@inco/js 0.8.0-devnet-13 → 0.8.0-devnet-22
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +18 -76
- package/dist/cjs/advancedacl/session-key.d.ts +1 -1
- package/dist/cjs/advancedacl/session-key.js +3 -2
- package/dist/cjs/attestedcompute/attested-compute.js +5 -2
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +5 -1
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +14 -4
- package/dist/cjs/binary.d.ts +2 -4
- package/dist/cjs/binary.js +11 -6
- package/dist/cjs/encryption/index.d.ts +1 -1
- package/dist/cjs/encryption/index.js +17 -16
- package/dist/cjs/generated/abis/lightning.d.ts +70 -17
- package/dist/cjs/generated/abis/lightning.js +44 -19
- package/dist/cjs/generated/abis/test-elist.d.ts +10 -2
- package/dist/cjs/generated/abis/test-elist.js +8 -3
- package/dist/cjs/generated/abis/verifier.d.ts +78 -4
- package/dist/cjs/generated/abis/verifier.js +49 -4
- package/dist/cjs/generated/lightning.d.ts +60 -0
- package/dist/cjs/generated/lightning.js +64 -1
- package/dist/cjs/generated/local-node.d.ts +4 -4
- package/dist/cjs/generated/local-node.js +4 -4
- package/dist/cjs/index.d.ts +1 -1
- package/dist/cjs/index.js +11 -2
- package/dist/cjs/kms/quorumClient.d.ts +5 -13
- package/dist/cjs/kms/quorumClient.js +74 -259
- package/dist/cjs/kms/quorumConsistency.d.ts +58 -0
- package/dist/cjs/kms/quorumConsistency.js +200 -0
- package/dist/cjs/kms/signatureVerification.d.ts +35 -0
- package/dist/cjs/kms/signatureVerification.js +88 -0
- package/dist/cjs/kms/thresholdPromises.d.ts +4 -3
- package/dist/cjs/kms/thresholdPromises.js +25 -15
- package/dist/cjs/lite/hadu.d.ts +1 -1
- package/dist/cjs/lite/hadu.js +3 -3
- package/dist/cjs/lite/index.d.ts +0 -2
- package/dist/cjs/lite/index.js +1 -15
- package/dist/cjs/lite/lightning.d.ts +1 -1
- package/dist/cjs/lite/lightning.js +14 -33
- package/dist/esm/advancedacl/session-key.d.ts +1 -1
- package/dist/esm/advancedacl/session-key.js +3 -2
- package/dist/esm/attestedcompute/attested-compute.js +6 -3
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +5 -1
- package/dist/esm/attesteddecrypt/attested-decrypt.js +15 -5
- package/dist/esm/binary.d.ts +2 -4
- package/dist/esm/binary.js +11 -6
- package/dist/esm/encryption/index.d.ts +1 -1
- package/dist/esm/encryption/index.js +2 -2
- package/dist/esm/generated/abis/lightning.d.ts +70 -17
- package/dist/esm/generated/abis/lightning.js +44 -19
- package/dist/esm/generated/abis/test-elist.d.ts +10 -2
- package/dist/esm/generated/abis/test-elist.js +8 -3
- package/dist/esm/generated/abis/verifier.d.ts +78 -4
- package/dist/esm/generated/abis/verifier.js +49 -4
- package/dist/esm/generated/lightning.d.ts +60 -0
- package/dist/esm/generated/lightning.js +64 -1
- package/dist/esm/generated/local-node.d.ts +4 -4
- package/dist/esm/generated/local-node.js +4 -4
- package/dist/esm/index.d.ts +1 -1
- package/dist/esm/index.js +2 -2
- package/dist/esm/kms/quorumClient.d.ts +5 -13
- package/dist/esm/kms/quorumClient.js +74 -259
- package/dist/esm/kms/quorumConsistency.d.ts +58 -0
- package/dist/esm/kms/quorumConsistency.js +193 -0
- package/dist/esm/kms/signatureVerification.d.ts +35 -0
- package/dist/esm/kms/signatureVerification.js +84 -0
- package/dist/esm/kms/thresholdPromises.d.ts +4 -3
- package/dist/esm/kms/thresholdPromises.js +25 -15
- package/dist/esm/lite/hadu.d.ts +1 -1
- package/dist/esm/lite/hadu.js +2 -2
- package/dist/esm/lite/index.d.ts +0 -2
- package/dist/esm/lite/index.js +1 -3
- package/dist/esm/lite/lightning.d.ts +1 -1
- package/dist/esm/lite/lightning.js +8 -27
- package/dist/types/advancedacl/session-key.d.ts +1 -1
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +5 -1
- package/dist/types/binary.d.ts +2 -4
- package/dist/types/encryption/index.d.ts +1 -1
- package/dist/types/generated/abis/lightning.d.ts +70 -17
- package/dist/types/generated/abis/test-elist.d.ts +10 -2
- package/dist/types/generated/abis/verifier.d.ts +78 -4
- package/dist/types/generated/lightning.d.ts +60 -0
- package/dist/types/generated/local-node.d.ts +4 -4
- package/dist/types/index.d.ts +1 -1
- package/dist/types/kms/quorumClient.d.ts +5 -13
- package/dist/types/kms/quorumConsistency.d.ts +58 -0
- package/dist/types/kms/signatureVerification.d.ts +35 -0
- package/dist/types/kms/thresholdPromises.d.ts +4 -3
- package/dist/types/lite/hadu.d.ts +1 -1
- package/dist/types/lite/index.d.ts +0 -2
- package/dist/types/lite/lightning.d.ts +1 -1
- package/package.json +12 -12
package/dist/cjs/index.js
CHANGED
|
@@ -14,9 +14,18 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
|
14
14
|
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
15
|
};
|
|
16
16
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
+
exports.validateHandle = exports.isFheType = exports.handleTypes = exports.getHandleType = exports.InputContext = exports.HandleTypeName = exports.HANDLE_VERSION = exports.HANDLE_LENGTH_BYTES = void 0;
|
|
17
18
|
__exportStar(require("./binary.js"), exports);
|
|
18
19
|
__exportStar(require("./chain.js"), exports);
|
|
19
|
-
|
|
20
|
+
var handle_js_1 = require("./handle.js");
|
|
21
|
+
Object.defineProperty(exports, "HANDLE_LENGTH_BYTES", { enumerable: true, get: function () { return handle_js_1.HANDLE_LENGTH_BYTES; } });
|
|
22
|
+
Object.defineProperty(exports, "HANDLE_VERSION", { enumerable: true, get: function () { return handle_js_1.HANDLE_VERSION; } });
|
|
23
|
+
Object.defineProperty(exports, "HandleTypeName", { enumerable: true, get: function () { return handle_js_1.HandleTypeName; } });
|
|
24
|
+
Object.defineProperty(exports, "InputContext", { enumerable: true, get: function () { return handle_js_1.InputContext; } });
|
|
25
|
+
Object.defineProperty(exports, "getHandleType", { enumerable: true, get: function () { return handle_js_1.getHandleType; } });
|
|
26
|
+
Object.defineProperty(exports, "handleTypes", { enumerable: true, get: function () { return handle_js_1.handleTypes; } });
|
|
27
|
+
Object.defineProperty(exports, "isFheType", { enumerable: true, get: function () { return handle_js_1.isFheType; } });
|
|
28
|
+
Object.defineProperty(exports, "validateHandle", { enumerable: true, get: function () { return handle_js_1.validateHandle; } });
|
|
20
29
|
__exportStar(require("./schema.js"), exports);
|
|
21
30
|
__exportStar(require("./viem.js"), exports);
|
|
22
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
31
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7Ozs7Ozs7QUFBQSw4Q0FBNEI7QUFDNUIsNkNBQTJCO0FBQzNCLHlDQVlxQjtBQVhuQixnSEFBQSxtQkFBbUIsT0FBQTtBQUNuQiwyR0FBQSxjQUFjLE9BQUE7QUFDZCwyR0FBQSxjQUFjLE9BQUE7QUFDZCx5R0FBQSxZQUFZLE9BQUE7QUFDWiwwR0FBQSxhQUFhLE9BQUE7QUFDYix3R0FBQSxXQUFXLE9BQUE7QUFDWCxzR0FBQSxTQUFTLE9BQUE7QUFDVCwyR0FBQSxjQUFjLE9BQUE7QUFLaEIsOENBQTRCO0FBQzVCLDRDQUEwQiJ9
|
|
@@ -2,9 +2,10 @@ import type { Address } from 'viem';
|
|
|
2
2
|
import type { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/types.js';
|
|
3
3
|
import type { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
4
4
|
import type { AttestedComputeRequest, AttestedDecryptRequest, AttestedRevealRequest } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
|
|
5
|
-
import type { XwingKeypair } from '../lite/
|
|
5
|
+
import type { XwingKeypair } from '../lite/xwing.js';
|
|
6
6
|
