@gvnrdao/dh-lit-actions 0.0.24 → 0.0.25
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
80f60280f58d3e802722798738d96971f628d07db22c151d28d4015f83f56491
|
|
@@ -1,3 +1,37 @@
|
|
|
1
1
|
// LIT Actions runtime provides: Lit, ethers, fetch
|
|
2
2
|
var _LIT_ACTION_ = (() => {
|
|
3
|
+
// src/btc-deposit-validator.ts
|
|
4
|
+
var go = async () => {
|
|
5
|
+
const { auth, publicKey } = globalThis;
|
|
6
|
+
if (!auth || typeof auth !== "object") throw new Error("auth is required");
|
|
7
|
+
if (!auth.positionId) throw new Error("auth.positionId is required");
|
|
8
|
+
if (!auth.callerAddress) throw new Error("auth.callerAddress is required");
|
|
9
|
+
if (typeof auth.timestamp !== "number") throw new Error("auth.timestamp must be number");
|
|
10
|
+
if (!publicKey || typeof publicKey !== "string") throw new Error("publicKey is required");
|
|
11
|
+
const message = ethers.utils.keccak256(
|
|
12
|
+
// @ts-ignore - ethers is provided in the LIT runtime
|
|
13
|
+
ethers.utils.defaultAbiCoder.encode(
|
|
14
|
+
["string", "address", "bytes32", "uint256"],
|
|
15
|
+
["LIT_HELLO", auth.callerAddress, auth.positionId, auth.timestamp]
|
|
16
|
+
)
|
|
17
|
+
);
|
|
18
|
+
const signature = await Lit.Actions.signEcdsa({
|
|
19
|
+
// @ts-ignore
|
|
20
|
+
toSign: ethers.utils.arrayify(message),
|
|
21
|
+
publicKey,
|
|
22
|
+
sigName: "hello"
|
|
23
|
+
});
|
|
24
|
+
Lit.Actions.setResponse({
|
|
25
|
+
response: JSON.stringify({
|
|
26
|
+
ok: true,
|
|
27
|
+
message,
|
|
28
|
+
signature,
|
|
29
|
+
positionId: auth.positionId,
|
|
30
|
+
callerAddress: auth.callerAddress,
|
|
31
|
+
timestamp: auth.timestamp,
|
|
32
|
+
validatorPkp: publicKey
|
|
33
|
+
})
|
|
34
|
+
});
|
|
35
|
+
};
|
|
36
|
+
go();
|
|
3
37
|
})();
|
package/package.json
CHANGED
|
@@ -11,59 +11,59 @@ const cid_utils_1 = require("../../utils/chunks/cid-utils");
|
|
|
11
11
|
// DATIL PRODUCTION NETWORK DEPLOYMENTS
|
|
12
12
|
exports.DH_LIT_ACTIONS_DATIL = {
|
|
13
13
|
authorizationDummy: {
|
|
14
|
-
cid: "
|
|
14
|
+
cid: "QmcTXaXwne4VTE8uwhnc7VZs4xdWUx3hiMcvA325bhSDdv",
|
|
15
15
|
authorizedCidHex: (0, cid_utils_1.cidToHex)("QmYjYi4mMNDie1odSetbGa6YvNf8GQFyEGjjkS3YztAY1B"),
|
|
16
16
|
name: "Authorization Dummy",
|
|
17
17
|
description: "Production authorization LIT Action for Milestone 1 testing and PKP authorization",
|
|
18
18
|
version: "0.1.0",
|
|
19
19
|
deployed: true,
|
|
20
|
-
deployedAt:
|
|
21
|
-
size:
|
|
22
|
-
