@shware/http 2.2.2 → 2.2.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,326 +0,0 @@
1
- // src/hono/__tests__/csrf.test.ts
2
- import { Hono } from "hono";
3
- import { csrf } from "../csrf.mjs";
4
- import { errorHandler } from "../handler.mjs";
5
- describe("CSRF Protection", () => {
6
- let app;
7
- beforeEach(() => {
8
- app = new Hono();
9
- app.onError(errorHandler);
10
- });
11
- it("should allow GET requests without CSRF token", async () => {
12
- app.use(csrf());
13
- app.get("/test", (c) => c.text("OK"));
14
- const res = await app.request("/test");
15
- expect(res.status).toBe(200);
16
- expect(await res.text()).toBe("OK");
17
- });
18
- it("should allow HEAD requests without CSRF token", async () => {
19
- app.use(csrf());
20
- app.all("/test", (c) => c.text("OK"));
21
- const res = await app.request("/test", { method: "HEAD" });
22
- expect(res.status).toBe(200);
23
- });
24
- it("should allow OPTIONS requests without CSRF token", async () => {
25
- app.use(csrf());
26
- app.options("/test", (c) => c.text("OK"));
27
- const res = await app.request("/test", { method: "OPTIONS" });
28
- expect(res.status).toBe(200);
29
- });
30
- it("should reject POST requests without CSRF token", async () => {
31
- app.use(csrf());
32
- app.post("/test", (c) => c.text("OK"));
33
- const res = await app.request("/test", { method: "POST" });
34
- expect(res.status).toBe(403);
35
- });
36
- it("should reject POST requests with mismatched tokens", async () => {
37
- app.use(csrf());
38
- app.post("/test", (c) => c.text("OK"));
39
- const res = await app.request("/test", {
40
- method: "POST",
41
- headers: { "X-XSRF-TOKEN": "header-token", Cookie: "XSRF-TOKEN=cookie-token" }
42
- });
43
- expect(res.status).toBe(403);
44
- });
45
- it("should allow POST requests with matching tokens", async () => {
46
- app.use(csrf());
47
- app.post("/test", (c) => c.text("OK"));
48
- const res = await app.request("/test", {
49
- method: "POST",
50
- headers: {
51
- "X-XSRF-TOKEN": "matching-token",
52
- Cookie: "XSRF-TOKEN=matching-token"
53
- }
54
- });
55
- expect(res.status).toBe(200);
56
- expect(await res.text()).toBe("OK");
57
- });
58
- it("should use custom cookie and header names", async () => {
59
- app.use(csrf({ cookieName: "csrf-token", headerName: "X-CSRF-Token" }));
60
- app.post("/test", (c) => c.text("OK"));
61
- const res = await app.request("/test", {
62
- method: "POST",
63
- headers: {
64
- "X-CSRF-Token": "test-token",
65
- Cookie: "csrf-token=test-token"
66
- }
67
- });
68
- expect(res.status).toBe(200);
69
- });
70
- it("should ignore specified paths", async () => {
71
- app.use(csrf({ ignores: [{ path: "/webhook/*", methods: ["POST"] }] }));
72
- app.post("/webhook/stripe", (c) => c.text("OK"));
73
- app.post("/api/data", (c) => c.text("OK"));
74
- const webhookRes = await app.request("/webhook/stripe", { method: "POST" });
75
- expect(webhookRes.status).toBe(200);
76
- const apiRes = await app.request("/api/data", { method: "POST" });
77
- expect(apiRes.status).toBe(403);
78
- });
79
- it("should ignore all methods for a path when methods not specified", async () => {
80
- app.use(csrf({ ignores: [{ path: "/auth/apple/callback" }] }));
81
- app.post("/auth/apple/callback", (c) => c.text("OK"));
82
- app.put("/auth/apple/callback", (c) => c.text("OK"));
83
- const postRes = await app.request("/auth/apple/callback", { method: "POST" });
84
- expect(postRes.status).toBe(200);
85
- const putRes = await app.request("/auth/apple/callback", { method: "PUT" });
86
- expect(putRes.status).toBe(200);
87
- });
88
- it("should handle empty tokens safely", async () => {
89
- app.use(csrf());
90
- app.post("/test", (c) => c.text("OK"));
91
- const res = await app.request("/test", {
92
- method: "POST",
93
- headers: { "X-XSRF-TOKEN": "", Cookie: "XSRF-TOKEN=" }
94
- });
95
- expect(res.status).toBe(403);
96
- });
97
- it("should handle missing cookie", async () => {
98
- app.use(csrf());
99
- app.post("/test", (c) => c.text("OK"));
100
- const res = await app.request("/test", {
101
- method: "POST",
102
- headers: { "X-XSRF-TOKEN": "token" }
103
- });
104
- expect(res.status).toBe(403);
105
- });
106
- it("should handle missing header", async () => {
107
- app.use(csrf());
108
- app.post("/test", (c) => c.text("OK"));