import type { BackoffConfig } from '../retry.js';
|
|
7
7
|
import { type KmsClient } from './client.js';
|
|
8
|
+
import type { ViemClient } from './signatureVerification.js';
|
|
8
9
|
export declare class KmsQuorumClient {
|
|
9
10
|
private readonly kmss;
|
|
10
11
|
private readonly threshold;
|
|
@@ -29,9 +30,9 @@ export declare class KmsQuorumClient {
|
|
|
29
30
|
* @throws {Error} If KMS clients array is empty or threshold is invalid
|
|
30
31
|
*/
|
|
31
32
|
static fromKmsClients(kmsClients: KmsClient[], threshold: number): KmsQuorumClient;
|
|
32
|
-
attestedDecrypt(request: AttestedDecryptRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
|
|
33
|
-
attestedCompute(request: AttestedComputeRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
|
|
34
|
-
attestedReveal(request: AttestedRevealRequest, backoffConfig?: Partial<BackoffConfig
|
|
33
|
+
attestedDecrypt(request: AttestedDecryptRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair, executorAddress?: Address, client?: ViemClient): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
|
|
34
|
+
attestedCompute(request: AttestedComputeRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair, executorAddress?: Address, client?: ViemClient): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
|
|
35
|
+
attestedReveal(request: AttestedRevealRequest, backoffConfig?: Partial<BackoffConfig>, executorAddress?: Address, client?: ViemClient): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
|
|
35
36
|
/**
|
|
36
37
|
* Generic method to execute a KMS operation across all clients with retry and threshold logic.
|
|
37
38
|
* Returns results with both the response and signer address.
|
|
@@ -48,13 +49,4 @@ export declare class KmsQuorumClient {
|
|
|
48
49
|
private buildPlaintextAttestation;
|
|
49
50
|
private buildAggregatedAttestations;
|
|
50
51
|
private buildAggregatedComputeAttestation;
|
|
51
|
-
private verifyResponseConsistency;
|
|
52
|
-
private verifyComputeResponseConsistency;
|
|
53
|
-
/**
|
|
54
|
-
* Verifies that two plaintext byte arrays are identical.
|
|
55
|
-
* Uses constant-time comparison to prevent timing side-channel attacks.
|
|
56
|
-
*/
|
|
57
|
-
private verifyPlaintextBytesConsistency;
|
|
58
|
-
private verifyPlaintextConsistency;
|
|
59
|
-
private verifyCiphertextConsistency;
|
|
60
52
|
}
|
|
@@ -4,18 +4,19 @@ exports.KmsQuorumClient = void 0;
|
|
|
4
4
|
const binary_js_1 = require("../binary.js");
|
|
5
5
|
const encryption_js_1 = require("../encryption/encryption.js");
|
|
6
6
|
const handle_js_1 = require("../handle.js");
|
|
7
|
-
const xwing_js_1 = require("../lite/xwing.js");
|
|
8
7
|
const retry_js_1 = require("../retry.js");
|
|
9
8
|
const client_js_1 = require("./client.js");
|
|
9
|
+
const quorumConsistency_js_1 = require("./quorumConsistency.js");
|
|
10
|
+
const signatureVerification_js_1 = require("./signatureVerification.js");
|
|
10
11
|
const thresholdPromises_js_1 = require("./thresholdPromises.js");
|
|
11
12
|
/**
|
|
12
|
-
* Checks if the threshold is at least a majority of signers and
|
|
13
|
+
* Checks if the threshold is at least a majority of signers and throws an error if not.
|
|
14
|
+
* This is important to ensure that the quorum client provides the expected security guarantees.
|
|
13
15
|
*/
|
|
14
16
|
function checkMajorityThreshold(threshold, signerCount) {
|
|
15
17
|
const majority = Math.floor(signerCount / 2) + 1;
|
|
16
18
|
if (threshold < majority) {
|
|
17
|
-
|
|
18
|
-
`A threshold below majority weakens quorum security guarantees.`);
|
|
19
|
+
throw new Error(`Threshold (${threshold}) must be at least a majority (${majority}) of ${signerCount} signers to ensure security guarantees.`);
|
|
19
20
|
}
|
|
20
21
|
}
|
|
21
22
|
class KmsQuorumClient {
|
|
@@ -71,7 +72,6 @@ class KmsQuorumClient {
|
|
|
71
72
|
if (threshold < 1 || threshold > urls.length) {
|
|
72
73
|
throw new Error(`Threshold must be between 1 and ${urls.length} (number of URLs)`);
|
|
73
74
|
}
|
|
74
|
-
checkMajorityThreshold(threshold, urls.length);
|
|
75
75
|
const attesters = urls.map((url, index) => {
|
|
76
76
|
return { url, signer: signers[index] };
|
|
77
77
|
});
|
|
@@ -92,41 +92,31 @@ class KmsQuorumClient {
|
|
|
92
92
|
if (threshold < 1 || threshold > kmsClients.length) {
|
|
93
93
|
throw new Error(`Threshold must be between 1 and ${kmsClients.length} (number of KMS clients)`);
|
|
94
94
|
}
|
|
95
|
-
checkMajorityThreshold(threshold, kmsClients.length);
|
|
96
95
|
return new KmsQuorumClient(kmsClients, threshold);
|
|
97
96
|
}
|
|
98
|
-
async attestedDecrypt(request, backoffConfig, reencryptKeypair) {
|
|
97
|
+
async attestedDecrypt(request, backoffConfig, reencryptKeypair, executorAddress, client) {
|
|
99
98
|
const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
|
|
100
99
|
return await kms.client.attestedDecrypt(request);
|
|
101
100
|
}, backoffConfig);
|
|
102
|
-
// Extract responses and signers
|
|
103
|
-
const thresholdResponses = thresholdResults.map((r) => r.response);
|
|
104
|
-
const signers = thresholdResults.map((r) => r.signer);
|
|
105
101
|
// Verify that responses are consistent across quorum (plaintext or ciphertext)
|
|
106
|
-
const reference = await
|
|
107
|
-
return this.buildAggregatedAttestations(reference,
|
|
102
|
+
const { reference, winningResults } = await (0, quorumConsistency_js_1.verifyDecryptResponseConsistency)(thresholdResults, this.threshold, reencryptKeypair);
|
|
103
|
+
return this.buildAggregatedAttestations(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
|
|
108
104
|
}
|
|
109
|
-
async attestedCompute(request, backoffConfig, reencryptKeypair) {
|
|
105
|
+
async attestedCompute(request, backoffConfig, reencryptKeypair, executorAddress, client) {
|
|
110
106
|
const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
|
|
111
107
|
return await kms.client.attestedCompute(request);
|
|
112
108
|
}, backoffConfig);
|
|
113
|
-
// Extract responses and signers
|
|
114
|
-
const thresholdResponses = thresholdResults.map((r) => r.response);
|
|
115
|
-
const signers = thresholdResults.map((r) => r.signer);
|
|
116
109
|
// Verify that responses are consistent across quorum
|
|
117
|
-
const reference = await
|
|
118
|
-
return this.buildAggregatedComputeAttestation(reference,
|
|
110
|
+
const { reference, winningResults } = await (0, quorumConsistency_js_1.verifyComputeResponseConsistency)(thresholdResults, this.threshold, request, reencryptKeypair);
|
|
111
|
+
return this.buildAggregatedComputeAttestation(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
|
|
119
112
|
}
|
|
120
|
-
async attestedReveal(request, backoffConfig) {
|
|
113
|
+
async attestedReveal(request, backoffConfig, executorAddress, client) {
|
|
121
114
|
const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
|
|
122
115
|
return await kms.client.attestedReveal(request);
|
|
123
116
|
}, backoffConfig);
|
|
124
|
-
// Extract responses and signers
|
|
125
|
-
const thresholdResponses = thresholdResults.map((r) => r.response);
|
|
126
|
-
const signers = thresholdResults.map((r) => r.signer);
|
|
127
117
|
// Verify that responses are consistent across quorum (plaintext only for reveal)
|
|
128
|
-
const reference = await this.
