@opentdf/sdk 0.1.0-beta.1701
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +52 -0
- package/dist/cjs/package.json +3 -0
- package/dist/cjs/src/access.js +155 -0
- package/dist/cjs/src/auth/Eas.js +60 -0
- package/dist/cjs/src/auth/auth.js +79 -0
- package/dist/cjs/src/auth/oidc-clientcredentials-provider.js +26 -0
- package/dist/cjs/src/auth/oidc-externaljwt-provider.js +33 -0
- package/dist/cjs/src/auth/oidc-refreshtoken-provider.js +34 -0
- package/dist/cjs/src/auth/oidc.js +222 -0
- package/dist/cjs/src/auth/providers.js +143 -0
- package/dist/cjs/src/encodings/base64.js +154 -0
- package/dist/cjs/src/encodings/hex.js +70 -0
- package/dist/cjs/src/encodings/index.js +29 -0
- package/dist/cjs/src/errors.js +138 -0
- package/dist/cjs/src/index.js +344 -0
- package/dist/cjs/src/nanotdf/Client.js +296 -0
- package/dist/cjs/src/nanotdf/NanoTDF.js +94 -0
- package/dist/cjs/src/nanotdf/browser-entry.js +19 -0
- package/dist/cjs/src/nanotdf/constants.js +5 -0
- package/dist/cjs/src/nanotdf/decrypt.js +17 -0
- package/dist/cjs/src/nanotdf/encrypt-dataset.js +38 -0
- package/dist/cjs/src/nanotdf/encrypt.js +132 -0
- package/dist/cjs/src/nanotdf/enum/CipherEnum.js +13 -0
- package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +15 -0
- package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +8 -0
- package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +11 -0
- package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +10 -0
- package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +11 -0
- package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +29 -0
- package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +11 -0
- package/dist/cjs/src/nanotdf/index.js +25 -0
- package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +3 -0
- package/dist/cjs/src/nanotdf/models/Ciphers.js +61 -0
- package/dist/cjs/src/nanotdf/models/DefaultParams.js +27 -0
- package/dist/cjs/src/nanotdf/models/EcCurves.js +39 -0
- package/dist/cjs/src/nanotdf/models/Header.js +255 -0
- package/dist/cjs/src/nanotdf/models/Payload.js +158 -0
- package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +73 -0
- package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +82 -0
- package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +38 -0
- package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +62 -0
- package/dist/cjs/src/nanotdf/models/ResourceLocator.js +211 -0
- package/dist/cjs/src/nanotdf/models/Signature.js +77 -0
- package/dist/cjs/src/nanotdf-crypto/ciphers.js +17 -0
- package/dist/cjs/src/nanotdf-crypto/decrypt.js +24 -0
- package/dist/cjs/src/nanotdf-crypto/digest.js +7 -0
- package/dist/cjs/src/nanotdf-crypto/ecdsaSignature.js +83 -0
- package/dist/cjs/src/nanotdf-crypto/encrypt.js +24 -0
- package/dist/cjs/src/nanotdf-crypto/enums.js +52 -0
- package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +20 -0
- package/dist/cjs/src/nanotdf-crypto/generateKeyPair.js +13 -0
- package/dist/cjs/src/nanotdf-crypto/generateRandomNumber.js +12 -0
- package/dist/cjs/src/nanotdf-crypto/importRawKey.js +18 -0
- package/dist/cjs/src/nanotdf-crypto/index.js +52 -0
- package/dist/cjs/src/nanotdf-crypto/keyAgreement.js +91 -0
- package/dist/cjs/src/nanotdf-crypto/pemPublicToCrypto.js +225 -0
- package/dist/cjs/src/policy/api.js +58 -0
- package/dist/cjs/src/policy/attributes.js +3 -0
- package/dist/cjs/src/policy/granter.js +146 -0
- package/dist/cjs/src/tdf/AttributeObject.js +15 -0
- package/dist/cjs/src/tdf/AttributeObjectJwt.js +3 -0
- package/dist/cjs/src/tdf/Crypto.js +47 -0
- package/dist/cjs/src/tdf/EntityObject.js +3 -0
- package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +38 -0
- package/dist/cjs/src/tdf/Policy.js +50 -0
- package/dist/cjs/src/tdf/PolicyObject.js +3 -0
- package/dist/cjs/src/tdf/TypedArray.js +3 -0
- package/dist/cjs/src/tdf/index.js +35 -0
- package/dist/cjs/src/types/index.js +3 -0
- package/dist/cjs/src/utils.js +147 -0
- package/dist/cjs/src/version.js +12 -0
- package/dist/cjs/tdf3/index.js +57 -0
- package/dist/cjs/tdf3/src/assertions.js +118 -0
- package/dist/cjs/tdf3/src/binary.js +153 -0
- package/dist/cjs/tdf3/src/ciphers/aes-gcm-cipher.js +56 -0
- package/dist/cjs/tdf3/src/ciphers/algorithms.js +8 -0
- package/dist/cjs/tdf3/src/ciphers/index.js +8 -0
- package/dist/cjs/tdf3/src/ciphers/symmetric-cipher-base.js +22 -0
- package/dist/cjs/tdf3/src/client/DecoratedReadableStream.js +116 -0
- package/dist/cjs/tdf3/src/client/builders.js +561 -0
- package/dist/cjs/tdf3/src/client/index.js +460 -0
- package/dist/cjs/tdf3/src/client/validation.js +63 -0
- package/dist/cjs/tdf3/src/crypto/crypto-utils.js +116 -0
- package/dist/cjs/tdf3/src/crypto/declarations.js +8 -0
- package/dist/cjs/tdf3/src/crypto/index.js +315 -0
- package/dist/cjs/tdf3/src/index.js +34 -0
- package/dist/cjs/tdf3/src/models/attribute-set.js +122 -0
- package/dist/cjs/tdf3/src/models/encryption-information.js +90 -0
- package/dist/cjs/tdf3/src/models/index.js +25 -0
- package/dist/cjs/tdf3/src/models/key-access.js +103 -0
- package/dist/cjs/tdf3/src/models/manifest.js +3 -0
- package/dist/cjs/tdf3/src/models/payload.js +3 -0
- package/dist/cjs/tdf3/src/models/policy.js +24 -0
- package/dist/cjs/tdf3/src/models/upsert-response.js +3 -0
- package/dist/cjs/tdf3/src/tdf.js +907 -0
- package/dist/cjs/tdf3/src/templates/default.html.js +98 -0
- package/dist/cjs/tdf3/src/templates/escaper.js +15 -0
- package/dist/cjs/tdf3/src/templates/index.js +12 -0
- package/dist/cjs/tdf3/src/utils/buffer-crc32.js +48 -0
- package/dist/cjs/tdf3/src/utils/chunkers.js +106 -0
- package/dist/cjs/tdf3/src/utils/index.js +296 -0
- package/dist/cjs/tdf3/src/utils/keysplit.js +61 -0
- package/dist/cjs/tdf3/src/utils/zip-reader.js +253 -0
- package/dist/cjs/tdf3/src/utils/zip-writer.js +308 -0
- package/dist/cjs/tdf3/src/version.js +6 -0
- package/dist/types/src/access.d.ts +47 -0
- package/dist/types/src/access.d.ts.map +1 -0
- package/dist/types/src/auth/Eas.d.ts +34 -0
- package/dist/types/src/auth/Eas.d.ts.map +1 -0
- package/dist/types/src/auth/auth.d.ts +86 -0
- package/dist/types/src/auth/auth.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts +9 -0
- package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-externaljwt-provider.d.ts +10 -0
- package/dist/types/src/auth/oidc-externaljwt-provider.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts +10 -0
- package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts.map +1 -0
- package/dist/types/src/auth/oidc.d.ts +104 -0
- package/dist/types/src/auth/oidc.d.ts.map +1 -0
- package/dist/types/src/auth/providers.d.ts +67 -0
- package/dist/types/src/auth/providers.d.ts.map +1 -0
- package/dist/types/src/encodings/base64.d.ts +18 -0
- package/dist/types/src/encodings/base64.d.ts.map +1 -0
- package/dist/types/src/encodings/hex.d.ts +5 -0
- package/dist/types/src/encodings/hex.d.ts.map +1 -0
- package/dist/types/src/encodings/index.d.ts +3 -0
- package/dist/types/src/encodings/index.d.ts.map +1 -0
- package/dist/types/src/errors.d.ts +72 -0
- package/dist/types/src/errors.d.ts.map +1 -0
- package/dist/types/src/index.d.ts +138 -0
- package/dist/types/src/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf/Client.d.ts +95 -0
- package/dist/types/src/nanotdf/Client.d.ts.map +1 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts +25 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts +17 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts.map +1 -0
- package/dist/types/src/nanotdf/constants.d.ts +2 -0
- package/dist/types/src/nanotdf/constants.d.ts.map +1 -0
- package/dist/types/src/nanotdf/decrypt.d.ts +9 -0
- package/dist/types/src/nanotdf/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts +12 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt.d.ts +14 -0
- package/dist/types/src/nanotdf/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +10 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +12 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +5 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +7 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +20 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +9 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/index.d.ts +9 -0
- package/dist/types/src/nanotdf/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +17 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts +14 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts +21 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts +15 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Header.d.ts +73 -0
- package/dist/types/src/nanotdf/models/Header.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts +47 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +52 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +35 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +11 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +31 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +65 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts +33 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts +8 -0
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts +14 -0
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/digest.d.ts +3 -0
- package/dist/types/src/nanotdf-crypto/digest.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts +35 -0
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts +14 -0
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/enums.d.ts +42 -0
- package/dist/types/src/nanotdf-crypto/enums.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts +7 -0
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts +10 -0
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts +5 -0
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/importRawKey.d.ts +13 -0
- package/dist/types/src/nanotdf-crypto/importRawKey.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/index.d.ts +12 -0
- package/dist/types/src/nanotdf-crypto/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts +28 -0
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts +28 -0
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +1 -0
- package/dist/types/src/policy/api.d.ts +4 -0
- package/dist/types/src/policy/api.d.ts.map +1 -0
- package/dist/types/src/policy/attributes.d.ts +95 -0
- package/dist/types/src/policy/attributes.d.ts.map +1 -0
- package/dist/types/src/policy/granter.d.ts +23 -0
- package/dist/types/src/policy/granter.d.ts.map +1 -0
- package/dist/types/src/tdf/AttributeObject.d.ts +13 -0
- package/dist/types/src/tdf/AttributeObject.d.ts.map +1 -0
- package/dist/types/src/tdf/AttributeObjectJwt.d.ts +4 -0
- package/dist/types/src/tdf/AttributeObjectJwt.d.ts.map +1 -0
- package/dist/types/src/tdf/Crypto.d.ts +37 -0
- package/dist/types/src/tdf/Crypto.d.ts.map +1 -0
- package/dist/types/src/tdf/EntityObject.d.ts +18 -0
- package/dist/types/src/tdf/EntityObject.d.ts.map +1 -0
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +99 -0
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/tdf/Policy.d.ts +28 -0
- package/dist/types/src/tdf/Policy.d.ts.map +1 -0
- package/dist/types/src/tdf/PolicyObject.d.ts +11 -0
- package/dist/types/src/tdf/PolicyObject.d.ts.map +1 -0
- package/dist/types/src/tdf/TypedArray.d.ts +3 -0
- package/dist/types/src/tdf/TypedArray.d.ts.map +1 -0
- package/dist/types/src/tdf/index.d.ts +7 -0
- package/dist/types/src/tdf/index.d.ts.map +1 -0
- package/dist/types/src/types/index.d.ts +45 -0
- package/dist/types/src/types/index.d.ts.map +1 -0
- package/dist/types/src/utils.d.ts +45 -0
- package/dist/types/src/utils.d.ts.map +1 -0
- package/dist/types/src/version.d.ts +9 -0
- package/dist/types/src/version.d.ts.map +1 -0
- package/dist/types/tdf3/index.d.ts +16 -0
- package/dist/types/tdf3/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/assertions.d.ts +63 -0
- package/dist/types/tdf3/src/assertions.d.ts.map +1 -0
- package/dist/types/tdf3/src/binary.d.ts +38 -0
- package/dist/types/tdf3/src/binary.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts +18 -0
- package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/algorithms.d.ts +4 -0
- package/dist/types/tdf3/src/ciphers/algorithms.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/index.d.ts +3 -0
- package/dist/types/tdf3/src/ciphers/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts +14 -0
- package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts +53 -0
- package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/builders.d.ts +436 -0
- package/dist/types/tdf3/src/client/builders.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/index.d.ts +139 -0
- package/dist/types/tdf3/src/client/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/client/validation.d.ts +8 -0
- package/dist/types/tdf3/src/client/validation.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/crypto-utils.d.ts +34 -0
- package/dist/types/tdf3/src/crypto/crypto-utils.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/declarations.d.ts +60 -0
- package/dist/types/tdf3/src/crypto/declarations.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/index.d.ts +103 -0
- package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/index.d.ts +5 -0
- package/dist/types/tdf3/src/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/attribute-set.d.ts +65 -0
- package/dist/types/tdf3/src/models/attribute-set.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/encryption-information.d.ts +49 -0
- package/dist/types/tdf3/src/models/encryption-information.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/index.d.ts +9 -0
- package/dist/types/tdf3/src/models/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/key-access.d.ts +42 -0
- package/dist/types/tdf3/src/models/key-access.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/manifest.d.ts +9 -0
- package/dist/types/tdf3/src/models/manifest.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/payload.d.ts +7 -0
- package/dist/types/tdf3/src/models/payload.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/policy.d.ts +13 -0
- package/dist/types/tdf3/src/models/policy.d.ts.map +1 -0
- package/dist/types/tdf3/src/models/upsert-response.d.ts +16 -0
- package/dist/types/tdf3/src/models/upsert-response.d.ts.map +1 -0
- package/dist/types/tdf3/src/tdf.d.ts +152 -0
- package/dist/types/tdf3/src/tdf.d.ts.map +1 -0
- package/dist/types/tdf3/src/templates/default.html.d.ts +8 -0
- package/dist/types/tdf3/src/templates/default.html.d.ts.map +1 -0
- package/dist/types/tdf3/src/templates/escaper.d.ts +6 -0
- package/dist/types/tdf3/src/templates/escaper.d.ts.map +1 -0
- package/dist/types/tdf3/src/templates/index.d.ts +3 -0
- package/dist/types/tdf3/src/templates/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/buffer-crc32.d.ts +2 -0
- package/dist/types/tdf3/src/utils/buffer-crc32.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/chunkers.d.ts +29 -0
- package/dist/types/tdf3/src/utils/chunkers.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/index.d.ts +36 -0
- package/dist/types/tdf3/src/utils/index.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/keysplit.d.ts +19 -0
- package/dist/types/tdf3/src/utils/keysplit.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/zip-reader.d.ts +63 -0
- package/dist/types/tdf3/src/utils/zip-reader.d.ts.map +1 -0
- package/dist/types/tdf3/src/utils/zip-writer.d.ts +35 -0
- package/dist/types/tdf3/src/utils/zip-writer.d.ts.map +1 -0
- package/dist/types/tdf3/src/version.d.ts +3 -0
- package/dist/types/tdf3/src/version.d.ts.map +1 -0
- package/dist/web/package.json +3 -0
- package/dist/web/src/access.js +147 -0
- package/dist/web/src/auth/Eas.js +55 -0
- package/dist/web/src/auth/auth.js +71 -0
- package/dist/web/src/auth/oidc-clientcredentials-provider.js +22 -0
- package/dist/web/src/auth/oidc-externaljwt-provider.js +29 -0
- package/dist/web/src/auth/oidc-refreshtoken-provider.js +30 -0
- package/dist/web/src/auth/oidc.js +215 -0
- package/dist/web/src/auth/providers.js +119 -0
- package/dist/web/src/encodings/base64.js +147 -0
- package/dist/web/src/encodings/hex.js +63 -0
- package/dist/web/src/encodings/index.js +3 -0
- package/dist/web/src/errors.js +123 -0
- package/dist/web/src/index.js +313 -0
- package/dist/web/src/nanotdf/Client.js +268 -0
- package/dist/web/src/nanotdf/NanoTDF.js +89 -0
- package/dist/web/src/nanotdf/browser-entry.js +14 -0
- package/dist/web/src/nanotdf/constants.js +2 -0
- package/dist/web/src/nanotdf/decrypt.js +14 -0
- package/dist/web/src/nanotdf/encrypt-dataset.js +32 -0
