@stackframe/react 2.8.62 → 2.8.63
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/esm/lib/stack-app/apps/implementations/admin-app-impl.js +20 -6
- package/dist/esm/lib/stack-app/apps/implementations/admin-app-impl.js.map +1 -1
- package/dist/esm/lib/stack-app/apps/implementations/client-app-impl.js +1 -1
- package/dist/esm/lib/stack-app/apps/implementations/client-app-impl.js.map +1 -1
- package/dist/esm/lib/stack-app/apps/implementations/common.js +1 -1
- package/dist/esm/lib/stack-app/apps/implementations/common.js.map +1 -1
- package/dist/esm/lib/stack-app/apps/implementations/server-app-impl.js +1 -1
- package/dist/esm/lib/stack-app/apps/implementations/server-app-impl.js.map +1 -1
- package/dist/esm/lib/stack-app/apps/interfaces/admin-app.js.map +1 -1
- package/dist/esm/lib/stack-app/projects/index.js +2 -1
- package/dist/esm/lib/stack-app/projects/index.js.map +1 -1
- package/dist/index.d.mts +9 -0
- package/dist/index.d.ts +9 -0
- package/dist/lib/stack-app/apps/implementations/admin-app-impl.js +20 -6
- package/dist/lib/stack-app/apps/implementations/admin-app-impl.js.map +1 -1
- package/dist/lib/stack-app/apps/implementations/client-app-impl.js +1 -1
- package/dist/lib/stack-app/apps/implementations/client-app-impl.js.map +1 -1
- package/dist/lib/stack-app/apps/implementations/common.js +1 -1
- package/dist/lib/stack-app/apps/implementations/common.js.map +1 -1
- package/dist/lib/stack-app/apps/implementations/server-app-impl.js +1 -1
- package/dist/lib/stack-app/apps/implementations/server-app-impl.js.map +1 -1
- package/dist/lib/stack-app/apps/interfaces/admin-app.js.map +1 -1
- package/dist/lib/stack-app/project-configs/index.js.map +1 -1
- package/dist/lib/stack-app/projects/index.js +2 -1
- package/dist/lib/stack-app/projects/index.js.map +1 -1
- package/package.json +3 -3
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../../../../src/lib/stack-app/apps/implementations/client-app-impl.ts"],"sourcesContent":["\n//===========================================\n// THIS FILE IS AUTO-GENERATED FROM TEMPLATE. DO NOT EDIT IT DIRECTLY, INSTEAD EDIT THE CORRESPONDING FILE IN packages/template\n//===========================================\nimport { WebAuthnError, startAuthentication, startRegistration } from \"@simplewebauthn/browser\";\nimport { KnownErrors, StackClientInterface } from \"@stackframe/stack-shared\";\nimport { ContactChannelsCrud } from \"@stackframe/stack-shared/dist/interface/crud/contact-channels\";\nimport { CurrentUserCrud } from \"@stackframe/stack-shared/dist/interface/crud/current-user\";\nimport type { CustomerInvoicesListResponse } from \"@stackframe/stack-shared/dist/interface/crud/invoices\";\nimport { ItemCrud } from \"@stackframe/stack-shared/dist/interface/crud/items\";\nimport { NotificationPreferenceCrud } from \"@stackframe/stack-shared/dist/interface/crud/notification-preferences\";\nimport { OAuthProviderCrud } from \"@stackframe/stack-shared/dist/interface/crud/oauth-providers\";\nimport type { CustomerProductsListResponse } from \"@stackframe/stack-shared/dist/interface/crud/products\";\nimport { TeamApiKeysCrud, UserApiKeysCrud, teamApiKeysCreateOutputSchema, userApiKeysCreateOutputSchema } from \"@stackframe/stack-shared/dist/interface/crud/project-api-keys\";\nimport { ProjectPermissionsCrud } from \"@stackframe/stack-shared/dist/interface/crud/project-permissions\";\nimport { ClientProjectsCrud } from \"@stackframe/stack-shared/dist/interface/crud/projects\";\nimport { SessionsCrud } from \"@stackframe/stack-shared/dist/interface/crud/sessions\";\nimport { TeamInvitationCrud } from \"@stackframe/stack-shared/dist/interface/crud/team-invitation\";\nimport { TeamMemberProfilesCrud } from \"@stackframe/stack-shared/dist/interface/crud/team-member-profiles\";\nimport { TeamPermissionsCrud } from \"@stackframe/stack-shared/dist/interface/crud/team-permissions\";\nimport { TeamsCrud } from \"@stackframe/stack-shared/dist/interface/crud/teams\";\nimport { UsersCrud } from \"@stackframe/stack-shared/dist/interface/crud/users\";\nimport { InternalSession } from \"@stackframe/stack-shared/dist/sessions\";\nimport { encodeBase32 } from \"@stackframe/stack-shared/dist/utils/bytes\";\nimport { scrambleDuringCompileTime } from \"@stackframe/stack-shared/dist/utils/compile-time\";\nimport { isBrowserLike } from \"@stackframe/stack-shared/dist/utils/env\";\nimport { StackAssertionError, captureError, throwErr } from \"@stackframe/stack-shared/dist/utils/errors\";\nimport { parseJson } from \"@stackframe/stack-shared/dist/utils/json\";\nimport { DependenciesMap } from \"@stackframe/stack-shared/dist/utils/maps\";\nimport { ProviderType } from \"@stackframe/stack-shared/dist/utils/oauth\";\nimport { deepPlainEquals, omit } from \"@stackframe/stack-shared/dist/utils/objects\";\nimport { neverResolve, runAsynchronously, wait } from \"@stackframe/stack-shared/dist/utils/promises\";\nimport { suspend, suspendIfSsr, use } from \"@stackframe/stack-shared/dist/utils/react\";\nimport { Result } from \"@stackframe/stack-shared/dist/utils/results\";\nimport { Store, storeLock } from \"@stackframe/stack-shared/dist/utils/stores\";\nimport { deindent, mergeScopeStrings } from \"@stackframe/stack-shared/dist/utils/strings\";\nimport { getRelativePart, isRelative } from \"@stackframe/stack-shared/dist/utils/urls\";\nimport { generateUuid } from \"@stackframe/stack-shared/dist/utils/uuids\";\nimport * as cookie from \"cookie\";\nimport React, { useCallback, useMemo } from \"react\"; // THIS_LINE_PLATFORM react-like\nimport type * as yup from \"yup\";\nimport { constructRedirectUrl } from \"../../../../utils/url\";\nimport { addNewOAuthProviderOrScope, callOAuthCallback, signInWithOAuth } from \"../../../auth\";\nimport { CookieHelper, createBrowserCookieHelper, createCookieHelper, createPlaceholderCookieHelper, deleteCookie, deleteCookieClient, isSecure as isSecureCookieContext, setOrDeleteCookie, setOrDeleteCookieClient } from \"../../../cookie\";\nimport { ApiKey, ApiKeyCreationOptions, ApiKeyUpdateOptions, apiKeyCreationOptionsToCrud } from \"../../api-keys\";\nimport { ConvexCtx, GetCurrentPartialUserOptions, GetCurrentUserOptions, HandlerUrls, OAuthScopesOnSignIn, RedirectMethod, RedirectToOptions, RequestLike, TokenStoreInit, stackAppInternalsSymbol } from \"../../common\";\nimport { OAuthConnection } from \"../../connected-accounts\";\nimport { ContactChannel, ContactChannelCreateOptions, ContactChannelUpdateOptions, contactChannelCreateOptionsToCrud, contactChannelUpdateOptionsToCrud } from \"../../contact-channels\";\nimport { Customer, CustomerBilling, CustomerDefaultPaymentMethod, CustomerInvoiceStatus, CustomerInvoicesList, CustomerInvoicesListOptions, CustomerInvoicesRequestOptions, CustomerPaymentMethodSetupIntent, CustomerProductsList, CustomerProductsListOptions, CustomerProductsRequestOptions, Item } from \"../../customers\";\nimport { NotificationCategory } from \"../../notification-categories\";\nimport { TeamPermission } from \"../../permissions\";\nimport { AdminOwnedProject, AdminProjectUpdateOptions, Project, adminProjectCreateOptionsToCrud } from \"../../projects\";\nimport { EditableTeamMemberProfile, Team, TeamCreateOptions, TeamInvitation, TeamUpdateOptions, TeamUser, teamCreateOptionsToCrud, teamUpdateOptionsToCrud } from \"../../teams\";\nimport { ActiveSession, Auth, BaseUser, CurrentUser, InternalUserExtra, OAuthProvider, ProjectCurrentUser, SyncedPartialUser, TokenPartialUser, UserExtra, UserUpdateOptions, userUpdateOptionsToCrud, withUserDestructureGuard } from \"../../users\";\nimport { StackClientApp, StackClientAppConstructorOptions, StackClientAppJson } from \"../interfaces/client-app\";\nimport { _StackAdminAppImplIncomplete } from \"./admin-app-impl\";\nimport { TokenObject, clientVersion, createCache, createCacheBySession, createEmptyTokenStore, getBaseUrl, getDefaultExtraRequestHeaders, getDefaultProjectId, getDefaultPublishableClientKey, getUrls, resolveConstructorOptions } from \"./common\";\n\nimport { useAsyncCache } from \"./common\";\n\nlet isReactServer = false;\n\n// hack to make sure process is defined in non-node environments\nconst process = (globalThis as any).process ?? { env: {} }; // THIS_LINE_PLATFORM js react\n\n\nconst allClientApps = new Map<string, [checkString: string | undefined, app: StackClientApp<any, any>]>();\n\ntype StackClientAppImplConstructorOptionsResolved<HasTokenStore extends boolean, ProjectId extends string> = StackClientAppConstructorOptions<HasTokenStore, ProjectId> & { inheritsFrom?: undefined };\n\nexport class _StackClientAppImplIncomplete<HasTokenStore extends boolean, ProjectId extends string = string> implements StackClientApp<HasTokenStore, ProjectId> {\n /**\n * There is a circular dependency between the admin app and the client app, as the former inherits from the latter and\n * the latter needs to use the former when creating a new instance of an internal project.\n *\n * To break it, we set the admin app here lazily instead of importing it directly. This variable is set by ./index.ts,\n * which imports both this file and ./admin-app-impl.ts.\n */\n static readonly LazyStackAdminAppImpl: { value: typeof import(\"./admin-app-impl\")._StackAdminAppImplIncomplete | undefined } = { value: undefined };\n\n protected readonly _options: StackClientAppImplConstructorOptionsResolved<HasTokenStore, ProjectId>;\n protected readonly _extraOptions: { uniqueIdentifier?: string, checkString?: string, interface?: StackClientInterface } | undefined;\n protected _uniqueIdentifier: string | undefined = undefined;\n protected _interface: StackClientInterface;\n protected readonly _tokenStoreInit: TokenStoreInit<HasTokenStore>;\n protected readonly _redirectMethod: RedirectMethod | undefined;\n protected readonly _urlOptions: Partial<HandlerUrls>;\n protected readonly _oauthScopesOnSignIn: Partial<OAuthScopesOnSignIn>;\n\n private __DEMO_ENABLE_SLIGHT_FETCH_DELAY = false;\n private readonly _ownedAdminApps = new DependenciesMap<[InternalSession, string], _StackAdminAppImplIncomplete<false, string>>();\n\n private readonly _currentUserCache = createCacheBySession(async (session) => {\n if (this.__DEMO_ENABLE_SLIGHT_FETCH_DELAY) {\n await wait(2000);\n }\n if (session.isKnownToBeInvalid()) {\n // let's save ourselves a network request\n //\n // this also makes a certain race condition less likely to happen. particularly, it's quite common for code to\n // look like this:\n //\n // const user = await useUser({ or: \"required\" });\n // const something = user.useSomething();\n //\n // now, let's say the session is invalidated. this will trigger a refresh to refresh both the user and the\n // something. however, it's not guaranteed that the user will return first, so useUser might still return a\n // user object while the something request has already completed (and failed, because the session is invalid).\n // by returning null quickly here without a request, it is very very likely for the user request to complete\n // first.\n //\n // TODO HACK: the above is a bit of a hack, and we should probably think of more consistent ways to handle this.\n // it also only works for the user endpoint, and only if the session is known to be invalid.\n return null;\n }\n return await this._interface.getClientUserByToken(session);\n });\n private readonly _currentProjectCache = createCache(async () => {\n return Result.orThrow(await this._interface.getClientProject());\n });\n private readonly _ownedProjectsCache = createCacheBySession(async (session) => {\n return await this._interface.listProjects(session);\n });\n private readonly _currentUserPermissionsCache = createCacheBySession<\n [string, boolean],\n TeamPermissionsCrud['Client']['Read'][]\n >(async (session, [teamId, recursive]) => {\n return await this._interface.listCurrentUserTeamPermissions({ teamId, recursive }, session);\n });\n private readonly _currentUserProjectPermissionsCache = createCacheBySession<\n [boolean],\n ProjectPermissionsCrud['Client']['Read'][]\n >(async (session, [recursive]) => {\n return await this._interface.listCurrentUserProjectPermissions({ recursive }, session);\n });\n private readonly _currentUserTeamsCache = createCacheBySession(async (session) => {\n return await this._interface.listCurrentUserTeams(session);\n });\n private readonly _currentUserOAuthConnectionAccessTokensCache = createCacheBySession<[string, string], { accessToken: string } | null>(\n async (session, [providerId, scope]) => {\n try {\n const result = await this._interface.createProviderAccessToken(providerId, scope || \"\", session);\n return { accessToken: result.access_token };\n } catch (err) {\n if (!