@opentdf/ctl 0.1.0-beta.1701

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md ADDED
@@ -0,0 +1,34 @@
1
+ # OpenTDF command line tool (for node)
2
+
3
+ A sample application using node & ESM to import and test a project
4
+
5
+ ## Usage
6
+
7
+ ```sh
8
+ opentdf.mjs <auth options> <policy options> [encrypt|decrypt] [input file]
9
+ ```
10
+
11
+ Sample round trip execution:
12
+
13
+ ```sh
14
+ echo hello-world >sample.txt
15
+ bin/opentdf.mjs encrypt \
16
+ --kasEndpoint http://localhost:65432/api/kas \
17
+ --oidcEndpoint http://localhost:65432/auth/realms/tdf \
18
+ --auth tdf-client:123-456 \
19
+ --containerType tdf3 \
20
+ --output sample.tdf \
21
+ sample.txt
22
+ bin/opentdf.mjs \
23
+ --kasEndpoint http://localhost:65432/api/kas \
24
+ --oidcEndpoint http://localhost:65432/auth/realms/tdf \
25
+ --auth tdf-client:123-456 \
26
+ --containerType tdf3 \
27
+ --userId alice@somewhere.there \
28
+ decrypt sample.tdf
29
+ ```
30
+
31
+ ### References
32
+
33
+ - [yargs](http://yargs.js.org)
34
+ - [typescript CLI starter](https://github.com/khalidx/typescript-cli-starter)
@@ -0,0 +1,4 @@
1
+ #!/usr/bin/env node
2
+ // To debug, add `--inspect-brk` to the above line and open chrome://inspect
3
+
4
+ import '../dist/src/cli.js';
@@ -0,0 +1,511 @@
1
+ import './polyfills.js';
2
+ import { createWriteStream, openAsBlob } from 'node:fs';
3
+ import { readFile, stat, writeFile } from 'node:fs/promises';
4
+ import { Writable } from 'node:stream';
5
+ import yargs from 'yargs';
6
+ import { hideBin } from 'yargs/helpers';
7
+ import { AuthProviders, NanoTDFClient, NanoTDFDatasetClient, TDF3Client, version, EncryptParamsBuilder, DecryptParamsBuilder, } from '@opentdf/sdk';
8
+ import { CLIError, log } from './logger.js';
9
+ import * as assertions from '@opentdf/sdk/assertions';
10
+ import { attributeFQNsAsValues } from '@opentdf/sdk/nano';
11
+ import { base64 } from '@opentdf/sdk/encodings';
12
+ const bindingTypes = ['ecdsa', 'gmac'];
13
+ const containerTypes = ['tdf3', 'nano', 'dataset', 'ztdf'];
14
+ const parseJwt = (jwt, field = 1) => {
15
+ return JSON.parse(base64.decode(jwt.split('.')[field]));
16
+ };
17
+ const parseJwtComplete = (jwt) => {
18
+ return { header: parseJwt(jwt, 0), payload: parseJwt(jwt) };
19
+ };
20
+ async function processAuth({ auth, clientId, clientSecret, oidcEndpoint, userId, }) {
21
+ log('DEBUG', 'Processing auth params');
22
+ if (auth) {
23
+ log('DEBUG', 'Processing an auth string');
24
+ const authParts = auth.split(':');
25
+ if (authParts.length !== 2) {
26
+ throw new CLIError('CRITICAL', `Auth expects <clientId>:<clientSecret>, received ${auth}`);
27
+ }
28
+ [clientId, clientSecret] = authParts;
29
+ }
30
+ else if (!clientId || !clientSecret) {
31
+ throw new CLIError('CRITICAL', 'Auth expects clientId and clientSecret, or combined auth param');
32
+ }
33
+ const actual = await AuthProviders.clientSecretAuthProvider({
34
+ clientId,
35
+ oidcOrigin: oidcEndpoint,
36
+ exchange: 'client',
37
+ clientSecret,
38
+ });
39
+ const requestLog = [];
40
+ return {
41
+ requestLog,
42
+ updateClientPublicKey: async (signingKey) => {
43
+ actual.updateClientPublicKey(signingKey);
44
+ log('DEBUG', `updateClientPublicKey: [${signingKey?.publicKey}]`);
45
+ },
46
+ withCreds: async (httpReq) => {
47
+ const credible = await actual.withCreds(httpReq);
48
+ if (userId) {
49
+ const url = new URL(credible.url);
50
+ url.searchParams.set('userId', userId);
51
+ credible.url = url.href;
52
+ }
53
+ log('DEBUG', `HTTP Requesting: ${JSON.stringify(credible)}`);
54
+ requestLog.push(credible);
55
+ return credible;
56
+ },
57
+ };
58
+ }
59
+ const rstrip = (str, suffix = ' ') => {
60
+ while (str && suffix && str.endsWith(suffix)) {
61
+ str = str.slice(0, -suffix.length);
62
+ }
63
+ return str;
64
+ };
65
+ function addParams(client, argv) {
66
+ if (argv.attributes?.length) {
67
+ client.dataAttributes = argv.attributes.split(',');
68
+ }
69
+ if (argv.usersWithAccess?.length) {
70
+ client.dissems = argv.usersWithAccess.split(',');
71
+ }
72
+ log('SILLY', `Built encrypt params dissems: ${client.dissems}, attrs: ${client.dataAttributes}`);
73
+ }
74
+ async function tdf3DecryptParamsFor(argv) {
75
+ const c = new DecryptParamsBuilder();
76
+ if (argv.noVerifyAssertions) {
77
+ c.withNoVerifyAssertions(true);
78
+ }
79
+ c.setFileSource(await openAsBlob(argv.file));
80
+ return c.build();
81
+ }
82
+ function parseAssertionConfig(s) {
83
+ const u = JSON.parse(s);
84
+ // if u is null or empty, return an empty array
85
+ if (!u) {
86
+ return [];
87
+ }
88
+ const a = Array.isArray(u) ? u : [u];
89
+ for (const assertion of a) {
90
+ if (!assertions.isAssertionConfig(assertion)) {
91
+ throw new CLIError('CRITICAL', `invalid assertion config ${JSON.stringify(assertion)}`);
92
+ }
93
+ }
94
+ return a;
95
+ }
96
+ async function tdf3EncryptParamsFor(argv) {
97
+ const c = new EncryptParamsBuilder();
98
+ if (argv.assertions?.length) {
99