- package/dist/web/src/nanotdf/encrypt.js +126 -0
- package/dist/web/src/nanotdf/enum/CipherEnum.js +11 -0
- package/dist/web/src/nanotdf/enum/CurveNameEnum.js +13 -0
- package/dist/web/src/nanotdf/enum/EncodingEnum.js +6 -0
- package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +9 -0
- package/dist/web/src/nanotdf/enum/ProtocolEnum.js +8 -0
- package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +9 -0
- package/dist/web/src/nanotdf/helpers/calculateByCurve.js +24 -0
- package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +8 -0
- package/dist/web/src/nanotdf/index.js +11 -0
- package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +2 -0
- package/dist/web/src/nanotdf/models/Ciphers.js +54 -0
- package/dist/web/src/nanotdf/models/DefaultParams.js +22 -0
- package/dist/web/src/nanotdf/models/EcCurves.js +32 -0
- package/dist/web/src/nanotdf/models/Header.js +250 -0
- package/dist/web/src/nanotdf/models/Payload.js +156 -0
- package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +71 -0
- package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +77 -0
- package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +33 -0
- package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +57 -0
- package/dist/web/src/nanotdf/models/ResourceLocator.js +206 -0
- package/dist/web/src/nanotdf/models/Signature.js +74 -0
- package/dist/web/src/nanotdf-crypto/ciphers.js +14 -0
- package/dist/web/src/nanotdf-crypto/decrypt.js +21 -0
- package/dist/web/src/nanotdf-crypto/digest.js +4 -0
- package/dist/web/src/nanotdf-crypto/ecdsaSignature.js +77 -0
- package/dist/web/src/nanotdf-crypto/encrypt.js +21 -0
- package/dist/web/src/nanotdf-crypto/enums.js +49 -0
- package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +17 -0
- package/dist/web/src/nanotdf-crypto/generateKeyPair.js +10 -0
- package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +9 -0
- package/dist/web/src/nanotdf-crypto/importRawKey.js +15 -0
- package/dist/web/src/nanotdf-crypto/index.js +12 -0
- package/dist/web/src/nanotdf-crypto/keyAgreement.js +87 -0
- package/dist/web/src/nanotdf-crypto/pemPublicToCrypto.js +197 -0
- package/dist/web/src/policy/api.js +54 -0
- package/dist/web/src/policy/attributes.js +2 -0
- package/dist/web/src/policy/granter.js +141 -0
- package/dist/web/src/tdf/AttributeObject.js +11 -0
- package/dist/web/src/tdf/AttributeObjectJwt.js +2 -0
- package/dist/web/src/tdf/Crypto.js +44 -0
- package/dist/web/src/tdf/EntityObject.js +2 -0
- package/dist/web/src/tdf/NanoTDF/NanoTDF.js +35 -0
- package/dist/web/src/tdf/Policy.js +48 -0
- package/dist/web/src/tdf/PolicyObject.js +2 -0
- package/dist/web/src/tdf/TypedArray.js +2 -0
- package/dist/web/src/tdf/index.js +4 -0
- package/dist/web/src/types/index.js +2 -0
- package/dist/web/src/utils.js +133 -0
- package/dist/web/src/version.js +9 -0
- package/dist/web/tdf3/index.js +13 -0
- package/dist/web/tdf3/src/assertions.js +111 -0
- package/dist/web/tdf3/src/binary.js +149 -0
- package/dist/web/tdf3/src/ciphers/aes-gcm-cipher.js +52 -0
- package/dist/web/tdf3/src/ciphers/algorithms.js +5 -0
- package/dist/web/tdf3/src/ciphers/index.js +3 -0
- package/dist/web/tdf3/src/ciphers/symmetric-cipher-base.js +18 -0
- package/dist/web/tdf3/src/client/DecoratedReadableStream.js +107 -0
- package/dist/web/tdf3/src/client/builders.js +557 -0
- package/dist/web/tdf3/src/client/index.js +423 -0
- package/dist/web/tdf3/src/client/validation.js +58 -0
- package/dist/web/tdf3/src/crypto/crypto-utils.js +107 -0
- package/dist/web/tdf3/src/crypto/declarations.js +5 -0
- package/dist/web/tdf3/src/crypto/index.js +296 -0
- package/dist/web/tdf3/src/index.js +5 -0
- package/dist/web/tdf3/src/models/attribute-set.js +118 -0
- package/dist/web/tdf3/src/models/encryption-information.js +86 -0
- package/dist/web/tdf3/src/models/index.js +9 -0
- package/dist/web/tdf3/src/models/key-access.js +74 -0
- package/dist/web/tdf3/src/models/manifest.js +2 -0
- package/dist/web/tdf3/src/models/payload.js +2 -0
- package/dist/web/tdf3/src/models/policy.js +20 -0
- package/dist/web/tdf3/src/models/upsert-response.js +2 -0
- package/dist/web/tdf3/src/tdf.js +866 -0
- package/dist/web/tdf3/src/templates/default.html.js +96 -0
- package/dist/web/tdf3/src/templates/escaper.js +10 -0
- package/dist/web/tdf3/src/templates/index.js +3 -0
- package/dist/web/tdf3/src/utils/buffer-crc32.js +44 -0
- package/dist/web/tdf3/src/utils/chunkers.js +96 -0
- package/dist/web/tdf3/src/utils/index.js +248 -0
- package/dist/web/tdf3/src/utils/keysplit.js +55 -0
- package/dist/web/tdf3/src/utils/zip-reader.js +247 -0
- package/dist/web/tdf3/src/utils/zip-writer.js +302 -0
- package/dist/web/tdf3/src/version.js +3 -0
- package/package.json +126 -0
- package/src/access.ts +198 -0
- package/src/auth/Eas.ts +79 -0
- package/src/auth/auth.ts +141 -0
- package/src/auth/oidc-clientcredentials-provider.ts +32 -0
- package/src/auth/oidc-externaljwt-provider.ts +41 -0
- package/src/auth/oidc-refreshtoken-provider.ts +41 -0
- package/src/auth/oidc.ts +307 -0
- package/src/auth/providers.ts +139 -0
- package/src/encodings/base64.ts +160 -0
- package/src/encodings/hex.ts +69 -0
- package/src/encodings/index.ts +2 -0
- package/src/errors.ts +113 -0
- package/src/index.ts +441 -0
- package/src/nanotdf/Client.ts +349 -0
- package/src/nanotdf/NanoTDF.ts +121 -0
- package/src/nanotdf/browser-entry.ts +20 -0
- package/src/nanotdf/constants.ts +1 -0
- package/src/nanotdf/decrypt.ts +19 -0
- package/src/nanotdf/encrypt-dataset.ts +52 -0
- package/src/nanotdf/encrypt.ts +197 -0
- package/src/nanotdf/enum/CipherEnum.ts +10 -0
- package/src/nanotdf/enum/CurveNameEnum.ts +12 -0
- package/src/nanotdf/enum/EncodingEnum.ts +5 -0
- package/src/nanotdf/enum/PolicyTypeEnum.ts +8 -0
- package/src/nanotdf/enum/ProtocolEnum.ts +7 -0
- package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +8 -0
- package/src/nanotdf/helpers/calculateByCurve.ts +26 -0
- package/src/nanotdf/helpers/getHkdfSalt.ts +15 -0
- package/src/nanotdf/index.ts +10 -0
- package/src/nanotdf/interfaces/PolicyInterface.ts +27 -0
- package/src/nanotdf/models/Ciphers.ts +67 -0
- package/src/nanotdf/models/DefaultParams.ts +24 -0
- package/src/nanotdf/models/EcCurves.ts +40 -0
- package/src/nanotdf/models/Header.ts +322 -0
- package/src/nanotdf/models/Payload.ts +196 -0
- package/src/nanotdf/models/Policy/AbstractPolicy.ts +90 -0
- package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +101 -0
- package/src/nanotdf/models/Policy/PolicyFactory.ts +48 -0
- package/src/nanotdf/models/Policy/RemotePolicy.ts +74 -0
- package/src/nanotdf/models/ResourceLocator.ts +212 -0
- package/src/nanotdf/models/Signature.ts +85 -0
- package/src/nanotdf-crypto/ciphers.ts +13 -0
- package/src/nanotdf-crypto/decrypt.ts +30 -0
- package/src/nanotdf-crypto/digest.ts +8 -0
- package/src/nanotdf-crypto/ecdsaSignature.ts +109 -0
- package/src/nanotdf-crypto/encrypt.ts +30 -0
- package/src/nanotdf-crypto/enums.ts +47 -0
- package/src/nanotdf-crypto/exportCryptoKey.ts +17 -0
- package/src/nanotdf-crypto/generateKeyPair.ts +19 -0
- package/src/nanotdf-crypto/generateRandomNumber.ts +8 -0
- package/src/nanotdf-crypto/importRawKey.ts +19 -0
- package/src/nanotdf-crypto/index.ts +11 -0
- package/src/nanotdf-crypto/keyAgreement.ts +139 -0
- package/src/nanotdf-crypto/pemPublicToCrypto.ts +232 -0
- package/src/package-lock.json +6 -0
- package/src/package.json +3 -0
- package/src/platform/authorization/authorization_connect.d.ts +44 -0
- package/src/platform/authorization/authorization_connect.js +44 -0
- package/src/platform/authorization/authorization_pb.d.ts +707 -0
- package/src/platform/authorization/authorization_pb.js +372 -0
- package/src/platform/common/common_pb.d.ts +129 -0
- package/src/platform/common/common_pb.js +58 -0
- package/src/platform/entityresolution/entity_resolution_connect.d.ts +35 -0
- package/src/platform/entityresolution/entity_resolution_connect.js +35 -0
- package/src/platform/entityresolution/entity_resolution_pb.d.ts +242 -0
- package/src/platform/entityresolution/entity_resolution_pb.js +139 -0
- package/src/platform/kas/kas_connect.d.ts +59 -0
- package/src/platform/kas/kas_connect.js +59 -0
- package/src/platform/kas/kas_pb.d.ts +200 -0
- package/src/platform/kas/kas_pb.js +84 -0
- package/src/platform/policy/attributes/attributes_connect.d.ts +168 -0
- package/src/platform/policy/attributes/attributes_connect.js +168 -0
- package/src/platform/policy/attributes/attributes_pb.d.ts +929 -0
- package/src/platform/policy/attributes/attributes_pb.js +363 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_connect.d.ts +62 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_connect.js +62 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_pb.d.ts +283 -0
- package/src/platform/policy/kasregistry/key_access_server_registry_pb.js +113 -0
- package/src/platform/policy/namespaces/namespaces_connect.d.ts +62 -0
- package/src/platform/policy/namespaces/namespaces_connect.js +62 -0
- package/src/platform/policy/namespaces/namespaces_pb.d.ts +270 -0
- package/src/platform/policy/namespaces/namespaces_pb.js +110 -0
- package/src/platform/policy/objects_pb.d.ts +725 -0
- package/src/platform/policy/objects_pb.js +288 -0
- package/src/platform/policy/resourcemapping/resource_mapping_connect.d.ts +259 -0
- package/src/platform/policy/resourcemapping/resource_mapping_connect.js +259 -0
- package/src/platform/policy/resourcemapping/resource_mapping_pb.d.ts +314 -0
- package/src/platform/policy/resourcemapping/resource_mapping_pb.js +142 -0
- package/src/platform/policy/selectors_pb.d.ts +269 -0
- package/src/platform/policy/selectors_pb.js +110 -0
- package/src/platform/policy/subjectmapping/subject_mapping_connect.d.ts +118 -0
- package/src/platform/policy/subjectmapping/subject_mapping_connect.js +118 -0
- package/src/platform/policy/subjectmapping/subject_mapping_pb.d.ts +672 -0
- package/src/platform/policy/subjectmapping/subject_mapping_pb.js +260 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_connect.d.ts +26 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_connect.js +26 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_pb.d.ts +75 -0
- package/src/platform/wellknownconfiguration/wellknown_configuration_pb.js +35 -0
- package/src/policy/api.ts +61 -0
- package/src/policy/attributes.ts +117 -0
- package/src/policy/granter.ts +181 -0
- package/src/tdf/AttributeObject.ts +27 -0
- package/src/tdf/AttributeObjectJwt.ts +3 -0
- package/src/tdf/Crypto.ts +42 -0
- package/src/tdf/EntityObject.ts +18 -0
- package/src/tdf/NanoTDF/NanoTDF.ts +120 -0
- package/src/tdf/Policy.ts +51 -0
- package/src/tdf/PolicyObject.ts +12 -0
- package/src/tdf/TypedArray.ts +12 -0
- package/src/tdf/index.ts +6 -0
- package/src/types/index.ts +55 -0
- package/src/utils.ts +149 -0
- package/src/version.ts +9 -0
- package/tdf3/index.ts +91 -0
- package/tdf3/package-lock.json +6 -0
- package/tdf3/package.json +3 -0
- package/tdf3/src/assertions.ts +191 -0
- package/tdf3/src/binary.ts +195 -0
- package/tdf3/src/ciphers/aes-gcm-cipher.ts +76 -0
- package/tdf3/src/ciphers/algorithms.ts +9 -0
- package/tdf3/src/ciphers/index.ts +2 -0
- package/tdf3/src/ciphers/symmetric-cipher-base.ts +38 -0
- package/tdf3/src/client/DecoratedReadableStream.ts +148 -0
- package/tdf3/src/client/builders.ts +701 -0
- package/tdf3/src/client/index.ts +637 -0
- package/tdf3/src/client/validation.ts +79 -0
- package/tdf3/src/crypto/crypto-utils.ts +119 -0
- package/tdf3/src/crypto/declarations.ts +89 -0
- package/tdf3/src/crypto/index.ts +394 -0
- package/tdf3/src/index.ts +4 -0
- package/tdf3/src/models/attribute-set.ts +142 -0
- package/tdf3/src/models/encryption-information.ts +172 -0
- package/tdf3/src/models/index.ts +8 -0
- package/tdf3/src/models/key-access.ts +128 -0
- package/tdf3/src/models/manifest.ts +9 -0
- package/tdf3/src/models/payload.ts +6 -0
- package/tdf3/src/models/policy.ts +35 -0
- package/tdf3/src/models/upsert-response.ts +17 -0
- package/tdf3/src/tdf.ts +1351 -0
- package/tdf3/src/templates/default.html.ts +105 -0
- package/tdf3/src/templates/escaper.ts +10 -0
- package/tdf3/src/templates/index.ts +2 -0
- package/tdf3/src/utils/buffer-crc32.ts +46 -0
- package/tdf3/src/utils/chunkers.ts +118 -0
- package/tdf3/src/utils/index.ts +309 -0
- package/tdf3/src/utils/keysplit.ts +63 -0
- package/tdf3/src/utils/zip-reader.ts +341 -0
- package/tdf3/src/utils/zip-writer.ts +375 -0
- package/tdf3/src/version.ts +2 -0
- package/tdf3/types.d.ts +14 -0
|
@@ -0,0 +1,866 @@
|
|
|
1
|
+
import axios from 'axios';
|
|
2
|
+
import { unsigned } from './utils/buffer-crc32.js';
|
|
3
|
+
import { exportSPKI, importX509 } from 'jose';
|
|
4
|
+
import { DecoratedReadableStream } from './client/DecoratedReadableStream.js';
|
|
5
|
+
import { pemToCryptoPublicKey, validateSecureUrl } from '../../src/utils.js';
|
|
6
|
+
import * as assertions from './assertions.js';
|
|
7
|
+
import { isRemote as isRemoteKeyAccess, Remote as KeyAccessRemote, Wrapped as KeyAccessWrapped, } from './models/index.js';
|
|
8
|
+
import { base64 } from '../../src/encodings/index.js';
|
|
9
|
+
import { ZipReader, ZipWriter, base64ToBuffer, isAppIdProviderCheck, keyMerge, buffToString, concatUint8, } from './utils/index.js';
|
|
10
|
+
import { Binary } from './binary.js';
|
|
11
|
+
import { OriginAllowList } from '../../src/access.js';
|
|
12
|
+
import { ConfigurationError, DecryptError, InvalidFileError, IntegrityError, NetworkError, PermissionDeniedError, ServiceError, TdfError, UnauthenticatedError, UnsafeUrlError, UnsupportedFeatureError as UnsupportedError, } from '../../src/errors.js';
|
|
13
|
+
import { htmlWrapperTemplate } from './templates/index.js';
|
|
14
|
+
// configurable
|
|
15
|
+
// TODO: remove dependencies from ciphers so that we can open-source instead of relying on other Virtru libs
|
|
16
|
+
import { AesGcmCipher } from './ciphers/index.js';
|
|
17
|
+
import { reqSignature, } from '../../src/auth/auth.js';
|
|
18
|
+
// TODO: input validation on manifest JSON
|
|
19
|
+
const DEFAULT_SEGMENT_SIZE = 1024 * 1024;
|
|
20
|
+
/**
|
|
21
|
+
* If we have KAS url but not public key we can fetch it from KAS, fetching
|
|
22
|
+
* the value from `${kas}/kas_public_key`.
|
|
23
|
+
*/
|
|
24
|
+
export async function fetchKasPublicKey(kas, algorithm) {
|
|
25
|
+
if (!kas) {
|
|
26
|
+
throw new ConfigurationError('KAS definition not found');
|
|
27
|
+
}
|
|
28
|
+
// Logs insecure KAS. Secure is enforced in constructor
|
|
29
|
+
validateSecureUrl(kas);
|
|
30
|
+
const infoStatic = { url: kas, algorithm: algorithm || 'rsa:2048' };
|
|
31
|
+
const params = {};
|
|
32
|
+
if (algorithm) {
|
|
33
|
+
params.algorithm = algorithm;
|
|
34
|
+
}
|
|
35
|
+
const v2Url = `${kas}/v2/kas_public_key`;
|
|
36
|
+
try {
|
|
37
|
+
const response = await axios.get(v2Url, {
|
|
38
|
+
params: {
|
|
39
|
+
...params,
|
|
40
|
+
v: '2',
|
|
41
|
+
},
|
|
42
|
+
});
|
|
43
|
+
const publicKey = typeof response.data === 'string'
|
|
44
|
+
? await extractPemFromKeyString(response.data)
|
|
45
|
+
: response.data.publicKey;
|
|
46
|
+
return {
|
|
47
|
+
publicKey,
|
|
48
|
+
key: pemToCryptoPublicKey(publicKey),
|
|
49
|
+
...infoStatic,
|
|
50
|
+
...(typeof response.data !== 'string' && response.data.kid && { kid: response.data.kid }),
|
|
51
|
+
};
|
|
52
|
+
}
|
|
53
|
+
catch (cause) {
|
|
54
|
+
const status = cause?.response?.status;
|
|
55
|
+
switch (status) {
|
|
56
|
+
case 400:
|
|
57
|
+
case 404:
|
|
58
|
+
// KAS does not yet implement v2, maybe
|
|
59
|
+
break;
|
|
60
|
+
case 401:
|
|
61
|
+
throw new UnauthenticatedError(`[${v2Url}] requires auth`, cause);
|
|
62
|
+
case 403:
|
|
63
|
+
throw new PermissionDeniedError(`[${v2Url}] permission denied`, cause);
|
|
64
|
+
default:
|
|
65
|
+
if (status && status >= 400 && status < 500) {
|
|
66
|
+
throw new ConfigurationError(`[${v2Url}] request error [${status}] [${cause.name}] [${cause.message}]`, cause);
|
|
67
|
+
}
|
|
68
|
+
throw new NetworkError(`[${v2Url}] error [${status}] [${cause.name}] [${cause.message}]`, cause);
|
|
69
|
+
}
|
|
70
|
+
}
|
|
71
|
+
// Retry with v1 params
|
|
72
|
+
const v1Url = `${kas}/kas_public_key`;
|
|
73
|
+
try {
|
|
74
|
+
const response = await axios.get(v1Url, {
|
|
75
|
+
params,
|
|
76
|
+
});
|
|
77
|
+
const publicKey = typeof response.data === 'string'
|
|
78
|
+
? await extractPemFromKeyString(response.data)
|
|
79
|
+
: response.data.publicKey;
|
|
80
|
+
// future proof: allow v2 response even if not specified.
