@quiltdata/benchling-webhook 0.9.0-20251130T062440Z → 0.9.0-20251204T040448Z
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +63 -47
- package/cdk.json +1 -0
- package/dist/bin/benchling-webhook.js +13 -0
- package/dist/bin/benchling-webhook.js.map +1 -1
- package/dist/bin/commands/deploy.d.ts.map +1 -1
- package/dist/bin/commands/deploy.js +60 -95
- package/dist/bin/commands/deploy.js.map +1 -1
- package/dist/bin/commands/destroy.d.ts +0 -1
- package/dist/bin/commands/destroy.d.ts.map +1 -1
- package/dist/bin/commands/destroy.js +0 -1
- package/dist/bin/commands/destroy.js.map +1 -1
- package/dist/bin/commands/infer-quilt-config.d.ts.map +1 -1
- package/dist/bin/commands/infer-quilt-config.js +13 -10
- package/dist/bin/commands/infer-quilt-config.js.map +1 -1
- package/dist/bin/commands/setup-profile.js +1 -1
- package/dist/bin/commands/setup-profile.js.map +1 -1
- package/dist/bin/commands/setup-wizard.d.ts.map +1 -1
- package/dist/bin/commands/setup-wizard.js +1 -0
- package/dist/bin/commands/setup-wizard.js.map +1 -1
- package/dist/lib/benchling-webhook-stack.d.ts.map +1 -1
- package/dist/lib/benchling-webhook-stack.js +61 -38
- package/dist/lib/benchling-webhook-stack.js.map +1 -1
- package/dist/lib/fargate-service.js +1 -1
- package/dist/lib/fargate-service.js.map +1 -1
- package/dist/lib/index.d.ts +1 -1
- package/dist/lib/index.js +3 -3
- package/dist/lib/network-load-balancer.d.ts.map +1 -1
- package/dist/lib/network-load-balancer.js +0 -2
- package/dist/lib/network-load-balancer.js.map +1 -1
- package/dist/lib/{http-api-gateway.d.ts → rest-api-gateway.d.ts} +9 -9
- package/dist/lib/rest-api-gateway.d.ts.map +1 -0
- package/dist/lib/rest-api-gateway.js +212 -0
- package/dist/lib/rest-api-gateway.js.map +1 -0
- package/dist/lib/types/config.d.ts +36 -3
- package/dist/lib/types/config.d.ts.map +1 -1
- package/dist/lib/types/config.js.map +1 -1
- package/dist/lib/wizard/phase2-stack-query.d.ts.map +1 -1
- package/dist/lib/wizard/phase2-stack-query.js +46 -21
- package/dist/lib/wizard/phase2-stack-query.js.map +1 -1
- package/dist/lib/wizard/phase3-parameter-collection.d.ts.map +1 -1
- package/dist/lib/wizard/phase3-parameter-collection.js +101 -67
- package/dist/lib/wizard/phase3-parameter-collection.js.map +1 -1
- package/dist/lib/wizard/types.d.ts +11 -0
- package/dist/lib/wizard/types.d.ts.map +1 -1
- package/dist/package.json +2 -2
- package/dist/scripts/discover-vpc.js +12 -11
- package/dist/scripts/discover-vpc.js.map +1 -1
- package/package.json +2 -2
- package/dist/lib/http-api-gateway.d.ts.map +0 -1
- package/dist/lib/http-api-gateway.js +0 -166
- package/dist/lib/http-api-gateway.js.map +0 -1
- package/dist/lib/waf-web-acl.d.ts +0 -51
- package/dist/lib/waf-web-acl.d.ts.map +0 -1
- package/dist/lib/waf-web-acl.js +0 -192
- package/dist/lib/waf-web-acl.js.map +0 -1
|
@@ -1,51 +0,0 @@
|
|
|
1
|
-
import * as wafv2 from "aws-cdk-lib/aws-wafv2";
|
|
2
|
-
import * as logs from "aws-cdk-lib/aws-logs";
|
|
3
|
-
import { Construct } from "constructs";
|
|
4
|
-
export interface WafWebAclProps {
|
|
5
|
-
/**
|
|
6
|
-
* Comma-separated list of allowed IP addresses/CIDR blocks
|
|
7
|
-
*
|
|
8
|
-
* Empty string means no IP filtering (discovery mode - COUNT all requests).
