@rhinestone/sdk 0.7.8 → 0.7.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (46) hide show
  1. package/dist/cjs/modules/abi/smart-sessions.d.ts +42 -0
  2. package/dist/cjs/modules/abi/smart-sessions.d.ts.map +1 -0
  3. package/dist/cjs/modules/abi/smart-sessions.js +131 -0
  4. package/dist/cjs/modules/common.d.ts +16 -0
  5. package/dist/cjs/modules/common.d.ts.map +1 -0
  6. package/dist/cjs/modules/common.js +11 -0
  7. package/dist/cjs/modules/index.d.ts +33 -0
  8. package/dist/cjs/modules/index.d.ts.map +1 -0
  9. package/dist/cjs/modules/index.js +153 -0
  10. package/dist/cjs/modules/omni-account.d.ts +9 -0
  11. package/dist/cjs/modules/omni-account.d.ts.map +1 -0
  12. package/dist/cjs/modules/omni-account.js +15 -0
  13. package/dist/cjs/modules/validators/core.d.ts +23 -0
  14. package/dist/cjs/modules/validators/core.d.ts.map +1 -0
  15. package/dist/cjs/modules/validators/core.js +118 -0
  16. package/dist/cjs/modules/validators/index.d.ts +4 -0
  17. package/dist/cjs/modules/validators/index.d.ts.map +1 -0
  18. package/dist/cjs/modules/validators/index.js +17 -0
  19. package/dist/cjs/modules/validators/smart-sessions.d.ts +29 -0
  20. package/dist/cjs/modules/validators/smart-sessions.d.ts.map +1 -0
  21. package/dist/cjs/modules/validators/smart-sessions.js +426 -0
  22. package/dist/cjs/orchestrator/client.d.ts +29 -0
  23. package/dist/cjs/orchestrator/client.d.ts.map +1 -0
  24. package/dist/cjs/orchestrator/client.js +250 -0
  25. package/dist/cjs/orchestrator/consts.d.ts +5 -0
  26. package/dist/cjs/orchestrator/consts.d.ts.map +1 -0
  27. package/dist/cjs/orchestrator/consts.js +9 -0
  28. package/dist/cjs/orchestrator/error.d.ts +18 -0
  29. package/dist/cjs/orchestrator/error.d.ts.map +1 -0
  30. package/dist/cjs/orchestrator/error.js +33 -0
  31. package/dist/cjs/orchestrator/index.d.ts +11 -0
  32. package/dist/cjs/orchestrator/index.d.ts.map +1 -0
  33. package/dist/cjs/orchestrator/index.js +40 -0
  34. package/dist/cjs/orchestrator/registry.d.ts +17 -0
  35. package/dist/cjs/orchestrator/registry.d.ts.map +1 -0
  36. package/dist/cjs/orchestrator/registry.js +358 -0
  37. package/dist/cjs/orchestrator/types.d.ts +222 -0
  38. package/dist/cjs/orchestrator/types.d.ts.map +1 -0
  39. package/dist/cjs/orchestrator/types.js +19 -0
  40. package/dist/cjs/orchestrator/utils.d.ts +29 -0
  41. package/dist/cjs/orchestrator/utils.d.ts.map +1 -0
  42. package/dist/cjs/orchestrator/utils.js +316 -0
  43. package/dist/cjs/types.d.ts +113 -0
  44. package/dist/cjs/types.d.ts.map +1 -0
  45. package/dist/cjs/types.js +2 -0
  46. package/package.json +6 -1
@@ -0,0 +1,426 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.SMART_SESSIONS_VALIDATOR_ADDRESS = exports.SMART_SESSION_MODE_ENABLE = exports.SMART_SESSION_MODE_USE = void 0;
4
+ exports.getSmartSessionValidator = getSmartSessionValidator;
5
+ exports.getEnableSessionCall = getEnableSessionCall;
6
+ exports.encodeSmartSessionSignature = encodeSmartSessionSignature;
7
+ exports.getPermissionId = getPermissionId;
8