|
|
81
|
+
return {
|
|
82
|
+
publicKey,
|
|
83
|
+
key: pemToCryptoPublicKey(publicKey),
|
|
84
|
+
...infoStatic,
|
|
85
|
+
...(typeof response.data !== 'string' && response.data.kid && { kid: response.data.kid }),
|
|
86
|
+
};
|
|
87
|
+
}
|
|
88
|
+
catch (cause) {
|
|
89
|
+
const status = cause?.response?.status;
|
|
90
|
+
switch (status) {
|
|
91
|
+
case 401:
|
|
92
|
+
throw new UnauthenticatedError(`[${v1Url}] requires auth`, cause);
|
|
93
|
+
case 403:
|
|
94
|
+
throw new PermissionDeniedError(`[${v1Url}] permission denied`, cause);
|
|
95
|
+
default:
|
|
96
|
+
if (status && status >= 400 && status < 500) {
|
|
97
|
+
throw new ConfigurationError(`[${v2Url}] request error [${status}] [${cause.name}] [${cause.message}]`, cause);
|
|
98
|
+
}
|
|
99
|
+
throw new NetworkError(`[${v1Url}] error [${status}] [${cause.name}] [${cause.message}]`, cause);
|
|
100
|
+
}
|
|
101
|
+
}
|
|
102
|
+
}
|
|
103
|
+
/**
|
|
104
|
+
*
|
|
105
|
+
* @param payload The TDF content to encode in HTML
|
|
106
|
+
* @param manifest A copy of the manifest
|
|
107
|
+
* @param transferUrl reader web-service start page
|
|
108
|
+
* @return utf-8 encoded HTML data
|
|
109
|
+
*/
|
|
110
|
+
export function wrapHtml(payload, manifest, transferUrl) {
|
|
111
|
+
const { origin } = new URL(transferUrl);
|
|
112
|
+
const exportManifest = typeof manifest === 'string' ? manifest : JSON.stringify(manifest);
|
|
113
|
+
const fullHtmlString = htmlWrapperTemplate({
|
|
114
|
+
transferUrl,
|
|
115
|
+
transferBaseUrl: origin,
|
|
116
|
+
manifest: base64.encode(exportManifest),
|
|
117
|
+
payload: buffToString(payload, 'base64'),
|
|
118
|
+
});
|
|
119
|
+
return new TextEncoder().encode(fullHtmlString);
|
|
120
|
+
}
|
|
121
|
+
export function unwrapHtml(htmlPayload) {
|
|
122
|
+
let html;
|
|
123
|
+
if (htmlPayload instanceof ArrayBuffer || ArrayBuffer.isView(htmlPayload)) {
|
|
124
|
+
html = new TextDecoder().decode(htmlPayload);
|
|
125
|
+
}
|
|
126
|
+
else {
|
|
127
|
+
html = htmlPayload.toString();
|
|
128
|
+
}
|
|
129
|
+
const payloadRe = /<input id=['"]?data-input['"]?[^>]*?value=['"]?([a-zA-Z0-9+/=]+)['"]?/;
|
|
130
|
+
const reResult = payloadRe.exec(html);
|
|
131
|
+
if (reResult === null) {
|
|
132
|
+
throw new InvalidFileError('Payload is missing');
|
|
133
|
+
}
|
|
134
|
+
const base64Payload = reResult[1];
|
|
135
|
+
try {
|
|
136
|
+
return base64ToBuffer(base64Payload);
|
|
137
|
+
}
|
|
138
|
+
catch (e) {
|
|
139
|
+
throw new InvalidFileError('There was a problem extracting the TDF3 payload', e);
|
|
140
|
+
}
|
|
141
|
+
}
|
|
142
|
+
export async function extractPemFromKeyString(keyString) {
|
|
143
|
+
let pem = keyString;
|
|
144
|
+
// Skip the public key extraction if we find that the KAS url provides a
|
|
145
|
+
// PEM-encoded key instead of certificate
|
|
146
|
+
if (keyString.includes('CERTIFICATE')) {
|
|
147
|
+
const cert = await importX509(keyString, 'RS256', { extractable: true });
|
|
148
|
+
pem = await exportSPKI(cert);
|
|
149
|
+
}
|
|
150
|
+
return pem;
|
|
151
|
+
}
|
|
152
|
+
/**
|
|
153
|
+
* Build a key access object and add it to the list. Can specify either
|
|
154
|
+
* a (url, publicKey) pair (legacy, deprecated) or an attribute URL (future).
|
|
155
|
+
* If all are missing then it attempts to use the default attribute. If that
|
|
156
|
+
* is missing it throws an error.
|
|
157
|
+
* @param {Object} options
|
|
158
|
+
* @param {String} options.type - enum representing how the object key is treated
|
|
159
|
+
* @param {String} options.attributeUrl - URL of the attribute to use for pubKey and kasUrl. Omit to use default.
|
|
160
|
+
* @param {String} options.url - directly set the KAS URL
|
|
161
|
+
* @param {String} options.publicKey - directly set the (KAS) public key
|
|
162
|
+
* @param {String?} options.kid - Key identifier of KAS public key
|
|
163
|
+
* @param {String? Object?} options.metadata - Metadata. Appears to be dead code.
|
|
164
|
+
* @return {KeyAccess}- the key access object loaded
|
|
165
|
+
*/
|
|
166
|
+
export async function buildKeyAccess({ attributeSet, type, url, publicKey, kid, attributeUrl, metadata, sid = '', }) {
|
|
167
|
+
/** Internal function to keep it DRY */
|
|
168
|
+
function createKeyAccess(type, kasUrl, kasKeyIdentifier, pubKey, metadata) {
|
|
169
|
+
switch (type) {
|
|
170
|
+
case 'wrapped':
|
|
171
|
+
return new KeyAccessWrapped(kasUrl, kasKeyIdentifier, pubKey, metadata, sid);
|
|
172
|
+
case 'remote':
|
|
173
|
+
return new KeyAccessRemote(kasUrl, kasKeyIdentifier, pubKey, metadata, sid);
|
|
174
|
+
default:
|
|
175
|
+
throw new ConfigurationError(`buildKeyAccess: Key access type ${type} is unknown`);
|
|
176
|
+
}
|
|
177
|
+
}
|
|
178
|
+
// If an attributeUrl is provided try to load with that first.
|
|
179
|
+
if (attributeUrl && attributeSet) {
|
|
180
|
+
const attr = attributeSet.get(attributeUrl);
|
|
181
|
+
if (attr && attr.kasUrl && attr.pubKey) {
|
|
182
|
+
return createKeyAccess(type, attr.kasUrl, attr.kid, attr.pubKey, metadata);
|
|
183
|
+
}
|
|
184
|
+
}
|
|
185
|
+
// if url and pulicKey are specified load the key access object with them
|
|
186
|
+
if (url && publicKey) {
|
|
187
|
+
return createKeyAccess(type, url, kid, await extractPemFromKeyString(publicKey), metadata);
|
|
188
|
+
}
|
|
189
|
+
// Assume the default attribute is the source for kasUrl and pubKey
|
|
190
|
+
const defaultAttr = attributeSet?.getDefault();
|
|
191
|
+
if (defaultAttr) {
|
|
192
|
+
const { pubKey, kasUrl } = defaultAttr;
|
|
193
|
+
if (pubKey && kasUrl) {
|
|
194
|
+
return createKeyAccess(type, kasUrl, kid, await extractPemFromKeyString(pubKey), metadata);
|
|
195
|
+
}
|
|
196
|
+
}
|
|
197
|
+
// All failed. Raise an error.
|
|
198
|
+
throw new ConfigurationError('TDF.buildKeyAccess: No source for kasUrl or pubKey');
|
|
199
|
+
}
|
|
200
|
+
export function validatePolicyObject(policy) {
|
|
201
|
+
const missingFields = [];
|
|
202
|
+
if (!policy.uuid)
|
|
203
|
+
missingFields.push('uuid');
|
|
204
|
+
if (!policy.body)
|
|
205
|
+
missingFields.push('body', 'body.dissem');
|
|
206
|
+
if (policy.body && !policy.body.dissem)
|
|
207
|
+
missingFields.push('body.dissem');
|
|
208
|
+
if (missingFields.length) {
|
|
209
|
+
throw new ConfigurationError(`The given policy object requires the following properties: ${missingFields}`);
|
|
210
|
+
}
|
|
211
|
+
}
|
|
212
|
+
async function _generateManifest(keyInfo, encryptionInformation, policy, mimeType) {
|
|
213
|
+
// (maybe) Fields are quoted to avoid renaming
|
|
214
|
+
const payload = {
|
|
215
|
+
type: 'reference',
|
|
216
|
+
url: '0.payload',
|
|
217
|
+
protocol: 'zip',
|
|
218
|
+
isEncrypted: true,
|
|
219
|
+
schemaVersion: '3.0.0',
|
|
220
|
+
...(mimeType && { mimeType }),
|
|
221
|
+
};
|
|
222
|
+
const encryptionInformationStr = await encryptionInformation.write(policy, keyInfo);
|
|
223
|
+
const assertions = [];
|
|
224
|
+
return {
|
|
225
|
+
payload,
|
|
226
|
+
// generate the manifest first, then insert integrity information into it
|
|
227
|
+
encryptionInformation: encryptionInformationStr,
|
|
228
|
+
assertions: assertions,
|
|
229
|
+
};
|
|
230
|
+
}
|
|
231
|
+
async function getSignature(unwrappedKeyBinary, payloadBinary, algorithmType, cryptoService) {
|
|
232
|
+
switch (algorithmType.toUpperCase()) {
|
|
233
|
+
case 'GMAC':
|
|
234
|
+
// use the auth tag baked into the encrypted payload
|
|
235
|
+
return buffToString(Uint8Array.from(payloadBinary.asByteArray()).slice(-16), 'hex');
|
|
236
|
+
case 'HS256':
|
|
237
|
+
// simple hmac is the default
|
|
238
|
+
return await cryptoService.hmac(buffToString(new Uint8Array(unwrappedKeyBinary.asArrayBuffer()), 'hex'), buffToString(new Uint8Array(payloadBinary.asArrayBuffer()), 'utf-8'));
|
|
239
|
+
default:
|
|
240
|
+
throw new ConfigurationError(`Unsupported signature alg [${algorithmType}]`);
|
|
241
|
+
}
|
|
242
|
+
}
|
|
243
|
+
function buildRequest(method, url, body) {
|
|
244
|
+
return {
|
|
245
|
+
headers: {},
|
|
246
|
+
method: method,
|
|
247
|
+
url: url,
|
|
248
|
+
body,
|
|
249
|
+
};
|
|
250
|
+
}
|
|
251
|
+
export async function upsert({ allowedKases, allowList, authProvider, entity, privateKey, unsavedManifest, ignoreType, }) {
|
|
252
|
+
const allowed = (() => {
|
|
253
|
+
if (allowList) {
|
|
254
|
+
return allowList;
|
|
255
|
+
}
|
|
256
|
+
if (!allowedKases) {
|
|
257
|
+
throw new ConfigurationError('Upsert cannot be done without allowlist');
|
|
258
|
+
}
|
|
259
|
+
return new OriginAllowList(allowedKases);
|
|
260
|
+
})();
|
|
261
|
+
const { keyAccess, policy } = unsavedManifest.encryptionInformation;
|
|
262
|
+
const isAppIdProvider = authProvider && isAppIdProviderCheck(authProvider);
|
|
263
|
+
if (authProvider === undefined) {
|
|
264
|
+
throw new ConfigurationError('Upsert cannot be done without auth provider');
|
|
265
|
+
}
|
|
266
|
+
return Promise.all(keyAccess.map(async (keyAccessObject) => {
|
|
267
|
+
// We only care about remote key access objects for the policy sync portion
|
|
268
|
+
const isRemote = isRemoteKeyAccess(keyAccessObject);
|
|
269
|
+
if (!ignoreType && !isRemote) {
|
|
270
|
+
return;
|
|
271
|
+
}
|
|
272
|
+
if (!allowed.allows(keyAccessObject.url)) {
|
|
273
|
+
throw new UnsafeUrlError(`Unexpected KAS url: [${keyAccessObject.url}]`);
|
|
274
|
+
}
|
|
275
|
+
const url = `${keyAccessObject.url}/${isAppIdProvider ? '' : 'v2/'}upsert`;
|
|
276
|
+
//TODO I dont' think we need a body at all for KAS requests
|
|
277
|
+
// Do we need ANY of this if it's already embedded in the EO in the Bearer OIDC token?
|
|
278
|
+
const body = {
|
|
279
|
+
keyAccess: keyAccessObject,
|
|
280
|
+
policy: unsavedManifest.encryptionInformation.policy,
|
|
281
|
+
entity: isAppIdProviderCheck(authProvider) ? entity : undefined,
|
|
282
|
+
authToken: undefined,
|
|
283
|
+
clientPayloadSignature: undefined,
|
|
284
|
+
};
|
|
285
|
+
if (isAppIdProviderCheck(authProvider)) {
|
|
286
|
+
body.authToken = await reqSignature({}, privateKey);
|
|
287
|
+
}
|
|
288
|
+
else {
|
|
289
|
+
body.clientPayloadSignature = await reqSignature(body, privateKey);
|
|
290
|
+
}
|
|
291
|
+
const httpReq = await authProvider.withCreds(buildRequest('POST', url, body));
|
|
292
|
+
try {
|
|
293
|
+
const response = await axios.post(httpReq.url, httpReq.body, {
|
|
294
|
+
headers: httpReq.headers,
|
|
295
|
+
});
|
|
296
|
+
// Remove additional properties which were needed to sync, but not that we want to save to
|
|
297
|
+
// the manifest
|
|
298
|
+
delete keyAccessObject.wrappedKey;
|
|
299
|
+
delete keyAccessObject.encryptedMetadata;
|
|
300
|
+
delete keyAccessObject.policyBinding;
|
|
301
|
+
if (isRemote) {
|
|
302
|
+
// Decode the policy and extract only the required info to save -- the uuid
|
|
303
|
+
const decodedPolicy = JSON.parse(base64.decode(policy));
|
|
304
|
+
unsavedManifest.encryptionInformation.policy = base64.encode(JSON.stringify({ uuid: decodedPolicy.uuid }));
|
|
305
|
+
}
|
|
306
|
+
return response.data;
|
|
307
|
+
}
|
|
308
|
+
catch (e) {
|
|
309
|
+
if (e.response) {
|
|
310
|
+
if (e.response.status >= 500) {
|
|
311
|
+
throw new ServiceError('upsert failure', e);
|
|
312
|
+
}
|
|
313
|
+
else if (e.response.status === 403) {
|
|
314
|
+
throw new PermissionDeniedError('upsert failure', e);
|
|
315
|
+
}
|
|
316
|
+
else if (e.response.status === 401) {
|
|
317
|
+
throw new UnauthenticatedError('upsert auth failure', e);
|
|
318
|
+
}
|
|
319
|
+
else if (e.response.status === 400) {
|
|
320
|
+
throw new ConfigurationError('upsert bad request; likely a configuration error', e);
|
|
321
|
+
}
|
|
322
|
+
else {
|
|
323
|
+
throw new NetworkError('upsert server error', e);
|
|
324
|
+
}
|
|
325
|
+
}
|
|
326
|
+
else if (e.request) {
|
|
327
|
+
throw new NetworkError('upsert request failure', e);
|
|
328
|
+
}
|
|
329
|
+
throw new TdfError(`Unable to perform upsert operation on the KAS: [${e.name}: ${e.message}], response: [${e?.response?.body}]`, e);
|
|
330
|
+
}
|
|
331
|
+
}));
|
|
332
|
+
}
|
|
333
|
+
export async function writeStream(cfg) {
|
|
334
|
+
if (!cfg.authProvider) {
|
|
335
|
+
throw new ConfigurationError('No authorization middleware defined');
|
|
336
|
+
}
|
|
337
|
+
if (!cfg.contentStream) {
|
|
338
|
+
throw new ConfigurationError('No input stream defined');
|
|
339
|
+
}
|
|
340
|
+
// eslint-disable-next-line @typescript-eslint/no-this-alias
|
|
341
|
+
const segmentInfos = [];
|
|
342
|
+
cfg.byteLimit ??= Number.MAX_SAFE_INTEGER;
|
|
343
|
+
const entryInfos = [
|
|
344
|
+
{
|
|
345
|
+
filename: '0.payload',
|
|
346
|
+
},
|
|
347
|
+
{
|
|
348
|
+
filename: '0.manifest.json',
|
|
349
|
+
},
|
|
350
|
+
];
|
|
351
|
+
let currentBuffer = new Uint8Array();
|
|
352
|
+
let totalByteCount = 0;
|
|
353
|
+
let bytesProcessed = 0;
|
|
354
|
+
let crcCounter = 0;
|
|
355
|
+
let fileByteCount = 0;
|
|
356
|
+
let aggregateHash = '';
|
|
357
|
+
const zipWriter = new ZipWriter();
|
|
358
|
+
const manifest = await _generateManifest(cfg.keyForManifest, cfg.encryptionInformation, cfg.policy, cfg.mimeType);
|
|
359
|
+
if (!manifest) {
|
|
360
|
+
// Set in encrypt; should never be reached.
