@opentdf/sdk 0.1.0-beta.1701

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (566) hide show
  1. package/README.md +52 -0
  2. package/dist/cjs/package.json +3 -0
  3. package/dist/cjs/src/access.js +155 -0
  4. package/dist/cjs/src/auth/Eas.js +60 -0
  5. package/dist/cjs/src/auth/auth.js +79 -0
  6. package/dist/cjs/src/auth/oidc-clientcredentials-provider.js +26 -0
  7. package/dist/cjs/src/auth/oidc-externaljwt-provider.js +33 -0
  8. package/dist/cjs/src/auth/oidc-refreshtoken-provider.js +34 -0
  9. package/dist/cjs/src/auth/oidc.js +222 -0
  10. package/dist/cjs/src/auth/providers.js +143 -0
  11. package/dist/cjs/src/encodings/base64.js +154 -0
  12. package/dist/cjs/src/encodings/hex.js +70 -0
  13. package/dist/cjs/src/encodings/index.js +29 -0
  14. package/dist/cjs/src/errors.js +138 -0
  15. package/dist/cjs/src/index.js +344 -0
  16. package/dist/cjs/src/nanotdf/Client.js +296 -0
  17. package/dist/cjs/src/nanotdf/NanoTDF.js +94 -0
  18. package/dist/cjs/src/nanotdf/browser-entry.js +19 -0
  19. package/dist/cjs/src/nanotdf/constants.js +5 -0
  20. package/dist/cjs/src/nanotdf/decrypt.js +17 -0
  21. package/dist/cjs/src/nanotdf/encrypt-dataset.js +38 -0
  22. package/dist/cjs/src/nanotdf/encrypt.js +132 -0
  23. package/dist/cjs/src/nanotdf/enum/CipherEnum.js +13 -0
  24. package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +15 -0
  25. package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +8 -0
  26. package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +11 -0
  27. package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +10 -0
  28. package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +11 -0
  29. package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +29 -0
  30. package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +11 -0
  31. package/dist/cjs/src/nanotdf/index.js +25 -0
  32. package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +3 -0
  33. package/dist/cjs/src/nanotdf/models/Ciphers.js +61 -0
  34. package/dist/cjs/src/nanotdf/models/DefaultParams.js +27 -0
  35. package/dist/cjs/src/nanotdf/models/EcCurves.js +39 -0
  36. package/dist/cjs/src/nanotdf/models/Header.js +255 -0
  37. package/dist/cjs/src/nanotdf/models/Payload.js +158 -0
  38. package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +73 -0
  39. package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +82 -0
  40. package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +38 -0
  41. package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +62 -0
  42. package/dist/cjs/src/nanotdf/models/ResourceLocator.js +211 -0
  43. package/dist/cjs/src/nanotdf/models/Signature.js +77 -0
  44. package/dist/cjs/src/nanotdf-crypto/ciphers.js +17 -0
  45. package/dist/cjs/src/nanotdf-crypto/decrypt.js +24 -0
  46. package/dist/cjs/src/nanotdf-crypto/digest.js +7 -0
  47. package/dist/cjs/src/nanotdf-crypto/ecdsaSignature.js +83 -0
  48. package/dist/cjs/src/nanotdf-crypto/encrypt.js +24 -0
  49. package/dist/cjs/src/nanotdf-crypto/enums.js +52 -0
  50. package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +20 -0
  51. package/dist/cjs/src/nanotdf-crypto/generateKeyPair.js +13 -0
  52. package/dist/cjs/src/nanotdf-crypto/generateRandomNumber.js +12 -0
  53. package/dist/cjs/src/nanotdf-crypto/importRawKey.js +18 -0
  54. package/dist/cjs/src/nanotdf-crypto/index.js +52 -0
  55. package/dist/cjs/src/nanotdf-crypto/keyAgreement.js +91 -0
  56. package/dist/cjs/src/nanotdf-crypto/pemPublicToCrypto.js +225 -0
  57. package/dist/cjs/src/policy/api.js +58 -0
  58. package/dist/cjs/src/policy/attributes.js +3 -0
  59. package/dist/cjs/src/policy/granter.js +146 -0
  60. package/dist/cjs/src/tdf/AttributeObject.js +15 -0
  61. package/dist/cjs/src/tdf/AttributeObjectJwt.js +3 -0
  62. package/dist/cjs/src/tdf/Crypto.js +47 -0
  63. package/dist/cjs/src/tdf/EntityObject.js +3 -0
  64. package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +38 -0
  65. package/dist/cjs/src/tdf/Policy.js +50 -0
  66. package/dist/cjs/src/tdf/PolicyObject.js +3 -0
  67. package/dist/cjs/src/tdf/TypedArray.js +3 -0
  68. package/dist/cjs/src/tdf/index.js +35 -0
  69. package/dist/cjs/src/types/index.js +3 -0
  70. package/dist/cjs/src/utils.js +147 -0
  71. package/dist/cjs/src/version.js +12 -0
  72. package/dist/cjs/tdf3/index.js +57 -0
  73. package/dist/cjs/tdf3/src/assertions.js +118 -0
  74. package/dist/cjs/tdf3/src/binary.js +153 -0
  75. package/dist/cjs/tdf3/src/ciphers/aes-gcm-cipher.js +56 -0
  76. package/dist/cjs/tdf3/src/ciphers/algorithms.js +8 -0
  77. package/dist/cjs/tdf3/src/ciphers/index.js +8 -0
  78. package/dist/cjs/tdf3/src/ciphers/symmetric-cipher-base.js +22 -0
  79. package/dist/cjs/tdf3/src/client/DecoratedReadableStream.js +116 -0
  80. package/dist/cjs/tdf3/src/client/builders.js +561 -0
  81. package/dist/cjs/tdf3/src/client/index.js +460 -0
  82. package/dist/cjs/tdf3/src/client/validation.js +63 -0
  83. package/dist/cjs/tdf3/src/crypto/crypto-utils.js +116 -0
  84. package/dist/cjs/tdf3/src/crypto/declarations.js +8 -0
  85. package/dist/cjs/tdf3/src/crypto/index.js +315 -0
  86. package/dist/cjs/tdf3/src/index.js +34 -0
  87. package/dist/cjs/tdf3/src/models/attribute-set.js +122 -0
  88. package/dist/cjs/tdf3/src/models/encryption-information.js +90 -0
  89. package/dist/cjs/tdf3/src/models/index.js +25 -0
  90. package/dist/cjs/tdf3/src/models/key-access.js +103 -0
  91. package/dist/cjs/tdf3/src/models/manifest.js +3 -0
  92. package/dist/cjs/tdf3/src/models/payload.js +3 -0
  93. package/dist/cjs/tdf3/src/models/policy.js +24 -0
  94. package/dist/cjs/tdf3/src/models/upsert-response.js +3 -0
  95. package/dist/cjs/tdf3/src/tdf.js +907 -0
  96. package/dist/cjs/tdf3/src/templates/default.html.js +98 -0
  97. package/dist/cjs/tdf3/src/templates/escaper.js +15 -0
  98. package/dist/cjs/tdf3/src/templates/index.js +12 -0
  99. package/dist/cjs/tdf3/src/utils/buffer-crc32.js +48 -0
  100. package/dist/cjs/tdf3/src/utils/chunkers.js +106 -0
  101. package/dist/cjs/tdf3/src/utils/index.js +296 -0
  102. package/dist/cjs/tdf3/src/utils/keysplit.js +61 -0
  103. package/dist/cjs/tdf3/src/utils/zip-reader.js +253 -0
  104. package/dist/cjs/tdf3/src/utils/zip-writer.js +308 -0
  105. package/dist/cjs/tdf3/src/version.js +6 -0
  106. package/dist/types/src/access.d.ts +47 -0
  107. package/dist/types/src/access.d.ts.map +1 -0
  108. package/dist/types/src/auth/Eas.d.ts +34 -0
  109. package/dist/types/src/auth/Eas.d.ts.map +1 -0
  110. package/dist/types/src/auth/auth.d.ts +86 -0
  111. package/dist/types/src/auth/auth.d.ts.map +1 -0
  112. package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts +9 -0
  113. package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts.map +1 -0
  114. package/dist/types/src/auth/oidc-externaljwt-provider.d.ts +10 -0
  115. package/dist/types/src/auth/oidc-externaljwt-provider.d.ts.map +1 -0
  116. package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts +10 -0
  117. package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts.map +1 -0
  118. package/dist/types/src/auth/oidc.d.ts +104 -0
  119. package/dist/types/src/auth/oidc.d.ts.map +1 -0
  120. package/dist/types/src/auth/providers.d.ts +67 -0
  121. package/dist/types/src/auth/providers.d.ts.map +1 -0
  122. package/dist/types/src/encodings/base64.d.ts +18 -0
  123. package/dist/types/src/encodings/base64.d.ts.map +1 -0
  124. package/dist/types/src/encodings/hex.d.ts +5 -0
  125. package/dist/types/src/encodings/hex.d.ts.map +1 -0
  126. package/dist/types/src/encodings/index.d.ts +3 -0
  127. package/dist/types/src/encodings/index.d.ts.map +1 -0
  128. package/dist/types/src/errors.d.ts +72 -0
  129. package/dist/types/src/errors.d.ts.map +1 -0
  130. package/dist/types/src/index.d.ts +138 -0
  131. package/dist/types/src/index.d.ts.map +1 -0
  132. package/dist/types/src/nanotdf/Client.d.ts +95 -0
  133. package/dist/types/src/nanotdf/Client.d.ts.map +1 -0
  134. package/dist/types/src/nanotdf/NanoTDF.d.ts +25 -0
  135. package/dist/types/src/nanotdf/NanoTDF.d.ts.map +1 -0
  136. package/dist/types/src/nanotdf/browser-entry.d.ts +17 -0
  137. package/dist/types/src/nanotdf/browser-entry.d.ts.map +1 -0
  138. package/dist/types/src/nanotdf/constants.d.ts +2 -0
  139. package/dist/types/src/nanotdf/constants.d.ts.map +1 -0
  140. package/dist/types/src/nanotdf/decrypt.d.ts +9 -0
  141. package/dist/types/src/nanotdf/decrypt.d.ts.map +1 -0
  142. package/dist/types/src/nanotdf/encrypt-dataset.d.ts +12 -0
  143. package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +1 -0
  144. package/dist/types/src/nanotdf/encrypt.d.ts +14 -0
  145. package/dist/types/src/nanotdf/encrypt.d.ts.map +1 -0
  146. package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +10 -0
  147. package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +1 -0
  148. package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +12 -0
  149. package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +1 -0
  150. package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +5 -0
  151. package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +1 -0
  152. package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +8 -0
  153. package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +1 -0
  154. package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +7 -0
  155. package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +1 -0
  156. package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +8 -0
  157. package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +1 -0
  158. package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +20 -0
  159. package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +1 -0
  160. package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +9 -0
  161. package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +1 -0
  162. package/dist/types/src/nanotdf/index.d.ts +9 -0
  163. package/dist/types/src/nanotdf/index.d.ts.map +1 -0
  164. package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +17 -0
  165. package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +1 -0
  166. package/dist/types/src/nanotdf/models/Ciphers.d.ts +14 -0
  167. package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +1 -0
  168. package/dist/types/src/nanotdf/models/DefaultParams.d.ts +21 -0
  169. package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +1 -0
  170. package/dist/types/src/nanotdf/models/EcCurves.d.ts +15 -0
  171. package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +1 -0
  172. package/dist/types/src/nanotdf/models/Header.d.ts +73 -0
  173. package/dist/types/src/nanotdf/models/Header.d.ts.map +1 -0
  174. package/dist/types/src/nanotdf/models/Payload.d.ts +47 -0
  175. package/dist/types/src/nanotdf/models/Payload.d.ts.map +1 -0
  176. package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +52 -0
  177. package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +1 -0
  178. package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +35 -0
  179. package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +1 -0
  180. package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +11 -0
  181. package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +1 -0
  182. package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +31 -0
  183. package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +1 -0
  184. package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +65 -0
  185. package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +1 -0
  186. package/dist/types/src/nanotdf/models/Signature.d.ts +33 -0
  187. package/dist/types/src/nanotdf/models/Signature.d.ts.map +1 -0
  188. package/dist/types/src/nanotdf-crypto/ciphers.d.ts +8 -0
  189. package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +1 -0
  190. package/dist/types/src/nanotdf-crypto/decrypt.d.ts +14 -0
  191. package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +1 -0
  192. package/dist/types/src/nanotdf-crypto/digest.d.ts +3 -0
  193. package/dist/types/src/nanotdf-crypto/digest.d.ts.map +1 -0
  194. package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts +35 -0
  195. package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +1 -0
  196. package/dist/types/src/nanotdf-crypto/encrypt.d.ts +14 -0
  197. package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +1 -0
  198. package/dist/types/src/nanotdf-crypto/enums.d.ts +42 -0
  199. package/dist/types/src/nanotdf-crypto/enums.d.ts.map +1 -0
  200. package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts +7 -0
  201. package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +1 -0
  202. package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts +10 -0
  203. package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +1 -0
  204. package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts +5 -0
  205. package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +1 -0
  206. package/dist/types/src/nanotdf-crypto/importRawKey.d.ts +13 -0
  207. package/dist/types/src/nanotdf-crypto/importRawKey.d.ts.map +1 -0
  208. package/dist/types/src/nanotdf-crypto/index.d.ts +12 -0
  209. package/dist/types/src/nanotdf-crypto/index.d.ts.map +1 -0
  210. package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts +28 -0
  211. package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +1 -0
  212. package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts +28 -0
  213. package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +1 -0
  214. package/dist/types/src/policy/api.d.ts +4 -0
  215. package/dist/types/src/policy/api.d.ts.map +1 -0
  216. package/dist/types/src/policy/attributes.d.ts +95 -0
  217. package/dist/types/src/policy/attributes.d.ts.map +1 -0
  218. package/dist/types/src/policy/granter.d.ts +23 -0
  219. package/dist/types/src/policy/granter.d.ts.map +1 -0
  220. package/dist/types/src/tdf/AttributeObject.d.ts +13 -0
  221. package/dist/types/src/tdf/AttributeObject.d.ts.map +1 -0
  222. package/dist/types/src/tdf/AttributeObjectJwt.d.ts +4 -0
  223. package/dist/types/src/tdf/AttributeObjectJwt.d.ts.map +1 -0
  224. package/dist/types/src/tdf/Crypto.d.ts +37 -0
  225. package/dist/types/src/tdf/Crypto.d.ts.map +1 -0
  226. package/dist/types/src/tdf/EntityObject.d.ts +18 -0
  227. package/dist/types/src/tdf/EntityObject.d.ts.map +1 -0
  228. package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +99 -0
  229. package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +1 -0
  230. package/dist/types/src/tdf/Policy.d.ts +28 -0
  231. package/dist/types/src/tdf/Policy.d.ts.map +1 -0
  232. package/dist/types/src/tdf/PolicyObject.d.ts +11 -0
  233. package/dist/types/src/tdf/PolicyObject.d.ts.map +1 -0
  234. package/dist/types/src/tdf/TypedArray.d.ts +3 -0
  235. package/dist/types/src/tdf/TypedArray.d.ts.map +1 -0
  236. package/dist/types/src/tdf/index.d.ts +7 -0
  237. package/dist/types/src/tdf/index.d.ts.map +1 -0
  238. package/dist/types/src/types/index.d.ts +45 -0
  239. package/dist/types/src/types/index.d.ts.map +1 -0
  240. package/dist/types/src/utils.d.ts +45 -0
  241. package/dist/types/src/utils.d.ts.map +1 -0
  242. package/dist/types/src/version.d.ts +9 -0
  243. package/dist/types/src/version.d.ts.map +1 -0
  244. package/dist/types/tdf3/index.d.ts +16 -0
  245. package/dist/types/tdf3/index.d.ts.map +1 -0
  246. package/dist/types/tdf3/src/assertions.d.ts +63 -0
  247. package/dist/types/tdf3/src/assertions.d.ts.map +1 -0
  248. package/dist/types/tdf3/src/binary.d.ts +38 -0
  249. package/dist/types/tdf3/src/binary.d.ts.map +1 -0
  250. package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts +18 -0
  251. package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts.map +1 -0
  252. package/dist/types/tdf3/src/ciphers/algorithms.d.ts +4 -0
