@inco/js 0.9.0-devnet-test-10 → 0.10.0-devnet-2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. package/README.md +503 -47
  2. package/dist/cjs/advancedacl/session-key.d.ts +5 -5
  3. package/dist/cjs/advancedacl/session-key.js +33 -9
  4. package/dist/cjs/attestedcompute/attested-compute.d.ts +1 -2
  5. package/dist/cjs/attestedcompute/attested-compute.js +15 -7
  6. package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +5 -43
  7. package/dist/cjs/attesteddecrypt/attested-decrypt.js +33 -96
  8. package/dist/cjs/attestedreveal/attested-reveal.d.ts +21 -0
  9. package/dist/cjs/attestedreveal/attested-reveal.js +31 -0
  10. package/dist/cjs/attestedreveal/index.d.ts +2 -0
  11. package/dist/cjs/attestedreveal/index.js +21 -0
  12. package/dist/cjs/attestedreveal/types.d.ts +4 -0
  13. package/dist/cjs/attestedreveal/types.js +13 -0
  14. package/dist/cjs/binary.d.ts +82 -0
  15. package/dist/cjs/binary.js +87 -5
  16. package/dist/cjs/chain.d.ts +29 -4
  17. package/dist/cjs/chain.js +34 -6
  18. package/dist/cjs/eip712/eip712.d.ts +18 -0
  19. package/dist/cjs/eip712/eip712.js +51 -0
  20. package/dist/cjs/eip712/index.d.ts +1 -0
  21. package/dist/cjs/eip712/index.js +8 -0
  22. package/dist/cjs/elistattesteddecrypt/elist-attested-decrypt.d.ts +49 -0
  23. package/dist/cjs/elistattesteddecrypt/elist-attested-decrypt.js +94 -0
  24. package/dist/cjs/elistattesteddecrypt/index.d.ts +2 -0
  25. package/dist/cjs/elistattesteddecrypt/index.js +22 -0
  26. package/dist/cjs/elistattesteddecrypt/types.d.ts +31 -0
  27. package/dist/cjs/elistattesteddecrypt/types.js +16 -0
  28. package/dist/cjs/encryption/encryption.d.ts +115 -0
  29. package/dist/cjs/encryption/encryption.js +98 -7
  30. package/dist/cjs/encryption/index.d.ts +1 -1
  31. package/dist/cjs/encryption/index.js +17 -16
  32. package/dist/cjs/generated/abis/lightning.d.ts +1119 -107
  33. package/dist/cjs/generated/abis/lightning.js +762 -52
  34. package/dist/cjs/generated/abis/test-elist.d.ts +20 -2
  35. package/dist/cjs/generated/abis/test-elist.js +16 -3
  36. package/dist/cjs/generated/abis/verifier.d.ts +118 -15
  37. package/dist/cjs/generated/abis/verifier.js +71 -19
  38. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +23 -37
  39. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +36 -41
  40. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
  41. package/dist/cjs/generated/es/inco/helioswrapper/v1/helioswrapper_pb.js +1 -1
  42. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +16 -0
  43. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +3 -3
  44. package/dist/cjs/generated/es/inco/kms/lite/v1/types_pb.js +1 -1
  45. package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +7 -0
  46. package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.js +3 -3
  47. package/dist/cjs/generated/lightning.d.ts +150 -0
  48. package/dist/cjs/generated/lightning.js +157 -1
  49. package/dist/cjs/generated/local-node.d.ts +9 -9
  50. package/dist/cjs/generated/local-node.js +37 -10
  51. package/dist/cjs/handle.d.ts +72 -0
  52. package/dist/cjs/handle.js +113 -9
  53. package/dist/cjs/index.d.ts +1 -1
  54. package/dist/cjs/index.js +11 -2
  55. package/dist/cjs/kms/client.d.ts +1 -1
  56. package/dist/cjs/kms/client.js +4 -3
  57. package/dist/cjs/kms/quorumClient.d.ts +18 -12
  58. package/dist/cjs/kms/quorumClient.js +212 -231
  59. package/dist/cjs/kms/quorumConsistency.d.ts +82 -0
  60. package/dist/cjs/kms/quorumConsistency.js +269 -0
  61. package/dist/cjs/kms/signatureVerification.d.ts +35 -0
  62. package/dist/cjs/kms/signatureVerification.js +88 -0
  63. package/dist/cjs/kms/thresholdPromises.d.ts +4 -3
  64. package/dist/cjs/kms/thresholdPromises.js +25 -15
  65. package/dist/cjs/lite/attested-compute.d.ts +2 -2
  66. package/dist/cjs/lite/attested-compute.js +2 -3
  67. package/dist/cjs/lite/attested-decrypt.d.ts +2 -2
  68. package/dist/cjs/lite/attested-decrypt.js +2 -3
  69. package/dist/cjs/lite/hadu.d.ts +1 -1
  70. package/dist/cjs/lite/hadu.js +3 -3
  71. package/dist/cjs/lite/index.d.ts +6 -2
  72. package/dist/cjs/lite/index.js +8 -14
  73. package/dist/cjs/lite/lightning.d.ts +96 -47
  74. package/dist/cjs/lite/lightning.js +221 -267
  75. package/dist/cjs/lite/types.d.ts +47 -0
  76. package/dist/cjs/lite/types.js +3 -0
  77. package/dist/cjs/lite/xwing.d.ts +33 -2
  78. package/dist/cjs/lite/xwing.js +62 -7
  79. package/dist/cjs/local/local-node.d.ts +18 -0
  80. package/dist/cjs/local/local-node.js +18 -3
  81. package/dist/cjs/reencryption/eip712.d.ts +27 -0
  82. package/dist/cjs/reencryption/eip712.js +20 -7
  83. package/dist/cjs/reencryption/types.d.ts +24 -0
  84. package/dist/cjs/retry.d.ts +14 -0
  85. package/dist/cjs/retry.js +58 -2
  86. package/dist/cjs/test/mocks.d.ts +6 -1
  87. package/dist/cjs/test/mocks.js +31 -6
  88. package/dist/cjs/viem.d.ts +361 -1
  89. package/dist/cjs/viem.js +14 -1
  90. package/dist/esm/advancedacl/session-key.d.ts +5 -5
  91. package/dist/esm/advancedacl/session-key.js +33 -9
  92. package/dist/esm/attestedcompute/attested-compute.d.ts +1 -2
  93. package/dist/esm/attestedcompute/attested-compute.js +13 -5
  94. package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +5 -43
  95. package/dist/esm/attesteddecrypt/attested-decrypt.js +34 -96
  96. package/dist/esm/attestedreveal/attested-reveal.d.ts +21 -0
  97. package/dist/esm/attestedreveal/attested-reveal.js +28 -0
  98. package/dist/esm/attestedreveal/index.d.ts +2 -0
  99. package/dist/esm/attestedreveal/index.js +3 -0
  100. package/dist/esm/attestedreveal/types.d.ts +4 -0
  101. package/dist/esm/attestedreveal/types.js +9 -0
  102. package/dist/esm/binary.d.ts +82 -0
  103. package/dist/esm/binary.js +87 -5
  104. package/dist/esm/chain.d.ts +29 -4
  105. package/dist/esm/chain.js +33 -5
  106. package/dist/esm/eip712/eip712.d.ts +18 -0
  107. package/dist/esm/eip712/eip712.js +46 -0
  108. package/dist/esm/eip712/index.d.ts +1 -0
  109. package/dist/esm/eip712/index.js +2 -0
  110. package/dist/esm/elistattesteddecrypt/elist-attested-decrypt.d.ts +49 -0
  111. package/dist/esm/elistattesteddecrypt/elist-attested-decrypt.js +89 -0
  112. package/dist/esm/elistattesteddecrypt/index.d.ts +2 -0
  113. package/dist/esm/elistattesteddecrypt/index.js +3 -0
  114. package/dist/esm/elistattesteddecrypt/types.d.ts +31 -0
  115. package/dist/esm/elistattesteddecrypt/types.js +12 -0
  116. package/dist/esm/encryption/encryption.d.ts +115 -0
  117. package/dist/esm/encryption/encryption.js +98 -7
  118. package/dist/esm/encryption/index.d.ts +1 -1
  119. package/dist/esm/encryption/index.js +2 -2
  120. package/dist/esm/generated/abis/lightning.d.ts +1119 -107
  121. package/dist/esm/generated/abis/lightning.js +761 -51
  122. package/dist/esm/generated/abis/test-elist.d.ts +20 -2
  123. package/dist/esm/generated/abis/test-elist.js +16 -3
  124. package/dist/esm/generated/abis/verifier.d.ts +118 -15
  125. package/dist/esm/generated/abis/verifier.js +71 -19
  126. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +23 -37
  127. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +35 -40
  128. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
  129. package/dist/esm/generated/es/inco/helioswrapper/v1/helioswrapper_pb.js +1 -1
  130. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +16 -0
  131. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +3 -3
  132. package/dist/esm/generated/es/inco/kms/lite/v1/types_pb.js +1 -1
  133. package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +7 -0
  134. package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.js +3 -3
  135. package/dist/esm/generated/lightning.d.ts +150 -0
  136. package/dist/esm/generated/lightning.js +157 -1
  137. package/dist/esm/generated/local-node.d.ts +9 -9
  138. package/dist/esm/generated/local-node.js +37 -10
  139. package/dist/esm/handle.d.ts +72 -0
  140. package/dist/esm/handle.js +110 -8
  141. package/dist/esm/index.d.ts +1 -1
  142. package/dist/esm/index.js +2 -2
  143. package/dist/esm/kms/client.d.ts +1 -1
  144. package/dist/esm/kms/client.js +3 -2
  145. package/dist/esm/kms/quorumClient.d.ts +18 -12
  146. package/dist/esm/kms/quorumClient.js +213 -232
  147. package/dist/esm/kms/quorumConsistency.d.ts +82 -0
  148. package/dist/esm/kms/quorumConsistency.js +260 -0
  149. package/dist/esm/kms/signatureVerification.d.ts +35 -0
  150. package/dist/esm/kms/signatureVerification.js +84 -0
  151. package/dist/esm/kms/thresholdPromises.d.ts +4 -3
  152. package/dist/esm/kms/thresholdPromises.js +25 -15
  153. package/dist/esm/lite/attested-compute.d.ts +2 -2
  154. package/dist/esm/lite/attested-compute.js +3 -3
  155. package/dist/esm/lite/attested-decrypt.d.ts +2 -2
  156. package/dist/esm/lite/attested-decrypt.js +3 -3
  157. package/dist/esm/lite/hadu.d.ts +1 -1
  158. package/dist/esm/lite/hadu.js +2 -2
  159. package/dist/esm/lite/index.d.ts +6 -2
  160. package/dist/esm/lite/index.js +5 -3
  161. package/dist/esm/lite/lightning.d.ts +96 -47
  162. package/dist/esm/lite/lightning.js +217 -263
  163. package/dist/esm/lite/types.d.ts +47 -0
  164. package/dist/esm/lite/types.js +2 -0
  165. package/dist/esm/lite/xwing.d.ts +33 -2
  166. package/dist/esm/lite/xwing.js +59 -7
  167. package/dist/esm/local/local-node.d.ts +18 -0
  168. package/dist/esm/local/local-node.js +18 -3
  169. package/dist/esm/reencryption/eip712.d.ts +27 -0
  170. package/dist/esm/reencryption/eip712.js +20 -7
  171. package/dist/esm/reencryption/types.d.ts +24 -0