hash: "
|
|
20
|
+
deployedAt: 1761413462458,
|
|
21
|
+
size: 1016,
|
|
22
|
+
hash: "c732ef30e50a5013a6c1cbac6dc011d3638875237d21097e3aff722b323d174b",
|
|
23
23
|
},
|
|
24
24
|
authorizationDummyB: {
|
|
25
|
-
cid: "
|
|
25
|
+
cid: "QmRM8Hd2sW1MZJ6yTGcL1uAj1DrQNgDX741PqyofphKF9n",
|
|
26
26
|
authorizedCidHex: (0, cid_utils_1.cidToHex)("QmZYwYmVfGzA3Xax8P3ZtPomkHAxhuLHBkxLwzHzsu164k"),
|
|
27
27
|
name: "Authorization Dummy B",
|
|
28
28
|
description: "Production second dummy authorization LIT Action for testing failed authorization scenarios",
|
|
29
29
|
version: "0.1.0",
|
|
30
30
|
deployed: true,
|
|
31
|
-
deployedAt:
|
|
32
|
-
size:
|
|
33
|
-
hash: "
|
|
31
|
+
deployedAt: 1761413462458,
|
|
32
|
+
size: 723,
|
|
33
|
+
hash: "6262c9467961c661d212b8c60806e499ed5e7d0fe8456e2455e536d40eb4c672",
|
|
34
34
|
},
|
|
35
35
|
pkpValidator: {
|
|
36
|
-
cid: "
|
|
36
|
+
cid: "Qmc9uhAj2KdotdmLhpHnWgPrBgHU85RqCwbKJWP2qkQC44",
|
|
37
37
|
authorizedCidHex: (0, cid_utils_1.cidToHex)("QmeyctanbAoJrqwwiuzpadEdB4ypFeQGvZ1kZvvLVTgQm8"),
|
|
38
38
|
name: "PKP Validator",
|
|
39
39
|
description: "Production PKP validation LIT Action for verifying authorized PKPs (with decimal PKP ID format, ESM format)",
|
|
40
40
|
version: "1.0.2",
|
|
41
41
|
deployed: true,
|
|
42
42
|
deployedAt: Date.now(),
|
|
43
|
-
size:
|
|
44
|
-
hash: "
|
|
43
|
+
size: 12322,
|
|
44
|
+
hash: "ac5d1dbc1ae8b678f435ac568320887e69e662d93d5f92e11f69e3a322f2e1ef",
|
|
45
45
|
pkp: {
|
|
46
|
-
tokenId: "
|
|
46
|
+
tokenId: "999461970",
|
|
47
47
|
publicKey: "0x0411111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111",
|
|
48
48
|
ethAddress: "0x1111111111111111111111111111111111111111",
|
|
49
49
|
mintTxHash: "0xaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
|
|
50
50
|
authTxHash: "0xbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb",
|
|
51
51
|
burnTxHash: "0xcccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc",
|
|
52
52
|
immutable: true,
|
|
53
|
-
authorizedCidHex: "
|
|
54
|
-
createdAt:
|
|
53
|
+
authorizedCidHex: "0x1220cd432b9afffbf6595071b32888cfe7dd49b571c0afc0c1bea290cdf02e2b66c5",
|
|
54
|
+
createdAt: 1761413461970,
|
|
55
55
|
},
|
|
56
56
|
},
|
|
57
57
|
ucdMintValidator: {
|
|
58
|
-
cid: "
|
|
58
|
+
cid: "QmTmvtVDVVac31CDjJJtQJKUoehE3iCDw6fUUFfsoneiDq", // Placeholder - needs IPFS deployment
|
|
59
59
|
authorizedCidHex: (0, cid_utils_1.cidToHex)("QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51"),
