@pulumi/artifactory 6.0.0 → 6.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +1 -1
- package/scopedToken.d.ts +105 -21
- package/scopedToken.js.map +1 -1
package/package.json
CHANGED
package/scopedToken.d.ts
CHANGED
|
@@ -80,7 +80,10 @@ export declare class ScopedToken extends pulumi.CustomResource {
|
|
|
80
80
|
*/
|
|
81
81
|
readonly accessToken: pulumi.Output<string>;
|
|
82
82
|
/**
|
|
83
|
-
* A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to
|
|
83
|
+
* A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to
|
|
84
|
+
* total 255 characters. Default to '*@*' if not set. Service ID must begin with valid JFrog service type. Options: jfrt,
|
|
85
|
+
* jfxr, jfpip, jfds, jfmc, jfac, jfevt, jfmd, jfcon, or *. For instructions to retrieve the Artifactory Service ID see
|
|
86
|
+
* this [documentation](https://jfrog.com/help/r/jfrog-rest-apis/get-service-id)
|
|
84
87
|
*/
|
|
85
88
|
readonly audiences: pulumi.Output<string[] | undefined>;
|
|
86
89
|
/**
|
|
@@ -88,7 +91,14 @@ export declare class ScopedToken extends pulumi.CustomResource {
|
|
|
88
91
|
*/
|
|
89
92
|
readonly description: pulumi.Output<string>;
|
|
90
93
|
/**
|
|
91
|
-
* The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is
|
|
94
|
+
* The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is
|
|
95
|
+
* mandatory, what is the default expiry, and what is the maximum expiry allowed. Must be non-negative. Default value is
|
|
96
|
+
* based on configuration in 'access.config.yaml'. See [API
|
|
97
|
+
* documentation](https://jfrog.com/help/r/jfrog-rest-apis/revoke-token-by-id) for details. Access Token would not be saved
|
|
98
|
+
* by Artifactory if this is less than the persistence threshold value (default to 10800 seconds) set in Access
|
|
99
|
+
* configuration. See [official
|
|
100
|
+
* documentation](https://jfrog.com/help/r/jfrog-platform-administration-documentation/using-the-revocable-and-persistency-thresholds)
|
|
101
|
+
* for details.
|
|
92
102
|
*/
|
|
93
103
|
readonly expiresIn: pulumi.Output<number>;
|
|
94
104
|
/**
|
|
@@ -96,11 +106,12 @@ export declare class ScopedToken extends pulumi.CustomResource {
|
|
|
96
106
|
*/
|
|
97
107
|
readonly expiry: pulumi.Output<number>;
|
|
98
108
|
/**
|
|
99
|
-
* The grant type used to authenticate the request. In this case, the only value supported is `
|
|
109
|
+
* The grant type used to authenticate the request. In this case, the only value supported is `client_credentials` which is
|
|
110
|
+
* also the default value if this parameter is not specified.
|
|
100
111
|
*/
|
|
101
112
|
readonly grantType: pulumi.Output<string>;
|
|
102
113
|
/**
|
|
103
|
-
* Also create a reference token which can be used like an API key.
|
|
114
|
+
* Also create a reference token which can be used like an API key. Default is `false`.