109
- const res = await app.request("/test", {
110
- method: "POST",
111
- headers: { Cookie: "XSRF-TOKEN=token" }
112
- });
113
- expect(res.status).toBe(403);
114
- });
115
- it("should use custom error message", async () => {
116
- app.use(csrf({ errorMessage: "Custom CSRF error" }));
117
- app.post("/test", (c) => c.text("OK"));
118
- const res = await app.request("/test", { method: "POST" });
119
- expect(res.status).toBe(403);
120
- const body = await res.json();
121
- expect(body.error.message).toBe("Custom CSRF error");
122
- });
123
- it("should work with custom safe methods", async () => {
124
- app.use(csrf({ safeMethods: ["GET"] }));
125
- app.all("/test", (c) => c.text("OK"));
126
- const res = await app.request("/test", { method: "HEAD" });
127
- expect(res.status).toBe(403);
128
- });
129
- it("should handle complex ignore patterns", async () => {
130
- app.use(
131
- csrf({
132
- ignores: [
133
- { path: "/api/v1/*", methods: ["GET", "POST"] },
134
- { path: "/api/v2/*", methods: ["POST"] },
135
- { path: "/public/*" }
136
- // All methods
137
- ]
138
- })
139
- );
140
- app.get("/api/v1/users", (c) => c.text("OK"));
141
- app.post("/api/v1/users", (c) => c.text("OK"));
142
- app.put("/api/v1/users", (c) => c.text("OK"));
143
- app.post("/api/v2/users", (c) => c.text("OK"));
144
- app.get("/api/v2/users", (c) => c.text("OK"));
145
- app.post("/public/data", (c) => c.text("OK"));
146
- let res = await app.request("/api/v1/users", { method: "GET" });
147
- expect(res.status).toBe(200);
148
- res = await app.request("/api/v1/users", { method: "POST" });
149
- expect(res.status).toBe(200);
150
- res = await app.request("/api/v1/users", { method: "PUT" });
151
- expect(res.status).toBe(403);
152
- res = await app.request("/api/v2/users", { method: "POST" });
153
- expect(res.status).toBe(200);
154
- res = await app.request("/api/v2/users", { method: "GET" });
155
- expect(res.status).toBe(200);
156
- res = await app.request("/public/data", { method: "POST" });
157
- expect(res.status).toBe(200);
158
- });
159
- describe("Origin bypass", () => {
160
- it("should allow requests from configured origins", async () => {
161
- app.use(csrf({ origin: ["https://example.com", "https://trusted.com"] }));
162
- app.post("/test", (c) => c.text("OK"));
163
- const res = await app.request("/test", {
164
- method: "POST",
165
- headers: { Origin: "https://example.com" }
166
- });
167
- expect(res.status).toBe(200);
168
- expect(await res.text()).toBe("OK");
169
- });
170
- it("should allow requests from any configured origin", async () => {
171
- app.use(csrf({ origin: ["https://example.com", "https://trusted.com"] }));
172
- app.post("/test", (c) => c.text("OK"));
173
- const res = await app.request("/test", {
174
- method: "POST",
175
- headers: { Origin: "https://trusted.com" }
176
- });
177
- expect(res.status).toBe(200);
178
- });
179
- it("should reject requests from non-configured origins", async () => {
180
- app.use(csrf({ origin: ["https://example.com"] }));
181
- app.post("/test", (c) => c.text("OK"));
182
- const res = await app.request("/test", {
183
- method: "POST",
184
- headers: { Origin: "https://malicious.com" }
185
- });
186
- expect(res.status).toBe(403);
187
- });
188
- it("should reject requests without origin header", async () => {
189
- app.use(csrf({ origin: ["https://example.com"] }));
190
- app.post("/test", (c) => c.text("OK"));
191
- const res = await app.request("/test", { method: "POST" });
192
- expect(res.status).toBe(403);
193
- });
194
- it("should handle empty origin list", async () => {
195
- app.use(csrf({ origin: [] }));
196
- app.post("/test", (c) => c.text("OK"));
197
- const res = await app.request("/test", {
198
- method: "POST",
199
- headers: { Origin: "https://example.com" }
200
- });
201
- expect(res.status).toBe(403);
202
- });
203
- });
204
- describe("Sec-Fetch-Site bypass", () => {
205
- it("should allow requests with configured sec-fetch-site values", async () => {
206
- app.use(csrf({ secFetchSite: ["same-origin", "same-site"] }));
207
- app.post("/test", (c) => c.text("OK"));
208
- const res = await app.request("/test", {
209
- method: "POST",
210
- headers: { "Sec-Fetch-Site": "same-origin" }
211
- });
212
- expect(res.status).toBe(200);
213