+ c.withAssertions(parseAssertionConfig(argv.assertions));
100
+ }
101
+ if (argv.attributes?.length) {
102
+ c.setAttributes(argv.attributes.split(','));
103
+ }
104
+ if (argv.usersWithAccess?.length) {
105
+ c.setUsersWithAccess(argv.usersWithAccess.split(','));
106
+ }
107
+ if (argv.mimeType?.length) {
108
+ c.setMimeType(argv.mimeType);
109
+ }
110
+ if (argv.autoconfigure) {
111
+ c.withAutoconfigure();
112
+ }
113
+ // use offline mode, we do not have upsert for v2
114
+ c.setOffline();
115
+ // FIXME TODO must call file.close() after we are done
116
+ const buffer = await processDataIn(argv.file);
117
+ c.setBufferSource(buffer);
118
+ return c.build();
119
+ }
120
+ async function processDataIn(file) {
121
+ if (!file) {
122
+ throw new CLIError('CRITICAL', 'Must specify file or pipe');
123
+ }
124
+ try {
125
+ const stats = await stat(file);
126
+ if (!stats?.isFile()) {
127
+ throw new CLIError('CRITICAL', `File does not exist [${file}]`);
128
+ }
129
+ }
130
+ catch (e) {
131
+ throw new CLIError('CRITICAL', `File is not accessable [${file}]`);
132
+ }
133
+ log('DEBUG', `Using input from file [${file}]`);
134
+ return readFile(file);
135
+ }
136
+ export const handleArgs = (args) => {
137
+ return (yargs(args)
138
+ .middleware((argv) => {
139
+ if (argv.silent) {
140
+ log.level = 'CRITICAL';
141
+ }
142
+ else if (argv.logLevel) {
143
+ const ll = argv.logLevel;
144
+ log.level = ll.toUpperCase();
145
+ }
146
+ })
147
+ .fail((msg, err, yargs) => {
148
+ if (err instanceof CLIError) {
149
+ log(err);
150
+ process.exit(1);
151
+ }
152
+ else if (err) {
153
+ log(err);
154
+ process.exit(2);
155
+ }
156
+ else {
157
+ console.error(`${msg}\n\n${yargs.help()}`);
158
+ process.exit(1);
159
+ }
160
+ })
161
+ // AUTH OPTIONS
162
+ .option('kasEndpoint', {
163
+ demandOption: true,
164
+ group: 'Server Endpoints:',
165
+ type: 'string',
166
+ description: 'URL to non-default KAS instance (https://mykas.net)',
167
+ })
168
+ .option('oidcEndpoint', {
169
+ demandOption: true,
170
+ group: 'Server Endpoints:',
171
+ type: 'string',
172
+ description: 'URL to non-default OIDC IdP (https://myidp.net)',
173
+ })
174
+ .option('policyEndpoint', {
175
+ group: 'Server Endpoints:',
176
+ type: 'string',
177
+ description: 'Attribute and key grant service endpoint',
178
+ })
179
+ .option('allowList', {
180
+ group: 'Security:',
181
+ desc: 'allowed KAS origins, comma separated; defaults to [kasEndpoint]',
182
+ type: 'string',
183
+ validate: (uris) => uris.split(','),
184
+ })
185
+ .option('ignoreAllowList', {
186
+ group: 'Security:',
187
+ desc: 'disable KAS allowlist feature for decrypt',
188
+ type: 'boolean',
189
+ })
190
+ .option('noVerifyAssertions', {
191
+ alias: 'no-verify-assertions',
192
+ group: 'Security',
193
+ desc: 'Do not verify assertions',
194
+ type: 'boolean',
195
+ })
196
+ .option('auth', {
197
+ group: 'OAuth and OIDC:',
198
+ type: 'string',
199
+ description: 'Combined OAuth Client Credentials (<clientId>:<clientSecret>)',
200
+ })
201
+ .option('dpop', {
202
+ group: 'Security:',
203
+ desc: 'Use DPoP for token binding',
204
+ type: 'boolean',
205
+ })
206
+ .implies('auth', '--no-clientId')
207
+ .implies('auth', '--no-clientSecret')
208
+ .option('clientId', {
209
+ group: 'OAuth and OIDC:',
210
+ alias: 'cid',
211
+ type: 'string',
212
+ description: 'OAuth Client Credentials: IdP-issued Client ID',
213
+ })
214
+ .implies('clientId', 'clientSecret')
215
+ .option('clientSecret', {
216
+ group: 'OAuth and OIDC:',
217
+ alias: 'cs',
218
+ type: 'string',
219
+ description: 'OAuth Client Credentials: IdP-issued Client Secret',
220
+ })
221
+ .implies('clientSecret', 'clientId')
222
+ .option('exchangeToken', {
223
+ group: 'OAuth and OIDC:',
224
+ alias: 'et',
225
+ type: 'string',
226
+ description: 'OAuth Token Exchange: Token issued by trusted external IdP',
227
+ })
228
+ .implies('exchangeToken', 'clientId')
229
+ // Examples
230
+ .example('$0 --auth ClientID123:Cli3nt$ecret', '# OIDC client credentials')
231
+ .example('$0 --clientId ClientID123 --clientSecret Cli3nt$ecret', '# OIDC client credentials')
232
+ // Policy, encryption, and container options
233
+ .options({
234
+ assertions: {
235
+ group: 'Encrypt Options:',
236
+ desc: 'ZTDF assertion config objects',
237
+ type: 'string',
238
+ default: '',
239
+ validate: parseAssertionConfig,
240
+ },
241
+ attributes: {
242
+ group: 'Encrypt Options:',
243
+ desc: 'Data attributes for the policy',
244
+ type: 'string',
245
+ default: '',
246
+ validate: (attributes) => attributes.split(','),
247
+ },
248
+ autoconfigure: {
249
+ group: 'Encrypt Options:',
250
+ desc: 'Enable automatic configuration from attributes using policy service',
251
+ type: 'boolean',
252
+ default: false,
253
+ },
254
+ containerType: {
255
+ group: 'Encrypt Options:',
256
+ alias: 't',
257
+ choices: containerTypes,
258
+ description: 'Container format',
259
+ default: 'nano',
260
+ },
261
+ policyBinding: {
262