  253. package/dist/types/tdf3/src/ciphers/algorithms.d.ts.map +1 -0
  254. package/dist/types/tdf3/src/ciphers/index.d.ts +3 -0
  255. package/dist/types/tdf3/src/ciphers/index.d.ts.map +1 -0
  256. package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts +14 -0
  257. package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts.map +1 -0
  258. package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts +53 -0
  259. package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts.map +1 -0
  260. package/dist/types/tdf3/src/client/builders.d.ts +436 -0
  261. package/dist/types/tdf3/src/client/builders.d.ts.map +1 -0
  262. package/dist/types/tdf3/src/client/index.d.ts +139 -0
  263. package/dist/types/tdf3/src/client/index.d.ts.map +1 -0
  264. package/dist/types/tdf3/src/client/validation.d.ts +8 -0
  265. package/dist/types/tdf3/src/client/validation.d.ts.map +1 -0
  266. package/dist/types/tdf3/src/crypto/crypto-utils.d.ts +34 -0
  267. package/dist/types/tdf3/src/crypto/crypto-utils.d.ts.map +1 -0
  268. package/dist/types/tdf3/src/crypto/declarations.d.ts +60 -0
  269. package/dist/types/tdf3/src/crypto/declarations.d.ts.map +1 -0
  270. package/dist/types/tdf3/src/crypto/index.d.ts +103 -0
  271. package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -0
  272. package/dist/types/tdf3/src/index.d.ts +5 -0
  273. package/dist/types/tdf3/src/index.d.ts.map +1 -0
  274. package/dist/types/tdf3/src/models/attribute-set.d.ts +65 -0
  275. package/dist/types/tdf3/src/models/attribute-set.d.ts.map +1 -0
  276. package/dist/types/tdf3/src/models/encryption-information.d.ts +49 -0
  277. package/dist/types/tdf3/src/models/encryption-information.d.ts.map +1 -0
  278. package/dist/types/tdf3/src/models/index.d.ts +9 -0
  279. package/dist/types/tdf3/src/models/index.d.ts.map +1 -0
  280. package/dist/types/tdf3/src/models/key-access.d.ts +42 -0
  281. package/dist/types/tdf3/src/models/key-access.d.ts.map +1 -0
  282. package/dist/types/tdf3/src/models/manifest.d.ts +9 -0
  283. package/dist/types/tdf3/src/models/manifest.d.ts.map +1 -0
  284. package/dist/types/tdf3/src/models/payload.d.ts +7 -0
  285. package/dist/types/tdf3/src/models/payload.d.ts.map +1 -0
  286. package/dist/types/tdf3/src/models/policy.d.ts +13 -0
  287. package/dist/types/tdf3/src/models/policy.d.ts.map +1 -0
  288. package/dist/types/tdf3/src/models/upsert-response.d.ts +16 -0
  289. package/dist/types/tdf3/src/models/upsert-response.d.ts.map +1 -0
  290. package/dist/types/tdf3/src/tdf.d.ts +152 -0
  291. package/dist/types/tdf3/src/tdf.d.ts.map +1 -0
  292. package/dist/types/tdf3/src/templates/default.html.d.ts +8 -0
  293. package/dist/types/tdf3/src/templates/default.html.d.ts.map +1 -0
  294. package/dist/types/tdf3/src/templates/escaper.d.ts +6 -0
  295. package/dist/types/tdf3/src/templates/escaper.d.ts.map +1 -0
  296. package/dist/types/tdf3/src/templates/index.d.ts +3 -0
  297. package/dist/types/tdf3/src/templates/index.d.ts.map +1 -0
  298. package/dist/types/tdf3/src/utils/buffer-crc32.d.ts +2 -0
  299. package/dist/types/tdf3/src/utils/buffer-crc32.d.ts.map +1 -0
  300. package/dist/types/tdf3/src/utils/chunkers.d.ts +29 -0
  301. package/dist/types/tdf3/src/utils/chunkers.d.ts.map +1 -0
  302. package/dist/types/tdf3/src/utils/index.d.ts +36 -0
  303. package/dist/types/tdf3/src/utils/index.d.ts.map +1 -0
  304. package/dist/types/tdf3/src/utils/keysplit.d.ts +19 -0
  305. package/dist/types/tdf3/src/utils/keysplit.d.ts.map +1 -0
  306. package/dist/types/tdf3/src/utils/zip-reader.d.ts +63 -0
  307. package/dist/types/tdf3/src/utils/zip-reader.d.ts.map +1 -0
  308. package/dist/types/tdf3/src/utils/zip-writer.d.ts +35 -0
  309. package/dist/types/tdf3/src/utils/zip-writer.d.ts.map +1 -0
  310. package/dist/types/tdf3/src/version.d.ts +3 -0
  311. package/dist/types/tdf3/src/version.d.ts.map +1 -0
  312. package/dist/web/package.json +3 -0
  313. package/dist/web/src/access.js +147 -0
  314. package/dist/web/src/auth/Eas.js +55 -0
  315. package/dist/web/src/auth/auth.js +71 -0
  316. package/dist/web/src/auth/oidc-clientcredentials-provider.js +22 -0
  317. package/dist/web/src/auth/oidc-externaljwt-provider.js +29 -0
  318. package/dist/web/src/auth/oidc-refreshtoken-provider.js +30 -0
  319. package/dist/web/src/auth/oidc.js +215 -0
  320. package/dist/web/src/auth/providers.js +119 -0
  321. package/dist/web/src/encodings/base64.js +147 -0
  322. package/dist/web/src/encodings/hex.js +63 -0
  323. package/dist/web/src/encodings/index.js +3 -0
  324. package/dist/web/src/errors.js +123 -0
  325. package/dist/web/src/index.js +313 -0
  326. package/dist/web/src/nanotdf/Client.js +268 -0
  327. package/dist/web/src/nanotdf/NanoTDF.js +89 -0
  328. package/dist/web/src/nanotdf/browser-entry.js +14 -0
  329. package/dist/web/src/nanotdf/constants.js +2 -0
  330. package/dist/web/src/nanotdf/decrypt.js +14 -0
  331. package/dist/web/src/nanotdf/encrypt-dataset.js +32 -0
  332. package/dist/web/src/nanotdf/encrypt.js +126 -0
  333. package/dist/web/src/nanotdf/enum/CipherEnum.js +11 -0
  334. package/dist/web/src/nanotdf/enum/CurveNameEnum.js +13 -0
  335. package/dist/web/src/nanotdf/enum/EncodingEnum.js +6 -0
  336. package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +9 -0
  337. package/dist/web/src/nanotdf/enum/ProtocolEnum.js +8 -0
  338. package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +9 -0
  339. package/dist/web/src/nanotdf/helpers/calculateByCurve.js +24 -0
  340. package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +8 -0
  341. package/dist/web/src/nanotdf/index.js +11 -0
  342. package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +2 -0
  343. package/dist/web/src/nanotdf/models/Ciphers.js +54 -0
  344. package/dist/web/src/nanotdf/models/DefaultParams.js +22 -0
  345. package/dist/web/src/nanotdf/models/EcCurves.js +32 -0
  346. package/dist/web/src/nanotdf/models/Header.js +250 -0
  347. package/dist/web/src/nanotdf/models/Payload.js +156 -0
  348. package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +71 -0
  349. package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +77 -0
  350. package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +33 -0
  351. package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +57 -0
  352. package/dist/web/src/nanotdf/models/ResourceLocator.js +206 -0
  353. package/dist/web/src/nanotdf/models/Signature.js +74 -0
  354. package/dist/web/src/nanotdf-crypto/ciphers.js +14 -0
  355. package/dist/web/src/nanotdf-crypto/decrypt.js +21 -0
  356. package/dist/web/src/nanotdf-crypto/digest.js +4 -0
  357. package/dist/web/src/nanotdf-crypto/ecdsaSignature.js +77 -0
  358. package/dist/web/src/nanotdf-crypto/encrypt.js +21 -0
  359. package/dist/web/src/nanotdf-crypto/enums.js +49 -0
  360. package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +17 -0
  361. package/dist/web/src/nanotdf-crypto/generateKeyPair.js +10 -0
  362. package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +9 -0
  363. package/dist/web/src/nanotdf-crypto/importRawKey.js +15 -0
  364. package/dist/web/src/nanotdf-crypto/index.js +12 -0
  365. package/dist/web/src/nanotdf-crypto/keyAgreement.js +87 -0
  366. package/dist/web/src/nanotdf-crypto/pemPublicToCrypto.js +197 -0
  367. package/dist/web/src/policy/api.js +54 -0
  368. package/dist/web/src/policy/attributes.js +2 -0
  369. package/dist/web/src/policy/granter.js +141 -0
  370. package/dist/web/src/tdf/AttributeObject.js +11 -0
  371. package/dist/web/src/tdf/AttributeObjectJwt.js +2 -0
  372. package/dist/web/src/tdf/Crypto.js +44 -0
  373. package/dist/web/src/tdf/EntityObject.js +2 -0
  374. package/dist/web/src/tdf/NanoTDF/NanoTDF.js +35 -0
  375. package/dist/web/src/tdf/Policy.js +48 -0
  376. package/dist/web/src/tdf/PolicyObject.js +2 -0
  377. package/dist/web/src/tdf/TypedArray.js +2 -0
  378. package/dist/web/src/tdf/index.js +4 -0
  379. package/dist/web/src/types/index.js +2 -0
  380. package/dist/web/src/utils.js +133 -0
  381. package/dist/web/src/version.js +9 -0
  382. package/dist/web/tdf3/index.js +13 -0
  383. package/dist/web/tdf3/src/assertions.js +111 -0
  384. package/dist/web/tdf3/src/binary.js +149 -0
  385. package/dist/web/tdf3/src/ciphers/aes-gcm-cipher.js +52 -0
  386. package/dist/web/tdf3/src/ciphers/algorithms.js +5 -0
  387. package/dist/web/tdf3/src/ciphers/index.js +3 -0
  388. package/dist/web/tdf3/src/ciphers/symmetric-cipher-base.js +18 -0
  389. package/dist/web/tdf3/src/client/DecoratedReadableStream.js +107 -0
  390. package/dist/web/tdf3/src/client/builders.js +557 -0
  391. package/dist/web/tdf3/src/client/index.js +423 -0
  392. package/dist/web/tdf3/src/client/validation.js +58 -0
  393. package/dist/web/tdf3/src/crypto/crypto-utils.js +107 -0
  394. package/dist/web/tdf3/src/crypto/declarations.js +5 -0
  395. package/dist/web/tdf3/src/crypto/index.js +296 -0
  396. package/dist/web/tdf3/src/index.js +5 -0
  397. package/dist/web/tdf3/src/models/attribute-set.js +118 -0
  398. package/dist/web/tdf3/src/models/encryption-information.js +86 -0
  399. package/dist/web/tdf3/src/models/index.js +9 -0
  400. package/dist/web/tdf3/src/models/key-access.js +74 -0
  401. package/dist/web/tdf3/src/models/manifest.js +2 -0
  402. package/dist/web/tdf3/src/models/payload.js +2 -0
  403. package/dist/web/tdf3/src/models/policy.js +20 -0
  404. package/dist/web/tdf3/src/models/upsert-response.js +2 -0
  405. package/dist/web/tdf3/src/tdf.js +866 -0
  406. package/dist/web/tdf3/src/templates/default.html.js +96 -0
  407. package/dist/web/tdf3/src/templates/escaper.js +10 -0
  408. package/dist/web/tdf3/src/templates/index.js +3 -0
  409. package/dist/web/tdf3/src/utils/buffer-crc32.js +44 -0
  410. package/dist/web/tdf3/src/utils/chunkers.js +96 -0
  411. package/dist/web/tdf3/src/utils/index.js +248 -0
  412. package/dist/web/tdf3/src/utils/keysplit.js +55 -0
  413. package/dist/web/tdf3/src/utils/zip-reader.js +247 -0
  414. package/dist/web/tdf3/src/utils/zip-writer.js +302 -0
  415. package/dist/web/tdf3/src/version.js +3 -0
  416. package/package.json +126 -0
  417. package/src/access.ts +198 -0
  418. package/src/auth/Eas.ts +79 -0
  419. package/src/auth/auth.ts +141 -0
  420. package/src/auth/oidc-clientcredentials-provider.ts +32 -0
  421. package/src/auth/oidc-externaljwt-provider.ts +41 -0
  422. package/src/auth/oidc-refreshtoken-provider.ts +41 -0
  423. package/src/auth/oidc.ts +307 -0
  424. package/src/auth/providers.ts +139 -0
  425. package/src/encodings/base64.ts +160 -0
  426. package/src/encodings/hex.ts +69 -0
  427. package/src/encodings/index.ts +2 -0
  428. package/src/errors.ts +113 -0
  429. package/src/index.ts +441 -0
  430. package/src/nanotdf/Client.ts +349 -0
  431. package/src/nanotdf/NanoTDF.ts +121 -0
  432. package/src/nanotdf/browser-entry.ts +20 -0
  433. package/src/nanotdf/constants.ts +1 -0
  434. package/src/nanotdf/decrypt.ts +19 -0
  435. package/src/nanotdf/encrypt-dataset.ts +52 -0
  436. package/src/nanotdf/encrypt.ts +197 -0
  437. package/src/nanotdf/enum/CipherEnum.ts +10 -0
  438. package/src/nanotdf/enum/CurveNameEnum.ts +12 -0
  439. package/src/nanotdf/enum/EncodingEnum.ts +5 -0
  440. package/src/nanotdf/enum/PolicyTypeEnum.ts +8 -0
  441. package/src/nanotdf/enum/ProtocolEnum.ts +7 -0
  442. package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +8 -0
  443. package/src/nanotdf/helpers/calculateByCurve.ts +26 -0
  444. package/src/nanotdf/helpers/getHkdfSalt.ts +15 -0
  445. package/src/nanotdf/index.ts +10 -0
  446. package/src/nanotdf/interfaces/PolicyInterface.ts +27 -0
  447. package/src/nanotdf/models/Ciphers.ts +67 -0
  448. package/src/nanotdf/models/DefaultParams.ts +24 -0
  449. package/src/nanotdf/models/EcCurves.ts +40 -0
  450. package/src/nanotdf/models/Header.ts +322 -0
  451. package/src/nanotdf/models/Payload.ts +196 -0
  452. package/src/nanotdf/models/Policy/AbstractPolicy.ts +90 -0
  453. package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +101 -0
  454. package/src/nanotdf/models/Policy/PolicyFactory.ts +48 -0
  455. package/src/nanotdf/models/Policy/RemotePolicy.ts +74 -0
  456. package/src/nanotdf/models/ResourceLocator.ts +212 -0
  457. package/src/nanotdf/models/Signature.ts +85 -0
  458. package/src/nanotdf-crypto/ciphers.ts +13 -0
  459. package/src/nanotdf-crypto/decrypt.ts +30 -0
  460. package/src/nanotdf-crypto/digest.ts +8 -0
  461. package/src/nanotdf-crypto/ecdsaSignature.ts +109 -0
  462. package/src/nanotdf-crypto/encrypt.ts +30 -0
  463. package/src/nanotdf-crypto/enums.ts +47 -0
  464. package/src/nanotdf-crypto/exportCryptoKey.ts +17 -0
  465. package/src/nanotdf-crypto/generateKeyPair.ts +19 -0
  466. package/src/nanotdf-crypto/generateRandomNumber.ts +8 -0
  467. package/src/nanotdf-crypto/importRawKey.ts +19 -0
  468. package/src/nanotdf-crypto/index.ts +11 -0
  469. package/src/nanotdf-crypto/keyAgreement.ts +139 -0
  470. package/src/nanotdf-crypto/pemPublicToCrypto.ts +232 -0
  471. package/src/package-lock.json +6 -0
  472. package/src/package.json +3 -0
  473. package/src/platform/authorization/authorization_connect.d.ts +44 -0
  474. package/src/platform/authorization/authorization_connect.js +44 -0
  475. package/src/platform/authorization/authorization_pb.d.ts +707 -0
  476. package/src/platform/authorization/authorization_pb.js +372 -0
  477. package/src/platform/common/common_pb.d.ts +129 -0
  478. package/src/platform/common/common_pb.js +58 -0
  479. package/src/platform/entityresolution/entity_resolution_connect.d.ts +35 -0
  480. package/src/platform/entityresolution/entity_resolution_connect.js +35 -0
  481. package/src/platform/entityresolution/entity_resolution_pb.d.ts +242 -0
  482. package/src/platform/entityresolution/entity_resolution_pb.js +139 -0
  483. package/src/platform/kas/kas_connect.d.ts +59 -0
  484. package/src/platform/kas/kas_connect.js +59 -0
  485. package/src/platform/kas/kas_pb.d.ts +200 -0
  486. package/src/platform/kas/kas_pb.js +84 -0
  487. package/src/platform/policy/attributes/attributes_connect.d.ts +168 -0
  488. package/src/platform/policy/attributes/attributes_connect.js +168 -0
  489. package/src/platform/policy/attributes/attributes_pb.d.ts +929 -0
  490. package/src/platform/policy/attributes/attributes_pb.js +363 -0
  491. package/src/platform/policy/kasregistry/key_access_server_registry_connect.d.ts +62 -0
  492. package/src/platform/policy/kasregistry/key_access_server_registry_connect.js +62 -0
  493. package/src/platform/policy/kasregistry/key_access_server_registry_pb.d.ts +283 -0
  494. package/src/platform/policy/kasregistry/key_access_server_registry_pb.js +113 -0
  495. package/src/platform/policy/namespaces/namespaces_connect.d.ts +62 -0
  496. package/src/platform/policy/namespaces/namespaces_connect.js +62 -0
  497. package/src/platform/policy/namespaces/namespaces_pb.d.ts +270 -0
  498. package/src/platform/policy/namespaces/namespaces_pb.js +110 -0
  499. package/src/platform/policy/objects_pb.d.ts +725 -0
  500. package/src/platform/policy/objects_pb.js +288 -0
  501. package/src/platform/policy/resourcemapping/resource_mapping_connect.d.ts +259 -0
  502. package/src/platform/policy/resourcemapping/resource_mapping_connect.js +259 -0
  503. package/src/platform/policy/resourcemapping/resource_mapping_pb.d.ts +314 -0
  504. package/src/platform/policy/resourcemapping/resource_mapping_pb.js +142 -0
  505. package/src/platform/policy/selectors_pb.d.ts +269 -0
  506. package/src/platform/policy/selectors_pb.js +110 -0
  507. package/src/platform/policy/subjectmapping/subject_mapping_connect.d.ts +118 -0
  508. package/src/platform/policy/subjectmapping/subject_mapping_connect.js +118 -0
  509. package/src/platform/policy/subjectmapping/subject_mapping_pb.d.ts +672 -0
  510. package/src/platform/policy/subjectmapping/subject_mapping_pb.js +260 -0