  172. package/dist/esm/retry.d.ts +14 -0
  173. package/dist/esm/retry.js +56 -2
  174. package/dist/esm/test/mocks.d.ts +6 -1
  175. package/dist/esm/test/mocks.js +31 -8
  176. package/dist/esm/viem.d.ts +361 -1
  177. package/dist/esm/viem.js +15 -2
  178. package/dist/types/advancedacl/session-key.d.ts +5 -5
  179. package/dist/types/attestedcompute/attested-compute.d.ts +1 -2
  180. package/dist/types/attesteddecrypt/attested-decrypt.d.ts +5 -43
  181. package/dist/types/attestedreveal/attested-reveal.d.ts +21 -0
  182. package/dist/types/attestedreveal/index.d.ts +2 -0
  183. package/dist/types/attestedreveal/types.d.ts +4 -0
  184. package/dist/types/binary.d.ts +82 -0
  185. package/dist/types/chain.d.ts +29 -4
  186. package/dist/types/eip712/eip712.d.ts +18 -0
  187. package/dist/types/eip712/index.d.ts +1 -0
  188. package/dist/types/elistattesteddecrypt/elist-attested-decrypt.d.ts +49 -0
  189. package/dist/types/elistattesteddecrypt/index.d.ts +2 -0
  190. package/dist/types/elistattesteddecrypt/types.d.ts +31 -0
  191. package/dist/types/encryption/encryption.d.ts +115 -0
  192. package/dist/types/encryption/index.d.ts +1 -1
  193. package/dist/types/generated/abis/lightning.d.ts +1119 -107
  194. package/dist/types/generated/abis/test-elist.d.ts +20 -2
  195. package/dist/types/generated/abis/verifier.d.ts +118 -15
  196. package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +23 -37
  197. package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +16 -0
  198. package/dist/types/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +7 -0
  199. package/dist/types/generated/lightning.d.ts +150 -0
  200. package/dist/types/generated/local-node.d.ts +9 -9
  201. package/dist/types/handle.d.ts +72 -0
  202. package/dist/types/index.d.ts +1 -1
  203. package/dist/types/kms/client.d.ts +1 -1
  204. package/dist/types/kms/quorumClient.d.ts +18 -12
  205. package/dist/types/kms/quorumConsistency.d.ts +82 -0
  206. package/dist/types/kms/signatureVerification.d.ts +35 -0
  207. package/dist/types/kms/thresholdPromises.d.ts +4 -3
  208. package/dist/types/lite/attested-compute.d.ts +2 -2
  209. package/dist/types/lite/attested-decrypt.d.ts +2 -2
  210. package/dist/types/lite/hadu.d.ts +1 -1
  211. package/dist/types/lite/index.d.ts +6 -2
  212. package/dist/types/lite/lightning.d.ts +96 -47
  213. package/dist/types/lite/types.d.ts +47 -0
  214. package/dist/types/lite/xwing.d.ts +33 -2
  215. package/dist/types/local/local-node.d.ts +18 -0
  216. package/dist/types/reencryption/eip712.d.ts +27 -0
  217. package/dist/types/reencryption/types.d.ts +24 -0
  218. package/dist/types/retry.d.ts +14 -0
  219. package/dist/types/test/mocks.d.ts +6 -1
  220. package/dist/types/viem.d.ts +361 -1
  221. package/package.json +19 -21
  222. package/dist/cjs/generated/abis/lightning-preview.d.ts +0 -1385
  223. package/dist/cjs/generated/abis/lightning-preview.js +0 -857
  224. package/dist/esm/generated/abis/lightning-preview.d.ts +0 -1385
  225. package/dist/esm/generated/abis/lightning-preview.js +0 -854
  226. package/dist/types/generated/abis/lightning-preview.d.ts +0 -1385
@@ -1,13 +1,27 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.KmsQuorumClient = void 0;
4
+ const viem_1 = require("viem");
4
5
  const binary_js_1 = require("../binary.js");
6
+ const types_js_1 = require("../elistattesteddecrypt/types.js");
5
7
  const encryption_js_1 = require("../encryption/encryption.js");
6
8
  const handle_js_1 = require("../handle.js");
7
9
  const xwing_js_1 = require("../lite/xwing.js");
8
10
  const retry_js_1 = require("../retry.js");
9
11
  const client_js_1 = require("./client.js");
12
+ const quorumConsistency_js_1 = require("./quorumConsistency.js");
13
+ const signatureVerification_js_1 = require("./signatureVerification.js");
10
14
  const thresholdPromises_js_1 = require("./thresholdPromises.js");
15
+ /**
16
+ * Checks if the threshold is at least a majority of signers and throws an error if not.
17
+ * This is important to ensure that the quorum client provides the expected security guarantees.
18
+ */
19
+ function checkMajorityThreshold(threshold, signerCount) {
20
+ const majority = Math.floor(signerCount / 2) + 1;
21
+ if (threshold < majority) {
22
+ throw new Error(`Threshold (${threshold}) must be at least a majority (${majority}) of ${signerCount} signers to ensure security guarantees.`);
23
+ }
24
+ }
11
25
  class KmsQuorumClient {
12
26
  kmss;
13
27
  threshold;
@@ -19,6 +33,7 @@ class KmsQuorumClient {
19
33
  if (threshold < 1 || threshold > attestersOrClients.length) {
20
34
  throw new Error(`Threshold must be between 1 and ${attestersOrClients.length}`);
21
35
  }
36
+ checkMajorityThreshold(threshold, attestersOrClients.length);
22
37
  // Check if first element is a KmsClient (has attestedDecrypt method) or an attester object
23
38
  if (attestersOrClients.length > 0 &&
24
39
  'attestedDecrypt' in attestersOrClients[0]) {
@@ -82,38 +97,47 @@ class KmsQuorumClient {
82
97
  }
83
98
  return new KmsQuorumClient(kmsClients, threshold);
84
99
  }
85
- async attestedDecrypt(request, backoffConfig, reencryptKeypair) {
100
+ async attestedDecrypt(request, backoffConfig, reencryptKeypair, executorAddress, client) {
86
101
  const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
87
102
  return await kms.client.attestedDecrypt(request);
88
103
  }, backoffConfig);
89
- // Extract responses and signers
90
- const thresholdResponses = thresholdResults.map((r) => r.response);
91
- const signers = thresholdResults.map((r) => r.signer);
92
104
  // Verify that responses are consistent across quorum (plaintext or ciphertext)
93
- const reference = await this.verifyResponseConsistency(thresholdResponses, reencryptKeypair);
94
- return this.buildAggregatedAttestations(reference, thresholdResponses, signers);
105
+ const { reference, winningResults } = await (0, quorumConsistency_js_1.verifyDecryptResponseConsistency)(thresholdResults, this.threshold, reencryptKeypair);
106
+ return this.buildAggregatedAttestations(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
95
107
  }
96
- async attestedCompute(request, backoffConfig, reencryptKeypair) {
108
+ async attestedCompute(request, backoffConfig, reencryptKeypair, executorAddress, client) {
97
109
  const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
98
110
  return await kms.client.attestedCompute(request);
99
111
  }, backoffConfig);
100
- // Extract responses and signers
101
- const thresholdResponses = thresholdResults.map((r) => r.response);
102
- const signers = thresholdResults.map((r) => r.signer);
103
112
  // Verify that responses are consistent across quorum
104
- const reference = await this.verifyComputeResponseConsistency(thresholdResponses, request, reencryptKeypair);
105
- return this.buildAggregatedComputeAttestation(reference, thresholdResponses, signers);
113
+ const { reference, winningResults } = await (0, quorumConsistency_js_1.verifyComputeResponseConsistency)(thresholdResults, this.threshold, request, reencryptKeypair);
114
+ return this.buildAggregatedComputeAttestation(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
106
115
  }
107
- async attestedReveal(request, backoffConfig) {
116
+ async attestedReveal(request, backoffConfig, executorAddress, client) {
108
117
  const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
109
118
  return await kms.client.attestedReveal(request);
110
119
  }, backoffConfig);
111
- // Extract responses and signers
112
- const thresholdResponses = thresholdResults.map((r) => r.response);
113
- const signers = thresholdResults.map((r) => r.signer);
114
120
  // Verify that responses are consistent across quorum (plaintext only for reveal)
115
- const reference = await this.verifyResponseConsistency(thresholdResponses);
116
- return this.buildAggregatedAttestations(reference, thresholdResponses, signers);
121
+ const { reference, winningResults } = await (0, quorumConsistency_js_1.verifyDecryptResponseConsistency)(thresholdResults, this.threshold);
122
+ return this.buildAggregatedAttestations(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
123
+ }
124
+ async eListAttestedDecrypt(request, backoffConfig, reencryptKeypair, executorAddress, client) {
125
+ const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
126
+ return await kms.client.eListAttestedDecrypt(request);
127
+ }, backoffConfig);
128
+ const { reference, winningResults } = await (0, quorumConsistency_js_1.verifyEListResponseConsistency)(thresholdResults, this.threshold, reencryptKeypair);
129
+ const elistHandle = request.elistHandleWithProof?.handle;
130
+ if (!elistHandle) {
131
+ throw new types_js_1.EListAttestedDecryptError('Missing elistHandleWithProof.handle in request');
132
+ }
133
+ return this.buildAggregatedEListAttestation(elistHandle, reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client, reencryptKeypair);
134
+ }
135
+ async eListAttestedReveal(request, backoffConfig, executorAddress, client) {
136
+ const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
137
+ return await kms.client.eListAttestedReveal(request);
138
+ }, backoffConfig);
139
+ const { reference, winningResults } = await (0, quorumConsistency_js_1.verifyEListResponseConsistency)(thresholdResults, this.threshold);
140
+ return this.buildAggregatedEListAttestation(request.handle, reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
117
141
  }
118
142
  /**
119
143
  * Generic method to execute a KMS operation across all clients with retry and threshold logic.