+ group: 'Encrypt Options:',
263
+ choices: bindingTypes,
264
+ description: 'Policy Binding Type (nano only)',
265
+ default: 'gmac',
266
+ },
267
+ mimeType: {
268
+ group: 'Encrypt Options:',
269
+ desc: 'Mime type for the plain text file (only supported for ztdf)',
270
+ type: 'string',
271
+ default: '',
272
+ },
273
+ userId: {
274
+ group: 'Encrypt Options:',
275
+ type: 'string',
276
+ description: 'Owner email address',
277
+ },
278
+ usersWithAccess: {
279
+ alias: 'users-with-access',
280
+ group: 'Encrypt Options:',
281
+ desc: 'Add users to the policy',
282
+ type: 'string',
283
+ default: '',
284
+ validate: (users) => users.split(','),
285
+ },
286
+ })
287
+ // COMMANDS
288
+ .options({
289
+ logLevel: {
290
+ group: 'Verbosity:',
291
+ alias: 'log-level',
292
+ type: 'string',
293
+ default: 'info',
294
+ desc: 'Set logging level',
295
+ },
296
+ silent: {
297
+ group: 'Verbosity:',
298
+ type: 'boolean',
299
+ default: false,
300
+ desc: 'Disable logging',
301
+ },
302
+ })
303
+ .option('output', {
304
+ type: 'string',
305
+ description: 'output file',
306
+ })
307
+ .command('attrs', 'Look up defintions of attributes', (yargs) => {
308
+ yargs.strict();
309
+ }, async (argv) => {
310
+ log('DEBUG', 'attribute value lookup');
311
+ const authProvider = await processAuth(argv);
312
+ const signingKey = await crypto.subtle.generateKey({
313
+ name: 'RSASSA-PKCS1-v1_5',
314
+ hash: 'SHA-256',
315
+ modulusLength: 2048,
316
+ publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
317
+ }, true, ['sign', 'verify']);
318
+ authProvider.updateClientPublicKey(signingKey);
319
+ log('DEBUG', `Initialized auth provider ${JSON.stringify(authProvider)}`);
320
+ const policyUrl = guessPolicyUrl(argv);
321
+ const defs = await attributeFQNsAsValues(policyUrl, authProvider, ...argv.attributes.split(','));
322
+ console.log(JSON.stringify(defs, null, 2));
323
+ })
324
+ .command('decrypt [file]', 'Decrypt TDF to string',
325
+ // eslint-disable-next-line @typescript-eslint/no-empty-function
326
+ (yargs) => {
327
+ yargs.strict().positional('file', {
328
+ describe: 'path to plain text file',
329
+ type: 'string',
330
+ });
331
+ }, async (argv) => {
332
+ log('DEBUG', 'Running decrypt command');
333
+ const allowedKases = argv.allowList?.split(',');
334
+ const ignoreAllowList = !!argv.ignoreAllowList;
335
+ const authProvider = await processAuth(argv);
336
+ log('DEBUG', `Initialized auth provider ${JSON.stringify(authProvider)}`);
337
+ const kasEndpoint = argv.kasEndpoint;
338
+ if (argv.containerType === 'tdf3' || argv.containerType == 'ztdf') {
339
+ log('DEBUG', `TDF3 Client`);
340
+ const client = new TDF3Client({
341
+ allowedKases,
342
+ ignoreAllowList,
343
+ authProvider,
344
+ kasEndpoint,
345
+ dpopEnabled: argv.dpop,
346
+ });
347
+ log('SILLY', `Initialized client ${JSON.stringify(client)}`);
348
+ log('DEBUG', `About to decrypt [${argv.file}]`);
349
+ const ct = await client.decrypt(await tdf3DecryptParamsFor(argv));
350
+ if (argv.output) {
351
+ const destination = createWriteStream(argv.output);
352
+ await ct.stream.pipeTo(Writable.toWeb(destination));
353
+ }
354
+ else {
355
+ console.log(await ct.toString());
356
+ }
357
+ }
358
+ else {
359
+ const dpopEnabled = !!argv.dpop;
360
+ const client = argv.containerType === 'nano'
361
+ ? new NanoTDFClient({
362
+ allowedKases,
363
+ ignoreAllowList,
364
+ authProvider,
365
+ kasEndpoint,
366
+ dpopEnabled,
367
+ })
368
+ : new NanoTDFDatasetClient({
369
+ allowedKases,
370
+ ignoreAllowList,
371
+ authProvider,
372
+ kasEndpoint,
373
+ dpopEnabled,
374
+ });
375
+ const buffer = await processDataIn(argv.file);
376
+ log('DEBUG', 'Decrypt data.');
377
+ const plaintext = await client.decrypt(buffer);
378
+ log('DEBUG', 'Handle output.');
379
+ if (argv.output) {
380
+ await writeFile(argv.output, new Uint8Array(plaintext));
381
+ }
382
+ else {
383
+ console.log(new TextDecoder().decode(plaintext));
384
+ }
385
+ }
386
+ const lastRequest = authProvider.requestLog[authProvider.requestLog.length - 1];
387
+ let accessToken = null;
388
+ let dpopToken = null;
389
+ for (const h of Object.keys(lastRequest.headers)) {
390
+ switch (h.toLowerCase()) {
391
+ case 'dpop':
392
+ console.assert(!dpopToken, 'Multiple dpop headers found');
393
+ dpopToken = parseJwtComplete(lastRequest.headers[h]);
394
+ log('INFO', `dpop: ${JSON.stringify(dpopToken)}`);
395
+ break;
396
+ case 'authorization':
397
+ console.assert(!accessToken, 'Multiple authorization headers found');
398
+ accessToken = parseJwt(lastRequest.headers[h].split(' ')[1]);
399
+ log('INFO', `Access Token: ${JSON.stringify(accessToken)}`);
400
+ if (argv.dpop) {
401
+ console.assert(accessToken.cnf?.jkt, 'Access token must have a cnf.jkt');
402
+ }
403
+ break;
404
+ }
405
+ }
406
+ console.assert(accessToken, 'No access_token found');
407
+ console.assert(!argv.dpop || dpopToken, 'DPoP requested but absent');
408
+ })
409
