@opentdf/sdk 0.1.0-beta.1701
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +52 -0
- package/dist/cjs/package.json +3 -0
- package/dist/cjs/src/access.js +155 -0
- package/dist/cjs/src/auth/Eas.js +60 -0
- package/dist/cjs/src/auth/auth.js +79 -0
- package/dist/cjs/src/auth/oidc-clientcredentials-provider.js +26 -0
- package/dist/cjs/src/auth/oidc-externaljwt-provider.js +33 -0
- package/dist/cjs/src/auth/oidc-refreshtoken-provider.js +34 -0
- package/dist/cjs/src/auth/oidc.js +222 -0
- package/dist/cjs/src/auth/providers.js +143 -0
- package/dist/cjs/src/encodings/base64.js +154 -0
- package/dist/cjs/src/encodings/hex.js +70 -0
- package/dist/cjs/src/encodings/index.js +29 -0
- package/dist/cjs/src/errors.js +138 -0
- package/dist/cjs/src/index.js +344 -0
- package/dist/cjs/src/nanotdf/Client.js +296 -0
- package/dist/cjs/src/nanotdf/NanoTDF.js +94 -0
- package/dist/cjs/src/nanotdf/browser-entry.js +19 -0
- package/dist/cjs/src/nanotdf/constants.js +5 -0
- package/dist/cjs/src/nanotdf/decrypt.js +17 -0
- package/dist/cjs/src/nanotdf/encrypt-dataset.js +38 -0
- package/dist/cjs/src/nanotdf/encrypt.js +132 -0
- package/dist/cjs/src/nanotdf/enum/CipherEnum.js +13 -0
- package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +15 -0
- package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +8 -0
- package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +11 -0
- package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +10 -0
- package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +11 -0
- package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +29 -0
- package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +11 -0
- package/dist/cjs/src/nanotdf/index.js +25 -0
- package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +3 -0
- package/dist/cjs/src/nanotdf/models/Ciphers.js +61 -0
- package/dist/cjs/src/nanotdf/models/DefaultParams.js +27 -0
- package/dist/cjs/src/nanotdf/models/EcCurves.js +39 -0
- package/dist/cjs/src/nanotdf/models/Header.js +255 -0
- package/dist/cjs/src/nanotdf/models/Payload.js +158 -0
- package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +73 -0
- package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +82 -0
- package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +38 -0
- package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +62 -0
- package/dist/cjs/src/nanotdf/models/ResourceLocator.js +211 -0
- package/dist/cjs/src/nanotdf/models/Signature.js +77 -0
- package/dist/cjs/src/nanotdf-crypto/ciphers.js +17 -0
- package/dist/cjs/src/nanotdf-crypto/decrypt.js +24 -0
- package/dist/cjs/src/nanotdf-crypto/digest.js +7 -0
- package/dist/cjs/src/nanotdf-crypto/ecdsaSignature.js +83 -0
- package/dist/cjs/src/nanotdf-crypto/encrypt.js +24 -0
- package/dist/cjs/src/nanotdf-crypto/enums.js +52 -0
- package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +20 -0
- package/dist/cjs/src/nanotdf-crypto/generateKeyPair.js +13 -0
- package/dist/cjs/src/nanotdf-crypto/generateRandomNumber.js +12 -0
- package/dist/cjs/src/nanotdf-crypto/importRawKey.js +18 -0
- package/dist/cjs/src/nanotdf-crypto/index.js +52 -0
- package/dist/cjs/src/nanotdf-crypto/keyAgreement.js +91 -0
- package/dist/cjs/src/nanotdf-crypto/pemPublicToCrypto.js +225 -0
- package/dist/cjs/src/policy/api.js +58 -0
- package/dist/cjs/src/policy/attributes.js +3 -0
- package/dist/cjs/src/policy/granter.js +146 -0
- package/dist/cjs/src/tdf/AttributeObject.js +15 -0
- package/dist/cjs/src/tdf/AttributeObjectJwt.js +3 -0
- package/dist/cjs/src/tdf/Crypto.js +47 -0
- package/dist/cjs/src/tdf/EntityObject.js +3 -0
- package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +38 -0
- package/dist/cjs/src/tdf/Policy.js +50 -0
- package/dist/cjs/src/tdf/PolicyObject.js +3 -0
- package/dist/cjs/src/tdf/TypedArray.js +3 -0
- package/dist/cjs/src/tdf/index.js +35 -0
- package/dist/cjs/src/types/index.js +3 -0
- package/dist/cjs/src/utils.js +147 -0
- package/dist/cjs/src/version.js +12 -0
- package/dist/cjs/tdf3/index.js +57 -0
- package/dist/cjs/tdf3/src/assertions.js +118 -0
- package/dist/cjs/tdf3/src/binary.js +153 -0
- package/dist/cjs/tdf3/src/ciphers/aes-gcm-cipher.js +56 -0
- package/dist/cjs/tdf3/src/ciphers/algorithms.js +8 -0
- package/dist/cjs/tdf3/src/ciphers/index.js +8 -0
- package/dist/cjs/tdf3/src/ciphers/symmetric-cipher-base.js +22 -0
- package/dist/cjs/tdf3/src/client/DecoratedReadableStream.js +116 -0
- package/dist/cjs/tdf3/src/client/builders.js +561 -0
- package/dist/cjs/tdf3/src/client/index.js +460 -0
- package/dist/cjs/tdf3/src/client/validation.js +63 -0
- package/dist/cjs/tdf3/src/crypto/crypto-utils.js +116 -0
- package/dist/cjs/tdf3/src/crypto/declarations.js +8 -0
- package/dist/cjs/tdf3/src/crypto/index.js +315 -0
- package/dist/cjs/tdf3/src/index.js +34 -0
- package/dist/cjs/tdf3/src/models/attribute-set.js +122 -0
- package/dist/cjs/tdf3/src/models/encryption-information.js +90 -0
- package/dist/cjs/tdf3/src/models/index.js +25 -0
- package/dist/cjs/tdf3/src/models/key-access.js +103 -0
- package/dist/cjs/tdf3/src/models/manifest.js +3 -0
- package/dist/cjs/tdf3/src/models/payload.js +3 -0
- package/dist/cjs/tdf3/src/models/policy.js +24 -0
- package/dist/cjs/tdf3/src/models/upsert-response.js +3 -0
- package/dist/cjs/tdf3/src/tdf.js +907 -0
- package/dist/cjs/tdf3/src/templates/default.html.js +98 -0
- package/dist/cjs/tdf3/src/templates/escaper.js +15 -0
- package/dist/cjs/tdf3/src/templates/index.js +12 -0
- package/dist/cjs/tdf3/src/utils/buffer-crc32.js +48 -0
- package/dist/cjs/tdf3/src/utils/chunkers.js +106 -0
- package/dist/cjs/tdf3/src/utils/index.js +296 -0
- package/dist/cjs/tdf3/src/utils/keysplit.js +61 -0
- package/dist/cjs/tdf3/src/utils/zip-reader.js +253 -0
- package/dist/cjs/tdf3/src/utils/zip-writer.js +308 -0
- package/dist/cjs/tdf3/src/version.js +6 -0
- package/dist/types/src/access.d.ts +47 -0
- package/dist/types/src/access.d.ts.map +1 -0
- package/dist/types/src/auth/Eas.d.ts +34 -0
- package/dist/types/src/auth/Eas.d.ts.map +1 -0
- package/dist/types/src/auth/auth.d.ts +86 -0
- package/dist/types/src/auth/auth.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts +9 -0
- package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-externaljwt-provider.d.ts +10 -0
- package/dist/types/src/auth/oidc-externaljwt-provider.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts +10 -0
- package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts.map +1 -0
- package/dist/types/src/auth/oidc.d.ts +104 -0
- package/dist/types/src/auth/oidc.d.ts.map +1 -0
- package/dist/types/src/auth/providers.d.ts +67 -0
- package/dist/types/src/auth/providers.d.ts.map +1 -0
- package/dist/types/src/encodings/base64.d.ts +18 -0
- package/dist/types/src/encodings/base64.d.ts.map +1 -0
- package/dist/types/src/encodings/hex.d.ts +5 -0
- package/dist/types/src/encodings/hex.d.ts.map +1 -0
- package/dist/types/src/encodings/index.d.ts +3 -0
- package/dist/types/src/encodings/index.d.ts.map +1 -0
- package/dist/types/src/errors.d.ts +72 -0
- package/dist/types/src/errors.d.ts.map +1 -0
- package/dist/types/src/index.d.ts +138 -0
- package/dist/types/src/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf/Client.d.ts +95 -0
- package/dist/types/src/nanotdf/Client.d.ts.map +1 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts +25 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts +17 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts.map +1 -0
- package/dist/types/src/nanotdf/constants.d.ts +2 -0
- package/dist/types/src/nanotdf/constants.d.ts.map +1 -0
- package/dist/types/src/nanotdf/decrypt.d.ts +9 -0
- package/dist/types/src/nanotdf/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts +12 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt.d.ts +14 -0
- package/dist/types/src/nanotdf/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +10 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +12 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +5 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +7 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +20 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +9 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/index.d.ts +9 -0
- package/dist/types/src/nanotdf/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +17 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts +14 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts +21 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts +15 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Header.d.ts +73 -0
- package/dist/types/src/nanotdf/models/Header.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts +47 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +52 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +35 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +11 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +31 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +65 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts +33 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts +8 -0
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts +14 -0
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/digest.d.ts +3 -0
- package/dist/types/src/nanotdf-crypto/digest.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts +35 -0
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts +14 -0
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/enums.d.ts +42 -0
- package/dist/types/src/nanotdf-crypto/enums.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts +7 -0
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts +10 -0
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts +5 -0
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/importRawKey.d.ts +13 -0
- package/dist/types/src/nanotdf-crypto/importRawKey.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/index.d.ts +12 -0
- package/dist/types/src/nanotdf-crypto/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts +28 -0
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts +28 -0
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +1 -0
- package/dist/types/src/policy/api.d.ts +4 -0
- package/dist/types/src/policy/api.d.ts.map +1 -0
- package/dist/types/src/policy/attributes.d.ts +95 -0
- package/dist/types/src/policy/attributes.d.ts.map +1 -0
- package/dist/types/src/policy/granter.d.ts +23 -0
- package/dist/types/src/policy/granter.d.ts.map +1 -0
- package/dist/types/src/tdf/AttributeObject.d.ts +13 -0
- package/dist/types/src/tdf/AttributeObject.d.ts.map +1 -0
- package/dist/types/src/tdf/AttributeObjectJwt.d.ts +4 -0
- package/dist/types/src/tdf/AttributeObjectJwt.d.ts.map +1 -0
- package/dist/types/src/tdf/Crypto.d.ts +37 -0
- package/dist/types/src/tdf/Crypto.d.ts.map +1 -0
- package/dist/types/src/tdf/EntityObject.d.ts +18 -0
- package/dist/types/src/tdf/EntityObject.d.ts.map +1 -0
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +99 -0
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/tdf/Policy.d.ts +28 -0
- package/dist/types/src/tdf/Policy.d.ts.map +1 -0
- package/dist/types/src/tdf/PolicyObject.d.ts +11 -0
- package/dist/types/src/tdf/PolicyObject.d.ts.map +1 -0
- package/dist/types/src/tdf/TypedArray.d.ts +3 -0
- package/dist/types/src/tdf/TypedArray.d.ts.map +1 -0
- package/dist/types/src/tdf/index.d.ts +7 -0
- package/dist/types/src/tdf/index.d.ts.map +1 -0
- package/dist/types/src/types/index.d.ts +45 -0
- package/dist/types/src/types/index.d.ts.map +1 -0
- package/dist/types/src/utils.d.ts +45 -0
- package/dist/types/src/utils.d.ts.map +1 -0
- package/dist/types/src/version.d.ts +9 -0
- package/dist/types/src/version.d.ts.map +1 -0
- package/dist/types/tdf3/index.d.ts +16 -0
- package/dist/types/tdf3/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/assertions.d.ts +63 -0
- package/dist/types/tdf3/src/assertions.d.ts.map +1 -0
- package/dist/types/tdf3/src/binary.d.ts +38 -0
- package/dist/types/tdf3/src/binary.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts +18 -0
- package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/algorithms.d.ts +4 -0
- package/dist/types/tdf3/src/ciphers/algorithms.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/index.d.ts +3 -0
- package/dist/types/tdf3/src/ciphers/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts +14 -0
- package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts +53 -0
- package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/builders.d.ts +436 -0
- package/dist/types/tdf3/src/client/builders.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/index.d.ts +139 -0
- package/dist/types/tdf3/src/client/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/validation.d.ts +8 -0
- package/dist/types/tdf3/src/client/validation.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/crypto-utils.d.ts +34 -0
- package/dist/types/tdf3/src/crypto/crypto-utils.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/declarations.d.ts +60 -0
- package/dist/types/tdf3/src/crypto/declarations.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/index.d.ts +103 -0
- package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/index.d.ts +5 -0
- package/dist/types/tdf3/src/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/attribute-set.d.ts +65 -0
- package/dist/types/tdf3/src/models/attribute-set.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/encryption-information.d.ts +49 -0
- package/dist/types/tdf3/src/models/encryption-information.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/index.d.ts +9 -0
- package/dist/types/tdf3/src/models/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/key-access.d.ts +42 -0
- package/dist/types/tdf3/src/models/key-access.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/manifest.d.ts +9 -0
- package/dist/types/tdf3/src/models/manifest.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/payload.d.ts +7 -0
- package/dist/types/tdf3/src/models/payload.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/policy.d.ts +13 -0
- package/dist/types/tdf3/src/models/policy.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/upsert-response.d.ts +16 -0
- package/dist/types/tdf3/src/models/upsert-response.d.ts.map +1 -0
- package/dist/types/tdf3/src/tdf.d.ts +152 -0
- package/dist/types/tdf3/src/tdf.d.ts.map +1 -0
- package/dist/types/tdf3/src/templates/default.html.d.ts +8 -0
- package/dist/types/tdf3/src/templates/default.html.d.ts.map +1 -0
- package/dist/types/tdf3/src/templates/escaper.d.ts +6 -0
- package/dist/types/tdf3/src/templates/escaper.d.ts.map +1 -0
- package/dist/types/tdf3/src/templates/index.d.ts +3 -0
- package/dist/types/tdf3/src/templates/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/buffer-crc32.d.ts +2 -0
- package/dist/types/tdf3/src/utils/buffer-crc32.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/chunkers.d.ts +29 -0
- package/dist/types/tdf3/src/utils/chunkers.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/index.d.ts +36 -0
- package/dist/types/tdf3/src/utils/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/keysplit.d.ts +19 -0
- package/dist/types/tdf3/src/utils/keysplit.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/zip-reader.d.ts +63 -0
- package/dist/types/tdf3/src/utils/zip-reader.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/zip-writer.d.ts +35 -0
- package/dist/types/tdf3/src/utils/zip-writer.d.ts.map +1 -0
- package/dist/types/tdf3/src/version.d.ts +3 -0
- package/dist/types/tdf3/src/version.d.ts.map +1 -0
- package/dist/web/package.json +3 -0
- package/dist/web/src/access.js +147 -0
- package/dist/web/src/auth/Eas.js +55 -0
- package/dist/web/src/auth/auth.js +71 -0
- package/dist/web/src/auth/oidc-clientcredentials-provider.js +22 -0
- package/dist/web/src/auth/oidc-externaljwt-provider.js +29 -0
- package/dist/web/src/auth/oidc-refreshtoken-provider.js +30 -0
- package/dist/web/src/auth/oidc.js +215 -0
- package/dist/web/src/auth/providers.js +119 -0
- package/dist/web/src/encodings/base64.js +147 -0
- package/dist/web/src/encodings/hex.js +63 -0
- package/dist/web/src/encodings/index.js +3 -0
- package/dist/web/src/errors.js +123 -0
- package/dist/web/src/index.js +313 -0
- package/dist/web/src/nanotdf/Client.js +268 -0
- package/dist/web/src/nanotdf/NanoTDF.js +89 -0
- package/dist/web/src/nanotdf/browser-entry.js +14 -0
- package/dist/web/src/nanotdf/constants.js +2 -0
- package/dist/web/src/nanotdf/decrypt.js +14 -0
- package/dist/web/src/nanotdf/encrypt-dataset.js +32 -0
- package/dist/web/src/nanotdf/encrypt.js +126 -0
- package/dist/web/src/nanotdf/enum/CipherEnum.js +11 -0
- package/dist/web/src/nanotdf/enum/CurveNameEnum.js +13 -0
- package/dist/web/src/nanotdf/enum/EncodingEnum.js +6 -0
- package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +9 -0
