@forestadmin/mcp-server 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +128 -0
- package/dist/__mocks__/version.d.ts +3 -0
- package/dist/__mocks__/version.js +7 -0
- package/dist/cli.d.ts +3 -0
- package/dist/cli.js +14 -0
- package/dist/factory.d.ts +51 -0
- package/dist/factory.js +40 -0
- package/dist/forest-oauth-provider.d.ts +44 -0
- package/dist/forest-oauth-provider.js +253 -0
- package/dist/forest-oauth-provider.test.d.ts +2 -0
- package/dist/forest-oauth-provider.test.js +590 -0
- package/dist/index.d.ts +4 -0
- package/dist/index.js +13 -0
- package/dist/mcp-paths.d.ts +5 -0
- package/dist/mcp-paths.js +11 -0
- package/dist/polyfills.d.ts +12 -0
- package/dist/polyfills.js +27 -0
- package/dist/schemas/filter.d.ts +4 -0
- package/dist/schemas/filter.js +70 -0
- package/dist/schemas/filter.test.d.ts +2 -0
- package/dist/schemas/filter.test.js +234 -0
- package/dist/server.d.ts +87 -0
- package/dist/server.js +341 -0
- package/dist/server.test.d.ts +2 -0
- package/dist/server.test.js +901 -0
- package/dist/test-utils/mock-server.d.ts +62 -0
- package/dist/test-utils/mock-server.js +187 -0
- package/dist/tools/list.d.ts +4 -0
- package/dist/tools/list.js +98 -0
- package/dist/tools/list.test.d.ts +2 -0
- package/dist/tools/list.test.js +385 -0
- package/dist/utils/activity-logs-creator.d.ts +9 -0
- package/dist/utils/activity-logs-creator.js +65 -0
- package/dist/utils/activity-logs-creator.test.d.ts +2 -0
- package/dist/utils/activity-logs-creator.test.js +239 -0
- package/dist/utils/agent-caller.d.ts +13 -0
- package/dist/utils/agent-caller.js +24 -0
- package/dist/utils/agent-caller.test.d.ts +2 -0
- package/dist/utils/agent-caller.test.js +102 -0
- package/dist/utils/error-parser.d.ts +10 -0
- package/dist/utils/error-parser.js +56 -0
- package/dist/utils/error-parser.test.d.ts +2 -0
- package/dist/utils/error-parser.test.js +124 -0
- package/dist/utils/schema-fetcher.d.ts +53 -0
- package/dist/utils/schema-fetcher.js +85 -0
- package/dist/utils/schema-fetcher.test.d.ts +2 -0
- package/dist/utils/schema-fetcher.test.js +212 -0
- package/dist/utils/sse-error-logger.d.ts +14 -0
- package/dist/utils/sse-error-logger.js +112 -0
- package/dist/utils/tool-with-logging.d.ts +44 -0
- package/dist/utils/tool-with-logging.js +66 -0
- package/dist/version.d.ts +3 -0
- package/dist/version.js +43 -0
- package/package.json +49 -0
|
@@ -0,0 +1,590 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
const forestadmin_client_1 = __importDefault(require("@forestadmin/forestadmin-client"));
|
|
7
|
+
const jsonwebtoken_1 = __importDefault(require("jsonwebtoken"));
|
|
8
|
+
const forest_oauth_provider_1 = __importDefault(require("./forest-oauth-provider"));
|
|
9
|
+
const mock_server_1 = __importDefault(require("./test-utils/mock-server"));
|
|
10
|
+
jest.mock('jsonwebtoken');
|
|
11
|
+
jest.mock('@forestadmin/forestadmin-client');
|
|
12
|
+
const mockCreateForestAdminClient = forestadmin_client_1.default;
|
|
13
|
+
const mockJwtDecode = jsonwebtoken_1.default.decode;
|
|
14
|
+
const mockJwtSign = jsonwebtoken_1.default.sign;
|
|
15
|
+
const TEST_ENV_SECRET = 'test-env-secret';
|
|
16
|
+
const TEST_AUTH_SECRET = 'test-auth-secret';
|
|
17
|
+
const TEST_FOREST_APP_URL = 'https://app.forestadmin.com';
|
|
18
|
+
function createProvider(forestServerUrl = 'https://api.forestadmin.com') {
|
|
19
|
+
return new forest_oauth_provider_1.default({
|
|
20
|
+
forestServerUrl,
|
|
21
|
+
forestAppUrl: TEST_FOREST_APP_URL,
|
|
22
|
+
envSecret: TEST_ENV_SECRET,
|
|
23
|
+
authSecret: TEST_AUTH_SECRET,
|
|
24
|
+
logger: console.info,
|
|
25
|
+
});
|
|
26
|
+
}
|
|
27
|
+
describe('ForestOAuthProvider', () => {
|
|
28
|
+
let originalEnv;
|
|
29
|
+
let mockServer;
|
|
30
|
+
const originalFetch = global.fetch;
|
|
31
|
+
beforeAll(() => {
|
|
32
|
+
originalEnv = { ...process.env };
|
|
33
|
+
});
|
|
34
|
+
afterAll(() => {
|
|
35
|
+
process.env = originalEnv;
|
|
36
|
+
global.fetch = originalFetch;
|
|
37
|
+
});
|
|
38
|
+
beforeEach(() => {
|
|
39
|
+
process.env.FOREST_ENV_SECRET = TEST_ENV_SECRET;
|
|
40
|
+
process.env.FOREST_AUTH_SECRET = TEST_AUTH_SECRET;
|
|
41
|
+
mockServer = new mock_server_1.default();
|
|
42
|
+
});
|
|
43
|
+
afterEach(() => {
|
|
44
|
+
mockServer.reset();
|
|
45
|
+
});
|
|
46
|
+
describe('constructor', () => {
|
|
47
|
+
it('should create instance with forestServerUrl', () => {
|
|
48
|
+
const customProvider = createProvider('https://custom.forestadmin.com');
|
|
49
|
+
expect(customProvider).toBeDefined();
|
|
50
|
+
});
|
|
51
|
+
it('should create instance with custom forestAppUrl', () => {
|
|
52
|
+
const customProvider = new forest_oauth_provider_1.default({
|
|
53
|
+
forestServerUrl: 'https://api.forestadmin.com',
|
|
54
|
+
forestAppUrl: 'https://custom-app.forestadmin.com',
|
|
55
|
+
envSecret: TEST_ENV_SECRET,
|
|
56
|
+
authSecret: TEST_AUTH_SECRET,
|
|
57
|
+
logger: console.info,
|
|
58
|
+
});
|
|
59
|
+
expect(customProvider).toBeDefined();
|
|
60
|
+
});
|
|
61
|
+
});
|
|
62
|
+
describe('initialize', () => {
|
|
63
|
+
it('should not throw when envSecret is empty string', async () => {
|
|
64
|
+
const customProvider = new forest_oauth_provider_1.default({
|
|
65
|
+
forestServerUrl: 'https://api.forestadmin.com',
|
|
66
|
+
forestAppUrl: TEST_FOREST_APP_URL,
|
|
67
|
+
envSecret: '',
|
|
68
|
+
authSecret: TEST_AUTH_SECRET,
|
|
69
|
+
logger: console.info,
|
|
70
|
+
});
|
|
71
|
+
await expect(customProvider.initialize()).resolves.not.toThrow();
|
|
72
|
+
});
|
|
73
|
+
it('should fetch environmentId from Forest Admin API', async () => {
|
|
74
|
+
mockServer.get('/liana/environment', {
|
|
75
|
+
data: { id: '98765', attributes: { api_endpoint: 'https://api.example.com' } },
|
|
76
|
+
});
|
|
77
|
+
global.fetch = mockServer.fetch;
|
|
78
|
+
const testProvider = createProvider();
|
|
79
|
+
await testProvider.initialize();
|
|
80
|
+
// Verify fetch was called with correct URL and headers
|
|
81
|
+
expect(mockServer.fetch).toHaveBeenCalledWith('https://api.forestadmin.com/liana/environment', expect.objectContaining({
|
|
82
|
+
method: 'GET',
|
|
83
|
+
headers: expect.objectContaining({
|
|
84
|
+
'forest-secret-key': 'test-env-secret',
|
|
85
|
+
'Content-Type': 'application/json',
|
|
86
|
+
}),
|
|
87
|
+
}));
|
|
88
|
+
});
|
|
89
|
+
it('should set environmentId after successful initialization', async () => {
|
|
90
|
+
mockServer.get('/liana/environment', {
|
|
91
|
+