|
|
361
|
+
throw new ConfigurationError('internal: please use "loadTDFStream" first to load a manifest.');
|
|
362
|
+
}
|
|
363
|
+
const pkKeyLike = cfg.dpopKeys.privateKey;
|
|
364
|
+
// For all remote key access objects, sync its policy
|
|
365
|
+
const upsertResponse = await upsert({
|
|
366
|
+
allowedKases: cfg.allowList ? undefined : cfg.allowedKases,
|
|
367
|
+
allowList: cfg.allowList,
|
|
368
|
+
authProvider: cfg.authProvider,
|
|
369
|
+
entity: cfg.entity,
|
|
370
|
+
privateKey: pkKeyLike,
|
|
371
|
+
unsavedManifest: manifest,
|
|
372
|
+
});
|
|
373
|
+
// determine default segment size by writing empty buffer
|
|
374
|
+
const { segmentSizeDefault } = cfg;
|
|
375
|
+
const encryptedBlargh = await cfg.encryptionInformation.encrypt(Binary.fromArrayBuffer(new ArrayBuffer(segmentSizeDefault)), cfg.keyForEncryption.unwrappedKeyBinary);
|
|
376
|
+
const payloadBuffer = new Uint8Array(encryptedBlargh.payload.asByteArray());
|
|
377
|
+
const encryptedSegmentSizeDefault = payloadBuffer.length;
|
|
378
|
+
// start writing the content
|
|
379
|
+
entryInfos[0].filename = '0.payload';
|
|
380
|
+
entryInfos[0].offset = totalByteCount;
|
|
381
|
+
const sourceReader = cfg.contentStream.getReader();
|
|
382
|
+
/*
|
|
383
|
+
TODO: Code duplication should be addressed
|
|
384
|
+
- RCA operations require that the write stream has already finished executing it's .on('end') handler before being returned,
|
|
385
|
+
thus both handlers are wrapped in a encompassing promise when we have an RCA source. We should investigate
|
|
386
|
+
if this causes O(n) promises to be loaded into memory.
|
|
387
|
+
- LFS operations can have the write stream returned immediately after both .on('end') and .on('data') handlers
|
|
388
|
+
have been defined, thus not requiring the handlers to be wrapped in a promise.
|
|
389
|
+
*/
|
|
390
|
+
const underlingSource = {
|
|
391
|
+
start: (controller) => {
|
|
392
|
+
controller.enqueue(getHeader(entryInfos[0].filename));
|
|
393
|
+
_countChunk(getHeader(entryInfos[0].filename));
|
|
394
|
+
crcCounter = 0;
|
|
395
|
+
fileByteCount = 0;
|
|
396
|
+
},
|
|
397
|
+
pull: async (controller) => {
|
|
398
|
+
let isDone;
|
|
399
|
+
while (currentBuffer.length < segmentSizeDefault && !isDone) {
|
|
400
|
+
const { value, done } = await sourceReader.read();
|
|
401
|
+
isDone = done;
|
|
402
|
+
if (value) {
|
|
403
|
+
currentBuffer = concatUint8([currentBuffer, value]);
|
|
404
|
+
}
|
|
405
|
+
}
|
|
406
|
+
while (currentBuffer.length >= segmentSizeDefault &&
|
|
407
|
+
!!controller.desiredSize &&
|
|
408
|
+
controller.desiredSize > 0) {
|
|
409
|
+
const segment = currentBuffer.slice(0, segmentSizeDefault);
|
|
410
|
+
const encryptedSegment = await _encryptAndCountSegment(segment);
|
|
411
|
+
controller.enqueue(encryptedSegment);
|
|
412
|
+
currentBuffer = currentBuffer.slice(segmentSizeDefault);
|
|
413
|
+
}
|
|
414
|
+
const isFinalChunkLeft = isDone && currentBuffer.length;
|
|
415
|
+
if (isFinalChunkLeft) {
|
|
416
|
+
const encryptedSegment = await _encryptAndCountSegment(currentBuffer);
|
|
417
|
+
controller.enqueue(encryptedSegment);
|
|
418
|
+
currentBuffer = new Uint8Array();
|
|
419
|
+
}
|
|
420
|
+
if (isDone && currentBuffer.length === 0) {
|
|
421
|
+
entryInfos[0].crcCounter = crcCounter;
|
|
422
|
+
entryInfos[0].fileByteCount = fileByteCount;
|
|
423
|
+
const payloadDataDescriptor = zipWriter.writeDataDescriptor(crcCounter, fileByteCount);
|
|
424
|
+
controller.enqueue(payloadDataDescriptor);
|
|
425
|
+
_countChunk(payloadDataDescriptor);
|
|
426
|
+
// prepare the manifest
|
|
427
|
+
entryInfos[1].filename = '0.manifest.json';
|
|
428
|
+
entryInfos[1].offset = totalByteCount;
|
|
429
|
+
controller.enqueue(getHeader(entryInfos[1].filename));
|
|
430
|
+
_countChunk(getHeader(entryInfos[1].filename));
|
|
431
|
+
crcCounter = 0;
|
|
432
|
+
fileByteCount = 0;
|
|
433
|
+
// hash the concat of all hashes
|
|
434
|
+
const payloadSigStr = await getSignature(cfg.keyForEncryption.unwrappedKeyBinary, Binary.fromString(aggregateHash), cfg.integrityAlgorithm, cfg.cryptoService);
|
|
435
|
+
manifest.encryptionInformation.integrityInformation.rootSignature.sig =
|
|
436
|
+
base64.encode(payloadSigStr);
|
|
437
|
+
manifest.encryptionInformation.integrityInformation.rootSignature.alg =
|
|
438
|
+
cfg.integrityAlgorithm;
|
|
439
|
+
manifest.encryptionInformation.integrityInformation.segmentSizeDefault = segmentSizeDefault;
|
|
440
|
+
manifest.encryptionInformation.integrityInformation.encryptedSegmentSizeDefault =
|
|
441
|
+
encryptedSegmentSizeDefault;
|
|
442
|
+
manifest.encryptionInformation.integrityInformation.segmentHashAlg =
|
|
443
|
+
cfg.segmentIntegrityAlgorithm;
|
|
444
|
+
manifest.encryptionInformation.integrityInformation.segments = segmentInfos;
|
|
445
|
+
manifest.encryptionInformation.method.isStreamable = true;
|
|
446
|
+
const signedAssertions = [];
|
|
447
|
+
if (cfg.assertionConfigs && cfg.assertionConfigs.length > 0) {
|
|
448
|
+
await Promise.all(cfg.assertionConfigs.map(async (assertionConfig) => {
|
|
449
|
+
// Create assertion using the assertionConfig values
|
|
450
|
+
const signingKey = assertionConfig.signingKey ?? {
|
|
451
|
+
alg: 'HS256',
|
|
452
|
+
key: new Uint8Array(cfg.keyForEncryption.unwrappedKeyBinary.asArrayBuffer()),
|
|
453
|
+
};
|
|
454
|
+
const assertion = await assertions.CreateAssertion(aggregateHash, {
|
|
455
|
+
...assertionConfig,
|
|
456
|
+
signingKey,
|
|
457
|
+
});
|
|
458
|
+
// Add signed assertion to the signedAssertions array
|
|
459
|
+
signedAssertions.push(assertion);
|
|
460
|
+
}));
|
|
461
|
+
}
|
|
462
|
+
manifest.assertions = signedAssertions;
|
|
463
|
+
// write the manifest
|
|
464
|
+
const manifestBuffer = new TextEncoder().encode(JSON.stringify(manifest));
|
|
465
|
+
controller.enqueue(manifestBuffer);
|
|
466
|
+
_countChunk(manifestBuffer);
|
|
467
|
+
entryInfos[1].crcCounter = crcCounter;
|
|
468
|
+
entryInfos[1].fileByteCount = fileByteCount;
|
|
469
|
+
const manifestDataDescriptor = zipWriter.writeDataDescriptor(crcCounter, fileByteCount);
|
|
470
|
+
controller.enqueue(manifestDataDescriptor);
|
|
471
|
+
_countChunk(manifestDataDescriptor);
|
|
472
|
+
// write the central directory out
|
|
473
|
+
const centralDirectoryByteCount = totalByteCount;
|
|
474
|
+
for (let i = 0; i < entryInfos.length; i++) {
|
|
475
|
+
const entryInfo = entryInfos[i];
|
|
476
|
+
const result = zipWriter.writeCentralDirectoryRecord(entryInfo.fileByteCount || 0, entryInfo.filename, entryInfo.offset || 0, entryInfo.crcCounter || 0, 2175008768);
|
|
477
|
+
controller.enqueue(result);
|
|
478
|
+
_countChunk(result);
|
|
479
|
+
}
|
|
480
|
+
const endOfCentralDirectoryByteCount = totalByteCount - centralDirectoryByteCount;
|
|
481
|
+
const finalChunk = zipWriter.writeEndOfCentralDirectoryRecord(entryInfos.length, endOfCentralDirectoryByteCount, centralDirectoryByteCount);
|
|
482
|
+
controller.enqueue(finalChunk);
|
|
483
|
+
_countChunk(finalChunk);
|
|
484
|
+
controller.close();
|
|
485
|
+
}
|
|
486
|
+
},
|
|
487
|
+
};
|
|
488
|
+
const plaintextStream = new DecoratedReadableStream(underlingSource);
|
|
489
|
+
plaintextStream.manifest = manifest;
|
|
490
|
+
if (upsertResponse) {
|
|
491
|
+
plaintextStream.upsertResponse = upsertResponse;
|
|
492
|
+
plaintextStream.tdfSize = totalByteCount;
|
|
493
|
+
plaintextStream.algorithm = manifest.encryptionInformation.method.algorithm;
|
|
494
|
+
}
|
|
495
|
+
return plaintextStream;
|
|
496
|
+
// nested helper fn's
|
|
497
|
+
function getHeader(filename) {
|
|
498
|
+
return zipWriter.getLocalFileHeader(filename, 0, 0, 0);
|
|
499
|
+
}
|
|
500
|
+
function _countChunk(chunk) {
|
|
501
|
+
if (typeof chunk === 'string') {
|
|
502
|
+
chunk = new TextEncoder().encode(chunk);
|
|
503
|
+
}
|
|
504
|
+
totalByteCount += chunk.length;
|
|
505
|
+
if (totalByteCount > cfg.byteLimit) {
|
|
506
|
+
throw new ConfigurationError(`Safe byte limit (${cfg.byteLimit}) exceeded`);
|
|
507
|
+
}
|
|
508
|
+
//new Uint8Array(chunk.buffer, chunk.byteOffset, chunk.byteLength);
|
|
509
|
+
crcCounter = unsigned(chunk, crcCounter);
|
|
510
|
+
fileByteCount += chunk.length;
|
|
511
|
+
}
|
|
512
|
+
async function _encryptAndCountSegment(chunk) {
|
|
513
|
+
bytesProcessed += chunk.length;
|
|
514
|
+
cfg.progressHandler?.(bytesProcessed);
|
|
515
|
+
// Don't pass in an IV here. The encrypt function will generate one for you, ensuring that each segment has a unique IV.
|
|
516
|
+
const encryptedResult = await cfg.encryptionInformation.encrypt(Binary.fromArrayBuffer(chunk.buffer), cfg.keyForEncryption.unwrappedKeyBinary);
|
|
517
|
+
const payloadBuffer = new Uint8Array(encryptedResult.payload.asByteArray());
|
|
518
|
+
const payloadSigStr = await getSignature(cfg.keyForEncryption.unwrappedKeyBinary, encryptedResult.payload, cfg.segmentIntegrityAlgorithm, cfg.cryptoService);
|
|
519
|
+
// combined string of all hashes for root signature
|
|
520
|
+
aggregateHash += payloadSigStr;
|
|
521
|
+
segmentInfos.push({
|
|
522
|
+
hash: base64.encode(payloadSigStr),
|
|
523
|
+
segmentSize: chunk.length === segmentSizeDefault ? undefined : chunk.length,
|
|
524
|
+
encryptedSegmentSize: payloadBuffer.length === encryptedSegmentSizeDefault ? undefined : payloadBuffer.length,
|
|
525
|
+
});
|
|
526
|
+
const result = new Uint8Array(encryptedResult.payload.asByteArray());
|
|
527
|
+
_countChunk(result);
|
|
528
|
+
return result;
|
|
529
|
+
}
|
|
530
|
+
}
|
|
531
|
+
// load the TDF as a stream in memory, for further use in reading and key syncing
|
|
532
|
+
export async function loadTDFStream(chunker) {
|
|
533
|
+
const zipReader = new ZipReader(chunker);
|
|
534
|
+
const centralDirectory = await zipReader.getCentralDirectory();
|
|
535
|
+
const manifest = await zipReader.getManifest(centralDirectory, '0.manifest.json');
|
|
536
|
+
return { manifest, zipReader, centralDirectory };
|
|
537
|
+
}
|
|
538
|
+
export function splitLookupTableFactory(keyAccess, allowedKases) {
|
|
539
|
+
const allowed = (k) => allowedKases.allows(k.url);
|
|
540
|
+
const splitIds = new Set(keyAccess.map(({ sid }) => sid ?? ''));
|
|
541
|
+
const accessibleSplits = new Set(keyAccess.filter(allowed).map(({ sid }) => sid));
|
|
542
|
+
if (splitIds.size > accessibleSplits.size) {
|
|
543
|
+
const disallowedKases = new Set(keyAccess.filter((k) => !allowed(k)).map(({ url }) => url));
|
|
544
|
+
throw new UnsafeUrlError(`Unreconstructable key - disallowed KASes include: ${JSON.stringify([
|
|
545
|
+
...disallowedKases,
|
|
546
|
+
])} from splitIds ${JSON.stringify([...splitIds])}`, ...disallowedKases);
|
|
547
|
+
}
|
|
548
|
+
const splitPotentials = Object.fromEntries([...splitIds].map((s) => [s, {}]));
|
|
549
|
+
for (const kao of keyAccess) {
|
|
550
|
+
const disjunction = splitPotentials[kao.sid ?? ''];
|
|
551
|
+
if (kao.url in disjunction) {
|
|
552
|
+
throw new InvalidFileError(`TODO: Fallback to no split ids. Repetition found for [${kao.url}] on split [${kao.sid}]`);
|
|
553
|
+
}
|
|
554
|
+
if (allowed(kao)) {
|
|
555
|
+
disjunction[kao.url] = kao;
|
|
556
|
+
}
|
|
557
|
+
}
|
|
558
|
+
return splitPotentials;
|
|
559
|
+
}
|
|
560
|
+
async function unwrapKey({ manifest, allowedKases, authProvider, dpopKeys, entity, cryptoService, }) {
|
|
561
|
+
if (authProvider === undefined) {
|
|
562
|
+
throw new ConfigurationError('upsert requires auth provider; must be configured in client constructor');
|
|
563
|
+
}
|
|
564
|
+
const { keyAccess } = manifest.encryptionInformation;
|
|
565
|
+
const splitPotentials = splitLookupTableFactory(keyAccess, allowedKases);
|
|
566
|
+
const isAppIdProvider = authProvider && isAppIdProviderCheck(authProvider);
|
|
567
|
+
async function tryKasRewrap(keySplitInfo) {