(KnownErrors.OAuthConnectionDoesNotHaveRequiredScope.isInstance(err) || KnownErrors.OAuthConnectionNotConnectedToUser.isInstance(err))) {\n throw err;\n }\n }\n return null;\n }\n );\n private readonly _currentUserOAuthConnectionCache = createCacheBySession<[ProviderType, string, boolean], OAuthConnection | null>(\n async (session, [providerId, scope, redirect]) => {\n return await this._getUserOAuthConnectionCacheFn({\n getUser: async () => Result.orThrow(await this._currentUserCache.getOrWait([session], \"write-only\")),\n getOrWaitOAuthToken: async () => Result.orThrow(await this._currentUserOAuthConnectionAccessTokensCache.getOrWait([session, providerId, scope || \"\"] as const, \"write-only\")),\n useOAuthToken: () => useAsyncCache(this._currentUserOAuthConnectionAccessTokensCache, [session, providerId, scope || \"\"] as const, \"connection.useAccessToken()\"),\n providerId,\n scope,\n redirect,\n session,\n });\n }\n );\n private readonly _teamMemberProfilesCache = createCacheBySession<[string], TeamMemberProfilesCrud['Client']['Read'][]>(\n async (session, [teamId]) => {\n return await this._interface.listTeamMemberProfiles({ teamId }, session);\n }\n );\n private readonly _teamInvitationsCache = createCacheBySession<[string], TeamInvitationCrud['Client']['Read'][]>(\n async (session, [teamId]) => {\n return await this._interface.listTeamInvitations({ teamId }, session);\n }\n );\n private readonly _currentUserTeamProfileCache = createCacheBySession<[string], TeamMemberProfilesCrud['Client']['Read']>(\n async (session, [teamId]) => {\n return await this._interface.getTeamMemberProfile({ teamId, userId: 'me' }, session);\n }\n );\n private readonly _clientContactChannelsCache = createCacheBySession<[], ContactChannelsCrud['Client']['Read'][]>(\n async (session) => {\n return await this._interface.listClientContactChannels(session);\n }\n );\n\n private readonly _userApiKeysCache = createCacheBySession<[], UserApiKeysCrud['Client']['Read'][]>(\n async (session) => {\n const results = await this._interface.listProjectApiKeys({ user_id: 'me' }, session, \"client\");\n return results as UserApiKeysCrud['Client']['Read'][];\n }\n );\n\n private readonly _teamApiKeysCache = createCacheBySession<[string], TeamApiKeysCrud['Client']['Read'][]>(\n async (session, [teamId]) => {\n const results = await this._interface.listProjectApiKeys({ team_id: teamId }, session, \"client\");\n return results as TeamApiKeysCrud['Client']['Read'][];\n }\n );\n\n private readonly _notificationCategoriesCache = createCacheBySession<[], NotificationPreferenceCrud['Client']['Read'][]>(\n async (session) => {\n const results = await this._interface.listNotificationCategories(session);\n return results as NotificationPreferenceCrud['Client']['Read'][];\n }\n );\n\n private readonly _currentUserOAuthProvidersCache = createCacheBySession<[], OAuthProviderCrud['Client']['Read'][]>(\n async (session) => {\n return await this._interface.listOAuthProviders({ user_id: 'me' }, session);\n }\n );\n\n private readonly _userItemCache = createCacheBySession<[string, string], ItemCrud['Client']['Read']>(\n async (session, [userId, itemId]) => {\n return await this._interface.getItem({ userId, itemId }, session);\n }\n );\n\n private readonly _teamItemCache = createCacheBySession<[string, string], ItemCrud['Client']['Read']>(\n async (session, [teamId, itemId]) => {\n return await this._interface.getItem({ teamId, itemId }, session);\n }\n );\n\n private readonly _customItemCache = createCacheBySession<[string, string], ItemCrud['Client']['Read']>(\n async (session, [customCustomerId, itemId]) => {\n return await this._interface.getItem({ customCustomerId, itemId }, session);\n }\n );\n\n private readonly _userProductsCache = createCacheBySession<[string, string | null, number | null], CustomerProductsListResponse>(\n async (session, [userId, cursor, limit]) => {\n return await this._interface.listProducts({\n customer_type: \"user\",\n customer_id: userId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _teamProductsCache = createCacheBySession<[string, string | null, number | null], CustomerProductsListResponse>(\n async (session, [teamId, cursor, limit]) => {\n return await this._interface.listProducts({\n customer_type: \"team\",\n customer_id: teamId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _customProductsCache = createCacheBySession<[string, string | null, number | null], CustomerProductsListResponse>(\n async (session, [customCustomerId, cursor, limit]) => {\n return await this._interface.listProducts({\n customer_type: \"custom\",\n customer_id: customCustomerId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _userInvoicesCache = createCacheBySession<[string, string | null, number | null], CustomerInvoicesListResponse>(\n async (session, [userId, cursor, limit]) => {\n return await this._interface.listInvoices({\n customer_type: \"user\",\n customer_id: userId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _teamInvoicesCache = createCacheBySession<[string, string | null, number | null], CustomerInvoicesListResponse>(\n async (session, [teamId, cursor, limit]) => {\n return await this._interface.listInvoices({\n customer_type: \"team\",\n customer_id: teamId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _customerBillingCache = createCacheBySession<[\"user\" | \"team\", string], {\n has_customer: boolean,\n default_payment_method: {\n id: string,\n brand: string | null,\n last4: string | null,\n exp_month: number | null,\n exp_year: number | null,\n } | null,\n }>(\n async (session, [customerType, customerId]) => {\n return await this._interface.getCustomerBilling(customerType, customerId, session);\n }\n );\n\n private readonly _convexPartialUserCache = createCache<[unknown], TokenPartialUser | null>(\n async ([ctx]) => await this._getPartialUserFromConvex(ctx as any)\n );\n\n private readonly _trustedParentDomainCache = createCache<[string], string | null>(\n async ([domain]) => await this._getTrustedParentDomain(domain)\n );\n\n private _anonymousSignUpInProgress: Promise<{ accessToken: string, refreshToken: string }> | null = null;\n\n protected async _createCookieHelper(): Promise<CookieHelper> {\n if (this._tokenStoreInit === 'nextjs-cookie' || this._tokenStoreInit === 'cookie') {\n return await createCookieHelper();\n } else {\n return await createPlaceholderCookieHelper();\n }\n }\n\n protected async _getUserOAuthConnectionCacheFn(options: {\n getUser: () => Promise<CurrentUserCrud['Client']['Read'] | null>,\n getOrWaitOAuthToken: () => Promise<{ accessToken: string } | null>,\n useOAuthToken: () => { accessToken: string } | null,\n providerId: ProviderType,\n scope: string | null,\n } & ({ redirect: true, session: InternalSession | null } | { redirect: false }),) {\n const user = await options.getUser();\n let hasConnection = true;\n if (!user || !user.oauth_providers.find((p) => p.id === options.providerId)) {\n hasConnection = false;\n }\n\n const token = await options.getOrWaitOAuthToken();\n if (!token) {\n hasConnection = false;\n }\n\n if (!hasConnection && options.redirect) {\n if (!options.session) {\n throw new Error(deindent`\n Cannot add new scopes to a user that is not a CurrentUser. Please ensure that you are calling this function on a CurrentUser object, or remove the 'or: redirect' option.\n\n Often, you can solve this by calling this function in the browser instead, or by removing the 'or: redirect' option and dealing with the case where the user doesn't have enough permissions.\n `);\n }\n await addNewOAuthProviderOrScope(\n this._interface,\n {\n provider: options.providerId,\n redirectUrl: this.urls.oauthCallback,\n errorRedirectUrl: this.urls.error,\n providerScope: mergeScopeStrings(options.scope || \"\", (this._oauthScopesOnSignIn[options.providerId] ?? []).join(\" \")),\n },\n options.session,\n );\n return await neverResolve();\n } else if (!hasConnection) {\n return null;\n }\n\n return {\n id: options.providerId,\n async getAccessToken() {\n const result = await options.getOrWaitOAuthToken();\n if (!result) {\n throw new StackAssertionError(\"No access token available\");\n }\n return result;\n },\n useAccessToken() {\n const result = options.useOAuthToken();\n if (!result) {\n throw new StackAssertionError(\"No access token available\");\n }\n return result;\n }\n };\n }\n\n constructor(options: StackClientAppConstructorOptions<HasTokenStore, ProjectId>, extraOptions?: { uniqueIdentifier?: string, checkString?: string, interface?: StackClientInterface }) {\n const resolvedOptions = resolveConstructorOptions(options);\n\n if (!_StackClientAppImplIncomplete.LazyStackAdminAppImpl.value) {\n throw new StackAssertionError(\"Admin app implementation not initialized. Did you import the _StackClientApp from stack-app/apps/implementations/index.ts? You can't import it directly from ./apps/implementations/client-app-impl.ts as that causes a circular dependency (see the comment at _LazyStackAdminAppImpl for more details).\");\n }\n\n this._options = resolvedOptions;\n this._extraOptions = extraOptions;\n\n const projectId = resolvedOptions.projectId ?? getDefaultProjectId();\n if (projectId !== \"internal\" && !(projectId.match(/^[0-9a-f]{8}-[0-9a-f]{4}-[1-8][0-9a-f]{3}-[089ab][0-9a-f]{3}-[0-9a-f]{12}$/i))) {\n throw new Error(`Invalid project ID: ${projectId}. Project IDs must be UUIDs. Please check your environment variables and/or your StackApp.`);\n }\n\n if (extraOptions && extraOptions.interface) {\n this._interface = extraOptions.interface;\n } else {\n this._interface = new StackClientInterface({\n getBaseUrl: () => getBaseUrl(resolvedOptions.baseUrl),\n extraRequestHeaders: resolvedOptions.extraRequestHeaders ?? getDefaultExtraRequestHeaders(),\n projectId,\n clientVersion,\n publishableClientKey: resolvedOptions.publishableClientKey ?? getDefaultPublishableClientKey(),\n prepareRequest: async () => {\n }\n });\n }\n\n this._tokenStoreInit = resolvedOptions.tokenStore;\n this._redirectMethod = resolvedOptions.redirectMethod || \"none\";\n this._urlOptions = resolvedOptions.urls ?? {};\n this._oauthScopesOnSignIn = resolvedOptions.oauthScopesOnSignIn ?? {};\n\n if (extraOptions && extraOptions.uniqueIdentifier) {\n this._uniqueIdentifier = extraOptions.uniqueIdentifier;\n this._initUniqueIdentifier();\n }\n }\n\n protected _initUniqueIdentifier() {\n if (!this._uniqueIdentifier) {\n throw new StackAssertionError(\"Unique identifier not initialized\");\n }\n if (allClientApps.has(this._uniqueIdentifier)) {\n throw new StackAssertionError(\"A Stack client app with the same unique identifier already exists\");\n }\n allClientApps.set(this._uniqueIdentifier, [this._extraOptions?.checkString ?? undefined, this]);\n }\n\n /**\n * Cloudflare workers does not allow use of randomness on the global scope (on which the Stack app is probably\n * initialized). For that reason, we generate the unique identifier lazily when it is first needed instead of in the\n * constructor.\n */\n protected _getUniqueIdentifier() {\n if (!this._uniqueIdentifier) {\n this._uniqueIdentifier = generateUuid();\n this._initUniqueIdentifier();\n }\n return this._uniqueIdentifier!;\n }\n\n protected async _checkFeatureSupport(name: string, options: any) {\n return await this._interface.checkFeatureSupport({ ...options, name });\n }\n\n protected _useCheckFeatureSupport(name: string, options: any): never {\n runAsynchronously(this._checkFeatureSupport(name, options));\n throw new StackAssertionError(`${name} is not currently supported. Please reach out to Stack support for more information.`);\n }\n\n protected _memoryTokenStore = createEmptyTokenStore();\n protected _nextServerCookiesTokenStores = new WeakMap<object, Store<TokenObject>>();\n protected _requestTokenStores = new WeakMap<RequestLike, Store<TokenObject>>();\n protected _storedBrowserCookieTokenStore: Store<TokenObject> | null = null;\n private _mostRecentQueuedCookieRefreshIndex: number = 0;\n protected get _legacyRefreshTokenCookieName() {\n return `stack-refresh-${this.projectId}`;\n }\n protected get _refreshTokenCookieName() {\n return `stack-refresh-${this.projectId}`;\n }\n private _getRefreshTokenDefaultCookieNameForSecure(secure: boolean): string {\n return `${secure ? \"__Host-\" : \"\"}${this._refreshTokenCookieName}--default`;\n }\n private _getCustomRefreshCookieName(domain: string): string {\n const encoded = encodeBase32(new TextEncoder().encode(domain.toLowerCase()));\n return `${this._refreshTokenCookieName}--custom-${encoded}`;\n }\n private _formatRefreshCookieValue(refreshToken: string, updatedAt: number): string {\n return JSON.stringify({\n refresh_token: refreshToken,\n updated_at_millis: updatedAt,\n });\n }\n private _formatAccessCookieValue(refreshToken: string | null, accessToken: string | null): string | null {\n return refreshToken && accessToken ? JSON.stringify([refreshToken, accessToken]) : null;\n }\n private _parseStructuredRefreshCookie(value: string | undefined): { refreshToken: string, updatedAt: number | null } | null {\n if (!value) {\n return null;\n }\n const parsed = parseJson(value);\n if (parsed.status !== \"ok\" || typeof parsed.data !== \"object\" || parsed.data === null) {\n console.warn(\"Failed to parse structured refresh cookie\");\n return null;\n }\n const data = parsed.data;\n const refreshToken = \"refresh_token\" in data && typeof data.refresh_token === \"string\" ? data.refresh_token : null;\n const updatedAt = \"updated_at_millis\" in data && typeof data.updated_at_millis === \"number\" ? data.updated_at_millis : null;\n if (!refreshToken) {\n console.warn(\"Refresh token not found in structured refresh cookie\");\n return null;\n }\n return {\n refreshToken,\n updatedAt,\n };\n\n }\n private _extractRefreshTokenFromCookieMap(cookies: cookie.Cookies): { refreshToken: string | null, updatedAt: number | null } {\n const { legacyNames, structuredPrefixes } = this._getRefreshTokenCookieNamePatterns();\n for (const name of legacyNames) {\n const value = cookies[name];\n if (value) {\n return { refreshToken: value, updatedAt: null };\n }\n }\n\n let selected: { refreshToken: string, updatedAt: number | null } | null = null;\n for (const [name, value] of Object.entries(cookies)) {\n if (!structuredPrefixes.some(prefix => name.startsWith(prefix))) continue;\n const parsed = this._parseStructuredRefreshCookie(value);\n if (!parsed) continue;\n const candidateUpdatedAt = parsed.updatedAt ?? Number.NEGATIVE_INFINITY;\n const selectedUpdatedAt = selected?.updatedAt ?? Number.NEGATIVE_INFINITY;\n if (!selected || candidateUpdatedAt > selectedUpdatedAt) {\n selected = parsed;\n }\n }\n\n if (!selected) {\n return { refreshToken: null, updatedAt: null };\n }\n\n return {\n refreshToken: selected.refreshToken,\n updatedAt: selected.updatedAt ?? null,\n };\n }\n protected _getTokensFromCookies(cookies: cookie.Cookies): TokenObject {\n const { refreshToken } = this._extractRefreshTokenFromCookieMap(cookies);\n const accessTokenCookie = cookies[this._accessTokenCookieName] ?? null;\n let accessToken: string | null = null;\n if (accessTokenCookie && accessTokenCookie.startsWith('[\\\"')) {\n const parsed = parseJson(accessTokenCookie);\n if (\n parsed.status === \"ok\" &&\n typeof parsed.data === \"object\" &&\n parsed.data !