|
|
60
60
|
name: "UCD Mint Validator",
|
|
61
61
|
description: "Production UCD mint validator LIT Action for validating mint operations with comprehensive on-chain checks",
|
|
62
62
|
version: "0.1.0",
|
|
63
|
-
deployed:
|
|
64
|
-
deployedAt:
|
|
65
|
-
size:
|
|
66
|
-
hash: "
|
|
63
|
+
deployed: true, // Not yet deployed to IPFS
|
|
64
|
+
deployedAt: 1761413462459,
|
|
65
|
+
size: 34828,
|
|
66
|
+
hash: "6c842ec61916b48d7a77ad2ecf7a3567e0c33fd20c3870f8ce97f296f3e4a1a9",
|
|
67
67
|
pkp: {
|
|
68
68
|
tokenId: "0",
|
|
69
69
|
publicKey: "0x0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
|
|
@@ -80,59 +80,59 @@ exports.DH_LIT_ACTIONS_DATIL = {
|
|
|
80
80
|
// DATIL-TEST DEVELOPMENT NETWORK DEPLOYMENTS
|
|
81
81
|
exports.DH_LIT_ACTIONS_DATIL_TEST = {
|
|
82
82
|
authorizationDummy: {
|
|
83
|
-
cid: "
|
|
83
|
+
cid: "QmcTXaXwne4VTE8uwhnc7VZs4xdWUx3hiMcvA325bhSDdv", // Test deployment
|
|
84
84
|
authorizedCidHex: (0, cid_utils_1.cidToHex)("QmYjYi4mMNDie1odSetbGa6YvNf8GQFyEGjjkS3YztAY1B"),
|
|
85
85
|
name: "Authorization Dummy (Test)",
|
|
86
86
|
description: "Development authorization LIT Action for Milestone 1 testing and PKP authorization on datil-test",
|
|
87
87
|
version: "0.1.0",
|
|
88
88
|
deployed: true,
|
|
89
|
-
deployedAt:
|
|
90
|
-
size:
|
|
91
|
-
hash: "
|
|
89
|
+
deployedAt: 1761413462458, // Earlier deployment
|
|
90
|
+
size: 1016,
|
|
91
|
+
hash: "c732ef30e50a5013a6c1cbac6dc011d3638875237d21097e3aff722b323d174b",
|
|
92
92
|
},
|
|
93
93
|
authorizationDummyB: {
|
|
94
|
-
cid: "
|
|
94
|
+
cid: "QmRM8Hd2sW1MZJ6yTGcL1uAj1DrQNgDX741PqyofphKF9n", // Different CID for proper testing
|
|
95
95
|
authorizedCidHex: (0, cid_utils_1.cidToHex)("QmZYwYmVfGzA3Xax8P3ZtPomkHAxhuLHBkxLwzHzsu164k"),
|
|
96
96
|
name: "Authorization Dummy B (Test)",
|
|
97
97
|
description: "Development second dummy authorization LIT Action for testing failed authorization scenarios on datil-test",
|
|
98
98
|
version: "0.1.0",
|
|
99
99
|
deployed: true, // Not yet deployed to test network
|
|
100
|
-
deployedAt:
|
|
101
|
-
size:
|
|
102
|
-
hash: "
|
|
100
|
+
deployedAt: 1761413462458,
|
|
101
|
+
size: 723,
|
|
102
|
+
hash: "6262c9467961c661d212b8c60806e499ed5e7d0fe8456e2455e536d40eb4c672",
|
|
103
103
|
},
|
|
104
104
|
pkpValidator: {
|
|
105
|
-
cid: "
|
|
105
|
+
cid: "Qmc9uhAj2KdotdmLhpHnWgPrBgHU85RqCwbKJWP2qkQC44", // Test network validator (ESM format)
|
|
106
106
|
