@opentdf/sdk 0.1.0-beta.1701

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (566) hide show
  1. package/README.md +52 -0
  2. package/dist/cjs/package.json +3 -0
  3. package/dist/cjs/src/access.js +155 -0
  4. package/dist/cjs/src/auth/Eas.js +60 -0
  5. package/dist/cjs/src/auth/auth.js +79 -0
  6. package/dist/cjs/src/auth/oidc-clientcredentials-provider.js +26 -0
  7. package/dist/cjs/src/auth/oidc-externaljwt-provider.js +33 -0
  8. package/dist/cjs/src/auth/oidc-refreshtoken-provider.js +34 -0
  9. package/dist/cjs/src/auth/oidc.js +222 -0
  10. package/dist/cjs/src/auth/providers.js +143 -0
  11. package/dist/cjs/src/encodings/base64.js +154 -0
  12. package/dist/cjs/src/encodings/hex.js +70 -0
  13. package/dist/cjs/src/encodings/index.js +29 -0
  14. package/dist/cjs/src/errors.js +138 -0
  15. package/dist/cjs/src/index.js +344 -0
  16. package/dist/cjs/src/nanotdf/Client.js +296 -0
  17. package/dist/cjs/src/nanotdf/NanoTDF.js +94 -0
  18. package/dist/cjs/src/nanotdf/browser-entry.js +19 -0
  19. package/dist/cjs/src/nanotdf/constants.js +5 -0
  20. package/dist/cjs/src/nanotdf/decrypt.js +17 -0
  21. package/dist/cjs/src/nanotdf/encrypt-dataset.js +38 -0
  22. package/dist/cjs/src/nanotdf/encrypt.js +132 -0
  23. package/dist/cjs/src/nanotdf/enum/CipherEnum.js +13 -0
  24. package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +15 -0
  25. package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +8 -0
  26. package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +11 -0
  27. package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +10 -0
  28. package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +11 -0
  29. package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +29 -0
  30. package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +11 -0
  31. package/dist/cjs/src/nanotdf/index.js +25 -0
  32. package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +3 -0
  33. package/dist/cjs/src/nanotdf/models/Ciphers.js +61 -0
  34. package/dist/cjs/src/nanotdf/models/DefaultParams.js +27 -0
  35. package/dist/cjs/src/nanotdf/models/EcCurves.js +39 -0
  36. package/dist/cjs/src/nanotdf/models/Header.js +255 -0
  37. package/dist/cjs/src/nanotdf/models/Payload.js +158 -0
  38. package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +73 -0
  39. package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +82 -0
  40. package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +38 -0
  41. package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +62 -0
  42. package/dist/cjs/src/nanotdf/models/ResourceLocator.js +211 -0
  43. package/dist/cjs/src/nanotdf/models/Signature.js +77 -0
  44. package/dist/cjs/src/nanotdf-crypto/ciphers.js +17 -0
  45. package/dist/cjs/src/nanotdf-crypto/decrypt.js +24 -0
  46. package/dist/cjs/src/nanotdf-crypto/digest.js +7 -0
  47. package/dist/cjs/src/nanotdf-crypto/ecdsaSignature.js +83 -0
  48. package/dist/cjs/src/nanotdf-crypto/encrypt.js +24 -0
  49. package/dist/cjs/src/nanotdf-crypto/enums.js +52 -0
  50. package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +20 -0
  51. package/dist/cjs/src/nanotdf-crypto/generateKeyPair.js +13 -0
  52. package/dist/cjs/src/nanotdf-crypto/generateRandomNumber.js +12 -0
  53. package/dist/cjs/src/nanotdf-crypto/importRawKey.js +18 -0
  54. package/dist/cjs/src/nanotdf-crypto/index.js +52 -0
  55. package/dist/cjs/src/nanotdf-crypto/keyAgreement.js +91 -0
  56. package/dist/cjs/src/nanotdf-crypto/pemPublicToCrypto.js +225 -0
  57. package/dist/cjs/src/policy/api.js +58 -0
  58. package/dist/cjs/src/policy/attributes.js +3 -0
  59. package/dist/cjs/src/policy/granter.js +146 -0
  60. package/dist/cjs/src/tdf/AttributeObject.js +15 -0
  61. package/dist/cjs/src/tdf/AttributeObjectJwt.js +3 -0
  62. package/dist/cjs/src/tdf/Crypto.js +47 -0
  63. package/dist/cjs/src/tdf/EntityObject.js +3 -0
  64. package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +38 -0
  65. package/dist/cjs/src/tdf/Policy.js +50 -0
  66. package/dist/cjs/src/tdf/PolicyObject.js +3 -0
  67. package/dist/cjs/src/tdf/TypedArray.js +3 -0
  68. package/dist/cjs/src/tdf/index.js +35 -0
  69. package/dist/cjs/src/types/index.js +3 -0
  70. package/dist/cjs/src/utils.js +147 -0
  71. package/dist/cjs/src/version.js +12 -0
  72. package/dist/cjs/tdf3/index.js +57 -0
  73. package/dist/cjs/tdf3/src/assertions.js +118 -0
  74. package/dist/cjs/tdf3/src/binary.js +153 -0
  75. package/dist/cjs/tdf3/src/ciphers/aes-gcm-cipher.js +56 -0
  76. package/dist/cjs/tdf3/src/ciphers/algorithms.js +8 -0
  77. package/dist/cjs/tdf3/src/ciphers/index.js +8 -0
  78. package/dist/cjs/tdf3/src/ciphers/symmetric-cipher-base.js +22 -0
  79. package/dist/cjs/tdf3/src/client/DecoratedReadableStream.js +116 -0
  80. package/dist/cjs/tdf3/src/client/builders.js +561 -0
  81. package/dist/cjs/tdf3/src/client/index.js +460 -0
  82. package/dist/cjs/tdf3/src/client/validation.js +63 -0
  83. package/dist/cjs/tdf3/src/crypto/crypto-utils.js +116 -0
  84. package/dist/cjs/tdf3/src/crypto/declarations.js +8 -0
  85. package/dist/cjs/tdf3/src/crypto/index.js +315 -0
  86. package/dist/cjs/tdf3/src/index.js +34 -0
  87. package/dist/cjs/tdf3/src/models/attribute-set.js +122 -0
  88. package/dist/cjs/tdf3/src/models/encryption-information.js +90 -0
  89. package/dist/cjs/tdf3/src/models/index.js +25 -0
  90. package/dist/cjs/tdf3/src/models/key-access.js +103 -0
  91. package/dist/cjs/tdf3/src/models/manifest.js +3 -0
  92. package/dist/cjs/tdf3/src/models/payload.js +3 -0
  93. package/dist/cjs/tdf3/src/models/policy.js +24 -0
  94. package/dist/cjs/tdf3/src/models/upsert-response.js +3 -0
  95. package/dist/cjs/tdf3/src/tdf.js +907 -0
  96. package/dist/cjs/tdf3/src/templates/default.html.js +98 -0
  97. package/dist/cjs/tdf3/src/templates/escaper.js +15 -0
  98. package/dist/cjs/tdf3/src/templates/index.js +12 -0
  99. package/dist/cjs/tdf3/src/utils/buffer-crc32.js +48 -0
  100. package/dist/cjs/tdf3/src/utils/chunkers.js +106 -0
  101. package/dist/cjs/tdf3/src/utils/index.js +296 -0
  102. package/dist/cjs/tdf3/src/utils/keysplit.js +61 -0
  103. package/dist/cjs/tdf3/src/utils/zip-reader.js +253 -0
  104. package/dist/cjs/tdf3/src/utils/zip-writer.js +308 -0
  105. package/dist/cjs/tdf3/src/version.js +6 -0
  106. package/dist/types/src/access.d.ts +47 -0
  107. package/dist/types/src/access.d.ts.map +1 -0
  108. package/dist/types/src/auth/Eas.d.ts +34 -0
  109. package/dist/types/src/auth/Eas.d.ts.map +1 -0
  110. package/dist/types/src/auth/auth.d.ts +86 -0
  111. package/dist/types/src/auth/auth.d.ts.map +1 -0
  112. package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts +9 -0
  113. package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts.map +1 -0
  114. package/dist/types/src/auth/oidc-externaljwt-provider.d.ts +10 -0
  115. package/dist/types/src/auth/oidc-externaljwt-provider.d.ts.map +1 -0
  116. package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts +10 -0
  117. package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts.map +1 -0
  118. package/dist/types/src/auth/oidc.d.ts +104 -0
  119. package/dist/types/src/auth/oidc.d.ts.map +1 -0
  120. package/dist/types/src/auth/providers.d.ts +67 -0
  121. package/dist/types/src/auth/providers.d.ts.map +1 -0
  122. package/dist/types/src/encodings/base64.d.ts +18 -0
  123. package/dist/types/src/encodings/base64.d.ts.map +1 -0
  124. package/dist/types/src/encodings/hex.d.ts +5 -0
  125. package/dist/types/src/encodings/hex.d.ts.map +1 -0
  126. package/dist/types/src/encodings/index.d.ts +3 -0
  127. package/dist/types/src/encodings/index.d.ts.map +1 -0
  128. package/dist/types/src/errors.d.ts +72 -0
  129. package/dist/types/src/errors.d.ts.map +1 -0
  130. package/dist/types/src/index.d.ts +138 -0
  131. package/dist/types/src/index.d.ts.map +1 -0
  132. package/dist/types/src/nanotdf/Client.d.ts +95 -0
  133. package/dist/types/src/nanotdf/Client.d.ts.map +1 -0
  134. package/dist/types/src/nanotdf/NanoTDF.d.ts +25 -0
  135. package/dist/types/src/nanotdf/NanoTDF.d.ts.map +1 -0
  136. package/dist/types/src/nanotdf/browser-entry.d.ts +17 -0
  137. package/dist/types/src/nanotdf/browser-entry.d.ts.map +1 -0
  138. package/dist/types/src/nanotdf/constants.d.ts +2 -0
  139. package/dist/types/src/nanotdf/constants.d.ts.map +1 -0
  140. package/dist/types/src/nanotdf/decrypt.d.ts +9 -0
  141. package/dist/types/src/nanotdf/decrypt.d.ts.map +1 -0
  142. package/dist/types/src/nanotdf/encrypt-dataset.d.ts +12 -0
  143. package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +1 -0
  144. package/dist/types/src/nanotdf/encrypt.d.ts +14 -0
  145. package/dist/types/src/nanotdf/encrypt.d.ts.map +1 -0
  146. package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +10 -0
  147. package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +1 -0
  148. package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +12 -0
  149. package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +1 -0
  150. package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +5 -0
  151. package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +1 -0
  152. package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +8 -0
  153. package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +1 -0
  154. package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +7 -0
  155. package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +1 -0
  156. package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +8 -0
  157. package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +1 -0
  158. package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +20 -0
  159. package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +1 -0
  160. package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +9 -0
  161. package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +1 -0
  162. package/dist/types/src/nanotdf/index.d.ts +9 -0
  163. package/dist/types/src/nanotdf/index.d.ts.map +1 -0
  164. package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +17 -0
  165. package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +1 -0
  166. package/dist/types/src/nanotdf/models/Ciphers.d.ts +14 -0
  167. package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +1 -0
  168. package/dist/types/src/nanotdf/models/DefaultParams.d.ts +21 -0
  169. package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +1 -0
  170. package/dist/types/src/nanotdf/models/EcCurves.d.ts +15 -0
  171. package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +1 -0
  172. package/dist/types/src/nanotdf/models/Header.d.ts +73 -0
  173. package/dist/types/src/nanotdf/models/Header.d.ts.map +1 -0
  174. package/dist/types/src/nanotdf/models/Payload.d.ts +47 -0
  175. package/dist/types/src/nanotdf/models/Payload.d.ts.map +1 -0
  176. package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +52 -0
  177. package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +1 -0
  178. package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +35 -0
  179. package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +1 -0
  180. package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +11 -0
  181. package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +1 -0
  182. package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +31 -0
  183. package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +1 -0
  184. package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +65 -0
  185. package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +1 -0
  186. package/dist/types/src/nanotdf/models/Signature.d.ts +33 -0
  187. package/dist/types/src/nanotdf/models/Signature.d.ts.map +1 -0
  188. package/dist/types/src/nanotdf-crypto/ciphers.d.ts +8 -0
  189. package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +1 -0
  190. package/dist/types/src/nanotdf-crypto/decrypt.d.ts +14 -0
  191. package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +1 -0
  192. package/dist/types/src/nanotdf-crypto/digest.d.ts +3 -0
  193. package/dist/types/src/nanotdf-crypto/digest.d.ts.map +1 -0
  194. package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts +35 -0
  195. package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +1 -0
  196. package/dist/types/src/nanotdf-crypto/encrypt.d.ts +14 -0
  197. package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +1 -0
  198. package/dist/types/src/nanotdf-crypto/enums.d.ts +42 -0
  199. package/dist/types/src/nanotdf-crypto/enums.d.ts.map +1 -0
  200. package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts +7 -0
  201. package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +1 -0
  202. package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts +10 -0
  203. package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +1 -0
  204. package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts +5 -0
  205. package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +1 -0
  206. package/dist/types/src/nanotdf-crypto/importRawKey.d.ts +13 -0
  207. package/dist/types/src/nanotdf-crypto/importRawKey.d.ts.map +1 -0
  208. package/dist/types/src/nanotdf-crypto/index.d.ts +12 -0
  209. package/dist/types/src/nanotdf-crypto/index.d.ts.map +1 -0
  210. package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts +28 -0
  211. package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +1 -0
  212. package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts +28 -0
  213. package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +1 -0
  214. package/dist/types/src/policy/api.d.ts +4 -0
  215. package/dist/types/src/policy/api.d.ts.map +1 -0
  216. package/dist/types/src/policy/attributes.d.ts +95 -0
  217. package/dist/types/src/policy/attributes.d.ts.map +1 -0
  218. package/dist/types/src/policy/granter.d.ts +23 -0
  219. package/dist/types/src/policy/granter.d.ts.map +1 -0
  220. package/dist/types/src/tdf/AttributeObject.d.ts +13 -0
  221. package/dist/types/src/tdf/AttributeObject.d.ts.map +1 -0
  222. package/dist/types/src/tdf/AttributeObjectJwt.d.ts +4 -0
  223. package/dist/types/src/tdf/AttributeObjectJwt.d.ts.map +1 -0
  224. package/dist/types/src/tdf/Crypto.d.ts +37 -0
  225. package/dist/types/src/tdf/Crypto.d.ts.map +1 -0
  226. package/dist/types/src/tdf/EntityObject.d.ts +18 -0
  227. package/dist/types/src/tdf/EntityObject.d.ts.map +1 -0
  228. package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +99 -0
  229. package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +1 -0
  230. package/dist/types/src/tdf/Policy.d.ts +28 -0
  231. package/dist/types/src/tdf/Policy.d.ts.map +1 -0
  232. package/dist/types/src/tdf/PolicyObject.d.ts +11 -0
  233. package/dist/types/src/tdf/PolicyObject.d.ts.map +1 -0
  234. package/dist/types/src/tdf/TypedArray.d.ts +3 -0
  235. package/dist/types/src/tdf/TypedArray.d.ts.map +1 -0
  236. package/dist/types/src/tdf/index.d.ts +7 -0
  237. package/dist/types/src/tdf/index.d.ts.map +1 -0
  238. package/dist/types/src/types/index.d.ts +45 -0
  239. package/dist/types/src/types/index.d.ts.map +1 -0
  240. package/dist/types/src/utils.d.ts +45 -0
  241. package/dist/types/src/utils.d.ts.map +1 -0
  242. package/dist/types/src/version.d.ts +9 -0
  243. package/dist/types/src/version.d.ts.map +1 -0
  244. package/dist/types/tdf3/index.d.ts +16 -0
  245. package/dist/types/tdf3/index.d.ts.map +1 -0
  246. package/dist/types/tdf3/src/assertions.d.ts +63 -0
  247. package/dist/types/tdf3/src/assertions.d.ts.map +1 -0