@@ -176,9 +200,10 @@ class KmsQuorumClient {
176
200
  covalidatorSignatures,
177
201
  };
178
202
  }
179
- buildAggregatedAttestations(reference, thresholdResponses, signers) {
203
+ async buildAggregatedAttestations(reference, thresholdResponses, signers, executorAddress, client) {
180
204
  const attestationCount = reference.decryptionAttestations.length;
181
- return new Array(attestationCount).fill(undefined).map((_, i) => {
205
+ const results = [];
206
+ for (let i = 0; i < attestationCount; i++) {
182
207
  const refAtt = reference.decryptionAttestations[i];
183
208
  if (!refAtt.value) {
184
209
  throw new Error('No value in attestation');
@@ -187,42 +212,56 @@ class KmsQuorumClient {
187
212
  const signatures = thresholdResponses.map((resp) => resp.decryptionAttestations[i].signature);
188
213
  const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
189
214
  if (refAtt.value.case === 'plaintext') {
190
- return this.buildPlaintextAttestation(refAtt, covalidatorSignatures);
215
+ // Verify covalidator signatures over the plaintext attestation
216
+ // executorAddress and client are only undefined when using a non-real client (e.g. in tests)
217
+ if (executorAddress && client) {
218
+ await (0, signatureVerification_js_1.verifyPlaintextAttestationSignatures)(refAtt.handle, refAtt.value.value.value, covalidatorSignatures, executorAddress, client);
219
+ }
220
+ results.push(this.buildPlaintextAttestation(refAtt, covalidatorSignatures));
191
221
  }
192
222
  else if (refAtt.value.case === 'reencryption') {
193
- // Collect encrypted signatures and sort by signer address
194
- const encryptedSignatures = thresholdResponses.map((resp) => {
195
- if (resp.decryptionAttestations[i].value.case === 'reencryption') {
196
- const reencryption = resp.decryptionAttestations[i].value.value;
197
- return reencryption.encryptedSignature;
223
+ // Collect per-covalidator encrypted signatures and ciphertexts
224
+ const encryptedSignatures = [];
225
+ const perCovalidatorCiphertexts = [];
226
+ for (const resp of thresholdResponses) {
227
+ const attValue = resp.decryptionAttestations[i].value;
228
+ if (attValue?.case === 'reencryption') {
229
+ encryptedSignatures.push(attValue.value.encryptedSignature);
230
+ perCovalidatorCiphertexts.push(attValue.value.userCiphertext);
198
231
  }
199
232
  else {
200
- throw new Error(`Expected reencryption attestation but received '${resp.decryptionAttestations[i].value.case}'`);
233
+ throw new Error(`Expected reencryption attestation but received '${attValue?.case}'`);
201
234
  }
202
- });
235
+ }
203
236
  const encryptedCovalidatorSignatures = this.collectAndSortSignatures(encryptedSignatures, signers);
237
+ const sortedCiphertexts = this.collectAndSortSignatures(perCovalidatorCiphertexts, signers);
238
+ // executorAddress and client are only undefined when using a non-real client (e.g. in tests)
239
+ if (executorAddress && client) {
240
+ await (0, signatureVerification_js_1.verifyReencryptionAttestationSignatures)(refAtt.handle, sortedCiphertexts, encryptedCovalidatorSignatures, covalidatorSignatures, executorAddress, client);
241
+ }
204
242
  const reencryption = refAtt.value.value;
205
243
  const ct = reencryption.userCiphertext;
206
- const fheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
207
- return {
244
+ const handleType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
245
+ results.push({
208
246
  handle: refAtt.handle,
209
247
  encryptedPlaintext: {
210
248
  ciphertext: {
211
249
  value: (0, binary_js_1.bytesToHex)(ct),
212
- scheme: 2, // EncryptionScheme: XWING
213
- type: fheType,
250
+ scheme: encryption_js_1.encryptionSchemes.xwing, // EncryptionScheme: XWING
251
+ type: handleType,
214
252
  },
215
253
  },
216
254
  encryptedSignatures: encryptedCovalidatorSignatures,
217
255
  covalidatorSignatures,
218
- };
256
+ });
219
257
  }
220
258
  else {
221
259
  throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext' or 'reencryption'`);
222
260
  }
223
- });
261
+ }
262
+ return results;
224
263
  }
225
- buildAggregatedComputeAttestation(reference, thresholdResponses, signers) {
264
+ async buildAggregatedComputeAttestation(reference, thresholdResponses, signers, executorAddress, client) {
226
265
  const refAtt = reference.decryptionAttestation;
227
266
  if (!refAtt) {
228
267
  throw new Error('No decryption attestation in reference response');
@@ -231,43 +270,58 @@ class KmsQuorumClient {
231
270
  throw new Error('No value in reference attestation');
232
271
  }
233
272
  // Collect signatures and sort by signer address
234
- // We know all responses have decryption attestations from verifyComputeResponseConsistency
273
+ // All responses are guaranteed to have decryption attestations by verifyComputeResponseConsistency
235
274
  const signatures = [];
236
275
  for (const resp of thresholdResponses) {
237
276
  const att = resp.decryptionAttestation;
238
- if (att) {
239
- signatures.push(att.signature);
240
- }
277
+ if (!att)
278
+ throw new Error('Missing decryption attestation in winning response');
279
+ signatures.push(att.signature);
241
280
  }
242
281
  const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
243
282
  if (refAtt.value.case === 'plaintext') {
283
+ // Verify covalidator signatures over the plaintext attestation
284
+ // executorAddress and client are only undefined when using a non-real client (e.g. in tests)
285
+ if (executorAddress && client) {
286
+ await (0, signatureVerification_js_1.verifyPlaintextAttestationSignatures)(refAtt.handle, refAtt.value.value.value, covalidatorSignatures, executorAddress, client);
287
+ }
244
288
  return this.buildPlaintextAttestation(refAtt, covalidatorSignatures);
245
289
  }
246
290
  if (refAtt.value.case === 'reencryption') {
291
+ // Reencryption envelope signatures are verified per-covalidator via
292
+ // isValidReencryptionAttestation on-chain (each has a unique digest).