== null &&\n Array.isArray(parsed.data) &&\n parsed.data.length === 2 &&\n typeof parsed.data[0] === \"string\" &&\n typeof parsed.data[1] === \"string\"\n ) {\n if (parsed.data[0] === refreshToken) {\n accessToken = parsed.data[1];\n }\n } else {\n console.warn(\"Access token cookie has invalid format\");\n }\n }\n return {\n refreshToken,\n accessToken,\n };\n }\n protected get _accessTokenCookieName() {\n // The access token, unlike the refresh token, should not depend on the project ID. We never want to store the\n // access token in cookies more than once because of how big it is (there's a limit of 4096 bytes for all cookies\n // together). This means that, if you have multiple projects on the same domain, some of them will need to refetch\n // the access token on page reload.\n return `stack-access`;\n }\n private _getAllBrowserCookies(): cookie.Cookies {\n if (!isBrowserLike()) {\n throw new StackAssertionError(\"Cannot get browser cookies on the server!\");\n }\n return cookie.parseCookie(document.cookie || \"\");\n }\n private _getRefreshTokenCookieNamePatterns(): { legacyNames: string[], structuredPrefixes: string[] } {\n return {\n legacyNames: [this._legacyRefreshTokenCookieName, \"stack-refresh\"],\n structuredPrefixes: [\n `${this._refreshTokenCookieName}--`,\n `__Host-${this._refreshTokenCookieName}--`,\n ],\n };\n }\n private _collectRefreshTokenCookieNames(cookies: cookie.Cookies): Set<string> {\n const { legacyNames, structuredPrefixes } = this._getRefreshTokenCookieNamePatterns();\n const names = new Set<string>();\n for (const name of legacyNames) {\n if (cookies[name]) {\n names.add(name);\n }\n }\n for (const name of Object.keys(cookies)) {\n if (structuredPrefixes.some(prefix => name.startsWith(prefix))) {\n names.add(name);\n }\n }\n return names;\n }\n private _prepareRefreshCookieUpdate(\n existingCookies: cookie.Cookies,\n refreshToken: string | null,\n accessToken: string | null,\n defaultCookieName: string,\n ) {\n const cookieNames = this._collectRefreshTokenCookieNames(existingCookies);\n cookieNames.delete(defaultCookieName);\n const updatedAt = refreshToken ? Date.now() : null;\n const refreshCookieValue = refreshToken && updatedAt !== null ? this._formatRefreshCookieValue(refreshToken, updatedAt) : null;\n const accessTokenPayload = this._formatAccessCookieValue(refreshToken, accessToken);\n return {\n updatedAt,\n refreshCookieValue,\n accessTokenPayload,\n cookieNamesToDelete: [...cookieNames],\n };\n }\n private _queueCustomRefreshCookieUpdate(refreshToken: string | null, updatedAt: number | null, context: \"browser\" | \"server\") {\n runAsynchronously(async () => {\n this._mostRecentQueuedCookieRefreshIndex++;\n const updateIndex = this._mostRecentQueuedCookieRefreshIndex;\n let hostname;\n if (isBrowserLike()) {\n hostname = window.location.hostname;\n }\n if (!hostname) {\n console.warn(\"No hostname found when queueing custom refresh cookie update\");\n return;\n }\n const domain = await this._trustedParentDomainCache.getOrWait([hostname], \"read-write\");\n\n const cookieOptions = { maxAge: 60 * 60 * 24 * 365, noOpIfServerComponent: true };\n const setCookie = async (targetDomain: string, value: string | null) => {\n const name = this._getCustomRefreshCookieName(targetDomain);\n const options = { ...cookieOptions, domain: targetDomain };\n if (context === \"browser\") {\n setOrDeleteCookieClient(name, value, options);\n } else {\n await setOrDeleteCookie(name, value, options);\n }\n };\n\n if (domain.status === \"error\" || !domain.data || updateIndex !== this._mostRecentQueuedCookieRefreshIndex) {\n return;\n }\n const value = refreshToken && updatedAt ? this._formatRefreshCookieValue(refreshToken, updatedAt) : null;\n await setCookie(domain.data, value);\n const isSecure = await isSecureCookieContext();\n await setOrDeleteCookie(this._getRefreshTokenDefaultCookieNameForSecure(isSecure), null, cookieOptions);\n });\n }\n private async _getTrustedParentDomain(currentDomain: string): Promise<string | null> {\n const project = Result.orThrow(await this._interface.getClientProject());\n const domains = project.config.domains.map(d => d.domain.trim().replace(/^https?:\\/\\//, \"\").split(\"/\")[0]?.toLowerCase());\n const trustedWildcards = domains.filter(d => d.startsWith(\"**.\"));\n const parts = currentDomain.split('.');\n for (let i = parts.length - 2; i >= 0; i--) {\n const parentDomain = parts.slice(i).join('.');\n if (domains.includes(parentDomain) && trustedWildcards.includes(\"**.\" + parentDomain)) {\n return parentDomain;\n }\n }\n\n return null;\n }\n\n protected _getBrowserCookieTokenStore(): Store<TokenObject> {\n if (!isBrowserLike()) {\n throw new Error(\"Cannot use cookie token store on the server!\");\n }\n\n if (this._storedBrowserCookieTokenStore === null) {\n const getCurrentValue = (old: TokenObject | null) => {\n const tokens = this._getTokensFromCookies(this._getAllBrowserCookies());\n return {\n refreshToken: tokens.refreshToken,\n accessToken: tokens.accessToken ?? (old?.refreshToken === tokens.refreshToken ? old.accessToken : null),\n };\n };\n this._storedBrowserCookieTokenStore = new Store<TokenObject>(getCurrentValue(null));\n let hasSucceededInWriting = true;\n\n setInterval(() => {\n if (hasSucceededInWriting) {\n const oldValue = this._storedBrowserCookieTokenStore!.get();\n const currentValue = getCurrentValue(oldValue);\n if (!deepPlainEquals(currentValue, oldValue)) {\n this._storedBrowserCookieTokenStore!.set(currentValue);\n }\n }\n }, 100);\n this._storedBrowserCookieTokenStore.onChange((value) => {\n try {\n const refreshToken = value.refreshToken;\n const secure = window.location.protocol === \"https:\";\n const defaultName = this._getRefreshTokenDefaultCookieNameForSecure(secure);\n const { updatedAt, refreshCookieValue, accessTokenPayload, cookieNamesToDelete } = this._prepareRefreshCookieUpdate(\n this._getAllBrowserCookies(),\n refreshToken,\n value.accessToken ?? null,\n defaultName,\n );\n setOrDeleteCookieClient(defaultName, refreshCookieValue, { maxAge: 60 * 60 * 24 * 365, secure });\n setOrDeleteCookieClient(this._accessTokenCookieName, accessTokenPayload, { maxAge: 60 * 60 * 24 });\n cookieNamesToDelete.forEach((name) => deleteCookieClient(name, {}));\n this._queueCustomRefreshCookieUpdate(refreshToken, updatedAt, \"browser\");\n hasSucceededInWriting = true;\n } catch (e) {\n if (!isBrowserLike()) {\n // Setting cookies inside RSCs is not allowed, so we just ignore it\n hasSucceededInWriting = false;\n } else {\n throw e;\n }\n }\n });\n }\n\n return this._storedBrowserCookieTokenStore;\n };\n protected _getOrCreateTokenStore(cookieHelper: CookieHelper, overrideTokenStoreInit?: TokenStoreInit): Store<TokenObject> {\n const tokenStoreInit = overrideTokenStoreInit === undefined ? this._tokenStoreInit : overrideTokenStoreInit;\n\n switch (tokenStoreInit) {\n case \"cookie\": {\n return this._getBrowserCookieTokenStore();\n }\n case \"nextjs-cookie\": {\n if (isBrowserLike()) {\n return this._getBrowserCookieTokenStore();\n } else {\n const tokens = this._getTokensFromCookies(cookieHelper.getAll());\n const store = new Store<TokenObject>(tokens);\n store.onChange((value) => {\n runAsynchronously(async () => {\n // TODO HACK this is a bit of a hack; while the order happens to work in practice (because the only actual\n // async operation is waiting for the `cookies()` to resolve which always happens at the same time during\n // the same request), it's not guaranteed to be free of race conditions if there are many updates happening\n // at the same time\n //\n // instead, we should create a per-request cookie helper outside of the store onChange and reuse that\n //\n // but that's kinda hard to do because Next.js doesn't expose a documented way to find out which request\n // we're currently processing, and hence we can't find out which per-request cookie helper to use\n //\n // so hack it is\n const refreshToken = value.refreshToken;\n const secure = await isSecureCookieContext();\n const defaultName = this._getRefreshTokenDefaultCookieNameForSecure(secure);\n const { updatedAt, refreshCookieValue, accessTokenPayload, cookieNamesToDelete } = this._prepareRefreshCookieUpdate(\n cookieHelper.getAll(),\n refreshToken,\n value.accessToken ?? null,\n defaultName,\n );\n await Promise.all([\n setOrDeleteCookie(defaultName, refreshCookieValue, { maxAge: 60 * 60 * 24 * 365, noOpIfServerComponent: true }),\n setOrDeleteCookie(this._accessTokenCookieName, accessTokenPayload, { maxAge: 60 * 60 * 24, noOpIfServerComponent: true }),\n ]);\n if (cookieNamesToDelete.length > 0) {\n await Promise.all(\n cookieNamesToDelete.map((name) =>\n deleteCookie(name, { noOpIfServerComponent: true }),\n ),\n );\n }\n this._queueCustomRefreshCookieUpdate(refreshToken, updatedAt, \"server\");\n });\n });\n return store;\n }\n }\n case \"memory\": {\n return this._memoryTokenStore;\n }\n default: {\n if (tokenStoreInit === null) {\n return createEmptyTokenStore();\n } else if (typeof tokenStoreInit === \"object\" && \"headers\" in tokenStoreInit) {\n if (this._requestTokenStores.has(tokenStoreInit)) return this._requestTokenStores.get(tokenStoreInit)!;\n\n // x-stack-auth header\n const stackAuthHeader = tokenStoreInit.headers.get(\"x-stack-auth\");\n if (stackAuthHeader) {\n let parsed;\n try {\n parsed = JSON.parse(stackAuthHeader);\n if (typeof parsed !== \"object\") throw new Error(\"x-stack-auth header must be a JSON object\");\n if (parsed === null) throw new Error(\"x-stack-auth header must not be null\");\n } catch (e) {\n throw new Error(`Invalid x-stack-auth header: ${stackAuthHeader}`, { cause: e });\n }\n return this._getOrCreateTokenStore(cookieHelper, {\n accessToken: parsed.accessToken ?? null,\n refreshToken: parsed.refreshToken ?? null,\n });\n }\n\n // read from cookies\n const cookieHeader = tokenStoreInit.headers.get(\"cookie\");\n const parsed = cookie.parseCookie(cookieHeader || \"\");\n const res = new Store<TokenObject>(this._getTokensFromCookies(parsed));\n this._requestTokenStores.set(tokenStoreInit, res);\n return res;\n } else if (\"accessToken\" in tokenStoreInit || \"refreshToken\" in tokenStoreInit) {\n return new Store<TokenObject>({\n refreshToken: tokenStoreInit.refreshToken,\n accessToken: tokenStoreInit.accessToken,\n });\n }\n\n throw new Error(`Invalid token store ${tokenStoreInit}`);\n }\n }\n }\n\n protected _useTokenStore(overrideTokenStoreInit?: TokenStoreInit): Store<TokenObject> {\n suspendIfSsr();\n const cookieHelper = createBrowserCookieHelper();\n const tokenStore = this._getOrCreateTokenStore(cookieHelper, overrideTokenStoreInit);\n return tokenStore;\n }\n\n /**\n * A map from token stores and session keys to sessions.\n *\n * This isn't just a map from session keys to sessions for two reasons:\n *\n * - So we can garbage-collect Session objects when the token store is garbage-collected\n * - So different token stores are separated and don't leak information between each other, eg. if the same user sends two requests to the same server they should get a different session object\n */\n private _sessionsByTokenStoreAndSessionKey = new WeakMap<Store<TokenObject>, Map<string, InternalSession>>();\n protected _getSessionFromTokenStore(tokenStore: Store<TokenObject>): InternalSession {\n const tokenObj = tokenStore.get();\n const sessionKey = InternalSession.calculateSessionKey(tokenObj);\n const existing = sessionKey ? this._sessionsByTokenStoreAndSessionKey.get(tokenStore)?.get(sessionKey) : null;\n if (existing) return existing;\n\n const session = this._interface.createSession({\n refreshToken: tokenObj.refreshToken,\n accessToken: tokenObj.accessToken,\n });\n session.onAccessTokenChange((newAccessToken) => {\n tokenStore.update((old) => ({\n ...old,\n accessToken: newAccessToken?.token ?? null\n }));\n });\n session.onInvalidate(() => {\n tokenStore.update((old) => ({\n ...old,\n accessToken: null,\n refreshToken: null,\n }));\n });\n\n let sessionsBySessionKey = this._sessionsByTokenStoreAndSessionKey.get(tokenStore) ?? new Map();\n this._sessionsByTokenStoreAndSessionKey.set(tokenStore, sessionsBySessionKey);\n sessionsBySessionKey.set(sessionKey, session);\n return session;\n }\n\n protected async _getSession(overrideTokenStoreInit?: TokenStoreInit): Promise<InternalSession> {\n const tokenStore = this._getOrCreateTokenStore(await this._createCookieHelper(), overrideTokenStoreInit);\n const session = this._getSessionFromTokenStore(tokenStore);\n return session;\n }\n\n protected _useSession(overrideTokenStoreInit?: TokenStoreInit): InternalSession {\n const tokenStore = this._useTokenStore(overrideTokenStoreInit);\n const subscribe = useCallback((cb: () => void) => {\n const { unsubscribe } = tokenStore.onChange(() => {\n cb();\n });\n return unsubscribe;\n }, [tokenStore]);\n const getSnapshot = useCallback(() => this._getSessionFromTokenStore(tokenStore), [tokenStore]);\n return React.useSyncExternalStore(subscribe, getSnapshot, getSnapshot);\n }\n\n protected async _signInToAccountWithTokens(tokens: { accessToken: string | null, refreshToken: string }) {\n if (!(\"accessToken\" in tokens) || !