- expect(await res.text()).toBe("OK");
214
- });
215
- it("should allow requests with any configured sec-fetch-site value", async () => {
216
- app.use(csrf({ secFetchSite: ["same-origin", "same-site", "cross-origin"] }));
217
- app.post("/test", (c) => c.text("OK"));
218
- const res = await app.request("/test", {
219
- method: "POST",
220
- headers: { "Sec-Fetch-Site": "cross-origin" }
221
- });
222
- expect(res.status).toBe(200);
223
- });
224
- it("should reject requests with non-configured sec-fetch-site values", async () => {
225
- app.use(csrf({ secFetchSite: ["same-origin"] }));
226
- app.post("/test", (c) => c.text("OK"));
227
- const res = await app.request("/test", {
228
- method: "POST",
229
- headers: { "Sec-Fetch-Site": "same-site" }
230
- });
231
- expect(res.status).toBe(403);
232
- });
233
- it("should reject requests without sec-fetch-site header", async () => {
234
- app.use(csrf({ secFetchSite: ["same-origin"] }));
235
- app.post("/test", (c) => c.text("OK"));
236
- const res = await app.request("/test", { method: "POST" });
237
- expect(res.status).toBe(403);
238
- });
239
- it("should handle all valid sec-fetch-site values", async () => {
240
- app.use(csrf({ secFetchSite: ["same-origin", "same-site", "none", "cross-origin"] }));
241
- app.post("/test", (c) => c.text("OK"));
242
- const validValues = ["same-origin", "same-site", "none", "cross-origin"];
243
- for (const value of validValues) {
244
- const res = await app.request("/test", {
245
- method: "POST",
246
- headers: { "Sec-Fetch-Site": value }
247
- });
248
- expect(res.status).toBe(200);
249
- }
250
- });
251
- it("should handle empty sec-fetch-site list", async () => {
252
- app.use(csrf({ secFetchSite: [] }));
253
- app.post("/test", (c) => c.text("OK"));
254
- const res = await app.request("/test", {
255
- method: "POST",
256
- headers: { "Sec-Fetch-Site": "same-origin" }
257
- });
258
- expect(res.status).toBe(403);
259
- });
260
- });
261
- describe("Combined origin and sec-fetch-site bypass", () => {
262
- it("should allow requests matching either origin or sec-fetch-site", async () => {
263
- app.use(
264
- csrf({
265
- origin: ["https://example.com"],
266
- secFetchSite: ["same-site"]
267
- })
268
- );
269
- app.post("/test", (c) => c.text("OK"));
270
- let res = await app.request("/test", {
271
- method: "POST",
272
- headers: { Origin: "https://example.com" }
273
- });
274
- expect(res.status).toBe(200);
275
- res = await app.request("/test", {
276
- method: "POST",
277
- headers: { "Sec-Fetch-Site": "same-site" }
278
- });
279
- expect(res.status).toBe(200);
280
- });
281
- it("should reject requests matching neither origin nor sec-fetch-site", async () => {
282
- app.use(
283
- csrf({
284
- origin: ["https://example.com"],
285
- secFetchSite: ["same-origin"]
286
- })
287
- );
288
- app.post("/test", (c) => c.text("OK"));
289
- const res = await app.request("/test", {
290
- method: "POST",
291
- headers: {
292
- Origin: "https://malicious.com",
293
- "Sec-Fetch-Site": "cross-origin"
294
- }
295
- });
296
- expect(res.status).toBe(403);
297
- });
298
- it("should work with origin, sec-fetch-site and ignore rules combined", async () => {
299
- app.use(
300
- csrf({
301
- origin: ["https://example.com"],
302
- secFetchSite: ["same-site"],
303
- ignores: [{ path: "/webhook/*", methods: ["POST"] }]
304
- })
305
- );
306
- app.post("/test", (c) => c.text("OK"));
307
- app.post("/webhook/stripe", (c) => c.text("OK"));
308
- app.post("/api/data", (c) => c.text("OK"));
309
- let res = await app.request("/test", {
310
- method: "POST",
311
- headers: { Origin: "https://example.com" }
312
- });
313
- expect(res.status).toBe(200);
314
- res = await app.request("/test", {
315
- method: "POST",
316
- headers: { "Sec-Fetch-Site": "same-site" }
317
- });
318
- expect(res.status).toBe(200);
319
- res = await app.request("/webhook/stripe", { method: "POST" });
320
- expect(res.status).toBe(200);
321
- res = await app.request("/api/data", { method: "POST" });
322
- expect(res.status).toBe(403);
323
- });
324
- });
325
- });
326
- //# sourceMappingURL=csrf.test.mjs.map
@@ -1 +0,0 @@
1