  248. package/dist/types/tdf3/src/binary.d.ts +38 -0
  249. package/dist/types/tdf3/src/binary.d.ts.map +1 -0
  250. package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts +18 -0
  251. package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts.map +1 -0
  252. package/dist/types/tdf3/src/ciphers/algorithms.d.ts +4 -0
  253. package/dist/types/tdf3/src/ciphers/algorithms.d.ts.map +1 -0
  254. package/dist/types/tdf3/src/ciphers/index.d.ts +3 -0
  255. package/dist/types/tdf3/src/ciphers/index.d.ts.map +1 -0
  256. package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts +14 -0
  257. package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts.map +1 -0
  258. package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts +53 -0
  259. package/dist/types/tdf3/src/client/DecoratedReadableStream.d.ts.map +1 -0
  260. package/dist/types/tdf3/src/client/builders.d.ts +436 -0
  261. package/dist/types/tdf3/src/client/builders.d.ts.map +1 -0
  262. package/dist/types/tdf3/src/client/index.d.ts +139 -0
  263. package/dist/types/tdf3/src/client/index.d.ts.map +1 -0
  264. package/dist/types/tdf3/src/client/validation.d.ts +8 -0
  265. package/dist/types/tdf3/src/client/validation.d.ts.map +1 -0
  266. package/dist/types/tdf3/src/crypto/crypto-utils.d.ts +34 -0
  267. package/dist/types/tdf3/src/crypto/crypto-utils.d.ts.map +1 -0
  268. package/dist/types/tdf3/src/crypto/declarations.d.ts +60 -0
  269. package/dist/types/tdf3/src/crypto/declarations.d.ts.map +1 -0
  270. package/dist/types/tdf3/src/crypto/index.d.ts +103 -0
  271. package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -0
  272. package/dist/types/tdf3/src/index.d.ts +5 -0
  273. package/dist/types/tdf3/src/index.d.ts.map +1 -0
  274. package/dist/types/tdf3/src/models/attribute-set.d.ts +65 -0
  275. package/dist/types/tdf3/src/models/attribute-set.d.ts.map +1 -0
  276. package/dist/types/tdf3/src/models/encryption-information.d.ts +49 -0
  277. package/dist/types/tdf3/src/models/encryption-information.d.ts.map +1 -0
  278. package/dist/types/tdf3/src/models/index.d.ts +9 -0
  279. package/dist/types/tdf3/src/models/index.d.ts.map +1 -0
  280. package/dist/types/tdf3/src/models/key-access.d.ts +42 -0
  281. package/dist/types/tdf3/src/models/key-access.d.ts.map +1 -0
  282. package/dist/types/tdf3/src/models/manifest.d.ts +9 -0
  283. package/dist/types/tdf3/src/models/manifest.d.ts.map +1 -0
  284. package/dist/types/tdf3/src/models/payload.d.ts +7 -0
  285. package/dist/types/tdf3/src/models/payload.d.ts.map +1 -0
  286. package/dist/types/tdf3/src/models/policy.d.ts +13 -0
  287. package/dist/types/tdf3/src/models/policy.d.ts.map +1 -0
  288. package/dist/types/tdf3/src/models/upsert-response.d.ts +16 -0
  289. package/dist/types/tdf3/src/models/upsert-response.d.ts.map +1 -0
  290. package/dist/types/tdf3/src/tdf.d.ts +152 -0
  291. package/dist/types/tdf3/src/tdf.d.ts.map +1 -0
  292. package/dist/types/tdf3/src/templates/default.html.d.ts +8 -0
  293. package/dist/types/tdf3/src/templates/default.html.d.ts.map +1 -0
  294. package/dist/types/tdf3/src/templates/escaper.d.ts +6 -0
  295. package/dist/types/tdf3/src/templates/escaper.d.ts.map +1 -0
  296. package/dist/types/tdf3/src/templates/index.d.ts +3 -0
  297. package/dist/types/tdf3/src/templates/index.d.ts.map +1 -0
  298. package/dist/types/tdf3/src/utils/buffer-crc32.d.ts +2 -0
  299. package/dist/types/tdf3/src/utils/buffer-crc32.d.ts.map +1 -0
  300. package/dist/types/tdf3/src/utils/chunkers.d.ts +29 -0
  301. package/dist/types/tdf3/src/utils/chunkers.d.ts.map +1 -0
  302. package/dist/types/tdf3/src/utils/index.d.ts +36 -0
  303. package/dist/types/tdf3/src/utils/index.d.ts.map +1 -0
  304. package/dist/types/tdf3/src/utils/keysplit.d.ts +19 -0
  305. package/dist/types/tdf3/src/utils/keysplit.d.ts.map +1 -0
  306. package/dist/types/tdf3/src/utils/zip-reader.d.ts +63 -0
  307. package/dist/types/tdf3/src/utils/zip-reader.d.ts.map +1 -0
  308. package/dist/types/tdf3/src/utils/zip-writer.d.ts +35 -0
  309. package/dist/types/tdf3/src/utils/zip-writer.d.ts.map +1 -0
  310. package/dist/types/tdf3/src/version.d.ts +3 -0
  311. package/dist/types/tdf3/src/version.d.ts.map +1 -0
  312. package/dist/web/package.json +3 -0
  313. package/dist/web/src/access.js +147 -0
  314. package/dist/web/src/auth/Eas.js +55 -0
  315. package/dist/web/src/auth/auth.js +71 -0
  316. package/dist/web/src/auth/oidc-clientcredentials-provider.js +22 -0
  317. package/dist/web/src/auth/oidc-externaljwt-provider.js +29 -0
  318. package/dist/web/src/auth/oidc-refreshtoken-provider.js +30 -0
  319. package/dist/web/src/auth/oidc.js +215 -0
  320. package/dist/web/src/auth/providers.js +119 -0
  321. package/dist/web/src/encodings/base64.js +147 -0
  322. package/dist/web/src/encodings/hex.js +63 -0
  323. package/dist/web/src/encodings/index.js +3 -0
  324. package/dist/web/src/errors.js +123 -0
  325. package/dist/web/src/index.js +313 -0
  326. package/dist/web/src/nanotdf/Client.js +268 -0
  327. package/dist/web/src/nanotdf/NanoTDF.js +89 -0
  328. package/dist/web/src/nanotdf/browser-entry.js +14 -0
  329. package/dist/web/src/nanotdf/constants.js +2 -0
  330. package/dist/web/src/nanotdf/decrypt.js +14 -0
  331. package/dist/web/src/nanotdf/encrypt-dataset.js +32 -0
  332. package/dist/web/src/nanotdf/encrypt.js +126 -0
  333. package/dist/web/src/nanotdf/enum/CipherEnum.js +11 -0
  334. package/dist/web/src/nanotdf/enum/CurveNameEnum.js +13 -0
  335. package/dist/web/src/nanotdf/enum/EncodingEnum.js +6 -0
  336. package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +9 -0
  337. package/dist/web/src/nanotdf/enum/ProtocolEnum.js +8 -0
  338. package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +9 -0
  339. package/dist/web/src/nanotdf/helpers/calculateByCurve.js +24 -0
  340. package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +8 -0
  341. package/dist/web/src/nanotdf/index.js +11 -0
  342. package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +2 -0
  343. package/dist/web/src/nanotdf/models/Ciphers.js +54 -0
  344. package/dist/web/src/nanotdf/models/DefaultParams.js +22 -0
  345. package/dist/web/src/nanotdf/models/EcCurves.js +32 -0
  346. package/dist/web/src/nanotdf/models/Header.js +250 -0
  347. package/dist/web/src/nanotdf/models/Payload.js +156 -0
  348. package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +71 -0
  349. package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +77 -0
  350. package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +33 -0
  351. package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +57 -0
  352. package/dist/web/src/nanotdf/models/ResourceLocator.js +206 -0
  353. package/dist/web/src/nanotdf/models/Signature.js +74 -0
  354. package/dist/web/src/nanotdf-crypto/ciphers.js +14 -0
  355. package/dist/web/src/nanotdf-crypto/decrypt.js +21 -0
  356. package/dist/web/src/nanotdf-crypto/digest.js +4 -0
  357. package/dist/web/src/nanotdf-crypto/ecdsaSignature.js +77 -0
  358. package/dist/web/src/nanotdf-crypto/encrypt.js +21 -0
  359. package/dist/web/src/nanotdf-crypto/enums.js +49 -0
  360. package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +17 -0
  361. package/dist/web/src/nanotdf-crypto/generateKeyPair.js +10 -0
  362. package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +9 -0
  363. package/dist/web/src/nanotdf-crypto/importRawKey.js +15 -0
  364. package/dist/web/src/nanotdf-crypto/index.js +12 -0
  365. package/dist/web/src/nanotdf-crypto/keyAgreement.js +87 -0
  366. package/dist/web/src/nanotdf-crypto/pemPublicToCrypto.js +197 -0
  367. package/dist/web/src/policy/api.js +54 -0
  368. package/dist/web/src/policy/attributes.js +2 -0
  369. package/dist/web/src/policy/granter.js +141 -0
  370. package/dist/web/src/tdf/AttributeObject.js +11 -0
  371. package/dist/web/src/tdf/AttributeObjectJwt.js +2 -0
  372. package/dist/web/src/tdf/Crypto.js +44 -0
  373. package/dist/web/src/tdf/EntityObject.js +2 -0
  374. package/dist/web/src/tdf/NanoTDF/NanoTDF.js +35 -0
  375. package/dist/web/src/tdf/Policy.js +48 -0
  376. package/dist/web/src/tdf/PolicyObject.js +2 -0
  377. package/dist/web/src/tdf/TypedArray.js +2 -0
  378. package/dist/web/src/tdf/index.js +4 -0
  379. package/dist/web/src/types/index.js +2 -0
  380. package/dist/web/src/utils.js +133 -0
  381. package/dist/web/src/version.js +9 -0
  382. package/dist/web/tdf3/index.js +13 -0
  383. package/dist/web/tdf3/src/assertions.js +111 -0
  384. package/dist/web/tdf3/src/binary.js +149 -0
  385. package/dist/web/tdf3/src/ciphers/aes-gcm-cipher.js +52 -0
  386. package/dist/web/tdf3/src/ciphers/algorithms.js +5 -0
  387. package/dist/web/tdf3/src/ciphers/index.js +3 -0
  388. package/dist/web/tdf3/src/ciphers/symmetric-cipher-base.js +18 -0
  389. package/dist/web/tdf3/src/client/DecoratedReadableStream.js +107 -0
  390. package/dist/web/tdf3/src/client/builders.js +557 -0
  391. package/dist/web/tdf3/src/client/index.js +423 -0
  392. package/dist/web/tdf3/src/client/validation.js +58 -0
  393. package/dist/web/tdf3/src/crypto/crypto-utils.js +107 -0
  394. package/dist/web/tdf3/src/crypto/declarations.js +5 -0
  395. package/dist/web/tdf3/src/crypto/index.js +296 -0
  396. package/dist/web/tdf3/src/index.js +5 -0
  397. package/dist/web/tdf3/src/models/attribute-set.js +118 -0
  398. package/dist/web/tdf3/src/models/encryption-information.js +86 -0
  399. package/dist/web/tdf3/src/models/index.js +9 -0
  400. package/dist/web/tdf3/src/models/key-access.js +74 -0
  401. package/dist/web/tdf3/src/models/manifest.js +2 -0
  402. package/dist/web/tdf3/src/models/payload.js +2 -0
  403. package/dist/web/tdf3/src/models/policy.js +20 -0
  404. package/dist/web/tdf3/src/models/upsert-response.js +2 -0
  405. package/dist/web/tdf3/src/tdf.js +866 -0
  406. package/dist/web/tdf3/src/templates/default.html.js +96 -0
  407. package/dist/web/tdf3/src/templates/escaper.js +10 -0
  408. package/dist/web/tdf3/src/templates/index.js +3 -0
  409. package/dist/web/tdf3/src/utils/buffer-crc32.js +44 -0
  410. package/dist/web/tdf3/src/utils/chunkers.js +96 -0
  411. package/dist/web/tdf3/src/utils/index.js +248 -0
  412. package/dist/web/tdf3/src/utils/keysplit.js +55 -0
  413. package/dist/web/tdf3/src/utils/zip-reader.js +247 -0
  414. package/dist/web/tdf3/src/utils/zip-writer.js +302 -0
  415. package/dist/web/tdf3/src/version.js +3 -0
  416. package/package.json +126 -0
  417. package/src/access.ts +198 -0
  418. package/src/auth/Eas.ts +79 -0
  419. package/src/auth/auth.ts +141 -0
  420. package/src/auth/oidc-clientcredentials-provider.ts +32 -0
  421. package/src/auth/oidc-externaljwt-provider.ts +41 -0
  422. package/src/auth/oidc-refreshtoken-provider.ts +41 -0
  423. package/src/auth/oidc.ts +307 -0
  424. package/src/auth/providers.ts +139 -0
  425. package/src/encodings/base64.ts +160 -0
  426. package/src/encodings/hex.ts +69 -0
  427. package/src/encodings/index.ts +2 -0
  428. package/src/errors.ts +113 -0
  429. package/src/index.ts +441 -0
  430. package/src/nanotdf/Client.ts +349 -0
  431. package/src/nanotdf/NanoTDF.ts +121 -0
  432. package/src/nanotdf/browser-entry.ts +20 -0
  433. package/src/nanotdf/constants.ts +1 -0
  434. package/src/nanotdf/decrypt.ts +19 -0
  435. package/src/nanotdf/encrypt-dataset.ts +52 -0
  436. package/src/nanotdf/encrypt.ts +197 -0
  437. package/src/nanotdf/enum/CipherEnum.ts +10 -0
  438. package/src/nanotdf/enum/CurveNameEnum.ts +12 -0
  439. package/src/nanotdf/enum/EncodingEnum.ts +5 -0
  440. package/src/nanotdf/enum/PolicyTypeEnum.ts +8 -0
  441. package/src/nanotdf/enum/ProtocolEnum.ts +7 -0
  442. package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +8 -0
  443. package/src/nanotdf/helpers/calculateByCurve.ts +26 -0
  444. package/src/nanotdf/helpers/getHkdfSalt.ts +15 -0
  445. package/src/nanotdf/index.ts +10 -0
  446. package/src/nanotdf/interfaces/PolicyInterface.ts +27 -0
  447. package/src/nanotdf/models/Ciphers.ts +67 -0
  448. package/src/nanotdf/models/DefaultParams.ts +24 -0
  449. package/src/nanotdf/models/EcCurves.ts +40 -0
  450. package/src/nanotdf/models/Header.ts +322 -0
  451. package/src/nanotdf/models/Payload.ts +196 -0
  452. package/src/nanotdf/models/Policy/AbstractPolicy.ts +90 -0
  453. package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +101 -0
  454. package/src/nanotdf/models/Policy/PolicyFactory.ts +48 -0
  455. package/src/nanotdf/models/Policy/RemotePolicy.ts +74 -0
  456. package/src/nanotdf/models/ResourceLocator.ts +212 -0
  457. package/src/nanotdf/models/Signature.ts +85 -0
  458. package/src/nanotdf-crypto/ciphers.ts +13 -0
  459. package/src/nanotdf-crypto/decrypt.ts +30 -0
  460. package/src/nanotdf-crypto/digest.ts +8 -0
  461. package/src/nanotdf-crypto/ecdsaSignature.ts +109 -0
  462. package/src/nanotdf-crypto/encrypt.ts +30 -0
  463. package/src/nanotdf-crypto/enums.ts +47 -0
  464. package/src/nanotdf-crypto/exportCryptoKey.ts +17 -0
  465. package/src/nanotdf-crypto/generateKeyPair.ts +19 -0
  466. package/src/nanotdf-crypto/generateRandomNumber.ts +8 -0
  467. package/src/nanotdf-crypto/importRawKey.ts +19 -0
  468. package/src/nanotdf-crypto/index.ts +11 -0
  469. package/src/nanotdf-crypto/keyAgreement.ts +139 -0
  470. package/src/nanotdf-crypto/pemPublicToCrypto.ts +232 -0
  471. package/src/package-lock.json +6 -0
  472. package/src/package.json +3 -0
  473. package/src/platform/authorization/authorization_connect.d.ts +44 -0
  474. package/src/platform/authorization/authorization_connect.js +44 -0
  475. package/src/platform/authorization/authorization_pb.d.ts +707 -0
  476. package/src/platform/authorization/authorization_pb.js +372 -0
  477. package/src/platform/common/common_pb.d.ts +129 -0
  478. package/src/platform/common/common_pb.js +58 -0
  479. package/src/platform/entityresolution/entity_resolution_connect.d.ts +35 -0
  480. package/src/platform/entityresolution/entity_resolution_connect.js +35 -0
  481. package/src/platform/entityresolution/entity_resolution_pb.d.ts +242 -0
  482. package/src/platform/entityresolution/entity_resolution_pb.js +139 -0
  483. package/src/platform/kas/kas_connect.d.ts +59 -0
  484. package/src/platform/kas/kas_connect.js +59 -0
  485. package/src/platform/kas/kas_pb.d.ts +200 -0
  486. package/src/platform/kas/kas_pb.js +84 -0
  487. package/src/platform/policy/attributes/attributes_connect.d.ts +168 -0
  488. package/src/platform/policy/attributes/attributes_connect.js +168 -0
  489. package/src/platform/policy/attributes/attributes_pb.d.ts +929 -0
  490. package/src/platform/policy/attributes/attributes_pb.js +363 -0
  491. package/src/platform/policy/kasregistry/key_access_server_registry_connect.d.ts +62 -0
  492. package/src/platform/policy/kasregistry/key_access_server_registry_connect.js +62 -0
  493. package/src/platform/policy/kasregistry/key_access_server_registry_pb.d.ts +283 -0
  494. package/src/platform/policy/kasregistry/key_access_server_registry_pb.js +113 -0
  495. package/src/platform/policy/namespaces/namespaces_connect.d.ts +62 -0
  496. package/src/platform/policy/namespaces/namespaces_connect.js +62 -0
  497. package/src/platform/policy/namespaces/namespaces_pb.d.ts +270 -0
  498. package/src/platform/policy/namespaces/namespaces_pb.js +110 -0
  499. package/src/platform/policy/objects_pb.d.ts +725 -0
  500. package/src/platform/policy/objects_pb.js +288 -0
  501. package/src/platform/policy/resourcemapping/resource_mapping_connect.d.ts +259 -0