(\"refreshToken\" in tokens)) {\n throw new StackAssertionError(\"Invalid tokens object; can't sign in with this\", { tokens });\n }\n const tokenStore = this._getOrCreateTokenStore(await this._createCookieHelper());\n tokenStore.set(tokens);\n }\n\n protected _hasPersistentTokenStore(overrideTokenStoreInit?: TokenStoreInit): this is StackClientApp<true, ProjectId> {\n return (overrideTokenStoreInit !== undefined ? overrideTokenStoreInit : this._tokenStoreInit) !== null;\n }\n\n protected _ensurePersistentTokenStore(overrideTokenStoreInit?: TokenStoreInit): asserts this is StackClientApp<true, ProjectId> {\n if (!this._hasPersistentTokenStore(overrideTokenStoreInit)) {\n throw new Error(\"Cannot call this function on a Stack app without a persistent token store. Make sure the tokenStore option on the constructor is set to a non-null value when initializing Stack.\\n\\nStack uses token stores to access access tokens of the current user. For example, on web frontends it is commonly the string value 'cookies' for cookie storage.\");\n }\n }\n\n protected _isInternalProject(): this is { projectId: \"internal\" } {\n return this.projectId === \"internal\";\n }\n\n protected _ensureInternalProject(): asserts this is { projectId: \"internal\" } {\n if (!this._isInternalProject()) {\n throw new Error(\"Cannot call this function on a Stack app with a project ID other than 'internal'.\");\n }\n }\n\n protected _clientProjectFromCrud(crud: ClientProjectsCrud['Client']['Read']): Project {\n return {\n id: crud.id,\n displayName: crud.display_name,\n config: {\n signUpEnabled: crud.config.sign_up_enabled,\n credentialEnabled: crud.config.credential_enabled,\n magicLinkEnabled: crud.config.magic_link_enabled,\n passkeyEnabled: crud.config.passkey_enabled,\n clientTeamCreationEnabled: crud.config.client_team_creation_enabled,\n clientUserDeletionEnabled: crud.config.client_user_deletion_enabled,\n allowTeamApiKeys: crud.config.allow_team_api_keys,\n allowUserApiKeys: crud.config.allow_user_api_keys,\n oauthProviders: crud.config.enabled_oauth_providers.map((p) => ({\n id: p.id,\n })),\n }\n };\n }\n\n protected _clientPermissionFromCrud(crud: TeamPermissionsCrud['Client']['Read'] | ProjectPermissionsCrud['Client']['Read']): TeamPermission {\n return {\n id: crud.id,\n };\n }\n\n protected _clientTeamUserFromCrud(crud: TeamMemberProfilesCrud['Client']['Read']): TeamUser {\n return {\n id: crud.user_id,\n teamProfile: {\n displayName: crud.display_name,\n profileImageUrl: crud.profile_image_url,\n }\n };\n }\n\n protected _clientTeamInvitationFromCrud(session: InternalSession, crud: TeamInvitationCrud['Client']['Read']): TeamInvitation {\n return {\n id: crud.id,\n recipientEmail: crud.recipient_email,\n expiresAt: new Date(crud.expires_at_millis),\n revoke: async () => {\n await this._interface.revokeTeamInvitation(crud.id, crud.team_id, session);\n await this._teamInvitationsCache.refresh([session, crud.team_id]);\n },\n };\n }\n\n protected _baseApiKeyFromCrud(\n crud: TeamApiKeysCrud['Client']['Read'] | UserApiKeysCrud['Client']['Read'] | yup.InferType<typeof teamApiKeysCreateOutputSchema> | yup.InferType<typeof userApiKeysCreateOutputSchema>\n ): Omit<ApiKey<\"user\", boolean>, \"revoke\" | \"update\"> | Omit<ApiKey<\"team\", boolean>, \"revoke\" | \"update\"> {\n return {\n id: crud.id,\n description: crud.description,\n expiresAt: crud.expires_at_millis ? new Date(crud.expires_at_millis) : undefined,\n manuallyRevokedAt: crud.manually_revoked_at_millis ? new Date(crud.manually_revoked_at_millis) : null,\n createdAt: new Date(crud.created_at_millis),\n ...(crud.type === \"team\" ? { type: \"team\", teamId: crud.team_id } : { type: \"user\", userId: crud.user_id }),\n value: typeof crud.value === \"string\" ? crud.value : {\n lastFour: crud.value.last_four,\n },\n isValid: function () {\n return this.whyInvalid() === null;\n },\n whyInvalid: function () {\n if (this.manuallyRevokedAt) {\n return \"manually-revoked\";\n }\n if (this.expiresAt && this.expiresAt < new Date()) {\n return \"expired\";\n }\n return null;\n },\n };\n }\n\n\n protected _clientApiKeyFromCrud(session: InternalSession, crud: TeamApiKeysCrud['Client']['Read']): ApiKey<\"team\">;\n protected _clientApiKeyFromCrud(session: InternalSession, crud: UserApiKeysCrud['Client']['Read']): ApiKey<\"user\">;\n protected _clientApiKeyFromCrud(session: InternalSession, crud: yup.InferType<typeof teamApiKeysCreateOutputSchema>): ApiKey<\"team\", true>;\n protected _clientApiKeyFromCrud(session: InternalSession, crud: yup.InferType<typeof userApiKeysCreateOutputSchema>): ApiKey<\"user\", true>;\n protected _clientApiKeyFromCrud(session: InternalSession, crud: TeamApiKeysCrud['Client']['Read'] | UserApiKeysCrud['Client']['Read'] | yup.InferType<typeof teamApiKeysCreateOutputSchema> | yup.InferType<typeof userApiKeysCreateOutputSchema>): ApiKey<\"user\" | \"team\", boolean> {\n return {\n ...this._baseApiKeyFromCrud(crud),\n async revoke() {\n await this.update({ revoked: true });\n },\n update: async (options: ApiKeyUpdateOptions) => {\n await this._interface.updateProjectApiKey(crud.type === \"team\" ? { team_id: crud.team_id } : { user_id: crud.user_id }, crud.id, options, session, \"client\");\n if (crud.type === \"team\") {\n await this._teamApiKeysCache.refresh([session, crud.team_id]);\n } else {\n await this._userApiKeysCache.refresh([session]);\n }\n },\n };\n }\n\n protected _clientTeamFromCrud(crud: TeamsCrud['Client']['Read'], session: InternalSession): Team {\n const app = this;\n return {\n id: crud.id,\n displayName: crud.display_name,\n profileImageUrl: crud.profile_image_url,\n clientMetadata: crud.client_metadata,\n clientReadOnlyMetadata: crud.client_read_only_metadata,\n ...this._createCustomer(crud.id, \"team\", session),\n async inviteUser(options: { email: string, callbackUrl?: string }) {\n await app._interface.sendTeamInvitation({\n teamId: crud.id,\n email: options.email,\n session,\n callbackUrl: options.callbackUrl ?? constructRedirectUrl(app.urls.teamInvitation, \"callbackUrl\"),\n });\n await app._teamInvitationsCache.refresh([session, crud.id]);\n },\n async listUsers() {\n const result = Result.orThrow(await app._teamMemberProfilesCache.getOrWait([session, crud.id], \"write-only\"));\n return result.map((crud) => app._clientTeamUserFromCrud(crud));\n },\n useUsers() {\n const result = useAsyncCache(app._teamMemberProfilesCache, [session, crud.id] as const, \"team.useUsers()\");\n return result.map((crud) => app._clientTeamUserFromCrud(crud));\n },\n async listInvitations() {\n const result = Result.orThrow(await app._teamInvitationsCache.getOrWait([session, crud.id], \"write-only\"));\n return result.map((crud) => app._clientTeamInvitationFromCrud(session, crud));\n },\n useInvitations() {\n const result = useAsyncCache(app._teamInvitationsCache, [session, crud.id] as const, \"team.useInvitations()\");\n return result.map((crud) => app._clientTeamInvitationFromCrud(session, crud));\n },\n async update(data: TeamUpdateOptions) {\n await app._interface.updateTeam({ data: teamUpdateOptionsToCrud(data), teamId: crud.id }, session);\n await app._currentUserTeamsCache.refresh([session]);\n },\n async delete() {\n await app._interface.deleteTeam(crud.id, session);\n await app._currentUserTeamsCache.refresh([session]);\n },\n\n useApiKeys() {\n const result = useAsyncCache(app._teamApiKeysCache, [session, crud.id] as const, \"team.useApiKeys()\");\n return result.map((crud) => app._clientApiKeyFromCrud(session, crud));\n },\n\n async listApiKeys() {\n const results = Result.orThrow(await app._teamApiKeysCache.getOrWait([session, crud.id], \"write-only\"));\n return results.map((crud) => app._clientApiKeyFromCrud(session, crud));\n },\n\n async createApiKey(options: ApiKeyCreationOptions<\"team\">) {\n const result = await app._interface.createProjectApiKey(\n await apiKeyCreationOptionsToCrud(\"team\", crud.id, options),\n session,\n \"client\",\n );\n await app._teamApiKeysCache.refresh([session, crud.id]);\n return app._clientApiKeyFromCrud(session, result);\n },\n };\n }\n\n protected _clientContactChannelFromCrud(crud: ContactChannelsCrud['Client']['Read'], session: InternalSession): ContactChannel {\n const app = this;\n return {\n id: crud.id,\n value: crud.value,\n type: crud.type,\n isVerified: crud.is_verified,\n isPrimary: crud.is_primary,\n usedForAuth: crud.used_for_auth,\n\n async sendVerificationEmail(options?: { callbackUrl?: string }) {\n await app._interface.sendCurrentUserContactChannelVerificationEmail(\n crud.id,\n options?.callbackUrl || constructRedirectUrl(app.urls.emailVerification, \"callbackUrl\"),\n session\n );\n },\n async update(data: ContactChannelUpdateOptions) {\n await app._interface.updateClientContactChannel(crud.id, contactChannelUpdateOptionsToCrud(data), session);\n await app._clientContactChannelsCache.refresh([session]);\n },\n async delete() {\n await app._interface.deleteClientContactChannel(crud.id, session);\n await app._clientContactChannelsCache.refresh([session]);\n },\n };\n }\n protected _clientNotificationCategoryFromCrud(crud: NotificationPreferenceCrud['Client']['Read'], session: InternalSession): NotificationCategory {\n const app = this;\n return {\n id: crud.notification_category_id,\n name: crud.notification_category_name,\n enabled: crud.enabled,\n canDisable: crud.can_disable,\n\n async setEnabled(enabled: boolean) {\n await app._interface.setNotificationsEnabled(crud.notification_category_id, enabled, session);\n await app._notificationCategoriesCache.refresh([session]);\n },\n };\n }\n protected _clientOAuthProviderFromCrud(crud: OAuthProviderCrud['Client']['Read'], session: InternalSession): OAuthProvider {\n const app = this;\n return {\n id: crud.id,\n type: crud.type,\n userId: crud.user_id,\n email: crud.email,\n allowSignIn: crud.allow_sign_in,\n allowConnectedAccounts: crud.allow_connected_accounts,\n\n async update(data: { allowSignIn?: boolean, allowConnectedAccounts?: boolean }): Promise<Result<void,\n InstanceType<typeof KnownErrors.OAuthProviderAccountIdAlreadyUsedForSignIn>\n >> {\n try {\n await app._interface.updateOAuthProvider(\n crud.user_id,\n crud.id,\n {\n allow_sign_in: data.allowSignIn,\n allow_connected_accounts: data.allowConnectedAccounts,\n },\n session\n );\n await app._currentUserOAuthProvidersCache.refresh([session]);\n return Result.ok(undefined);\n } catch (error) {\n if (KnownErrors.OAuthProviderAccountIdAlreadyUsedForSignIn.isInstance(error)) {\n return Result.error(error);\n }\n throw error;\n }\n },\n\n async delete() {\n await app._interface.deleteOAuthProvider(crud.user_id, crud.id, session);\n await app._currentUserOAuthProvidersCache.refresh([session]);\n },\n };\n }\n\n protected _clientItemFromCrud(crud: ItemCrud['Client']['Read']): Item {\n const app = this;\n return {\n displayName: crud.display_name,\n quantity: crud.quantity,\n nonNegativeQuantity: Math.max(0, crud.quantity),\n };\n }\n\n protected _customerProductsFromResponse(response: CustomerProductsListResponse): CustomerProductsList {\n const products = response.items.map((item) => ({\n id: item.id,\n quantity: item.quantity,\n displayName: item.product.display_name,\n customerType: item.product.customer_type,\n isServerOnly: item.product.server_only,\n stackable: item.product.stackable,\n type: item.type,\n subscription: item.subscription ? {\n currentPeriodEnd: item.subscription.current_period_end ? new Date(item.subscription.current_period_end) : null,\n cancelAtPeriodEnd: item.subscription.cancel_at_period_end,\n isCancelable: item.subscription.is_cancelable,\n } : null,\n switchOptions: item.switch_options?.map((option) => ({\n productId: option.product_id,\n displayName: option.product.display_name,\n prices: option.product.prices,\n })),\n }));\n return Object.assign(products, { nextCursor: response.pagination.next_cursor ?? null });\n }\n\n protected _customerInvoicesFromResponse(response: CustomerInvoicesListResponse): CustomerInvoicesList {\n const invoices = response.items.map((item) => ({\n status: item.status as CustomerInvoiceStatus,\n amountTotal: item.amount_total,\n hostedInvoiceUrl: item.hosted_invoice_url,\n createdAt: new Date(item.created_at_millis),\n }));\n return Object.assign(invoices, { nextCursor: response.pagination.next_cursor ?? null });\n }\n\n protected _customerBillingFromResponse(response: {\n has_customer: boolean,\n default_payment_method: {\n id: string,\n brand: string | null,\n last4: string | null,\n exp_month: number | null,\n exp_year: number | null,\n } | null,\n }): CustomerBilling {\n return {\n hasCustomer: response.has_customer,\n defaultPaymentMethod: response.default_payment_method,\n };\n }\n\n protected _createAuth(session: InternalSession): Auth {\n const app = this;\n return {\n _internalSession: session,\n currentSession: {\n async getTokens() {\n const tokens = await session.getOrFetchLikelyValidTokens(20_000, 75_000);\n return {\n accessToken: tokens?.accessToken.token ?? null,\n refreshToken: tokens?.refreshToken?.token ?? null,\n };\n },\n useTokens() {\n const [_, setCounter] = React.useState(0);\n React.useEffect(() => {\n const { unsubscribe: unsubscribeRefresh } = session.startRefreshingAccessToken(30_000, 60_000);\n const { unsubscribe: unsubscribeInvalidate } = session.onInvalidate(() => setCounter(c => c + 1));\n const { unsubscribe: unsubscribeAccessTokenChange } = session.onAccessTokenChange(() => setCounter(c => c + 1));\n return () => {\n unsubscribeRefresh();\n unsubscribeInvalidate();\n unsubscribeAccessTokenChange();\n };\n }, []);\n\n let accessToken = session.isKnownToBeInvalid() ? null : session.getAccessTokenIfNotExpiredYet(20_000, 75_000);\n if (accessToken === null) {\n // note: tokens is never actually assigned here in practice because