData, \"url\">;\ntype Result = CfgAccountsProfileDeleteCreateResponses[keyof CfgAccountsProfileDeleteCreateResponses];\n\nexport function useCfgAccountsProfileDeleteCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_delete_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_delete_create\"], Args>(\n [\"cfg_accounts_profile_delete_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfileDeleteCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = AccountDeleteResponseSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_delete_create\",\n method: \"POST\",\n path: \"/cfg/accounts/profile/delete/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_delete_create\",\n method: \"POST\",\n path: \"/cfg/accounts/profile/delete/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const AccountDeleteResponseSchema = z.object({\n success: z.boolean(),\n message: z.string(),\n});\n\nexport type AccountDeleteResponse = z.infer<typeof AccountDeleteResponseSchema>;\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Partial update user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfilePartialPartialUpdateData, CfgAccountsProfilePartialPartialUpdateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfilePartialPartialUpdateData, \"url\">;\ntype Result = CfgAccountsProfilePartialPartialUpdateResponses[keyof CfgAccountsProfilePartialPartialUpdateResponses];\n\nexport function useCfgAccountsProfilePartialPartialUpdate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_partial_partial_update\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_partial_partial_update\"], Args>(\n [\"cfg_accounts_profile_partial_partial_update\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfilePartialPartialUpdate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_partial_partial_update\",\n method: \"PATCH\",\n path: \"/cfg/accounts/profile/partial/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_partial_partial_update\",\n method: \"PATCH\",\n path: \"/cfg/accounts/profile/partial/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Partial update user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfilePartialUpdateData, CfgAccountsProfilePartialUpdateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfilePartialUpdateData, \"url\">;\ntype Result = CfgAccountsProfilePartialUpdateResponses[keyof CfgAccountsProfilePartialUpdateResponses];\n\nexport function useCfgAccountsProfilePartialUpdate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_partial_update\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_partial_update\"], Args>(\n [\"cfg_accounts_profile_partial_update\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfilePartialUpdate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_partial_update\",\n method: \"PUT\",\n path: \"/cfg/accounts/profile/partial/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_partial_update\",\n method: \"PUT\",\n path: \"/cfg/accounts/profile/partial/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Get current user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWR from \"swr\";\nimport type { SWRConfiguration } from \"swr\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileRetrieveData, CfgAccountsProfileRetrieveResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Result = CfgAccountsProfileRetrieveResponses[keyof CfgAccountsProfileRetrieveResponses];\n\nexport function useCfgAccountsProfileRetrieve(\n args?: Omit<CfgAccountsProfileRetrieveData, \"url\" | \"body\">,\n config?: SWRConfiguration<Result>,\n) {\n const key = [\"cfg_accounts_profile_retrieve\", args ?? {}] as const;\n return useSWR<Result>(\n key,\n async () => {\n const res = await CfgAccountsProfile.cfgAccountsProfileRetrieve({ ...(args ?? {}), throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/profile/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_retrieve\",\n method: \"GET\",\n path: \"/cfg/accounts/profile/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Update user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileUpdatePartialUpdateData, CfgAccountsProfileUpdatePartialUpdateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfileUpdatePartialUpdateData, \"url\">;\ntype Result = CfgAccountsProfileUpdatePartialUpdateResponses[keyof CfgAccountsProfileUpdatePartialUpdateResponses];\n\nexport function useCfgAccountsProfileUpdatePartialUpdate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_update_partial_update\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_update_partial_update\"], Args>(\n [\"cfg_accounts_profile_update_partial_update\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfileUpdatePartialUpdate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_update_partial_update\",\n method: \"PATCH\",\n path: \"/cfg/accounts/profile/update/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_update_partial_update\",\n method: \"PATCH\",\n path: \"/cfg/accounts/profile/update/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// Update user profile\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsProfile } from \"../../sdk.gen\";\nimport type { CfgAccountsProfileUpdateUpdateData, CfgAccountsProfileUpdateUpdateResponses } from \"../../types.gen\";\nimport { UserSchema } from \"../schemas/User\";\n\ntype Args = Omit<CfgAccountsProfileUpdateUpdateData, \"url\">;\ntype Result = CfgAccountsProfileUpdateUpdateResponses[keyof CfgAccountsProfileUpdateUpdateResponses];\n\nexport function useCfgAccountsProfileUpdateUpdate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_profile_update_update\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_profile_update_update\"], Args>(\n [\"cfg_accounts_profile_update_update\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsProfile.cfgAccountsProfileUpdateUpdate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = UserSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_profile_update_update\",\n method: \"PUT\",\n path: \"/cfg/accounts/profile/update/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_profile_update_update\",\n method: \"PUT\",\n path: \"/cfg/accounts/profile/update/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","'use client';\n\n// AUTO-GENERATED by openapi_processor / ts.hooks\n// POST /cfg/accounts/token/refresh/\n// DO NOT EDIT — re-run `make gen`.\n\nimport useSWRMutation from \"swr/mutation\";\nimport type { SWRMutationConfiguration } from \"swr/mutation\";\nimport { CfgAccountsAuth } from \"../../sdk.gen\";\nimport type { CfgAccountsTokenRefreshCreateData, CfgAccountsTokenRefreshCreateResponses } from \"../../types.gen\";\nimport { TokenRefreshSchema } from \"../schemas/TokenRefresh\";\n\ntype Args = Omit<CfgAccountsTokenRefreshCreateData, \"url\">;\ntype Result = CfgAccountsTokenRefreshCreateResponses[keyof CfgAccountsTokenRefreshCreateResponses];\n\nexport function useCfgAccountsTokenRefreshCreate(\n config?: SWRMutationConfiguration<Result, Error, readonly [\"cfg_accounts_token_refresh_create\"], Args>,\n) {\n return useSWRMutation<Result, Error, readonly [\"cfg_accounts_token_refresh_create\"], Args>(\n [\"cfg_accounts_token_refresh_create\"] as const,\n async (_key, { arg }: { arg: Args }) => {\n const res = await CfgAccountsAuth.cfgAccountsTokenRefreshCreate({ ...arg, throwOnError: true } as never);\n const data = res.data as Result;\n const parsed = TokenRefreshSchema.safeParse(data);\n if (!parsed.success) {\n // Log first so the failure is always visible, even if the\n // event handler swallows it.\n console.warn(\n \"[zod] response did not match schema\",\n {\n operation: \"cfg_accounts_token_refresh_create\",\n method: \"POST\",\n path: \"/cfg/accounts/token/refresh/\",\n issues: parsed.error.issues,\n data,\n },\n );\n if (typeof window !== \"undefined\") {\n try {\n window.dispatchEvent(\n new CustomEvent(\"zod-validation-error\", {\n detail: {\n operation: \"cfg_accounts_token_refresh_create\",\n method: \"POST\",\n path: \"/cfg/accounts/token/refresh/\",\n issues: parsed.error.issues,\n data,\n timestamp: new Date(),\n },\n bubbles: true,\n cancelable: false,\n }),\n );\n } catch {\n // Event dispatch is best-effort.\n }\n }\n return data;\n }\n return parsed.data as unknown as Result;\n },\n config,\n );\n}\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const TokenRefreshSchema = z.object({\n access: z.string(),\n refresh: z.string(),\n});\n\nexport type TokenRefresh = z.infer<typeof TokenRefreshSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeyRequestSchema = z.object({\n key: z.string().min(1),\n reissued_at: z.string().datetime({ offset: true }).nullable(),\n created_at: z.string().datetime({ offset: true }),\n});\n\nexport type APIKeyRequest = z.infer<typeof APIKeyRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const APIKeyTestRequestSchema = z.object({\n key: z.string().min(1),\n});\n\nexport type APIKeyTestRequest = z.infer<typeof APIKeyTestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const CfgUserUpdateRequestSchema = z.object({\n first_name: z.string().max(50).optional(),\n last_name: z.string().max(50).optional(),\n company: z.string().max(100).optional(),\n phone: z.string().max(20).optional(),\n position: z.string().max(100).optional(),\n language: z.string().max(10).optional(),\n timezone: z.string().max(64).optional(),\n});\n\nexport type CfgUserUpdateRequest = z.infer<typeof CfgUserUpdateRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthAuthorizeRequestRequestSchema = z.object({\n redirect_uri: z.string().optional(),\n source_url: z.string().optional(),\n});\n\nexport type OAuthAuthorizeRequestRequest = z.infer<typeof OAuthAuthorizeRequestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthCallbackRequestRequestSchema = z.object({\n code: z.string().min(10).max(500),\n state: z.string().min(20).max(100),\n redirect_uri: z.string().optional(),\n});\n\nexport type OAuthCallbackRequestRequest = z.infer<typeof OAuthCallbackRequestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\nimport { OAuthProviderEnumSchema } from \"./OAuthProviderEnum\";\n\nexport const OAuthDisconnectRequestRequestSchema = z.object({\n provider: OAuthProviderEnumSchema,\n});\n\nexport type OAuthDisconnectRequestRequest = z.infer<typeof OAuthDisconnectRequestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OAuthErrorSchema = z.object({\n error: z.string(),\n error_description: z.string().optional(),\n});\n\nexport type OAuthError = z.infer<typeof OAuthErrorSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OTPErrorResponseSchema = z.object({\n error: z.string(),\n error_code: z.string().nullable().optional(),\n retry_after: z.number().int().nullable().optional(),\n});\n\nexport type OTPErrorResponse = z.infer<typeof OTPErrorResponseSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OTPRequestRequestSchema = z.object({\n identifier: z.string().min(1),\n source_url: z.string().optional(),\n});\n\nexport type OTPRequestRequest = z.infer<typeof OTPRequestRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const OTPVerifyRequestSchema = z.object({\n identifier: z.string().min(1),\n otp: z.string().min(4).max(4),\n source_url: z.string().optional(),\n});\n\nexport type OTPVerifyRequest = z.infer<typeof OTPVerifyRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const PatchedCfgUserUpdateRequestSchema = z.object({\n first_name: z.string().max(50).optional(),\n last_name: z.string().max(50).optional(),\n company: z.string().max(100).optional(),\n phone: z.string().max(20).optional(),\n position: z.string().max(100).optional(),\n language: z.string().max(10).optional(),\n timezone: z.string().max(64).optional(),\n});\n\nexport type PatchedCfgUserUpdateRequest = z.infer<typeof PatchedCfgUserUpdateRequestSchema>;\n","// AUTO-GENERATED by cmdop_server / devtools.generator.ts_extras\n// Source: OpenAPI 3.1 components.schemas\n// DO NOT EDIT — re-run `make gen-clients`.