@pulumi/auth0 3.31.0-alpha.1761887850 → 3.31.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/client.d.ts +18 -6
- package/client.js +2 -0
- package/client.js.map +1 -1
- package/connection.d.ts +7 -7
- package/connection.js +7 -7
- package/getClient.d.ts +6 -2
- package/getClient.js.map +1 -1
- package/getClientGrants.d.ts +57 -0
- package/getClientGrants.js +32 -0
- package/getClientGrants.js.map +1 -0
- package/getTenant.d.ts +2 -2
- package/index.d.ts +9 -0
- package/index.js +16 -3
- package/index.js.map +1 -1
- package/organizationDiscoveryDomain.d.ts +91 -0
- package/organizationDiscoveryDomain.js +69 -0
- package/organizationDiscoveryDomain.js.map +1 -0
- package/organizationDiscoveryDomains.d.ts +65 -0
- package/organizationDiscoveryDomains.js +60 -0
- package/organizationDiscoveryDomains.js.map +1 -0
- package/package.json +2 -2
- package/tenant.d.ts +7 -8
- package/tenant.js +1 -2
- package/tenant.js.map +1 -1
- package/tokenExchangeProfile.d.ts +2 -2
- package/tokenExchangeProfile.js +2 -2
- package/triggerAction.d.ts +2 -2
- package/triggerAction.js +2 -2
- package/triggerActions.d.ts +4 -4
- package/triggerActions.js +4 -4
- package/types/input.d.ts +50 -0
- package/types/output.d.ts +106 -2
- package/userPermission.d.ts +2 -0
- package/userPermission.js +2 -0
- package/userPermission.js.map +1 -1
- package/userPermissions.d.ts +2 -0
- package/userPermissions.js +2 -0
- package/userPermissions.js.map +1 -1
package/types/output.d.ts
CHANGED
|
@@ -1297,6 +1297,10 @@ export interface ConnectionConnectedAccounts {
|
|
|
1297
1297
|
active: boolean;
|
|
1298
1298
|
}
|
|
1299
1299
|
export interface ConnectionOptions {
|
|
1300
|
+
/**
|
|
1301
|
+
* URL used to exchange a user-authorized request token for an access token.
|
|
1302
|
+
*/
|
|
1303
|
+
accessTokenUrl?: string;
|
|
1300
1304
|
/**
|
|
1301
1305
|
* ADFS URL where to fetch the metadata source.
|
|
1302
1306
|
*/
|
|
@@ -1361,6 +1365,14 @@ export interface ConnectionOptions {
|
|
|
1361
1365
|
* Proof Key for Code Exchange (PKCE) configuration settings for an OIDC or Okta Workforce connection.
|
|
1362
1366
|
*/
|
|
1363
1367
|
connectionSettings: outputs.ConnectionOptionsConnectionSettings;
|
|
1368
|
+
/**
|
|
1369
|
+
* Identifies the client to the service provider
|
|
1370
|
+
*/
|
|
1371
|
+
consumerKey?: string;
|
|
1372
|
+
/**
|
|
1373
|
+
* Secret used to establish ownership of the consumer key.
|
|
1374
|
+
*/
|
|
1375
|
+
consumerSecret?: string;
|
|
1364
1376
|
/**
|
|
1365
1377
|
* Configure extra headers to the Token endpoint of an OAuth 2.0 provider
|
|
1366
1378
|
*/
|
|
@@ -1571,6 +1583,10 @@ export interface ConnectionOptions {
|
|
|
1571
1583
|
* Template that formats the SAML request.
|
|
1572
1584
|
*/
|
|
1573
1585
|
requestTemplate?: string;
|
|
1586
|
+
/**
|
|
1587
|
+
* URL used to obtain an unauthorized request token.
|
|
1588
|
+
*/
|
|
1589
|
+
requestTokenUrl?: string;
|
|
1574
1590
|
/**
|
|
1575
1591
|
* Indicates whether the user is required to provide a username in addition to an email address.
|
|
1576
1592
|
*/
|
|
@@ -1585,6 +1601,10 @@ export interface ConnectionOptions {
|
|
|
1585
1601
|
scripts?: {
|
|
1586
1602
|
[key: string]: string;
|
|
1587
1603
|
};
|
|
1604
|
+
/**
|
|
1605
|
+
* Session Key for storing the request token.