getOrFetchLikelyValidTokens is always a fresh promise so the `use` hook always throws, but this is more idiomatic and makes the type checker happy\n accessToken = use(session.getOrFetchLikelyValidTokens(20_000, 75_000))?.accessToken ?? null;\n }\n return {\n accessToken: accessToken?.token ?? null,\n refreshToken: session.getRefreshToken()?.token ?? null,\n };\n },\n },\n async getAccessToken(): Promise<string | null> {\n const tokens = await this.currentSession.getTokens();\n return tokens.accessToken;\n },\n useAccessToken(): string | null {\n return this.currentSession.useTokens().accessToken;\n },\n async getRefreshToken(): Promise<string | null> {\n const tokens = await this.currentSession.getTokens();\n return tokens.refreshToken;\n },\n useRefreshToken(): string | null {\n return this.currentSession.useTokens().refreshToken;\n },\n async getAuthHeaders(): Promise<{ \"x-stack-auth\": string }> {\n return {\n \"x-stack-auth\": JSON.stringify(await this.getAuthJson()),\n };\n },\n useAuthHeaders(): { \"x-stack-auth\": string } {\n return {\n \"x-stack-auth\": JSON.stringify(this.useAuthJson()),\n };\n },\n async getAuthJson(): Promise<{ accessToken: string | null, refreshToken: string | null }> {\n const tokens = await this.currentSession.getTokens();\n return tokens;\n },\n useAuthJson(): { accessToken: string | null, refreshToken: string | null } {\n return this.currentSession.useTokens();\n },\n signOut(options?: { redirectUrl?: URL | string }) {\n return app._signOut(session, options);\n },\n };\n }\n\n protected _editableTeamProfileFromCrud(crud: TeamMemberProfilesCrud['Client']['Read'], session: InternalSession): EditableTeamMemberProfile {\n const app = this;\n return {\n displayName: crud.display_name,\n profileImageUrl: crud.profile_image_url,\n async update(update: { displayName?: string, profileImageUrl?: string }) {\n await app._interface.updateTeamMemberProfile({\n teamId: crud.team_id,\n userId: crud.user_id,\n profile: {\n display_name: update.displayName,\n profile_image_url: update.profileImageUrl,\n },\n }, session);\n await app._currentUserTeamProfileCache.refresh([session, crud.team_id]);\n }\n };\n }\n\n protected _createBaseUser(crud: NonNullable<CurrentUserCrud['Client']['Read']> | UsersCrud['Server']['Read']): BaseUser {\n return {\n id: crud.id,\n displayName: crud.display_name,\n primaryEmail: crud.primary_email,\n primaryEmailVerified: crud.primary_email_verified,\n profileImageUrl: crud.profile_image_url,\n signedUpAt: new Date(crud.signed_up_at_millis),\n clientMetadata: crud.client_metadata,\n clientReadOnlyMetadata: crud.client_read_only_metadata,\n hasPassword: crud.has_password,\n emailAuthEnabled: crud.auth_with_email,\n otpAuthEnabled: crud.otp_auth_enabled,\n oauthProviders: crud.oauth_providers,\n passkeyAuthEnabled: crud.passkey_auth_enabled,\n isMultiFactorRequired: crud.requires_totp_mfa,\n isAnonymous: crud.is_anonymous,\n isRestricted: crud.is_restricted,\n restrictedReason: crud.restricted_reason,\n toClientJson(): CurrentUserCrud['Client']['Read'] {\n return crud;\n }\n };\n }\n\n protected _createUserExtraFromCurrent(crud: NonNullable<CurrentUserCrud['Client']['Read']>, session: InternalSession): UserExtra {\n const app = this;\n async function getConnectedAccount(id: ProviderType, options?: { scopes?: string[] }): Promise<OAuthConnection | null>;\n async function getConnectedAccount(id: ProviderType, options: { or: 'redirect', scopes?: string[] }): Promise<OAuthConnection>;\n async function getConnectedAccount(id: ProviderType, options?: { or?: 'redirect', scopes?: string[] }): Promise<OAuthConnection | null> {\n const scopeString = options?.scopes?.join(\" \");\n return Result.orThrow(await app._currentUserOAuthConnectionCache.getOrWait([session, id, scopeString || \"\", options?.or === 'redirect'], \"write-only\"));\n }\n\n function useConnectedAccount(id: ProviderType, options?: { scopes?: string[] }): OAuthConnection | null;\n function useConnectedAccount(id: ProviderType, options: { or: 'redirect', scopes?: string[] }): OAuthConnection;\n function useConnectedAccount(id: ProviderType, options?: { or?: 'redirect', scopes?: string[] }): OAuthConnection | null {\n const scopeString = options?.scopes?.join(\" \");\n return useAsyncCache(app._currentUserOAuthConnectionCache, [session, id, scopeString || \"\", options?.or === 'redirect'] as const, \"user.useConnectedAccount()\");\n }\n return {\n async getActiveSessions() {\n const sessions = await app._interface.listSessions(session);\n return sessions.items.map((crud) => app._clientSessionFromCrud(crud));\n },\n async revokeSession(sessionId: string) {\n await app._interface.deleteSession(sessionId, session);\n },\n setDisplayName(displayName: string | null) {\n return this.update({ displayName });\n },\n setClientMetadata(metadata: Record<string, any>) {\n return this.update({ clientMetadata: metadata });\n },\n async setSelectedTeam(team: Team | string | null) {\n await this.update({ selectedTeamId: typeof team === 'string' ? team : team?.id ?? null });\n },\n getConnectedAccount,\n useConnectedAccount, // THIS_LINE_PLATFORM react-like\n async getTeam(teamId: string) {\n const teams = await this.listTeams();\n return teams.find((t) => t.id === teamId) ?? null;\n },\n useTeam(teamId: string) {\n const teams = this.useTeams();\n return useMemo(() => {\n return teams.find((t) => t.id === teamId) ?? null;\n }, [teams, teamId]);\n },\n async listTeams() {\n const teams = Result.orThrow(await app._currentUserTeamsCache.getOrWait([session], \"write-only\"));\n return teams.map((crud) => app._clientTeamFromCrud(crud, session));\n },\n useTeams() {\n const teams = useAsyncCache(app._currentUserTeamsCache, [session], \"user.useTeams()\");\n return useMemo(() => teams.map((crud) => app._clientTeamFromCrud(crud, session)), [teams]);\n },\n async createTeam(data: TeamCreateOptions) {\n const crud = await app._interface.createClientTeam(teamCreateOptionsToCrud(data, 'me'), session);\n await app._currentUserTeamsCache.refresh([session]);\n await this.update({ selectedTeamId: crud.id });\n return app._clientTeamFromCrud(crud, session);\n },\n async leaveTeam(team: Team) {\n await app._interface.leaveTeam(team.id, session);\n // TODO: refresh cache\n },\n async listPermissions(scopeOrOptions?: Team | { recursive?: boolean }, options?: { recursive?: boolean }): Promise<TeamPermission[]> {\n if (scopeOrOptions && 'id' in scopeOrOptions) {\n const scope = scopeOrOptions;\n const recursive = options?.recursive ?? true;\n const permissions = Result.orThrow(await app._currentUserPermissionsCache.getOrWait([session, scope.id, recursive], \"write-only\"));\n return permissions.map((crud) => app._clientPermissionFromCrud(crud));\n } else {\n const opts = scopeOrOptions;\n const recursive = opts?.recursive ?? true;\n const permissions = Result.orThrow(await app._currentUserProjectPermissionsCache.getOrWait([session, recursive], \"write-only\"));\n return permissions.map((crud) => app._clientPermissionFromCrud(crud));\n }\n },\n usePermissions(scopeOrOptions?: Team | { recursive?: boolean }, options?: { recursive?: boolean }): TeamPermission[] {\n if (scopeOrOptions && 'id' in scopeOrOptions) {\n const scope = scopeOrOptions;\n const recursive = options?.recursive ?? true;\n const permissions = useAsyncCache(app._currentUserPermissionsCache, [session, scope.id, recursive] as const, \"user.usePermissions()\");\n return useMemo(() => permissions.map((crud) => app._clientPermissionFromCrud(crud)), [permissions]);\n } else {\n const opts = scopeOrOptions;\n const recursive = opts?.recursive ?? true;\n const permissions = useAsyncCache(app._currentUserProjectPermissionsCache, [session, recursive] as const, \"user.usePermissions()\");\n return useMemo(() => permissions.map((crud) => app._clientPermissionFromCrud(crud)), [permissions]);\n }\n },\n usePermission(scopeOrPermissionId: Team | string, permissionId?: string): TeamPermission | null {\n if (scopeOrPermissionId && typeof scopeOrPermissionId !== 'string') {\n const scope = scopeOrPermissionId;\n const permissions = this.usePermissions(scope);\n return useMemo(() => permissions.find((p) => p.id === permissionId) ?? null, [permissions, permissionId]);\n } else {\n const pid = scopeOrPermissionId;\n const permissions = this.usePermissions();\n return useMemo(() => permissions.find((p) => p.id === pid) ?? null, [permissions, pid]);\n }\n },\n async getPermission(scopeOrPermissionId: Team | string, permissionId?: string): Promise<TeamPermission | null> {\n if (scopeOrPermissionId && typeof scopeOrPermissionId !== 'string') {\n const scope = scopeOrPermissionId;\n const permissions = await this.listPermissions(scope);\n return permissions.find((p) => p.id === permissionId) ?? null;\n } else {\n const pid = scopeOrPermissionId;\n const permissions = await this.listPermissions();\n return permissions.find((p) => p.id === pid) ?? null;\n }\n },\n async hasPermission(scopeOrPermissionId: Team | string, permissionId?: string): Promise<boolean> {\n if (scopeOrPermissionId && typeof scopeOrPermissionId !== 'string') {\n const scope = scopeOrPermissionId;\n return (await this.getPermission(scope, permissionId as string)) !== null;\n } else {\n const pid = scopeOrPermissionId;\n return (await this.getPermission(pid)) !== null;\n }\n },\n async update(update) {\n return await app._updateClientUser(update, session);\n },\n async sendVerificationEmail(options?: { callbackUrl?: string }) {\n if (!crud.primary_email) {\n throw new StackAssertionError(\"User does not have a primary email\");\n }\n return await app._interface.sendVerificationEmail(\n crud.primary_email,\n options?.callbackUrl ?? constructRedirectUrl(app.urls.emailVerification, \"callbackUrl\"),\n session\n );\n },\n async updatePassword(options: { oldPassword: string, newPassword: string }) {\n const result = await app._interface.updatePassword(options, session);\n await app._currentUserCache.refresh([session]);\n return result;\n },\n async setPassword(options: { password: string }) {\n const result = await app._interface.setPassword(options, session);\n await app._currentUserCache.refresh([session]);\n return result;\n },\n selectedTeam: crud.selected_team && this._clientTeamFromCrud(crud.selected_team, session),\n async getTeamProfile(team: Team) {\n const result = Result.orThrow(await app._currentUserTeamProfileCache.getOrWait([session, team.id], \"write-only\"));\n return app._editableTeamProfileFromCrud(result, session);\n },\n useTeamProfile(team: Team) {\n const result = useAsyncCache(app._currentUserTeamProfileCache, [session, team.id] as const, \"user.useTeamProfile()\");\n return app._editableTeamProfileFromCrud(result, session);\n },\n async delete() {\n await app._interface.deleteCurrentUser(session);\n session.markInvalid();\n },\n async listContactChannels() {\n const result = Result.orThrow(await app._clientContactChannelsCache.getOrWait([session], \"write-only\"));\n return result.map((crud) => app._clientContactChannelFromCrud(crud, session));\n },\n useContactChannels() {\n const result = useAsyncCache(app._clientContactChannelsCache, [session] as const, \"user.useContactChannels()\");\n return result.map((crud) => app._clientContactChannelFromCrud(crud, session));\n },\n async createContactChannel(data: ContactChannelCreateOptions) {\n const crud = await app._interface.createClientContactChannel(contactChannelCreateOptionsToCrud('me', data), session);\n await app._clientContactChannelsCache.refresh([session]);\n return app._clientContactChannelFromCrud(crud, session);\n },\n useNotificationCategories() {\n const results = useAsyncCache(app._notificationCategoriesCache, [session] as const, \"user.useNotificationCategories()\");\n return results.map((crud) => app._clientNotificationCategoryFromCrud(crud, session));\n },\n async listNotificationCategories() {\n const results = Result.orThrow(await app._notificationCategoriesCache.getOrWait([session], \"write-only\"));\n return results.map((crud) => app._clientNotificationCategoryFromCrud(crud, session));\n },\n useApiKeys() {\n const result = useAsyncCache(app._userApiKeysCache, [session] as const, \"user.useApiKeys()\");\n return result.map((crud) => app._clientApiKeyFromCrud(session, crud));\n },\n\n async listApiKeys() {\n const results = await app._interface.listProjectApiKeys({ user_id: 'me' }, session, \"client\");\n return results.map((crud) => app._clientApiKeyFromCrud(session, crud));\n },\n\n async createApiKey(options: ApiKeyCreationOptions<\"user\">) {\n const result = await app._interface.createProjectApiKey(\n await apiKeyCreationOptionsToCrud(\"user\", \"me\", options),\n session,\n \"client\",\n );\n await app._userApiKeysCache.refresh([session]);\n return app._clientApiKeyFromCrud(session, result);\n },\n\n useOAuthProviders() {\n const results = useAsyncCache(app._currentUserOAuthProvidersCache, [session] as const, \"user.useOAuthProviders()\");\n return results.map((crud) => app._clientOAuthProviderFromCrud(crud, session));\n },\n\n async listOAuthProviders() {\n const results = Result.orThrow(await app._currentUserOAuthProvidersCache.getOrWait([session], \"write-only\"));\n return results.map((crud) => app._clientOAuthProviderFromCrud(crud, session));\n },\n\n useOAuthProvider(id: string) {\n const providers = this.useOAuthProviders();\n return useMemo(() => providers.find((p) => p.id === id) ?? null, [providers, id]);\n },\n\n async getOAuthProvider(id: string) {\n const providers = await this.listOAuthProviders();\n return providers.find((p) => p.id === id) ?? null;\n },\n\n async registerPasskey(options?: { hostname?: string }): Promise<Result<undefined, KnownErrors[\"PasskeyRegistrationFailed\"] | KnownErrors[\"PasskeyWebAuthnError\"]>> {\n const hostname = (await app._getCurrentUrl())?.hostname;\n if (!hostname) {\n throw new StackAssertionError(\"hostname must be provided if the Stack App does not have a redirect method\");\n }\n\n const initiationResult = await app._interface.initiatePasskeyRegistration({}, session);\n\n if (initiationResult.status !