\n\nimport { z } from \"zod\";\n\nexport const TokenRefreshRequestSchema = z.object({\n refresh: z.string().min(1),\n});\n\nexport type TokenRefreshRequest = z.infer<typeof TokenRefreshRequestSchema>;\n","/**\n * Email validation utility\n */\nexport const validateEmail = (email: string): boolean => {\n const emailRegex = /^[^\\s@]+@[^\\s@]+\\.[^\\s@]+$/;\n return emailRegex.test(email);\n};\n","/**\n * Format authentication error for display\n */\nexport const formatAuthError = (error: any): string => {\n if (typeof error === 'string') {\n return error;\n }\n\n if (error?.message) {\n return error.message;\n }\n\n if (error?.detail) {\n return error.detail;\n }\n\n if (error?.response?.data?.detail) {\n return error.response.data.detail;\n }\n\n return 'An unexpected error occurred';\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACKO,IAAM,iBAAiB;AAAA;AAAA,EAE5B,kBAAkB;AAAA;AAAA,EAElB,aAAa;AAAA;AAAA,EAEb,wBAAwB;AAC1B;;;ACZO,IAAM,QAAQ,yBAAyB;AAEvC,IAAM,YAAY,OAAO,WAAW;;;ACE3C,IAAAA,qBAA4B;AAC5B,IAAAC,iBAEO;AACP,IAAAC,cAA0B;;;ACS1B,wBAA2C;AAC3C,mBAAqC;AAKrC,SAAS,cAAsB;AAC7B,MAAI,OAAO,YAAY,aAAa;AAClC,WAAO;AAAA,EACT;AACA,SAAO,QAAQ,IAAI,yBAAyB;AAC9C;AALS;AAUT,SAAS,aAAa,MAAc,UAA0B;AAC5D,MAAI,CAAC,UAAU;AACb,WAAO;AAAA,EACT;AAEA,QAAM,iBAAiB,KAAK,WAAW,GAAG,IAAI,OAAO,IAAI,IAAI;AAE7D,QAAM,qBAAqB,SAAS,QAAQ,OAAO,EAAE;AACrD,SAAO,GAAG,kBAAkB,GAAG,cAAc;AAC/C;AATS;AA6BF,SAAS,eAAe;AAC7B,QAAM,aAAS,kBAAAC,WAAc;AAG7B,QAAM,eAAW,sBAAQ,MAAM,YAAY,GAAG,CAAC,CAAC;AAChD,QAAMC,qBAAgB,sBAAQ,MAAM;AAClC,WAAO,OAAO,YAAY,eAAe,QAAQ,IAAI,6BAA6B;AAAA,EACpF,GAAG,CAAC,CAAC;AAEL,QAAM,WAAO,0BAAY,CAAC,MAAc,YAAmC;AACzE,QAAI,UAAU;AAEZ,aAAO,SAAS,OAAO,aAAa,MAAM,QAAQ;AAAA,IACpD,OAAO;AAEL,aAAO,KAAK,MAAM,OAAO;AAAA,IAC3B;AAAA,EACF,GAAG,CAAC,QAAQ,QAAQ,CAAC;AAErB,QAAM,cAAU,0BAAY,CAAC,MAAc,YAAmC;AAC5E,QAAI,UAAU;AAEZ,aAAO,SAAS,QAAQ,aAAa,MAAM,QAAQ,CAAC;AAAA,IACtD,OAAO;AAEL,aAAO,QAAQ,MAAM,OAAO;AAAA,IAC9B;AAAA,EACF,GAAG,CAAC,QAAQ,QAAQ,CAAC;AAerB,QAAM,eAAW,0BAAY,CAAC,SAAiB;AAC7C,WAAO,SAAS,OAAO,aAAa,MAAM,QAAQ;AAAA,EACpD,GAAG,CAAC,QAAQ,CAAC;AAcb,QAAM,kBAAc,0BAAY,CAAC,SAAiB;AAChD,WAAO,SAAS,QAAQ,aAAa,MAAM,QAAQ,CAAC;AAAA,EACtD,GAAG,CAAC,QAAQ,CAAC;AAEb,QAAM,eAAW,0BAAY,CAAC,SAAiB;AAE7C,WAAO,SAAS,IAAI;AAAA,EACtB,GAAG,CAAC,MAAM,CAAC;AAEX,QAAM,WAAO,0BAAY,MAAM;AAC7B,WAAO,KAAK;AAAA,EACd,GAAG,CAAC,MAAM,CAAC;AAEX,QAAM,cAAU,0BAAY,MAAM;AAChC,WAAO,QAAQ;AAAA,EACjB,GAAG,CAAC,MAAM,CAAC;AAEX,QAAM,cAAU,0BAAY,MAAM;AAChC,WAAO,QAAQ;AAAA,EACjB,GAAG,CAAC,MAAM,CAAC;AAEX,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAzFgB;;;AC7ChB,IAAAC,qBAA4B;AAC5B,IAAAC,gBAA4C;AAerC,SAAS,iBAAkC;AAChD,QAAM,eAAW,gCAAY;AAC7B,QAAM,CAAC,aAAa,cAAc,QAAI,wBAA0B,MAAM;AACpE,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO,IAAI,gBAAgB;AAAA,IAC7B;AACA,WAAO,IAAI,gBAAgB,OAAO,SAAS,MAAM;AAAA,EACnD,CAAC;AACD,QAAM,oBAAgB,sBAAe,EAAE;AAEvC,+BAAU,MAAM;AACd,QAAI,OAAO,WAAW,YAAa;AAEnC,UAAM,oBAAoB,6BAAM;AAC9B,YAAM,gBAAgB,OAAO,SAAS;AACtC,UAAI,kBAAkB,cAAc,SAAS;AAC3C,sBAAc,UAAU;AACxB,uBAAe,IAAI,gBAAgB,aAAa,CAAC;AAAA,MACnD;AAAA,IACF,GAN0B;AAS1B,sBAAkB;AAGlB,WAAO,iBAAiB,YAAY,iBAAiB;AAIrD,UAAM,aAAa,YAAY,mBAAmB,GAAG;AAErD,WAAO,MAAM;AACX,aAAO,oBAAoB,YAAY,iBAAiB;AACxD,oBAAc,UAAU;AAAA,IAC1B;AAAA,EACF,GAAG,CAAC,QAAQ,CAAC;AAEb,SAAO;AACT;AAtCgB;;;AC/BhB,IAAAC,gBAAyD;AAIzD,IAAM,kBAAkB,wBAAC,MAAsB;AAC7C,MAAI,KAAK,EAAG,QAAO;AACnB,QAAM,IAAI,KAAK,MAAM,IAAI,EAAE;AAC3B,SAAO,IAAI,IAAI,GAAG,CAAC,IAAI,OAAO,IAAI,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,KAAK,GAAG,CAAC;AACjE,GAJwB;AAYjB,IAAM,mBAAmB,wBAC9B,oBAAoB,OACO;AAC3B,QAAM,CAAC,YAAY,aAAa,QAAI,wBAAS,iBAAiB;AAC9D,QAAM,CAAC,KAAK,MAAM,QAAI,wBAAS,EAAE;AACjC,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAS,KAAK;AAChD,QAAM,CAAC,eAAe,gBAAgB,QAAI,wBAAS,IAAI;AACvD,QAAM,CAAC,MAAM,OAAO,QAAI,wBAAmB,YAAY;AACvD,QAAM,CAAC,OAAO,QAAQ,QAAI,wBAAS,EAAE;AAGrC,QAAM,CAAC,oBAAoB,qBAAqB,QAAI,wBAAwB,IAAI;AAChF,QAAM,CAAC,iBAAiB,kBAAkB,QAAI,wBAAS,KAAK;AAC5D,QAAM,CAAC,eAAe,gBAAgB,QAAI,wBAAS,EAAE;AACrD,QAAM,CAAC,eAAe,gBAAgB,QAAI,wBAAS,KAAK;AAGxD,QAAM,CAAC,kBAAkB,mBAAmB,QAAI,wBAAS,CAAC;AAC1D,QAAM,wBAAoB,sBAA8C,IAAI;AAE5E,QAAM,8BAA0B,2BAAY,CAAC,YAAoB;AAC/D,QAAI,kBAAkB,QAAS,eAAc,kBAAkB,OAAO;AACtE,wBAAoB,OAAO;AAC3B,sBAAkB,UAAU,YAAY,MAAM;AAC5C,0BAAoB,CAAC,SAAS;AAC5B,YAAI,QAAQ,GAAG;AACb,wBAAc,kBAAkB,OAAQ;AACxC,4BAAkB,UAAU;AAC5B,iBAAO;AAAA,QACT;AACA,eAAO,OAAO;AAAA,MAChB,CAAC;AAAA,IACH,GAAG,GAAI;AAAA,EACT,GAAG,CAAC,CAAC;AAEL,+BAAU,MAAM,MAAM;AACpB,QAAI,kBAAkB,QAAS,eAAc,kBAAkB,OAAO;AAAA,EACxE,GAAG,CAAC,CAAC;AAEL,QAAM,iBAAa,2BAAY,MAAM,SAAS,EAAE,GAAG,CAAC,CAAC;AAErD,SAAO;AAAA;AAAA,IAEL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA,eAAe,mBAAmB;AAAA,IAClC,gBAAgB,gBAAgB,gBAAgB;AAAA;AAAA,IAEhD;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAtEgC;;;AChBhC,IAAAC,gBAA4B;AAI5B,IAAM,cAAc;AAEb,IAAM,oBAAoB,6BAA0B;AACzD,QAAMC,0BAAqB,2BAAY,CAAC,OAAwB;AAC9D,WAAO,YAAY,KAAK,EAAE;AAAA,EAC5B,GAAG,CAAC,CAAC;AAEL,SAAO,EAAE,oBAAAA,oBAAmB;AAC9B,GANiC;AAQ1B,IAAM,qBAAqB,wBAAC,OAAwB,YAAY,KAAK,EAAE,GAA5C;;;ACdlC,IAAAC,gBAA+C;;;ACF/C,qBAA8B;AAe9B,IAAM,gBAAgB,QAAQ,IAAI,6BAA6B;AAC/D,IAAM,WAAW,SAAiB;AAE3B,IAAM,aAAS,8BAAc;AAAA,EAClC,OAAO,WAAW,IAAI;AAAA;AACxB,CAAC,EAAE,QAAQ,KAAK;AAKT,IAAM,aAAa,OAAO,QAAQ,MAAM;;;ACvB/C,IAAAC,qBAA4B;AAC5B,IAAAC,gBAA0B;AAkBnB,IAAM,cAAc,wBAAC,UAA8B,CAAC,MAAM;AAC/D,QAAM,EAAE,eAAe,aAAa,MAAM,eAAe,CAAC,OAAO,EAAE,IAAI;AACvE,QAAM,cAAc,eAAe;AACnC,QAAM,eAAW,gCAAY;AAC7B,QAAM,SAAS,aAAa;AAG5B,QAAM,gBAAgB,aAAa,KAAK,UAAQ,aAAa,QAAQ,UAAU,WAAW,OAAO,GAAG,CAAC;AAErG,QAAM,SAAS,CAAC,CAAE,YAAY,IAAI,KAAK;AACvC,QAAM,UAAU,CAAC,CAAC,YAAY,UAAU;AAExC,+BAAU,MAAM;AACd,QAAI,CAAC,QAAS;AAEd,UAAM,WAAW,YAAY,IAAI,KAAK;AAItC,QAAI,YAAY,OAAO,aAAa,YAAY,SAAS,WAAW,eAAe,kBAAkB;AACnG,iBAAW,KAAK,qCAAqC,QAAQ;AAC7D,sBAAgB,QAAQ;AAAA,IAC1B;AAOA,QAAI,cAAc,UAAU;AAC1B,YAAM,aAAa,OAAO,YAAY,YAAY,QAAQ,CAAC;AAC3D,aAAO,WAAW;AAClB,YAAM,cAAc,IAAI,gBAAgB,UAAU,EAAE,SAAS;AAC7D,YAAM,eAAe,OAAO,WAAW,cAAc,OAAO,SAAS,WAAW;AAChF,aAAO,QAAQ,cAAc,GAAG,YAAY,IAAI,WAAW,KAAK,YAAY;AAAA,IAC9E;AAAA,EACF,GAAG,CAAC,UAAU,aAAa,eAAe,YAAY,QAAQ,OAAO,CAAC;AAEtE,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GA3C2B;;;ACnB3B,IAAAC,gBAAsC;;;ACK/B,IAAM,WAAN,cAAuB,MAAM;AAAA,EAClC,YACS,YACA,YACA,UACA,KACP,SACA;AACA,UAAM,WAAW,QAAQ,UAAU,KAAK,UAAU,EAAE;AAN7C;AACA;AACA;AACA;AAIP,SAAK,OAAO;AAAA,EACd;AAAA,EAjBF,OAOoC;AAAA;AAAA;AAAA,EAYlC,IAAI,UAAsC;AACxC,QAAI,OAAO,KAAK,aAAa,YAAY,KAAK,aAAa,MAAM;AAC/D,aAAO,KAAK;AAAA,IACd;AACA,WAAO;AAAA,EACT;AAAA,EAEA,IAAI,cAA+C;AACjD,UAAM,UAAU,KAAK;AACrB,QAAI,CAAC,QAAS,QAAO;AACrB,UAAM,cAAwC,CAAC;AAC/C,eAAW,CAAC,KAAK,KAAK,KAAK,OAAO,QAAQ,OAAO,GAAG;AAClD,UAAI,MAAM,QAAQ,KAAK,EAAG,aAAY,GAAG,IAAI;AAAA,IAC/C;AACA,WAAO,OAAO,KAAK,WAAW,EAAE,SAAS,IAAI,cAAc;AAAA,EAC7D;AAAA,EAEA,IAAI,eAAuB;AACzB,UAAM,UAAU,KAAK;AACrB,QAAI,CAAC,QAAS,QAAO,KAAK;AAC1B,QAAI,QAAQ,QAAQ;AAClB,aAAO,MAAM,QAAQ,QAAQ,MAAM,IAAI,QAAQ,OAAO,KAAK,IAAI,IAAI,OAAO,QAAQ,MAAM;AAAA,IAC1F;AACA,QAAI,QAAQ,MAAO,QAAO,OAAO,QAAQ,KAAK;AAC9C,QAAI,QAAQ,QAAS,QAAO,OAAO,QAAQ,OAAO;AAClD,UAAM,cAAc,KAAK;AACzB,QAAI,aAAa;AACf,YAAM,aAAa,OAAO,KAAK,WAAW,EAAE,CAAC;AAC7C,UAAI,WAAY,QAAO,GAAG,UAAU,KAAK,YAAY,UAAU,GAAG,KAAK,IAAI,CAAC;AAAA,IAC9E;AACA,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,IAAI,oBAA6B;AAAE,WAAO,KAAK,eAAe;AAAA,EAAK;AAAA,EACnE,IAAI,cAAuB;AAAE,WAAO,KAAK,eAAe;AAAA,EAAK;AAAA,EAC7D,IAAI,oBAA6B;AAAE,WAAO,KAAK,eAAe;AAAA,EAAK;AAAA,EACnE,IAAI,kBAA2B;AAAE,WAAO,KAAK,eAAe;AAAA,EAAK;AAAA,EACjE,IAAI,gBAAyB;AAAE,WAAO,KAAK,cAAc,OAAO,KAAK,aAAa;AAAA,EAAK;AACzF;;;ACjDA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAMC,aAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAACA,WAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAACA,WAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAACA,WAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAACA,WAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAkBT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAiBT,SAAS,gBAA+B;AACtC,MAAIA,WAAW,QAAO;AACtB,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAS7D,IAAI,kBAAyC;AAG7C,IAAI,mBAAkD;AAGtD,IAAM,eAAe;AAiBrB,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAWA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,kBAAkB,IAAiC;AACjD,sBAAkB;AAAA,EACpB;AACF;AAOA,eAAe,aAAqC;AAClD,MAAI,iBAAkB,QAAO;AAC7B,MAAI,CAAC,gBAAiB,QAAO;AAC7B,QAAM,UAAU,KAAK,gBAAgB;AACrC,MAAI,CAAC,QAAS,QAAO;AAErB,sBAAoB,YAAY;AAC9B,QAAI;AACF,YAAM,SAAS,MAAM,gBAAiB,OAAO;AAC7C,UAAI,CAAC,QAAQ,OAAQ,QAAO;AAC5B,WAAK,SAAS,OAAO,MAAM;AAC3B,UAAI,OAAO,QAAS,MAAK,gBAAgB,OAAO,OAAO;AACvD,aAAO,OAAO;AAAA,IAChB,QAAQ;AACN,aAAO;AAAA,IACT,UAAE;AACA,yBAAmB;AAAA,IACrB;AAAA,EACF,GAAG;AAEH,SAAO;AACT;AArBe;AAiCR,SAAS,oBAAoBC,SAAyB;AAC3D,MAAI,QAAS;AACb,YAAUA;AAEV,EAAAA,QAAO,UAAU;AAAA,IACf,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AAED,EAAAA,QAAO,aAAa,QAAQ,IAAI,CAAC,YAAY;AAC3C,UAAM,QAAQ,KAAK,SAAS;AAC5B,QAAI,MAAO,SAAQ,QAAQ,IAAI,iBAAiB,UAAU,KAAK,EAAE;AAEjE,UAAM,SAAS,KAAK,UAAU;AAC9B,QAAI,OAAQ,SAAQ,QAAQ,IAAI,mBAAmB,MAAM;AAEzD,UAAM,SAAS,KAAK,UAAU;AAC9B,QAAI,OAAQ,SAAQ,QAAQ,IAAI,aAAa,MAAM;AAEnD,QAAI;AACF,YAAM,KAAK,KAAK,eAAe,EAAE,gBAAgB,EAAE;AACnD,UAAI,GAAI,SAAQ,QAAQ,IAAI,cAAc,EAAE;AAAA,IAC9C,QAAQ;AAAA,IAAC;AACT,YAAQ,QAAQ,IAAI,kBAAiB,oBAAI,KAAK,GAAE,YAAY,CAAC;AAE7D,WAAO;AAAA,EACT,CAAC;AAKD,EAAAA,QAAO,aAAa,MAAM,IAAI,CAAC,KAAK,KAAK,QAAQ;AAC/C,QAAI,eAAe,SAAU,QAAO;AACpC,UAAM,MAAO,KAA6B,OAAO;AACjD,UAAM,SAAU,KAA8B,UAAU;AACxD,UAAM,aAAc,KAA8B,cAAc;AAChE,WAAO,IAAI,SAAS,QAAQ,YAAY,KAAK,GAAG;AAAA,EAClD,CAAC;AAED,EAAAA,QAAO,aAAa,SAAS,IAAI,OAAO,UAAU,YAAY;AAC5D,QAAI,SAAS,WAAW,IAAK,QAAO;AAGpC,QAAI,QAAQ,QAAQ,IAAI,YAAY,GAAG;AACrC,UAAI,iBAAiB;AACnB,YAAI;AAAE,0BAAgB,QAAQ;AAAA,QAAG,QAAQ;AAAA,QAAC;AAAA,MAC5C;AACA,aAAO;AAAA,IACT;AAEA,UAAM,WAAW,MAAM,WAAW;AAClC,QAAI,CAAC,UAAU;AACb,UAAI,iBAAiB;AACnB,YAAI;AAAE,0BAAgB,QAAQ;AAAA,QAAG,QAAQ;AAAA,QAAC;AAAA,MAC5C;AACA,aAAO;AAAA,IACT;AAKA,UAAM,QAAQ,QAAQ,MAAM;AAC5B,UAAM,QAAQ,IAAI,iBAAiB,UAAU,QAAQ,EAAE;AACvD,UAAM,QAAQ,IAAI,cAAc,GAAG;AACnC,QAAI;AACF,YAAM,UAAU,MAAM,MAAM,KAAK;AACjC,UAAI,QAAQ,WAAW,OAAO,iBAAiB;AAC7C,YAAI;AAAE,0BAAgB,OAAO;AAAA,QAAG,QAAQ;AAAA,QAAC;AAAA,MAC3C;AACA,aAAO;AAAA,IACT,QAAQ;AAEN,UAAI,iBAAiB;AACnB,YAAI;AAAE,0BAAgB,QAAQ;AAAA,QAAG,QAAQ;AAAA,QAAC;AAAA,MAC5C;AACA,aAAO;AAAA,IACT;AAAA,EACF,CAAC;AACH;AA9EgB;;;AC5RhB,IAAAC,kBAAoD;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,eAAW,+BAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACpG3C,IAAM,wBAAwB,wBAAC,MAAgB,KAAa,UAAyB;AACnF,MAAI,OAAO,UAAU,YAAY,iBAAiB,MAAM;AACtD,SAAK,OAAO,KAAK,KAAK;AAAA,EACxB,WAAW,iBAAiB,MAAM;AAChC,SAAK,OAAO,KAAK,MAAM,YAAY,CAAC;AAAA,EACtC,OAAO;AACL,SAAK,OAAO,KAAK,KAAK,UAAU,KAAK,CAAC;AAAA,EACxC;AACF,GAR8B;AAkBvB,IAAM,yBAAyB;AAAA,EACpC,gBAAgB,wBAAC,SAA4B;AAC3C,UAAM,OAAO,IAAI,SAAS;AAE1B,WAAO,QAAQ,IAA+B,EAAE,QAAQ,CAAC,CAAC,KAAK,KAAK,MAAM;AACxE,UAAI,UAAU,UAAa,UAAU,MAAM;AACzC;AAAA,MACF;AACA,UAAI,MAAM,QAAQ,KAAK,GAAG;AACxB,cAAM,QAAQ,CAAC,MAAM,sBAAsB,MAAM,KAAK,CAAC,CAAC;AAAA,MAC1D,OAAO;AACL,8BAAsB,MAAM,KAAK,KAAK;AAAA,MACxC;AAAA,IACF,CAAC;AAED,WAAO;AAAA,EACT,GAfgB;AAgBlB;AAEO,IAAM,qBAAqB;AAAA,EAChC,gBAAgB,wBAAC,SACf,KAAK,UAAU,MAAM,CAAC,MAAM,UAAW,OAAO,UAAU,WAAW,MAAM,SAAS,IAAI,KAAM,GAD9E;AAElB;;;AClBA,IAAM,mBAAyC;AAAA,EAC7C,QAAQ;AAAA,EACR,WAAW;AAAA,EACX,QAAQ;AAAA,EACR,SAAS;AACX;AACA,IAAM,gBAAgB,OAAO,QAAQ,gBAAgB;;;AC+B9C,SAAS,gBAAiC;AAAA,EAC/C;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA,GAAG;AACL,GAA2D;AACzD,MAAI;AAEJ,QAAM,QAAQ,eAAe,CAAC,OAAe,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,EAAE,CAAC;AAE7F,QAAM,eAAe,0CAAmB;AACtC,QAAI,aAAqB,wBAAwB;AACjD,QAAI,UAAU;AACd,UAAM,SAAS,QAAQ,UAAU,IAAI,gBAAgB,EAAE;AAEvD,WAAO,MAAM;AACX,UAAI,OAAO,QAAS;AAEpB;AAEA,YAAM,UACJ,QAAQ,mBAAmB,UACvB,QAAQ,UACR,IAAI,QAAQ,QAAQ,OAA6C;AAEvE,UAAI,gBAAgB,QAAW;AAC7B,gBAAQ,IAAI,iBAAiB,WAAW;AAAA,MAC1C;AAEA,UAAI;AACF,cAAM,cAA2B;AAAA,UAC/B,UAAU;AAAA,UACV,GAAG;AAAA,UACH,MAAM,QAAQ;AAAA,UACd;AAAA,UACA;AAAA,QACF;AACA,YAAI,UAAU,IAAI,QAAQ,KAAK,WAAW;AAC1C,YAAI,WAAW;AACb,oBAAU,MAAM,UAAU,KAAK,WAAW;AAAA,QAC5C;AAGA,cAAM,SAAS,QAAQ,SAAS,WAAW;AAC3C,cAAM,WAAW,MAAM,OAAO,OAAO;AAErC,YAAI,CAAC,SAAS,GAAI,OAAM,IAAI,MAAM,eAAe,SAAS,MAAM,IAAI,SAAS,UAAU,EAAE;AAEzF,YAAI,CAAC,SAAS,KAAM,OAAM,IAAI,MAAM,yBAAyB;AAE7D,cAAM,SAAS,SAAS,KAAK,YAAY,IAAI,kBAAkB,CAAC,EAAE,UAAU;AAE5E,YAAI,SAAS;AAEb,cAAM,eAAe,6BAAM;AACzB,cAAI;AACF,mBAAO,OAAO;AAAA,UAChB,QAAQ;AAAA,UAER;AAAA,QACF,GANqB;AAQrB,eAAO,iBAAiB,SAAS,YAAY;AAE7C,YAAI;AACF