|
|
1606
|
+
*/
|
|
1607
|
+
sessionKey?: string;
|
|
1588
1608
|
/**
|
|
1589
1609
|
* Determines whether to sync user profile attributes (`name`, `givenName`, `familyName`, `nickname`, `picture`) at each login or only on the first login. Options include: `onEachLogin`, `onFirstLogin`, `neverOnLogin`. Default value: `onEachLogin`.
|
|
1590
1610
|
*/
|
|
@@ -1609,6 +1629,10 @@ export interface ConnectionOptions {
|
|
|
1609
1629
|
* Sign Request Algorithm.
|
|
1610
1630
|
*/
|
|
1611
1631
|
signatureAlgorithm?: string;
|
|
1632
|
+
/**
|
|
1633
|
+
* Signature method used to sign the request
|
|
1634
|
+
*/
|
|
1635
|
+
signatureMethod?: string;
|
|
1612
1636
|
/**
|
|
1613
1637
|
* X.509 signing certificate (encoded in PEM or CER) you retrieved from the IdP, Base64-encoded.
|
|
1614
1638
|
*/
|
|
@@ -1685,6 +1709,10 @@ export interface ConnectionOptions {
|
|
|
1685
1709
|
* Whether to use WS-Fed.
|
|
1686
1710
|
*/
|
|
1687
1711
|
useWsfed?: boolean;
|
|
1712
|
+
/**
|
|
1713
|
+
* URL used to obtain user authorization.
|
|
1714
|
+
*/
|
|
1715
|
+
userAuthorizationUrl?: string;
|
|
1688
1716
|
/**
|
|
1689
1717
|
* Attribute in the token that will be mapped to the userId property in Auth0.
|
|
1690
1718
|
*/
|
|
@@ -3314,6 +3342,28 @@ export interface GetClientDefaultOrganization {
|
|
|
3314
3342
|
*/
|
|
3315
3343
|
organizationId: string;
|
|
3316
3344
|
}
|
|
3345
|
+
export interface GetClientGrantsClientGrant {
|
|
3346
|
+
/**
|
|
3347
|
+
* The audience of the client grant.
|
|
3348
|
+
*/
|
|
3349
|
+
audience: string;
|
|
3350
|
+
/**
|
|
3351
|
+
* The client ID associated with the grant.
|
|
3352
|
+
*/
|
|
3353
|
+
clientId: string;
|
|
3354
|
+
/**
|
|
3355
|
+
* The ID of the client grant.
|
|
3356
|
+
*/
|
|
3357
|
+
id: string;
|
|
3358
|
+
/**
|
|
3359
|
+
* List of granted scopes.
|
|
3360
|
+
*/
|
|
3361
|
+
scopes: string[];
|
|
3362
|
+
/**
|
|
3363
|
+
* The subject type (usually 'client').
|
|
3364
|
+
*/
|
|
3365
|
+
subjectType: string;
|
|
3366
|
+
}
|
|
3317
3367
|
export interface GetClientJwtConfiguration {
|
|
3318
3368
|
/**
|
|
3319
3369
|
* Algorithm used to sign JWTs. Can be one of `HS256`, `RS256`, `PS256`.
|
|
@@ -3579,15 +3629,19 @@ export interface GetClientsClient {
|
|
|
3579
3629
|
* Configure OIDC logout for the Client
|
|
3580
3630
|
*/
|
|
3581
3631
|
oidcLogouts: outputs.GetClientsClientOidcLogout[];
|
|
3632
|
+
/**
|
|
3633
|
+
* Methods for discovering organizations during the pre_login_prompt. Can include `email` (allows users to find their organization by entering their email address) and/or `organizationName` (requires users to enter the organization name directly). These methods can be combined. Setting this property requires that `organizationRequireBehavior` is set to `preLoginPrompt`.
|
|
3634
|
+
*/
|
|
3635
|
+
organizationDiscoveryMethods: string[];
|
|
3582
3636
|
/**
|
|
3583
3637
|
* The identifier of a resource server that client is associated withThis property can be sent only when app_type=resource_server.This property can not be changed, once the client is created.