== \"ok\") {\n return Result.error(new KnownErrors.PasskeyRegistrationFailed(\"Failed to get initiation options for passkey registration\"));\n }\n\n const { options_json, code } = initiationResult.data;\n\n // HACK: Override the rpID to be the actual domain\n if (options_json.rp.id !== \"THIS_VALUE_WILL_BE_REPLACED.example.com\") {\n throw new StackAssertionError(`Expected returned RP ID from server to equal sentinel, but found ${options_json.rp.id}`);\n }\n\n options_json.rp.id = hostname;\n\n let attResp;\n try {\n attResp = await startRegistration({ optionsJSON: options_json });\n } catch (error: any) {\n if (error instanceof WebAuthnError) {\n return Result.error(new KnownErrors.PasskeyWebAuthnError(error.message, error.name));\n } else {\n // This should never happen\n captureError(\"passkey-registration-failed\", error);\n return Result.error(new KnownErrors.PasskeyRegistrationFailed(\"Failed to start passkey registration due to unknown error\"));\n }\n }\n\n\n const registrationResult = await app._interface.registerPasskey({ credential: attResp, code }, session);\n\n await app._refreshUser(session);\n return registrationResult;\n },\n };\n }\n\n protected _createInternalUserExtra(session: InternalSession): InternalUserExtra {\n const app = this;\n this._ensureInternalProject();\n return {\n createProject(newProject: AdminProjectUpdateOptions & { displayName: string, teamId: string }) {\n return app._createProject(session, newProject);\n },\n async transferProject(projectIdToTransfer: string, newTeamId: string): Promise<void> {\n await app._interface.transferProject(session, projectIdToTransfer, newTeamId);\n await app._refreshProject();\n },\n listOwnedProjects() {\n return app._listOwnedProjects(session);\n },\n useOwnedProjects() {\n return app._useOwnedProjects(session);\n },\n };\n }\n\n protected _createCustomer(userIdOrTeamId: string, type: \"user\" | \"team\", session: InternalSession | null): Omit<Customer, \"id\"> {\n const app = this;\n const effectiveSession = session ?? app._interface.createSession({ refreshToken: null });\n const customerOptions = type === \"user\" ? { userId: userIdOrTeamId } : { teamId: userIdOrTeamId };\n return {\n async getBilling() {\n const response = Result.orThrow(await app._customerBillingCache.getOrWait([effectiveSession, type, userIdOrTeamId], \"write-only\"));\n return app._customerBillingFromResponse(response);\n },\n useBilling() {\n const response = useAsyncCache(app._customerBillingCache, [effectiveSession, type, userIdOrTeamId] as const, \"customer.useBilling()\");\n return app._customerBillingFromResponse(response);\n },\n async createPaymentMethodSetupIntent(): Promise<CustomerPaymentMethodSetupIntent> {\n const body = await app._interface.createCustomerPaymentMethodSetupIntent(type, userIdOrTeamId, effectiveSession);\n return {\n clientSecret: body.client_secret,\n stripeAccountId: body.stripe_account_id,\n };\n },\n async setDefaultPaymentMethodFromSetupIntent(setupIntentId: string): Promise<CustomerDefaultPaymentMethod> {\n const body = await app._interface.setDefaultCustomerPaymentMethodFromSetupIntent(type, userIdOrTeamId, setupIntentId, effectiveSession);\n await app._customerBillingCache.refresh([effectiveSession, type, userIdOrTeamId]);\n return body.default_payment_method;\n },\n async getItem(itemId: string) {\n return await app.getItem({ itemId, ...customerOptions });\n },\n useItem(itemId: string) {\n return app.useItem({ itemId, ...customerOptions });\n },\n async listProducts(options?: CustomerProductsListOptions) {\n return await app.listProducts({ ...options, ...customerOptions });\n },\n useProducts(options?: CustomerProductsListOptions) {\n return app.useProducts({ ...options, ...customerOptions });\n },\n async listInvoices(options?: CustomerInvoicesListOptions) {\n return await app.listInvoices({ ...options, ...customerOptions });\n },\n useInvoices(options?: CustomerInvoicesListOptions) {\n return app.useInvoices({ ...options, ...customerOptions });\n },\n async createCheckoutUrl(options: { productId: string, returnUrl?: string }) {\n return await app._interface.createCheckoutUrl(type, userIdOrTeamId, options.productId, effectiveSession, options.returnUrl);\n },\n async switchSubscription(options: { fromProductId: string, toProductId: string, priceId?: string, quantity?: number }) {\n await app._interface.switchSubscription({\n customer_type: type,\n customer_id: userIdOrTeamId,\n from_product_id: options.fromProductId,\n to_product_id: options.toProductId,\n price_id: options.priceId,\n quantity: options.quantity,\n }, effectiveSession);\n await app._customerBillingCache.refresh([effectiveSession, type, userIdOrTeamId]);\n if (type === \"user\") {\n await app._userProductsCache.invalidateWhere(([cachedSession, userId]) => cachedSession === effectiveSession && userId === userIdOrTeamId);\n } else {\n await app._teamProductsCache.invalidateWhere(([cachedSession, teamId]) => cachedSession === effectiveSession && teamId === userIdOrTeamId);\n }\n },\n };\n }\n\n async getItem(options: { itemId: string, userId: string } | { itemId: string, teamId: string } | { itemId: string, customCustomerId: string }): Promise<Item> {\n const session = await this._getSession();\n let crud: ItemCrud['Client']['Read'];\n if (\"userId\" in options) {\n crud = Result.orThrow(await this._userItemCache.getOrWait([session, options.userId, options.itemId], \"write-only\"));\n } else if (\"teamId\" in options) {\n crud = Result.orThrow(await this._teamItemCache.getOrWait([session, options.teamId, options.itemId], \"write-only\"));\n } else {\n crud = Result.orThrow(await this._customItemCache.getOrWait([session, options.customCustomerId, options.itemId], \"write-only\"));\n }\n return this._clientItemFromCrud(crud);\n }\n\n useItem(options: { itemId: string, userId: string } | { itemId: string, teamId: string } | { itemId: string, customCustomerId: string }): Item {\n const session = this._useSession();\n const [cache, ownerId] =\n \"userId\" in options ? [this._userItemCache, options.userId] :\n \"teamId\" in options ? [this._teamItemCache, options.teamId] : [this._customItemCache, options.customCustomerId];\n const crud = useAsyncCache(cache, [session, ownerId, options.itemId] as const, \"app.useItem()\");\n return this._clientItemFromCrud(crud);\n }\n\n async listProducts(options: CustomerProductsRequestOptions): Promise<CustomerProductsList> {\n const currentUser = await this.getUser();\n const session = currentUser?._internalSession ?? await this._getSession();\n if (\"userId\" in options) {\n const response = Result.orThrow(await this._userProductsCache.getOrWait([session, options.userId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerProductsFromResponse(response);\n } else if (\"teamId\" in options) {\n const response = Result.orThrow(await this._teamProductsCache.getOrWait([session, options.teamId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerProductsFromResponse(response);\n }\n const response = Result.orThrow(await this._customProductsCache.getOrWait([session, options.customCustomerId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerProductsFromResponse(response);\n }\n\n async listInvoices(options: CustomerInvoicesRequestOptions): Promise<CustomerInvoicesList> {\n const session = await this._getSession();\n if (\"userId\" in options) {\n const response = Result.orThrow(await this._userInvoicesCache.getOrWait([session, options.userId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerInvoicesFromResponse(response);\n }\n const response = Result.orThrow(await this._teamInvoicesCache.getOrWait([session, options.teamId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerInvoicesFromResponse(response);\n }\n\n async cancelSubscription(options: { productId: string } | { productId: string, teamId: string }): Promise<void> {\n const session = await this._getSession();\n const user = await this.getUser();\n if (!user) {\n throw new KnownErrors.UserAuthenticationRequired();\n }\n const customerType = \"teamId\" in options ? \"team\" : \"user\";\n const customerId = \"teamId\" in options ? options.teamId : user.id;\n await this._interface.cancelSubscription({\n customer_type: customerType,\n customer_id: customerId,\n product_id: options.productId,\n }, session);\n if (customerType === \"user\") {\n await this._userProductsCache.invalidateWhere(([cachedSession, userId]) => cachedSession === session && userId === customerId);\n } else {\n await this._teamProductsCache.invalidateWhere(([cachedSession, teamId]) => cachedSession === session && teamId === customerId);\n }\n }\n useProducts(options: CustomerProductsRequestOptions): CustomerProductsList {\n const session = this._useSession();\n const cache = \"userId\" in options ? this._userProductsCache : \"teamId\" in options ? this._teamProductsCache : this._customProductsCache;\n const debugLabel = \"clientApp.useProducts()\";\n const customerId = \"userId\" in options ? options.userId : \"teamId\" in options ? options.teamId : options.customCustomerId;\n const response = useAsyncCache(cache, [session, customerId, options.cursor ?? null, options.limit ?? null] as const, debugLabel);\n return this._customerProductsFromResponse(response);\n }\n useInvoices(options: CustomerInvoicesRequestOptions): CustomerInvoicesList {\n const session = this._useSession();\n const cache = \"userId\" in options ? this._userInvoicesCache : this._teamInvoicesCache;\n const debugLabel = \"clientApp.useInvoices()\";\n const customerId = \"userId\" in options ? options.userId : options.teamId;\n const response = useAsyncCache(cache, [session, customerId, options.cursor ?? null, options.limit ?? null] as const, debugLabel);\n return this._customerInvoicesFromResponse(response);\n }\n\n protected _currentUserFromCrud(crud: NonNullable<CurrentUserCrud['Client']['Read']>, session: InternalSession): ProjectCurrentUser<ProjectId> {\n const currentUser = withUserDestructureGuard({\n ...this._createBaseUser(crud),\n ...this._createAuth(session),\n ...this._createUserExtraFromCurrent(crud, session),\n ...this._isInternalProject() ? this._createInternalUserExtra(session) : {},\n ...this._createCustomer(crud.id, \"user\", session),\n } satisfies CurrentUser);\n return currentUser as ProjectCurrentUser<ProjectId>;\n }\n protected _clientSessionFromCrud(crud: SessionsCrud['Client']['Read']): ActiveSession {\n return {\n id: crud.id,\n userId: crud.user_id,\n createdAt: new Date(crud.created_at),\n isImpersonation: crud.is_impersonation,\n lastUsedAt: crud.last_used_at ? new Date(crud.last_used_at) : undefined,\n isCurrentSession: crud.is_current_session ?? false,\n geoInfo: crud.last_used_at_end_user_ip_info,\n };\n }\n\n protected _getOwnedAdminApp(forProjectId: string, session: InternalSession): _StackAdminAppImplIncomplete<false, string> {\n if (!this._ownedAdminApps.has([session, forProjectId])) {\n this._ownedAdminApps.set([session, forProjectId], new (_StackClientAppImplIncomplete.LazyStackAdminAppImpl.value!)({\n baseUrl: this._interface.options.getBaseUrl(),\n projectId: forProjectId,\n tokenStore: null,\n projectOwnerSession: session,\n noAutomaticPrefetch: true,\n }));\n }\n return this._ownedAdminApps.get([session, forProjectId])!;\n }\n\n get projectId(): ProjectId {\n return this._interface.projectId as ProjectId;\n }\n\n protected async _isTrusted(url: string): Promise<boolean> {\n return isRelative(url);\n }\n\n get urls(): Readonly<HandlerUrls> {\n return getUrls(this._urlOptions);\n }\n\n protected async _getCurrentUrl() {\n if (this._redirectMethod === \"none\") {\n return null;\n }\n return new URL(window.location.href);\n }\n\n protected async _redirectTo(options: { url: URL | string, replace?: boolean }) {\n if (this._redirectMethod === \"none\") {\n return;\n } else if (typeof this._redirectMethod === \"object\" && this._redirectMethod.navigate) {\n this._redirectMethod.navigate(options.url.toString());\n } else {\n if (options.replace) {\n window.location.replace(options.url);\n } else {\n window.location.assign(options.url);\n }\n }\n\n await wait(2000);\n }\n\n useNavigate(): (to: string) => void {\n if (typeof this._redirectMethod === \"object\") {\n return this._redirectMethod.useNavigate();\n } else if (this._redirectMethod === \"window\") {\n return (to: string) => window.location.assign(to);\n } else {\n return (to: string) => { };\n }\n }\n protected async _redirectIfTrusted(url: string, options?: RedirectToOptions) {\n if (!await this._isTrusted(url)) {\n throw new Error(`Redirect URL ${url} is not trusted; should be relative.