@kadi.build/deploy-ability 0.0.6 → 0.0.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.env-example +72 -0
- package/README.md +240 -0
- package/dist/errors/error-utils.d.ts +31 -0
- package/dist/errors/error-utils.d.ts.map +1 -0
- package/dist/errors/error-utils.js +44 -0
- package/dist/errors/error-utils.js.map +1 -0
- package/dist/errors/index.d.ts +1 -0
- package/dist/errors/index.d.ts.map +1 -1
- package/dist/errors/index.js +2 -0
- package/dist/errors/index.js.map +1 -1
- package/dist/targets/akash/certificate-manager.d.ts.map +1 -1
- package/dist/targets/akash/certificate-manager.js +11 -6
- package/dist/targets/akash/certificate-manager.js.map +1 -1
- package/dist/targets/akash/client.d.ts.map +1 -1
- package/dist/targets/akash/client.js +18 -11
- package/dist/targets/akash/client.js.map +1 -1
- package/dist/targets/akash/deployer.d.ts +64 -3
- package/dist/targets/akash/deployer.d.ts.map +1 -1
- package/dist/targets/akash/deployer.js +169 -10
- package/dist/targets/akash/deployer.js.map +1 -1
- package/dist/targets/akash/index.d.ts +86 -2
- package/dist/targets/akash/index.d.ts.map +1 -1
- package/dist/targets/akash/index.js +49 -2
- package/dist/targets/akash/index.js.map +1 -1
- package/dist/targets/akash/provider-manager.d.ts.map +1 -1
- package/dist/targets/akash/provider-manager.js +15 -9
- package/dist/targets/akash/provider-manager.js.map +1 -1
- package/dist/targets/akash/sdl-generator.js +9 -3
- package/dist/targets/akash/sdl-generator.js.map +1 -1
- package/dist/targets/akash/secrets-provider.d.ts +189 -0
- package/dist/targets/akash/secrets-provider.d.ts.map +1 -0
- package/dist/targets/akash/secrets-provider.js +249 -0
- package/dist/targets/akash/secrets-provider.js.map +1 -0
- package/dist/targets/akash/types.d.ts +96 -0
- package/dist/targets/akash/types.d.ts.map +1 -1
- package/dist/targets/akash/wallet-manager.d.ts +21 -3
- package/dist/targets/akash/wallet-manager.d.ts.map +1 -1
- package/dist/targets/akash/wallet-manager.js +152 -18
- package/dist/targets/akash/wallet-manager.js.map +1 -1
- package/dist/targets/local/deployer.d.ts.map +1 -1
- package/dist/targets/local/deployer.js +23 -13
- package/dist/targets/local/deployer.js.map +1 -1
- package/dist/targets/local/network-manager.d.ts.map +1 -1
- package/dist/targets/local/network-manager.js +4 -3
- package/dist/targets/local/network-manager.js.map +1 -1
- package/dist/types/common.d.ts +106 -23
- package/dist/types/common.d.ts.map +1 -1
- package/dist/types/index.d.ts +2 -2
- package/dist/types/index.d.ts.map +1 -1
- package/dist/types/index.js.map +1 -1
- package/dist/types/options.d.ts +83 -1
- package/dist/types/options.d.ts.map +1 -1
- package/dist/types/profiles.d.ts +11 -3
- package/dist/types/profiles.d.ts.map +1 -1
- package/dist/types/profiles.js.map +1 -1
- package/dist/utils/registry/manager.d.ts +10 -9
- package/dist/utils/registry/manager.d.ts.map +1 -1
- package/dist/utils/registry/manager.js +41 -24
- package/dist/utils/registry/manager.js.map +1 -1
- package/dist/utils/registry/setup.d.ts +2 -2
- package/dist/utils/registry/setup.d.ts.map +1 -1
- package/dist/utils/registry/setup.js +7 -5
- package/dist/utils/registry/setup.js.map +1 -1
- package/dist/utils/registry/transformer.d.ts +1 -1
- package/dist/utils/registry/transformer.js +1 -1
- package/dist/utils/registry/types.d.ts +36 -12
- package/dist/utils/registry/types.d.ts.map +1 -1
- package/package.json +4 -3
package/.env-example
ADDED
|
@@ -0,0 +1,72 @@
|
|
|
1
|
+
# Local & Remote File Manager Configuration
|
|
2
|
+
# Copy this file to .env and customize the values
|
|
3
|
+
|
|
4
|
+
# =============================================================================
|
|
5
|
+
# LOCAL FILE SYSTEM CONFIGURATION
|
|
6
|
+
# =============================================================================
|
|
7
|
+
|
|
8
|
+
# Directory Paths (customize these for your setup)
|
|
9
|
+
DEFAULT_LOCAL_ROOT=/Users/yourname/Documents
|
|
10
|
+
DEFAULT_UPLOAD_DIRECTORY=./uploads
|
|
11
|
+
DEFAULT_DOWNLOAD_DIRECTORY=./downloads
|
|
12
|
+
DEFAULT_TEMP_DIRECTORY=./temp
|
|
13
|
+
|
|
14
|
+
# File Operation Limits
|
|
15
|
+
MAX_FILE_SIZE=1073741824
|
|
16
|
+
CHUNK_SIZE=8388608
|
|
17
|
+
MAX_RETRY_ATTEMPTS=3
|
|
18
|
+
TIMEOUT_MS=30000
|
|
19
|
+
|
|
20
|
+
# Performance Settings
|
|
21
|
+
MAX_CONCURRENT_OPERATIONS=5
|
|
22
|
+
ENABLE_PROGRESS_TRACKING=true
|
|
23
|
+
ENABLE_CHECKSUM_VERIFICATION=true
|
|
24
|
+
|
|
25
|
+
# Security Settings
|
|
26
|
+
ALLOW_SYMLINKS=false
|
|
27
|
+
RESTRICT_TO_BASE_PATH=true
|
|
28
|
+
MAX_PATH_LENGTH=255
|
|
29
|
+
|
|
30
|
+
# =============================================================================
|
|
31
|
+
# FEATURE CONFIGURATION (Future Buckets)
|
|
32
|
+
# =============================================================================
|
|
33
|
+
|
|
34
|
+
# File Watching (Bucket 2)
|
|
35
|
+
WATCH_ENABLED=true
|
|
36
|
+
WATCH_RECURSIVE=true
|
|
37
|
+
WATCH_IGNORE_DOTFILES=true
|
|
38
|
+
WATCH_DEBOUNCE_MS=100
|
|
39
|
+
|
|
40
|
+
# Compression (Bucket 3)
|
|
41
|
+
COMPRESSION_ENABLED=true
|
|
42
|
+
COMPRESSION_LEVEL=6
|
|
43
|
+
COMPRESSION_FORMAT=zip
|
|
44
|
+
|
|
45
|
+
# Tunneling (Bucket 4) - Multi-Service Configuration
|
|
46
|
+
TUNNEL_SERVICE=kadi
|
|
47
|
+
TUNNEL_FALLBACK_SERVICES=ngrok,serveo,localtunnel
|
|
48
|
+
TUNNEL_AUTH_TOKEN=
|
|
49
|
+
TUNNEL_SUBDOMAIN=
|
|
50
|
+
TUNNEL_REGION=us
|
|
51
|
+
TUNNEL_AUTO_FALLBACK=true
|
|
52
|
+
|
|
53
|
+
# Ngrok-specific configuration
|
|
54
|
+
NGROK_AUTH_TOKEN=your-ngrok-auth-token
|
|
55
|
+
NGROK_REGION=us
|
|
56
|
+
NGROK_PROTOCOL=http
|
|
57
|
+
|
|
58
|
+
# KĀDI Tunnel Configuration
|
|
59
|
+
KADI_TUNNEL_SERVER=broker.kadi.build
|
|
60
|
+
KADI_TUNNEL_SSH_PORT=2200
|
|
61
|
+
KADI_TUNNEL_TOKEN=your-kadi-tunnel-token
|
|
62
|
+
KADI_TUNNEL_DOMAIN=tunnel.kadi.build
|
|
63
|
+
KADI_TUNNEL_MODE=frpc
|
|
64
|
+
KADI_TUNNEL_TRANSPORT=wss
|
|
65
|
+
KADI_TUNNEL_WSS_HOST=tunnel-control.kadi.build
|
|
66
|
+
KADI_AGENT_ID=kadi
|
|
67
|
+
|
|
68
|
+
|
|
69
|
+
# Logging
|
|
70
|
+
LOG_LEVEL=info
|
|
71
|
+
ENABLE_FILE_LOGGING=false
|
|
72
|
+
LOG_FILE_PATH=./logs/application.log
|
package/README.md
CHANGED
|
@@ -16,6 +16,7 @@
|
|
|
16
16
|
**Type-Safe** - Complete TypeScript support with zero `any` types
|
|
17
17
|
**Delightful API** - Simple for common tasks, powerful for advanced use cases
|
|
18
18
|
**Flexible Wallet Support** - Human approval (WalletConnect) or autonomous signing (agents)
|
|
19
|
+
**Autonomous Mode** - Fully automated deployments with secure secrets integration
|
|
19
20
|
**Well-Documented** - Comprehensive JSDoc with IntelliSense
|
|
20
21
|
**Production-Ready** - Handles Akash Network complexity elegantly
|
|
21
22
|
|
|
@@ -167,6 +168,30 @@ if (result.success) {
|
|
|
167
168
|
}
|
|
168
169
|
```
|
|
169
170
|
|
|
171
|
+
### Autonomous Deployment (Agent-Controlled)
|
|
172
|
+
|
|
173
|
+
For fully automated deployments with secrets integration:
|
|
174
|
+
|
|
175
|
+
```typescript
|
|
176
|
+
import { createSecretsProvider, deployToAkash } from 'deploy-ability';
|
|
177
|
+
|
|
178
|
+
// In a KADI agent:
|
|
179
|
+
const secrets = createSecretsProvider(this.secrets);
|
|
180
|
+
|
|
181
|
+
const result = await deployToAkash({
|
|
182
|
+
autonomous: { secrets, bidStrategy: 'cheapest' },
|
|
183
|
+
projectRoot: process.cwd(),
|
|
184
|
+
profile: 'production',
|
|
185
|
+
network: 'mainnet',
|
|
186
|
+
});
|
|
187
|
+
|
|
188
|
+
if (result.success) {
|
|
189
|
+
console.log(`Deployed! DSEQ: ${result.data.dseq}`);
|
|
190
|
+
}
|
|
191
|
+
```
|
|
192
|
+
|
|
193
|
+
See [Autonomous Deployment with Secrets Integration](#autonomous-deployment-with-secrets-integration) for full details.