- package/dist/web/src/nanotdf/enum/ProtocolEnum.js +8 -0
- package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +9 -0
- package/dist/web/src/nanotdf/helpers/calculateByCurve.js +24 -0
- package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +8 -0
- package/dist/web/src/nanotdf/index.js +11 -0
- package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +2 -0
- package/dist/web/src/nanotdf/models/Ciphers.js +54 -0
- package/dist/web/src/nanotdf/models/DefaultParams.js +22 -0
- package/dist/web/src/nanotdf/models/EcCurves.js +32 -0
- package/dist/web/src/nanotdf/models/Header.js +250 -0
- package/dist/web/src/nanotdf/models/Payload.js +156 -0
- package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +71 -0
- package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +77 -0
- package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +33 -0
- package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +57 -0
- package/dist/web/src/nanotdf/models/ResourceLocator.js +206 -0
- package/dist/web/src/nanotdf/models/Signature.js +74 -0
- package/dist/web/src/nanotdf-crypto/ciphers.js +14 -0
- package/dist/web/src/nanotdf-crypto/decrypt.js +21 -0
- package/dist/web/src/nanotdf-crypto/digest.js +4 -0
- package/dist/web/src/nanotdf-crypto/ecdsaSignature.js +77 -0
- package/dist/web/src/nanotdf-crypto/encrypt.js +21 -0
- package/dist/web/src/nanotdf-crypto/enums.js +49 -0
- package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +17 -0
- package/dist/web/src/nanotdf-crypto/generateKeyPair.js +10 -0
- package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +9 -0
- package/dist/web/src/nanotdf-crypto/importRawKey.js +15 -0
- package/dist/web/src/nanotdf-crypto/index.js +12 -0
- package/dist/web/src/nanotdf-crypto/keyAgreement.js +87 -0
- package/dist/web/src/nanotdf-crypto/pemPublicToCrypto.js +197 -0
- package/dist/web/src/policy/api.js +54 -0
- package/dist/web/src/policy/attributes.js +2 -0
- package/dist/web/src/policy/granter.js +141 -0
- package/dist/web/src/tdf/AttributeObject.js +11 -0
- package/dist/web/src/tdf/AttributeObjectJwt.js +2 -0
- package/dist/web/src/tdf/Crypto.js +44 -0
- package/dist/web/src/tdf/EntityObject.js +2 -0
- package/dist/web/src/tdf/NanoTDF/NanoTDF.js +35 -0
- package/dist/web/src/tdf/Policy.js +48 -0
- package/dist/web/src/tdf/PolicyObject.js +2 -0
- package/dist/web/src/tdf/TypedArray.js +2 -0
- package/dist/web/src/tdf/index.js +4 -0
- package/dist/web/src/types/index.js +2 -0
- package/dist/web/src/utils.js +133 -0
- package/dist/web/src/version.js +9 -0
- package/dist/web/tdf3/index.js +13 -0
- package/dist/web/tdf3/src/assertions.js +111 -0
- package/dist/web/tdf3/src/binary.js +149 -0
- package/dist/web/tdf3/src/ciphers/aes-gcm-cipher.js +52 -0
- package/dist/web/tdf3/src/ciphers/algorithms.js +5 -0
- package/dist/web/tdf3/src/ciphers/index.js +3 -0
- package/dist/web/tdf3/src/ciphers/symmetric-cipher-base.js +18 -0
- package/dist/web/tdf3/src/client/DecoratedReadableStream.js +107 -0
- package/dist/web/tdf3/src/client/builders.js +557 -0
- package/dist/web/tdf3/src/client/index.js +423 -0
- package/dist/web/tdf3/src/client/validation.js +58 -0
- package/dist/web/tdf3/src/crypto/crypto-utils.js +107 -0
- package/dist/web/tdf3/src/crypto/declarations.js +5 -0
- package/dist/web/tdf3/src/crypto/index.js +296 -0
- package/dist/web/tdf3/src/index.js +5 -0
- package/dist/web/tdf3/src/models/attribute-set.js +118 -0
- package/dist/web/tdf3/src/models/encryption-information.js +86 -0
- package/dist/web/tdf3/src/models/index.js +9 -0
- package/dist/web/tdf3/src/models/key-access.js +74 -0
- package/dist/web/tdf3/src/models/manifest.js +2 -0
- package/dist/web/tdf3/src/models/payload.js +2 -0
- package/dist/web/tdf3/src/models/policy.js +20 -0
- package/dist/web/tdf3/src/models/upsert-response.js +2 -0
- package/dist/web/tdf3/src/tdf.js +866 -0
- package/dist/web/tdf3/src/templates/default.html.js +96 -0
- package/dist/web/tdf3/src/templates/escaper.js +10 -0
- package/dist/web/tdf3/src/templates/index.js +3 -0
- package/dist/web/tdf3/src/utils/buffer-crc32.js +44 -0
- package/dist/web/tdf3/src/utils/chunkers.js +96 -0
- package/dist/web/tdf3/src/utils/index.js +248 -0
- package/dist/web/tdf3/src/utils/keysplit.js +55 -0
- package/dist/web/tdf3/src/utils/zip-reader.js +247 -0
- package/dist/web/tdf3/src/utils/zip-writer.js +302 -0
- package/dist/web/tdf3/src/version.js +3 -0
- package/package.json +126 -0
- package/src/access.ts +198 -0
- package/src/auth/Eas.ts +79 -0
- package/src/auth/auth.ts +141 -0
- package/src/auth/oidc-clientcredentials-provider.ts +32 -0
- package/src/auth/oidc-externaljwt-provider.ts +41 -0
- package/src/auth/oidc-refreshtoken-provider.ts +41 -0
- package/src/auth/oidc.ts +307 -0
- package/src/auth/providers.ts +139 -0
- package/src/encodings/base64.ts +160 -0
- package/src/encodings/hex.ts +69 -0
- package/src/encodings/index.ts +2 -0
- package/src/errors.ts +113 -0
- package/src/index.ts +441 -0
- package/src/nanotdf/Client.ts +349 -0
- package/src/nanotdf/NanoTDF.ts +121 -0
- package/src/nanotdf/browser-entry.ts +20 -0
- package/src/nanotdf/constants.ts +1 -0
- package/src/nanotdf/decrypt.ts +19 -0
- package/src/nanotdf/encrypt-dataset.ts +52 -0
- package/src/nanotdf/encrypt.ts +197 -0
- package/src/nanotdf/enum/CipherEnum.ts +10 -0
- package/src/nanotdf/enum/CurveNameEnum.ts +12 -0
- package/src/nanotdf/enum/EncodingEnum.ts +5 -0
- package/src/nanotdf/enum/PolicyTypeEnum.ts +8 -0
- package/src/nanotdf/enum/ProtocolEnum.ts +7 -0
- package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +8 -0
- package/src/nanotdf/helpers/calculateByCurve.ts +26 -0
- package/src/nanotdf/helpers/getHkdfSalt.ts +15 -0
- package/src/nanotdf/index.ts +10 -0
- package/src/nanotdf/interfaces/PolicyInterface.ts +27 -0
- package/src/nanotdf/models/Ciphers.ts +67 -0
- package/src/nanotdf/models/DefaultParams.ts +24 -0
- package/src/nanotdf/models/EcCurves.ts +40 -0
- package/src/nanotdf/models/Header.ts +322 -0
- package/src/nanotdf/models/Payload.ts +196 -0
- package/src/nanotdf/models/Policy/AbstractPolicy.ts +90 -0
- package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +101 -0
- package/src/nanotdf/models/Policy/PolicyFactory.ts +48 -0
- package/src/nanotdf/models/Policy/RemotePolicy.ts +74 -0
- package/src/nanotdf/models/ResourceLocator.ts +212 -0
- package/src/nanotdf/models/Signature.ts +85 -0
- package/src/nanotdf-crypto/ciphers.ts +13 -0
- package/src/nanotdf-crypto/decrypt.ts +30 -0
- package/src/nanotdf-crypto/digest.ts +8 -0
- package/src/nanotdf-crypto/ecdsaSignature.ts +109 -0
- package/src/nanotdf-crypto/encrypt.ts +30 -0
- package/src/nanotdf-crypto/enums.ts +47 -0
- package/src/nanotdf-crypto/exportCryptoKey.ts +17 -0
- package/src/nanotdf-crypto/generateKeyPair.ts +19 -0
- package/src/nanotdf-crypto/generateRandomNumber.ts +8 -0
- package/src/nanotdf-crypto/importRawKey.ts +19 -0
- package/src/nanotdf-crypto/index.ts +11 -0
- package/src/nanotdf-crypto/keyAgreement.ts +139 -0
- package/src/nanotdf-crypto/pemPublicToCrypto.ts +232 -0
- package/src/package-lock.json +6 -0
- package/src/package.json +3 -0
- package/src/platform/authorization/authorization_connect.d.ts +44 -0
- package/src/platform/authorization/authorization_connect.js +44 -0
- package/src/platform/authorization/authorization_pb.d.ts +707 -0
- package/src/platform/authorization/authorization_pb.js +372 -0
- package/src/platform/common/common_pb.d.ts +129 -0
- package/src/platform/common/common_pb.js +58 -0
- package/src/platform/entityresolution/entity_resolution_connect.d.ts +35 -0
- package/src/platform/entityresolution/entity_resolution_connect.js +35 -0
- package/src/platform/entityresolution/entity_resolution_pb.d.ts +242 -0
- package/src/platform/entityresolution/entity_resolution_pb.js +139 -0
- package/src/platform/kas/kas_connect.d.ts +59 -0
- package/src/platform/kas/kas_connect.js +59 -0
- package/src/platform/kas/kas_pb.d.ts +200 -0
- package/src/platform/kas/kas_pb.js +84 -0
- package/src/platform/policy/attributes/attributes_connect.d.ts +168 -0
- package/src/platform/policy/attributes/attributes_connect.js +168 -0
- package/src/platform/policy/attributes/attributes_pb.d.ts +929 -0
- package/src/platform/policy/attributes/attributes_pb.js +363 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_connect.d.ts +62 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_connect.js +62 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_pb.d.ts +283 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_pb.js +113 -0
- package/src/platform/policy/namespaces/namespaces_connect.d.ts +62 -0
- package/src/platform/policy/namespaces/namespaces_connect.js +62 -0
- package/src/platform/policy/namespaces/namespaces_pb.d.ts +270 -0
- package/src/platform/policy/namespaces/namespaces_pb.js +110 -0
- package/src/platform/policy/objects_pb.d.ts +725 -0
- package/src/platform/policy/objects_pb.js +288 -0
- package/src/platform/policy/resourcemapping/resource_mapping_connect.d.ts +259 -0
- package/src/platform/policy/resourcemapping/resource_mapping_connect.js +259 -0
- package/src/platform/policy/resourcemapping/resource_mapping_pb.d.ts +314 -0
- package/src/platform/policy/resourcemapping/resource_mapping_pb.js +142 -0
- package/src/platform/policy/selectors_pb.d.ts +269 -0
- package/src/platform/policy/selectors_pb.js +110 -0
- package/src/platform/policy/subjectmapping/subject_mapping_connect.d.ts +118 -0
- package/src/platform/policy/subjectmapping/subject_mapping_connect.js +118 -0
- package/src/platform/policy/subjectmapping/subject_mapping_pb.d.ts +672 -0
- package/src/platform/policy/subjectmapping/subject_mapping_pb.js +260 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_connect.d.ts +26 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_connect.js +26 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_pb.d.ts +75 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_pb.js +35 -0
- package/src/policy/api.ts +61 -0
- package/src/policy/attributes.ts +117 -0
- package/src/policy/granter.ts +181 -0
- package/src/tdf/AttributeObject.ts +27 -0
- package/src/tdf/AttributeObjectJwt.ts +3 -0
- package/src/tdf/Crypto.ts +42 -0
- package/src/tdf/EntityObject.ts +18 -0
- package/src/tdf/NanoTDF/NanoTDF.ts +120 -0
- package/src/tdf/Policy.ts +51 -0
- package/src/tdf/PolicyObject.ts +12 -0
- package/src/tdf/TypedArray.ts +12 -0
- package/src/tdf/index.ts +6 -0
- package/src/types/index.ts +55 -0
- package/src/utils.ts +149 -0
- package/src/version.ts +9 -0
- package/tdf3/index.ts +91 -0
- package/tdf3/package-lock.json +6 -0
- package/tdf3/package.json +3 -0
- package/tdf3/src/assertions.ts +191 -0
- package/tdf3/src/binary.ts +195 -0
- package/tdf3/src/ciphers/aes-gcm-cipher.ts +76 -0
- package/tdf3/src/ciphers/algorithms.ts +9 -0
- package/tdf3/src/ciphers/index.ts +2 -0
- package/tdf3/src/ciphers/symmetric-cipher-base.ts +38 -0
- package/tdf3/src/client/DecoratedReadableStream.ts +148 -0
- package/tdf3/src/client/builders.ts +701 -0
- package/tdf3/src/client/index.ts +637 -0
- package/tdf3/src/client/validation.ts +79 -0
- package/tdf3/src/crypto/crypto-utils.ts +119 -0
- package/tdf3/src/crypto/declarations.ts +89 -0
- package/tdf3/src/crypto/index.ts +394 -0
- package/tdf3/src/index.ts +4 -0
- package/tdf3/src/models/attribute-set.ts +142 -0
- package/tdf3/src/models/encryption-information.ts +172 -0
- package/tdf3/src/models/index.ts +8 -0
- package/tdf3/src/models/key-access.ts +128 -0
- package/tdf3/src/models/manifest.ts +9 -0
- package/tdf3/src/models/payload.ts +6 -0
- package/tdf3/src/models/policy.ts +35 -0
- package/tdf3/src/models/upsert-response.ts +17 -0
- package/tdf3/src/tdf.ts +1351 -0
- package/tdf3/src/templates/default.html.ts +105 -0
- package/tdf3/src/templates/escaper.ts +10 -0
- package/tdf3/src/templates/index.ts +2 -0
- package/tdf3/src/utils/buffer-crc32.ts +46 -0
- package/tdf3/src/utils/chunkers.ts +118 -0
- package/tdf3/src/utils/index.ts +309 -0
- package/tdf3/src/utils/keysplit.ts +63 -0
- package/tdf3/src/utils/zip-reader.ts +341 -0
- package/tdf3/src/utils/zip-writer.ts +375 -0
- package/tdf3/src/version.ts +2 -0
- package/tdf3/types.d.ts +14 -0
|
@@ -0,0 +1,907 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
+
if (mod && mod.__esModule) return mod;
|
|
20
|
+
var result = {};
|
|
21
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
+
__setModuleDefault(result, mod);
|
|
23
|
+
return result;
|
|
24
|
+
};
|
|
25
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
26
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
27
|
+
};
|
|
28
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
|
+
exports.readStream = exports.sliceAndDecrypt = exports.splitLookupTableFactory = exports.loadTDFStream = exports.writeStream = exports.upsert = exports.validatePolicyObject = exports.buildKeyAccess = exports.extractPemFromKeyString = exports.unwrapHtml = exports.wrapHtml = exports.fetchKasPublicKey = void 0;
|
|
30
|
+
const axios_1 = __importDefault(require("axios"));
|
|
31
|
+
const buffer_crc32_js_1 = require("./utils/buffer-crc32.js");
|
|
32
|
+
const jose_1 = require("jose");
|
|
33
|
+
const DecoratedReadableStream_js_1 = require("./client/DecoratedReadableStream.js");
|
|
34
|
+
const utils_js_1 = require("../../src/utils.js");
|
|
35
|
+
const assertions = __importStar(require("./assertions.js"));
|
|
36
|
+
const index_js_1 = require("./models/index.js");
|
|
37
|
+
const index_js_2 = require("../../src/encodings/index.js");
|
|
38
|
+
const index_js_3 = require("./utils/index.js");
|
|
39
|
+
const binary_js_1 = require("./binary.js");
|
|
40
|
+
const access_js_1 = require("../../src/access.js");
|
|
41
|
+
const errors_js_1 = require("../../src/errors.js");
|
|
42
|
+
const index_js_4 = require("./templates/index.js");
|
|
43
|
+
// configurable
|
|
44
|
+
// TODO: remove dependencies from ciphers so that we can open-source instead of relying on other Virtru libs
|
|
45
|
+
const index_js_5 = require("./ciphers/index.js");
|
|
46
|
+
const auth_js_1 = require("../../src/auth/auth.js");
|
|
47
|
+
// TODO: input validation on manifest JSON
|
|
48
|
+
const DEFAULT_SEGMENT_SIZE = 1024 * 1024;
|
|
49
|
+
/**
|
|
50
|
+
* If we have KAS url but not public key we can fetch it from KAS, fetching
|
|
51
|
+
* the value from `${kas}/kas_public_key`.
|
|
52
|
+
*/
|
|
53
|
+
async function fetchKasPublicKey(kas, algorithm) {
|
|
54
|
+
if (!kas) {
|
|
55
|
+
throw new errors_js_1.ConfigurationError('KAS definition not found');
|
|
56
|
+
}
|
|
57
|
+
// Logs insecure KAS. Secure is enforced in constructor
|
|
58
|
+
(0, utils_js_1.validateSecureUrl)(kas);
|
|
59
|
+
const infoStatic = { url: kas, algorithm: algorithm || 'rsa:2048' };
|
|
60
|
+
const params = {};
|
|
61
|
+
if (algorithm) {
|
|
62
|
+
params.algorithm = algorithm;
|
|
63
|
+
}
|
|
64
|
+
const v2Url = `${kas}/v2/kas_public_key`;
|
|
65
|
+
try {
|
|
66
|
+
const response = await axios_1.default.get(v2Url, {
|
|
67
|
+
params: {
|
|
68
|
+
...params,
|
|
69
|
+
v: '2',
|
|
70
|
+
},
|
|
71
|
+
});
|
|
72
|
+
const publicKey = typeof response.data === 'string'
|
|
73
|
+
? await extractPemFromKeyString(response.data)
|
|
74
|
+
: response.data.publicKey;
|
|
75
|
+
return {
|
|
76
|
+
publicKey,
|
|
77
|
+
key: (0, utils_js_1.pemToCryptoPublicKey)(publicKey),
|
|
78
|
+
...infoStatic,
|
|
79
|
+
...(typeof response.data !== 'string' && response.data.kid && { kid: response.data.kid }),
|
|
80
|
+
};
|
|
81
|
+
}
|
|
82
|
+
catch (cause) {
|
|
83
|
+
const status = cause?.response?.status;
|
|
84
|
+
switch (status) {
|
|
85
|
+
case 400:
|
|
86
|
+
case 404:
|
|
87
|
+
// KAS does not yet implement v2, maybe
|
|
88
|
+
break;
|
|
89
|
+
case 401:
|
|
90
|
+
throw new errors_js_1.UnauthenticatedError(`[${v2Url}] requires auth`, cause);
|
|
91
|
+
case 403:
|
|
92
|
+
throw new errors_js_1.PermissionDeniedError(`[${v2Url}] permission denied`, cause);
|
|
93
|
+
default:
|
|
94
|
+
if (status && status >= 400 && status < 500) {
|
|
95
|
+
throw new errors_js_1.ConfigurationError(`[${v2Url}] request error [${status}] [${cause.name}] [${cause.message}]`, cause);
|
|
96
|
+
}
|
|
97
|
+
throw new errors_js_1.NetworkError(`[${v2Url}] error [${status}] [${cause.name}] [${cause.message}]`, cause);
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
// Retry with v1 params
|
|
101
|
+
const v1Url = `${kas}/kas_public_key`;
|
|
102
|
+
try {
|
|
103
|
+
const response = await axios_1.default.get(v1Url, {
|
|
104
|
+
params,
|
|
105
|
+
});
|
|
106
|
+
const publicKey = typeof response.data === 'string'
|
|
107
|
+
? await extractPemFromKeyString(response.data)
|
|
108
|
+
: response.data.publicKey;
|
|
109
|
+
// future proof: allow v2 response even if not specified.