+ .command('encrypt [file]', 'Encrypt file or pipe to a TDF',
410
+ // eslint-disable-next-line @typescript-eslint/no-empty-function
411
+ (yargs) => {
412
+ yargs.strict().positional('file', {
413
+ describe: 'path to plain text file',
414
+ type: 'string',
415
+ });
416
+ }, async (argv) => {
417
+ log('DEBUG', 'Running encrypt command');
418
+ const authProvider = await processAuth(argv);
419
+ log('DEBUG', `Initialized auth provider ${JSON.stringify(authProvider)}`);
420
+ const kasEndpoint = argv.kasEndpoint;
421
+ const ignoreAllowList = !!argv.ignoreAllowList;
422
+ const allowedKases = argv.allowList?.split(',');
423
+ if ('tdf3' === argv.containerType || 'ztdf' === argv.containerType) {
424
+ log('DEBUG', `TDF3 Client`);
425
+ const policyEndpoint = guessPolicyUrl(argv);
426
+ const client = new TDF3Client({
427
+ allowedKases,
428
+ ignoreAllowList,
429
+ authProvider,
430
+ kasEndpoint,
431
+ policyEndpoint,
432
+ dpopEnabled: argv.dpop,
433
+ });
434
+ log('SILLY', `Initialized client ${JSON.stringify(client)}`);
435
+ const ct = await client.encrypt(await tdf3EncryptParamsFor(argv));
436
+ if (!ct) {
437
+ throw new CLIError('CRITICAL', 'Encrypt configuration error: No output?');
438
+ }
439
+ if (argv.output) {
440
+ const destination = createWriteStream(argv.output);
441
+ await ct.stream.pipeTo(Writable.toWeb(destination));
442
+ }
443
+ else {
444
+ console.log(await ct.toString());
445
+ }
446
+ }
447
+ else {
448
+ const dpopEnabled = !!argv.dpop;
449
+ const ecdsaBinding = argv.policyBinding.toLowerCase() == 'ecdsa';
450
+ const client = argv.containerType === 'nano'
451
+ ? new NanoTDFClient({ allowedKases, authProvider, dpopEnabled, kasEndpoint })
452
+ : new NanoTDFDatasetClient({
453
+ allowedKases,
454
+ authProvider,
455
+ dpopEnabled,
456
+ kasEndpoint,
457
+ });
458
+ log('SILLY', `Initialized client ${JSON.stringify(client)}`);
459
+ addParams(client, argv);
460
+ const buffer = await processDataIn(argv.file);
461
+ const cyphertext = await client.encrypt(buffer, { ecdsaBinding });
462
+ log('DEBUG', `Handle cyphertext output ${JSON.stringify(cyphertext)}`);
463
+ if (argv.output) {
464
+ await writeFile(argv.output, new Uint8Array(cyphertext));
465
+ }
466
+ else {
467
+ console.log(base64.encodeArrayBuffer(cyphertext));
468
+ }
469
+ }
470
+ })
471
+ .usage('openTDF CLI\n\nUsage: $0 [options]')
472
+ .alias('help', 'h')
473
+ .demandCommand()
474
+ .recommendCommands()
475
+ .help('help')
476
+ .options({
477
+ env: {
478
+ desc: 'Set the environment',
479
+ },
480
+ })
481
+ .version('version', JSON.stringify({
482
+ '@opentdf/ctl': process.env.npm_package_version || 'UNRELEASED',
483
+ '@opentdf/sdk': version,
484
+ }))
485
+ .alias('version', 'V')
486
+ .strict()
487
+ .parseAsync());
488
+ };
489
+ export const main = async (argsPromise) => {
490
+ argsPromise;
491
+ };
492
+ handleArgs(hideBin(process.argv))
493
+ .then(main)
494
+ .then(() => {
495
+ // Nothing;
496
+ })
497
+ .catch((err) => {
498
+ console.error(err);
499
+ });
500
+ function guessPolicyUrl({ kasEndpoint, policyEndpoint, }) {
501
+ let policyUrl;
502
+ if (policyEndpoint) {
503
+ policyUrl = rstrip(policyEndpoint, '/');
504
+ }
505
+ else {
506
+ const uNoSlash = rstrip(kasEndpoint, '/');
507
+ policyUrl = uNoSlash.endsWith('/kas') ? uNoSlash.slice(0, -4) : uNoSlash;
508
+ }
509
+ return policyUrl;
510
+ }
511
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cli.js","sourceRoot":"","sources":["../../src/cli.ts"],"names":[],"mappings":"AAAA,OAAO,gBAAgB,CAAC;AACxB,OAAO,EAAE,iBAAiB,EAAE,UAAU,EAAE,MAAM,SAAS,CAAC;AACxD,OAAO,EAAE,QAAQ,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,kBAAkB,CAAC;AAC7D,OAAO,EAAE,QAAQ,EAAE,MAAM,aAAa,CAAC;AACvC,OAAO,KAAK,MAAM,OAAO,CAAC;AAC1B,OAAO,EAAE,OAAO,EAAE,MAAM,eAAe,CAAC;AACxC,OAAO,EAIL,aAAa,EACb,aAAa,EACb,oBAAoB,EACpB,UAAU,EACV,OAAO,EACP,oBAAoB,EAEpB,oBAAoB,GACrB,MAAM,cAAc,CAAC;AACtB,OAAO,EAAE,QAAQ,EAAS,GAAG,EAAE,MAAM,aAAa,CAAC;AAEnD,OAAO,KAAK,UAAU,MAAM,yBAAyB,CAAC;AACtD,OAAO,EAAE,qBAAqB,EAAE,MAAM,mBAAmB,CAAC;AAC1D,OAAO,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAchD,MAAM,YAAY,GAAG,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;AAEvC,MAAM,cAAc,GAAG,CAAC,MAAM,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,CAAC,CAAC;AAE3D,MAAM,QAAQ,GAAG,CAAC,GAAW,EAAE,KAAK,GAAG,CAAC,EAAE,EAAE;IAC1C,OAAO,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;AAC1D,CAAC,CAAC;AAEF,MAAM,gBAAgB,GAAG,CAAC,GAAW,EAAE,EAAE;IACvC,OAAO,EAAE,MAAM,EAAE,QAAQ,CAAC,GAAG,EAAE,CAAC,CAAC,EAAE,OAAO,EAAE,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;AAC9D,CAAC,CAAC;AAEF,KAAK,UAAU,WAAW,CAAC,EACzB,IAAI,EACJ,QAAQ,EACR,YAAY,EACZ,YAAY,EACZ,MAAM,GACQ;IACd,GAAG,CAAC,OAAO,EAAE,wBAAwB,CAAC,CAAC;IACvC,IAAI,IAAI,EAAE,CAAC;QACT,GAAG,CAAC,OAAO,EAAE,2BAA2B,CAAC,CAAC;QAC1C,MAAM,SAAS,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAClC,IAAI,SAAS,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC3B,MAAM,IAAI,QAAQ,CAAC,UAAU,EAAE,oDAAoD,IAAI,EAAE,CAAC,CAAC;QAC7F,CAAC;QAED,CAAC,QAAQ,EAAE,YAAY,CAAC,GAAG,SAAS,CAAC;IACvC,CAAC;SAAM,IAAI,CAAC,QAAQ,IAAI,CAAC,YAAY,EAAE,CAAC;QACtC,MAAM,IAAI,QAAQ,CAChB,UAAU,EACV,gEAAgE,CACjE,CAAC;IACJ,CAAC;IACD,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,wBAAwB,CAAC;QAC1D,QAAQ;QACR,UAAU,EAAE,YAAY;QACxB,QAAQ,EAAE,QAAQ;QAClB,YAAY;KACb,CAAC,CAAC;IACH,MAAM,UAAU,GAAgC,EAAE,CAAC;IACnD,OAAO;QACL,UAAU;QACV,qBAAqB,EAAE,KAAK,EAAE,UAAmC,EAAE,EAAE;YACnE,MAAM,CAAC,qBAAqB,CAAC,UAAU,CAAC,CAAC;YACzC,GAAG,CAAC,OAAO,EAAE,2BAA2B,UAAU,EAAE,SAAS,GAAG,CAAC,CAAC;QACpE,CAAC;QACD,SAAS,EAAE,KAAK,EAAE,OAAkC,EAAE,EAAE;YACtD,MAAM,QAAQ,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;YACjD,IAAI,MAAM,EAAE,CAAC;gBACX,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC;gBAClC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;gBACvC,QAAQ,CAAC,GAAG,GAAG,GAAG,CAAC,IAAI,CAAC;YAC1B,CAAC;YACD,GAAG,CAAC,OAAO,EAAE,oBAAoB,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;YAC7D,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YAC1B,OAAO,QAAQ,CAAC;QAClB,CAAC;KACF,CAAC;AACJ,CAAC;AAED,MAAM,MAAM,GAAG,CAAC,GAAW,EAAE,MAAM,GAAG,GAAG,EAAU,EAAE;IACnD,OAAO,GAAG,IAAI,MAAM,IAAI,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;QAC7C,GAAG,GAAG,GAAG,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;IACrC,CAAC;IACD,OAAO,GAAG,CAAC;AACb,CAAC,CAAC;AAIF,SAAS,SAAS,CAAC,MAAqB,EAAE,IAAuB;IAC/D,IAAI,IAAI,CAAC,UAAU,EAAE,MAAM,EAAE,CAAC;QAC5B,MAAM,CAAC,cAAc,GAAG,IAAI,CAAC,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IACrD,CAAC;IACD,IAAI,IAAI,CAAC,eAAe,EAAE,MAAM,EAAE,CAAC;QACjC,MAAM,CAAC,OAAO,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IACnD,CAAC;IACD,GAAG,CAAC,OAAO,EAAE,iCAAiC,MAAM,CAAC,OAAO,YAAY,MAAM,CAAC,cAAc,EAAE,CAAC,CAAC;AACnG,CAAC;AAED,KAAK,UAAU,oBAAoB,CAAC,IAAuB;IACzD,MAAM,CAAC,GAAG,IAAI,oBAAoB,EAAE,CAAC;IACrC,IAAI,IAAI,CAAC,kBAAkB,EAAE,CAAC;QAC5B,CAAC,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;IACjC,CAAC;IACD,CAAC,CAAC,aAAa,CAAC,MAAM,UAAU,CAAC,IAAI,CAAC,IAAc,CAAC,CAAC,CAAC;IACvD,OAAO,CAAC,CAAC,KAAK,EAAE,CAAC;AACnB,CAAC;AAED,SAAS,oBAAoB,CAAC,CAAS;IACrC,MAAM,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACxB,+CAA+C;IAC/C,IAAI,CAAC,CAAC,EAAE,CAAC;QACP,OAAO,EAAE,CAAC;IACZ,CAAC;IACD,MAAM,CAAC,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;IACrC,KAAK,MAAM,SAAS,IAAI,CAAC,EAAE,CAAC;QAC1B,IAAI,CAAC,UAAU,CAAC,iBAAiB,CAAC,SAAS,CAAC,EAAE,CAAC;YAC7C,MAAM,IAAI,QAAQ,CAAC,UAAU,EAAE,4BAA4B,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;QAC1F,CAAC;IACH,CAAC;IACD,OAAO,CAAC,CAAC;AACX,CAAC;AAED,KAAK,UAAU,oBAAoB,CAAC,IAAuB;IACzD,MAAM,CAAC,GAAG,IAAI,oBAAoB,EAAE,CAAC;IACrC,IAAI,IAAI,CAAC,UAAU,EAAE,MAAM,EAAE,CAAC;QAC5B,CAAC,CAAC,cAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC;IAC1D,CAAC;IACD,IAAI,IAAI,CAAC,UAAU,EAAE,MAAM,EAAE,CAAC;QAC5B,CAAC,CAAC,aAAa,CAAC,IAAI,CAAC,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC;IAC9C,CAAC;IACD,IAAI,IAAI,CAAC,eAAe,EAAE,MAAM,EAAE,CAAC;QACjC,CAAC,CAAC,kBAAkB,CAAC,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC;IACxD,CAAC;IACD,IAAI,IAAI,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;QAC1B,CAAC,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;IAC/B,CAAC;IACD,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;QACvB,CAAC,CAAC,iBAAiB,EAAE,CAAC;IACxB,CAAC;IACD,iDAAiD;IACjD,CAAC,CAAC,UAAU,EAAE,CAAC;IACf,sDAAsD;IACtD,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,IAAI,CAAC,IAAc,CAAC,CAAC;IACxD,CAAC,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;IAC1B,OAAO,CAAC,CAAC,KAAK,EAAE,CAAC;AACnB,CAAC;AAED,KAAK,UAAU,aAAa,CAAC,IAAY;IACvC,IAAI,CAAC,IAAI,EAAE,CAAC;QACV,MAAM,IAAI,QAAQ,CAAC,UAAU,EAAE,2BAA2B,CAAC,CAAC;IAC9D,CAAC;IACD,IAAI,CAAC;QACH,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,CAAC;QAC/B,IAAI,CAAC,KAAK,EAAE,MAAM,EAAE,EAAE,CAAC;YACrB,MAAM,IAAI,QAAQ,CAAC,UAAU,EAAE,wBAAwB,IAAI,GAAG,CAAC,CAAC;QAClE,CAAC;IACH,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,MAAM,IAAI,QAAQ,CAAC,UAAU,EAAE,2BAA2B,IAAI,GAAG,CAAC,CAAC;IACrE,CAAC;IACD,GAAG,CAAC,OAAO,EAAE,0BAA0B,IAAI,GAAG,CAAC,CAAC;IAChD,OAAO,QAAQ,CAAC,IAAI,CAAC,CAAC;AACxB,CAAC;AAED,MAAM,CAAC,MAAM,UAAU,GAAG,CAAC,IAAc,EAAE,EAAE;IAC3C,OAAO,CACL,KAAK,CAAC,IAAI,CAAC;SACR,UAAU,CAAC,CAAC,IAAI,EAAE,EAAE;QACnB,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;YAChB,GAAG,CAAC,KAAK,GAAG,UAAU,CAAC;QACzB,CAAC;aAAM,IAAI,IAAI,CAAC,QAAQ,EAAE,CAAC;YACzB,MAAM,EAAE,GAAG,IAAI,CAAC,QAAkB,CAAC;YACnC,GAAG,CAAC,KAAK,GAAG,EAAE,CAAC,WAAW,EAAW,CAAC;QACxC,CAAC;IACH,CAAC,CAAC;SACD,IAAI,CAAC,CAAC,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;QACxB,IAAI,GAAG,YAAY,QAAQ,EAAE,CAAC;YAC5B,GAAG,CAAC,GAAG,CAAC,CAAC;YACT,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAClB,CAAC;aAAM,IAAI,GAAG,EAAE,CAAC;YACf,GAAG,CAAC,GAAG,CAAC,CAAC;YACT,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAClB,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,KAAK,CAAC,GAAG,GAAG,OAAO,KAAK,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;YAC3C,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAClB,CAAC;IACH,CAAC,CAAC;QAEF,eAAe