|
|
194
|
+
|
|
170
195
|
### Deploy to Local Docker
|
|
171
196
|
|
|
172
197
|
```typescript
|
|
@@ -329,6 +354,221 @@ class SelfDeployingAgent {
|
|
|
329
354
|
|
|
330
355
|
---
|
|
331
356
|
|
|
357
|
+
## Autonomous Deployment with Secrets Integration
|
|
358
|
+
|
|
359
|
+
For fully automated deployments, deploy-ability integrates with KADI's `secret-ability` to securely retrieve wallet mnemonics from encrypted vaults. This enables agents to deploy without any user interaction while keeping secrets secure.
|
|
360
|
+
|
|
361
|
+
### How It Works
|
|
362
|
+
|
|
363
|
+
```mermaid
|
|
364
|
+
sequenceDiagram
|
|
365
|
+
participant Agent as KADI Agent
|
|
366
|
+
participant Secrets as secret-ability
|
|
367
|
+
participant Keychain as OS Keychain
|
|
368
|
+
participant Deploy as deploy-ability
|
|
369
|
+
participant Akash as Akash Network
|
|
370
|
+
|
|
371
|
+
Agent->>Secrets: Get mnemonic from vault
|
|
372
|
+
Secrets->>Keychain: Get master key
|
|
373
|
+
Keychain-->>Secrets: Master key
|
|
374
|
+
Secrets-->>Agent: Decrypted mnemonic
|
|
375
|
+
Agent->>Deploy: deployToAkash({ autonomous: { secrets } })
|
|
376
|
+
Deploy->>Akash: Create deployment (auto-sign)
|
|
377
|
+
Akash-->>Deploy: Deployment result
|
|
378
|
+
Deploy-->>Agent: Success!
|
|
379
|
+
```
|
|
380
|
+
|
|
381
|
+
### Vault Configuration
|
|
382
|
+
|
|
383
|
+
Secrets are stored in a **global vault** at the machine level:
|
|
384
|
+
|
|
385
|
+
| Setting | Value |
|
|
386
|
+
|---------|-------|
|
|
387
|
+
| Config Path | `~/.kadi/secrets/config.toml` |
|
|
388
|
+
| Vault Name | `global` |
|
|
389
|
+
| Vault Type | `age` (ChaCha20-Poly1305 encryption) |
|
|
390
|
+
| Master Key | Stored in OS Keychain (macOS Keychain, GNOME Keyring, etc.) |
|
|
391
|
+
|
|
392
|
+
### Secret Keys
|
|
393
|
+
|
|
394
|
+
| Key | Description |
|
|
395
|
+
|-----|-------------|
|
|
396
|
+
| `AKASH_WALLET` | BIP39 mnemonic phrase (12 or 24 words) |
|
|
397
|
+
| `akash-tls-certificate` | Cached TLS certificate for provider communication |
|
|
398
|
+
| `akash-wallet-password` | Optional BIP39 passphrase |
|
|
399
|
+
|
|
400
|
+
### Setup: Store Your Mnemonic
|
|
401
|
+
|
|
402
|
+
Before using autonomous deployment, store your mnemonic in the global vault:
|
|
403
|
+
|
|
404
|
+
```bash
|
|
405
|
+
# Using KADI CLI
|
|
406
|
+
kadi secrets set --vault global --key AKASH_WALLET --value "your 12 or 24 word mnemonic phrase here"
|
|
407
|
+
```
|
|
408
|
+
|
|
409
|
+
Or programmatically with secret-ability:
|
|
410
|
+
|
|
411
|
+
```typescript
|
|
412
|
+
// 1. Create the global vault (one-time)
|
|
413
|
+
await secrets.invoke('config.createVault', {
|
|
414
|
+
configPath: '~/.kadi/secrets/config.toml',
|
|
415
|
+
name: 'global',
|
|
416
|
+
type: 'age'
|
|
417
|
+
});
|
|
418
|
+
|
|
419
|
+
// 2. Store the mnemonic
|
|
420
|
+
await secrets.invoke('set', {
|
|
421
|
+
configPath: '~/.kadi/secrets/config.toml',
|
|
422
|
+
vault: 'global',
|
|
423
|
+
key: 'AKASH_WALLET',
|
|
424
|
+
value: 'your 12 or 24 word mnemonic phrase here'
|
|
425
|
+
});
|
|
426
|
+
```
|
|
427
|
+
|
|
428
|
+
### Usage: Autonomous Deployment
|
|
429
|
+
|
|
430
|
+
#### Option 1: Using `createSecretsProvider` (Recommended)
|
|
431
|
+
|
|
432
|
+
Integrates directly with KADI's secret-ability:
|
|
433
|
+
|
|
434
|
+
```typescript
|
|
435
|
+
import {
|
|
436
|
+
createSecretsProvider,
|
|
437
|
+
deployToAkash
|
|
438
|
+
} from 'deploy-ability';
|
|
439
|
+
|
|
440
|
+
// In a KADI agent context:
|
|
441
|
+
class DeploymentAgent {
|
|
442
|
+
async deploy(profile: string) {
|
|
443
|
+
// Create secrets provider from secret-ability client
|
|
444
|
+
const secrets = createSecretsProvider(this.secrets);
|
|
445
|
+
|
|
446
|
+
// Deploy autonomously - no user interaction needed!
|
|
447
|
+
const result = await deployToAkash({
|
|
448
|
+
autonomous: {
|
|
449
|
+
secrets,
|
|
450
|
+
bidStrategy: 'cheapest', // or 'most-reliable'
|
|
451
|
+
},
|
|
452
|
+
projectRoot: process.cwd(),
|
|
453
|
+
profile,
|
|
454
|
+
network: 'mainnet',
|
|
455
|
+
});
|
|
456
|
+
|
|
457
|
+
if (result.success) {
|
|
458
|
+
console.log(`Deployed! DSEQ: ${result.data.dseq}`);
|
|
459
|
+
console.log(`Provider: ${result.data.providerUri}`);
|
|
460
|
+
}
|
|
461
|
+
|
|
462
|
+
return result;
|
|
463
|
+
}
|
|
464
|
+
}
|
|
465
|
+
```
|
|
466
|
+
|
|
467
|
+
#### Option 2: Using `createSimpleMnemonicProvider` (Testing)
|
|
468
|
+
|
|
469
|
+
For testing or when secret-ability is not available:
|
|
470
|
+
|
|
471
|
+
```typescript
|
|
472
|
+
import {
|
|
473
|
+
createSimpleMnemonicProvider,
|
|
474
|
+
deployToAkash
|
|
475
|
+
} from 'deploy-ability';
|
|
476
|
+
|
|
477
|
+
// ⚠️ For testing only - mnemonic stored in memory
|
|
478
|
+
const secrets = createSimpleMnemonicProvider(
|
|
479
|
+
'test test test test test test test test test test test junk'
|
|
480
|
+
);
|
|
481
|
+
|
|
482
|
+
const result = await deployToAkash({
|
|
483
|
+
autonomous: {
|
|
484
|
+
secrets,
|
|
485
|
+
bidStrategy: 'cheapest',
|
|
486
|
+
},
|
|
487
|
+
projectRoot: './my-app',
|
|
488
|
+
profile: 'production',
|
|
489
|
+
network: 'testnet', // Use testnet for testing!