|
|
129
|
-
return this.buildAggregatedAttestations(reference,
|
|
118
|
+
const { reference, winningResults } = await (0, quorumConsistency_js_1.verifyDecryptResponseConsistency)(thresholdResults, this.threshold);
|
|
119
|
+
return this.buildAggregatedAttestations(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
|
|
130
120
|
}
|
|
131
121
|
/**
|
|
132
122
|
* Generic method to execute a KMS operation across all clients with retry and threshold logic.
|
|
@@ -189,9 +179,10 @@ class KmsQuorumClient {
|
|
|
189
179
|
covalidatorSignatures,
|
|
190
180
|
};
|
|
191
181
|
}
|
|
192
|
-
buildAggregatedAttestations(reference, thresholdResponses, signers) {
|
|
182
|
+
async buildAggregatedAttestations(reference, thresholdResponses, signers, executorAddress, client) {
|
|
193
183
|
const attestationCount = reference.decryptionAttestations.length;
|
|
194
|
-
|
|
184
|
+
const results = [];
|
|
185
|
+
for (let i = 0; i < attestationCount; i++) {
|
|
195
186
|
const refAtt = reference.decryptionAttestations[i];
|
|
196
187
|
if (!refAtt.value) {
|
|
197
188
|
throw new Error('No value in attestation');
|
|
@@ -200,42 +191,56 @@ class KmsQuorumClient {
|
|
|
200
191
|
const signatures = thresholdResponses.map((resp) => resp.decryptionAttestations[i].signature);
|
|
201
192
|
const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
|
|
202
193
|
if (refAtt.value.case === 'plaintext') {
|
|
203
|
-
|
|
194
|
+
// Verify covalidator signatures over the plaintext attestation
|
|
195
|
+
// executorAddress and client are only undefined when using a non-real client (e.g. in tests)
|
|
196
|
+
if (executorAddress && client) {
|
|
197
|
+
await (0, signatureVerification_js_1.verifyPlaintextAttestationSignatures)(refAtt.handle, refAtt.value.value.value, covalidatorSignatures, executorAddress, client);
|
|
198
|
+
}
|
|
199
|
+
results.push(this.buildPlaintextAttestation(refAtt, covalidatorSignatures));
|
|
204
200
|
}
|
|
205
201
|
else if (refAtt.value.case === 'reencryption') {
|
|
206
|
-
// Collect encrypted signatures and
|
|
207
|
-
const encryptedSignatures =
|
|
208
|
-
|
|
209
|
-
|
|
210
|
-
|
|
202
|
+
// Collect per-covalidator encrypted signatures and ciphertexts
|
|
203
|
+
const encryptedSignatures = [];
|
|
204
|
+
const perCovalidatorCiphertexts = [];
|
|
205
|
+
for (const resp of thresholdResponses) {
|
|
206
|
+
const attValue = resp.decryptionAttestations[i].value;
|
|
207
|
+
if (attValue?.case === 'reencryption') {
|
|
208
|
+
encryptedSignatures.push(attValue.value.encryptedSignature);
|
|
209
|
+
perCovalidatorCiphertexts.push(attValue.value.userCiphertext);
|
|
211
210
|
}
|
|
212
211
|
else {
|
|
213
|
-
throw new Error(`Expected reencryption attestation but received '${
|
|
212
|
+
throw new Error(`Expected reencryption attestation but received '${attValue?.case}'`);
|
|
214
213
|
}
|
|
215
|
-
}
|
|
214
|
+
}
|
|
216
215
|
const encryptedCovalidatorSignatures = this.collectAndSortSignatures(encryptedSignatures, signers);
|
|
216
|
+
const sortedCiphertexts = this.collectAndSortSignatures(perCovalidatorCiphertexts, signers);
|
|
217
|
+
// executorAddress and client are only undefined when using a non-real client (e.g. in tests)
|
|
218
|
+
if (executorAddress && client) {
|
|
219
|
+
await (0, signatureVerification_js_1.verifyReencryptionAttestationSignatures)(refAtt.handle, sortedCiphertexts, encryptedCovalidatorSignatures, covalidatorSignatures, executorAddress, client);
|
|
220
|
+
}
|
|
217
221
|
const reencryption = refAtt.value.value;
|
|
218
222
|
const ct = reencryption.userCiphertext;
|
|
219
|
-
const
|
|
220
|
-
|
|
223
|
+
const handleType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
|
|
224
|
+
results.push({
|
|
221
225
|
handle: refAtt.handle,
|
|
222
226
|
encryptedPlaintext: {
|
|
223
227
|
ciphertext: {
|
|
224
228
|
value: (0, binary_js_1.bytesToHex)(ct),
|
|
225
|
-
scheme:
|
|
226
|
-
type:
|
|
229
|
+
scheme: encryption_js_1.encryptionSchemes.xwing, // EncryptionScheme: XWING
|
|
230
|
+
type: handleType,
|
|
227
231
|
},
|
|
228
232
|
},
|
|
229
233
|
encryptedSignatures: encryptedCovalidatorSignatures,
|
|
230
234
|
covalidatorSignatures,
|
|
231
|
-
};
|
|
235
|
+
});
|
|
232
236
|
}
|
|
233
237
|
else {
|
|
234
238
|
throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext' or 'reencryption'`);
|
|
235
239
|
}
|
|
236
|
-
}
|
|
240
|
+
}
|
|
241
|
+
return results;
|
|
237
242
|
}
|
|
238
|
-
buildAggregatedComputeAttestation(reference, thresholdResponses, signers) {
|
|
243
|
+
async buildAggregatedComputeAttestation(reference, thresholdResponses, signers, executorAddress, client) {
|
|
239
244
|
const refAtt = reference.decryptionAttestation;
|
|
240
245
|
if (!refAtt) {
|
|
241
246
|
throw new Error('No decryption attestation in reference response');
|
|
@@ -244,43 +249,58 @@ class KmsQuorumClient {
|
|
|
244
249
|
throw new Error('No value in reference attestation');
|
|
245
250
|
}
|
|
246
251
|
// Collect signatures and sort by signer address
|
|
247
|
-
//
|
|
252
|
+
// All responses are guaranteed to have decryption attestations by verifyComputeResponseConsistency
|
|
248
253
|
const signatures = [];
|
|
249
254
|
for (const resp of thresholdResponses) {
|
|
250
255
|
const att = resp.decryptionAttestation;
|
|
251
|
-
if (att)
|
|
252
|
-
|
|
253
|
-
|
|
256
|
+
if (!att)
|
|
257
|
+
throw new Error('Missing decryption attestation in winning response');
|
|
258
|
+
signatures.push(att.signature);
|
|
254
259
|
}
|
|
255
260
|
const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
|
|
256
261
|
if (refAtt.value.case === 'plaintext') {
|
|
262
|
+
// Verify covalidator signatures over the plaintext attestation
|
|
263
|
+
// executorAddress and client are only undefined when using a non-real client (e.g. in tests)
|
|
264
|
+
if (executorAddress && client) {
|
|
265
|
+
await (0, signatureVerification_js_1.verifyPlaintextAttestationSignatures)(refAtt.handle, refAtt.value.value.value, covalidatorSignatures, executorAddress, client);
|
|
266
|
+
}
|
|
257
267
|
return this.buildPlaintextAttestation(refAtt, covalidatorSignatures);
|
|
258
268
|
}
|
|
259
269
|
if (refAtt.value.case === 'reencryption') {
|
|
270
|
+
// Reencryption envelope signatures are verified per-covalidator via
|
|
271
|
+
// isValidReencryptionAttestation on-chain (each has a unique digest).