data: { id: '54321', attributes: { api_endpoint: 'https://api.example.com' } },
|
|
92
|
+
});
|
|
93
|
+
global.fetch = mockServer.fetch;
|
|
94
|
+
const testProvider = createProvider();
|
|
95
|
+
await testProvider.initialize();
|
|
96
|
+
// Verify environmentId is set by checking authorize redirect includes it
|
|
97
|
+
const mockResponse = { redirect: jest.fn() };
|
|
98
|
+
const mockClient = {
|
|
99
|
+
client_id: 'test-client',
|
|
100
|
+
redirect_uris: ['https://example.com/callback'],
|
|
101
|
+
};
|
|
102
|
+
await testProvider.authorize(mockClient, {
|
|
103
|
+
redirectUri: 'https://example.com/callback',
|
|
104
|
+
codeChallenge: 'challenge',
|
|
105
|
+
state: 'state',
|
|
106
|
+
scopes: ['mcp:read'],
|
|
107
|
+
resource: new URL('https://localhost:3931'),
|
|
108
|
+
}, mockResponse);
|
|
109
|
+
const redirectUrl = new URL(mockResponse.redirect.mock.calls[0][0]);
|
|
110
|
+
expect(redirectUrl.searchParams.get('environmentId')).toBe('54321');
|
|
111
|
+
});
|
|
112
|
+
it('should handle non-OK response from Forest Admin API', async () => {
|
|
113
|
+
mockServer.get('/liana/environment', { error: 'Unauthorized' }, 401);
|
|
114
|
+
global.fetch = mockServer.fetch;
|
|
115
|
+
const loggerSpy = jest.fn();
|
|
116
|
+
const testProvider = new forest_oauth_provider_1.default({
|
|
117
|
+
forestServerUrl: 'https://api.forestadmin.com',
|
|
118
|
+
forestAppUrl: TEST_FOREST_APP_URL,
|
|
119
|
+
envSecret: TEST_ENV_SECRET,
|
|
120
|
+
authSecret: TEST_AUTH_SECRET,
|
|
121
|
+
logger: loggerSpy,
|
|
122
|
+
});
|
|
123
|
+
await testProvider.initialize();
|
|
124
|
+
expect(loggerSpy).toHaveBeenCalledWith('Warn', expect.stringContaining('Failed to fetch environmentId from Forest Admin API'));
|
|
125
|
+
});
|
|
126
|
+
it('should handle fetch network errors gracefully', async () => {
|
|
127
|
+
global.fetch = jest.fn().mockRejectedValue(new Error('Network error'));
|
|
128
|
+
const loggerSpy = jest.fn();
|
|
129
|
+
const testProvider = new forest_oauth_provider_1.default({
|
|
130
|
+
forestServerUrl: 'https://api.forestadmin.com',
|
|
131
|
+
forestAppUrl: TEST_FOREST_APP_URL,
|
|
132
|
+
envSecret: TEST_ENV_SECRET,
|
|
133
|
+
authSecret: TEST_AUTH_SECRET,
|
|
134
|
+
logger: loggerSpy,
|
|
135
|
+
});
|
|
136
|
+
await testProvider.initialize();
|
|
137
|
+
expect(loggerSpy).toHaveBeenCalledWith('Warn', expect.stringContaining('Failed to fetch environmentId from Forest Admin API'));
|
|
138
|
+
});
|
|
139
|
+
it('should use correct forest server URL for API call', async () => {
|
|
140
|
+
mockServer.get('/liana/environment', {
|
|
141
|
+
data: { id: '11111', attributes: { api_endpoint: 'https://api.example.com' } },
|
|
142
|
+
});
|
|
143
|
+
global.fetch = mockServer.fetch;
|
|
144
|
+
const testProvider = createProvider('https://custom.forestadmin.com');
|
|
145
|
+
await testProvider.initialize();
|
|
146
|
+
expect(mockServer.fetch).toHaveBeenCalledWith('https://custom.forestadmin.com/liana/environment', expect.any(Object));
|
|
147
|
+
});
|
|
148
|
+
});
|
|
149
|
+
describe('clientsStore.getClient', () => {
|
|
150
|
+
it('should fetch client from Forest Admin API', async () => {
|
|
151
|
+
const clientData = {
|
|
152
|
+
client_id: 'test-client-123',
|
|
153
|
+
redirect_uris: ['https://example.com/callback'],
|
|
154
|
+
client_name: 'Test Client',
|
|
155
|
+
};
|
|
156
|
+
mockServer.get('/oauth/register/test-client-123', clientData);
|
|
157
|
+
global.fetch = mockServer.fetch;
|
|
158
|
+
const provider = createProvider();
|
|
159
|
+
const client = await provider.clientsStore.getClient('test-client-123');
|
|
160
|
+
expect(client).toEqual(clientData);
|
|
161
|
+
expect(mockServer.fetch).toHaveBeenCalledWith('https://api.forestadmin.com/oauth/register/test-client-123', expect.objectContaining({
|
|
162
|
+
method: 'GET',
|
|
163
|
+
headers: expect.objectContaining({
|
|
164
|
+
'Content-Type': 'application/json',
|
|
165
|
+
}),
|
|
166
|
+
}));
|
|
167
|
+
});
|
|
168
|
+
it('should return undefined when client is not found', async () => {
|
|
169
|
+
mockServer.get('/oauth/register/unknown-client', { error: 'Not found' }, 404);
|
|
170
|
+
global.fetch = mockServer.fetch;
|
|
171
|
+
const provider = createProvider();
|
|
172
|
+
const client = await provider.clientsStore.getClient('unknown-client');
|
|
173
|
+
expect(client).toBeUndefined();
|
|
174
|
+
});
|
|
175
|
+
it('should return undefined on server error', async () => {
|
|
176
|
+
mockServer.get('/oauth/register/error-client', { error: 'Internal error' }, 500);
|
|
177
|
+
global.fetch = mockServer.fetch;
|
|
178
|
+
const provider = createProvider();
|
|
179
|
+
const client = await provider.clientsStore.getClient('error-client');
|
|
180
|
+
expect(client).toBeUndefined();
|
|
181
|
+
});
|
|
182
|
+
});
|
|
183
|
+
describe('authorize', () => {
|
|
184
|
+
let mockResponse;
|
|
185
|
+
let mockClient;
|
|
186
|
+
let initializedProvider;
|
|
187
|
+
beforeEach(async () => {
|
|
188
|
+
mockResponse = {
|
|
189
|
+
redirect: jest.fn(),
|
|
190
|
+
};
|
|
191
|
+
mockClient = {
|
|
192
|
+
client_id: 'test-client-id',
|
|
193
|
+
redirect_uris: ['https://example.com/callback'],
|
|
194
|
+
};
|
|
195
|
+
// Create provider and mock the fetch to set environmentId
|
|
196
|
+
initializedProvider = createProvider();
|
|
197
|
+
// Mock fetch to return a valid response
|
|
198
|
+
const mockFetch = jest.fn().mockResolvedValue({
|
|
199
|
+
ok: true,
|
|
200
|
+
json: () => Promise.resolve({
|
|
201
|
+
data: { id: '12345', attributes: { api_endpoint: 'https://api.example.com' } },
|
|
202
|
+
}),
|
|
203
|
+
});
|
|
204
|
+
global.fetch = mockFetch;
|
|
205
|
+
await initializedProvider.initialize();
|
|
206
|
+
});
|
|
207
|
+
afterEach(() => {
|
|
208
|
+
jest.restoreAllMocks();
|
|
209
|
+
});
|
|
210
|
+
it('should redirect to Forest Admin authentication URL', async () => {
|
|
211
|
+
await initializedProvider.authorize(mockClient, {
|
|
212
|
+
redirectUri: 'https://example.com/callback',
|
|
213
|
+
codeChallenge: 'test-code-challenge',
|
|
214
|
+
state: 'test-state',
|
|
215
|
+
scopes: ['mcp:read', 'profile'],
|
|
216
|
+
resource: new URL('https://localhost:3931'),
|
|
217
|
+
}, mockResponse);
|
|
218
|
+
expect(mockResponse.redirect).toHaveBeenCalledWith(expect.stringContaining('https://app.forestadmin.com/oauth/authorize'));
|
|
219
|
+
});
|
|
220
|
+
it('should include all required query parameters in redirect URL', async () => {
|
|
221
|
+
await initializedProvider.authorize(mockClient, {