|
|
490
|
+
});
|
|
491
|
+
```
|
|
492
|
+
|
|
493
|
+
#### Option 3: Custom SecretsProvider
|
|
494
|
+
|
|
495
|
+
Implement the `SecretsProvider` interface for custom secret backends:
|
|
496
|
+
|
|
497
|
+
```typescript
|
|
498
|
+
import { deployToAkash, SecretsProvider } from 'deploy-ability';
|
|
499
|
+
|
|
500
|
+
// Custom provider (e.g., AWS Secrets Manager, HashiCorp Vault)
|
|
501
|
+
const customSecrets: SecretsProvider = {
|
|
502
|
+
async getMnemonic() {
|
|
503
|
+
// Fetch from your secret backend
|
|
504
|
+
return await mySecretManager.getSecret('akash-wallet-mnemonic');
|
|
505
|
+
},
|
|
506
|
+
|
|
507
|
+
async getCertificate() {
|
|
508
|
+
// Optional: return cached certificate
|
|
509
|
+
const cert = await mySecretManager.getSecret('akash-certificate');
|
|
510
|
+
return cert ? JSON.parse(cert) : null;
|
|
511
|
+
},
|
|
512
|
+
|
|
513
|
+
async storeCertificate(cert) {
|
|
514
|
+
// Optional: cache the certificate
|
|
515
|
+
await mySecretManager.setSecret('akash-certificate', JSON.stringify(cert));
|
|
516
|
+
},
|
|
517
|
+
};
|
|
518
|
+
|
|
519
|
+
const result = await deployToAkash({
|
|
520
|
+
autonomous: { secrets: customSecrets, bidStrategy: 'cheapest' },
|
|
521
|
+
projectRoot: './my-app',
|
|
522
|
+
profile: 'production',
|
|
523
|
+
network: 'mainnet',
|
|
524
|
+
});
|
|
525
|
+
```
|
|
526
|
+
|
|
527
|
+
### Bid Selection Strategies
|
|
528
|
+
|
|
529
|
+
When deploying autonomously, you must specify a bid selection strategy:
|
|
530
|
+
|
|
531
|
+
| Strategy | Description |
|
|
532
|
+
|----------|-------------|
|
|
533
|
+
| `'cheapest'` | Select the lowest price bid |
|
|
534
|
+
| `'most-reliable'` | Select the bid with highest provider uptime |
|
|
535
|
+
| `'balanced'` | Balance between price and provider reliability |
|
|
536
|
+
|
|
537
|
+
You can also add filters:
|
|
538
|
+
|
|
539
|
+
```typescript
|
|
540
|
+
autonomous: {
|
|
541
|
+
secrets,
|
|
542
|
+
bidStrategy: 'cheapest',
|
|
543
|
+
bidFilter: {
|
|
544
|
+
maxPricePerMonth: { uakt: 5_000_000 }, // Max 5 AKT/month
|
|
545
|
+
requireAudited: true, // Only audited providers
|
|
546
|
+
minUptime: { value: 0.95, period: '7d' }, // 95% uptime over 7 days
|
|
547
|
+
},
|
|
548
|
+
}
|
|
549
|
+
```
|
|
550
|
+
|
|
551
|
+
### Exported Constants
|
|
552
|
+
|
|
553
|
+
For programmatic access to configuration:
|
|
554
|
+
|
|
555
|
+
```typescript
|
|
556
|
+
import {
|
|
557
|
+
AKASH_VAULT_NAME, // 'global'
|
|
558
|
+
GLOBAL_CONFIG_PATH, // '~/.kadi/secrets/config.toml'
|
|
559
|
+
AKASH_SECRET_KEYS, // { WALLET_MNEMONIC: 'AKASH_WALLET', ... }
|
|
560
|
+
} from 'deploy-ability';
|
|
561
|
+
```
|
|
562
|
+
|
|
563
|
+
### Security Model
|
|
564
|
+
|
|
565
|
+
1. **Encrypted at Rest**: Secrets are encrypted with ChaCha20-Poly1305 in `config.toml`
|
|
566
|
+
2. **Master Key in Keychain**: The encryption key is stored in the OS keychain (never in files)
|
|
567
|
+
3. **No Plaintext**: Mnemonics are never written to disk in plaintext
|
|
568
|
+
4. **Per-Machine**: Secrets are tied to the machine's keychain - can't be copied
|
|
569
|
+
|
|
570
|
+
---
|
|
571
|
+
|
|
332
572
|
## Error Handling
|
|
333
573
|
|
|
334
574
|
deploy-ability uses a **Result type pattern** for predictable error handling:
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Error utility functions
|
|
3
|
+
*
|
|
4
|
+
* Provides safe error message extraction for catch blocks
|
|
5
|
+
*
|
|
6
|
+
* @module errors/error-utils
|
|
7
|
+
*/
|
|
8
|
+
/**
|
|
9
|
+
* Extract a safe error message from an unknown caught error.
|
|
10
|
+
*
|
|
11
|
+
* Handles:
|
|
12
|
+
* - Error objects (extracts .message)
|
|
13
|
+
* - String errors (returns as-is)
|
|
14
|
+
* - Objects with circular references (safe stringification)
|
|
15
|
+
* - Primitive values (converts to string)
|
|
16
|
+
*
|
|
17
|
+
* @param error - The caught error (unknown type from catch blocks)
|
|
18
|
+
* @returns A string message safe for logging and interpolation
|
|
19
|
+
*
|
|
20
|
+
* @example
|
|
21
|
+
* ```typescript
|
|
22
|
+
* try {
|
|
23
|
+
* await riskyOperation();
|
|
24
|
+
* } catch (error) {
|
|
25
|
+
* const errMsg = getErrorMessage(error);
|
|
26
|
+
* logger.error(`Operation failed: ${errMsg}`);
|
|
27
|
+
* }
|
|
28
|
+
* ```
|
|
29
|
+
*/
|
|
30
|
+
export declare function getErrorMessage(error: unknown): string;
|
|
31
|
+
//# sourceMappingURL=error-utils.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"error-utils.d.ts","sourceRoot":"","sources":["../../src/errors/error-utils.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,wBAAgB,eAAe,CAAC,KAAK,EAAE,OAAO,GAAG,MAAM,CAYtD"}
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Error utility functions
|
|
3
|
+
*
|
|
4
|
+
* Provides safe error message extraction for catch blocks
|
|
5
|
+
*
|
|
6
|
+
* @module errors/error-utils
|
|
7
|
+
*/
|
|
8
|
+
/**
|
|
9
|
+
* Extract a safe error message from an unknown caught error.