|
|
9
|
-
* Non-empty string enables IP filtering (security mode - BLOCK unknown IPs).
|
|
10
|
-
*
|
|
11
|
-
* @example "192.168.1.0/24,10.0.0.0/8"
|
|
12
|
-
* @default ""
|
|
13
|
-
*/
|
|
14
|
-
readonly ipAllowList?: string;
|
|
15
|
-
}
|
|
16
|
-
/**
|
|
17
|
-
* WAF Web ACL for Benchling webhook IP filtering
|
|
18
|
-
*
|
|
19
|
-
* Provides defense-in-depth security at AWS edge with two rules:
|
|
20
|
-
* 1. Health check exception - Always allow /health, /health/ready, /health/live
|
|
21
|
-
* 2. IP allowlist - Allow requests from configured IP ranges
|
|
22
|
-
*
|
|
23
|
-
* **Automatic Mode Selection:**
|
|
24
|
-
* - Empty IP allowlist → COUNT mode (discovery phase - logs requests but doesn't block)
|
|
25
|
-
* - Non-empty IP allowlist → BLOCK mode (security phase - blocks unknown IPs)
|
|
26
|
-
*
|
|
27
|
-
* This allows customers to deploy initially without knowing Benchling IPs,
|
|
28
|
-
* discover them from CloudWatch logs, then add them to enable blocking mode.
|
|
29
|
-
*/
|
|
30
|
-
export declare class WafWebAcl extends Construct {
|
|
31
|
-
readonly webAcl: wafv2.CfnWebACL;
|
|
32
|
-
readonly ipSet: wafv2.CfnIPSet;
|
|
33
|
-
readonly logGroup: logs.ILogGroup;
|
|
34
|
-
constructor(scope: Construct, id: string, props?: WafWebAclProps);
|
|
35
|
-
/**
|
|
36
|
-
* Parse IP allowlist string into array of CIDR blocks
|
|
37
|
-
*
|
|
38
|
-
* - Splits by comma
|
|
39
|
-
* - Trims whitespace
|
|
40
|
-
* - Adds /32 suffix if not present
|
|
41
|
-
* - Filters out empty entries
|
|
42
|
-
*
|
|
43
|
-
* @param allowList Comma-separated list of IPs/CIDR blocks
|
|
44
|
-
* @returns Array of CIDR blocks
|
|
45
|
-
*
|
|
46
|
-
* @example
|
|
47
|
-
* parseIpAllowList("192.168.1.0/24, 10.0.0.1") → ["192.168.1.0/24", "10.0.0.1/32"]
|
|
48
|
-
*/
|
|
49
|
-
private parseIpAllowList;
|
|
50
|
-
}
|
|
51
|
-
//# sourceMappingURL=waf-web-acl.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"waf-web-acl.d.ts","sourceRoot":"","sources":["../../lib/waf-web-acl.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,KAAK,MAAM,uBAAuB,CAAC;AAC/C,OAAO,KAAK,IAAI,MAAM,sBAAsB,CAAC;AAC7C,OAAO,EAAE,SAAS,EAAE,MAAM,YAAY,CAAC;AAEvC,MAAM,WAAW,cAAc;IAC3B;;;;;;;;OAQG;IACH,QAAQ,CAAC,WAAW,CAAC,EAAE,MAAM,CAAC;CACjC;AAED;;;;;;;;;;;;;GAaG;AACH,qBAAa,SAAU,SAAQ,SAAS;IACpC,SAAgB,MAAM,EAAE,KAAK,CAAC,SAAS,CAAC;IACxC,SAAgB,KAAK,EAAE,KAAK,CAAC,QAAQ,CAAC;IACtC,SAAgB,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC;gBAE7B,KAAK,EAAE,SAAS,EAAE,EAAE,EAAE,MAAM,EAAE,KAAK,GAAE,cAAmB;IA2HpE;;;;;;;;;;;;;OAaG;IACH,OAAO,CAAC,gBAAgB;CAU3B"}
|
package/dist/lib/waf-web-acl.js
DELETED
|
@@ -1,192 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || (function () {
|
|
19
|
-