  511. package/src/platform/wellknownconfiguration/wellknown_configuration_connect.d.ts +26 -0
  512. package/src/platform/wellknownconfiguration/wellknown_configuration_connect.js +26 -0
  513. package/src/platform/wellknownconfiguration/wellknown_configuration_pb.d.ts +75 -0
  514. package/src/platform/wellknownconfiguration/wellknown_configuration_pb.js +35 -0
  515. package/src/policy/api.ts +61 -0
  516. package/src/policy/attributes.ts +117 -0
  517. package/src/policy/granter.ts +181 -0
  518. package/src/tdf/AttributeObject.ts +27 -0
  519. package/src/tdf/AttributeObjectJwt.ts +3 -0
  520. package/src/tdf/Crypto.ts +42 -0
  521. package/src/tdf/EntityObject.ts +18 -0
  522. package/src/tdf/NanoTDF/NanoTDF.ts +120 -0
  523. package/src/tdf/Policy.ts +51 -0
  524. package/src/tdf/PolicyObject.ts +12 -0
  525. package/src/tdf/TypedArray.ts +12 -0
  526. package/src/tdf/index.ts +6 -0
  527. package/src/types/index.ts +55 -0
  528. package/src/utils.ts +149 -0
  529. package/src/version.ts +9 -0
  530. package/tdf3/index.ts +91 -0
  531. package/tdf3/package-lock.json +6 -0
  532. package/tdf3/package.json +3 -0
  533. package/tdf3/src/assertions.ts +191 -0
  534. package/tdf3/src/binary.ts +195 -0
  535. package/tdf3/src/ciphers/aes-gcm-cipher.ts +76 -0
  536. package/tdf3/src/ciphers/algorithms.ts +9 -0
  537. package/tdf3/src/ciphers/index.ts +2 -0
  538. package/tdf3/src/ciphers/symmetric-cipher-base.ts +38 -0
  539. package/tdf3/src/client/DecoratedReadableStream.ts +148 -0
  540. package/tdf3/src/client/builders.ts +701 -0
  541. package/tdf3/src/client/index.ts +637 -0
  542. package/tdf3/src/client/validation.ts +79 -0
  543. package/tdf3/src/crypto/crypto-utils.ts +119 -0
  544. package/tdf3/src/crypto/declarations.ts +89 -0
  545. package/tdf3/src/crypto/index.ts +394 -0
  546. package/tdf3/src/index.ts +4 -0
  547. package/tdf3/src/models/attribute-set.ts +142 -0
  548. package/tdf3/src/models/encryption-information.ts +172 -0
  549. package/tdf3/src/models/index.ts +8 -0
  550. package/tdf3/src/models/key-access.ts +128 -0
  551. package/tdf3/src/models/manifest.ts +9 -0
  552. package/tdf3/src/models/payload.ts +6 -0
  553. package/tdf3/src/models/policy.ts +35 -0
  554. package/tdf3/src/models/upsert-response.ts +17 -0
  555. package/tdf3/src/tdf.ts +1351 -0
  556. package/tdf3/src/templates/default.html.ts +105 -0
  557. package/tdf3/src/templates/escaper.ts +10 -0
  558. package/tdf3/src/templates/index.ts +2 -0
  559. package/tdf3/src/utils/buffer-crc32.ts +46 -0
  560. package/tdf3/src/utils/chunkers.ts +118 -0
  561. package/tdf3/src/utils/index.ts +309 -0
  562. package/tdf3/src/utils/keysplit.ts +63 -0
  563. package/tdf3/src/utils/zip-reader.ts +341 -0
  564. package/tdf3/src/utils/zip-writer.ts +375 -0
  565. package/tdf3/src/version.ts +2 -0
  566. package/tdf3/types.d.ts +14 -0
@@ -0,0 +1,907 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ var __importDefault = (this && this.__importDefault) || function (mod) {
26
+ return (mod && mod.__esModule) ? mod : { "default": mod };
27
+ };
28
+ Object.defineProperty(exports, "__esModule", { value: true });
29
+ exports.readStream = exports.sliceAndDecrypt = exports.splitLookupTableFactory = exports.loadTDFStream = exports.writeStream = exports.upsert = exports.validatePolicyObject = exports.buildKeyAccess = exports.extractPemFromKeyString = exports.unwrapHtml = exports.wrapHtml = exports.fetchKasPublicKey = void 0;
30
+ const axios_1 = __importDefault(require("axios"));
31
+ const buffer_crc32_js_1 = require("./utils/buffer-crc32.js");
32
+ const jose_1 = require("jose");
33
+ const DecoratedReadableStream_js_1 = require("./client/DecoratedReadableStream.js");
34
+ const utils_js_1 = require("../../src/utils.js");
35
+ const assertions = __importStar(require("./assertions.js"));
36
+ const index_js_1 = require("./models/index.js");
37
+ const index_js_2 = require("../../src/encodings/index.js");
38
+ const index_js_3 = require("./utils/index.js");
39
+ const binary_js_1 = require("./binary.js");
40
+ const access_js_1 = require("../../src/access.js");
41
+ const errors_js_1 = require("../../src/errors.js");
42
+ const index_js_4 = require("./templates/index.js");
43
+ // configurable
44
+ // TODO: remove dependencies from ciphers so that we can open-source instead of relying on other Virtru libs
45
+ const index_js_5 = require("./ciphers/index.js");
46
+ const auth_js_1 = require("../../src/auth/auth.js");
47
+ // TODO: input validation on manifest JSON
48
+ const DEFAULT_SEGMENT_SIZE = 1024 * 1024;
49
+ /**
50
+ * If we have KAS url but not public key we can fetch it from KAS, fetching
51
+ * the value from `${kas}/kas_public_key`.
52
+ */
53
+ async function fetchKasPublicKey(kas, algorithm) {
54
+ if (!kas) {
55
+ throw new errors_js_1.ConfigurationError('KAS definition not found');
56
+ }
57
+ // Logs insecure KAS. Secure is enforced in constructor
58
+ (0, utils_js_1.validateSecureUrl)(kas);
59
+ const infoStatic = { url: kas, algorithm: algorithm || 'rsa:2048' };
60
+ const params = {};
61
+ if (algorithm) {
62
+ params.algorithm = algorithm;
63
+ }
64
+ const v2Url = `${kas}/v2/kas_public_key`;
65
+ try {
66
+ const response = await axios_1.default.get(v2Url, {
67
+ params: {
68
+ ...params,
69
+ v: '2',
70
+ },
71
+ });
72
+ const publicKey = typeof response.data === 'string'
73
+ ? await extractPemFromKeyString(response.data)
74
+ : response.data.publicKey;
75
+ return {
76
+ publicKey,
77
+ key: (0, utils_js_1.pemToCryptoPublicKey)(publicKey),
78
+ ...infoStatic,
79
+ ...(typeof response.data !== 'string' && response.data.kid && { kid: response.data.kid }),
80
+ };
81
+ }
82
+ catch (cause) {
83
+ const status = cause?.response?.status;
84
+ switch (status) {
85
+ case 400:
86
+ case 404:
87
+ // KAS does not yet implement v2, maybe
88
+ break;
89
+ case 401:
90
+ throw new errors_js_1.UnauthenticatedError(`[${v2Url}] requires auth`, cause);
91
+ case 403:
92
+ throw new errors_js_1.PermissionDeniedError(`[${v2Url}] permission denied`, cause);
93
+ default:
94
+ if (status && status >= 400 && status < 500) {
95
+ throw new errors_js_1.ConfigurationError(`[${v2Url}] request error [${status}] [${cause.name}] [${cause.message}]`, cause);
96
+ }
97
+ throw new errors_js_1.NetworkError(`[${v2Url}] error [${status}] [${cause.name}] [${cause.message}]`, cause);
98
+ }
99
+ }
100
+ // Retry with v1 params
101
+ const v1Url = `${kas}/kas_public_key`;
102
+ try {
103
+ const response = await axios_1.default.get(v1Url, {
104
+ params,
105
+ });
106
+ const publicKey = typeof response.data === 'string'
107
+ ? await extractPemFromKeyString(response.data)
108
+ : response.data.publicKey;
109
+ // future proof: allow v2 response even if not specified.
110
+ return {
111
+ publicKey,
112
+ key: (0, utils_js_1.pemToCryptoPublicKey)(publicKey),
113
+ ...infoStatic,
114
+ ...(typeof response.data !== 'string' && response.data.kid && { kid: response.data.kid }),
115
+ };
116
+ }
117
+ catch (cause) {
118
+ const status = cause?.response?.status;
119
+ switch (status) {
120
+ case 401:
121
+ throw new errors_js_1.UnauthenticatedError(`[${v1Url}] requires auth`, cause);
122
+ case 403:
123
+ throw new errors_js_1.PermissionDeniedError(`[${v1Url}] permission denied`, cause);
124
+ default:
125
+ if (status && status >= 400 && status < 500) {
126
+ throw new errors_js_1.ConfigurationError(`[${v2Url}] request error [${status}] [${cause.name}] [${cause.message}]`, cause);
127
+ }
128
+ throw new errors_js_1.NetworkError(`[${v1Url}] error [${status}] [${cause.name}] [${cause.message}]`, cause);
129
+ }
130
+ }
131
+ }
132
+ exports.fetchKasPublicKey = fetchKasPublicKey;
133
+ /**
134
+ *
135
+ * @param payload The TDF content to encode in HTML
136
+ * @param manifest A copy of the manifest
137
+ * @param transferUrl reader web-service start page
138
+ * @return utf-8 encoded HTML data
139
+ */
140
+ function wrapHtml(payload, manifest, transferUrl) {
141
+ const { origin } = new URL(transferUrl);
142
+ const exportManifest = typeof manifest === 'string' ? manifest : JSON.stringify(manifest);
143
+ const fullHtmlString = (0, index_js_4.htmlWrapperTemplate)({
144
+ transferUrl,
145
+ transferBaseUrl: origin,
146
+ manifest: index_js_2.base64.encode(exportManifest),
147
+ payload: (0, index_js_3.buffToString)(payload, 'base64'),
148
+ });
149
+ return new TextEncoder().encode(fullHtmlString);
150
+ }
151
+ exports.wrapHtml = wrapHtml;
152
+ function unwrapHtml(htmlPayload) {
153
+ let html;
154
+ if (htmlPayload instanceof ArrayBuffer || ArrayBuffer.isView(htmlPayload)) {
155
+ html = new TextDecoder().decode(htmlPayload);
156
+ }
157
+ else {
158
+ html = htmlPayload.toString();
159
+ }
160
+ const payloadRe = /<input id=['"]?data-input['"]?[^>]*?value=['"]?([a-zA-Z0-9+/=]+)['"]?/;
161
+ const reResult = payloadRe.exec(html);
162
+ if (reResult === null) {
163
+ throw new errors_js_1.InvalidFileError('Payload is missing');
164
+ }
165
+ const base64Payload = reResult[1];
166
+ try {
167
+ return (0, index_js_3.base64ToBuffer)(base64Payload);
168
+ }
169
+ catch (e) {
170
+ throw new errors_js_1.InvalidFileError('There was a problem extracting the TDF3 payload', e);
171
+ }
172
+ }
173
+ exports.unwrapHtml = unwrapHtml;
174
+ async function extractPemFromKeyString(keyString) {
175
+ let pem = keyString;
176
+ // Skip the public key extraction if we find that the KAS url provides a
177
+ // PEM-encoded key instead of certificate
178
+ if (keyString.includes('CERTIFICATE')) {
179
+ const cert = await (0, jose_1.importX509)(keyString, 'RS256', { extractable: true });
180
+ pem = await (0, jose_1.exportSPKI)(cert);
181
+ }
182
+ return pem;
183
+ }
184
+ exports.extractPemFromKeyString = extractPemFromKeyString;
185
+ /**
186
+ * Build a key access object and add it to the list. Can specify either
187
+ * a (url, publicKey) pair (legacy, deprecated) or an attribute URL (future).
188
+ * If all are missing then it attempts to use the default attribute. If that
189
+ * is missing it throws an error.
190
+ * @param {Object} options
191
+ * @param {String} options.type - enum representing how the object key is treated
192
+ * @param {String} options.attributeUrl - URL of the attribute to use for pubKey and kasUrl. Omit to use default.
193
+ * @param {String} options.url - directly set the KAS URL
194
+ * @param {String} options.publicKey - directly set the (KAS) public key
195
+ * @param {String?} options.kid - Key identifier of KAS public key
196
+ * @param {String? Object?} options.metadata - Metadata. Appears to be dead code.
197
+ * @return {KeyAccess}- the key access object loaded
198
+ */
199
+ async function buildKeyAccess({ attributeSet, type, url, publicKey, kid, attributeUrl, metadata, sid = '', }) {
200
+ /** Internal function to keep it DRY */
201
+ function createKeyAccess(type, kasUrl, kasKeyIdentifier, pubKey, metadata) {
202
+ switch (type) {
203
+ case 'wrapped':
204
+ return new index_js_1.Wrapped(kasUrl, kasKeyIdentifier, pubKey, metadata, sid);
205
+ case 'remote':
206
+ return new index_js_1.Remote(kasUrl, kasKeyIdentifier, pubKey, metadata, sid);
207
+ default:
208
+ throw new errors_js_1.ConfigurationError(`buildKeyAccess: Key access type ${type} is unknown`);
209
+ }
210
+ }
211
+ // If an attributeUrl is provided try to load with that first.
212
+ if (attributeUrl && attributeSet) {
213
+ const attr = attributeSet.get(attributeUrl);
214
+ if (attr && attr.kasUrl && attr.pubKey) {
215
+ return createKeyAccess(type, attr.kasUrl, attr.kid, attr.pubKey, metadata);
216
+ }
217
+ }
218
+ // if url and pulicKey are specified load the key access object with them
219
+ if (url && publicKey) {
220
+ return createKeyAccess(type, url, kid, await extractPemFromKeyString(publicKey), metadata);
221
+ }
222
+ // Assume the default attribute is the source for kasUrl and pubKey
223
+ const defaultAttr = attributeSet?.getDefault();
224
+ if (defaultAttr) {
225
+ const { pubKey, kasUrl } = defaultAttr;
226
+ if (pubKey && kasUrl) {
227
+ return createKeyAccess(type, kasUrl, kid, await extractPemFromKeyString(pubKey), metadata);
228
+ }
229
+ }
230
+ // All failed. Raise an error.
231
+ throw new errors_js_1.ConfigurationError('TDF.buildKeyAccess: No source for kasUrl or pubKey');
232
+ }
233
+ exports.buildKeyAccess = buildKeyAccess;
234
+ function validatePolicyObject(policy) {
235
+ const missingFields = [];
236
+ if (!policy.uuid)
237
+ missingFields.push('uuid');
238
+ if (!policy.body)
239
+ missingFields.push('body', 'body.dissem');
240
+ if (policy.body && !policy.body.dissem)
241
+ missingFields.push('body.dissem');
242
+ if (missingFields.length) {
243
+ throw new errors_js_1.ConfigurationError(`The given policy object requires the following properties: ${missingFields}`);
244
+ }
245
+ }
246
+ exports.validatePolicyObject = validatePolicyObject;
247
+ async function _generateManifest(keyInfo, encryptionInformation, policy, mimeType) {
248
+ // (maybe) Fields are quoted to avoid renaming
249
+ const payload = {
250
+ type: 'reference',
251
+ url: '0.payload',
252
+ protocol: 'zip',
253
+ isEncrypted: true,
254
+ schemaVersion: '3.0.0',
255
+ ...(mimeType && { mimeType }),
256
+ };
257
+ const encryptionInformationStr = await encryptionInformation.write(policy, keyInfo);
258
+ const assertions = [];
259
+ return {
260
+ payload,
261
+ // generate the manifest first, then insert integrity information into it
262
+ encryptionInformation: encryptionInformationStr,
263
+ assertions: assertions,
264
+ };
265
+ }
266
+ async function getSignature(unwrappedKeyBinary, payloadBinary, algorithmType, cryptoService) {
267
+ switch (algorithmType.toUpperCase()) {
268
+ case 'GMAC':
269
+ // use the auth tag baked into the encrypted payload
270
+ return (0, index_js_3.buffToString)(Uint8Array.from(payloadBinary.asByteArray()).slice(-16), 'hex');
271
+ case 'HS256':
272
+ // simple hmac is the default
273
+ return await cryptoService.hmac((0, index_js_3.buffToString)(new Uint8Array(unwrappedKeyBinary.asArrayBuffer()), 'hex'), (0, index_js_3.buffToString)(new Uint8Array(payloadBinary.asArrayBuffer()), 'utf-8'));
274
+ default:
275
+ throw new errors_js_1.ConfigurationError(`Unsupported signature alg [${algorithmType}]`);
276
+ }
277
+ }
278
+ function buildRequest(method, url, body) {
279
+ return {
280
+ headers: {},
281
+ method: method,
282
+ url: url,
283
+ body,
284
+ };
285
+ }
286
+ async function upsert({ allowedKases, allowList, authProvider, entity, privateKey, unsavedManifest, ignoreType, }) {
287
+ const allowed = (() => {
288
+ if (allowList) {
289
+ return allowList;
290
+ }
291
+ if (!allowedKases) {
292
+ throw new errors_js_1.ConfigurationError('Upsert cannot be done without allowlist');
293
+ }
294
+ return new access_js_1.OriginAllowList(allowedKases);
295
+ })();
296
+ const { keyAccess, policy } = unsavedManifest.encryptionInformation;
297
+ const isAppIdProvider = authProvider && (0, index_js_3.isAppIdProviderCheck)(authProvider);
298
+ if (authProvider === undefined) {
299
+ throw new errors_js_1.ConfigurationError('Upsert cannot be done without auth provider');
300
+ }
301
+ return Promise.all(keyAccess.map(async (keyAccessObject) => {
302
+ // We only care about remote key access objects for the policy sync portion
303
+ const isRemote = (0, index_js_1.isRemote)(keyAccessObject);
304
+ if (!ignoreType && !isRemote) {
305
+ return;
306
+ }
307
+ if (!allowed.allows(keyAccessObject.url)) {
308
+ throw new errors_js_1.UnsafeUrlError(`Unexpected KAS url: [${keyAccessObject.url}]`);
309
+ }
310
+ const url = `${keyAccessObject.url}/${isAppIdProvider ? '' : 'v2/'}upsert`;
311
+ //TODO I dont' think we need a body at all for KAS requests
312
+ // Do we need ANY of this if it's already embedded in the EO in the Bearer OIDC token?