+ exports.getAccountEIP712Domain = getAccountEIP712Domain;
9
+ exports.isSessionEnabled = isSessionEnabled;
10
+ exports.getSessionAllowedERC7739Content = getSessionAllowedERC7739Content;
11
+ const viem_1 = require("viem");
12
+ const orchestrator_1 = require("../../orchestrator");
13
+ const smart_sessions_1 = require("../abi/smart-sessions");
14
+ const common_1 = require("../common");
15
+ const omni_account_1 = require("../omni-account");
16
+ const core_1 = require("./core");
17
+ const SMART_SESSIONS_VALIDATOR_ADDRESS = '0x00000000002b0ecfbd0496ee71e01257da0e37de';
18
+ exports.SMART_SESSIONS_VALIDATOR_ADDRESS = SMART_SESSIONS_VALIDATOR_ADDRESS;
19
+ const SMART_SESSION_MODE_USE = '0x00';
20
+ exports.SMART_SESSION_MODE_USE = SMART_SESSION_MODE_USE;
21
+ const SMART_SESSION_MODE_ENABLE = '0x01';
22
+ exports.SMART_SESSION_MODE_ENABLE = SMART_SESSION_MODE_ENABLE;
23
+ const SMART_SESSION_MODE_UNSAFE_ENABLE = '0x02';
24
+ const SPENDING_LIMITS_POLICY_ADDRESS = '0x00000088D48cF102A8Cdb0137A9b173f957c6343';
25
+ const TIME_FRAME_POLICY_ADDRESS = '0x8177451511dE0577b911C254E9551D981C26dc72';
26
+ const SUDO_POLICY_ADDRESS = '0x0000003111cD8e92337C100F22B7A9dbf8DEE301';
27
+ const UNIVERSAL_ACTION_POLICY_ADDRESS = '0x0000006DDA6c463511C4e9B05CFc34C1247fCF1F';
28
+ const USAGE_LIMIT_POLICY_ADDRESS = '0x1F34eF8311345A3A4a4566aF321b313052F51493';
29
+ const VALUE_LIMIT_POLICY_ADDRESS = '0x730DA93267E7E513e932301B47F2ac7D062abC83';
30
+ const SMART_SESSIONS_FALLBACK_TARGET_FLAG = '0x0000000000000000000000000000000000000001';
31
+ const SMART_SESSIONS_FALLBACK_TARGET_SELECTOR_FLAG = '0x00000001';
32
+ const ACTION_CONDITION_EQUAL = 0;
33
+ const ACTION_CONDITION_GREATER_THAN = 1;
34
+ const ACTION_CONDITION_LESS_THAN = 2;
35
+ const ACTION_CONDITION_GREATER_THAN_OR_EQUAL = 3;
36
+ const ACTION_CONDITION_LESS_THAN_OR_EQUAL = 4;
37
+ const ACTION_CONDITION_NOT_EQUAL = 5;
38
+ const ACTION_CONDITION_IN_RANGE = 6;
39
+ async function getEnableSessionCall(chain, session) {
40
+ const { appDomainSeparator, contentsType } = await getSessionAllowedERC7739Content(chain);
41
+ const allowedERC7739Content = [
42
+ {
43
+ appDomainSeparator,
44
+ contentName: [contentsType],
45
+ },
46
+ ];
47
+ const sessionData = await getSmartSessionData(chain, session, allowedERC7739Content);
48
+ return {
49
+ to: SMART_SESSIONS_VALIDATOR_ADDRESS,
50
+ data: (0, viem_1.encodeFunctionData)({
51
+ abi: smart_sessions_1.enableSessionsAbi,
52
+ functionName: 'enableSessions',
53
+ args: [[sessionData]],
54
+ }),
55
+ };
56
+ }
57
+ function getOmniAccountActions(chain) {
58
+ const wethAddress = (0, orchestrator_1.getWethAddress)(chain);
59
+ const omniActions = [
60
+ {
61
+ actionTarget: orchestrator_1.RHINESTONE_SPOKE_POOL_ADDRESS,
62
+ actionTargetSelector: '0xa2418864', // injected execution
63
+ actionPolicies: [getPolicyData({ type: 'sudo' })],
64
+ },
65
+ {
66
+ actionTarget: omni_account_1.HOOK_ADDRESS,
67
+ actionTargetSelector: '0x27c777a9', // injected execution
68
+ actionPolicies: [getPolicyData({ type: 'sudo' })],
69
+ },