|
|
104
115
|
*/
|
|
105
116
|
readonly includeReferenceToken: pulumi.Output<boolean>;
|
|
106
117
|
/**
|
|
@@ -128,8 +139,23 @@ export declare class ScopedToken extends pulumi.CustomResource {
|
|
|
128
139
|
*/
|
|
129
140
|
readonly refreshable: pulumi.Output<boolean>;
|
|
130
141
|
/**
|
|
131
|
-
* The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can
|
|
132
|
-
*
|
|
142
|
+
* The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can
|
|
143
|
+
* set any scope, while non-admin users can only set the scope to a subset of the groups to which they belong. The
|
|
144
|
+
* supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
|
|
145
|
+
* will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
|
|
146
|
+
* grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
|
|
147
|
+
* `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to inicate the
|
|
148
|
+
* group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
|
|
149
|
+
* livelogsrThe scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
|
|
150
|
+
* total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
|
|
151
|
+
* API. A permission can be represented as a scope token string in the following format:
|
|
152
|
+
* `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
|
|
153
|
+
* from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
|
|
154
|
+
* `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
|
|
155
|
+
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are <r, w, d,
|
|
156
|
+
* a, m> or any combination of these actions .To allow all actions - use `*` Examples: `["applied-permissions/user",
|
|
157
|
+
* "artifact:generic-local:r"]` `["applied-permissions/group", "artifact:generic-local/path:*"]`
|
|
158
|
+
* `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
133
159
|
*/
|
|
134
160
|
readonly scopes: pulumi.Output<string[]>;
|
|
135
161
|
/**
|
|
@@ -141,7 +167,9 @@ export declare class ScopedToken extends pulumi.CustomResource {
|
|
|
141
167
|
*/
|
|
142
168
|
readonly tokenType: pulumi.Output<string>;
|
|
143
169
|
/**
|
|
144
|
-
* The user name for which this token is created. The username is based on the authenticated user - either from the user of
|
|
170
|
+
* The user name for which this token is created. The username is based on the authenticated user - either from the user of
|
|
171
|
+
* the authenticated token or based on the username (if basic auth was used). The username is then used to set the subject
|
|
172
|
+
* of the token: <service-id>/users/<username>. Limited to 255 characters.
|
|
145
173
|
*/
|
|
146
174
|
readonly username: pulumi.Output<string | undefined>;
|
|
147
175
|
/**
|
|
@@ -162,7 +190,10 @@ export interface ScopedTokenState {
|
|
|
162
190
|
*/
|
|
163
191
|
accessToken?: pulumi.Input<string>;
|
|
164
192
|
/**
|
|
165
|
-
* A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to
|
|
193
|
+
* A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to
|
|
194
|
+
* total 255 characters. Default to '*@*' if not set. Service ID must begin with valid JFrog service type. Options: jfrt,
|
|
195
|
+
* jfxr, jfpip, jfds, jfmc, jfac, jfevt, jfmd, jfcon, or *. For instructions to retrieve the Artifactory Service ID see
|
|
196
|
+
* this [documentation](https://jfrog.com/help/r/jfrog-rest-apis/get-service-id)
|
|
166
197
|
*/
|
|
167
198
|
audiences?: pulumi.Input<pulumi.Input<string>[]>;
|
|
168
199
|
/**
|
|
@@ -170,7 +201,14 @@ export interface ScopedTokenState {
|
|
|
170
201
|
*/
|
|
171
202
|
description?: pulumi.Input<string>;
|
|
172
203
|
/**
|
|
173
|
-
* The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is
|
|
204
|
+
* The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is
|
|
205
|
+
* mandatory, what is the default expiry, and what is the maximum expiry allowed. Must be non-negative. Default value is
|
|
206
|
+
* based on configuration in 'access.config.yaml'. See [API
|
|
207
|
+
* documentation](https://jfrog.com/help/r/jfrog-rest-apis/revoke-token-by-id) for details. Access Token would not be saved
|
|
208
|
+
* by Artifactory if this is less than the persistence threshold value (default to 10800 seconds) set in Access
|
|
209
|
+
* configuration. See [official
|
|
210
|
+
* documentation](https://jfrog.com/help/r/jfrog-platform-administration-documentation/using-the-revocable-and-persistency-thresholds)
|
|
211
|
+
* for details.
|
|
174
212
|
*/
|
|
175
213
|
expiresIn?: pulumi.Input<number>;
|
|
176
214
|
/**
|
|
@@ -178,11 +216,12 @@ export interface ScopedTokenState {
|
|
|
178
216
|
*/
|
|
179
217
|
expiry?: pulumi.Input<number>;
|
|
180
218
|
/**
|
|
181
|
-
* The grant type used to authenticate the request. In this case, the only value supported is `
|
|
219
|
+
* The grant type used to authenticate the request. In this case, the only value supported is `client_credentials` which is
|
|
220
|
+
* also the default value if this parameter is not specified.
|
|
182
221
|
*/
|
|
183
222
|
grantType?: pulumi.Input<string>;
|
|
184
223
|
/**
|
|
185
|
-
* Also create a reference token which can be used like an API key.
|
|
224
|
+
* Also create a reference token which can be used like an API key. Default is `false`.