313
+ const body = {
314
+ keyAccess: keyAccessObject,
315
+ policy: unsavedManifest.encryptionInformation.policy,
316
+ entity: (0, index_js_3.isAppIdProviderCheck)(authProvider) ? entity : undefined,
317
+ authToken: undefined,
318
+ clientPayloadSignature: undefined,
319
+ };
320
+ if ((0, index_js_3.isAppIdProviderCheck)(authProvider)) {
321
+ body.authToken = await (0, auth_js_1.reqSignature)({}, privateKey);
322
+ }
323
+ else {
324
+ body.clientPayloadSignature = await (0, auth_js_1.reqSignature)(body, privateKey);
325
+ }
326
+ const httpReq = await authProvider.withCreds(buildRequest('POST', url, body));
327
+ try {
328
+ const response = await axios_1.default.post(httpReq.url, httpReq.body, {
329
+ headers: httpReq.headers,
330
+ });
331
+ // Remove additional properties which were needed to sync, but not that we want to save to
332
+ // the manifest
333
+ delete keyAccessObject.wrappedKey;
334
+ delete keyAccessObject.encryptedMetadata;
335
+ delete keyAccessObject.policyBinding;
336
+ if (isRemote) {
337
+ // Decode the policy and extract only the required info to save -- the uuid
338
+ const decodedPolicy = JSON.parse(index_js_2.base64.decode(policy));
339
+ unsavedManifest.encryptionInformation.policy = index_js_2.base64.encode(JSON.stringify({ uuid: decodedPolicy.uuid }));
340
+ }
341
+ return response.data;
342
+ }
343
+ catch (e) {
344
+ if (e.response) {
345
+ if (e.response.status >= 500) {
346
+ throw new errors_js_1.ServiceError('upsert failure', e);
347
+ }
348
+ else if (e.response.status === 403) {
349
+ throw new errors_js_1.PermissionDeniedError('upsert failure', e);
350
+ }
351
+ else if (e.response.status === 401) {
352
+ throw new errors_js_1.UnauthenticatedError('upsert auth failure', e);
353
+ }
354
+ else if (e.response.status === 400) {
355
+ throw new errors_js_1.ConfigurationError('upsert bad request; likely a configuration error', e);
356
+ }
357
+ else {
358
+ throw new errors_js_1.NetworkError('upsert server error', e);
359
+ }
360
+ }
361
+ else if (e.request) {
362
+ throw new errors_js_1.NetworkError('upsert request failure', e);
363
+ }
364
+ throw new errors_js_1.TdfError(`Unable to perform upsert operation on the KAS: [${e.name}: ${e.message}], response: [${e?.response?.body}]`, e);
365
+ }
366
+ }));
367
+ }
368
+ exports.upsert = upsert;
369
+ async function writeStream(cfg) {
370
+ if (!cfg.authProvider) {
371
+ throw new errors_js_1.ConfigurationError('No authorization middleware defined');
372
+ }
373
+ if (!cfg.contentStream) {
374
+ throw new errors_js_1.ConfigurationError('No input stream defined');
375
+ }
376
+ // eslint-disable-next-line @typescript-eslint/no-this-alias
377
+ const segmentInfos = [];
378
+ cfg.byteLimit ??= Number.MAX_SAFE_INTEGER;
379
+ const entryInfos = [
380
+ {
381
+ filename: '0.payload',
382
+ },
383
+ {
384
+ filename: '0.manifest.json',
385
+ },
386
+ ];
387
+ let currentBuffer = new Uint8Array();
388
+ let totalByteCount = 0;
389
+ let bytesProcessed = 0;
390
+ let crcCounter = 0;
391
+ let fileByteCount = 0;
392
+ let aggregateHash = '';
393
+ const zipWriter = new index_js_3.ZipWriter();
394
+ const manifest = await _generateManifest(cfg.keyForManifest, cfg.encryptionInformation, cfg.policy, cfg.mimeType);
395
+ if (!manifest) {
396
+ // Set in encrypt; should never be reached.
397
+ throw new errors_js_1.ConfigurationError('internal: please use "loadTDFStream" first to load a manifest.');
398
+ }
399
+ const pkKeyLike = cfg.dpopKeys.privateKey;
400
+ // For all remote key access objects, sync its policy
401
+ const upsertResponse = await upsert({
402
+ allowedKases: cfg.allowList ? undefined : cfg.allowedKases,
403
+ allowList: cfg.allowList,
404
+ authProvider: cfg.authProvider,
405
+ entity: cfg.entity,
406
+ privateKey: pkKeyLike,
407
+ unsavedManifest: manifest,
408
+ });
409
+ // determine default segment size by writing empty buffer
410
+ const { segmentSizeDefault } = cfg;
411
+ const encryptedBlargh = await cfg.encryptionInformation.encrypt(binary_js_1.Binary.fromArrayBuffer(new ArrayBuffer(segmentSizeDefault)), cfg.keyForEncryption.unwrappedKeyBinary);
412
+ const payloadBuffer = new Uint8Array(encryptedBlargh.payload.asByteArray());
413
+ const encryptedSegmentSizeDefault = payloadBuffer.length;
414
+ // start writing the content
415
+ entryInfos[0].filename = '0.payload';
416
+ entryInfos[0].offset = totalByteCount;
417
+ const sourceReader = cfg.contentStream.getReader();
418
+ /*
419
+ TODO: Code duplication should be addressed
420
+ - RCA operations require that the write stream has already finished executing it's .on('end') handler before being returned,
421
+ thus both handlers are wrapped in a encompassing promise when we have an RCA source. We should investigate
422
+ if this causes O(n) promises to be loaded into memory.
423
+ - LFS operations can have the write stream returned immediately after both .on('end') and .on('data') handlers
424
+ have been defined, thus not requiring the handlers to be wrapped in a promise.
425
+ */
426
+ const underlingSource = {
427
+ start: (controller) => {
428
+ controller.enqueue(getHeader(entryInfos[0].filename));
429
+ _countChunk(getHeader(entryInfos[0].filename));
430
+ crcCounter = 0;
431
+ fileByteCount = 0;
432
+ },
433
+ pull: async (controller) => {
434
+ let isDone;
435
+ while (currentBuffer.length < segmentSizeDefault && !isDone) {
436
+ const { value, done } = await sourceReader.read();
437
+ isDone = done;
438
+ if (value) {
439
+ currentBuffer = (0, index_js_3.concatUint8)([currentBuffer, value]);
440
+ }
441
+ }
442
+ while (currentBuffer.length >= segmentSizeDefault &&
443
+ !!controller.desiredSize &&
444
+ controller.desiredSize > 0) {
445
+ const segment = currentBuffer.slice(0, segmentSizeDefault);
446
+ const encryptedSegment = await _encryptAndCountSegment(segment);
447
+ controller.enqueue(encryptedSegment);
448
+ currentBuffer = currentBuffer.slice(segmentSizeDefault);
449
+ }
450
+ const isFinalChunkLeft = isDone && currentBuffer.length;
451
+ if (isFinalChunkLeft) {
452
+ const encryptedSegment = await _encryptAndCountSegment(currentBuffer);
453
+ controller.enqueue(encryptedSegment);
454
+ currentBuffer = new Uint8Array();
455
+ }
456
+ if (isDone && currentBuffer.length === 0) {
457
+ entryInfos[0].crcCounter = crcCounter;
458
+ entryInfos[0].fileByteCount = fileByteCount;
459
+ const payloadDataDescriptor = zipWriter.writeDataDescriptor(crcCounter, fileByteCount);
460
+ controller.enqueue(payloadDataDescriptor);
461
+ _countChunk(payloadDataDescriptor);
462
+ // prepare the manifest
463
+ entryInfos[1].filename = '0.manifest.json';
464
+ entryInfos[1].offset = totalByteCount;
465
+ controller.enqueue(getHeader(entryInfos[1].filename));
466
+ _countChunk(getHeader(entryInfos[1].filename));
467
+ crcCounter = 0;
468
+ fileByteCount = 0;
469
+ // hash the concat of all hashes
470
+ const payloadSigStr = await getSignature(cfg.keyForEncryption.unwrappedKeyBinary, binary_js_1.Binary.fromString(aggregateHash), cfg.integrityAlgorithm, cfg.cryptoService);
471
+ manifest.encryptionInformation.integrityInformation.rootSignature.sig =
472
+ index_js_2.base64.encode(payloadSigStr);
473
+ manifest.encryptionInformation.integrityInformation.rootSignature.alg =
474
+ cfg.integrityAlgorithm;
475
+ manifest.encryptionInformation.integrityInformation.segmentSizeDefault = segmentSizeDefault;
476
+ manifest.encryptionInformation.integrityInformation.encryptedSegmentSizeDefault =
477
+ encryptedSegmentSizeDefault;
478
+ manifest.encryptionInformation.integrityInformation.segmentHashAlg =
479
+ cfg.segmentIntegrityAlgorithm;
480
+ manifest.encryptionInformation.integrityInformation.segments = segmentInfos;
481
+ manifest.encryptionInformation.method.isStreamable = true;
482
+ const signedAssertions = [];
483
+ if (cfg.assertionConfigs && cfg.assertionConfigs.length > 0) {
484
+ await Promise.all(cfg.assertionConfigs.map(async (assertionConfig) => {
485
+ // Create assertion using the assertionConfig values
486
+ const signingKey = assertionConfig.signingKey ?? {
487
+ alg: 'HS256',
488
+ key: new Uint8Array(cfg.keyForEncryption.unwrappedKeyBinary.asArrayBuffer()),
489
+ };
490
+ const assertion = await assertions.CreateAssertion(aggregateHash, {
491
+ ...assertionConfig,
492
+ signingKey,
493
+ });
494
+ // Add signed assertion to the signedAssertions array
495
+ signedAssertions.push(assertion);
496
+ }));
497
+ }
498
+ manifest.assertions = signedAssertions;
499
+ // write the manifest
500
+ const manifestBuffer = new TextEncoder().encode(JSON.stringify(manifest));
501
+ controller.enqueue(manifestBuffer);
502
+ _countChunk(manifestBuffer);
503
+ entryInfos[1].crcCounter = crcCounter;
504
+ entryInfos[1].fileByteCount = fileByteCount;
505
+ const manifestDataDescriptor = zipWriter.writeDataDescriptor(crcCounter, fileByteCount);
506
+ controller.enqueue(manifestDataDescriptor);
507
+ _countChunk(manifestDataDescriptor);
508
+ // write the central directory out
509
+ const centralDirectoryByteCount = totalByteCount;
510
+ for (let i = 0; i < entryInfos.length; i++) {
511
+ const entryInfo = entryInfos[i];
512
+ const result = zipWriter.writeCentralDirectoryRecord(entryInfo.fileByteCount || 0, entryInfo.filename, entryInfo.offset || 0, entryInfo.crcCounter || 0, 2175008768);
513
+ controller.enqueue(result);
514
+ _countChunk(result);
515
+ }
516
+ const endOfCentralDirectoryByteCount = totalByteCount - centralDirectoryByteCount;
517
+ const finalChunk = zipWriter.writeEndOfCentralDirectoryRecord(entryInfos.length, endOfCentralDirectoryByteCount, centralDirectoryByteCount);
518
+ controller.enqueue(finalChunk);
519
+ _countChunk(finalChunk);
520
+ controller.close();
521
+ }
522
+ },
523
+ };
524
+ const plaintextStream = new DecoratedReadableStream_js_1.DecoratedReadableStream(underlingSource);
525
+ plaintextStream.manifest = manifest;
526
+ if (upsertResponse) {
527
+ plaintextStream.upsertResponse = upsertResponse;
528
+ plaintextStream.tdfSize = totalByteCount;
529
+ plaintextStream.algorithm = manifest.encryptionInformation.method.algorithm;
530
+ }
531
+ return plaintextStream;
532
+ // nested helper fn's
533
+ function getHeader(filename) {
534
+ return zipWriter.getLocalFileHeader(filename, 0, 0, 0);
535
+ }
536
+ function _countChunk(chunk) {
537
+ if (typeof chunk === 'string') {
538
+ chunk = new TextEncoder().encode(chunk);
539
+ }
540
+ totalByteCount += chunk.length;
541
+ if (totalByteCount > cfg.byteLimit) {
542
+ throw new errors_js_1.ConfigurationError(`Safe byte limit (${cfg.byteLimit}) exceeded`);
543
+ }
544
+ //new Uint8Array(chunk.buffer, chunk.byteOffset, chunk.byteLength);
545
+ crcCounter = (0, buffer_crc32_js_1.unsigned)(chunk, crcCounter);
546
+ fileByteCount += chunk.length;
547
+ }
548
+ async function _encryptAndCountSegment(chunk) {
549
+ bytesProcessed += chunk.length;
550
+ cfg.progressHandler?.(bytesProcessed);
551
+ // Don't pass in an IV here. The encrypt function will generate one for you, ensuring that each segment has a unique IV.