  502. package/src/platform/policy/resourcemapping/resource_mapping_connect.js +259 -0
  503. package/src/platform/policy/resourcemapping/resource_mapping_pb.d.ts +314 -0
  504. package/src/platform/policy/resourcemapping/resource_mapping_pb.js +142 -0
  505. package/src/platform/policy/selectors_pb.d.ts +269 -0
  506. package/src/platform/policy/selectors_pb.js +110 -0
  507. package/src/platform/policy/subjectmapping/subject_mapping_connect.d.ts +118 -0
  508. package/src/platform/policy/subjectmapping/subject_mapping_connect.js +118 -0
  509. package/src/platform/policy/subjectmapping/subject_mapping_pb.d.ts +672 -0
  510. package/src/platform/policy/subjectmapping/subject_mapping_pb.js +260 -0
  511. package/src/platform/wellknownconfiguration/wellknown_configuration_connect.d.ts +26 -0
  512. package/src/platform/wellknownconfiguration/wellknown_configuration_connect.js +26 -0
  513. package/src/platform/wellknownconfiguration/wellknown_configuration_pb.d.ts +75 -0
  514. package/src/platform/wellknownconfiguration/wellknown_configuration_pb.js +35 -0
  515. package/src/policy/api.ts +61 -0
  516. package/src/policy/attributes.ts +117 -0
  517. package/src/policy/granter.ts +181 -0
  518. package/src/tdf/AttributeObject.ts +27 -0
  519. package/src/tdf/AttributeObjectJwt.ts +3 -0
  520. package/src/tdf/Crypto.ts +42 -0
  521. package/src/tdf/EntityObject.ts +18 -0
  522. package/src/tdf/NanoTDF/NanoTDF.ts +120 -0
  523. package/src/tdf/Policy.ts +51 -0
  524. package/src/tdf/PolicyObject.ts +12 -0
  525. package/src/tdf/TypedArray.ts +12 -0
  526. package/src/tdf/index.ts +6 -0
  527. package/src/types/index.ts +55 -0
  528. package/src/utils.ts +149 -0
  529. package/src/version.ts +9 -0
  530. package/tdf3/index.ts +91 -0
  531. package/tdf3/package-lock.json +6 -0
  532. package/tdf3/package.json +3 -0
  533. package/tdf3/src/assertions.ts +191 -0
  534. package/tdf3/src/binary.ts +195 -0
  535. package/tdf3/src/ciphers/aes-gcm-cipher.ts +76 -0
  536. package/tdf3/src/ciphers/algorithms.ts +9 -0
  537. package/tdf3/src/ciphers/index.ts +2 -0
  538. package/tdf3/src/ciphers/symmetric-cipher-base.ts +38 -0
  539. package/tdf3/src/client/DecoratedReadableStream.ts +148 -0
  540. package/tdf3/src/client/builders.ts +701 -0
  541. package/tdf3/src/client/index.ts +637 -0
  542. package/tdf3/src/client/validation.ts +79 -0
  543. package/tdf3/src/crypto/crypto-utils.ts +119 -0
  544. package/tdf3/src/crypto/declarations.ts +89 -0
  545. package/tdf3/src/crypto/index.ts +394 -0
  546. package/tdf3/src/index.ts +4 -0
  547. package/tdf3/src/models/attribute-set.ts +142 -0
  548. package/tdf3/src/models/encryption-information.ts +172 -0
  549. package/tdf3/src/models/index.ts +8 -0
  550. package/tdf3/src/models/key-access.ts +128 -0
  551. package/tdf3/src/models/manifest.ts +9 -0
  552. package/tdf3/src/models/payload.ts +6 -0
  553. package/tdf3/src/models/policy.ts +35 -0
  554. package/tdf3/src/models/upsert-response.ts +17 -0
  555. package/tdf3/src/tdf.ts +1351 -0
  556. package/tdf3/src/templates/default.html.ts +105 -0
  557. package/tdf3/src/templates/escaper.ts +10 -0
  558. package/tdf3/src/templates/index.ts +2 -0
  559. package/tdf3/src/utils/buffer-crc32.ts +46 -0
  560. package/tdf3/src/utils/chunkers.ts +118 -0
  561. package/tdf3/src/utils/index.ts +309 -0
  562. package/tdf3/src/utils/keysplit.ts +63 -0
  563. package/tdf3/src/utils/zip-reader.ts +341 -0
  564. package/tdf3/src/utils/zip-writer.ts +375 -0
  565. package/tdf3/src/version.ts +2 -0
  566. package/tdf3/types.d.ts +14 -0
@@ -0,0 +1,866 @@
1
+ import axios from 'axios';
2
+ import { unsigned } from './utils/buffer-crc32.js';
3
+ import { exportSPKI, importX509 } from 'jose';
4
+ import { DecoratedReadableStream } from './client/DecoratedReadableStream.js';
5
+ import { pemToCryptoPublicKey, validateSecureUrl } from '../../src/utils.js';
6
+ import * as assertions from './assertions.js';
7
+ import { isRemote as isRemoteKeyAccess, Remote as KeyAccessRemote, Wrapped as KeyAccessWrapped, } from './models/index.js';
8
+ import { base64 } from '../../src/encodings/index.js';
9
+ import { ZipReader, ZipWriter, base64ToBuffer, isAppIdProviderCheck, keyMerge, buffToString, concatUint8, } from './utils/index.js';
10
+ import { Binary } from './binary.js';
11
+ import { OriginAllowList } from '../../src/access.js';
12
+ import { ConfigurationError, DecryptError, InvalidFileError, IntegrityError, NetworkError, PermissionDeniedError, ServiceError, TdfError, UnauthenticatedError, UnsafeUrlError, UnsupportedFeatureError as UnsupportedError, } from '../../src/errors.js';
13
+ import { htmlWrapperTemplate } from './templates/index.js';
14
+ // configurable
15
+ // TODO: remove dependencies from ciphers so that we can open-source instead of relying on other Virtru libs
16
+ import { AesGcmCipher } from './ciphers/index.js';
17
+ import { reqSignature, } from '../../src/auth/auth.js';
18
+ // TODO: input validation on manifest JSON
19
+ const DEFAULT_SEGMENT_SIZE = 1024 * 1024;
20
+ /**
21
+ * If we have KAS url but not public key we can fetch it from KAS, fetching
22
+ * the value from `${kas}/kas_public_key`.
23
+ */
24
+ export async function fetchKasPublicKey(kas, algorithm) {
25
+ if (!kas) {
26
+ throw new ConfigurationError('KAS definition not found');
27
+ }
28
+ // Logs insecure KAS. Secure is enforced in constructor
29
+ validateSecureUrl(kas);
30
+ const infoStatic = { url: kas, algorithm: algorithm || 'rsa:2048' };
31
+ const params = {};
32
+ if (algorithm) {
33
+ params.algorithm = algorithm;
34
+ }
35
+ const v2Url = `${kas}/v2/kas_public_key`;
36
+ try {
37
+ const response = await axios.get(v2Url, {
38
+ params: {
39
+ ...params,
40
+ v: '2',
41
+ },
42
+ });
43
+ const publicKey = typeof response.data === 'string'
44
+ ? await extractPemFromKeyString(response.data)
45
+ : response.data.publicKey;
46
+ return {
47
+ publicKey,
48
+ key: pemToCryptoPublicKey(publicKey),
49
+ ...infoStatic,
50
+ ...(typeof response.data !== 'string' && response.data.kid && { kid: response.data.kid }),
51
+ };
52
+ }
53
+ catch (cause) {
54
+ const status = cause?.response?.status;
55
+ switch (status) {
56
+ case 400:
57
+ case 404:
58
+ // KAS does not yet implement v2, maybe
59
+ break;
60
+ case 401:
61
+ throw new UnauthenticatedError(`[${v2Url}] requires auth`, cause);
62
+ case 403:
63
+ throw new PermissionDeniedError(`[${v2Url}] permission denied`, cause);
64
+ default:
65
+ if (status && status >= 400 && status < 500) {
66
+ throw new ConfigurationError(`[${v2Url}] request error [${status}] [${cause.name}] [${cause.message}]`, cause);
67
+ }
68
+ throw new NetworkError(`[${v2Url}] error [${status}] [${cause.name}] [${cause.message}]`, cause);
69
+ }
70
+ }
71
+ // Retry with v1 params
72
+ const v1Url = `${kas}/kas_public_key`;
73
+ try {
74
+ const response = await axios.get(v1Url, {
75
+ params,
76
+ });
77
+ const publicKey = typeof response.data === 'string'
78
+ ? await extractPemFromKeyString(response.data)
79
+ : response.data.publicKey;
80
+ // future proof: allow v2 response even if not specified.
81
+ return {
82
+ publicKey,
83
+ key: pemToCryptoPublicKey(publicKey),
84
+ ...infoStatic,
85
+ ...(typeof response.data !== 'string' && response.data.kid && { kid: response.data.kid }),
86
+ };
87
+ }
88
+ catch (cause) {
89
+ const status = cause?.response?.status;
90
+ switch (status) {
91
+ case 401:
92
+ throw new UnauthenticatedError(`[${v1Url}] requires auth`, cause);
93
+ case 403:
94
+ throw new PermissionDeniedError(`[${v1Url}] permission denied`, cause);
95
+ default:
96
+ if (status && status >= 400 && status < 500) {
97
+ throw new ConfigurationError(`[${v2Url}] request error [${status}] [${cause.name}] [${cause.message}]`, cause);
98
+ }
99
+ throw new NetworkError(`[${v1Url}] error [${status}] [${cause.name}] [${cause.message}]`, cause);
100
+ }
101
+ }
102
+ }
103
+ /**
104
+ *
105
+ * @param payload The TDF content to encode in HTML
106
+ * @param manifest A copy of the manifest
107
+ * @param transferUrl reader web-service start page
108
+ * @return utf-8 encoded HTML data
109
+ */
110
+ export function wrapHtml(payload, manifest, transferUrl) {
111
+ const { origin } = new URL(transferUrl);
112
+ const exportManifest = typeof manifest === 'string' ? manifest : JSON.stringify(manifest);
113
+ const fullHtmlString = htmlWrapperTemplate({
114
+ transferUrl,
115
+ transferBaseUrl: origin,
116
+ manifest: base64.encode(exportManifest),
117
+ payload: buffToString(payload, 'base64'),
118
+ });
119
+ return new TextEncoder().encode(fullHtmlString);
120
+ }
121
+ export function unwrapHtml(htmlPayload) {
122
+ let html;
123
+ if (htmlPayload instanceof ArrayBuffer || ArrayBuffer.isView(htmlPayload)) {
124
+ html = new TextDecoder().decode(htmlPayload);
125
+ }
126
+ else {
127
+ html = htmlPayload.toString();
128
+ }
129
+ const payloadRe = /<input id=['"]?data-input['"]?[^>]*?value=['"]?([a-zA-Z0-9+/=]+)['"]?/;
130
+ const reResult = payloadRe.exec(html);
131
+ if (reResult === null) {
132
+ throw new InvalidFileError('Payload is missing');
133
+ }
134
+ const base64Payload = reResult[1];
135
+ try {
136
+ return base64ToBuffer(base64Payload);
137
+ }
138
+ catch (e) {
139
+ throw new InvalidFileError('There was a problem extracting the TDF3 payload', e);
140
+ }
141
+ }
142
+ export async function extractPemFromKeyString(keyString) {
143
+ let pem = keyString;
144
+ // Skip the public key extraction if we find that the KAS url provides a
145
+ // PEM-encoded key instead of certificate
146
+ if (keyString.includes('CERTIFICATE')) {
147
+ const cert = await importX509(keyString, 'RS256', { extractable: true });
148
+ pem = await exportSPKI(cert);
149
+ }
150
+ return pem;
151
+ }
152
+ /**
153
+ * Build a key access object and add it to the list. Can specify either
154
+ * a (url, publicKey) pair (legacy, deprecated) or an attribute URL (future).
155
+ * If all are missing then it attempts to use the default attribute. If that
156
+ * is missing it throws an error.
157
+ * @param {Object} options
158
+ * @param {String} options.type - enum representing how the object key is treated
159
+ * @param {String} options.attributeUrl - URL of the attribute to use for pubKey and kasUrl. Omit to use default.
160
+ * @param {String} options.url - directly set the KAS URL
161
+ * @param {String} options.publicKey - directly set the (KAS) public key
162
+ * @param {String?} options.kid - Key identifier of KAS public key
163
+ * @param {String? Object?} options.metadata - Metadata. Appears to be dead code.
164
+ * @return {KeyAccess}- the key access object loaded
165
+ */
166
+ export async function buildKeyAccess({ attributeSet, type, url, publicKey, kid, attributeUrl, metadata, sid = '', }) {
167
+ /** Internal function to keep it DRY */
168
+ function createKeyAccess(type, kasUrl, kasKeyIdentifier, pubKey, metadata) {
169
+ switch (type) {
170
+ case 'wrapped':
171
+ return new KeyAccessWrapped(kasUrl, kasKeyIdentifier, pubKey, metadata, sid);
172
+ case 'remote':
173
+ return new KeyAccessRemote(kasUrl, kasKeyIdentifier, pubKey, metadata, sid);
174
+ default:
175
+ throw new ConfigurationError(`buildKeyAccess: Key access type ${type} is unknown`);
176
+ }
177
+ }
178
+ // If an attributeUrl is provided try to load with that first.
179
+ if (attributeUrl && attributeSet) {
180
+ const attr = attributeSet.get(attributeUrl);
181
+ if (attr && attr.kasUrl && attr.pubKey) {
182
+ return createKeyAccess(type, attr.kasUrl, attr.kid, attr.pubKey, metadata);
183
+ }
184
+ }
185
+ // if url and pulicKey are specified load the key access object with them
186
+ if (url && publicKey) {
187
+ return createKeyAccess(type, url, kid, await extractPemFromKeyString(publicKey), metadata);
188
+ }
189
+ // Assume the default attribute is the source for kasUrl and pubKey
190
+ const defaultAttr = attributeSet?.getDefault();
191
+ if (defaultAttr) {
192
+ const { pubKey, kasUrl } = defaultAttr;
193
+ if (pubKey && kasUrl) {
194
+ return createKeyAccess(type, kasUrl, kid, await extractPemFromKeyString(pubKey), metadata);
195
+ }
196
+ }
197
+ // All failed. Raise an error.
198
+ throw new ConfigurationError('TDF.buildKeyAccess: No source for kasUrl or pubKey');
199
+ }
200
+ export function validatePolicyObject(policy) {
201
+ const missingFields = [];
202
+ if (!policy.uuid)
203
+ missingFields.push('uuid');
204
+ if (!policy.body)
205
+ missingFields.push('body', 'body.dissem');
206
+ if (policy.body && !policy.body.dissem)
207
+ missingFields.push('body.dissem');
208
+ if (missingFields.length) {
209
+ throw new ConfigurationError(`The given policy object requires the following properties: ${missingFields}`);
210
+ }
211
+ }
212
+ async function _generateManifest(keyInfo, encryptionInformation, policy, mimeType) {
213
+ // (maybe) Fields are quoted to avoid renaming
214
+ const payload = {
215
+ type: 'reference',
216
+ url: '0.payload',
217
+ protocol: 'zip',
218
+ isEncrypted: true,
219
+ schemaVersion: '3.0.0',
220
+ ...(mimeType && { mimeType }),
221
+ };
222
+ const encryptionInformationStr = await encryptionInformation.write(policy, keyInfo);
223
+ const assertions = [];
224
+ return {
225
+ payload,
226
+ // generate the manifest first, then insert integrity information into it
227
+ encryptionInformation: encryptionInformationStr,
228
+ assertions: assertions,
229
+ };
230
+ }
231
+ async function getSignature(unwrappedKeyBinary, payloadBinary, algorithmType, cryptoService) {
232
+ switch (algorithmType.toUpperCase()) {
233
+ case 'GMAC':
234
+ // use the auth tag baked into the encrypted payload
235
+ return buffToString(Uint8Array.from(payloadBinary.asByteArray()).slice(-16), 'hex');
236
+ case 'HS256':
237
+ // simple hmac is the default
238
+ return await cryptoService.hmac(buffToString(new Uint8Array(unwrappedKeyBinary.asArrayBuffer()), 'hex'), buffToString(new Uint8Array(payloadBinary.asArrayBuffer()), 'utf-8'));
239
+ default:
240
+ throw new ConfigurationError(`Unsupported signature alg [${algorithmType}]`);
241
+ }
242
+ }
243
+ function buildRequest(method, url, body) {
244
+ return {
245
+ headers: {},
246
+ method: method,
247
+ url: url,
248
+ body,
249
+ };
250
+ }
251
+ export async function upsert({ allowedKases, allowList, authProvider, entity, privateKey, unsavedManifest, ignoreType, }) {
252
+ const allowed = (() => {
253
+ if (allowList) {
254
+ return allowList;
255
+ }
256
+ if (!allowedKases) {
257
+ throw new ConfigurationError('Upsert cannot be done without allowlist');
258
+ }
259
+ return new OriginAllowList(allowedKases);
260
+ })();
261
+ const { keyAccess, policy } = unsavedManifest.encryptionInformation;
262
+ const isAppIdProvider = authProvider && isAppIdProviderCheck(authProvider);
263
+ if (authProvider === undefined) {
264
+ throw new ConfigurationError('Upsert cannot be done without auth provider');
265
+ }
266
+ return Promise.all(keyAccess.map(async (keyAccessObject) => {
267
+ // We only care about remote key access objects for the policy sync portion
268
+ const isRemote = isRemoteKeyAccess(keyAccessObject);
269
+ if (!ignoreType && !isRemote) {
270
+ return;
271
+ }
272
+ if (!allowed.allows(keyAccessObject.url)) {
273
+ throw new UnsafeUrlError(`Unexpected KAS url: [${keyAccessObject.url}]`);
274
+ }
275
+ const url = `${keyAccessObject.url}/${isAppIdProvider ? '' : 'v2/'}upsert`;
276
+ //TODO I dont' think we need a body at all for KAS requests
277
+ // Do we need ANY of this if it's already embedded in the EO in the Bearer OIDC token?