`);\n }\n return await this._redirectTo({ url, ...options });\n }\n\n protected async _redirectToHandler(handlerName: keyof HandlerUrls, options?: RedirectToOptions) {\n let url = this.urls[handlerName];\n if (!url) {\n throw new Error(`No URL for handler name ${handlerName}`);\n }\n\n if (!options?.noRedirectBack) {\n if (handlerName === \"afterSignIn\" || handlerName === \"afterSignUp\") {\n if (isReactServer || typeof window === \"undefined\") {\n // TODO implement this\n } else {\n const queryParams = new URLSearchParams(window.location.search);\n url = queryParams.get(\"after_auth_return_to\") || url;\n }\n } else if (handlerName === \"signIn\" || handlerName === \"signUp\" || handlerName === \"onboarding\") {\n // For signIn, signUp, and onboarding, preserve the return URL so user can be redirected back after completing the flow\n if (isReactServer || typeof window === \"undefined\") {\n // TODO implement this\n } else {\n const currentUrl = new URL(window.location.href);\n const nextUrl = new URL(url, currentUrl);\n if (currentUrl.searchParams.has(\"after_auth_return_to\")) {\n nextUrl.searchParams.set(\"after_auth_return_to\", currentUrl.searchParams.get(\"after_auth_return_to\")!);\n } else if (currentUrl.protocol === nextUrl.protocol && currentUrl.host === nextUrl.host) {\n nextUrl.searchParams.set(\"after_auth_return_to\", getRelativePart(currentUrl));\n }\n url = getRelativePart(nextUrl);\n }\n }\n }\n\n await this._redirectIfTrusted(url, options);\n }\n\n async redirectToSignIn(options?: RedirectToOptions) { return await this._redirectToHandler(\"signIn\", options); }\n async redirectToSignUp(options?: RedirectToOptions) { return await this._redirectToHandler(\"signUp\", options); }\n async redirectToSignOut(options?: RedirectToOptions) { return await this._redirectToHandler(\"signOut\", options); }\n async redirectToEmailVerification(options?: RedirectToOptions) { return await this._redirectToHandler(\"emailVerification\", options); }\n async redirectToPasswordReset(options?: RedirectToOptions) { return await this._redirectToHandler(\"passwordReset\", options); }\n async redirectToForgotPassword(options?: RedirectToOptions) { return await this._redirectToHandler(\"forgotPassword\", options); }\n async redirectToHome(options?: RedirectToOptions) { return await this._redirectToHandler(\"home\", options); }\n async redirectToOAuthCallback(options?: RedirectToOptions) { return await this._redirectToHandler(\"oauthCallback\", options); }\n async redirectToMagicLinkCallback(options?: RedirectToOptions) { return await this._redirectToHandler(\"magicLinkCallback\", options); }\n async redirectToAfterSignIn(options?: RedirectToOptions) { return await this._redirectToHandler(\"afterSignIn\", options); }\n async redirectToAfterSignUp(options?: RedirectToOptions) { return await this._redirectToHandler(\"afterSignUp\", options); }\n async redirectToOnboarding(options?: RedirectToOptions) { return await this._redirectToHandler(\"onboarding\", options); }\n async redirectToAfterSignOut(options?: RedirectToOptions) { return await this._redirectToHandler(\"afterSignOut\", options); }\n async redirectToAccountSettings(options?: RedirectToOptions) { return await this._redirectToHandler(\"accountSettings\", options); }\n async redirectToError(options?: RedirectToOptions) { return await this._redirectToHandler(\"error\", options); }\n async redirectToTeamInvitation(options?: RedirectToOptions) { return await this._redirectToHandler(\"teamInvitation\", options); }\n async redirectToMfa(options?: RedirectToOptions) { return await this._redirectToHandler(\"mfa\", options); }\n\n async sendForgotPasswordEmail(email: string, options?: { callbackUrl?: string }): Promise<Result<undefined, KnownErrors[\"UserNotFound\"]>> {\n return await this._interface.sendForgotPasswordEmail(email, options?.callbackUrl ?? constructRedirectUrl(this.urls.passwordReset, \"callbackUrl\"));\n }\n\n async sendMagicLinkEmail(email: string, options?: { callbackUrl?: string }): Promise<Result<{ nonce: string }, KnownErrors[\"RedirectUrlNotWhitelisted\"]>> {\n return await this._interface.sendMagicLinkEmail(email, options?.callbackUrl ?? constructRedirectUrl(this.urls.magicLinkCallback, \"callbackUrl\"));\n }\n\n async resetPassword(options: { password: string, code: string }): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n return await this._interface.resetPassword(options);\n }\n\n async verifyPasswordResetCode(code: string): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n return await this._interface.verifyPasswordResetCode(code);\n }\n\n async verifyTeamInvitationCode(code: string): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n return await this._interface.acceptTeamInvitation({\n type: 'check',\n code,\n session: await this._getSession(),\n });\n }\n\n async acceptTeamInvitation(code: string): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n const result = await this._interface.acceptTeamInvitation({\n type: 'use',\n code,\n session: await this._getSession(),\n });\n\n if (result.status === 'ok') {\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n async getTeamInvitationDetails(code: string): Promise<Result<{ teamDisplayName: string }, KnownErrors[\"VerificationCodeError\"]>> {\n const result = await this._interface.acceptTeamInvitation({\n type: 'details',\n code,\n session: await this._getSession(),\n });\n\n if (result.status === 'ok') {\n return Result.ok({ teamDisplayName: result.data.team_display_name });\n } else {\n return Result.error(result.error);\n }\n }\n\n async verifyEmail(code: string): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n const result = await this._interface.verifyEmail(code);\n await this._currentUserCache.refresh([await this._getSession()]);\n await this._clientContactChannelsCache.refresh([await this._getSession()]);\n return result;\n }\n\n async getUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'redirect' }): Promise<ProjectCurrentUser<ProjectId>>;\n async getUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'throw' }): Promise<ProjectCurrentUser<ProjectId>>;\n async getUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'anonymous' }): Promise<ProjectCurrentUser<ProjectId>>;\n async getUser(options?: GetCurrentUserOptions<HasTokenStore>): Promise<ProjectCurrentUser<ProjectId> | null>;\n async getUser(options?: GetCurrentUserOptions<HasTokenStore>): Promise<ProjectCurrentUser<ProjectId> | null> {\n // Validate that includeRestricted: false and or: 'anonymous' are mutually exclusive\n if (options?.or === 'anonymous' && options.includeRestricted === false) {\n throw new Error(\"Cannot use { or: 'anonymous' } with { includeRestricted: false }. Anonymous users implicitly include restricted users.\");\n }\n\n this._ensurePersistentTokenStore(options?.tokenStore);\n const session = await this._getSession(options?.tokenStore);\n let crud = Result.orThrow(await this._currentUserCache.getOrWait([session], \"write-only\"));\n const includeAnonymous = options?.or === \"anonymous\" || options?.or === \"anonymous-if-exists[deprecated]\";\n const includeRestricted = options?.includeRestricted === true || includeAnonymous;\n\n if (crud === null || (crud.is_anonymous && !includeAnonymous) || (crud.is_restricted && !includeRestricted)) {\n switch (options?.or) {\n case 'redirect': {\n if (!crud?.is_anonymous && crud?.is_restricted) {\n await this.redirectToOnboarding({ replace: true });\n } else {\n await this.redirectToSignIn({ replace: true });\n }\n // TODO: We should probably `await neverResolve()` here instead of returning null. I (Konsti) wanna do it in a release with few changes though because I'm not sure if it'll break anything\n break;\n }\n case 'throw': {\n throw new Error(\"User is not signed in but getUser was called with { or: 'throw' }\");\n }\n case 'anonymous': {\n const tokens = await this._signUpAnonymously();\n return await this.getUser({ tokenStore: tokens, or: \"anonymous-if-exists[deprecated]\", includeRestricted: true }) ?? throwErr(\"Something went wrong while signing up anonymously\");\n }\n case undefined:\n case \"anonymous-if-exists[deprecated]\":\n case \"return-null\": {\n return null;\n }\n }\n }\n\n return crud && this._currentUserFromCrud(crud, session);\n }\n\n useUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'redirect' }): ProjectCurrentUser<ProjectId>;\n useUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'throw' }): ProjectCurrentUser<ProjectId>;\n useUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'anonymous' }): ProjectCurrentUser<ProjectId>;\n useUser(options?: GetCurrentUserOptions<HasTokenStore>): ProjectCurrentUser<ProjectId> | null;\n useUser(options?: GetCurrentUserOptions<HasTokenStore>): ProjectCurrentUser<ProjectId> | null {\n // Validate that includeRestricted: false and or: 'anonymous' are mutually exclusive\n if (options?.or === 'anonymous' && options.includeRestricted === false) {\n throw new Error(\"Cannot use { or: 'anonymous' } with { includeRestricted: false }. Anonymous users implicitly include restricted users.\");\n }\n\n this._ensurePersistentTokenStore(options?.tokenStore);\n\n const session = this._useSession(options?.tokenStore);\n let crud = useAsyncCache(this._currentUserCache, [session] as const, \"clientApp.useUser()\");\n const includeAnonymous = options?.or === \"anonymous\" || options?.or === \"anonymous-if-exists[deprecated]\";\n const includeRestricted = options?.includeRestricted === true || includeAnonymous;\n\n if (crud === null || (crud.is_anonymous && !includeAnonymous) || (crud.is_restricted && !includeRestricted)) {\n switch (options?.or) {\n case 'redirect': {\n if (!crud?.is_anonymous && crud?.is_restricted) {\n runAsynchronously(this.redirectToOnboarding({ replace: true }));\n } else {\n runAsynchronously(this.redirectToSignIn({ replace: true }));\n }\n suspend();\n throw new StackAssertionError(\"suspend should never return\");\n }\n case 'throw': {\n throw new Error(\"User is not signed in but useUser was called with { or: 'throw' }\");\n }\n case 'anonymous': {\n // TODO we should think about the behavior when calling useUser (or getUser) in anonymous with a custom token store. signUpAnonymously always sets the current token store on app level, instead of the one passed to this function\n // TODO we shouldn't reload & suspend here, instead we should use a promise that resolves to the new anonymous user\n runAsynchronously(async () => {\n await this._signUpAnonymously();\n if (typeof window !== \"undefined\") {\n window.location.reload();\n }\n });\n suspend();\n throw new StackAssertionError(\"suspend should never return\");\n }\n case undefined:\n case \"anonymous-if-exists[deprecated]\":\n case \"return-null\": {\n // do nothing\n }\n }\n }\n\n return useMemo(() => {\n return crud && this._currentUserFromCrud(crud, session);\n }, [crud, session, options?.or]);\n }\n\n _getTokenPartialUserFromSession(session: InternalSession, options: GetCurrentPartialUserOptions<HasTokenStore>): TokenPartialUser | null {\n const accessToken = session.getAccessTokenIfNotExpiredYet(0, null);\n if (!accessToken) {\n return null;\n }\n const isAnonymous = accessToken.payload.is_anonymous;\n if (isAnonymous && options.or !== \"anonymous\") {\n return null;\n }\n return {\n id: accessToken.payload.sub,\n primaryEmail: accessToken.payload.email,\n displayName: accessToken.payload.name,\n primaryEmailVerified: accessToken.payload.email_verified,\n isAnonymous,\n isRestricted: accessToken.payload.is_restricted,\n restrictedReason: accessToken.payload.restricted_reason,\n } satisfies TokenPartialUser;\n }\n\n async _getPartialUserFromConvex(ctx: ConvexCtx): Promise<TokenPartialUser | null> {\n const auth = await ctx.auth.getUserIdentity();\n if (!auth) {\n return null;\n }\n return {\n id: auth.subject,\n displayName: auth.name ?? null,\n primaryEmail: auth.email ?? null,\n primaryEmailVerified: auth.email_verified as boolean,\n isAnonymous: auth.is_anonymous as boolean,\n isRestricted: auth.is_restricted as boolean,\n restrictedReason: (auth.restricted_reason as { type: \"anonymous\" | \"email_not_verified\" } | null) ?? null,\n };\n }\n\n async getPartialUser(options: GetCurrentPartialUserOptions<HasTokenStore> & { from: 'token' }): Promise<TokenPartialUser | null>;\n async getPartialUser(options: GetCurrentPartialUserOptions<HasTokenStore> & { from: 'convex' }): Promise<TokenPartialUser | null>;\n async getPartialUser(options: GetCurrentPartialUserOptions<HasTokenStore>): Promise<SyncedPartialUser | TokenPartialUser | null> {\n switch (options.from) {\n case \"token\": {\n this._ensurePersistentTokenStore(options.tokenStore ?? this._tokenStoreInit);\n const session = await this._getSession(options.tokenStore);\n return this._getTokenPartialUserFromSession(session, options);\n }\n case \"convex\": {\n return await this._getPartialUserFromConvex(options.ctx);\n }\n default: {\n // @ts-expect-error\n throw new Error(`Invalid 'from' option: ${options.from}`);\n }\n }\n }\n usePartialUser(options: GetCurrentPartialUserOptions<HasTokenStore> & { from: 'token' }): TokenPartialUser | null;\n usePartialUser(options: GetCurrentPartialUserOptions<HasTokenStore> & { from: 'convex' }): TokenPartialUser | null;\n usePartialUser(options: GetCurrentPartialUserOptions<HasTokenStore>): TokenPartialUser | SyncedPartialUser | null {\n switch (options.from) {\n case \"token\": {\n this._ensurePersistentTokenStore(options.tokenStore ?? this._tokenStoreInit);\n const session = this._useSession(options.tokenStore);\n return this._getTokenPartialUserFromSession(session, options);\n }\n case \"convex\": {\n const result = useAsyncCache(this._convexPartialUserCache, [options.ctx] as const, \"clientApp.usePartialUser()\");\n return result;\n }\n default: {\n // @ts-expect-error\n throw new Error(`Invalid 'from' option: ${options.from}`);\n }\n }\n }\n getConvexClientAuth(options: { tokenStore: TokenStoreInit }): (args: { forceRefreshToken: boolean }) => Promise<string | null> {\n return async (args: { forceRefreshToken: boolean }) => {\n const session = await this._getSession(options.tokenStore ?? this._tokenStoreInit);\n if (!args.forceRefreshToken) {\n const tokens = await session.getOrFetchLikelyValidTokens(20_000, 75_000);\n return tokens?.accessToken.token ?? null;\n }\n const tokens = await session.fetchNewTokens();\n return tokens?.accessToken.token ?? null;\n };\n }\n\n async getConvexHttpClientAuth(options: { tokenStore: TokenStoreInit }): Promise<string> {\n const session = await this._getSession(options.tokenStore);\n const tokens = await session.getOrFetchLikelyValidTokens(20_000, 75_000);\n return tokens?.accessToken.token ?? \"\";\n }\n\n protected async _updateClientUser(update: UserUpdateOptions, session: InternalSession) {\n const res = await this._interface.updateClientUser(userUpdateOptionsToCrud(update), session);\n await this._refreshUser(session);\n return res;\n }\n\n async signInWithOAuth(provider: ProviderType, options?: { returnTo?: string }) {\n if (typeof window === \"undefined\") {\n throw new Error(\"signInWithOAuth can currently only be called in a browser environment\");\n }\n\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n await signInWithOAuth(\n this._interface,\n {\n provider,\n redirectUrl: options?.returnTo ?? this.urls.oauthCallback,\n errorRedirectUrl: this.urls.error,\n providerScope: this._oauthScopesOnSignIn[provider]?.join(\" \"),\n },\n session,\n );\n }\n\n /**\n * Handles MFA verification by redirecting to the OTP page\n */\n protected async _experimentalMfa(error: KnownErrors['MultiFactorAuthenticationRequired'], session: InternalSession): Promise<never> {\n // Store the attempt code in session storage so the OTP page can access it\n if (typeof window !