552
+ const encryptedResult = await cfg.encryptionInformation.encrypt(binary_js_1.Binary.fromArrayBuffer(chunk.buffer), cfg.keyForEncryption.unwrappedKeyBinary);
553
+ const payloadBuffer = new Uint8Array(encryptedResult.payload.asByteArray());
554
+ const payloadSigStr = await getSignature(cfg.keyForEncryption.unwrappedKeyBinary, encryptedResult.payload, cfg.segmentIntegrityAlgorithm, cfg.cryptoService);
555
+ // combined string of all hashes for root signature
556
+ aggregateHash += payloadSigStr;
557
+ segmentInfos.push({
558
+ hash: index_js_2.base64.encode(payloadSigStr),
559
+ segmentSize: chunk.length === segmentSizeDefault ? undefined : chunk.length,
560
+ encryptedSegmentSize: payloadBuffer.length === encryptedSegmentSizeDefault ? undefined : payloadBuffer.length,
561
+ });
562
+ const result = new Uint8Array(encryptedResult.payload.asByteArray());
563
+ _countChunk(result);
564
+ return result;
565
+ }
566
+ }
567
+ exports.writeStream = writeStream;
568
+ // load the TDF as a stream in memory, for further use in reading and key syncing
569
+ async function loadTDFStream(chunker) {
570
+ const zipReader = new index_js_3.ZipReader(chunker);
571
+ const centralDirectory = await zipReader.getCentralDirectory();
572
+ const manifest = await zipReader.getManifest(centralDirectory, '0.manifest.json');
573
+ return { manifest, zipReader, centralDirectory };
574
+ }
575
+ exports.loadTDFStream = loadTDFStream;
576
+ function splitLookupTableFactory(keyAccess, allowedKases) {
577
+ const allowed = (k) => allowedKases.allows(k.url);
578
+ const splitIds = new Set(keyAccess.map(({ sid }) => sid ?? ''));
579
+ const accessibleSplits = new Set(keyAccess.filter(allowed).map(({ sid }) => sid));
580
+ if (splitIds.size > accessibleSplits.size) {
581
+ const disallowedKases = new Set(keyAccess.filter((k) => !allowed(k)).map(({ url }) => url));
582
+ throw new errors_js_1.UnsafeUrlError(`Unreconstructable key - disallowed KASes include: ${JSON.stringify([
583
+ ...disallowedKases,
584
+ ])} from splitIds ${JSON.stringify([...splitIds])}`, ...disallowedKases);
585
+ }
586
+ const splitPotentials = Object.fromEntries([...splitIds].map((s) => [s, {}]));
587
+ for (const kao of keyAccess) {
588
+ const disjunction = splitPotentials[kao.sid ?? ''];
589
+ if (kao.url in disjunction) {
590
+ throw new errors_js_1.InvalidFileError(`TODO: Fallback to no split ids. Repetition found for [${kao.url}] on split [${kao.sid}]`);
591
+ }
592
+ if (allowed(kao)) {
593
+ disjunction[kao.url] = kao;
594
+ }
595
+ }
596
+ return splitPotentials;
597
+ }
598
+ exports.splitLookupTableFactory = splitLookupTableFactory;
599
+ async function unwrapKey({ manifest, allowedKases, authProvider, dpopKeys, entity, cryptoService, }) {
600
+ if (authProvider === undefined) {
601
+ throw new errors_js_1.ConfigurationError('upsert requires auth provider; must be configured in client constructor');
602
+ }
603
+ const { keyAccess } = manifest.encryptionInformation;
604
+ const splitPotentials = splitLookupTableFactory(keyAccess, allowedKases);
605
+ const isAppIdProvider = authProvider && (0, index_js_3.isAppIdProviderCheck)(authProvider);
606
+ async function tryKasRewrap(keySplitInfo) {
607
+ const url = `${keySplitInfo.url}/${isAppIdProvider ? '' : 'v2/'}rewrap`;
608
+ const ephemeralEncryptionKeys = await cryptoService.cryptoToPemPair(await cryptoService.generateKeyPair());
609
+ const clientPublicKey = ephemeralEncryptionKeys.publicKey;
610
+ const requestBodyStr = JSON.stringify({
611
+ algorithm: 'RS256',
612
+ keyAccess: keySplitInfo,
613
+ policy: manifest.encryptionInformation.policy,
614
+ clientPublicKey,
615
+ });
616
+ const jwtPayload = { requestBody: requestBodyStr };
617
+ const signedRequestToken = await (0, auth_js_1.reqSignature)(isAppIdProvider ? {} : jwtPayload, dpopKeys.privateKey);
618
+ let requestBody;
619
+ if (isAppIdProvider) {
620
+ requestBody = {
621
+ keyAccess: keySplitInfo,
622
+ policy: manifest.encryptionInformation.policy,
623
+ entity: {
624
+ ...entity,
625
+ publicKey: clientPublicKey,
626
+ },
627
+ authToken: signedRequestToken,
628
+ };
629
+ }
630
+ else {
631
+ requestBody = {
632
+ signedRequestToken,
633
+ };
634
+ }
635
+ const httpReq = await authProvider.withCreds(buildRequest('POST', url, requestBody));
636
+ const { data: { entityWrappedKey, metadata }, } = await axios_1.default.post(httpReq.url, httpReq.body, { headers: httpReq.headers });
637
+ const key = binary_js_1.Binary.fromString(index_js_2.base64.decode(entityWrappedKey));
638
+ const decryptedKeyBinary = await cryptoService.decryptWithPrivateKey(key, ephemeralEncryptionKeys.privateKey);
639
+ return {
640
+ key: new Uint8Array(decryptedKeyBinary.asByteArray()),
641
+ metadata,
642
+ };
643
+ }
644
+ // Get unique split IDs to determine if we have an OR or AND condition
645
+ const splitIds = new Set(Object.keys(splitPotentials));
646
+ // If we have only one split ID, it's an OR condition
647
+ if (splitIds.size === 1) {
648
+ const [splitId] = splitIds;
649
+ const potentials = splitPotentials[splitId];
650
+ try {
651
+ // OR condition: Try all KAS servers for this split, take first success
652
+ const result = await Promise.any(Object.values(potentials).map(async (keySplitInfo) => {
653
+ try {
654
+ return await tryKasRewrap(keySplitInfo);
655
+ }
656
+ catch (e) {
657
+ // Rethrow with more context
658
+ throw handleRewrapError(e);
659
+ }
660
+ }));
661
+ const reconstructedKey = (0, index_js_3.keyMerge)([result.key]);
662
+ return {
663
+ reconstructedKeyBinary: binary_js_1.Binary.fromArrayBuffer(reconstructedKey),
664
+ metadata: result.metadata,
665
+ };
666
+ }
667
+ catch (error) {
668
+ if (error instanceof AggregateError) {
669
+ // All KAS servers failed
670
+ throw error.errors[0]; // Throw the first error since we've already wrapped them
671
+ }
672
+ throw error;
673
+ }
674
+ }
675
+ else {
676
+ // AND condition: We need successful results from all different splits
677
+ const splitResults = await Promise.all(Object.entries(splitPotentials).map(async ([splitId, potentials]) => {
678
+ if (!potentials || !Object.keys(potentials).length) {
679
+ throw new errors_js_1.UnsafeUrlError(`Unreconstructable key - no valid KAS found for split ${JSON.stringify(splitId)}`, '');
680
+ }
681
+ try {
682
+ // For each split, try all potential KAS servers until one succeeds
683
+ return await Promise.any(Object.values(potentials).map(async (keySplitInfo) => {
684
+ try {
685
+ return await tryKasRewrap(keySplitInfo);
686
+ }
687
+ catch (e) {
688
+ throw handleRewrapError(e);
689
+ }
690
+ }));
691
+ }
692
+ catch (error) {
693
+ if (error instanceof AggregateError) {
694
+ // All KAS servers for this split failed
695
+ throw error.errors[0]; // Throw the first error since we've already wrapped them
696
+ }
697
+ throw error;
698
+ }
699
+ }));
700
+ // Merge all the split keys
701
+ const reconstructedKey = (0, index_js_3.keyMerge)(splitResults.map((r) => r.key));
702
+ return {
703
+ reconstructedKeyBinary: binary_js_1.Binary.fromArrayBuffer(reconstructedKey),
704
+ metadata: splitResults[0].metadata, // Use metadata from first split
705
+ };
706
+ }
707
+ }
708
+ function handleRewrapError(error) {
709
+ if (axios_1.default.isAxiosError(error)) {
710
+ if (error.response?.status && error.response?.status >= 500) {
711
+ return new errors_js_1.ServiceError('rewrap failure', error);
712
+ }
713
+ else if (error.response?.status === 403) {
714
+ return new errors_js_1.PermissionDeniedError('rewrap failure', error);
715
+ }
716
+ else if (error.response?.status === 401) {
717
+ return new errors_js_1.UnauthenticatedError('rewrap auth failure', error);
718
+ }
719
+ else if (error.response?.status === 400) {
720
+ return new errors_js_1.InvalidFileError('rewrap bad request; could indicate an invalid policy binding or a configuration error', error);
721
+ }
722
+ else {
723
+ return new errors_js_1.NetworkError('rewrap server error', error);
724
+ }
725
+ }
726
+ else {
727
+ if (error.name === 'InvalidAccessError' || error.name === 'OperationError') {
728
+ return new errors_js_1.DecryptError('unable to unwrap key from kas', error);
729
+ }
730
+ return new errors_js_1.InvalidFileError(`Unable to decrypt the response from KAS: [${error.name}: ${error.message}]`, error);
731
+ }
732
+ }
733
+ async function decryptChunk(encryptedChunk, reconstructedKeyBinary, hash, cipher, segmentIntegrityAlgorithm, cryptoService) {
734
+ if (segmentIntegrityAlgorithm !== 'GMAC' && segmentIntegrityAlgorithm !== 'HS256') {
735
+ }
736
+ const segmentHashStr = await getSignature(reconstructedKeyBinary, binary_js_1.Binary.fromArrayBuffer(encryptedChunk.buffer), segmentIntegrityAlgorithm, cryptoService);
737
+ if (hash !== btoa(segmentHashStr)) {
738
+ throw new errors_js_1.IntegrityError('Failed integrity check on segment hash');
739
+ }
740
+ return await cipher.decrypt(encryptedChunk, reconstructedKeyBinary);
741
+ }
742
+ async function updateChunkQueue(chunkMap, centralDirectory, zipReader, reconstructedKeyBinary, cipher, segmentIntegrityAlgorithm, cryptoService) {
743
+ const chunksInOneDownload = 500;
744
+ let requests = [];
745
+ const maxLength = 3;
746
+ for (let i = 0; i < chunkMap.length; i += chunksInOneDownload) {
747
+ if (requests.length === maxLength) {
748
+ await Promise.all(requests);
749
+ requests = [];
750
+ }
751
+ requests.push((async () => {
752
+ let buffer;
753
+ const slice = chunkMap.slice(i, i + chunksInOneDownload);
754
+ try {
755
+ const bufferSize = slice.reduce((currentVal, { encryptedSegmentSize }) => currentVal + encryptedSegmentSize, 0);
756
+ buffer = await zipReader.getPayloadSegment(centralDirectory, '0.payload', slice[0].encryptedOffset, bufferSize);
757
+ }
758
+ catch (e) {
759
+ if (e instanceof errors_js_1.InvalidFileError) {
760
+ throw e;
761
+ }
762
+ throw new errors_js_1.NetworkError('unable to fetch payload segment', e);
763
+ }
764
+ if (buffer) {
765
+ sliceAndDecrypt({
766
+ buffer,
767
+ cryptoService,
768
+ reconstructedKeyBinary,
769
+ slice,
770
+ cipher,
771
+ segmentIntegrityAlgorithm,
772
+ });
773
+ }
774
+ })());
775
+ }
776
+ }
777
+ async function sliceAndDecrypt({ buffer, reconstructedKeyBinary, slice, cipher, cryptoService, segmentIntegrityAlgorithm, }) {
778
+ for (const index in slice) {
779
+ const { encryptedOffset, encryptedSegmentSize, _resolve, _reject } = slice[index];
780
+ const offset = slice[0].encryptedOffset === 0 ? encryptedOffset : encryptedOffset % slice[0].encryptedOffset;
781
+ const encryptedChunk = new Uint8Array(buffer.slice(offset, offset + encryptedSegmentSize));
782
+ try {
783
+ const result = await decryptChunk(encryptedChunk, reconstructedKeyBinary, slice[index]['hash'], cipher, segmentIntegrityAlgorithm, cryptoService);
784
+ slice[index].decryptedChunk = result;
785
+ if (_resolve) {
786
+ _resolve(null);
787
+ }
788
+ }
789
+ catch (e) {
790
+ if (_reject) {
791
+ _reject(e);
792
+ }
793
+ else {
794
+ throw e;
795
+ }
796
+ }
797
+ }
798
+ }
799
+ exports.sliceAndDecrypt = sliceAndDecrypt;
800
+ async function readStream(cfg) {
801
+ let { allowList } = cfg;
802
+ if (!allowList) {
803
+ if (!cfg.allowedKases) {
804
+ throw new errors_js_1.ConfigurationError('Upsert cannot be done without allowlist');
805
+ }
806
+ allowList = new access_js_1.OriginAllowList(cfg.allowedKases);
807
+ }
808
+ const { manifest, zipReader, centralDirectory } = await loadTDFStream(cfg.chunker);
809
+ if (!manifest) {
810
+ throw new errors_js_1.InvalidFileError('Missing manifest data');
811
+ }
812
+ cfg.keyMiddleware ??= async (key) => key;
813
+ const { encryptedSegmentSizeDefault: defaultSegmentSize, rootSignature, segmentHashAlg, segments, } = manifest.encryptionInformation.integrityInformation;
814
+ const { metadata, reconstructedKeyBinary } = await unwrapKey({
815
+ manifest,
816
+ authProvider: cfg.authProvider,
817
+ allowedKases: allowList,
818
+ dpopKeys: cfg.dpopKeys,
819
+ entity: cfg.entity,
820
+ cryptoService: cfg.cryptoService,
821
+ });
822
+ // async function unwrapKey(manifest: Manifest, allowedKases: string[], authProvider: AuthProvider | AppIdAuthProvider, publicKey: string, privateKey: string, entity: EntityObject) {