278
+ const body = {
279
+ keyAccess: keyAccessObject,
280
+ policy: unsavedManifest.encryptionInformation.policy,
281
+ entity: isAppIdProviderCheck(authProvider) ? entity : undefined,
282
+ authToken: undefined,
283
+ clientPayloadSignature: undefined,
284
+ };
285
+ if (isAppIdProviderCheck(authProvider)) {
286
+ body.authToken = await reqSignature({}, privateKey);
287
+ }
288
+ else {
289
+ body.clientPayloadSignature = await reqSignature(body, privateKey);
290
+ }
291
+ const httpReq = await authProvider.withCreds(buildRequest('POST', url, body));
292
+ try {
293
+ const response = await axios.post(httpReq.url, httpReq.body, {
294
+ headers: httpReq.headers,
295
+ });
296
+ // Remove additional properties which were needed to sync, but not that we want to save to
297
+ // the manifest
298
+ delete keyAccessObject.wrappedKey;
299
+ delete keyAccessObject.encryptedMetadata;
300
+ delete keyAccessObject.policyBinding;
301
+ if (isRemote) {
302
+ // Decode the policy and extract only the required info to save -- the uuid
303
+ const decodedPolicy = JSON.parse(base64.decode(policy));
304
+ unsavedManifest.encryptionInformation.policy = base64.encode(JSON.stringify({ uuid: decodedPolicy.uuid }));
305
+ }
306
+ return response.data;
307
+ }
308
+ catch (e) {
309
+ if (e.response) {
310
+ if (e.response.status >= 500) {
311
+ throw new ServiceError('upsert failure', e);
312
+ }
313
+ else if (e.response.status === 403) {
314
+ throw new PermissionDeniedError('upsert failure', e);
315
+ }
316
+ else if (e.response.status === 401) {
317
+ throw new UnauthenticatedError('upsert auth failure', e);
318
+ }
319
+ else if (e.response.status === 400) {
320
+ throw new ConfigurationError('upsert bad request; likely a configuration error', e);
321
+ }
322
+ else {
323
+ throw new NetworkError('upsert server error', e);
324
+ }
325
+ }
326
+ else if (e.request) {
327
+ throw new NetworkError('upsert request failure', e);
328
+ }
329
+ throw new TdfError(`Unable to perform upsert operation on the KAS: [${e.name}: ${e.message}], response: [${e?.response?.body}]`, e);
330
+ }
331
+ }));
332
+ }
333
+ export async function writeStream(cfg) {
334
+ if (!cfg.authProvider) {
335
+ throw new ConfigurationError('No authorization middleware defined');
336
+ }
337
+ if (!cfg.contentStream) {
338
+ throw new ConfigurationError('No input stream defined');
339
+ }
340
+ // eslint-disable-next-line @typescript-eslint/no-this-alias
341
+ const segmentInfos = [];
342
+ cfg.byteLimit ??= Number.MAX_SAFE_INTEGER;
343
+ const entryInfos = [
344
+ {
345
+ filename: '0.payload',
346
+ },
347
+ {
348
+ filename: '0.manifest.json',
349
+ },
350
+ ];
351
+ let currentBuffer = new Uint8Array();
352
+ let totalByteCount = 0;
353
+ let bytesProcessed = 0;
354
+ let crcCounter = 0;
355
+ let fileByteCount = 0;
356
+ let aggregateHash = '';
357
+ const zipWriter = new ZipWriter();
358
+ const manifest = await _generateManifest(cfg.keyForManifest, cfg.encryptionInformation, cfg.policy, cfg.mimeType);
359
+ if (!manifest) {
360
+ // Set in encrypt; should never be reached.
361
+ throw new ConfigurationError('internal: please use "loadTDFStream" first to load a manifest.');
362
+ }
363
+ const pkKeyLike = cfg.dpopKeys.privateKey;
364
+ // For all remote key access objects, sync its policy
365
+ const upsertResponse = await upsert({
366
+ allowedKases: cfg.allowList ? undefined : cfg.allowedKases,
367
+ allowList: cfg.allowList,
368
+ authProvider: cfg.authProvider,
369
+ entity: cfg.entity,
370
+ privateKey: pkKeyLike,
371
+ unsavedManifest: manifest,
372
+ });
373
+ // determine default segment size by writing empty buffer
374
+ const { segmentSizeDefault } = cfg;
375
+ const encryptedBlargh = await cfg.encryptionInformation.encrypt(Binary.fromArrayBuffer(new ArrayBuffer(segmentSizeDefault)), cfg.keyForEncryption.unwrappedKeyBinary);
376
+ const payloadBuffer = new Uint8Array(encryptedBlargh.payload.asByteArray());
377
+ const encryptedSegmentSizeDefault = payloadBuffer.length;
378
+ // start writing the content
379
+ entryInfos[0].filename = '0.payload';
380
+ entryInfos[0].offset = totalByteCount;
381
+ const sourceReader = cfg.contentStream.getReader();
382
+ /*
383
+ TODO: Code duplication should be addressed
384
+ - RCA operations require that the write stream has already finished executing it's .on('end') handler before being returned,
385
+ thus both handlers are wrapped in a encompassing promise when we have an RCA source. We should investigate
386
+ if this causes O(n) promises to be loaded into memory.
387
+ - LFS operations can have the write stream returned immediately after both .on('end') and .on('data') handlers
388
+ have been defined, thus not requiring the handlers to be wrapped in a promise.
389
+ */
390
+ const underlingSource = {
391
+ start: (controller) => {
392
+ controller.enqueue(getHeader(entryInfos[0].filename));
393
+ _countChunk(getHeader(entryInfos[0].filename));
394
+ crcCounter = 0;
395
+ fileByteCount = 0;
396
+ },
397
+ pull: async (controller) => {
398
+ let isDone;
399
+ while (currentBuffer.length < segmentSizeDefault && !isDone) {
400
+ const { value, done } = await sourceReader.read();
401
+ isDone = done;
402
+ if (value) {
403
+ currentBuffer = concatUint8([currentBuffer, value]);
404
+ }
405
+ }
406
+ while (currentBuffer.length >= segmentSizeDefault &&
407
+ !!controller.desiredSize &&
408
+ controller.desiredSize > 0) {
409
+ const segment = currentBuffer.slice(0, segmentSizeDefault);
410
+ const encryptedSegment = await _encryptAndCountSegment(segment);
411
+ controller.enqueue(encryptedSegment);
412
+ currentBuffer = currentBuffer.slice(segmentSizeDefault);
413
+ }
414
+ const isFinalChunkLeft = isDone && currentBuffer.length;
415
+ if (isFinalChunkLeft) {
416
+ const encryptedSegment = await _encryptAndCountSegment(currentBuffer);
417
+ controller.enqueue(encryptedSegment);
418
+ currentBuffer = new Uint8Array();
419
+ }
420
+ if (isDone && currentBuffer.length === 0) {
421
+ entryInfos[0].crcCounter = crcCounter;
422
+ entryInfos[0].fileByteCount = fileByteCount;
423
+ const payloadDataDescriptor = zipWriter.writeDataDescriptor(crcCounter, fileByteCount);
424
+ controller.enqueue(payloadDataDescriptor);
425
+ _countChunk(payloadDataDescriptor);
426
+ // prepare the manifest
427
+ entryInfos[1].filename = '0.manifest.json';
428
+ entryInfos[1].offset = totalByteCount;
429
+ controller.enqueue(getHeader(entryInfos[1].filename));
430
+ _countChunk(getHeader(entryInfos[1].filename));
431
+ crcCounter = 0;
432
+ fileByteCount = 0;
433
+ // hash the concat of all hashes
434
+ const payloadSigStr = await getSignature(cfg.keyForEncryption.unwrappedKeyBinary, Binary.fromString(aggregateHash), cfg.integrityAlgorithm, cfg.cryptoService);
435
+ manifest.encryptionInformation.integrityInformation.rootSignature.sig =
436
+ base64.encode(payloadSigStr);
437
+ manifest.encryptionInformation.integrityInformation.rootSignature.alg =
438
+ cfg.integrityAlgorithm;
439
+ manifest.encryptionInformation.integrityInformation.segmentSizeDefault = segmentSizeDefault;
440
+ manifest.encryptionInformation.integrityInformation.encryptedSegmentSizeDefault =
441
+ encryptedSegmentSizeDefault;
442
+ manifest.encryptionInformation.integrityInformation.segmentHashAlg =
443
+ cfg.segmentIntegrityAlgorithm;
444
+ manifest.encryptionInformation.integrityInformation.segments = segmentInfos;
445
+ manifest.encryptionInformation.method.isStreamable = true;
446
+ const signedAssertions = [];
447
+ if (cfg.assertionConfigs && cfg.assertionConfigs.length > 0) {
448
+ await Promise.all(cfg.assertionConfigs.map(async (assertionConfig) => {
449
+ // Create assertion using the assertionConfig values
450
+ const signingKey = assertionConfig.signingKey ?? {
451
+ alg: 'HS256',
452
+ key: new Uint8Array(cfg.keyForEncryption.unwrappedKeyBinary.asArrayBuffer()),
453
+ };
454
+ const assertion = await assertions.CreateAssertion(aggregateHash, {
455
+ ...assertionConfig,
456
+ signingKey,
457
+ });
458
+ // Add signed assertion to the signedAssertions array
459
+ signedAssertions.push(assertion);
460
+ }));
461
+ }
462
+ manifest.assertions = signedAssertions;
463
+ // write the manifest
464
+ const manifestBuffer = new TextEncoder().encode(JSON.stringify(manifest));
465
+ controller.enqueue(manifestBuffer);
466
+ _countChunk(manifestBuffer);
467
+ entryInfos[1].crcCounter = crcCounter;
468
+ entryInfos[1].fileByteCount = fileByteCount;
469
+ const manifestDataDescriptor = zipWriter.writeDataDescriptor(crcCounter, fileByteCount);
470
+ controller.enqueue(manifestDataDescriptor);
471
+ _countChunk(manifestDataDescriptor);
472
+ // write the central directory out
473
+ const centralDirectoryByteCount = totalByteCount;
474
+ for (let i = 0; i < entryInfos.length; i++) {
475
+ const entryInfo = entryInfos[i];
476
+ const result = zipWriter.writeCentralDirectoryRecord(entryInfo.fileByteCount || 0, entryInfo.filename, entryInfo.offset || 0, entryInfo.crcCounter || 0, 2175008768);
477
+ controller.enqueue(result);
478
+ _countChunk(result);
479
+ }
480
+ const endOfCentralDirectoryByteCount = totalByteCount - centralDirectoryByteCount;
481
+ const finalChunk = zipWriter.writeEndOfCentralDirectoryRecord(entryInfos.length, endOfCentralDirectoryByteCount, centralDirectoryByteCount);
482
+ controller.enqueue(finalChunk);
483
+ _countChunk(finalChunk);
484
+ controller.close();
485
+ }
486
+ },
487
+ };
488
+ const plaintextStream = new DecoratedReadableStream(underlingSource);
489
+ plaintextStream.manifest = manifest;
490
+ if (upsertResponse) {
491
+ plaintextStream.upsertResponse = upsertResponse;
492
+ plaintextStream.tdfSize = totalByteCount;
493
+ plaintextStream.algorithm = manifest.encryptionInformation.method.algorithm;
494
+ }
495
+ return plaintextStream;
496
+ // nested helper fn's
497
+ function getHeader(filename) {
498
+ return zipWriter.getLocalFileHeader(filename, 0, 0, 0);
499
+ }
500
+ function _countChunk(chunk) {
501
+ if (typeof chunk === 'string') {
502
+ chunk = new TextEncoder().encode(chunk);
503
+ }
504
+ totalByteCount += chunk.length;
505
+ if (totalByteCount > cfg.byteLimit) {
506
+ throw new ConfigurationError(`Safe byte limit (${cfg.byteLimit}) exceeded`);
507
+ }
508
+ //new Uint8Array(chunk.buffer, chunk.byteOffset, chunk.byteLength);
509
+ crcCounter = unsigned(chunk, crcCounter);
510
+ fileByteCount += chunk.length;
511
+ }
512
+ async function _encryptAndCountSegment(chunk) {
513
+ bytesProcessed += chunk.length;
514
+ cfg.progressHandler?.(bytesProcessed);
515
+ // Don't pass in an IV here. The encrypt function will generate one for you, ensuring that each segment has a unique IV.