|
|
10
|
+
*
|
|
11
|
+
* Handles:
|
|
12
|
+
* - Error objects (extracts .message)
|
|
13
|
+
* - String errors (returns as-is)
|
|
14
|
+
* - Objects with circular references (safe stringification)
|
|
15
|
+
* - Primitive values (converts to string)
|
|
16
|
+
*
|
|
17
|
+
* @param error - The caught error (unknown type from catch blocks)
|
|
18
|
+
* @returns A string message safe for logging and interpolation
|
|
19
|
+
*
|
|
20
|
+
* @example
|
|
21
|
+
* ```typescript
|
|
22
|
+
* try {
|
|
23
|
+
* await riskyOperation();
|
|
24
|
+
* } catch (error) {
|
|
25
|
+
* const errMsg = getErrorMessage(error);
|
|
26
|
+
* logger.error(`Operation failed: ${errMsg}`);
|
|
27
|
+
* }
|
|
28
|
+
* ```
|
|
29
|
+
*/
|
|
30
|
+
export function getErrorMessage(error) {
|
|
31
|
+
if (error instanceof Error && error.message) {
|
|
32
|
+
return error.message;
|
|
33
|
+
}
|
|
34
|
+
if (typeof error === 'string') {
|
|
35
|
+
return error;
|
|
36
|
+
}
|
|
37
|
+
try {
|
|
38
|
+
return String(error);
|
|
39
|
+
}
|
|
40
|
+
catch {
|
|
41
|
+
return 'Unknown error';
|
|
42
|
+
}
|
|
43
|
+
}
|
|
44
|
+
//# sourceMappingURL=error-utils.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"error-utils.js","sourceRoot":"","sources":["../../src/errors/error-utils.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAM,UAAU,eAAe,CAAC,KAAc;IAC5C,IAAI,KAAK,YAAY,KAAK,IAAI,KAAK,CAAC,OAAO,EAAE,CAAC;QAC5C,OAAO,KAAK,CAAC,OAAO,CAAC;IACvB,CAAC;IACD,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;QAC9B,OAAO,KAAK,CAAC;IACf,CAAC;IACD,IAAI,CAAC;QACH,OAAO,MAAM,CAAC,KAAK,CAAC,CAAC;IACvB,CAAC;IAAC,MAAM,CAAC;QACP,OAAO,eAAe,CAAC;IACzB,CAAC;AACH,CAAC"}
|
package/dist/errors/index.d.ts
CHANGED
|
@@ -10,4 +10,5 @@ export { WalletError, isWalletError, WalletErrorCodes, walletNotFoundError, conn
|
|
|
10
10
|
export { CertificateError, isCertificateError, CertificateErrorCodes, certificateNotFoundError, certificateInvalidError, certificateExpiredError, certificateCreationFailedError, certificateBroadcastFailedError, type CertificateErrorCode, } from './certificate-error.js';
|
|
11
11
|
export { ProviderError, isProviderError, ProviderErrorCodes, providerUnreachableError, manifestRejectedError, noBidsReceivedError, containerTimeoutError, containerStartFailedError, type ProviderErrorCode, } from './provider-error.js';
|
|
12
12
|
export { ProfileError, isProfileError, ProfileErrorCodes, agentJsonNotFoundError, agentJsonParseError, profileNotFoundError, noProfilesDefinedError, profileInvalidError, serviceConfigInvalidError, type ProfileErrorCode, } from './profile-error.js';
|
|
13
|
+
export { getErrorMessage } from './error-utils.js';
|
|
13
14
|
//# sourceMappingURL=index.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/errors/index.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAGH,OAAO,EACL,eAAe,EACf,iBAAiB,EACjB,KAAK,YAAY,EACjB,KAAK,aAAa,GACnB,MAAM,uBAAuB,CAAC;AAG/B,OAAO,EACL,WAAW,EACX,aAAa,EACb,gBAAgB,EAChB,mBAAmB,EACnB,uBAAuB,EACvB,sBAAsB,EACtB,iBAAiB,EACjB,kBAAkB,EAClB,oBAAoB,EACpB,KAAK,eAAe,GACrB,MAAM,mBAAmB,CAAC;AAG3B,OAAO,EACL,gBAAgB,EAChB,kBAAkB,EAClB,qBAAqB,EACrB,wBAAwB,EACxB,uBAAuB,EACvB,uBAAuB,EACvB,8BAA8B,EAC9B,+BAA+B,EAC/B,KAAK,oBAAoB,GAC1B,MAAM,wBAAwB,CAAC;AAGhC,OAAO,EACL,aAAa,EACb,eAAe,EACf,kBAAkB,EAClB,wBAAwB,EACxB,qBAAqB,EACrB,mBAAmB,EACnB,qBAAqB,EACrB,yBAAyB,EACzB,KAAK,iBAAiB,GACvB,MAAM,qBAAqB,CAAC;AAG7B,OAAO,EACL,YAAY,EACZ,cAAc,EACd,iBAAiB,EACjB,sBAAsB,EACtB,mBAAmB,EACnB,oBAAoB,EACpB,sBAAsB,EACtB,mBAAmB,EACnB,yBAAyB,EACzB,KAAK,gBAAgB,GACtB,MAAM,oBAAoB,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/errors/index.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAGH,OAAO,EACL,eAAe,EACf,iBAAiB,EACjB,KAAK,YAAY,EACjB,KAAK,aAAa,GACnB,MAAM,uBAAuB,CAAC;AAG/B,OAAO,EACL,WAAW,EACX,aAAa,EACb,gBAAgB,EAChB,mBAAmB,EACnB,uBAAuB,EACvB,sBAAsB,EACtB,iBAAiB,EACjB,kBAAkB,EAClB,oBAAoB,EACpB,KAAK,eAAe,GACrB,MAAM,mBAAmB,CAAC;AAG3B,OAAO,EACL,gBAAgB,EAChB,kBAAkB,EAClB,qBAAqB,EACrB,wBAAwB,EACxB,uBAAuB,EACvB,uBAAuB,EACvB,8BAA8B,EAC9B,+BAA+B,EAC/B,KAAK,oBAAoB,GAC1B,MAAM,wBAAwB,CAAC;AAGhC,OAAO,EACL,aAAa,EACb,eAAe,EACf,kBAAkB,EAClB,wBAAwB,EACxB,qBAAqB,EACrB,mBAAmB,EACnB,qBAAqB,EACrB,yBAAyB,EACzB,KAAK,iBAAiB,GACvB,MAAM,qBAAqB,CAAC;AAG7B,OAAO,EACL,YAAY,EACZ,cAAc,EACd,iBAAiB,EACjB,sBAAsB,EACtB,mBAAmB,EACnB,oBAAoB,EACpB,sBAAsB,EACtB,mBAAmB,EACnB,yBAAyB,EACzB,KAAK,gBAAgB,GACtB,MAAM,oBAAoB,CAAC;AAG5B,OAAO,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC"}
|
package/dist/errors/index.js
CHANGED
|
@@ -15,4 +15,6 @@ export { CertificateError, isCertificateError, CertificateErrorCodes, certificat
|
|
|
15
15
|
export { ProviderError, isProviderError, ProviderErrorCodes, providerUnreachableError, manifestRejectedError, noBidsReceivedError, containerTimeoutError, containerStartFailedError, } from './provider-error.js';
|
|
16
16
|
// Profile errors
|
|
17
17
|
export { ProfileError, isProfileError, ProfileErrorCodes, agentJsonNotFoundError, agentJsonParseError, profileNotFoundError, noProfilesDefinedError, profileInvalidError, serviceConfigInvalidError, } from './profile-error.js';
|
|
18
|
+
// Error utilities
|
|
19
|
+
export { getErrorMessage } from './error-utils.js';
|
|
18
20
|
//# sourceMappingURL=index.js.map
|