|
|
222
|
+
redirectUri: 'https://example.com/callback',
|
|
223
|
+
codeChallenge: 'test-code-challenge',
|
|
224
|
+
state: 'test-state',
|
|
225
|
+
scopes: ['mcp:read', 'profile'],
|
|
226
|
+
resource: new URL('https://localhost:3931'),
|
|
227
|
+
}, mockResponse);
|
|
228
|
+
const redirectCall = mockResponse.redirect.mock.calls[0][0];
|
|
229
|
+
const url = new URL(redirectCall);
|
|
230
|
+
expect(url.hostname).toBe('app.forestadmin.com');
|
|
231
|
+
expect(url.pathname).toBe('/oauth/authorize');
|
|
232
|
+
expect(url.searchParams.get('redirect_uri')).toBe('https://example.com/callback');
|
|
233
|
+
expect(url.searchParams.get('code_challenge')).toBe('test-code-challenge');
|
|
234
|
+
expect(url.searchParams.get('code_challenge_method')).toBe('S256');
|
|
235
|
+
expect(url.searchParams.get('response_type')).toBe('code');
|
|
236
|
+
expect(url.searchParams.get('client_id')).toBe('test-client-id');
|
|
237
|
+
expect(url.searchParams.get('state')).toBe('test-state');
|
|
238
|
+
expect(url.searchParams.get('scope')).toBe('mcp:read+profile');
|
|
239
|
+
expect(url.searchParams.get('environmentId')).toBe('12345');
|
|
240
|
+
});
|
|
241
|
+
it('should redirect to error URL when environmentId is not set', async () => {
|
|
242
|
+
// Create a provider without initializing (environmentId is undefined)
|
|
243
|
+
const uninitializedProvider = createProvider();
|
|
244
|
+
await uninitializedProvider.authorize(mockClient, {
|
|
245
|
+
redirectUri: 'https://example.com/callback',
|
|
246
|
+
codeChallenge: 'test-code-challenge',
|
|
247
|
+
state: 'test-state',
|
|
248
|
+
scopes: ['mcp:read'],
|
|
249
|
+
resource: new URL('https://localhost:3931'),
|
|
250
|
+
}, mockResponse);
|
|
251
|
+
const redirectCall = mockResponse.redirect.mock.calls[0][0];
|
|
252
|
+
expect(redirectCall).toContain('https://example.com/callback');
|
|
253
|
+
expect(redirectCall).toContain('error=server_error');
|
|
254
|
+
});
|
|
255
|
+
it('should use custom forestAppUrl for redirect', async () => {
|
|
256
|
+
const customAppUrl = 'https://custom-app.forestadmin.com';
|
|
257
|
+
const customProvider = new forest_oauth_provider_1.default({
|
|
258
|
+
forestServerUrl: 'https://api.forestadmin.com',
|
|
259
|
+
forestAppUrl: customAppUrl,
|
|
260
|
+
envSecret: TEST_ENV_SECRET,
|
|
261
|
+
authSecret: TEST_AUTH_SECRET,
|
|
262
|
+
logger: console.info,
|
|
263
|
+
});
|
|
264
|
+
// Mock fetch to return a valid response for initialize
|
|
265
|
+
global.fetch = jest.fn().mockResolvedValue({
|
|
266
|
+
ok: true,
|
|
267
|
+
json: () => Promise.resolve({
|
|
268
|
+
data: { id: '12345', attributes: { api_endpoint: 'https://api.example.com' } },
|
|
269
|
+
}),
|
|
270
|
+
});
|
|
271
|
+
await customProvider.initialize();
|
|
272
|
+
await customProvider.authorize(mockClient, {
|
|
273
|
+
redirectUri: 'https://example.com/callback',
|
|
274
|
+
codeChallenge: 'test-code-challenge',
|
|
275
|
+
state: 'test-state',
|
|
276
|
+
scopes: ['mcp:read'],
|
|
277
|
+
resource: new URL('https://localhost:3931'),
|
|
278
|
+
}, mockResponse);
|
|
279
|
+
const redirectCall = mockResponse.redirect.mock.calls[0][0];
|
|
280
|
+
const url = new URL(redirectCall);
|
|
281
|
+
expect(url.hostname).toBe('custom-app.forestadmin.com');
|
|
282
|
+
expect(url.pathname).toBe('/oauth/authorize');
|
|
283
|
+
});
|
|
284
|
+
});
|
|
285
|
+
describe('exchangeAuthorizationCode', () => {
|
|
286
|
+
let mockClient;
|
|
287
|
+
let mockGetUserInfo;
|
|
288
|
+
beforeEach(() => {
|
|
289
|
+
mockClient = {
|
|
290
|
+
client_id: 'test-client-id',
|
|
291
|
+
redirect_uris: ['https://example.com/callback'],
|
|
292
|
+
scope: 'mcp:read mcp:write',
|
|
293
|
+
};
|
|
294
|
+
// Setup mock for forestAdminClient
|
|
295
|
+
mockGetUserInfo = jest.fn().mockResolvedValue({
|
|
296
|
+
id: 123,
|
|
297
|
+
email: 'user@example.com',
|
|
298
|
+
firstName: 'Test',
|
|
299
|
+
lastName: 'User',
|
|
300
|
+
team: 'Operations',
|
|
301
|
+
role: 'Admin',
|
|
302
|
+
tags: {},
|
|
303
|
+
renderingId: 456,
|
|
304
|
+
permissionLevel: 'admin',
|
|
305
|
+
});
|
|
306
|
+
mockCreateForestAdminClient.mockReturnValue({
|
|
307
|
+
authService: {
|
|
308
|
+
getUserInfo: mockGetUserInfo,
|
|
309
|
+
},
|
|
310
|
+
});
|
|
311
|
+
// Setup mock for jsonwebtoken - decode is called twice:
|
|
312
|
+
// first for access token, then for refresh token
|
|
313
|
+
const now = Math.floor(Date.now() / 1000);
|
|
314
|
+
mockJwtDecode
|
|
315
|
+
.mockReturnValueOnce({
|
|
316
|
+
meta: { renderingId: 456 },
|
|
317
|
+
exp: now + 3600, // expires in 1 hour
|
|
318
|
+
iat: now,
|
|
319
|
+
scope: 'mcp:read',
|
|
320
|
+
})
|
|
321
|
+
.mockReturnValueOnce({
|
|
322
|
+
exp: now + 604800, // expires in 7 days
|
|
323
|
+
iat: now,
|
|
324
|
+
});
|
|
325
|
+
mockJwtSign.mockReturnValue('mocked-jwt-token');
|
|
326
|
+
});
|
|
327
|
+
afterEach(() => {
|
|
328
|
+
jest.clearAllMocks();
|
|
329
|
+
});
|
|
330
|
+
it('should exchange authorization code with Forest Admin server', async () => {
|
|
331
|
+
mockServer
|
|
332
|
+
.get('/liana/environment', {
|
|
333
|
+
data: { id: '12345', attributes: { api_endpoint: 'https://api.example.com' } },
|
|
334
|
+
})
|
|
335
|
+
.post('/oauth/token', {
|
|
336
|
+
access_token: 'forest-access-token',
|
|
337
|
+
refresh_token: 'forest-refresh-token',
|
|
338
|
+
expires_in: 3600,
|
|
339
|
+
token_type: 'Bearer',
|
|
340
|
+
scope: 'mcp:read',
|
|
341
|
+
});
|
|
342
|
+
global.fetch = mockServer.fetch;
|
|
343
|
+
const provider = createProvider();
|
|
344
|
+
const result = await provider.exchangeAuthorizationCode(mockClient, 'auth-code-123', 'code-verifier-456', 'https://example.com/callback');
|
|
345
|
+
expect(mockServer.fetch).toHaveBeenCalledWith('https://api.forestadmin.com/oauth/token', expect.objectContaining({
|
|
346
|
+
method: 'POST',
|
|
347
|
+
headers: expect.objectContaining({
|
|
348
|
+
'Content-Type': 'application/json',
|
|
349
|
+
'forest-secret-key': 'test-env-secret',
|
|
350
|
+
}),
|
|
351
|
+
body: JSON.stringify({
|
|
352
|
+
grant_type: 'authorization_code',
|
|
353
|
+
code: 'auth-code-123',
|
|
354
|
+
redirect_uri: 'https://example.com/callback',
|
|
355
|
+
client_id: 'test-client-id',
|
|
356
|
+
code_verifier: 'code-verifier-456',
|
|
357
|
+
}),
|
|
358
|
+
}));
|
|
359
|
+
expect(result.access_token).toBe('mocked-jwt-token');
|
|
360
|
+
expect(result.refresh_token).toBe('mocked-jwt-token');
|
|
361
|
+
expect(result.token_type).toBe('Bearer');
