@drunk-pulumi/azure 0.0.37 → 0.0.38

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. package/Aks/Helper.d.ts +6 -11
  2. package/Aks/Helper.js +40 -65
  3. package/Aks/Identity.d.ts +3 -10
  4. package/Aks/Identity.js +9 -8
  5. package/Aks/index.d.ts +67 -71
  6. package/Aks/index.js +198 -314
  7. package/Apim/ApiProduct/PolicyBuilder.js +25 -27
  8. package/Apim/ApiProduct/SwaggerHelper.js +1 -3
  9. package/Apim/ApiProduct/index.d.ts +3 -3
  10. package/Apim/ApiProduct/index.js +1 -2
  11. package/Automation/index.d.ts +7 -0
  12. package/Automation/index.js +55 -0
  13. package/AzAd/EnvRoles.Consts.d.ts +12 -0
  14. package/AzAd/EnvRoles.Consts.js +125 -0
  15. package/AzAd/EnvRoles.d.ts +16 -15
  16. package/AzAd/EnvRoles.js +69 -47
  17. package/AzAd/GraphDefinition.d.ts +2 -2
  18. package/AzAd/GraphDefinition.js +3055 -3056
  19. package/AzAd/Helper.d.ts +24 -13
  20. package/AzAd/Helper.js +98 -25
  21. package/AzAd/Identities/AzDevOpsIdentity.d.ts +12 -0
  22. package/AzAd/Identities/AzDevOpsIdentity.js +32 -0
  23. package/AzAd/Identities/AzDevOpsManagedIdentity.d.ts +7 -0
  24. package/AzAd/Identities/AzDevOpsManagedIdentity.js +15 -0
  25. package/AzAd/Identities/AzUserAdRevertSync.d.ts +2 -9
  26. package/AzAd/Identities/AzUserAdRevertSync.js +4 -5
  27. package/AzAd/Identities/index.d.ts +3 -0
  28. package/AzAd/Identities/index.js +10 -0
  29. package/AzAd/Identity.d.ts +10 -22
  30. package/AzAd/Identity.js +50 -61
  31. package/AzAd/Role.d.ts +2 -3
  32. package/AzAd/Role.js +4 -5
  33. package/AzAd/RoleAssignment.d.ts +34 -5
  34. package/AzAd/RoleAssignment.js +2 -2
  35. package/AzAd/RoleDefinitions/JustInTimeRequestRole.d.ts +2 -0
  36. package/AzAd/RoleDefinitions/JustInTimeRequestRole.js +25 -0
  37. package/AzAd/RolesBuiltIn.d.ts +29 -0
  38. package/AzAd/RolesBuiltIn.js +13034 -8058
  39. package/AzAd/UserAssignedIdentity.d.ts +6 -0
  40. package/AzAd/UserAssignedIdentity.js +27 -0
  41. package/Builder/AksBuilder.d.ts +3 -0
  42. package/Builder/AksBuilder.js +95 -0
  43. package/Builder/VnetBuilder.d.ts +3 -0
  44. package/Builder/VnetBuilder.js +279 -0
  45. package/Builder/index.d.ts +2 -0
  46. package/Builder/index.js +8 -0
  47. package/Builder/types.d.ts +120 -0
  48. package/Builder/types.js +18 -0
  49. package/Certificate/index.d.ts +1 -1
  50. package/Certificate/index.js +26 -28
  51. package/Common/AutoTags.js +2 -2
  52. package/Common/AzureEnv.d.ts +4 -3
  53. package/Common/AzureEnv.js +31 -24
  54. package/Common/GlobalEnv.d.ts +1 -2
  55. package/Common/GlobalEnv.js +7 -7
  56. package/Common/Location.d.ts +3 -3
  57. package/Common/Location.js +22 -9
  58. package/Common/LocationBuiltIn.d.ts +6 -81
  59. package/Common/LocationBuiltIn.js +491 -1923
  60. package/Common/Naming/index.d.ts +6 -4
  61. package/Common/Naming/index.js +64 -60
  62. package/Common/ResourceEnv.d.ts +2 -2
  63. package/Common/ResourceEnv.js +11 -10
  64. package/Common/StackEnv.js +2 -9
  65. package/Core/KeyGenetators.d.ts +16 -20
  66. package/Core/KeyGenetators.js +17 -16
  67. package/Core/Random.d.ts +4 -4
  68. package/Core/Random.js +10 -10
  69. package/Core/ResourceGroup.d.ts +12 -6
  70. package/Core/ResourceGroup.js +12 -24
  71. package/IOT/Hub/index.d.ts +4 -8
  72. package/IOT/Hub/index.js +19 -54
  73. package/KeyVault/Helper.d.ts +8 -6
  74. package/KeyVault/Helper.js +13 -19
  75. package/KeyVault/index.d.ts +1 -3
  76. package/KeyVault/index.js +2 -26
  77. package/Logs/Helpers.d.ts +35 -25
  78. package/Logs/Helpers.js +33 -20
  79. package/Logs/LogAnalytics.d.ts +2 -2
  80. package/Logs/LogAnalytics.js +15 -6
  81. package/Logs/index.d.ts +3 -3
  82. package/Logs/index.js +4 -4
  83. package/MySql/index.d.ts +2 -3
  84. package/MySql/index.js +16 -19
  85. package/{ReadMe.md → README.md} +6 -1
  86. package/Sql/index.d.ts +15 -9
  87. package/Sql/index.js +39 -41
  88. package/Storage/CdnEndpoint.d.ts +2 -2
  89. package/Storage/CdnEndpoint.js +14 -15
  90. package/Storage/Helper.d.ts +2 -2
  91. package/Storage/Helper.js +6 -6
  92. package/Storage/ManagementRules.d.ts +5 -23
  93. package/Storage/ManagementRules.js +3 -3
  94. package/Storage/index.d.ts +3 -3
  95. package/Storage/index.js +28 -28
  96. package/VM/AzureDevOpsExtension.d.ts +16 -0
  97. package/VM/AzureDevOpsExtension.js +14 -0
  98. package/VM/Extension.d.ts +15 -0
  99. package/VM/Extension.js +13 -0
  100. package/VM/GlobalSchedule.d.ts +10 -0
  101. package/VM/GlobalSchedule.js +20 -0
  102. package/VM/index.d.ts +18 -18
  103. package/VM/index.js +94 -57
  104. package/VNet/Bastion.d.ts +4 -4
  105. package/VNet/Bastion.js +12 -8
  106. package/VNet/Firewall.d.ts +19 -12
  107. package/VNet/Firewall.js +59 -40
  108. package/VNet/FirewallPolicies/AksFirewallPolicy.d.ts +16 -16
  109. package/VNet/FirewallPolicies/AksFirewallPolicy.js +193 -220
  110. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.d.ts +12 -10
  111. package/VNet/FirewallPolicies/CloudPCFirewallPolicy.js +170 -282
  112. package/VNet/FirewallPolicies/DefaultFirewallPolicy.d.ts +3 -0
  113. package/VNet/FirewallPolicies/DefaultFirewallPolicy.js +25 -0
  114. package/VNet/FirewallPolicies/index.d.ts +4 -0
  115. package/VNet/FirewallPolicies/index.js +10 -0
  116. package/VNet/FirewallPolicy.d.ts +14 -11
  117. package/VNet/FirewallPolicy.js +67 -74
  118. package/VNet/FirewallRules/AksFirewallRules.d.ts +4 -3
  119. package/VNet/FirewallRules/AksFirewallRules.js +101 -100
  120. package/VNet/Helper.d.ts +8 -4
  121. package/VNet/Helper.js +42 -35
  122. package/VNet/IpAddress.d.ts +6 -8
  123. package/VNet/IpAddress.js +6 -11
  124. package/VNet/IpAddressPrefix.d.ts +12 -9
  125. package/VNet/IpAddressPrefix.js +14 -13
  126. package/VNet/NSGRules/AppGatewaySecurityRule.d.ts +9 -0
  127. package/VNet/NSGRules/AppGatewaySecurityRule.js +46 -0
  128. package/VNet/NSGRules/AzADSecurityRule.d.ts +6 -0
  129. package/VNet/NSGRules/AzADSecurityRule.js +39 -0
  130. package/VNet/NSGRules/BastionSecurityRule.d.ts +9 -0
  131. package/VNet/NSGRules/BastionSecurityRule.js +93 -0
  132. package/VNet/NatGateway.d.ts +10 -0
  133. package/VNet/NatGateway.js +21 -0
  134. package/VNet/NetworkPeering.d.ts +7 -7
  135. package/VNet/NetworkPeering.js +29 -20
  136. package/VNet/PrivateDns.d.ts +8 -10
  137. package/VNet/PrivateDns.js +12 -14
  138. package/VNet/PrivateEndpoint.js +5 -2
  139. package/VNet/RouteTable.d.ts +7 -8
  140. package/VNet/RouteTable.js +6 -6
  141. package/VNet/SecurityGroup.d.ts +4 -4
  142. package/VNet/SecurityGroup.js +7 -3
  143. package/VNet/Subnet.d.ts +10 -7
  144. package/VNet/Subnet.js +4 -3
  145. package/VNet/VPNGateway.d.ts +13 -0
  146. package/VNet/VPNGateway.js +73 -0
  147. package/VNet/VirtualWAN.d.ts +7 -10
  148. package/VNet/VirtualWAN.js +1 -1
  149. package/VNet/Vnet.d.ts +29 -23
  150. package/VNet/Vnet.js +58 -121
  151. package/VNet/index.d.ts +17 -18
  152. package/VNet/index.js +41 -54
  153. package/VNet/types.d.ts +94 -0
  154. package/VNet/types.js +3 -0
  155. package/Web/types.d.ts +2 -134
  156. package/package.json +8 -8
  157. package/types.d.ts +22 -8
  158. package/z_tests/_tools/Mocks.js +12 -13
  159. package/Automation/AutoAccount.d.ts +0 -5
  160. package/Automation/AutoAccount.js +0 -18
  161. package/AzAd/Identities/AzDevOps.d.ts +0 -23
  162. package/AzAd/Identities/AzDevOps.js +0 -61
  163. package/AzAd/KeyVaultRoles.d.ts +0 -8
  164. package/AzAd/KeyVaultRoles.js +0 -53
  165. package/AzAd/ManagedIdentity.d.ts +0 -6
  166. package/AzAd/ManagedIdentity.js +0 -20
  167. package/AzAd/UserIdentity.d.ts +0 -5
  168. package/AzAd/UserIdentity.js +0 -12
  169. package/Common/Naming/AzureRegions.d.ts +0 -4
  170. package/Common/Naming/AzureRegions.js +0 -49
  171. package/KeyVault/VaultPermissions.d.ts +0 -27
  172. package/KeyVault/VaultPermissions.js +0 -226
  173. package/VNet/FirewallRules/types.d.ts +0 -20
  174. package/VNet/FirewallRules/types.js +0 -5
  175. package/VNet/NSGRules/AzADService.d.ts +0 -10
  176. package/VNet/NSGRules/AzADService.js +0 -45
package/Aks/index.js CHANGED
@@ -11,11 +11,8 @@ const Identity_1 = require("./Identity");
11
11
  const StackEnv_1 = require("../Common/StackEnv");
12
12
  const Helpers_1 = require("../Logs/Helpers");
13
13
  const Naming_1 = require("../Common/Naming");
14
- const PrivateDns_1 = require("../VNet/PrivateDns");
15
- const Helper_1 = require("../VNet/Helper");