var ownKeys = function(o) {
|
|
20
|
-
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
21
|
-
var ar = [];
|
|
22
|
-
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
23
|
-
return ar;
|
|
24
|
-
};
|
|
25
|
-
return ownKeys(o);
|
|
26
|
-
};
|
|
27
|
-
return function (mod) {
|
|
28
|
-
if (mod && mod.__esModule) return mod;
|
|
29
|
-
var result = {};
|
|
30
|
-
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
31
|
-
__setModuleDefault(result, mod);
|
|
32
|
-
return result;
|
|
33
|
-
};
|
|
34
|
-
})();
|
|
35
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
|
-
exports.WafWebAcl = void 0;
|
|
37
|
-
const cdk = __importStar(require("aws-cdk-lib"));
|
|
38
|
-
const wafv2 = __importStar(require("aws-cdk-lib/aws-wafv2"));
|
|
39
|
-
const logs = __importStar(require("aws-cdk-lib/aws-logs"));
|
|
40
|
-
const constructs_1 = require("constructs");
|
|
41
|
-
/**
|
|
42
|
-
* WAF Web ACL for Benchling webhook IP filtering
|
|
43
|
-
*
|
|
44
|
-
* Provides defense-in-depth security at AWS edge with two rules:
|
|
45
|
-
* 1. Health check exception - Always allow /health, /health/ready, /health/live
|
|
46
|
-
* 2. IP allowlist - Allow requests from configured IP ranges
|
|
47
|
-
*
|
|
48
|
-
* **Automatic Mode Selection:**
|
|
49
|
-
* - Empty IP allowlist → COUNT mode (discovery phase - logs requests but doesn't block)
|
|
50
|
-
* - Non-empty IP allowlist → BLOCK mode (security phase - blocks unknown IPs)
|
|
51
|
-
*
|
|
52
|
-
* This allows customers to deploy initially without knowing Benchling IPs,
|
|
53
|
-
* discover them from CloudWatch logs, then add them to enable blocking mode.
|
|
54
|
-
*/
|
|
55
|
-
class WafWebAcl extends constructs_1.Construct {
|
|
56
|
-
constructor(scope, id, props = {}) {
|
|
57
|
-
super(scope, id);
|
|
58
|
-
// Parse IP allowlist with CIDR notation normalization
|
|
59
|
-
const ipAllowList = this.parseIpAllowList(props.ipAllowList || "");
|
|
60
|
-
// Automatic mode selection based on IP allowlist
|
|
61
|
-
// - Empty allowlist: Allow mode (discovery - logs all requests, no blocking)
|
|
62
|
-
// - Has IPs: Block mode (security - blocks unknown IPs)
|
|
63
|
-
const isDiscoveryMode = ipAllowList.length === 0;
|
|
64
|
-
const mode = isDiscoveryMode ? "Allow" : "Block";
|
|
65
|
-
console.log(`WAF mode: ${mode} (${isDiscoveryMode ? "discovery - no IPs configured, all traffic allowed" : `security - ${ipAllowList.length} IP ranges configured`})`);
|
|
66
|
-
// Create IP Set for allowlist
|
|
67
|
-
this.ipSet = new wafv2.CfnIPSet(this, "IPSet", {
|
|
68
|
-
name: "BenchlingWebhookIPSet",
|
|
69
|
-
scope: "REGIONAL",
|
|
70
|
-
ipAddressVersion: "IPV4",
|
|
71
|
-
addresses: ipAllowList,
|
|
72
|
-