516
+ const encryptedResult = await cfg.encryptionInformation.encrypt(Binary.fromArrayBuffer(chunk.buffer), cfg.keyForEncryption.unwrappedKeyBinary);
517
+ const payloadBuffer = new Uint8Array(encryptedResult.payload.asByteArray());
518
+ const payloadSigStr = await getSignature(cfg.keyForEncryption.unwrappedKeyBinary, encryptedResult.payload, cfg.segmentIntegrityAlgorithm, cfg.cryptoService);
519
+ // combined string of all hashes for root signature
520
+ aggregateHash += payloadSigStr;
521
+ segmentInfos.push({
522
+ hash: base64.encode(payloadSigStr),
523
+ segmentSize: chunk.length === segmentSizeDefault ? undefined : chunk.length,
524
+ encryptedSegmentSize: payloadBuffer.length === encryptedSegmentSizeDefault ? undefined : payloadBuffer.length,
525
+ });
526
+ const result = new Uint8Array(encryptedResult.payload.asByteArray());
527
+ _countChunk(result);
528
+ return result;
529
+ }
530
+ }
531
+ // load the TDF as a stream in memory, for further use in reading and key syncing
532
+ export async function loadTDFStream(chunker) {
533
+ const zipReader = new ZipReader(chunker);
534
+ const centralDirectory = await zipReader.getCentralDirectory();
535
+ const manifest = await zipReader.getManifest(centralDirectory, '0.manifest.json');
536
+ return { manifest, zipReader, centralDirectory };
537
+ }
538
+ export function splitLookupTableFactory(keyAccess, allowedKases) {
539
+ const allowed = (k) => allowedKases.allows(k.url);
540
+ const splitIds = new Set(keyAccess.map(({ sid }) => sid ?? ''));
541
+ const accessibleSplits = new Set(keyAccess.filter(allowed).map(({ sid }) => sid));
542
+ if (splitIds.size > accessibleSplits.size) {
543
+ const disallowedKases = new Set(keyAccess.filter((k) => !allowed(k)).map(({ url }) => url));
544
+ throw new UnsafeUrlError(`Unreconstructable key - disallowed KASes include: ${JSON.stringify([
545
+ ...disallowedKases,
546
+ ])} from splitIds ${JSON.stringify([...splitIds])}`, ...disallowedKases);
547
+ }
548
+ const splitPotentials = Object.fromEntries([...splitIds].map((s) => [s, {}]));
549
+ for (const kao of keyAccess) {
550
+ const disjunction = splitPotentials[kao.sid ?? ''];
551
+ if (kao.url in disjunction) {
552
+ throw new InvalidFileError(`TODO: Fallback to no split ids. Repetition found for [${kao.url}] on split [${kao.sid}]`);
553
+ }
554
+ if (allowed(kao)) {
555
+ disjunction[kao.url] = kao;
556
+ }
557
+ }
558
+ return splitPotentials;
559
+ }
560
+ async function unwrapKey({ manifest, allowedKases, authProvider, dpopKeys, entity, cryptoService, }) {
561
+ if (authProvider === undefined) {
562
+ throw new ConfigurationError('upsert requires auth provider; must be configured in client constructor');
563
+ }
564
+ const { keyAccess } = manifest.encryptionInformation;
565
+ const splitPotentials = splitLookupTableFactory(keyAccess, allowedKases);
566
+ const isAppIdProvider = authProvider && isAppIdProviderCheck(authProvider);
567
+ async function tryKasRewrap(keySplitInfo) {
568
+ const url = `${keySplitInfo.url}/${isAppIdProvider ? '' : 'v2/'}rewrap`;
569
+ const ephemeralEncryptionKeys = await cryptoService.cryptoToPemPair(await cryptoService.generateKeyPair());
570
+ const clientPublicKey = ephemeralEncryptionKeys.publicKey;
571
+ const requestBodyStr = JSON.stringify({
572
+ algorithm: 'RS256',
573
+ keyAccess: keySplitInfo,
574
+ policy: manifest.encryptionInformation.policy,
575
+ clientPublicKey,
576
+ });
577
+ const jwtPayload = { requestBody: requestBodyStr };
578
+ const signedRequestToken = await reqSignature(isAppIdProvider ? {} : jwtPayload, dpopKeys.privateKey);
579
+ let requestBody;
580
+ if (isAppIdProvider) {
581
+ requestBody = {
582
+ keyAccess: keySplitInfo,
583
+ policy: manifest.encryptionInformation.policy,
584
+ entity: {
585
+ ...entity,
586
+ publicKey: clientPublicKey,
587
+ },
588
+ authToken: signedRequestToken,
589
+ };
590
+ }
591
+ else {
592
+ requestBody = {
593
+ signedRequestToken,
594
+ };
595
+ }
596
+ const httpReq = await authProvider.withCreds(buildRequest('POST', url, requestBody));
597
+ const { data: { entityWrappedKey, metadata }, } = await axios.post(httpReq.url, httpReq.body, { headers: httpReq.headers });
598
+ const key = Binary.fromString(base64.decode(entityWrappedKey));
599
+ const decryptedKeyBinary = await cryptoService.decryptWithPrivateKey(key, ephemeralEncryptionKeys.privateKey);
600
+ return {
601
+ key: new Uint8Array(decryptedKeyBinary.asByteArray()),
602
+ metadata,
603
+ };
604
+ }
605
+ // Get unique split IDs to determine if we have an OR or AND condition
606
+ const splitIds = new Set(Object.keys(splitPotentials));
607
+ // If we have only one split ID, it's an OR condition
608
+ if (splitIds.size === 1) {
609
+ const [splitId] = splitIds;
610
+ const potentials = splitPotentials[splitId];
611
+ try {
612
+ // OR condition: Try all KAS servers for this split, take first success
613
+ const result = await Promise.any(Object.values(potentials).map(async (keySplitInfo) => {
614
+ try {
615
+ return await tryKasRewrap(keySplitInfo);
616
+ }
617
+ catch (e) {
618
+ // Rethrow with more context
619
+ throw handleRewrapError(e);
620
+ }
621
+ }));
622
+ const reconstructedKey = keyMerge([result.key]);
623
+ return {
624
+ reconstructedKeyBinary: Binary.fromArrayBuffer(reconstructedKey),
625
+ metadata: result.metadata,
626
+ };
627
+ }
628
+ catch (error) {
629
+ if (error instanceof AggregateError) {
630
+ // All KAS servers failed
631
+ throw error.errors[0]; // Throw the first error since we've already wrapped them
632
+ }
633
+ throw error;
634
+ }
635
+ }
636
+ else {
637
+ // AND condition: We need successful results from all different splits
638
+ const splitResults = await Promise.all(Object.entries(splitPotentials).map(async ([splitId, potentials]) => {
639
+ if (!potentials || !Object.keys(potentials).length) {
640
+ throw new UnsafeUrlError(`Unreconstructable key - no valid KAS found for split ${JSON.stringify(splitId)}`, '');
641
+ }
642
+ try {
643
+ // For each split, try all potential KAS servers until one succeeds
644
+ return await Promise.any(Object.values(potentials).map(async (keySplitInfo) => {
645
+ try {
646
+ return await tryKasRewrap(keySplitInfo);
647
+ }
648
+ catch (e) {
649
+ throw handleRewrapError(e);
650
+ }
651
+ }));
652
+ }
653
+ catch (error) {
654
+ if (error instanceof AggregateError) {
655
+ // All KAS servers for this split failed
656
+ throw error.errors[0]; // Throw the first error since we've already wrapped them
657
+ }
658
+ throw error;
659
+ }
660
+ }));
661
+ // Merge all the split keys
662
+ const reconstructedKey = keyMerge(splitResults.map((r) => r.key));
663
+ return {
664
+ reconstructedKeyBinary: Binary.fromArrayBuffer(reconstructedKey),
665
+ metadata: splitResults[0].metadata, // Use metadata from first split
666
+ };
667
+ }
668
+ }
669
+ function handleRewrapError(error) {
670
+ if (axios.isAxiosError(error)) {
671
+ if (error.response?.status && error.response?.status >= 500) {
672
+ return new ServiceError('rewrap failure', error);
673
+ }
674
+ else if (error.response?.status === 403) {
675
+ return new PermissionDeniedError('rewrap failure', error);
676
+ }
677
+ else if (error.response?.status === 401) {
678
+ return new UnauthenticatedError('rewrap auth failure', error);
679
+ }
680
+ else if (error.response?.status === 400) {
681
+ return new InvalidFileError('rewrap bad request; could indicate an invalid policy binding or a configuration error', error);
682
+ }
683
+ else {
684
+ return new NetworkError('rewrap server error', error);
685
+ }
686
+ }
687
+ else {
688
+ if (error.name === 'InvalidAccessError' || error.name === 'OperationError') {
689
+ return new DecryptError('unable to unwrap key from kas', error);
690
+ }
691
+ return new InvalidFileError(`Unable to decrypt the response from KAS: [${error.name}: ${error.message}]`, error);
692
+ }
693
+ }
694
+ async function decryptChunk(encryptedChunk, reconstructedKeyBinary, hash, cipher, segmentIntegrityAlgorithm, cryptoService) {
695
+ if (segmentIntegrityAlgorithm !== 'GMAC' && segmentIntegrityAlgorithm !== 'HS256') {
696
+ }
697
+ const segmentHashStr = await getSignature(reconstructedKeyBinary, Binary.fromArrayBuffer(encryptedChunk.buffer), segmentIntegrityAlgorithm, cryptoService);
698
+ if (hash !== btoa(segmentHashStr)) {
699
+ throw new IntegrityError('Failed integrity check on segment hash');
700
+ }
701
+ return await cipher.decrypt(encryptedChunk, reconstructedKeyBinary);
702
+ }
703
+ async function updateChunkQueue(chunkMap, centralDirectory, zipReader, reconstructedKeyBinary, cipher, segmentIntegrityAlgorithm, cryptoService) {
704
+ const chunksInOneDownload = 500;
705
+ let requests = [];
706
+ const maxLength = 3;
707
+ for (let i = 0; i < chunkMap.length; i += chunksInOneDownload) {
708
+ if (requests.length === maxLength) {
709
+ await Promise.all(requests);
710
+ requests = [];
711
+ }
712
+ requests.push((async () => {
713
+ let buffer;
714
+ const slice = chunkMap.slice(i, i + chunksInOneDownload);
715
+ try {
716
+ const bufferSize = slice.reduce((currentVal, { encryptedSegmentSize }) => currentVal + encryptedSegmentSize, 0);
717
+ buffer = await zipReader.getPayloadSegment(centralDirectory, '0.payload', slice[0].encryptedOffset, bufferSize);
718
+ }
719
+ catch (e) {
720
+ if (e instanceof InvalidFileError) {
721
+ throw e;
722
+ }
723
+ throw new NetworkError('unable to fetch payload segment', e);
724
+ }
725
+ if (buffer) {
726
+ sliceAndDecrypt({
727
+ buffer,
728
+ cryptoService,
729
+ reconstructedKeyBinary,
730
+ slice,
731
+ cipher,
732
+ segmentIntegrityAlgorithm,
733
+ });
734
+ }
735
+ })());
736
+ }
737
+ }
738
+ export async function sliceAndDecrypt({ buffer, reconstructedKeyBinary, slice, cipher, cryptoService, segmentIntegrityAlgorithm, }) {
739
+ for (const index in slice) {
740
+ const { encryptedOffset, encryptedSegmentSize, _resolve, _reject } = slice[index];
741
+ const offset = slice[0].encryptedOffset === 0 ? encryptedOffset : encryptedOffset % slice[0].encryptedOffset;
742
+ const encryptedChunk = new Uint8Array(buffer.slice(offset, offset + encryptedSegmentSize));
743
+ try {
744
+ const result = await decryptChunk(encryptedChunk, reconstructedKeyBinary, slice[index]['hash'], cipher, segmentIntegrityAlgorithm, cryptoService);
745
+ slice[index].decryptedChunk = result;
746
+ if (_resolve) {
747
+ _resolve(null);
748
+ }
749
+ }
750
+ catch (e) {
751
+ if (_reject) {
752
+ _reject(e);
753
+ }
754
+ else {
755
+ throw e;
756
+ }
757
+ }
758
+ }
759
+ }
760
+ export async function readStream(cfg) {
761
+ let { allowList } = cfg;
762
+ if (!allowList) {
763
+ if (!cfg.allowedKases) {
764
+ throw new ConfigurationError('Upsert cannot be done without allowlist');
765
+ }
766
+ allowList = new OriginAllowList(cfg.allowedKases);
767
+ }
768
+ const { manifest, zipReader, centralDirectory } = await loadTDFStream(cfg.chunker);
769
+ if (!manifest) {
770
+ throw new InvalidFileError('Missing manifest data');
771
+ }
772
+ cfg.keyMiddleware ??= async (key) => key;
773
+ const { encryptedSegmentSizeDefault: defaultSegmentSize, rootSignature, segmentHashAlg, segments, } = manifest.encryptionInformation.integrityInformation;
774
+ const { metadata, reconstructedKeyBinary } = await unwrapKey({
775
+ manifest,
776
+ authProvider: cfg.authProvider,
777
+ allowedKases: allowList,
778
+ dpopKeys: cfg.dpopKeys,
779
+ entity: cfg.entity,
780
+ cryptoService: cfg.cryptoService,
781
+ });
782
+ // async function unwrapKey(manifest: Manifest, allowedKases: string[], authProvider: AuthProvider | AppIdAuthProvider, publicKey: string, privateKey: string, entity: EntityObject) {
783
+ const keyForDecryption = await cfg.keyMiddleware(reconstructedKeyBinary);
784
+ const encryptedSegmentSizeDefault = defaultSegmentSize || DEFAULT_SEGMENT_SIZE;
785
+ // check the combined string of hashes
786
+ const aggregateHash = segments.map(({ hash }) => base64.decode(hash)).join('');
787
+ const integrityAlgorithm = rootSignature.alg;
788
+ if (integrityAlgorithm !== 'GMAC' && integrityAlgorithm !== 'HS256') {
789