- {"version":3,"sources":["../../../src/hono/__tests__/csrf.test.ts"],"sourcesContent":["import { Hono } from 'hono';\nimport { csrf } from '../csrf';\nimport { type Env, errorHandler } from '../handler';\n\ndescribe('CSRF Protection', () => {\n let app: Hono<Env>;\n\n beforeEach(() => {\n app = new Hono();\n app.onError(errorHandler);\n });\n\n it('should allow GET requests without CSRF token', async () => {\n app.use(csrf());\n app.get('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test');\n expect(res.status).toBe(200);\n expect(await res.text()).toBe('OK');\n });\n\n it('should allow HEAD requests without CSRF token', async () => {\n app.use(csrf());\n app.all('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', { method: 'HEAD' });\n expect(res.status).toBe(200);\n });\n\n it('should allow OPTIONS requests without CSRF token', async () => {\n app.use(csrf());\n app.options('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', { method: 'OPTIONS' });\n expect(res.status).toBe(200);\n });\n\n it('should reject POST requests without CSRF token', async () => {\n app.use(csrf());\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', { method: 'POST' });\n expect(res.status).toBe(403);\n });\n\n it('should reject POST requests with mismatched tokens', async () => {\n app.use(csrf());\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { 'X-XSRF-TOKEN': 'header-token', Cookie: 'XSRF-TOKEN=cookie-token' },\n });\n expect(res.status).toBe(403);\n });\n\n it('should allow POST requests with matching tokens', async () => {\n app.use(csrf());\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: {\n 'X-XSRF-TOKEN': 'matching-token',\n Cookie: 'XSRF-TOKEN=matching-token',\n },\n });\n expect(res.status).toBe(200);\n expect(await res.text()).toBe('OK');\n });\n\n it('should use custom cookie and header names', async () => {\n app.use(csrf({ cookieName: 'csrf-token', headerName: 'X-CSRF-Token' }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: {\n 'X-CSRF-Token': 'test-token',\n Cookie: 'csrf-token=test-token',\n },\n });\n expect(res.status).toBe(200);\n });\n\n it('should ignore specified paths', async () => {\n app.use(csrf({ ignores: [{ path: '/webhook/*', methods: ['POST'] }] }));\n app.post('/webhook/stripe', (c) => c.text('OK'));\n app.post('/api/data', (c) => c.text('OK'));\n\n // Ignored path should work without CSRF token\n const webhookRes = await app.request('/webhook/stripe', { method: 'POST' });\n expect(webhookRes.status).toBe(200);\n\n // Non-ignored path should require CSRF token\n const apiRes = await app.request('/api/data', { method: 'POST' });\n expect(apiRes.status).toBe(403);\n });\n\n it('should ignore all methods for a path when methods not specified', async () => {\n app.use(csrf({ ignores: [{ path: '/auth/apple/callback' }] }));\n app.post('/auth/apple/callback', (c) => c.text('OK'));\n app.put('/auth/apple/callback', (c) => c.text('OK'));\n\n const postRes = await app.request('/auth/apple/callback', { method: 'POST' });\n expect(postRes.status).toBe(200);\n\n const putRes = await app.request('/auth/apple/callback', { method: 'PUT' });\n expect(putRes.status).toBe(200);\n });\n\n it('should handle empty tokens safely', async () => {\n app.use(csrf());\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { 'X-XSRF-TOKEN': '', Cookie: 'XSRF-TOKEN=' },\n });\n expect(res.status).toBe(403);\n });\n\n it('should handle missing cookie', async () => {\n app.use(csrf());\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { 'X-XSRF-TOKEN': 'token' },\n });\n expect(res.status).toBe(403);\n });\n\n it('should handle missing header', async () => {\n app.use(csrf());\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { Cookie: 'XSRF-TOKEN=token' },\n });\n expect(res.status).toBe(403);\n });\n\n it('should use custom error message', async () => {\n app.use(csrf({ errorMessage: 'Custom CSRF error' }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', { method: 'POST' });\n expect(res.status).toBe(403);\n const body = await res.json();\n expect(body.error.message).toBe('Custom CSRF error');\n });\n\n it('should work with custom safe methods', async () => {\n app.use(csrf({ safeMethods: ['GET'] }));\n app.all('/test', (c) => c.text('OK'));\n\n // HEAD is no longer safe, should require CSRF token\n const res = await app.request('/test', { method: 'HEAD' });\n expect(res.status).toBe(403);\n });\n\n it('should handle complex