authorizedCidHex: (0, cid_utils_1.cidToHex)("QmeyctanbAoJrqwwiuzpadEdB4ypFeQGvZ1kZvvLVTgQm8"),
|
|
107
107
|
name: "PKP Validator (Test)",
|
|
108
108
|
description: "Development PKP validation LIT Action for verifying authorized PKPs on datil-test (with decimal PKP ID format)",
|
|
109
109
|
version: "1.0.2",
|
|
110
110
|
deployed: true, // Actually deployed to test network
|
|
111
111
|
deployedAt: Date.now(),
|
|
112
|
-
size:
|
|
113
|
-
hash: "
|
|
112
|
+
size: 12322,
|
|
113
|
+
hash: "ac5d1dbc1ae8b678f435ac568320887e69e662d93d5f92e11f69e3a322f2e1ef",
|
|
114
114
|
pkp: {
|
|
115
|
-
tokenId: "
|
|
115
|
+
tokenId: "999461970",
|
|
116
116
|
publicKey: "0x0411111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111",
|
|
117
117
|
ethAddress: "0x1111111111111111111111111111111111111111",
|
|
118
118
|
mintTxHash: "0xaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
|
|
119
119
|
authTxHash: "0xbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb",
|
|
120
120
|
burnTxHash: "0xcccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc",
|
|
121
121
|
immutable: true,
|
|
122
|
-
authorizedCidHex: "
|
|
123
|
-
createdAt:
|
|
122
|
+
authorizedCidHex: "0x1220cd432b9afffbf6595071b32888cfe7dd49b571c0afc0c1bea290cdf02e2b66c5",
|
|
123
|
+
createdAt: 1761413461970,
|
|
124
124
|
},
|
|
125
125
|
},
|
|
126
126
|
ucdMintValidator: {
|
|
127
|
-
cid: "
|
|
127
|
+
cid: "QmTmvtVDVVac31CDjJJtQJKUoehE3iCDw6fUUFfsoneiDq", // Placeholder - needs IPFS deployment
|
|
128
128
|
authorizedCidHex: (0, cid_utils_1.cidToHex)("QmNLei78zWmzUdbeRB3CiUfAizWUrbeeZh5K1rhAQKCh51"),
|
|
129
129
|
name: "UCD Mint Validator (Test)",
|
|
130
130
|
description: "Development UCD mint validator LIT Action for validating mint operations with comprehensive on-chain checks on datil-test",
|
|
131
131
|
version: "0.1.0",
|
|
132
|
-
deployed:
|
|
133
|
-
deployedAt:
|
|
134
|
-
size:
|
|
135
|
-
hash: "
|
|
132
|
+
deployed: true, // Not yet deployed to IPFS
|
|
133
|
+
deployedAt: 1761413462459,
|
|
134
|
+
size: 34828,
|
|
135
|
+
hash: "6c842ec61916b48d7a77ad2ecf7a3567e0c33fd20c3870f8ce97f296f3e4a1a9",
|
|
136
136
|
pkp: {
|
|
137
137
|
tokenId: "0",
|
|
138
138
|