|
|
3584
3638
|
*/
|
|
3585
3639
|
resourceServerIdentifier: string;
|
|
3586
3640
|
sessionTransfers: outputs.GetClientsClientSessionTransfer[];
|
|
3587
3641
|
/**
|
|
3588
|
-
* Indicates whether
|
|
3642
|
+
* Indicates whether the confirmation prompt appears when using non-verifiable callback URIs. Set to true to skip the prompt, false to show it, or null to unset. Accepts (true/false/null) or ("true"/"false"/"null")
|
|
3589
3643
|
*/
|
|
3590
|
-
skipNonVerifiableCallbackUriConfirmationPrompt:
|
|
3644
|
+
skipNonVerifiableCallbackUriConfirmationPrompt: string;
|
|
3591
3645
|
/**
|
|
3592
3646
|
* Allows configuration for token exchange
|
|
3593
3647
|
*/
|
|
@@ -3734,6 +3788,10 @@ export interface GetConnectionKeysKey {
|
|
|
3734
3788
|
};
|
|
3735
3789
|
}
|
|
3736
3790
|
export interface GetConnectionOption {
|
|
3791
|
+
/**
|
|
3792
|
+
* URL used to exchange a user-authorized request token for an access token.
|
|
3793
|
+
*/
|
|
3794
|
+
accessTokenUrl: string;
|
|
3737
3795
|
/**
|
|
3738
3796
|
* ADFS URL where to fetch the metadata source.
|
|
3739
3797
|
*/
|
|
@@ -3798,6 +3856,14 @@ export interface GetConnectionOption {
|
|
|
3798
3856
|
* Proof Key for Code Exchange (PKCE) configuration settings for an OIDC or Okta Workforce connection.
|
|
3799
3857
|
*/
|
|
3800
3858
|
connectionSettings: outputs.GetConnectionOptionConnectionSetting[];
|
|
3859
|
+
/**
|
|
3860
|
+
* Identifies the client to the service provider
|
|
3861
|
+
*/
|
|
3862
|
+
consumerKey: string;
|
|
3863
|
+
/**
|
|
3864
|
+
* Secret used to establish ownership of the consumer key.
|
|
3865
|
+
*/
|
|
3866
|
+
consumerSecret: string;
|
|
3801
3867
|
/**
|
|
3802
3868
|
* Configure extra headers to the Token endpoint of an OAuth 2.0 provider
|
|
3803
3869
|
*/
|
|
@@ -4008,6 +4074,10 @@ export interface GetConnectionOption {
|
|
|
4008
4074
|
* Template that formats the SAML request.
|
|
4009
4075
|
*/
|
|
4010
4076
|
requestTemplate: string;
|
|
4077
|
+
/**
|
|
4078
|
+
* URL used to obtain an unauthorized request token.
|
|
4079
|
+
*/
|
|
4080
|
+
requestTokenUrl: string;
|
|
4011
4081
|
/**
|
|
4012
4082
|
* Indicates whether the user is required to provide a username in addition to an email address.
|
|
4013
4083
|
*/
|
|
@@ -4022,6 +4092,10 @@ export interface GetConnectionOption {
|
|
|
4022
4092
|
scripts: {
|
|
4023
4093
|
[key: string]: string;
|
|
4024
4094
|
};
|
|
4095
|
+
/**
|
|
4096
|
+
* Session Key for storing the request token.
|
|
4097
|
+
*/
|
|
4098
|
+
sessionKey: string;
|
|
4025
4099
|
/**
|
|
4026
4100
|
* Determines whether to sync user profile attributes (`name`, `givenName`, `familyName`, `nickname`, `picture`) at each login or only on the first login. Options include: `onEachLogin`, `onFirstLogin`, `neverOnLogin`. Default value: `onEachLogin`.
|
|
4027
4101
|
*/
|
|
@@ -4046,6 +4120,10 @@ export interface GetConnectionOption {
|
|
|
4046
4120
|
* Sign Request Algorithm.
|
|
4047
4121
|
*/
|
|
4048
4122
|
signatureAlgorithm: string;
|
|
4123
|
+
/**
|
|
4124
|
+
* Signature method used to sign the request
|
|
4125
|
+
*/
|
|
4126
|
+
signatureMethod: string;
|
|
4049
4127
|
/**
|
|
4050
4128
|
* X.509 signing certificate (encoded in PEM or CER) you retrieved from the IdP, Base64-encoded.
|
|
4051
4129
|
*/
|
|
@@ -4122,6 +4200,10 @@ export interface GetConnectionOption {
|
|
|
4122
4200
|
* Whether to use WS-Fed.
|
|
4123
4201
|
*/
|
|
4124
4202
|
useWsfed: boolean;
|
|
4203
|
+
/**
|
|
4204
|
+
* URL used to obtain user authorization.
|
|
4205
|
+
*/
|
|
4206
|
+
userAuthorizationUrl: string;
|
|
4125
4207
|
/**
|
|
4126
4208
|
* Attribute in the token that will be mapped to the userId property in Auth0.