70
+ {
71
+ actionTarget: wethAddress,
72
+ actionTargetSelector: '0xd0e30db0', // deposit
73
+ actionPolicies: [getPolicyData({ type: 'sudo' })],
74
+ },
75
+ {
76
+ actionTarget: wethAddress,
77
+ actionTargetSelector: '0x2e1a7d4d', // widthdraw
78
+ actionPolicies: [getPolicyData({ type: 'sudo' })],
79
+ },
80
+ ];
81
+ return omniActions;
82
+ }
83
+ async function getSessionAllowedERC7739Content(chain) {
84
+ const publicClient = (0, viem_1.createPublicClient)({
85
+ chain,
86
+ transport: (0, viem_1.http)(),
87
+ });
88
+ const appDomainSeparator = await publicClient.readContract({
89
+ address: omni_account_1.HOOK_ADDRESS,
90
+ abi: (0, viem_1.parseAbi)(['function DOMAIN_SEPARATOR() view returns (bytes32)']),
91
+ functionName: 'DOMAIN_SEPARATOR',
92
+ });
93
+ const contentsType = 'MultichainCompact(address sponsor,uint256 nonce,uint256 expires,Segment[] segments)Segment(address arbiter,uint256 chainId,uint256[2][] idsAndAmounts,Witness witness)Witness(address recipient,uint256[2][] tokenOut,uint256 depositId,uint256 targetChain,uint32 fillDeadline,XchainExec[] execs,bytes32 userOpHash,uint32 maxFeeBps)XchainExec(address to,uint256 value,bytes data)';
94
+ return {
95
+ appDomainSeparator,
96
+ contentsType,
97
+ };
98
+ }
99
+ async function getSmartSessionData(chain, session, allowedERC7739Content) {
100
+ const omniActions = getOmniAccountActions(chain);
101
+ const sessionValidator = (0, core_1.getValidator)(session.owners);
102
+ const userOpPolicies = (session.policies || [
103
+ {
104
+ type: 'sudo',
105
+ },
106
+ ]).map((policy) => {
107
+ return getPolicyData(policy);
108
+ });
109
+ return {
110
+ sessionValidator: sessionValidator.address,
111
+ sessionValidatorInitData: sessionValidator.initData,
112
+ salt: session.salt ?? viem_1.zeroHash,
113
+ userOpPolicies,
114
+ // Using the fallback action by default (any transaction will pass)
115
+ actions: (session.actions || [
116
+ {
117
+ target: SMART_SESSIONS_FALLBACK_TARGET_FLAG,
118
+ selector: SMART_SESSIONS_FALLBACK_TARGET_SELECTOR_FLAG,
119
+ },
120
+ ])
121
+ .map((action) => {
122
+ const actionPolicies = (action.policies || [
123
+ {
124
+ type: 'sudo',
125
+ },
126
+ ]).map((policy) => {
127
+ return getPolicyData(policy);
128
+ });
129
+ return {
130
+ actionTargetSelector: action.selector,
131
+ actionTarget: action.target,
132
+ actionPolicies,
133
+ };
134
+ })
135
+ .concat(omniActions),
136
+ erc7739Policies: {
137
+ allowedERC7739Content,
138
+ erc1271Policies: [getPolicyData({ type: 'sudo' })],
139
+ },
140
+ permitERC4337Paymaster: true,
141
+ };
142
+ }
143
+ function getSmartSessionValidator(config) {
144
+ if (!config.sessions) {
145
+ return null;
146
+ }
147
+ return {
148
+ address: SMART_SESSIONS_VALIDATOR_ADDRESS,
149
+ initData: '0x',
150
+ deInitData: '0x',
151
+ additionalContext: '0x',
152
+ type: common_1.MODULE_TYPE_ID_VALIDATOR,
153
+ };
154
+ }
155
+ function getPolicyData(policy) {
156
+ switch (policy.type) {
157
+ case 'sudo':
158
+ return {
159
+ policy: SUDO_POLICY_ADDRESS,
160
+ initData: '0x',