;SACd,MAAM,CAAC,aAAa,EAAE;QACrB,YAAY,EAAE,IAAI;QAClB,KAAK,EAAE,mBAAmB;QAC1B,IAAI,EAAE,QAAQ;QACd,WAAW,EAAE,qDAAqD;KACnE,CAAC;SACD,MAAM,CAAC,cAAc,EAAE;QACtB,YAAY,EAAE,IAAI;QAClB,KAAK,EAAE,mBAAmB;QAC1B,IAAI,EAAE,QAAQ;QACd,WAAW,EAAE,iDAAiD;KAC/D,CAAC;SACD,MAAM,CAAC,gBAAgB,EAAE;QACxB,KAAK,EAAE,mBAAmB;QAC1B,IAAI,EAAE,QAAQ;QACd,WAAW,EAAE,0CAA0C;KACxD,CAAC;SACD,MAAM,CAAC,WAAW,EAAE;QACnB,KAAK,EAAE,WAAW;QAClB,IAAI,EAAE,iEAAiE;QACvE,IAAI,EAAE,QAAQ;QACd,QAAQ,EAAE,CAAC,IAAY,EAAE,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC;KAC5C,CAAC;SACD,MAAM,CAAC,iBAAiB,EAAE;QACzB,KAAK,EAAE,WAAW;QAClB,IAAI,EAAE,2CAA2C;QACjD,IAAI,EAAE,SAAS;KAChB,CAAC;SACD,MAAM,CAAC,oBAAoB,EAAE;QAC5B,KAAK,EAAE,sBAAsB;QAC7B,KAAK,EAAE,UAAU;QACjB,IAAI,EAAE,0BAA0B;QAChC,IAAI,EAAE,SAAS;KAChB,CAAC;SACD,MAAM,CAAC,MAAM,EAAE;QACd,KAAK,EAAE,iBAAiB;QACxB,IAAI,EAAE,QAAQ;QACd,WAAW,EAAE,+DAA+D;KAC7E,CAAC;SACD,MAAM,CAAC,MAAM,EAAE;QACd,KAAK,EAAE,WAAW;QAClB,IAAI,EAAE,4BAA4B;QAClC,IAAI,EAAE,SAAS;KAChB,CAAC;SACD,OAAO,CAAC,MAAM,EAAE,eAAe,CAAC;SAChC,OAAO,CAAC,MAAM,EAAE,mBAAmB,CAAC;SAEpC,MAAM,CAAC,UAAU,EAAE;QAClB,KAAK,EAAE,iBAAiB;QACxB,KAAK,EAAE,KAAK;QACZ,IAAI,EAAE,QAAQ;QACd,WAAW,EAAE,gDAAgD;KAC9D,CAAC;SACD,OAAO,CAAC,UAAU,EAAE,cAAc,CAAC;SAEnC,MAAM,CAAC,cAAc,EAAE;QACtB,KAAK,EAAE,iBAAiB;QACxB,KAAK,EAAE,IAAI;QACX,IAAI,EAAE,QAAQ;QACd,WAAW,EAAE,oDAAoD;KAClE,CAAC;SACD,OAAO,CAAC,cAAc,EAAE,UAAU,CAAC;SAEnC,MAAM,CAAC,eAAe,EAAE;QACvB,KAAK,EAAE,iBAAiB;QACxB,KAAK,EAAE,IAAI;QACX,IAAI,EAAE,QAAQ;QACd,WAAW,EAAE,4DAA4D;KAC1E,CAAC;SACD,OAAO,CAAC,eAAe,EAAE,UAAU,CAAC;QAErC,WAAW;SACV,OAAO,CAAC,oCAAoC,EAAE,2BAA2B,CAAC;SAE1E,OAAO,CAAC,uDAAuD,EAAE,2BAA2B,CAAC;QAE9F,4CAA4C;SAC3C,OAAO,CAAC;QACP,UAAU,EAAE;YACV,KAAK,EAAE,kBAAkB;YACzB,IAAI,EAAE,+BAA+B;YACrC,IAAI,EAAE,QAAQ;YACd,OAAO,EAAE,EAAE;YACX,QAAQ,EAAE,oBAAoB;SAC/B;QACD,UAAU,EAAE;YACV,KAAK,EAAE,kBAAkB;YACzB,IAAI,EAAE,gCAAgC;YACtC,IAAI,EAAE,QAAQ;YACd,OAAO,EAAE,EAAE;YACX,QAAQ,EAAE,CAAC,UAAkB,EAAE,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC;SACxD;QACD,aAAa,EAAE;YACb,KAAK,EAAE,kBAAkB;YACzB,IAAI,EAAE,qEAAqE;YAC3E,IAAI,EAAE,SAAS;YACf,OAAO,EAAE,KAAK;SACf;QACD,aAAa,EAAE;YACb,KAAK,EAAE,kBAAkB;YACzB,KAAK,EAAE,GAAG;YACV,OAAO,EAAE,cAAc;YACvB,WAAW,EAAE,kBAAkB;YAC/B,OAAO,EAAE,MAAM;SAChB;QACD,aAAa,EAAE;YACb,KAAK,EAAE,kBAAkB;YACzB,OAAO,EAAE,YAAY;YACrB,WAAW,EAAE,iCAAiC;YAC9C,OAAO,EAAE,MAAM;SAChB;QACD,QAAQ,EAAE;YACR,KAAK,EAAE,kBAAkB;YACzB,IAAI,EAAE,6DAA6D;YACnE,IAAI,EAAE,QAAQ;YACd,OAAO,EAAE,EAAE;SACZ;QACD,MAAM,EAAE;YACN,KAAK,EAAE,kBAAkB;YACzB,IAAI,EAAE,QAAQ;YACd,WAAW,EAAE,qBAAqB;SACnC;QACD,eAAe,EAAE;YACf,KAAK,EAAE,mBAAmB;YAC1B,KAAK,EAAE,kBAAkB;YACzB,IAAI,EAAE,yBAAyB;YAC/B,IAAI,EAAE,QAAQ;YACd,OAAO,EAAE,EAAE;YACX,QAAQ,EAAE,CAAC,KAAa,EAAE,EAAE,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC;SAC9C;KACF,CAAC;QAEF,WAAW;SACV,OAAO,CAAC;QACP,QAAQ,EAAE;YACR,KAAK,EAAE,YAAY;YACnB,KAAK,EAAE,WAAW;YAClB,IAAI,EAAE,QAAQ;YACd,OAAO,EAAE,MAAM;YACf,IAAI,EAAE,mBAAmB;SAC1B;QACD,MAAM,EAAE;YACN,KAAK,EAAE,YAAY;YACnB,IAAI,EAAE,SAAS;YACf,OAAO,EAAE,KAAK;YACd,IAAI,EAAE,iBAAiB;SACxB;KACF,CAAC;SACD,MAAM,CAAC,QAAQ,EAAE;QAChB,IAAI,EAAE,QAAQ;QACd,WAAW,EAAE,aAAa;KAC3B,CAAC;SAED,OAAO,CACN,OAAO,EACP,kCAAkC,EAClC,CAAC,KAAK,EAAE,EAAE;QACR,KAAK,CAAC,MAAM,EAAE,CAAC;IACjB,CAAC,EACD,KAAK,EAAE,IAAI,EAAE,EAAE;QACb,GAAG,CAAC,OAAO,EAAE,wBAAwB,CAAC,CAAC;QACvC,MAAM,YAAY,GAAG,MAAM,WAAW,CAAC,IAAI,CAAC,CAAC;QAC7C,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,WAAW,CAChD;YACE,IAAI,EAAE,mBAAmB;YACzB,IAAI,EAAE,SAAS;YACf,aAAa,EAAE,IAAI;YACnB,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;SACnD,EACD,IAAI,EACJ,CAAC,MAAM,EAAE,QAAQ,CAAC,CACnB,CAAC;QACF,YAAY,CAAC,qBAAqB,CAAC,UAAU,CAAC,CAAC;QAC/C,GAAG,CAAC,OAAO,EAAE,6BAA6B,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;QAE1E,MAAM,SAAS,GAAW,cAAc,CAAC,IAAI,CAAC,CAAC;QAC/C,MAAM,IAAI,GAAG,MAAM,qBAAqB,CACtC,SAAS,EACT,YAAY,EACZ,GAAI,IAAI,CAAC,UAAqB,CAAC,KAAK,CAAC,GAAG,CAAC,CAC1C,CAAC;QACF,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IAC7C,CAAC,CACF;SAEA,OAAO,CACN,gBAAgB,EAChB,uBAAuB;IACvB,gEAAgE;IAChE,CAAC,KAAK,EAAE,EAAE;QACR,KAAK,CAAC,MAAM,EAAE,CAAC,UAAU,CAAC,MAAM,EAAE;YAChC,QAAQ,EAAE,yBAAyB;YACnC,IAAI,EAAE,QAAQ;SACf,CAAC,CAAC;IACL,CAAC,EACD,KAAK,EAAE,IAAI,EAAE,EAAE;QACb,GAAG,CAAC,OAAO,EAAE,yBAAyB,CAAC,CAAC;QACxC,MAAM,YAAY,GAAG,IAAI,CAAC,SAAS,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC;QAChD,MAAM,eAAe,GAAG,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC;QAC/C,MAAM,YAAY,GAAG,MAAM,WAAW,CAAC,IAAI,CAAC,CAAC;QAC7C,GAAG,CAAC,OAAO,EAAE,6BAA6B,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;QAE1E,MAAM,WAAW,GAAG,IAAI,CAAC,WAAW,CAAC;QACrC,IAAI,IAAI,CAAC,aAAa,KAAK,MAAM,IAAI,IAAI,CAAC,aAAa,IAAI,MAAM,EAAE,CAAC;YAClE,GAAG,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC;YAC5B,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC;gBAC5B,YAAY;gBACZ,eAAe;gBACf,YAAY;gBACZ,WAAW;gBACX,WAAW,EAAE,IAAI,CAAC,IAAI;aACvB,CAAC,CAAC;YACH,GAAG,CAAC,OAAO,EAAE,sBAAsB,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YAC7D,GAAG,CAAC,OAAO,EAAE,qBAAqB,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