publicKey: "0x0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"lit-actions-registry.js","sourceRoot":"","sources":["../../../pkg-src/constants/chunks/lit-actions-registry.ts"],"names":[],"mappings":";;;AA4KA,4DAOC;AAlLD,4DAAwD;AAExD;;;;GAIG;AAEH,uCAAuC;AAC1B,QAAA,oBAAoB,GAA2B;IAC1D,kBAAkB,EAAE;QAClB,GAAG,EAAE,gDAAgD;QACrD,gBAAgB,EAAE,IAAA,oBAAQ,EACxB,gDAAgD,CACjD;QACD,IAAI,EAAE,qBAAqB;QAC3B,WAAW,EACT,mFAAmF;QACrF,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI;QACd,UAAU,EAAE,aAAa;QACzB,IAAI,EAAE,IAAI;QACV,IAAI,EAAE,kEAAkE;KACzE;IACD,mBAAmB,EAAE;QACnB,GAAG,EAAE,gDAAgD;QACrD,gBAAgB,EAAE,IAAA,oBAAQ,EACxB,gDAAgD,CACjD;QACD,IAAI,EAAE,uBAAuB;QAC7B,WAAW,EACT,6FAA6F;QAC/F,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI;QACd,UAAU,EAAE,aAAa;QACzB,IAAI,EAAE,GAAG;QACT,IAAI,EAAE,kEAAkE;KACzE;IACD,YAAY,EAAE;QACZ,GAAG,EAAE,gDAAgD;QACrD,gBAAgB,EAAE,IAAA,oBAAQ,EACxB,gDAAgD,CACjD;QACD,IAAI,EAAE,eAAe;QACrB,WAAW,EACT,6GAA6G;QAC/G,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI;QACd,UAAU,EAAE,IAAI,CAAC,GAAG,EAAE;QACtB,IAAI,EAAE,
|
|
1
|
+
{"version":3,"file":"lit-actions-registry.js","sourceRoot":"","sources":["../../../pkg-src/constants/chunks/lit-actions-registry.ts"],"names":[],"mappings":";;;AA4KA,4DAOC;AAlLD,4DAAwD;AAExD;;;;GAIG;AAEH,uCAAuC;AAC1B,QAAA,oBAAoB,GAA2B;IAC1D,kBAAkB,EAAE;QAClB,GAAG,EAAE,gDAAgD;QACrD,gBAAgB,EAAE,IAAA,oBAAQ,EACxB,gDAAgD,CACjD;QACD,IAAI,EAAE,qBAAqB;QAC3B,WAAW,EACT,mFAAmF;QACrF,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI;QACd,UAAU,EAAE,aAAa;QACzB,IAAI,EAAE,IAAI;QACV,IAAI,EAAE,kEAAkE;KACzE;IACD,mBAAmB,EAAE;QACnB,GAAG,EAAE,gDAAgD;QACrD,gBAAgB,EAAE,IAAA,oBAAQ,EACxB,gDAAgD,CACjD;QACD,IAAI,EAAE,uBAAuB;QAC7B,WAAW,EACT,6FAA6F;QAC/F,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI;QACd,UAAU,EAAE,aAAa;QACzB,IAAI,EAAE,GAAG;QACT,IAAI,EAAE,kEAAkE;KACzE;IACD,YAAY,EAAE;QACZ,GAAG,EAAE,gDAAgD;QACrD,gBAAgB,EAAE,IAAA,oBAAQ,EACxB,gDAAgD,CACjD;QACD,IAAI,EAAE,eAAe;QACrB,WAAW,EACT,6GAA6G;QAC/G,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI;QACd,UAAU,EAAE,IAAI,CAAC,GAAG,EAAE;QACtB,IAAI,EAAE,KAAK;QACX,IAAI,EAAE,kEAAkE;QACxE,GAAG,EAAE;YACH,OAAO,EAAE,WAAW;YACpB,SAAS,EAAE,sIAAsI;YACjJ,UAAU,EAAE,4CAA4C;YACxD,UAAU,EAAE,oEAAoE;YAChF,UAAU,EAAE,oEAAoE;YAChF,UAAU,EAAE,oEAAoE;YAChF,SAAS,EAAE,IAAI;YACf,gBAAgB,EAAE,wEAAwE;YAC1F,SAAS,EAAE,aAAa;SACzB;KACF;IACD,gBAAgB,EAAE;QAChB,GAAG,EAAE,gDAAgD,EAAE,sCAAsC;QAC7F,gBAAgB,EAAE,IAAA,oBAAQ,EAAC,gDAAgD,CAAC;QAC5E,IAAI,EAAE,oBAAoB;QAC1B,WAAW,EACT,4GAA4G;QAC9G,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI,EAAE,2BAA2B;QAC3C,UAAU,EAAE,aAAa;QACzB,IAAI,EAAE,KAAK;QACX,IAAI,EAAE,kEAAkE;QACxE,GAAG,EAAE;YACH,OAAO,EAAE,GAAG;YACZ,SAAS,EAAE,sIAAsI;YACjJ,UAAU,EAAE,4CAA4C;YACxD,UAAU,EAAE,oEAAoE;YAChF,UAAU,EAAE,oEAAoE;YAChF,UAAU,EAAE,oEAAoE;YAChF,SAAS,EAAE,KAAK;YAChB,gBAAgB,EAAE,IAAA,oBAAQ,EAAC,gDAAgD,CAAC;YAC5E,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;SACtB;KACF;CACF,CAAC;AAEF,6CAA6C;AAChC,QAAA,yBAAyB,GAA2B;IAC/D,kBAAkB,EAAE;QAClB,GAAG,EAAE,gDAAgD,EAAE,kBAAkB;QACzE,gBAAgB,EAAE,IAAA,oBAAQ,EACxB,gDAAgD,CACjD;QACD,IAAI,EAAE,4BAA4B;QAClC,WAAW,EACT,kGAAkG;QACpG,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI;QACd,UAAU,EAAE,aAAa,EAAE,qBAAqB;QAChD,IAAI,EAAE,IAAI;QACV,IAAI,EAAE,kEAAkE;KACzE;IACD,mBAAmB,EAAE;QACnB,GAAG,EAAE,gDAAgD,EAAE,mCAAmC;QAC1F,gBAAgB,EAAE,IAAA,oBAAQ,EACxB,gDAAgD,CACjD;QACD,IAAI,EAAE,8BAA8B;QACpC,WAAW,EACT,4GAA4G;QAC9G,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI,EAAE,mCAAmC;QACnD,UAAU,EAAE,aAAa;QACzB,IAAI,EAAE,GAAG;QACT,IAAI,EAAE,kEAAkE;KACzE;IACD,YAAY,EAAE;QACZ,GAAG,EAAE,gDAAgD,EAAE,sCAAsC;QAC7F,gBAAgB,EAAE,IAAA,oBAAQ,EACxB,gDAAgD,CACjD;QACD,IAAI,EAAE,sBAAsB;QAC5B,WAAW,EACT,gHAAgH;QAClH,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI,EAAE,oCAAoC;QACpD,UAAU,EAAE,IAAI,CAAC,GAAG,EAAE;QACtB,IAAI,EAAE,KAAK;QACX,IAAI,EAAE,kEAAkE;QACxE,GAAG,EAAE;YACH,OAAO,EAAE,WAAW;YACpB,SAAS,EAAE,sIAAsI;YACjJ,UAAU,EAAE,4CAA4C;YACxD,UAAU,EAAE,oEAAoE;YAChF,UAAU,EAAE,oEAAoE;YAChF,UAAU,EAAE,oEAAoE;YAChF,SAAS,EAAE,IAAI;YACf,gBAAgB,EAAE,wEAAwE;YAC1F,SAAS,EAAE,aAAa;SACzB;KACF;IACD,gBAAgB,EAAE;QAChB,GAAG,EAAE,gDAAgD,EAAE,sCAAsC;QAC7F,gBAAgB,EAAE,IAAA,oBAAQ,EAAC,gDAAgD,CAAC;QAC5E,IAAI,EAAE,2BAA2B;QACjC,WAAW,EACT,2HAA2H;QAC7H,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,IAAI,EAAE,2BAA2B;QAC3C,UAAU,EAAE,aAAa;QACzB,IAAI,EAAE,KAAK;QACX,IAAI,EAAE,kEAAkE;QACxE,GAAG,EAAE;YACH,OAAO,EAAE,GAAG;YACZ,SAAS,EAAE,sIAAsI;YACjJ,UAAU,EAAE,4CAA4C;YACxD,UAAU,EAAE,oEAAoE;YAChF,UAAU,EAAE,oEAAoE;YAChF,UAAU,EAAE,oEAAoE;YAChF,SAAS,EAAE,KAAK;YAChB,gBAAgB,EAAE,IAAA,oBAAQ,EAAC,gDAAgD,CAAC;YAC5E,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;SACtB;KACF;CACF,CAAC;AAEF;;GAEG;AACH,SAAgB,wBAAwB,CACtC,OAA+B;IAE/B,IAAI,OAAO,KAAK,YAAY,EAAE,CAAC;QAC7B,OAAO,iCAAyB,CAAC;IACnC,CAAC;IACD,OAAO,4BAAoB,CAAC;AAC9B,CAAC;AAED;;GAEG;AACU,QAAA,iBAAiB,GAAG,4BAAoB,CAAC;AACzC,QAAA,sBAAsB,GAAG,iCAAyB,CAAC;AAEhE;;GAEG;AACU,QAAA,6BAA6B,GACxC,4BAAoB,CAAC,kBAAkB,CAAC,GAAG,CAAC;AACjC,QAAA,+BAA+B,GAC1C,4BAAoB,CAAC,mBAAmB,CAAC,GAAG,CAAC;AAClC,QAAA,uBAAuB,GAAG,4BAAoB,CAAC,YAAY,CAAC,GAAG,CAAC;AAE7E;;GAEG;AACU,QAAA,kCAAkC,GAC7C,iCAAyB,CAAC,kBAAkB,CAAC,GAAG,CAAC;AACtC,QAAA,oCAAoC,GAC/C,iCAAyB,CAAC,mBAAmB,CAAC,GAAG,CAAC;AACvC,QAAA,4BAA4B,GACvC,iCAAyB,CAAC,YAAY,CAAC,GAAG,CAAC"}
|