+ throw new UnsupportedError(`Unsupported integrity alg [${integrityAlgorithm}]`);
790
+ }
791
+ const payloadSigStr = await getSignature(keyForDecryption, Binary.fromString(aggregateHash), integrityAlgorithm, cfg.cryptoService);
792
+ if (manifest.encryptionInformation.integrityInformation.rootSignature.sig !==
793
+ base64.encode(payloadSigStr)) {
794
+ throw new IntegrityError('Failed integrity check on root signature');
795
+ }
796
+ if (!cfg.noVerifyAssertions) {
797
+ for (const assertion of manifest.assertions || []) {
798
+ // Create a default assertion key
799
+ let assertionKey = {
800
+ alg: 'HS256',
801
+ key: new Uint8Array(reconstructedKeyBinary.asArrayBuffer()),
802
+ };
803
+ if (cfg.assertionVerificationKeys) {
804
+ const foundKey = cfg.assertionVerificationKeys.Keys[assertion.id];
805
+ if (foundKey) {
806
+ assertionKey = foundKey;
807
+ }
808
+ }
809
+ await assertions.verify(assertion, aggregateHash, assertionKey);
810
+ }
811
+ }
812
+ let mapOfRequestsOffset = 0;
813
+ const chunkMap = new Map(segments.map(({ hash, encryptedSegmentSize = encryptedSegmentSizeDefault }) => {
814
+ const result = (() => {
815
+ let _resolve, _reject;
816
+ const chunk = {
817
+ hash,
818
+ encryptedOffset: mapOfRequestsOffset,
819
+ encryptedSegmentSize,
820
+ promise: new Promise((resolve, reject) => {
821
+ _resolve = resolve;
822
+ _reject = reject;
823
+ }),
824
+ };
825
+ chunk._resolve = _resolve;
826
+ chunk._reject = _reject;
827
+ return chunk;
828
+ })();
829
+ mapOfRequestsOffset += encryptedSegmentSize || encryptedSegmentSizeDefault;
830
+ return [hash, result];
831
+ }));
832
+ const cipher = new AesGcmCipher(cfg.cryptoService);
833
+ const segmentIntegrityAlg = segmentHashAlg || integrityAlgorithm;
834
+ if (segmentIntegrityAlg !== 'GMAC' && segmentIntegrityAlg !== 'HS256') {
835
+ throw new UnsupportedError(`Unsupported segment hash alg [${segmentIntegrityAlg}]`);
836
+ }
837
+ // Not waiting for Promise to resolve
838
+ updateChunkQueue(Array.from(chunkMap.values()), centralDirectory, zipReader, keyForDecryption, cipher, segmentIntegrityAlg, cfg.cryptoService);
839
+ let progress = 0;
840
+ const underlyingSource = {
841
+ pull: async (controller) => {
842
+ if (chunkMap.size === 0) {
843
+ controller.close();
844
+ return;
845
+ }
846
+ const [hash, chunk] = chunkMap.entries().next().value;
847
+ if (!chunk.decryptedChunk) {
848
+ await chunk.promise;
849
+ }
850
+ const decryptedSegment = chunk.decryptedChunk;
851
+ controller.enqueue(new Uint8Array(decryptedSegment.payload.asByteArray()));
852
+ progress += chunk.encryptedSegmentSize;
853
+ cfg.progressHandler?.(progress);
854
+ chunk.decryptedChunk = null;
855
+ chunkMap.delete(hash);
856
+ },
857
+ ...(cfg.fileStreamServiceWorker && { fileStreamServiceWorker: cfg.fileStreamServiceWorker }),
858
+ };
859
+ const outputStream = new DecoratedReadableStream(underlyingSource);
860
+ outputStream.manifest = manifest;
861
+ outputStream.emit('manifest', manifest);
862
+ outputStream.metadata = metadata;
863
+ outputStream.emit('rewrap', metadata);
864
+ return outputStream;
865
+ }
866
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"tdf.js","sourceRoot":"","sources":["../../../../tdf3/src/tdf.ts"],"names":[],"mappings":"AAAA,OAAO,KAAqB,MAAM,OAAO,CAAC;AAC1C,OAAO,EAAE,QAAQ,EAAE,MAAM,yBAAyB,CAAC;AACnD,OAAO,EAAE,UAAU,EAAE,UAAU,EAAE,MAAM,MAAM,CAAC;AAC9C,OAAO,EAAE,uBAAuB,EAAE,MAAM,qCAAqC,CAAC;AAE9E,OAAO,EAAE,oBAAoB,EAAE,iBAAiB,EAAE,MAAM,oBAAoB,CAAC;AAG7E,OAAO,KAAK,UAAU,MAAM,iBAAiB,CAAC;AAE9C,OAAO,EAEL,QAAQ,IAAI,iBAAiB,EAK7B,MAAM,IAAI,eAAe,EAGzB,OAAO,IAAI,gBAAgB,GAI5B,MAAM,mBAAmB,CAAC;AAC3B,OAAO,EAAE,MAAM,EAAE,MAAM,8BAA8B,CAAC;AACtD,OAAO,EAEL,SAAS,EACT,SAAS,EACT,cAAc,EACd,oBAAoB,EACpB,QAAQ,EACR,YAAY,EACZ,WAAW,GACZ,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,MAAM,EAAE,MAAM,aAAa,CAAC;AACrC,OAAO,EAA2C,eAAe,EAAE,MAAM,qBAAqB,CAAC;AAC/F,OAAO,EACL,kBAAkB,EAClB,YAAY,EACZ,gBAAgB,EAChB,cAAc,EACd,YAAY,EACZ,qBAAqB,EACrB,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,cAAc,EACd,uBAAuB,IAAI,gBAAgB,GAC5C,MAAM,qBAAqB,CAAC;AAC7B,OAAO,EAAE,mBAAmB,EAAE,MAAM,sBAAsB,CAAC;AAE3D,eAAe;AACf,4GAA4G;AAC5G,OAAO,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAC;AAClD,OAAO,EAKL,YAAY,GACb,MAAM,wBAAwB,CAAC;AAMhC,0CAA0C;AAC1C,MAAM,oBAAoB,GAAG,IAAI,GAAG,IAAI,CAAC;AAgIzC;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CACrC,GAAW,EACX,SAAiC;IAEjC,IAAI,CAAC,GAAG,EAAE;QACR,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,CAAC,CAAC;KAC1D;IACD,uDAAuD;IACvD,iBAAiB,CAAC,GAAG,CAAC,CAAC;IACvB,MAAM,UAAU,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,SAAS,EAAE,SAAS,IAAI,UAAU,EAAE,CAAC;IACpE,MAAM,MAAM,GAAuB,EAAE,CAAC;IACtC,IAAI,SAAS,EAAE;QACb,MAAM,CAAC,SAAS,GAAG,SAAS,CAAC;KAC9B;IACD,MAAM,KAAK,GAAG,GAAG,GAAG,oBAAoB,CAAC;IACzC,IAAI;QACF,MAAM,QAAQ,GAAwC,MAAM,KAAK,CAAC,GAAG,CAAC,KAAK,EAAE;YAC3E,MAAM,EAAE;gBACN,GAAG,MAAM;gBACT,CAAC,EAAE,GAAG;aACP;SACF,CAAC,CAAC;QACH,MAAM,SAAS,GACb,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ;YAC/B,CAAC,CAAC,MAAM,uBAAuB,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC9C,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,CAAC;QAC9B,OAAO;YACL,SAAS;YACT,GAAG,EAAE,oBAAoB,CAAC,SAAS,CAAC;YACpC,GAAG,UAAU;YACb,GAAG,CAAC,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ,IAAI,QAAQ,CAAC,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;SAC1F,CAAC;KACH;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,MAAM,GAAG,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC;QACvC,QAAQ,MAAM,EAAE;YACd,KAAK,GAAG,CAAC;YACT,KAAK,GAAG;gBACN,uCAAuC;gBACvC,MAAM;YACR,KAAK,GAAG;gBACN,MAAM,IAAI,oBAAoB,CAAC,IAAI,KAAK,iBAAiB,EAAE,KAAK,CAAC,CAAC;YACpE,KAAK,GAAG;gBACN,MAAM,IAAI,qBAAqB,CAAC,IAAI,KAAK,qBAAqB,EAAE,KAAK,CAAC,CAAC;YACzE;gBACE,IAAI,MAAM,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,GAAG,GAAG,EAAE;oBAC3C,MAAM,IAAI,kBAAkB,CAC1B,IAAI,KAAK,oBAAoB,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACzE,KAAK,CACN,CAAC;iBACH;gBACD,MAAM,IAAI,YAAY,CACpB,IAAI,KAAK,YAAY,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACjE,KAAK,CACN,CAAC;SACL;KACF;IACD,uBAAuB;IACvB,MAAM,KAAK,GAAG,GAAG,GAAG,iBAAiB,CAAC;IACtC,IAAI;QACF,MAAM,QAAQ,GAAwC,MAAM,KAAK,CAAC,GAAG,CAAC,KAAK,EAAE;YAC3E,MAAM;SACP,CAAC,CAAC;QACH,MAAM,SAAS,GACb,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ;YAC/B,CAAC,CAAC,MAAM,uBAAuB,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC9C,CAAC,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,CAAC;QAC9B,yDAAyD;QACzD,OAAO;YACL,SAAS;YACT,GAAG,EAAE,oBAAoB,CAAC,SAAS,CAAC;YACpC,GAAG,UAAU;YACb,GAAG,CAAC,OAAO,QAAQ,CAAC,IAAI,KAAK,QAAQ,IAAI,QAAQ,CAAC,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,QAAQ,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;SAC1F,CAAC;KACH;IAAC,OAAO,KAAK,EAAE;QACd,MAAM,MAAM,GAAG,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC;QACvC,QAAQ,MAAM,EAAE;YACd,KAAK,GAAG;gBACN,MAAM,IAAI,oBAAoB,CAAC,IAAI,KAAK,iBAAiB,EAAE,KAAK,CAAC,CAAC;YACpE,KAAK,GAAG;gBACN,MAAM,IAAI,qBAAqB,CAAC,IAAI,KAAK,qBAAqB,EAAE,KAAK,CAAC,CAAC;YACzE;gBACE,IAAI,MAAM,IAAI,MAAM,IAAI,GAAG,IAAI,MAAM,GAAG,GAAG,EAAE;oBAC3C,MAAM,IAAI,kBAAkB,CAC1B,IAAI,KAAK,oBAAoB,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACzE,KAAK,CACN,CAAC;iBACH;gBACD,MAAM,IAAI,YAAY,CACpB,IAAI,KAAK,YAAY,MAAM,MAAM,KAAK,CAAC,IAAI,MAAM,KAAK,CAAC,OAAO,GAAG,EACjE,KAAK,CACN,CAAC;SACL;KACF;AACH,CAAC;AACD;;;;;;GAMG;AACH,MAAM,UAAU,QAAQ,CACtB,OAAmB,EACnB,QAA2B,EAC3B,WAAmB;IAEnB,MAAM,EAAE,MAAM,EAAE,GAAG,IAAI,GAAG,CAAC,WAAW,CAAC,CAAC;IACxC,MAAM,cAAc,GAAW,OAAO,QAAQ,KAAK,QAAQ,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;IAElG,MAAM,cAAc,GAAG,mBAAmB,CAAC;QACzC,WAAW;QACX,eAAe,EAAE,MAAM;QACvB,QAAQ,EAAE,MAAM,CAAC,MAAM,CAAC,cAAc,CAAC;QACvC,OAAO,EAAE,YAAY,CAAC,OAAO,EAAE,QAAQ,CAAC;KACzC,CAAC,CAAC;IAEH,OAAO,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;AAClD,CAAC;AAED,MAAM,UAAU,UAAU,CAAC,WAAuD;IAChF,IAAI,IAAI,CAAC;IACT,IAAI,WAAW,YAAY,WAAW,IAAI,WAAW,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE;QACzE,IAAI,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;KAC9C;SAAM;QACL,IAAI,GAAG,WAAW,CAAC,QAAQ,EAAE,CAAC;KAC/B;IACD,MAAM,SAAS,GAAG,uEAAuE,CAAC;IAC1F,MAAM,QAAQ,GAAG,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACtC,IAAI,QAAQ,KAAK,IAAI,EAAE;QACrB,MAAM,IAAI,gBAAgB,CAAC,oBAAoB,CAAC,CAAC;KAClD;IACD,MAAM,aAAa,GAAG,QAAQ,CAAC,CAAC,CAAC,CAAC;IAClC,IAAI;QACF,OAAO,cAAc,CAAC,aAAa,CAAC,CAAC;KACtC;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,IAAI,gBAAgB,CAAC,iDAAiD,EAAE,CAAC,CAAC,CAAC;KAClF;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,uBAAuB,CAAC,SAAiB;IAC7D,IAAI,GAAG,GAAW,SAAS,CAAC;IAE5B,wEAAwE;IACxE,yCAAyC;IACzC,IAAI,SAAS,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE;QACrC,MAAM,IAAI,GAAG,MAAM,UAAU,CAAC,SAAS,EAAE,OAAO,EAAE,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC;QACzE,GAAG,GAAG,MAAM,UAAU,CAAC,IAAI,CAAC,CAAC;KAC9B;IAED,OAAO,GAAG,CAAC;AACb,CAAC;AAED;;;;;;;;;;;;;GAaG;AACH,MAAM,CAAC,KAAK,UAAU,cAAc,CAAC,EACnC,YAAY,EACZ,IAAI,EACJ,GAAG,EACH,SAAS,EACT,GAAG,EACH,YAAY,EACZ,QAAQ,EACR,GAAG,GAAG,EAAE,GACO;IACf,uCAAuC;IACvC,SAAS,eAAe,CACtB,IAAmB,EACnB,MAAc,EACd,gBAAoC,EACpC,MAAc,EACd,QAAmB;QAEnB,QAAQ,IAAI,EAAE;YACZ,KAAK,SAAS;gBACZ,OAAO,IAAI,gBAAgB,CAAC,MAAM,EAAE,gBAAgB,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,CAAC,CAAC;YAC/E,KAAK,QAAQ;gBACX,OAAO,IAAI,eAAe,CAAC,MAAM,EAAE,gBAAgB,EAAE,MAAM,EAAE,QAAQ,EAAE,GAAG,CAAC,CAAC;YAC9E;gBACE,MAAM,IAAI,kBAAkB,CAAC,mCAAmC,IAAI,aAAa,CAAC,CAAC;SACtF;IACH,CAAC;IAED,8DAA8D;IAC9D,IAAI,YAAY,IAAI,YAAY,EAAE;QAChC,MAAM,IAAI,GAAG,YAAY,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAC5C,IAAI,IAAI,IAAI,IAAI,CAAC,MAAM,IAAI,IAAI,CAAC,MAAM,EAAE;YACtC,OAAO,eAAe,CAAC,IAAI,EAAE,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;SAC5E;KACF;IAED,yEAAyE;IACzE,IAAI,GAAG,IAAI,SAAS,EAAE;QACpB,OAAO,eAAe,CAAC,IAAI,EAAE,GAAG,EAAE,GAAG,EAAE,MAAM,uBAAuB,CAAC,SAAS,CAAC,EAAE,QAAQ,CAAC,CAAC;KAC5F;IAED,mEAAmE;IACnE,MAAM,WAAW,GAAG,YAAY,EAAE,UAAU,EAAE,CAAC;IAC/C,IAAI,WAAW,EAAE;QACf,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,GAAG,WAAW,CAAC;QACvC,IAAI,MAAM,IAAI,MAAM,EAAE;YACpB,OAAO,eAAe,CAAC,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,uBAAuB,CAAC,MAAM,CAAC,EAAE,QAAQ,CAAC,CAAC;SAC5F;KACF;IACD,8BAA8B;IAC9B,MAAM,IAAI,kBAAkB,CAAC,oDAAoD,CAAC,CAAC;AACrF,CAAC;AAED,MAAM,UAAU,oBAAoB,CAAC,MAAc;IACjD,MAAM,aAAa,GAAa,EAAE,CAAC;IAEnC,IAAI,CAAC,MAAM,CAAC,IAAI;QAAE,aAAa,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAC7C,IAAI,CAAC,MAAM,CAAC,IAAI;QAAE,aAAa,CAAC,IAAI,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;IAC5D,IAAI,MAAM,CAAC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM;QAAE,aAAa,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IAE1E,IAAI,aAAa,CAAC,MAAM,EAAE;QACxB,MAAM,IAAI,kBAAkB,CAC1B,8DAA8D,aAAa,EAAE,CAC9E,CAAC;KACH;AACH,CAAC;AAED,KAAK,UAAU,iBAAiB,CAC9B,OAAgB,EAChB,qBAA+B,EAC/B,MAAc,EACd,QAA4B;IAE5B,8CAA8C;IAC9C,MAAM,OAAO,GAAG;QACd,IAAI,EAAE,WAAW;QACjB,GAAG,EAAE,WAAW;QAChB,QAAQ,EAAE,KAAK;QACf,WAAW,EAAE,IAAI;QACjB,aAAa,EAAE,OAAO;QACtB,GAAG,CAAC,QAAQ,IAAI,EAAE,QAAQ,EAAE,CAAC;KAC9B,CAAC;IAEF,MAAM,wBAAwB,GAAG,MAAM,qBAAqB,CAAC,KAAK,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACpF,MAAM,UAAU,GAA2B,EAAE,CAAC;IAC9C,OAAO;QACL,OAAO;QACP,yEAAyE;QACzE,qBAAqB,EAAE,wBAAwB;QAC/C,UAAU,EAAE,UAAU;KACvB,CAAC;AACJ,CAAC;AAED,KAAK,UAAU,YAAY,CACzB,kBAA0B,EAC1B,aAAqB,EACrB,aAAiC,EACjC,aAA4B;IAE5B,QAAQ,aAAa,CAAC,WAAW,EAAE,EAAE;QACnC,KAAK,MAAM;YACT,oDAAoD;YACpD,OAAO,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,EAAE,KAAK,CAAC,CAAC;QACtF,KAAK,OAAO;YACV,6BAA6B;YAC7B,OAAO,MAAM,aAAa,CAAC,IAAI,CAC7B,YAAY,CAAC,IAAI,UAAU,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC,EAAE,KAAK,CAAC,EACvE,YAAY,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,aAAa,EAAE,CAAC,EAAE,OAAO,CAAC,CACrE,CAAC;QACJ;YACE,MAAM,IAAI,kBAAkB,CAAC,8BAA8B,aAAa,GAAG,CAAC,CAAC;KAChF;AACH,CAAC;AAED,SAAS,YAAY,CAAC,MAAkB,EAAE,GAAW,EAAE,IAAc;IACnE,OAAO;QACL,OAAO,EAAE,EAAE;QACX,MAAM,EAAE,MAAM;QACd,GAAG,EAAE,GAAG;QACR,IAAI;KACL,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,MAAM,CAAC,EAC3B,YAAY,EACZ,SAAS,EACT,YAAY,EACZ,MAAM,EACN,UAAU,EACV,eAAe,EACf,UAAU,GACU;IACpB,MAAM,OAAO,GAAG,CAAC,GAAG,EAAE;QACpB,IAAI,SAAS,EAAE;YACb,OAAO,SAAS,CAAC;SAClB;QACD,IAAI,CAAC,YAAY,EAAE;YACjB,MAAM,IAAI,kBAAkB,CAAC,yCAAyC,CAAC,CAAC;SACzE;QACD,OAAO,IAAI,eAAe,CAAC,YAAY,CAAC,CAAC;IAC3C,CAAC,CAAC,EAAE,CAAC;IACL,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,GAAG,eAAe,CAAC,qBAAqB,CAAC;IACpE,MAAM,eAAe,GAAG,YAAY,IAAI,oBAAoB,CAAC,YAAY,CAAC,CAAC;IAC3E,IAAI,YAAY,KAAK,SAAS,EAAE;QAC9B,MAAM,IAAI,kBAAkB,CAAC,6CAA6C,CAAC,CAAC;KAC7E;IACD,OAAO,OAAO,CAAC,GAAG,CAChB,SAAS,CAAC,GAAG,CAAC,KAAK,EAAE,eAAe,EAAE,EAAE;QACtC,2EAA2E;QAC3E,MAAM,QAAQ,GAAG,iBAAiB,CAAC,eAAe,CAAC,CAAC;QACpD,IAAI,CAAC,UAAU,IAAI,CAAC,QAAQ,EAAE;YAC5B,OAAO;SACR;QAED,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,EAAE;YACxC,MAAM,IAAI,cAAc,CAAC,wBAAwB,eAAe,CAAC,GAAG,GAAG,CAAC,CAAC;SAC1E;QAED,MAAM,GAAG,GAAG,GAAG,eAAe,CAAC,GAAG,IAAI,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,QAAQ,CAAC;QAE3E,2DAA2D;QAC3D,sFAAsF;QACtF,MAAM,IAAI,GAA4B;YACpC,SAAS,EAAE,eAAe;YAC1B,MAAM,EAAE,eAAe,CAAC,qBAAqB,CAAC,MAAM;YACpD,MAAM,EAAE,oBAAoB,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS;YAC/D,SAAS,EAAE,SAAS;YACpB,sBAAsB,EAAE,SAAS;SAClC,CAAC;QAEF,IAAI,oBAAoB,CAAC,YAAY,CAAC,EAAE;YACtC,IAAI,CAAC,SAAS,GAAG,MAAM,YAAY,CAAC,EAAE,EAAE,UAAU,CAAC,CAAC;SACrD;aAAM;YACL,IAAI,CAAC,sBAAsB,GAAG,MAAM,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;SACpE;QACD,MAAM,OAAO,GAAG,MAAM,YAAY,CAAC,SAAS,CAAC,YAAY,CAAC,MAAM,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC,CAAC;QAE9E,IAAI;YACF,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,EAAE;gBAC3D,OAAO,EAAE,OAAO,CAAC,OAAO;aACzB,CAAC,CAAC;YAEH,0FAA0F;YAC1F,eAAe;YACf,OAAO,eAAe,CAAC,UAAU,CAAC;YAClC,OAAO,eAAe,CAAC,iBAAiB,CAAC;YACzC,OAAO,eAAe,CAAC,aAAa,CAAC;YAErC,IAAI,QAAQ,EAAE;gBACZ,2EAA2E;gBAC3E,MAAM,aAAa,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBACxD,eAAe,CAAC,qBAAqB,CAAC,MAAM,GAAG,MAAM,CAAC,MAAM,CAC1D,IAAI,CAAC,SAAS,CAAC,EAAE,IAAI,EAAE,aAAa,CAAC,IAAI,EAAE,CAAC,CAC7C,CAAC;aACH;YACD,OAAO,QAAQ,CAAC,IAAI,CAAC;SACtB;QAAC,OAAO,CAAC,EAAE;YACV,IAAI,CAAC,CAAC,QAAQ,EAAE;gBACd,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,IAAI,GAAG,EAAE;oBAC5B,MAAM,IAAI,YAAY,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC;iBAC7C;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,qBAAqB,CAAC,gBAAgB,EAAE,CAAC,CAAC,CAAC;iBACtD;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,oBAAoB,CAAC,qBAAqB,EAAE,CAAC,CAAC,CAAC;iBAC1D;qBAAM,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,KAAK,GAAG,EAAE;oBACpC,MAAM,IAAI,kBAAkB,CAAC,kDAAkD,EAAE,CAAC,CAAC,CAAC;iBACrF;qBAAM;oBACL,MAAM,IAAI,YAAY,CAAC,qBAAqB,EAAE,CAAC,CAAC,CAAC;iBAClD;aACF;iBAAM,IAAI,CAAC,CAAC,OAAO,EAAE;gBACpB,MAAM,IAAI,YAAY,CAAC,wBAAwB,EAAE,CAAC,CAAC,CAAC;aACrD;YACD,MAAM,IAAI,QAAQ,CAChB,mDAAmD,CAAC,CAAC,IAAI,KAAK,CAAC,CAAC,OAAO,iBAAiB,CAAC,EAAE,QAAQ,EAAE,IAAI,GAAG,EAC5G,CAAC,CACF,CAAC;SACH;IACH,CAAC,CAAC,CACH,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,WAAW,CAAC,GAAyB;IACzD,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE;QACrB,MAAM,IAAI,kBAAkB,CAAC,qCAAqC,CAAC,CAAC;KACrE;IACD,IAAI,CAAC,GAAG,CAAC,aAAa,EAAE;QACtB,MAAM,IAAI,kBAAkB,CAAC,yBAAyB,CAAC,CAAC;KACzD;IAED,4DAA4D;IAC5D,MAAM,YAAY,GAAc,EAAE,CAAC;IAEnC,GAAG,CAAC,SAAS,KAAK,MAAM,CAAC,gBAAgB,CAAC;IAE1C,MAAM,UAAU,GAAgB;QAC9B;YACE,QAAQ,EAAE,WAAW;SACtB;QACD;YACE,QAAQ,EAAE,iBAAiB;SAC5B;KACF,CAAC;IAEF,IAAI,aAAa,GAAG,IAAI,UAAU,EAAE,CAAC;IAErC,IAAI,cAAc,GAAG,CAAC,CAAC;IACvB,IAAI,cAAc,GAAG,CAAC,CAAC;IACvB,IAAI,UAAU,GAAG,CAAC,CAAC;IACnB,IAAI,aAAa,GAAG,CAAC,CAAC;IACtB,IAAI,aAAa,GAAG,EAAE,CAAC;IAEvB,MAAM,SAAS,GAAG,IAAI,SAAS,EAAE,CAAC;IAClC,MAAM,QAAQ,GAAG,MAAM,iBAAiB,CACtC,GAAG,CAAC,cAAc,EAClB,GAAG,CAAC,qBAAqB,EACzB,GAAG,CAAC,MAAM,EACV,GAAG,CAAC,QAAQ,CACb,CAAC;IAEF,IAAI,CAAC,QAAQ,EAAE;QACb,2CAA2C;QAC3C,MAAM,IAAI,kBAAkB,CAAC,gEAAgE,CAAC,CAAC;KAChG;IACD,MAAM,SAAS,GAAG,GAAG,CAAC,QAAQ,CAAC,UAAU,CAAC;IAE1C,qDAAqD;IACrD,MAAM,cAAc,GAAG,MAAM,MAAM,CAAC;QAClC,YAAY,EAAE,GAAG,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,YAAY;QAC1D,SAAS,EAAE,GAAG,CAAC,SAAS;QACxB,YAAY,EAAE,GAAG,CAAC,YAAY;QAC9B,MAAM,EAAE,GAAG,CAAC,MAAM;QAClB,UAAU,EAAE,SAAS;QACrB,eAAe,EAAE,QAAQ;KAC1B,CAAC,CAAC;IAEH,yDAAyD;IACzD,MAAM,EAAE,kBAAkB,EAAE,GAAG,GAAG,CAAC;IACnC,MAAM,eAAe,GAAG,MAAM,GAAG,CAAC,qBAAqB,CAAC,OAAO,CAC7D,MAAM,CAAC,eAAe,CAAC,IAAI,WAAW,CAAC,kBAAkB,CAAC,CAAC,EAC3D,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CACxC,CAAC;IACF,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;IAC5E,MAAM,2BAA2B,GAAG,aAAa,CAAC,MAAM,CAAC;IAEzD,4BAA4B;IAC5B,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,WAAW,CAAC;IACrC,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,GAAG,cAAc,CAAC;IACtC,MAAM,YAAY,GAAG,GAAG,CAAC,aAAa,CAAC,SAAS,EAAE,CAAC;IAEnD;;;;;;;MAOE;IACF,MAAM,eAAe,GAAG;QACtB,KAAK,EAAE,CAAC,UAA2C,EAAE,EAAE;YACrD,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;YACtD,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;YAC/C,UAAU,GAAG,CAAC,CAAC;YACf,aAAa,GAAG,CAAC,CAAC;QACpB,CAAC;QAED,IAAI,EAAE,KAAK,EAAE,UAA2C,EAAE,EAAE;YAC1D,IAAI,MAAM,CAAC;YAEX,OAAO,aAAa,CAAC,MAAM,GAAG,kBAAkB,IAAI,CAAC,MAAM,EAAE;gBAC3D,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,GAAG,MAAM,YAAY,CAAC,IAAI,EAAE,CAAC;gBAClD,MAAM,GAAG,IAAI,CAAC;gBACd,IAAI,KAAK,EAAE;oBACT,aAAa,GAAG,WAAW,CAAC,CAAC,aAAa,EAAE,KAAK,CAAC,CAAC,CAAC;iBACrD;aACF;YAED,OACE,aAAa,CAAC,MAAM,IAAI,kBAAkB;gBAC1C,CAAC,CAAC,UAAU,CAAC,WAAW;gBACxB,UAAU,CAAC,WAAW,GAAG,CAAC,EAC1B;gBACA,MAAM,OAAO,GAAG,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,kBAAkB,CAAC,CAAC;gBAC3D,MAAM,gBAAgB,GAAG,MAAM,uBAAuB,CAAC,OAAO,CAAC,CAAC;gBAChE,UAAU,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;gBAErC,aAAa,GAAG,aAAa,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;aACzD;YAED,MAAM,gBAAgB,GAAG,MAAM,IAAI,aAAa,CAAC,MAAM,CAAC;YAExD,IAAI,gBAAgB,EAAE;gBACpB,MAAM,gBAAgB,GAAG,MAAM,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBACtE,UAAU,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;gBACrC,aAAa,GAAG,IAAI,UAAU,EAAE,CAAC;aAClC;YAED,IAAI,MAAM,IAAI,aAAa,CAAC,MAAM,KAAK,CAAC,EAAE;gBACxC,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,GAAG,UAAU,CAAC;gBACtC,UAAU,CAAC,CAAC,CAAC,CAAC,aAAa,GAAG,aAAa,CAAC;gBAC5C,MAAM,qBAAqB,GAAG,SAAS,CAAC,mBAAmB,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;gBAEvF,UAAU,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC;gBAC1C,WAAW,CAAC,qBAAqB,CAAC,CAAC;gBAEnC,uBAAuB;gBACvB,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,GAAG,iBAAiB,CAAC;gBAC3C,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,GAAG,cAAc,CAAC;gBACtC,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;gBACtD,WAAW,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC;gBAC/C,UAAU,GAAG,CAAC,CAAC;gBACf,aAAa,GAAG,CAAC,CAAC;gBAElB,gCAAgC;gBAChC,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,EACvC,MAAM,CAAC,UAAU,CAAC,aAAa,CAAC,EAChC,GAAG,CAAC,kBAAkB,EACtB,GAAG,CAAC,aAAa,CAClB,CAAC;gBACF,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;oBACnE,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;gBAC/B,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;oBACnE,GAAG,CAAC,kBAAkB,CAAC;gBAEzB,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;gBAC5F,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,2BAA2B;oBAC7E,2BAA2B,CAAC;gBAC9B,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,cAAc;oBAChE,GAAG,CAAC,yBAAyB,CAAC;gBAChC,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,QAAQ,GAAG,YAAY,CAAC;gBAE5E,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;gBAE1D,MAAM,gBAAgB,GAA2B,EAAE,CAAC;gBACpD,IAAI,GAAG,CAAC,gBAAgB,IAAI,GAAG,CAAC,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE;oBAC3D,MAAM,OAAO,CAAC,GAAG,CACf,GAAG,CAAC,gBAAgB,CAAC,GAAG,CAAC,KAAK,EAAE,eAAe,EAAE,EAAE;wBACjD,oDAAoD;wBACpD,MAAM,UAAU,GAAiB,eAAe,CAAC,UAAU,IAAI;4BAC7D,GAAG,EAAE,OAAO;4BACZ,GAAG,EAAE,IAAI,UAAU,CAAC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CAAC,aAAa,EAAE,CAAC;yBAC7E,CAAC;wBACF,MAAM,SAAS,GAAG,MAAM,UAAU,CAAC,eAAe,CAAC,aAAa,EAAE;4BAChE,GAAG,eAAe;4BAClB,UAAU;yBACX,CAAC,CAAC;wBAEH,qDAAqD;wBACrD,gBAAgB,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;oBACnC,CAAC,CAAC,CACH,CAAC;iBACH;gBAED,QAAQ,CAAC,UAAU,GAAG,gBAAgB,CAAC;gBAEvC,qBAAqB;gBACrB,MAAM,cAAc,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC,CAAC;gBAC1E,UAAU,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;gBACnC,WAAW,CAAC,cAAc,CAAC,CAAC;gBAC5B,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,GAAG,UAAU,CAAC;gBACtC,UAAU,CAAC,CAAC,CAAC,CAAC,aAAa,GAAG,aAAa,CAAC;gBAC5C,MAAM,sBAAsB,GAAG,SAAS,CAAC,mBAAmB,CAAC,UAAU,EAAE,aAAa,CAAC,CAAC;gBACxF,UAAU,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC;gBAC3C,WAAW,CAAC,sBAAsB,CAAC,CAAC;gBAEpC,kCAAkC;gBAClC,MAAM,yBAAyB,GAAG,cAAc,CAAC;gBACjD,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;oBAC1C,MAAM,SAAS,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;oBAChC,MAAM,MAAM,GAAG,SAAS,CAAC,2BAA2B,CAClD,SAAS,CAAC,aAAa,IAAI,CAAC,EAC5B,SAAS,CAAC,QAAQ,EAClB,SAAS,CAAC,MAAM,IAAI,CAAC,EACrB,SAAS,CAAC,UAAU,IAAI,CAAC,EACzB,UAAU,CACX,CAAC;oBACF,UAAU,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;oBAC3B,WAAW,CAAC,MAAM,CAAC,CAAC;iBACrB;gBACD,MAAM,8BAA8B,GAAG,cAAc,GAAG,yBAAyB,CAAC;gBAClF,MAAM,UAAU,GAAG,SAAS,CAAC,gCAAgC,CAC3D,UAAU,CAAC,MAAM,EACjB,8BAA8B,EAC9B,yBAAyB,CAC1B,CAAC;gBACF,UAAU,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC/B,WAAW,CAAC,UAAU,CAAC,CAAC;gBAExB,UAAU,CAAC,KAAK,EAAE,CAAC;aACpB;QACH,CAAC;KACF,CAAC;IAEF,MAAM,eAAe,GAAG,IAAI,uBAAuB,CAAC,eAAe,CAAC,CAAC;IACrE,eAAe,CAAC,QAAQ,GAAG,QAAQ,CAAC;IAEpC,IAAI,cAAc,EAAE;QAClB,eAAe,CAAC,cAAc,GAAG,cAAc,CAAC;QAChD,eAAe,CAAC,OAAO,GAAG,cAAc,CAAC;QACzC,eAAe,CAAC,SAAS,GAAG,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,SAAS,CAAC;KAC7E;IAED,OAAO,eAAe,CAAC;IAEvB,qBAAqB;IACrB,SAAS,SAAS,CAAC,QAAgB;QACjC,OAAO,SAAS,CAAC,kBAAkB,CAAC,QAAQ,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;IACzD,CAAC;IAED,SAAS,WAAW,CAAC,KAA0B;QAC7C,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;YAC7B,KAAK,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;SACzC;QACD,cAAc,IAAI,KAAK,CAAC,MAAM,CAAC;QAC/B,IAAI,cAAc,GAAG,GAAG,CAAC,SAAS,EAAE;YAClC,MAAM,IAAI,kBAAkB,CAAC,oBAAoB,GAAG,CAAC,SAAS,YAAY,CAAC,CAAC;SAC7E;QACD,mEAAmE;QACnE,UAAU,GAAG,QAAQ,CAAC,KAAK,EAAE,UAAU,CAAC,CAAC;QACzC,aAAa,IAAI,KAAK,CAAC,MAAM,CAAC;IAChC,CAAC;IAED,KAAK,UAAU,uBAAuB,CAAC,KAAiB;QACtD,cAAc,IAAI,KAAK,CAAC,MAAM,CAAC;QAC/B,GAAG,CAAC,eAAe,EAAE,CAAC,cAAc,CAAC,CAAC;QAEtC,wHAAwH;QACxH,MAAM,eAAe,GAAG,MAAM,GAAG,CAAC,qBAAqB,CAAC,OAAO,CAC7D,MAAM,CAAC,eAAe,CAAC,KAAK,CAAC,MAAM,CAAC,EACpC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,CACxC,CAAC;QACF,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;QAC5E,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,GAAG,CAAC,gBAAgB,CAAC,kBAAkB,EACvC,eAAe,CAAC,OAAO,EACvB,GAAG,CAAC,yBAAyB,EAC7B,GAAG,CAAC,aAAa,CAClB,CAAC;QAEF,mDAAmD;QACnD,aAAa,IAAI,aAAa,CAAC;QAE/B,YAAY,CAAC,IAAI,CAAC;YAChB,IAAI,EAAE,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC;YAClC,WAAW,EAAE,KAAK,CAAC,MAAM,KAAK,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM;YAC3E,oBAAoB,EAClB,aAAa,CAAC,MAAM,KAAK,2BAA2B,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,aAAa,CAAC,MAAM;SAC1F,CAAC,CAAC;QACH,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,eAAe,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC;QACrE,WAAW,CAAC,MAAM,CAAC,CAAC;QAEpB,OAAO,MAAM,CAAC;IAChB,CAAC;AACH,CAAC;AAED,iFAAiF;AACjF,MAAM,CAAC,KAAK,UAAU,aAAa,CACjC,OAAgB;IAEhB,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,OAAO,CAAC,CAAC;IACzC,MAAM,gBAAgB,GAAG,MAAM,SAAS,CAAC,mBAAmB,EAAE,CAAC;IAC/D,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,WAAW,CAAC,gBAAgB,EAAE,iBAAiB,CAAC,CAAC;IAClF,OAAO,EAAE,QAAQ,EAAE,SAAS,EAAE,gBAAgB,EAAE,CAAC;AACnD,CAAC;AAED,MAAM,UAAU,uBAAuB,CACrC,SAA4B,EAC5B,YAA6B;IAE7B,MAAM,OAAO,GAAG,CAAC,CAAkB,EAAE,EAAE,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;IACnE,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC,CAAC;IAEhE,MAAM,gBAAgB,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;IAClF,IAAI,QAAQ,CAAC,IAAI,GAAG,gBAAgB,CAAC,IAAI,EAAE;QACzC,MAAM,eAAe,GAAG,IAAI,GAAG,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,GAAG,CAAC,CAAC,CAAC;QAC5F,MAAM,IAAI,cAAc,CACtB,qDAAqD,IAAI,CAAC,SAAS,CAAC;YAClE,GAAG,eAAe;SACnB,CAAC,kBAAkB,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,QAAQ,CAAC,CAAC,EAAE,EACnD,GAAG,eAAe,CACnB,CAAC;KACH;IACD,MAAM,eAAe,GAAoD,MAAM,CAAC,WAAW,CACzF,CAAC,GAAG,QAAQ,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAClC,CAAC;IACF,KAAK,MAAM,GAAG,IAAI,SAAS,EAAE;QAC3B,MAAM,WAAW,GAAG,eAAe,CAAC,GAAG,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC;QACnD,IAAI,GAAG,CAAC,GAAG,IAAI,WAAW,EAAE;YAC1B,MAAM,IAAI,gBAAgB,CACxB,yDAAyD,GAAG,CAAC,GAAG,eAAe,GAAG,CAAC,GAAG,GAAG,CAC1F,CAAC;SACH;QACD,IAAI,OAAO,CAAC,GAAG,CAAC,EAAE;YAChB,WAAW,CAAC,GAAG,CAAC,GAAG,CAAC,GAAG,GAAG,CAAC;SAC5B;KACF;IACD,OAAO,eAAe,CAAC;AACzB,CAAC;AAED,KAAK,UAAU,SAAS,CAAC,EACvB,QAAQ,EACR,YAAY,EACZ,YAAY,EACZ,QAAQ,EACR,MAAM,EACN,aAAa,GAQd;IACC,IAAI,YAAY,KAAK,SAAS,EAAE;QAC9B,MAAM,IAAI,kBAAkB,CAC1B,yEAAyE,CAC1E,CAAC;KACH;IACD,MAAM,EAAE,SAAS,EAAE,GAAG,QAAQ,CAAC,qBAAqB,CAAC;IACrD,MAAM,eAAe,GAAG,uBAAuB,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;IACzE,MAAM,eAAe,GAAG,YAAY,IAAI,oBAAoB,CAAC,YAAY,CAAC,CAAC;IAE3E,KAAK,UAAU,YAAY,CAAC,YAA6B;QACvD,MAAM,GAAG,GAAG,GAAG,YAAY,CAAC,GAAG,IAAI,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,QAAQ,CAAC;QACxE,MAAM,uBAAuB,GAAG,MAAM,aAAa,CAAC,eAAe,CACjE,MAAM,aAAa,CAAC,eAAe,EAAE,CACtC,CAAC;QACF,MAAM,eAAe,GAAG,uBAAuB,CAAC,SAAS,CAAC;QAE1D,MAAM,cAAc,GAAG,IAAI,CAAC,SAAS,CAAC;YACpC,SAAS,EAAE,OAAO;YAClB,SAAS,EAAE,YAAY;YACvB,MAAM,EAAE,QAAQ,CAAC,qBAAqB,CAAC,MAAM;YAC7C,eAAe;SAChB,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,EAAE,WAAW,EAAE,cAAc,EAAE,CAAC;QACnD,MAAM,kBAAkB,GAAG,MAAM,YAAY,CAC3C,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,EACjC,QAAQ,CAAC,UAAU,CACpB,CAAC;QAEF,IAAI,WAAW,CAAC;QAChB,IAAI,eAAe,EAAE;YACnB,WAAW,GAAG;gBACZ,SAAS,EAAE,YAAY;gBACvB,MAAM,EAAE,QAAQ,CAAC,qBAAqB,CAAC,MAAM;gBAC7C,MAAM,EAAE;oBACN,GAAG,MAAM;oBACT,SAAS,EAAE,eAAe;iBAC3B;gBACD,SAAS,EAAE,kBAAkB;aAC9B,CAAC;SACH;aAAM;YACL,WAAW,GAAG;gBACZ,kBAAkB;aACnB,CAAC;SACH;QAED,MAAM,OAAO,GAAG,MAAM,YAAY,CAAC,SAAS,CAAC,YAAY,CAAC,MAAM,EAAE,GAAG,EAAE,WAAW,CAAC,CAAC,CAAC;QACrF,MAAM,EACJ,IAAI,EAAE,EAAE,gBAAgB,EAAE,QAAQ,EAAE,GACrC,GAAG,MAAM,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC;QAE9E,MAAM,GAAG,GAAG,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC;QAC/D,MAAM,kBAAkB,GAAG,MAAM,aAAa,CAAC,qBAAqB,CAClE,GAAG,EACH,uBAAuB,CAAC,UAAU,CACnC,CAAC;QAEF,OAAO;YACL,GAAG,EAAE,IAAI,UAAU,CAAC,kBAAkB,CAAC,WAAW,EAAE,CAAC;YACrD,QAAQ;SACT,CAAC;IACJ,CAAC;IAED,sEAAsE;IACtE,MAAM,QAAQ,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC;IAEvD,qDAAqD;IACrD,IAAI,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAE;QACvB,MAAM,CAAC,OAAO,CAAC,GAAG,QAAQ,CAAC;QAC3B,MAAM,UAAU,GAAG,eAAe,CAAC,OAAO,CAAC,CAAC;QAE5C,IAAI;YACF,uEAAuE;YACvE,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,GAAG,CAC9B,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,YAAY,EAAE,EAAE;gBACnD,IAAI;oBACF,OAAO,MAAM,YAAY,CAAC,YAAY,CAAC,CAAC;iBACzC;gBAAC,OAAO,CAAC,EAAE;oBACV,4BAA4B;oBAC5B,MAAM,iBAAiB,CAAC,CAAuB,CAAC,CAAC;iBAClD;YACH,CAAC,CAAC,CACH,CAAC;YAEF,MAAM,gBAAgB,GAAG,QAAQ,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC;YAChD,OAAO;gBACL,sBAAsB,EAAE,MAAM,CAAC,eAAe,CAAC,gBAAgB,CAAC;gBAChE,QAAQ,EAAE,MAAM,CAAC,QAAQ;aAC1B,CAAC;SACH;QAAC,OAAO,KAAK,EAAE;YACd,IAAI,KAAK,YAAY,cAAc,EAAE;gBACnC,yBAAyB;gBACzB,MAAM,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,yDAAyD;aACjF;YACD,MAAM,KAAK,CAAC;SACb;KACF;SAAM;QACL,sEAAsE;QACtE,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,GAAG,CACpC,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,OAAO,EAAE,UAAU,CAAC,EAAE,EAAE;YAClE,IAAI,CAAC,UAAU,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,MAAM,EAAE;gBAClD,MAAM,IAAI,cAAc,CACtB,wDAAwD,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,EAAE,EACjF,EAAE,CACH,CAAC;aACH;YAED,IAAI;gBACF,mEAAmE;gBACnE,OAAO,MAAM,OAAO,CAAC,GAAG,CACtB,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,YAAY,EAAE,EAAE;oBACnD,IAAI;wBACF,OAAO,MAAM,YAAY,CAAC,YAAY,CAAC,CAAC;qBACzC;oBAAC,OAAO,CAAC,EAAE;wBACV,MAAM,iBAAiB,CAAC,CAAuB,CAAC,CAAC;qBAClD;gBACH,CAAC,CAAC,CACH,CAAC;aACH;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,KAAK,YAAY,cAAc,EAAE;oBACnC,wCAAwC;oBACxC,MAAM,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,yDAAyD;iBACjF;gBACD,MAAM,KAAK,CAAC;aACb;QACH,CAAC,CAAC,CACH,CAAC;QAEF,2BAA2B;QAC3B,MAAM,gBAAgB,GAAG,QAAQ,CAAC,YAAY,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;QAClE,OAAO;YACL,sBAAsB,EAAE,MAAM,CAAC,eAAe,CAAC,gBAAgB,CAAC;YAChE,QAAQ,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,gCAAgC;SACrE,CAAC;KACH;AACH,CAAC;AAED,SAAS,iBAAiB,CAAC,KAAyB;IAClD,IAAI,KAAK,CAAC,YAAY,CAAC,KAAK,CAAC,EAAE;QAC7B,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,IAAI,GAAG,EAAE;YAC3D,OAAO,IAAI,YAAY,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;SAClD;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,qBAAqB,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;SAC3D;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,oBAAoB,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC;SAC/D;aAAM,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,KAAK,GAAG,EAAE;YACzC,OAAO,IAAI,gBAAgB,CACzB,uFAAuF,EACvF,KAAK,CACN,CAAC;SACH;aAAM;YACL,OAAO,IAAI,YAAY,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC;SACvD;KACF;SAAM;QACL,IAAI,KAAK,CAAC,IAAI,KAAK,oBAAoB,IAAI,KAAK,CAAC,IAAI,KAAK,gBAAgB,EAAE;YAC1E,OAAO,IAAI,YAAY,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;SACjE;QACD,OAAO,IAAI,gBAAgB,CACzB,6CAA6C,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,OAAO,GAAG,EAC5E,KAAK,CACN,CAAC;KACH;AACH,CAAC;AAED,KAAK,UAAU,YAAY,CACzB,cAA0B,EAC1B,sBAA8B,EAC9B,IAAY,EACZ,MAAuB,EACvB,yBAA6C,EAC7C,aAA4B;IAE5B,IAAI,yBAAyB,KAAK,MAAM,IAAI,yBAAyB,KAAK,OAAO,EAAE;KAClF;IACD,MAAM,cAAc,GAAG,MAAM,YAAY,CACvC,sBAAsB,EACtB,MAAM,CAAC,eAAe,CAAC,cAAc,CAAC,MAAM,CAAC,EAC7C,yBAAyB,EACzB,aAAa,CACd,CAAC;IACF,IAAI,IAAI,KAAK,IAAI,CAAC,cAAc,CAAC,EAAE;QACjC,MAAM,IAAI,cAAc,CAAC,wCAAwC,CAAC,CAAC;KACpE;IACD,OAAO,MAAM,MAAM,CAAC,OAAO,CAAC,cAAc,EAAE,sBAAsB,CAAC,CAAC;AACtE,CAAC;AAED,KAAK,UAAU,gBAAgB,CAC7B,QAAiB,EACjB,gBAAoC,EACpC,SAAoB,EACpB,sBAA8B,EAC9B,MAAuB,EACvB,yBAA6C,EAC7C,aAA4B;IAE5B,MAAM,mBAAmB,GAAG,GAAG,CAAC;IAChC,IAAI,QAAQ,GAAG,EAAE,CAAC;IAClB,MAAM,SAAS,GAAG,CAAC,CAAC;IAEpB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,IAAI,mBAAmB,EAAE;QAC7D,IAAI,QAAQ,CAAC,MAAM,KAAK,SAAS,EAAE;YACjC,MAAM,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YAC5B,QAAQ,GAAG,EAAE,CAAC;SACf;QACD,QAAQ,CAAC,IAAI,CACX,CAAC,KAAK,IAAI,EAAE;YACV,IAAI,MAAyB,CAAC;YAE9B,MAAM,KAAK,GAAG,QAAQ,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,GAAG,mBAAmB,CAAC,CAAC;YACzD,IAAI;gBACF,MAAM,UAAU,GAAG,KAAK,CAAC,MAAM,CAC7B,CAAC,UAAU,EAAE,EAAE,oBAAoB,EAAE,EAAE,EAAE,CAAC,UAAU,GAAI,oBAA+B,EACvF,CAAC,CACF,CAAC;gBACF,MAAM,GAAG,MAAM,SAAS,CAAC,iBAAiB,CACxC,gBAAgB,EAChB,WAAW,EACX,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,EACxB,UAAU,CACX,CAAC;aACH;YAAC,OAAO,CAAC,EAAE;gBACV,IAAI,CAAC,YAAY,gBAAgB,EAAE;oBACjC,MAAM,CAAC,CAAC;iBACT;gBACD,MAAM,IAAI,YAAY,CAAC,iCAAiC,EAAE,CAAC,CAAC,CAAC;aAC9D;YACD,IAAI,MAAM,EAAE;gBACV,eAAe,CAAC;oBACd,MAAM;oBACN,aAAa;oBACb,sBAAsB;oBACtB,KAAK;oBACL,MAAM;oBACN,yBAAyB;iBAC1B,CAAC,CAAC;aACJ;QACH,CAAC,CAAC,EAAE,CACL,CAAC;KACH;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,EACpC,MAAM,EACN,sBAAsB,EACtB,KAAK,EACL,MAAM,EACN,aAAa,EACb,yBAAyB,GAQ1B;IACC,KAAK,MAAM,KAAK,IAAI,KAAK,EAAE;QACzB,MAAM,EAAE,eAAe,EAAE,oBAAoB,EAAE,QAAQ,EAAE,OAAO,EAAE,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC;QAElF,MAAM,MAAM,GACV,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,eAAe,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC;QAChG,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,GAAI,oBAA+B,CAAC,CAChE,CAAC;QAEF,IAAI;YACF,MAAM,MAAM,GAAG,MAAM,YAAY,CAC/B,cAAc,EACd,sBAAsB,EACtB,KAAK,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,EACpB,MAAM,EACN,yBAAyB,EACzB,aAAa,CACd,CAAC;YACF,KAAK,CAAC,KAAK,CAAC,CAAC,cAAc,GAAG,MAAM,CAAC;YACrC,IAAI,QAAQ,EAAE;gBACZ,QAAQ,CAAC,IAAI,CAAC,CAAC;aAChB;SACF;QAAC,OAAO,CAAC,EAAE;YACV,IAAI,OAAO,EAAE;gBACX,OAAO,CAAC,CAAC,CAAC,CAAC;aACZ;iBAAM;gBACL,MAAM,CAAC,CAAC;aACT;SACF;KACF;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,UAAU,CAAC,GAAyB;IACxD,IAAI,EAAE,SAAS,EAAE,GAAG,GAAG,CAAC;IACxB,IAAI,CAAC,SAAS,EAAE;QACd,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE;YACrB,MAAM,IAAI,kBAAkB,CAAC,yCAAyC,CAAC,CAAC;SACzE;QACD,SAAS,GAAG,IAAI,eAAe,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;KACnD;IACD,MAAM,EAAE,QAAQ,EAAE,SAAS,EAAE,gBAAgB,EAAE,GAAG,MAAM,aAAa,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IACnF,IAAI,CAAC,QAAQ,EAAE;QACb,MAAM,IAAI,gBAAgB,CAAC,uBAAuB,CAAC,CAAC;KACrD;IACD,GAAG,CAAC,aAAa,KAAK,KAAK,EAAE,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC;IAEzC,MAAM,EACJ,2BAA2B,EAAE,kBAAkB,EAC/C,aAAa,EACb,cAAc,EACd,QAAQ,GACT,GAAG,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC;IACxD,MAAM,EAAE,QAAQ,EAAE,sBAAsB,EAAE,GAAG,MAAM,SAAS,CAAC;QAC3D,QAAQ;QACR,YAAY,EAAE,GAAG,CAAC,YAAY;QAC9B,YAAY,EAAE,SAAS;QACvB,QAAQ,EAAE,GAAG,CAAC,QAAQ;QACtB,MAAM,EAAE,GAAG,CAAC,MAAM;QAClB,aAAa,EAAE,GAAG,CAAC,aAAa;KACjC,CAAC,CAAC;IACH,sLAAsL;IACtL,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;IACzE,MAAM,2BAA2B,GAAG,kBAAkB,IAAI,oBAAoB,CAAC;IAE/E,sCAAsC;IACtC,MAAM,aAAa,GAAG,QAAQ,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IAC/E,MAAM,kBAAkB,GAAG,aAAa,CAAC,GAAG,CAAC;IAC7C,IAAI,kBAAkB,KAAK,MAAM,IAAI,kBAAkB,KAAK,OAAO,EAAE;QACnE,MAAM,IAAI,gBAAgB,CAAC,8BAA8B,kBAAkB,GAAG,CAAC,CAAC;KACjF;IACD,MAAM,aAAa,GAAG,MAAM,YAAY,CACtC,gBAAgB,EAChB,MAAM,CAAC,UAAU,CAAC,aAAa,CAAC,EAChC,kBAAkB,EAClB,GAAG,CAAC,aAAa,CAClB,CAAC;IAEF,IACE,QAAQ,CAAC,qBAAqB,CAAC,oBAAoB,CAAC,aAAa,CAAC,GAAG;QACrE,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,EAC5B;QACA,MAAM,IAAI,cAAc,CAAC,0CAA0C,CAAC,CAAC;KACtE;IAED,IAAI,CAAC,GAAG,CAAC,kBAAkB,EAAE;QAC3B,KAAK,MAAM,SAAS,IAAI,QAAQ,CAAC,UAAU,IAAI,EAAE,EAAE;YACjD,iCAAiC;YACjC,IAAI,YAAY,GAAiB;gBAC/B,GAAG,EAAE,OAAO;gBACZ,GAAG,EAAE,IAAI,UAAU,CAAC,sBAAsB,CAAC,aAAa,EAAE,CAAC;aAC5D,CAAC;YAEF,IAAI,GAAG,CAAC,yBAAyB,EAAE;gBACjC,MAAM,QAAQ,GAAG,GAAG,CAAC,yBAAyB,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;gBAClE,IAAI,QAAQ,EAAE;oBACZ,YAAY,GAAG,QAAQ,CAAC;iBACzB;aACF;YACD,MAAM,UAAU,CAAC,MAAM,CAAC,SAAS,EAAE,aAAa,EAAE,YAAY,CAAC,CAAC;SACjE;KACF;IAED,IAAI,mBAAmB,GAAG,CAAC,CAAC;IAC5B,MAAM,QAAQ,GAAG,IAAI,GAAG,CACtB,QAAQ,CAAC,GAAG,CAAC,CAAC,EAAE,IAAI,EAAE,oBAAoB,GAAG,2BAA2B,EAAE,EAAE,EAAE;QAC5E,MAAM,MAAM,GAAG,CAAC,GAAG,EAAE;YACnB,IAAI,QAAQ,EAAE,OAAO,CAAC;YACtB,MAAM,KAAK,GAAU;gBACnB,IAAI;gBACJ,eAAe,EAAE,mBAAmB;gBACpC,oBAAoB;gBACpB,OAAO,EAAE,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;oBACvC,QAAQ,GAAG,OAAO,CAAC;oBACnB,OAAO,GAAG,MAAM,CAAC;gBACnB,CAAC,CAAC;aACH,CAAC;YACF,KAAK,CAAC,QAAQ,GAAG,QAAQ,CAAC;YAC1B,KAAK,CAAC,OAAO,GAAG,OAAO,CAAC;YACxB,OAAO,KAAK,CAAC;QACf,CAAC,CAAC,EAAE,CAAC;QACL,mBAAmB,IAAI,oBAAoB,IAAI,2BAA2B,CAAC;QAC3E,OAAO,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC;IACxB,CAAC,CAAC,CACH,CAAC;IAEF,MAAM,MAAM,GAAG,IAAI,YAAY,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAG,cAAc,IAAI,kBAAkB,CAAC;IACjE,IAAI,mBAAmB,KAAK,MAAM,IAAI,mBAAmB,KAAK,OAAO,EAAE;QACrE,MAAM,IAAI,gBAAgB,CAAC,iCAAiC,mBAAmB,GAAG,CAAC,CAAC;KACrF;IAED,qCAAqC;IACrC,gBAAgB,CACd,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC,EAC7B,gBAAgB,EAChB,SAAS,EACT,gBAAgB,EAChB,MAAM,EACN,mBAAmB,EACnB,GAAG,CAAC,aAAa,CAClB,CAAC;IAEF,IAAI,QAAQ,GAAG,CAAC,CAAC;IACjB,MAAM,gBAAgB,GAAG;QACvB,IAAI,EAAE,KAAK,EAAE,UAA2C,EAAE,EAAE;YAC1D,IAAI,QAAQ,CAAC,IAAI,KAAK,CAAC,EAAE;gBACvB,UAAU,CAAC,KAAK,EAAE,CAAC;gBACnB,OAAO;aACR;YAED,MAAM,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,QAAQ,CAAC,OAAO,EAAE,CAAC,IAAI,EAAE,CAAC,KAAK,CAAC;YACtD,IAAI,CAAC,KAAK,CAAC,cAAc,EAAE;gBACzB,MAAM,KAAK,CAAC,OAAO,CAAC;aACrB;YACD,MAAM,gBAAgB,GAAG,KAAK,CAAC,cAAc,CAAC;YAE9C,UAAU,CAAC,OAAO,CAAC,IAAI,UAAU,CAAC,gBAAgB,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC;YAC3E,QAAQ,IAAI,KAAK,CAAC,oBAAoB,CAAC;YACvC,GAAG,CAAC,eAAe,EAAE,CAAC,QAAQ,CAAC,CAAC;YAEhC,KAAK,CAAC,cAAc,GAAG,IAAI,CAAC;YAC5B,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACxB,CAAC;QACD,GAAG,CAAC,GAAG,CAAC,uBAAuB,IAAI,EAAE,uBAAuB,EAAE,GAAG,CAAC,uBAAuB,EAAE,CAAC;KAC7F,CAAC;IAEF,MAAM,YAAY,GAAG,IAAI,uBAAuB,CAAC,gBAAgB,CAAC,CAAC;IAEnE,YAAY,CAAC,QAAQ,GAAG,QAAQ,CAAC;IACjC,YAAY,CAAC,IAAI,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;IACxC,YAAY,CAAC,QAAQ,GAAG,QAAQ,CAAC;IACjC,YAAY,CAAC,IAAI,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;IACtC,OAAO,YAAY,CAAC;AACtB,CAAC"}