16
14
  const RoleAssignment_1 = require("../AzAd/RoleAssignment");
17
- const Group_1 = require("../AzAd/Group");
18
- const Helper_2 = require("./Helper");
15
+ const Helper_1 = require("./Helper");
19
16
  const CustomHelper_1 = require("../KeyVault/CustomHelper");
20
17
  const KeyVaultBase_1 = require("@drunk-pulumi/azure-providers/AzBase/KeyVaultBase");
21
18
  const autoScaleFor = ({ enableAutoScaling, nodeType, env, }) => {
@@ -24,11 +21,11 @@ const autoScaleFor = ({ enableAutoScaling, nodeType, env, }) => {
24
21
  let maxCount = 3;
25
22
  if (env === AzureEnv_1.Environments.Prd) {
26
23
  switch (nodeType) {
27
- case 'User':
24
+ case "User":
28
25
  maxCount = 5;
29
26
  break;
30
- case 'Default':
31
- case 'System':
27
+ case "Default":
28
+ case "System":
32
29
  default:
33
30
  maxCount = 3;
34
31
  break;
@@ -42,12 +39,13 @@ const autoScaleFor = ({ enableAutoScaling, nodeType, env, }) => {
42
39
  };
43
40
  };
44
41
  const defaultNodePoolProps = {
45
- availabilityZones: AzureEnv_1.isPrd ? ['1', '2', '3'] : undefined,
42
+ availabilityZones: AzureEnv_1.isPrd ? ["1", "2", "3"] : undefined,
46
43
  type: native.containerservice.AgentPoolType.VirtualMachineScaleSets,
47
- vmSize: 'Standard_B2s',
44
+ vmSize: "Standard_B2s",
48
45
  maxPods: 50,
49
46
  enableFIPS: false,
50
47
  enableNodePublicIP: false,
48
+ //enableEncryptionAtHost: false,
51
49
  enableUltraSSD: AzureEnv_1.isPrd,
52
50
  osDiskSizeGB: 128,
53
51
  osDiskType: native.containerservice.OSDiskType.Managed,
@@ -55,127 +53,84 @@ const defaultNodePoolProps = {
55
53
  environment: AzureEnv_1.currentEnv,
56
54
  stack: StackEnv_1.stack,
57
55
  },
58
- tags: {
59
- environment: AzureEnv_1.currentEnv,
60
- },
61
56
  };
62
57
  var VmSizes;
63
58
  (function (VmSizes) {
64
59
  /** 32G RAM - 4CPU - $221.92 */
65
- VmSizes["Standard_E4as_v4_221"] = "Standard_E4as_v4";
60
+ VmSizes["Standard_E4as_v4"] = "Standard_E4as_v4";
66
61
  /** 8G RAM - 2CPU - $77.38 */
67
- VmSizes["Standard_B2ms_77"] = "Standard_B2ms";
62
+ VmSizes["Standard_B2ms"] = "Standard_B2ms";
68
63
  /** 16G RAM - 4CPU - $154.03 */
69
- VmSizes["Standard_B4ms_154"] = "Standard_B4ms";
64
+ VmSizes["Standard_B4ms"] = "Standard_B4ms";
70
65
  /** 8G RAM - 2CPU - 87.60 */
71
- VmSizes["Standard_D2as_v4_87"] = "Standard_D2as_v4";
66
+ VmSizes["Standard_D2as_v4"] = "Standard_D2as_v4";
72
67
  /** 8G RAM - 2CPU - 87.60 */
73
- VmSizes["Standard_D2s_v3_87"] = "Standard_D2s_v3";
68
+ VmSizes["Standard_D2s_v3"] = "Standard_D2s_v3";
69
+ /** 8G RAM - 4CPU - 182.5 */
70
+ VmSizes["Standard_D4s_v3"] = "Standard_D4s_v3";
74
71
  /** 16G RAM - 4CPU - $175.20 */
75
- VmSizes["Standard_D4as_v4_175"] = "Standard_D4as_v4";
72
+ VmSizes["Standard_D4as_v4"] = "Standard_D4as_v4";
76
73
  /** 4G RAM - 2CPU - $69.35 */
77
- VmSizes["Standard_A2_v2_69"] = "Standard_A2_v2";
74
+ VmSizes["Standard_A2_v2"] = "Standard_A2_v2";
78
75
  /** 8G RAM - 4CPU - $144.54 */
79
- VmSizes["Standard_A4_v2_144"] = "Standard_A4_v2";
76
+ VmSizes["Standard_A4_v2"] = "Standard_A4_v2";
80
77
  /** 32G RAM - 4CPU - $205.13 */
81
- VmSizes["Standard_A4m_v2_205"] = "Standard_A4m_v2";
78
+ VmSizes["Standard_A4m_v2"] = "Standard_A4m_v2";
82
79
  })(VmSizes || (exports.VmSizes = VmSizes = {}));
83
80
  //Using this to enable the preview feature https://azurecloudai.blog/2019/10/16/aks-enabling-and-using-preview-features-such-as-nodepools-using-cli/
84
- exports.default = async ({ group, nodeResourceGroup, name, linux,
85
- //kubernetesVersion,
86
- defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vaultInfo, featureFlags = { enableDiagnosticSetting: true }, addon = {
81
+ exports.default = async ({ group, name, linux, defaultNodePool, nodePools, network, logWpId, acr, aksAccess, vaultInfo, features = { enableDiagnosticSetting: true }, addon = {
87
82
  enableAzurePolicy: true,
88
- enableAzureKeyVault: true,
83
+ enableAzureKeyVault: false,
89
84
  enableKubeDashboard: false,
90
- }, tier = native.containerservice.ManagedClusterSKUTier.Free, lock = true, dependsOn = [], importFrom, }) => {
85
+ }, tier = native.containerservice.ManagedClusterSKUTier.Free, lock = true, dependsOn = [], importUri, ignoreChanges = [], }) => {
91
86
  const aksName = (0, Naming_1.getAksName)(name);
92
87
  const secretName = `${aksName}-config`;
93
88
  const acrScope = acr?.enable ? acr.id ?? AzureEnv_1.defaultScope : undefined;
94
- const disableLocalAccounts = vaultInfo
95
- ? await (0, KeyVaultBase_1.getKeyVaultBase)(vaultInfo.name).checkSecretExist(secretName)
96
- : false;
89
+ const nodeResourceGroup = (0, Naming_1.getResourceGroupName)(`${aksName}-nodes`);
90
+ const disableLocalAccounts = await (0, KeyVaultBase_1.getKeyVaultBase)(vaultInfo.name)
91
+ .checkSecretExist(secretName)
92
+ .catch(() => false);
97
93
  console.log(name, { disableLocalAccounts });
98
- nodeResourceGroup = nodeResourceGroup || `${aksName}-nodes`;
99
- // const appGateway =
100
- // addon.applicationGateway && network.outboundIpAddress
101
- // ? await AppGateway({
102
- // name,
103
- // group,
104
- // publicIpAddressId: network.outboundIpAddress.ipAddressId,
105
- // subnetId: addon.applicationGateway.gatewaySubnetId,
106
- // })
107
- // : undefined;
108
- // const podIdentity = featureFlags?.enablePodIdentity
109
- // ? ManagedIdentity({
110
- // name,
111
- // group,
112
- // lock,
113
- // })
114
- // : undefined;
115
- const serviceIdentity = featureFlags.createServicePrincipal
116
- ? (0, Identity_1.default)({
117
- name: aksName,
118
- vaultInfo,
119
- })
120
- : undefined;
121
- const adminGroup = aksAccess?.envRoleNames
122
- ? (0, Group_1.getAdGroup)(aksAccess.envRoleNames.admin)
123
- : undefined;
124
- const contributeGroup = aksAccess?.envRoleNames
125
- ? (0, Group_1.getAdGroup)(aksAccess.envRoleNames.contributor)
126
- : undefined;
127
- //const enableAzureRBAC = Boolean(aksAccess?.adminMembers && adminGroup);
94
+ ignoreChanges.push("privateLinkResources", "networkProfile", "linuxProfile");
95
+ const serviceIdentity = (0, Identity_1.default)({
96
+ name: aksName,
97
+ vaultInfo,
98
+ dependsOn,
99
+ });
128
100
  //=================Validate ===================================/
129
- if (!network?.subnetId) {
130
- console.error('Aks subnetId is required:', name);
131
- return undefined;
132
- }
133
- if (!linux?.sshKeys || !linux.sshKeys[0]) {
134
- console.error('Aks sshKeys is required:', name);
135
- return undefined;
136
- }
137
- //Private DNS Zone for Private CLuster
138
- const privateZone = aksAccess?.enablePrivateCluster
139
- ? (0, PrivateDns_1.default)({
140
- name: 'privatelink.southeastasia.azmk8s.io',
141
- group,
142
- vnetIds: [(0, pulumi_1.output)(network.subnetId).apply(Helper_1.getVnetIdFromSubnetId)],
143
- })
144
- : undefined;
101
+ // if (!linux?.sshKeys || !linux.sshKeys[0]) {
102
+ // console.error("Aks sshKeys is required:", name);
103
+ // return undefined;
104
+ // }
145
105
  //Create AKS Cluster
146
106
  const aks = new native.containerservice.ManagedCluster(aksName, {
147
107
  resourceName: aksName,
148
108
  ...group,
149
109
  nodeResourceGroup,
150
110
  dnsPrefix: aksName,
111
+ //fqdnSubdomain: '',
151
112
  //kubernetesVersion,
152
113
  apiServerAccessProfile: {
153
- authorizedIPRanges: aksAccess?.enablePrivateCluster
154
- ? []
114
+ authorizedIPRanges: features?.enablePrivateCluster
115
+ ? undefined
155
116
  : aksAccess?.authorizedIPRanges || [],
156
117
  disableRunCommand: true,
157
- enablePrivateCluster: aksAccess?.enablePrivateCluster,
158
- privateDNSZone: privateZone?.id,
118
+ enablePrivateCluster: features?.enablePrivateCluster,
119
+ enablePrivateClusterPublicFQDN: true,
120
+ privateDNSZone: "system",
159
121
  },
160
- //fqdnSubdomain: '',
161
122
  addonProfiles: {
162
123
  azureKeyvaultSecretsProvider: {
163
124
  config: addon.enableAzureKeyVault
164
125
  ? {
165
- enableSecretRotation: 'true',
126
+ enableSecretRotation: "true",
166
127
  }
167
128
  : undefined,
168
129
  enabled: Boolean(addon.enableAzureKeyVault),
169
130
  },
170
131
  azurePolicy: { enabled: Boolean(addon.enableAzurePolicy) },
171
132
  kubeDashboard: { enabled: Boolean(addon.enableKubeDashboard) },
172
- //If there is no public P address provided, the public app can access via HTTP app routing only and feature only support HTTP.
173
- //TO enable HTTPS support need to create a cluster with a public IP address.