;YAChD,MAAM,EAAE,GAAG,MAAM,MAAM,CAAC,OAAO,CAAC,MAAM,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC;YAClE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;gBAChB,MAAM,WAAW,GAAG,iBAAiB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;gBACnD,MAAM,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC;YACtD,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,MAAM,EAAE,CAAC,QAAQ,EAAE,CAAC,CAAC;YACnC,CAAC;QACH,CAAC;aAAM,CAAC;YACN,MAAM,WAAW,GAAG,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC;YAChC,MAAM,MAAM,GACV,IAAI,CAAC,aAAa,KAAK,MAAM;gBAC3B,CAAC,CAAC,IAAI,aAAa,CAAC;oBAChB,YAAY;oBACZ,eAAe;oBACf,YAAY;oBACZ,WAAW;oBACX,WAAW;iBACZ,CAAC;gBACJ,CAAC,CAAC,IAAI,oBAAoB,CAAC;oBACvB,YAAY;oBACZ,eAAe;oBACf,YAAY;oBACZ,WAAW;oBACX,WAAW;iBACZ,CAAC,CAAC;YACT,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,IAAI,CAAC,IAAc,CAAC,CAAC;YAExD,GAAG,CAAC,OAAO,EAAE,eAAe,CAAC,CAAC;YAC9B,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;YAE/C,GAAG,CAAC,OAAO,EAAE,gBAAgB,CAAC,CAAC;YAC/B,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;gBAChB,MAAM,SAAS,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC;YAC1D,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC;YACnD,CAAC;QACH,CAAC;QACD,MAAM,WAAW,GAAG,YAAY,CAAC,UAAU,CAAC,YAAY,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;QAChF,IAAI,WAAW,GAAG,IAAI,CAAC;QACvB,IAAI,SAAS,GAAG,IAAI,CAAC;QACrB,KAAK,MAAM,CAAC,IAAI,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,EAAE,CAAC;YACjD,QAAQ,CAAC,CAAC,WAAW,EAAE,EAAE,CAAC;gBACxB,KAAK,MAAM;oBACT,OAAO,CAAC,MAAM,CAAC,CAAC,SAAS,EAAE,6BAA6B,CAAC,CAAC;oBAC1D,SAAS,GAAG,gBAAgB,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC;oBACrD,GAAG,CAAC,MAAM,EAAE,SAAS,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;oBAClD,MAAM;gBACR,KAAK,eAAe;oBAClB,OAAO,CAAC,MAAM,CAAC,CAAC,WAAW,EAAE,sCAAsC,CAAC,CAAC;oBACrE,WAAW,GAAG,QAAQ,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;oBAC7D,GAAG,CAAC,MAAM,EAAE,iBAAiB,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC;oBAC5D,IAAI,IAAI,CAAC,IAAI,EAAE,CAAC;wBACd,OAAO,CAAC,MAAM,CAAC,WAAW,CAAC,GAAG,EAAE,GAAG,EAAE,kCAAkC,CAAC,CAAC;oBAC3E,CAAC;oBACD,MAAM;YACV,CAAC;QACH,CAAC;QACD,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE,uBAAuB,CAAC,CAAC;QACrD,OAAO,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,IAAI,IAAI,SAAS,EAAE,2BAA2B,CAAC,CAAC;IACvE,CAAC,CACF;SACA,OAAO,CACN,gBAAgB,EAChB,+BAA+B;IAC/B,gEAAgE;IAChE,CAAC,KAAK,EAAE,EAAE;QACR,KAAK,CAAC,MAAM,EAAE,CAAC,UAAU,CAAC,MAAM,EAAE;YAChC,QAAQ,EAAE,yBAAyB;YACnC,IAAI,EAAE,QAAQ;SACf,CAAC,CAAC;IACL,CAAC,EACD,KAAK,EAAE,IAAI,EAAE,EAAE;QACb,GAAG,CAAC,OAAO,EAAE,yBAAyB,CAAC,CAAC;QACxC,MAAM,YAAY,GAAG,MAAM,WAAW,CAAC,IAAI,CAAC,CAAC;QAC7C,GAAG,CAAC,OAAO,EAAE,6BAA6B,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;QAC1E,MAAM,WAAW,GAAG,IAAI,CAAC,WAAW,CAAC;QACrC,MAAM,eAAe,GAAG,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC;QAC/C,MAAM,YAAY,GAAG,IAAI,CAAC,SAAS,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC;QAEhD,IAAI,MAAM,KAAK,IAAI,CAAC,aAAa,IAAI,MAAM,KAAK,IAAI,CAAC,aAAa,EAAE,CAAC;YACnE,GAAG,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC;YAC5B,MAAM,cAAc,GAAW,cAAc,CAAC,IAAI,CAAC,CAAC;YACpD,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC;gBAC5B,YAAY;gBACZ,eAAe;gBACf,YAAY;gBACZ,WAAW;gBACX,cAAc;gBACd,WAAW,EAAE,IAAI,CAAC,IAAI;aACvB,CAAC,CAAC;YACH,GAAG,CAAC,OAAO,EAAE,sBAAsB,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YAC7D,MAAM,EAAE,GAAG,MAAM,MAAM,CAAC,OAAO,CAAC,MAAM,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC;YAClE,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,QAAQ,CAAC,UAAU,EAAE,yCAAyC,CAAC,CAAC;YAC5E,CAAC;YACD,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;gBAChB,MAAM,WAAW,GAAG,iBAAiB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;gBACnD,MAAM,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC;YACtD,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,MAAM,EAAE,CAAC,QAAQ,EAAE,CAAC,CAAC;YACnC,CAAC;QACH,CAAC;aAAM,CAAC;YACN,MAAM,WAAW,GAAG,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC;YAChC,MAAM,YAAY,GAAG,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,IAAI,OAAO,CAAC;YACjE,MAAM,MAAM,GACV,IAAI,CAAC,aAAa,KAAK,MAAM;gBAC3B,CAAC,CAAC,IAAI,aAAa,CAAC,EAAE,YAAY,EAAE,YAAY,EAAE,WAAW,EAAE,WAAW,EAAE,CAAC;gBAC7E,CAAC,CAAC,IAAI,oBAAoB,CAAC;oBACvB,YAAY;oBACZ,YAAY;oBACZ,WAAW;oBACX,WAAW;iBACZ,CAAC,CAAC;YACT,GAAG,CAAC,OAAO,EAAE,sBAAsB,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;YAE7D,SAAS,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;YAExB,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,IAAI,CAAC,IAAc,CAAC,CAAC;YACxD,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,OAAO,CAAC,MAAM,EAAE,EAAE,YAAY,EAAE,CAAC,CAAC;YAElE,GAAG,CAAC,OAAO,EAAE,4BAA4B,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;YACvE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;gBAChB,MAAM,SAAS,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC,CAAC;YAC3D,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,MAAM,