description: "Allowed IP addresses for Benchling webhooks",
|
|
73
|
-
});
|
|
74
|
-
// CloudWatch log group for WAF logs
|
|
75
|
-
this.logGroup = new logs.LogGroup(this, "WafLogGroup", {
|
|
76
|
-
logGroupName: "/aws/waf/benchling-webhook",
|
|
77
|
-
retention: logs.RetentionDays.ONE_WEEK,
|
|
78
|
-
removalPolicy: cdk.RemovalPolicy.DESTROY,
|
|
79
|
-
});
|
|
80
|
-
// Create Web ACL with two rules
|
|
81
|
-
// Default action: Allow (discovery mode) or Block (security mode)
|
|
82
|
-
const defaultActionConfig = isDiscoveryMode
|
|
83
|
-
? { allow: {} }
|
|
84
|
-
: { block: {} };
|
|
85
|
-
this.webAcl = new wafv2.CfnWebACL(this, "WebACL", {
|
|
86
|
-
name: "BenchlingWebhookWebACL",
|
|
87
|
-
scope: "REGIONAL",
|
|
88
|
-
defaultAction: defaultActionConfig,
|
|
89
|
-
description: "WAF for Benchling webhook IP filtering with automatic discovery mode. " +
|
|
90
|
-
`Mode: ${mode} (${isDiscoveryMode ? "empty allowlist - all traffic allowed" : `${ipAllowList.length} IPs configured`})`,
|
|
91
|
-
rules: [
|
|
92
|
-
// Rule 1: Health check exception (Priority 10)
|
|
93
|
-
// Always allow health check endpoints regardless of IP
|
|
94
|
-
{
|
|
95
|
-
name: "HealthCheckException",
|
|
96
|
-
priority: 10,
|
|
97
|
-
statement: {
|
|
98
|
-
orStatement: {
|
|
99
|
-
statements: [
|
|
100
|
-
{
|
|
101
|
-
byteMatchStatement: {
|
|
102
|
-
fieldToMatch: { uriPath: {} },
|
|
103
|
-
positionalConstraint: "EXACTLY",
|
|
104
|
-
searchString: "/health",
|
|
105
|
-
textTransformations: [{ priority: 0, type: "NONE" }],
|
|
106
|
-
},
|
|
107
|
-
},
|
|
108
|
-
{
|
|
109
|
-
byteMatchStatement: {
|
|
110
|
-
fieldToMatch: { uriPath: {} },
|
|
111
|
-
positionalConstraint: "EXACTLY",
|
|
112
|
-
searchString: "/health/ready",
|
|
113
|
-
textTransformations: [{ priority: 0, type: "NONE" }],
|
|
114
|
-
},
|
|
115
|
-
},
|
|
116
|
-
{
|
|
117
|
-
byteMatchStatement: {
|
|
118
|
-
fieldToMatch: { uriPath: {} },
|
|
119
|
-
positionalConstraint: "EXACTLY",
|
|
120
|
-
searchString: "/health/live",
|
|
121
|
-
textTransformations: [{ priority: 0, type: "NONE" }],
|
|
122
|
-
},
|
|
123
|
-
},
|
|
124
|
-
],
|
|
125
|
-
},
|
|
126
|
-
},
|
|
127
|
-
action: { allow: {} },
|
|
128
|
-
visibilityConfig: {
|
|
129
|
-
sampledRequestsEnabled: true,
|
|
130
|
-
cloudWatchMetricsEnabled: true,
|
|
131
|
-
metricName: "HealthCheckException",
|
|
132
|
-
},
|
|
133
|
-
},
|
|
134
|
-
// Rule 2: IP allowlist (Priority 20)
|
|
135
|
-
// Allow requests from configured IP ranges
|
|
136
|
-
// Note: When IP allowlist is empty, this rule matches no IPs,
|
|
137
|
-
// so all non-health requests fall through to default action (COUNT or BLOCK)
|
|
138
|
-
{
|
|
139
|
-
name: "IPAllowlist",