247
293
  const reencryption = refAtt.value.value;
248
294
  const ct = reencryption.userCiphertext;
249
295
  if (!ct) {
250
296
  throw new Error('No ciphertext in reencryption');
251
297
  }
252
- const fheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
253
- // Collect encrypted signatures and sort by signer address
254
- const encryptedSignatures = thresholdResponses.map((resp) => {
298
+ const handleType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
299
+ // Collect per-covalidator encrypted signatures and ciphertexts
300
+ const encryptedSignatures = [];
301
+ const perCovalidatorCiphertexts = [];
302
+ for (const resp of thresholdResponses) {
255
303
  if (resp.decryptionAttestation?.value.case === 'reencryption') {
256
- const reencryption = resp.decryptionAttestation?.value.value;
257
- return reencryption.encryptedSignature;
304
+ const reenc = resp.decryptionAttestation.value.value;
305
+ encryptedSignatures.push(reenc.encryptedSignature);
306
+ perCovalidatorCiphertexts.push(reenc.userCiphertext);
258
307
  }
259
308
  else {
260
309
  throw new Error(`Expected reencryption attestation but received '${resp.decryptionAttestation?.value.case}'`);
261
310
  }
262
- });
311
+ }
263
312
  const encryptedCovalidatorSignatures = this.collectAndSortSignatures(encryptedSignatures, signers);
313
+ const sortedCiphertexts = this.collectAndSortSignatures(perCovalidatorCiphertexts, signers);
314
+ // executorAddress and client are only undefined when using a non-real client (e.g. in tests)
315
+ if (executorAddress && client) {
316
+ await (0, signatureVerification_js_1.verifyReencryptionAttestationSignatures)(refAtt.handle, sortedCiphertexts, encryptedCovalidatorSignatures, covalidatorSignatures, executorAddress, client);
317
+ }
264
318
  return {
265
319
  handle: refAtt.handle,
266
320
  encryptedPlaintext: {
267
321
  ciphertext: {
268
322
  value: (0, binary_js_1.bytesToHex)(ct),
269
- scheme: encryption_js_1.encryptionSchemes.xwing, // EncryptionScheme: ECIES
270
- type: fheType,
323
+ scheme: encryption_js_1.encryptionSchemes.xwing, // EncryptionScheme: XWING
324
+ type: handleType,
271
325
  },
272
326
  },
273
327
  encryptedSignatures: encryptedCovalidatorSignatures,
@@ -276,207 +330,134 @@ class KmsQuorumClient {
276
330
  }
277
331
  throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext' or 'reencryption'`);
278
332
  }
279
- async verifyResponseConsistency(thresholdResponses, reencryptKeypair) {
280
- if (thresholdResponses.length === 0) {
281
- throw new Error('No responses collected to verify');
282
- }
283
- const reference = thresholdResponses[0];
284
- for (let r = 1; r < thresholdResponses.length; r++) {
285
- if (thresholdResponses[r].decryptionAttestations.length !==
286
- reference.decryptionAttestations.length) {
287
- throw new Error('Inconsistent number of decryption attestations across KMS responses');
333
+ async buildAggregatedEListAttestation(elistHandle, reference, thresholdResponses, signers, executorAddress, client, reencryptKeypair) {
334
+ const refProofAtt = reference.commitmentProofAttestation;
335
+ if (!refProofAtt) {
336
+ throw new Error('No commitmentProofAttestation in reference response');
337
+ }
338
+ if (!refProofAtt.value) {
339
+ throw new Error('No value in commitmentProofAttestation');
340
+ }
341
+ // Collect and sort commitment proof signatures
342
+ const proofSignatures = thresholdResponses.map((resp) => resp.commitmentProofAttestation.signature);
343
+ const covalidatorSignatures = this.collectAndSortSignatures(proofSignatures, signers);
344
+ // Build commitment proof from the attestation
345
+ // The commitment proof is always a keccak256 hash (uint256), regardless of the elist handle type.
346
+ let commitmentProof;
347
+ if (refProofAtt.value.case === 'plaintext') {
348
+ const proofBytes = refProofAtt.value.value.value;
349
+ const proofHandle = refProofAtt.handle;
350
+ // Verify commitment proof signatures
351
+ if (executorAddress && client) {
352
+ await (0, signatureVerification_js_1.verifyPlaintextAttestationSignatures)(proofHandle, proofBytes, covalidatorSignatures, executorAddress, client);
288
353
  }
354
+ commitmentProof = (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.xwing, handle_js_1.handleTypes.euint256, (0, binary_js_1.bytesToBigInt)(proofBytes));
289
355
  }
290
- for (let i = 0; i < reference.decryptionAttestations.length; i++) {
291
- const refAtt = reference.decryptionAttestations[i];
292
- if (!refAtt.value) {
293
- throw new Error('No value in reference attestation');
294
- }
295
- const refCase = refAtt.value.case;
296
- // Verify that all responses have the same case (plaintext or reencryption)
297
- for (let r = 1; r < thresholdResponses.length; r++) {
298
- const att = thresholdResponses[r].decryptionAttestations[i];
299
- if (!att.value) {
300
- throw new Error('No value in attestation');
301
- }
302
- if (att.value.case !== refCase) {
303
- throw new Error(`Inconsistent attestation types: reference has '${refCase}' but response ${r} has '${att.value.case}'`);
356
+ else {
357
+ throw new Error(`Unexpected commitmentProofAttestation type: ${refProofAtt.value.case}`);
358
+ }
359
+ // Verify proof hashes: per-element and aggregate
360
+ await this.verifyElementProofHashes(reference, refProofAtt.value.value.value, reencryptKeypair);
361
+ // Build values and commitments from EListElements
362
+ const elementType = (0, handle_js_1.getEListElementType)(elistHandle);
363
+ const commitments = [];
364
+ const isReencryption = reference.values.length > 0 &&
365
+ reference.values[0].value.case === 'reencryption';
366
+ if (isReencryption) {
367
+ const values = [];
368
+ for (const elem of reference.values) {
369
+ commitments.push(elem.commitment);
370
+ if (elem.value.case !== 'reencryption') {
371
+ throw new Error(`Expected reencryption elist element but got '${elem.value.case}'`);
304
372
  }
373
+ const ct = elem.value.value.userCiphertext;
374
+ values.push({
375
+ ciphertext: {
376
+ value: (0, binary_js_1.bytesToHex)(ct),
377
+ scheme: encryption_js_1.encryptionSchemes.xwing,
378
+ type: elementType,
379
+ },
380
+ });
305
381
  }
306
- // Verify consistency based on the case
307
- if (refCase === 'plaintext') {
308
- this.verifyPlaintextConsistency(i, reference, thresholdResponses);
309
- }
310
- else if (refCase === 'reencryption') {
311
- await this.verifyCiphertextConsistency(i, reference, thresholdResponses, reencryptKeypair);
312
- }
313
- else {
314
- throw new Error(`Unexpected attestation type: ${refCase}, expected 'plaintext' or 'reencryption'`);
315
- }
316
- }
317
- return reference;
318
- }
319
- async verifyComputeResponseConsistency(thresholdResponses, request, reencryptKeypair) {
320
- if (thresholdResponses.length === 0) {
321
- throw new Error('No responses collected to verify');
322
- }
323
- const reference = thresholdResponses[0];
324
- const refAtt = reference.decryptionAttestation;
325
- if (!refAtt) {
326
- throw new Error('No decryption attestation in reference response');
327
- }
328
- if (!refAtt.value) {
329
- throw new Error('No value in reference attestation');
330
- }
331
- const refCase = refAtt.value.case;
332
- // Precompute reference values based on the case
333
- let refBytes;
334
- let refReencryption;
335
- let refCt;
336
- let refFheType;
337
- if (refCase === 'plaintext') {
338
- refBytes = refAtt.value.value.value;
339
- }
340
- else if (refCase === 'reencryption') {
341
- refReencryption = refAtt.value.value;
342
- refCt = refReencryption.userCiphertext;
343
- if (!refCt) {
344
- throw new Error('No ciphertext in reference reencryption');
345
- }
346
- refFheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
382
+ return {
383
+ handle: elistHandle,
384
+ commitmentProof,
385
+ values,
386
+ covalidatorSignatures,
387
+ commitments,
388
+ };
347
389
  }
348
390
  else {
349
- throw new Error(`Unexpected attestation type: ${refCase}, expected 'plaintext' or 'reencryption'`);
350
- }
351
- // If no reencryptPubKey is provided in the request (or it's empty), reject reencryption attestations
352
- const hasReencryptPubKey = request?.reencryptPubKey && request.reencryptPubKey.length > 0;
353
- if (refCase === 'reencryption' && !hasReencryptPubKey) {
354
- throw new Error("Unexpected attestation type: reencryption, expected 'plaintext'");
355
- }
356
- // Verify that all responses have a decryption attestation and are consistent
357
- for (let r = 1; r < thresholdResponses.length; r++) {
358
- const att = thresholdResponses[r].decryptionAttestation;
359
- if (!att) {
360
- throw new Error('No decryption attestation in response');
361
- }
362
- if (!att.value) {
363
- throw new Error('No value in attestation');
364
- }
365
- if (att.value.case !== refCase) {
366
- throw new Error(`Inconsistent attestation types: reference has '${refCase}' but response ${r} has '${att.value.case}'`);
367
- }
368
- // Verify handles match
369
- if (att.handle !== refAtt.handle) {
370
- throw new Error('Handles differ across KMS responses');
371
- }
372
- // Verify consistency based on the case
373
- if (refCase === 'plaintext') {
374
- if (!refBytes) {
375
- throw new Error('No reference plaintext bytes to compare');
376
- }
377
- if (att.value.case !== 'plaintext') {
378
- throw new Error('Expected plaintext attestation but received non-plaintext');
379
- }
380
- const bytes = att.value.value.value;
381
- this.verifyPlaintextBytesConsistency(refBytes, bytes);
382
- }
383
- else if (refCase === 'reencryption') {
384
- if (!refCt || refFheType === undefined) {
385
- throw new Error('No reference reencryption data to compare');
386
- }
387
- if (att.value.case !== 'reencryption') {
388
- throw new Error('Expected reencryption attestation but received non-reencryption');
389
- }
390
- const reencryption = att.value.value;
391
- const ct = reencryption.userCiphertext;
392
- if (!ct) {
393
- throw new Error('No ciphertext in reencryption');
394
- }
395
- const fheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(att.handle));
396
- // Verify FHE type matches
397
- if (fheType !== refFheType) {
398
- throw new Error('FHE types differ across KMS responses');
399
- }
400
- // Verify handles match
401
- if (att.handle !== refAtt.handle) {
402
- throw new Error('Handles differ across KMS responses');
403
- }
404
- // If keypair provided, decrypt and verify plaintext consistency
405
- if (reencryptKeypair) {
406
- const refPlaintext = await (0, xwing_js_1.decrypt)(reencryptKeypair, refCt);
407
- const plaintext = await (0, xwing_js_1.decrypt)(reencryptKeypair, ct);
408
- this.verifyPlaintextBytesConsistency(refPlaintext, plaintext);
391
+ const values = [];
392
+ for (const elem of reference.values) {
393
+ commitments.push(elem.commitment);
394
+ if (elem.value.case !== 'plaintext') {
395
+ throw new Error(`Expected plaintext elist element but got '${elem.value.case}'`);
409
396
  }
397
+ const plaintextBytes = elem.value.value.value;
398
+ values.push((0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.xwing, elementType, (0, binary_js_1.bytesToBigInt)(plaintextBytes)));
410
399
  }
400
+ return {
401
+ handle: elistHandle,
402
+ commitmentProof,
403
+ values,
404
+ covalidatorSignatures,
405
+ commitments,
406
+ };
411
407
  }
412
- return reference;
413
408
  }
414
409
  /**
415
- * Verifies that two plaintext byte arrays are identical.