823
+ const keyForDecryption = await cfg.keyMiddleware(reconstructedKeyBinary);
824
+ const encryptedSegmentSizeDefault = defaultSegmentSize || DEFAULT_SEGMENT_SIZE;
825
+ // check the combined string of hashes
826
+ const aggregateHash = segments.map(({ hash }) => index_js_2.base64.decode(hash)).join('');
827
+ const integrityAlgorithm = rootSignature.alg;
828
+ if (integrityAlgorithm !== 'GMAC' && integrityAlgorithm !== 'HS256') {
829
+ throw new errors_js_1.UnsupportedFeatureError(`Unsupported integrity alg [${integrityAlgorithm}]`);
830
+ }
831
+ const payloadSigStr = await getSignature(keyForDecryption, binary_js_1.Binary.fromString(aggregateHash), integrityAlgorithm, cfg.cryptoService);
832
+ if (manifest.encryptionInformation.integrityInformation.rootSignature.sig !==
833
+ index_js_2.base64.encode(payloadSigStr)) {
834
+ throw new errors_js_1.IntegrityError('Failed integrity check on root signature');
835
+ }
836
+ if (!cfg.noVerifyAssertions) {
837
+ for (const assertion of manifest.assertions || []) {
838
+ // Create a default assertion key
839
+ let assertionKey = {
840
+ alg: 'HS256',
841
+ key: new Uint8Array(reconstructedKeyBinary.asArrayBuffer()),
842
+ };
843
+ if (cfg.assertionVerificationKeys) {
844
+ const foundKey = cfg.assertionVerificationKeys.Keys[assertion.id];
845
+ if (foundKey) {
846
+ assertionKey = foundKey;
847
+ }
848
+ }
849
+ await assertions.verify(assertion, aggregateHash, assertionKey);
850
+ }
851
+ }
852
+ let mapOfRequestsOffset = 0;
853
+ const chunkMap = new Map(segments.map(({ hash, encryptedSegmentSize = encryptedSegmentSizeDefault }) => {
854
+ const result = (() => {
855
+ let _resolve, _reject;
856
+ const chunk = {
857
+ hash,
858
+ encryptedOffset: mapOfRequestsOffset,
859
+ encryptedSegmentSize,
860
+ promise: new Promise((resolve, reject) => {
861
+ _resolve = resolve;
862
+ _reject = reject;
863
+ }),
864
+ };
865
+ chunk._resolve = _resolve;
866
+ chunk._reject = _reject;
867
+ return chunk;
868
+ })();
869
+ mapOfRequestsOffset += encryptedSegmentSize || encryptedSegmentSizeDefault;
870
+ return [hash, result];
871
+ }));
872
+ const cipher = new index_js_5.AesGcmCipher(cfg.cryptoService);
873
+ const segmentIntegrityAlg = segmentHashAlg || integrityAlgorithm;
874
+ if (segmentIntegrityAlg !== 'GMAC' && segmentIntegrityAlg !== 'HS256') {
875
+ throw new errors_js_1.UnsupportedFeatureError(`Unsupported segment hash alg [${segmentIntegrityAlg}]`);
876
+ }
877
+ // Not waiting for Promise to resolve
878
+ updateChunkQueue(Array.from(chunkMap.values()), centralDirectory, zipReader, keyForDecryption, cipher, segmentIntegrityAlg, cfg.cryptoService);
879
+ let progress = 0;
880
+ const underlyingSource = {
881
+ pull: async (controller) => {
882
+ if (chunkMap.size === 0) {
883
+ controller.close();
884
+ return;
885
+ }
886
+ const [hash, chunk] = chunkMap.entries().next().value;
887
+ if (!chunk.decryptedChunk) {
888
+ await chunk.promise;
889
+ }
890
+ const decryptedSegment = chunk.decryptedChunk;
891
+ controller.enqueue(new Uint8Array(decryptedSegment.payload.asByteArray()));
892
+ progress += chunk.encryptedSegmentSize;
893
+ cfg.progressHandler?.(progress);
894
+ chunk.decryptedChunk = null;
895
+ chunkMap.delete(hash);
896
+ },
897
+ ...(cfg.fileStreamServiceWorker && { fileStreamServiceWorker: cfg.fileStreamServiceWorker }),
898
+ };
899
+ const outputStream = new DecoratedReadableStream_js_1.DecoratedReadableStream(underlyingSource);
900
+ outputStream.manifest = manifest;
901
+ outputStream.emit('manifest', manifest);
902
+ outputStream.metadata = metadata;
903
+ outputStream.emit('rewrap', metadata);
904
+ return outputStream;
905
+ }
906
+ exports.readStream = readStream;
907
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"tdf.js","sourceRoot":"","sources":["../../../../tdf3/src/tdf.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,kDAA0C;AAC1C,6DAAmD;AACnD,+BAA8C;AAC9C,oFAA8E;AAE9E,iDAA6E;AAG7E,4DAA8C;AAE9C,gDAc2B;AAC3B,2DAAsD;AACtD,+CAS0B;AAC1B,2CAAqC;AACrC,mDAA+F;AAC/F,mDAY6B;AAC7B,mDAA2D;AAE3D,eAAe;AACf,4GAA4G;AAC5G,iDAAkD;AAClD,oDAMgC;AAMhC,0CAA0C;AAC1C,MAAM,oBAAoB,GAAG,IAAI,GAAG,IAAI,CAAC;AAgIzC;;;GAGG;AACI,KAAK,UAAU,iBAAiB,CACrC,GAAW,EACX,SAAiC;IAEjC,IAAI,CAAC,GAAG,EAAE;QACR,MAAM,IAAI,8BAAkB,CAAC,0BAA0B,CAAC,CAAC;KAC1D;IACD,uDAAuD;IACvD,IAAA,4BAAiB,EAAC,GAAG,CAAC,CAAC;IACvB,MAAM,UAAU,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,SAAS,EAAE,SAAS,IAAI,UAAU,EAAE,CAAC;IACpE,MAAM,MAAM,GAAuB,EAAE,CAAC;IACtC,IAAI,SAAS,EAAE;QACb,MAAM,CAAC,SAAS,GAAG,SAAS,CAAC;KAC9B;IACD,MAAM,KAAK,GAAG,GAAG,GAAG,oBAAoB,CAAC;IACzC,IAAI;QACF,MAAM,QAAQ,GAAwC,MAAM,eAAK,CAAC,GAAG,CAAC,KAAK,EAAE;YAC3E,MAAM,EAAE;gBACN,GAAG,MAAM;gBACT,CAAC,EAAE,GAAG;aACP;SACF,CAAC,CAAC;QACH,MAAM,SAAS,GACb,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ;YAC/B,CAAC,CAAC,MAAM,uBAAuB,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC9C,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,CAAC;QAC9B,OAAO;YACL,SAAS;YACT,GAAG,EAAE,IAAA,+BAAoB,EAAC,SAAS,CAAC;YACpC,GAAG,UAAU;YACb,GAAG,CAAC,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ,IAAI,QAAQ,CAAC,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;SAC1F,CAAC;KACH;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,MAAM,GAAG,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC;QACvC,QAAQ,MAAM,EAAE;YACd,KAAK,GAAG,CAAC;YACT,KAAK,GAAG;gBACN,uCAAuC;gBACvC,MAAM;YACR,KAAK,GAAG;gBACN,MAAM,IAAI,gCAAoB,CAAC,IAAI,KAAK,iBAAiB,EAAE,KAAK,CAAC,CAAC;YACpE,KAAK,GAAG;gBACN,MAAM,IAAI,iCAAqB,CAAC,IAAI,KAAK,qBAAqB,EAAE,KAAK,CAAC,CAAC;YACzE;gBACE,IAAI,MAAM,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,GAAG,GAAG,EAAE;oBAC3C,MAAM,IAAI,8BAAkB,CAC1B,IAAI,KAAK,oBAAoB,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACzE,KAAK,CACN,CAAC;iBACH;gBACD,MAAM,IAAI,wBAAY,CACpB,IAAI,KAAK,YAAY,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACjE,KAAK,CACN,CAAC;SACL;KACF;IACD,uBAAuB;IACvB,MAAM,KAAK,GAAG,GAAG,GAAG,iBAAiB,CAAC;IACtC,IAAI;QACF,MAAM,QAAQ,GAAwC,MAAM,eAAK,CAAC,GAAG,CAAC,KAAK,EAAE;YAC3E,MAAM;SACP,CAAC,CAAC;QACH,MAAM,SAAS,GACb,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ;YAC/B,CAAC,CAAC,MAAM,uBAAuB,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC9C,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,CAAC;QAC9B,yDAAyD;QACzD,OAAO;YACL,SAAS;YACT,GAAG,EAAE,IAAA,+BAAoB,EAAC,SAAS,CAAC;YACpC,GAAG,UAAU;YACb,GAAG,CAAC,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ,IAAI,QAAQ,CAAC,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;SAC1F,CAAC;KACH;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,MAAM,GAAG,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC;QACvC,QAAQ,MAAM,EAAE;YACd,KAAK,GAAG;gBACN,MAAM,IAAI,gCAAoB,CAAC,IAAI,KAAK,iBAAiB,EAAE,KAAK,CAAC,CAAC;YACpE,KAAK,GAAG;gBACN,MAAM,IAAI,iCAAqB,CAAC,IAAI,KAAK,qBAAqB,EAAE,KAAK,CAAC,CAAC;YACzE;gBACE,IAAI,MAAM,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,GAAG,GAAG,EAAE;oBAC3C,MAAM,IAAI,8BAAkB,CAC1B,IAAI,KAAK,oBAAoB,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACzE,KAAK,CACN,CAAC;iBACH;gBACD,MAAM,IAAI,wBAAY,CACpB,IAAI,KAAK,YAAY,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACjE,KAAK,CACN,CAAC;SACL;KACF;AACH,CAAC;AA7FD,8CA6FC;AACD;;;;;;GAMG;AACH,SAAgB,QAAQ,CACtB,OAAmB,EACnB,QAA2B,EAC3B,WAAmB;IAEnB,MAAM,EAAE,MAAM,EAAE,GAAG,IAAI,GAAG,CAAC,WAAW,CAAC,CAAC;IACxC,MAAM,cAAc,GAAW,OAAO,QAAQ,KAAK,QAAQ,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;IAElG,MAAM,cAAc,GAAG,IAAA,8BAAmB,EAAC;QACzC,WAAW;QACX,eAAe,EAAE,MAAM;QACvB,QAAQ,EAAE,iBAAM,CAAC,MAAM,CAAC,cAAc,CAAC;QACvC,OAAO,EAAE,IAAA,uBAAY,EAAC,OAAO,EAAE,QAAQ,CAAC;KACzC,CAAC,CAAC;IAEH,OAAO,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;AAClD,CAAC;AAhBD,4BAgBC;AAED,SAAgB,UAAU,CAAC,WAAuD;IAChF,IAAI,IAAI,CAAC;IACT,IAAI,WAAW,YAAY,WAAW,IAAI,WAAW,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE;QACzE,IAAI,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;KAC9C;SAAM;QACL,IAAI,GAAG,WAAW,CAAC,QAAQ,EAAE,CAAC;KAC/B;IACD,MAAM,SAAS,GAAG,uEAAuE,CAAC;IAC1F,MAAM,QAAQ,GAAG,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtC,IAAI,QAAQ,KAAK,IAAI,EAAE;QACrB,MAAM,IAAI,4BAAgB,CAAC,oBAAoB,CAAC,CAAC;KAClD;IACD,MAAM,aAAa,GAAG,QAAQ,CAAC,CAAC,CAAC,CAAC;IAClC,IAAI;QACF,OAAO,IAAA,yBAAc,EAAC,aAAa,CAAC,CAAC;KACtC;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,IAAI,4BAAgB,CAAC,iDAAiD,EAAE,CAAC,CAAC,CAAC;KAClF;AACH,CAAC;AAlBD,gCAkBC;AAEM,KAAK,UAAU,uBAAuB,CAAC,SAAiB;IAC7D,IAAI,GAAG,GAAW,SAAS,CAAC;IAE5B,wEAAwE;IACxE,yCAAyC;IACzC,IAAI,SAAS,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE;QACrC,MAAM,IAAI,GAAG,MAAM,IAAA,iBAAU,EAAC,SAAS,EAAE,OAAO,EAAE,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC;QACzE,GAAG,GAAG,MAAM,IAAA,iBAAU,EAAC,IAAI,CAAC,CAAC;KAC9B;IAED,OAAO,GAAG,CAAC;AACb,CAAC;AAXD,0DAWC;AAED;;;;;;;;;;;;;GAaG;AACI,KAAK,UAAU,cAAc,CAAC,EACnC,YAAY,EACZ,IAAI,EACJ,GAAG,EACH,SAAS,EACT,GAAG,EACH,YAAY,EACZ,QAAQ,EACR,GAAG,GAAG,EAAE,GACO;IACf,uCAAuC;IACvC,SAAS,eAAe,CACtB,IAAmB,EACnB,MAAc,EACd,gBAAoC,EACpC,MAAc,EACd,QAAmB;QAEnB,QAAQ,IAAI,EAAE;YACZ,KAAK,SAAS;gBACZ,OAAO,IAAI,kBAAgB,CAAC,MAAM,EAAE,gBAAgB,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,CAAC,CAAC;YAC/E,KAAK,QAAQ;gBACX,OAAO,IAAI,iBAAe,CAAC,MAAM,EAAE,gBAAgB,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,CAAC,CAAC;YAC9E;gBACE,MAAM,IAAI,8BAAkB,CAAC,mCAAmC,IAAI,aAAa,CAAC,CAAC;SACtF;IACH,CAAC;IAED,8DAA8D;IAC9D,IAAI,YAAY,IAAI,YAAY,EAAE;QAChC,MAAM,IAAI,GAAG,YAAY,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAC5C,IAAI,IAAI,IAAI,IAAI,CAAC,MAAM,IAAI,IAAI,CAAC,MAAM,EAAE;YACtC,OAAO,eAAe,CAAC,IAAI,EAAE,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;SAC5E;KACF;IAED,yEAAyE;IACzE,IAAI,GAAG,IAAI,SAAS,EAAE;QACpB,OAAO,eAAe,CAAC,IAAI,EAAE,GAAG,EAAE,GAAG,EAAE,MAAM,uBAAuB,CAAC,SAAS,CAAC,EAAE,QAAQ,CAAC,CAAC;KAC5F;IAED,mEAAmE;IACnE,MAAM,WAAW,GAAG,YAAY,EAAE,UAAU,EAAE,CAAC;IAC/C,IAAI,WAAW,EAAE;QACf,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,GAAG,WAAW,CAAC;QACvC,IAAI,MAAM,IAAI,MAAM,EAAE;YACpB,OAAO,eAAe,CAAC,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,uBAAuB,CAAC,MAAM,CAAC,EAAE,QAAQ,CAAC,CAAC;SAC5F;KACF;IACD,8BAA8B;IAC9B,MAAM,IAAI,8BAAkB,CAAC,oDAAoD,CAAC,CAAC;AACrF,CAAC;AAnDD,wCAmDC;AAED,SAAgB,oBAAoB,CAAC,MAAc;IACjD,MAAM,aAAa,GAAa,EAAE,CAAC;IAEnC,IAAI,CAAC,MAAM,CAAC,IAAI;QAAE,aAAa,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAC7C,IAAI,CAAC,MAAM,CAAC,IAAI;QAAE,aAAa,CAAC,IAAI,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;IAC5D,IAAI,MAAM,CAAC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM;QAAE,aAAa,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IAE1E,IAAI,aAAa,CAAC,MAAM,EAAE;QACxB,MAAM,IAAI,8BAAkB,CAC1B,8DAA8D,aAAa,EAAE,CAC9E,CAAC;KACH;AACH,CAAC;AAZD,oDAYC;AAED,KAAK,UAAU,iBAAiB,CAC9B,OAAgB,EAChB,qBAA+B,EAC/B,MAAc,EACd,QAA4B;IAE5B,8CAA8C;IAC9C,MAAM,OAAO,GAAG;QACd,IAAI,EAAE,WAAW;QACjB,GAAG,EAAE,WAAW;QAChB,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,IAAI;QACjB,aAAa,EAAE,OAAO;QACtB,GAAG,CAAC,QAAQ,IAAI,EAAE,QAAQ,EAAE,CAAC;KAC9B,CAAC;IAEF,MAAM,wBAAwB,GAAG,MAAM,qBAAqB,CAAC,KAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACpF,MAAM,UAAU,GAA2B,EAAE,CAAC;IAC9C,OAAO;QACL,OAAO;QACP,yEAAyE;QACzE,qBAAqB,EAAE,wBAAwB;QAC/C,UAAU,EAAE,UAAU;KACvB,CAAC;AACJ,CAAC;AAED,KAAK,UAAU,YAAY,CACzB,kBAA0B,EAC1B,aAAqB,EACrB,aAAiC,EACjC,aAA4B;IAE5B,QAAQ,aAAa,CAAC,WAAW,EAAE,EAAE;QACnC,KAAK,MAAM;YACT,oDAAoD;YACpD,OAAO,IAAA,uBAAY,EAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,EAAE,KAAK,CAAC,CAAC;QACtF,KAAK,OAAO;YACV,6BAA6B;YAC7B,OAAO,MAAM,aAAa,CAAC,IAAI,CAC7B,IAAA,uBAAY,EAAC,IAAI,UAAU,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC,EAAE,KAAK,CAAC,EACvE,IAAA,uBAAY,EAAC,IAAI,UAAU,CAAC,aAAa,CAAC,aAAa,EAAE,CAAC,EAAE,OAAO,CAAC,CACrE,CAAC;QACJ;YACE,MAAM,IAAI,8BAAkB,CAAC,8BAA8B,aAAa,GAAG,CAAC,CAAC;KAChF;AACH,CAAC;AAED,SAAS,YAAY,CAAC,MAAkB,EAAE,GAAW,EAAE,IAAc;IACnE,OAAO;QACL,OAAO,EAAE,EAAE;QACX,MAAM,EAAE,MAAM;QACd,GAAG,EAAE,GAAG;QACR,IAAI;KACL,CAAC;AACJ,CAAC;AAEM,KAAK,UAAU,MAAM,CAAC,EAC3B,YAAY,EACZ,SAAS,EACT,YAAY,EACZ,MAAM,EACN,UAAU,EACV,eAAe,EACf,UAAU,GACU;IACpB,MAAM,OAAO,GAAG,CAAC,GAAG,EAAE;QACpB,IAAI,SAAS,EAAE;YACb,OAAO,SAAS,CAAC;SAClB;QACD,IAAI,CAAC,YAAY,EAAE;YACjB,MAAM,IAAI,8BAAkB,CAAC,yCAAyC,CAAC,CAAC;SACzE