|
|
140
|
-
priority: 20,
|
|
141
|
-
statement: {
|
|
142
|
-
ipSetReferenceStatement: {
|
|
143
|
-
arn: this.ipSet.attrArn,
|
|
144
|
-
},
|
|
145
|
-
},
|
|
146
|
-
action: { allow: {} },
|
|
147
|
-
visibilityConfig: {
|
|
148
|
-
sampledRequestsEnabled: true,
|
|
149
|
-
cloudWatchMetricsEnabled: true,
|
|
150
|
-
metricName: "IPAllowlist",
|
|
151
|
-
},
|
|
152
|
-
},
|
|
153
|
-
],
|
|
154
|
-
visibilityConfig: {
|
|
155
|
-
sampledRequestsEnabled: true,
|
|
156
|
-
cloudWatchMetricsEnabled: true,
|
|
157
|
-
metricName: "BenchlingWebhookWebACL",
|
|
158
|
-
},
|
|
159
|
-
});
|
|
160
|
-
// Configure WAF logging to CloudWatch
|
|
161
|
-
new wafv2.CfnLoggingConfiguration(this, "WafLogging", {
|
|
162
|
-
resourceArn: this.webAcl.attrArn,
|
|
163
|
-
logDestinationConfigs: [this.logGroup.logGroupArn],
|
|
164
|
-
});
|
|
165
|
-
}
|
|
166
|
-
/**
|
|
167
|
-
* Parse IP allowlist string into array of CIDR blocks
|
|
168
|
-
*
|
|
169
|
-
* - Splits by comma
|
|
170
|
-
* - Trims whitespace
|
|
171
|
-
* - Adds /32 suffix if not present
|
|
172
|
-
* - Filters out empty entries
|
|
173
|
-
*
|
|
174
|
-
* @param allowList Comma-separated list of IPs/CIDR blocks
|
|
175
|
-
* @returns Array of CIDR blocks
|
|
176
|
-
*
|
|
177
|
-
* @example
|
|
178
|
-
* parseIpAllowList("192.168.1.0/24, 10.0.0.1") → ["192.168.1.0/24", "10.0.0.1/32"]
|
|
179
|
-
*/
|
|
180
|
-
parseIpAllowList(allowList) {
|
|
181
|
-
return allowList
|
|
182
|
-
.split(",")
|
|
183
|
-
.map((ip) => ip.trim())
|
|
184
|
-
.filter((ip) => ip.length > 0)
|
|
185
|
-
.map((ip) => {
|
|
186
|
-
// Ensure CIDR notation (add /32 if not specified)
|
|
187
|
-
return ip.includes("/") ? ip : `${ip}/32`;
|
|
188
|
-
});
|
|
189
|
-
}
|
|
190
|
-
}
|
|
191
|
-
exports.WafWebAcl = WafWebAcl;
|
|
192
|
-
//# sourceMappingURL=waf-web-acl.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"waf-web-acl.js","sourceRoot":"","sources":["../../lib/waf-web-acl.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,iDAAmC;AACnC,6DAA+C;AAC/C,2DAA6C;AAC7C,2CAAuC;AAevC;;;;;;;;;;;;;GAaG;AACH,MAAa,SAAU,SAAQ,sBAAS;IAKpC,YAAY,KAAgB,EAAE,EAAU,EAAE,QAAwB,EAAE;QAChE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,sDAAsD;QACtD,MAAM,WAAW,GAAG,IAAI,CAAC,gBAAgB,CAAC,KAAK,CAAC,WAAW,IAAI,EAAE,CAAC,CAAC;QAEnE,iDAAiD;QACjD,6EAA6E;QAC7E,wDAAwD;QACxD,MAAM,eAAe,GAAG,WAAW,CAAC,MAAM,KAAK,CAAC,CAAC;QACjD,MAAM,IAAI,GAAG,eAAe,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC;QAEjD,OAAO,CAAC,GAAG,CACP,aAAa,IAAI,KAAK,eAAe,CAAC,CAAC,CAAC,oDAAoD,CAAC,CAAC,CAAC,cAAc,WAAW,CAAC,MAAM,uBAAuB,GAAG,CAC5J,CAAC;QAEF,8BAA8B;QAC9B,IAAI,CAAC,KAAK,GAAG,IAAI,KAAK,CAAC,QAAQ,CAAC,IAAI,EAAE,OAAO,EAAE;YAC3C,IAAI,EAAE,uBAAuB;YAC7B,KAAK,EAAE