|
|
110
|
+
return {
|
|
111
|
+
publicKey,
|
|
112
|
+
key: (0, utils_js_1.pemToCryptoPublicKey)(publicKey),
|
|
113
|
+
...infoStatic,
|
|
114
|
+
...(typeof response.data !== 'string' && response.data.kid && { kid: response.data.kid }),
|
|
115
|
+
};
|
|
116
|
+
}
|
|
117
|
+
catch (cause) {
|
|
118
|
+
const status = cause?.response?.status;
|
|
119
|
+
switch (status) {
|
|
120
|
+
case 401:
|
|
121
|
+
throw new errors_js_1.UnauthenticatedError(`[${v1Url}] requires auth`, cause);
|
|
122
|
+
case 403:
|
|
123
|
+
throw new errors_js_1.PermissionDeniedError(`[${v1Url}] permission denied`, cause);
|
|
124
|
+
default:
|
|
125
|
+
if (status && status >= 400 && status < 500) {
|
|
126
|
+
throw new errors_js_1.ConfigurationError(`[${v2Url}] request error [${status}] [${cause.name}] [${cause.message}]`, cause);
|
|
127
|
+
}
|
|
128
|
+
throw new errors_js_1.NetworkError(`[${v1Url}] error [${status}] [${cause.name}] [${cause.message}]`, cause);
|
|
129
|
+
}
|
|
130
|
+
}
|
|
131
|
+
}
|
|
132
|
+
exports.fetchKasPublicKey = fetchKasPublicKey;
|
|
133
|
+
/**
|
|
134
|
+
*
|
|
135
|
+
* @param payload The TDF content to encode in HTML
|
|
136
|
+
* @param manifest A copy of the manifest
|
|
137
|
+
* @param transferUrl reader web-service start page
|
|
138
|
+
* @return utf-8 encoded HTML data
|
|
139
|
+
*/
|
|
140
|
+
function wrapHtml(payload, manifest, transferUrl) {
|
|
141
|
+
const { origin } = new URL(transferUrl);
|
|
142
|
+
const exportManifest = typeof manifest === 'string' ? manifest : JSON.stringify(manifest);
|
|
143
|
+
const fullHtmlString = (0, index_js_4.htmlWrapperTemplate)({
|
|
144
|
+
transferUrl,
|
|
145
|
+
transferBaseUrl: origin,
|
|
146
|
+
manifest: index_js_2.base64.encode(exportManifest),
|
|
147
|
+
payload: (0, index_js_3.buffToString)(payload, 'base64'),
|
|
148
|
+
});
|
|
149
|
+
return new TextEncoder().encode(fullHtmlString);
|
|
150
|
+
}
|
|
151
|
+
exports.wrapHtml = wrapHtml;
|
|
152
|
+
function unwrapHtml(htmlPayload) {
|
|
153
|
+
let html;
|
|
154
|
+
if (htmlPayload instanceof ArrayBuffer || ArrayBuffer.isView(htmlPayload)) {
|
|
155
|
+
html = new TextDecoder().decode(htmlPayload);
|
|
156
|
+
}
|
|
157
|
+
else {
|
|
158
|
+
html = htmlPayload.toString();
|
|
159
|
+
}
|
|
160
|
+
const payloadRe = /<input id=['"]?data-input['"]?[^>]*?value=['"]?([a-zA-Z0-9+/=]+)['"]?/;
|
|
161
|
+
const reResult = payloadRe.exec(html);
|
|
162
|
+
if (reResult === null) {
|
|
163
|
+
throw new errors_js_1.InvalidFileError('Payload is missing');
|
|
164
|
+
}
|
|
165
|
+
const base64Payload = reResult[1];
|
|
166
|
+
try {
|
|
167
|
+
return (0, index_js_3.base64ToBuffer)(base64Payload);
|
|
168
|
+
}
|
|
169
|
+
catch (e) {
|
|
170
|
+
throw new errors_js_1.InvalidFileError('There was a problem extracting the TDF3 payload', e);
|
|
171
|
+
}
|
|
172
|
+
}
|
|
173
|
+
exports.unwrapHtml = unwrapHtml;
|
|
174
|
+
async function extractPemFromKeyString(keyString) {
|
|
175
|
+
let pem = keyString;
|
|
176
|
+
// Skip the public key extraction if we find that the KAS url provides a
|
|
177
|
+
// PEM-encoded key instead of certificate
|
|
178
|
+
if (keyString.includes('CERTIFICATE')) {
|
|
179
|
+
const cert = await (0, jose_1.importX509)(keyString, 'RS256', { extractable: true });
|
|
180
|
+
pem = await (0, jose_1.exportSPKI)(cert);
|
|
181
|
+
}
|
|
182
|
+
return pem;
|
|
183
|
+
}
|
|
184
|
+
exports.extractPemFromKeyString = extractPemFromKeyString;
|
|
185
|
+
/**
|
|
186
|
+
* Build a key access object and add it to the list. Can specify either
|
|
187
|
+
* a (url, publicKey) pair (legacy, deprecated) or an attribute URL (future).
|
|
188
|
+
* If all are missing then it attempts to use the default attribute. If that
|
|
189
|
+
* is missing it throws an error.
|
|
190
|
+
* @param {Object} options
|
|
191
|
+
* @param {String} options.type - enum representing how the object key is treated
|
|
192
|
+
* @param {String} options.attributeUrl - URL of the attribute to use for pubKey and kasUrl. Omit to use default.
|
|
193
|
+
* @param {String} options.url - directly set the KAS URL
|
|
194
|
+
* @param {String} options.publicKey - directly set the (KAS) public key
|
|
195
|
+
* @param {String?} options.kid - Key identifier of KAS public key
|
|
196
|
+
* @param {String? Object?} options.metadata - Metadata. Appears to be dead code.
|
|
197
|
+
* @return {KeyAccess}- the key access object loaded
|
|
198
|
+
*/
|
|
199
|
+
async function buildKeyAccess({ attributeSet, type, url, publicKey, kid, attributeUrl, metadata, sid = '', }) {
|
|
200
|
+
/** Internal function to keep it DRY */
|
|
201
|
+
function createKeyAccess(type, kasUrl, kasKeyIdentifier, pubKey, metadata) {
|
|
202
|
+
switch (type) {
|
|
203
|
+
case 'wrapped':
|
|
204
|
+
return new index_js_1.Wrapped(kasUrl, kasKeyIdentifier, pubKey, metadata, sid);
|
|
205
|
+
case 'remote':
|
|
206
|
+
return new index_js_1.Remote(kasUrl, kasKeyIdentifier, pubKey, metadata, sid);
|
|
207
|
+
default:
|
|
208
|
+
throw new errors_js_1.ConfigurationError(`buildKeyAccess: Key access type ${type} is unknown`);
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
// If an attributeUrl is provided try to load with that first.
|
|
212
|
+
if (attributeUrl && attributeSet) {
|
|
213
|
+
const attr = attributeSet.get(attributeUrl);
|
|
214
|
+
if (attr && attr.kasUrl && attr.pubKey) {
|
|
215
|
+
return createKeyAccess(type, attr.kasUrl, attr.kid, attr.pubKey, metadata);
|
|
216
|
+
}
|
|
217
|
+
}
|
|
218
|
+
// if url and pulicKey are specified load the key access object with them
|
|
219
|
+
if (url && publicKey) {
|
|
220
|
+
return createKeyAccess(type, url, kid, await extractPemFromKeyString(publicKey), metadata);
|
|
221
|
+
}
|
|
222
|
+
// Assume the default attribute is the source for kasUrl and pubKey
|
|
223
|
+
const defaultAttr = attributeSet?.getDefault();
|
|
224
|
+
if (defaultAttr) {
|
|
225
|
+
const { pubKey, kasUrl } = defaultAttr;
|
|
226
|
+
if (pubKey && kasUrl) {
|
|
227
|
+
return createKeyAccess(type, kasUrl, kid, await extractPemFromKeyString(pubKey), metadata);
|
|
228
|
+
}
|
|
229
|
+
}
|
|
230
|
+
// All failed. Raise an error.
|
|
231
|
+
throw new errors_js_1.ConfigurationError('TDF.buildKeyAccess: No source for kasUrl or pubKey');
|
|
232
|
+
}
|
|
233
|
+
exports.buildKeyAccess = buildKeyAccess;
|
|
234
|
+
function validatePolicyObject(policy) {
|
|
235
|
+
const missingFields = [];
|
|
236
|
+
if (!policy.uuid)
|
|
237
|
+
missingFields.push('uuid');
|
|
238
|
+
if (!policy.body)
|
|
239
|
+
missingFields.push('body', 'body.dissem');
|
|
240
|
+
if (policy.body && !policy.body.dissem)
|
|
241
|
+
missingFields.push('body.dissem');
|
|
242
|
+
if (missingFields.length) {
|
|
243
|
+
throw new errors_js_1.ConfigurationError(`The given policy object requires the following properties: ${missingFields}`);
|
|
244
|
+
}
|
|
245
|
+
}
|
|
246
|
+
exports.validatePolicyObject = validatePolicyObject;
|
|
247
|
+
async function _generateManifest(keyInfo, encryptionInformation, policy, mimeType) {
|
|
248
|
+
// (maybe) Fields are quoted to avoid renaming
|
|
249
|
+
const payload = {
|
|
250
|
+
type: 'reference',
|
|
251
|
+
url: '0.payload',
|
|
252
|
+
protocol: 'zip',
|
|
253
|
+
isEncrypted: true,
|
|
254
|
+
schemaVersion: '3.0.0',
|
|
255
|
+
...(mimeType && { mimeType }),
|
|
256
|
+
};
|
|
257
|
+
const encryptionInformationStr = await encryptionInformation.write(policy, keyInfo);
|
|
258
|
+
const assertions = [];
|
|
259
|
+
return {
|
|
260
|
+
payload,
|
|
261
|
+
// generate the manifest first, then insert integrity information into it
|
|
262
|
+
encryptionInformation: encryptionInformationStr,
|
|
263
|
+
assertions: assertions,
|
|
264
|
+
};
|
|
265
|
+
}
|
|
266
|
+
async function getSignature(unwrappedKeyBinary, payloadBinary, algorithmType, cryptoService) {
|
|
267
|
+
switch (algorithmType.toUpperCase()) {
|
|
268
|
+
case 'GMAC':
|
|
269
|
+
// use the auth tag baked into the encrypted payload
|
|
270
|
+
return (0, index_js_3.buffToString)(Uint8Array.from(payloadBinary.asByteArray()).slice(-16), 'hex');
|
|
271
|
+
case 'HS256':
|
|
272
|
+
// simple hmac is the default
|
|
273
|
+
return await cryptoService.hmac((0, index_js_3.buffToString)(new Uint8Array(unwrappedKeyBinary.asArrayBuffer()), 'hex'), (0, index_js_3.buffToString)(new Uint8Array(payloadBinary.asArrayBuffer()), 'utf-8'));
|
|
274
|
+
default:
|
|
275
|
+
throw new errors_js_1.ConfigurationError(`Unsupported signature alg [${algorithmType}]`);
|
|
276
|
+
}
|
|
277
|
+
}
|
|
278
|
+
function buildRequest(method, url, body) {
|
|
279
|
+
return {
|
|
280
|
+
headers: {},
|
|
281
|
+
method: method,
|
|
282
|
+
url: url,
|
|
283
|
+
body,
|
|
284
|
+
};
|
|
285
|
+
}
|
|
286
|
+
async function upsert({ allowedKases, allowList, authProvider, entity, privateKey, unsavedManifest, ignoreType, }) {
|
|
287
|
+
const allowed = (() => {
|
|
288
|
+
if (allowList) {
|
|
289
|
+
return allowList;
|
|
290
|
+
}
|
|
291
|
+
if (!allowedKases) {
|
|
292
|
+
throw new errors_js_1.ConfigurationError('Upsert cannot be done without allowlist');
|
|
293
|
+
}
|
|
294
|
+
return new access_js_1.OriginAllowList(allowedKases);
|
|
295
|
+
})();
|
|
296
|
+
const { keyAccess, policy } = unsavedManifest.encryptionInformation;
|
|
297
|
+
const isAppIdProvider = authProvider && (0, index_js_3.isAppIdProviderCheck)(authProvider);
|
|
298
|
+
if (authProvider === undefined) {
|
|
299
|
+
throw new errors_js_1.ConfigurationError('Upsert cannot be done without auth provider');
|
|
300
|
+
}
|
|
301
|
+
return Promise.all(keyAccess.map(async (keyAccessObject) => {
|
|
302
|
+
// We only care about remote key access objects for the policy sync portion
|
|
303
|
+
const isRemote = (0, index_js_1.isRemote)(keyAccessObject);
|
|
304
|
+
if (!ignoreType && !isRemote) {
|
|
305
|
+
return;
|
|
306
|
+
}
|
|
307
|
+
if (!allowed.allows(keyAccessObject.url)) {
|
|
308
|
+
throw new errors_js_1.UnsafeUrlError(`Unexpected KAS url: [${keyAccessObject.url}]`);
|
|
309
|
+
}
|
|
310
|
+
const url = `${keyAccessObject.url}/${isAppIdProvider ? '' : 'v2/'}upsert`;
|
|
311
|
+
//TODO I dont' think we need a body at all for KAS requests
|
|
312
|
+
// Do we need ANY of this if it's already embedded in the EO in the Bearer OIDC token?
|
|
313
|
+
const body = {
|
|
314
|
+
keyAccess: keyAccessObject,
|
|
315
|
+
policy: unsavedManifest.encryptionInformation.policy,
|
|
316
|
+
entity: (0, index_js_3.isAppIdProviderCheck)(authProvider) ? entity : undefined,
|
|
317
|
+
authToken: undefined,
|
|
318
|
+
clientPayloadSignature: undefined,
|
|
319
|
+
};
|
|
320
|
+
if ((0, index_js_3.isAppIdProviderCheck)(authProvider)) {
|
|
321
|
+
body.authToken = await (0, auth_js_1.reqSignature)({}, privateKey);
|
|
322
|
+
}
|
|
323
|
+
else {
|
|
324
|
+
body.clientPayloadSignature = await (0, auth_js_1.reqSignature)(body, privateKey);
|
|
325
|
+
}
|
|
326
|
+
const httpReq = await authProvider.withCreds(buildRequest('POST', url, body));
|
|
327
|
+
try {
|
|
328
|
+
const response = await axios_1.default.post(httpReq.url, httpReq.body, {
|
|
329
|
+
headers: httpReq.headers,
|
|
330
|
+
});
|
|
331
|
+
// Remove additional properties which were needed to sync, but not that we want to save to
|
|
332
|
+
// the manifest
|
|
333
|
+
delete keyAccessObject.wrappedKey;
|
|
334
|
+
delete keyAccessObject.encryptedMetadata;
|
|
335
|
+
delete keyAccessObject.policyBinding;
|
|
336
|
+
if (isRemote) {
|
|
337
|
+
// Decode the policy and extract only the required info to save -- the uuid
|
|
338
|
+
const decodedPolicy = JSON.parse(index_js_2.base64.decode(policy));
|
|
339
|
+
unsavedManifest.encryptionInformation.policy = index_js_2.base64.encode(JSON.stringify({ uuid: decodedPolicy.uuid }));
|
|
340
|
+
}
|
|
341
|
+
return response.data;
|
|
342
|
+
}
|
|
343
|
+
catch (e) {
|
|
344
|
+
if (e.response) {
|
|
345
|
+
if (e.response.status >= 500) {
|
|
346
|
+
throw new errors_js_1.ServiceError('upsert failure', e);
|
|
347
|
+
}
|
|
348
|
+
else if (e.response.status === 403) {
|
|
349
|
+
throw new errors_js_1.PermissionDeniedError('upsert failure', e);
|
|
350
|
+
}
|
|
351
|
+
else if (e.response.status === 401) {
|
|
352
|
+
throw new errors_js_1.UnauthenticatedError('upsert auth failure', e);
|
|
353
|
+
}
|
|
354
|
+
else if (e.response.status === 400) {
|
|
355
|
+
throw new errors_js_1.ConfigurationError('upsert bad request; likely a configuration error', e);
|
|
356
|
+
}
|
|
357
|
+
else {
|
|
358
|
+
throw new errors_js_1.NetworkError('upsert server error', e);
|
|
359
|
+
}
|
|
360
|
+
}
|
|
361
|
+
else if (e.request) {
|
|
362
|
+
throw new errors_js_1.NetworkError('upsert request failure', e);
|
|
363
|
+
}
|
|
364
|
+
throw new errors_js_1.TdfError(`Unable to perform upsert operation on the KAS: [${e.name}: ${e.message}], response: [${e?.response?.body}]`, e);
|
|
365
|
+
}
|
|
366
|
+
}));
|
|
367
|
+
}
|
|
368
|
+
exports.upsert = upsert;
|
|
369
|
+
async function writeStream(cfg) {
|
|
370
|
+
if (!cfg.authProvider) {
|
|
371
|
+
throw new errors_js_1.ConfigurationError('No authorization middleware defined');
|
|
372
|
+
}
|
|
373
|
+
if (!cfg.contentStream) {
|
|
374
|
+
throw new errors_js_1.ConfigurationError('No input stream defined');
|
|
375
|
+
}
|
|
376
|
+
// eslint-disable-next-line @typescript-eslint/no-this-alias
|
|
377
|
+
const segmentInfos = [];
|
|
378
|
+
cfg.byteLimit ??= Number.MAX_SAFE_INTEGER;
|
|
379
|
+
const entryInfos = [
|
|
380
|
+
{
|
|
381
|
+
filename: '0.payload',
|
|
382
|
+
},
|
|
383
|
+
{
|
|
384
|
+
filename: '0.manifest.json',
|
|
385
|
+
},
|
|
386
|
+
];
|
|
387
|
+
let currentBuffer = new Uint8Array();
|
|
388
|
+
let totalByteCount = 0;
|
|
389
|
+
let bytesProcessed = 0;
|
|
390
|
+
let crcCounter = 0;
|
|
391
|
+
let fileByteCount = 0;
|
|
392
|
+
let aggregateHash = '';
|
|
393
|
+
const zipWriter = new index_js_3.ZipWriter();
|
|
394
|
+
const manifest = await _generateManifest(cfg.keyForManifest, cfg.encryptionInformation, cfg.policy, cfg.mimeType);
|
|
395
|
+
if (!manifest) {
|
|
396
|
+
// Set in encrypt; should never be reached.