410
+ * Verifies proof hashes at two levels:
411
+ * 1. Aggregate: keccak256(concat(proofHashes)) must equal the attested commitmentProof
412
+ * 2. Per-element:
413
+ * - For plaintext (reveal): proofHash[i] = keccak256(value[i])
414
+ * - For reencryption (decrypt): proofHash[i] = keccak256(commitment[i] || plaintext[i])
415
+ * — requires reencryptKeypair to decrypt the ciphertext first.
416
416
  */
417
- verifyPlaintextBytesConsistency(refBytes, bytes) {
418
- if (refBytes.length !== bytes.length) {
419
- throw new Error('Plaintexts length differ across KMS responses');
420
- }
421
- for (let b = 0; b < refBytes.length; b++) {
422
- if (refBytes[b] !== bytes[b]) {
423
- throw new Error('Plaintexts differ across KMS responses');
424
- }
425
- }
426
- }
427
- verifyPlaintextConsistency(index, reference, thresholdResponses) {
428
- const refAtt = reference.decryptionAttestations[index];
429
- if (refAtt.value?.case !== 'plaintext') {
430
- throw new Error('Expected plaintext attestation');
431
- }
432
- const refBytes = refAtt.value.value.value;
433
- for (let r = 1; r < thresholdResponses.length; r++) {
434
- const att = thresholdResponses[r].decryptionAttestations[index];
435
- if (att.value?.case !== 'plaintext') {
436
- throw new Error('Expected plaintext attestation but received non-plaintext');
437
- }
438
- const bytes = att.value.value.value;
439
- this.verifyPlaintextBytesConsistency(refBytes, bytes);
440
- }
441
- }
442
- async verifyCiphertextConsistency(index, reference, thresholdResponses, reencryptKeypair) {
443
- const refAtt = reference.decryptionAttestations[index];
444
- if (refAtt.value?.case !== 'reencryption') {
445
- throw new Error('Expected reencryption attestation');
446
- }
447
- const refReencryption = refAtt.value.value;
448
- const refCt = refReencryption.userCiphertext;
449
- if (!refCt) {
450
- throw new Error('No ciphertext in reference reencryption');
451
- }
452
- const refFheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(refAtt.handle));
453
- for (let r = 1; r < thresholdResponses.length; r++) {
454
- const att = thresholdResponses[r].decryptionAttestations[index];
455
- if (att.value?.case !== 'reencryption') {
456
- throw new Error('Expected reencryption attestation but received non-reencryption');
457
- }
458
- const reencryption = att.value.value;
459
- const ct = reencryption.userCiphertext;
460
- if (!ct) {
461
- throw new Error('No ciphertext in reencryption');
417
+ async verifyElementProofHashes(reference, commitmentProofBytes, reencryptKeypair) {
418
+ // Aggregate check: keccak256(concat(proofHashes)) must match the attested commitment proof
419
+ const proofHashesConcat = new Uint8Array(reference.proofHashes.reduce((acc, h) => acc + h.length, 0));
420
+ let offset = 0;
421
+ for (const h of reference.proofHashes) {
422
+ proofHashesConcat.set(h, offset);
423
+ offset += h.length;
424
+ }
425
+ const computedProof = (0, viem_1.keccak256)((0, binary_js_1.bytesToHex)(proofHashesConcat));
426
+ const attestedProof = (0, binary_js_1.bytesToHex)(commitmentProofBytes);
427
+ if (computedProof !== attestedProof) {
428
+ throw new types_js_1.EListAttestedDecryptError(`Commitment proof verification failed: computed ${computedProof} but attested value is ${attestedProof}`);
429
+ }
430
+ // Per-element check
431
+ if (reference.proofHashes.length !== reference.values.length) {
432
+ throw new types_js_1.EListAttestedDecryptError(`proofHashes length (${reference.proofHashes.length}) does not match values length (${reference.values.length})`);
433
+ }
434
+ for (let i = 0; i < reference.values.length; i++) {
435
+ const elem = reference.values[i];
436
+ let preimage;
437
+ if (elem.value.case === 'reencryption') {
438
+ if (!reencryptKeypair) {
439
+ // Can't verify without keypair; aggregate check + signatures still hold
440
+ continue;
441
+ }
442
+ const plaintext = await (0, xwing_js_1.decrypt)(reencryptKeypair, elem.value.value.userCiphertext);
443
+ const combined = new Uint8Array(elem.commitment.length + plaintext.length);
444
+ combined.set(elem.commitment, 0);
445
+ combined.set(plaintext, elem.commitment.length);
446
+ preimage = combined;
462
447
  }
463
- const fheType = (0, handle_js_1.getHandleType)((0, binary_js_1.parseHex)(att.handle));
464
- // Verify FHE type matches
465
- if (fheType !== refFheType) {
466
- throw new Error('FHE types differ across KMS responses');
448
+ else if (elem.value.case === 'plaintext') {
449
+ preimage = elem.value.value.value;
467
450
  }
468
- // Verify handles match
469
- if (att.handle !== refAtt.handle) {
470
- throw new Error('Handles differ across KMS responses');
451
+ else {
452
+ throw new types_js_1.EListAttestedDecryptError(`Unexpected elist element type at index ${i}: ${elem.value.case}`);
471
453
  }
472
- // If keypair provided, decrypt and verify plaintext consistency
473
- if (reencryptKeypair) {
474
- const refPlaintext = await (0, xwing_js_1.decrypt)(reencryptKeypair, refCt);
475
- const plaintext = await (0, xwing_js_1.decrypt)(reencryptKeypair, ct);
476
- this.verifyPlaintextBytesConsistency(refPlaintext, plaintext);
454
+ const computedHash = (0, viem_1.keccak256)((0, binary_js_1.bytesToHex)(preimage));
455
+ const expectedHash = (0, binary_js_1.bytesToHex)(reference.proofHashes[i]);
456
+ if (computedHash !== expectedHash) {
457
+ throw new types_js_1.EListAttestedDecryptError(`Element proof hash mismatch at index ${i}: computed ${computedHash} but expected ${expectedHash}`);
477
458
  }
478
459
  }
479
460
  }
480
461
  }
481
462
  exports.KmsQuorumClient = KmsQuorumClient;
482
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"quorumClient.js","sourceRoot":"","sources":["../../../src/kms/quorumClient.ts"],"names":[],"mappings":";;;AAKA,4CAKsB;AAMtB,+DAGqC;AAUrC,4CAA6C;AAE7C,+CAA2C;AAE3C,0CAA+C;AAC/C,2CAA2D;AAC3D,iEAA8D;AAO9D,MAAa,eAAe;IACT,IAAI,CAAQ;IACZ,SAAS,CAAS;IAQnC,iBAAiB;IACjB,YACE,kBAAoE,EACpE,SAAiB;QAEjB,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CACb,mCAAmC,kBAAkB,CAAC,MAAM,EAAE,CAC/D,CAAC;QACJ,CAAC;QAED,2FAA2F;QAC3F,IACE,kBAAkB,CAAC,MAAM,GAAG,CAAC;YAC7B,iBAAiB,IAAI,kBAAkB,CAAC,CAAC,CAAC,EAC1C,CAAC;YACD,0BAA0B;YAC1B,MAAM,UAAU,GAAG,kBAAiC,CAAC;YACrD,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;gBACtC,MAAM;gBACN,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAC,CAAC;QACN,CAAC;aAAM,CAAC;YACN,iDAAiD;YACjD,MAAM,SAAS,GAAG,kBAGf,CAAC;YACJ,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrC,OAAO;oBACL,MAAM,EAAE,IAAA,wBAAY,EAAC,QAAQ,CAAC,GAAG,EAAE,QAAQ,CAAC,MAAM,CAAC;oBACnD,MAAM,EAAE,QAAQ,CAAC,MAAM;iBACxB,CAAC;YACJ,CAAC,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,QAAQ,CACb,IAAc,EACd,OAAkB,EAClB,SAAiB;QAEjB,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,yBAAyB,OAAO,CAAC,MAAM,mCAAmC,IAAI,CAAC,MAAM,GAAG,CACzF,CAAC;QACJ,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CACb,mCAAmC,IAAI,CAAC,MAAM,mBAAmB,CAClE,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACxC,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,eAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,cAAc,CACnB,UAAuB,EACvB,SAAiB;QAEjB,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CACb,mCAAmC,UAAU,CAAC,MAAM,0BAA0B,CAC/E,CAAC;QACJ,CAAC;QAED,OAAO,IAAI,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B;QAO/B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,+EAA+E;QAC/E,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,yBAAyB,CACpD,kBAAkB,EAClB,gBAAgB,CACjB,CAAC;QAEF,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B;QAK/B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,qDAAqD;QACrD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAC3D,kBAAkB,EAClB,OAAO,EACP,gBAAgB,CACjB,CAAC;QAEF,OAAO,IAAI,CAAC,iCAAiC,CAC3C,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,aAAsC;QAOtC,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAClD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAkC,CAC5C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,iFAAiF;QACjF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,CAAC;QAE3E,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,gCAAgC,CAC5C,SAA2C,EAC3C,aAAsC;QAEtC,iEAAiE;QACjE,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;oBACjD,OAAO,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,EAAE,aAAa,CAAC,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;YAC1C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,cAAc,KAAK,YAAY,KAAK,EAAE,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,IAAA,2CAAoB,EAG9B,