,iBAAO,MAAM;AACX,kBAAM,EAAE,MAAM,MAAM,IAAI,MAAM,OAAO,KAAK;AAC1C,gBAAI,KAAM;AACV,sBAAU;AACV,qBAAS,OAAO,QAAQ,UAAU,IAAI;AAEtC,kBAAM,SAAS,OAAO,MAAM,MAAM;AAClC,qBAAS,OAAO,IAAI,KAAK;AAEzB,uBAAW,SAAS,QAAQ;AAC1B,oBAAM,QAAQ,MAAM,MAAM,IAAI;AAC9B,oBAAM,YAA2B,CAAC;AAClC,kBAAI;AAEJ,yBAAW,QAAQ,OAAO;AACxB,oBAAI,KAAK,WAAW,OAAO,GAAG;AAC5B,4BAAU,KAAK,KAAK,QAAQ,aAAa,EAAE,CAAC;AAAA,gBAC9C,WAAW,KAAK,WAAW,QAAQ,GAAG;AACpC,8BAAY,KAAK,QAAQ,cAAc,EAAE;AAAA,gBAC3C,WAAW,KAAK,WAAW,KAAK,GAAG;AACjC,gCAAc,KAAK,QAAQ,WAAW,EAAE;AAAA,gBAC1C,WAAW,KAAK,WAAW,QAAQ,GAAG;AACpC,wBAAM,SAAS,OAAO,SAAS,KAAK,QAAQ,cAAc,EAAE,GAAG,EAAE;AACjE,sBAAI,CAAC,OAAO,MAAM,MAAM,GAAG;AACzB,iCAAa;AAAA,kBACf;AAAA,gBACF;AAAA,cACF;AAEA,kBAAI;AACJ,kBAAI,aAAa;AAEjB,kBAAI,UAAU,QAAQ;AACpB,sBAAM,UAAU,UAAU,KAAK,IAAI;AACnC,oBAAI;AACF,yBAAO,KAAK,MAAM,OAAO;AACzB,+BAAa;AAAA,gBACf,QAAQ;AACN,yBAAO;AAAA,gBACT;AAAA,cACF;AAEA,kBAAI,YAAY;AACd,oBAAI,mBAAmB;AACrB,wBAAM,kBAAkB,IAAI;AAAA,gBAC9B;AAEA,oBAAI,qBAAqB;AACvB,yBAAO,MAAM,oBAAoB,IAAI;AAAA,gBACvC;AAAA,cACF;AAEA,2BAAa;AAAA,gBACX;AAAA,gBACA,OAAO;AAAA,gBACP,IAAI;AAAA,gBACJ,OAAO;AAAA,cACT,CAAC;AAED,kBAAI,UAAU,QAAQ;AACpB,sBAAM;AAAA,cACR;AAAA,YACF;AAAA,UACF;AAAA,QACF,UAAE;AACA,iBAAO,oBAAoB,SAAS,YAAY;AAChD,iBAAO,YAAY;AAAA,QACrB;AAEA;AAAA,MACF,SAAS,OAAO;AAEd,qBAAa,KAAK;AAElB,YAAI,wBAAwB,UAAa,WAAW,qBAAqB;AACvE;AAAA,QACF;AAGA,cAAM,UAAU,KAAK,IAAI,aAAa,MAAM,UAAU,IAAI,oBAAoB,GAAK;AACnF,cAAM,MAAM,OAAO;AAAA,MACrB;AAAA,IACF;AAAA,EACF,GA1IqB;AA4IrB,QAAM,SAAS,aAAa;AAE5B,SAAO,EAAE,OAAO;AAClB;AAhKgB;;;ACtDT,IAAM,wBAAwB,wBAAC,UAA+B;AACnE,UAAQ,OAAO;AAAA,IACb,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT;AACE,aAAO;AAAA,EACX;AACF,GAXqC;AAa9B,IAAM,0BAA0B,wBAAC,UAA+B;AACrE,UAAQ,OAAO;AAAA,IACb,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT;AACE,aAAO;AAAA,EACX;AACF,GAXuC;AAahC,IAAM,yBAAyB,wBAAC,UAAgC;AACrE,UAAQ,OAAO;AAAA,IACb,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT,KAAK;AACH,aAAO;AAAA,IACT;AACE,aAAO;AAAA,EACX;AACF,GAXsC;AAa/B,IAAM,sBAAsB,wBAAC;AAAA,EAClC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,MAEM;AACJ,MAAI,CAAC,SAAS;AACZ,UAAMC,iBACJ,gBAAgB,QAAQ,MAAM,IAAI,CAAC,MAAM,mBAAmB,CAAW,CAAC,GACxE,KAAK,wBAAwB,KAAK,CAAC;AACrC,YAAQ,OAAO;AAAA,MACb,KAAK;AACH,eAAO,IAAIA,aAAY;AAAA,MACzB,KAAK;AACH,eAAO,IAAI,IAAI,IAAIA,aAAY;AAAA,MACjC,KAAK;AACH,eAAOA;AAAA,MACT;AACE,eAAO,GAAG,IAAI,IAAIA,aAAY;AAAA,IAClC;AAAA,EACF;AAEA,QAAM,YAAY,sBAAsB,KAAK;AAC7C,QAAM,eAAe,MAClB,IAAI,CAAC,MAAM;AACV,QAAI,UAAU,WAAW,UAAU,UAAU;AAC3C,aAAO,gBAAgB,IAAI,mBAAmB,CAAW;AAAA,IAC3D;AAEA,WAAO,wBAAwB;AAAA,MAC7B;AAAA,MACA;AAAA,MACA,OAAO;AAAA,IACT,CAAC;AAAA,EACH,CAAC,EACA,KAAK,SAAS;AACjB,SAAO,UAAU,WAAW,UAAU,WAAW,YAAY,eAAe;AAC9E,GAxCmC;AA0C5B,IAAM,0BAA0B,wBAAC;AAAA,EACtC;AAAA,EACA;AAAA,EACA;AACF,MAA+B;AAC7B,MAAI,UAAU,UAAa,UAAU,MAAM;AACzC,WAAO;AAAA,EACT;AAEA,MAAI,OAAO,UAAU,UAAU;AAC7B,UAAM,IAAI;AAAA,MACR;AAAA,IACF;AAAA,EACF;AAEA,SAAO,GAAG,IAAI,IAAI,gBAAgB,QAAQ,mBAAmB,KAAK,CAAC;AACrE,GAhBuC;AAkBhC,IAAM,uBAAuB,wBAAC;AAAA,EACnC;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF,MAGM;AACJ,MAAI,iBAAiB,MAAM;AACzB,WAAO,YAAY,MAAM,YAAY,IAAI,GAAG,IAAI,IAAI,MAAM,YAAY,CAAC;AAAA,EACzE;AAEA,MAAI,UAAU,gBAAgB,CAAC,SAAS;AACtC,QAAI,SAAmB,CAAC;AACxB,WAAO,QAAQ,KAAK,EAAE,QAAQ,CAAC,CAAC,KAAK,CAAC,MAAM;AAC1C,eAAS,CAAC,GAAG,QAAQ,KAAK,gBAAiB,IAAe,mBAAmB,CAAW,CAAC;AAAA,IAC3F,CAAC;AACD,UAAMA,gBAAe,OAAO,KAAK,GAAG;AACpC,YAAQ,OAAO;AAAA,MACb,KAAK;AACH,eAAO,GAAG,IAAI,IAAIA,aAAY;AAAA,MAChC,KAAK;AACH,eAAO,IAAIA,aAAY;AAAA,MACzB,KAAK;AACH,eAAO,IAAI,IAAI,IAAIA,aAAY;AAAA,MACjC;AACE,eAAOA;AAAA,IACX;AAAA,EACF;AAEA,QAAM,YAAY,uBAAuB,KAAK;AAC9C,QAAM,eAAe,OAAO,QAAQ,KAAK,EACtC;AAAA,IAAI,CAAC,CAAC,KAAK,CAAC,MACX,wBAAwB;AAAA,MACtB;AAAA,MACA,MAAM,UAAU,eAAe,GAAG,IAAI,IAAI,GAAG,MAAM;AAAA,MACnD,OAAO;AAAA,IACT,CAAC;AAAA,EACH,EACC,KAAK,SAAS;AACjB,SAAO,UAAU,WAAW,UAAU,WAAW,YAAY,eAAe;AAC9E,GA5CoC;;;AC/G7B,IAAM,gBAAgB;AAEtB,IAAM,wBAAwB,wBAAC,EAAE,MAAM,KAAK,KAAK,MAAsB;AAC5E,MAAI,MAAM;AACV,QAAM,UAAU,KAAK,MAAM,aAAa;AACxC,MAAI,SAAS;AACX,eAAW,SAAS,SAAS;AAC3B,UAAI,UAAU;AACd,UAAI,OAAO,MAAM,UAAU,GAAG,MAAM,SAAS,CAAC;AAC9C,UAAI,QAA6B;AAEjC,UAAI,KAAK,SAAS,GAAG,GAAG;AACtB,kBAAU;AACV,eAAO,KAAK,UAAU,GAAG,KAAK,SAAS,CAAC;AAAA,MAC1C;AAEA,UAAI,KAAK,WAAW,GAAG,GAAG;AACxB,eAAO,KAAK,UAAU,CAAC;AACvB,gBAAQ;AAAA,MACV,WAAW,KAAK,WAAW,GAAG,GAAG;AAC/B,eAAO,KAAK,UAAU,CAAC;AACvB,gBAAQ;AAAA,MACV;AAEA,YAAM,QAAQ,KAAK,IAAI;AAEvB,UAAI,UAAU,UAAa,UAAU,MAAM;AACzC;AAAA,MACF;AAEA,UAAI,MAAM,QAAQ,KAAK,GAAG;AACxB,cAAM,IAAI,QAAQ,OAAO,oBAAoB,EAAE,SAAS,MAAM,OAAO,MAAM,CAAC,CAAC;AAC7E;AAAA,MACF;AAEA,UAAI,OAAO,UAAU,UAAU;AAC7B,cAAM,IAAI;AAAA,UACR;AAAA,UACA,qBAAqB;AAAA,YACnB;AAAA,YACA;AAAA,YACA;AAAA,YACA;AAAA,YACA,WAAW;AAAA,UACb,CAAC;AAAA,QACH;AACA;AAAA,MACF;AAEA,UAAI,UAAU,UAAU;AACtB,cAAM,IAAI;AAAA,UACR;AAAA,UACA,IAAI,wBAAwB;AAAA,YAC1B;AAAA,YACA;AAAA,UACF,CAAC,CAAC;AAAA,QACJ;AACA;AAAA,MACF;AAEA,YAAM,eAAe;AAAA,QACnB,UAAU,UAAU,IAAI,KAAe,KAAM;AAAA,MAC/C;AACA,YAAM,IAAI,QAAQ,OAAO,YAAY;AAAA,IACvC;AAAA,EACF;AACA,SAAO;AACT,GAjEqC;AAmE9B,IAAM,SAAS,wBAAC;AAAA,EACrB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA,KAAK;AACP,MAMM;AACJ,QAAM,UAAU,KAAK,WAAW,GAAG,IAAI,OAAO,IAAI,IAAI;AACtD,MAAI,OAAO,WAAW,MAAM;AAC5B,MAAI,MAAM;AACR,UAAM,sBAAsB,EAAE,MAAM,IAAI,CAAC;AAAA,EAC3C;AACA,MAAI,SAAS,QAAQ,gBAAgB,KAAK,IAAI;AAC9C,MAAI,OAAO,WAAW,GAAG,GAAG;AAC1B,aAAS,OAAO,UAAU,CAAC;AAAA,EAC7B;AACA,MAAI,QAAQ;AACV,WAAO,IAAI,MAAM;AAAA,EACnB;AACA,SAAO;AACT,GA1BsB;AA4Bf,SAAS,oBAAoB,SAIjC;AACD,QAAM,UAAU,QAAQ,SAAS;AACjC,QAAM,mBAAmB,WAAW,QAAQ;AAE5C,MAAI,kBAAkB;AACpB,QAAI,oBAAoB,SAAS;AAC/B,YAAM,oBACJ,QAAQ,mBAAmB,UAAa,QAAQ,mBAAmB;AAErE,aAAO,oBAAoB,QAAQ,iBAAiB;AAAA,IACtD;AAGA,WAAO,QAAQ,SAAS,KAAK,QAAQ,OAAO;AAAA,EAC9C;AAGA,MAAI,SAAS;AACX,WAAO,QAAQ;AAAA,EACjB;AAGA,SAAO;AACT;AA3BgB;;;AC3FT,IAAM,eAAe,8BAC1BC,OACA,aACgC;AAChC,QAAM,QAAQ,OAAO,aAAa,aAAa,MAAM,SAASA,KAAI,IAAI;AAEtE,MAAI,CAAC,OAAO;AACV;AAAA,EACF;AAEA,MAAIA,MAAK,WAAW,UAAU;AAC5B,WAAO,UAAU,KAAK;AAAA,EACxB;AAEA,MAAIA,MAAK,WAAW,SAAS;AAC3B,WAAO,SAAS,KAAK,KAAK,CAAC;AAAA,EAC7B;AAEA,SAAO;AACT,GAnB4B;;;ACRrB,IAAM,wBAAwB,wBAAc;AAAA,EACjD,aAAa,CAAC;AAAA,EACd,GAAG;AACL,IAA4B,CAAC,MAAM;AACjC,QAAM,kBAAkB,wBAAC,gBAAmB;AAC1C,UAAM,SAAmB,CAAC;AAC1B,QAAI,eAAe,OAAO,gBAAgB,UAAU;AAClD,iBAAW,QAAQ,aAAa;AAC9B,cAAM,QAAQ,YAAY,IAAI;AAE9B,YAAI,UAAU,UAAa,UAAU,MAAM;AACzC;AAAA,QACF;AAEA,cAAM,UAAU,WAAW,IAAI,KAAK;AAEpC,YAAI,MAAM,QAAQ,KAAK,GAAG;AACxB,gBAAM,kBAAkB,oBAAoB;AAAA,YAC1C,eAAe,QAAQ;AAAA,YACvB,SAAS;AAAA,YACT;AAAA,YACA,OAAO;AAAA,YACP;AAAA,YACA,GAAG,QAAQ;AAAA,UACb,CAAC;AACD,cAAI,gBAAiB,QAAO,KAAK,eAAe;AAAA,QAClD,WAAW,OAAO,UAAU,UAAU;AACpC,gBAAM,mBAAmB,qBAAqB;AAAA,YAC5C,eAAe,QAAQ;AAAA,YACvB,SAAS;AAAA,YACT;AAAA,YACA,OAAO;AAAA,YACP;AAAA,YACA,GAAG,QAAQ;AAAA,UACb,CAAC;AACD,cAAI,iBAAkB,QAAO,KAAK,gBAAgB;AAAA,QACpD,OAAO;AACL,gBAAM,sBAAsB,wBAAwB;AAAA,YAClD,eAAe,QAAQ;AAAA,YACvB;AAAA,YACA;AAAA,UACF,CAAC;AACD,cAAI,oBAAqB,QAAO,KAAK,mBAAmB;AAAA,QAC1D;AAAA,MACF;AAAA,IACF;AACA,WAAO,OAAO,KAAK,GAAG;AAAA,EACxB,GA3CwB;AA4CxB,SAAO;AACT,GAjDqC;AAsD9B,IAAM,aAAa,wBAAC,gBAAmE;AAC5F,MAAI,CAAC,aAAa;AAGhB,WAAO;AAAA,EACT;AAEA,QAAM,eAAe,YAAY,MAAM,GAAG,EAAE,CAAC,GAAG,KAAK;AAErD,MAAI,CAAC,cAAc;AACjB;AAAA,EACF;AAEA,MAAI,aAAa,WAAW,kBAAkB,KAAK,aAAa,SAAS,OAAO,GAAG;AACjF,WAAO;AAAA,EACT;AAEA,MAAI,iBAAiB,uBAAuB;AAC1C,WAAO;AAAA,EACT;AAEA,MACE,CAAC,gBAAgB,UAAU,UAAU,QAAQ,EAAE,KAAK,CAAC,SAAS,aAAa,WAAW,IAAI,CAAC,GAC3F;AACA,WAAO;AAAA,EACT;AAEA,MAAI,aAAa,WAAW,OAAO,GAAG;AACpC,WAAO;AAAA,EACT;AAEA;AACF,GAhC0B;AAkC1B,IAAM,oBAAoB,wBACxB,SAGA,SACY;AACZ,MAAI,CAAC,MAAM;AACT,WAAO;AAAA,EACT;AACA,MACE,QAAQ,QAAQ,IAAI,IAAI,KACxB,QAAQ,QAAQ,IAAI,KACpB,QAAQ,QAAQ,IAAI,QAAQ,GAAG,SAAS,GAAG,IAAI,GAAG,GAClD;AACA,WAAO;AAAA,EACT;AACA,SAAO;AACT,GAjB0B;AAmBnB,IAAM,gBAAgB,8BAAO;AAAA,EAClC;AAAA,EACA,GAAG;AACL,MAGQ;AACN,aAAWC,SAAQ,UAAU;AAC3B,QAAI,kBAAkB,SAASA,MAAK,IAAI,GAAG;AACzC;AAAA,IACF;AAEA,UAAM,QAAQ,MAAM,aAAaA,OAAM,QAAQ,IAAI;AAEnD,QAAI,CAAC,OAAO;AACV;AAAA,IACF;AAEA,UAAM,OAAOA,MAAK,QAAQ;AAE1B,YAAQA,MAAK,IAAI;AAAA,MACf,KAAK;AACH,YAAI,CAAC,QAAQ,OAAO;AAClB,kBAAQ,QAAQ,CAAC;AAAA,QACnB;AACA,gBAAQ,MAAM,IAAI,IAAI;AACtB;AAAA,MACF,KAAK;AACH,gBAAQ,QAAQ,OAAO,UAAU,GAAG,IAAI,IAAI,KAAK,EAAE;AACnD;AAAA,MACF,KAAK;AAAA,MACL;AACE,gBAAQ,QAAQ,IAAI,MAAM,KAAK;AAC/B;AAAA,IACJ;AAAA,EACF;AACF,GApC6B;AAsCtB,IAAM,WAA+B,wBAAC,YAC3C,OAAO;AAAA,EACL,SAAS,QAAQ;AAAA,EACjB,MAAM,QAAQ;AAAA,EACd,OAAO,QAAQ;AAAA,EACf,iBACE,OAAO,QAAQ,oBAAoB,aAC/B,QAAQ,kBACR,sBAAsB,QAAQ,eAAe;AAAA,EACnD,KAAK,QAAQ;AACf,CAAC,GAVyC;AAYrC,IAAM,eAAe,wBAAC,GAAW,MAAsB;AAC5D,QAAM,SAAS,EAAE,GAAG,GAAG,GAAG,EAAE;AAC5B,MAAI,OAAO,SAAS,SAAS,GAAG,GAAG;AACjC,WAAO,UAAU,OAAO,QAAQ,UAAU,GAAG,OAAO,QAAQ,SAAS,CAAC;AAAA,EACxE;AACA,SAAO,UAAU,aAAa,EAAE,SAAS,EAAE,OAAO;AAClD,SAAO;AACT,GAP4B;AAS5B,IAAM,iBAAiB,wBAAC,YAA8C;AACpE,QAAM,UAAmC,CAAC;AAC1C,UAAQ,QAAQ,CAAC,OAAO,QAAQ;AAC9B,YAAQ,KAAK,CAAC,KAAK,KAAK,CAAC;AAAA,EAC3B,CAAC;AACD,SAAO;AACT,GANuB;AAQhB,IAAM,eAAe,2BACvB,YACS;AACZ,QAAM,gBAAgB,IAAI,QAAQ;AAClC,aAAW,UAAU,SAAS;AAC5B,QAAI,CAAC,QAAQ;AACX;AAAA,IACF;AAEA,UAAM,WAAW,kBAAkB,UAAU,eAAe,MAAM,IAAI,OAAO,QAAQ,MAAM;AAE3F,eAAW,CAAC,KAAK,KAAK,KAAK,UAAU;AACnC,UAAI,UAAU,MAAM;AAClB,sBAAc,OAAO,GAAG;AAAA,MAC1B,WAAW,MAAM,QAAQ,KAAK,GAAG;AAC/B,mBAAW,KAAK,OAAO;AACrB,wBAAc,OAAO,KAAK,CAAW;AAAA,QACvC;AAAA,MACF,WAAW,UAAU,QAAW;AAG9B,sBAAc;AAAA,UACZ;AAAA,UACA,OAAO,UAAU,WAAW,KAAK,UAAU,KAAK,IAAK;AAAA,QACvD;AAAA,MACF;AAAA,IACF;AAAA,EACF;AACA,SAAO;AACT,GA7B4B;AAgD5B,IAAM,eAAN,MAAgC;AAAA,EA3OhC,OA2OgC;AAAA;AAAA;AAAA,EAC9B,MAAiC,CAAC;AAAA,EAElC,QAAc;AACZ,SAAK,MAAM,CAAC;AAAA,EACd;AAAA,EAEA,MAAM,IAAgC;AACpC,UAAM,QAAQ,KAAK,oBAAoB,EAAE;AACzC,QAAI,KAAK,IAAI,KAAK,GAAG;AACnB,WAAK,IAAI,KAAK,IAAI;AAAA,IACpB;AAAA,EACF;AAAA,EAEA,OAAO,IAAmC;AACxC,UAAM,QAAQ,KAAK,oBAAoB,EAAE;AACzC,WAAO,QAAQ,KAAK,IAAI,KAAK,CAAC;AAAA,EAChC;AAAA,EAEA,oBAAoB,IAAkC;AACpD,QAAI,OAAO,OAAO,UAAU;AAC1B,aAAO,KAAK,IAAI,EAAE,IAAI,KAAK;AAAA,IAC7B;AACA,WAAO,KAAK,IAAI,QAAQ,EAAE;AAAA,EAC5B;AAAA,EAEA,OAAO,IAA0B,IAA+C;AAC9E,UAAM,QAAQ,KAAK,oBAAoB,EAAE;AACzC,QAAI,KAAK,IAAI,KAAK,GAAG;AACnB,WAAK,IAAI,KAAK,IAAI;AAClB,aAAO;AAAA,IACT;AACA,WAAO;AAAA,EACT;AAAA,EAEA,IAAI,IAAyB;AAC3B,SAAK,IAAI,KAAK,EAAE;AAChB,WAAO,KAAK,IAAI,SAAS;AAAA,EAC3B;AACF;AAQO,IAAM,qBAAqB,8BAK5B;AAAA,EACJ,OAAO,IAAI,aAAqD;AAAA,EAChE,SAAS,IAAI,aAA2C;AAAA,EACxD,UAAU,IAAI,aAAgD;AAChE,IATkC;AAWlC,IAAM,yBAAyB,sBAAsB;AAAA,EACnD,eAAe;AAAA,EACf,OAAO;AAAA,IACL,SAAS;AAAA,IACT,OAAO;AAAA,EACT;AAAA,EACA,QAAQ;AAAA,IACN,SAAS;AAAA,IACT,OAAO;AAAA,EACT;AACF,CAAC;AAED,IAAM,iBAAiB;AAAA,EACrB,gBAAgB;AAClB;AAEO,IAAM,eAAe,wBAC1B,WAAqD,CAAC,OACR;AAAA,EAC9C,GAAG;AAAA,EACH,SAAS;AAAA,EACT,SAAS;AAAA,EACT,iBAAiB;AAAA,EACjB,GAAG;AACL,IAR4B;;;AChSrB,IAAM,eAAe,wBAAC,SAAiB,CAAC,MAAc;AAC3D,MAAI,UAAU,aAAa,aAAa,GAAG,MAAM;AAEjD,QAAM,YAAY,8BAAe,EAAE,GAAG,QAAQ,IAA5B;AAElB,QAAM,YAAY,wBAACC,YAA2B;AAC5C,cAAU,aAAa,SAASA,OAAM;AACtC,WAAO,UAAU;AAAA,EACnB,GAHkB;AAKlB,QAAM,eAAe,mBAAuE;AAE5F,QAAM,gBAAgB,8BAMpB,YACG;AACH,UAAM,OAAO;AAAA,MACX,GAAG;AAAA,MACH,GAAG;AAAA,MACH,OAAO,QAAQ,SAAS,QAAQ,SAAS,WAAW;AAAA,MACpD,SAAS,aAAa,QAAQ,SAAS,QAAQ,OAAO;AAAA,MACtD,gBAAgB;AAAA,IAClB;AAEA,QAAI,KAAK,UAAU;AACjB,YAAM,cAAc;AAAA,QAClB,GAAG;AAAA,QACH,UAAU,KAAK;AAAA,MACjB,CAAC;AAAA,IACH;AAEA,QAAI,KAAK,kBAAkB;AACzB,YAAM,KAAK,iBAAiB,IAAI;AAAA,IAClC;AAEA,QAAI,KAAK,SAAS,UAAa,KAAK,gBAAgB;AAClD,WAAK,iBAAiB,KAAK,eAAe,KAAK,IAAI;AAAA,IACrD;AAGA,QAAI,KAAK,SAAS,UAAa,KAAK,mBAAmB,IAAI;AACzD,WAAK,QAAQ,OAAO,cAAc;AAAA,IACpC;AAEA,UAAM,eAAe;AAErB,UAAM,MAAM,SAAS,YAAY;AAEjC,WAAO,EAAE,MAAM,cAAc,IAAI;AAAA,EACnC,GAzCsB;AA2CtB,QAAM,UAA6B,8BAAO,YAAY;AACpD,UAAM,eAAe,QAAQ,gBAAgB,QAAQ;AACrD,UAAM,gBAAgB,QAAQ,iBAAiB,QAAQ;AAEvD,QAAIC;AACJ,QAAI;AAEJ,QAAI;AACF,YAAM,EAAE,MAAM,IAAI,IAAI,MAAM,cAAc,OAAO;AACjD,YAAM,cAAuB;AAAA,QAC3B,UAAU;AAAA,QACV,GAAG;AAAA,QACH,MAAM,oBAAoB,IAAI;AAAA,MAChC;AAEA,MAAAA,WAAU,IAAI,QAAQ,KAAK,WAAW;AAEtC,iBAAW,MAAM,aAAa,QAAQ,KAAK;AACzC,YAAI,IAAI;AACN,UAAAA,WAAU,MAAM,GAAGA,UAAS,IAAI;AAAA,QAClC;AAAA,MACF;AAIA,YAAM,SAAS,KAAK;AAEpB,iBAAW,MAAM,OAAOA,QAAO;AAE/B,iBAAW,MAAM,aAAa,SAAS,KAAK;AAC1C,YAAI,IAAI;AACN,qBAAW,MAAM,GAAG,UAAUA,UAAS,IAAI;AAAA,QAC7C;AAAA,MACF;AAEA,YAAM,SAAS;AAAA,QACb,SAAAA;AAAA,QACA;AAAA,MACF;AAEA,UAAI,SAAS,IAAI;AACf,cAAM,WACH,KAAK,YAAY,SACd,WAAW,SAAS,QAAQ,IAAI,cAAc,CAAC,IAC/C,KAAK,YAAY;AAEvB,YAAI,SAAS,WAAW,OAAO,SAAS,QAAQ,IAAI,gBAAgB,MAAM,KAAK;AAC7E,cAAI;AACJ,kBAAQ,SAAS;AAAA,YACf,KAAK;AAAA,YACL,KAAK;AAAA,YACL,KAAK;AACH,0BAAY,MAAM,SAAS,OAAO,EAAE;AACpC;AAAA,YACF,KAAK;