|
|
397
|
+
throw new errors_js_1.ConfigurationError('internal: please use "loadTDFStream" first to load a manifest.');
|
|
398
|
+
}
|
|
399
|
+
const pkKeyLike = cfg.dpopKeys.privateKey;
|
|
400
|
+
// For all remote key access objects, sync its policy
|
|
401
|
+
const upsertResponse = await upsert({
|
|
402
|
+
allowedKases: cfg.allowList ? undefined : cfg.allowedKases,
|
|
403
|
+
allowList: cfg.allowList,
|
|
404
|
+
authProvider: cfg.authProvider,
|
|
405
|
+
entity: cfg.entity,
|
|
406
|
+
privateKey: pkKeyLike,
|
|
407
|
+
unsavedManifest: manifest,
|
|
408
|
+
});
|
|
409
|
+
// determine default segment size by writing empty buffer
|
|
410
|
+
const { segmentSizeDefault } = cfg;
|
|
411
|
+
const encryptedBlargh = await cfg.encryptionInformation.encrypt(binary_js_1.Binary.fromArrayBuffer(new ArrayBuffer(segmentSizeDefault)), cfg.keyForEncryption.unwrappedKeyBinary);
|
|
412
|
+
const payloadBuffer = new Uint8Array(encryptedBlargh.payload.asByteArray());
|
|
413
|
+
const encryptedSegmentSizeDefault = payloadBuffer.length;
|
|
414
|
+
// start writing the content
|
|
415
|
+
entryInfos[0].filename = '0.payload';
|
|
416
|
+
entryInfos[0].offset = totalByteCount;
|
|
417
|
+
const sourceReader = cfg.contentStream.getReader();
|
|
418
|
+
/*
|
|
419
|
+
TODO: Code duplication should be addressed
|
|
420
|
+
- RCA operations require that the write stream has already finished executing it's .on('end') handler before being returned,
|
|
421
|
+
thus both handlers are wrapped in a encompassing promise when we have an RCA source. We should investigate
|
|
422
|
+
if this causes O(n) promises to be loaded into memory.
|
|
423
|
+
- LFS operations can have the write stream returned immediately after both .on('end') and .on('data') handlers
|
|
424
|
+
have been defined, thus not requiring the handlers to be wrapped in a promise.
|
|
425
|
+
*/
|
|
426
|
+
const underlingSource = {
|
|
427
|
+
start: (controller) => {
|
|
428
|
+
controller.enqueue(getHeader(entryInfos[0].filename));
|
|
429
|
+
_countChunk(getHeader(entryInfos[0].filename));
|
|
430
|
+
crcCounter = 0;
|
|
431
|
+
fileByteCount = 0;
|
|
432
|
+
},
|
|
433
|
+
pull: async (controller) => {
|
|
434
|
+
let isDone;
|
|
435
|
+
while (currentBuffer.length < segmentSizeDefault && !isDone) {
|
|
436
|
+
const { value, done } = await sourceReader.read();
|
|
437
|
+
isDone = done;
|
|
438
|
+
if (value) {
|
|
439
|
+
currentBuffer = (0, index_js_3.concatUint8)([currentBuffer, value]);
|
|
440
|
+
}
|
|
441
|
+
}
|
|
442
|
+
while (currentBuffer.length >= segmentSizeDefault &&
|
|
443
|
+
!!controller.desiredSize &&
|
|
444
|
+
controller.desiredSize > 0) {
|
|
445
|
+
const segment = currentBuffer.slice(0, segmentSizeDefault);
|
|
446
|
+
const encryptedSegment = await _encryptAndCountSegment(segment);
|
|
447
|
+
controller.enqueue(encryptedSegment);
|
|
448
|
+
currentBuffer = currentBuffer.slice(segmentSizeDefault);
|
|
449
|
+
}
|
|
450
|
+
const isFinalChunkLeft = isDone && currentBuffer.length;
|
|
451
|
+
if (isFinalChunkLeft) {
|
|
452
|
+
const encryptedSegment = await _encryptAndCountSegment(currentBuffer);
|
|
453
|
+
controller.enqueue(encryptedSegment);
|
|
454
|
+
currentBuffer = new Uint8Array();
|
|
455
|
+
}
|
|
456
|
+
if (isDone && currentBuffer.length === 0) {
|
|
457
|
+
entryInfos[0].crcCounter = crcCounter;
|
|
458
|
+
entryInfos[0].fileByteCount = fileByteCount;
|
|
459
|
+
const payloadDataDescriptor = zipWriter.writeDataDescriptor(crcCounter, fileByteCount);
|
|
460
|
+
controller.enqueue(payloadDataDescriptor);
|
|
461
|
+
_countChunk(payloadDataDescriptor);
|
|
462
|
+
// prepare the manifest
|
|
463
|
+
entryInfos[1].filename = '0.manifest.json';
|
|
464
|
+
entryInfos[1].offset = totalByteCount;
|
|
465
|
+
controller.enqueue(getHeader(entryInfos[1].filename));
|
|
466
|
+
_countChunk(getHeader(entryInfos[1].filename));
|
|
467
|
+
crcCounter = 0;
|
|
468
|
+
fileByteCount = 0;
|
|
469
|
+
// hash the concat of all hashes
|
|
470
|
+
const payloadSigStr = await getSignature(cfg.keyForEncryption.unwrappedKeyBinary, binary_js_1.Binary.fromString(aggregateHash), cfg.integrityAlgorithm, cfg.cryptoService);
|
|
471
|
+
manifest.encryptionInformation.integrityInformation.rootSignature.sig =
|
|
472
|
+
index_js_2.base64.encode(payloadSigStr);
|
|
473
|
+
manifest.encryptionInformation.integrityInformation.rootSignature.alg =
|
|
474
|
+
cfg.integrityAlgorithm;
|
|
475
|
+
manifest.encryptionInformation.integrityInformation.segmentSizeDefault = segmentSizeDefault;
|
|
476
|
+
manifest.encryptionInformation.integrityInformation.encryptedSegmentSizeDefault =
|
|
477
|
+
encryptedSegmentSizeDefault;
|
|
478
|
+
manifest.encryptionInformation.integrityInformation.segmentHashAlg =
|
|
479
|
+
cfg.segmentIntegrityAlgorithm;
|
|
480
|
+
manifest.encryptionInformation.integrityInformation.segments = segmentInfos;
|
|
481
|
+
manifest.encryptionInformation.method.isStreamable = true;
|
|
482
|
+
const signedAssertions = [];
|
|
483
|
+
if (cfg.assertionConfigs && cfg.assertionConfigs.length > 0) {
|
|
484
|
+
await Promise.all(cfg.assertionConfigs.map(async (assertionConfig) => {
|
|
485
|
+
// Create assertion using the assertionConfig values
|
|
486
|
+
const signingKey = assertionConfig.signingKey ?? {
|
|
487
|
+
alg: 'HS256',
|
|
488
|
+
key: new Uint8Array(cfg.keyForEncryption.unwrappedKeyBinary.asArrayBuffer()),
|
|
489
|
+
};
|
|
490
|
+
const assertion = await assertions.CreateAssertion(aggregateHash, {
|
|
491
|
+
...assertionConfig,
|
|
492
|
+
signingKey,
|
|
493
|
+
});
|
|
494
|
+
// Add signed assertion to the signedAssertions array
|
|
495
|
+
signedAssertions.push(assertion);
|
|
496
|
+
}));
|
|
497
|
+
}
|
|
498
|
+
manifest.assertions = signedAssertions;
|
|
499
|
+
// write the manifest
|
|
500
|
+
const manifestBuffer = new TextEncoder().encode(JSON.stringify(manifest));
|
|
501
|
+
controller.enqueue(manifestBuffer);
|
|
502
|
+
_countChunk(manifestBuffer);
|
|
503
|
+
entryInfos[1].crcCounter = crcCounter;
|
|
504
|
+
entryInfos[1].fileByteCount = fileByteCount;
|
|
505
|
+
const manifestDataDescriptor = zipWriter.writeDataDescriptor(crcCounter, fileByteCount);
|
|
506
|
+
controller.enqueue(manifestDataDescriptor);
|
|
507
|
+
_countChunk(manifestDataDescriptor);
|
|
508
|
+
// write the central directory out
|
|
509
|
+
const centralDirectoryByteCount = totalByteCount;
|
|
510
|
+
for (let i = 0; i < entryInfos.length; i++) {
|
|
511
|
+
const entryInfo = entryInfos[i];
|
|
512
|
+
const result = zipWriter.writeCentralDirectoryRecord(entryInfo.fileByteCount || 0, entryInfo.filename, entryInfo.offset || 0, entryInfo.crcCounter || 0, 2175008768);
|
|
513
|
+
controller.enqueue(result);
|
|
514
|
+
_countChunk(result);
|
|
515
|
+
}
|
|
516
|
+
const endOfCentralDirectoryByteCount = totalByteCount - centralDirectoryByteCount;
|
|
517
|
+
const finalChunk = zipWriter.writeEndOfCentralDirectoryRecord(entryInfos.length, endOfCentralDirectoryByteCount, centralDirectoryByteCount);
|
|
518
|
+
controller.enqueue(finalChunk);
|
|
519
|
+
_countChunk(finalChunk);
|
|
520
|
+
controller.close();
|
|
521
|
+
}
|
|
522
|
+
},
|
|
523
|
+
};
|
|
524
|
+
const plaintextStream = new DecoratedReadableStream_js_1.DecoratedReadableStream(underlingSource);
|
|
525
|
+
plaintextStream.manifest = manifest;
|
|
526
|
+
if (upsertResponse) {
|
|
527
|
+
plaintextStream.upsertResponse = upsertResponse;
|
|
528
|
+
plaintextStream.tdfSize = totalByteCount;
|
|
529
|
+
plaintextStream.algorithm = manifest.encryptionInformation.method.algorithm;
|
|
530
|
+
}
|
|
531
|
+
return plaintextStream;
|
|
532
|
+
// nested helper fn's
|
|
533
|
+
function getHeader(filename) {
|
|
534
|
+
return zipWriter.getLocalFileHeader(filename, 0, 0, 0);
|
|
535
|
+
}
|
|
536
|
+
function _countChunk(chunk) {
|
|
537
|
+
if (typeof chunk === 'string') {
|
|
538
|
+
chunk = new TextEncoder().encode(chunk);
|
|
539
|
+
}
|
|
540
|
+
totalByteCount += chunk.length;
|
|
541
|
+
if (totalByteCount > cfg.byteLimit) {
|
|
542
|
+
throw new errors_js_1.ConfigurationError(`Safe byte limit (${cfg.byteLimit}) exceeded`);
|
|
543
|
+
}
|
|
544
|
+
//new Uint8Array(chunk.buffer, chunk.byteOffset, chunk.byteLength);
|
|
545
|
+
crcCounter = (0, buffer_crc32_js_1.unsigned)(chunk, crcCounter);
|
|
546
|
+
fileByteCount += chunk.length;
|
|
547
|
+
}
|
|
548
|
+
async function _encryptAndCountSegment(chunk) {
|
|
549
|
+
bytesProcessed += chunk.length;
|
|
550
|
+
cfg.progressHandler?.(bytesProcessed);
|
|
551
|
+
// Don't pass in an IV here. The encrypt function will generate one for you, ensuring that each segment has a unique IV.
|
|
552
|
+
const encryptedResult = await cfg.encryptionInformation.encrypt(binary_js_1.Binary.fromArrayBuffer(chunk.buffer), cfg.keyForEncryption.unwrappedKeyBinary);
|
|
553
|
+
const payloadBuffer = new Uint8Array(encryptedResult.payload.asByteArray());
|
|
554
|
+
const payloadSigStr = await getSignature(cfg.keyForEncryption.unwrappedKeyBinary, encryptedResult.payload, cfg.segmentIntegrityAlgorithm, cfg.cryptoService);
|
|
555
|
+
// combined string of all hashes for root signature
|
|
556
|
+
aggregateHash += payloadSigStr;
|
|
557
|
+
segmentInfos.push({
|
|
558
|
+
hash: index_js_2.base64.encode(payloadSigStr),
|
|
559
|
+
segmentSize: chunk.length === segmentSizeDefault ? undefined : chunk.length,
|
|
560
|
+
encryptedSegmentSize: payloadBuffer.length === encryptedSegmentSizeDefault ? undefined : payloadBuffer.length,
|
|
561
|
+
});
|
|
562
|
+
const result = new Uint8Array(encryptedResult.payload.asByteArray());
|
|
563
|
+
_countChunk(result);
|
|
564
|
+
return result;
|
|
565
|
+
}
|
|
566
|
+
}
|
|
567
|
+
exports.writeStream = writeStream;
|
|
568
|
+
// load the TDF as a stream in memory, for further use in reading and key syncing
|
|
569
|
+
async function loadTDFStream(chunker) {
|
|
570
|
+
const zipReader = new index_js_3.ZipReader(chunker);
|
|
571
|
+
const centralDirectory = await zipReader.getCentralDirectory();
|
|
572
|
+
const manifest = await zipReader.getManifest(centralDirectory, '0.manifest.json');
|
|
573
|
+
return { manifest, zipReader, centralDirectory };
|
|
574
|
+
}
|
|
575
|
+
exports.loadTDFStream = loadTDFStream;
|
|
576
|
+
function splitLookupTableFactory(keyAccess, allowedKases) {
|
|
577
|
+
const allowed = (k) => allowedKases.allows(k.url);
|
|
578
|
+
const splitIds = new Set(keyAccess.map(({ sid }) => sid ?? ''));
|
|
579
|
+
const accessibleSplits = new Set(keyAccess.filter(allowed).map(({ sid }) => sid));
|
|
580
|
+
if (splitIds.size > accessibleSplits.size) {
|
|
581
|
+
const disallowedKases = new Set(keyAccess.filter((k) => !allowed(k)).map(({ url }) => url));
|
|
582
|
+
throw new errors_js_1.UnsafeUrlError(`Unreconstructable key - disallowed KASes include: ${JSON.stringify([
|
|
583
|
+
...disallowedKases,
|
|
584
|
+
])} from splitIds ${JSON.stringify([...splitIds])}`, ...disallowedKases);
|
|
585
|
+
}
|
|
586
|
+
const splitPotentials = Object.fromEntries([...splitIds].map((s) => [s, {}]));
|
|
587
|
+
for (const kao of keyAccess) {
|
|
588
|
+
const disjunction = splitPotentials[kao.sid ?? ''];
|
|
589
|
+
if (kao.url in disjunction) {
|
|
590
|
+
throw new errors_js_1.InvalidFileError(`TODO: Fallback to no split ids. Repetition found for [${kao.url}] on split [${kao.sid}]`);
|
|
591
|
+
}
|
|
592
|
+
if (allowed(kao)) {
|
|
593
|
+
disjunction[kao.url] = kao;
|
|
594
|
+
}
|
|
595
|
+
}
|
|
596
|
+
return splitPotentials;
|
|
597
|
+
}
|
|
598
|
+
exports.splitLookupTableFactory = splitLookupTableFactory;
|
|
599
|
+
async function unwrapKey({ manifest, allowedKases, authProvider, dpopKeys, entity, cryptoService, }) {
|
|
600
|
+
if (authProvider === undefined) {
|
|
601
|
+
throw new errors_js_1.ConfigurationError('upsert requires auth provider; must be configured in client constructor');
|
|
602
|
+
}
|