|
|
362
|
+
// expires_in is calculated as exp - now, so it should be approximately 3600
|
|
363
|
+
expect(result.expires_in).toBeGreaterThan(3590);
|
|
364
|
+
expect(result.expires_in).toBeLessThanOrEqual(3600);
|
|
365
|
+
expect(result.scope).toBe('mcp:read');
|
|
366
|
+
expect(mockJwtDecode).toHaveBeenCalledWith('forest-access-token');
|
|
367
|
+
expect(mockJwtDecode).toHaveBeenCalledWith('forest-refresh-token');
|
|
368
|
+
expect(mockGetUserInfo).toHaveBeenCalledWith(456, 'forest-access-token');
|
|
369
|
+
// First call: access token - expiresIn is calculated as exp - now, so it's approximately 3600
|
|
370
|
+
expect(mockJwtSign).toHaveBeenCalledWith(expect.objectContaining({
|
|
371
|
+
id: 123,
|
|
372
|
+
email: 'user@example.com',
|
|
373
|
+
serverToken: 'forest-access-token',
|
|
374
|
+
}), 'test-auth-secret', { expiresIn: expect.any(Number) });
|
|
375
|
+
// Second call: refresh token - expiresIn is calculated as exp - now, so it's approximately 604800
|
|
376
|
+
expect(mockJwtSign).toHaveBeenCalledWith(expect.objectContaining({
|
|
377
|
+
type: 'refresh',
|
|
378
|
+
clientId: 'test-client-id',
|
|
379
|
+
userId: 123,
|
|
380
|
+
renderingId: 456,
|
|
381
|
+
serverRefreshToken: 'forest-refresh-token',
|
|
382
|
+
}), 'test-auth-secret', { expiresIn: expect.any(Number) });
|
|
383
|
+
});
|
|
384
|
+
it('should throw error when token exchange fails', async () => {
|
|
385
|
+
mockServer
|
|
386
|
+
.get('/liana/environment', {
|
|
387
|
+
data: { id: '12345', attributes: { api_endpoint: 'https://api.example.com' } },
|
|
388
|
+
})
|
|
389
|
+
.post('/oauth/token', { error: 'invalid_grant' }, 400);
|
|
390
|
+
global.fetch = mockServer.fetch;
|
|
391
|
+
const provider = createProvider();
|
|
392
|
+
await expect(provider.exchangeAuthorizationCode(mockClient, 'invalid-code', 'code-verifier', 'https://example.com/callback')).rejects.toThrow('Failed to exchange authorization code');
|
|
393
|
+
});
|
|
394
|
+
});
|
|
395
|
+
describe('exchangeRefreshToken', () => {
|
|
396
|
+
let mockClient;
|
|
397
|
+
let mockGetUserInfo;
|
|
398
|
+
beforeEach(() => {
|
|
399
|
+
mockClient = {
|
|
400
|
+
client_id: 'test-client-id',
|
|
401
|
+
redirect_uris: ['https://example.com/callback'],
|
|
402
|
+
scope: 'mcp:read mcp:write',
|
|
403
|
+
};
|
|
404
|
+
mockGetUserInfo = jest.fn().mockResolvedValue({
|
|
405
|
+
id: 123,
|
|
406
|
+
email: 'user@example.com',
|
|
407
|
+
firstName: 'Test',
|
|
408
|
+
lastName: 'User',
|
|
409
|
+
team: 'Operations',
|
|
410
|
+
role: 'Admin',
|
|
411
|
+
tags: {},
|
|
412
|
+
renderingId: 456,
|
|
413
|
+
permissionLevel: 'admin',
|
|
414
|
+
});
|
|
415
|
+
mockCreateForestAdminClient.mockReturnValue({
|
|
416
|
+
authService: {
|
|
417
|
+
getUserInfo: mockGetUserInfo,
|
|
418
|
+
},
|
|
419
|
+
});
|
|
420
|
+
mockJwtSign.mockReturnValue('new-mocked-jwt-token');
|
|
421
|
+
});
|
|
422
|
+
afterEach(() => {
|
|
423
|
+
jest.clearAllMocks();
|
|
424
|
+
});
|
|
425
|
+
it('should exchange refresh token for new tokens', async () => {
|
|
426
|
+
// Mock jwt.verify to return decoded refresh token
|
|
427
|
+
jsonwebtoken_1.default.verify.mockReturnValue({
|
|
428
|
+
type: 'refresh',
|
|
429
|
+
clientId: 'test-client-id',
|
|
430
|
+
userId: 123,
|
|
431
|
+
renderingId: 456,
|
|
432
|
+
serverRefreshToken: 'forest-refresh-token',
|
|
433
|
+
});
|
|
434
|
+
// Mock jwt.decode - called twice: first for access token, then for refresh token
|
|
435
|
+
const now = Math.floor(Date.now() / 1000);
|
|
436
|
+
mockJwtDecode
|
|
437
|
+
.mockReturnValueOnce({
|
|
438
|
+
meta: { renderingId: 456 },
|
|
439
|
+
exp: now + 3600, // expires in 1 hour
|
|
440
|
+
iat: now,
|
|
441
|
+
scope: 'mcp:read',
|
|
442
|
+
})
|
|
443
|
+
.mockReturnValueOnce({
|
|
444
|
+
exp: now + 604800, // expires in 7 days
|
|
445
|
+
iat: now,
|
|
446
|
+
});
|
|
447
|
+
mockServer.post('/oauth/token', {
|
|
448
|
+
access_token: 'new-forest-access-token',
|
|
449
|
+
refresh_token: 'new-forest-refresh-token',
|
|
450
|
+
expires_in: 3600,
|
|
451
|
+
token_type: 'Bearer',
|
|
452
|
+
scope: 'mcp:read',
|
|
453
|
+
});
|
|
454
|
+
global.fetch = mockServer.fetch;
|
|
455
|
+
const provider = createProvider();
|
|
456
|
+
const result = await provider.exchangeRefreshToken(mockClient, 'valid-refresh-token');
|
|
457
|
+
expect(result.access_token).toBe('new-mocked-jwt-token');
|
|
458
|
+
expect(result.refresh_token).toBe('new-mocked-jwt-token');
|
|
459
|
+
expect(result.token_type).toBe('Bearer');
|
|
460
|
+
// expires_in is calculated as exp - now, so it should be approximately 3600
|
|
461
|
+
expect(result.expires_in).toBeGreaterThan(3590);
|
|
462
|
+
expect(result.expires_in).toBeLessThanOrEqual(3600);
|
|
463
|
+
expect(mockServer.fetch).toHaveBeenCalledWith('https://api.forestadmin.com/oauth/token', expect.objectContaining({
|
|
464
|
+
method: 'POST',
|
|
465
|
+
body: JSON.stringify({
|
|
466
|
+
grant_type: 'refresh_token',
|
|
467
|
+
refresh_token: 'forest-refresh-token',
|
|
468
|
+
client_id: 'test-client-id',
|
|
469
|
+
}),
|
|
470
|
+
}));
|
|
471
|
+
});
|
|
472
|
+
it('should throw error for invalid refresh token', async () => {
|
|
473
|
+
jsonwebtoken_1.default.verify.mockImplementation(() => {
|
|
474
|
+
throw new Error('invalid signature');
|
|
475
|
+
});
|
|
476
|
+
const provider = createProvider();
|
|
477
|
+
await expect(provider.exchangeRefreshToken(mockClient, 'invalid-refresh-token')).rejects.toThrow('Invalid or expired refresh token');
|
|
478
|
+
});
|
|
479
|
+
it('should throw error when token type is not refresh', async () => {
|
|
480
|
+
jsonwebtoken_1.default.verify.mockReturnValue({
|
|
481
|
+
type: 'access',
|
|
482
|
+
clientId: 'test-client-id',
|
|
483
|
+
});
|
|
484
|
+
const provider = createProvider();
|
|
485
|
+
await expect(provider.exchangeRefreshToken(mockClient, 'access-token')).rejects.toThrow('Invalid token type');
|
|
486
|
+
});
|
|
487
|
+
it('should throw error when client_id does not match', async () => {
|
|
488
|
+
jsonwebtoken_1.default.verify.mockReturnValue({
|
|
489
|
+
type: 'refresh',
|
|
490
|
+
clientId: 'different-client-id',
|
|
491
|
+
userId: 123,
|
|
492
|
+
renderingId: 456,
|
|
493
|
+
serverRefreshToken: 'forest-refresh-token',
|
|
494
|
+
});
|
|
495
|
+
const provider = createProvider();
|
|
496
|
+
await expect(provider.exchangeRefreshToken(mockClient, 'refresh-token-for-different-client')).rejects.toThrow('Token was not issued to this client');