AACH,0BAAY,IAAI,SAAS;AACzB;AAAA,YACF,KAAK;AACH,0BAAY,SAAS;AACrB;AAAA,YACF,KAAK;AAAA,YACL;AACE,0BAAY,CAAC;AACb;AAAA,UACJ;AACA,iBAAO,KAAK,kBAAkB,SAC1B,YACA;AAAA,YACE,MAAM;AAAA,YACN,GAAG;AAAA,UACL;AAAA,QACN;AAEA,YAAI;AACJ,gBAAQ,SAAS;AAAA,UACf,KAAK;AAAA,UACL,KAAK;AAAA,UACL,KAAK;AAAA,UACL,KAAK;AACH,mBAAO,MAAM,SAAS,OAAO,EAAE;AAC/B;AAAA,UACF,KAAK,QAAQ;AAGX,kBAAM,OAAO,MAAM,SAAS,KAAK;AACjC,mBAAO,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAClC;AAAA,UACF;AAAA,UACA,KAAK;AACH,mBAAO,KAAK,kBAAkB,SAC1B,SAAS,OACT;AAAA,cACE,MAAM,SAAS;AAAA,cACf,GAAG;AAAA,YACL;AAAA,QACR;AAEA,YAAI,YAAY,QAAQ;AACtB,cAAI,KAAK,mBAAmB;AAC1B,kBAAM,KAAK,kBAAkB,IAAI;AAAA,UACnC;AAEA,cAAI,KAAK,qBAAqB;AAC5B,mBAAO,MAAM,KAAK,oBAAoB,IAAI;AAAA,UAC5C;AAAA,QACF;AAEA,eAAO,KAAK,kBAAkB,SAC1B,OACA;AAAA,UACE;AAAA,UACA,GAAG;AAAA,QACL;AAAA,MACN;AAEA,YAAM,YAAY,MAAM,SAAS,KAAK;AACtC,UAAI;AAEJ,UAAI;AACF,oBAAY,KAAK,MAAM,SAAS;AAAA,MAClC,QAAQ;AAAA,MAER;AAEA,YAAM,aAAa;AAAA,IACrB,SAAS,OAAO;AACd,UAAI,aAAa;AAEjB,iBAAW,MAAM,aAAa,MAAM,KAAK;AACvC,YAAI,IAAI;AACN,uBAAa,MAAM,GAAG,YAAY,UAAUA,UAAS,OAAiC;AAAA,QACxF;AAAA,MACF;AAEA,mBAAa,cAAc,CAAC;AAE5B,UAAI,cAAc;AAChB,cAAM;AAAA,MACR;AAGA,aAAO,kBAAkB,SACrB,SACA;AAAA,QACE,OAAO;AAAA,QACP,SAAAA;AAAA,QACA;AAAA,MACF;AAAA,IACN;AAAA,EACF,GArJmC;AAuJnC,QAAM,eAAe,wBAAC,WAAkC,CAAC,YACvD,QAAQ,EAAE,GAAG,SAAS,OAAO,CAAC,GADX;AAGrB,QAAM,YAAY,wBAAC,WAAkC,OAAO,YAA4B;AACtF,UAAM,EAAE,MAAM,IAAI,IAAI,MAAM,cAAc,OAAO;AACjD,WAAO,gBAAgB;AAAA,MACrB,GAAG;AAAA,MACH,MAAM,KAAK;AAAA,MACX;AAAA,MACA,WAAW,8BAAOC,MAAK,SAAS;AAC9B,YAAID,WAAU,IAAI,QAAQC,MAAK,IAAI;AACnC,mBAAW,MAAM,aAAa,QAAQ,KAAK;AACzC,cAAI,IAAI;AACN,YAAAD,WAAU,MAAM,GAAGA,UAAS,IAAI;AAAA,UAClC;AAAA,QACF;AACA,eAAOA;AAAA,MACT,GARW;AAAA,MASX,gBAAgB,oBAAoB,IAAI;AAAA,MACxC;AAAA,IACF,CAAC;AAAA,EACH,GAlBkB;AAoBlB,QAAM,YAAgC,wBAAC,YAAY,SAAS,EAAE,GAAG,SAAS,GAAG,QAAQ,CAAC,GAAhD;AAEtC,SAAO;AAAA,IACL,UAAU;AAAA,IACV,SAAS,aAAa,SAAS;AAAA,IAC/B,QAAQ,aAAa,QAAQ;AAAA,IAC7B,KAAK,aAAa,KAAK;AAAA,IACvB;AAAA,IACA,MAAM,aAAa,MAAM;AAAA,IACzB;AAAA,IACA,SAAS,aAAa,SAAS;AAAA,IAC/B,OAAO,aAAa,OAAO;AAAA,IAC3B,MAAM,aAAa,MAAM;AAAA,IACzB,KAAK,aAAa,KAAK;AAAA,IACvB;AAAA,IACA;AAAA,IACA,KAAK;AAAA,MACH,SAAS,UAAU,SAAS;AAAA,MAC5B,QAAQ,UAAU,QAAQ;AAAA,MAC1B,KAAK,UAAU,KAAK;AAAA,MACpB,MAAM,UAAU,MAAM;AAAA,MACtB,SAAS,UAAU,SAAS;AAAA,MAC5B,OAAO,UAAU,OAAO;AAAA,MACxB,MAAM,UAAU,MAAM;AAAA,MACtB,KAAK,UAAU,KAAK;AAAA,MACpB,OAAO,UAAU,OAAO;AAAA,IAC1B;AAAA,IACA,OAAO,aAAa,OAAO;AAAA,EAC7B;AACF,GAlQ4B;;;ACNrB,IAAM,SAAS,aAAa,aAA6B,EAAE,SAAS,wBAAwB,CAAC,CAAC;AAIrG,oBAAoB,MAAM;;;ACCnB,IAAM,oBAAN,MAAwB;AAAA,EApB/B,OAoB+B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAM3B,OAAc,0BAAgE,SAAgE;AAC1I,YAAQ,SAAS,UAAU,QAAQ,IAAuF;AAAA,MACtH,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,kCAAwE,SAAuE;AACzJ,YAAQ,QAAQ,UAAU,QAAQ,KAAwG;AAAA,MACtI,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,4BAAkE,SAAiE;AAC7I,YAAQ,QAAQ,UAAU,QAAQ,KAAkE;AAAA,MAChG,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,mBAAN,MAAuB;AAAA,EAjF9B,OAiF8B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAM1B,OAAc,gCAAsE,SAAsE;AACtJ,YAAQ,SAAS,UAAU,QAAQ,IAAqE;AAAA,MACpG,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,iCAAuE,SAAsE;AACvJ,YAAQ,QAAQ,UAAU,QAAQ,KAAsG;AAAA,MACpI,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,sCAA4E,SAA4E;AAClK,YAAQ,SAAS,UAAU,QAAQ,KAAgH;AAAA,MAC/I,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,qCAA2E,SAA0E;AAC/J,YAAQ,QAAQ,UAAU,QAAQ,KAA8G;AAAA,MAC5I,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,kCAAwE,SAAwE;AAC1J,YAAQ,SAAS,UAAU,QAAQ,IAAuE,EAAE,KAAK,kCAAkC,GAAG,QAAQ,CAAC;AAAA,EACnK;AACJ;AAEO,IAAM,cAAN,MAAkB;AAAA,EA1JzB,OA0JyB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAIrB,OAAc,4BAAkE,SAAiE;AAC7I,YAAQ,QAAQ,UAAU,QAAQ,KAA4F;AAAA,MAC1H,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAYA,OAAc,2BAAiE,SAAgE;AAC3I,YAAQ,QAAQ,UAAU,QAAQ,KAA0F;AAAA,MACxH,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,qBAAN,MAAyB;AAAA,EAjMhC,OAiMgC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAM5B,OAAc,2BAAiE,SAAiE;AAC5I,YAAQ,SAAS,UAAU,QAAQ,IAAyF;AAAA,MACxH,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,+BAAqE,SAAqE;AACpJ,YAAQ,SAAS,UAAU,QAAQ,KAAkG;AAAA,MACjI,GAAG;AAAA,MACH,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAiBA,OAAc,+BAAqE,SAAqE;AACpJ,YAAQ,SAAS,UAAU,QAAQ,KAAkG;AAAA,MACjI,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,uCAA6E,SAA6E;AACpK,YAAQ,SAAS,UAAU,QAAQ,MAAmH;AAAA,MAClJ,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,gCAAsE,SAAsE;AACtJ,YAAQ,SAAS,UAAU,QAAQ,IAAmG;AAAA,MAClI,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,sCAA4E,SAA4E;AAClK,YAAQ,SAAS,UAAU,QAAQ,MAAiH;AAAA,MAChJ,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,+BAAqE,SAAqE;AACpJ,YAAQ,SAAS,UAAU,QAAQ,IAAiG;AAAA,MAChI,UAAU,CAAC,EAAE,QAAQ,UAAU,MAAM,OAAO,GAAG;AAAA,QACvC,IAAI;AAAA,QACJ,MAAM;AAAA,QACN,MAAM;AAAA,MACV,CAAC;AAAA,MACL,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,kBAAN,MAAsB;AAAA,EArV7B,OAqV6B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAIzB,OAAc,8BAAoE,SAAmE;AACjJ,YAAQ,QAAQ,UAAU,QAAQ,KAAoE;AAAA,MAClG,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,gBAAN,MAAoB;AAAA,EArW3B,OAqW2B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAMvB,OAAc,+BAAqE,SAAqE;AACpJ,YAAQ,SAAS,UAAU,QAAQ,IAAiG;AAAA,MAChI,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,qBAAN,MAAyB;AAAA,EApXhC,OAoXgC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAI5B,OAAc,2BAAiE,SAAiE;AAC5I,YAAQ,SAAS,UAAU,QAAQ,IAAgE;AAAA,MAC/F,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,OAAc,mCAAyE,SAAwE;AAC3J,YAAQ,QAAQ,UAAU,QAAQ,KAA0G;AAAA,MACxI,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,UAAN,MAAc;AAAA,EAnZrB,OAmZqB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAIjB,OAAc,uBAA6D,SAA6D;AACpI,YAAQ,SAAS,UAAU,QAAQ,IAA4D;AAAA,MAC3F,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,sBAA4D,SAA2D;AACjI,YAAQ,QAAQ,UAAU,QAAQ,OAA8D;AAAA,MAC5F,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,IACP,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,qBAA2D,SAA0D;AAC/H,YAAQ,QAAQ,UAAU,QAAQ,KAA8E;AAAA,MAC5G,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,eAAN,MAAmB;AAAA,EA9b1B,OA8b0B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAMtB,OAAc,mBAAyD,SAAyD;AAC5H,YAAQ,SAAS,UAAU,QAAQ,KAA0E;AAAA,MACzG,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,SAAS;AAAA,MAChB;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,0BAAgE,SAA+D;AACzI,YAAQ,QAAQ,UAAU,QAAQ,KAAwF;AAAA,MACtH,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;AAEO,IAAM,gBAAN,MAAoB;AAAA,EAle3B,OAke2B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAMvB,OAAc,oBAA0D,SAAyD;AAC7H,YAAQ,QAAQ,UAAU,QAAQ,KAA4E;AAAA,MAC1G,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAc,0BAAgE,SAA+D;AACzI,YAAQ,QAAQ,UAAU,QAAQ,KAAwF;AAAA,MACtH,UAAU,CAAC,EAAE,MAAM,aAAa,MAAM,SAAS,GAAG,EAAE,QAAQ,UAAU,MAAM,OAAO,CAAC;AAAA,MACpF,KAAK;AAAA,MACL,GAAG;AAAA,MACH,SAAS;AAAA,QACL,gBAAgB;AAAA,QAChB,GAAG,QAAQ;AAAA,MACf;AAAA,IACJ,CAAC;AAAA,EACL;AACJ;;;AC/dO,IAAM,MAAN,MAAU;AAAA,EArCjB,OAqCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAEA,oBAAoB;AAAA,EACpB,mBAAmB;AAAA,EACnB,cAAc;AAAA,EACd,qBAAqB;AAAA,EACrB,kBAAkB;AAAA,EAE3B,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AClDO,IAAME,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAEA,gBAAgB;AAAA,EAEzB,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;ACvCO,IAAMC,OAAN,MAAU;AAAA,EApCjB,OAoCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAEA,qBAAqB;AAAA,EACrB,UAAU;AAAA,EACV,eAAe;AAAA,EACf,gBAAgB;AAAA,EAEzB,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AChEO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;;;ACXlC,IAAK,iBAAL,kBAAKC,oBAAL;AACL,EAAAA,gBAAA,sBAAmB;AACnB,EAAAA,gBAAA,wBAAqB;AACrB,EAAAA,gBAAA,0BAAuB;AACvB,EAAAA,gBAAA,0BAAuB;AACvB,EAAAA,gBAAA,wBAAqB;AACrB,EAAAA,gBAAA,6BAA0B;AAC1B,EAAAA,gBAAA,iBAAc;AACd,EAAAA,gBAAA,sBAAmB;AACnB,EAAAA,gBAAA,qBAAkB;AATR,SAAAA;AAAA,GAAA;AAYL,IAAK,oBAAL,kBAAKC,uBAAL;AACL,EAAAA,mBAAA,UAAO;AADG,SAAAA;AAAA,GAAA;AAkBL,IAAM,YAAY;AAAA;AAAA;AAAA;AAAA,EAIvB,MAAM,WAA+B,QAA+B;AAClE,QAAI,OAAO;AACT,cAAQ,IAAI,eAAe,WAAW,MAAM;AAAA,IAC9C;AAAA,EAIF;AAAA;AAAA;AAAA;AAAA,EAKA,QAAQ,QAAgB;AACtB,QAAI,OAAO;AACT,cAAQ,IAAI,yBAAyB,MAAM;AAAA,IAC7C;AAAA,EAIF;AACF;;;AlBIO,IAAM,eAAe,wBAAC,UAA+B,CAAC,MAA0B;AACrF,QAAM,EAAE,WAAW,SAAS,aAAa,eAAe,MAAM,IAAI;AAClE,QAAM,SAAS,aAAa;AAE5B,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,wBAAwB,IAAI;AACtD,QAAM,CAAC,SAAS,UAAU,QAAI,wBAAwB,IAAI;AAC1D,QAAM,CAAC,sBAAsB,uBAAuB,QAAI,wBAAwB,IAAI;AACpF,QAAM,CAAC,mBAAmB,oBAAoB,QAAI,wBAAwB,IAAI;AAE9E,QAAM,iBAAa,2BAAY,MAAM;AACnC,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAKL,QAAM,oBAAgB,2BAAY,CAAC,aAM7B;AAEJ,mBAAY,SAAS,SAAS,YAAY;AAC1C,mBAAY,gBAAgB,SAAS,aAAa;AAGlD,QAAI,SAAS,SAAS;AACpB,iBAAW,SAAS,OAAO;AAAA,IAC7B;AAGA,QAAI,SAAS,2BAA2B,QAAW;AACjD,8BAAwB,SAAS,sBAAsB;AAAA,IACzD;AAGA,cAAU,qDAAyC;AAAA,MACjD;AAAA,MACA,OAAO;AAAA,IACT,CAAC;AAGD,QAAI,SAAS,MAAM,IAAI;AACrB,gBAAU,QAAQ,OAAO,SAAS,KAAK,EAAE,CAAC;AAAA,IAC5C;AAGA,gBAAY,SAAS,IAAI;AAGzB,QAAI,CAAC,cAAc;AACjB,YAAM,mBAAmB,eAAe;AACxC,iBAAW,KAAK,mCAAmC,gBAAgB;AACnE,aAAO,SAAS,gBAAgB;AAAA,IAClC;AAAA,EACF,GAAG,CAAC,WAAW,aAAa,QAAQ,YAAY,CAAC;AAKjD,QAAM,iBAAa,2BAAY,OAAO,WAAmB,SAAmC;AAC1F,QAAI,CAAC,WAAW;AACd,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,wBAAwB;AAExC,YAAM,SAAS,MAAM,cAAc,oBAAoB;AAAA,QACrD,MAAM,EAAE,YAAY,WAAW,KAAK;AAAA,QACpC,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,UAAI,CAAC,SAAS,gBAAgB,CAAC,SAAS,eAAe;AACrD,cAAM,IAAI,MAAM,wCAAwC;AAAA,MAC1D;AAEA,oBAAc,QAAQ;AACtB,aAAO;AAAA,IAET,SAAS,KAAK;AACZ,iBAAW,MAAM,gCAAgC,GAAG;AACpD,YAAM,eAAe,eAAe,WAC/B,IAAI,UAAU,SAAS,IAAI,UAAU,UAAU,IAAI,UAAU,WAAW,IAAI,eAC5E,eAAe,QAAQ,IAAI,UAAU;AAC1C,UAAI,eAAe,YAAY,OAAO,IAAI,UAAU,uBAAuB,UAAU;AACnF,6BAAqB,IAAI,SAAS,kBAAkB;AAAA,MACtD;AACA,eAAS,YAAY;AACrB,gBAAU,YAAY;AAGtB,gBAAU,yDAA2C;AAAA,QACnD;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAED,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,eAAe,OAAO,CAAC;AAK3B,QAAM,uBAAmB,2BAAY,OAAO,WAAmB,eAAyC;AACtG,QAAI,CAAC,WAAW;AACd,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,cAAc,WAAW,SAAS,GAAG;AACxC,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,0BAA0B;AAE1C,YAAM,SAAS,MAAM,cAAc,0BAA0B;AAAA,QAC3D,MAAM;AAAA,UACJ,YAAY;AAAA,UACZ,aAAa,WAAW,QAAQ,QAAQ,EAAE;AAAA,QAC5C;AAAA,QACA,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,UAAI,CAAC,SAAS,gBAAgB,CAAC,SAAS,eAAe;AACrD,cAAM,IAAI,MAAM,gDAAgD;AAAA,MAClE;AAEA,oBAAc,QAAQ;AACtB,aAAO;AAAA,IAET,SAAS,KAAK;AACZ,iBAAW,MAAM,uCAAuC,GAAG;AAC3D,YAAM,eAAe,eAAe,WAC/B,IAAI,UAAU,SAAS,IAAI,UAAU,UAAU,IAAI,UAAU,WAAW,IAAI,eAC5E,eAAe,QAAQ,IAAI,UAAU;AAC1C,UAAI,eAAe,YAAY,OAAO,IAAI,UAAU,uBAAuB,UAAU;AACnF,6BAAqB,IAAI,SAAS,kBAAkB;AAAA,MACtD;AACA,eAAS,YAAY;AACrB,gBAAU,YAAY;AAGtB,gBAAU,yDAA2C;AAAA,QACnD;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAED,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,eAAe,OAAO,CAAC;AAE3B,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAjM4B;;;AHjDrB,IAAM,cAAc,wBAAC,YAAgD;AAC1E,QAAM;AAAA,IACJ;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA,yBAAyB;AAAA,IACzB,WAAW;AAAA,IACX,iBAAiB;AAAA,EACnB,IAAI;AAGJ,QAAM,YAAY,iBAAiB;AACnC,QAAM,aAAa,kBAAkB;AAGrC,QAAM,6BAAyB,sBAAO,KAAK;AAG3C,QAAM;AAAA,IACJ;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI,QAAQ;AAGZ,QAAM;AAAA,IACJ;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI;AAGJ,QAAM,YAAY,aAAa;AAAA,IAC7B,WAAW,6BAAM;AACf,iBAAW,KAAK,qDAAqD;AACrE,cAAQ,SAAS;AACjB,qBAAe;AAAA,IACjB,GAJW;AAAA,IAKX,SAAS,wBAAC,UAAU;AAClB,eAAS,KAAK;AACd,gBAAU,KAAK;AAAA,IACjB,GAHS;AAAA,IAIT;AAAA,IACA,cAAc;AAAA;AAAA,EAChB,CAAC;AAED,QAAM,EAAE,oBAAAC,oBAAmB,IAAI;AAM/B,QAAM,8BAA0B,2BAAY,CAAC,OAAe;AAC1D,cAAU,EAAE;AAAA,EACd,GAAG,CAAC,SAAS,CAAC;AAOd,+BAAU,MAAM;AACd,UAAM,aAAa,cAAc;AACjC,QAAI,YAAY;AACd,oBAAc,UAAU;AAAA,IAC1B;AAAA,EAEF,GAAG,CAAC,CAAC;AAML,QAAM,6BAAyB,2BAAY,OAAO,MAAuB;AACvE,MAAE,eAAe;AAEjB,QAAI,CAAC,YAAY;AACf,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb;AAAA,IACF;AAEA,QAAI,CAACA,oBAAmB,UAAU,GAAG;AACnC,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb;AAAA,IACF;AAEA,QAAI,0BAA0B,CAAC,eAAe;AAC5C,