|
|
568
|
+
const url = `${keySplitInfo.url}/${isAppIdProvider ? '' : 'v2/'}rewrap`;
|
|
569
|
+
const ephemeralEncryptionKeys = await cryptoService.cryptoToPemPair(await cryptoService.generateKeyPair());
|
|
570
|
+
const clientPublicKey = ephemeralEncryptionKeys.publicKey;
|
|
571
|
+
const requestBodyStr = JSON.stringify({
|
|
572
|
+
algorithm: 'RS256',
|
|
573
|
+
keyAccess: keySplitInfo,
|
|
574
|
+
policy: manifest.encryptionInformation.policy,
|
|
575
|
+
clientPublicKey,
|
|
576
|
+
});
|
|
577
|
+
const jwtPayload = { requestBody: requestBodyStr };
|
|
578
|
+
const signedRequestToken = await reqSignature(isAppIdProvider ? {} : jwtPayload, dpopKeys.privateKey);
|
|
579
|
+
let requestBody;
|
|
580
|
+
if (isAppIdProvider) {
|
|
581
|
+
requestBody = {
|
|
582
|
+
keyAccess: keySplitInfo,
|
|
583
|
+
policy: manifest.encryptionInformation.policy,
|
|
584
|
+
entity: {
|
|
585
|
+
...entity,
|
|
586
|
+
publicKey: clientPublicKey,
|
|
587
|
+
},
|
|
588
|
+
authToken: signedRequestToken,
|
|
589
|
+
};
|
|
590
|
+
}
|
|
591
|
+
else {
|
|
592
|
+
requestBody = {
|
|
593
|
+
signedRequestToken,
|
|
594
|
+
};
|
|
595
|
+
}
|
|
596
|
+
const httpReq = await authProvider.withCreds(buildRequest('POST', url, requestBody));
|
|
597
|
+
const { data: { entityWrappedKey, metadata }, } = await axios.post(httpReq.url, httpReq.body, { headers: httpReq.headers });
|
|
598
|
+
const key = Binary.fromString(base64.decode(entityWrappedKey));
|
|
599
|
+
const decryptedKeyBinary = await cryptoService.decryptWithPrivateKey(key, ephemeralEncryptionKeys.privateKey);
|
|
600
|
+
return {
|
|
601
|
+
key: new Uint8Array(decryptedKeyBinary.asByteArray()),
|
|
602
|
+
metadata,
|
|
603
|
+
};
|
|
604
|
+
}
|
|
605
|
+
// Get unique split IDs to determine if we have an OR or AND condition
|
|
606
|
+
const splitIds = new Set(Object.keys(splitPotentials));
|
|
607
|
+
// If we have only one split ID, it's an OR condition
|
|
608
|
+
if (splitIds.size === 1) {
|
|
609
|
+
const [splitId] = splitIds;
|
|
610
|
+
const potentials = splitPotentials[splitId];
|
|
611
|
+
try {
|
|
612
|
+
// OR condition: Try all KAS servers for this split, take first success
|
|
613
|
+
const result = await Promise.any(Object.values(potentials).map(async (keySplitInfo) => {
|
|
614
|
+
try {
|
|
615
|
+
return await tryKasRewrap(keySplitInfo);
|
|
616
|
+
}
|
|
617
|
+
catch (e) {
|
|
618
|
+
// Rethrow with more context
|
|
619
|
+
throw handleRewrapError(e);
|
|
620
|
+
}
|
|
621
|
+
}));
|
|
622
|
+
const reconstructedKey = keyMerge([result.key]);
|
|
623
|
+
return {
|
|
624
|
+
reconstructedKeyBinary: Binary.fromArrayBuffer(reconstructedKey),
|
|
625
|
+
metadata: result.metadata,
|
|
626
|
+
};
|
|
627
|
+
}
|
|
628
|
+
catch (error) {
|
|
629
|
+
if (error instanceof AggregateError) {
|
|
630
|
+
// All KAS servers failed
|
|
631
|
+
throw error.errors[0]; // Throw the first error since we've already wrapped them
|
|
632
|
+
}
|
|
633
|
+
throw error;
|
|
634
|
+
}
|
|
635
|
+
}
|
|
636
|
+
else {
|
|
637
|
+
// AND condition: We need successful results from all different splits
|
|
638
|
+
const splitResults = await Promise.all(Object.entries(splitPotentials).map(async ([splitId, potentials]) => {
|
|
639
|
+
if (!potentials || !Object.keys(potentials).length) {
|
|
640
|
+
throw new UnsafeUrlError(`Unreconstructable key - no valid KAS found for split ${JSON.stringify(splitId)}`, '');
|
|
641
|
+
}
|
|
642
|
+
try {
|
|
643
|
+
// For each split, try all potential KAS servers until one succeeds
|
|
644
|
+
return await Promise.any(Object.values(potentials).map(async (keySplitInfo) => {
|
|
645
|
+
try {
|
|
646
|
+
return await tryKasRewrap(keySplitInfo);
|
|
647
|
+
}
|
|
648
|
+
catch (e) {
|
|
649
|
+
throw handleRewrapError(e);
|
|
650
|
+
}
|
|
651
|
+
}));
|
|
652
|
+
}
|
|
653
|
+
catch (error) {
|
|
654
|
+
if (error instanceof AggregateError) {
|
|
655
|
+
// All KAS servers for this split failed
|
|
656
|
+
throw error.errors[0]; // Throw the first error since we've already wrapped them
|
|
657
|
+
}
|
|
658
|
+
throw error;
|
|
659
|
+
}
|
|
660
|
+
}));
|
|
661
|
+
// Merge all the split keys
|
|
662
|
+
const reconstructedKey = keyMerge(splitResults.map((r) => r.key));
|
|
663
|
+
return {
|
|
664
|
+
reconstructedKeyBinary: Binary.fromArrayBuffer(reconstructedKey),
|
|
665
|
+
metadata: splitResults[0].metadata, // Use metadata from first split
|
|
666
|
+
};
|
|
667
|
+
}
|
|
668
|
+
}
|
|
669
|
+
function handleRewrapError(error) {
|
|
670
|
+
if (axios.isAxiosError(error)) {
|
|
671
|
+
if (error.response?.status && error.response?.status >= 500) {
|
|
672
|
+
return new ServiceError('rewrap failure', error);
|
|
673
|
+
}
|
|
674
|
+
else if (error.response?.status === 403) {
|
|
675
|
+
return new PermissionDeniedError('rewrap failure', error);
|
|
676
|
+
}
|
|
677
|
+
else if (error.response?.status === 401) {
|
|
678
|
+
return new UnauthenticatedError('rewrap auth failure', error);
|
|
679
|
+
}
|
|
680
|
+
else if (error.response?.status === 400) {
|
|
681
|
+
return new InvalidFileError('rewrap bad request; could indicate an invalid policy binding or a configuration error', error);
|
|
682
|
+
}
|
|
683
|
+
else {
|
|
684
|
+
return new NetworkError('rewrap server error', error);
|
|
685
|
+
}
|
|
686
|
+
}
|
|
687
|
+
else {
|
|
688
|
+
if (error.name === 'InvalidAccessError' || error.name === 'OperationError') {
|
|
689
|
+
return new DecryptError('unable to unwrap key from kas', error);
|
|
690
|
+
}
|
|
691
|
+
return new InvalidFileError(`Unable to decrypt the response from KAS: [${error.name}: ${error.message}]`, error);
|
|
692
|
+
}
|
|
693
|
+
}
|
|
694
|
+
async function decryptChunk(encryptedChunk, reconstructedKeyBinary, hash, cipher, segmentIntegrityAlgorithm, cryptoService) {
|
|
695
|
+
if (segmentIntegrityAlgorithm !== 'GMAC' && segmentIntegrityAlgorithm !== 'HS256') {
|
|
696
|
+
}
|
|
697
|
+
const segmentHashStr = await getSignature(reconstructedKeyBinary, Binary.fromArrayBuffer(encryptedChunk.buffer), segmentIntegrityAlgorithm, cryptoService);
|
|
698
|
+
if (hash !== btoa(segmentHashStr)) {
|
|
699
|
+
throw new IntegrityError('Failed integrity check on segment hash');
|
|
700
|
+
}
|
|
701
|
+
return await cipher.decrypt(encryptedChunk, reconstructedKeyBinary);
|
|
702
|
+
}
|
|
703
|
+
async function updateChunkQueue(chunkMap, centralDirectory, zipReader, reconstructedKeyBinary, cipher, segmentIntegrityAlgorithm, cryptoService) {
|
|
704
|
+
const chunksInOneDownload = 500;
|
|
705
|
+
let requests = [];
|
|
706
|
+
const maxLength = 3;
|
|
707
|
+
for (let i = 0; i < chunkMap.length; i += chunksInOneDownload) {
|
|
708
|
+
if (requests.length === maxLength) {
|
|
709
|
+
await Promise.all(requests);
|
|
710
|
+
requests = [];
|
|
711
|
+
}
|
|
712
|
+
requests.push((async () => {
|
|
713
|
+
let buffer;
|
|
714
|
+
const slice = chunkMap.slice(i, i + chunksInOneDownload);
|
|
715
|
+
try {
|
|
716
|
+
const bufferSize = slice.reduce((currentVal, { encryptedSegmentSize }) => currentVal + encryptedSegmentSize, 0);
|
|
717
|
+
buffer = await zipReader.getPayloadSegment(centralDirectory, '0.payload', slice[0].encryptedOffset, bufferSize);
|
|
718
|
+
}
|
|
719
|
+
catch (e) {
|
|
720
|
+
if (e instanceof InvalidFileError) {
|
|
721
|
+
throw e;
|
|
722
|
+
}
|
|
723
|
+
throw new NetworkError('unable to fetch payload segment', e);
|
|
724
|
+
}
|
|
725
|
+
if (buffer) {
|
|
726
|
+
sliceAndDecrypt({
|
|
727
|
+
buffer,
|
|
728
|
+
cryptoService,
|
|
729
|
+
reconstructedKeyBinary,
|
|
730
|
+
slice,
|
|
731
|
+
cipher,
|
|
732
|
+
segmentIntegrityAlgorithm,
|
|
733
|
+
});
|
|
734
|
+
}
|
|
735
|
+
})());
|
|
736
|
+
}
|
|
737
|
+
}
|
|
738
|
+
export async function sliceAndDecrypt({ buffer, reconstructedKeyBinary, slice, cipher, cryptoService, segmentIntegrityAlgorithm, }) {
|
|
739
|
+
for (const index in slice) {
|
|
740
|
+
const { encryptedOffset, encryptedSegmentSize, _resolve, _reject } = slice[index];
|
|
741
|
+
const offset = slice[0].encryptedOffset === 0 ? encryptedOffset : encryptedOffset % slice[0].encryptedOffset;
|
|
742
|
+
const encryptedChunk = new Uint8Array(buffer.slice(offset, offset + encryptedSegmentSize));
|
|
743
|
+
try {
|
|
744
|
+
const result = await decryptChunk(encryptedChunk, reconstructedKeyBinary, slice[index]['hash'], cipher, segmentIntegrityAlgorithm, cryptoService);
|
|
745
|
+
slice[index].decryptedChunk = result;
|
|
746
|
+
if (_resolve) {
|
|
747
|
+
_resolve(null);
|
|
748
|
+
}
|
|
749
|
+
}
|
|
750
|
+
catch (e) {
|
|
751
|
+
if (_reject) {
|
|
752
|
+
_reject(e);
|
|
753
|
+
}
|
|
754
|
+
else {
|
|
755
|
+
throw e;
|
|
756
|
+
}
|
|
757
|
+
}
|
|
758
|
+
}
|
|
759
|
+
}
|
|
760
|
+
export async function readStream(cfg) {
|
|
761
|
+
let { allowList } = cfg;
|
|
762
|
+
if (!allowList) {
|
|
763
|
+
if (!cfg.allowedKases) {
|
|
764
|
+
throw new ConfigurationError('Upsert cannot be done without allowlist');
|
|
765
|
+
}
|
|
766
|
+
allowList = new OriginAllowList(cfg.allowedKases);
|
|
767
|
+
}
|
|
768
|
+
const { manifest, zipReader, centralDirectory } = await loadTDFStream(cfg.chunker);
|
|
769
|
+
if (!manifest) {
|
|
770
|
+
throw new InvalidFileError('Missing manifest data');
|
|
771
|
+
}
|
|
772
|
+
cfg.keyMiddleware ??= async (key) => key;
|
|
773
|
+
const { encryptedSegmentSizeDefault: defaultSegmentSize, rootSignature, segmentHashAlg, segments, } = manifest.encryptionInformation.integrityInformation;
|
|
774
|
+
const { metadata, reconstructedKeyBinary } = await unwrapKey({
|
|
775
|
+
manifest,
|
|
776
|
+
authProvider: cfg.authProvider,
|
|
777
|
+
allowedKases: allowList,
|
|
778
|
+
dpopKeys: cfg.dpopKeys,
|
|
779
|
+
entity: cfg.entity,
|
|
780
|
+
cryptoService: cfg.cryptoService,
|
|
781
|
+
});
|
|
782
|
+
// async function unwrapKey(manifest: Manifest, allowedKases: string[], authProvider: AuthProvider | AppIdAuthProvider, publicKey: string, privateKey: string, entity: EntityObject) {
|
|
783
|
+
const keyForDecryption = await cfg.keyMiddleware(reconstructedKeyBinary);
|
|
784
|
+
const encryptedSegmentSizeDefault = defaultSegmentSize || DEFAULT_SEGMENT_SIZE;
|
|
785
|
+
// check the combined string of hashes
|
|
786
|
+
const aggregateHash = segments.map(({ hash }) => base64.decode(hash)).join('');
|
|
787
|
+
const integrityAlgorithm = rootSignature.alg;
|
|
788
|
+
if (integrityAlgorithm !== 'GMAC' && integrityAlgorithm !== 'HS256') {
|
|
789
|
+
throw new UnsupportedError(`Unsupported integrity alg [${integrityAlgorithm}]`);
|
|
790
|
+
}
|
|
791
|
+
const payloadSigStr = await getSignature(keyForDecryption, Binary.fromString(aggregateHash), integrityAlgorithm, cfg.cryptoService);
|
|
792
|
+
if (manifest.encryptionInformation.integrityInformation.rootSignature.sig !==
|
|
793
|
+
base64.encode(payloadSigStr)) {
|
|
794
|
+
throw new IntegrityError('Failed integrity check on root signature');
|
|
795
|
+
}
|
|
796
|
+
if (!cfg.noVerifyAssertions) {
|
|
797
|
+
for (const assertion of manifest.assertions || []) {
|
|
798
|
+
// Create a default assertion key
|
|
799
|
+
let assertionKey = {
|
|
800
|
+
alg: 'HS256',
|
|
801
|
+
key: new Uint8Array(reconstructedKeyBinary.asArrayBuffer()),
|
|
802
|
+
};
|
|
803
|
+
if (cfg.assertionVerificationKeys) {
|
|
804
|
+
const foundKey = cfg.assertionVerificationKeys.Keys[assertion.id];
|
|
805
|
+
if (foundKey) {
|
|
806
|
+
assertionKey = foundKey;
|
|
807
|
+
}
|
|
808
|
+
}
|
|
809
|
+
await assertions.verify(assertion, aggregateHash, assertionKey);
|
|
810
|
+
}
|
|
811
|
+
}
|
|
812
|
+
let mapOfRequestsOffset = 0;
|
|
813
|
+
const chunkMap = new Map(segments.map(({ hash, encryptedSegmentSize = encryptedSegmentSizeDefault }) => {
|
|
814
|
+
const result = (() => {
|
|
815
|
+
let _resolve, _reject;
|
|
816
|
+
const chunk = {
|
|
817
|
+