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;YACpD,CAAC;QACH,CAAC;IACH,CAAC,CACF;SACA,KAAK,CAAC,oCAAoC,CAAC;SAC3C,KAAK,CAAC,MAAM,EAAE,GAAG,CAAC;SAClB,aAAa,EAAE;SACf,iBAAiB,EAAE;SACnB,IAAI,CAAC,MAAM,CAAC;SACZ,OAAO,CAAC;QACP,GAAG,EAAE;YACH,IAAI,EAAE,qBAAqB;SAC5B;KACF,CAAC;SAED,OAAO,CACN,SAAS,EACT,IAAI,CAAC,SAAS,CAAC;QACb,cAAc,EAAE,OAAO,CAAC,GAAG,CAAC,mBAAmB,IAAI,YAAY;QAC/D,cAAc,EAAE,OAAO;KACxB,CAAC,CACH;SACA,KAAK,CAAC,SAAS,EAAE,GAAG,CAAC;SACrB,MAAM,EAAE;SACR,UAAU,EAAE,CAChB,CAAC;AACJ,CAAC,CAAC;AAGF,MAAM,CAAC,MAAM,IAAI,GAAG,KAAK,EAAE,WAAqB,EAAE,EAAE;IAClD,WAAW,CAAC;AACd,CAAC,CAAC;AAEF,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;KAC9B,IAAI,CAAC,IAAI,CAAC;KACV,IAAI,CAAC,GAAG,EAAE;IACT,WAAW;AACb,CAAC,CAAC;KACD,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;IACb,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;AACrB,CAAC,CAAC,CAAC;AAEL,SAAS,cAAc,CAAC,EACtB,WAAW,EACX,cAAc,GAIf;IACC,IAAI,SAAiB,CAAC;IACtB,IAAI,cAAc,EAAE,CAAC;QACnB,SAAS,GAAG,MAAM,CAAC,cAAc,EAAE,GAAG,CAAC,CAAC;IAC1C,CAAC;SAAM,CAAC;QACN,MAAM,QAAQ,GAAG,MAAM,CAAC,WAAW,EAAE,GAAG,CAAC,CAAC;QAC1C,SAAS,GAAG,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC;IAC3E,CAAC;IACD,OAAO,SAAS,CAAC;AACnB,CAAC"}
@@ -0,0 +1,64 @@
1
+ export const Levels = ['CRITICAL', 'ERROR', 'WARNING', 'INFO', 'DEBUG', 'SILLY'];
2
+ export class CLIError extends Error {
3
+ constructor(prefix, message, cause) {
4
+ super(message, { cause });
5
+ this.prefix = prefix;
6
+ this.message = message;
7
+ }
8
+ }
9
+ export const log = Object.assign((thing, message) => {
10
+ let e;
11
+ let m;
12
+ let l;
13
+ if (thing instanceof CLIError) {
14
+ l = thing.prefix;
15
+ m = thing.message;
16
+ e = thing;
17
+ }
18
+ else if (thing instanceof Error) {
19
+ l = 'CRITICAL';
20
+ m = thing.message;
21
+ e = thing;
22
+ }
23
+ else {
24
+ l = thing;
25
+ m = message || '';
26
+ e = null;
27
+ }
28
+ const prefixed = `[${l}] ${m}`;
29
+ const i = Levels.indexOf(l);
30
+ if (i <= Levels.indexOf(log.level)) {
31
+ switch (l) {
32
+ case 'CRITICAL':
33
+ case 'ERROR':
34
+ if (e && !(e instanceof CLIError)) {
35
+ console.error(prefixed, e);
36
+ }
37
+ else {
38
+ console.error(prefixed);
39
+ }
40
+ break;
41
+ case 'WARNING':
42
+ if (e) {
43
+ console.warn(prefixed, e);
44
+ }
45
+ else {
46
+ console.warn(prefixed);
47
+ }
48
+ break;
49
+ case 'INFO':
50
+ console.info(prefixed);
51
+ break;
52
+ default:
53
+ console.log(prefixed);
54
+ break;
55
+ }
56
+ }
57
+ if (log.level === 'SILLY') {
58
+ console.error(e);
59
+ }
60
+ if (l === 'CRITICAL') {
61
+ process.exit(1);
62
+ }
63
+ }, { level: 'INFO' });
64
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,6 @@
1
+ if (!('document' in globalThis)) {
2
+ // @ts-expect-error // document is either undefined or readonly
3
+ globalThis.document = { documentElement: { style: {} } };
4
+ }
5
+ export {};
6
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoicG9seWZpbGxzLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vc3JjL3BvbHlmaWxscy50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxJQUFJLENBQUMsQ0FBQyxVQUFVLElBQUksVUFBVSxDQUFDLEVBQUUsQ0FBQztJQUNoQywrREFBK0Q7SUFDL0QsVUFBVSxDQUFDLFFBQVEsR0FBRyxFQUFFLGVBQWUsRUFBRSxFQUFFLEtBQUssRUFBRSxFQUFFLEVBQUUsRUFBRSxDQUFDO0FBQzNELENBQUMifQ==
package/package.json ADDED
@@ -0,0 +1,54 @@
1
+ {
2
+ "name": "@opentdf/ctl",
3
+ "version": "0.1.0-beta.1701",
4
+ "description": "Node based CLI for opentdf",
5
+ "repository": {
6
+ "type": "git",
7
+ "url": "git+https://github.com/opentdf/web-sdk.git",
8
+ "directory": "cli"
9
+ },
10
+ "license": "BSD-3-Clause-Clear",
11
+ "author": "Virtru",
12
+ "main": "dist/src/cli.js",
13
+ "type": "module",
14
+ "files": [
15
+ "dist/src/**",
16
+ "bin/opentdf.mjs"
17
+ ],
18
+ "scripts": {
19
+ "build": "tsc",
20
+ "build:watch": "tsc --watch",
21
+ "prepack": "npm run build",
22
+ "test": "npm run build && mocha dist/**/*.spec.js",
23
+ "watch": "(trap 'kill 0' SIGINT; npm run build && (npm run build:watch & npm run test -- --watch))",
24
+ "format": "prettier --write \"{src,tests}/**/*.ts\"",
25
+ "license-check": "license-checker-rseidelsohn --production --onlyAllow 'Apache-2.0; BSD; CC-BY-4.0; ISC; MIT'",
26
+ "lint": "eslint ./{src,tests}/**/*.ts"
27
+ },
28
+ "bin": {
29
+ "opentdf": "./bin/opentdf.mjs"
30
+ },
31
+ "devDependencies": {
32
+ "@esm-bundle/chai": "4.3.4-fix.0",
33
+ "@types/mocha": "10.0.9",
34
+ "@types/node": "^22.9.0",
35
+ "@types/readable-stream": "^4.0.18",
36
+ "@types/sinon": "^17.0.3",
37
+ "@types/yargs": "^17.0.33",
38
+ "@typescript-eslint/eslint-plugin": "^6.2.1",
39
+ "@typescript-eslint/parser": "^6.2.1",
40
+ "chai": "^5.1.2",
41
+ "eslint": "^8.9.0",
42
+ "eslint-config-prettier": "^8.9.0",
43
+ "license-checker-rseidelsohn": "^4.4.2",
44
+ "mocha": "^10.8.2",
45
+ "prettier": "^3.3.3",
46
+ "sinon": "^19.0.2",
47
+ "ts-node": "^10.9.2",
48
+ "typescript": "^5.1.6"
49
+ },
50
+ "dependencies": {
51
+ "@opentdf/sdk": "^0.1.0-beta.1701",
52
+ "yargs": "^17.7.2"
53
+ }
54
+ }