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb;AAAA,IACF;AAEA,iBAAa,IAAI;AACjB,eAAW;AAEX,QAAI;AACF,YAAM,SAAS,MAAM,WAAW,YAAY,SAAS;AAErD,UAAI,OAAO,SAAS;AAClB,gCAAwB,UAAU;AAClC,gBAAQ,KAAK;AACb,8BAAsB,UAAU;AAAA,MAClC,OAAO;AACL,YAAI,OAAO,YAAY;AACrB,kCAAwB,OAAO,UAAU;AACzC,qBAAW;AAAA,QACb,OAAO;AACL,mBAAS,OAAO,OAAO;AACvB,oBAAU,OAAO,OAAO;AAAA,QAC1B;AAAA,MACF;AAAA,IACF,QAAQ;AACN,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AAAA,IACf,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG;AAAA,IACD;AAAA,IAAY;AAAA,IAAe;AAAA,IAC3BA;AAAA,IAAoB;AAAA,IAAY;AAAA,IAChC;AAAA,IAAU;AAAA,IAAc;AAAA,IAAS;AAAA,IACjC;AAAA,IAAyB;AAAA,IAAqB;AAAA,IAAS;AAAA,EACzD,CAAC;AAGD,QAAM,gBAAY,2BAAY,OAC5B,kBACA,cACqB;AACrB,QAAI,CAAC,aAAa,UAAU,SAAS,eAAe,kBAAkB;AACpE,YAAM,MAAM,oBAAoB,eAAe,gBAAgB;AAC/D,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,eAAW;AAEX,QAAI;AAEF,YAAM,SAAS,MAAM,UAAU,kBAAkB,WAAW,WAAW,aAAa,IAAI;AAGxF,UAAI,OAAO,gBAAgB,OAAO,YAAY;AAC5C,mBAAW,KAAK,qCAAqC;AACrD,8BAAsB,OAAO,UAAU;AACvC,2BAAmB,OAAO,qBAAqB,KAAK;AACpD,gBAAQ,KAAK;AACb,gCAAwB,gBAAgB;AACxC,eAAO;AAAA,MACT;AAEA,UAAI,OAAO,SAAS;AAClB,gCAAwB,gBAAgB;AAIxC,YAAI,OAAO,qBAAqB,gBAAgB;AAC9C,qBAAW,KAAK,kDAAkD;AAClE,6BAAmB,IAAI;AACvB,kBAAQ,WAAW;AACnB,yBAAe;AACf,iBAAO;AAAA,QACT;AAGA,YAAI,OAAO,qBAAqB,CAAC,gBAAgB;AAC/C,qBAAW,KAAK,mEAAmE;AAAA,QACrF,OAAO;AACL,qBAAW,KAAK,qDAAqD;AAAA,QACvE;AACA,gBAAQ,SAAS;AACjB,uBAAe;AACf,eAAO;AAAA,MACT,OAAO;AACL,iBAAS,OAAO,OAAO;AACvB,kBAAU,OAAO,OAAO;AACxB,eAAO;AAAA,MACT;AAAA,IACF,QAAQ;AACN,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,WAAW,yBAAyB,UAAU,cAAc,YAAY,cAAc,SAAS,WAAW,aAAa,uBAAuB,oBAAoB,SAAS,cAAc,CAAC;AAE9L,QAAM,sBAAkB,2BAAY,OAAO,MAAuB;AAChE,MAAE,eAAe;AACjB,UAAM,UAAU,YAAY,GAAG;AAAA,EACjC,GAAG,CAAC,YAAY,KAAK,SAAS,CAAC;AAE/B,QAAM,sBAAkB,2BAAY,YAAY;AAC9C,iBAAa,IAAI;AACjB,eAAW;AAEX,QAAI;AACF,YAAM,SAAS,MAAM,WAAW,YAAY,SAAS;AAErD,UAAI,OAAO,SAAS;AAClB,gCAAwB,UAAU;AAClC,eAAO,EAAE;AAAA,MACX,OAAO;AACL,YAAI,OAAO,YAAY;AACrB,kCAAwB,OAAO,UAAU;AACzC,qBAAW;AAAA,QACb,OAAO;AACL,mBAAS,OAAO,OAAO;AACvB,oBAAU,OAAO,OAAO;AAAA,QAC1B;AAAA,MACF;AAAA,IACF,QAAQ;AACN,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AAAA,IACf,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,YAAY,YAAY,yBAAyB,QAAQ,UAAU,cAAc,YAAY,yBAAyB,SAAS,SAAS,CAAC;AAE7I,QAAM,6BAAyB,2BAAY,MAAM;AAC/C,YAAQ,YAAY;AACpB,eAAW;AAAA,EACb,GAAG,CAAC,SAAS,UAAU,CAAC;AAExB,QAAM,mBAAe,2BAAY,MAAM;AACrC,YAAQ,KAAK;AACb,eAAW;AAAA,EACb,GAAG,CAAC,SAAS,UAAU,CAAC;AAMxB,QAAM,sBAAkB,2BAAY,OAAO,MAAuB;AAChE,MAAE,eAAe;AAEjB,QAAI,CAAC,oBAAoB;AACvB,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb;AAAA,IACF;AAEA,QAAI,eAAe;AACjB,YAAM,UAAU,iBAAiB,oBAAoB,aAAa;AAAA,IACpE,OAAO;AACL,YAAM,UAAU,WAAW,oBAAoB,aAAa;AAAA,IAC9D;AAAA,EACF,GAAG,CAAC,oBAAoB,eAAe,eAAe,WAAW,UAAU,OAAO,CAAC;AAEnF,QAAM,0BAAsB,2BAAY,MAAM;AAC5C,qBAAiB,IAAI;AACrB,qBAAiB,EAAE;AACnB,eAAW;AAAA,EACb,GAAG,CAAC,kBAAkB,kBAAkB,UAAU,CAAC;AAEnD,QAAM,oBAAgB,2BAAY,MAAM;AACtC,qBAAiB,KAAK;AACtB,qBAAiB,EAAE;AACnB,eAAW;AAAA,EACb,GAAG,CAAC,kBAAkB,kBAAkB,UAAU,CAAC;AAMnD,cAAY;AAAA,IACV,cAAc,CAAC,QAAQ;AAAA,IACvB,eAAe,wBAAC,gBAAwB;AACtC,UAAI,uBAAuB,WAAW,UAAW;AACjD,6BAAuB,UAAU;AAEjC,iBAAW,KAAK,wCAAwC;AAExD,YAAM,aAAa,cAAc;AACjC,YAAM,iBAAiB,cAAc;AAErC,UAAI,CAAC,gBAAgB;AACnB,mBAAW,KAAK,2CAA2C;AAC3D,+BAAuB,UAAU;AACjC;AAAA,MACF;AAGA,oBAAc,cAAc;AAC5B,aAAO,WAAW;AAClB,cAAQ,KAAK;AAGb,iBAAW,YAAY;AACrB,YAAI;AACF,gBAAM,UAAU,gBAAgB,WAAW;AAAA,QAC7C,UAAE;AACA,iCAAuB,UAAU;AAAA,QACnC;AAAA,MACF,GAAG,GAAG;AAAA,IACR,GA5Be;AAAA,IA6Bf,YAAY;AAAA,EACd,CAAC;AAMD,SAAO;AAAA;AAAA,IAEL,GAAG;AAAA;AAAA,IAGH;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA;AAAA,IAGA;AAAA,IACA;AAAA,IACA;AAAA;AAAA,IAGA,GAAG;AAAA;AAAA,IAGH,yBAAyB;AAAA;AAAA,IAGzB,cAAc,UAAU;AAAA,IACxB,kBAAkB,UAAU;AAAA,IAC5B,4BAA4B,UAAU;AAAA,EACxC;AACF,GAvW2B;;;AsBf3B,IAAAC,gBAAsC;AA6C/B,IAAM,gBAAgB,wBAAC,UAAgC,CAAC,MAA2B;AACxF,QAAM,EAAE,WAAW,WAAW,SAAS,eAAe,aAAa,eAAe,MAAM,IAAI;AAC5F,QAAM,SAAS,aAAa;AAE5B,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,wBAAwB,IAAI;AAKtD,QAAM,sBAAkB,2BAAY,YAAY;AAC9C,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,+BAA+B;AAG/C,gBAAU,iDAAuC;AAAA,QAC/C;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAID,YAAM,SAAS,MAAM,iBAAiB,sCAAsC;AAAA,QAC1E,MAAM;AAAA,UACJ,YAAY,cAAc,OAAO,WAAW,cAAc,OAAO,SAAS,OAAO;AAAA,QACnF;AAAA,QACA,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,UAAI,CAAC,SAAS,mBAAmB;AAC/B,cAAM,IAAI,MAAM,iCAAiC;AAAA,MACnD;AAEA,iBAAW,KAAK,4BAA4B,SAAS,iBAAiB;AAEtE,UAAI,OAAO,WAAW,aAAa;AACjC,uBAAe,QAAQ,eAAe,SAAS,KAAK;AACpD,uBAAe,QAAQ,kBAAkB,QAAQ;AAAA,MACnD;AAEA,aAAO,SAAS,OAAO,SAAS;AAAA,IAElC,SAAS,KAAK;AACZ,YAAM,eAAe,eAAe,QAAQ,IAAI,UAAU;AAC1D,iBAAW,MAAM,6BAA6B,GAAG;AACjD,eAAS,YAAY;AACrB,gBAAU,YAAY;AAGtB,gBAAU,+CAAsC;AAAA,QAC9C;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAAA,IACH,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,WAAW,OAAO,CAAC;AAQvB,QAAM,2BAAuB,2BAAY,OAAO,MAAc,UAAkB;AAC9E,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,qCAAqC;AAGrD,UAAI,OAAO,WAAW,aAAa;AACjC,cAAM,cAAc,eAAe,QAAQ,aAAa;AACxD,YAAI,eAAe,gBAAgB,OAAO;AACxC,gBAAM,IAAI,MAAM,4CAA4C;AAAA,QAC9D;AAEA,uBAAe,WAAW,aAAa;AACvC,uBAAe,WAAW,gBAAgB;AAAA,MAC5C;AAEA,YAAM,SAAS,MAAM,iBAAiB,qCAAqC;AAAA,QACzE,MAAM,EAAE,MAAM,MAAM;AAAA,QACpB,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAGxB,UAAI,SAAS,gBAAgB,SAAS,YAAY;AAChD,mBAAW,KAAK,uCAAuC,SAAS,UAAU;AAG1E,kBAAU,iDAAuC;AAAA,UAC/C;AAAA,UACA,OAAO;AAAA,QACT,CAAC;AAGD,wBAAgB,SAAS,YAAY,SAAS,qBAAqB,KAAK;AACxE;AAAA,MACF;AAEA,UAAI,CAAC,SAAS,UAAU,CAAC,SAAS,SAAS;AACzC,cAAM,IAAI,MAAM,sCAAsC;AAAA,MACxD;AAEA,iBAAW,KAAK,kCAAkC,SAAS,IAAI;AAE/D,qBAAY,SAAS,SAAS,MAAM;AACpC,qBAAY,gBAAgB,SAAS,OAAO;AAG5C,gBAAU,qDAAyC;AAAA,QACjD;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAGD,UAAI,SAAS,MAAM,IAAI;AACrB,kBAAU,QAAQ,OAAO,SAAS,KAAK,EAAE,CAAC;AAAA,MAC5C;AAGA,kBAAY,SAAS,MAAM,SAAS,eAAe,KAAK;AAGxD,UAAI,CAAC,cAAc;AAEjB,cAAM,mBAAmB,eAAe;AACxC,eAAO,SAAS,gBAAgB;AAAA,MAClC;AAAA,IAEF,SAAS,KAAK;AACZ,YAAM,eAAe,eAAe,QAAQ,IAAI,UAAU;AAC1D,iBAAW,MAAM,gCAAgC,GAAG;AACpD,eAAS,YAAY;AACrB,gBAAU,YAAY;AAGtB,gBAAU,+CAAsC;AAAA,QAC9C;AAAA,QACA,OAAO;AAAA,MACT,CAAC;AAAA,IACH,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,WAAW,SAAS,aAAa,MAAM,CAAC;AAE5C,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GA/J6B;;;AC7C7B,IAAAC,gBAAsC;AAmF/B,IAAM,oBAAoB,wBAAC,UAAoC,CAAC,MAA+B;AACpG,QAAM,EAAE,YAAY,QAAQ,IAAI;AAEhC,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,wBAAwB,IAAI;AACtD,QAAM,CAAC,WAAW,YAAY,QAAI,wBAAoC,IAAI;AAC1E,QAAM,CAAC,aAAa,cAAc,QAAI,wBAA0B,IAAI;AACpE,QAAM,CAAC,oBAAoB,qBAAqB,QAAI,wBAAwB,IAAI;AAChF,QAAM,CAAC,WAAW,YAAY,QAAI,wBAA0D,MAAM;AAElG,QAAM,iBAAa,2BAAY,MAAM;AACnC,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAEL,QAAM,iBAAa,2BAAY,MAAM;AACnC,iBAAa,IAAI;AACjB,mBAAe,IAAI;AACnB,0BAAsB,IAAI;AAC1B,iBAAa,MAAM;AACnB,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAKL,QAAM,iBAAa,2BAAY,OAAO,eAA4D;AAChG,iBAAa,IAAI;AACjB,aAAS,IAAI;AACb,iBAAa,UAAU;AAEvB,QAAI;AACF,iBAAW,KAAK,uBAAuB;AAEvC,YAAM,SAAS,MAAM,aAAa,mBAAmB;AAAA,QACnD,MAAM,EAAE,aAAa,WAAW;AAAA,QAChC,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,YAAM,OAA2B;AAAA,QAC/B,UAAU,SAAS;AAAA,QACnB,QAAQ,SAAS;AAAA,QACjB,iBAAiB,SAAS;AAAA,QAC1B,cAAc,SAAS;AAAA,QACvB,WAAW,SAAS;AAAA,MACtB;AAEA,mBAAa,IAAI;AACjB,iBAAW,KAAK,oCAAoC,KAAK,WAAW,SAAS;AAE7E,aAAO;AAAA,IAET,SAAS,KAAK;AACZ,YAAM,eAAe,eAAe,QAAQ,IAAI,UAAU;AAC1D,iBAAW,MAAM,oBAAoB,GAAG;AACxC,eAAS,YAAY;AACrB,mBAAa,MAAM;AACnB,gBAAU,YAAY;AACtB,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,OAAO,CAAC;AAKZ,QAAM,mBAAe,2BAAY,OAAO,SAA2C;AACjF,QAAI,CAAC,WAAW;AACd,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,YAAM,MAAM;AACZ,eAAS,GAAG;AACZ,gBAAU,GAAG;AACb,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,aAAS,IAAI;AACb,iBAAa,YAAY;AAEzB,QAAI;AACF,iBAAW,KAAK,yBAAyB;AAEzC,YAAM,SAAS,MAAM,aAAa,0BAA0B;AAAA,QAC1D,MAAM,EAAE,WAAW,UAAU,UAAU,KAAK;AAAA,QAC5C,cAAc;AAAA,MAChB,CAAC;AACD,YAAM,WAAW,OAAO;AAExB,YAAM,QAAQ,SAAS;AACvB,qBAAe,KAAK;AACpB,4BAAsB,SAAS,oBAAoB;AACnD,mBAAa,UAAU;AAEvB,iBAAW,KAAK,gDAAgD,MAAM,MAAM;AAG5E,mBAAa,KAAK;AAElB,aAAO;AAAA,IAET,SAAS,KAAK;AACZ,YAAM,eAAe,eAAe,QAAQ,IAAI,UAAU;AAC1D,iBAAW,MAAM,iCAAiC,GAAG;AACrD,eAAS,YAAY;AACrB,mBAAa,UAAU;AACvB,gBAAU,YAAY;AACtB,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,WAAW,YAAY,OAAO,CAAC;AAEnC,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAnIiC;;;ACnFjC,IAAAC,iBAAsC;AAmDtC,SAAS,oBAAoB,KAAc,UAA0B;AACnE,MAAI,eAAe,UAAU;AAC3B,UAAM,OAAO,IAAI;AACjB,QAAI,OAAO,MAAM,UAAU,SAAU,QAAO,KAAK;AACjD,QAAI,OAAO,MAAM,WAAW,SAAU,QAAO,KAAK;AAClD,WAAO,IAAI;AAAA,EACb;AACA,MAAI,eAAe,MAAO,QAAO,IAAI;AACrC,SAAO;AACT;AATS;AAWF,IAAM,qBAAqB,6BAAgC;AAChE,QAAM,CAAC,WAAW,YAAY,QAAI,yBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,yBAAwB,IAAI;AACtD,QAAM,CAAC,eAAe,gBAAgB,QAAI,yBAAyB,IAAI;AACvE,QAAM,CAAC,SAAS,UAAU,QAAI,yBAA4B,CAAC,CAAC;AAE5D,QAAM,iBAAa,4BAAY,MAAM;AACnC,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAKL,QAAM,kBAAc,4BAAY,YAA2B;AACzD,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,wBAAwB;AAGxC,YAAM,SAAS,MAAM,QAAQ,uBAAuB,EAAE,cAAc,KAAK,CAAC;AAC1E,YAAM,WAAW,OAAO;AAExB,YAAM,gBAAmC,SAAS,QAAQ,IAAI,CAAC,YAAY;AAAA,QACzE,IAAI,OAAO;AAAA,QACX,MAAM,OAAO;AAAA,QACb,WAAW,OAAO;AAAA,QAClB,YAAY,OAAO,gBAAgB;AAAA,QACnC,WAAW,OAAO;AAAA,MACpB,EAAE;AAEF,iBAAW,aAAa;AACxB,uBAAiB,SAAS,eAAe;AAEzC,iBAAW,KAAK,eAAe,SAAS,kBAAkB,YAAY,UAAU;AAAA,IAElF,SAAS,KAAK;AACZ,YAAM,eAAe,oBAAoB,KAAK,4BAA4B;AAC1E,iBAAW,MAAM,+BAA+B,GAAG;AACnD,eAAS,YAAY;AAAA,IACvB,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,CAAC;AAKL,QAAM,iBAAa,4BAAY,OAAO,SAAmC;AACvE,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,eAAS,6BAA6B;AACtC,aAAO;AAAA,IACT;AAEA,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,kBAAkB;AAElC,YAAM,QAAQ,qBAAqB,EAAE,MAAM,EAAE,KAAK,GAAG,cAAc,KAAK,CAAC;AAEzE,uBAAiB,KAAK;AACtB,iBAAW,CAAC,CAAC;AAEb,iBAAW,KAAK,2BAA2B;AAC3C,aAAO;AAAA,IAET,SAAS,KAAc;AACrB,YAAM,eAAe,oBAAoB,KAAK,2BAA2B;AACzE,iBAAW,MAAM,0BAA0B,GAAG;AAC9C,eAAS,YAAY;AACrB,aAAO;AAAA,IACT,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,CAAC;AAEL,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAxFkC;;;AC9DlC,IAAAC,iBAAyB;AAUlB,SAAS,kBAAqB,KAAa,cAAiB;AAEjE,QAAM,CAAC,aAAa,cAAc,QAAI,yBAAY,MAAM;AACtD,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO;AAAA,IACT;AAEA,QAAI;AACF,YAAM,OAAO,OAAO,eAAe,QAAQ,GAAG;AAC9C,aAAO,OAAO,KAAK,MAAM,IAAI,IAAI;AAAA,IACnC,SAAS,OAAO;AACd,iBAAW,MAAM,qCAAqC,GAAG,MAAM,KAAK;AACpE,aAAO;AAAA,IACT;AAAA,EACF,CAAC;AAGD,QAAM,gBAAgB,wBAAC,SAAuB;AAC5C,QAAI;AACF,YAAM,aAAa,KAAK,UAAU,IAAI;AACtC,YAAM,cAAc,IAAI,KAAK,CAAC,UAAU,CAAC,EAAE;AAC3C,YAAM,WAAW,cAAc;AAG/B,UAAI,WAAW,MAAM;AACnB,mBAAW,KAAK,cAAc,SAAS,QAAQ,CAAC,CAAC,kCAAkC,GAAG,GAAG;AACzF,eAAO;AAAA,MACT;AAEA,aAAO;AAAA,IACT,SAAS,OAAO;AACd,iBAAW,MAAM,qCAAqC,GAAG,MAAM,KAAK;AACpE,aAAO;AAAA,IACT;AAAA,EACF,GAjBsB;AAoBtB,QAAM,eAAe,6BAAM;AACzB,QAAI;AACF,YAAM,OAAO,OAAO,KAAK,cAAc,EAAE,OAAO,CAAAC,SAAOA,QAAO,OAAOA,SAAQ,QAAQ;AAErF,UAAI,KAAK,SAAS,IAAI;AACpB,cAAM,gBAAgB,KAAK,KAAK,KAAK,SAAS,GAAG;AACjD,iBAAS,IAAI,GAAG,IAAI,eAAe,KAAK;AACtC,cAAI;AACF,kBAAMA,OAAM,KAAK,CAAC;AAClB,gBAAIA,MAAK;AACP,6BAAe,WAAWA,IAAG;AAC7B,6BAAe,WAAW,GAAGA,IAAG,YAAY;AAAA,YAC9C;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,2CAA2C,KAAK;AAAA,IACnE;AAAA,EACF,GArBqB;AAwBrB,QAAM,gBAAgB,6BAAM;AAC1B,QAAI;AACF,YAAM,OAAO,OAAO,KAAK,cAAc;AACvC,iBAAWA,QAAO,MAAM;AACtB,YAAI;AACF,yBAAe,WAAWA,IAAG;AAAA,QAC/B,QAAQ;AAAA,QAER;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,wCAAwC,KAAK;AAAA,IAChE;AAAA,EACF,GAbsB;AAgBtB,QAAM,WAAW,wBAAC,UAA+B;AAC/C,QAAI;AACF,YAAM,eAAe,iBAAiB,WAAW,MAAM,WAAW,IAAI;AAGtE,UAAI,CAAC,cAAc,YAAY,GAAG;AAChC,mBAAW,KAAK,gCAAgC,GAAG,iBAAiB;AAEpE,YAAI;AACF,iBAAO,eAAe,WAAW,GAAG;AACpC,iBAAO,eAAe,WAAW,GAAG,GAAG,YAAY;AAAA,QACrD,QAAQ;AAAA,QAER;AAEA,uBAAe,YAAY;AAC3B;AAAA,MACF;AAEA,qBAAe,YAAY;AAE3B,UAAI,OAAO,WAAW,aAAa;AAEjC,YAAI;AACF,iBAAO,eAAe,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAE/D,iBAAO,eAAe,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,QACzE,SAAS,cAAmB;AAE1B,cAAI,aAAa,SAAS,wBACtB,aAAa,SAAS,MACtB,aAAa,SAAS,SAAS,OAAO,GAAG;AAC3C,uBAAW,KAAK,qDAAqD;AACrE,yBAAa;AAGb,gBAAI;AACF,qBAAO,eAAe,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAC/D,qBAAO,eAAe,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