161
+ };
162
+ case 'universal-action': {
163
+ function getCondition(condition) {
164
+ switch (condition) {
165
+ case 'equal':
166
+ return ACTION_CONDITION_EQUAL;
167
+ case 'greaterThan':
168
+ return ACTION_CONDITION_GREATER_THAN;
169
+ case 'lessThan':
170
+ return ACTION_CONDITION_LESS_THAN;
171
+ case 'greaterThanOrEqual':
172
+ return ACTION_CONDITION_GREATER_THAN_OR_EQUAL;
173
+ case 'lessThanOrEqual':
174
+ return ACTION_CONDITION_LESS_THAN_OR_EQUAL;
175
+ case 'notEqual':
176
+ return ACTION_CONDITION_NOT_EQUAL;
177
+ case 'inRange':
178
+ return ACTION_CONDITION_IN_RANGE;
179
+ }
180
+ }
181
+ const MAX_RULES = 16;
182
+ const rules = createFixedArray(MAX_RULES, () => ({
183
+ condition: ACTION_CONDITION_EQUAL,
184
+ offset: 0n,
185
+ isLimited: false,
186
+ ref: viem_1.zeroHash,
187
+ usage: { limit: 0n, used: 0n },
188
+ }));
189
+ for (let i = 0; i < policy.rules.length; i++) {
190
+ const rule = policy.rules[i];
191
+ const ref = (0, viem_1.isHex)(rule.referenceValue)
192
+ ? (0, viem_1.padHex)(rule.referenceValue)
193
+ : (0, viem_1.toHex)(rule.referenceValue, { size: 32 });
194
+ rules[i] = {
195
+ condition: getCondition(rule.condition),
196
+ offset: rule.calldataOffset,
197
+ isLimited: rule.usageLimit !== undefined,
198
+ ref,
199
+ usage: {
200
+ limit: rule.usageLimit ? rule.usageLimit : 0n,
201
+ used: 0n,
202
+ },
203
+ };
204
+ }
205
+ return {
206
+ policy: UNIVERSAL_ACTION_POLICY_ADDRESS,
207
+ initData: (0, viem_1.encodeAbiParameters)([
208
+ {
209
+ components: [
210
+ {
211
+ name: 'valueLimitPerUse',
212
+ type: 'uint256',
213
+ },
214
+ {
215
+ components: [
216
+ {
217
+ name: 'length',
218
+ type: 'uint256',
219
+ },
220
+ {
221
+ components: [
222
+ {
223
+ name: 'condition',
224
+ type: 'uint8',
225
+ },
226
+ {
227
+ name: 'offset',
228
+ type: 'uint64',
229
+ },
230
+ {
231
+ name: 'isLimited',
232
+ type: 'bool',
233
+ },
234
+ {
235
+ name: 'ref',
236
+ type: 'bytes32',
237
+ },
238
+ {
239
+ components: [
240
+ {
241
+ name: 'limit',
242
+ type: 'uint256',
243
+ },
244
+ {
245
+ name: 'used',
246
+ type: 'uint256',
247
+ },
248
+ ],
249
+ name: 'usage',
250
+ type: 'tuple',
251
+ },
252
+ ],
253
+ name: 'rules',
254
+ type: 'tuple[16]',
255
+ },
256
+ ],
257
+ name: 'paramRules',
258
+ type: 'tuple',
259
+ },
260
+ ],
261
+ name: 'ActionConfig',
262
+ type: 'tuple',
263
+ },
264
+ ], [
265
+ {
266
+ valueLimitPerUse: policy.valueLimitPerUse ?? 0n,
267
+ paramRules: {
268
+ length: BigInt(policy.rules.length),
269
+ rules: rules,
270
+ },
271
+ },
272
+ ]),
273
+ };
274
+ }
275
+ case 'spending-limits': {
276
+ const tokens = policy.limits.map(({ token }) => token);
277
+ const limits = policy.limits.map(({ amount }) => amount);
278
+ return {
279
+ policy: SPENDING_LIMITS_POLICY_ADDRESS,
280
+ initData: (0, viem_1.encodeAbiParameters)([{ type: 'address[]' }, { type: 'uint256[]' }], [tokens, limits]),
281
+ };
282
+ }
283
+ case 'time-frame': {
284
+ return {
285
+ policy: TIME_FRAME_POLICY_ADDRESS,
286
+ initData: (0, viem_1.encodePacked)(['uint128', 'uint128'], [