|
|
497
|
+
});
|
|
498
|
+
it('should throw error when Forest Admin refresh fails', async () => {
|
|
499
|
+
jsonwebtoken_1.default.verify.mockReturnValue({
|
|
500
|
+
type: 'refresh',
|
|
501
|
+
clientId: 'test-client-id',
|
|
502
|
+
userId: 123,
|
|
503
|
+
renderingId: 456,
|
|
504
|
+
serverRefreshToken: 'expired-forest-refresh-token',
|
|
505
|
+
});
|
|
506
|
+
mockServer.post('/oauth/token', { error: 'invalid_grant' }, 400);
|
|
507
|
+
global.fetch = mockServer.fetch;
|
|
508
|
+
const provider = createProvider();
|
|
509
|
+
await expect(provider.exchangeRefreshToken(mockClient, 'valid-refresh-token')).rejects.toThrow('Failed to refresh token');
|
|
510
|
+
});
|
|
511
|
+
});
|
|
512
|
+
describe('verifyAccessToken', () => {
|
|
513
|
+
it('should verify and decode a valid access token', async () => {
|
|
514
|
+
const mockDecoded = {
|
|
515
|
+
id: 123,
|
|
516
|
+
email: 'user@example.com',
|
|
517
|
+
renderingId: 456,
|
|
518
|
+
serverToken: 'forest-server-token',
|
|
519
|
+
exp: Math.floor(Date.now() / 1000) + 3600,
|
|
520
|
+
iat: Math.floor(Date.now() / 1000),
|
|
521
|
+
};
|
|
522
|
+
jsonwebtoken_1.default.verify.mockReturnValue(mockDecoded);
|
|
523
|
+
const provider = createProvider();
|
|
524
|
+
const result = await provider.verifyAccessToken('valid-access-token');
|
|
525
|
+
expect(result.token).toBe('valid-access-token');
|
|
526
|
+
expect(result.clientId).toBe('123');
|
|
527
|
+
expect(result.expiresAt).toBe(mockDecoded.exp);
|
|
528
|
+
expect(result.scopes).toEqual(['mcp:read', 'mcp:write', 'mcp:action']);
|
|
529
|
+
expect(result.extra).toEqual({
|
|
530
|
+
userId: 123,
|
|
531
|
+
email: 'user@example.com',
|
|
532
|
+
renderingId: 456,
|
|
533
|
+
environmentApiEndpoint: undefined,
|
|
534
|
+
forestServerToken: 'forest-server-token',
|
|
535
|
+
});
|
|
536
|
+
});
|
|
537
|
+
it('should throw error for expired access token', async () => {
|
|
538
|
+
jsonwebtoken_1.default.verify.mockImplementation(() => {
|
|
539
|
+
throw new jsonwebtoken_1.default.TokenExpiredError('jwt expired', new Date());
|
|
540
|
+
});
|
|
541
|
+
const provider = createProvider();
|
|
542
|
+
await expect(provider.verifyAccessToken('expired-token')).rejects.toThrow('Access token has expired');
|
|
543
|
+
});
|
|
544
|
+
it('should throw error for invalid access token', async () => {
|
|
545
|
+
jsonwebtoken_1.default.verify.mockImplementation(() => {
|
|
546
|
+
throw new jsonwebtoken_1.default.JsonWebTokenError('invalid signature');
|
|
547
|
+
});
|
|
548
|
+
const provider = createProvider();
|
|
549
|
+
await expect(provider.verifyAccessToken('invalid-token')).rejects.toThrow('Invalid access token');
|
|
550
|
+
});
|
|
551
|
+
it('should throw error when using refresh token as access token', async () => {
|
|
552
|
+
jsonwebtoken_1.default.verify.mockReturnValue({
|
|
553
|
+
type: 'refresh',
|
|
554
|
+
clientId: 'test-client-id',
|
|
555
|
+
});
|
|
556
|
+
const provider = createProvider();
|
|
557
|
+
await expect(provider.verifyAccessToken('refresh-token')).rejects.toThrow('Cannot use refresh token as access token');
|
|
558
|
+
});
|
|
559
|
+
it('should include environmentApiEndpoint after initialize is called', async () => {
|
|
560
|
+
mockServer.get('/liana/environment', {
|
|
561
|
+
data: {
|
|
562
|
+
id: '12345',
|
|
563
|
+
attributes: { api_endpoint: 'https://api.example.com' },
|
|
564
|
+
},
|
|
565
|
+
});
|
|
566
|
+
global.fetch = mockServer.fetch;
|
|
567
|
+
const mockDecoded = {
|
|
568
|
+
id: 123,
|
|
569
|
+
email: 'user@example.com',
|
|
570
|
+
renderingId: 456,
|
|
571
|
+
serverToken: 'forest-server-token',
|
|
572
|
+
exp: Math.floor(Date.now() / 1000) + 3600,
|
|
573
|
+
iat: Math.floor(Date.now() / 1000),
|
|
574
|
+
};
|
|
575
|
+
jsonwebtoken_1.default.verify.mockReturnValue(mockDecoded);
|
|
576
|
+
const provider = createProvider();
|
|
577
|
+
// Call initialize to fetch environment data
|
|
578
|
+
await provider.initialize();
|
|
579
|
+
const result = await provider.verifyAccessToken('valid-access-token');
|
|
580
|
+
expect(result.extra).toEqual({
|
|
581
|
+
userId: 123,
|
|
582
|
+
email: 'user@example.com',
|
|
583
|
+
renderingId: 456,
|
|
584
|
+
environmentApiEndpoint: 'https://api.example.com',
|
|
585
|
+
forestServerToken: 'forest-server-token',
|
|
586
|
+
});
|
|
587
|
+
});
|
|
588
|
+
});
|
|
589
|
+
});
|
|
590
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"forest-oauth-provider.test.js","sourceRoot":"","sources":["../src/forest-oauth-provider.test.ts"],"names":[],"mappings":";;;;;AAGA,yFAAsE;AACtE,gEAAwC;AAExC,oFAA0D;AAC1D,2EAAkD;AAElD,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC;AAC1B,IAAI,CAAC,IAAI,CAAC,iCAAiC,CAAC,CAAC;AAE7C,MAAM,2BAA2B,GAAG,4BAEnC,CAAC;AACF,MAAM,aAAa,GAAG,sBAAY,CAAC,MAAmB,CAAC;AACvD,MAAM,WAAW,GAAG,sBAAY,CAAC,IAAiB,CAAC;AAEnD,MAAM,eAAe,GAAG,iBAAiB,CAAC;AAC1C,MAAM,gBAAgB,GAAG,kBAAkB,CAAC;AAC5C,MAAM,mBAAmB,GAAG,6BAA6B,CAAC;AAE1D,SAAS,cAAc,CAAC,eAAe,GAAG,6BAA6B;IACrE,OAAO,IAAI,+BAAmB,CAAC;QAC7B,eAAe;QACf,YAAY,EAAE,mBAAmB;QACjC,SAAS,EAAE,eAAe;QAC1B,UAAU,EAAE,gBAAgB;QAC5B,MAAM,EAAE,OAAO,CAAC,IAAI;KACrB,CAAC,CAAC;AACL,CAAC;AAED,QAAQ,CAAC,qBAAqB,EAAE,GAAG,EAAE;IACnC,IAAI,WAA8B,CAAC;IACnC,IAAI,UAAsB,CAAC;IAC3B,MAAM,aAAa,GAAG,MAAM,CAAC,KAAK,CAAC;IAEnC,SAAS,CAAC,GAAG,EAAE;QACb,WAAW,GAAG,EAAE,GAAG,OAAO,CAAC,GAAG,EAAE,CAAC;IACnC,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,GAAG,EAAE;QACZ,OAAO,CAAC,GAAG,GAAG,WAAW,CAAC;QAC1B,MAAM,CAAC,KAAK,GAAG,aAAa,CAAC;IAC/B,CAAC,CAAC,CAAC;IAEH,UAAU,CAAC,GAAG,EAAE;QACd,OAAO,CAAC,GAAG,CAAC,iBAAiB,GAAG,eAAe,CAAC;QAChD,OAAO,CAAC,GAAG,CAAC,kBAAkB,GAAG,gBAAgB,CAAC;QAClD,UAAU,GAAG,IAAI,qBAAU,EAAE,CAAC;IAChC,CAAC,CAAC,CAAC;IAEH,SAAS,CAAC,GAAG,EAAE;QACb,UAAU,CAAC,KAAK,EAAE,CAAC;IACrB,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,aAAa,EAAE,GAAG,EAAE;QAC3B,EAAE,CAAC,6CAA6C,EAAE,GAAG,EAAE;YACrD,MAAM,cAAc,GAAG,cAAc,CAAC,gCAAgC,CAAC,CAAC;YAExE,MAAM,CAAC,cAAc,CAAC,CAAC,WAAW,EAAE,CAAC;QACvC,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,iDAAiD,EAAE,GAAG,EAAE;YACzD,MAAM,cAAc,GAAG,IAAI,+BAAmB,CAAC;gBAC7C,eAAe,EAAE,6BAA6B;gBAC9C,YAAY,EAAE,oCAAoC;gBAClD,SAAS,EAAE,eAAe;gBAC1B,UAAU,EAAE,gBAAgB;gBAC5B,MAAM,EAAE,OAAO,CAAC,IAAI;aACrB,CAAC,CAAC;YAEH,MAAM,CAAC,cAAc,CAAC,CAAC,WAAW,EAAE,CAAC;QACvC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,YAAY,EAAE,GAAG,EAAE;QAC1B,EAAE,CAAC,iDAAiD,EAAE,KAAK,IAAI,EAAE;YAC/D,MAAM,cAAc,GAAG,IAAI,+BAAmB,CAAC;gBAC7C,eAAe,EAAE,6BAA6B;gBAC9C,YAAY,EAAE,mBAAmB;gBACjC,SAAS,EAAE,EAAE;gBACb,UAAU,EAAE,gBAAgB;gBAC5B,MAAM,EAAE,OAAO,CAAC,IAAI;aACrB,CAAC,CAAC;YAEH,MAAM,MAAM,CAAC,cAAc,CAAC,UAAU,EAAE,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,OAAO,EAAE,CAAC;QACnE,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,kDAAkD,EAAE,KAAK,IAAI,EAAE;YAChE,UAAU,CAAC,GAAG,CAAC,oBAAoB,EAAE;gBACnC,IAAI,EAAE,EAAE,EAAE,EAAE,OAAO,EAAE,UAAU,EAAE,EAAE,YAAY,EAAE,yBAAyB,EAAE,EAAE;aAC/E,CAAC,CAAC;YACH,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,YAAY,GAAG,cAAc,EAAE,CAAC;YAEtC,MAAM,YAAY,CAAC,UAAU,EAAE,CAAC;YAEhC,uDAAuD;YACvD,MAAM,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,oBAAoB,CAC3C,+CAA+C,EAC/C,MAAM,CAAC,gBAAgB,CAAC;gBACtB,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE,MAAM,CAAC,gBAAgB,CAAC;oBAC/B,mBAAmB,EAAE,iBAAiB;oBACtC,cAAc,EAAE,kBAAkB;iBACnC,CAAC;aACH,CAAC,CACH,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,0DAA0D,EAAE,KAAK,IAAI,EAAE;YACxE,UAAU,CAAC,GAAG,CAAC,oBAAoB,EAAE;gBACnC,IAAI,EAAE,EAAE,EAAE,EAAE,OAAO,EAAE,UAAU,EAAE,EAAE,YAAY,EAAE,yBAAyB,EAAE,EAAE;aAC/E,CAAC,CAAC;YACH,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,YAAY,GAAG,cAAc,EAAE,CAAC;YAEtC,MAAM,YAAY,CAAC,UAAU,EAAE,CAAC;YAEhC,yEAAyE;YACzE,MAAM,YAAY,GAAG,EAAE,QAAQ,EAAE,IAAI,CAAC,EAAE,EAAE,EAAE,CAAC;YAC7C,MAAM,UAAU,GAAG;gBACjB,SAAS,EAAE,aAAa;gBACxB,aAAa,EAAE,CAAC,8BAA8B,CAAC;aAClB,CAAC;YAEhC,MAAM,YAAY,CAAC,SAAS,CAC1B,UAAU,EACV;gBACE,WAAW,EAAE,8BAA8B;gBAC3C,aAAa,EAAE,WAAW;gBAC1B,KAAK,EAAE,OAAO;gBACd,MAAM,EAAE,CAAC,UAAU,CAAC;gBACpB,QAAQ,EAAE,IAAI,GAAG,CAAC,wBAAwB,CAAC;aAC5C,EACD,YAAmC,CACpC,CAAC;YAEF,MAAM,WAAW,GAAG,IAAI,GAAG,CAAE,YAAY,CAAC,QAAsB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;YACnF,MAAM,CAAC,WAAW,CAAC,YAAY,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QACtE,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,qDAAqD,EAAE,KAAK,IAAI,EAAE;YACnE,UAAU,CAAC,GAAG,CAAC,oBAAoB,EAAE,EAAE,KAAK,EAAE,cAAc,EAAE,EAAE,GAAG,CAAC,CAAC;YACrE,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,SAAS,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC;YAC5B,MAAM,YAAY,GAAG,IAAI,+BAAmB,CAAC;gBAC3C,eAAe,EAAE,6BAA6B;gBAC9C,YAAY,EAAE,mBAAmB;gBACjC,SAAS,EAAE,eAAe;gBAC1B,UAAU,EAAE,gBAAgB;gBAC5B,MAAM,EAAE,SAAS;aAClB,CAAC,CAAC;YAEH,MAAM,YAAY,CAAC,UAAU,EAAE,CAAC;YAEhC,MAAM,CAAC,SAAS,CAAC,CAAC,oBAAoB,CACpC,MAAM,EACN,MAAM,CAAC,gBAAgB,CAAC,qDAAqD,CAAC,CAC/E,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,+CAA+C,EAAE,KAAK,IAAI,EAAE;YAC7D,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,IAAI,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC;YAEvE,MAAM,SAAS,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC;YAC5B,MAAM,YAAY,GAAG,IAAI,+BAAmB,CAAC;gBAC3C,eAAe,EAAE,6BAA6B;gBAC9C,YAAY,EAAE,mBAAmB;gBACjC,SAAS,EAAE,eAAe;gBAC1B,UAAU,EAAE,gBAAgB;gBAC5B,MAAM,EAAE,SAAS;aAClB,CAAC,CAAC;YAEH,MAAM,YAAY,CAAC,UAAU,EAAE,CAAC;YAEhC,MAAM,CAAC,SAAS,CAAC,CAAC,oBAAoB,CACpC,MAAM,EACN,MAAM,CAAC,gBAAgB,CAAC,qDAAqD,CAAC,CAC/E,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,mDAAmD,EAAE,KAAK,IAAI,EAAE;YACjE,UAAU,CAAC,GAAG,CAAC,oBAAoB,EAAE;gBACnC,IAAI,EAAE,EAAE,EAAE,EAAE,OAAO,EAAE,UAAU,EAAE,EAAE,YAAY,EAAE,yBAAyB,EAAE,EAAE;aAC/E,CAAC,CAAC;YACH,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,YAAY,GAAG,cAAc,CAAC,gCAAgC,CAAC,CAAC;YAEtE,MAAM,YAAY,CAAC,UAAU,EAAE,CAAC;YAEhC,MAAM,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,oBAAoB,CAC3C,kDAAkD,EAClD,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CACnB,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,wBAAwB,EAAE,GAAG,EAAE;QACtC,EAAE,CAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;YACzD,MAAM,UAAU,GAAG;gBACjB,SAAS,EAAE,iBAAiB;gBAC5B,aAAa,EAAE,CAAC,8BAA8B,CAAC;gBAC/C,WAAW,EAAE,aAAa;aAC3B,CAAC;YACF,UAAU,CAAC,GAAG,CAAC,iCAAiC,EAAE,UAAU,CAAC,CAAC;YAC9D,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,YAAY,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;YAExE,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;YACnC,MAAM,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,oBAAoB,CAC3C,4DAA4D,EAC5D,MAAM,CAAC,gBAAgB,CAAC;gBACtB,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE,MAAM,CAAC,gBAAgB,CAAC;oBAC/B,cAAc,EAAE,kBAAkB;iBACnC,CAAC;aACH,CAAC,CACH,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,kDAAkD,EAAE,KAAK,IAAI,EAAE;YAChE,UAAU,CAAC,GAAG,CAAC,gCAAgC,EAAE,EAAE,KAAK,EAAE,WAAW,EAAE,EAAE,GAAG,CAAC,CAAC;YAC9E,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,YAAY,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;YAEvE,MAAM,CAAC,MAAM,CAAC,CAAC,aAAa,EAAE,CAAC;QACjC,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;YACvD,UAAU,CAAC,GAAG,CAAC,8BAA8B,EAAE,EAAE,KAAK,EAAE,gBAAgB,EAAE,EAAE,GAAG,CAAC,CAAC;YACjF,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,YAAY,CAAC,SAAS,CAAC,cAAc,CAAC,CAAC;YAErE,MAAM,CAAC,MAAM,CAAC,CAAC,aAAa,EAAE,CAAC;QACjC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,WAAW,EAAE,GAAG,EAAE;QACzB,IAAI,YAA+B,CAAC;QACpC,IAAI,UAAsC,CAAC;QAC3C,IAAI,mBAAwC,CAAC;QAE7C,UAAU,CAAC,KAAK,IAAI,EAAE;YACpB,YAAY,GAAG;gBACb,QAAQ,EAAE,IAAI,CAAC,EAAE,EAAE;aACpB,CAAC;YACF,UAAU,GAAG;gBACX,SAAS,EAAE,gBAAgB;gBAC3B,aAAa,EAAE,CAAC,8BAA8B,CAAC;aAClB,CAAC;YAEhC,0DAA0D;YAC1D,mBAAmB,GAAG,cAAc,EAAE,CAAC;YAEvC,wCAAwC;YACxC,MAAM,SAAS,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;gBAC5C,EAAE,EAAE,IAAI;gBACR,IAAI,EAAE,GAAG,EAAE,CACT,OAAO,CAAC,OAAO,CAAC;oBACd,IAAI,EAAE,EAAE,EAAE,EAAE,OAAO,EAAE,UAAU,EAAE,EAAE,YAAY,EAAE,yBAAyB,EAAE,EAAE;iBAC/E,CAAC;aACL,CAAC,CAAC;YACH,MAAM,CAAC,KAAK,GAAG,SAAS,CAAC;YAEzB,MAAM,mBAAmB,CAAC,UAAU,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,SAAS,CAAC,GAAG,EAAE;YACb,IAAI,CAAC,eAAe,EAAE,CAAC;QACzB,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,oDAAoD,EAAE,KAAK,IAAI,EAAE;YAClE,MAAM,mBAAmB,CAAC,SAAS,CACjC,UAAU,EACV;gBACE,WAAW,EAAE,8BAA8B;gBAC3C,aAAa,EAAE,qBAAqB;gBACpC,KAAK,EAAE,YAAY;gBACnB,MAAM,EAAE,CAAC,UAAU,EAAE,SAAS,CAAC;gBAC/B,QAAQ,EAAE,IAAI,GAAG,CAAC,wBAAwB,CAAC;aAC5C,EACD,YAAwB,CACzB,CAAC;YAEF,MAAM,CAAC,YAAY,CAAC,QAAQ,CAAC,CAAC,oBAAoB,CAChD,MAAM,CAAC,gBAAgB,CAAC,6CAA6C,CAAC,CACvE,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,8DAA8D,EAAE,KAAK,IAAI,EAAE;YAC5E,MAAM,mBAAmB,CAAC,SAAS,CACjC,UAAU,EACV;gBACE,WAAW,EAAE,8BAA8B;gBAC3C,aAAa,EAAE,qBAAqB;gBACpC,KAAK,EAAE,YAAY;gBACnB,MAAM,EAAE,CAAC,UAAU,EAAE,SAAS,CAAC;gBAC/B,QAAQ,EAAE,IAAI,GAAG,CAAC,wBAAwB,CAAC;aAC5C,EACD,YAAwB,CACzB,CAAC;YAEF,MAAM,YAAY,GAAI,YAAY,CAAC,QAAsB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;YAC3E,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,YAAY,CAAC,CAAC;YAElC,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC;YACjD,