174
- httpApplicationRouting: {
175
- enabled: !network.outboundIpAddress?.ipAddressId &&
176
- !network.enableFirewall &&
177
- !aksAccess?.enablePrivateCluster,
178
- },
133
+ httpApplicationRouting: { enabled: false },
179
134
  aciConnectorLinux: {
180
135
  enabled: Boolean(network.virtualHostSubnetName),
181
136
  config: network.virtualHostSubnetName
@@ -192,10 +147,10 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
192
147
  : undefined,
193
148
  },
194
149
  omsAgent: {
195
- enabled: Boolean(log?.logWpId),
196
- config: log
150
+ enabled: Boolean(logWpId),
151
+ config: logWpId
197
152
  ? {
198
- logAnalyticsWorkspaceResourceID: log.logWpId,
153
+ logAnalyticsWorkspaceResourceID: logWpId,
199
154
  }
200
155
  : undefined,
201
156
  },
@@ -204,26 +159,29 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
204
159
  name: native.containerservice.ManagedClusterSKUName.Base,
205
160
  tier,
206
161
  },
162
+ supportPlan: native.containerservice.KubernetesSupportPlan.KubernetesOfficial,
207
163
  agentPoolProfiles: [
208
164
  {
209
165
  ...defaultNodePoolProps,
210
166
  ...defaultNodePool,
211
167
  ...autoScaleFor({
212
168
  env: AzureEnv_1.currentEnv,
213
- nodeType: defaultNodePool.mode,
214
- enableAutoScaling: enableAutoScale,
169
+ nodeType: "System",
170
+ enableAutoScaling: features?.enableAutoScale,
171
+ // powerState: {
172
+ // code: "Running",
173
+ // },
174
+ // upgradeSettings: {
175
+ // maxSurge: "10%",
176
+ // },
215
177
  }),
216
- count: defaultNodePool.mode === 'System' ? 1 : 0,
217
- //orchestratorVersion: kubernetesVersion,
178
+ name: "defaultnodes",
179
+ mode: "System",
180
+ count: 1,
218
181
  vnetSubnetID: network.subnetId,
219
- kubeletDiskType: 'OS',
220
- osSKU: 'Ubuntu',
221
- osType: 'Linux',
222
- //upgradeSettings: {},
223
- tags: {
224
- ...defaultNodePoolProps.tags,
225
- mode: defaultNodePool.mode,
226
- },
182
+ kubeletDiskType: "OS",
183
+ osSKU: "Ubuntu",
184
+ osType: "Linux",
227
185
  },
228
186
  ],
229
187
  linuxProfile: linux
@@ -232,51 +190,54 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
232
190
  ssh: { publicKeys: linux.sshKeys.map((k) => ({ keyData: k })) },
233
191
  }
234
192
  : undefined,
193
+ //This is not inuse
194
+ windowsProfile: {
195
+ adminUsername: "azureuser",
196
+ enableCSIProxy: true,
197
+ },
235
198
  autoScalerProfile: {
236
- balanceSimilarNodeGroups: 'true',
237
- expander: 'random',
238
- maxEmptyBulkDelete: '10',
239
- maxGracefulTerminationSec: '600',
240
- maxNodeProvisionTime: '15m',
241
- maxTotalUnreadyPercentage: '45',
242
- newPodScaleUpDelay: '0s',
243
- okTotalUnreadyCount: '3',
244
- scaleDownDelayAfterAdd: '30m',
245
- scaleDownDelayAfterDelete: '60s',
246
- scaleDownDelayAfterFailure: '10m',
247
- scaleDownUnneededTime: '10m',
248
- scaleDownUnreadyTime: '20m',
249
- scaleDownUtilizationThreshold: '0.5',
250
- scanInterval: '60s',
251
- skipNodesWithLocalStorage: 'false',
252
- skipNodesWithSystemPods: 'true',
199
+ balanceSimilarNodeGroups: "true",
200
+ expander: "random",
201
+ maxEmptyBulkDelete: "10",
202
+ maxGracefulTerminationSec: "600",
203
+ maxNodeProvisionTime: "15m",
204
+ maxTotalUnreadyPercentage: "45",
205
+ newPodScaleUpDelay: "0s",
206
+ okTotalUnreadyCount: "3",
207
+ scaleDownDelayAfterAdd: "30m",
208
+ scaleDownDelayAfterDelete: "60s",
209
+ scaleDownDelayAfterFailure: "10m",
210
+ scaleDownUnneededTime: "10m",
211
+ scaleDownUnreadyTime: "20m",
212
+ scaleDownUtilizationThreshold: "0.5",
213
+ scanInterval: "60s",
214
+ skipNodesWithLocalStorage: "false",
215
+ skipNodesWithSystemPods: "true",
253
216
  },
254
217
  //Still under preview
255
218
  // workloadAutoScalerProfile: enableAutoScale
256
219
  // ? { keda: { enabled: true } }
257
220
  // : undefined,
258
- servicePrincipalProfile: serviceIdentity
259
- ? {
260
- clientId: serviceIdentity.clientId,
261
- secret: serviceIdentity.clientSecret,
262
- }
263
- : undefined,
221
+ //azureMonitorProfile: { metrics: { enabled } },
222
+ //Refer here for details https://learn.microsoft.com/en-us/azure/aks/use-managed-identity
223
+ //enablePodSecurityPolicy: true,
224
+ servicePrincipalProfile: {
225
+ clientId: serviceIdentity.clientId,
226
+ secret: serviceIdentity.clientSecret,
227
+ },
264
228
  securityProfile: {
265
- defender: AzureEnv_1.isPrd
229
+ defender: logWpId && AzureEnv_1.isPrd
266
230
  ? {
267
- logAnalyticsWorkspaceResourceId: log?.logWpId,
231
+ logAnalyticsWorkspaceResourceId: logWpId,
268
232
  securityMonitoring: { enabled: true },
269
233
  }
270
234
  : undefined,
271
235
  imageCleaner: { enabled: true, intervalHours: 24 },
272
236
  workloadIdentity: { enabled: false },
273
237
  },
274
- //azureMonitorProfile: { metrics: { enabled } },
275
- //Refer here for details https://learn.microsoft.com/en-us/azure/aks/use-managed-identity
276
- enablePodSecurityPolicy: false,
277
- podIdentityProfile: featureFlags.enablePodIdentity
238
+ podIdentityProfile: features.enablePodIdentity
278
239
  ? {
279
- enabled: featureFlags.enablePodIdentity,
240
+ enabled: features.enablePodIdentity,
280
241
  //Not allow pod to use kublet command
281
242
  allowNetworkPluginKubenet: false,
282
243
  }
@@ -284,28 +245,21 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
284
245
  identity: {
285
246
  type: native.containerservice.ResourceIdentityType.SystemAssigned,
286
247
  },
287
- // identityProfile: podIdentity
288
- // ? {
289
- // kubeletidentity: {
290
- // clientId: podIdentity.clientId,
291
- // objectId: podIdentity.principalId,
292
- // resourceId: podIdentity.id,
293
- // },
294
- // }
295
- // : undefined,
296
- //Preview Features
297
248
  autoUpgradeProfile: {
298
249
  upgradeChannel: native.containerservice.UpgradeChannel.Patch,
250
+ //nodeOSUpgradeChannel: "NodeImage",
299
251
  },
300
- //securityProfile:{},
301
252
  disableLocalAccounts,
302
253
  enableRBAC: true,
303
- aadProfile: {
304
- enableAzureRBAC: true,
305
- managed: true,
306
- adminGroupObjectIDs: adminGroup ? [adminGroup.objectId] : undefined,
307
- tenantID: AzureEnv_1.tenantId,
308
- },
254
+ aadProfile: aksAccess?.envRoles
255
+ ? {
256
+ enableAzureRBAC: true,
257
+ managed: true,
258
+ adminGroupObjectIDs: [aksAccess.envRoles.admin.objectId],
259
+ tenantID: AzureEnv_1.tenantId,
260
+ }
261
+ : undefined,
262
+ oidcIssuerProfile: { enabled: false },
309
263
  storageProfile: {
310
264
  blobCSIDriver: {
311
265
  enabled: true,
@@ -314,6 +268,7 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
314
268
  enabled: true,
315
269
  },
316
270
  fileCSIDriver: { enabled: true },
271
+ snapshotController: { enabled: true },
317
272
  },
318
273
  networkProfile: {
319
274
  networkMode: native.containerservice.NetworkMode.Transparent,
@@ -322,20 +277,17 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
322
277
  //dnsServiceIP: '10.0.0.10',
323
278
  //dockerBridgeCidr: '172.17.0.1/16',
324
279
  //serviceCidr: '10.0.0.0/16',
325
- outboundType: network.enableFirewall || aksAccess?.enablePrivateCluster
280