|
|
186
225
|
*/
|
|
187
226
|
includeReferenceToken?: pulumi.Input<boolean>;
|
|
188
227
|
/**
|
|
@@ -210,8 +249,23 @@ export interface ScopedTokenState {
|
|
|
210
249
|
*/
|
|
211
250
|
refreshable?: pulumi.Input<boolean>;
|
|
212
251
|
/**
|
|
213
|
-
* The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can
|
|
214
|
-
*
|
|
252
|
+
* The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can
|
|
253
|
+
* set any scope, while non-admin users can only set the scope to a subset of the groups to which they belong. The
|
|
254
|
+
* supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
|
|
255
|
+
* will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
|
|
256
|
+
* grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
|
|
257
|
+
* `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to inicate the
|
|
258
|
+
* group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
|
|
259
|
+
* livelogsrThe scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
|
|
260
|
+
* total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
|
|
261
|
+
* API. A permission can be represented as a scope token string in the following format:
|
|
262
|
+
* `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
|
|
263
|
+
* from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
|
|
264
|
+
* `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
|
|
265
|
+
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are <r, w, d,
|
|
266
|
+
* a, m> or any combination of these actions .To allow all actions - use `*` Examples: `["applied-permissions/user",
|
|
267
|
+
* "artifact:generic-local:r"]` `["applied-permissions/group", "artifact:generic-local/path:*"]`
|
|
268
|
+
* `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
215
269
|
*/
|
|
216
270
|
scopes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
217
271
|
/**
|
|
@@ -223,7 +277,9 @@ export interface ScopedTokenState {
|
|
|
223
277
|
*/
|
|
224
278
|
tokenType?: pulumi.Input<string>;
|
|
225
279
|
/**
|
|
226
|
-
* The user name for which this token is created. The username is based on the authenticated user - either from the user of
|
|
280
|
+
* The user name for which this token is created. The username is based on the authenticated user - either from the user of
|
|
281
|
+
* the authenticated token or based on the username (if basic auth was used). The username is then used to set the subject
|
|
282
|
+
* of the token: <service-id>/users/<username>. Limited to 255 characters.
|
|
227
283
|
*/
|
|
228
284
|
username?: pulumi.Input<string>;
|
|
229
285
|
}
|
|
@@ -232,7 +288,10 @@ export interface ScopedTokenState {
|
|
|
232
288
|
*/
|
|
233
289
|
export interface ScopedTokenArgs {
|
|
234
290
|
/**
|
|
235
|
-
* A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to
|
|
291
|
+
* A list of the other instances or services that should accept this token identified by their Service-IDs. Limited to
|
|
292
|
+
* total 255 characters. Default to '*@*' if not set. Service ID must begin with valid JFrog service type. Options: jfrt,
|
|
293
|
+
* jfxr, jfpip, jfds, jfmc, jfac, jfevt, jfmd, jfcon, or *. For instructions to retrieve the Artifactory Service ID see
|
|
294
|
+
* this [documentation](https://jfrog.com/help/r/jfrog-rest-apis/get-service-id)
|
|
236
295
|
*/
|
|
237
296
|
audiences?: pulumi.Input<pulumi.Input<string>[]>;
|
|
238
297
|
/**
|
|
@@ -240,15 +299,23 @@ export interface ScopedTokenArgs {
|
|
|
240
299
|
*/
|
|
241
300
|
description?: pulumi.Input<string>;
|
|
242
301
|
/**
|
|
243
|
-
* The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is
|
|
302
|
+
* The amount of time, in seconds, it would take for the token to expire. An admin shall be able to set whether expiry is
|
|
303
|
+
* mandatory, what is the default expiry, and what is the maximum expiry allowed. Must be non-negative. Default value is
|
|
304
|
+
* based on configuration in 'access.config.yaml'. See [API
|
|
305
|
+
* documentation](https://jfrog.com/help/r/jfrog-rest-apis/revoke-token-by-id) for details. Access Token would not be saved
|
|
306
|
+
* by Artifactory if this is less than the persistence threshold value (default to 10800 seconds) set in Access
|
|
307
|
+
* configuration. See [official
|
|
308
|
+
* documentation](https://jfrog.com/help/r/jfrog-platform-administration-documentation/using-the-revocable-and-persistency-thresholds)
|
|
309
|
+
* for details.