|
|
260
272
|
const reencryption = refAtt.value.value;
|
|
261
273
|
const ct = reencryption.userCiphertext;
|
|
262
274
|
if (!ct) {
|
|
263
275
|
throw new Error('No ciphertext in reencryption');
|
|
264
276
|
}
|
|
265
|
-
const
|
|
266
|
-
// Collect encrypted signatures and
|
|
267
|
-
const encryptedSignatures =
|
|
277
|
+
const handleType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
|
|
278
|
+
// Collect per-covalidator encrypted signatures and ciphertexts
|
|
279
|
+
const encryptedSignatures = [];
|
|
280
|
+
const perCovalidatorCiphertexts = [];
|
|
281
|
+
for (const resp of thresholdResponses) {
|
|
268
282
|
if (resp.decryptionAttestation?.value.case === 'reencryption') {
|
|
269
|
-
const
|
|
270
|
-
|
|
283
|
+
const reenc = resp.decryptionAttestation.value.value;
|
|
284
|
+
encryptedSignatures.push(reenc.encryptedSignature);
|
|
285
|
+
perCovalidatorCiphertexts.push(reenc.userCiphertext);
|
|
271
286
|
}
|
|
272
287
|
else {
|
|
273
288
|
throw new Error(`Expected reencryption attestation but received '${resp.decryptionAttestation?.value.case}'`);
|
|
274
289
|
}
|
|
275
|
-
}
|
|
290
|
+
}
|
|
276
291
|
const encryptedCovalidatorSignatures = this.collectAndSortSignatures(encryptedSignatures, signers);
|
|
292
|
+
const sortedCiphertexts = this.collectAndSortSignatures(perCovalidatorCiphertexts, signers);
|
|
293
|
+
// executorAddress and client are only undefined when using a non-real client (e.g. in tests)
|
|
294
|
+
if (executorAddress && client) {
|
|
295
|
+
await (0, signatureVerification_js_1.verifyReencryptionAttestationSignatures)(refAtt.handle, sortedCiphertexts, encryptedCovalidatorSignatures, covalidatorSignatures, executorAddress, client);
|
|
296
|
+
}
|
|
277
297
|
return {
|
|
278
298
|
handle: refAtt.handle,
|
|
279
299
|
encryptedPlaintext: {
|
|
280
300
|
ciphertext: {
|
|
281
301
|
value: (0, binary_js_1.bytesToHex)(ct),
|
|
282
|
-
scheme: encryption_js_1.encryptionSchemes.xwing, // EncryptionScheme:
|
|
283
|
-
type:
|
|
302
|
+
scheme: encryption_js_1.encryptionSchemes.xwing, // EncryptionScheme: XWING
|
|
303
|
+
type: handleType,
|
|
284
304
|
},
|
|
285
305
|
},
|
|
286
306
|
encryptedSignatures: encryptedCovalidatorSignatures,
|
|
@@ -289,211 +309,6 @@ class KmsQuorumClient {
|
|
|
289
309
|
}
|
|
290
310
|
throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext' or 'reencryption'`);
|
|
291
311
|
}
|
|
292
|
-
async verifyResponseConsistency(thresholdResponses, reencryptKeypair) {
|
|
293
|
-
if (thresholdResponses.length === 0) {
|
|
294
|
-
throw new Error('No responses collected to verify');
|
|
295
|
-
}
|
|
296
|
-
const reference = thresholdResponses[0];
|
|
297
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
298
|
-
if (thresholdResponses[r].decryptionAttestations.length !==
|
|
299
|
-
reference.decryptionAttestations.length) {
|
|
300
|
-
throw new Error('Inconsistent number of decryption attestations across KMS responses');
|
|
301
|
-
}
|
|
302
|
-
}
|
|
303
|
-
for (let i = 0; i < reference.decryptionAttestations.length; i++) {
|
|
304
|
-
const refAtt = reference.decryptionAttestations[i];
|
|
305
|
-
if (!refAtt.value) {
|
|
306
|
-
throw new Error('No value in reference attestation');
|
|
307
|
-
}
|
|
308
|
-
const refCase = refAtt.value.case;
|
|
309
|
-
// Verify that all responses have the same case (plaintext or reencryption)
|
|
310
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
311
|
-
const att = thresholdResponses[r].decryptionAttestations[i];
|
|
312
|
-
if (!att.value) {
|
|
313
|
-
throw new Error('No value in attestation');
|
|
314
|
-
}
|
|
315
|
-
if (att.value.case !== refCase) {
|
|
316
|
-
throw new Error(`Inconsistent attestation types: reference has '${refCase}' but response ${r} has '${att.value.case}'`);
|
|
317
|
-
}
|
|
318
|
-
}
|
|
319
|
-
// Verify consistency based on the case
|
|
320
|
-
if (refCase === 'plaintext') {
|
|
321
|
-
this.verifyPlaintextConsistency(i, reference, thresholdResponses);
|
|
322
|
-
}
|
|
323
|
-
else if (refCase === 'reencryption') {
|
|
324
|
-
await this.verifyCiphertextConsistency(i, reference, thresholdResponses, reencryptKeypair);
|
|
325
|
-
}
|
|
326
|
-
else {
|
|
327
|
-
throw new Error(`Unexpected attestation type: ${refCase}, expected 'plaintext' or 'reencryption'`);
|
|
328
|
-
}
|
|
329
|
-
}
|
|
330
|
-
return reference;
|
|
331
|
-
}
|
|
332
|
-
async verifyComputeResponseConsistency(thresholdResponses, request, reencryptKeypair) {
|
|
333
|
-
if (thresholdResponses.length === 0) {
|
|
334
|
-
throw new Error('No responses collected to verify');
|
|
335
|
-
}
|
|
336
|
-
const reference = thresholdResponses[0];
|
|
337
|
-
const refAtt = reference.decryptionAttestation;
|
|
338
|
-
if (!refAtt) {
|
|
339
|
-
throw new Error('No decryption attestation in reference response');
|
|
340
|
-
}
|
|
341
|
-
if (!refAtt.value) {
|
|
342
|
-
throw new Error('No value in reference attestation');
|
|
343
|
-
}
|
|
344
|
-
const refCase = refAtt.value.case;
|
|
345
|
-
// Precompute reference values based on the case
|
|
346
|
-
let refBytes;
|
|
347
|
-
let refReencryption;
|
|
348
|
-
let refCt;
|
|
349
|
-
let refFheType;
|
|
350
|
-
if (refCase === 'plaintext') {
|
|
351
|
-
refBytes = refAtt.value.value.value;
|
|
352
|
-
}
|
|
353
|
-
else if (refCase === 'reencryption') {
|
|
354
|
-
refReencryption = refAtt.value.value;
|
|
355
|
-
refCt = refReencryption.userCiphertext;
|
|
356
|
-
if (!refCt) {
|
|
357
|
-
throw new Error('No ciphertext in reference reencryption');
|
|
358
|
-
}
|
|
359
|
-
refFheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
|
|
360
|
-
}
|
|
361
|
-
else {
|
|
362
|
-
throw new Error(`Unexpected attestation type: ${refCase}, expected 'plaintext' or 'reencryption'`);
|
|
363
|
-
}
|
|
364
|
-
// If no reencryptPubKey is provided in the request (or it's empty), reject reencryption attestations
|
|
365
|
-
const hasReencryptPubKey = request?.reencryptPubKey && request.reencryptPubKey.length > 0;
|
|
366
|
-
if (refCase === 'reencryption' && !hasReencryptPubKey) {
|
|
367
|
-
throw new Error("Unexpected attestation type: reencryption, expected 'plaintext'");
|
|
368
|
-
}
|
|
369
|
-
// Verify that all responses have a decryption attestation and are consistent
|
|
370
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
371
|
-
const att = thresholdResponses[r].decryptionAttestation;
|
|
372
|
-
if (!att) {
|
|
373
|
-
throw new Error('No decryption attestation in response');
|
|
374
|
-
}
|
|
375
|
-
if (!att.value) {
|
|
376
|
-
throw new Error('No value in attestation');
|
|
377
|
-
}
|
|
378
|
-
if (att.value.case !== refCase) {
|
|
379
|
-
throw new Error(`Inconsistent attestation types: reference has '${refCase}' but response ${r} has '${att.value.case}'`);
|
|
380
|
-
}
|
|
381
|
-
// Verify handles match
|
|
382
|
-
if (att.handle !== refAtt.handle) {
|
|
383
|
-
throw new Error('Handles differ across KMS responses');
|
|
384
|
-
}
|
|
385
|
-