hash,
|
|
818
|
+
encryptedOffset: mapOfRequestsOffset,
|
|
819
|
+
encryptedSegmentSize,
|
|
820
|
+
promise: new Promise((resolve, reject) => {
|
|
821
|
+
_resolve = resolve;
|
|
822
|
+
_reject = reject;
|
|
823
|
+
}),
|
|
824
|
+
};
|
|
825
|
+
chunk._resolve = _resolve;
|
|
826
|
+
chunk._reject = _reject;
|
|
827
|
+
return chunk;
|
|
828
|
+
})();
|
|
829
|
+
mapOfRequestsOffset += encryptedSegmentSize || encryptedSegmentSizeDefault;
|
|
830
|
+
return [hash, result];
|
|
831
|
+
}));
|
|
832
|
+
const cipher = new AesGcmCipher(cfg.cryptoService);
|
|
833
|
+
const segmentIntegrityAlg = segmentHashAlg || integrityAlgorithm;
|
|
834
|
+
if (segmentIntegrityAlg !== 'GMAC' && segmentIntegrityAlg !== 'HS256') {
|
|
835
|
+
throw new UnsupportedError(`Unsupported segment hash alg [${segmentIntegrityAlg}]`);
|
|
836
|
+
}
|
|
837
|
+
// Not waiting for Promise to resolve
|
|
838
|
+
updateChunkQueue(Array.from(chunkMap.values()), centralDirectory, zipReader, keyForDecryption, cipher, segmentIntegrityAlg, cfg.cryptoService);
|
|
839
|
+
let progress = 0;
|
|
840
|
+
const underlyingSource = {
|
|
841
|
+
pull: async (controller) => {
|
|
842
|
+
if (chunkMap.size === 0) {
|
|
843
|
+
controller.close();
|
|
844
|
+
return;
|
|
845
|
+
}
|
|
846
|
+
const [hash, chunk] = chunkMap.entries().next().value;
|
|
847
|
+
if (!chunk.decryptedChunk) {
|
|
848
|
+
await chunk.promise;
|
|
849
|
+
}
|
|
850
|
+
const decryptedSegment = chunk.decryptedChunk;
|
|
851
|
+
controller.enqueue(new Uint8Array(decryptedSegment.payload.asByteArray()));
|
|
852
|
+
progress += chunk.encryptedSegmentSize;
|
|
853
|
+
cfg.progressHandler?.(progress);
|
|
854
|
+
chunk.decryptedChunk = null;
|
|
855
|
+
chunkMap.delete(hash);
|
|
856
|
+
},
|
|
857
|
+
...(cfg.fileStreamServiceWorker && { fileStreamServiceWorker: cfg.fileStreamServiceWorker }),
|
|
858
|
+
};
|
|
859
|
+
const outputStream = new DecoratedReadableStream(underlyingSource);
|
|
860
|
+
outputStream.manifest = manifest;
|
|
861
|
+
outputStream.emit('manifest', manifest);
|
|
862
|
+
outputStream.metadata = metadata;
|
|
863
|
+
outputStream.emit('rewrap', metadata);
|
|
864
|
+
return outputStream;
|
|
865
|
+
}
|
|
866
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"tdf.js","sourceRoot":"","sources":["../../../../tdf3/src/tdf.ts"],"names":[],"mappings":"AAAA,OAAO,KAAqB,MAAM,OAAO,CAAC;AAC1C,OAAO,EAAE,QAAQ,EAAE,MAAM,yBAAyB,CAAC;AACnD,OAAO,EAAE,UAAU,EAAE,UAAU,EAAE,MAAM,MAAM,CAAC;AAC9C,OAAO,EAAE,uBAAuB,EAAE,MAAM,qCAAqC,CAAC;AAE9E,OAAO,EAAE,oBAAoB,EAAE,iBAAiB,EAAE,MAAM,oBAAoB,CAAC;AAG7E,OAAO,KAAK,UAAU,MAAM,iBAAiB,CAAC;AAE9C,OAAO,EAEL,QAAQ,IAAI,iBAAiB,EAK7B,MAAM,IAAI,eAAe,EAGzB,OAAO,IAAI,gBAAgB,GAI5B,MAAM,mBAAmB,CAAC;AAC3B,OAAO,EAAE,MAAM,EAAE,MAAM,8BAA8B,CAAC;AACtD,OAAO,EAEL,SAAS,EACT,SAAS,EACT,cAAc,EACd,oBAAoB,EACpB,QAAQ,EACR,YAAY,EACZ,WAAW,GACZ,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,MAAM,EAAE,MAAM,aAAa,CAAC;AACrC,OAAO,EAA2C,eAAe,EAAE,MAAM,qBAAqB,CAAC;AAC/F,OAAO,EACL,kBAAkB,EAClB,YAAY,EACZ,gBAAgB,EAChB,cAAc,EACd,YAAY,EACZ,qBAAqB,EACrB,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,cAAc,EACd,uBAAuB,IAAI,gBAAgB,GAC5C,MAAM,qBAAqB,CAAC;AAC7B,OAAO,EAAE,mBAAmB,EAAE,MAAM,sBAAsB,CAAC;AAE3D,eAAe;AACf,4GAA4G;AAC5G,OAAO,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAC;AAClD,OAAO,EAKL,YAAY,GACb,MAAM,wBAAwB,CAAC;AAMhC,0CAA0C;AAC1C,MAAM,oBAAoB,GAAG,IAAI,GAAG,IAAI,CAAC;AAgIzC;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CACrC,GAAW,EACX,SAAiC;IAEjC,IAAI,CAAC,GAAG,EAAE;QACR,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,CAAC,CAAC;KAC1D;IACD,uDAAuD;IACvD,iBAAiB,CAAC,GAAG,CAAC,CAAC;IACvB,MAAM,UAAU,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,SAAS,EAAE,SAAS,IAAI,UAAU,EAAE,CAAC;IACpE,MAAM,MAAM,GAAuB,EAAE,CAAC;IACtC,IAAI,SAAS,EAAE;QACb,MAAM,CAAC,SAAS,GAAG,SAAS,CAAC;KAC9B;IACD,MAAM,KAAK,GAAG,GAAG,GAAG,oBAAoB,CAAC;IACzC,IAAI;QACF,MAAM,QAAQ,GAAwC,MAAM,KAAK,CAAC,GAAG,CAAC,KAAK,EAAE;YAC3E,MAAM,EAAE;gBACN,GAAG,MAAM;gBACT,CAAC,EAAE,GAAG;aACP;SACF,CAAC,CAAC;QACH,MAAM,SAAS,GACb,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ;YAC/B,CAAC,CAAC,MAAM,uBAAuB,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC9C,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,CAAC;QAC9B,OAAO;YACL,SAAS;YACT,GAAG,EAAE,oBAAoB,CAAC,SAAS,CAAC;YACpC,GAAG,UAAU;YACb,GAAG,CAAC,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ,IAAI,QAAQ,CAAC,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;SAC1F,CAAC;KACH;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,MAAM,GAAG,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC;QACvC,QAAQ,MAAM,EAAE;YACd,KAAK,GAAG,CAAC;YACT,KAAK,GAAG;gBACN,uCAAuC;gBACvC,MAAM;YACR,KAAK,GAAG;gBACN,MAAM,IAAI,oBAAoB,CAAC,IAAI,KAAK,iBAAiB,EAAE,KAAK,CAAC,CAAC;YACpE,KAAK,GAAG;gBACN,MAAM,IAAI,qBAAqB,CAAC,IAAI,KAAK,qBAAqB,EAAE,KAAK,CAAC,CAAC;YACzE;gBACE,IAAI,MAAM,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,GAAG,GAAG,EAAE;oBAC3C,MAAM,IAAI,kBAAkB,CAC1B,IAAI,KAAK,oBAAoB,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACzE,KAAK,CACN,CAAC;iBACH;gBACD,MAAM,IAAI,YAAY,CACpB,IAAI,KAAK,YAAY,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACjE,KAAK,CACN,CAAC;SACL;KACF;IACD,uBAAuB;IACvB,MAAM,KAAK,GAAG,GAAG,GAAG,iBAAiB,CAAC;IACtC,IAAI;QACF,MAAM,QAAQ,GAAwC,MAAM,KAAK,CAAC,GAAG,CAAC,KAAK,EAAE;YAC3E,MAAM;SACP,CAAC,CAAC;QACH,MAAM,SAAS,GACb,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ;YAC/B,CAAC,CAAC,MAAM,uBAAuB,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC9C,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,CAAC;QAC9B,yDAAyD;QACzD,OAAO;YACL,SAAS;YACT,GAAG,EAAE,oBAAoB,CAAC,SAAS,CAAC;YACpC,GAAG,UAAU;YACb,GAAG,CAAC,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ,IAAI,QAAQ,CAAC,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;SAC1F,CAAC;KACH;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,MAAM,GAAG,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC;QACvC,QAAQ,MAAM,EAAE;YACd,KAAK,GAAG;gBACN,MAAM,IAAI,oBAAoB,CAAC,IAAI,KAAK,iBAAiB,EAAE,KAAK,CAAC,CAAC;YACpE,KAAK,GAAG;gBACN,MAAM,IAAI,qBAAqB,CAAC,IAAI,KAAK,qBAAqB,EAAE,KAAK,CAAC,CAAC;YACzE;gBACE,IAAI,MAAM,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,GAAG,GAAG,EAAE;oBAC3C,MAAM,IAAI,kBAAkB,CAC1B,IAAI,KAAK,oBAAoB,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACzE,KAAK,CACN,CAAC;iBACH;gBACD,MAAM,IAAI,YAAY,CACpB,IAAI,KAAK,YAAY,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACjE,KAAK,CACN,CAAC;SACL;KACF;AACH,CAAC;AACD;;;;;;GAMG;AACH,MAAM,UAAU,QAAQ,CACtB,OAAmB,EACnB,QAA2B,EAC3B,WAAmB;IAEnB,MAAM,EAAE,MAAM,EAAE,GAAG,IAAI,GAAG,CAAC,WAAW,CAAC,CAAC;IACxC,MAAM,cAAc,GAAW,OAAO,QAAQ,KAAK,QAAQ,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;IAElG,MAAM,cAAc,GAAG,mBAAmB,CAAC;QACzC,WAAW;QACX,eAAe,EAAE,MAAM;QACvB,QAAQ,EAAE,MAAM,CAAC,MAAM,CAAC,cAAc,CAAC;QACvC,OAAO,EAAE,YAAY,CAAC,OAAO,EAAE,QAAQ,CAAC;KACzC,CAAC,CAAC;IAEH,OAAO,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;AAClD,CAAC;AAED,MAAM,UAAU,UAAU,CAAC,WAAuD;IAChF,IAAI,IAAI,CAAC;IACT,IAAI,WAAW,YAAY,WAAW,IAAI,WAAW,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE;QACzE,IAAI,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;KAC9C;SAAM;QACL,IAAI,GAAG,WAAW,CAAC,QAAQ,EAAE,CAAC;KAC/B;IACD,MAAM,SAAS,GAAG,uEAAuE,CAAC;IAC1F,MAAM,QAAQ,GAAG,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtC,IAAI,QAAQ,KAAK,IAAI,EAAE;QACrB,MAAM,IAAI,gBAAgB,CAAC,oBAAoB,CAAC,CAAC;KAClD;IACD,MAAM,aAAa,GAAG,QAAQ,CAAC,CAAC,CAAC,CAAC;IAClC,IAAI;QACF,OAAO,cAAc,CAAC,aAAa,CAAC,CAAC;KACtC;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,IAAI,gBAAgB,CAAC,iDAAiD,EAAE,CAAC,CAAC,CAAC;KAClF;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,uBAAuB,CAAC,SAAiB;IAC7D,IAAI,GAAG,GAAW,SAAS,CAAC;IAE5B,wEAAwE;IACxE,yCAAyC;IACzC,IAAI,SAAS,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE;QACrC,MAAM,IAAI,GAAG,MAAM,UAAU,CAAC,SAAS,EAAE,OAAO,EAAE,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC;QACzE,GAAG,GAAG,MAAM,UAAU,CAAC,IAAI,CAAC,CAAC;KAC9B;IAED,OAAO,GAAG,CAAC;AACb,CAAC;AAED;;;;;;;;;;;;;GAaG;AACH,MAAM,CAAC,KAAK,UAAU,cAAc,CAAC,EACnC,YAAY,EACZ,IAAI,EACJ,GAAG,EACH,SAAS,EACT,GAAG,EACH,YAAY,EACZ,QAAQ,EACR,GAAG,GAAG,EAAE,GACO;IACf,uCAAuC;IACvC,SAAS,eAAe,CACtB,IAAmB,EACnB,MAAc,EACd,gBAAoC,EACpC,MAAc,EACd,QAAmB;QAEnB,QAAQ,IAAI,EAAE;YACZ,KAAK,SAAS;gBACZ,OAAO,IAAI,gBAAgB,CAAC,MAAM,EAAE,gBAAgB,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,CAAC,CAAC;YAC/E,KAAK,QAAQ;gBACX,OAAO,IAAI,eAAe,CAAC,MAAM,EAAE,gBAAgB,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,CAAC,CAAC;YAC9E;gBACE,MAAM,IAAI,kBAAkB,CAAC,mCAAmC,IAAI,aAAa,CAAC,CAAC;SACtF;IACH,CAAC;IAED,8DAA8D;IAC9D,IAAI,YAAY,IAAI,YAAY,EAAE;QAChC,MAAM,IAAI,GAAG,YAAY,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAC5C,IAAI,IAAI,IAAI,IAAI,CAAC,MAAM,IAAI,IAAI,CAAC,MAAM,EAAE;YACtC,OAAO,eAAe,CAAC,IAAI,EAAE,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;SAC5E;KACF;IAED,yEAAyE;IACzE,IAAI,GAAG,IAAI,SAAS,EAAE;QACpB,OAAO,eAAe,CAAC,IAAI,EAAE,GAAG,EAAE,GAAG,EAAE,MAAM,uBAAuB,CAAC,SAAS,CAAC,EAAE,QAAQ,CAAC,CAAC;KAC5F;IAED,mEAAmE;IACnE,MAAM,WAAW,GAAG,YAAY,EAAE,UAAU,EAAE,CAAC;IAC/C,IAAI,WAAW,EAAE;QACf,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,GAAG,WAAW,CAAC;QACvC,IAAI,MAAM,IAAI,MAAM,EAAE;YACpB,OAAO,eAAe,CAAC,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,uBAAuB,CAAC,MAAM,CAAC,EAAE,QAAQ,CAAC,CAAC;SAC5F;KACF;IACD,8BAA8B;IAC9B,MAAM,IAAI,kBAAkB,CAAC,oDAAoD,CAAC,CAAC;AACrF,CAAC;AAED,MAAM,UAAU,oBAAoB,CAAC,MAAc;IACjD,MAAM,aAAa,GAAa,EAAE,CAAC;IAEnC,IAAI,CAAC,MAAM,CAAC,IAAI;QAAE,aAAa,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAC7C,IAAI,CAAC,MAAM,CAAC,IAAI;QAAE,aAAa,CAAC,IAAI,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;IAC5D,IAAI,MAAM,CAAC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM;QAAE,aAAa,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IAE1E,IAAI,aAAa,CAAC,MAAM,EAAE;QACxB,MAAM,IAAI,kBAAkB,CAC1B,8DAA8D,aAAa,EAAE,CAC9E,CAAC;KACH;AACH,CAAC;AAED,KAAK,UAAU,iBAAiB,CAC9B,OAAgB,EAChB,qBAA+B,EAC/B,MAAc,EACd,QAA4B;IAE5B,8CAA8C;IAC9C,MAAM,OAAO,GAAG;QACd,IAAI,EAAE,WAAW;QACjB,GAAG,EAAE,WAAW;QAChB,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,IAAI;QACjB,aAAa,EAAE,OAAO;QACtB,GAAG,CAAC,QAAQ,IAAI,EAAE,QAAQ,EAAE,CAAC;KAC9B,CAAC;IAEF,MAAM,wBAAwB,GAAG,MAAM,qBAAqB,CAAC,KAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACpF,MAAM,UAAU,GAA2B,EAAE,CAAC;IAC9C,OAAO;QACL,OAAO;QACP,yEAAyE;QACzE,qBAAqB,EAAE,wBAAwB;QAC/C,UAAU,EAAE,UAAU;KACvB,CAAC;AACJ,CAAC;AAED,KAAK,UAAU,YAAY,CACzB,kBAA0B,EAC1B,aAAqB,EACrB,aAAiC,EACjC,aAA4B;IAE5B,QAAQ,aAAa,CAAC,WAAW,EAAE,EAAE;QACnC,KAAK,MAAM;YACT,oDAAoD;YACpD,OAAO,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,EAAE,KAAK,CAAC,CAAC;QACtF,KAAK,OAAO;YACV,6BAA6B;YAC7B,OAAO,MAAM,aAAa,CAAC,IAAI,CAC7B,YAAY,CAAC,IAAI,UAAU,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC,EAAE,KAAK,CAAC,EACvE,YAAY,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,aAAa,EAAE,CAAC,EAAE,OAAO,CAAC,CACrE,CAAC;QACJ;YACE,MAAM,IAAI,kBAAkB,CAAC,8BAA8B,aAAa,GAAG,CAAC,CAAC;KAChF;AACH,CAAC;AAED,SAAS,YAAY,CAAC,MAAkB,EAAE,GAAW,EAAE,IAAc;IACnE,OAAO;QACL,OAAO,EAAE,EAAE;QACX,MAAM,EAAE,MAAM;QACd,GAAG,EAAE,GAAG;QACR,IAAI;KACL,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,MAAM,CAAC,EAC3B,YAAY,EACZ,SAAS,EACT,YAAY,EACZ,MAAM,EACN,UAAU,EACV,eAAe,EACf,UAAU,GACU;IACpB,MAAM,OAAO,GAAG,CAAC,GAAG,EAAE;QACpB,IAAI,SAAS,EAAE;YACb,OAAO,SAAS,CAAC;SAClB;QACD,IAAI,CAAC,YAAY,EAAE;YACjB,MAAM,IAAI,kBAAkB,CAAC,yCAAyC,CAAC,CAAC;SACzE;QACD,OAAO,IAAI,eAAe,CAAC,YAAY,CAAC,CAAC;IAC3C,CAAC,CAAC,EAAE,CAAC;IACL,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,GAAG,eAAe,CAAC,qBAAqB,CAAC;IACpE,MAAM,eAAe,GAAG,YAAY,IAAI,oBAAoB,CAAC,YAAY,CAAC,CAAC;IAC3E,IAAI,YAAY,KAAK,SAAS,EAAE;QAC9B,MAAM,IAAI,kBAAkB,CAAC,6CAA6C,CAAC,CAAC;KAC7E;IACD,OAAO,OAAO,CAAC,GAAG,CAChB,SAAS,CAAC,GAAG,CAAC,KAAK,EAAE,eAAe,EAAE,EAAE;QACtC,2EAA2E;QAC3E,MAAM,QAAQ,GAAG,iBAAiB,CAAC,eAAe,CAAC,CAAC;QACpD,IAAI,CAAC,UAAU,IAAI,CAAC,QAAQ,EAAE;YAC5B,OAAO;SACR;QAED,