+ outboundType: features?.enablePrivateCluster || !network.outboundIpAddress
326
281
  ? native.containerservice.OutboundType.UserDefinedRouting
327
282
  : native.containerservice.OutboundType.LoadBalancer,
328
- loadBalancerSku: network.outboundIpAddress?.ipAddressId ||
329
- network.enableFirewall ||
330
- aksAccess?.enablePrivateCluster
331
- ? 'Standard'
332
- : 'Basic',
333
- loadBalancerProfile: network.outboundIpAddress &&
334
- !(network.enableFirewall || aksAccess?.enablePrivateCluster)
283
+ loadBalancerSku: "Standard",
284
+ loadBalancerProfile: network.outboundIpAddress
335
285
  ? {
336
- outboundIPs: {
337
- publicIPs: [{ id: network.outboundIpAddress.ipAddressId }],
338
- },
286
+ outboundIPs: network.outboundIpAddress.ipAddressId
287
+ ? {
288
+ publicIPs: [{ id: network.outboundIpAddress.ipAddressId }],
289
+ }
290
+ : undefined,
339
291
  outboundIPPrefixes: network.outboundIpAddress.ipAddressPrefixId
340
292
  ? {
341
293
  publicIPPrefixes: [
@@ -348,13 +300,28 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
348
300
  },
349
301
  }, {
350
302
  protect: lock,
351
- dependsOn: serviceIdentity
352
- ? [...dependsOn, serviceIdentity.resource]
353
- : dependsOn,
354
- import: importFrom,
303
+ dependsOn: serviceIdentity.resource,
304
+ import: importUri,
355
305
  deleteBeforeReplace: true,
356
- ignoreChanges: ['privateLinkResources', 'networkProfile', 'linuxProfile'],
306
+ ignoreChanges,
357
307
  });
308
+ new native.containerservice.MaintenanceConfiguration(`${aksName}-MaintenanceConfiguration`, {
309
+ configName: "default",
310
+ // notAllowedTime: [
311
+ // {
312
+ // end: "2020-11-30T12:00:00Z",
313
+ // start: "2020-11-26T03:00:00Z",
314
+ // },
315
+ // ],
316
+ ...group,
317
+ resourceName: aks.name,
318
+ timeInWeek: [
319
+ {
320
+ day: native.containerservice.WeekDay.Sunday,
321
+ hourSlots: [0, 23],
322
+ },
323
+ ],
324
+ }, { dependsOn: aks });
358
325
  if (lock) {
359
326
  (0, Locker_1.default)({ name: aksName, resource: aks });
360
327
  }
@@ -368,26 +335,21 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
368
335
  ...autoScaleFor({
369
336
  env: AzureEnv_1.currentEnv,
370
337
  nodeType: p.mode,
371
- enableAutoScaling: enableAutoScale,
338
+ enableAutoScaling: features.enableAutoScale,
372
339
  }),
373
- count: p.mode === 'System' ? 1 : 0,
340
+ count: p.mode === "System" ? 1 : 0,
374
341
  //orchestratorVersion: kubernetesVersion,
375
342
  vnetSubnetID: network.subnetId,
376
- kubeletDiskType: 'OS',
377
- osSKU: 'Ubuntu',
378
- osType: 'Linux',
379
- //upgradeSettings: {},
380
- tags: {
381
- ...defaultNodePoolProps.tags,
382
- mode: p.mode,
383
- },
343
+ kubeletDiskType: "OS",
344
+ osSKU: "Ubuntu",
345
+ osType: "Linux",
384
346
  }));
385
347
  }
386
348
  if (vaultInfo) {
387
349
  aks.id.apply(async (id) => {
388
350
  if (!id)
389
351
  return;
390
- const config = await (0, Helper_2.getAksConfig)({
352
+ const config = await (0, Helper_1.getAksConfig)({
391
353
  name: aksName,
392
354
  groupName: group.resourceGroupName,
393
355
  formattedName: true,
@@ -396,6 +358,7 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
396
358
  (0, CustomHelper_1.addCustomSecret)({
397
359
  name: secretName,
398
360
  value: config,
361
+ formattedName: true,
399
362
  dependsOn: aks,
400
363
  ignoreChange: true,
401
364
  contentType: name,
@@ -407,151 +370,72 @@ defaultNodePool, nodePools, enableAutoScale, network, log, acr, aksAccess, vault
407
370
  aks.id.apply(async (id) => {
408
371
  if (!id)
409
372
  return;
410
- //Admin
411
- if (adminGroup) {
412
- await Promise.all([
413
- {
414
- shortName: 'Admin-Contributor-Role',
415
- name: 'Azure Kubernetes Service Contributor Role',
416
- },
417
- {
418
- shortName: 'Admin-RBAC-Cluster-Admin',
419
- name: 'Azure Kubernetes Service RBAC Cluster Admin',
420
- },
421
- {
422
- shortName: 'Admin-Cluster-Admin-Role',
423
- name: 'Azure Kubernetes Service Cluster Admin Role',
424
- },
425
- {
426
- shortName: 'Admin-Cluster-Monitoring-User',
427
- name: 'Azure Kubernetes Service Cluster Monitoring User',
428
- },
429
- {
430
- shortName: 'Admin-Cluster-User-Role',
431
- name: 'Azure Kubernetes Service Cluster User Role',
432
- },
433
- ].map((r) => (0, RoleAssignment_1.roleAssignment)({
434
- name: `${name}-${r.shortName}`,
435
- principalId: adminGroup.objectId,
436
- principalType: 'Group',
437
- roleName: r.name,
438
- scope: id,
439
- })));
440
- }
441
- //Contributor
442
- if (contributeGroup) {
443
- await Promise.all([
444
- {
445
- shortName: 'Contributor-Contributor-Role',
446
- name: 'Azure Kubernetes Service Contributor Role',
447
- },
448
- {
449
- shortName: 'Contributor-RBAC-Admin',
450
- name: 'Azure Kubernetes Service RBAC Admin',
451
- },
452
- {
453
- shortName: 'Contributor-RBAC-Reader',
454
- name: 'Azure Kubernetes Service RBAC Reader',
455
- },
456
- {
457
- shortName: 'Contributor-RBAC-Writer',
458
- name: 'Azure Kubernetes Service RBAC Writer',
459
- },
460
- ].map((r) => (0, RoleAssignment_1.roleAssignment)({
461
- name: `${name}-${r.shortName}`,
462
- principalId: contributeGroup.objectId,
463
- principalType: 'Group',
464
- roleName: r.name,
465
- scope: id,
466
- })));
467
- }
373
+ //Grant Permission for Identity
374
+ pulumi
375
+ .all([aks.identity, aks.identityProfile, network.subnetId])
376
+ .apply(([identity, identityProfile, sId]) => {
377
+ if (acrScope && identityProfile && identityProfile["kubeletidentity"]) {
378
+ (0, RoleAssignment_1.roleAssignment)({
379
+ name: `${name}-aks-identity-profile-pull`,
380
+ principalId: identityProfile["kubeletidentity"].objectId,
381
+ principalType: "ServicePrincipal",
382
+ roleName: "AcrPull",
383
+ scope: acrScope,
384
+ });
385
+ if (vaultInfo) {
386
+ (0, CustomHelper_1.addCustomSecret)({
387
+ name: `${name}-identity-clientId`,
388
+ value: identityProfile["kubeletidentity"].clientId,
389
+ dependsOn: aks,
390
+ contentType: name,
391
+ vaultInfo,
392
+ });
393
+ }
394
+ }
395
+ if (network.subnetId && identity) {
396
+ (0, RoleAssignment_1.roleAssignment)({
397
+ name: `${name}-system-net`,
398
+ principalId: identity.principalId,
399
+ roleName: "Contributor",
400
+ principalType: "ServicePrincipal",
401
+ scope: (0, AzureEnv_1.getResourceIdFromInfo)({
402
+ group: (0, AzureEnv_1.parseResourceInfoFromId)(sId).group,
403
+ }),
404
+ });
405
+ }
406
+ });
468
407
  //Diagnostic
469
- if (featureFlags.enableDiagnosticSetting) {
408
+ if (features.enableDiagnosticSetting && logWpId) {
470
409
  (0, Helpers_1.createDiagnostic)({
471
410
  name,
472
411
  targetResourceId: id,
473
- ...log,
412
+ logWpId,
474
413
  logsCategories: [
475
- 'guard',
476
- 'kube-controller-manager',
477
- 'kube-audit-admin',
478
- 'kube-audit',
479
- 'kube-scheduler',
480
- 'cluster-autoscaler',
414
+ "guard",
415
+ "kube-controller-manager",
416
+ "kube-audit-admin",
417
+ "kube-audit",
418
+ "kube-scheduler",
419
+ "cluster-autoscaler",
481
420
  ],
421
+ dependsOn: aks,
482
422
  });
483
- }
484
- });
485
- //Grant Permission for Identity