|
603
|
+
const { keyAccess } = manifest.encryptionInformation;
|
|
604
|
+
const splitPotentials = splitLookupTableFactory(keyAccess, allowedKases);
|
|
605
|
+
const isAppIdProvider = authProvider && (0, index_js_3.isAppIdProviderCheck)(authProvider);
|
|
606
|
+
async function tryKasRewrap(keySplitInfo) {
|
|
607
|
+
const url = `${keySplitInfo.url}/${isAppIdProvider ? '' : 'v2/'}rewrap`;
|
|
608
|
+
const ephemeralEncryptionKeys = await cryptoService.cryptoToPemPair(await cryptoService.generateKeyPair());
|
|
609
|
+
const clientPublicKey = ephemeralEncryptionKeys.publicKey;
|
|
610
|
+
const requestBodyStr = JSON.stringify({
|
|
611
|
+
algorithm: 'RS256',
|
|
612
|
+
keyAccess: keySplitInfo,
|
|
613
|
+
policy: manifest.encryptionInformation.policy,
|
|
614
|
+
clientPublicKey,
|
|
615
|
+
});
|
|
616
|
+
const jwtPayload = { requestBody: requestBodyStr };
|
|
617
|
+
const signedRequestToken = await (0, auth_js_1.reqSignature)(isAppIdProvider ? {} : jwtPayload, dpopKeys.privateKey);
|
|
618
|
+
let requestBody;
|
|
619
|
+
if (isAppIdProvider) {
|
|
620
|
+
requestBody = {
|
|
621
|
+
keyAccess: keySplitInfo,
|
|
622
|
+
policy: manifest.encryptionInformation.policy,
|
|
623
|
+
entity: {
|
|
624
|
+
...entity,
|
|
625
|
+
publicKey: clientPublicKey,
|
|
626
|
+
},
|
|
627
|
+
authToken: signedRequestToken,
|
|
628
|
+
};
|
|
629
|
+
}
|
|
630
|
+
else {
|
|
631
|
+
requestBody = {
|
|
632
|
+
signedRequestToken,
|
|
633
|
+
};
|
|
634
|
+
}
|
|
635
|
+
const httpReq = await authProvider.withCreds(buildRequest('POST', url, requestBody));
|
|
636
|
+
const { data: { entityWrappedKey, metadata }, } = await axios_1.default.post(httpReq.url, httpReq.body, { headers: httpReq.headers });
|
|
637
|
+
const key = binary_js_1.Binary.fromString(index_js_2.base64.decode(entityWrappedKey));
|
|
638
|
+
const decryptedKeyBinary = await cryptoService.decryptWithPrivateKey(key, ephemeralEncryptionKeys.privateKey);
|
|
639
|
+
return {
|
|
640
|
+
key: new Uint8Array(decryptedKeyBinary.asByteArray()),
|
|
641
|
+
metadata,
|
|
642
|
+
};
|
|
643
|
+
}
|
|
644
|
+
// Get unique split IDs to determine if we have an OR or AND condition
|
|
645
|
+
const splitIds = new Set(Object.keys(splitPotentials));
|
|
646
|
+
// If we have only one split ID, it's an OR condition
|
|
647
|
+
if (splitIds.size === 1) {
|
|
648
|
+
const [splitId] = splitIds;
|
|
649
|
+
const potentials = splitPotentials[splitId];
|
|
650
|
+
try {
|
|
651
|
+
// OR condition: Try all KAS servers for this split, take first success
|
|
652
|
+
const result = await Promise.any(Object.values(potentials).map(async (keySplitInfo) => {
|
|
653
|
+
try {
|
|
654
|
+
return await tryKasRewrap(keySplitInfo);
|
|
655
|
+
}
|
|
656
|
+
catch (e) {
|
|
657
|
+
// Rethrow with more context
|
|
658
|
+
throw handleRewrapError(e);
|
|
659
|
+
}
|
|
660
|
+
}));
|
|
661
|
+
const reconstructedKey = (0, index_js_3.keyMerge)([result.key]);
|
|
662
|
+
return {
|
|
663
|
+
reconstructedKeyBinary: binary_js_1.Binary.fromArrayBuffer(reconstructedKey),
|
|
664
|
+
metadata: result.metadata,
|
|
665
|
+
};
|
|
666
|
+
}
|
|
667
|
+
catch (error) {
|
|
668
|
+
if (error instanceof AggregateError) {
|
|
669
|
+
// All KAS servers failed
|
|
670
|
+
throw error.errors[0]; // Throw the first error since we've already wrapped them
|
|
671
|
+
}
|
|
672
|
+
throw error;
|
|
673
|
+
}
|
|
674
|
+
}
|
|
675
|
+
else {
|
|
676
|
+
// AND condition: We need successful results from all different splits
|
|
677
|
+
const splitResults = await Promise.all(Object.entries(splitPotentials).map(async ([splitId, potentials]) => {
|
|
678
|
+
if (!potentials || !Object.keys(potentials).length) {
|
|
679
|
+
throw new errors_js_1.UnsafeUrlError(`Unreconstructable key - no valid KAS found for split ${JSON.stringify(splitId)}`, '');
|
|
680
|
+
}
|
|
681
|
+
try {
|
|
682
|
+
// For each split, try all potential KAS servers until one succeeds
|
|
683
|
+
return await Promise.any(Object.values(potentials).map(async (keySplitInfo) => {
|
|
684
|
+
try {
|
|
685
|
+
return await tryKasRewrap(keySplitInfo);
|
|
686
|
+
}
|
|
687
|
+
catch (e) {
|
|
688
|
+
throw handleRewrapError(e);
|
|
689
|
+
}
|
|
690
|
+
}));
|
|
691
|
+
}
|
|
692
|
+
catch (error) {
|
|
693
|
+
if (error instanceof AggregateError) {
|
|
694
|
+
// All KAS servers for this split failed
|
|
695
|
+
throw error.errors[0]; // Throw the first error since we've already wrapped them
|
|
696
|
+
}
|
|
697
|
+
throw error;
|
|
698
|
+
}
|
|
699
|
+
}));
|
|
700
|
+
// Merge all the split keys
|
|
701
|
+
const reconstructedKey = (0, index_js_3.keyMerge)(splitResults.map((r) => r.key));
|
|
702
|
+
return {
|
|
703
|
+
reconstructedKeyBinary: binary_js_1.Binary.fromArrayBuffer(reconstructedKey),
|
|
704
|
+
metadata: splitResults[0].metadata, // Use metadata from first split
|
|
705
|
+
};
|
|
706
|
+
}
|
|
707
|
+
}
|
|
708
|
+
function handleRewrapError(error) {
|
|
709
|
+
if (axios_1.default.isAxiosError(error)) {
|
|
710
|
+
if (error.response?.status && error.response?.status >= 500) {
|
|
711
|
+
return new errors_js_1.ServiceError('rewrap failure', error);
|
|
712
|
+
}
|
|
713
|
+
else if (error.response?.status === 403) {
|
|
714
|
+
return new errors_js_1.PermissionDeniedError('rewrap failure', error);
|
|
715
|
+
}
|
|
716
|
+
else if (error.response?.status === 401) {
|
|
717
|
+
return new errors_js_1.UnauthenticatedError('rewrap auth failure', error);
|
|
718
|
+
}
|
|
719
|
+
else if (error.response?.status === 400) {
|
|
720
|
+
return new errors_js_1.InvalidFileError('rewrap bad request; could indicate an invalid policy binding or a configuration error', error);
|
|
721
|
+
}
|
|
722
|
+
else {
|
|
723
|
+
return new errors_js_1.NetworkError('rewrap server error', error);
|
|
724
|
+
}
|
|
725
|
+
}
|
|
726
|
+
else {
|
|
727
|
+
if (error.name === 'InvalidAccessError' || error.name === 'OperationError') {
|
|
728
|
+
return new errors_js_1.DecryptError('unable to unwrap key from kas', error);
|
|
729
|
+
}
|
|
730
|
+
return new errors_js_1.InvalidFileError(`Unable to decrypt the response from KAS: [${error.name}: ${error.message}]`, error);
|
|
731
|
+
}
|
|
732
|
+
}
|
|
733
|
+
async function decryptChunk(encryptedChunk, reconstructedKeyBinary, hash, cipher, segmentIntegrityAlgorithm, cryptoService) {
|
|
734
|
+
if (segmentIntegrityAlgorithm !== 'GMAC' && segmentIntegrityAlgorithm !== 'HS256') {
|
|
735
|
+
}
|
|
736
|
+
const segmentHashStr = await getSignature(reconstructedKeyBinary, binary_js_1.Binary.fromArrayBuffer(encryptedChunk.buffer), segmentIntegrityAlgorithm, cryptoService);
|
|
737
|
+
if (hash !== btoa(segmentHashStr)) {
|
|
738
|
+
throw new errors_js_1.IntegrityError('Failed integrity check on segment hash');
|
|
739
|
+
}
|
|
740
|
+
return await cipher.decrypt(encryptedChunk, reconstructedKeyBinary);
|
|
741
|
+
}
|
|
742
|
+
async function updateChunkQueue(chunkMap, centralDirectory, zipReader, reconstructedKeyBinary, cipher, segmentIntegrityAlgorithm, cryptoService) {
|
|
743
|
+
const chunksInOneDownload = 500;
|
|
744
|
+
let requests = [];
|
|
745
|
+
const maxLength = 3;
|
|
746
|
+
for (let i = 0; i < chunkMap.length; i += chunksInOneDownload) {
|
|
747
|
+
if (requests.length === maxLength) {
|
|
748
|
+
await Promise.all(requests);
|
|
749
|
+
requests = [];
|
|
750
|
+
}
|
|
751
|
+
requests.push((async () => {
|
|
752
|
+
let buffer;
|
|
753
|
+
const slice = chunkMap.slice(i, i + chunksInOneDownload);
|
|
754
|
+
try {
|
|
755
|
+
const bufferSize = slice.reduce((currentVal, { encryptedSegmentSize }) => currentVal + encryptedSegmentSize, 0);
|
|
756
|
+
buffer = await zipReader.getPayloadSegment(centralDirectory, '0.payload', slice[0].encryptedOffset, bufferSize);
|
|
757
|
+
}
|
|
758
|
+
catch (e) {
|
|
759
|
+
if (e instanceof errors_js_1.InvalidFileError) {
|
|
760
|
+
throw e;
|
|
761
|
+
}
|
|
762
|
+
throw new errors_js_1.NetworkError('unable to fetch payload segment', e);
|
|
763
|
+
}
|
|
764
|
+
if (buffer) {
|
|
765
|
+
sliceAndDecrypt({
|
|
766
|
+
buffer,
|
|
767
|
+
cryptoService,
|
|
768
|
+
reconstructedKeyBinary,
|
|
769
|
+
slice,
|
|
770
|
+
cipher,
|
|
771
|
+
segmentIntegrityAlgorithm,
|
|
772
|
+
});
|
|
773
|
+
}
|
|
774
|
+
})());
|
|
775
|
+
}
|
|
776
|
+
}
|
|
777
|
+
async function sliceAndDecrypt({ buffer, reconstructedKeyBinary, slice, cipher, cryptoService, segmentIntegrityAlgorithm, }) {
|
|
778
|
+
for (const index in slice) {
|
|
779
|
+
const { encryptedOffset, encryptedSegmentSize, _resolve, _reject } = slice[index];
|
|
780
|
+
const offset = slice[0].encryptedOffset === 0 ? encryptedOffset : encryptedOffset % slice[0].encryptedOffset;
|
|
781
|
+
const encryptedChunk = new Uint8Array(buffer.slice(offset, offset + encryptedSegmentSize));
|
|
782
|
+
try {
|
|
783
|
+
const result = await decryptChunk(encryptedChunk, reconstructedKeyBinary, slice[index]['hash'], cipher, segmentIntegrityAlgorithm, cryptoService);
|
|
784
|
+
slice[index].decryptedChunk = result;
|
|
785
|
+
if (_resolve) {
|
|
786
|
+
_resolve(null);
|
|
787
|
+
}
|
|
788
|
+
}
|
|
789
|
+
catch (e) {
|
|
790
|
+
if (_reject) {
|
|
791
|
+
_reject(e);
|
|
792
|
+
}
|
|
793
|
+
else {
|
|
794
|
+
throw e;
|
|
795
|
+
}
|
|
796
|
+
}
|
|
797
|
+
}
|
|
798
|
+
}
|
|
799
|
+
exports.sliceAndDecrypt = sliceAndDecrypt;
|
|
800
|
+
async function readStream(cfg) {
|
|
801
|
+
let { allowList } = cfg;
|
|
802
|
+
if (!allowList) {
|
|
803
|
+
if (!cfg.allowedKases) {
|
|
804
|
+
throw new errors_js_1.ConfigurationError('Upsert cannot be done without allowlist');
|
|
805
|
+
}
|
|
806
|
+
allowList = new access_js_1.OriginAllowList(cfg.allowedKases);
|
|
807
|
+
}
|
|
808
|
+
const { manifest, zipReader, centralDirectory } = await loadTDFStream(cfg.chunker);
|
|
809
|
+
if (!manifest) {
|
|
810
|
+
throw new errors_js_1.InvalidFileError('Missing manifest data');
|
|
811
|
+
}
|
|
812
|
+
cfg.keyMiddleware ??= async (key) => key;
|
|
813
|
+
const { encryptedSegmentSizeDefault: defaultSegmentSize, rootSignature, segmentHashAlg, segments, } = manifest.encryptionInformation.integrityInformation;
|
|
814
|
+
const { metadata, reconstructedKeyBinary } = await unwrapKey({
|
|
815
|
+
manifest,
|
|
816
|
+
authProvider: cfg.authProvider,
|
|
817
|
+
allowedKases: allowList,
|
|
818
|
+
dpopKeys: cfg.dpopKeys,
|
|
819
|
+
entity: cfg.entity,
|
|
820
|
+
cryptoService: cfg.cryptoService,
|
|
821
|
+
});
|
|
822
|
+
// async function unwrapKey(manifest: Manifest, allowedKases: string[], authProvider: AuthProvider | AppIdAuthProvider, publicKey: string, privateKey: string, entity: EntityObject) {
|
|
823
|
+
const keyForDecryption = await cfg.keyMiddleware(reconstructedKeyBinary);
|
|
824
|
+
const encryptedSegmentSizeDefault = defaultSegmentSize || DEFAULT_SEGMENT_SIZE;
|
|
825
|
+
// check the combined string of hashes
|
|
826
|
+
const aggregateHash = segments.map(({ hash }) => index_js_2.base64.decode(hash)).join('');
|
|
827
|
+
const integrityAlgorithm = rootSignature.alg;
|
|
828
|
+
if (integrityAlgorithm !== 'GMAC' && integrityAlgorithm !== 'HS256') {
|
|
829
|
+
throw new errors_js_1.UnsupportedFeatureError(`Unsupported integrity alg [${integrityAlgorithm}]`);
|
|
830
|
+
}
|
|
831
|
+
const payloadSigStr = await getSignature(keyForDecryption, binary_js_1.Binary.fromString(aggregateHash), integrityAlgorithm, cfg.cryptoService);
|
|
832
|
+
if (manifest.encryptionInformation.integrityInformation.rootSignature.sig !==
|
|
833
|
+
index_js_2.base64.encode(payloadSigStr)) {
|
|
834
|
+
throw new errors_js_1.IntegrityError('Failed integrity check on root signature');
|
|
835
|
+
}
|
|
836
|
+
if (!cfg.noVerifyAssertions) {
|
|
837
|
+
for (const assertion of manifest.assertions || []) {
|
|
838
|
+
// Create a default assertion key
|
|
839
|
+
let assertionKey = {
|
|
840
|
+
alg: 'HS256',
|
|
841
|
+