,YACzE,SAAS,YAAY;AACnB,yBAAW,MAAM,qCAAqC,GAAG,8BAA8B,UAAU;AAEjG,kBAAI;AACF,8BAAc;AACd,uBAAO,eAAe,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAC/D,uBAAO,eAAe,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,cACzE,SAAS,YAAY;AACnB,2BAAW,MAAM,qCAAqC,GAAG,2BAA2B,UAAU;AAE9F,+BAAe,YAAY;AAAA,cAC7B;AAAA,YACF;AAAA,UACF,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,qCAAqC,GAAG,MAAM,KAAK;AAEpE,YAAM,eAAe,iBAAiB,WAAW,MAAM,WAAW,IAAI;AACtE,qBAAe,YAAY;AAAA,IAC7B;AAAA,EACF,GA/DiB;AAkEjB,QAAM,cAAc,6BAAM;AACxB,QAAI;AACF,qBAAe,YAAY;AAC3B,UAAI,OAAO,WAAW,aAAa;AACjC,YAAI;AACF,iBAAO,eAAe,WAAW,GAAG;AACpC,iBAAO,eAAe,WAAW,GAAG,GAAG,YAAY;AAAA,QACrD,SAAS,aAAkB;AAEzB,cAAI,YAAY,SAAS,wBACrB,YAAY,SAAS,MACrB,YAAY,SAAS,SAAS,OAAO,GAAG;AAC1C,uBAAW,KAAK,oEAAoE;AACpF,yBAAa;AAEb,gBAAI;AACF,qBAAO,eAAe,WAAW,GAAG;AACpC,qBAAO,eAAe,WAAW,GAAG,GAAG,YAAY;AAAA,YACrD,SAAS,YAAY;AACnB,yBAAW,MAAM,wCAAwC,GAAG,qBAAqB,UAAU;AAE3F,4BAAc;AAAA,YAChB;AAAA,UACF,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,sCAAsC,GAAG,MAAM,KAAK;AAAA,IACvE;AAAA,EACF,GA/BoB;AAiCpB,SAAO,CAAC,aAAa,UAAU,WAAW;AAC5C;AAjLgB;;;ACVhB,IAAM,oBAAoB;AAW1B,IAAM,yBAAyB,6BAAc;AAC3C,MAAI,OAAO,WAAW,YAAa,QAAO;AAC1C,MAAI;AACF,UAAM,OAAO,OAAO,eAAe,QAAQ,iBAAiB;AAC5D,WAAO,OAAO,KAAK,MAAM,IAAI,IAAI;AAAA,EACnC,QAAQ;AACN,WAAO;AAAA,EACT;AACF,GAR+B;AAa/B,IAAM,2BAA2B,6BAAY;AAC3C,MAAI,OAAO,WAAW,YAAa;AACnC,MAAI;AACF,WAAO,eAAe,WAAW,iBAAiB;AAClD,WAAO,eAAe,WAAW,GAAG,iBAAiB,YAAY;AAAA,EACnE,QAAQ;AAAA,EAER;AACF,GARiC;AAU1B,IAAM,yBAAyB,wBAAC,UAA+B,CAAC,MAAM;AAC3E,QAAM,EAAE,cAAc,cAAc,aAAa,KAAK,IAAI;AAC1D,QAAM,CAAC,aAAa,gBAAgB,iBAAiB,IAAI,kBAA0B,mBAAmB,EAAE;AAExG,QAAM,cAAc,wBAAC,QAAgB;AACnC,mBAAe,GAAG;AAAA,EACpB,GAFoB;AAIpB,QAAM,cAAc,6BAAM;AAExB,WAAO,uBAAuB,KAAK;AAAA,EACrC,GAHoB;AAKpB,QAAM,gBAAgB,6BAAM;AAC1B,sBAAkB;AAClB,6BAAyB;AAAA,EAC3B,GAHsB;AAKtB,QAAM,cAAc,6BAAM;AACxB,UAAM,SAAS,uBAAuB;AACtC,WAAO,OAAO,SAAS,KAAK,YAAY,SAAS;AAAA,EACnD,GAHoB;AAKpB,QAAM,sBAAsB,6BAAM;AAEhC,UAAM,SAAS,uBAAuB;AACtC,WAAO,UAAU,eAAe;AAAA,EAClC,GAJ4B;AAM5B,QAAM,sBAAsB,6BAAM;AAGhC,UAAM,SAAS,uBAAuB;AACtC,UAAM,WAAW,UAAU,eAAe;AAE1C,QAAI,YAAY;AACd,oBAAc;AAAA,IAChB;AACA,WAAO;AAAA,EACT,GAV4B;AAY5B,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GAlDsC;;;AClCtC,IAAAC,iBAAoC;AAY7B,IAAM,eAAe,wBAAC,UAA+B,CAAC,MAAM;AACjE,QAAM,EAAE,aAAa,SAAS,cAAc,MAAM,iBAAiB,gBAAgB,KAAK,IAAI;AAC5F,QAAM,EAAE,iBAAiB,WAAW,gBAAgB,IAAI,QAAQ;AAChE,QAAM,SAAS,aAAa;AAC5B,QAAM,CAAC,eAAe,gBAAgB,QAAI,yBAAS,KAAK;AAExD,gCAAU,MAAM;AACd,QAAI,CAAC,aAAa,eAAe,CAAC,mBAAmB,CAAC,eAAe;AAEnE,UAAI,iBAAiB,OAAO,WAAW,aAAa;AAClD,cAAM,aAAa,OAAO,SAAS,WAAW,OAAO,SAAS;AAC9D,wBAAgB,UAAU;AAAA,MAC5B;AAEA,uBAAiB,IAAI;AACrB,aAAO,KAAK,UAAU;AAAA,IACxB;AAAA,EACF,GAAG,CAAC,iBAAiB,WAAW,QAAQ,YAAY,aAAa,eAAe,eAAe,eAAe,CAAC;AAE/G,SAAO,EAAE,iBAAiB,WAAW,cAAc;AACrD,GApB4B;;;ACZ5B,IAAAC,iBAAoC;AAU7B,SAAS,gBAAmB,KAAa,cAAiB;AAE/D,QAAM,CAAC,aAAa,cAAc,QAAI,yBAAY,MAAM;AACtD,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO;AAAA,IACT;AAEA,QAAI;AACF,YAAM,OAAO,OAAO,aAAa,QAAQ,GAAG;AAC5C,UAAI,SAAS,MAAM;AACjB,eAAO;AAAA,MACT;AAGA,UAAI;AACF,eAAO,KAAK,MAAM,IAAI;AAAA,MACxB,QAAQ;AAEN,eAAO;AAAA,MACT;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,mCAAmC,GAAG,MAAM,KAAK;AAClE,aAAO;AAAA,IACT;AAAA,EACF,CAAC;AAGD,QAAM,gBAAgB,wBAAC,SAAuB;AAC5C,QAAI;AACF,YAAM,aAAa,KAAK,UAAU,IAAI;AACtC,YAAM,cAAc,IAAI,KAAK,CAAC,UAAU,CAAC,EAAE;AAC3C,YAAM,WAAW,cAAc;AAG/B,UAAI,WAAW,MAAM;AACnB,mBAAW,KAAK,cAAc,SAAS,QAAQ,CAAC,CAAC,kCAAkC,GAAG,GAAG;AACzF,eAAO;AAAA,MACT;AAEA,aAAO;AAAA,IACT,SAAS,OAAO;AACd,iBAAW,MAAM,qCAAqC,GAAG,MAAM,KAAK;AACpE,aAAO;AAAA,IACT;AAAA,EACF,GAjBsB;AAoBtB,QAAM,eAAe,6BAAM;AACzB,QAAI;AACF,YAAM,OAAO,OAAO,KAAK,YAAY,EAAE,OAAO,CAAAC,SAAOA,QAAO,OAAOA,SAAQ,QAAQ;AAEnF,UAAI,KAAK,SAAS,IAAI;AACpB,cAAM,gBAAgB,KAAK,KAAK,KAAK,SAAS,GAAG;AACjD,iBAAS,IAAI,GAAG,IAAI,eAAe,KAAK;AACtC,cAAI;AACF,kBAAMA,OAAM,KAAK,CAAC;AAClB,gBAAIA,MAAK;AACP,2BAAa,WAAWA,IAAG;AAC3B,2BAAa,WAAW,GAAGA,IAAG,YAAY;AAAA,YAC5C;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,yCAAyC,KAAK;AAAA,IACjE;AAAA,EACF,GArBqB;AAwBrB,QAAM,gBAAgB,6BAAM;AAC1B,QAAI;AACF,YAAM,OAAO,OAAO,KAAK,YAAY;AACrC,iBAAWA,QAAO,MAAM;AACtB,YAAI;AACF,uBAAa,WAAWA,IAAG;AAAA,QAC7B,QAAQ;AAAA,QAER;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,sCAAsC,KAAK;AAAA,IAC9D;AAAA,EACF,GAbsB;AAgBtB,QAAM,WAAW,wBAAC,UAA+B;AAC/C,QAAI;AACF,YAAM,eAAe,iBAAiB,WAAW,MAAM,WAAW,IAAI;AAGtE,UAAI,CAAC,cAAc,YAAY,GAAG;AAChC,mBAAW,KAAK,gCAAgC,GAAG,iBAAiB;AAEpE,YAAI;AACF,iBAAO,aAAa,WAAW,GAAG;AAClC,iBAAO,aAAa,WAAW,GAAG,GAAG,YAAY;AAAA,QACnD,QAAQ;AAAA,QAER;AAEA,uBAAe,YAAY;AAC3B;AAAA,MACF;AAEA,qBAAe,YAAY;AAE3B,UAAI,OAAO,WAAW,aAAa;AAEjC,YAAI;AAEF,cAAI,OAAO,iBAAiB,UAAU;AACpC,mBAAO,aAAa,QAAQ,KAAK,YAAY;AAAA,UAC/C,OAAO;AACL,mBAAO,aAAa,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAAA,UAC/D;AAEA,iBAAO,aAAa,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,QACvE,SAAS,cAAmB;AAE1B,cAAI,aAAa,SAAS,wBACtB,aAAa,SAAS,MACtB,aAAa,SAAS,SAAS,OAAO,GAAG;AAC3C,uBAAW,KAAK,mDAAmD;AACnE,yBAAa;AAGb,gBAAI;AAEF,kBAAI,OAAO,iBAAiB,UAAU;AACpC,uBAAO,aAAa,QAAQ,KAAK,YAAY;AAAA,cAC/C,OAAO;AACL,uBAAO,aAAa,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAAA,cAC/D;AACA,qBAAO,aAAa,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,YACvE,SAAS,YAAY;AACnB,yBAAW,MAAM,mCAAmC,GAAG,8BAA8B,UAAU;AAE/F,kBAAI;AACF,8BAAc;AAEd,oBAAI,OAAO,iBAAiB,UAAU;AACpC,yBAAO,aAAa,QAAQ,KAAK,YAAY;AAAA,gBAC/C,OAAO;AACL,yBAAO,aAAa,QAAQ,KAAK,KAAK,UAAU,YAAY,CAAC;AAAA,gBAC/D;AACA,uBAAO,aAAa,QAAQ,GAAG,GAAG,cAAc,KAAK,IAAI,EAAE,SAAS,CAAC;AAAA,cACvE,SAAS,YAAY;AACnB,2BAAW,MAAM,mCAAmC,GAAG,2BAA2B,UAAU;AAE5F,+BAAe,YAAY;AAAA,cAC7B;AAAA,YACF;AAAA,UACF,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,mCAAmC,GAAG,MAAM,KAAK;AAElE,YAAM,eAAe,iBAAiB,WAAW,MAAM,WAAW,IAAI;AACtE,qBAAe,YAAY;AAAA,IAC7B;AAAA,EACF,GA9EiB;AAiFjB,QAAM,cAAc,6BAAM;AACxB,QAAI;AACF,qBAAe,YAAY;AAC3B,UAAI,OAAO,WAAW,aAAa;AACjC,YAAI;AACF,iBAAO,aAAa,WAAW,GAAG;AAClC,iBAAO,aAAa,WAAW,GAAG,GAAG,YAAY;AAAA,QACnD,SAAS,aAAkB;AAEzB,cAAI,YAAY,SAAS,wBACrB,YAAY,SAAS,MACrB,YAAY,SAAS,SAAS,OAAO,GAAG;AAC1C,uBAAW,KAAK,kEAAkE;AAClF,yBAAa;AAEb,gBAAI;AACF,qBAAO,aAAa,WAAW,GAAG;AAClC,qBAAO,aAAa,WAAW,GAAG,GAAG,YAAY;AAAA,YACnD,SAAS,YAAY;AACnB,yBAAW,MAAM,sCAAsC,GAAG,qBAAqB,UAAU;AAEzF,4BAAc;AAAA,YAChB;AAAA,UACF,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,oCAAoC,GAAG,MAAM,KAAK;AAAA,IACrE;AAAA,EACF,GA/BoB;AAiCpB,SAAO,CAAC,aAAa,UAAU,WAAW;AAC5C;AA1MgB;;;ACKT,SAAS,aAAa,MAAsB;AACjD,MAAI,OAAO;AACT,WAAO;AAAA,EACT;AAEA,MAAI;AAEF,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO,KAAK,mBAAmB,IAAI,EAAE,QAAQ,mBAAmB,CAAC,GAAG,OAAO;AACzE,eAAO,OAAO,aAAa,SAAS,IAAI,EAAE,CAAC;AAAA,MAC7C,CAAC,CAAC;AAAA,IACJ;AAEA,WAAO,OAAO,KAAK,MAAM,OAAO,EAAE,SAAS,QAAQ;AAAA,EACrD,SAAS,OAAO;AACd,YAAQ,MAAM,0BAA0B,KAAK;AAC7C,WAAO;AAAA,EACT;AACF;AAlBgB;AAyBT,SAAS,aAAa,SAAyB;AACpD,MAAI,OAAO;AACT,WAAO;AAAA,EACT;AAEA,MAAI;AAEF,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,SAAS,KAAK,OAAO;AAC3B,YAAM,QAAQ,IAAI,WAAW,OAAO,MAAM;AAC1C,eAAS,IAAI,GAAG,IAAI,OAAO,QAAQ,KAAK;AACtC,cAAM,CAAC,IAAI,OAAO,WAAW,CAAC;AAAA,MAChC;AACA,aAAO;AAAA,QACL,MAAM,KAAK,KAAK,EACb,IAAI,UAAQ,OAAO,OAAO,KAAK,SAAS,EAAE,GAAG,MAAM,EAAE,CAAC,EACtD,KAAK,EAAE;AAAA,MACZ;AAAA,IACF;AAEA,WAAO,OAAO,KAAK,SAAS,QAAQ,EAAE,SAAS,OAAO;AAAA,EACxD,SAAS,OAAO;AACd,YAAQ,MAAM,0BAA0B,KAAK;AAC7C,WAAO;AAAA,EACT;AACF;AAzBgB;AA+BT,SAAS,YAAY;AAC1B,SAAO;AAAA,IACL,QAAQ;AAAA,IACR,QAAQ;AAAA,IACR;AAAA,EACF;AACF;AANgB;;;ACzDhB,IAAM,YAAY;AAClB,IAAM,gBAAgB;AACtB,IAAM,cAAc;AAkBb,SAAS,mBAAgC;AAC9C,MAAI;AACF,QAAI,OAAO,WAAW,YAAa,QAAO;AAE1C,UAAM,SAAS,aAAa,QAAQ,SAAS;AAC7C,QAAI,CAAC,QAAQ;AACX,iBAAc,MAAM,yBAAyB;AAC7C,aAAO;AAAA,IACT;AAGA,UAAM,UAAU,aAAa,MAAM;AACnC,UAAM,aAA4B,KAAK,MAAM,OAAO;AAGpD,QAAI,WAAW,YAAY,eAAe;AACxC,iBAAc,KAAK,wCAAwC;AAC3D,wBAAkB;AAClB,aAAO;AAAA,IACT;AAGA,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,MAAM,MAAM,WAAW;AAC7B,QAAI,MAAM,WAAW,KAAK;AACxB,iBAAc,KAAK,yBAAyB;AAC5C,wBAAkB;AAClB,aAAO;AAAA,IACT;AAEA,eAAc,MAAM,mBAAmB,KAAK,MAAM,MAAM,GAAI,GAAG,SAAS;AACxE,WAAO,WAAW;AAAA,EACpB,SAAS,OAAO;AACd,eAAc,MAAM,wBAAwB,KAAK;AACjD,sBAAkB;AAClB,WAAO;AAAA,EACT;AACF;AArCgB;AA4CT,SAAS,iBAAiB,SAAe,SAAqC;AACnF,MAAI;AACF,QAAI,OAAO,WAAW,YAAa;AAEnC,UAAM,aAA4B;AAAA,MAChC,SAAS;AAAA,MACT,MAAM;AAAA,MACN,WAAW,KAAK,IAAI;AAAA,MACpB,KAAK,SAAS,OAAO;AAAA,IACvB;AAGA,UAAM,UAAU,aAAa,KAAK,UAAU,UAAU,CAAC;AACvD,iBAAa,QAAQ,WAAW,OAAO;AACvC,eAAc,MAAM,wBAAwB,WAAW,MAAM,KAAM,SAAS;AAAA,EAC9E,SAAS,OAAO;AACd,eAAc,MAAM,wBAAwB,KAAK;AAAA,EACnD;AACF;AAlBgB;AAuBT,SAAS,oBAA0B;AACxC,MAAI;AACF,QAAI,OAAO,WAAW,YAAa;AACnC,iBAAa,WAAW,SAAS;AACjC,eAAc,MAAM,eAAe;AAAA,EACrC,SAAS,OAAO;AACd,eAAc,MAAM,yBAAyB,KAAK;AAAA,EACpD;AACF;AARgB;AAaT,SAAS,gBAAyB;AACvC,SAAO,iBAAiB,MAAM;AAChC;AAFgB;AAOT,SAAS,mBAKP;AACP,MAAI;AACF,QAAI,OAAO,WAAW,YAAa,QAAO;AAE1C,UAAM,SAAS,aAAa,QAAQ,SAAS;AAC7C,QAAI,CAAC,OAAQ,QAAO,EAAE,QAAQ,MAAM;AAGpC,UAAM,UAAU,aAAa,MAAM;AACnC,UAAM,aAA4B,KAAK,MAAM,OAAO;AACpD,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,MAAM,MAAM,WAAW;AAC7B,UAAM,YAAY,WAAW,MAAM;AAEnC,WAAO;AAAA,MACL,QAAQ;AAAA,MACR;AAAA,MACA,KAAK,WAAW;AAAA,MAChB,WAAW,KAAK,IAAI,GAAG,SAAS;AAAA,IAClC;AAAA,EACF,SAAS,OAAO;AACd,eAAc,MAAM,2BAA2B,KAAK;AACpD,WAAO;AAAA,EACT;AACF;AA7BgB;;;AChHhB,IAAAC,iBAA+C;AAO/C,IAAM,6BAA6B,KAAK,KAAK;AAC7C,IAAM,oBAAoB,IAAI,KAAK;AAcnC,SAAS,eAAe,OAA8B;AACpD,MAAI;AACF,UAAM,UAAU,KAAK,MAAM,KAAK,MAAM,MAAM,GAAG,EAAE,CAAC,CAAC,CAAC;AACpD,WAAO,QAAQ,MAAM;AAAA,EACvB,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAPS;AAYT,SAAS,oBAAoB,OAAe,aAA8B;AACxE,QAAM,SAAS,eAAe,KAAK;AACnC,MAAI,CAAC,OAAQ,QAAO;AAEpB,QAAM,kBAAkB,SAAS,KAAK,IAAI;AAC1C,SAAO,kBAAkB;AAC3B;AANS;AAWF,SAAS,gBAAgB,UAAkC,CAAC,GAAG;AACpE,QAAM,EAAE,UAAU,MAAM,WAAW,eAAe,IAAI;AACtD,QAAM,sBAAkB,uBAAO,KAAK;AAKpC,QAAM,mBAAe,4BAAY,YAA8B;AAC7D,QAAI,gBAAgB,SAAS;AAC3B,iBAAW,MAAM,mCAAmC;AACpD,aAAO;AAAA,IACT;AAEA,UAAM,oBAAoB,eAAY,gBAAgB;AACtD,QAAI,CAAC,mBAAmB;AACtB,iBAAW,KAAK,4BAA4B;AAC5C,aAAO;AAAA,IACT;AAEA,oBAAgB,UAAU;AAC1B,eAAW,KAAK,qBAAqB;AAErC,QAAI;AAEF,YAAM,SAAS,MAAM,gBAAgB,8BAA8B;AAAA,QACjE,MAAM,EAAE,SAAS,kBAAkB;AAAA,QACnC,cAAc;AAAA,MAChB,CAAC;AAED,YAAM,iBAAiB,OAAO,KAAK;AAEnC,UAAI,CAAC,gBAAgB;AACnB,cAAM,IAAI,MAAM,qCAAqC;AAAA,MACvD;AAEA,qBAAY,SAAS,cAAc;AACnC,qBAAY,gBAAgB,iBAAiB;AAC7C,iBAAW,KAAK,8BAA8B;AAE9C,kBAAY,cAAc;AAC1B,aAAO;AAAA,IACT,SAAS,OAAO;AACd,iBAAW,MAAM,wBAAwB,KAAK;AAC9C,uBAAiB,iBAAiB,QAAQ,QAAQ,IAAI,MAAM,OAAO,KAAK,CAAC,CAAC;AAC1E,aAAO;AAAA,IACT,UAAE;AACA,sBAAgB,UAAU;AAAA,IAC5B;AAAA,EACF,GAAG,CAAC,WAAW,cAAc,CAAC;AAK9B,QAAM,sBAAkB,4BAAY,YAAY;AAC9C,UAAM,QAAQ,eAAY,SAAS;AACnC,QAAI,CAAC,MAAO;AAEZ,QAAI,oBAAoB,OAAO,0BAA0B,GAAG;AAC1D,iBAAW,KAAK,6CAA6C;AAC7D,YAAM,aAAa;AAAA,IACrB;AAAA,EACF,GAAG,CAAC,YAAY,CAAC;AAGjB,gCAAU,MAAM;AACd,QAAI,CAAC,QAAS;AAGd,oBAAgB;AAGhB,UAAM,aAAa,YAAY,iBAAiB,iBAAiB;AAEjE,WAAO,MAAM,cAAc,UAAU;AAAA,EACvC,GAAG,CAAC,SAAS,eAAe,CAAC;AAG7B,gCAAU,MAAM;AACd,QAAI,CAAC,QAAS;AAEd,UAAM,cAAc,6BAAM;AACxB,iBAAW,MAAM,mCAAmC;AACpD,sBAAgB;AAAA,IAClB,GAHoB;AAKpB,WAAO,iBAAiB,SAAS,WAAW;AAC5C,WAAO,MAAM,OAAO,oBAAoB,SAAS,WAAW;AAAA,EAC9D,GAAG,CAAC,SAAS,eAAe,CAAC;AAG7B,gCAAU,MAAM;AACd,QAAI,CAAC,QAAS;AAEd,UAAM,eAAe,6BAAM;AACzB,iBAAW,KAAK,wCAAwC;AACxD,sBAAgB;AAAA,IAClB,GAHqB;AAKrB,WAAO,iBAAiB,UAAU,YAAY;AAC9C,WAAO,MAAM,OAAO,oBAAoB,UAAU,YAAY;AAAA,EAChE,GAAG,CAAC,SAAS,eAAe,CAAC;AAE7B,SAAO;AAAA,IACL;AAAA,IACA;AAAA,EACF;AACF;AA1GgB;;;ACtDhB,IAAAC,iBAAsC;AA0C/B,IAAM,mBAAmB,6BAA8B;AAC5D,QAAM,CAAC,WAAW,YAAY,QAAI,yBAAS,KAAK;AAChD,QAAM,CAAC,OAAO,QAAQ,QAAI,yBAAwB,IAAI;AACtD,QAAM,EAAE,OAAO,IAAI,QAAQ;AAE3B,QAAM,iBAAa,4BAAY,MAAM;AACnC,aAAS,IAAI;AAAA,EACf,GAAG,CAAC,CAAC;AAKL,QAAM,oBAAgB,4BAAY,YAA0C;AAC1E,iBAAa,IAAI;AACjB,aAAS,IAAI;AAEb,QAAI;AACF,iBAAW,KAAK,qBAAqB;AAErC,YAAM,SAAS,MAAM,mBAAmB,+BAA+B,EAAE,cAAc,KAAK,CAAC;AAC7F,YAAM,WAAW,OAAO;AAExB,UAAI,CAAC,SAAS,SAAS;AACrB,mBAAW,MAAM,6BAA6B,SAAS,OAAO;AAC9D,iBAAS,SAAS,OAAO;AACzB,cAAM,IAAI,MAAM,SAAS,OAAO;AAAA,MAClC;AAAA,IAEF,SAASC,QAAO;AACd,iBAAW,MAAM,6BAA6BA,MAAK;AACnD,YAAMA;AAAA,IACR,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAIA,UAAM,OAAO;AACb,WAAO,EAAE,SAAS,MAAM,SAAS,+BAA+B;AAAA,EAClE,GAAG,CAAC,CAAC;AAEL,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF,GA/CgC;;;AC7BhC,IAAAC,iBAEO;;;ACXP,sBAA2B;;;ACF3B,iBAAkB;AAEX,IAAM,yBAAyB,aAAE,OAAO;AAAA,EAC7C,KAAK,aAAE,OAAO;AAAA,EACd,aAAa,aAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