package/dist/errors/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/errors/index.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,aAAa;AACb,OAAO,EACL,eAAe,EACf,iBAAiB,GAGlB,MAAM,uBAAuB,CAAC;AAE/B,gBAAgB;AAChB,OAAO,EACL,WAAW,EACX,aAAa,EACb,gBAAgB,EAChB,mBAAmB,EACnB,uBAAuB,EACvB,sBAAsB,EACtB,iBAAiB,EACjB,kBAAkB,EAClB,oBAAoB,GAErB,MAAM,mBAAmB,CAAC;AAE3B,qBAAqB;AACrB,OAAO,EACL,gBAAgB,EAChB,kBAAkB,EAClB,qBAAqB,EACrB,wBAAwB,EACxB,uBAAuB,EACvB,uBAAuB,EACvB,8BAA8B,EAC9B,+BAA+B,GAEhC,MAAM,wBAAwB,CAAC;AAEhC,kBAAkB;AAClB,OAAO,EACL,aAAa,EACb,eAAe,EACf,kBAAkB,EAClB,wBAAwB,EACxB,qBAAqB,EACrB,mBAAmB,EACnB,qBAAqB,EACrB,yBAAyB,GAE1B,MAAM,qBAAqB,CAAC;AAE7B,iBAAiB;AACjB,OAAO,EACL,YAAY,EACZ,cAAc,EACd,iBAAiB,EACjB,sBAAsB,EACtB,mBAAmB,EACnB,oBAAoB,EACpB,sBAAsB,EACtB,mBAAmB,EACnB,yBAAyB,GAE1B,MAAM,oBAAoB,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/errors/index.ts"],"names":[],"mappings":"AAAA;;;;;;GAMG;AAEH,aAAa;AACb,OAAO,EACL,eAAe,EACf,iBAAiB,GAGlB,MAAM,uBAAuB,CAAC;AAE/B,gBAAgB;AAChB,OAAO,EACL,WAAW,EACX,aAAa,EACb,gBAAgB,EAChB,mBAAmB,EACnB,uBAAuB,EACvB,sBAAsB,EACtB,iBAAiB,EACjB,kBAAkB,EAClB,oBAAoB,GAErB,MAAM,mBAAmB,CAAC;AAE3B,qBAAqB;AACrB,OAAO,EACL,gBAAgB,EAChB,kBAAkB,EAClB,qBAAqB,EACrB,wBAAwB,EACxB,uBAAuB,EACvB,uBAAuB,EACvB,8BAA8B,EAC9B,+BAA+B,GAEhC,MAAM,wBAAwB,CAAC;AAEhC,kBAAkB;AAClB,OAAO,EACL,aAAa,EACb,eAAe,EACf,kBAAkB,EAClB,wBAAwB,EACxB,qBAAqB,EACrB,mBAAmB,EACnB,qBAAqB,EACrB,yBAAyB,GAE1B,MAAM,qBAAqB,CAAC;AAE7B,iBAAiB;AACjB,OAAO,EACL,YAAY,EACZ,cAAc,EACd,iBAAiB,EACjB,sBAAsB,EACtB,mBAAmB,EACnB,oBAAoB,EACpB,sBAAsB,EACtB,mBAAmB,EACnB,yBAAyB,GAE1B,MAAM,oBAAoB,CAAC;AAE5B,kBAAkB;AAClB,OAAO,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"certificate-manager.d.ts","sourceRoot":"","sources":["../../../src/targets/akash/certificate-manager.ts"],"names":[],"mappings":"AAAA;;;;;;;GAOG;AAKH,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AACnD,OAAO,KAAK,EAAE,2BAA2B,EAAE,MAAM,YAAY,CAAC;AAC9D,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAE/C,OAAO,EAAE,gBAAgB,
|
|
1
|
+
{"version":3,"file":"certificate-manager.d.ts","sourceRoot":"","sources":["../../../src/targets/akash/certificate-manager.ts"],"names":[],"mappings":"AAAA;;;;;;;GAOG;AAKH,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AACnD,OAAO,KAAK,EAAE,2BAA2B,EAAE,MAAM,YAAY,CAAC;AAC9D,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAE/C,OAAO,EAAE,gBAAgB,EAA0C,MAAM,uBAAuB,CAAC;AAEjG,+CAA+C;AAC/C,MAAM,WAAW,eAAe;IAC9B,IAAI,EAAE,MAAM,CAAC;IACb,UAAU,EAAE,MAAM,CAAC;IACnB,SAAS,EAAE,MAAM,CAAC;IAClB,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB;AAED,mCAAmC;AACnC,MAAM,WAAW,0BAA0B;IACzC,eAAe,EAAE,MAAM,CAAC;IACxB,MAAM,EAAE,MAAM,CAAC;IACf,OAAO,EAAE,OAAO,CAAC;CAClB;AAED,uCAAuC;AACvC,MAAM,WAAW,sBAAsB;IACrC,MAAM,EAAE,OAAO,CAAC;IAChB,KAAK,EAAE,MAAM,CAAC;IACd,OAAO,EAAE,MAAM,EAAE,CAAC;CACnB;AAED,oCAAoC;AACpC,MAAM,WAAW,uBAAuB;IACtC,eAAe,EAAE,MAAM,CAAC;IACxB,MAAM,EAAE,MAAM,CAAC;IACf,OAAO,EAAE,OAAO,CAAC;IACjB,YAAY,EAAE,MAAM,CAAC;IACrB,cAAc,EAAE,MAAM,EAAE,CAAC;CAC1B;AAED;;;;;;;;;;;;;;;GAeG;AACH,wBAAsB,mBAAmB,CACvC,aAAa,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,2BAA2B,EAAE,gBAAgB,CAAC,CAAC,CAsChE;AAED;;;;;;;;;;;;;;;GAeG;AACH,wBAAgB,gBAAgB,CAC9B,IAAI,EAAE,OAAO,GACZ,MAAM,CAAC,2BAA2B,EAAE,gBAAgB,CAAC,CAqDvD;AAED;;;;;GAKG;AACH,qBAAa,kBAAkB;IAC7B,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAc;IAErC;;;;;;;;;;OAUG;gBACS,MAAM,EAAE,WAAW;IAI/B;;;;;;;;;;;;;;;OAeG;IACG,KAAK,CACT,aAAa,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,sBAAsB,GAAG,IAAI,EAAE,gBAAgB,CAAC,CAAC;IAoCnE;;;;;;;;;;;;;;;;;;;;OAoBG;IACG,SAAS,CACb,aAAa,EAAE,MAAM,EACrB,WAAW,EAAE,2BAA2B,GACvC,OAAO,CAAC,MAAM,CAAC,0BAA0B,EAAE,gBAAgB,CAAC,CAAC;IAqDhE;;;;;;;;;;;;;;;;;;;;OAoBG;IACG,MAAM,CACV,aAAa,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,uBAAuB,EAAE,gBAAgB,CAAC,CAAC;IA0E7D;;;;;;;;;;;;;;;;;;;;;OAqBG;IACG,WAAW,CACf,aAAa,EAAE,MAAM,EACrB,OAAO,CAAC,EAAE;QACR,mBAAmB,CAAC,EAAE,2BAA2B,CAAC;KACnD,GACA,OAAO,CAAC,MAAM,CAAC,2BAA2B,EAAE,gBAAgB,CAAC,CAAC;CAoDlE"}
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
*/
|
|
9
9
|
import { certificateManager } from '@akashnetwork/chain-sdk';
|
|
10
10
|
import { success, failure } from '../../types/index.js';
|
|
11
|
-
import { CertificateError, CertificateErrorCodes } from '../../errors/index.js';
|
|
11
|
+
import { CertificateError, CertificateErrorCodes, getErrorMessage } from '../../errors/index.js';
|
|
12
12
|
/**
|
|
13
13
|
* Generate a new Akash certificate
|
|
14
14
|
*
|
|
@@ -49,7 +49,8 @@ export async function generateCertificate(walletAddress) {
|
|
|
49
49
|
return success(certificate);
|
|
50
50
|
}
|
|
51
51
|
catch (error) {
|
|
52
|
-
|
|
52
|
+
const errMsg = getErrorMessage(error);
|
|
53
|
+
return failure(new CertificateError(`Failed to generate certificate: ${errMsg}`, CertificateErrorCodes.CERT_CREATION_FAILED, { error: errMsg }));
|
|
53
54
|
}
|
|
54
55
|
}
|
|
55
56
|
/**
|
|
@@ -99,7 +100,8 @@ export function parseCertificate(json) {
|
|
|
99
100
|
});
|
|
100
101
|
}
|
|
101
102
|
catch (error) {
|
|
102
|
-
|
|
103
|
+
const errMsg = getErrorMessage(error);
|
|
104
|
+
return failure(new CertificateError(`Failed to parse certificate: ${errMsg}`, CertificateErrorCodes.CERT_INVALID, { error: errMsg }));
|
|
103
105
|
}
|
|
104
106
|
}
|
|
105
107
|
/**
|
|
@@ -226,7 +228,8 @@ export class CertificateManager {
|
|
|
226
228
|
});
|
|
227
229
|
}
|
|
228
230
|
catch (error) {
|
|
229
|
-
|
|
231
|
+
const errMsg = getErrorMessage(error);
|
|
232
|
+
return failure(new CertificateError(`Failed to broadcast certificate: ${errMsg}`, CertificateErrorCodes.CERT_BROADCAST_FAILED, { error: errMsg }));
|
|
230
233
|
}
|
|
231
234
|
}
|
|
232
235
|
/**
|
|
@@ -296,7 +299,8 @@ export class CertificateManager {
|
|
|
296
299
|
});
|
|
297
300
|
}
|
|
298
301
|
catch (error) {
|
|
299
|
-
|
|
302
|
+
const errMsg = getErrorMessage(error);
|
|
303
|
+