;QACD,OAAO,IAAI,2BAAe,CAAC,YAAY,CAAC,CAAC;IAC3C,CAAC,CAAC,EAAE,CAAC;IACL,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,GAAG,eAAe,CAAC,qBAAqB,CAAC;IACpE,MAAM,eAAe,GAAG,YAAY,IAAI,IAAA,+BAAoB,EAAC,YAAY,CAAC,CAAC;IAC3E,IAAI,YAAY,KAAK,SAAS,EAAE;QAC9B,MAAM,IAAI,8BAAkB,CAAC,6CAA6C,CAAC,CAAC;KAC7E;IACD,OAAO,OAAO,CAAC,GAAG,CAChB,SAAS,CAAC,GAAG,CAAC,KAAK,EAAE,eAAe,EAAE,EAAE;QACtC,2EAA2E;QAC3E,MAAM,QAAQ,GAAG,IAAA,mBAAiB,EAAC,eAAe,CAAC,CAAC;QACpD,IAAI,CAAC,UAAU,IAAI,CAAC,QAAQ,EAAE;YAC5B,OAAO;SACR;QAED,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE;YACxC,MAAM,IAAI,0BAAc,CAAC,wBAAwB,eAAe,CAAC,GAAG,GAAG,CAAC,CAAC;SAC1E;QAED,MAAM,GAAG,GAAG,GAAG,eAAe,CAAC,GAAG,IAAI,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,QAAQ,CAAC;QAE3E,2DAA2D;QAC3D,sFAAsF;QACtF,MAAM,IAAI,GAA4B;YACpC,SAAS,EAAE,eAAe;YAC1B,MAAM,EAAE,eAAe,CAAC,qBAAqB,CAAC,MAAM;YACpD,MAAM,EAAE,IAAA,+BAAoB,EAAC,YAAY,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS;YAC/D,SAAS,EAAE,SAAS;YACpB,sBAAsB,EAAE,SAAS;SAClC,CAAC;QAEF,IAAI,IAAA,+BAAoB,EAAC,YAAY,CAAC,EAAE;YACtC,IAAI,CAAC,SAAS,GAAG,MAAM,IAAA,sBAAY,EAAC,EAAE,EAAE,UAAU,CAAC,CAAC;SACrD;aAAM;YACL,IAAI,CAAC,sBAAsB,GAAG,MAAM,IAAA,sBAAY,EAAC,IAAI,EAAE,UAAU,CAAC,CAAC;SACpE;QACD,MAAM,OAAO,GAAG,MAAM,YAAY,CAAC,SAAS,CAAC,YAAY,CAAC,MAAM,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC,CAAC;QAE9E,IAAI;YACF,MAAM,QAAQ,GAAG,MAAM,eAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,EAAE;gBAC3D,OAAO,EAAE,OAAO,CAAC,OAAO;aACzB,CAAC,CAAC;YAEH,0FAA0F;YAC1F,eAAe;YACf,OAAO,eAAe,CAAC,UAAU,CAAC;YAClC,OAAO,eAAe,CAAC,iBAAiB,CAAC;YACzC,OAAO,eAAe,CAAC,aAAa,CAAC;YAErC,IAAI,QAAQ,EAAE;gBACZ,2EAA2E;gBAC3E,MAAM,aAAa,GAAG,IAAI,CAAC,KAAK,CAAC,iBAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBACxD,eAAe,CAAC,qBAAqB,CAAC,MAAM,GAAG,iBAAM,CAAC,MAAM,CAC1D,IAAI,CAAC,SAAS,CAAC,EAAE,IAAI,EAAE,aAAa,CAAC,IAAI,EAAE,CAAC,CAC7C,CAAC;aACH;YACD,OAAO,QAAQ,CAAC,IAAI,CAAC;SACtB;QAAC,OAAO,CAAC,EAAE;YACV,IAAI,CAAC,CAAC,QAAQ,EAAE;gBACd,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,IAAI,GAAG,EAAE;oBAC5B,MAAM,IAAI,wBAAY,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC;iBAC7C;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,iCAAqB,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC;iBACtD;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,gCAAoB,CAAC,qBAAqB,EAAE,CAAC,CAAC,CAAC;iBAC1D;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,8BAAkB,CAAC,kDAAkD,EAAE,CAAC,CAAC,CAAC;iBACrF;qBAAM;oBACL,MAAM,IAAI,wBAAY,CAAC,qBAAqB,EAAE,CAAC,CAAC,CAAC;iBAClD;aACF;iBAAM,IAAI,CAAC,CAAC,OAAO,EAAE;gBACpB,MAAM,IAAI,wBAAY,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC;aACrD;YACD,MAAM,IAAI,oBAAQ,CAChB,mDAAmD,CAAC,CAAC,IAAI,KAAK,CAAC,CAAC,OAAO,iBAAiB,CAAC,EAAE,QAAQ,EAAE,IAAI,GAAG,EAC5G,CAAC,CACF,CAAC;SACH;IACH,CAAC,CAAC,CACH,CAAC;AACJ,CAAC;AAhGD,wBAgGC;AAEM,KAAK,UAAU,WAAW,CAAC,GAAyB;IACzD,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE;QACrB,MAAM,IAAI,8BAAkB,CAAC,qCAAqC,CAAC,CAAC;KACrE;IACD,IAAI,CAAC,GAAG,CAAC,aAAa,EAAE;QACtB,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,CAAC,CAAC;KACzD;IAED,4DAA4D;IAC5D,MAAM,YAAY,GAAc,EAAE,CAAC;IAEnC,GAAG,CAAC,SAAS,KAAK,MAAM,CAAC,gBAAgB,CAAC;IAE1C,MAAM,UAAU,GAAgB;QAC9B;YACE,QAAQ,EAAE,WAAW;SACtB;QACD;YACE,QAAQ,EAAE,iBAAiB;SAC5B;KACF,CAAC;IAEF,IAAI,aAAa,GAAG,IAAI,UAAU,EAAE,CAAC;IAErC,IAAI,cAAc,GAAG,CAAC,CAAC;IACvB,IAAI,cAAc,GAAG,CAAC,CAAC;IACvB,IAAI,UAAU,GAAG,CAAC,CAAC;IACnB,IAAI,aAAa,GAAG,CAAC,CAAC;IACtB,IAAI,aAAa,GAAG,EAAE,CAAC;IAEvB,MAAM,SAAS,GAAG,IAAI,oBAAS,EAAE,CAAC;IAClC,MAAM,QAAQ,GAAG,MAAM,iBAAiB,CACtC,GAAG,CAAC,cAAc,EAClB,GAAG,CAAC,qBAAqB,EACzB,GAAG,CAAC,MAAM,EACV,GAAG,CAAC,QAAQ,CACb,CAAC;IAEF,IAAI,CAAC,QAAQ,EAAE;QACb,2CAA2C;QAC3C,MAAM,IAAI,8BAAkB,CAAC,gEAAgE,CAAC,CAAC;KAChG;IACD,MAAM,SAAS,GAAG,GAAG,CAAC,QAAQ,CAAC,UAAU,CAAC;IAE1C,qDAAqD;IACrD,MAAM,cAAc,GAAG,MAAM,MAAM,CAAC;QAClC,YAAY,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,YAAY;QAC1D,SAAS,EAAE,GAAG,CAAC,SAAS;QACxB,YAAY,EAAE,GAAG,CAAC,YAAY;QAC9B,MAAM,EAAE,GAAG,CAAC,MAAM;QAClB,UAAU,EAAE,SAAS;QACrB,eAAe,EAAE,QAAQ;KAC1B,CAAC,CAAC;IAEH,yDAAyD;IACzD,MAAM,EAAE,kBAAkB,EAAE,GAAG,GAAG,CAAC;IACnC,MAAM,eAAe,GAAG,MAAM,GAAG,CAAC,qBAAqB,CAAC,OAAO,CAC7D,kBAAM,CAAC,eAAe,CAAC,IAAI,WAAW,CAAC,kBAAkB,CAAC,CAAC,EAC3D,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CACxC,CAAC;IACF,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;IAC5E,MAAM,2BAA2B,GAAG,aAAa,CAAC,MAAM,CAAC;IAEzD,4BAA4B;IAC5B,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,WAAW,CAAC;IACrC,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,GAAG,cAAc,CAAC;IACtC,MAAM,YAAY,GAAG,GAAG,CAAC,aAAa,CAAC,SAAS,EAAE,CAAC;IAEnD;;;;;;;MAOE;IACF,MAAM,eAAe,GAAG;QACtB,KAAK,EAAE,CAAC,UAA2C,EAAE,EAAE;YACrD,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;YACtD,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;YAC/C,UAAU,GAAG,CAAC,CAAC;YACf,aAAa,GAAG,CAAC,CAAC;QACpB,CAAC;QAED,IAAI,EAAE,KAAK,EAAE,UAA2C,EAAE,EAAE;YAC1D,IAAI,MAAM,CAAC;YAEX,OAAO,aAAa,CAAC,MAAM,GAAG,kBAAkB,IAAI,CAAC,MAAM,EAAE;gBAC3D,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,GAAG,MAAM,YAAY,CAAC,IAAI,EAAE,CAAC;gBAClD,MAAM,GAAG,IAAI,CAAC;gBACd,IAAI,KAAK,EAAE;oBACT,aAAa,GAAG,IAAA,sBAAW,EAAC,CAAC,aAAa,EAAE,KAAK,CAAC,CAAC,CAAC;iBACrD;aACF;YAED,OACE,aAAa,CAAC,MAAM,IAAI,kBAAkB;gBAC1C,CAAC,CAAC,UAAU,CAAC,WAAW;gBACxB,UAAU,CAAC,WAAW,GAAG,CAAC,EAC1B;gBACA,MAAM,OAAO,GAAG,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,kBAAkB,CAAC,CAAC;gBAC3D,MAAM,gBAAgB,GAAG,MAAM,uBAAuB,CAAC,OAAO,CAAC,CAAC;gBAChE,UAAU,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;gBAErC,aAAa,GAAG,aAAa,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;aACzD;YAED,MAAM,gBAAgB,GAAG,MAAM,IAAI,aAAa,CAAC,MAAM,CAAC;YAExD,IAAI,gBAAgB,EAAE;gBACpB,MAAM,gBAAgB,GAAG,MAAM,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBACtE,UAAU,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;gBACrC,aAAa,GAAG,IAAI,UAAU,EAAE,CAAC;aAClC;YAED,IAAI,MAAM,IAAI,aAAa,CAAC,MAAM,KAAK,CAAC,EAAE;gBACxC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,GAAG,UAAU,CAAC;gBACtC,UAAU,CAAC,CAAC,CAAC,CAAC,aAAa,GAAG,aAAa,CAAC;gBAC5C,MAAM,qBAAqB,GAAG,SAAS,CAAC,mBAAmB,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;gBAEvF,UAAU,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC;gBAC1C,WAAW,CAAC,qBAAqB,CAAC,CAAC;gBAEnC,uBAAuB;gBACvB,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,iBAAiB,CAAC;gBAC3C,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,GAAG,cAAc,CAAC;gBACtC,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;gBACtD,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;gBAC/C,UAAU,GAAG,CAAC,CAAC;gBACf,aAAa,GAAG,CAAC,CAAC;gBAElB,gCAAgC;gBAChC,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,EACvC,kBAAM,CAAC,UAAU,CAAC,aAAa,CAAC,EAChC,GAAG,CAAC,kBAAkB,EACtB,GAAG,CAAC,aAAa,CAClB,CAAC;gBACF,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;oBACnE,iBAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;gBAC/B,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;oBACnE,GAAG,CAAC,kBAAkB,CAAC;gBAEzB,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;gBAC5F,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,2BAA2B;oBAC7E,2BAA2B,CAAC;gBAC9B,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,cAAc;oBAChE,GAAG,CAAC,yBAAyB,CAAC;gBAChC,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,QAAQ,GAAG,YAAY,CAAC;gBAE5E,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;gBAE1D,MAAM,gBAAgB,GAA2B,EAAE,CAAC;gBACpD,IAAI,GAAG,CAAC,gBAAgB,IAAI,GAAG,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE;oBAC3D,MAAM,OAAO,CAAC,GAAG,CACf,GAAG,CAAC,gBAAgB,CAAC,GAAG,CAAC,KAAK,EAAE,eAAe,EAAE,EAAE;wBACjD,oDAAoD;wBACpD,MAAM,UAAU,GAAiB,eAAe,CAAC,UAAU,IAAI;4BAC7D,GAAG,EAAE,OAAO;4BACZ,GAAG,EAAE,IAAI,UAAU,CAAC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC;yBAC7E,CAAC;wBACF,MAAM,SAAS,GAAG,MAAM,UAAU,CAAC,eAAe,CAAC,aAAa,EAAE;4BAChE,GAAG,eAAe;4BAClB,UAAU;yBACX,CAAC,CAAC;wBAEH,qDAAqD;wBACrD,gBAAgB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;oBACnC,CAAC,CAAC,CACH,CAAC;iBACH;gBAED,QAAQ,CAAC,UAAU,GAAG,gBAAgB,CAAC;gBAEvC,qBAAqB;gBACrB,MAAM,cAAc,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC,CAAC;gBAC1E,UAAU,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;gBACnC,WAAW,CAAC,cAAc,CAAC,CAAC;gBAC5B,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,GAAG,UAAU,CAAC;gBACtC,UAAU,CAAC,CAAC,CAAC,CAAC,aAAa,GAAG,aAAa,CAAC;gBAC5C,MAAM,sBAAsB,GAAG,SAAS,CAAC,mBAAmB,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;gBACxF,UAAU,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC;gBAC3C,WAAW,CAAC,sBAAsB,CAAC,CAAC;gBAEpC,kCAAkC;gBAClC,MAAM,yBAAyB,GAAG,cAAc,CAAC;gBACjD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;oBAC1C,MAAM,SAAS,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;oBAChC,MAAM,MAAM,GAAG,SAAS,CAAC,2BAA2B,CAClD,SAAS,CAAC,aAAa,IAAI,CAAC,EAC5B,SAAS,CAAC,QAAQ,EAClB,SAAS,CAAC,MAAM,IAAI,CAAC,EACrB,SAAS,CAAC,UAAU,IAAI,CAAC,EACzB,UAAU,CACX,CAAC;oBACF,UAAU,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;oBAC3B,WAAW,CAAC,MAAM,CAAC,CAAC;iBACrB;gBACD,MAAM,8BAA8B,GAAG,cAAc,GAAG,yBAAyB,CAAC;gBAClF,MAAM,UAAU,GAAG,SAAS,CAAC,gCAAgC,CAC3D,UAAU,CAAC,MAAM,EACjB,8BAA8B,EAC9B,yBAAyB,CAC1B,CAAC;gBACF,UAAU,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC/B,WAAW,CAAC,UAAU,CAAC,CAAC;gBAExB,UAAU,CAAC,KAAK,EAAE,CAAC;aACpB;QACH,CAAC;KACF,CAAC;IAEF,MAAM,eAAe,GAAG,IAAI,oDAAuB,CAAC,eAAe,CAAC,CAAC;IACrE,eAAe,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAEpC,IAAI,cAAc,EAAE;QAClB,eAAe,CAAC,cAAc,GAAG,cAAc,CAAC;QAChD,eAAe,CAAC,OAAO,GAAG,cAAc,CAAC;QACzC,eAAe,CAAC,SAAS,GAAG,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,SAAS,CAAC;KAC7E;IAED,OAAO,eAAe,CAAC;IAEvB,qBAAqB;IACrB,SAAS,SAAS,CAAC,QAAgB;QACjC,OAAO,SAAS,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;IACzD,CAAC;IAED,SAAS,WAAW,CAAC,KAA0B;QAC7C,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;YAC7B,KAAK,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;SACzC;QACD,cAAc,IAAI,KAAK,CAAC,MAAM,CAAC;QAC/B,IAAI,cAAc,GAAG,GAAG,CAAC,SAAS,EAAE;YAClC,MAAM,IAAI,8BAAkB,CAAC,oBAAoB,GAAG,CAAC,SAAS,YAAY,CAAC,CAAC;SAC7E;QACD,mEAAmE;QACnE,UAAU,GAAG,IAAA,0BAAQ,EAAC,KAAK,EAAE,UAAU,CAAC,CAAC;QACzC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;IAChC,CAAC;IAED,KAAK,UAAU,uBAAuB,CAAC,KAAiB;QACtD,cAAc,IAAI,KAAK,CAAC,MAAM,CAAC;QAC/B,GAAG,CAAC,eAAe,EAAE,CAAC,cAAc,CAAC,CAAC;QAEtC,wHAAwH;QACxH,MAAM,eAAe,GAAG,MAAM,GAAG,CAAC,qBAAqB,CAAC,OAAO,CAC7D,kBAAM,CAAC,eAAe,CAAC,KAAK,CAAC,MAAM,CAAC,EACpC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CACxC,CAAC;QACF,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;QAC5E,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,EACvC,eAAe,CAAC,OAAO,EACvB,GAAG,CAAC,yBAAyB,EAC7B,GAAG,CAAC,aAAa,CAClB,CAAC;QAEF,mDAAmD;QACnD,aAAa,IAAI,aAAa,CAAC;QAE/B,YAAY,CAAC,IAAI,CAAC;YAChB,IAAI,EAAE,iBAAM,CAAC,MAAM,CAAC,aAAa,CAAC;YAClC,WAAW,EAAE,KAAK,CAAC,MAAM,KAAK,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM;YAC3E,oBAAoB,EAClB,aAAa,CAAC,MAAM,KAAK,2BAA2B,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,aAAa,CAAC,MAAM;SAC1F,CAAC,CAAC;QACH,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;QACrE,WAAW,CAAC,MAAM,CAAC,CAAC;QAEpB,OAAO,MAAM,CAAC;IAChB,CAAC;AACH,CAAC;AAhRD,kCAgRC;AAED,iFAAiF;AAC1E,KAAK,UAAU,aAAa,CACjC,OAAgB;IAEhB,MAAM,SAAS,GAAG,IAAI,oBAAS,CAAC,OAAO,CAAC,CAAC;IACzC,MAAM,gBAAgB,GAAG,MAAM,SAAS,CAAC,mBAAmB,EAAE,CAAC;IAC/D,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;IAClF,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,gBAAgB,EAAE,CAAC;AACnD,CAAC;AAPD,sCAOC;AAED,SAAgB,uBAAuB,CACrC,SAA4B,EAC5B,YAA6B;IAE7B,MAAM,OAAO,GAAG,CAAC,CAAkB,EAAE,EAAE,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;IACnE,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC,CAAC;IAEhE,MAAM,gBAAgB,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IAClF,IAAI,QAAQ,CAAC,IAAI,GAAG,gBAAgB,CAAC,IAAI,EAAE;QACzC,MAAM,eAAe,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;QAC5F,MAAM,IAAI,0BAAc,CACtB,qDAAqD,IAAI,CAAC,SAAS,CAAC;YAClE,GAAG,eAAe;SACnB,CAAC,kBAAkB,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,QAAQ,CAAC,CAAC,EAAE,EACnD,GAAG,eAAe,CACnB,CAAC;KACH;IACD,MAAM,eAAe,GAAoD,MAAM,CAAC,WAAW,CACzF,CAAC,GAAG,QAAQ,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAClC,CAAC;IACF,KAAK,MAAM,GAAG,IAAI,SAAS,EAAE;QAC3B,MAAM,WAAW,GAAG,eAAe,CAAC,GAAG,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC;QACnD,IAAI,GAAG,CAAC,GAAG,IAAI,WAAW,EAAE;YAC1B,MAAM,IAAI,4BAAgB,CACxB,yDAAyD,GAAG,CAAC,GAAG,eAAe,GAAG,CAAC,GAAG,GAAG,CAC1F,CAAC;SACH;QACD,IAAI,OAAO,CAAC,GAAG,CAAC,EAAE;YAChB,WAAW,CAAC,GAAG,CAAC,GAAG,CAAC,GAAG,GAAG,CAAC;SAC5B;KACF;IACD,OAAO,eAAe,CAAC;AACzB,CAAC;AAhCD,0DAgCC;AAED,KAAK,UAAU,SAAS,CAAC,EACvB,QAAQ,EACR,YAAY,EACZ,YAAY,EACZ,QAAQ,EACR,MAAM,EACN,aAAa,GAQd;IACC,IAAI,YAAY,KAAK,SAAS,EAAE;QAC9B,MAAM,IAAI,8BAAkB,CAC1B,yEAAyE,CAC1E,CAAC;KACH;IACD,MAAM,EAAE,SAAS,EAAE,GAAG,QAAQ,CAAC,qBAAqB,CAAC;IACrD,MAAM,eAAe,GAAG,uBAAuB,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;IACzE,MAAM,eAAe,GAAG,YAAY,IAAI,IAAA,+BAAoB,EAAC,YAAY,CAAC,CAAC;IAE3E,KAAK,UAAU,YAAY,CAAC,YAA6B;QACvD,MAAM,GAAG,GAAG,GAAG,YAAY,CAAC,GAAG,IAAI,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,QAAQ,CAAC;QACxE,MAAM,uBAAuB,GAAG,MAAM,aAAa,CAAC,eAAe,CACjE,MAAM,aAAa,CAAC,eAAe,EAAE,CACtC,CAAC;QACF,MAAM,eAAe,GAAG,uBAAuB,CAAC,SAAS,CAAC;QAE1D,MAAM,cAAc,GAAG,IAAI,CAAC,SAAS,CAAC;YACpC,SAAS,EAAE,OAAO;YAClB,SAAS,EAAE,YAAY;YACvB,MAAM,EAAE,QAAQ,CAAC,qBAAqB,CAAC,MAAM;YAC7C,eAAe;SAChB,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,EAAE,WAAW,EAAE,cAAc,EAAE,CAAC;QACnD,MAAM,kBAAkB,GAAG,MAAM,IAAA,sBAAY,EAC3C,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,EACjC,QAAQ,CAAC,UAAU,CACpB,CAAC;QAEF,IAAI,WAAW,CAAC;QAChB,IAAI,eAAe,EAAE;YACnB,WAAW,GAAG;gBACZ,SAAS,EAAE,YAAY;gBACvB,MAAM,EAAE,QAAQ,CAAC,qBAAqB,CAAC,MAAM;gBAC7C,MAAM,EAAE;oBACN,GAAG,MAAM;oBACT,SAAS,EAAE,eAAe;iBAC3B;gBACD,SAAS,EAAE,kBAAkB;aAC9B,CAAC;SACH;aAAM;YACL,WAAW,GAAG;gBACZ,kBAAkB;aACnB,CAAC;SACH;QAED,MAAM,OAAO,GAAG,MAAM,YAAY,CAAC,SAAS,CAAC,YAAY,CAAC,MAAM,EAAE,GAAG,EAAE,WAAW,CAAC,CAAC,CAAC;QACrF,MAAM,EACJ,IAAI,EAAE,EAAE,gBAAgB,EAAE,QAAQ,EAAE,GACrC,GAAG,MAAM,eAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC;QAE9E,MAAM,GAAG,GAAG,kBAAM,CAAC,UAAU,CAAC,iBAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC;QAC/D,MAAM,kBAAkB,GAAG,MAAM,aAAa,CAAC,qBAAqB,CAClE,GAAG,EACH,uBAAuB,CAAC,UAAU,CACnC,CAAC;QAEF,OAAO;YACL,GAAG,EAAE,IAAI,UAAU,CAAC,kBAAkB,CAAC,WAAW,EAAE,CAAC;YACrD,QAAQ;SACT,CAAC;IACJ,CAAC;IAED,sEAAsE;IACtE,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC;IAEvD,qDAAqD;IACrD,IAAI,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAE;QACvB,MAAM,CAAC,OAAO,CAAC,GAAG,QAAQ,CAAC;QAC3B,MAAM,UAAU,GAAG,eAAe,CAAC,OAAO,CAAC,CAAC;QAE5C,IAAI;YACF,uEAAuE;YACvE,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,GAAG,CAC9B,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,YAAY,EAAE,EAAE;gBACnD,IAAI;oBACF,OAAO,MAAM,YAAY,CAAC,YAAY,CAAC,CAAC;iBACzC;gBAAC,OAAO,CAAC,EAAE;oBACV,4BAA4B;oBAC5B,MAAM,iBAAiB,CAAC,CAAuB,CAAC,CAAC;iBAClD;YACH,CAAC,CAAC,CACH,CAAC;YAEF,MAAM,gBAAgB,GAAG,IAAA,mBAAQ,EAAC,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC;YAChD,OAAO;gBACL,sBAAsB,EAAE,kBAAM,CAAC,eAAe,CAAC,gBAAgB,CAAC;gBAChE,QAAQ,EAAE,MAAM,CAAC,QAAQ;aAC1B,CAAC;SACH;QAAC,OAAO,KAAK,EAAE;YACd,IAAI,KAAK,YAAY,cAAc,EAAE;gBACnC,yBAAyB;gBACzB,MAAM,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,yDAAyD;aACjF;YACD,MAAM,KAAK,CAAC;SACb;KACF;SAAM;QACL,sEAAsE;QACtE,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,GAAG,CACpC,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,OAAO,EAAE,UAAU,CAAC,EAAE,EAAE;YAClE,IAAI,CAAC,UAAU,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,MAAM,EAAE;gBAClD,MAAM,IAAI,0BAAc,CACtB,wDAAwD,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,EAAE,EACjF,EAAE,CACH,CAAC;aACH;YAED,IAAI;gBACF,mEAAmE;gBACnE,OAAO,MAAM,OAAO,CAAC,GAAG,CACtB,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,YAAY,EAAE,EAAE;oBACnD,IAAI;wBACF,OAAO,MAAM,YAAY,CAAC,YAAY,CAAC,CAAC;qBACzC;oBAAC,OAAO,CAAC,EAAE;wBACV,MAAM,iBAAiB,CAAC,CAAuB,CAAC,CAAC;qBAClD;gBACH,CAAC,CAAC,CACH,CAAC;aACH;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,KAAK,YAAY,cAAc,EAAE;oBACnC,wCAAwC;oBACxC,MAAM,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,yDAAyD;iBACjF;gBACD,MAAM,KAAK,CAAC;aACb;QACH,CAAC,CAAC,CACH,CAAC;QAEF,2BAA2B;QAC3B,MAAM,gBAAgB,GAAG,IAAA,mBAAQ,EAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;QAClE,OAAO;YACL,sBAAsB,EAAE,kBAAM,CAAC,eAAe,CAAC,gBAAgB,CAAC;YAChE,QAAQ,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,gCAAgC;SACrE,CAAC;KACH;AACH,CAAC;AAED,SAAS,iBAAiB,CAAC,KAAyB;IAClD,IAAI,eAAK,CAAC,YAAY,CAAC,KAAK,CAAC,EAAE;QAC7B,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,IAAI,GAAG,EAAE;YAC3D,OAAO,IAAI,wBAAY,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;SAClD;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,iCAAqB,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;SAC3D;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,gCAAoB,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC;SAC/D;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,4BAAgB,CACzB,uFAAuF,EACvF,KAAK,CACN,CAAC;SACH;aAAM;YACL,OAAO,IAAI,wBAAY,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC;SACvD;KACF;SAAM;QACL,IAAI,KAAK,CAAC,IAAI,KAAK,oBAAoB,IAAI,KAAK,CAAC,IAAI,KAAK,gBAAgB,EAAE;YAC1E,OAAO,IAAI,wBAAY,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;SACjE;QACD,OAAO,IAAI,4BAAgB,CACzB,6CAA6C,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,GAAG,EAC5E,KAAK,CACN,CAAC;KACH;AACH,CAAC;AAED,KAAK,UAAU,YAAY,CACzB,cAA0B,EAC1B,sBAA8B,EAC9B,IAAY,EACZ,MAAuB,EACvB,yBAA6C,EAC7C,aAA4B;IAE5B,IAAI,yBAAyB,KAAK,MAAM,IAAI,yBAAyB,KAAK,OAAO,EAAE;KAClF;IACD,MAAM,cAAc,GAAG,MAAM,YAAY,CACvC,sBAAsB,EACtB,kBAAM,CAAC,eAAe,CAAC,cAAc,CAAC,MAAM,CAAC,EAC7C,yBAAyB,EACzB,aAAa,CACd,CAAC;IACF,IAAI,IAAI,KAAK,IAAI,CAAC,cAAc,CAAC,EAAE;QACjC,MAAM,IAAI,0BAAc,CAAC,wCAAwC,CAAC,CAAC;KACpE;IACD,OAAO,MAAM,MAAM,CAAC,OAAO,CAAC,cAAc,EAAE,sBAAsB,CAAC,CAAC;AACtE,CAAC;AAED,KAAK,UAAU,gBAAgB,CAC7B,QAAiB,EACjB,gBAAoC,EACpC,SAAoB,EACpB,sBAA8B,EAC9B,MAAuB,EACvB,yBAA6C,EAC7C,aAA4B;IAE5B,MAAM,mBAAmB,GAAG,GAAG,CAAC;IAChC,IAAI,QAAQ,GAAG,EAAE,CAAC;IAClB,MAAM,SAAS,GAAG,CAAC,CAAC;IAEpB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,IAAI,mBAAmB,EAAE;QAC7D,IAAI,QAAQ,CAAC,MAAM,KAAK,SAAS,EAAE;YACjC,MAAM,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YAC5B,QAAQ,GAAG,EAAE,CAAC;SACf;QACD,QAAQ,CAAC,IAAI,CACX,CAAC,KAAK,IAAI,EAAE;YACV,IAAI,MAAyB,CAAC;YAE9B,MAAM,KAAK,GAAG,QAAQ,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,GAAG,mBAAmB,CAAC,CAAC;YACzD,IAAI;gBACF,MAAM,UAAU,GAAG,KAAK,CAAC,MAAM,CAC7B,CAAC,UAAU,EAAE,EAAE,oBAAoB,EAAE,EAAE,EAAE,CAAC,UAAU,GAAI,oBAA+B,EACvF,CAAC,CACF,CAAC;gBACF,MAAM,GAAG,MAAM,SAAS,CAAC,iBAAiB,CACxC,gBAAgB,EAChB,WAAW,EACX,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,EACxB,UAAU,CACX,CAAC;aACH;YAAC,OAAO,CAAC,EAAE;gBACV,IAAI,CAAC,YAAY,4BAAgB,EAAE;oBACjC,MAAM,CAAC,CAAC;iBACT;gBACD,MAAM,IAAI,wBAAY,CAAC,iCAAiC,EAAE,CAAC,CAAC,CAAC;aAC9D;YACD,IAAI,MAAM,EAAE;gBACV,eAAe,CAAC;oBACd,MAAM;oBACN,aAAa;oBACb,sBAAsB;oBACtB,KAAK;oBACL,MAAM;oBACN,yBAAyB;iBAC1B,CAAC,CAAC;aACJ;QACH,CAAC,CAAC,EAAE,CACL,CAAC;KACH;AACH,CAAC;AAEM,KAAK,UAAU,eAAe,CAAC,EACpC,MAAM,EACN,sBAAsB,EACtB,KAAK,EACL,MAAM,EACN,aAAa,EACb,yBAAyB,GAQ1B;IACC,KAAK,MAAM,KAAK,IAAI,KAAK,EAAE;QACzB,MAAM,EAAE,eAAe,EAAE,oBAAoB,EAAE,QAAQ,EAAE,OAAO,EAAE,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC;QAElF,MAAM,MAAM,GACV,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,eAAe,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC;QAChG,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,GAAI,oBAA+B,CAAC,CAChE,CAAC;QAEF,IAAI;YACF,MAAM,MAAM,GAAG,MAAM,YAAY,CAC/B,cAAc,EACd,sBAAsB,EACtB,KAAK,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,EACpB,MAAM,EACN,yBAAyB,EACzB,aAAa,CACd,CAAC;YACF,KAAK,CAAC,KAAK,CAAC,CAAC,cAAc,GAAG,MAAM,CAAC;YACrC,IAAI,QAAQ,EAAE;gBACZ,QAAQ,CAAC,IAAI,CAAC,CAAC;aAChB;SACF;QAAC,OAAO,CAAC,EAAE;YACV,IAAI,OAAO,EAAE;gBACX,OAAO,CAAC,CAAC,CAAC,CAAC;aACZ;iBAAM;gBACL,MAAM,CAAC,CAAC;aACT;SACF;KACF;AACH,CAAC;AA7CD,0CA6CC;AAEM,KAAK,UAAU,UAAU,CAAC,GAAyB;IACxD,IAAI,EAAE,SAAS,EAAE,GAAG,GAAG,CAAC;IACxB,IAAI,CAAC,SAAS,EAAE;QACd,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE;YACrB,MAAM,IAAI,8BAAkB,CAAC,yCAAyC,CAAC,CAAC;SACzE;QACD,SAAS,GAAG,IAAI,2BAAe,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;KACnD;IACD,MAAM,EAAE,QAAQ,EAAE,SAAS,EAAE,gBAAgB,EAAE,GAAG,MAAM,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IACnF,IAAI,CAAC,QAAQ,EAAE;QACb,MAAM,IAAI,4BAAgB,CAAC,uBAAuB,CAAC,CAAC;KACrD;IACD,GAAG,CAAC,aAAa,KAAK,KAAK,EAAE,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC;IAEzC,MAAM,EACJ,2BAA2B,EAAE,kBAAkB,EAC/C,aAAa,EACb,cAAc,EACd,QAAQ,GACT,GAAG,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC;IACxD,MAAM,EAAE,QAAQ,EAAE,sBAAsB,EAAE,GAAG,MAAM,SAAS,CAAC;QAC3D,QAAQ;QACR,YAAY,EAAE,GAAG,CAAC,YAAY;QAC9B,YAAY,EAAE,SAAS;QACvB,QAAQ,EAAE,GAAG,CAAC,QAAQ;QACtB,MAAM,EAAE,GAAG,CAAC,MAAM;QAClB,aAAa,EAAE,GAAG,CAAC,aAAa;KACjC,CAAC,CAAC;IACH,sLAAsL;IACtL,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;IACzE,MAAM,2BAA2B,GAAG,kBAAkB,IAAI,oBAAoB,CAAC;IAE/E,sCAAsC;IACtC,MAAM,aAAa,GAAG,QAAQ,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC,iBAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IAC/E,MAAM,kBAAkB,GAAG,aAAa,CAAC,GAAG,CAAC;IAC7C,IAAI,kBAAkB,KAAK,MAAM,IAAI,kBAAkB,KAAK,OAAO,EAAE;QACnE,MAAM,IAAI,mCAAgB,CAAC,8BAA8B,kBAAkB,GAAG,CAAC,CAAC;KACjF;IACD,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,gBAAgB,EAChB,kBAAM,CAAC,UAAU,CAAC,aAAa,CAAC,EAChC,kBAAkB,EAClB,GAAG,CAAC,aAAa,CAClB,CAAC;IAEF,IACE,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;QACrE,iBAAM,CAAC,MAAM,CAAC,aAAa,CAAC,EAC5B;QACA,MAAM,IAAI,0BAAc,CAAC,0CAA0C,CAAC,CAAC;KACtE;IAED,IAAI,CAAC,GAAG,CAAC,kBAAkB,EAAE;QAC3B,KAAK,MAAM,SAAS,IAAI,QAAQ,CAAC,UAAU,IAAI,EAAE,EAAE;YACjD,iCAAiC;YACjC,IAAI,YAAY,GAAiB;gBAC/B,GAAG,EAAE,OAAO;gBACZ,GAAG,EAAE,IAAI,UAAU,CAAC,sBAAsB,CAAC,aAAa,EAAE,CAAC;aAC5D,CAAC;YAEF,IAAI,GAAG,CAAC,yBAAyB,EAAE;gBACjC,MAAM,QAAQ,GAAG,GAAG,CAAC,yBAAyB,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;gBAClE,IAAI,QAAQ,EAAE;oBACZ,YAAY,GAAG,QAAQ,CAAC;iBACzB;aACF;YACD,MAAM,UAAU,CAAC,MAAM,CAAC,SAAS,EAAE,aAAa,EAAE,YAAY,CAAC,CAAC;SACjE;KACF;IAED,IAAI,mBAAmB,GAAG,CAAC,CAAC;IAC5B,MAAM,QAAQ,GAAG,IAAI,GAAG,CACtB,QAAQ,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,EAAE,oBAAoB,GAAG,2BAA2B,EAAE,EAAE,EAAE;QAC5E,MAAM,MAAM,GAAG,CAAC,GAAG,EAAE;YACnB,IAAI,QAAQ,EAAE,OAAO,CAAC;YACtB,MAAM,KAAK,GAAU;gBACnB,IAAI;gBACJ,eAAe,EAAE,mBAAmB;gBACpC,oBAAoB;gBACpB,OAAO,EAAE,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;oBACvC,QAAQ,GAAG,OAAO,CAAC;oBACnB,OAAO,GAAG,MAAM,CAAC;gBACnB,CAAC,CAAC;aACH,CAAC;YACF,KAAK,CAAC,QAAQ,GAAG,QAAQ,CAAC;YAC1B,KAAK,CAAC,OAAO,GAAG,OAAO,CAAC;YACxB,OAAO,KAAK,CAAC;QACf,CAAC,CAAC,EAAE,CAAC;QACL,mBAAmB,IAAI,oBAAoB,IAAI,2BAA2B,CAAC;QAC3E,OAAO,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC;IACxB,CAAC,CAAC,CACH,CAAC;IAEF,MAAM,MAAM,GAAG,IAAI,uBAAY,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAG,cAAc,IAAI,kBAAkB,CAAC;IACjE,IAAI,mBAAmB,KAAK,MAAM,IAAI,mBAAmB,KAAK,OAAO,EAAE;QACrE,MAAM,IAAI,mCAAgB,CAAC,iCAAiC,mBAAmB,GAAG,CAAC,CAAC;KACrF;IAED,qCAAqC;IACrC,gBAAgB,CACd,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC,EAC7B,gBAAgB,EAChB,SAAS,EACT,gBAAgB,EAChB,MAAM,EACN,mBAAmB,EACnB,GAAG,CAAC,aAAa,CAClB,CAAC;IAEF,IAAI,QAAQ,GAAG,CAAC,CAAC;IACjB,MAAM,gBAAgB,GAAG;QACvB,IAAI,EAAE,KAAK,EAAE,UAA2C,EAAE,EAAE;YAC1D,IAAI,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAE;gBACvB,UAAU,CAAC,KAAK,EAAE,CAAC;gBACnB,OAAO;aACR;YAED,MAAM,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,QAAQ,CAAC,OAAO,EAAE,CAAC,IAAI,EAAE,CAAC,KAAK,CAAC;YACtD,IAAI,CAAC,KAAK,CAAC,cAAc,EAAE;gBACzB,MAAM,KAAK,CAAC,OAAO,CAAC;aACrB;YACD,MAAM,gBAAgB,GAAG,KAAK,CAAC,cAAc,CAAC;YAE9C,UAAU,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,gBAAgB,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC;YAC3E,QAAQ,IAAI,KAAK,CAAC,oBAAoB,CAAC;YACvC,GAAG,CAAC,eAAe,EAAE,CAAC,QAAQ,CAAC,CAAC;YAEhC,KAAK,CAAC,cAAc,GAAG,IAAI,CAAC;YAC5B,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACxB,CAAC;QACD,GAAG,CAAC,GAAG,CAAC,uBAAuB,IAAI,EAAE,uBAAuB,EAAE,GAAG,CAAC,uBAAuB,EAAE,CAAC;KAC7F,CAAC;IAEF,MAAM,YAAY,GAAG,IAAI,oDAAuB,CAAC,gBAAgB,CAAC,CAAC;IAEnE,YAAY,CAAC,QAAQ,GAAG,QAAQ,CAAC;IACjC,YAAY,CAAC,IAAI,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;IACxC,YAAY,CAAC,QAAQ,GAAG,QAAQ,CAAC;IACjC,YAAY,CAAC,IAAI,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;IACtC,OAAO,YAAY,CAAC;AACtB,CAAC;AA7ID,gCA6IC"}