key: new Uint8Array(reconstructedKeyBinary.asArrayBuffer()),
|
|
842
|
+
};
|
|
843
|
+
if (cfg.assertionVerificationKeys) {
|
|
844
|
+
const foundKey = cfg.assertionVerificationKeys.Keys[assertion.id];
|
|
845
|
+
if (foundKey) {
|
|
846
|
+
assertionKey = foundKey;
|
|
847
|
+
}
|
|
848
|
+
}
|
|
849
|
+
await assertions.verify(assertion, aggregateHash, assertionKey);
|
|
850
|
+
}
|
|
851
|
+
}
|
|
852
|
+
let mapOfRequestsOffset = 0;
|
|
853
|
+
const chunkMap = new Map(segments.map(({ hash, encryptedSegmentSize = encryptedSegmentSizeDefault }) => {
|
|
854
|
+
const result = (() => {
|
|
855
|
+
let _resolve, _reject;
|
|
856
|
+
const chunk = {
|
|
857
|
+
hash,
|
|
858
|
+
encryptedOffset: mapOfRequestsOffset,
|
|
859
|
+
encryptedSegmentSize,
|
|
860
|
+
promise: new Promise((resolve, reject) => {
|
|
861
|
+
_resolve = resolve;
|
|
862
|
+
_reject = reject;
|
|
863
|
+
}),
|
|
864
|
+
};
|
|
865
|
+
chunk._resolve = _resolve;
|
|
866
|
+
chunk._reject = _reject;
|
|
867
|
+
return chunk;
|
|
868
|
+
})();
|
|
869
|
+
mapOfRequestsOffset += encryptedSegmentSize || encryptedSegmentSizeDefault;
|
|
870
|
+
return [hash, result];
|
|
871
|
+
}));
|
|
872
|
+
const cipher = new index_js_5.AesGcmCipher(cfg.cryptoService);
|
|
873
|
+
const segmentIntegrityAlg = segmentHashAlg || integrityAlgorithm;
|
|
874
|
+
if (segmentIntegrityAlg !== 'GMAC' && segmentIntegrityAlg !== 'HS256') {
|
|
875
|
+
throw new errors_js_1.UnsupportedFeatureError(`Unsupported segment hash alg [${segmentIntegrityAlg}]`);
|
|
876
|
+
}
|
|
877
|
+
// Not waiting for Promise to resolve
|
|
878
|
+
updateChunkQueue(Array.from(chunkMap.values()), centralDirectory, zipReader, keyForDecryption, cipher, segmentIntegrityAlg, cfg.cryptoService);
|
|
879
|
+
let progress = 0;
|
|
880
|
+
const underlyingSource = {
|
|
881
|
+
pull: async (controller) => {
|
|
882
|
+
if (chunkMap.size === 0) {
|
|
883
|
+
controller.close();
|
|
884
|
+
return;
|
|
885
|
+
}
|
|
886
|
+
const [hash, chunk] = chunkMap.entries().next().value;
|
|
887
|
+
if (!chunk.decryptedChunk) {
|
|
888
|
+
await chunk.promise;
|
|
889
|
+
}
|
|
890
|
+
const decryptedSegment = chunk.decryptedChunk;
|
|
891
|
+
controller.enqueue(new Uint8Array(decryptedSegment.payload.asByteArray()));
|
|
892
|
+
progress += chunk.encryptedSegmentSize;
|
|
893
|
+
cfg.progressHandler?.(progress);
|
|
894
|
+
chunk.decryptedChunk = null;
|
|
895
|
+
chunkMap.delete(hash);
|
|
896
|
+
},
|
|
897
|
+
...(cfg.fileStreamServiceWorker && { fileStreamServiceWorker: cfg.fileStreamServiceWorker }),
|
|
898
|
+
};
|
|
899
|
+
const outputStream = new DecoratedReadableStream_js_1.DecoratedReadableStream(underlyingSource);
|
|
900
|
+
outputStream.manifest = manifest;
|
|
901
|
+
outputStream.emit('manifest', manifest);
|
|
902
|
+
outputStream.metadata = metadata;
|
|
903
|
+
outputStream.emit('rewrap', metadata);
|
|
904
|
+
return outputStream;
|
|
905
|
+
}
|
|
906
|
+
exports.readStream = readStream;
|
|
907
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"tdf.js","sourceRoot":"","sources":["../../../../tdf3/src/tdf.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,kDAA0C;AAC1C,6DAAmD;AACnD,+BAA8C;AAC9C,oFAA8E;AAE9E,iDAA6E;AAG7E,4DAA8C;AAE9C,gDAc2B;AAC3B,2DAAsD;AACtD,+CAS0B;AAC1B,2CAAqC;AACrC,mDAA+F;AAC/F,mDAY6B;AAC7B,mDAA2D;AAE3D,eAAe;AACf,4GAA4G;AAC5G,iDAAkD;AAClD,oDAMgC;AAMhC,0CAA0C;AAC1C,MAAM,oBAAoB,GAAG,IAAI,GAAG,IAAI,CAAC;AAgIzC;;;GAGG;AACI,KAAK,UAAU,iBAAiB,CACrC,GAAW,EACX,SAAiC;IAEjC,IAAI,CAAC,GAAG,EAAE;QACR,MAAM,IAAI,8BAAkB,CAAC,0BAA0B,CAAC,CAAC;KAC1D;IACD,uDAAuD;IACvD,IAAA,4BAAiB,EAAC,GAAG,CAAC,CAAC;IACvB,MAAM,UAAU,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,SAAS,EAAE,SAAS,IAAI,UAAU,EAAE,CAAC;IACpE,MAAM,MAAM,GAAuB,EAAE,CAAC;IACtC,IAAI,SAAS,EAAE;QACb,MAAM,CAAC,SAAS,GAAG,SAAS,CAAC;KAC9B;IACD,MAAM,KAAK,GAAG,GAAG,GAAG,oBAAoB,CAAC;IACzC,IAAI;QACF,MAAM,QAAQ,GAAwC,MAAM,eAAK,CAAC,GAAG,CAAC,KAAK,EAAE;YAC3E,MAAM,EAAE;gBACN,GAAG,MAAM;gBACT,CAAC,EAAE,GAAG;aACP;SACF,CAAC,CAAC;QACH,MAAM,SAAS,GACb,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ;YAC/B,CAAC,CAAC,MAAM,uBAAuB,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC9C,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,CAAC;QAC9B,OAAO;YACL,SAAS;YACT,GAAG,EAAE,IAAA,+BAAoB,EAAC,SAAS,CAAC;YACpC,GAAG,UAAU;YACb,GAAG,CAAC,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ,IAAI,QAAQ,CAAC,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;SAC1F,CAAC;KACH;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,MAAM,GAAG,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC;QACvC,QAAQ,MAAM,EAAE;YACd,KAAK,GAAG,CAAC;YACT,KAAK,GAAG;gBACN,uCAAuC;gBACvC,MAAM;YACR,KAAK,GAAG;gBACN,MAAM,IAAI,gCAAoB,CAAC,IAAI,KAAK,iBAAiB,EAAE,KAAK,CAAC,CAAC;YACpE,KAAK,GAAG;gBACN,MAAM,IAAI,iCAAqB,CAAC,IAAI,KAAK,qBAAqB,EAAE,KAAK,CAAC,CAAC;YACzE;gBACE,IAAI,MAAM,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,GAAG,GAAG,EAAE;oBAC3C,MAAM,IAAI,8BAAkB,CAC1B,IAAI,KAAK,oBAAoB,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACzE,KAAK,CACN,CAAC;iBACH;gBACD,MAAM,IAAI,wBAAY,CACpB,IAAI,KAAK,YAAY,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACjE,KAAK,CACN,CAAC;SACL;KACF;IACD,uBAAuB;IACvB,MAAM,KAAK,GAAG,GAAG,GAAG,iBAAiB,CAAC;IACtC,IAAI;QACF,MAAM,QAAQ,GAAwC,MAAM,eAAK,CAAC,GAAG,CAAC,KAAK,EAAE;YAC3E,MAAM;SACP,CAAC,CAAC;QACH,MAAM,SAAS,GACb,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ;YAC/B,CAAC,CAAC,MAAM,uBAAuB,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC9C,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,CAAC;QAC9B,yDAAyD;QACzD,OAAO;YACL,SAAS;YACT,GAAG,EAAE,IAAA,+BAAoB,EAAC,SAAS,CAAC;YACpC,GAAG,UAAU;YACb,GAAG,CAAC,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ,IAAI,QAAQ,CAAC,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;SAC1F,CAAC;KACH;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,MAAM,GAAG,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC;QACvC,QAAQ,MAAM,EAAE;YACd,KAAK,GAAG;gBACN,MAAM,IAAI,gCAAoB,CAAC,IAAI,KAAK,iBAAiB,EAAE,KAAK,CAAC,CAAC;YACpE,KAAK,GAAG;gBACN,MAAM,IAAI,iCAAqB,CAAC,IAAI,KAAK,qBAAqB,EAAE,KAAK,CAAC,CAAC;YACzE;gBACE,IAAI,MAAM,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,GAAG,GAAG,EAAE;oBAC3C,MAAM,IAAI,8BAAkB,CAC1B,IAAI,KAAK,oBAAoB,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACzE,KAAK,CACN,CAAC;iBACH;gBACD,MAAM,IAAI,wBAAY,CACpB,IAAI,KAAK,YAAY,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACjE,KAAK,CACN,CAAC;SACL;KACF;AACH,CAAC;AA7FD,8CA6FC;AACD;;;;;;GAMG;AACH,SAAgB,QAAQ,CACtB,OAAmB,EACnB,QAA2B,EAC3B,WAAmB;IAEnB,MAAM,EAAE,MAAM,EAAE,GAAG,IAAI,GAAG,CAAC,WAAW,CAAC,CAAC;IACxC,MAAM,cAAc,GAAW,OAAO,QAAQ,KAAK,QAAQ,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;IAElG,MAAM,cAAc,GAAG,IAAA,8BAAmB,EAAC;QACzC,WAAW;QACX,eAAe,EAAE,MAAM;QACvB,QAAQ,EAAE,iBAAM,CAAC,MAAM,CAAC,cAAc,CAAC;QACvC,OAAO,EAAE,IAAA,uBAAY,EAAC,OAAO,EAAE,QAAQ,CAAC;KACzC,CAAC,CAAC;IAEH,OAAO,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;AAClD,CAAC;AAhBD,4BAgBC;AAED,SAAgB,UAAU,CAAC,WAAuD;IAChF,IAAI,IAAI,CAAC;IACT,IAAI,WAAW,YAAY,WAAW,IAAI,WAAW,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE;QACzE,IAAI,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;KAC9C;SAAM;QACL,IAAI,GAAG,WAAW,CAAC,QAAQ,EAAE,CAAC;KAC/B;IACD,MAAM,SAAS,GAAG,uEAAuE,CAAC;IAC1F,MAAM,QAAQ,GAAG,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtC,IAAI,QAAQ,KAAK,IAAI,EAAE;QACrB,MAAM,IAAI,4BAAgB,CAAC,oBAAoB,CAAC,CAAC;KAClD;IACD,MAAM,aAAa,GAAG,QAAQ,CAAC,CAAC,CAAC,CAAC;IAClC,IAAI;QACF,OAAO,IAAA,yBAAc,EAAC,aAAa,CAAC,CAAC;KACtC;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,IAAI,4BAAgB,CAAC,iDAAiD,EAAE,CAAC,CAAC,CAAC;KAClF;AACH,CAAC;AAlBD,gCAkBC;AAEM,KAAK,UAAU,uBAAuB,CAAC,SAAiB;IAC7D,IAAI,GAAG,GAAW,SAAS,CAAC;IAE5B,wEAAwE;IACxE,yCAAyC;IACzC,IAAI,SAAS,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE;QACrC,MAAM,IAAI,GAAG,MAAM,IAAA,iBAAU,EAAC,SAAS,EAAE,OAAO,EAAE,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC;QACzE,GAAG,GAAG,MAAM,IAAA,iBAAU,EAAC,IAAI,CAAC,CAAC;KAC9B;IAED,OAAO,GAAG,CAAC;AACb,CAAC;AAXD,0DAWC;AAED;;;;;;;;;;;;;GAaG;AACI,KAAK,UAAU,cAAc,CAAC,EACnC,YAAY,EACZ,IAAI,EACJ,GAAG,EACH,SAAS,EACT,GAAG,EACH,YAAY,EACZ,QAAQ,EACR,GAAG,GAAG,EAAE,GACO;IACf,uCAAuC;IACvC,SAAS,eAAe,CACtB,IAAmB,EACnB,MAAc,EACd,gBAAoC,EACpC,MAAc,EACd,QAAmB;QAEnB,QAAQ,IAAI,EAAE;YACZ,KAAK,SAAS;gBACZ,OAAO,IAAI,kBAAgB,CAAC,MAAM,EAAE,gBAAgB,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,CAAC,CAAC;YAC/E,KAAK,QAAQ;gBACX,OAAO,IAAI,iBAAe,CAAC,MAAM,EAAE,gBAAgB,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,CAAC,CAAC;YAC9E;gBACE,MAAM,IAAI,8BAAkB,CAAC,mCAAmC,IAAI,aAAa,CAAC,CAAC;SACtF;IACH,CAAC;IAED,8DAA8D;IAC9D,IAAI,YAAY,IAAI,YAAY,EAAE;QAChC,MAAM,IAAI,GAAG,YAAY,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAC5C,IAAI,IAAI,IAAI,IAAI,CAAC,MAAM,IAAI,IAAI,CAAC,MAAM,EAAE;YACtC,OAAO,eAAe,CAAC,IAAI,EAAE,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;SAC5E;KACF;IAED,yEAAyE;IACzE,IAAI,GAAG,IAAI,SAAS,EAAE;QACpB,OAAO,eAAe,CAAC,IAAI,EAAE,GAAG,EAAE,GAAG,EAAE,MAAM,uBAAuB,CAAC,SAAS,CAAC,EAAE,QAAQ,CAAC,CAAC;KAC5F;IAED,mEAAmE;IACnE,MAAM,WAAW,GAAG,YAAY,EAAE,UAAU,EAAE,CAAC;IAC/C,IAAI,WAAW,EAAE;QACf,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,GAAG,WAAW,CAAC;QACvC,IAAI,MAAM,IAAI,MAAM,EAAE;YACpB,OAAO,eAAe,CAAC,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,uBAAuB,CAAC,MAAM,CAAC,EAAE,QAAQ,CAAC,CAAC;SAC5F;KACF;IACD,8BAA8B;IAC9B,MAAM,IAAI,8BAAkB,CAAC,oDAAoD,CAAC,CAAC;AACrF,CAAC;AAnDD,wCAmDC;AAED,SAAgB,oBAAoB,CAAC,MAAc;IACjD,MAAM,aAAa,GAAa,EAAE,CAAC;IAEnC,IAAI,CAAC,MAAM,CAAC,IAAI;QAAE,aAAa,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAC7C,IAAI,CAAC,MAAM,CAAC,IAAI;QAAE,aAAa,CAAC,IAAI,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;IAC5D,IAAI,MAAM,CAAC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM;QAAE,aAAa,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IAE1E,IAAI,aAAa,CAAC,MAAM,EAAE;QACxB,MAAM,IAAI,8BAAkB,CAC1B,8DAA8D,aAAa,EAAE,CAC9E,CAAC;KACH;AACH,CAAC;AAZD,oDAYC;AAED,KAAK,UAAU,iBAAiB,CAC9B,OAAgB,EAChB,qBAA+B,EAC/B,MAAc,EACd,QAA4B;IAE5B,8CAA8C;IAC9C,MAAM,OAAO,GAAG;QACd,IAAI,EAAE,WAAW;QACjB,GAAG,EAAE,WAAW;QAChB,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,IAAI;QACjB,aAAa,EAAE,OAAO;QACtB,GAAG,CAAC,QAAQ,IAAI,EAAE,QAAQ,EAAE,CAAC;KAC9B,CAAC;IAEF,MAAM,wBAAwB,GAAG,MAAM,qBAAqB,CAAC,KAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACpF,MAAM,UAAU,GAA2B,EAAE,CAAC;IAC9C,OAAO;QACL,OAAO;QACP,yEAAyE;QACzE,qBAAqB,EAAE,wBAAwB;QAC/C,UAAU,EAAE,UAAU;KACvB,CAAC;AACJ,CAAC;AAED,KAAK,UAAU,YAAY,CACzB,kBAA0B,EAC1B,aAAqB,EACrB,aAAiC,EACjC,aAA4B;IAE5B,QAAQ,aAAa,CAAC,WAAW,EAAE,EAAE;QACnC,KAAK,MAAM;YACT,oDAAoD;YACpD,OAAO,IAAA,uBAAY,EAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,EAAE,KAAK,CAAC,CAAC;QACtF,KAAK,OAAO;YACV,6BAA6B;YAC7B,OAAO,MAAM,aAAa,CAAC,IAAI,CAC7B,IAAA,uBAAY,EAAC,IAAI,UAAU,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC,EAAE,KAAK,CAAC,EACvE,IAAA,uBAAY,EAAC,IAAI,UAAU,CAAC,aAAa,CAAC,aAAa,EAAE,CAAC,EAAE,OAAO,CAAC,CACrE,CAAC;QACJ;YACE,MAAM,IAAI,8BAAkB,CAAC,8BAA8B,aAAa,GAAG,CAAC,CAAC;KAChF;AACH,CAAC;AAED,SAAS,YAAY,CAAC,MAAkB,EAAE,GAAW,EAAE,IAAc;IACnE,OAAO;QACL,OAAO,EAAE,EAAE;QACX,MAAM,EAAE,MAAM;QACd,GAAG,EAAE,GAAG;QACR,IAAI;KACL,CAAC;AACJ,CAAC;AAEM,KAAK,UAAU,MAAM,CAAC,EAC3B,YAAY,EACZ,SAAS,EACT,YAAY,EACZ,MAAM,EACN,UAAU,EACV,eAAe,EACf,UAAU,GACU;IACpB,MAAM,OAAO,GAAG,CAAC,GAAG,EAAE;QACpB,IAAI,SAAS,EAAE;YACb,OAAO,SAAS,CAAC;SAClB;QACD,IAAI,CAAC,YAAY,EAAE;YACjB,MAAM,IAAI,8BAAkB,CAAC,yCAAyC,CAAC,CAAC;SACzE;QACD,OAAO,IAAI,2BAAe,CAAC,YAAY,CAAC,CAAC;IAC3C,CAAC,CAAC,EAAE,CAAC;IACL,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,GAAG,eAAe,CAAC,qBAAqB,CAAC;IACpE,MAAM,eAAe,GAAG,YAAY,IAAI,IAAA,+BAAoB,EAAC,YAAY,CAAC,CAAC;IAC3E,IAAI,YAAY,KAAK,SAAS,EAAE;QAC9B,MAAM,IAAI,8BAAkB,CAAC,6CAA6C,CAAC,CAAC;KAC7E;IACD,OAAO,OAAO,CAAC,GAAG,CAChB,SAAS,CAAC,GAAG,CAAC,KAAK,EAAE,eAAe,EAAE,EAAE;QACtC,2EAA2E;QAC3E,MAAM,QAAQ,GAAG,IAAA,mBAAiB,EAAC,eAAe,CAAC,CAAC;QACpD,IAAI,CAAC,UAAU,IAAI,CAAC,QAAQ,EAAE;YAC5B,OAAO;SACR;QAED,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE;YACxC,MAAM,IAAI,0BAAc,CAAC,wBAAwB,eAAe,CAAC,GAAG,GAAG,CAAC,CAAC;SAC1E;QAED,MAAM,GAAG,GAAG,GAAG,eAAe,CAAC,GAAG,IAAI,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,QAAQ,CAAC;QAE3E,2DAA2D;QAC3D,sFAAsF;QACtF,MAAM,IAAI,GAA4B;YACpC,SAAS,EAAE,eAAe;YAC1B,MAAM,EAAE,eAAe,CAAC,qBAAqB,CAAC,MAAM;YACpD,MAAM,EAAE,IAAA,+BAAoB,EAAC,YAAY,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS;YAC/D,SAAS,EAAE,SAAS;YACpB,sBAAsB,EAAE,SAAS;SAClC,CAAC;QAEF,IAAI,IAAA,+BAAoB,EAAC,YAAY,CAAC,EAAE;YACtC,IAAI,CAAC,SAAS,GAAG,MAAM,IAAA,sBAAY,EAAC,EAAE,EAAE,UAAU,CAAC,CAAC;SACrD;aAAM;YACL,IAAI,CAAC,sBAAsB,GAAG,MAAM,IAAA,sBAAY,EAAC,IAAI,EAAE,UAAU,CAAC,CAAC;SACpE;QACD,MAAM,OAAO,GAAG,MAAM,YAAY,CAAC,SAAS,CAAC,YAAY,CAAC,MAAM,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC,CAAC;QAE9E,IAAI;YACF,MAAM,QAAQ,GAAG,MAAM,eAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,EAAE;gBAC3D,OAAO,EAAE,OAAO,CAAC,OAAO;aACzB,CAAC,CAAC;YAEH,0FAA0F;YAC1F,eAAe;YACf,OAAO,eAAe,CAAC,UAAU,CAAC;YAClC,OAAO,eAAe,CAAC,iBAAiB,CAAC;YACzC,OAAO,eAAe,CAAC,aAAa,CAAC;YAErC,IAAI,QAAQ,EAAE;gBACZ,2EAA2E;gBAC3E,MAAM,aAAa,GAAG,IAAI,CAAC,KAAK,CAAC,iBAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBACxD,eAAe,CAAC,qBAAqB,CAAC,MAAM,GAAG,iBAAM,CAAC,MAAM,CAC1D,IAAI,CAAC,SAAS,CAAC,EAAE,IAAI,EAAE,aAAa,CAAC,IAAI,EAAE,CAAC,CAC7C,CAAC;aACH;YACD,OAAO,QAAQ,CAAC,IAAI,CAAC;SACtB;QAAC,OAAO,CAAC,EAAE;YACV,IAAI,CAAC,CAAC,QAAQ,EAAE;gBACd,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,IAAI,GAAG,EAAE;oBAC5B,MAAM,IAAI,wBAAY,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC;iBAC7C;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,iCAAqB,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC;iBACtD;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,gCAAoB,CAAC,qBAAqB,EAAE,CAAC,CAAC,CAAC;iBAC1D;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,8BAAkB,CAAC,kDAAkD,EAAE,CAAC,CAAC,CAAC;iBACrF;qBAAM;oBACL,MAAM,IAAI,wBAAY,CAAC,qBAAqB,EAAE,CAAC,CAAC,CAAC;iBAClD;aACF;iBAAM,IAAI,CAAC,CAAC,OAAO,EAAE;gBACpB,MAAM,IAAI,wBAAY,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC;aACrD;YACD,MAAM,IAAI,oBAAQ,CAChB,mDAAmD,CAAC,CAAC,IAAI,KAAK,CAAC,CAAC,OAAO,iBAAiB,CAAC,EAAE,QAAQ,EAAE,IAAI,GAAG,EAC5G,CAAC,CACF,CAAC;SACH;IACH,CAAC,CAAC,CACH,CAAC;AACJ,CAAC;AAhGD,wBAgGC;AAEM,KAAK,UAAU,WAAW,CAAC,GAAyB;IACzD,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE;QACrB,MAAM,IAAI,8BAAkB,CAAC,qCAAqC,CAAC,CAAC;KACrE;IACD,IAAI,CAAC,GAAG,CAAC,aAAa,EAAE;QACtB,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,CAAC,CAAC;KACzD;IAED,4DAA4D;IAC5D,MAAM,YAAY,GAAc,EAAE,CAAC;IAEnC,GAAG,CAAC,SAAS,KAAK,MAAM,CAAC,gBAAgB,CAAC;IAE1C,MAAM,UAAU,GAAgB;QAC9B;YACE,QAAQ,EAAE,WAAW;SACtB;QACD;YACE,QAAQ,EAAE,iBAAiB;SAC5B;KACF,CAAC;IAEF,IAAI,aAAa,GAAG,IAAI,UAAU,EAAE,CAAC;IAErC,IAAI,cAAc,GAAG,CAAC,CAAC;IACvB,IAAI,cAAc,GAAG,CAAC,CAAC;IACvB,IAAI,UAAU,GAAG,CAAC,CAAC;IACnB,IAAI,aAAa,GAAG,CAAC,CAAC;IACtB,IAAI,aAAa,GAAG,EAAE,CAAC;IAEvB,MAAM,SAAS,GAAG,IAAI,oBAAS,EAAE,CAAC;IAClC,MAAM,QAAQ,GAAG,MAAM,iBAAiB,CACtC,GAAG,CAAC,cAAc,EAClB,GAAG,CAAC,qBAAqB,EACzB,GAAG,CAAC,MAAM,EACV,GAAG,CAAC,QAAQ,CACb,CAAC;IAEF,IAAI,CAAC,QAAQ,EAAE;QACb,2CAA2C;QAC3C,MAAM,IAAI,8BAAkB,CAAC,gEAAgE,CAAC,CAAC;KAChG;IACD,MAAM,SAAS,GAAG,GAAG,CAAC,QAAQ,CAAC,UAAU,CAAC;IAE1C,qDAAqD;IACrD,MAAM,cAAc,GAAG,MAAM,MAAM,CAAC;QAClC,YAAY,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,YAAY;QAC1D,SAAS,EAAE,GAAG,CAAC,SAAS;QACxB,YAAY,EAAE,GAAG,CAAC,YAAY;QAC9B,MAAM,EAAE,GAAG,CAAC,MAAM;QAClB,UAAU,EAAE,SAAS;QACrB,eAAe,EAAE,QAAQ;KAC1B,CAAC,CAAC;IAEH,yDAAyD;IACzD,MAAM,EAAE,kBAAkB,EAAE,GAAG,GAAG,CAAC;IACnC,MAAM,eAAe,GAAG,MAAM,GAAG,CAAC,qBAAqB,CAAC,OAAO,CAC7D,kBAAM,CAAC,eAAe,CAAC,IAAI,WAAW,CAAC,kBAAkB,CAAC,CAAC,EAC3D,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CACxC,CAAC;IACF,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;IAC5E,MAAM,2BAA2B,GAAG,aAAa,CAAC,MAAM,CAAC;IAEzD,4BAA4B;IAC5B,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,WAAW,CAAC;IACrC,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,GAAG,cAAc,CAAC;IACtC,MAAM,YAAY,GAAG,GAAG,CAAC,aAAa,CAAC,SAAS,EAAE,CAAC;IAEnD;;;;;;;MAOE;IACF,MAAM,eAAe,GAAG;QACtB,KAAK,EAAE,CAAC,UAA2C,EAAE,EAAE;YACrD,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;YACtD,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;YAC/C,UAAU,GAAG,CAAC,CAAC;YACf,aAAa,GAAG,CAAC,CAAC;QACpB,CAAC;QAED,IAAI,EAAE,KAAK,EAAE,UAA2C,EAAE,EAAE;YAC1D,IAAI,MAAM,CAAC;YAEX,OAAO,aAAa,CAAC,MAAM,GAAG,kBAAkB,IAAI,CAAC,MAAM,EAAE;gBAC3D,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,GAAG,MAAM,YAAY,CAAC,IAAI,EAAE,CAAC;gBAClD,MAAM,GAAG,IAAI,CAAC;gBACd,IAAI,KAAK,EAAE;oBACT,aAAa,GAAG,IAAA,sBAAW,EAAC,CAAC,aAAa,EAAE,KAAK,CAAC,CAAC,CAAC;iBACrD;aACF;YAED,OACE,aAAa,CAAC,MAAM,IAAI,kBAAkB;gBAC1C,CAAC,CAAC,UAAU,CAAC,WAAW;gBACxB,UAAU,CAAC,WAAW,GAAG,CAAC,EAC1B;gBACA,MAAM,OAAO,GAAG,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,kBAAkB,CAAC,CAAC;gBAC3D,MAAM,gBAAgB,GAAG,MAAM,uBAAuB,CAAC,OAAO,CAAC,CAAC;gBAChE,UAAU,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;gBAErC,aAAa,GAAG,aAAa,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;aACzD;YAED,MAAM,gBAAgB,GAAG,MAAM,IAAI,aAAa,CAAC,MAAM,CAAC;YAExD,IAAI,gBAAgB,EAAE;gBACpB,MAAM,gBAAgB,GAAG,MAAM,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBACtE,UAAU,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;gBACrC,aAAa,GAAG,IAAI,UAAU,EAAE,CAAC;aAClC;YAED,IAAI,MAAM,IAAI,aAAa,CAAC,MAAM,KAAK,CAAC,EAAE;gBACxC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,GAAG,UAAU,CAAC;gBACtC,UAAU,CAAC,CAAC,CAAC,CAAC,aAAa,GAAG,aAAa,CAAC;gBAC5C,MAAM,qBAAqB,GAAG,SAAS,CAAC,mBAAmB,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;gBAEvF,UAAU,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC;gBAC1C,WAAW,CAAC,qBAAqB,CAAC,CAAC;gBAEnC,uBAAuB;gBACvB,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,iBAAiB,CAAC;gBAC3C,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,GAAG,cAAc,CAAC;gBACtC,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;gBACtD,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;gBAC/C,UAAU,GAAG,CAAC,CAAC;gBACf,aAAa,GAAG,CAAC,CAAC;gBAElB,gCAAgC;gBAChC,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,EACvC,kBAAM,CAAC,UAAU,CAAC,aAAa,CAAC,EAChC,GAAG,CAAC,kBAAkB,EACtB,GAAG,CAAC,aAAa,CAClB,CAAC;gBACF,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;oBACnE,iBAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;gBAC/B,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;oBACnE,GAAG,CAAC,kBAAkB,CAAC;gBAEzB,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;gBAC5F,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,2BAA2B;oBAC7E,2BAA2B,CAAC;gBAC9B,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,cAAc;oBAChE,GAAG,CAAC,yBAAyB,CAAC;gBAChC,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,QAAQ,GAAG,YAAY,CAAC;gBAE5E,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;gBAE1D,MAAM,gBAAgB,GAA2B,EAAE,CAAC;gBACpD,IAAI,GAAG,CAAC,gBAAgB,IAAI,GAAG,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE;oBAC3D,MAAM,OAAO,CAAC,GAAG,CACf,GAAG,CAAC,gBAAgB,CAAC,GAAG,CAAC,KAAK,EAAE,eAAe,EAAE,EAAE;wBACjD,oDAAoD;wBACpD,MAAM,UAAU,GAAiB,eAAe,CAAC,UAAU,IAAI;4BAC7D,GAAG,EAAE,OAAO;4BACZ,GAAG,EAAE,IAAI,UAAU,CAAC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC;yBAC7E,CAAC;wBACF,MAAM,SAAS,GAAG,MAAM,UAAU,CAAC,eAAe,CAAC,aAAa,EAAE;4BAChE,GAAG,eAAe;4BAClB,UAAU;yBACX,CAAC,CAAC;wBAEH,qDAAqD;wBACrD,gBAAgB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;oBACnC,CAAC,CAAC,CACH,CAAC;iBACH;gBAED,QAAQ,CAAC,UAAU,GAAG,gBAAgB,CAAC;gBAEvC,qBAAqB;gBACrB,MAAM,cAAc,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC,CAAC;gBAC1E,UAAU,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;gBACnC,WAAW,CAAC,cAAc,CAAC,CAAC;gBAC5B,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,GAAG,UAAU,CAAC;gBACtC,UAAU,CAAC,CAAC,CAAC,CAAC,aAAa,GAAG,aAAa,CAAC;gBAC5C,MAAM,sBAAsB,GAAG,SAAS,CAAC,mBAAmB,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;gBACxF,UAAU,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC;gBAC3C,WAAW,CAAC,sBAAsB,CAAC,CAAC;gBAEpC,kCAAkC;gBAClC,MAAM,yBAAyB,GAAG,cAAc,CAAC;gBACjD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;oBAC1C,MAAM,SAAS,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;oBAChC,MAAM,MAAM,GAAG,SAAS,CAAC,2BAA2B,CAClD,SAAS,CAAC,aAAa,IAAI,CAAC,EAC5B,SAAS,CAAC,QAAQ,EAClB,SAAS,CAAC,MAAM,IAAI,CAAC,EACrB,SAAS,CAAC,UAAU,IAAI,CAAC,EACzB,UAAU,CACX,CAAC;oBACF,UAAU,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;oBAC3B,WAAW,CAAC,MAAM,CAAC,CAAC;iBACrB;gBACD,MAAM,8BAA8B,GAAG,cAAc,GAAG,yBAAyB,CAAC;gBAClF,MAAM,UAAU,GAAG,SAAS,CAAC,gCAAgC,CAC3D,UAAU,CAAC,MAAM,EACjB,8BAA8B,EAC9B,yBAAyB,CAC1B,CAAC;gBACF,UAAU,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC/B,WAAW,CAAC,UAAU,CAAC,CAAC;gBAExB,UAAU,CAAC,KAAK,EAAE,CAAC;aACpB;QACH,CAAC;KACF,CAAC;IAEF,MAAM,eAAe,GAAG,IAAI,oDAAuB,CAAC,eAAe,CAAC,CAAC;IACrE,eAAe,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAEpC,IAAI,cAAc,EAAE;QAClB,eAAe,CAAC,cAAc,GAAG,cAAc,CAAC;QAChD,eAAe,CAAC,OAAO,GAAG,cAAc,CAAC;QACzC,eAAe,CAAC,SAAS,GAAG,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,SAAS,CAAC;KAC7E;IAED,OAAO,eAAe,CAAC;IAEvB,qBAAqB;IACrB,SAAS,SAAS,CAAC,QAAgB;QACjC,OAAO,SAAS,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;IACzD,CAAC;IAED,SAAS,WAAW,CAAC,KAA0B;QAC7C,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;YAC7B,KAAK,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;SACzC;QACD,cAAc,IAAI,KAAK,CAAC,MAAM,CAAC;QAC/B,IAAI,cAAc,GAAG,GAAG,CAAC,SAAS,EAAE;YAClC,MAAM,IAAI,8BAAkB,CAAC,oBAAoB,GAAG,CAAC,SAAS,YAAY,CAAC,CAAC;SAC7E;QACD,mEAAmE;QACnE,UAAU,GAAG,IAAA,0BAAQ,EAAC,KAAK,EAAE,UAAU,CAAC,CAAC;QACzC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;IAChC,CAAC;IAED,KAAK,UAAU,uBAAuB,CAAC,KAAiB;QACtD,cAAc,IAAI,KAAK,CAAC,MAAM,CAAC;QAC/B,GAAG,CAAC,eAAe,EAAE,CAAC,cAAc,CAAC,CAAC;QAEtC,wHAAwH;QACxH,MAAM,eAAe,GAAG,MAAM,GAAG,CAAC,qBAAqB,CAAC,OAAO,CAC7D,kBAAM,CAAC,eAAe,CAAC,KAAK,CAAC,MAAM,CAAC,EACpC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CACxC,CAAC;QACF,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;QAC5E,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,EACvC,eAAe,CAAC,OAAO,EACvB,GAAG,CAAC,yBAAyB,EAC7B,GAAG,CAAC,aAAa,CAClB,CAAC;QAEF,mDAAmD;QACnD,aAAa,IAAI,aAAa,CAAC;QAE/B,YAAY,CAAC,IAAI,CAAC;YAChB,IAAI,EAAE,iBAAM,CAAC,MAAM,CAAC,aAAa,CAAC;YAClC,WAAW,EAAE,KAAK,CAAC,MAAM,KAAK,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM;YAC3E,oBAAoB,EAClB,aAAa,CAAC,MAAM,KAAK,2BAA2B,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,aAAa,CAAC,MAAM;SAC1F,CAAC,CAAC;QACH,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;QACrE,WAAW,CAAC,MAAM,CAAC,CAAC;QAEpB,OAAO,MAAM,CAAC;IAChB,CAAC;AACH,CAAC;AAhRD,kCAgRC;AAED,iFAAiF;AAC1E,KAAK,UAAU,aAAa,CACjC,OAAgB;IAEhB,MAAM,SAAS,GAAG,IAAI,oBAAS,CAAC,OAAO,CAAC,CAAC;IACzC,MAAM,gBAAgB,GAAG,MAAM,SAAS,CAAC,mBAAmB,EAAE,CAAC;IAC/D,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;IAClF,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,gBAAgB,EAAE,CAAC;AACnD,CAAC;AAPD,sCAOC;AAED,SAAgB,uBAAuB,CACrC,SAA4B,EAC5B,YAA6B;IAE7B,MAAM,OAAO,GAAG,CAAC,CAAkB,EAAE,EAAE,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;IACnE,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC,CAAC;IAEhE,MAAM,gBAAgB,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IAClF,IAAI,QAAQ,CAAC,IAAI,GAAG,gBAAgB,CAAC,IAAI,EAAE;QACzC,MAAM,eAAe,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;QAC5F,MAAM,IAAI,0BAAc,CACtB,qDAAqD,IAAI,CAAC,SAAS,CAAC;YAClE,GAAG,eAAe;SACnB,CAAC,kBAAkB,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,QAAQ,CAAC,CAAC,EAAE,EACnD,GAAG,eAAe,CACnB,CAAC;KACH;IACD,MAAM,eAAe,GAAoD,MAAM,CAAC,WAAW,CACzF,CAAC,GAAG,QAAQ,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAClC,CAAC;IACF,KAAK,MAAM,GAAG,IAAI,SAAS,EAAE;QAC3B,MAAM,WAAW,GAAG,eAAe,CAAC,GAAG,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC;QACnD,IAAI,GAAG,CAAC,GAAG,IAAI,WAAW,EAAE;YAC1B,MAAM,IAAI,4BAAgB,CACxB,yDAAyD,GAAG,CAAC,GAAG,eAAe,GAAG,CAAC,GAAG,GAAG,CAC1F,CAAC;SACH;QACD,IAAI,OAAO,CAAC,GAAG,CAAC,EAAE;YAChB,WAAW,CAAC,GAAG,