return failure(new CertificateError(`Failed to revoke certificate: ${errMsg}`, CertificateErrorCodes.CERT_REVOKE_FAILED, { error: errMsg }));
|
|
300
304
|
}
|
|
301
305
|
}
|
|
302
306
|
/**
|
|
@@ -354,7 +358,8 @@ export class CertificateManager {
|
|
|
354
358
|
return success(generateResult.data);
|
|
355
359
|
}
|
|
356
360
|
catch (error) {
|
|
357
|
-
|
|
361
|
+
const errMsg = getErrorMessage(error);
|
|
362
|
+
return failure(new CertificateError(`Failed to ensure certificate: ${errMsg}`, CertificateErrorCodes.CERT_ERROR, { error: errMsg }));
|
|
358
363
|
}
|
|
359
364
|
}
|
|
360
365
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"certificate-manager.js","sourceRoot":"","sources":["../../../src/targets/akash/certificate-manager.ts"],"names":[],"mappings":"AAAA;;;;;;;GAOG;AAEH,OAAO,EAAE,kBAAkB,EAAuB,MAAM,yBAAyB,CAAC;AAMlF,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,MAAM,sBAAsB,CAAC;AACxD,OAAO,EAAE,gBAAgB,EAAE,qBAAqB,EAAE,MAAM,uBAAuB,CAAC;
|
|
1
|
+
{"version":3,"file":"certificate-manager.js","sourceRoot":"","sources":["../../../src/targets/akash/certificate-manager.ts"],"names":[],"mappings":"AAAA;;;;;;;GAOG;AAEH,OAAO,EAAE,kBAAkB,EAAuB,MAAM,yBAAyB,CAAC;AAMlF,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,MAAM,sBAAsB,CAAC;AACxD,OAAO,EAAE,gBAAgB,EAAE,qBAAqB,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AAiCjG;;;;;;;;;;;;;;;GAeG;AACH,MAAM,CAAC,KAAK,UAAU,mBAAmB,CACvC,aAAqB;IAErB,IAAI,CAAC;QACH,yCAAyC;QACzC,IAAI,CAAC,aAAa,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC;YACzD,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,+BAA+B,EAC/B,qBAAqB,CAAC,YAAY,EAClC,EAAE,aAAa,EAAE,CAClB,CAAC,CAAC;QACL,CAAC;QAED,iDAAiD;QACjD,oEAAoE;QACpE,MAAM,OAAO,GAAmB,MAAM,kBAAkB,CAAC,WAAW,CAAC,aAAa,CAAC,CAAC;QAEpF,wDAAwD;QACxD,MAAM,WAAW,GAAgC;YAC/C,IAAI,EAAE,OAAO,CAAC,IAAI;YAClB,SAAS,EAAE,OAAO,CAAC,SAAS;YAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;SAC/B,CAAC;QAEF,mDAAmD;QACnD,MAAM,gBAAgB,GAAG,gBAAgB,CAAC,WAAW,CAAC,CAAC;QACvD,IAAI,CAAC,gBAAgB,CAAC,OAAO,EAAE,CAAC;YAC9B,OAAO,gBAAgB,CAAC;QAC1B,CAAC;QAED,uCAAuC;QACvC,OAAO,OAAO,CAAC,WAAW,CAAC,CAAC;IAC9B,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,MAAM,MAAM,GAAG,eAAe,CAAC,KAAK,CAAC,CAAC;QACtC,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,mCAAmC,MAAM,EAAE,EAC3C,qBAAqB,CAAC,oBAAoB,EAC1C,EAAE,KAAK,EAAE,MAAM,EAAE,CAClB,CAAC,CAAC;IACL,CAAC;AACH,CAAC;AAED;;;;;;;;;;;;;;;GAeG;AACH,MAAM,UAAU,gBAAgB,CAC9B,IAAa;IAEb,IAAI,CAAC;QACH,sCAAsC;QACtC,IAAI,CAAC,IAAI,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;YACtC,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,+BAA+B,EAC/B,qBAAqB,CAAC,YAAY,EAClC,EAAE,YAAY,EAAE,OAAO,IAAI,EAAE,CAC9B,CAAC,CAAC;QACL,CAAC;QAED,MAAM,IAAI,GAAG,IAA+B,CAAC;QAE7C,sCAAsC;QACtC,MAAM,cAAc,GAAG,CAAC,MAAM,EAAE,YAAY,EAAE,WAAW,CAAC,CAAC;QAC3D,KAAK,MAAM,KAAK,IAAI,cAAc,EAAE,CAAC;YACnC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,OAAO,IAAI,CAAC,KAAK,CAAC,KAAK,QAAQ,EAAE,CAAC;gBACpD,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,0CAA0C,KAAK,EAAE,EACjD,qBAAqB,CAAC,YAAY,EAClC,EAAE,YAAY,EAAE,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CACrD,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,6CAA6C;QAC7C,8DAA8D;QAC9D,KAAK,MAAM,KAAK,IAAI,cAAc,EAAE,CAAC;YACnC,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAW,CAAC;YACtC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAC,EAAE,CAAC;gBACrE,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,qBAAqB,KAAK,uBAAuB,EACjD,qBAAqB,CAAC,YAAY,EAClC,EAAE,KAAK,EAAE,OAAO,EAAE,OAAO,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,KAAK,EAAE,CACrD,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,uCAAuC;QACvC,OAAO,OAAO,CAAC;YACb,IAAI,EAAE,IAAI,CAAC,IAAc;YACzB,UAAU,EAAE,IAAI,CAAC,UAAoB;YACrC,SAAS,EAAE,IAAI,CAAC,SAAmB;YACnC,KAAK,EAAE,IAAI,CAAC,KAA2B;SACxC,CAAC,CAAC;IACL,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,MAAM,MAAM,GAAG,eAAe,CAAC,KAAK,CAAC,CAAC;QACtC,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,gCAAgC,MAAM,EAAE,EACxC,qBAAqB,CAAC,YAAY,EAClC,EAAE,KAAK,EAAE,MAAM,EAAE,CAClB,CAAC,CAAC;IACL,CAAC;AACH,CAAC;AAED;;;;;GAKG;AACH,MAAM,OAAO,kBAAkB;IACZ,MAAM,CAAc;IAErC;;;;;;;;;;OAUG;IACH,YAAY,MAAmB;QAC7B,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;IACvB,CAAC;IAED;;;;;;;;;;;;;;;OAeG;IACH,KAAK,CAAC,KAAK,CACT,aAAqB;QAErB,IAAI,CAAC;YACH,2DAA2D;YAC3D,uDAAuD;YACvD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,eAAe,CAAC;gBACtE,MAAM,EAAE;oBACN,KAAK,EAAE,aAAa;oBACpB,KAAK,EAAE,OAAO;iBACf;aACF,CAAC,CAAC;YAEH,oCAAoC;YACpC,MAAM,YAAY,GAAG,QAAQ,CAAC,YAAY,IAAI,EAAE,CAAC;YACjD,MAAM,gBAAgB,GAAG,YAAY,CAAC,MAAM,CAAC;YAC7C,MAAM,iBAAiB,GAAG,gBAAgB,GAAG,CAAC,CAAC;YAE/C,IAAI,iBAAiB,EAAE,CAAC;gBACtB,uCAAuC;gBACvC,MAAM,OAAO,GAAG,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;gBAElD,OAAO,OAAO,CAAC;oBACb,MAAM,EAAE,IAAI;oBACZ,KAAK,EAAE,gBAAgB;oBACvB,OAAO;iBACR,CAAC,CAAC;YACL,CAAC;YAED,uBAAuB;YACvB,OAAO,OAAO,CAAC,IAAI,CAAC,CAAC;QACvB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,6DAA6D;YAC7D,oDAAoD;YACpD,OAAO,OAAO,CAAC,IAAI,CAAC,CAAC;QACvB,CAAC;IACH,CAAC;IAED;;;;;;;;;;;;;;;;;;;;OAoBG;IACH,KAAK,CAAC,SAAS,CACb,aAAqB,EACrB,WAAwC;QAExC,IAAI,CAAC;YACH,wCAAwC;YACxC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,EAAE,CAAC;gBAC3B,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,gEAAgE,EAChE,qBAAqB,CAAC,qBAAqB,EAC3C,EAAE,UAAU,EAAE,4CAA4C,EAAE,CAC7D,CAAC,CAAC;YACL,CAAC;YAED,iCAAiC;YACjC,MAAM,gBAAgB,GAAG,gBAAgB,CAAC,WAAW,CAAC,CAAC;YACvD,IAAI,CAAC,gBAAgB,CAAC,OAAO,EAAE,CAAC;gBAC9B,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,sCAAsC,EACtC,qBAAqB,CAAC,YAAY,EAClC,EAAE,aAAa,EAAE,gBAAgB,CAAC,KAAK,CAAC,OAAO,EAAE,CAClD,CAAC,CAAC;YACL,CAAC;YAED,+BAA+B;YAC/B,IAAI,MAAM,GAAG,EAAE,CAAC;YAChB,IAAI,QAAQ,GAAG,CAAC,CAAC;YAEjB,yDAAyD;YACzD,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,iBAAiB,CAAC;gBACvD,KAAK,EAAE,aAAa;gBACpB,IAAI,EAAE,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC;gBACnD,MAAM,EAAE,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC;aAC3D,EAAE;gBACD,cAAc,EAAE,CAAC,UAA6B,EAAE,EAAE;oBAChD,MAAM,GAAG,UAAU,CAAC,eAAe,CAAC;oBACpC,QAAQ,GAAG,UAAU,CAAC,MAAM,CAAC;gBAC/B,CAAC;aACF,CAAC,CAAC;YAEH,qCAAqC;YACrC,OAAO,OAAO,CAAC;gBACb,eAAe,EAAE,MAAM;gBACvB,MAAM,EAAE,QAAQ;gBAChB,OAAO,EAAE,IAAI;aACd,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,MAAM,GAAG,eAAe,CAAC,KAAK,CAAC,CAAC;YACtC,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,oCAAoC,MAAM,EAAE,EAC5C,qBAAqB,CAAC,qBAAqB,EAC3C,EAAE,KAAK,EAAE,MAAM,EAAE,CAClB,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;;;;;;;;;;;;;;;;;;;OAoBG;IACH,KAAK,CAAC,MAAM,CACV,aAAqB;QAErB,IAAI,CAAC;YACH,wCAAwC;YACxC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,EAAE,CAAC;gBAC3B,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,6DAA6D,EAC7D,qBAAqB,CAAC,kBAAkB,EACxC,EAAE,UAAU,EAAE,4CAA4C,EAAE,CAC7D,CAAC,CAAC;YACL,CAAC;YAED,yDAAyD;YACzD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;YAEpD,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,CAAC;gBACzB,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,uCAAuC,EACvC,qBAAqB,CAAC,kBAAkB,EACxC,EAAE,KAAK,EAAE,WAAW,CAAC,KAAK,EAAE,OAAO,EAAE,CACtC,CAAC,CAAC;YACL,CAAC;YAED,IAAI,CAAC,WAAW,CAAC,IAAI,IAAI,WAAW,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBAC/D,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,sCAAsC,EACtC,qBAAqB,CAAC,cAAc,EACpC,EAAE,aAAa,EAAE,CAClB,CAAC,CAAC;YACL,CAAC;YAED,MAAM,OAAO,GAAG,WAAW,CAAC,IAAI,CAAC,OAAO,CAAC;YACzC,MAAM,cAAc,GAAa,EAAE,CAAC;YAEpC,oDAAoD;YACpD,IAAI,MAAM,GAAG,EAAE,CAAC;YAChB,IAAI,QAAQ,GAAG,CAAC,CAAC;YAEjB,gCAAgC;YAChC,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE,CAAC;gBAC7B,IAAI,CAAC,MAAM;oBAAE,SAAS;gBAEtB,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,iBAAiB,CAAC;oBACvD,EAAE,EAAE;wBACF,KAAK,EAAE,aAAa;wBACpB,MAAM;qBACP;iBACF,EAAE;oBACD,cAAc,EAAE,CAAC,UAA6B,EAAE,EAAE;wBAChD,MAAM,GAAG,UAAU,CAAC,eAAe,CAAC;wBACpC,QAAQ,GAAG,UAAU,CAAC,MAAM,CAAC;oBAC/B,CAAC;iBACF,CAAC,CAAC;gBAEH,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAC9B,CAAC;YAED,kCAAkC;YAClC,OAAO,OAAO,CAAC;gBACb,eAAe,EAAE,MAAM;gBACvB,MAAM,EAAE,QAAQ;gBAChB,OAAO,EAAE,IAAI;gBACb,YAAY,EAAE,cAAc,CAAC,MAAM;gBACnC,cAAc;aACf,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,MAAM,GAAG,eAAe,CAAC,KAAK,CAAC,CAAC;YACtC,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,iCAAiC,MAAM,EAAE,EACzC,qBAAqB,CAAC,kBAAkB,EACxC,EAAE,KAAK,EAAE,MAAM,EAAE,CAClB,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;OAqBG;IACH,KAAK,CAAC,WAAW,CACf,aAAqB,EACrB,OAEC;QAED,IAAI,CAAC;YACH,yDAAyD;YACzD,IAAI,OAAO,EAAE,mBAAmB,EAAE,CAAC;gBACjC,MAAM,gBAAgB,GAAG,gBAAgB,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC;gBACvE,IAAI,gBAAgB,CAAC,OAAO,EAAE,CAAC;oBAC7B,OAAO,gBAAgB,CAAC;gBAC1B,CAAC;gBACD,sDAAsD;YACxD,CAAC;YAED,oDAAoD;YACpD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;YACpD,IAAI,WAAW,CAAC,OAAO,IAAI,WAAW,CAAC,IAAI,EAAE,CAAC;gBAC5C,iEAAiE;gBACjE,oEAAoE;gBACpE,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,+DAA+D,EAC/D,qBAAqB,CAAC,cAAc,EACpC;oBACE,UAAU,EACR,6DAA6D;iBAChE,CACF,CAAC,CAAC;YACL,CAAC;YAED,mCAAmC;YACnC,MAAM,cAAc,GAAG,MAAM,mBAAmB,CAAC,aAAa,CAAC,CAAC;YAChE,IAAI,CAAC,cAAc,CAAC,OAAO,EAAE,CAAC;gBAC5B,OAAO,cAAc,CAAC;YACxB,CAAC;YAED,kCAAkC;YAClC,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,SAAS,CAC1C,aAAa,EACb,cAAc,CAAC,IAAI,CACpB,CAAC;YACF,IAAI,CAAC,eAAe,CAAC,OAAO,EAAE,CAAC;gBAC7B,OAAO,OAAO,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;YACxC,CAAC;YAED,qDAAqD;YACrD,OAAO,OAAO,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QACtC,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,MAAM,GAAG,eAAe,CAAC,KAAK,CAAC,CAAC;YACtC,OAAO,OAAO,CAAC,IAAI,gBAAgB,CACjC,iCAAiC,MAAM,EAAE,EACzC,qBAAqB,CAAC,UAAU,EAChC,EAAE,KAAK,EAAE,MAAM,EAAE,CAClB,CAAC,CAAC;QACL,CAAC;IACH,CAAC;CACF"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../../src/targets/akash/client.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;GAoBG;AAEH,OAAO,IAAI,MAAM,MAAM,CAAC;AAGxB,OAAO,KAAK,EAAE,GAAG,IAAI,OAAO,EAAE,MAAM,yBAAyB,CAAC;AAG9D,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAEnD,OAAO,EAAE,eAAe,
|
|
1
|
+
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../../src/targets/akash/client.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;GAoBG;AAEH,OAAO,IAAI,MAAM,MAAM,CAAC;AAGxB,OAAO,KAAK,EAAE,GAAG,IAAI,OAAO,EAAE,MAAM,yBAAyB,CAAC;AAG9D,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAEnD,OAAO,EAAE,eAAe,EAAmB,MAAM,uBAAuB,CAAC;AACzE,OAAO,KAAK,EAAE,aAAa,EAAE,WAAW,EAAgB,YAAY,EAAE,MAAM,YAAY,CAAC;AACzF,OAAO,EAAoB,KAAK,YAAY,EAAE,MAAM,kBAAkB,CAAC;AACvE,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,WAAW,CAAC;AAG7C,OAAO,EAAE,kBAAkB,EAAE,MAAM,0BAA0B,CAAC;AAM9D;;GAEG;AACH,MAAM,WAAW,kBAAkB;IACjC;;OAEG;IACH,QAAQ,CAAC,OAAO,EAAE,YAAY,CAAC;IAE/B;;;;;OAKG;IACH,QAAQ,CAAC,MAAM,CAAC,EAAE,WAAW,CAAC;IAE9B;;;;;;;OAOG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,MAAM,CAAC;CACjC;AAED;;GAEG;AACH,MAAM,WAAW,gBAAgB;IAC/B,qDAAqD;IACrD,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IAEtB,qCAAqC;IACrC,QAAQ,CAAC,eAAe,EAAE,MAAM,CAAC;IAEjC,gDAAgD;IAChD,QAAQ,CAAC,MAAM,EAAE,MAAM,CAAC;CACzB;AAED;;GAEG;AACH,MAAM,WAAW,WAAW;IAC1B,+CAA+C;IAC/C,QAAQ,CAAC,KAAK,EAAE,eAAe,CAAC;IAEhC,qCAAqC;IACrC,QAAQ,CAAC,eAAe,EAAE,MAAM,CAAC;IAEjC,2CAA2C;IAC3C,QAAQ,CAAC,MAAM,EAAE,MAAM,CAAC;CACzB;AAED;;GAEG;AACH,MAAM,WAAW,qBAAqB;IACpC,iCAAiC;IACjC,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IAEtB,oBAAoB;IACpB,QAAQ,CAAC,KAAK,EAAE,MAAM,CAAC;IAEvB,uBAAuB;IACvB,QAAQ,CAAC,eAAe,EAAE,MAAM,CAAC;IAEjC,mBAAmB;IACnB,QAAQ,CAAC,MAAM,EAAE,MAAM,CAAC;IAExB,iCAAiC;IACjC,QAAQ,CAAC,QAAQ,EAAE,IAAI,CAAC;IAExB,kDAAkD;IAClD,QAAQ,CAAC,SAAS,EAAE,OAAO,CAAC;CAC7B;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B,QAAQ,CAAC,KAAK,EAAE,MAAM,CAAC;IACvB,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB,QAAQ,CAAC,QAAQ,EAAE,MAAM,CAAC;CAC3B;AAED;;GAEG;AACH,MAAM,WAAW,KAAK;IACpB,KAAK,EAAE,MAAM,CAAC;IACd,IAAI,EAAE,IAAI,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;IACb,IAAI,EAAE,MAAM,CAAC;IACb,QAAQ,EAAE,MAAM,CAAC;IACjB,IAAI,CAAC,EAAE,MAAM,CAAC;CACf;AAED;;GAEG;AACH,MAAM,WAAW,OAAO;IACtB,KAAK,EAAE,MAAM,CAAC;IACd,MAAM,EAAE,MAAM,CAAC;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,GAAG;IAClB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,EAAE,CAAC,EAAE,KAAK,CAAC;IACX,KAAK,CAAC,EAAE,KAAK,CAAC;IACd,KAAK,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,OAAO,CAAC;IAChB,SAAS,EAAE,IAAI,CAAC;IAChB,cAAc,CAAC,EAAE,OAAO,EAAE,CAAC;CAC5B;AAED;;GAEG;AACH,MAAM,MAAM,WAAW,GAAG,GAAG,CAAC;AAE9B;;GAEG;AACH,MAAM,WAAW,iBAAiB;IAChC,QAAQ,CAAC,KAAK,EAAE,MAAM,CAAC;IACvB,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB,QAAQ,CAAC,KAAK,EAAE,MAAM,CAAC;IACvB,QAAQ,CAAC,OAAO,EAAE,MAAM,CAAC;IACzB,QAAQ,CAAC,SAAS,EAAE,MAAM,CAAC;IAC3B,QAAQ,CAAC,MAAM,EAAE,SAAS,sBAAsB,EAAE,CAAC;CACpD;AAED;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACrC,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IACtB,QAAQ,CAAC,SAAS,EAAE,SAAS,uBAAuB,EAAE,CAAC;CACxD;AAED;;GAEG;AACH,MAAM,WAAW,uBAAuB;IACtC,QAAQ,CAAC,UAAU,EAAE,MAAM,CAAC;IAC5B,QAAQ,CAAC,KAAK,EAAE,MAAM,CAAC;IACvB,QAAQ,CAAC,QAAQ,EAAE,MAAM,CAAC;IAC1B,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,QAAQ,CAAC,iBAAiB,EAAE,SAAS,MAAM,EAAE,CAAC;CAC/C;AAED;;GAEG;AACH,MAAM,WAAW,gBAAgB;IAC/B,QAAQ,CAAC,KAAK,EAAE,MAAM,CAAC;IACvB,QAAQ,CAAC,OAAO,CAAC,EAAE,MAAM,CAAC;IAC1B,QAAQ,CAAC,UAAU,EAAE,SAAS,iBAAiB,EAAE,CAAC;CACnD;AAED;;GAEG;AACH,MAAM,WAAW,iBAAiB;IAChC,QAAQ,CAAC,GAAG,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,KAAK,EAAE,MAAM,CAAC;CACxB;AAED;;GAEG;AACH,MAAM,WAAW,YAAY;IAC3B,QAAQ,CAAC,KAAK,CAAC,EAAE,MAAM,CAAC;IACxB,QAAQ,CAAC,IAAI,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAChC,QAAQ,CAAC,QAAQ,CAAC,EAAE,MAAM,CAAC;IAC3B,QAAQ,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC;IACvB,QAAQ,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC;IACvB,QAAQ,CAAC,KAAK,CAAC,EAAE,MAAM,CAAC;CACzB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B;;OAEG;IACH,QAAQ,CAAC,SAAS,CAAC,EAAE,SAAS,MAAM,EAAE,CAAC;IAEvC;;;;OAIG;IACH,QAAQ,CAAC,aAAa,CAAC,EAAE,OAAO,CAAC;IAEjC;;;;;;;OAOG;IACH,QAAQ,CAAC,uBAAuB,CAAC,EAAE,OAAO,CAAC;CAC5C;AAED;;GAEG;AACH,MAAM,WAAW,eAAgB,SAAQ,eAAe;IACtD;;;;OAIG;IACH,QAAQ,CAAC,OAAO,CAAC,EAAE,MAAM,CAAC;IAE1B;;;;OAIG;IACH,QAAQ,CAAC,YAAY,CAAC,EAAE,MAAM,CAAC;IAE/B;;;;OAIG;IACH,QAAQ,CAAC,WAAW,CAAC,EAAE,MAAM,CAAC;CAC/B;AAED;;GAEG;AACH,MAAM,MAAM,GAAG,GAAG,OAAO,CAAC;AAM1B;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,qBAAa,WAAW;IACtB;;;OAGG;IACH,OAAO,CAAC,QAAQ,CAAC,GAAG,CAA2C;IAE/D;;;OAGG;IACH,OAAO,CAAC,QAAQ,CAAC,OAAO,CAAe;IACvC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAsC;IAE7D;;;OAGG;IACH,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAc;IAEtC;;;OAGG;IACH,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAS;IAEvC;;;OAGG;IACH,OAAO,CAAC,WAAW,CAAC,CAAqB;IAMzC;;;;;;;;;;;;;;;;;;;;;;;;OAwBG;gBACS,OAAO,EAAE,kBAAkB;IA4CvC;;;;;;;;;;;;;;;;;;;;;;;;;;;OA2BG;IACG,OAAO,CACX,MAAM,EAAE,aAAa,EACrB,IAAI,EAAE,MAAM,EACZ,OAAO,CAAC,EAAE,eAAe,GACxB,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE,EAAE,eAAe,CAAC,CAAC;IA4HlD;;;;;;;;OAQG;IACH,OAAO,CAAC,gBAAgB;IAcxB;;;;;;;;;;;;;;;;;;;;;;;;;;OA0BG;IACG,SAAS,CACb,MAAM,EAAE,aAAa,EACrB,IAAI,EAAE,MAAM,EACZ,OAAO,CAAC,EAAE,eAAe,GACxB,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE,EAAE,eAAe,CAAC,CAAC;IAwClD;;;;;;;;;;;;;;;;;;;OAmBG;IACG,YAAY,CAChB,KAAK,EAAE,eAAe,GACrB,OAAO,CAAC,MAAM,CAAC,YAAY,EAAE,eAAe,CAAC,CAAC;IAoCjD;;;;;;;;;;;;;;;;;OAiBG;IACG,SAAS,CACb,MAAM,EAAE,aAAa,EACrB,OAAO,CAAC,EAAE,IAAI,CAAC,YAAY,EAAE,OAAO,CAAC,GACpC,OAAO,CAAC,MAAM,CAAC,SAAS,YAAY,EAAE,EAAE,eAAe,CAAC,CAAC;IAyC5D;;;OAGG;IACH,OAAO,CAAC,QAAQ;IA2BhB;;;OAGG;IACH,OAAO,CAAC,aAAa;IAkBrB;;;OAGG;IACH,OAAO,CAAC,YAAY;IAOpB;;;;;;;;;;;;;;OAcG;IACG,aAAa,CACjB,KAAK,EAAE,MAAM,EACb,IAAI,EAAE,MAAM,GACX,OAAO,CAAC,MAAM,CAAC,iBAAiB,EAAE,eAAe,CAAC,CAAC;IAgCtD;;;OAGG;IACH,OAAO,CAAC,aAAa;IAwCrB;;;OAGG;IACH,OAAO,CAAC,kBAAkB;IAY1B;;;OAGG;IACH,OAAO,CAAC,mBAAmB;IAO3B;;;OAGG;IACH,OAAO,CAAC,WAAW;IAOnB;;;;;;;;;;;;;OAaG;IACG,WAAW,CACf,eAAe,EAAE,MAAM,GACtB,OAAO,CAAC,MAAM,CAAC,gBAAgB,GAAG,SAAS,EAAE,eAAe,CAAC,CAAC;IAwBjE;;;OAGG;IACH,OAAO,CAAC,WAAW;IAiBnB;;;OAGG;IACH,OAAO,CAAC,oBAAoB;IAqB5B;;;;;;;;;;;;;;;;;;;;;OAqBG;IACG,gBAAgB,CACpB,GAAG,EAAE,GAAG,EACR,UAAU,GAAE,MAAU,GACrB,OAAO,CAAC,MAAM,CAAC,gBAAgB,EAAE,eAAe,CAAC,CAAC;IA4ErD;;;OAGG;YACW,gBAAgB;IAe9B;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACG,SAAS,CACb,GAAG,EAAE,WAAW,GACf,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE,eAAe,CAAC,CAAC;IAsEhD;;;;;;;;;;;;;;;;;;;;OAoBG;IACG,eAAe,CACnB,IAAI,EAAE,MAAM,GACX,OAAO,CAAC,MAAM,CAAC,qBAAqB,EAAE,eAAe,CAAC,CAAC;IAyD1D;;;;;;;;;;;;;OAaG;IACH,qBAAqB,IAAI,kBAAkB;IAY3C;;;;;;;;;;;;;;;;;;OAkBG;IACG,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC;IAMjC;;;;;;;;;OASG;IACH,UAAU,IAAI,YAAY;IAI1B;;;;;;;;;;;;;;;OAeG;IACH,OAAO,IAAI,OAAO;CAGnB"}
|