|
|
244
310
|
*/
|
|
245
311
|
expiresIn?: pulumi.Input<number>;
|
|
246
312
|
/**
|
|
247
|
-
* The grant type used to authenticate the request. In this case, the only value supported is `
|
|
313
|
+
* The grant type used to authenticate the request. In this case, the only value supported is `client_credentials` which is
|
|
314
|
+
* also the default value if this parameter is not specified.
|
|
248
315
|
*/
|
|
249
316
|
grantType?: pulumi.Input<string>;
|
|
250
317
|
/**
|
|
251
|
-
* Also create a reference token which can be used like an API key.
|
|
318
|
+
* Also create a reference token which can be used like an API key. Default is `false`.
|
|
252
319
|
*/
|
|
253
320
|
includeReferenceToken?: pulumi.Input<boolean>;
|
|
254
321
|
/**
|
|
@@ -260,12 +327,29 @@ export interface ScopedTokenArgs {
|
|
|
260
327
|
*/
|
|
261
328
|
refreshable?: pulumi.Input<boolean>;
|
|
262
329
|
/**
|
|
263
|
-
* The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can
|
|
264
|
-
*
|
|
330
|
+
* The scope of access that the token provides. Access to the REST API is always provided by default. Administrators can
|
|
331
|
+
* set any scope, while non-admin users can only set the scope to a subset of the groups to which they belong. The
|
|
332
|
+
* supported scopes include: * `applied-permissions/user` - provides user access. If left at the default setting, the token
|
|
333
|
+
* will be created with the user-identity scope, which allows users to identify themselves in the Platform but does not
|
|
334
|
+
* grant any specific access permissions.* `applied-permissions/admin` - the scope assigned to admin users.*
|
|
335
|
+
* `applied-permissions/groups` - the group to which permissions are assigned by group name (use username to inicate the
|
|
336
|
+
* group name)* `system:metrics:r` - for getting the service metrics* `system:livelogs:r` - for getting the service
|
|
337
|
+
* livelogsrThe scope to assign to the token should be provided as a list of scope tokens, limited to 500 characters in
|
|
338
|
+
* total. Resource Permissions From Artifactory 7.38.x, resource permissions scoped tokens are also supported in the REST
|
|
339
|
+
* API. A permission can be represented as a scope token string in the following format:
|
|
340
|
+
* `<resource-type>:<target>[/<sub-resource>]:<actions>` Where: `<resource-type>` - one of the permission resource types,
|
|
341
|
+
* from a predefined closed list. Currently, the only resource type that is supported is the artifact resource type.
|
|
342
|
+
* `<target>` - the target resource, can be exact name or a pattern `<sub-resource>` - optional, the target sub-resource,
|
|
343
|
+
* can be exact name or a pattern `<actions>` - comma-separated list of action acronyms.The actions allowed are <r, w, d,
|
|
344
|
+
* a, m> or any combination of these actions .To allow all actions - use `*` Examples: `["applied-permissions/user",
|
|
345
|
+
* "artifact:generic-local:r"]` `["applied-permissions/group", "artifact:generic-local/path:*"]`
|
|
346
|
+
* `["applied-permissions/admin", "system:metrics:r", "artifact:generic-local:*"]`
|
|
265
347
|
*/
|
|
266
348
|
scopes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
267
349
|
/**
|
|
268
|
-
* The user name for which this token is created. The username is based on the authenticated user - either from the user of
|
|
350
|
+
* The user name for which this token is created. The username is based on the authenticated user - either from the user of
|
|
351
|
+
* the authenticated token or based on the username (if basic auth was used). The username is then used to set the subject
|
|
352
|
+
* of the token: <service-id>/users/<username>. Limited to 255 characters.
|
|
269
353
|
*/
|
|
270
354
|
username?: pulumi.Input<string>;
|
|
271
355
|
}
|
package/scopedToken.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"scopedToken.js","sourceRoot":"","sources":["../scopedToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;
|
|
1
|
+
{"version":3,"file":"scopedToken.js","sourceRoot":"","sources":["../scopedToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2DG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA4GD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACrD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,EAAE,gBAAgB,EAAE,cAAc,CAAC,EAAE,CAAC;QAClG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AApLL,kCAqLC;AAvKG,gBAAgB;AACO,wBAAY,GAAG,2CAA2C,CAAC"}
|