287
+ BigInt(policy.validUntil) / 1000n,
288
+ BigInt(policy.validAfter) / 1000n,
289
+ ]),
290
+ };
291
+ }
292
+ case 'usage-limit': {
293
+ return {
294
+ policy: USAGE_LIMIT_POLICY_ADDRESS,
295
+ initData: (0, viem_1.encodePacked)(['uint128'], [policy.limit]),
296
+ };
297
+ }
298
+ case 'value-limit': {
299
+ return {
300
+ policy: VALUE_LIMIT_POLICY_ADDRESS,
301
+ initData: (0, viem_1.encodeAbiParameters)([{ type: 'uint256' }], [policy.limit]),
302
+ };
303
+ }
304
+ }
305
+ }
306
+ function createFixedArray(length, getValue) {
307
+ return Array.from({ length }, (_, i) => getValue(i));
308
+ }
309
+ async function isSessionEnabled(client, address, permissionId) {
310
+ return await client.readContract({
311
+ address: SMART_SESSIONS_VALIDATOR_ADDRESS,
312
+ abi: [
313
+ {
314
+ inputs: [
315
+ {
316
+ internalType: 'PermissionId',
317
+ name: 'permissionId',
318
+ type: 'bytes32',
319
+ },
320
+ {
321
+ internalType: 'address',
322
+ name: 'account',
323
+ type: 'address',
324
+ },
325
+ ],
326
+ name: 'isPermissionEnabled',
327
+ outputs: [
328
+ {
329
+ internalType: 'bool',
330
+ name: '',
331
+ type: 'bool',
332
+ },
333
+ ],
334
+ stateMutability: 'view',
335
+ type: 'function',
336
+ },
337
+ ],
338
+ functionName: 'isPermissionEnabled',
339
+ args: [permissionId, address],
340
+ });
341
+ }
342
+ function encodeSmartSessionSignature(mode, permissionId, signature) {
343
+ switch (mode) {
344
+ case SMART_SESSION_MODE_USE:
345
+ return (0, viem_1.encodePacked)(['bytes1', 'bytes32', 'bytes'], [mode, permissionId, signature]);
346
+ case SMART_SESSION_MODE_ENABLE:
347
+ case SMART_SESSION_MODE_UNSAFE_ENABLE:
348
+ throw new Error('Enable mode not implemented');
349
+ default:
350
+ throw new Error(`Unknown mode ${mode}`);
351
+ }
352
+ }
353
+ function getPermissionId(session) {
354
+ const sessionValidator = (0, core_1.getValidator)(session.owners);
355
+ return (0, viem_1.keccak256)((0, viem_1.encodeAbiParameters)([
356
+ {
357
+ type: 'address',
358
+ name: 'sessionValidator',
359
+ },
360
+ {
361
+ type: 'bytes',
362
+ name: 'sessionValidatorInitData',
363
+ },
364
+ {
365
+ type: 'bytes32',
366
+ name: 'salt',
367
+ },
368
+ ], [
369
+ sessionValidator.address,
370
+ sessionValidator.initData,
371
+ session.salt ?? viem_1.zeroHash,
372
+ ]));
373
+ }
374
+ async function getAccountEIP712Domain(client, account) {
375
+ const data = await client.readContract({
376
+ address: account,
377
+ abi: [
378
+ {
379
+ type: 'function',
380
+ name: 'eip712Domain',
381
+ inputs: [],
382
+ outputs: [
383
+ {
384
+ type: 'bytes1',
385
+ name: 'fields,',
386
+ },
387
+ {
388
+ type: 'string',
389
+ name: 'name',
390
+ },
391
+ {
392
+ type: 'string',
393
+ name: 'version',
394
+ },
395
+ {
396
+ type: 'uint256',
397
+ name: 'chainId',
398
+ },
399
+ {
400
+ type: 'address',
401
+ name: 'verifyingContract',
402
+ },
403
+ {
404
+ type: 'bytes32',
405
+ name: 'salt',
406
+ },
407
+ {
408
+ type: 'uint256[]',
409
+ name: 'extensions',
410
+ },
411
+ ],
412
+ stateMutability: 'view',
413