486
- pulumi
487
- .all([aks.identity, aks.identityProfile, network.subnetId])
488
- .apply(([identity, identityProfile, sId]) => {
489
- console.log('Grant RBAC for cluster:', name);
490
- //Already assigned when creating the service
491
- // if (serviceIdentity?.principalId) {
492
- // await roleAssignment({
493
- // name: `${name}-aks-identity-acr-pull`,
494
- // principalId: serviceIdentity?.principalId,
495
- // principalType: 'ServicePrincipal',
496
- // roleName: 'AcrPull',
497
- // scope: defaultScope,
498
- // });
499
- // }
500
- if (acrScope && identityProfile && identityProfile['kubeletidentity']) {
501
- (0, RoleAssignment_1.roleAssignment)({
502
- name: `${name}-aks-identity-profile-pull`,
503
- principalId: identityProfile['kubeletidentity'].objectId,
504
- principalType: 'ServicePrincipal',
505
- roleName: 'AcrPull',
506
- scope: acrScope,
507
- });
508
- if (vaultInfo) {
509
- (0, CustomHelper_1.addCustomSecret)({
510
- name: `${name}-identity-clientId`,
511
- value: identityProfile['kubeletidentity'].clientId,
512
- dependsOn: aks,
513
- contentType: name,
514
- vaultInfo,
515
- });
516
- }
517
- }
518
- // if (identity?.principalId) {
519
- // await roleAssignment({
520
- // name: `${name}-system-acr-pull`,
521
- // principalId: identity.principalId,
522
- // principalType: 'ServicePrincipal',
523
- // roleName: 'AcrPull',
524
- // scope: defaultScope,
525
- // });
526
- // }
527
- if (network.subnetId && identity) {
528
- (0, RoleAssignment_1.roleAssignment)({
529
- name: `${name}-system-net`,
530
- principalId: identity.principalId,
531
- roleName: 'Contributor',
532
- principalType: 'ServicePrincipal',
533
- scope: (0, AzureEnv_1.getResourceIdFromInfo)({
534
- group: (0, AzureEnv_1.getResourceInfoFromId)(sId).group,
535
- }),
536
- });
537
- }
538
- if (privateZone && identity) {
539
- (0, RoleAssignment_1.roleAssignment)({
540
- name: `${name}-private-dns`,
541
- principalId: identity.principalId,
542
- roleName: 'Private DNS Zone Contributor',
543
- principalType: 'ServicePrincipal',
544
- scope: privateZone.id,
423
+ //Apply monitoring for VMScale Sets
424
+ (0, VmSetMonitor_1.default)({
425
+ group: { resourceGroupName: nodeResourceGroup },
426
+ logWpId,
427
+ vaultInfo,
428
+ dependsOn: aks,
545
429
  });
546
430
  }
547
431
  });
548
- //Apply monitoring for VMScale Sets
549
- (0, VmSetMonitor_1.default)({
550
- group: { resourceGroupName: nodeResourceGroup },
551
- ...log,
552
- vaultInfo,
553
- dependsOn: aks,
554
- });
555
- return { aks, serviceIdentity, adminGroup, privateZone };
432
+ return {
433
+ aks,
434
+ serviceIdentity,
435
+ disableLocalAccounts,
436
+ getKubeConfig: () => (0, pulumi_1.output)((0, KeyVaultBase_1.getKeyVaultBase)(vaultInfo.name)
437
+ .getSecret(secretName)
438
+ .then((s) => s.value)),
439
+ };
556
440
  };
557
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/Aks/index.ts"],"names":[],"mappings":";;;AAAA,+CAA+C;AAC/C,yCAAyC;AACzC,2CAA+C;AAC/C,iDAA2C;AAE3C,iDAQ4B;AAC5B,2CAAoC;AACpC,yCAA4C;AAC5C,iDAA2C;AAC3C,6CAAmD;AACnD,6CAA8C;AAC9C,mDAA4C;AAC5C,2CAAuD;AACvD,2DAAwD;AACxD,yCAA2C;AAE3C,qCAAwC;AACxC,2DAA2D;AAE3D,oFAAoF;AAEpF,MAAM,YAAY,GAAG,CAAC,EACpB,iBAAiB,EACjB,QAAQ,EACR,GAAG,GAKJ,EAAE,EAAE;IACH,MAAM,SAAS,GAAG,CAAC,CAAC;IACpB,MAAM,QAAQ,GAAG,CAAC,CAAC;IACnB,IAAI,QAAQ,GAAG,CAAC,CAAC;IAEjB,IAAI,GAAG,KAAK,uBAAY,CAAC,GAAG,EAAE,CAAC;QAC7B,QAAQ,QAAQ,EAAE,CAAC;YACjB,KAAK,MAAM;gBACT,QAAQ,GAAG,CAAC,CAAC;gBACb,MAAM;YAER,KAAK,SAAS,CAAC;YACf,KAAK,QAAQ,CAAC;YACd;gBACE,QAAQ,GAAG,CAAC,CAAC;gBACb,MAAM;QACV,CAAC;IACH,CAAC;IAED,OAAO;QACL,iBAAiB;QACjB,SAAS,EAAE,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS;QACpD,QAAQ,EAAE,iBAAiB,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS;QAClD,QAAQ,EAAE,iBAAiB,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS;KACnD,CAAC;AACJ,CAAC,CAAC;AAEF,MAAM,oBAAoB,GAAG;IAC3B,iBAAiB,EAAE,gBAAK,CAAC,CAAC,CAAC,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS;IACtD,IAAI,EAAE,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,uBAAuB;IACnE,MAAM,EAAE,cAAc;IAEtB,OAAO,EAAE,EAAE;IACX,UAAU,EAAE,KAAK;IACjB,kBAAkB,EAAE,KAAK;IAEzB,cAAc,EAAE,gBAAK;IACrB,YAAY,EAAE,GAAG;IACjB,UAAU,EAAE,MAAM,CAAC,gBAAgB,CAAC,UAAU,CAAC,OAAO;IAEtD,UAAU,EAAE;QACV,WAAW,EAAE,qBAAU;QACvB,KAAK,EAAL,gBAAK;KACN;IAED,IAAI,EAAE;QACJ,WAAW,EAAE,qBAAU;KACxB;CACF,CAAC;AAEF,IAAY,OAmBX;AAnBD,WAAY,OAAO;IACjB,+BAA+B;IAC/B,oDAAyC,CAAA;IACzC,6BAA6B;IAC7B,6CAAkC,CAAA;IAClC,+BAA+B;IAC/B,8CAAmC,CAAA;IACnC,4BAA4B;IAC5B,mDAAwC,CAAA;IACxC,4BAA4B;IAC5B,iDAAsC,CAAA;IACtC,+BAA+B;IAC/B,oDAAyC,CAAA;IACzC,6BAA6B;IAC7B,+CAAoC,CAAA;IACpC,8BAA8B;IAC9B,gDAAqC,CAAA;IACrC,+BAA+B;IAC/B,kDAAuC,CAAA;AACzC,CAAC,EAnBW,OAAO,uBAAP,OAAO,QAmBlB;AAuED,oJAAoJ;AACpJ,kBAAe,KAAK,EAAE,EACpB,KAAK,EACL,iBAAiB,EACjB,IAAI,EACJ,KAAK;AACL,oBAAoB;AACpB,eAAe,EACf,SAAS,EACT,eAAe,EACf,OAAO,EACP,GAAG,EACH,GAAG,EACH,SAAS,EACT,SAAS,EACT,YAAY,GAAG,EAAE,uBAAuB,EAAE,IAAI,EAAE,EAChD,KAAK,GAAG;IACN,iBAAiB,EAAE,IAAI;IACvB,mBAAmB,EAAE,IAAI;IACzB,mBAAmB,EAAE,KAAK;CAC3B,EACD,IAAI,GAAG,MAAM,CAAC,gBAAgB,CAAC,qBAAqB,CAAC,IAAI,EACzD,IAAI,GAAG,IAAI,EACX,SAAS,GAAG,EAAE,EACd,UAAU,GACD,EAAE,EAAE;IACb,MAAM,OAAO,GAAG,IAAA,mBAAU,EAAC,IAAI,CAAC,CAAC;IACjC,MAAM,UAAU,GAAG,GAAG,OAAO,SAAS,CAAC;IACvC,MAAM,QAAQ,GAAG,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,EAAE,IAAI,uBAAY,CAAC,CAAC,CAAC,SAAS,CAAC;IAClE,MAAM,oBAAoB,GAAG,SAAS;QACpC,CAAC,CAAC,MAAM,IAAA,8BAAe,EAAC,SAAS,CAAC,IAAI,CAAC,CAAC,gBAAgB,CAAC,UAAU,CAAC;QACpE,CAAC,CAAC,KAAK,CAAC;IACV,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,oBAAoB,EAAE,CAAC,CAAC;IAC5C,iBAAiB,GAAG,iBAAiB,IAAI,GAAG,OAAO,QAAQ,CAAC;IAE5D,qBAAqB;IACrB,0DAA0D;IAC1D,2BAA2B;IAC3B,gBAAgB;IAChB,iBAAiB;IACjB,oEAAoE;IACpE,8DAA8D;IAC9D,WAAW;IACX,mBAAmB;IAEnB,sDAAsD;IACtD,wBAAwB;IACxB,cAAc;IACd,eAAe;IACf,cAAc;IACd,SAAS;IACT,iBAAiB;IAEjB,MAAM,eAAe,GAAG,YAAY,CAAC,sBAAsB;QACzD,CAAC,CAAC,IAAA,kBAAkB,EAAC;YACjB,IAAI,EAAE,OAAO;YACb,SAAS;SACV,CAAC;QACJ,CAAC,CAAC,SAAS,CAAC;IAEd,MAAM,UAAU,GAAG,SAAS,EAAE,YAAY;QACxC,CAAC,CAAC,IAAA,kBAAU,EAAC,SAAS,CAAC,YAAY,CAAC,KAAK,CAAC;QAC1C,CAAC,CAAC,SAAS,CAAC;IAEd,MAAM,eAAe,GAAG,SAAS,EAAE,YAAY;QAC7C,CAAC,CAAC,IAAA,kBAAU,EAAC,SAAS,CAAC,YAAY,CAAC,WAAW,CAAC;QAChD,CAAC,CAAC,SAAS,CAAC;IAEd,yEAAyE;IAEzE,gEAAgE;IAChE,IAAI,CAAC,OAAO,EAAE,QAAQ,EAAE,CAAC;QACvB,OAAO,CAAC,KAAK,CAAC,2BAA2B,EAAE,IAAI,CAAC,CAAC;QACjD,OAAO,SAAS,CAAC;IACnB,CAAC;IACD,IAAI,CAAC,KAAK,EAAE,OAAO,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;QACzC,OAAO,CAAC,KAAK,CAAC,0BAA0B,EAAE,IAAI,CAAC,CAAC;QAChD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,sCAAsC;IACtC,MAAM,WAAW,GAAG,SAAS,EAAE,oBAAoB;QACjD,CAAC,CAAC,IAAA,oBAAU,EAAC;YACT,IAAI,EAAE,qCAAqC;YAC3C,KAAK;YACL,OAAO,EAAE,CAAC,IAAA,eAAM,EAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,KAAK,CAAC,8BAAqB,CAAC,CAAC;SACjE,CAAC;QACJ,CAAC,CAAC,SAAS,CAAC;IAEd,oBAAoB;IACpB,MAAM,GAAG,GAAG,IAAI,MAAM,CAAC,gBAAgB,CAAC,cAAc,CACpD,OAAO,EACP;QACE,YAAY,EAAE,OAAO;QACrB,GAAG,KAAK;QACR,iBAAiB;QACjB,SAAS,EAAE,OAAO;QAClB,oBAAoB;QAEpB,sBAAsB,EAAE;YACtB,kBAAkB,EAAE,SAAS,EAAE,oBAAoB;gBACjD,CAAC,CAAC,EAAE;gBACJ,CAAC,CAAC,SAAS,EAAE,kBAAkB,IAAI,EAAE;YACvC,iBAAiB,EAAE,IAAI;