// Verify consistency based on the case
|
|
386
|
-
if (refCase === 'plaintext') {
|
|
387
|
-
if (!refBytes) {
|
|
388
|
-
throw new Error('No reference plaintext bytes to compare');
|
|
389
|
-
}
|
|
390
|
-
if (att.value.case !== 'plaintext') {
|
|
391
|
-
throw new Error('Expected plaintext attestation but received non-plaintext');
|
|
392
|
-
}
|
|
393
|
-
const bytes = att.value.value.value;
|
|
394
|
-
this.verifyPlaintextBytesConsistency(refBytes, bytes);
|
|
395
|
-
}
|
|
396
|
-
else if (refCase === 'reencryption') {
|
|
397
|
-
if (!refCt || refFheType === undefined) {
|
|
398
|
-
throw new Error('No reference reencryption data to compare');
|
|
399
|
-
}
|
|
400
|
-
if (att.value.case !== 'reencryption') {
|
|
401
|
-
throw new Error('Expected reencryption attestation but received non-reencryption');
|
|
402
|
-
}
|
|
403
|
-
const reencryption = att.value.value;
|
|
404
|
-
const ct = reencryption.userCiphertext;
|
|
405
|
-
if (!ct) {
|
|
406
|
-
throw new Error('No ciphertext in reencryption');
|
|
407
|
-
}
|
|
408
|
-
const fheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(att.handle));
|
|
409
|
-
// Verify FHE type matches
|
|
410
|
-
if (fheType !== refFheType) {
|
|
411
|
-
throw new Error('FHE types differ across KMS responses');
|
|
412
|
-
}
|
|
413
|
-
// Verify handles match
|
|
414
|
-
if (att.handle !== refAtt.handle) {
|
|
415
|
-
throw new Error('Handles differ across KMS responses');
|
|
416
|
-
}
|
|
417
|
-
// If keypair provided, decrypt and verify plaintext consistency
|
|
418
|
-
if (reencryptKeypair) {
|
|
419
|
-
const refPlaintext = await (0, xwing_js_1.decrypt)(reencryptKeypair, refCt);
|
|
420
|
-
const plaintext = await (0, xwing_js_1.decrypt)(reencryptKeypair, ct);
|
|
421
|
-
this.verifyPlaintextBytesConsistency(refPlaintext, plaintext);
|
|
422
|
-
}
|
|
423
|
-
}
|
|
424
|
-
}
|
|
425
|
-
return reference;
|
|
426
|
-
}
|
|
427
|
-
/**
|
|
428
|
-
* Verifies that two plaintext byte arrays are identical.
|
|
429
|
-
* Uses constant-time comparison to prevent timing side-channel attacks.
|
|
430
|
-
*/
|
|
431
|
-
verifyPlaintextBytesConsistency(refBytes, bytes) {
|
|
432
|
-
if (refBytes.length !== bytes.length) {
|
|
433
|
-
throw new Error('Plaintexts length differ across KMS responses');
|
|
434
|
-
}
|
|
435
|
-
// Compare all bytes before deciding to throw, preventing timing side-channel
|
|
436
|
-
let mismatch = 0;
|
|
437
|
-
for (let b = 0; b < refBytes.length; b++) {
|
|
438
|
-
mismatch |= refBytes[b] ^ bytes[b];
|
|
439
|
-
}
|
|
440
|
-
if (mismatch !== 0) {
|
|
441
|
-
throw new Error('Plaintexts differ across KMS responses');
|
|
442
|
-
}
|
|
443
|
-
}
|
|
444
|
-
verifyPlaintextConsistency(index, reference, thresholdResponses) {
|
|
445
|
-
const refAtt = reference.decryptionAttestations[index];
|
|
446
|
-
if (refAtt.value?.case !== 'plaintext') {
|
|
447
|
-
throw new Error('Expected plaintext attestation');
|
|
448
|
-
}
|
|
449
|
-
const refBytes = refAtt.value.value.value;
|
|
450
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
451
|
-
const att = thresholdResponses[r].decryptionAttestations[index];
|
|
452
|
-
if (att.value?.case !== 'plaintext') {
|
|
453
|
-
throw new Error('Expected plaintext attestation but received non-plaintext');
|
|
454
|
-
}
|
|
455
|
-
const bytes = att.value.value.value;
|
|
456
|
-
this.verifyPlaintextBytesConsistency(refBytes, bytes);
|
|
457
|
-
}
|
|
458
|
-
}
|
|
459
|
-
async verifyCiphertextConsistency(index, reference, thresholdResponses, reencryptKeypair) {
|
|
460
|
-
const refAtt = reference.decryptionAttestations[index];
|
|
461
|
-
if (refAtt.value?.case !== 'reencryption') {
|
|
462
|
-
throw new Error('Expected reencryption attestation');
|
|
463
|
-
}
|
|
464
|
-
const refReencryption = refAtt.value.value;
|
|
465
|
-
const refCt = refReencryption.userCiphertext;
|
|
466
|
-
if (!refCt) {
|
|
467
|
-
throw new Error('No ciphertext in reference reencryption');
|
|
468
|
-
}
|
|
469
|
-
const refFheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
|
|
470
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
471
|
-
const att = thresholdResponses[r].decryptionAttestations[index];
|
|
472
|
-
if (att.value?.case !== 'reencryption') {
|
|
473
|
-
throw new Error('Expected reencryption attestation but received non-reencryption');
|
|
474
|
-
}
|
|
475
|
-
const reencryption = att.value.value;
|
|
476
|
-
const ct = reencryption.userCiphertext;
|
|
477
|
-
if (!ct) {
|
|
478
|
-
throw new Error('No ciphertext in reencryption');
|
|
479
|
-
}
|
|
480
|
-
const fheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(att.handle));
|
|
481
|
-
// Verify FHE type matches
|
|
482
|
-
if (fheType !== refFheType) {
|
|
483
|
-
throw new Error('FHE types differ across KMS responses');
|
|
484
|
-
}
|
|
485
|
-
// Verify handles match
|
|
486
|
-
if (att.handle !== refAtt.handle) {
|
|
487
|
-
throw new Error('Handles differ across KMS responses');
|
|
488
|
-
}
|
|
489
|
-
// If keypair provided, decrypt and verify plaintext consistency
|
|
490
|
-
if (reencryptKeypair) {
|
|
491
|
-
const refPlaintext = await (0, xwing_js_1.decrypt)(reencryptKeypair, refCt);
|
|
492
|
-
const plaintext = await (0, xwing_js_1.decrypt)(reencryptKeypair, ct);
|
|
493
|
-
this.verifyPlaintextBytesConsistency(refPlaintext, plaintext);
|
|
494
|
-
}
|
|
495
|
-
}
|
|
496
|
-
}
|
|
497
312
|
}
|
|
498
313
|
exports.KmsQuorumClient = KmsQuorumClient;
|
|
499
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"quorumClient.js","sourceRoot":"","sources":["../../../src/kms/quorumClient.ts"],"names":[],"mappings":";;;AAKA,4CAKsB;AAMtB,+DAGqC;AAUrC,4CAA6C;AAE7C,+CAA2C;AAE3C,0CAA+C;AAC/C,2CAA2D;AAC3D,iEAA8D;AAO9D;;GAEG;AACH,SAAS,sBAAsB,CAAC,SAAiB,EAAE,WAAmB;IACpE,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,IAAI,SAAS,GAAG,QAAQ,EAAE,CAAC;QACzB,OAAO,CAAC,IAAI,CACV,gCAAgC,SAAS,4BAA4B,QAAQ,QAAQ,WAAW,YAAY;YAC1G,gEAAgE,CACnE,CAAC;IACJ,CAAC;AACH,CAAC;AAED,MAAa,eAAe;IACT,IAAI,CAAQ;IACZ,SAAS,CAAS;IAQnC,iBAAiB;IACjB,YACE,kBAAoE,EACpE,SAAiB;QAEjB,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CACb,mCAAmC,kBAAkB,CAAC,MAAM,EAAE,CAC/D,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAE7D,2FAA2F;QAC3F,IACE,kBAAkB,CAAC,MAAM,GAAG,CAAC;YAC7B,iBAAiB,IAAI,kBAAkB,CAAC,CAAC,CAAC,EAC1C,CAAC;YACD,0BAA0B;YAC1B,MAAM,UAAU,GAAG,kBAAiC,CAAC;YACrD,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;gBACtC,MAAM;gBACN,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAC,CAAC;QACN,CAAC;aAAM,CAAC;YACN,iDAAiD;YACjD,MAAM,SAAS,GAAG,kBAGf,CAAC;YACJ,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrC,OAAO;oBACL,MAAM,EAAE,IAAA,wBAAY,EAAC,QAAQ,CAAC,GAAG,EAAE,QAAQ,CAAC,MAAM,CAAC;oBACnD,MAAM,EAAE,QAAQ,CAAC,MAAM;iBACxB,CAAC;YACJ,CAAC,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,QAAQ,CACb,IAAc,EACd,OAAkB,EAClB,SAAiB;QAEjB,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,yBAAyB,OAAO,CAAC,MAAM,mCAAmC,IAAI,CAAC,MAAM,GAAG,CACzF,CAAC;QACJ,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