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAC9B,UAAwB,EACxB,OAAkB;QAElB,MAAM,qBAAqB,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;YAChE,SAAS;YACT,MAAM,EAAE,OAAO,CAAC,GAAG,CAAC;SACrB,CAAC,CAAC,CAAC;QAEJ,+EAA+E;QAC/E,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC;YAChC,OAAO,CAAC,CAAC;QACX,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,OAAO,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACK,yBAAyB,CAC/B,qBAAiD,EACjD,qBAAmC;QAEnC,IACE,CAAC,qBAAqB,CAAC,KAAK;YAC5B,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAChD,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,cAAc,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAC/D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAmB,CAAC;QACzD,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,IAAA,yBAAa,EAAC,cAAc,CAAC,CAAC;QAClD,MAAM,SAAS,GAAG,IAAA,iCAAiB,EACjC,iCAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ,CAAC;QAEF,OAAO;YACL,MAAM;YACN,SAAS;YACT,qBAAqB;SACuC,CAAC;IACjE,CAAC;IAEO,2BAA2B,CACjC,SAA2D,EAC3D,kBAAwE,EACxE,OAAkB;QAKlB,MAAM,gBAAgB,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,CAAC;QACjE,OAAO,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAC9D,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YACnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,gDAAgD;YAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC,GAAG,CACvC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,SAAS,CACnD,CAAC;YACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;YAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACtC,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;YACvE,CAAC;iBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAChD,0DAA0D;gBAC1D,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;oBAC1D,IAAI,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACjE,MAAM,YAAY,GAAG,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC;wBAChE,OAAO,YAAY,CAAC,kBAAkB,CAAC;oBACzC,CAAC;yBAAM,CAAC;wBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,GAAG,CAChG,CAAC;oBACJ,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;gBAEF,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;gBACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBACvD,OAAO;oBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;oBAClC,kBAAkB,EAAE;wBAClB,UAAU,EAAE;4BACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;4BACrB,MAAM,EAAE,CAAC,EAAE,0BAA0B;4BACrC,IAAI,EAAE,OAAO;yBACd;qBACqD;oBACxD,mBAAmB,EAAE,8BAA8B;oBACnD,qBAAqB;iBACgD,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;YACJ,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,iCAAiC,CACvC,SAAkC,EAClC,kBAA6C,EAC7C,OAAkB;QAIlB,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,gDAAgD;QAChD,2FAA2F;QAC3F,MAAM,UAAU,GAAiB,EAAE,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;YACtC,MAAM,GAAG,GAAG,IAAI,CAAC,qBAAqB,CAAC;YACvC,IAAI,GAAG,EAAE,CAAC;gBACR,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YACjC,CAAC;QACH,CAAC;QACD,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;QAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;YACzC,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;YAEvD,0DAA0D;YAC1D,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1D,IAAI,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBAC9D,MAAM,YAAY,GAAG,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,KAAK,CAAC;oBAC7D,OAAO,YAAY,CAAC,kBAAkB,CAAC;gBACzC,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,GAAG,CAC7F,CAAC;gBACJ,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;YAEF,OAAO;gBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;gBAClC,kBAAkB,EAAE;oBAClB,UAAU,EAAE;wBACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;wBACrB,MAAM,EAAE,iCAAiB,CAAC,KAAK,EAAE,0BAA0B;wBAC3D,IAAI,EAAE,OAAO;qBACd;iBACqD;gBACxD,mBAAmB,EAAE,8BAA8B;gBACnD,qBAAqB;aACgD,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,yBAAyB,CACrC,kBAAwE,EACxE,gBAA+B;QAE/B,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QAExC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,IACE,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,MAAM;gBACnD,SAAS,CAAC,sBAAsB,CAAC,MAAM,EACvC,CAAC;gBACD,MAAM,IAAI,KAAK,CACb,qEAAqE,CACtE,CAAC;YACJ,CAAC;QACH,CAAC;QAED,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACjE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YAEnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;YACvD,CAAC;YAED,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC;YAElC,2EAA2E;YAC3E,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;gBAC5D,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;oBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;gBAC7C,CAAC;gBACD,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,OAAO,EAAE,CAAC;oBAC/B,MAAM,IAAI,KAAK,CACb,kDAAkD,OAAO,kBAAkB,CAAC,SAAS,GAAG,CAAC,KAAK,CAAC,IAAI,GAAG,CACvG,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,uCAAuC;YACvC,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;gBAC5B,IAAI,CAAC,0BAA0B,CAAC,CAAC,EAAE,SAAS,EAAE,kBAAkB,CAAC,CAAC;YACpE,CAAC;iBAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;gBACtC,MAAM,IAAI,CAAC,2BAA2B,CACpC,CAAC,EACD,SAAS,EACT,kBAAkB,EAClB,gBAAgB,CACjB,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,OAAO,0CAA0C,CAClF,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,KAAK,CAAC,gCAAgC,CAC5C,kBAA6C,EAC7C,OAAgC,EAChC,gBAA+B;QAE/B,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QACxC,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAE/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC;QAElC,gDAAgD;QAChD,IAAI,QAAgC,CAAC;QACrC,IAAI,eAAgC,CAAC;QACrC,IAAI,KAA6B,CAAC;QAClC,IAAI,UAAwD,CAAC;QAE7D,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;YAC5B,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QACtC,CAAC;aAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;YACtC,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACrC,KAAK,GAAG,eAAe,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,KAAK,EAAE,CAAC;gBACX,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;YAC7D,CAAC;YAED,UAAU,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;QACtD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CACb,gCAAgC,OAAO,0CAA0C,CAClF,CAAC;QACJ,CAAC;QAED,qGAAqG;QACrG,MAAM,kBAAkB,GACtB,OAAO,EAAE,eAAe,IAAI,OAAO,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC;QACjE,IAAI,OAAO,KAAK,cAAc,IAAI,CAAC,kBAAkB,EAAE,CAAC;YACtD,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;QACJ,CAAC;QAED,6EAA6E;QAC7E,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,qBAAqB,CAAC;YACxD,IAAI,CAAC,GAAG,EAAE,CAAC;gBACT,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,OAAO,EAAE,CAAC;gBAC/B,MAAM,IAAI,KAAK,CACb,kDAAkD,OAAO,kBAAkB,CAAC,SAAS,GAAG,CAAC,KAAK,CAAC,IAAI,GAAG,CACvG,CAAC;YACJ,CAAC;YAED,uBAAuB;YACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;gBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACzD,CAAC;YAED,uCAAuC;YACvC,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;gBAC5B,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACd,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;gBAC7D,CAAC;gBAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;oBACnC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;gBACJ,CAAC;gBAED,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;gBACpC,IAAI,CAAC,+BAA+B,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;YACxD,CAAC;iBAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;gBACtC,IAAI,CAAC,KAAK,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;oBACvC,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;gBAC/D,CAAC;gBAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBACtC,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;gBACJ,CAAC;gBAED,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC;gBACrC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,IAAI,CAAC,EAAE,EAAE,CAAC;oBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;gBACnD,CAAC;gBACD,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;gBAEpD,0BAA0B;gBAC1B,IAAI,OAAO,KAAK,UAAU,EAAE,CAAC;oBAC3B,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;gBAC3D,CAAC;gBAED,uBAAuB;gBACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;oBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;gBACzD,CAAC;gBAED,gEAAgE;gBAChE,IAAI,gBAAgB,EAAE,CAAC;oBACrB,MAAM,YAAY,GAAG,MAAM,IAAA,kBAAO,EAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;oBAC5D,MAAM,SAAS,GAAG,MAAM,IAAA,kBAAO,EAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;oBACtD,IAAI,CAAC,+BAA+B,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;OAEG;IACK,+BAA+B,CACrC,QAAoB,EACpB,KAAiB;QAEjB,IAAI,QAAQ,CAAC,MAAM,KAAK,KAAK,CAAC,MAAM,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACnE,CAAC;QACD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACzC,IAAI,QAAQ,CAAC,CAAC,CAAC,KAAK,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC;gBAC7B,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;YAC5D,CAAC;QACH,CAAC;IACH,CAAC;IAEO,0BAA0B,CAChC,KAAa,EACb,SAA2D,EAC3D,kBAAwE;QAExE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;gBACpC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;YACJ,CAAC;YAED,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;YACpC,IAAI,CAAC,+BAA+B,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QACxD,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,2BAA2B,CACvC,KAAa,EACb,SAA2D,EAC3D,kBAAwE,EACxE,gBAA+B;QAE/B,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;QAC3C,MAAM,KAAK,GAAG,eAAe,CAAC,cAAc,CAAC;QAC7C,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;QAC7D,CAAC;QAED,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;QAE1D,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;gBACvC,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;YACJ,CAAC;YAED,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC;YACrC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YACD,MAAM,OAAO,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;YAEpD,0BAA0B;YAC1B,IAAI,OAAO,KAAK,UAAU,EAAE,CAAC;gBAC3B,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,uBAAuB;YACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;gBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACzD,CAAC;YAED,gEAAgE;YAChE,IAAI,gBAAgB,EAAE,CAAC;gBACrB,MAAM,YAAY,GAAG,MAAM,IAAA,kBAAO,EAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;gBAC5D,MAAM,SAAS,GAAG,MAAM,IAAA,kBAAO,EAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;gBACtD,IAAI,CAAC,+BAA+B,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;CACF;AA5tBD,0CA4tBC"}
463
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"quorumClient.js","sourceRoot":"","sources":["../../../src/kms/quorumClient.ts"],"names":[],"mappings":";;;AAAA,+BAA+C;AAK/C,4CAKsB;AACtB,+DAI0C;AAM1C,+DAGqC;AAcrC,4CAA+E;AAC/E,+CAA8D;AAE9D,0CAA+C;AAC/C,2CAA2D;AAC3D,iEAIgC;AAGhC,yEAGoC;AACpC,iEAA8D;AAO9D;;;GAGG;AACH,SAAS,sBAAsB,CAAC,SAAiB,EAAE,WAAmB;IACpE,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,IAAI,SAAS,GAAG,QAAQ,EAAE,CAAC;QACzB,MAAM,IAAI,KAAK,CACb,cAAc,SAAS,kCAAkC,QAAQ,QAAQ,WAAW,yCAAyC,CAC9H,CAAC;IACJ,CAAC;AACH,CAAC;AAED,MAAa,eAAe;IACT,IAAI,CAAQ;IACZ,SAAS,CAAS;IAQnC,iBAAiB;IACjB,YACE,kBAAoE,EACpE,SAAiB;QAEjB,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CACb,mCAAmC,kBAAkB,CAAC,MAAM,EAAE,CAC/D,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAE7D,2FAA2F;QAC3F,IACE,kBAAkB,CAAC,MAAM,GAAG,CAAC;YAC7B,iBAAiB,IAAI,kBAAkB,CAAC,CAAC,CAAC,EAC1C,CAAC;YACD,0BAA0B;YAC1B,MAAM,UAAU,GAAG,kBAAiC,CAAC;YACrD,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;gBACtC,MAAM;gBACN,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAC,CAAC;QACN,CAAC;aAAM,CAAC;YACN,iDAAiD;YACjD,MAAM,SAAS,GAAG,kBAGf,CAAC;YACJ,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrC,OAAO;oBACL,MAAM,EAAE,IAAA,wBAAY,EAAC,QAAQ,CAAC,GAAG,EAAE,QAAQ,CAAC,MAAM,CAAC;oBACnD,MAAM,EAAE,QAAQ,CAAC,MAAM;iBACxB,CAAC;YACJ,CAAC,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,QAAQ,CACb,IAAc,EACd,OAAkB,EAClB,SAAiB;QAEjB,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,yBAAyB,OAAO,CAAC,MAAM,mCAAmC,IAAI,CAAC,MAAM,GAAG,CACzF,CAAC;QACJ,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CACb,mCAAmC,IAAI,CAAC,MAAM,mBAAmB,CAClE,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACxC,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,eAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,cAAc,CACnB,UAAuB,EACvB,SAAiB;QAEjB,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CACb,mCAAmC,UAAU,CAAC,MAAM,0BAA0B,CAC/E,CAAC;QACJ,CAAC;QAED,OAAO,IAAI,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B,EAC/B,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,+EAA+E;QAC/E,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,IAAA,uDAAgC,EACpC,gBAGE,EACF,IAAI,CAAC,SAAS,EACd,gBAAgB,CACjB,CAAC;QAEJ,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B,EAC/B,eAAyB,EACzB,MAAmB;QAKnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,qDAAqD;QACrD,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,IAAA,uDAAgC,EACpC,gBAGE,EACF,IAAI,CAAC,SAAS,EACd,OAAO,EACP,gBAAgB,CACjB,CAAC;QAEJ,OAAO,IAAI,CAAC,iCAAiC,CAC3C,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,aAAsC,EACtC,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAClD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,iFAAiF;QACjF,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,IAAA,uDAAgC,EACpC,gBAGE,EACF,IAAI,CAAC,SAAS,CACf,CAAC;QAEJ,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,oBAAoB,CACxB,OAAoC,EACpC,aAAsC,EACtC,gBAA+B,EAC/B,eAAyB,EACzB,MAAmB;QAKnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,oBAAoB,CAAC,OAAO,CAAC,CAAC;QACxD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GAAG,MAAM,IAAA,qDAA8B,EACxE,gBAGE,EACF,IAAI,CAAC,SAAS,EACd,gBAAgB,CACjB,CAAC;QAEF,MAAM,WAAW,GAAG,OAAO,CAAC,oBAAoB,EAAE,MAAM,CAAC;QACzD,IAAI,CAAC,WAAW,EAAE,CAAC;YACjB,MAAM,IAAI,oCAAyB,CACjC,gDAAgD,CACjD,CAAC;QACJ,CAAC;QAED,OAAO,IAAI,CAAC,+BAA+B,CACzC,WAAwB,EACxB,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,EACN,gBAAgB,CACjB,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,mBAAmB,CACvB,OAAmC,EACnC,aAAsC,EACtC,eAAyB,EACzB,MAAmB;QAEnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;QACvD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GAAG,MAAM,IAAA,qDAA8B,EACxE,gBAGE,EACF,IAAI,CAAC,SAAS,CACf,CAAC;QAEF,OAAO,IAAI,CAAC,+BAA+B,CACzC,OAAO,CAAC,MAAmB,EAC3B,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CAGP,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,gCAAgC,CAC5C,SAA2C,EAC3C,aAAsC;QAEtC,iEAAiE;QACjE,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;oBACjD,OAAO,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,EAAE,aAAa,CAAC,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;YAC1C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,cAAc,KAAK,YAAY,KAAK,EAAE,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,IAAA,2CAAoB,EAG9B,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAC9B,UAAwB,EACxB,OAAkB;QAElB,MAAM,qBAAqB,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;YAChE,SAAS;YACT,MAAM,EAAE,OAAO,CAAC,GAAG,CAAC;SACrB,CAAC,CAAC,CAAC;QAEJ,+EAA+E;QAC/E,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC;YAChC,OAAO,CAAC,CAAC;QACX,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,OAAO,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACK,yBAAyB,CAC/B,qBAAiD,EACjD,qBAAmC;QAEnC,IACE,CAAC,qBAAqB,CAAC,KAAK;YAC5B,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAChD,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,cAAc,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAC/D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAmB,CAAC;QACzD,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,IAAA,yBAAa,EAAC,cAAc,CAAC,CAAC;QAClD,MAAM,SAAS,GAAG,IAAA,iCAAiB,EACjC,iCAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ,CAAC;QAEF,OAAO;YACL,MAAM;YACN,SAAS;YACT,qBAAqB;SACuC,CAAC;IACjE,CAAC;IAEO,KAAK,CAAC,2BAA2B,CACvC,SAA2D,EAC3D,kBAAwE,EACxE,OAAkB,EAClB,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,CAAC;QACjE,MAAM,OAAO,GAGP,EAAE,CAAC;QAET,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,gBAAgB,EAAE,CAAC,EAAE,EAAE,CAAC;YAC1C,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YACnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,gDAAgD;YAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC,GAAG,CACvC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,SAAS,CACnD,CAAC;YACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;YAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACtC,+DAA+D;gBAC/D,6FAA6F;gBAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;oBAC9B,MAAM,IAAA,+DAAoC,EACxC,MAAM,CAAC,MAAM,EACb,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EACxB,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;gBACJ,CAAC;gBACD,OAAO,CAAC,IAAI,CACV,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAC9D,CAAC;YACJ,CAAC;iBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAChD,+DAA+D;gBAC/D,MAAM,mBAAmB,GAAiB,EAAE,CAAC;gBAC7C,MAAM,yBAAyB,GAAiB,EAAE,CAAC;gBACnD,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;oBACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;oBACtD,IAAI,QAAQ,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;wBACtC,mBAAmB,CAAC,