AACnD,CAAC;;;ACHD,iBAAmB;;;ACFnB,IAAAC,cAAkB;AAEX,IAAM,eAAe,cAAE,OAAO;AAAA,EACnC,KAAK,cAAE,OAAO;AAAA,EACd,aAAa,cAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC,EAAE,SAAS;AAAA,EAC5D,YAAY,cAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAClD,CAAC;;;ACJD,IAAAC,mBAA2B;;;ACF3B,IAAAC,cAAkB;AAEX,IAAM,yBAAyB,cAAE,OAAO;AAAA,EAC7C,OAAO,cAAE,QAAQ;AAAA,EACjB,SAAS,cAAE,OAAO,EAAE,SAAS;AAC/B,CAAC;;;ACHD,IAAAC,cAAmB;;;ACFnB,IAAAC,cAAkB;;;ACAlB,IAAAC,cAAkB;;;ACAlB,IAAAC,cAAkB;AAEX,IAAM,0BAA0B,cAAE,KAAK,CAAC,QAAQ,CAAC;;;ADCjD,IAAM,wBAAwB,cAAE,OAAO;AAAA,EAC5C,IAAI,cAAE,OAAO,EAAE,IAAI;AAAA,EACnB,UAAU;AAAA,EACV,kBAAkB,cAAE,OAAO;AAAA,EAC3B,mBAAmB,cAAE,OAAO;AAAA,EAC5B,gBAAgB,cAAE,MAAM;AAAA,EACxB,qBAAqB,cAAE,OAAO;AAAA,EAC9B,cAAc,cAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAAA,EAClD,eAAe,cAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AACrD,CAAC;;;ADTM,IAAM,4DAA4D,cAAE,MAAM,qBAAqB;;;AGDtG,IAAAC,mBAA2B;;;ACF3B,IAAAC,cAAkB;AAEX,IAAM,2DAA2D,cAAE,OAAO;AAAA,EAC/E,SAAS,cAAE,OAAO,EAAE,SAAS;AAC/B,CAAC;;;ACFD,IAAAC,mBAA2B;;;ACF3B,IAAAC,cAAkB;AAEX,IAAM,+BAA+B,cAAE,OAAO;AAAA,EACnD,mBAAmB,cAAE,OAAO;AAAA,EAC5B,OAAO,cAAE,OAAO;AAClB,CAAC;;;ACHD,IAAAC,mBAA2B;;;ACF3B,IAAAC,cAAkB;AAEX,IAAM,2BAA2B,cAAE,OAAO;AAAA,EAC/C,cAAc,cAAE,QAAQ,EAAE,QAAQ,KAAK,EAAE,SAAS;AAAA,EAClD,YAAY,cAAE,OAAO,EAAE,MAAM,iEAAiE,EAAE,SAAS,EAAE,SAAS;AAAA,EACpH,QAAQ,cAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EACvC,SAAS,cAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EACxC,MAAM,cAAE,OAAO,CAAC,CAAC,EAAE,YAAY,EAAE,SAAS,EAAE,SAAS;AAAA,EACrD,aAAa,cAAE,QAAQ;AAAA,EACvB,mBAAmB,cAAE,QAAQ;AAAA,EAC7B,mBAAmB,cAAE,QAAQ,EAAE,SAAS;AAC1C,CAAC;;;ACTD,IAAAC,cAAmB;;;ACFnB,IAAAC,eAAkB;AAEX,IAAM,+BAA+B,eAAE,OAAO;AAAA,EACnD,WAAW,eAAE,MAAM,eAAE,OAAO,CAAC,CAAC,EAAE,YAAY,CAAC;AAC/C,CAAC;;;ACFD,IAAAC,mBAA2B;;;ACF3B,IAAAC,eAAkB;AAEX,IAAM,2BAA2B,eAAE,OAAO;AAAA,EAC/C,SAAS,eAAE,OAAO;AACpB,CAAC;;;ADOM,SAAS,+BACd,QACA;AACA,aAAO,iBAAAC;AAAA,IACL,CAAC,iCAAiC;AAAA,IAClC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,YAAY,4BAA4B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AACjG,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,yBAAyB,UAAU,IAAI;AACtD,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;AEThB,IAAAC,mBAA2B;;;ACF3B,IAAAC,eAAkB;;;ACAlB,IAAAC,eAAkB;;;ACAlB,IAAAC,eAAkB;AAEX,IAAM,wBAAwB,eAAE,OAAO;AAAA,EAC5C,OAAO,eAAE,OAAO;AAAA,EAChB,gBAAgB,eAAE,OAAO;AAAA,EACzB,YAAY,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAAA,EAChD,UAAU,eAAE,MAAM,eAAE,OAAO,CAAC;AAC9B,CAAC;;;ADJM,IAAM,aAAa,eAAE,OAAO;AAAA,EACjC,IAAI,eAAE,OAAO,EAAE,IAAI;AAAA,EACnB,OAAO,eAAE,MAAM;AAAA,EACf,YAAY,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EACnD,WAAW,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EAClD,WAAW,eAAE,OAAO;AAAA,EACpB,UAAU,eAAE,OAAO;AAAA,EACnB,kBAAkB,eAAE,OAAO;AAAA,EAC3B,SAAS,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS,EAAE,SAAS;AAAA,EACjD,OAAO,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EAC9C,UAAU,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS,EAAE,SAAS;AAAA,EAClD,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EACjD,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS,EAAE,SAAS;AAAA,EACjD,QAAQ,eAAE,OAAO,EAAE,SAAS;AAAA,EAC5B,UAAU,eAAE,QAAQ;AAAA,EACpB,cAAc,eAAE,QAAQ;AAAA,EACxB,aAAa,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAAA,EACjD,YAAY,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC,EAAE,SAAS;AAAA,EAC3D,2BAA2B,eAAE,OAAO,EAAE,IAAI,EAAE,QAAQ,CAAC;AAAA,EACrD,YAAY,sBAAsB,SAAS;AAAA,EAC3C,SAAS,eAAE,OAAO,EAAE,SAAS;AAC/B,CAAC;;;ADrBM,IAAM,0BAA0B,eAAE,OAAO;AAAA,EAC9C,cAAc,eAAE,QAAQ,EAAE,QAAQ,KAAK,EAAE,SAAS;AAAA,EAClD,YAAY,eAAE,OAAO,EAAE,MAAM,iEAAiE,EAAE,SAAS,EAAE,SAAS;AAAA,EACpH,SAAS,eAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EACxC,QAAQ,eAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EACvC,MAAM,WAAW,SAAS,EAAE,SAAS;AAAA,EACrC,mBAAmB,eAAE,QAAQ,EAAE,SAAS;AAC1C,CAAC;;;ADCM,SAAS,8BACd,QACA;AACA,aAAO,iBAAAC;AAAA,IACL,CAAC,gCAAgC;AAAA,IACjC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,YAAY,2BAA2B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AAChG,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,wBAAwB,UAAU,IAAI;AACrD,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;AIThB,IAAAC,mBAA2B;AASpB,SAAS,kCACd,QACA;AACA,aAAO,iBAAAC;AAAA,IACL,CAAC,oCAAoC;AAAA,IACrC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,mBAAmB,+BAA+B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AAC3G,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,WAAW,UAAU,IAAI;AACxC,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;ACThB,IAAAC,mBAA2B;;;ACF3B,IAAAC,eAAkB;AAEX,IAAM,8BAA8B,eAAE,OAAO;AAAA,EAClD,SAAS,eAAE,QAAQ;AAAA,EACnB,SAAS,eAAE,OAAO;AACpB,CAAC;;;ACHD,IAAAC,oBAA2B;;;ACA3B,IAAAC,oBAA2B;AASpB,SAAS,mCACd,QACA;AACA,aAAO,kBAAAC;AAAA,IACL,CAAC,qCAAqC;AAAA,IACtC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,mBAAmB,gCAAgC,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AAC5G,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,WAAW,UAAU,IAAI;AACxC,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;ACThB,IAAAC,cAAmB;;;ACAnB,IAAAC,oBAA2B;;;ACA3B,IAAAC,oBAA2B;AASpB,SAAS,kCACd,QACA;AACA,aAAO,kBAAAC;AAAA,IACL,CAAC,oCAAoC;AAAA,IACrC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,mBAAmB,+BAA+B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AAC3G,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,WAAW,UAAU,IAAI;AACxC,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;ACThB,IAAAC,oBAA2B;;;ACF3B,IAAAC,eAAkB;AAEX,IAAM,qBAAqB,eAAE,OAAO;AAAA,EACzC,QAAQ,eAAE,OAAO;AAAA,EACjB,SAAS,eAAE,OAAO;AACpB,CAAC;;;ADMM,SAAS,iCACd,QACA;AACA,aAAO,kBAAAC;AAAA,IACL,CAAC,mCAAmC;AAAA,IACpC,OAAO,MAAM,EAAE,IAAI,MAAqB;AACtC,YAAM,MAAM,MAAM,gBAAgB,8BAA8B,EAAE,GAAG,KAAK,cAAc,KAAK,CAAU;AACvG,YAAM,OAAO,IAAI;AACjB,YAAM,SAAS,mBAAmB,UAAU,IAAI;AAChD,UAAI,CAAC,OAAO,SAAS;AAGnB,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,WAAW;AAAA,YACX,QAAQ;AAAA,YACR,MAAM;AAAA,YACN,QAAQ,OAAO,MAAM;AAAA,YACrB;AAAA,UACF;AAAA,QACF;AACA,YAAI,OAAO,WAAW,aAAa;AACjC,cAAI;AACF,mBAAO;AAAA,cACL,IAAI,YAAY,wBAAwB;AAAA,gBACtC,QAAQ;AAAA,kBACN,WAAW;AAAA,kBACX,QAAQ;AAAA,kBACR,MAAM;AAAA,kBACN,QAAQ,OAAO,MAAM;AAAA,kBACrB;AAAA,kBACA,WAAW,oBAAI,KAAK;AAAA,gBACtB;AAAA,gBACA,SAAS;AAAA,gBACT,YAAY;AAAA,cACd,CAAC;AAAA,YACH;AAAA,UACF,QAAQ;AAAA,UAER;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO,OAAO;AAAA,IAChB;AAAA,IACA;AAAA,EACF;AACF;AAhDgB;;;AEXhB,IAAAC,eAAkB;AAEX,IAAM,sBAAsB,eAAE,OAAO;AAAA,EAC1C,KAAK,eAAE,OAAO,EAAE,IAAI,CAAC;AAAA,EACrB,aAAa,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC,EAAE,SAAS;AAAA,EAC5D,YAAY,eAAE,OAAO,EAAE,SAAS,EAAE,QAAQ,KAAK,CAAC;AAClD,CAAC;;;ACND,IAAAC,eAAkB;AAEX,IAAM,0BAA0B,eAAE,OAAO;AAAA,EAC9C,KAAK,eAAE,OAAO,EAAE,IAAI,CAAC;AACvB,CAAC;;;ACJD,IAAAC,eAAkB;AAEX,IAAM,6BAA6B,eAAE,OAAO;AAAA,EACjD,YAAY,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACxC,WAAW,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACvC,SAAS,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS;AAAA,EACtC,OAAO,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACnC,UAAU,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS;AAAA,EACvC,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACtC,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AACxC,CAAC;;;ACVD,IAAAC,eAAkB;AAEX,IAAM,qCAAqC,eAAE,OAAO;AAAA,EACzD,cAAc,eAAE,OAAO,EAAE,SAAS;AAAA,EAClC,YAAY,eAAE,OAAO,EAAE,SAAS;AAClC,CAAC;;;ACLD,IAAAC,eAAkB;AAEX,IAAM,oCAAoC,eAAE,OAAO;AAAA,EACxD,MAAM,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,IAAI,GAAG;AAAA,EAChC,OAAO,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,IAAI,GAAG;AAAA,EACjC,cAAc,eAAE,OAAO,EAAE,SAAS;AACpC,CAAC;;;ACND,IAAAC,eAAkB;AAGX,IAAM,sCAAsC,eAAE,OAAO;AAAA,EAC1D,UAAU;AACZ,CAAC;;;ACLD,IAAAC,eAAkB;AAEX,IAAM,mBAAmB,eAAE,OAAO;AAAA,EACvC,OAAO,eAAE,OAAO;AAAA,EAChB,mBAAmB,eAAE,OAAO,EAAE,SAAS;AACzC,CAAC;;;ACLD,IAAAC,eAAkB;AAEX,IAAM,yBAAyB,eAAE,OAAO;AAAA,EAC7C,OAAO,eAAE,OAAO;AAAA,EAChB,YAAY,eAAE,OAAO,EAAE,SAAS,EAAE,SAAS;AAAA,EAC3C,aAAa,eAAE,OAAO,EAAE,IAAI,EAAE,SAAS,EAAE,SAAS;AACpD,CAAC;;;ACND,IAAAC,eAAkB;AAEX,IAAM,0BAA0B,eAAE,OAAO;AAAA,EAC9C,YAAY,eAAE,OAAO,EAAE,IAAI,CAAC;AAAA,EAC5B,YAAY,eAAE,OAAO,EAAE,SAAS;AAClC,CAAC;;;ACLD,IAAAC,eAAkB;AAEX,IAAM,yBAAyB,eAAE,OAAO;AAAA,EAC7C,YAAY,eAAE,OAAO,EAAE,IAAI,CAAC;AAAA,EAC5B,KAAK,eAAE,OAAO,EAAE,IAAI,CAAC,EAAE,IAAI,CAAC;AAAA,EAC5B,YAAY,eAAE,OAAO,EAAE,SAAS;AAClC,CAAC;;;ACND,IAAAC,eAAkB;AAEX,IAAM,oCAAoC,eAAE,OAAO;AAAA,EACxD,YAAY,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACxC,WAAW,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACvC,SAAS,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS;AAAA,EACtC,OAAO,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACnC,UAAU,eAAE,OAAO,EAAE,IAAI,GAAG,EAAE,SAAS;AAAA,EACvC,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AAAA,EACtC,UAAU,eAAE,OAAO,EAAE,IAAI,EAAE,EAAE,SAAS;AACxC,CAAC;;;ACVD,IAAAC,eAAkB;AAEX,IAAM,4BAA4B,eAAE,OAAO;AAAA,EAChD,SAAS,eAAE,OAAO,EAAE,IAAI,CAAC;AAC3B,CAAC;;;A9CmNG;AAvJJ,IAAM,sBAAkB,8BAAgD,MAAS;AAM1E,SAAS,iBAAiB,EAAE,SAAS,GAA0B;AACpE,QAAM,CAAC,SAAS,UAAU,QAAI,yBAA2B,MAAM;AAC7D,UAAM,SAAS,iBAAiB;AAChC,WAAO,UAAU;AAAA,EACnB,CAAC;AACD,QAAM,CAAC,kBAAkB,mBAAmB,QAAI,yBAAS,KAAK;AAC9D,QAAM,CAAC,cAAc,eAAe,QAAI,yBAAuB,IAAI;AAEnE,QAAM,iBAAa,uBAAyB,OAAO;AACnD,QAAM,mBAAe,uBAAO,KAAK;AAEjC,gCAAU,MAAM;AACd,eAAW,UAAU;AAAA,EACvB,GAAG,CAAC,OAAO,CAAC;AAEZ,gCAAU,MAAM;AACd,iBAAa,UAAU;AAAA,EACzB,GAAG,CAAC,gBAAgB,CAAC;AAErB,QAAM,EAAE,SAAS,qBAAqB,IAAI,kCAAkC;AAC5E,QAAM,EAAE,SAAS,4BAA4B,IAAI,mCAAmC;AACpF,QAAM,EAAE,SAAS,cAAc,IAAI,kCAAkC;AACrE,QAAM,EAAE,SAAS,kBAAkB,IAAI,+BAA+B;AACtE,QAAM,EAAE,SAAS,iBAAiB,IAAI,8BAA8B;AACpE,QAAM,EAAE,SAAS,oBAAoB,IAAI,iCAAiC;AAE1E,QAAM,qBAAiB,4BAAY,OAAO,YAAgF;AACxH,UAAM,EAAE,UAAU,MAAM,IAAI,WAAW,CAAC;AAExC,QAAI,aAAa,SAAS;AACxB,iBAAW,MAAM,kDAAkD,QAAQ,GAAG;AAC9E,aAAO,WAAW;AAAA,IACpB;AAEA,wBAAoB,IAAI;AACxB,iBAAa,UAAU;AACvB,oBAAgB,IAAI;AACpB,QAAI;AACF,iBAAW,MAAM,sCAAsC,QAAQ,YAAY,KAAK,GAAG;AACnF,YAAM,MAAM,MAAM,mBAAmB,2BAA2B,EAAE,cAAc,KAAK,CAAC;AACtF,YAAM,SAAS,IAAI;AACnB,iBAAW,MAAM;AACjB,iBAAW,UAAU;AACrB,uBAAiB,MAAM;AACvB,aAAO;AAAA,IACT,SAAS,OAAO;AACd,YAAM,MAAM,iBAAiB,QAAQ,QAAQ,IAAI,MAAM,yBAAyB;AAChF,sBAAgB,GAAG;AACnB,YAAM;AAAA,IACR,UAAE;AACA,0BAAoB,KAAK;AACzB,mBAAa,UAAU;AAAA,IACzB;AAAA,EACF,GAAG,CAAC,CAAC;AAEL,QAAM,gBAAgB,8BAAO,SAA8C;AACzE,UAAM,qBAAqB,EAAE,MAAM,KAAK,CAAC;AACzC,UAAM,OAAO,MAAM,eAAe,EAAE,UAAU,iBAAiB,OAAO,KAAK,CAAC;AAC5E,WAAO;AAAA,EACT,GAJsB;AAMtB,QAAM,uBAAuB,8BAAO,SAAqD;AACvF,UAAM,4BAA4B,EAAE,MAAM,KAAK,CAAC;AAChD,UAAM,OAAO,MAAM,eAAe,EAAE,UAAU,wBAAwB,OAAO,KAAK,CAAC;AACnF,WAAO;AAAA,EACT,GAJ6B;AAM7B,QAAM,eAAe,8BAAO,WAAuC;AACjE,UAAM,cAAc,EAAE,MAAM,EAAE,OAAO,EAAE,CAAC;AACxC,UAAM,OAAO,MAAM,eAAe,EAAE,UAAU,gBAAgB,OAAO,KAAK,CAAC;AAC3E,WAAO;AAAA,EACT,GAJqB;AAMrB,QAAM,aAAa,8BAAO,SAAyD;AACjF,UAAM,SAAS,MAAM,kBAAkB,EAAE,MAAM,KAAK,CAAC;AACrD,WAAO;AAAA,EACT,GAHmB;AAKnB,QAAM,YAAY,8BAAO,SAAuD;AAC9E,UAAM,SAAU,MAAM,iBAAiB,EAAE,MAAM,KAAK,CAAC;AAErD,QAAI,OAAO,gBAAgB,OAAO,YAAY;AAC5C,iBAAW,KAAK,0BAA0B,OAAO,UAAU;AAC3D,aAAO;AAAA,IACT;AAEA,QAAI,OAAO,UAAU,OAAO,SAAS;AACnC,qBAAe,SAAS,OAAO,MAAM;AACrC,qBAAe,gBAAgB,OAAO,OAAO;AAC7C,UAAI;AACF,cAAM,eAAe,EAAE,UAAU,aAAa,OAAO,KAAK,CAAC;AAAA,MAC7D,SAASC,eAAc;AACrB,mBAAW,KAAK,+DAA+DA,aAAY;AAAA,MAC7F;AAAA,IACF;AAEA,WAAO;AAAA,EACT,GAnBkB;AAqBlB,QAAM,eAAe,8BAAO,YAA2C;AACrE,UAAM,OAA4B,EAAE,QAAQ;AAC5C,UAAM,SAAU,MAAM,oBAAoB,EAAE,KAAK,CAAC;AAElD,QAAI,OAAO,QAAQ;AACjB,qBAAe,SAAS,OAAO,MAAM;AACrC,qBAAe,gBAAgB,OAAO;AAAA,IACxC;AAEA,WAAO;AAAA,EACT,GAVqB;AAYrB,QAAM,aAAS,4BAAY,MAAM;AAC/B,mBAAe,WAAW;AAC1B,eAAW,MAAS;AACpB,oBAAgB,IAAI;AACpB,sBAAkB;AAAA,EACpB,GAAG,CAAC,CAAC;AAEL,QAAM,YAA8B,wBAAQ,OAAO;AAAA,IACjD;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,IAAI;AAAA,IACF;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF,CAAC;AAED,SACE,4CAAC,gBAAgB,UAAhB,EAAyB,OACvB,UACH;AAEJ;AArJgB;AAuJT,SAAS,qBAA2C;AACzD,QAAM,cAAU,2BAAW,eAAe;AAC1C,MAAI,CAAC,SAAS;AACZ,UAAM,IAAI,MAAM,yDAAyD;AAAA,EAC3E;AACA,SAAO;AACT;AANgB;;;AtCgZV,IAAAC,sBAAA;AAzlBN,IAAM,gBAAgB;AAAA,EACpB,MAAM;AAAA,EACN,iBAAiB;AAAA,EACjB,qBAAqB;AACvB;AAEA,IAAM,kBAAc,8BAA2C,MAAS;AAGxE,IAAM,oBAAoB;AAE1B,IAAM,iBAAiB,6BAAe;AACpC,