,UAAU;YACjB,gBAAgB,EAAE,MAAM;YACxB,SAAS,EAAE,WAAW;YACtB,WAAW,EAAE,6CAA6C;SAC7D,CAAC,CAAC;QAEH,oCAAoC;QACpC,IAAI,CAAC,QAAQ,GAAG,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,aAAa,EAAE;YACnD,YAAY,EAAE,4BAA4B;YAC1C,SAAS,EAAE,IAAI,CAAC,aAAa,CAAC,QAAQ;YACtC,aAAa,EAAE,GAAG,CAAC,aAAa,CAAC,OAAO;SAC3C,CAAC,CAAC;QAEH,gCAAgC;QAChC,kEAAkE;QAClE,MAAM,mBAAmB,GAA0C,eAAe;YAC9E,CAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;YACf,CAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE,CAAC;QAEpB,IAAI,CAAC,MAAM,GAAG,IAAI,KAAK,CAAC,SAAS,CAAC,IAAI,EAAE,QAAQ,EAAE;YAC9C,IAAI,EAAE,wBAAwB;YAC9B,KAAK,EAAE,UAAU;YACjB,aAAa,EAAE,mBAAmB;YAClC,WAAW,EACP,wEAAwE;gBACxE,SAAS,IAAI,KAAK,eAAe,CAAC,CAAC,CAAC,uCAAuC,CAAC,CAAC,CAAC,GAAG,WAAW,CAAC,MAAM,iBAAiB,GAAG;YAC3H,KAAK,EAAE;gBACH,+CAA+C;gBAC/C,uDAAuD;gBACvD;oBACI,IAAI,EAAE,sBAAsB;oBAC5B,QAAQ,EAAE,EAAE;oBACZ,SAAS,EAAE;wBACP,WAAW,EAAE;4BACT,UAAU,EAAE;gCACR;oCACI,kBAAkB,EAAE;wCAChB,YAAY,EAAE,EAAE,OAAO,EAAE,EAAE,EAAE;wCAC7B,oBAAoB,EAAE,SAAS;wCAC/B,YAAY,EAAE,SAAS;wCACvB,mBAAmB,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;qCACvD;iCACJ;gCACD;oCACI,kBAAkB,EAAE;wCAChB,YAAY,EAAE,EAAE,OAAO,EAAE,EAAE,EAAE;wCAC7B,oBAAoB,EAAE,SAAS;wCAC/B,YAAY,EAAE,eAAe;wCAC7B,mBAAmB,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;qCACvD;iCACJ;gCACD;oCACI,kBAAkB,EAAE;wCAChB,YAAY,EAAE,EAAE,OAAO,EAAE,EAAE,EAAE;wCAC7B,oBAAoB,EAAE,SAAS;wCAC/B,YAAY,EAAE,cAAc;wCAC5B,mBAAmB,EAAE,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;qCACvD;iCACJ;6BACJ;yBACJ;qBACJ;oBACD,MAAM,EAAE,EAAE,KAAK,EAAE,EAAE,EAAE;oBACrB,gBAAgB,EAAE;wBACd,sBAAsB,EAAE,IAAI;wBAC5B,wBAAwB,EAAE,IAAI;wBAC9B,UAAU,EAAE,sBAAsB;qBACrC;iBACJ;gBAED,qCAAqC;gBACrC,2CAA2C;gBAC3C,8DAA8D;gBAC9D,6EAA6E;gBAC7E;oBACI,IAAI,EAAE,aAAa;oBACnB,QAAQ,EAAE,EAAE;oBACZ,SAAS,EAAE;wBACP,uBAAuB,EAAE;4BACrB,GAAG,EAAE,IAAI,CAAC,KAAK,CAAC,OAAO;yBAC1B;qBACJ;oBACD,MAAM,EAAE,EAAE,KAAK,EAAE,EAAE,EAAE;oBACrB,gBAAgB,EAAE;wBACd,sBAAsB,EAAE,IAAI;wBAC5B,wBAAwB,EAAE,IAAI;wBAC9B,UAAU,EAAE,aAAa;qBAC5B;iBACJ;aACJ;YACD,gBAAgB,EAAE;gBACd,sBAAsB,EAAE,IAAI;gBAC5B,wBAAwB,EAAE,IAAI;gBAC9B,UAAU,EAAE,wBAAwB;aACvC;SACJ,CAAC,CAAC;QAEH,sCAAsC;QACtC,IAAI,KAAK,CAAC,uBAAuB,CAAC,IAAI,EAAE,YAAY,EAAE;YAClD,WAAW,EAAE,IAAI,CAAC,MAAM,CAAC,OAAO;YAChC,qBAAqB,EAAE,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC;SACrD,CAAC,CAAC;IACP,CAAC;IAED;;;;;;;;;;;;;OAaG;IACK,gBAAgB,CAAC,SAAiB;QACtC,OAAO,SAAS;aACX,KAAK,CAAC,GAAG,CAAC;aACV,GAAG,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,IAAI,EAAE,CAAC;aACtB,MAAM,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,MAAM,GAAG,CAAC,CAAC;aAC7B,GAAG,CAAC,CAAC,EAAE,EAAE,EAAE;YACR,kDAAkD;YAClD,OAAO,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC;QAC9C,CAAC,CAAC,CAAC;IACX,CAAC;CACJ;AAxJD,8BAwJC"}
|