CACb,mCAAmC,IAAI,CAAC,MAAM,mBAAmB,CAClE,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;QAE/C,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACxC,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,eAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,cAAc,CACnB,UAAuB,EACvB,SAAiB;QAEjB,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CACb,mCAAmC,UAAU,CAAC,MAAM,0BAA0B,CAC/E,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC;QAErD,OAAO,IAAI,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B;QAO/B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,+EAA+E;QAC/E,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,yBAAyB,CACpD,kBAAkB,EAClB,gBAAgB,CACjB,CAAC;QAEF,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B;QAK/B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,qDAAqD;QACrD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAC3D,kBAAkB,EAClB,OAAO,EACP,gBAAgB,CACjB,CAAC;QAEF,OAAO,IAAI,CAAC,iCAAiC,CAC3C,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,aAAsC;QAOtC,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAClD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAkC,CAC5C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,iFAAiF;QACjF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,CAAC;QAE3E,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,gCAAgC,CAC5C,SAA2C,EAC3C,aAAsC;QAEtC,iEAAiE;QACjE,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;oBACjD,OAAO,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,EAAE,aAAa,CAAC,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;YAC1C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,cAAc,KAAK,YAAY,KAAK,EAAE,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,IAAA,2CAAoB,EAG9B,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAC9B,UAAwB,EACxB,OAAkB;QAElB,MAAM,qBAAqB,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;YAChE,SAAS;YACT,MAAM,EAAE,OAAO,CAAC,GAAG,CAAC;SACrB,CAAC,CAAC,CAAC;QAEJ,+EAA+E;QAC/E,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC;YAChC,OAAO,CAAC,CAAC;QACX,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,OAAO,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACK,yBAAyB,CAC/B,qBAAiD,EACjD,qBAAmC;QAEnC,IACE,CAAC,qBAAqB,CAAC,KAAK;YAC5B,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAChD,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,cAAc,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAC/D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAmB,CAAC;QACzD,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,IAAA,yBAAa,EAAC,cAAc,CAAC,CAAC;QAClD,MAAM,SAAS,GAAG,IAAA,iCAAiB,EACjC,iCAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ,CAAC;QAEF,OAAO;YACL,MAAM;YACN,SAAS;YACT,qBAAqB;SACuC,CAAC;IACjE,CAAC;IAEO,2BAA2B,CACjC,SAA2D,EAC3D,kBAAwE,EACxE,OAAkB;QAKlB,MAAM,gBAAgB,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,CAAC;QACjE,OAAO,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAC9D,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YACnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,gDAAgD;YAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC,GAAG,CACvC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,SAAS,CACnD,CAAC;YACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;YAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACtC,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;YACvE,CAAC;iBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAChD,0DAA0D;gBAC1D,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;oBAC1D,IAAI,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACjE,MAAM,YAAY,GAAG,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC;wBAChE,OAAO,YAAY,CAAC,kBAAkB,CAAC;oBACzC,CAAC;yBAAM,CAAC;wBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,GAAG,CAChG,CAAC;oBACJ,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;gBAEF,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;gBACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBACvD,OAAO;oBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;oBAClC,kBAAkB,EAAE;wBAClB,UAAU,EAAE;4BACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;4BACrB,MAAM,EAAE,CAAC,EAAE,0BAA0B;4BACrC,IAAI,EAAE,OAAO;yBACd;qBACqD;oBACxD,mBAAmB,EAAE,8BAA8B;oBACnD,qBAAqB;iBACgD,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;YACJ,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,iCAAiC,CACvC,SAAkC,EAClC,kBAA6C,EAC7C,OAAkB;QAIlB,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,gDAAgD;QAChD,2FAA2F;QAC3F,MAAM,UAAU,GAAiB,EAAE,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;YACtC,MAAM,GAAG,GAAG,IAAI,CAAC,qBAAqB,CAAC;YACvC,IAAI,GAAG,EAAE,CAAC;gBACR,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YACjC,CAAC;QACH,CAAC;QACD,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;QAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;YACzC,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;YAEvD,0DAA0D;YAC1D,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1D,IAAI,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBAC9D,MAAM,YAAY,GAAG,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,KAAK,CAAC;oBAC7D,OAAO,YAAY,CAAC,kBAAkB,CAAC;gBACzC,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,GAAG,CAC7F,CAAC;gBACJ,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;YAEF,OAAO;gBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;gBAClC,kBAAkB,EAAE;oBAClB,UAAU,EAAE;wBACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;wBACrB,MAAM,EAAE,iCAAiB,CAAC,KAAK,EAAE,0BAA0B;wBAC3D,IAAI,EAAE,OAAO;qBACd;iBACqD;gBACxD,mBAAmB,EAAE,8BAA8B;gBACnD,qBAAqB;aACgD,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,yBAAyB,CACrC,kBAAwE,EACxE,gBAA+B;QAE/B,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QAExC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,IACE,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,MAAM;gBACnD,SAAS,CAAC,sBAAsB,CAAC,MAAM,EACvC,CAAC;gBACD,MAAM,IAAI,KAAK,CACb,qEAAqE,CACtE,CAAC;YACJ,CAAC;QACH,CAAC;QAED,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACjE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YAEnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;YACvD,CAAC;YAED,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC;YAElC,2EAA2E;YAC3E,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;gBAC5D,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;oBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;gBAC7C,CAAC;gBACD,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,OAAO,EAAE,CAAC;oBAC/B,MAAM,IAAI,KAAK,CACb,kDAAkD,OAAO,kBAAkB,CAAC,SAAS,GAAG,CAAC,KAAK,CAAC,IAAI,GAAG,CACvG,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,uCAAuC;YACvC,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;gBAC5B,IAAI,CAAC,0BAA0B,CAAC,CAAC,EAAE,SAAS,EAAE,kBAAkB,CAAC,CAAC;YACpE,CAAC;iBAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;gBACtC,MAAM,IAAI,CAAC,2BAA2B,CACpC,CAAC,EACD,SAAS,EACT,kBAAkB,EAClB,gBAAgB,CACjB,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,OAAO,0CAA0C,CAClF,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,KAAK,CAAC,gCAAgC,CAC5C,kBAA6C,EAC7C,OAAgC,EAChC,gBAA+B;QAE/B,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QACxC,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAE/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC;QAElC,gDAAgD;QAChD,IAAI,QAAgC,CAAC;QACrC,IAAI,eAAgC,CAAC;QACrC,IAAI,KAA6B,CAAC;QAClC,IAAI,UAAwD,CAAC;QAE7D,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;YAC5B,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QACtC,CAAC;aAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;YACtC,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACrC,KAAK,GAAG,eAAe,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,KAAK,EAAE,CAAC;gBACX,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;YAC7D,CAAC;YAED,UAAU,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;QACtD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CACb,gCAAgC,OAAO,0CAA0C,CAClF,CAAC;QACJ,CAAC;QAED,qGAAqG;QACrG,MAAM,kBAAkB,GACtB,OAAO,EAAE,eAAe,IAAI,OAAO,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC;QACjE,IAAI,OAAO,KAAK,cAAc,IAAI,CAAC,kBAAkB,EAAE,CAAC;YACtD,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;QACJ,CAAC;QAED,6EAA6E;QAC7E,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,qBAAqB,CAAC;YACxD,IAAI,CAAC,GAAG,EAAE,CAAC;gBACT,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,OAAO,EAAE,CAAC;gBAC/B,MAAM,IAAI,KAAK,CACb,kDAAkD,OAAO,kBAAkB,CAAC,SAAS,GAAG,CAAC,KAAK,CAAC,IAAI,GAAG,CACvG,CAAC;YACJ,CAAC;YAED,uBAAuB;YACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;gBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACzD,CAAC;YAED,uCAAuC;YACvC,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;gBAC5B,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACd,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;gBAC7D,CAAC;gBAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;oBACnC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;gBACJ,CAAC;gBAED,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;gBACpC,IAAI,CAAC,+BAA+B,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;YACxD,CAAC;iBAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;gBACtC,IAAI,CAAC,KAAK,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;oBACvC,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;gBAC/D,CAAC;gBAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBACtC,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;gBACJ,CAAC;gBAED,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC;gBACrC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,IAAI,CAAC,EAAE,EAAE,CAAC;oBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;gBACnD,CAAC;gBACD,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;gBAEpD,0BAA0B;gBAC1B,IAAI,OAAO,KAAK,UAAU,EAAE,CAAC;oBAC3B,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;gBAC3D,CAAC;gBAED,uBAAuB;gBACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;oBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;gBACzD,CAAC;gBAED,gEAAgE;gBAChE,IAAI,gBAAgB,EAAE,CAAC;oBACrB,MAAM,YAAY,GAAG,MAAM,IAAA,kBAAO,EAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;oBAC5D,MAAM,SAAS,GAAG,MAAM,IAAA,kBAAO,EAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;oBACtD,IAAI,CAAC,+BAA+B,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;OAGG;IACK,+BAA+B,CACrC,QAAoB,EACpB,KAAiB;QAEjB,IAAI,QAAQ,CAAC,MAAM,KAAK,KAAK,CAAC,MAAM,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACnE,CAAC;QACD,6EAA6E;QAC7E,IAAI,QAAQ,GAAG,CAAC,CAAC;QACjB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACzC,QAAQ,IAAI,QAAQ,CAAC,CAAC,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;QACrC,CAAC;QACD,IAAI,QAAQ,KAAK,CAAC,EAAE,CAAC;YACnB,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAEO,0BAA0B,CAChC,KAAa,EACb,SAA2D,EAC3D,kBAAwE;QAExE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;gBACpC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;YACJ,CAAC;YAED,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;YACpC,IAAI,CAAC,+BAA+B,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QACxD,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,2BAA2B,CACvC,KAAa,EACb,SAA2D,EAC3D,kBAAwE,EACxE,gBAA+B;QAE/B,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;QAC3C,MAAM,KAAK,GAAG,eAAe,CAAC,cAAc,CAAC;QAC7C,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;QAC7D,CAAC;QAED,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;QAE1D,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;gBACvC,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;YACJ,CAAC;YAED,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC;YACrC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YACD,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;YAEpD,0BAA0B;YAC1B,IAAI,OAAO,KAAK,UAAU,EAAE,CAAC;gBAC3B,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,uBAAuB;YACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;gBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACzD,CAAC;YAED,gEAAgE;YAChE,IAAI,gBAAgB,EAAE,CAAC;gBACrB,MAAM,YAAY,GAAG,MAAM,IAAA,kBAAO,EAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;gBAC5D,MAAM,SAAS,GAAG,MAAM,IAAA,kBAAO,EAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;gBACtD,IAAI,CAAC,+BAA+B,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;CACF;AAtuBD,0CAsuBC"}
|
|
314
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"quorumClient.js","sourceRoot":"","sources":["../../../src/kms/quorumClient.ts"],"names":[],"mappings":";;;AAKA,4CAKsB;AAMtB,+DAGqC;AAUrC,4CAA6C;AAG7C,0CAA+C;AAC/C,2CAA2D;AAC3D,iEAGgC;AAEhC,yEAGoC;AACpC,iEAA8D;AAO9D;;;GAGG;AACH,SAAS,sBAAsB,CAAC,SAAiB,EAAE,WAAmB;IACpE,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,IAAI,SAAS,GAAG,QAAQ,EAAE,CAAC;QACzB,MAAM,IAAI,KAAK,CACb,cAAc,SAAS,kCAAkC,QAAQ,QAAQ,WAAW,yCAAyC,CAC9H,CAAC;IACJ,CAAC;AACH,CAAC;AAED,MAAa,eAAe;IACT,IAAI,CAAQ;IACZ,SAAS,CAAS;IAQnC,iBAAiB;IACjB,YACE,kBAAoE,EACpE,SAAiB;QAEjB,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CACb,mCAAmC,kBAAkB,CAAC,MAAM,EAAE,CAC/D,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAE7D,2FAA2F;QAC3F,IACE,kBAAkB,CAAC,MAAM,GAAG,CAAC;YAC7B,iBAAiB,IAAI,kBAAkB,CAAC,CAAC,CAAC,EAC1C,CAAC;YACD,0BAA0B;YAC1B,MAAM,UAAU,GAAG,kBAAiC,CAAC;YACrD,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;gBACtC,MAAM;gBACN,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAC,CAAC;QACN,CAAC;aAAM,CAAC;YACN,iDAAiD;YACjD,MAAM,SAAS,GAAG,kBAGf,CAAC;YACJ,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrC,OAAO;oBACL,MAAM,EAAE,IAAA,wBAAY,EAAC,QAAQ,CAAC,GAAG,EAAE,QAAQ,CAAC,MAAM,CAAC;oBACnD,MAAM,EAAE,QAAQ,CAAC,MAAM;iBACxB,CAAC;YACJ,CAAC,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,QAAQ,CACb,IAAc,EACd,OAAkB,EAClB,SAAiB;QAEjB,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,yBAAyB,OAAO,CAAC,MAAM,mCAAmC,IAAI,CAAC,MAAM,GAAG,CACzF,CAAC;QACJ,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CACb,mCAAmC,IAAI,CAAC,MAAM,mBAAmB,CAClE,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACxC,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,eAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,cAAc,CACnB,UAAuB,EACvB,SAAiB;QAEjB,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CACb,mCAAmC,UAAU,CAAC,MAAM,0BAA0B,CAC/E,CAAC;QACJ,CAAC;QAED,OAAO,IAAI,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B,EAC/B,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,+EAA+E;QAC/E,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,IAAA,uDAAgC,EACpC,gBAGE,EACF,IAAI,CAAC,SAAS,EACd,gBAAgB,CACjB,CAAC;QAEJ,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B,EAC/B,eAAyB,EACzB,MAAmB;QAKnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,qDAAqD;QACrD,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,IAAA,uDAAgC,EACpC,gBAGE,EACF,IAAI,CAAC,SAAS,EACd,OAAO,EACP,gBAAgB,CACjB,CAAC;QAEJ,OAAO,IAAI,CAAC,iCAAiC,CAC3C,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,aAAsC,EACtC,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAClD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,iFAAiF;QACjF,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,IAAA,uDAAgC,EACpC,gBAGE,EACF,IAAI,CAAC,SAAS,CACf,CAAC;QAEJ,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,gCAAgC,CAC5C,SAA2C,EAC3C,aAAsC;QAEtC,iEAAiE;QACjE,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;oBACjD,OAAO,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,EAAE,aAAa,CAAC,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;YAC1C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,cAAc,KAAK,YAAY,KAAK,EAAE,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,IAAA,2CAAoB,EAG9B,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAC9B,UAAwB,EACxB,OAAkB;QAElB,MAAM,qBAAqB,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;YAChE,SAAS;YACT,MAAM,EAAE,OAAO,CAAC,GAAG,CAAC;SACrB,CAAC,CAAC,CAAC;QAEJ,+EAA+E;QAC/E,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC;YAChC,OAAO,CAAC,CAAC;QACX,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,OAAO,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACK,yBAAyB,CAC/B,qBAAiD,EACjD,qBAAmC;QAEnC,IACE,CAAC,qBAAqB,CAAC,KAAK;YAC5B,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAChD,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,cAAc,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAC/D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAmB,CAAC;QACzD,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,IAAA,yBAAa,EAAC,cAAc,CAAC,CAAC;QAClD,MAAM,SAAS,GAAG,IAAA,iCAAiB,EACjC,iCAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ,CAAC;QAEF,OAAO;YACL,MAAM;YACN,SAAS;YACT,qBAAqB;SACuC,CAAC;IACjE,CAAC;IAEO,KAAK,CAAC,2BAA2B,CACvC,SAA2D,EAC3D,kBAAwE,EACxE,OAAkB,EAClB,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,CAAC;QACjE,MAAM,OAAO,GAGP,EAAE,CAAC;QAET,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,gBAAgB,EAAE,CAAC,EAAE,EAAE,CAAC;YAC1C,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YACnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,gDAAgD;YAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC,GAAG,CACvC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,SAAS,CACnD,CAAC;YACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;YAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACtC,+DAA+D;gBAC/D,6FAA6F;gBAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;oBAC9B,MAAM,IAAA,+DAAoC,EACxC,MAAM,CAAC,MAAM,EACb,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EACxB,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;gBACJ,CAAC;gBACD,OAAO,CAAC,IAAI,CACV,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAC9D,CAAC;YACJ,CAAC;iBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAChD,+DAA+D;gBAC/D,MAAM,mBAAmB,GAAiB,EAAE,CAAC;gBAC7C,MAAM,yBAAyB,GAAiB,EAAE,CAAC;gBACnD,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;oBACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;oBACtD,IAAI,QAAQ,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;wBACtC,mBAAmB,CAAC,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;wBAC5D,yBAAyB,CAAC,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;oBAChE,CAAC;yBAAM,CAAC;wBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,QAAQ,EAAE,IAAI,GAAG,CACrE,CAAC;oBACJ,CAAC;gBACH,CAAC;gBAED,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;gBAEF,MAAM,iBAAiB,GAAG,IAAI,CAAC,wBAAwB,CACrD,yBAAyB,EACzB,OAAO,CACR,CAAC;gBAEF,6FAA6F;gBAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;oBAC9B,MAAM,IAAA,kEAAuC,EAC3C,MAAM,CAAC,MAAM,EACb,iBAAiB,EACjB,8BAA8B,EAC9B,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;gBACJ,CAAC;gBAED,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;gBACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBAC1D,OAAO,CAAC,IAAI,CAAC;oBACX,MAAM,EAAE,MAAM,CAAC,MAAmB;oBAClC,kBAAkB,EAAE;wBAClB,UAAU,EAAE;4BACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;4BACrB,MAAM,EAAE,iCAAiB,CAAC,KAAK,EAAE,0BAA0B;4BAC3D,IAAI,EAAE,UAA8B;yBACrC;qBACqD;oBACxD,mBAAmB,EAAE,8BAA8B;oBACnD,qBAAqB;iBAItB,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,KAAK,CAAC,iCAAiC,CAC7C,SAAkC,EAClC,kBAA6C,EAC7C,OAAkB,EAClB,eAAyB,EACzB,MAAmB;QAKnB,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,gDAAgD;QAChD,mGAAmG;QACnG,MAAM,UAAU,GAAiB,EAAE,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;YACtC,MAAM,GAAG,GAAG,IAAI,CAAC,qBAAqB,CAAC;YACvC,IAAI,CAAC,GAAG;gBACN,MAAM,IAAI,KAAK,CAAC,oDAAoD,CAAC,CAAC;YACxE,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;QACjC,CAAC;QACD,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;QAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,+DAA+D;YAC/D,6FAA6F;YAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;gBAC9B,MAAM,IAAA,+DAAoC,EACxC,MAAM,CAAC,MAAM,EACb,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EACxB,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;YACJ,CAAC;YACD,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;YACzC,oEAAoE;YACpE,sEAAsE;YAEtE,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;YAE1D,+DAA+D;YAC/D,MAAM,mBAAmB,GAAiB,EAAE,CAAC;YAC7C,MAAM,yBAAyB,GAAiB,EAAE,CAAC;YACnD,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;gBACtC,IAAI,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBAC9D,MAAM,KAAK,GAAG,IAAI,CAAC,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC;oBACrD,mBAAmB,CAAC,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;oBACnD,yBAAyB,CAAC,IAAI,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;gBACvD,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,GAAG,CAC7F,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;YAEF,MAAM,iBAAiB,GAAG,IAAI,CAAC,wBAAwB,CACrD,yBAAyB,EACzB,OAAO,CACR,CAAC;YAEF,6FAA6F;YAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;gBAC9B,MAAM,IAAA,kEAAuC,EAC3C,MAAM,CAAC,MAAM,EACb,iBAAiB,EACjB,8BAA8B,EAC9B,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;YACJ,CAAC;YAED,OAAO;gBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;gBAClC,kBAAkB,EAAE;oBAClB,UAAU,EAAE;wBACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;wBACrB,MAAM,EAAE,iCAAiB,CAAC,KAAK,EAAE,0BAA0B;wBAC3D,IAAI,EAAE,UAA8B;qBACrC;iBACqD;gBACxD,mBAAmB,EAAE,8BAA8B;gBACnD,qBAAqB;aACgD,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;IACJ,CAAC;CACF;AA9hBD,0CA8hBC"}
|