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE;YACxC,MAAM,IAAI,cAAc,CAAC,wBAAwB,eAAe,CAAC,GAAG,GAAG,CAAC,CAAC;SAC1E;QAED,MAAM,GAAG,GAAG,GAAG,eAAe,CAAC,GAAG,IAAI,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,QAAQ,CAAC;QAE3E,2DAA2D;QAC3D,sFAAsF;QACtF,MAAM,IAAI,GAA4B;YACpC,SAAS,EAAE,eAAe;YAC1B,MAAM,EAAE,eAAe,CAAC,qBAAqB,CAAC,MAAM;YACpD,MAAM,EAAE,oBAAoB,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS;YAC/D,SAAS,EAAE,SAAS;YACpB,sBAAsB,EAAE,SAAS;SAClC,CAAC;QAEF,IAAI,oBAAoB,CAAC,YAAY,CAAC,EAAE;YACtC,IAAI,CAAC,SAAS,GAAG,MAAM,YAAY,CAAC,EAAE,EAAE,UAAU,CAAC,CAAC;SACrD;aAAM;YACL,IAAI,CAAC,sBAAsB,GAAG,MAAM,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;SACpE;QACD,MAAM,OAAO,GAAG,MAAM,YAAY,CAAC,SAAS,CAAC,YAAY,CAAC,MAAM,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC,CAAC;QAE9E,IAAI;YACF,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,EAAE;gBAC3D,OAAO,EAAE,OAAO,CAAC,OAAO;aACzB,CAAC,CAAC;YAEH,0FAA0F;YAC1F,eAAe;YACf,OAAO,eAAe,CAAC,UAAU,CAAC;YAClC,OAAO,eAAe,CAAC,iBAAiB,CAAC;YACzC,OAAO,eAAe,CAAC,aAAa,CAAC;YAErC,IAAI,QAAQ,EAAE;gBACZ,2EAA2E;gBAC3E,MAAM,aAAa,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBACxD,eAAe,CAAC,qBAAqB,CAAC,MAAM,GAAG,MAAM,CAAC,MAAM,CAC1D,IAAI,CAAC,SAAS,CAAC,EAAE,IAAI,EAAE,aAAa,CAAC,IAAI,EAAE,CAAC,CAC7C,CAAC;aACH;YACD,OAAO,QAAQ,CAAC,IAAI,CAAC;SACtB;QAAC,OAAO,CAAC,EAAE;YACV,IAAI,CAAC,CAAC,QAAQ,EAAE;gBACd,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,IAAI,GAAG,EAAE;oBAC5B,MAAM,IAAI,YAAY,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC;iBAC7C;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,qBAAqB,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC;iBACtD;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,oBAAoB,CAAC,qBAAqB,EAAE,CAAC,CAAC,CAAC;iBAC1D;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,kBAAkB,CAAC,kDAAkD,EAAE,CAAC,CAAC,CAAC;iBACrF;qBAAM;oBACL,MAAM,IAAI,YAAY,CAAC,qBAAqB,EAAE,CAAC,CAAC,CAAC;iBAClD;aACF;iBAAM,IAAI,CAAC,CAAC,OAAO,EAAE;gBACpB,MAAM,IAAI,YAAY,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC;aACrD;YACD,MAAM,IAAI,QAAQ,CAChB,mDAAmD,CAAC,CAAC,IAAI,KAAK,CAAC,CAAC,OAAO,iBAAiB,CAAC,EAAE,QAAQ,EAAE,IAAI,GAAG,EAC5G,CAAC,CACF,CAAC;SACH;IACH,CAAC,CAAC,CACH,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,WAAW,CAAC,GAAyB;IACzD,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE;QACrB,MAAM,IAAI,kBAAkB,CAAC,qCAAqC,CAAC,CAAC;KACrE;IACD,IAAI,CAAC,GAAG,CAAC,aAAa,EAAE;QACtB,MAAM,IAAI,kBAAkB,CAAC,yBAAyB,CAAC,CAAC;KACzD;IAED,4DAA4D;IAC5D,MAAM,YAAY,GAAc,EAAE,CAAC;IAEnC,GAAG,CAAC,SAAS,KAAK,MAAM,CAAC,gBAAgB,CAAC;IAE1C,MAAM,UAAU,GAAgB;QAC9B;YACE,QAAQ,EAAE,WAAW;SACtB;QACD;YACE,QAAQ,EAAE,iBAAiB;SAC5B;KACF,CAAC;IAEF,IAAI,aAAa,GAAG,IAAI,UAAU,EAAE,CAAC;IAErC,IAAI,cAAc,GAAG,CAAC,CAAC;IACvB,IAAI,cAAc,GAAG,CAAC,CAAC;IACvB,IAAI,UAAU,GAAG,CAAC,CAAC;IACnB,IAAI,aAAa,GAAG,CAAC,CAAC;IACtB,IAAI,aAAa,GAAG,EAAE,CAAC;IAEvB,MAAM,SAAS,GAAG,IAAI,SAAS,EAAE,CAAC;IAClC,MAAM,QAAQ,GAAG,MAAM,iBAAiB,CACtC,GAAG,CAAC,cAAc,EAClB,GAAG,CAAC,qBAAqB,EACzB,GAAG,CAAC,MAAM,EACV,GAAG,CAAC,QAAQ,CACb,CAAC;IAEF,IAAI,CAAC,QAAQ,EAAE;QACb,2CAA2C;QAC3C,MAAM,IAAI,kBAAkB,CAAC,gEAAgE,CAAC,CAAC;KAChG;IACD,MAAM,SAAS,GAAG,GAAG,CAAC,QAAQ,CAAC,UAAU,CAAC;IAE1C,qDAAqD;IACrD,MAAM,cAAc,GAAG,MAAM,MAAM,CAAC;QAClC,YAAY,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,YAAY;QAC1D,SAAS,EAAE,GAAG,CAAC,SAAS;QACxB,YAAY,EAAE,GAAG,CAAC,YAAY;QAC9B,MAAM,EAAE,GAAG,CAAC,MAAM;QAClB,UAAU,EAAE,SAAS;QACrB,eAAe,EAAE,QAAQ;KAC1B,CAAC,CAAC;IAEH,yDAAyD;IACzD,MAAM,EAAE,kBAAkB,EAAE,GAAG,GAAG,CAAC;IACnC,MAAM,eAAe,GAAG,MAAM,GAAG,CAAC,qBAAqB,CAAC,OAAO,CAC7D,MAAM,CAAC,eAAe,CAAC,IAAI,WAAW,CAAC,kBAAkB,CAAC,CAAC,EAC3D,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CACxC,CAAC;IACF,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;IAC5E,MAAM,2BAA2B,GAAG,aAAa,CAAC,MAAM,CAAC;IAEzD,4BAA4B;IAC5B,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,WAAW,CAAC;IACrC,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,GAAG,cAAc,CAAC;IACtC,MAAM,YAAY,GAAG,GAAG,CAAC,aAAa,CAAC,SAAS,EAAE,CAAC;IAEnD;;;;;;;MAOE;IACF,MAAM,eAAe,GAAG;QACtB,KAAK,EAAE,CAAC,UAA2C,EAAE,EAAE;YACrD,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;YACtD,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;YAC/C,UAAU,GAAG,CAAC,CAAC;YACf,aAAa,GAAG,CAAC,CAAC;QACpB,CAAC;QAED,IAAI,EAAE,KAAK,EAAE,UAA2C,EAAE,EAAE;YAC1D,IAAI,MAAM,CAAC;YAEX,OAAO,aAAa,CAAC,MAAM,GAAG,kBAAkB,IAAI,CAAC,MAAM,EAAE;gBAC3D,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,GAAG,MAAM,YAAY,CAAC,IAAI,EAAE,CAAC;gBAClD,MAAM,GAAG,IAAI,CAAC;gBACd,IAAI,KAAK,EAAE;oBACT,aAAa,GAAG,WAAW,CAAC,CAAC,aAAa,EAAE,KAAK,CAAC,CAAC,CAAC;iBACrD;aACF;YAED,OACE,aAAa,CAAC,MAAM,IAAI,kBAAkB;gBAC1C,CAAC,CAAC,UAAU,CAAC,WAAW;gBACxB,UAAU,CAAC,WAAW,GAAG,CAAC,EAC1B;gBACA,MAAM,OAAO,GAAG,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,kBAAkB,CAAC,CAAC;gBAC3D,MAAM,gBAAgB,GAAG,MAAM,uBAAuB,CAAC,OAAO,CAAC,CAAC;gBAChE,UAAU,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;gBAErC,aAAa,GAAG,aAAa,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;aACzD;YAED,MAAM,gBAAgB,GAAG,MAAM,IAAI,aAAa,CAAC,MAAM,CAAC;YAExD,IAAI,gBAAgB,EAAE;gBACpB,MAAM,gBAAgB,GAAG,MAAM,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBACtE,UAAU,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;gBACrC,aAAa,GAAG,IAAI,UAAU,EAAE,CAAC;aAClC;YAED,IAAI,MAAM,IAAI,aAAa,CAAC,MAAM,KAAK,CAAC,EAAE;gBACxC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,GAAG,UAAU,CAAC;gBACtC,UAAU,CAAC,CAAC,CAAC,CAAC,aAAa,GAAG,aAAa,CAAC;gBAC5C,MAAM,qBAAqB,GAAG,SAAS,CAAC,mBAAmB,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;gBAEvF,UAAU,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC;gBAC1C,WAAW,CAAC,qBAAqB,CAAC,CAAC;gBAEnC,uBAAuB;gBACvB,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,iBAAiB,CAAC;gBAC3C,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,GAAG,cAAc,CAAC;gBACtC,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;gBACtD,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;gBAC/C,UAAU,GAAG,CAAC,CAAC;gBACf,aAAa,GAAG,CAAC,CAAC;gBAElB,gCAAgC;gBAChC,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,EACvC,MAAM,CAAC,UAAU,CAAC,aAAa,CAAC,EAChC,GAAG,CAAC,kBAAkB,EACtB,GAAG,CAAC,aAAa,CAClB,CAAC;gBACF,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;oBACnE,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;gBAC/B,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;oBACnE,GAAG,CAAC,kBAAkB,CAAC;gBAEzB,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;gBAC5F,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,2BAA2B;oBAC7E,2BAA2B,CAAC;gBAC9B,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,cAAc;oBAChE,GAAG,CAAC,yBAAyB,CAAC;gBAChC,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,QAAQ,GAAG,YAAY,CAAC;gBAE5E,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;gBAE1D,MAAM,gBAAgB,GAA2B,EAAE,CAAC;gBACpD,IAAI,GAAG,CAAC,gBAAgB,IAAI,GAAG,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE;oBAC3D,MAAM,OAAO,CAAC,GAAG,CACf,GAAG,CAAC,gBAAgB,CAAC,GAAG,CAAC,KAAK,EAAE,eAAe,EAAE,EAAE;wBACjD,oDAAoD;wBACpD,MAAM,UAAU,GAAiB,eAAe,CAAC,UAAU,IAAI;4BAC7D,GAAG,EAAE,OAAO;4BACZ,GAAG,EAAE,IAAI,UAAU,CAAC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC;yBAC7E,CAAC;wBACF,MAAM,SAAS,GAAG,MAAM,UAAU,CAAC,eAAe,CAAC,aAAa,EAAE;4BAChE,GAAG,eAAe;4BAClB,UAAU;yBACX,CAAC,CAAC;wBAEH,qDAAqD;wBACrD,gBAAgB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;oBACnC,CAAC,CAAC,CACH,CAAC;iBACH;gBAED,QAAQ,CAAC,UAAU,GAAG,gBAAgB,CAAC;gBAEvC,qBAAqB;gBACrB,MAAM,cAAc,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC,CAAC;gBAC1E,UAAU,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;gBACnC,WAAW,CAAC,cAAc,CAAC,CAAC;gBAC5B,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,GAAG,UAAU,CAAC;gBACtC,UAAU,CAAC,CAAC,CAAC,CAAC,aAAa,GAAG,aAAa,CAAC;gBAC5C,MAAM,sBAAsB,GAAG,SAAS,CAAC,mBAAmB,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;gBACxF,UAAU,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC;gBAC3C,WAAW,CAAC,sBAAsB,CAAC,CAAC;gBAEpC,kCAAkC;gBAClC,MAAM,yBAAyB,GAAG,cAAc,CAAC;gBACjD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;oBAC1C,MAAM,SAAS,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;oBAChC,MAAM,MAAM,GAAG,SAAS,CAAC,2BAA2B,CAClD,SAAS,CAAC,aAAa,IAAI,CAAC,EAC5B,SAAS,CAAC,QAAQ,EAClB,SAAS,CAAC,MAAM,IAAI,CAAC,EACrB,SAAS,CAAC,UAAU,IAAI,CAAC,EACzB,UAAU,CACX,CAAC;oBACF,UAAU,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;oBAC3B,WAAW,CAAC,MAAM,CAAC,CAAC;iBACrB;gBACD,MAAM,8BAA8B,GAAG,cAAc,GAAG,yBAAyB,CAAC;gBAClF,MAAM,UAAU,GAAG,SAAS,CAAC,gCAAgC,CAC3D,UAAU,CAAC,MAAM,EACjB,8BAA8B,EAC9B,yBAAyB,CAC1B,CAAC;gBACF,UAAU,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC/B,WAAW,CAAC,UAAU,CAAC,CAAC;gBAExB,UAAU,CAAC,KAAK,EAAE,CAAC;aACpB;QACH,CAAC;KACF,CAAC;IAEF,MAAM,eAAe,GAAG,IAAI,uBAAuB,CAAC,eAAe,CAAC,CAAC;IACrE,eAAe,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAEpC,IAAI,cAAc,EAAE;QAClB,eAAe,CAAC,cAAc,GAAG,cAAc,CAAC;QAChD,eAAe,CAAC,OAAO,GAAG,cAAc,CAAC;QACzC,eAAe,CAAC,SAAS,GAAG,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,SAAS,CAAC;KAC7E;IAED,OAAO,eAAe,CAAC;IAEvB,qBAAqB;IACrB,SAAS,SAAS,CAAC,QAAgB;QACjC,OAAO,SAAS,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;IACzD,CAAC;IAED,SAAS,WAAW,CAAC,KAA0B;QAC7C,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;YAC7B,KAAK,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;SACzC;QACD,cAAc,IAAI,KAAK,CAAC,MAAM,CAAC;QAC/B,IAAI,cAAc,GAAG,GAAG,CAAC,SAAS,EAAE;YAClC,MAAM,IAAI,kBAAkB,CAAC,oBAAoB,GAAG,CAAC,SAAS,YAAY,CAAC,CAAC;SAC7E;QACD,mEAAmE;QACnE,UAAU,GAAG,QAAQ,CAAC,KAAK,EAAE,UAAU,CAAC,CAAC;QACzC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;IAChC,CAAC;IAED,KAAK,UAAU,uBAAuB,CAAC,KAAiB;QACtD,cAAc,IAAI,KAAK,CAAC,MAAM,CAAC;QAC/B,GAAG,CAAC,eAAe,EAAE,CAAC,cAAc,CAAC,CAAC;QAEtC,wHAAwH;QACxH,MAAM,eAAe,GAAG,MAAM,GAAG,CAAC,qBAAqB,CAAC,OAAO,CAC7D,MAAM,CAAC,eAAe,CAAC,KAAK,CAAC,MAAM,CAAC,EACpC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CACxC,CAAC;QACF,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;QAC5E,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,EACvC,eAAe,CAAC,OAAO,EACvB,GAAG,CAAC,yBAAyB,EAC7B,GAAG,CAAC,aAAa,CAClB,CAAC;QAEF,mDAAmD;QACnD,aAAa,IAAI,aAAa,CAAC;QAE/B,YAAY,CAAC,IAAI,CAAC;YAChB,IAAI,EAAE,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC;YAClC,WAAW,EAAE,KAAK,CAAC,MAAM,KAAK,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM;YAC3E,oBAAoB,EAClB,aAAa,CAAC,MAAM,KAAK,2BAA2B,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,aAAa,CAAC,MAAM;SAC1F,CAAC,CAAC;QACH,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;QACrE,WAAW,CAAC,MAAM,CAAC,CAAC;QAEpB,OAAO,MAAM,CAAC;IAChB,CAAC;AACH,CAAC;AAED,iFAAiF;AACjF,MAAM,CAAC,KAAK,UAAU,aAAa,CACjC,OAAgB;IAEhB,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,OAAO,CAAC,CAAC;IACzC,MAAM,gBAAgB,GAAG,MAAM,SAAS,CAAC,mBAAmB,EAAE,CAAC;IAC/D,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;IAClF,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,gBAAgB,EAAE,CAAC;AACnD,CAAC;AAED,MAAM,UAAU,uBAAuB,CACrC,SAA4B,EAC5B,YAA6B;IAE7B,MAAM,OAAO,GAAG,CAAC,CAAkB,EAAE,EAAE,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;IACnE,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC,CAAC;IAEhE,MAAM,gBAAgB,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IAClF,IAAI,QAAQ,CAAC,IAAI,GAAG,gBAAgB,CAAC,IAAI,EAAE;QACzC,MAAM,eAAe,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;QAC5F,MAAM,IAAI,cAAc,CACtB,qDAAqD,IAAI,CAAC,SAAS,CAAC;YAClE,GAAG,eAAe;SACnB,CAAC,kBAAkB,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,QAAQ,CAAC,CAAC,EAAE,EACnD,GAAG,eAAe,CACnB,CAAC;KACH;IACD,MAAM,eAAe,GAAoD,MAAM,CAAC,WAAW,CACzF,CAAC,GAAG,QAAQ,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAClC,CAAC;IACF,KAAK,MAAM,GAAG,IAAI,SAAS,EAAE;QAC3B,MAAM,WAAW,GAAG,eAAe,CAAC,GAAG,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC;QACnD,IAAI,GAAG,CAAC,GAAG,IAAI,WAAW,EAAE;YAC1B,MAAM,IAAI,gBAAgB,CACxB,yDAAyD,GAAG,CAAC,GAAG,eAAe,GAAG,CAAC,GAAG,GAAG,CAC1F,CAAC;SACH;QACD,IAAI,OAAO,CAAC,GAAG,CAAC,EAAE;YAChB,WAAW,CAAC,GAAG,CAAC,GAAG,CAAC,GAAG,GAAG,CAAC;SAC5B;KACF;IACD,OAAO,eAAe,CAAC;AACzB,CAAC;AAED,KAAK,UAAU,SAAS,CAAC,EACvB,QAAQ,EACR,YAAY,EACZ,YAAY,EACZ,QAAQ,EACR,MAAM,EACN,aAAa,GAQd;IACC,IAAI,YAAY,KAAK,SAAS,EAAE;QAC9B,MAAM,IAAI,kBAAkB,CAC1B,yEAAyE,CAC1E,CAAC;KACH;IACD,MAAM,EAAE,SAAS,EAAE,GAAG,QAAQ,CAAC,qBAAqB,CAAC;IACrD,MAAM,eAAe,GAAG,uBAAuB,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;IACzE,MAAM,eAAe,GAAG,YAAY,IAAI,oBAAoB,CAAC,YAAY,CAAC,CAAC;IAE3E,KAAK,UAAU,YAAY,CAAC,YAA6B;QACvD,MAAM,GAAG,GAAG,GAAG,YAAY,CAAC,GAAG,IAAI,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,QAAQ,CAAC;QACxE,MAAM,uBAAuB,GAAG,MAAM,aAAa,CAAC,eAAe,CACjE,MAAM,aAAa,CAAC,eAAe,EAAE,CACtC,CAAC;QACF,MAAM,eAAe,GAAG,uBAAuB,CAAC,SAAS,CAAC;QAE1D,MAAM,cAAc,GAAG,IAAI,CAAC,SAAS,CAAC;YACpC,SAAS,EAAE,OAAO;YAClB,SAAS,EAAE,YAAY;YACvB,MAAM,EAAE,QAAQ,CAAC,qBAAqB,CAAC,MAAM;YAC7C,eAAe;SAChB,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,EAAE,WAAW,EAAE,cAAc,EAAE,CAAC;QACnD,MAAM,kBAAkB,GAAG,MAAM,YAAY,CAC3C,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,EACjC,QAAQ,CAAC,UAAU,CACpB,CAAC;QAEF,IAAI,WAAW,CAAC;QAChB,IAAI,eAAe,EAAE;YACnB,WAAW,GAAG;gBACZ,SAAS,EAAE,YAAY;gBACvB,MAAM,EAAE,QAAQ,CAAC,qBAAqB,CAAC,MAAM;gBAC7C,MAAM,EAAE;oBACN,GAAG,MAAM;oBACT,SAAS,EAAE,eAAe;iBAC3B;gBACD,SAAS,EAAE,kBAAkB;aAC9B,CAAC;SACH;aAAM;YACL,WAAW,GAAG;gBACZ,kBAAkB;aACnB,CAAC;SACH;QAED,MAAM,OAAO,GAAG,MAAM,YAAY,CAAC,SAAS,CAAC,YAAY,CAAC,MAAM,EAAE,GAAG,EAAE,WAAW,CAAC,CAAC,CAAC;QACrF,MAAM,EACJ,IAAI,EAAE,EAAE,gBAAgB,EAAE,QAAQ,EAAE,GACrC,GAAG,MAAM,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC;QAE9E,MAAM,GAAG,GAAG,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC;QAC/D,MAAM,kBAAkB,GAAG,MAAM,aAAa,CAAC,qBAAqB,CAClE,GAAG,EACH,uBAAuB,CAAC,UAAU,CACnC,CAAC;QAEF,OAAO;YACL,GAAG,EAAE,IAAI,UAAU,CAAC,kBAAkB,CAAC,WAAW,EAAE,CAAC;YACrD,QAAQ;SACT,CAAC;IACJ,CAAC;IAED,sEAAsE;IACtE,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC;IAEvD,qDAAqD;IACrD,IAAI,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAE;QACvB,MAAM,CAAC,OAAO,CAAC,GAAG,QAAQ,CAAC;QAC3B,MAAM,UAAU,GAAG,eAAe,CAAC,OAAO,CAAC,CAAC;QAE5C,IAAI;YACF,uEAAuE;YACvE,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,GAAG,CAC9B,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,YAAY,EAAE,EAAE;gBACnD,IAAI;oBACF,OAAO,MAAM,YAAY,CAAC,YAAY,CAAC,CAAC;iBACzC;gBAAC,OAAO,CAAC,EAAE;oBACV,4BAA4B;oBAC5B,MAAM,iBAAiB,CAAC,CAAuB,CAAC,CAAC;iBAClD;YACH,CAAC,CAAC,CACH,CAAC;YAEF,MAAM,gBAAgB,GAAG,QAAQ,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC;YAChD,OAAO;gBACL,sBAAsB,EAAE,MAAM,CAAC,eAAe,CAAC,gBAAgB,CAAC;gBAChE,QAAQ,EAAE,MAAM,CAAC,QAAQ;aAC1B,CAAC;SACH;QAAC,OAAO,KAAK,EAAE;YACd,IAAI,KAAK,YAAY,cAAc,EAAE;gBACnC,yBAAyB;gBACzB,MAAM,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,yDAAyD;aACjF;YACD,MAAM,KAAK,CAAC;SACb;KACF;SAAM;QACL,sEAAsE;QACtE,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,GAAG,CACpC,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,OAAO,EAAE,UAAU,CAAC,EAAE,EAAE;YAClE,IAAI,CAAC,UAAU,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,MAAM,EAAE;gBAClD,MAAM,IAAI,cAAc,CACtB,wDAAwD,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,EAAE,EACjF,EAAE,CACH,CAAC;aACH;YAED,IAAI;gBACF,mEAAmE;gBACnE,OAAO,MAAM,OAAO,CAAC,GAAG,CACtB,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,YAAY,EAAE,EAAE;oBACnD,IAAI;wBACF,OAAO,MAAM,YAAY,CAAC,YAAY,CAAC,CAAC;qBACzC;oBAAC,OAAO,CAAC,EAAE;wBACV,MAAM,iBAAiB,CAAC,CAAuB,CAAC,CAAC;qBAClD;gBACH,CAAC,CAAC,CACH,CAAC;aACH;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,KAAK,YAAY,cAAc,EAAE;oBACnC,wCAAwC;oBACxC,MAAM,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,yDAAyD;iBACjF;gBACD,MAAM,KAAK,CAAC;aACb;QACH,CAAC,CAAC,CACH,CAAC;QAEF,2BAA2B;QAC3B,MAAM,gBAAgB,GAAG,QAAQ,CAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;QAClE,OAAO;YACL,sBAAsB,EAAE,MAAM,CAAC,eAAe,CAAC,gBAAgB,CAAC;YAChE,QAAQ,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,gCAAgC;SACrE,CAAC;KACH;AACH,CAAC;AAED,SAAS,iBAAiB,CAAC,KAAyB;IAClD,IAAI,KAAK,CAAC,YAAY,CAAC,KAAK,CAAC,EAAE;QAC7B,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,IAAI,GAAG,EAAE;YAC3D,OAAO,IAAI,YAAY,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;SAClD;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,qBAAqB,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;SAC3D;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,oBAAoB,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC;SAC/D;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,gBAAgB,CACzB,uFAAuF,EACvF,KAAK,CACN,CAAC;SACH;aAAM;YACL,OAAO,IAAI,YAAY,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC;SACvD;KACF;SAAM;QACL,IAAI,KAAK,CAAC,IAAI,KAAK,oBAAoB,IAAI,KAAK,CAAC,IAAI,KAAK,gBAAgB,EAAE;YAC1E,OAAO,IAAI,YAAY,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;SACjE;QACD,OAAO,IAAI,gBAAgB,CACzB,6CAA6C,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,GAAG,EAC5E,KAAK,CACN,CAAC;KACH;AACH,CAAC;AAED,KAAK,UAAU,YAAY,CACzB,cAA0B,EAC1B,sBAA8B,EAC9B,IAAY,EACZ,MAAuB,EACvB,yBAA6C,EAC7C,aAA4B;IAE5B,IAAI,yBAAyB,KAAK,MAAM,IAAI,yBAAyB,KAAK,OAAO,EAAE;KAClF;IACD,MAAM,cAAc,GAAG,MAAM,YAAY,CACvC,sBAAsB,EACtB,MAAM,CAAC,eAAe,CAAC,cAAc,CAAC,MAAM,CAAC,EAC7C,yBAAyB,EACzB,aAAa,CACd,CAAC;IACF,IAAI,IAAI,KAAK,IAAI,CAAC,cAAc,CAAC,EAAE;QACjC,MAAM,IAAI,cAAc,CAAC,wCAAwC,CAAC,CAAC;KACpE;IACD,OAAO,MAAM,MAAM,CAAC,OAAO,CAAC,cAAc,EAAE,sBAAsB,CAAC,CAAC;AACtE,CAAC;AAED,KAAK,UAAU,gBAAgB,CAC7B,QAAiB,EACjB,gBAAoC,EACpC,SAAoB,EACpB,sBAA8B,EAC9B,MAAuB,EACvB,yBAA6C,EAC7C,aAA4B;IAE5B,MAAM,mBAAmB,GAAG,GAAG,CAAC;IAChC,IAAI,QAAQ,GAAG,EAAE,CAAC;IAClB,MAAM,SAAS,GAAG,CAAC,CAAC;IAEpB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,IAAI,mBAAmB,EAAE;QAC7D,IAAI,QAAQ,CAAC,MAAM,KAAK,SAAS,EAAE;YACjC,MAAM,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YAC5B,QAAQ,GAAG,EAAE,CAAC;SACf;QACD,QAAQ,CAAC,IAAI,CACX,CAAC,KAAK,IAAI,EAAE;YACV,IAAI,MAAyB,CAAC;YAE9B,MAAM,KAAK,GAAG,QAAQ,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,GAAG,mBAAmB,CAAC,CAAC;YACzD,IAAI;gBACF,MAAM,UAAU,GAAG,KAAK,CAAC,MAAM,CAC7B,CAAC,UAAU,EAAE,EAAE,oBAAoB,EAAE,EAAE,EAAE,CAAC,UAAU,GAAI,oBAA+B,EACvF,CAAC,CACF,CAAC;gBACF,MAAM,GAAG,MAAM,SAAS,CAAC,iBAAiB,CACxC,gBAAgB,EAChB,WAAW,EACX,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,EACxB,UAAU,CACX,CAAC;aACH;YAAC,OAAO,CAAC,EAAE;gBACV,IAAI,CAAC,YAAY,gBAAgB,EAAE;oBACjC,MAAM,CAAC,CAAC;iBACT;gBACD,MAAM,IAAI,YAAY,CAAC,iCAAiC,EAAE,CAAC,CAAC,CAAC;aAC9D;YACD,IAAI,MAAM,EAAE;gBACV,eAAe,CAAC;oBACd,MAAM;oBACN,aAAa;oBACb,sBAAsB;oBACtB,KAAK;oBACL,MAAM;oBACN,yBAAyB;iBAC1B,CAAC,CAAC;aACJ;QACH,CAAC,CAAC,EAAE,CACL,CAAC;KACH;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,EACpC,MAAM,EACN,sBAAsB,EACtB,KAAK,EACL,MAAM,EACN,aAAa,EACb,yBAAyB,GAQ1B;IACC,KAAK,MAAM,KAAK,IAAI,KAAK,EAAE;QACzB,MAAM,EAAE,eAAe,EAAE,oBAAoB,EAAE,QAAQ,EAAE,OAAO,EAAE,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC;QAElF,MAAM,MAAM,GACV,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,eAAe,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC;QAChG,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,GAAI,oBAA+B,CAAC,CAChE,CAAC;QAEF,IAAI;YACF,MAAM,MAAM,GAAG,MAAM,YAAY,CAC/B,cAAc,EACd,sBAAsB,EACtB,KAAK,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,EACpB,MAAM,EACN,yBAAyB,EACzB,aAAa,CACd,CAAC;YACF,KAAK,CAAC,KAAK,CAAC,CAAC,cAAc,GAAG,MAAM,CAAC;YACrC,IAAI,QAAQ,EAAE;gBACZ,QAAQ,CAAC,IAAI,CAAC,CAAC;aAChB;SACF;QAAC,OAAO,CAAC,EAAE;YACV,IAAI,OAAO,EAAE;gBACX,OAAO,CAAC,CAAC,CAAC,CAAC;aACZ;iBAAM;gBACL,MAAM,CAAC,CAAC;aACT;SACF;KACF;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,UAAU,CAAC,GAAyB;IACxD,IAAI,EAAE,SAAS,EAAE,GAAG,GAAG,CAAC;IACxB,IAAI,CAAC,SAAS,EAAE;QACd,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE;YACrB,MAAM,IAAI,kBAAkB,CAAC,yCAAyC,CAAC,CAAC;SACzE;QACD,SAAS,GAAG,IAAI,eAAe,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;KACnD;IACD,MAAM,EAAE,QAAQ,EAAE,SAAS,EAAE,gBAAgB,EAAE,GAAG,MAAM,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IACnF,IAAI,CAAC,QAAQ,EAAE;QACb,MAAM,IAAI,gBAAgB,CAAC,uBAAuB,CAAC,CAAC;KACrD;IACD,GAAG,CAAC,aAAa,KAAK,KAAK,EAAE,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC;IAEzC,MAAM,EACJ,2BAA2B,EAAE,kBAAkB,EAC/C,aAAa,EACb,cAAc,EACd,QAAQ,GACT,GAAG,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC;IACxD,MAAM,EAAE,QAAQ,EAAE,sBAAsB,EAAE,GAAG,MAAM,SAAS,CAAC;QAC3D,QAAQ;QACR,YAAY,EAAE,GAAG,CAAC,YAAY;QAC9B,YAAY,EAAE,SAAS;QACvB,QAAQ,EAAE,GAAG,CAAC,QAAQ;QACtB,MAAM,EAAE,GAAG,CAAC,MAAM;QAClB,aAAa,EAAE,GAAG,CAAC,aAAa;KACjC,CAAC,CAAC;IACH,sLAAsL;IACtL,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;IACzE,MAAM,2BAA2B,GAAG,kBAAkB,IAAI,oBAAoB,CAAC;IAE/E,sCAAsC;IACtC,MAAM,aAAa,GAAG,QAAQ,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IAC/E,MAAM,kBAAkB,GAAG,aAAa,CAAC,GAAG,CAAC;IAC7C,IAAI,kBAAkB,KAAK,MAAM,IAAI,kBAAkB,KAAK,OAAO,EAAE;QACnE,MAAM,IAAI,gBAAgB,CAAC,8BAA8B,kBAAkB,GAAG,CAAC,CAAC;KACjF;IACD,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,gBAAgB,EAChB,MAAM,CAAC,UAAU,CAAC,aAAa,CAAC,EAChC,kBAAkB,EAClB,GAAG,CAAC,aAAa,CAClB,CAAC;IAEF,IACE,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;QACrE,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,EAC5B;QACA,MAAM,IAAI,cAAc,CAAC,0CAA0C,CAAC,CAAC;KACtE;IAED,IAAI,CAAC,GAAG,CAAC,kBAAkB,EAAE;QAC3B,KAAK,MAAM,SAAS,IAAI,QAAQ,CAAC,UAAU,IAAI,EAAE,EAAE;YACjD,iCAAiC;YACjC,IAAI,YAAY,GAAiB;gBAC/B,GAAG,EAAE,OAAO;gBACZ,GAAG,EAAE,IAAI,UAAU,CAAC,sBAAsB,CAAC,aAAa,EAAE,CAAC;aAC5D,CAAC;YAEF,IAAI,GAAG,CAAC,yBAAyB,EAAE;gBACjC,MAAM,QAAQ,GAAG,GAAG,CAAC,yBAAyB,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;gBAClE,IAAI,QAAQ,EAAE;oBACZ,YAAY,GAAG,QAAQ,CAAC;iBACzB;aACF;YACD,MAAM,UAAU,CAAC,MAAM,CAAC,SAAS,EAAE,aAAa,EAAE,YAAY,CAAC,CAAC;SACjE;KACF;IAED,IAAI,mBAAmB,GAAG,CAAC,CAAC;IAC5B,MAAM,QAAQ,GAAG,IAAI,GAAG,CACtB,QAAQ,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,EAAE,oBAAoB,GAAG,2BAA2B,EAAE,EAAE,EAAE;QAC5E,MAAM,MAAM,GAAG,CAAC,GAAG,EAAE;YACnB,IAAI,QAAQ,EAAE,OAAO,CAAC;YACtB,MAAM,KAAK,GAAU;gBACnB,IAAI;gBACJ,eAAe,EAAE,mBAAmB;gBACpC,oBAAoB;gBACpB,OAAO,EAAE,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;oBACvC,QAAQ,GAAG,OAAO,CAAC;oBACnB,OAAO,GAAG,MAAM,CAAC;gBACnB,CAAC,CAAC;aACH,CAAC;YACF,KAAK,CAAC,QAAQ,GAAG,QAAQ,CAAC;YAC1B,KAAK,CAAC,OAAO,GAAG,OAAO,CAAC;YACxB,OAAO,KAAK,CAAC;QACf,CAAC,CAAC,EAAE,CAAC;QACL,mBAAmB,IAAI,oBAAoB,IAAI,2BAA2B,CAAC;QAC3E,OAAO,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC;IACxB,CAAC,CAAC,CACH,CAAC;IAEF,MAAM,MAAM,GAAG,IAAI,YAAY,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAG,cAAc,IAAI,kBAAkB,CAAC;IACjE,IAAI,mBAAmB,KAAK,MAAM,IAAI,mBAAmB,KAAK,OAAO,EAAE;QACrE,MAAM,IAAI,gBAAgB,CAAC,iCAAiC,mBAAmB,GAAG,CAAC,CAAC;KACrF;IAED,qCAAqC;IACrC,gBAAgB,CACd,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC,EAC7B,gBAAgB,EAChB,SAAS,EACT,gBAAgB,EAChB,MAAM,EACN,mBAAmB,EACnB,GAAG,CAAC,aAAa,CAClB,CAAC;IAEF,IAAI,QAAQ,GAAG,CAAC,CAAC;IACjB,MAAM,gBAAgB,GAAG;QACvB,IAAI,EAAE,KAAK,EAAE,UAA2C,EAAE,EAAE;YAC1D,IAAI,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAE;gBACvB,UAAU,CAAC,KAAK,EAAE,CAAC;gBACnB,OAAO;aACR;YAED,MAAM,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,QAAQ,CAAC,OAAO,EAAE,CAAC,IAAI,EAAE,CAAC,KAAK,CAAC;YACtD,IAAI,CAAC,KAAK,CAAC,cAAc,EAAE;gBACzB,MAAM,KAAK,CAAC,OAAO,CAAC;aACrB;YACD,MAAM,gBAAgB,GAAG,KAAK,CAAC,cAAc,CAAC;YAE9C,UAAU,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,gBAAgB,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC;YAC3E,QAAQ,IAAI,KAAK,CAAC,oBAAoB,CAAC;YACvC,GAAG,CAAC,eAAe,EAAE,CAAC,QAAQ,CAAC,CAAC;YAEhC,KAAK,CAAC,cAAc,GAAG,IAAI,CAAC;YAC5B,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACxB,CAAC;QACD,GAAG,CAAC,GAAG,CAAC,uBAAuB,IAAI,EAAE,uBAAuB,EAAE,GAAG,CAAC,uBAAuB,EAAE,CAAC;KAC7F,CAAC;IAEF,MAAM,YAAY,GAAG,IAAI,uBAAuB,CAAC,gBAAgB,CAAC,CAAC;IAEnE,YAAY,CAAC,QAAQ,GAAG,QAAQ,CAAC;IACjC,YAAY,CAAC,IAAI,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;IACxC,YAAY,CAAC,QAAQ,GAAG,QAAQ,CAAC;IACjC,YAAY,CAAC,IAAI,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;IACtC,OAAO,YAAY,CAAC;AACtB,CAAC"}
|