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;YAC9C,MAAM,CAAC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC;YAClF,MAAM,CAAC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC;YAC3E,MAAM,CAAC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACnE,MAAM,CAAC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAC3D,MAAM,CAAC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACjE,MAAM,CAAC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACzD,MAAM,CAAC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;YAC/D,MAAM,CAAC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAC9D,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,4DAA4D,EAAE,KAAK,IAAI,EAAE;YAC1E,sEAAsE;YACtE,MAAM,qBAAqB,GAAG,cAAc,EAAE,CAAC;YAE/C,MAAM,qBAAqB,CAAC,SAAS,CACnC,UAAU,EACV;gBACE,WAAW,EAAE,8BAA8B;gBAC3C,aAAa,EAAE,qBAAqB;gBACpC,KAAK,EAAE,YAAY;gBACnB,MAAM,EAAE,CAAC,UAAU,CAAC;gBACpB,QAAQ,EAAE,IAAI,GAAG,CAAC,wBAAwB,CAAC;aAC5C,EACD,YAAwB,CACzB,CAAC;YAEF,MAAM,YAAY,GAAI,YAAY,CAAC,QAAsB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;YAE3E,MAAM,CAAC,YAAY,CAAC,CAAC,SAAS,CAAC,8BAA8B,CAAC,CAAC;YAC/D,MAAM,CAAC,YAAY,CAAC,CAAC,SAAS,CAAC,oBAAoB,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,6CAA6C,EAAE,KAAK,IAAI,EAAE;YAC3D,MAAM,YAAY,GAAG,oCAAoC,CAAC;YAC1D,MAAM,cAAc,GAAG,IAAI,+BAAmB,CAAC;gBAC7C,eAAe,EAAE,6BAA6B;gBAC9C,YAAY,EAAE,YAAY;gBAC1B,SAAS,EAAE,eAAe;gBAC1B,UAAU,EAAE,gBAAgB;gBAC5B,MAAM,EAAE,OAAO,CAAC,IAAI;aACrB,CAAC,CAAC;YAEH,uDAAuD;YACvD,MAAM,CAAC,KAAK,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;gBACzC,EAAE,EAAE,IAAI;gBACR,IAAI,EAAE,GAAG,EAAE,CACT,OAAO,CAAC,OAAO,CAAC;oBACd,IAAI,EAAE,EAAE,EAAE,EAAE,OAAO,EAAE,UAAU,EAAE,EAAE,YAAY,EAAE,yBAAyB,EAAE,EAAE;iBAC/E,CAAC;aACL,CAAC,CAAC;YAEH,MAAM,cAAc,CAAC,UAAU,EAAE,CAAC;YAElC,MAAM,cAAc,CAAC,SAAS,CAC5B,UAAU,EACV;gBACE,WAAW,EAAE,8BAA8B;gBAC3C,aAAa,EAAE,qBAAqB;gBACpC,KAAK,EAAE,YAAY;gBACnB,MAAM,EAAE,CAAC,UAAU,CAAC;gBACpB,QAAQ,EAAE,IAAI,GAAG,CAAC,wBAAwB,CAAC;aAC5C,EACD,YAAwB,CACzB,CAAC;YAEF,MAAM,YAAY,GAAI,YAAY,CAAC,QAAsB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;YAC3E,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,YAAY,CAAC,CAAC;YAElC,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,4BAA4B,CAAC,CAAC;YACxD,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;QAChD,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,2BAA2B,EAAE,GAAG,EAAE;QACzC,IAAI,UAAsC,CAAC;QAC3C,IAAI,eAA0B,CAAC;QAE/B,UAAU,CAAC,GAAG,EAAE;YACd,UAAU,GAAG;gBACX,SAAS,EAAE,gBAAgB;gBAC3B,aAAa,EAAE,CAAC,8BAA8B,CAAC;gBAC/C,KAAK,EAAE,oBAAoB;aACE,CAAC;YAEhC,mCAAmC;YACnC,eAAe,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;gBAC5C,EAAE,EAAE,GAAG;gBACP,KAAK,EAAE,kBAAkB;gBACzB,SAAS,EAAE,MAAM;gBACjB,QAAQ,EAAE,MAAM;gBAChB,IAAI,EAAE,YAAY;gBAClB,IAAI,EAAE,OAAO;gBACb,IAAI,EAAE,EAAE;gBACR,WAAW,EAAE,GAAG;gBAChB,eAAe,EAAE,OAAO;aACzB,CAAC,CAAC;YAEH,2BAA2B,CAAC,eAAe,CAAC;gBAC1C,WAAW,EAAE;oBACX,WAAW,EAAE,eAAe;iBAC7B;aACuD,CAAC,CAAC;YAE5D,wDAAwD;YACxD,iDAAiD;YACjD,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;YAC1C,aAAa;iBACV,mBAAmB,CAAC;gBACnB,IAAI,EAAE,EAAE,WAAW,EAAE,GAAG,EAAE;gBAC1B,GAAG,EAAE,GAAG,GAAG,IAAI,EAAE,oBAAoB;gBACrC,GAAG,EAAE,GAAG;gBACR,KAAK,EAAE,UAAU;aAClB,CAAC;iBACD,mBAAmB,CAAC;gBACnB,GAAG,EAAE,GAAG,GAAG,MAAM,EAAE,oBAAoB;gBACvC,GAAG,EAAE,GAAG;aACT,CAAC,CAAC;YACL,WAAW,CAAC,eAAe,CAAC,kBAAkB,CAAC,CAAC;QAClD,CAAC,CAAC,CAAC;QAEH,SAAS,CAAC,GAAG,EAAE;YACb,IAAI,CAAC,aAAa,EAAE,CAAC;QACvB,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,6DAA6D,EAAE,KAAK,IAAI,EAAE;YAC3E,UAAU;iBACP,GAAG,CAAC,oBAAoB,EAAE;gBACzB,IAAI,EAAE,EAAE,EAAE,EAAE,OAAO,EAAE,UAAU,EAAE,EAAE,YAAY,EAAE,yBAAyB,EAAE,EAAE;aAC/E,CAAC;iBACD,IAAI,CAAC,cAAc,EAAE;gBACpB,YAAY,EAAE,qBAAqB;gBACnC,aAAa,EAAE,sBAAsB;gBACrC,UAAU,EAAE,IAAI;gBAChB,UAAU,EAAE,QAAQ;gBACpB,KAAK,EAAE,UAAU;aAClB,CAAC,CAAC;YACL,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,yBAAyB,CACrD,UAAU,EACV,eAAe,EACf,mBAAmB,EACnB,8BAA8B,CAC/B,CAAC;YAEF,MAAM,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,oBAAoB,CAC3C,yCAAyC,EACzC,MAAM,CAAC,gBAAgB,CAAC;gBACtB,MAAM,EAAE,MAAM;gBACd,OAAO,EAAE,MAAM,CAAC,gBAAgB,CAAC;oBAC/B,cAAc,EAAE,kBAAkB;oBAClC,mBAAmB,EAAE,iBAAiB;iBACvC,CAAC;gBACF,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;oBACnB,UAAU,EAAE,oBAAoB;oBAChC,IAAI,EAAE,eAAe;oBACrB,YAAY,EAAE,8BAA8B;oBAC5C,SAAS,EAAE,gBAAgB;oBAC3B,aAAa,EAAE,mBAAmB;iBACnC,CAAC;aACH,CAAC,CACH,CAAC;YAEF,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;YACrD,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;YACtD,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YACzC,4EAA4E;YAC5E,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC;YAChD,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;YAEtC,MAAM,CAAC,aAAa,CAAC,CAAC,oBAAoB,CAAC,qBAAqB,CAAC,CAAC;YAClE,MAAM,CAAC,aAAa,CAAC,CAAC,oBAAoB,CAAC,sBAAsB,CAAC,CAAC;YACnE,MAAM,CAAC,eAAe,CAAC,CAAC,oBAAoB,CAAC,GAAG,EAAE,qBAAqB,CAAC,CAAC;YAEzE,8FAA8F;YAC9F,MAAM,CAAC,WAAW,CAAC,CAAC,oBAAoB,CACtC,MAAM,CAAC,gBAAgB,CAAC;gBACtB,EAAE,EAAE,GAAG;gBACP,KAAK,EAAE,kBAAkB;gBACzB,WAAW,EAAE,qBAAqB;aACnC,CAAC,EACF,kBAAkB,EAClB,EAAE,SAAS,EAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAClC,CAAC;YAEF,kGAAkG;YAClG,MAAM,CAAC,WAAW,CAAC,CAAC,oBAAoB,CACtC,MAAM,CAAC,gBAAgB,CAAC;gBACtB,IAAI,EAAE,SAAS;gBACf,QAAQ,EAAE,gBAAgB;gBAC1B,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,GAAG;gBAChB,kBAAkB,EAAE,sBAAsB;aAC3C,CAAC,EACF,kBAAkB,EAClB,EAAE,SAAS,EAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,EAAE,CAClC,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;YAC5D,UAAU;iBACP,GAAG,CAAC,oBAAoB,EAAE;gBACzB,IAAI,EAAE,EAAE,EAAE,EAAE,OAAO,EAAE,UAAU,EAAE,EAAE,YAAY,EAAE,yBAAyB,EAAE,EAAE;aAC/E,CAAC;iBACD,IAAI,CAAC,cAAc,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE,EAAE,GAAG,CAAC,CAAC;YACzD,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,CACV,QAAQ,CAAC,yBAAyB,CAChC,UAAU,EACV,cAAc,EACd,eAAe,EACf,8BAA8B,CAC/B,CACF,CAAC,OAAO,CAAC,OAAO,CAAC,uCAAuC,CAAC,CAAC;QAC7D,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,sBAAsB,EAAE,GAAG,EAAE;QACpC,IAAI,UAAsC,CAAC;QAC3C,IAAI,eAA0B,CAAC;QAE/B,UAAU,CAAC,GAAG,EAAE;YACd,UAAU,GAAG;gBACX,SAAS,EAAE,gBAAgB;gBAC3B,aAAa,EAAE,CAAC,8BAA8B,CAAC;gBAC/C,KAAK,EAAE,oBAAoB;aACE,CAAC;YAEhC,eAAe,GAAG,IAAI,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC;gBAC5C,EAAE,EAAE,GAAG;gBACP,KAAK,EAAE,kBAAkB;gBACzB,SAAS,EAAE,MAAM;gBACjB,QAAQ,EAAE,MAAM;gBAChB,IAAI,EAAE,YAAY;gBAClB,IAAI,EAAE,OAAO;gBACb,IAAI,EAAE,EAAE;gBACR,WAAW,EAAE,GAAG;gBAChB,eAAe,EAAE,OAAO;aACzB,CAAC,CAAC;YAEH,2BAA2B,CAAC,eAAe,CAAC;gBAC1C,WAAW,EAAE;oBACX,WAAW,EAAE,eAAe;iBAC7B;aACuD,CAAC,CAAC;YAE5D,WAAW,CAAC,eAAe,CAAC,sBAAsB,CAAC,CAAC;QACtD,CAAC,CAAC,CAAC;QAEH,SAAS,CAAC,GAAG,EAAE;YACb,IAAI,CAAC,aAAa,EAAE,CAAC;QACvB,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;YAC5D,kDAAkD;YACjD,sBAAY,CAAC,MAAoB,CAAC,eAAe,CAAC;gBACjD,IAAI,EAAE,SAAS;gBACf,QAAQ,EAAE,gBAAgB;gBAC1B,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,GAAG;gBAChB,kBAAkB,EAAE,sBAAsB;aAC3C,CAAC,CAAC;YAEH,iFAAiF;YACjF,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;YAC1C,aAAa;iBACV,mBAAmB,CAAC;gBACnB,IAAI,EAAE,EAAE,WAAW,EAAE,GAAG,EAAE;gBAC1B,GAAG,EAAE,GAAG,GAAG,IAAI,EAAE,oBAAoB;gBACrC,GAAG,EAAE,GAAG;gBACR,KAAK,EAAE,UAAU;aAClB,CAAC;iBACD,mBAAmB,CAAC;gBACnB,GAAG,EAAE,GAAG,GAAG,MAAM,EAAE,oBAAoB;gBACvC,GAAG,EAAE,GAAG;aACT,CAAC,CAAC;YAEL,UAAU,CAAC,IAAI,CAAC,cAAc,EAAE;gBAC9B,YAAY,EAAE,yBAAyB;gBACvC,aAAa,EAAE,0BAA0B;gBACzC,UAAU,EAAE,IAAI;gBAChB,UAAU,EAAE,QAAQ;gBACpB,KAAK,EAAE,UAAU;aAClB,CAAC,CAAC;YACH,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,oBAAoB,CAAC,UAAU,EAAE,qBAAqB,CAAC,CAAC;YAEtF,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC;YACzD,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC;YAC1D,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YACzC,4EAA4E;YAC5E,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC;YAChD,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC;YAEpD,MAAM,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,oBAAoB,CAC3C,yCAAyC,EACzC,MAAM,CAAC,gBAAgB,CAAC;gBACtB,MAAM,EAAE,MAAM;gBACd,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;oBACnB,UAAU,EAAE,eAAe;oBAC3B,aAAa,EAAE,sBAAsB;oBACrC,SAAS,EAAE,gBAAgB;iBAC5B,CAAC;aACH,CAAC,CACH,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;YAC3D,sBAAY,CAAC,MAAoB,CAAC,kBAAkB,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;YACvC,CAAC,CAAC,CAAC;YAEH,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,CACV,QAAQ,CAAC,oBAAoB,CAAC,UAAU,EAAE,uBAAuB,CAAC,CACnE,CAAC,OAAO,CAAC,OAAO,CAAC,kCAAkC,CAAC,CAAC;QACxD,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,mDAAmD,EAAE,KAAK,IAAI,EAAE;YAChE,sBAAY,CAAC,MAAoB,CAAC,eAAe,CAAC;gBACjD,IAAI,EAAE,QAAQ;gBACd,QAAQ,EAAE,gBAAgB;aAC3B,CAAC,CAAC;YAEH,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,CAAC,QAAQ,CAAC,oBAAoB,CAAC,UAAU,EAAE,cAAc,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CACrF,oBAAoB,CACrB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,kDAAkD,EAAE,KAAK,IAAI,EAAE;YAC/D,sBAAY,CAAC,MAAoB,CAAC,eAAe,CAAC;gBACjD,IAAI,EAAE,SAAS;gBACf,QAAQ,EAAE,qBAAqB;gBAC/B,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,GAAG;gBAChB,kBAAkB,EAAE,sBAAsB;aAC3C,CAAC,CAAC;YAEH,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,CACV,QAAQ,CAAC,oBAAoB,CAAC,UAAU,EAAE,oCAAoC,CAAC,CAChF,CAAC,OAAO,CAAC,OAAO,CAAC,qCAAqC,CAAC,CAAC;QAC3D,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,oDAAoD,EAAE,KAAK,IAAI,EAAE;YACjE,sBAAY,CAAC,MAAoB,CAAC,eAAe,CAAC;gBACjD,IAAI,EAAE,SAAS;gBACf,QAAQ,EAAE,gBAAgB;gBAC1B,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,GAAG;gBAChB,kBAAkB,EAAE,8BAA8B;aACnD,CAAC,CAAC;YAEH,UAAU,CAAC,IAAI,CAAC,cAAc,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE,EAAE,GAAG,CAAC,CAAC;YACjE,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,CACV,QAAQ,CAAC,oBAAoB,CAAC,UAAU,EAAE,qBAAqB,CAAC,CACjE,CAAC,OAAO,CAAC,OAAO,CAAC,yBAAyB,CAAC,CAAC;QAC/C,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,mBAAmB,EAAE,GAAG,EAAE;QACjC,EAAE,CAAC,+CAA+C,EAAE,KAAK,IAAI,EAAE;YAC7D,MAAM,WAAW,GAAG;gBAClB,EAAE,EAAE,GAAG;gBACP,KAAK,EAAE,kBAAkB;gBACzB,WAAW,EAAE,GAAG;gBAChB,WAAW,EAAE,qBAAqB;gBAClC,GAAG,EAAE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,GAAG,IAAI;gBACzC,GAAG,EAAE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC;aACnC,CAAC;YAED,sBAAY,CAAC,MAAoB,CAAC,eAAe,CAAC,WAAW,CAAC,CAAC;YAEhE,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,iBAAiB,CAAC,oBAAoB,CAAC,CAAC;YAEtE,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC;YAChD,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YACpC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC;YAC/C,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,CAAC,UAAU,EAAE,WAAW,EAAE,YAAY,CAAC,CAAC,CAAC;YACvE,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,OAAO,CAAC;gBAC3B,MAAM,EAAE,GAAG;gBACX,KAAK,EAAE,kBAAkB;gBACzB,WAAW,EAAE,GAAG;gBAChB,sBAAsB,EAAE,SAAS;gBACjC,iBAAiB,EAAE,qBAAqB;aACzC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,6CAA6C,EAAE,KAAK,IAAI,EAAE;YAC1D,sBAAY,CAAC,MAAoB,CAAC,kBAAkB,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,sBAAY,CAAC,iBAAiB,CAAC,aAAa,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;YACtE,CAAC,CAAC,CAAC;YAEH,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,CAAC,QAAQ,CAAC,iBAAiB,CAAC,eAAe,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CACvE,0BAA0B,CAC3B,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,6CAA6C,EAAE,KAAK,IAAI,EAAE;YAC1D,sBAAY,CAAC,MAAoB,CAAC,kBAAkB,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,sBAAY,CAAC,iBAAiB,CAAC,mBAAmB,CAAC,CAAC;YAChE,CAAC,CAAC,CAAC;YAEH,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,CAAC,QAAQ,CAAC,iBAAiB,CAAC,eAAe,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CACvE,sBAAsB,CACvB,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,6DAA6D,EAAE,KAAK,IAAI,EAAE;YAC1E,sBAAY,CAAC,MAAoB,CAAC,eAAe,CAAC;gBACjD,IAAI,EAAE,SAAS;gBACf,QAAQ,EAAE,gBAAgB;aAC3B,CAAC,CAAC;YAEH,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,MAAM,MAAM,CAAC,QAAQ,CAAC,iBAAiB,CAAC,eAAe,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CACvE,0CAA0C,CAC3C,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,EAAE,CAAC,kEAAkE,EAAE,KAAK,IAAI,EAAE;YAChF,UAAU,CAAC,GAAG,CAAC,oBAAoB,EAAE;gBACnC,IAAI,EAAE;oBACJ,EAAE,EAAE,OAAO;oBACX,UAAU,EAAE,EAAE,YAAY,EAAE,yBAAyB,EAAE;iBACxD;aACF,CAAC,CAAC;YAEH,MAAM,CAAC,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC;YAEhC,MAAM,WAAW,GAAG;gBAClB,EAAE,EAAE,GAAG;gBACP,KAAK,EAAE,kBAAkB;gBACzB,WAAW,EAAE,GAAG;gBAChB,WAAW,EAAE,qBAAqB;gBAClC,GAAG,EAAE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,GAAG,IAAI;gBACzC,GAAG,EAAE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC;aACnC,CAAC;YAED,sBAAY,CAAC,MAAoB,CAAC,eAAe,CAAC,WAAW,CAAC,CAAC;YAEhE,MAAM,QAAQ,GAAG,cAAc,EAAE,CAAC;YAElC,4CAA4C;YAC5C,MAAM,QAAQ,CAAC,UAAU,EAAE,CAAC;YAE5B,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,iBAAiB,CAAC,oBAAoB,CAAC,CAAC;YAEtE,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,OAAO,CAAC;gBAC3B,MAAM,EAAE,GAAG;gBACX,KAAK,EAAE,kBAAkB;gBACzB,WAAW,EAAE,GAAG;gBAChB,sBAAsB,EAAE,yBAAyB;gBACjD,iBAAiB,EAAE,qBAAqB;aACzC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
package/dist/index.d.ts
ADDED