YACvB,oBAAoB,EAAE,SAAS,EAAE,oBAAoB;YACrD,cAAc,EAAE,WAAW,EAAE,EAAE;SAChC;QACD,oBAAoB;QAEpB,aAAa,EAAE;YACb,4BAA4B,EAAE;gBAC5B,MAAM,EAAE,KAAK,CAAC,mBAAmB;oBAC/B,CAAC,CAAC;wBACE,oBAAoB,EAAE,MAAM;qBAC7B;oBACH,CAAC,CAAC,SAAS;gBACb,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,mBAAmB,CAAC;aAC5C;YAED,WAAW,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,iBAAiB,CAAC,EAAE;YAC1D,aAAa,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,mBAAmB,CAAC,EAAE;YAC9D,8HAA8H;YAC9H,4EAA4E;YAC5E,sBAAsB,EAAE;gBACtB,OAAO,EACL,CAAC,OAAO,CAAC,iBAAiB,EAAE,WAAW;oBACvC,CAAC,OAAO,CAAC,cAAc;oBACvB,CAAC,SAAS,EAAE,oBAAoB;aACnC;YAED,iBAAiB,EAAE;gBACjB,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,qBAAqB,CAAC;gBAC/C,MAAM,EAAE,OAAO,CAAC,qBAAqB;oBACnC,CAAC,CAAC,EAAE,UAAU,EAAE,OAAO,CAAC,qBAAqB,EAAE;oBAC/C,CAAC,CAAC,SAAS;aACd;YAED,yBAAyB,EAAE;gBACzB,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,kBAAkB,CAAC;gBAC1C,MAAM,EAAE,KAAK,CAAC,kBAAkB;oBAC9B,CAAC,CAAC;wBACE,WAAW,EAAE,GAAG,IAAI,UAAU;wBAC9B,QAAQ,EAAE,KAAK,CAAC,kBAAkB,CAAC,eAAe;qBACnD;oBACH,CAAC,CAAC,SAAS;aACd;YAED,QAAQ,EAAE;gBACR,OAAO,EAAE,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC;gBAC9B,MAAM,EAAE,GAAG;oBACT,CAAC,CAAC;wBACE,+BAA+B,EAAE,GAAG,CAAC,OAAQ;qBAC9C;oBACH,CAAC,CAAC,SAAS;aACd;SACF;QAED,GAAG,EAAE;YACH,IAAI,EAAE,MAAM,CAAC,gBAAgB,CAAC,qBAAqB,CAAC,IAAI;YACxD,IAAI;SACL;QAED,iBAAiB,EAAE;YACjB;gBACE,GAAG,oBAAoB;gBACvB,GAAG,eAAe;gBAElB,GAAG,YAAY,CAAC;oBACd,GAAG,EAAE,qBAAU;oBACf,QAAQ,EAAE,eAAe,CAAC,IAAI;oBAC9B,iBAAiB,EAAE,eAAe;iBACnC,CAAC;gBAEF,KAAK,EAAE,eAAe,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;gBAChD,yCAAyC;gBACzC,YAAY,EAAE,OAAO,CAAC,QAAQ;gBAC9B,eAAe,EAAE,IAAI;gBACrB,KAAK,EAAE,QAAQ;gBACf,MAAM,EAAE,OAAO;gBAEf,sBAAsB;gBACtB,IAAI,EAAE;oBACJ,GAAG,oBAAoB,CAAC,IAAI;oBAC5B,IAAI,EAAE,eAAe,CAAC,IAAI;iBAC3B;aACF;SACF;QAED,YAAY,EAAE,KAAK;YACjB,CAAC,CAAC;gBACE,aAAa,EAAE,KAAK,CAAC,aAAa;gBAClC,GAAG,EAAE,EAAE,UAAU,EAAE,KAAK,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,CAAC,CAAC,EAAE;aAChE;YACH,CAAC,CAAC,SAAS;QAEb,iBAAiB,EAAE;YACjB,wBAAwB,EAAE,MAAM;YAChC,QAAQ,EAAE,QAAQ;YAClB,kBAAkB,EAAE,IAAI;YACxB,yBAAyB,EAAE,KAAK;YAChC,oBAAoB,EAAE,KAAK;YAC3B,yBAAyB,EAAE,IAAI;YAC/B,kBAAkB,EAAE,IAAI;YACxB,mBAAmB,EAAE,GAAG;YACxB,sBAAsB,EAAE,KAAK;YAC7B,yBAAyB,EAAE,KAAK;YAChC,0BAA0B,EAAE,KAAK;YACjC,qBAAqB,EAAE,KAAK;YAC5B,oBAAoB,EAAE,KAAK;YAC3B,6BAA6B,EAAE,KAAK;YACpC,YAAY,EAAE,KAAK;YACnB,yBAAyB,EAAE,OAAO;YAClC,uBAAuB,EAAE,MAAM;SAChC;QAED,qBAAqB;QACrB,6CAA6C;QAC7C,kCAAkC;QAClC,iBAAiB;QAEjB,uBAAuB,EAAE,eAAe;YACtC,CAAC,CAAC;gBACE,QAAQ,EAAE,eAAe,CAAC,QAAQ;gBAClC,MAAM,EAAE,eAAe,CAAC,YAAY;aACrC;YACH,CAAC,CAAC,SAAS;QAEb,eAAe,EAAE;YACf,QAAQ,EAAE,gBAAK;gBACb,CAAC,CAAC;oBACE,+BAA+B,EAAE,GAAG,EAAE,OAAO;oBAC7C,kBAAkB,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE;iBACtC;gBACH,CAAC,CAAC,SAAS;YACb,YAAY,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE,aAAa,EAAE,EAAE,EAAE;YAClD,gBAAgB,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE;SACrC;QAED,gDAAgD;QAChD,yFAAyF;QACzF,uBAAuB,EAAE,KAAK;QAC9B,kBAAkB,EAAE,YAAY,CAAC,iBAAiB;YAChD,CAAC,CAAC;gBACE,OAAO,EAAE,YAAY,CAAC,iBAAiB;gBACvC,qCAAqC;gBACrC,yBAAyB,EAAE,KAAK;aACjC;YACH,CAAC,CAAC,SAAS;QAEb,QAAQ,EAAE;YACR,IAAI,EAAE,MAAM,CAAC,gBAAgB,CAAC,oBAAoB,CAAC,cAAc;SAClE;QACD,+BAA+B;QAC/B,QAAQ;QACR,2BAA2B;QAC3B,0CAA0C;QAC1C,6CAA6C;QAC7C,sCAAsC;QACtC,WAAW;QACX,QAAQ;QACR,iBAAiB;QAEjB,kBAAkB;QAClB,kBAAkB,EAAE;YAClB,cAAc,EAAE,MAAM,CAAC,gBAAgB,CAAC,cAAc,CAAC,KAAK;SAC7D;QACD,qBAAqB;QACrB,oBAAoB;QACpB,UAAU,EAAE,IAAI;QAChB,UAAU,EAAE;YACV,eAAe,EAAE,IAAI;YACrB,OAAO,EAAE,IAAI;YACb,mBAAmB,EAAE,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS;YACnE,QAAQ,EAAE,mBAAQ;SACnB;QAED,cAAc,EAAE;YACd,aAAa,EAAE;gBACb,OAAO,EAAE,IAAI;aACd;YACD,aAAa,EAAE;gBACb,OAAO,EAAE,IAAI;aACd;YACD,aAAa,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE;SACjC;QAED,cAAc,EAAE;YACd,WAAW,EAAE,MAAM,CAAC,gBAAgB,CAAC,WAAW,CAAC,WAAW;YAC5D,aAAa,EAAE,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,KAAK;YAC1D,aAAa,EAAE,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,KAAK;YAE1D,4BAA4B;YAC5B,oCAAoC;YACpC,6BAA6B;YAE7B,YAAY,EACV,OAAO,CAAC,cAAc,IAAI,SAAS,EAAE,oBAAoB;gBACvD,CAAC,CAAC,MAAM,CAAC,gBAAgB,CAAC,YAAY,CAAC,kBAAkB;gBACzD,CAAC,CAAC,MAAM,CAAC,gBAAgB,CAAC,YAAY,CAAC,YAAY;YAEvD,eAAe,EACb,OAAO,CAAC,iBAAiB,EAAE,WAAW;gBACtC,OAAO,CAAC,cAAc;gBACtB,SAAS,EAAE,oBAAoB;gBAC7B,CAAC,CAAC,UAAU;gBACZ,CAAC,CAAC,OAAO;YAEb,mBAAmB,EACjB,OAAO,CAAC,iBAAiB;gBACzB,CAAC,CAAC,OAAO,CAAC,cAAc,IAAI,SAAS,EAAE,oBAAoB,CAAC;gBAC1D,CAAC,CAAC;oBACE,WAAW,EAAE;wBACX,SAAS,EAAE,CAAC,EAAE,EAAE,EAAE,OAAO,CAAC,iBAAiB,CAAC,WAAW,EAAE,CAAC;qBAC3D;oBACD,kBAAkB,EAAE,OAAO,CAAC,iBAAiB,CAAC,iBAAiB;wBAC7D,CAAC,CAAC;4BACE,gBAAgB,EAAE;gCAChB,EAAE,EAAE,EAAE,OAAO,CAAC,iBAAiB,CAAC,iBAAiB,EAAE;6BACpD;yBACF;wBACH,CAAC,CAAC,SAAS;iBACd;gBACH,CAAC,CAAC,SAAS;SAChB;KACF,EACD;QACE,OAAO,EAAE,IAAI;QACb,SAAS,EAAE,eAAe;YACxB,CAAC,CAAC,CAAC,GAAG,SAAS,EAAE,eAAe,CAAC,QAAQ,CAAC;YAC1C,CAAC,CAAC,SAAS;QACb,MAAM,EAAE,UAAU;QAClB,mBAAmB,EAAE,IAAI;QACzB,aAAa,EAAE,CAAC,sBAAsB,EAAE,gBAAgB,EAAE,cAAc,CAAC;KAC1E,CACF,CAAC;IAEF,IAAI,IAAI,EAAE,CAAC;QACT,IAAA,gBAAM,EAAC,EAAE,IAAI,EAAE,OAAO,EAAE,QAAQ,EAAE,GAAG,EAAE,CAAC,CAAC;IAC3C,CAAC;IAED,IAAI,SAAS,EAAE,CAAC;QACd,SAAS,CAAC,GAAG,CACX,CAAC,CAAC,EAAE,EAAE,CACJ,IAAI,MAAM,CAAC,gBAAgB,CAAC,SAAS,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE;YACzD,uBAAuB;YACvB,YAAY,EAAE,GAAG,CAAC,IAAI;YACtB,GAAG,KAAK;YAER,GAAG,oBAAoB;YACvB,GAAG,CAAC;YAEJ,GAAG,YAAY,CAAC;gBACd,GAAG,EAAE,qBAAU;gBACf,QAAQ,EAAE,CAAC,CAAC,IAAI;gBAChB,iBAAiB,EAAE,eAAe;aACnC,CAAC;YAEF,KAAK,EAAE,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;YAClC,yCAAyC;YACzC,YAAY,EAAE,OAAO,CAAC,QAAQ;YAC9B,eAAe,EAAE,IAAI;YACrB,KAAK,EAAE,QAAQ;YACf,MAAM,EAAE,OAAO;YAEf,sBAAsB;YACtB,IAAI,EAAE;gBACJ,GAAG,oBAAoB,CAAC,IAAI;gBAC5B,IAAI,EAAE,CAAC,CAAC,IAAI;aACb;SACF,CAAC,CACL,CAAC;IACJ,CAAC;IACD,IAAI,SAAS,EAAE,CAAC;QACd,GAAG,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,EAAE;YACxB,IAAI,CAAC,EAAE;gBAAE,OAAO;YAEhB,MAAM,MAAM,GAAG,MAAM,IAAA,qBAAY,EAAC;gBAChC,IAAI,EAAE,OAAO;gBACb,SAAS,EAAE,KAAK,CAAC,iBAAiB;gBAClC,aAAa,EAAE,IAAI;gBACnB,oBAAoB,EAAE,oBAAoB;aAC3C,CAAC,CAAC;YAEH,IAAA,8BAAe,EAAC;gBACd,IAAI,EAAE,UAAU;gBAChB,KAAK,EAAE,MAAM;gBACb,SAAS,EAAE,GAAG;gBACd,YAAY,EAAE,IAAI;gBAClB,WAAW,EAAE,IAAI;gBACjB,SAAS;aACV,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC;IAED,4BAA4B;IAE5B,GAAG,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,EAAE;QACxB,IAAI,CAAC,EAAE;YAAE,OAAO;QAEhB,OAAO;QACP,IAAI,UAAU,EAAE,CAAC;YACf,MAAM,OAAO,CAAC,GAAG,CACf;gBACE;oBACE,SAAS,EAAE,wBAAwB;oBACnC,IAAI,EAAE,2CAA2C;iBAClD;gBACD;oBACE,SAAS,EAAE,0BAA0B;oBACrC,IAAI,EAAE,6CAA6C;iBACpD;gBACD;oBACE,SAAS,EAAE,0BAA0B;oBACrC,IAAI,EAAE,6CAA6C;iBACpD;gBACD;oBACE,SAAS,EAAE,+BAA+B;oBAC1C,IAAI,EAAE,kDAAkD;iBACzD;gBACD;oBACE,SAAS,EAAE,yBAAyB;oBACpC,IAAI,EAAE,4CAA4C;iBACnD;aACF,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CACV,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,IAAI,CAAC,CAAC,SAAS,EAAE;gBAC9B,WAAW,EAAE,UAAU,CAAC,QAAQ;gBAChC,aAAa,EAAE,OAAO;gBACtB,QAAQ,EAAE,CAAC,CAAC,IAAI;gBAChB,KAAK,EAAE,EAAE;aACV,CAAC,CACH,CACF,CAAC;QACJ,CAAC;QAED,aAAa;QACb,IAAI,eAAe,EAAE,CAAC;YACpB,MAAM,OAAO,CAAC,GAAG,CACf;gBACE;oBACE,SAAS,EAAE,8BAA8B;oBACzC,IAAI,EAAE,2CAA2C;iBAClD;gBACD;oBACE,SAAS,EAAE,wBAAwB;oBACnC,IAAI,EAAE,qCAAqC;iBAC5C;gBACD;oBACE,SAAS,EAAE,yBAAyB;oBACpC,IAAI,EAAE,sCAAsC;iBAC7C;gBACD;oBACE,SAAS,EAAE,yBAAyB;oBACpC,IAAI,EAAE,sCAAsC;iBAC7C;aACF,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CACV,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,IAAI,CAAC,CAAC,SAAS,EAAE;gBAC9B,WAAW,EAAE,eAAe,CAAC,QAAQ;gBACrC,aAAa,EAAE,OAAO;gBACtB,QAAQ,EAAE,CAAC,CAAC,IAAI;gBAChB,KAAK,EAAE,EAAE;aACV,CAAC,CACH,CACF,CAAC;QACJ,CAAC;QAED,YAAY;QACZ,IAAI,YAAY,CAAC,uBAAuB,EAAE,CAAC;YACzC,IAAA,0BAAgB,EAAC;gBACf,IAAI;gBACJ,gBAAgB,EAAE,EAAE;gBACpB,GAAG,GAAG;gBACN,cAAc,EAAE;oBACd,OAAO;oBACP,yBAAyB;oBACzB,kBAAkB;oBAClB,YAAY;oBACZ,gBAAgB;oBAChB,oBAAoB;iBACrB;aACF,CAAC,CAAC;QACL,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,+BAA+B;IAC/B,MAAM;SACH,GAAG,CAAC,CAAC,GAAG,CAAC,QAAQ,EAAE,GAAG,CAAC,eAAe,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;SAC1D,KAAK,CAAC,CAAC,CAAC,QAAQ,EAAE,eAAe,EAAE,GAAG,CAAC,EAAE,EAAE;QAC1C,OAAO,CAAC,GAAG,CAAC,yBAAyB,EAAE,IAAI,CAAC,CAAC;QAE7C,4CAA4C;QAC5C,sCAAsC;QACtC,2BAA2B;QAC3B,6CAA6C;QAC7C,iDAAiD;QACjD,yCAAyC;QACzC,2BAA2B;QAC3B,2BAA2B;QAC3B,QAAQ;QACR,IAAI;QAEJ,IAAI,QAAQ,IAAI,eAAe,IAAI,eAAe,CAAC,iBAAiB,CAAC,EAAE,CAAC;YACtE,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,4BAA4B;gBACzC,WAAW,EAAE,eAAe,CAAC,iBAAiB,CAAC,CAAC,QAAS;gBACzD,aAAa,EAAE,kBAAkB;gBACjC,QAAQ,EAAE,SAAS;gBACnB,KAAK,EAAE,QAAQ;aAChB,CAAC,CAAC;YAEH,IAAI,SAAS,EAAE,CAAC;gBACd,IAAA,8BAAe,EAAC;oBACd,IAAI,EAAE,GAAG,IAAI,oBAAoB;oBACjC,KAAK,EAAE,eAAe,CAAC,iBAAiB,CAAC,CAAC,QAAS;oBACnD,SAAS,EAAE,GAAG;oBACd,WAAW,EAAE,IAAI;oBACjB,SAAS;iBACV,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,+BAA+B;QAC/B,2BAA2B;QAC3B,uCAAuC;QACvC,yCAAyC;QACzC,yCAAyC;QACzC,2BAA2B;QAC3B,2BAA2B;QAC3B,QAAQ;QACR,IAAI;QAEJ,IAAI,OAAO,CAAC,QAAQ,IAAI,QAAQ,EAAE,CAAC;YACjC,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,aAAa;gBAC1B,WAAW,EAAE,QAAQ,CAAC,WAAW;gBACjC,QAAQ,EAAE,aAAa;gBACvB,aAAa,EAAE,kBAAkB;gBACjC,KAAK,EAAE,IAAA,gCAAqB,EAAC;oBAC3B,KAAK,EAAE,IAAA,gCAAqB,EAAC,GAAG,CAAE,CAAC,KAAK;iBACzC,CAAC;aACH,CAAC,CAAC;QACL,CAAC;QAED,IAAI,WAAW,IAAI,QAAQ,EAAE,CAAC;YAC5B,IAAA,+BAAc,EAAC;gBACb,IAAI,EAAE,GAAG,IAAI,cAAc;gBAC3B,WAAW,EAAE,QAAQ,CAAC,WAAW;gBACjC,QAAQ,EAAE,8BAA8B;gBACxC,aAAa,EAAE,kBAAkB;gBACjC,KAAK,EAAE,WAAW,CAAC,EAAE;aACtB,CAAC,CAAC;QACL,CAAC;IACH,CAAC,CAAC,CAAC;IAEL,mCAAmC;IACnC,IAAA,sBAAa,EAAC;QACZ,KAAK,EAAE,EAAE,iBAAiB,EAAE,iBAAiB,EAAE;QAC/C,GAAG,GAAG;QACN,SAAS;QACT,SAAS,EAAE,GAAG;KACf,CAAC,CAAC;IAEH,OAAO,EAAE,GAAG,EAAE,eAAe,EAAE,UAAU,EAAE,WAAW,EAAE,CAAC;AAC3D,CAAC,CAAC"}
441
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/Aks/index.ts"],"names":[],"mappings":";;;AAAA,+CAA+C;AAC/C,yCAAyC;AACzC,2CAAuD;AACvD,iDAA2C;AAE3C,iDAQ4B;AAC5B,2CAAoC;AACpC,yCAA4C;AAC5C,iDAA2C;AAC3C,6CAAmD;AACnD,6CAAoE;AACpE,2DAAwD;AAExD,qCAAwC;AACxC,2DAA2D;AAE3D,oFAAoF;AAIpF,MAAM,YAAY,GAAG,CAAC,EACpB,iBAAiB,EACjB,QAAQ,EACR,GAAG,GAKJ,EAAE,EAAE;IACH,MAAM,SAAS,GAAG,CAAC,CAAC;IACpB,MAAM,QAAQ,GAAG,CAAC,CAAC;IACnB,IAAI,QAAQ,GAAG,CAAC,CAAC;IAEjB,IAAI,GAAG,KAAK,uBAAY,CAAC,GAAG,EAAE,CAAC;QAC7B,QAAQ,QAAQ,EAAE,CAAC;YACjB,KAAK,MAAM;gBACT,QAAQ,GAAG,CAAC,CAAC;gBACb,MAAM;YAER,KAAK,SAAS,CAAC;YACf,KAAK,QAAQ,CAAC;YACd;gBACE,QAAQ,GAAG,CAAC,CAAC;gBACb,MAAM;QACV,CAAC;IACH,CAAC;IAED,OAAO;QACL,iBAAiB;QACjB,SAAS,EAAE,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS;QACpD,QAAQ,EAAE,iBAAiB,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS;QAClD,QAAQ,EAAE,iBAAiB,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS;KACnD,CAAC;AACJ,CAAC,CAAC;AAEF,MAAM,oBAAoB,GAAG;IAC3B,iBAAiB,EAAE,gBAAK,CAAC,CAAC,CAAC,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS;IACtD,IAAI,EAAE,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,uBAAuB;IACnE,MAAM,EAAE,cAAc;IAEtB,OAAO,EAAE,EAAE;IACX,UAAU,EAAE,KAAK;IACjB,kBAAkB,EAAE,KAAK;IACzB,gCAAgC;IAEhC,cAAc,EAAE,gBAAK;IACrB,YAAY,EAAE,GAAG;IACjB,UAAU,EAAE,MAAM,CAAC,gBAAgB,CAAC,UAAU,CAAC,OAAO;IAEtD,UAAU,EAAE;QACV,WAAW,EAAE,qBAAU;QACvB,KAAK,EAAL,gBAAK;KACN;CACF,CAAC;AAEF,IAAY,OAqBX;AArBD,WAAY,OAAO;IACjB,+BAA+B;IAC/B,gDAAqC,CAAA;IACrC,6BAA6B;IAC7B,0CAA+B,CAAA;IAC/B,+BAA+B;IAC/B,0CAA+B,CAAA;IAC/B,4BAA4B;IAC5B,gDAAqC,CAAA;IACrC,4BAA4B;IAC5B,8CAAmC,CAAA;IACnC,4BAA4B;IAC5B,8CAAmC,CAAA;IACnC,+BAA+B;IAC/B,gDAAqC,CAAA;IACrC,6BAA6B;IAC7B,4CAAiC,CAAA;IACjC,8BAA8B;IAC9B,4CAAiC,CAAA;IACjC,+BAA+B;IAC/B,8CAAmC,CAAA;AACrC,CAAC,EArBW,OAAO,uBAAP,OAAO,QAqBlB;AA8ED,oJAAoJ;AACpJ,kBAAe,KAAK,EAAE,EACpB,KAAK,EACL,IAAI,EACJ,KAAK,EACL,eAAe,EACf,SAAS,EACT,OAAO,EACP,OAAO,EACP,GAAG,EACH,SAAS,EACT,SAAS,EACT,QAAQ,GAAG,EAAE,uBAAuB,EAAE,IAAI,EAAE,EAC5C,KAAK,GAAG;IACN,iBAAiB,EAAE,IAAI;IACvB,mBAAmB,EAAE,KAAK;IAC1B,mBAAmB,EAAE,KAAK;CAC3B,EACD,IAAI,GAAG,MAAM,CAAC,gBAAgB,CAAC,qBAAqB,CAAC,IAAI,EACzD,IAAI,GAAG,IAAI,EACX,SAAS,GAAG,EAAE,EACd,SAAS,EACT,aAAa,GAAG,EAAE,GACT,EAAuB,EAAE;IAClC,MAAM,OAAO,GAAG,IAAA,mBAAU,EAAC,IAAI,CAAC,CAAC;IACjC,MAAM,UAAU,GAAG,GAAG,OAAO,SAAS,CAAC;IACvC,MAAM,QAAQ,GAAG,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,EAAE,IAAI,uBAAY,CAAC,CAAC,CAAC,SAAS,CAAC;IAClE,MAAM,iBAAiB,GAAG,IAAA,6BAAoB,EAAC,GAAG,OAAO,QAAQ,CAAC,CAAC;IACnE,MAAM,oBAAoB,GAAG,MAAM,IAAA,8BAAe,EAAC,SAAS,CAAC,IAAI,CAAC;SAC/D,gBAAgB,CAAC,UAAU,CAAC;SAC5B,KAAK,CAAC,GAAG,EAAE,CAAC,KAAK,CAAC,CAAC;IAEtB,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,oBAAoB,EAAE,CAAC,CAAC;IAC5C,aAAc,CAAC,IAAI,CAAC,sBAAsB,EAAE,gBAAgB,EAAE,cAAc,CAAC,CAAC;IAE9E,MAAM,eAAe,GAAG,IAAA,kBAAkB,EAAC;QACzC,IAAI,EAAE,OAAO;QACb,SAAS;QACT,SAAS;KACV,CAAC,CAAC;IAEH,gEAAgE;IAChE,8CAA8C;IAC9C,qDAAqD;IACrD,sBAAsB;IACtB,IAAI;IAEJ,oBAAoB;IACpB,MAAM,GAAG,GAAG,IAAI,MAAM,CAAC,gBAAgB,CAAC,cAAc,CACpD,OAAO,EACP;QACE,YAAY,EAAE,OAAO;QACrB,GAAG,KAAK;QACR,iBAAiB;QACjB,SAAS,EAAE,OAAO;QAClB,oBAAoB;QACpB,oBAAoB;QAEpB,sBAAsB,EAAE;YACtB,kBAAkB,EAAE,QAAQ,EAAE,oBAAoB;gBAChD,CAAC,CAAC,SAAS;gBACX,CAAC,CAAC,SAAS,EAAE,kBAAkB,IAAI,EAAE;YACvC,iBAAiB,EAAE,IAAI;YACvB,oBAAoB,EAAE,QAAQ,EAAE,oBAAoB;YACpD,8BAA8B,EAAE,IAAI;YACpC,cAAc,EAAE,QAAQ;SACzB;QAED,aAAa,EAAE;YACb,4BAA4B,EAAE;gBAC5B,MAAM,EAAE,KAAK,CAAC,mBAAmB;oBAC/B,CAAC,CAAC;wBACE,oBAAoB,EAAE,MAAM;qBAC7B;oBACH,CAAC,CAAC,SAAS;gBACb,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,mBAAmB,CAAC;aAC5C;YAED,WAAW,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,iBAAiB,CAAC,EAAE;YAC1D,aAAa,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,mBAAmB,CAAC,EAAE;YAC9D,sBAAsB,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE;YAE1C,iBAAiB,EAAE;gBACjB,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC,qBAAqB,CAAC;gBAC/C,MAAM,EAAE,OAAO,CAAC,qBAAqB;oBACnC,CAAC,CAAC,EAAE,UAAU,EAAE,OAAO,CAAC,qBAAqB,EAAE;oBAC/C,CAAC,CAAC,SAAS;aACd;YAED,yBAAyB,EAAE;gBACzB,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,kBAAkB,CAAC;gBAC1C,MAAM,EAAE,KAAK,CAAC,kBAAkB;oBAC9B,CAAC,CAAC;wBACE,WAAW,EAAE,GAAG,IAAI,UAAU;wBAC9B,QAAQ,EAAE,KAAK,CAAC,kBAAkB,CAAC,eAAe;qBACnD;oBACH,CAAC,CAAC,SAAS;aACd;YAED,QAAQ,EAAE;gBACR,OAAO,EAAE,OAAO,CAAC,OAAO,CAAC;gBACzB,MAAM,EAAE,OAAO;oBACb,CAAC,CAAC;wBACE,+BAA+B,EAAE,OAAO;qBACzC;oBACH,CAAC,CAAC,SAAS;aACd;SACF;QAED,GAAG,EAAE;YACH,IAAI,EAAE,MAAM,CAAC,gBAAgB,CAAC,qBAAqB,CAAC,IAAI;YACxD,IAAI;SACL;QACD,WAAW,EACT,MAAM,CAAC,gBAAgB,CAAC,qBAAqB,CAAC,kBAAkB;QAClE,iBAAiB,EAAE;YACjB;gBACE,GAAG,oBAAoB;gBACvB,GAAG,eAAe;gBAClB,GAAG,YAAY,CAAC;oBACd,GAAG,EAAE,qBAAU;oBACf,QAAQ,EAAE,QAAQ;oBAClB,iBAAiB,EAAE,QAAQ,EAAE,eAAe;oBAC5C,gBAAgB;oBAChB,qBAAqB;oBACrB,KAAK;oBACL,qBAAqB;oBACrB,qBAAqB;oBACrB,KAAK;iBACN,CAAC;gBAEF,IAAI,EAAE,cAAc;gBACpB,IAAI,EAAE,QAAQ;gBACd,KAAK,EAAE,CAAC;gBACR,YAAY,EAAE,OAAO,CAAC,QAAQ;gBAC9B,eAAe,EAAE,IAAI;gBACrB,KAAK,EAAE,QAAQ;gBACf,MAAM,EAAE,OAAO;aAChB;SACF;QACD,YAAY,EAAE,KAAK;YACjB,CAAC,CAAC;gBACE,aAAa,EAAE,KAAK,CAAC,aAAa;gBAClC,GAAG,EAAE,EAAE,UAAU,EAAE,KAAK,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,CAAC,CAAC,EAAE;aAChE;YACH,CAAC,CAAC,SAAS;QACb,mBAAmB;QACnB,cAAc,EAAE;YACd,aAAa,EAAE,WAAW;YAC1B,cAAc,EAAE,IAAI;SACrB;QACD,iBAAiB,EAAE;YACjB,wBAAwB,EAAE,MAAM;YAChC,QAAQ,EAAE,QAAQ;YAClB,kBAAkB,EAAE,IAAI;YACxB,yBAAyB,EAAE,KAAK;YAChC,oBAAoB,EAAE,KAAK;YAC3B,yBAAyB,EAAE,IAAI;YAC/B,kBAAkB,EAAE,IAAI;YACxB,mBAAmB,EAAE,GAAG;YACxB,sBAAsB,EAAE,KAAK;YAC7B,yBAAyB,EAAE,KAAK;YAChC,0BAA0B,EAAE,KAAK;YACjC,qBAAqB,EAAE,KAAK;YAC5B,oBAAoB,EAAE,KAAK;YAC3B,6BAA6B,EAAE,KAAK;YACpC,YAAY,EAAE,KAAK;YACnB,yBAAyB,EAAE,OAAO;YAClC,uBAAuB,EAAE,MAAM;SAChC;QAED,qBAAqB;QACrB,6CAA6C;QAC7C,kCAAkC;QAClC,iBAAiB;QACjB,gDAAgD;QAChD,yFAAyF;QACzF,gCAAgC;QAEhC,uBAAuB,EAAE;YACvB,QAAQ,EAAE,eAAe,CAAC,QAAQ;YAClC,MAAM,EAAE,eAAe,CAAC,YAAY;SACrC;QACD,eAAe,EAAE;YACf,QAAQ,EACN,OAAO,IAAI,gBAAK;gBACd,CAAC,CAAC;oBACE,+BAA+B,EAAE,OAAO;oBACxC,kBAAkB,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE;iBACtC;gBACH,CAAC,CAAC,SAAS;YACf,YAAY,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE,aAAa,EAAE,EAAE,EAAE;YAClD,gBAAgB,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE;SACrC;QACD,kBAAkB,EAAE,QAAQ,CAAC,iBAAiB;YAC5C,CAAC,CAAC;gBACE,OAAO,EAAE,QAAQ,CAAC,iBAAiB;gBACnC,qCAAqC;gBACrC,yBAAyB,EAAE,KAAK;aACjC;YACH,CAAC,CAAC,SAAS;QACb,QAAQ,EAAE;YACR,IAAI,EAAE,MAAM,CAAC,gBAAgB,CAAC,oBAAoB,CAAC,cAAc;SAClE;QACD,kBAAkB,EAAE;YAClB,cAAc,EAAE,MAAM,CAAC,gBAAgB,CAAC,cAAc,CAAC,KAAK;YAC5D,oCAAoC;SACrC;QACD,oBAAoB;QACpB,UAAU,EAAE,IAAI;QAChB,UAAU,EAAE,SAAS,EAAE,QAAQ;YAC7B,CAAC,CAAC;gBACE,eAAe,EAAE,IAAI;gBACrB,OAAO,EAAE,IAAI;gBACb,mBAAmB,EAAE,CAAC,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,QAAQ,CAAC;gBACxD,QAAQ,EAAE,mBAAQ;aACnB;YACH,CAAC,CAAC,SAAS;QACb,iBAAiB,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE;QACrC,cAAc,EAAE;YACd,aAAa,EAAE;gBACb,OAAO,EAAE,IAAI;aACd;YACD,aAAa,EAAE;gBACb,OAAO,EAAE,IAAI;aACd;YACD,aAAa,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE;YAChC,kBAAkB,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE;SACtC;QACD,cAAc,EAAE;YACd,WAAW,EAAE,MAAM,CAAC,gBAAgB,CAAC,WAAW,CAAC,WAAW;YAC5D,aAAa,EAAE,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,KAAK;YAC1D,aAAa,EAAE,MAAM,CAAC,gBAAgB,CAAC,aAAa,CAAC,KAAK;YAE1D,4BAA4B;YAC5B,oCAAoC;YACpC,6BAA6B;YAE7B,YAAY,EACV,QAAQ,EAAE,oBAAoB,IAAI,CAAC,OAAO,CAAC,iBAAiB;gBAC1D,CAAC,CAAC,MAAM,CAAC,gBAAgB,CAAC,YAAY,CAAC,kBAAkB;gBACzD,CAAC,CAAC,MAAM,CAAC,gBAAgB,CAAC,YAAY,CAAC,YAAY;YAEvD,eAAe,EAAE,UAAU;YAC3B,mBAAmB,EAAE,OAAO,CAAC,iBAAiB;gBAC5C,CAAC,CAAC;oBACE,WAAW,EAAE,OAAO,CAAC,iBAAiB,CAAC,WAAW;wBAChD,CAAC,CAAC;4BACE,SAAS,EAAE,CAAC,EAAE,EAAE,EAAE,OAAO,CAAC,iBAAiB,CAAC,WAAW,EAAE,CAAC;yBAC3D;wBACH,CAAC,CAAC,SAAS;oBACb,kBAAkB,EAAE,OAAO,CAAC,iBAAiB,CAAC,iBAAiB;wBAC7D,CAAC,CAAC;4BACE,gBAAgB,EAAE;gCAChB,EAAE,EAAE,EAAE,OAAO,CAAC,iBAAiB,CAAC,iBAAiB,EAAE;6BACpD;yBACF;wBACH,CAAC,CAAC,SAAS;iBACd;gBACH,CAAC,CAAC,SAAS;SACd;KACF,EACD;QACE,OAAO,EAAE,IAAI;QACb,SAAS,EAAE,eAAe,CAAC,QAAQ;QACnC,MAAM,EAAE,SAAS;QACjB,mBAAmB,EAAE,IAAI;QACzB,aAAa;KACd,CACF,CAAC;IAEF,IAAI,MAAM,CAAC,gBAAgB,CAAC,wBAAwB,CAClD,GAAG,OAAO,2BAA2B,EACrC;QACE,UAAU,EAAE,SAAS;QACrB,oBAAoB;QACpB,MAAM;QACN,mCAAmC;QACnC,qCAAqC;QACrC,OAAO;QACP,KAAK;QACL,GAAG,KAAK;QACR,YAAY,EAAE,GAAG,CAAC,IAAI;QACtB,UAAU,EAAE;YACV;gBACE,GAAG,EAAE,MAAM,CAAC,gBAAgB,CAAC,OAAO,CAAC,MAAM;gBAC3C,SAAS,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC;aACnB;SACF;KACF,EACD,EAAE,SAAS,EAAE,GAAG,EAAE,CACnB,CAAC;IAEF,IAAI,IAAI,EAAE,CAAC;QACT,IAAA,gBAAM,EAAC,EAAE,IAAI,EAAE,OAAO,EAAE,QAAQ,EAAE,GAAG,EAAE,CAAC,CAAC;IAC3C,CAAC;IAED,IAAI,SAAS,EAAE,CAAC;QACd,SAAS,CAAC,GAAG,CACX,CAAC,CAAC,EAAE,EAAE,CACJ,IAAI,MAAM,CAAC,gBAAgB,CAAC,SAAS,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE;YACzD,uBAAuB;YACvB,YAAY,EAAE,GAAG,CAAC,IAAI;YACtB,GAAG,KAAK;YACR,GAAG,oBAAoB;YACvB,GAAG,CAAC;YAEJ,GAAG,YAAY,CAAC;gBACd,GAAG,EAAE,qBAAU;gBACf,QAAQ,EAAE,CAAC,CAAC,IAAI;gBAChB,iBAAiB,EAAE,QAAQ,CAAC,eAAe;aAC5C,CAAC;YAEF,KAAK,EAAE,CAAC,CAAC,IAAI,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;YAClC,yCAAyC;YACzC,YAAY,EAAE,OAAO,CAAC,QAAQ;YAC9B,eAAe,EAAE,IAAI;YACrB,KAAK,EAAE,QAAQ;YACf,MAAM,EAAE,OAAO;SAChB,CAAC,CACL,CAAC;IACJ,CAAC;IAED,IAAI,SAAS,EAAE,CAAC;QACd,GAAG,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,EAAE;YACxB,IAAI,CAAC,EAAE;gBAAE,OAAO;YAEhB,MAAM,MAAM,GAAG,MAAM,IAAA,qBAAY,EAAC;gBAChC,IAAI,EAAE,OAAO;gBACb,SAAS,EAAE,KAAK,CAAC,iBAAiB;gBAClC,aAAa,EAAE,IAAI;gBACnB,oBAAoB,EAAE,oBAAoB;aAC3C,CAAC,CAAC;YAEH,IAAA,8BAAe,EAAC;gBACd,IAAI,EAAE,UAAU;gBAChB,KAAK,EAAE,MAAM;gBACb,aAAa,EAAE,IAAI;gBACnB,SAAS,EAAE,GAAG;gBACd,YAAY,EAAE,IAAI;gBAClB,WAAW,EAAE,IAAI;gBACjB,SAAS;aACV,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC;IAED,4BAA4B;IAC5B,GAAG,CAAC,EAAE,CAAC,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE,EAAE;QACxB,IAAI,CAAC,EAAE;YAAE,OAAO;QAEhB,+BAA+B;QAC/B,MAAM;aACH,GAAG,CAAC,CAAC,GAAG,CAAC,QAAQ,EAAE,GAAG,CAAC,eAAe,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;aAC1D,KAAK,CAAC,CAAC,CAAC,QAAQ,EAAE,eAAe,EAAE,GAAG,CAAC,EAAE,EAAE;YAC1C,IAAI,QAAQ,IAAI,eAAe,IAAI,eAAe,CAAC,iBAAiB,CAAC,EAAE,CAAC;gBACtE,IAAA,+BAAc,EAAC;oBACb,IAAI,EAAE,GAAG,IAAI,4BAA4B;oBACzC,WAAW,EAAE,eAAe,CAAC,iBAAiB,CAAC,CAAC,QAAS;oBACzD,aAAa,EAAE,kBAAkB;oBACjC,QAAQ,EAAE,SAAS;oBACnB,KAAK,EAAE,QAAQ;iBAChB,CAAC,CAAC;gBAEH,IAAI,SAAS,EAAE,CAAC;oBACd,IAAA,8BAAe,EAAC;wBACd,IAAI,EAAE,GAAG,IAAI,oBAAoB;wBACjC,KAAK,EAAE,eAAe,CAAC,iBAAiB,CAAC,CAAC,QAAS;wBACnD,SAAS,EAAE,GAAG;wBACd,WAAW,EAAE,IAAI;wBACjB,SAAS;qBACV,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,IAAI,OAAO,CAAC,QAAQ,IAAI,QAAQ,EAAE,CAAC;gBACjC,IAAA,+BAAc,EAAC;oBACb,IAAI,EAAE,GAAG,IAAI,aAAa;oBAC1B,WAAW,EAAE,QAAQ,CAAC,WAAW;oBACjC,QAAQ,EAAE,aAAa;oBACvB,aAAa,EAAE,kBAAkB;oBACjC,KAAK,EAAE,IAAA,gCAAqB,EAAC;wBAC3B,KAAK,EAAE,IAAA,kCAAuB,EAAC,GAAG,CAAE,CAAC,KAAK;qBAC3C,CAAC;iBACH,CAAC,CAAC;YACL,CAAC;QACH,CAAC,CAAC,CAAC;QAEL,YAAY;QACZ,IAAI,QAAQ,CAAC,uBAAuB,IAAI,OAAO,EAAE,CAAC;YAChD,IAAA,0BAAgB,EAAC;gBACf,IAAI;gBACJ,gBAAgB,EAAE,EAAE;gBACpB,OAAO;gBACP,cAAc,EAAE;oBACd,OAAO;oBACP,yBAAyB;oBACzB,kBAAkB;oBAClB,YAAY;oBACZ,gBAAgB;oBAChB,oBAAoB;iBACrB;gBACD,SAAS,EAAE,GAAG;aACf,CAAC,CAAC;YAEH,mCAAmC;YACnC,IAAA,sBAAa,EAAC;gBACZ,KAAK,EAAE,EAAE,iBAAiB,EAAE,iBAAiB,EAAE;gBAC/C,OAAO;gBACP,SAAS;gBACT,SAAS,EAAE,GAAG;aACf,CAAC,CAAC;QACL,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,OAAO;QACL,GAAG;QACH,eAAe;QACf,oBAAoB;QACpB,aAAa,EAAE,GAAmB,EAAE,CAClC,IAAA,eAAM,EACJ,IAAA,8BAAe,EAAC,SAAS,CAAC,IAAI,CAAC;aAC5B,SAAS,CAAC,UAAU,CAAC;aACrB,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAE,CAAC,KAAM,CAAC,CAC1B;KACJ,CAAC;AACJ,CAAC,CAAC"}