ignore patterns', async () => {\n app.use(\n csrf({\n ignores: [\n { path: '/api/v1/*', methods: ['GET', 'POST'] },\n { path: '/api/v2/*', methods: ['POST'] },\n { path: '/public/*' }, // All methods\n ],\n })\n );\n\n app.get('/api/v1/users', (c) => c.text('OK'));\n app.post('/api/v1/users', (c) => c.text('OK'));\n app.put('/api/v1/users', (c) => c.text('OK'));\n app.post('/api/v2/users', (c) => c.text('OK'));\n app.get('/api/v2/users', (c) => c.text('OK'));\n app.post('/public/data', (c) => c.text('OK'));\n\n // Ignored GET and POST for /api/v1/*\n let res = await app.request('/api/v1/users', { method: 'GET' });\n expect(res.status).toBe(200);\n\n res = await app.request('/api/v1/users', { method: 'POST' });\n expect(res.status).toBe(200);\n\n // PUT not ignored for /api/v1/*\n res = await app.request('/api/v1/users', { method: 'PUT' });\n expect(res.status).toBe(403);\n\n // Only POST ignored for /api/v2/*\n res = await app.request('/api/v2/users', { method: 'POST' });\n expect(res.status).toBe(200);\n\n // GET not ignored for /api/v2/* (but GET is safe by default)\n res = await app.request('/api/v2/users', { method: 'GET' });\n expect(res.status).toBe(200);\n\n // All methods ignored for /public/*\n res = await app.request('/public/data', { method: 'POST' });\n expect(res.status).toBe(200);\n });\n\n describe('Origin bypass', () => {\n it('should allow requests from configured origins', async () => {\n app.use(csrf({ origin: ['https://example.com', 'https://trusted.com'] }));\n app.post('/test', (c) => c.text('OK'));\n\n // Request from allowed origin should work without CSRF token\n const res = await app.request('/test', {\n method: 'POST',\n headers: { Origin: 'https://example.com' },\n });\n expect(res.status).toBe(200);\n expect(await res.text()).toBe('OK');\n });\n\n it('should allow requests from any configured origin', async () => {\n app.use(csrf({ origin: ['https://example.com', 'https://trusted.com'] }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { Origin: 'https://trusted.com' },\n });\n expect(res.status).toBe(200);\n });\n\n it('should reject requests from non-configured origins', async () => {\n app.use(csrf({ origin: ['https://example.com'] }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { Origin: 'https://malicious.com' },\n });\n expect(res.status).toBe(403);\n });\n\n it('should reject requests without origin header', async () => {\n app.use(csrf({ origin: ['https://example.com'] }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', { method: 'POST' });\n expect(res.status).toBe(403);\n });\n\n it('should handle empty origin list', async () => {\n app.use(csrf({ origin: [] }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { Origin: 'https://example.com' },\n });\n expect(res.status).toBe(403);\n });\n });\n\n describe('Sec-Fetch-Site bypass', () => {\n it('should allow requests with configured sec-fetch-site values', async () => {\n app.use(csrf({ secFetchSite: ['same-origin', 'same-site'] }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { 'Sec-Fetch-Site': 'same-origin' },\n });\n expect(res.status).toBe(200);\n expect(await res.text()).toBe('OK');\n });\n\n it('should allow requests with any configured sec-fetch-site value', async () => {\n app.use(csrf({ secFetchSite: ['same-origin', 'same-site', 'cross-origin'] }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { 'Sec-Fetch-Site': 'cross-origin' },\n });\n expect(res.status).toBe(200);\n });\n\n it('should reject requests with non-configured sec-fetch-site values', async () => {\n app.use(csrf({ secFetchSite: ['same-origin'] }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { 'Sec-Fetch-Site': 'same-site' },\n });\n expect(res.status).toBe(403);\n });\n\n it('should reject requests without sec-fetch-site header', async () => {\n app.use(csrf({ secFetchSite: ['same-origin'] }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', { method: 'POST' });\n expect(res.status).toBe(403);\n });\n\n it('should handle all valid sec-fetch-site values', async () => {\n app.use(csrf({ secFetchSite: ['same-origin', 'same-site', 'none', 'cross-origin'] }));\n app.post('/test', (c) => c.text('OK'));\n\n const validValues = ['same-origin', 'same-site', 'none', 'cross-origin'];\n\n for (const value of validValues) {\n