+ constant: true,
414
+ },
415
+ ],
416
+ functionName: 'eip712Domain',
417
+ args: [],
418
+ });
419
+ return {
420
+ name: data[1],
421
+ version: data[2],
422
+ chainId: data[3],
423
+ verifyingContract: data[4],
424
+ salt: data[5],
425
+ };
426
+ }
@@ -0,0 +1,29 @@
1
+ import { type Address, type Hex } from 'viem';
2
+ import type { UserOperation } from 'viem/account-abstraction';
3
+ import type { BundleEvent, BundleResult, MetaIntent, OrderCostResult, OrderFeeInput, OrderPath, PostOrderBundleResult, SignedMultiChainCompact, UserTokenBalance } from './types';
4
+ export declare class Orchestrator {
5
+ private serverUrl;
6
+ private apiKey;
7
+ constructor(serverUrl: string, apiKey: string);
8
+ getPortfolio(userAddress: Address, filter?: {
9
+ chainIds?: number[];
10
+ tokens?: {
11
+ [chainId: number]: Address[];
12
+ };
13
+ }): Promise<UserTokenBalance[]>;
14
+ getMaxTokenAmount(userAddress: Address, targetChainId: number, targetTokenAddress: Address, targetGasUnits: bigint): Promise<bigint>;
15
+ getIntentCost(intent: OrderFeeInput, userAddress: Address): Promise<OrderCostResult>;
16
+ getOrderPath(intent: MetaIntent, userAddress: Address): Promise<OrderPath>;
17
+ postSignedOrderBundle(signedOrderBundles: {
18
+ signedOrderBundle: SignedMultiChainCompact;
19
+ initCode?: Hex;
20
+ userOp?: UserOperation;
21
+ }[]): Promise<PostOrderBundleResult>;
22
+ getBundleStatus(bundleId: bigint): Promise<BundleResult>;
23
+ getPendingBundles(count?: number, offset?: number): Promise<{
24
+ pendingBundles: BundleEvent[];
25
+ nextOffset?: number;
26
+ }>;
27
+ private parseError;
28
+ }
29
+ //# sourceMappingURL=client.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../../orchestrator/client.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,OAAO,EAAU,KAAK,GAAG,EAAE,MAAM,MAAM,CAAA;AACrD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAA;AAG7D,OAAO,KAAK,EACV,WAAW,EACX,YAAY,EACZ,UAAU,EACV,eAAe,EACf,aAAa,EACb,SAAS,EACT,qBAAqB,EACrB,uBAAuB,EACvB,gBAAgB,EACjB,MAAM,SAAS,CAAA;AAShB,qBAAa,YAAY;IACvB,OAAO,CAAC,SAAS,CAAQ;IACzB,OAAO,CAAC,MAAM,CAAQ;gBAEV,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;IAKvC,YAAY,CAChB,WAAW,EAAE,OAAO,EACpB,MAAM,CAAC,EAAE;QACP,QAAQ,CAAC,EAAE,MAAM,EAAE,CAAA;QACnB,MAAM,CAAC,EAAE;YACP,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,EAAE,CAAA;SAC7B,CAAA;KACF,GACA,OAAO,CAAC,gBAAgB,EAAE,CAAC;IAwCxB,iBAAiB,CACrB,WAAW,EAAE,OAAO,EACpB,aAAa,EAAE,MAAM,EACrB,kBAAkB,EAAE,OAAO,EAC3B,cAAc,EAAE,MAAM,GACrB,OAAO,CAAC,MAAM,CAAC;IAgCZ,aAAa,CACjB,MAAM,EAAE,aAAa,EACrB,WAAW,EAAE,OAAO,GACnB,OAAO,CAAC,eAAe,CAAC;IAqBrB,YAAY,CAChB,MAAM,EAAE,UAAU,EAClB,WAAW,EAAE,OAAO,GACnB,OAAO,CAAC,SAAS,CAAC;IAgCf,qBAAqB,CACzB,kBAAkB,EAAE;QAClB,iBAAiB,EAAE,uBAAuB,CAAA;QAC1C,QAAQ,CAAC,EAAE,GAAG,CAAA;QACd,MAAM,CAAC,EAAE,aAAa,CAAA;KACvB,EAAE,GACF,OAAO,CAAC,qBAAqB,CAAC;IA2C3B,eAAe,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC;IAyBxD,iBAAiB,CACrB,KAAK,GAAE,MAAW,EAClB,MAAM,GAAE,MAAU,GACjB,OAAO,CAAC;QAAE,cAAc,EAAE,WAAW,EAAE,CAAC;QAAC,UAAU,CAAC,EAAE,MAAM,CAAA;KAAE,CAAC;IAuBlE,OAAO,CAAC,UAAU;CA6DnB"}