MAAI,OAAO,WAAW,YAAa,QAAO;AAC1C,SAAO,eAAY,gBAAgB;AACrC,GAHuB;AAMvB,IAAM,uBAAoD,wBAAC,EAAE,UAAU,OAAO,MAAM;AAClF,QAAM,WAAW,mBAAmB;AAGpC,QAAM,kBAAkB,uBAAuB;AAAA,IAC7C,aAAa,QAAQ,QAAQ,mBAAmB,cAAc;AAAA,IAC9D,YAAY;AAAA,EACd,CAAC;AAGD,QAAM,CAAC,WAAW,YAAY,QAAI,yBAAS,MAAM;AAE/C,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,YAAY,eAAe;AAEjC,aAAO,CAAC;AAAA,IACV;AACA,WAAO;AAAA,EACT,CAAC;AAED,QAAM,CAAC,aAAa,cAAc,QAAI,yBAAS,KAAK;AACpD,QAAM,SAAS,aAAa;AAC5B,QAAM,eAAW,gCAAY;AAC7B,QAAM,cAAc,eAAe;AAGnC,QAAM,CAAC,aAAa,gBAAgB,gBAAgB,IAAI,gBAA+B,mBAAmB,IAAI;AAG9G,kBAAgB;AAAA,IACd,SAAS;AAAA,IACT,WAAW,wBAAC,aAAa;AACvB,iBAAW,KAAK,mCAAmC;AAAA,IACrD,GAFW;AAAA,IAGX,gBAAgB,wBAAC,UAAU;AACzB,iBAAW,KAAK,8BAA8B,MAAM,OAAO;AAAA,IAE7D,GAHgB;AAAA,EAIlB,CAAC;AAGD,QAAM,OAAO,SAAS;AAGtB,QAAM,cAAU,uBAAO,IAAI;AAC3B,QAAM,gBAAY,uBAAO,MAAM;AAC/B,QAAM,0BAAsB,uBAAO,KAAK;AAGxC,gCAAU,MAAM;AACd,YAAQ,UAAU;AAAA,EACpB,GAAG,CAAC,IAAI,CAAC;AAET,gCAAU,MAAM;AACd,cAAU,UAAU;AAAA,EACtB,GAAG,CAAC,MAAM,CAAC;AAKX,QAAM,qBAAiB,4BAAY,CAAC,WAAmB;AACrD,eAAW,KAAK,4BAA4B,MAAM;AAClD,mBAAY,WAAW;AACvB,sBAAkB;AAElB,mBAAe,IAAI;AACnB,iBAAa,KAAK;AAAA,EACpB,GAAG,CAAC,CAAC;AAIL,QAAM,4BAAwB,4BAAY,CAAC,OAAY,UAAkB,kBAAkB;AAGzF,UAAM,cAAc,OAAO,WAAW,OAClB,OAAO,eAAe,OACtB,OAAO,SAAS,qBAChB,OAAO,SAAS;AAEpC,QAAI,aAAa;AACf,iBAAW,KAAK,2BAA2B,OAAO,mBAAmB;AACrE,qBAAe,mBAAmB,OAAO,EAAE;AAC3C,aAAO;AAAA,IACT;AAGA,QAAI,OAAO,YAAY,OAAO;AAC5B,iBAAW,KAAK,qBAAqB,OAAO,4BAA4B,OAAO,WAAW,KAAK;AAAA,IACjG;AAEA,WAAO;AAAA,EACT,GAAG,CAAC,cAAc,CAAC;AAGnB,QAAM,0BAAsB,uBAAO,KAAK;AACxC,QAAM,iBAAa,4BAAY,CAAC,UAAe;AAC7C,UAAM,cAAc,OAAO,WAAW,OAClB,OAAO,eAAe,OACtB,OAAO,SAAS,qBAChB,OAAO,SAAS;AAEpC,QAAI,eAAe,CAAC,oBAAoB,SAAS;AAC/C,0BAAoB,UAAU;AAC9B,iBAAW,KAAK,qCAAqC;AACrD,qBAAe,gBAAgB;AAE/B,YAAM,kBAAkB,UAAU,SAAS,QAAQ,uBAAuB,cAAc;AACxF,aAAO,YAAY,eAAe;AAAA,IACpC;AAAA,EACF,GAAG,CAAC,gBAAgB,MAAM,CAAC;AAC3B,QAAM,gBAAY,wBAAQ,OAAO,EAAE,SAAS,WAAW,IAAI,CAAC,UAAU,CAAC;AAGvE,QAAM,yBAAqB,4BAAY,OAAO,aAAqC;AACjF,UAAM,gBAAgB,YAAY;AAGlC,QAAI,oBAAoB,SAAS;AAC/B,iBAAW,MAAM,sEAAsE,aAAa,EAAE;AACtG;AAAA,IACF;AAEA,eAAW,MAAM,iCAAiC,aAAa,EAAE;AAEjE,QAAI;AACF,0BAAoB,UAAU;AAG9B,YAAM,SAAS,eAAY,gBAAgB;AAC3C,YAAM,QAAQ,eAAY,SAAS;AAGnC,UAAI,CAAC,QAAQ;AACX,mBAAW,KAAK,+CAA+C;AAC/D,cAAM,IAAI,MAAM,+BAA+B;AAAA,MACjD;AAGA,UAAI,SAAS,WAAW,CAAC,SAAS,kBAAkB;AAClD,mBAAW,MAAM,8DAA8D;AAC/E,uBAAe,IAAI;AACnB;AAAA,MACF;AAGA,YAAM,mBAAmB,MAAM,SAAS,eAAe,EAAE,UAAU,cAAc,CAAC;AAElF,UAAI,kBAAkB;AACpB,mBAAW,KAAK,gCAAgC,iBAAiB,EAAE;AAAA,MACrE,OAAO;AACL,mBAAW,KAAK,yDAAyD;AAAA,MAC3E;AAIA,qBAAe,IAAI;AAAA,IACrB,SAAS,OAAY;AACnB,iBAAW,MAAM,2BAA2B,KAAK;AAGjD,YAAM,cAAc,OAAO,WAAW,OAClB,OAAO,eAAe,OACtB,OAAO,SAAS,qBAChB,OAAO,SAAS;AAEpC,UAAI,aAAa;AACf,mBAAW,KAAK,wCAAwC;AACxD,uBAAe,8BAA8B;AAAA,MAC/C,OAAO;AAEL,mBAAW,KAAK,0DAA0D;AAC1E,uBAAe,IAAI;AAAA,MACrB;AAAA,IACF,UAAE;AACA,0BAAoB,UAAU;AAAA,IAChC;AAAA,EACF,GAAG,CAAC,gBAAgB,uBAAuB,QAAQ,CAAC;AAGpD,gCAAU,MAAM;AACd,QAAI,YAAa;AAEjB,UAAM,iBAAiB,mCAAY;AACjC,iBAAW,KAAK,sBAAsB;AAGtC,YAAM,aAAa,OAAO,WAAW,eAAe,OAAO,SAAS,OAAO;AAC3E,iBAAW,KAAK,iBAAiB,UAAU;AAG3C,YAAM,QAAQ,eAAY,SAAS;AACnC,YAAMC,gBAAe,eAAY,gBAAgB;AACjD,iBAAW,KAAK,mBAAmB,QAAQ,GAAG,MAAM,UAAU,GAAG,EAAE,CAAC,QAAQ,MAAM;AAClF,iBAAW,KAAK,2BAA2BA,gBAAe,GAAGA,cAAa,UAAU,GAAG,EAAE,CAAC,QAAQ,MAAM;AACxG,iBAAW,KAAK,sBAAsB,OAAO,KAAK,YAAY,EAAE,OAAO,OAAK,EAAE,SAAS,OAAO,KAAK,EAAE,SAAS,MAAM,CAAC,CAAC;AAEtH,YAAM,YAAY,eAAe;AACjC,iBAAW,KAAK,eAAe,SAAS;AAGxC,UAAI,QAAQ,SAAS;AACnB,mBAAW,KAAK,yEAAyE;AACzF,uBAAe,IAAI;AACnB,qBAAa,KAAK;AAClB;AAAA,MACF;AAGA,YAAM,gBAAgB,iBAAiB;AACvC,UAAI,eAAe;AACjB,mBAAW,KAAK,2DAA2D;AAC3E,uBAAe,IAAI;AACnB,qBAAa,KAAK;AAClB;AAAA,MACF;AAIA,UAAI,cAAc,CAAC,WAAW;AAC5B,mBAAW,KAAK,+EAA+E;AAC/F,mBAAW,KAAK,wEAAwE;AACxF,uBAAe,IAAI;AACnB,qBAAa,KAAK;AAClB;AAAA,MACF;AAEA,UAAI,WAAW;AACb,qBAAa,IAAI;AACjB,YAAI;AACF,qBAAW,KAAK,8CAA8C;AAC9D,gBAAM,mBAAmB,4BAA4B;AAAA,QACvD,SAAS,OAAY;AACnB,qBAAW,MAAM,iDAAiD,KAAK;AAEvE,gBAAM,cAAc,OAAO,WAAW,OAClB,OAAO,eAAe,OACtB,OAAO,SAAS,qBAChB,OAAO,SAAS;AAEpC,cAAI,aAAa;AACf,2BAAe,0BAA0B;AAAA,UAC3C,OAAO;AACL,uBAAW,KAAK,8CAA8C;AAC9D,2BAAe,IAAI;AAAA,UACrB;AAAA,QACF;AACA,qBAAa,KAAK;AAAA,MACpB,OAAO;AACL,uBAAe,IAAI;AACnB,qBAAa,KAAK;AAAA,MACpB;AAAA,IACF,GArEuB;AAuEvB,mBAAe;AAAA,EAEjB,GAAG,CAAC,WAAW,CAAC;AAGhB,gCAAU,MAAM;AACd,QAAI,CAAC,YAAa;AAGlB,UAAM,kBAAkB,eAAY,gBAAgB;AACpD,UAAM,YAAY,QAAQ,QAAQ,QAAQ,cAAc;AACxD,UAAM,aAAa,aAAa;AAChC,UAAM,YAAY,YAAY,IAAI,MAAM;AAIxC,QAAI,mBAAmB,cAAc,CAAC,WAAW;AAC/C,YAAM,cAAc,QAAQ,QAAQ,mBAAmB,cAAc;AACrE,aAAO,KAAK,WAAW;AAAA,IACzB;AAAA,EACF,GAAG,CAAC,aAAa,UAAU,aAAa,QAAQ,MAAM,CAAC;AAEvD,QAAM,+BAA2B,4BAAY,MAAM;AACjD,UAAM,cAAc,QAAQ,QAAQ,mBAAmB,cAAc;AACrE,WAAO,KAAK,WAAW;AAAA,EACzB,GAAG,CAAC,QAAQ,QAAQ,MAAM,CAAC;AAE3B,QAAM,mCAA+B,4BAAY,MAAM;AACrD,UAAM,kBAAkB,QAAQ,QAAQ,uBAAuB,cAAc;AAC7E,WAAO,KAAK,eAAe;AAAA,EAC7B,GAAG,CAAC,QAAQ,QAAQ,MAAM,CAAC;AAG3B,QAAM,2BAAuB,4BAAY,YAAY;AACnD,QAAI;AACF,mBAAa,IAAI;AACjB,YAAM,kBAAkB,eAAY,gBAAgB;AAEpD,UAAI,iBAAiB;AACnB,cAAM,mBAAmB;AACzB,YAAI,QAAQ,SAAS;AACnB,mCAAyB;AAAA,QAC3B;AAAA,MACF,OAAO;AACL,qCAA6B;AAAA,MAC/B;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,mCAAmC,KAAK;AAEzD,UAAI,CAAC,sBAAsB,OAAO,sBAAsB,GAAG;AACzD,uBAAe,sBAAsB;AAAA,MACvC;AACA,mCAA6B;AAAA,IAC/B,UAAE;AACA,mBAAa,KAAK;AAAA,IACpB;AAAA,EACF,GAAG,CAAC,oBAAoB,gBAAgB,0BAA0B,8BAA8B,qBAAqB,CAAC;AAGtH,QAAM,iBAAa;AAAA,IACjB,OAAO,YAAoB,cAAiH;AAE1I,qBAAY,WAAW;AAEvB,UAAI;AACF,cAAM,SAAS,MAAM,SAAS,WAAW;AAAA,UACvC;AAAA,UACA,YAAY;AAAA,QACd,CAAC;AAGD,kBAAU,iDAAuC;AAAA,UAC/C;AAAA,UACA,OAAO;AAAA,QACT,CAAC;AAED,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS,OAAO,WAAW;AAAA,QAC7B;AAAA,MACF,SAAS,OAAO;AACd,mBAAW,MAAM,sBAAsB,KAAK;AAE5C,YAAI,iBAAiB,UAAU;AAC7B,gBAAM,aAAa,MAAM,UAAU,eAAe,MAAM,UAAU;AAElE,gBAAM,UAAU,MAAM,UAAU,SAAS,MAAM,UAAU,UAAU,MAAM,UAAU,WAAW,MAAM;AACpG,iBAAO;AAAA,YACL,SAAS;AAAA,YACT,YAAY,MAAM;AAAA,YAClB;AAAA,YACA,YAAY,OAAO,eAAe,WAAW,aAAa;AAAA,UAC5D;AAAA,QACF;AAEA,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS;AAAA,QACX;AAAA,MACF;AAAA,IACF;AAAA,IACA,CAAC,QAAQ;AAAA,EACX;AAEA,QAAM,gBAAY;AAAA,IAChB,OAAO,YAAoB,SAAiB,WAAoB,aAAsB,iBAOhF;AACJ,UAAI;AAEF,cAAM,SAAS,MAAM,SAAS,UAAU;AAAA,UACtC;AAAA,UACA,KAAK;AAAA,UACL,YAAY;AAAA,QACd,CAAC;AAGD,YAAI,OAAO,gBAAgB,OAAO,YAAY;AAC5C,qBAAW,KAAK,0BAA0B,OAAO,UAAU;AAC3D,iBAAO;AAAA,YACL,SAAS;AAAA,YACT,SAAS;AAAA,YACT,cAAc;AAAA,YACd,YAAY,OAAO;AAAA,YACnB,mBAAmB,OAAO;AAAA,UAC5B;AAAA,QACF;AAGA,YAAI,CAAC,OAAO,UAAU,CAAC,OAAO,SAAS;AACrC,qBAAW,MAAM,yCAAyC,MAAM;AAChE,iBAAO;AAAA,YACL,SAAS;AAAA,YACT,SAAS;AAAA,UACX;AAAA,QACF;AAGA,YAAI,WAAW,SAAS,GAAG,GAAG;AAC5B,yBAAe,UAAU;AAAA,QAC3B;AAGA,cAAM,IAAI,QAAQ,aAAW,WAAW,SAAS,GAAG,CAAC;AAGrD,kBAAU,qDAAyC;AAAA,UACjD;AAAA,UACA,OAAO;AAAA,QACT,CAAC;AAGD,YAAI,OAAO,MAAM,IAAI;AACnB,oBAAU,QAAQ,OAAO,OAAO,KAAK,EAAE,CAAC;AAAA,QAC1C;AAGA,YAAI,CAAC,cAAc;AAGjB,gBAAM,gBAAgB,gBAAgB,oBAAoB;AAC1D,gBAAM,mBAAmB,eAAe,iBAAiB,QAAQ,QAAQ,mBAAmB,cAAc;AAC1G,qBAAW,KAAK,8BAA8B,gBAAgB;AAC9D,iBAAO,SAAS,gBAAgB;AAAA,QAClC;AAEA,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS;AAAA,UACT,MAAM,OAAO;AAAA,UACb,mBAAmB,OAAO;AAAA,QAC5B;AAAA,MACF,SAAS,OAAO;AACd,mBAAW,MAAM,qBAAqB,KAAK;AAG3C,kBAAU,yDAA2C;AAAA,UACnD;AAAA,UACA,OAAO;AAAA,QACT,CAAC;AAED,YAAI,iBAAiB,UAAU;AAC7B,gBAAM,UAAU,MAAM,UAAU,SAAS,MAAM,UAAU,UAAU,MAAM,UAAU,WAAW,MAAM;AACpG,iBAAO,EAAE,SAAS,OAAO,QAAQ;AAAA,QACnC;AACA,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS;AAAA,QACX;AAAA,MACF;AAAA,IACF;AAAA,IACA,CAAC,gBAAgB,QAAQ,QAAQ,iBAAiB,UAAU,MAAM;AAAA,EACpE;AAEA,QAAM,mBAAe,4BAAY,YAA4D;AAC3F,QAAI;AACF,YAAM,oBAAoB,eAAY,gBAAgB;AACtD,UAAI,CAAC,mBAAmB;AACtB,uBAAe,sBAAsB;AAGrC,kBAAU,yDAA2C;AAAA,UACnD;AAAA,QACF,CAAC;AAED,eAAO;AAAA,UACL,SAAS;AAAA,UACT,SAAS;AAAA,QACX;AAAA,MACF;AAEA,YAAM,SAAS,aAAa,iBAAiB;AAG7C,gBAAU,qDAAyC;AAAA,QACjD;AAAA,MACF,CAAC;AAED,aAAO;AAAA,QACL,SAAS;AAAA,QACT,SAAS;AAAA,MACX;AAAA,IACF,SAAS,OAAO;AACd,iBAAW,MAAM,wBAAwB,KAAK;AAC9C,qBAAe,oBAAoB;AAGnC,gBAAU,+DAA8C;AAAA,QACtD;AAAA,MACF,CAAC;AAED,aAAO;AAAA,QACL,SAAS;AAAA,QACT,SAAS;AAAA,MACX;AAAA,IACF;AAAA,EACF,GAAG,CAAC,gBAAgB,QAAQ,CAAC;AAE7B,QAAM,aAAS,4BAAY,MAAY;AAErC,cAAU,uCAAkC;AAAA,MAC1C;AAAA,IACF,CAAC;AAED,aAAS,OAAO;AAChB,mBAAe,IAAI;AACnB,iBAAa,KAAK;AAIlB,UAAM,kBAAkB,QAAQ,QAAQ,uBAAuB,cAAc;AAC7E,WAAO,YAAY,eAAe;AAAA,EACpC,GAAG,CAAC,UAAU,QAAQ,QAAQ,qBAAqB,MAAM,CAAC;AAG1D,QAAM,kBAAc,wBAAQ,MAAM;AAChC,WAAO,QAAQ,MAAM,YAAY,MAAM,YAAY;AAAA,EACrD,GAAG,CAAC,IAAI,CAAC;AAGT,QAAM,oBAAgB;AAAA,IACpB,OAAO,SAA+F;AACpG,YAAM,SAAS,MAAM,SAAS,qBAAqB,IAAI;AACvD,aAAO;AAAA,IACT;AAAA,IACA,CAAC,QAAQ;AAAA,EACX;AAGA,QAAM,mBAAe;AAAA,IACnB,OAAO,WAA8C;AACnD,YAAM,SAAS,MAAM,SAAS,aAAa,MAAM;AACjD,aAAO;AAAA,IACT;AAAA,IACA,CAAC,QAAQ;AAAA,EACX;AAGA,QAAM,YAAQ;AAAA,IACZ,OAAO;AAAA,MACL;AAAA,MACA;AAAA;AAAA,MAEA,iBAAiB,eAAY,gBAAgB;AAAA,MAC7C;AAAA,MACA;AAAA,MACA;AAAA,MACA,UAAU,6BAAM,eAAY,SAAS,GAA3B;AAAA,MACV,iBAAiB,6BAAM,eAAY,gBAAgB,GAAlC;AAAA,MACjB,eAAe,6BAAM,aAAN;AAAA,MACf,WAAW;AAAA,MACX,iBAAiB;AAAA,MACjB;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA;AAAA,MAEA,iBAAiB,gBAAgB;AAAA,MACjC,gBAAgB,gBAAgB;AAAA,MAChC,kBAAkB,gBAAgB;AAAA,MAClC,gBAAgB,gBAAgB;AAAA;AAAA,MAEhC;AAAA,MACA;AAAA,IACF;AAAA,IACA;AAAA,MACE;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,IACF;AAAA,EACF;AAEA,SACE,6CAAC,YAAY,UAAZ,EAAqB,OACpB,uDAAC,yBAAU,OAAO,WAAY,UAAS,GACzC;AAEJ,GA3kB0D;AAolB1D,SAAS,gBAAgB,EAAE,UAAU,QAAQ,UAAU,KAAK,GAAsB;AAChF,MAAI,CAAC,QAAS,QAAO,6EAAG,UAAS;AACjC,SACE,6CAAC,oBACC,uDAAC,wBAAqB,QACnB,UACH,GACF;AAEJ;AATS;AAWF,IAAM,mBAAe,qBAAK,eAAe;AAMhD,IAAM,mBAAoC;AAAA,EACxC,MAAM;AAAA,EACN,WAAW;AAAA,EACX,iBAAiB;AAAA,EACjB,aAAa;AAAA,EACb,oBAAoB,mCAAY;AAC9B,eAAW,KAAK,yDAAyD;AAAA,EAC3E,GAFoB;AAAA,EAGpB,sBAAsB,mCAAY;AAChC,eAAW,KAAK,2DAA2D;AAAA,EAC7E,GAFsB;AAAA,EAGtB,UAAU,6BAAM,MAAN;AAAA,EACV,iBAAiB,6BAAM,MAAN;AAAA,EACjB,eAAe,6BAAM,MAAN;AAAA,EACf,WAAW,6BAAM;AACf,eAAW,KAAK,gDAAgD;AAAA,EAClE,GAFW;AAAA,EAGX,iBAAiB,6BAAM;AAAA,EAAC,GAAP;AAAA,EACjB,YAAY,mCAAY;AACtB,eAAW,KAAK,iDAAiD;AACjE,WAAO,EAAE,SAAS,OAAO,SAAS,6BAA6B;AAAA,EACjE,GAHY;AAAA,EAIZ,WAAW,mCAAY;AACrB,eAAW,KAAK,gDAAgD;AAChE,WAAO,EAAE,SAAS,OAAO,SAAS,6BAA6B;AAAA,EACjE,GAHW;AAAA,EAIX,cAAc,mCAAY;AACxB,eAAW,KAAK,mDAAmD;AACnE,WAAO,EAAE,SAAS,OAAO,SAAS,6BAA6B;AAAA,EACjE,GAHc;AAAA,EAId,QAAQ,8BAAO,aAAyC;AACtD,eAAW,KAAK,6CAA6C;AAAA,EAC/D,GAFQ;AAAA,EAGR,iBAAiB,6BAAM;AAAA,EAAC,GAAP;AAAA,EACjB,gBAAgB,6BAAM,MAAN;AAAA,EAChB,kBAAkB,6BAAM;AAAA,EAAC,GAAP;AAAA,EAClB,gBAAgB,6BAAM,OAAN;AAAA,EAChB,eAAe,mCAAY;AACzB,eAAW,KAAK,oDAAoD;AACpE,WAAO,CAAC;AAAA,EACV,GAHe;AAAA,EAIf,cAAc,mCAAY;AACxB,eAAW,KAAK,mDAAmD;AACnE,WAAO,CAAC;AAAA,EACV,GAHc;AAIhB;AAQO,IAAM,UAAU,6BAAuB;AAC5C,QAAM,cAAU,2BAAW,WAAW;AAEtC,MAAI,YAAY,QAAW;AAGzB,QAAI,aAAa,OAAO;AACtB,iBAAW,MAAM,8DAA8D;AAAA,IACjF;AACA,WAAO;AAAA,EACT;AAEA,SAAO;AACT,GAbuB;;;AqFhsBhB,IAAM,gBAAgB,wBAAC,UAA2B;AACvD,QAAM,aAAa;AACnB,SAAO,WAAW,KAAK,KAAK;AAC9B,GAH6B;;;ACAtB,IAAM,kBAAkB,wBAAC,UAAuB;AACrD,MAAI,OAAO,UAAU,UAAU;AAC7B,WAAO;AAAA,EACT;AAEA,MAAI,OAAO,SAAS;AAClB,WAAO,MAAM;AAAA,EACf;AAEA,MAAI,OAAO,QAAQ;AACjB,WAAO,MAAM;AAAA,EACf;AAEA,MAAI,OAAO,UAAU,MAAM,QAAQ;AACjC,WAAO,MAAM,SAAS,KAAK;AAAA,EAC7B;AAEA,SAAO;AACT,GAlB+B;","names":["import_navigation","import_react","import_swr","useNextRouter","isStaticBuild","import_navigation","import_react","import_react","import_react","validateIdentifier","import_react","import_navigation","import_react","import_react","isBrowser","client","import_consola","joinedValues","auth","auth","config","request","url","API","API","API","AnalyticsEvent","AnalyticsCategory","validateIdentifier","import_react","import_react","import_react","import_react","key","import_react","import_react","key","import_react","import_react","error","import_react","import_zod","import_mutation","import_zod","import_swr","import_zod","import_zod","import_zod","import_mutation","import_zod","import_mutation","import_zod","import_mutation","import_zod","import_swr","import_zod","import_mutation","import_zod","useSWRMutation","import_mutation","import_zod","import_zod","import_zod","useSWRMutation","import_mutation","useSWRMutation","import_mutation","import_zod","import_mutation","import_mutation","useSWRMutation","import_swr","import_mutation","import_mutation","useSWRMutation","import_mutation","import_zod","useSWRMutation","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","import_zod","profileError","import_jsx_runtime","refreshToken"]}