|
|
4127
4209
|
*/
|
|
@@ -5785,6 +5867,28 @@ export interface OrganizationConnectionsEnabledConnection {
|
|
|
5785
5867
|
*/
|
|
5786
5868
|
showAsButton?: boolean;
|
|
5787
5869
|
}
|
|
5870
|
+
export interface OrganizationDiscoveryDomainsDiscoveryDomain {
|
|
5871
|
+
/**
|
|
5872
|
+
* The domain name for organization discovery.
|
|
5873
|
+
*/
|
|
5874
|
+
domain: string;
|
|
5875
|
+
/**
|
|
5876
|
+
* The ID of the discovery domain.
|
|
5877
|
+
*/
|
|
5878
|
+
id: string;
|
|
5879
|
+
/**
|
|
5880
|
+
* Verification status. Must be either 'pending' or 'verified'.
|
|
5881
|
+
*/
|
|
5882
|
+
status: string;
|
|
5883
|
+
/**
|
|
5884
|
+
* The full domain where the TXT record should be added.
|
|
5885
|
+
*/
|
|
5886
|
+
verificationHost: string;
|
|
5887
|
+
/**
|
|
5888
|
+
* TXT record value for domain verification.
|
|
5889
|
+
*/
|
|
5890
|
+
verificationTxt: string;
|
|
5891
|
+
}
|
|
5788
5892
|
export interface OrganizationTokenQuota {
|
|
5789
5893
|
/**
|
|
5790
5894
|
* The token quota configuration for client credentials.
|
package/userPermission.d.ts
CHANGED
|
@@ -6,6 +6,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
* permissions assigned to a user. To avoid potential issues, it is recommended not to use this resource in conjunction
|
|
7
7
|
* with the `auth0.UserPermissions` resource when managing permissions for the same user id.
|
|
8
8
|
*
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
9
11
|
* ## Import
|
|
10
12
|
*
|
|
11
13
|
* This resource can be imported by specifying the
|
package/userPermission.js
CHANGED
|
@@ -12,6 +12,8 @@ const utilities = require("./utilities");
|
|
|
12
12
|
* permissions assigned to a user. To avoid potential issues, it is recommended not to use this resource in conjunction
|
|
13
13
|
* with the `auth0.UserPermissions` resource when managing permissions for the same user id.
|
|
14
14
|
*
|
|
15
|
+
* ## Example Usage
|
|
16
|
+
*
|
|
15
17
|
* ## Import
|
|
16
18
|
*
|
|
17
19
|
* This resource can be imported by specifying the
|
package/userPermission.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"userPermission.js","sourceRoot":"","sources":["../userPermission.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"userPermission.js","sourceRoot":"","sources":["../userPermission.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IACrD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAsD,EAAE,IAAmC;QACjH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8C,CAAC;YAC7D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,EAAE,wBAAwB,CAAC;YAC7E,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAA6C,CAAC;YAC3D,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,wBAAwB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;aAC3E;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,EAAE,wBAAwB,CAAC;YAC5E,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC5D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;;AAtFL,wCAuFC;AAzEG,gBAAgB;AACO,2BAAY,GAAG,2CAA2C,CAAC"}
|
package/userPermissions.d.ts
CHANGED
|
@@ -8,6 +8,8 @@ import * as outputs from "./types/output";
|
|
|
8
8
|
* appends a permissions to a user. To avoid potential issues, it is recommended not to use this resource in conjunction
|
|
9
9
|
* with the `auth0.UserPermission` resource when managing permissions for the same user id.
|
|
10
10
|
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
11
13
|
* ## Import
|
|
12
14
|
*
|
|
13
15
|
* This resource can be imported by specifying the user ID
|
package/userPermissions.js
CHANGED
|
@@ -12,6 +12,8 @@ const utilities = require("./utilities");
|
|
|
12
12
|
* appends a permissions to a user. To avoid potential issues, it is recommended not to use this resource in conjunction
|
|
13
13
|
* with the `auth0.UserPermission` resource when managing permissions for the same user id.
|
|
14
14
|
*
|
|
15
|
+
* ## Example Usage
|
|
16
|
+
*
|
|
15
17
|
* ## Import
|
|
16
18
|
*
|
|
17
19
|
* This resource can be imported by specifying the user ID
|
package/userPermissions.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"userPermissions.js","sourceRoot":"","sources":["../userPermissions.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"userPermissions.js","sourceRoot":"","sources":["../userPermissions.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;SAC3C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAjEL,0CAkEC;AApDG,gBAAgB;AACO,4BAAY,GAAG,6CAA6C,CAAC"}
|