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;wBAC5D,yBAAyB,CAAC,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;oBAChE,CAAC;yBAAM,CAAC;wBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,QAAQ,EAAE,IAAI,GAAG,CACrE,CAAC;oBACJ,CAAC;gBACH,CAAC;gBAED,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;gBAEF,MAAM,iBAAiB,GAAG,IAAI,CAAC,wBAAwB,CACrD,yBAAyB,EACzB,OAAO,CACR,CAAC;gBAEF,6FAA6F;gBAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;oBAC9B,MAAM,IAAA,kEAAuC,EAC3C,MAAM,CAAC,MAAM,EACb,iBAAiB,EACjB,8BAA8B,EAC9B,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;gBACJ,CAAC;gBAED,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;gBACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBAC1D,OAAO,CAAC,IAAI,CAAC;oBACX,MAAM,EAAE,MAAM,CAAC,MAAmB;oBAClC,kBAAkB,EAAE;wBAClB,UAAU,EAAE;4BACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;4BACrB,MAAM,EAAE,iCAAiB,CAAC,KAAK,EAAE,0BAA0B;4BAC3D,IAAI,EAAE,UAA8B;yBACrC;qBACqD;oBACxD,mBAAmB,EAAE,8BAA8B;oBACnD,qBAAqB;iBAItB,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,KAAK,CAAC,iCAAiC,CAC7C,SAAkC,EAClC,kBAA6C,EAC7C,OAAkB,EAClB,eAAyB,EACzB,MAAmB;QAKnB,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,gDAAgD;QAChD,mGAAmG;QACnG,MAAM,UAAU,GAAiB,EAAE,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;YACtC,MAAM,GAAG,GAAG,IAAI,CAAC,qBAAqB,CAAC;YACvC,IAAI,CAAC,GAAG;gBACN,MAAM,IAAI,KAAK,CAAC,oDAAoD,CAAC,CAAC;YACxE,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;QACjC,CAAC;QACD,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;QAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,+DAA+D;YAC/D,6FAA6F;YAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;gBAC9B,MAAM,IAAA,+DAAoC,EACxC,MAAM,CAAC,MAAM,EACb,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EACxB,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;YACJ,CAAC;YACD,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;YACzC,oEAAoE;YACpE,sEAAsE;YAEtE,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,MAAM,UAAU,GAAG,IAAA,yBAAa,EAAC,IAAA,oBAAQ,EAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;YAE1D,+DAA+D;YAC/D,MAAM,mBAAmB,GAAiB,EAAE,CAAC;YAC7C,MAAM,yBAAyB,GAAiB,EAAE,CAAC;YACnD,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;gBACtC,IAAI,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBAC9D,MAAM,KAAK,GAAG,IAAI,CAAC,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC;oBACrD,mBAAmB,CAAC,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;oBACnD,yBAAyB,CAAC,IAAI,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;gBACvD,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,GAAG,CAC7F,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;YAEF,MAAM,iBAAiB,GAAG,IAAI,CAAC,wBAAwB,CACrD,yBAAyB,EACzB,OAAO,CACR,CAAC;YAEF,6FAA6F;YAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;gBAC9B,MAAM,IAAA,kEAAuC,EAC3C,MAAM,CAAC,MAAM,EACb,iBAAiB,EACjB,8BAA8B,EAC9B,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;YACJ,CAAC;YAED,OAAO;gBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;gBAClC,kBAAkB,EAAE;oBAClB,UAAU,EAAE;wBACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;wBACrB,MAAM,EAAE,iCAAiB,CAAC,KAAK,EAAE,0BAA0B;wBAC3D,IAAI,EAAE,UAA8B;qBACrC;iBACqD;gBACxD,mBAAmB,EAAE,8BAA8B;gBACnD,qBAAqB;aACgD,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,+BAA+B,CAC3C,WAAsB,EACtB,SAAqE,EACrE,kBAEC,EACD,OAAkB,EAClB,eAAyB,EACzB,MAAmB,EACnB,gBAA+B;QAK/B,MAAM,WAAW,GAAG,SAAS,CAAC,0BAA0B,CAAC;QACzD,IAAI,CAAC,WAAW,EAAE,CAAC;YACjB,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;QACzE,CAAC;QACD,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,CAAC;YACvB,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;QAED,+CAA+C;QAC/C,MAAM,eAAe,GAAG,kBAAkB,CAAC,GAAG,CAC5C,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,0BAA2B,CAAC,SAAS,CACrD,CAAC;QACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,eAAe,EACf,OAAO,CACR,CAAC;QAEF,8CAA8C;QAC9C,kGAAkG;QAClG,IAAI,eAAqD,CAAC;QAC1D,IAAI,WAAW,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YAC3C,MAAM,UAAU,GAAG,WAAW,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;YACjD,MAAM,WAAW,GAAG,WAAW,CAAC,MAAmB,CAAC;YAEpD,qCAAqC;YACrC,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;gBAC9B,MAAM,IAAA,+DAAoC,EACxC,WAAW,EACX,UAAU,EACV,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;YACJ,CAAC;YAED,eAAe,GAAG,IAAA,iCAAiB,EACjC,iCAAiB,CAAC,KAAK,EACvB,uBAAW,CAAC,QAA4B,EACxC,IAAA,yBAAa,EAAC,UAAU,CAAC,CAC1B,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CACb,+CAA+C,WAAW,CAAC,KAAK,CAAC,IAAI,EAAE,CACxE,CAAC;QACJ,CAAC;QAED,iDAAiD;QACjD,MAAM,IAAI,CAAC,wBAAwB,CACjC,SAAS,EACT,WAAW,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EAC7B,gBAAgB,CACjB,CAAC;QAEF,kDAAkD;QAClD,MAAM,WAAW,GAAG,IAAA,+BAAmB,EAAC,WAAW,CAAqB,CAAC;QACzE,MAAM,WAAW,GAAiB,EAAE,CAAC;QACrC,MAAM,cAAc,GAClB,SAAS,CAAC,MAAM,CAAC,MAAM,GAAG,CAAC;YAC3B,SAAS,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,CAAC;QAEpD,IAAI,cAAc,EAAE,CAAC;YACnB,MAAM,MAAM,GAA0D,EAAE,CAAC;YACzE,KAAK,MAAM,IAAI,IAAI,SAAS,CAAC,MAAM,EAAE,CAAC;gBACpC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;gBAClC,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBACvC,MAAM,IAAI,KAAK,CACb,gDAAgD,IAAI,CAAC,KAAK,CAAC,IAAI,GAAG,CACnE,CAAC;gBACJ,CAAC;gBACD,MAAM,EAAE,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,cAAc,CAAC;gBAC3C,MAAM,CAAC,IAAI,CAAC;oBACV,UAAU,EAAE;wBACV,KAAK,EAAE,IAAA,sBAAU,EAAC,EAAE,CAAC;wBACrB,MAAM,EAAE,iCAAiB,CAAC,KAAK;wBAC/B,IAAI,EAAE,WAAW;qBAClB;iBACqD,CAAC,CAAC;YAC5D,CAAC;YACD,OAAO;gBACL,MAAM,EAAE,WAAW;gBACnB,eAAe;gBACf,MAAM;gBACN,qBAAqB;gBACrB,WAAW;aAIZ,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,MAAM,MAAM,GAA2C,EAAE,CAAC;YAC1D,KAAK,MAAM,IAAI,IAAI,SAAS,CAAC,MAAM,EAAE,CAAC;gBACpC,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;gBAClC,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;oBACpC,MAAM,IAAI,KAAK,CACb,6CAA6C,IAAI,CAAC,KAAK,CAAC,IAAI,GAAG,CAChE,CAAC;gBACJ,CAAC;gBACD,MAAM,cAAc,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;gBAC9C,MAAM,CAAC,IAAI,CACT,IAAA,iCAAiB,EACf,iCAAiB,CAAC,KAAK,EACvB,WAAW,EACX,IAAA,yBAAa,EAAC,cAAc,CAAC,CAC9B,CACF,CAAC;YACJ,CAAC;YACD,OAAO;gBACL,MAAM,EAAE,WAAW;gBACnB,eAAe;gBACf,MAAM;gBACN,qBAAqB;gBACrB,WAAW;aACsD,CAAC;QACtE,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACK,KAAK,CAAC,wBAAwB,CACpC,SAAqE,EACrE,oBAAgC,EAChC,gBAA+B;QAE/B,2FAA2F;QAC3F,MAAM,iBAAiB,GAAG,IAAI,UAAU,CACtC,SAAS,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,GAAG,EAAE,CAAC,EAAE,EAAE,CAAC,GAAG,GAAG,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAC5D,CAAC;QACF,IAAI,MAAM,GAAG,CAAC,CAAC;QACf,KAAK,MAAM,CAAC,IAAI,SAAS,CAAC,WAAW,EAAE,CAAC;YACtC,iBAAiB,CAAC,GAAG,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;YACjC,MAAM,IAAI,CAAC,CAAC,MAAM,CAAC;QACrB,CAAC;QACD,MAAM,aAAa,GAAG,IAAA,gBAAS,EAAC,IAAA,sBAAU,EAAC,iBAAiB,CAAC,CAAC,CAAC;QAC/D,MAAM,aAAa,GAAG,IAAA,sBAAU,EAAC,oBAAoB,CAAC,CAAC;QACvD,IAAI,aAAa,KAAK,aAAa,EAAE,CAAC;YACpC,MAAM,IAAI,oCAAyB,CACjC,kDAAkD,aAAa,0BAA0B,aAAa,EAAE,CACzG,CAAC;QACJ,CAAC;QAED,oBAAoB;QACpB,IAAI,SAAS,CAAC,WAAW,CAAC,MAAM,KAAK,SAAS,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC;YAC7D,MAAM,IAAI,oCAAyB,CACjC,uBAAuB,SAAS,CAAC,WAAW,CAAC,MAAM,mCAAmC,SAAS,CAAC,MAAM,CAAC,MAAM,GAAG,CACjH,CAAC;QACJ,CAAC;QAED,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,SAAS,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACjD,MAAM,IAAI,GAAG,SAAS,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;YACjC,IAAI,QAAoB,CAAC;YAEzB,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBACvC,IAAI,CAAC,gBAAgB,EAAE,CAAC;oBACtB,wEAAwE;oBACxE,SAAS;gBACX,CAAC;gBACD,MAAM,SAAS,GAAG,MAAM,IAAA,kBAAO,EAC7B,gBAAgB,EAChB,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,cAAc,CAChC,CAAC;gBACF,MAAM,QAAQ,GAAG,IAAI,UAAU,CAC7B,IAAI,CAAC,UAAU,CAAC,MAAM,GAAG,SAAS,CAAC,MAAM,CAC1C,CAAC;gBACF,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC;gBACjC,QAAQ,CAAC,GAAG,CAAC,SAAS,EAAE,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;gBAChD,QAAQ,GAAG,QAAQ,CAAC;YACtB,CAAC;iBAAM,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBAC3C,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;YACpC,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,oCAAyB,CACjC,0CAA0C,CAAC,KAAK,IAAI,CAAC,KAAK,CAAC,IAAI,EAAE,CAClE,CAAC;YACJ,CAAC;YAED,MAAM,YAAY,GAAG,IAAA,gBAAS,EAAC,IAAA,sBAAU,EAAC,QAAQ,CAAC,CAAC,CAAC;YACrD,MAAM,YAAY,GAAG,IAAA,sBAAU,EAAC,SAAS,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC;YAC1D,IAAI,YAAY,KAAK,YAAY,EAAE,CAAC;gBAClC,MAAM,IAAI,oCAAyB,CACjC,wCAAwC,CAAC,cAAc,YAAY,iBAAiB,YAAY,EAAE,CACnG,CAAC;YACJ,CAAC;QACH,CAAC;IACH,CAAC;CACF;AAvzBD,0CAuzBC"}