const res = await app.request('/test', {\n method: 'POST',\n headers: { 'Sec-Fetch-Site': value },\n });\n expect(res.status).toBe(200);\n }\n });\n\n it('should handle empty sec-fetch-site list', async () => {\n app.use(csrf({ secFetchSite: [] }));\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: { 'Sec-Fetch-Site': 'same-origin' },\n });\n expect(res.status).toBe(403);\n });\n });\n\n describe('Combined origin and sec-fetch-site bypass', () => {\n it('should allow requests matching either origin or sec-fetch-site', async () => {\n app.use(\n csrf({\n origin: ['https://example.com'],\n secFetchSite: ['same-site'],\n })\n );\n app.post('/test', (c) => c.text('OK'));\n\n // Should work with matching origin\n let res = await app.request('/test', {\n method: 'POST',\n headers: { Origin: 'https://example.com' },\n });\n expect(res.status).toBe(200);\n\n // Should work with matching sec-fetch-site\n res = await app.request('/test', {\n method: 'POST',\n headers: { 'Sec-Fetch-Site': 'same-site' },\n });\n expect(res.status).toBe(200);\n });\n\n it('should reject requests matching neither origin nor sec-fetch-site', async () => {\n app.use(\n csrf({\n origin: ['https://example.com'],\n secFetchSite: ['same-origin'],\n })\n );\n app.post('/test', (c) => c.text('OK'));\n\n const res = await app.request('/test', {\n method: 'POST',\n headers: {\n Origin: 'https://malicious.com',\n 'Sec-Fetch-Site': 'cross-origin',\n },\n });\n expect(res.status).toBe(403);\n });\n\n it('should work with origin, sec-fetch-site and ignore rules combined', async () => {\n app.use(\n csrf({\n origin: ['https://example.com'],\n secFetchSite: ['same-site'],\n ignores: [{ path: '/webhook/*', methods: ['POST'] }],\n })\n );\n\n app.post('/test', (c) => c.text('OK'));\n app.post('/webhook/stripe', (c) => c.text('OK'));\n app.post('/api/data', (c) => c.text('OK'));\n\n // Should work with origin bypass\n let res = await app.request('/test', {\n method: 'POST',\n headers: { Origin: 'https://example.com' },\n });\n expect(res.status).toBe(200);\n\n // Should work with sec-fetch-site bypass\n res = await app.request('/test', {\n method: 'POST',\n headers: { 'Sec-Fetch-Site': 'same-site' },\n });\n expect(res.status).toBe(200);\n\n // Should work with ignore rule\n res = await app.request('/webhook/stripe', { method: 'POST' });\n expect(res.status).toBe(200);\n\n // Should fail without any bypass\n res = await app.request('/api/data', { method: 'POST' });\n expect(res.status).toBe(403);\n });\n });\n});\n"],"mappings":";AAAA,SAAS,YAAY;AACrB,SAAS,YAAY;AACrB,SAAmB,oBAAoB;AAEvC,SAAS,mBAAmB,MAAM;AAChC,MAAI;AAEJ,aAAW,MAAM;AACf,UAAM,IAAI,KAAK;AACf,QAAI,QAAQ,YAAY;AAAA,EAC1B,CAAC;AAED,KAAG,gDAAgD,YAAY;AAC7D,QAAI,IAAI,KAAK,CAAC;AACd,QAAI,IAAI,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAEpC,UAAM,MAAM,MAAM,IAAI,QAAQ,OAAO;AACrC,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAC3B,WAAO,MAAM,IAAI,KAAK,CAAC,EAAE,KAAK,IAAI;AAAA,EACpC,CAAC;AAED,KAAG,iDAAiD,YAAY;AAC9D,QAAI,IAAI,KAAK,CAAC;AACd,QAAI,IAAI,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAEpC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS,EAAE,QAAQ,OAAO,CAAC;AACzD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,KAAG,oDAAoD,YAAY;AACjE,QAAI,IAAI,KAAK,CAAC;AACd,QAAI,QAAQ,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAExC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS,EAAE,QAAQ,UAAU,CAAC;AAC5D,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,KAAG,kDAAkD,YAAY;AAC/D,QAAI,IAAI,KAAK,CAAC;AACd,QAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS,EAAE,QAAQ,OAAO,CAAC;AACzD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,KAAG,sDAAsD,YAAY;AACnE,QAAI,IAAI,KAAK,CAAC;AACd,QAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,MACrC,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,gBAAgB,QAAQ,0BAA0B;AAAA,IAC/E,CAAC;AACD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,KAAG,mDAAmD,YAAY;AAChE,QAAI,IAAI,KAAK,CAAC;AACd,QAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,MACrC,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,gBAAgB;AAAA,QAChB,QAAQ;AAAA,MACV;AAAA,IACF,CAAC;AACD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAC3B,WAAO,MAAM,IAAI,KAAK,CAAC,EAAE,KAAK,IAAI;AAAA,EACpC,CAAC;AAED,KAAG,6CAA6C,YAAY;AAC1D,QAAI,IAAI,KAAK,EAAE,YAAY,cAAc,YAAY,eAAe,CAAC,CAAC;AACtE,QAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,MACrC,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,gBAAgB;AAAA,QAChB,QAAQ;AAAA,MACV;AAAA,IACF,CAAC;AACD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,KAAG,iCAAiC,YAAY;AAC9C,QAAI,IAAI,KAAK,EAAE,SAAS,CAAC,EAAE,MAAM,cAAc,SAAS,CAAC,MAAM,EAAE,CAAC,EAAE,CAAC,CAAC;AACtE,QAAI,KAAK,mBAAmB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAC/C,QAAI,KAAK,aAAa,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAGzC,UAAM,aAAa,MAAM,IAAI,QAAQ,mBAAmB,EAAE,QAAQ,OAAO,CAAC;AAC1E,WAAO,WAAW,MAAM,EAAE,KAAK,GAAG;AAGlC,UAAM,SAAS,MAAM,IAAI,QAAQ,aAAa,EAAE,QAAQ,OAAO,CAAC;AAChE,WAAO,OAAO,MAAM,EAAE,KAAK,GAAG;AAAA,EAChC,CAAC;AAED,KAAG,mEAAmE,YAAY;AAChF,QAAI,IAAI,KAAK,EAAE,SAAS,CAAC,EAAE,MAAM,uBAAuB,CAAC,EAAE,CAAC,CAAC;AAC7D,QAAI,KAAK,wBAAwB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AACpD,QAAI,IAAI,wBAAwB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAEnD,UAAM,UAAU,MAAM,IAAI,QAAQ,wBAAwB,EAAE,QAAQ,OAAO,CAAC;AAC5E,WAAO,QAAQ,MAAM,EAAE,KAAK,GAAG;AAE/B,UAAM,SAAS,MAAM,IAAI,QAAQ,wBAAwB,EAAE,QAAQ,MAAM,CAAC;AAC1E,WAAO,OAAO,MAAM,EAAE,KAAK,GAAG;AAAA,EAChC,CAAC;AAED,KAAG,qCAAqC,YAAY;AAClD,QAAI,IAAI,KAAK,CAAC;AACd,QAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,MACrC,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,IAAI,QAAQ,cAAc;AAAA,IACvD,CAAC;AACD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,KAAG,gCAAgC,YAAY;AAC7C,QAAI,IAAI,KAAK,CAAC;AACd,QAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,MACrC,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,QAAQ;AAAA,IACrC,CAAC;AACD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,KAAG,gCAAgC,YAAY;AAC7C,QAAI,IAAI,KAAK,CAAC;AACd,QAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,MACrC,QAAQ;AAAA,MACR,SAAS,EAAE,QAAQ,mBAAmB;AAAA,IACxC,CAAC;AACD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,KAAG,mCAAmC,YAAY;AAChD,QAAI,IAAI,KAAK,EAAE,cAAc,oBAAoB,CAAC,CAAC;AACnD,QAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS,EAAE,QAAQ,OAAO,CAAC;AACzD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAC3B,UAAM,OAAO,MAAM,IAAI,KAAK;AAC5B,WAAO,KAAK,MAAM,OAAO,EAAE,KAAK,mBAAmB;AAAA,EACrD,CAAC;AAED,KAAG,wCAAwC,YAAY;AACrD,QAAI,IAAI,KAAK,EAAE,aAAa,CAAC,KAAK,EAAE,CAAC,CAAC;AACtC,QAAI,IAAI,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAGpC,UAAM,MAAM,MAAM,IAAI,QAAQ,SAAS,EAAE,QAAQ,OAAO,CAAC;AACzD,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,KAAG,yCAAyC,YAAY;AACtD,QAAI;AAAA,MACF,KAAK;AAAA,QACH,SAAS;AAAA,UACP,EAAE,MAAM,aAAa,SAAS,CAAC,OAAO,MAAM,EAAE;AAAA,UAC9C,EAAE,MAAM,aAAa,SAAS,CAAC,MAAM,EAAE;AAAA,UACvC,EAAE,MAAM,YAAY;AAAA;AAAA,QACtB;AAAA,MACF,CAAC;AAAA,IACH;AAEA,QAAI,IAAI,iBAAiB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAC5C,QAAI,KAAK,iBAAiB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAC7C,QAAI,IAAI,iBAAiB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAC5C,QAAI,KAAK,iBAAiB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAC7C,QAAI,IAAI,iBAAiB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAC5C,QAAI,KAAK,gBAAgB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAG5C,QAAI,MAAM,MAAM,IAAI,QAAQ,iBAAiB,EAAE,QAAQ,MAAM,CAAC;AAC9D,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAE3B,UAAM,MAAM,IAAI,QAAQ,iBAAiB,EAAE,QAAQ,OAAO,CAAC;AAC3D,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAG3B,UAAM,MAAM,IAAI,QAAQ,iBAAiB,EAAE,QAAQ,MAAM,CAAC;AAC1D,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAG3B,UAAM,MAAM,IAAI,QAAQ,iBAAiB,EAAE,QAAQ,OAAO,CAAC;AAC3D,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAG3B,UAAM,MAAM,IAAI,QAAQ,iBAAiB,EAAE,QAAQ,MAAM,CAAC;AAC1D,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAG3B,UAAM,MAAM,IAAI,QAAQ,gBAAgB,EAAE,QAAQ,OAAO,CAAC;AAC1D,WAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,EAC7B,CAAC;AAED,WAAS,iBAAiB,MAAM;AAC9B,OAAG,iDAAiD,YAAY;AAC9D,UAAI,IAAI,KAAK,EAAE,QAAQ,CAAC,uBAAuB,qBAAqB,EAAE,CAAC,CAAC;AACxE,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAGrC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS,EAAE,QAAQ,sBAAsB;AAAA,MAC3C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAC3B,aAAO,MAAM,IAAI,KAAK,CAAC,EAAE,KAAK,IAAI;AAAA,IACpC,CAAC;AAED,OAAG,oDAAoD,YAAY;AACjE,UAAI,IAAI,KAAK,EAAE,QAAQ,CAAC,uBAAuB,qBAAqB,EAAE,CAAC,CAAC;AACxE,