CAAC,GAAG,CAAC,GAAG,GAAG,CAAC;SAC5B;KACF;IACD,OAAO,eAAe,CAAC;AACzB,CAAC;AAhCD,0DAgCC;AAED,KAAK,UAAU,SAAS,CAAC,EACvB,QAAQ,EACR,YAAY,EACZ,YAAY,EACZ,QAAQ,EACR,MAAM,EACN,aAAa,GAQd;IACC,IAAI,YAAY,KAAK,SAAS,EAAE;QAC9B,MAAM,IAAI,8BAAkB,CAC1B,yEAAyE,CAC1E,CAAC;KACH;IACD,MAAM,EAAE,SAAS,EAAE,GAAG,QAAQ,CAAC,qBAAqB,CAAC;IACrD,MAAM,eAAe,GAAG,uBAAuB,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;IACzE,MAAM,eAAe,GAAG,YAAY,IAAI,IAAA,+BAAoB,EAAC,YAAY,CAAC,CAAC;IAE3E,KAAK,UAAU,YAAY,CAAC,YAA6B;QACvD,MAAM,GAAG,GAAG,GAAG,YAAY,CAAC,GAAG,IAAI,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,QAAQ,CAAC;QACxE,MAAM,uBAAuB,GAAG,MAAM,aAAa,CAAC,eAAe,CACjE,MAAM,aAAa,CAAC,eAAe,EAAE,CACtC,CAAC;QACF,MAAM,eAAe,GAAG,uBAAuB,CAAC,SAAS,CAAC;QAE1D,MAAM,cAAc,GAAG,IAAI,CAAC,SAAS,CAAC;YACpC,SAAS,EAAE,OAAO;YAClB,SAAS,EAAE,YAAY;YACvB,MAAM,EAAE,QAAQ,CAAC,qBAAqB,CAAC,MAAM;YAC7C,eAAe;SAChB,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,EAAE,WAAW,EAAE,cAAc,EAAE,CAAC;QACnD,MAAM,kBAAkB,GAAG,MAAM,IAAA,sBAAY,EAC3C,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,EACjC,QAAQ,CAAC,UAAU,CACpB,CAAC;QAEF,IAAI,WAAW,CAAC;QAChB,IAAI,eAAe,EAAE;YACnB,WAAW,GAAG;gBACZ,SAAS,EAAE,YAAY;gBACvB,MAAM,EAAE,QAAQ,CAAC,qBAAqB,CAAC,MAAM;gBAC7C,MAAM,EAAE;oBACN,GAAG,MAAM;oBACT,SAAS,EAAE,eAAe;iBAC3B;gBACD,SAAS,EAAE,kBAAkB;aAC9B,CAAC;SACH;aAAM;YACL,WAAW,GAAG;gBACZ,kBAAkB;aACnB,CAAC;SACH;QAED,MAAM,OAAO,GAAG,MAAM,YAAY,CAAC,SAAS,CAAC,YAAY,CAAC,MAAM,EAAE,GAAG,EAAE,WAAW,CAAC,CAAC,CAAC;QACrF,MAAM,EACJ,IAAI,EAAE,EAAE,gBAAgB,EAAE,QAAQ,EAAE,GACrC,GAAG,MAAM,eAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC;QAE9E,MAAM,GAAG,GAAG,kBAAM,CAAC,UAAU,CAAC,iBAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC;QAC/D,MAAM,kBAAkB,GAAG,MAAM,aAAa,CAAC,qBAAqB,CAClE,GAAG,EACH,uBAAuB,CAAC,UAAU,CACnC,CAAC;QAEF,OAAO;YACL,GAAG,EAAE,IAAI,UAAU,CAAC,kBAAkB,CAAC,WAAW,EAAE,CAAC;YACrD,QAAQ;SACT,CAAC;IACJ,CAAC;IAED,sEAAsE;IACtE,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC;IAEvD,qDAAqD;IACrD,IAAI,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAE;QACvB,MAAM,CAAC,OAAO,CAAC,GAAG,QAAQ,CAAC;QAC3B,MAAM,UAAU,GAAG,eAAe,CAAC,OAAO,CAAC,CAAC;QAE5C,IAAI;YACF,uEAAuE;YACvE,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,GAAG,CAC9B,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,YAAY,EAAE,EAAE;gBACnD,IAAI;oBACF,OAAO,MAAM,YAAY,CAAC,YAAY,CAAC,CAAC;iBACzC;gBAAC,OAAO,CAAC,EAAE;oBACV,4BAA4B;oBAC5B,MAAM,iBAAiB,CAAC,CAAuB,CAAC,CAAC;iBAClD;YACH,CAAC,CAAC,CACH,CAAC;YAEF,MAAM,gBAAgB,GAAG,IAAA,mBAAQ,EAAC,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC;YAChD,OAAO;gBACL,sBAAsB,EAAE,kBAAM,CAAC,eAAe,CAAC,gBAAgB,CAAC;gBAChE,QAAQ,EAAE,MAAM,CAAC,QAAQ;aAC1B,CAAC;SACH;QAAC,OAAO,KAAK,EAAE;YACd,IAAI,KAAK,YAAY,cAAc,EAAE;gBACnC,yBAAyB;gBACzB,MAAM,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,yDAAyD;aACjF;YACD,MAAM,KAAK,CAAC;SACb;KACF;SAAM;QACL,sEAAsE;QACtE,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,GAAG,CACpC,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,OAAO,EAAE,UAAU,CAAC,EAAE,EAAE;YAClE,IAAI,CAAC,UAAU,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,MAAM,EAAE;gBAClD,MAAM,IAAI,0BAAc,CACtB,wDAAwD,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,EAAE,EACjF,EAAE,CACH,CAAC;aACH;YAED,IAAI;gBACF,mEAAmE;gBACnE,OAAO,MAAM,OAAO,CAAC,GAAG,CACtB,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,YAAY,EAAE,EAAE;oBACnD,IAAI;wBACF,OAAO,MAAM,YAAY,CAAC,YAAY,CAAC,CAAC;qBACzC;oBAAC,OAAO,CAAC,EAAE;wBACV,MAAM,iBAAiB,CAAC,CAAuB,CAAC,CAAC;qBAClD;gBACH,CAAC,CAAC,CACH,CAAC;aACH;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,KAAK,YAAY,cAAc,EAAE;oBACnC,wCAAwC;oBACxC,MAAM,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,yDAAyD;iBACjF;gBACD,MAAM,KAAK,CAAC;aACb;QACH,CAAC,CAAC,CACH,CAAC;QAEF,2BAA2B;QAC3B,MAAM,gBAAgB,GAAG,IAAA,mBAAQ,EAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;QAClE,OAAO;YACL,sBAAsB,EAAE,kBAAM,CAAC,eAAe,CAAC,gBAAgB,CAAC;YAChE,QAAQ,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,gCAAgC;SACrE,CAAC;KACH;AACH,CAAC;AAED,SAAS,iBAAiB,CAAC,KAAyB;IAClD,IAAI,eAAK,CAAC,YAAY,CAAC,KAAK,CAAC,EAAE;QAC7B,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,IAAI,GAAG,EAAE;YAC3D,OAAO,IAAI,wBAAY,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;SAClD;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,iCAAqB,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;SAC3D;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,gCAAoB,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC;SAC/D;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,4BAAgB,CACzB,uFAAuF,EACvF,KAAK,CACN,CAAC;SACH;aAAM;YACL,OAAO,IAAI,wBAAY,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC;SACvD;KACF;SAAM;QACL,IAAI,KAAK,CAAC,IAAI,KAAK,oBAAoB,IAAI,KAAK,CAAC,IAAI,KAAK,gBAAgB,EAAE;YAC1E,OAAO,IAAI,wBAAY,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;SACjE;QACD,OAAO,IAAI,4BAAgB,CACzB,6CAA6C,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,GAAG,EAC5E,KAAK,CACN,CAAC;KACH;AACH,CAAC;AAED,KAAK,UAAU,YAAY,CACzB,cAA0B,EAC1B,sBAA8B,EAC9B,IAAY,EACZ,MAAuB,EACvB,yBAA6C,EAC7C,aAA4B;IAE5B,IAAI,yBAAyB,KAAK,MAAM,IAAI,yBAAyB,KAAK,OAAO,EAAE;KAClF;IACD,MAAM,cAAc,GAAG,MAAM,YAAY,CACvC,sBAAsB,EACtB,kBAAM,CAAC,eAAe,CAAC,cAAc,CAAC,MAAM,CAAC,EAC7C,yBAAyB,EACzB,aAAa,CACd,CAAC;IACF,IAAI,IAAI,KAAK,IAAI,CAAC,cAAc,CAAC,EAAE;QACjC,MAAM,IAAI,0BAAc,CAAC,wCAAwC,CAAC,CAAC;KACpE;IACD,OAAO,MAAM,MAAM,CAAC,OAAO,CAAC,cAAc,EAAE,sBAAsB,CAAC,CAAC;AACtE,CAAC;AAED,KAAK,UAAU,gBAAgB,CAC7B,QAAiB,EACjB,gBAAoC,EACpC,SAAoB,EACpB,sBAA8B,EAC9B,MAAuB,EACvB,yBAA6C,EAC7C,aAA4B;IAE5B,MAAM,mBAAmB,GAAG,GAAG,CAAC;IAChC,IAAI,QAAQ,GAAG,EAAE,CAAC;IAClB,MAAM,SAAS,GAAG,CAAC,CAAC;IAEpB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,IAAI,mBAAmB,EAAE;QAC7D,IAAI,QAAQ,CAAC,MAAM,KAAK,SAAS,EAAE;YACjC,MAAM,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YAC5B,QAAQ,GAAG,EAAE,CAAC;SACf;QACD,QAAQ,CAAC,IAAI,CACX,CAAC,KAAK,IAAI,EAAE;YACV,IAAI,MAAyB,CAAC;YAE9B,MAAM,KAAK,GAAG,QAAQ,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,GAAG,mBAAmB,CAAC,CAAC;YACzD,IAAI;gBACF,MAAM,UAAU,GAAG,KAAK,CAAC,MAAM,CAC7B,CAAC,UAAU,EAAE,EAAE,oBAAoB,EAAE,EAAE,EAAE,CAAC,UAAU,GAAI,oBAA+B,EACvF,CAAC,CACF,CAAC;gBACF,MAAM,GAAG,MAAM,SAAS,CAAC,iBAAiB,CACxC,gBAAgB,EAChB,WAAW,EACX,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,EACxB,UAAU,CACX,CAAC;aACH;YAAC,OAAO,CAAC,EAAE;gBACV,IAAI,CAAC,YAAY,4BAAgB,EAAE;oBACjC,MAAM,CAAC,CAAC;iBACT;gBACD,MAAM,IAAI,wBAAY,CAAC,iCAAiC,EAAE,CAAC,CAAC,CAAC;aAC9D;YACD,IAAI,MAAM,EAAE;gBACV,eAAe,CAAC;oBACd,MAAM;oBACN,aAAa;oBACb,sBAAsB;oBACtB,KAAK;oBACL,MAAM;oBACN,yBAAyB;iBAC1B,CAAC,CAAC;aACJ;QACH,CAAC,CAAC,EAAE,CACL,CAAC;KACH;AACH,CAAC;AAEM,KAAK,UAAU,eAAe,CAAC,EACpC,MAAM,EACN,sBAAsB,EACtB,KAAK,EACL,MAAM,EACN,aAAa,EACb,yBAAyB,GAQ1B;IACC,KAAK,MAAM,KAAK,IAAI,KAAK,EAAE;QACzB,MAAM,EAAE,eAAe,EAAE,oBAAoB,EAAE,QAAQ,EAAE,OAAO,EAAE,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC;QAElF,MAAM,MAAM,GACV,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,eAAe,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC;QAChG,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,GAAI,oBAA+B,CAAC,CAChE,CAAC;QAEF,IAAI;YACF,MAAM,MAAM,GAAG,MAAM,YAAY,CAC/B,cAAc,EACd,sBAAsB,EACtB,KAAK,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,EACpB,MAAM,EACN,yBAAyB,EACzB,aAAa,CACd,CAAC;YACF,KAAK,CAAC,KAAK,CAAC,CAAC,cAAc,GAAG,MAAM,CAAC;YACrC,IAAI,QAAQ,EAAE;gBACZ,QAAQ,CAAC,IAAI,CAAC,CAAC;aAChB;SACF;QAAC,OAAO,CAAC,EAAE;YACV,IAAI,OAAO,EAAE;gBACX,OAAO,CAAC,CAAC,CAAC,CAAC;aACZ;iBAAM;gBACL,MAAM,CAAC,CAAC;aACT;SACF;KACF;AACH,CAAC;AA7CD,0CA6CC;AAEM,KAAK,UAAU,UAAU,CAAC,GAAyB;IACxD,IAAI,EAAE,SAAS,EAAE,GAAG,GAAG,CAAC;IACxB,IAAI,CAAC,SAAS,EAAE;QACd,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE;YACrB,MAAM,IAAI,8BAAkB,CAAC,yCAAyC,CAAC,CAAC;SACzE;QACD,SAAS,GAAG,IAAI,2BAAe,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;KACnD;IACD,MAAM,EAAE,QAAQ,EAAE,SAAS,EAAE,gBAAgB,EAAE,GAAG,MAAM,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IACnF,IAAI,CAAC,QAAQ,EAAE;QACb,MAAM,IAAI,4BAAgB,CAAC,uBAAuB,CAAC,CAAC;KACrD;IACD,GAAG,CAAC,aAAa,KAAK,KAAK,EAAE,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC;IAEzC,MAAM,EACJ,2BAA2B,EAAE,kBAAkB,EAC/C,aAAa,EACb,cAAc,EACd,QAAQ,GACT,GAAG,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC;IACxD,MAAM,EAAE,QAAQ,EAAE,sBAAsB,EAAE,GAAG,MAAM,SAAS,CAAC;QAC3D,QAAQ;QACR,YAAY,EAAE,GAAG,CAAC,YAAY;QAC9B,YAAY,EAAE,SAAS;QACvB,QAAQ,EAAE,GAAG,CAAC,QAAQ;QACtB,MAAM,EAAE,GAAG,CAAC,MAAM;QAClB,aAAa,EAAE,GAAG,CAAC,aAAa;KACjC,CAAC,CAAC;IACH,sLAAsL;IACtL,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;IACzE,MAAM,2BAA2B,GAAG,kBAAkB,IAAI,oBAAoB,CAAC;IAE/E,sCAAsC;IACtC,MAAM,aAAa,GAAG,QAAQ,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC,iBAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IAC/E,MAAM,kBAAkB,GAAG,aAAa,CAAC,GAAG,CAAC;IAC7C,IAAI,kBAAkB,KAAK,MAAM,IAAI,kBAAkB,KAAK,OAAO,EAAE;QACnE,MAAM,IAAI,mCAAgB,CAAC,8BAA8B,kBAAkB,GAAG,CAAC,CAAC;KACjF;IACD,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,gBAAgB,EAChB,kBAAM,CAAC,UAAU,CAAC,aAAa,CAAC,EAChC,kBAAkB,EAClB,GAAG,CAAC,aAAa,CAClB,CAAC;IAEF,IACE,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;QACrE,iBAAM,CAAC,MAAM,CAAC,aAAa,CAAC,EAC5B;QACA,MAAM,IAAI,0BAAc,CAAC,0CAA0C,CAAC,CAAC;KACtE;IAED,IAAI,CAAC,GAAG,CAAC,kBAAkB,EAAE;QAC3B,KAAK,MAAM,SAAS,IAAI,QAAQ,CAAC,UAAU,IAAI,EAAE,EAAE;YACjD,iCAAiC;YACjC,IAAI,YAAY,GAAiB;gBAC/B,GAAG,EAAE,OAAO;gBACZ,GAAG,EAAE,IAAI,UAAU,CAAC,sBAAsB,CAAC,aAAa,EAAE,CAAC;aAC5D,CAAC;YAEF,IAAI,GAAG,CAAC,yBAAyB,EAAE;gBACjC,MAAM,QAAQ,GAAG,GAAG,CAAC,yBAAyB,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;gBAClE,IAAI,QAAQ,EAAE;oBACZ,YAAY,GAAG,QAAQ,CAAC;iBACzB;aACF;YACD,MAAM,UAAU,CAAC,MAAM,CAAC,SAAS,EAAE,aAAa,EAAE,YAAY,CAAC,CAAC;SACjE;KACF;IAED,IAAI,mBAAmB,GAAG,CAAC,CAAC;IAC5B,MAAM,QAAQ,GAAG,IAAI,GAAG,CACtB,QAAQ,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,EAAE,oBAAoB,GAAG,2BAA2B,EAAE,EAAE,EAAE;QAC5E,MAAM,MAAM,GAAG,CAAC,GAAG,EAAE;YACnB,IAAI,QAAQ,EAAE,OAAO,CAAC;YACtB,MAAM,KAAK,GAAU;gBACnB,IAAI;gBACJ,eAAe,EAAE,mBAAmB;gBACpC,oBAAoB;gBACpB,OAAO,EAAE,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;oBACvC,QAAQ,GAAG,OAAO,CAAC;oBACnB,OAAO,GAAG,MAAM,CAAC;gBACnB,CAAC,CAAC;aACH,CAAC;YACF,KAAK,CAAC,QAAQ,GAAG,QAAQ,CAAC;YAC1B,KAAK,CAAC,OAAO,GAAG,OAAO,CAAC;YACxB,OAAO,KAAK,CAAC;QACf,CAAC,CAAC,EAAE,CAAC;QACL,mBAAmB,IAAI,oBAAoB,IAAI,2BAA2B,CAAC;QAC3E,OAAO,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC;IACxB,CAAC,CAAC,CACH,CAAC;IAEF,MAAM,MAAM,GAAG,IAAI,uBAAY,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAG,cAAc,IAAI,kBAAkB,CAAC;IACjE,IAAI,mBAAmB,KAAK,MAAM,IAAI,mBAAmB,KAAK,OAAO,EAAE;QACrE,MAAM,IAAI,mCAAgB,CAAC,iCAAiC,mBAAmB,GAAG,CAAC,CAAC;KACrF;IAED,qCAAqC;IACrC,gBAAgB,CACd,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC,EAC7B,gBAAgB,EAChB,SAAS,EACT,gBAAgB,EAChB,MAAM,EACN,mBAAmB,EACnB,GAAG,CAAC,aAAa,CAClB,CAAC;IAEF,IAAI,QAAQ,GAAG,CAAC,CAAC;IACjB,MAAM,gBAAgB,GAAG;QACvB,IAAI,EAAE,KAAK,EAAE,UAA2C,EAAE,EAAE;YAC1D,IAAI,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAE;gBACvB,UAAU,CAAC,KAAK,EAAE,CAAC;gBACnB,OAAO;aACR;YAED,MAAM,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,QAAQ,CAAC,OAAO,EAAE,CAAC,IAAI,EAAE,CAAC,KAAK,CAAC;YACtD,IAAI,CAAC,KAAK,CAAC,cAAc,EAAE;gBACzB,MAAM,KAAK,CAAC,OAAO,CAAC;aACrB;YACD,MAAM,gBAAgB,GAAG,KAAK,CAAC,cAAc,CAAC;YAE9C,UAAU,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,gBAAgB,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC;YAC3E,QAAQ,IAAI,KAAK,CAAC,oBAAoB,CAAC;YACvC,GAAG,CAAC,eAAe,EAAE,CAAC,QAAQ,CAAC,CAAC;YAEhC,KAAK,CAAC,cAAc,GAAG,IAAI,CAAC;YAC5B,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACxB,CAAC;QACD,GAAG,CAAC,GAAG,CAAC,uBAAuB,IAAI,EAAE,uBAAuB,EAAE,GAAG,CAAC,uBAAuB,EAAE,CAAC;KAC7F,CAAC;IAEF,MAAM,YAAY,GAAG,IAAI,oDAAuB,CAAC,gBAAgB,CAAC,CAAC;IAEnE,YAAY,CAAC,QAAQ,GAAG,QAAQ,CAAC;IACjC,YAAY,CAAC,IAAI,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;IACxC,YAAY,CAAC,QAAQ,GAAG,QAAQ,CAAC;IACjC,YAAY,CAAC,IAAI,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;IACtC,OAAO,YAAY,CAAC;AACtB,CAAC;AA7ID,gCA6IC"}
|