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS,EAAE,QAAQ,sBAAsB;AAAA,MAC3C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAED,OAAG,sDAAsD,YAAY;AACnE,UAAI,IAAI,KAAK,EAAE,QAAQ,CAAC,qBAAqB,EAAE,CAAC,CAAC;AACjD,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS,EAAE,QAAQ,wBAAwB;AAAA,MAC7C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAED,OAAG,gDAAgD,YAAY;AAC7D,UAAI,IAAI,KAAK,EAAE,QAAQ,CAAC,qBAAqB,EAAE,CAAC,CAAC;AACjD,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS,EAAE,QAAQ,OAAO,CAAC;AACzD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAED,OAAG,mCAAmC,YAAY;AAChD,UAAI,IAAI,KAAK,EAAE,QAAQ,CAAC,EAAE,CAAC,CAAC;AAC5B,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS,EAAE,QAAQ,sBAAsB;AAAA,MAC3C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAAA,EACH,CAAC;AAED,WAAS,yBAAyB,MAAM;AACtC,OAAG,+DAA+D,YAAY;AAC5E,UAAI,IAAI,KAAK,EAAE,cAAc,CAAC,eAAe,WAAW,EAAE,CAAC,CAAC;AAC5D,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS,EAAE,kBAAkB,cAAc;AAAA,MAC7C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAC3B,aAAO,MAAM,IAAI,KAAK,CAAC,EAAE,KAAK,IAAI;AAAA,IACpC,CAAC;AAED,OAAG,kEAAkE,YAAY;AAC/E,UAAI,IAAI,KAAK,EAAE,cAAc,CAAC,eAAe,aAAa,cAAc,EAAE,CAAC,CAAC;AAC5E,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS,EAAE,kBAAkB,eAAe;AAAA,MAC9C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAED,OAAG,oEAAoE,YAAY;AACjF,UAAI,IAAI,KAAK,EAAE,cAAc,CAAC,aAAa,EAAE,CAAC,CAAC;AAC/C,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS,EAAE,kBAAkB,YAAY;AAAA,MAC3C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAED,OAAG,wDAAwD,YAAY;AACrE,UAAI,IAAI,KAAK,EAAE,cAAc,CAAC,aAAa,EAAE,CAAC,CAAC;AAC/C,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS,EAAE,QAAQ,OAAO,CAAC;AACzD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAED,OAAG,iDAAiD,YAAY;AAC9D,UAAI,IAAI,KAAK,EAAE,cAAc,CAAC,eAAe,aAAa,QAAQ,cAAc,EAAE,CAAC,CAAC;AACpF,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,cAAc,CAAC,eAAe,aAAa,QAAQ,cAAc;AAEvE,iBAAW,SAAS,aAAa;AAC/B,cAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,UACrC,QAAQ;AAAA,UACR,SAAS,EAAE,kBAAkB,MAAM;AAAA,QACrC,CAAC;AACD,eAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,MAC7B;AAAA,IACF,CAAC;AAED,OAAG,2CAA2C,YAAY;AACxD,UAAI,IAAI,KAAK,EAAE,cAAc,CAAC,EAAE,CAAC,CAAC;AAClC,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS,EAAE,kBAAkB,cAAc;AAAA,MAC7C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAAA,EACH,CAAC;AAED,WAAS,6CAA6C,MAAM;AAC1D,OAAG,kEAAkE,YAAY;AAC/E,UAAI;AAAA,QACF,KAAK;AAAA,UACH,QAAQ,CAAC,qBAAqB;AAAA,UAC9B,cAAc,CAAC,WAAW;AAAA,QAC5B,CAAC;AAAA,MACH;AACA,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAGrC,UAAI,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACnC,QAAQ;AAAA,QACR,SAAS,EAAE,QAAQ,sBAAsB;AAAA,MAC3C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAG3B,YAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QAC/B,QAAQ;AAAA,QACR,SAAS,EAAE,kBAAkB,YAAY;AAAA,MAC3C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAED,OAAG,qEAAqE,YAAY;AAClF,UAAI;AAAA,QACF,KAAK;AAAA,UACH,QAAQ,CAAC,qBAAqB;AAAA,UAC9B,cAAc,CAAC,aAAa;AAAA,QAC9B,CAAC;AAAA,MACH;AACA,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAErC,YAAM,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACrC,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,QAAQ;AAAA,UACR,kBAAkB;AAAA,QACpB;AAAA,MACF,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAED,OAAG,qEAAqE,YAAY;AAClF,UAAI;AAAA,QACF,KAAK;AAAA,UACH,QAAQ,CAAC,qBAAqB;AAAA,UAC9B,cAAc,CAAC,WAAW;AAAA,UAC1B,SAAS,CAAC,EAAE,MAAM,cAAc,SAAS,CAAC,MAAM,EAAE,CAAC;AAAA,QACrD,CAAC;AAAA,MACH;AAEA,UAAI,KAAK,SAAS,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AACrC,UAAI,KAAK,mBAAmB,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAC/C,UAAI,KAAK,aAAa,CAAC,MAAM,EAAE,KAAK,IAAI,CAAC;AAGzC,UAAI,MAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QACnC,QAAQ;AAAA,QACR,SAAS,EAAE,QAAQ,sBAAsB;AAAA,MAC3C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAG3B,YAAM,MAAM,IAAI,QAAQ,SAAS;AAAA,QAC/B,QAAQ;AAAA,QACR,SAAS,EAAE,kBAAkB,YAAY;AAAA,MAC3C,CAAC;AACD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAG3B,YAAM,MAAM,IAAI,QAAQ,mBAAmB,EAAE,QAAQ,OAAO,CAAC;AAC7D,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAG3B,YAAM,MAAM,IAAI,QAAQ,aAAa,EAAE,QAAQ,OAAO,CAAC;AACvD,aAAO,IAAI,MAAM,EAAE,KAAK,GAAG;AAAA,IAC7B,CAAC;AAAA,EACH,CAAC;AACH,CAAC;","names":[]}