== 'undefined') {\n window.sessionStorage.setItem('stack_mfa_attempt_code', (error.details as any)?.attempt_code ?? throwErr(\"attempt code missing\"));\n }\n\n // Redirect to the MFA page\n await this.redirectToMfa();\n\n throw new StackAssertionError(\"we should have redirected in redirectToMfa()\");\n }\n\n /**\n * @deprecated\n * TODO remove\n */\n protected async _catchMfaRequiredError<T, E>(callback: () => Promise<Result<T, E>>): Promise<Result<T | { accessToken: string, refreshToken: string, newUser: boolean }, E>> {\n try {\n return await callback();\n } catch (e) {\n if (KnownErrors.MultiFactorAuthenticationRequired.isInstance(e)) {\n return Result.ok(await this._experimentalMfa(e, await this._getSession()));\n }\n throw e;\n }\n }\n\n async signInWithCredential(options: {\n email: string,\n password: string,\n noRedirect?: boolean,\n }): Promise<Result<undefined, KnownErrors[\"EmailPasswordMismatch\"] | KnownErrors[\"InvalidTotpCode\"]>> {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n return await this._interface.signInWithCredential(options.email, options.password, session);\n });\n } catch (e) {\n if (KnownErrors.InvalidTotpCode.isInstance(e)) {\n return Result.error(e);\n }\n throw e;\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n if (!options.noRedirect) {\n await this.redirectToAfterSignIn({ replace: true });\n }\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n async signUpWithCredential(options: {\n email: string,\n password: string,\n noRedirect?: boolean,\n noVerificationCallback?: boolean,\n verificationCallbackUrl?: string,\n }): Promise<Result<undefined, KnownErrors[\"UserWithEmailAlreadyExists\"] | KnownErrors['PasswordRequirementsNotMet']>> {\n if (options.noVerificationCallback && options.verificationCallbackUrl) {\n throw new StackAssertionError(\"verificationCallbackUrl is not allowed when noVerificationCallback is true\");\n }\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n const emailVerificationRedirectUrl = options.noVerificationCallback ? undefined : options.verificationCallbackUrl ?? constructRedirectUrl(this.urls.emailVerification, \"verificationCallbackUrl\");\n\n let result = await this._interface.signUpWithCredential(\n options.email,\n options.password,\n emailVerificationRedirectUrl,\n session\n );\n\n // If the redirect URL is not whitelisted and we didn't explicitly opt out of verification,\n // retry with undefined (no email verification) and log a warning\n if (result.status === 'error' &&\n result.error instanceof KnownErrors.RedirectUrlNotWhitelisted &&\n !options.noVerificationCallback &&\n emailVerificationRedirectUrl !== undefined) {\n console.error(\"Warning: The verification callback URL is not trusted. Proceeding with signup without email verification. Please add your domain to the trusted domains list in your Stack Auth dashboard.\", { url: emailVerificationRedirectUrl });\n\n result = await this._interface.signUpWithCredential(\n options.email,\n options.password,\n undefined, // No email verification\n session\n );\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n if (!options.noRedirect) {\n await this.redirectToAfterSignUp({ replace: true });\n }\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n async _signUpAnonymously() {\n this._ensurePersistentTokenStore();\n\n if (!this._anonymousSignUpInProgress) {\n this._anonymousSignUpInProgress = (async () => {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n const result = await this._interface.signUpAnonymously(session);\n if (result.status === \"ok\") {\n await this._signInToAccountWithTokens(result.data);\n } else {\n throw new StackAssertionError(\"signUpAnonymously() should never return an error\");\n }\n this._anonymousSignUpInProgress = null;\n return result.data;\n })();\n }\n\n return await this._anonymousSignUpInProgress;\n }\n\n async signInWithMagicLink(code: string, options?: { noRedirect?: boolean }): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"] | KnownErrors[\"InvalidTotpCode\"]>> {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n return await this._interface.signInWithMagicLink(code, session);\n });\n } catch (e) {\n if (KnownErrors.InvalidTotpCode.isInstance(e)) {\n return Result.error(e);\n }\n throw e;\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n if (!(options?.noRedirect)) {\n if (result.data.newUser) {\n await this.redirectToAfterSignUp({ replace: true });\n } else {\n await this.redirectToAfterSignIn({ replace: true });\n }\n }\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n /**\n * Initiates a CLI authentication process that allows a command line application\n * to get a refresh token for a user's account.\n *\n * This process works as follows:\n * 1. The CLI app calls this method, which initiates the auth process with the server\n * 2. The server returns a polling code and a login code\n * 3. The CLI app opens a browser window to the appUrl with the login code as a parameter\n * 4. The user logs in through the browser and confirms the authorization\n * 5. The CLI app polls for the refresh token using the polling code\n *\n * @param options Options for the CLI login\n * @param options.appUrl The URL of the app that will handle the CLI auth confirmation\n * @param options.expiresInMillis Optional duration in milliseconds before the auth attempt expires (default: 2 hours)\n * @param options.maxAttempts Optional maximum number of polling attempts (default: Infinity)\n * @param options.waitTimeMillis Optional time to wait between polling attempts (default: 2 seconds)\n * @param options.promptLink Optional function to call with the login URL to prompt the user to open the browser\n * @returns Result containing either the refresh token or an error\n */\n async promptCliLogin(options: {\n appUrl: string,\n expiresInMillis?: number,\n maxAttempts?: number,\n waitTimeMillis?: number,\n promptLink?: (url: string) => void,\n }): Promise<Result<string, KnownErrors[\"CliAuthError\"] | KnownErrors[\"CliAuthExpiredError\"] | KnownErrors[\"CliAuthUsedError\"]>> {\n // Step 1: Initiate the CLI auth process\n const response = await this._interface.sendClientRequest(\n \"/auth/cli\",\n {\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n },\n body: JSON.stringify({\n expires_in_millis: options.expiresInMillis,\n }),\n },\n null\n );\n\n if (!response.ok) {\n return Result.error(new KnownErrors.CliAuthError(`Failed to initiate CLI auth: ${response.status} ${await response.text()}`));\n }\n\n const initResult = await response.json();\n const pollingCode = initResult.polling_code;\n const loginCode = initResult.login_code;\n\n // Step 2: Open the browser for the user to authenticate\n const url = `${options.appUrl}/handler/cli-auth-confirm?login_code=${encodeURIComponent(loginCode)}`;\n if (options.promptLink) {\n options.promptLink(url);\n } else {\n console.log(`Please visit the following URL to authenticate:\\n${url}`);\n }\n\n\n // Step 3: Poll for the token\n let attempts = 0;\n while (attempts < (options.maxAttempts ?? Infinity)) {\n attempts++;\n const pollResponse = await this._interface.sendClientRequest(\"/auth/cli/poll\", {\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n },\n body: JSON.stringify({\n polling_code: pollingCode,\n }),\n }, null);\n\n if (!pollResponse.ok) {\n return Result.error(new KnownErrors.CliAuthError(`Failed to initiate CLI auth: ${pollResponse.status} ${await pollResponse.text()}`));\n }\n const pollResult = await pollResponse.json();\n\n if (pollResponse.status === 201 && pollResult.status === \"success\") {\n return Result.ok(pollResult.refresh_token);\n }\n if (pollResult.status === \"waiting\") {\n await wait(options.waitTimeMillis ?? 2000);\n continue;\n }\n if (pollResult.status === \"expired\") {\n return Result.error(new KnownErrors.CliAuthExpiredError(\"CLI authentication request expired. Please try again.\"));\n }\n if (pollResult.status === \"used\") {\n return Result.error(new KnownErrors.CliAuthUsedError(\"This authentication token has already been used.\"));\n }\n return Result.error(new KnownErrors.CliAuthError(`Unexpected status from CLI auth polling: ${pollResult.status}`));\n }\n\n return Result.error(new KnownErrors.CliAuthError(\"Timed out waiting for CLI authentication.\"));\n }\n\n /*\n * Completes the MFA sign-in process by verifying the provided OTP code\n * @param totp The TOTP (Time-based One-Time Password) provided by the user\n * @param code The Attempt code provided by the user\n * @param options Additional options for the sign-in process\n * @returns A Result indicating success or failure\n */\n async signInWithMfa(totp: string, code: string, options?: { noRedirect?: boolean }): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"] | KnownErrors[\"InvalidTotpCode\"]>> {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n return await this._interface.signInWithMfa(totp, code, session);\n });\n } catch (e) {\n if (e instanceof KnownErrors.InvalidTotpCode) {\n return Result.error(e);\n }\n throw e;\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n if (!(options?.noRedirect)) {\n if (result.data.newUser) {\n await this.redirectToAfterSignUp({ replace: true });\n } else {\n await this.redirectToAfterSignIn({ replace: true });\n }\n }\n return Result.ok(undefined);\n }\n return Result.error(result.error);\n }\n\n async signInWithPasskey(): Promise<Result<undefined, KnownErrors[\"PasskeyAuthenticationFailed\"] | KnownErrors[\"InvalidTotpCode\"] | KnownErrors[\"PasskeyWebAuthnError\"]>> {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n const initiationResult = await this._interface.initiatePasskeyAuthentication({}, session);\n if (initiationResult.status !== \"ok\") {\n return Result.error(new KnownErrors.PasskeyAuthenticationFailed(\"Failed to get initiation options for passkey authentication\"));\n }\n\n const { options_json, code } = initiationResult.data;\n\n // HACK: Override the rpID to be the actual domain\n if (options_json.rpId !== \"THIS_VALUE_WILL_BE_REPLACED.example.com\") {\n throw new StackAssertionError(`Expected returned RP ID from server to equal sentinel, but found ${options_json.rpId}`);\n }\n options_json.rpId = window.location.hostname;\n\n const authentication_response = await startAuthentication({ optionsJSON: options_json });\n return await this._interface.signInWithPasskey({ authentication_response, code }, session);\n });\n } catch (error) {\n if (error instanceof WebAuthnError) {\n return Result.error(new KnownErrors.PasskeyWebAuthnError(error.message, error.name));\n } else {\n // This should never happen\n return Result.error(new KnownErrors.PasskeyAuthenticationFailed(\"Failed to sign in with passkey\"));\n }\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n await this.redirectToAfterSignIn({ replace: true });\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n\n async callOAuthCallback() {\n if (typeof window === \"undefined\") {\n throw new Error(\"callOAuthCallback can currently only be called in a browser environment\");\n }\n this._ensurePersistentTokenStore();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n return await callOAuthCallback(this._interface, this.urls.oauthCallback);\n });\n } catch (e) {\n if (KnownErrors.InvalidTotpCode.isInstance(e)) {\n alert(\"Invalid TOTP code. Please try signing in again.\");\n return false;\n } else {\n throw e;\n }\n }\n if (result.status === 'ok' && result.data) {\n await this._signInToAccountWithTokens(result.data);\n // TODO fix afterCallbackRedirectUrl for MFA (currently not passed because /mfa/sign-in doesn't return it)\n // or just get rid of afterCallbackRedirectUrl entirely tbh\n if (\"afterCallbackRedirectUrl\" in result.data && result.data.afterCallbackRedirectUrl) {\n await this._redirectTo({ url: result.data.afterCallbackRedirectUrl, replace: true });\n return true;\n } else if (result.data.newUser) {\n await this.redirectToAfterSignUp({ replace: true });\n return true;\n } else {\n await this.redirectToAfterSignIn({ replace: true });\n return true;\n }\n }\n return false;\n }\n\n protected async _signOut(session: InternalSession, options?: { redirectUrl?: URL | string }): Promise<void> {\n await storeLock.withWriteLock(async () => {\n await this._interface.signOut(session);\n if (options?.redirectUrl) {\n await this._redirectTo({ url: options.redirectUrl, replace: true });\n } else {\n await this.redirectToAfterSignOut();\n }\n });\n }\n\n async signOut(options?: { redirectUrl?: URL | string, tokenStore?: TokenStoreInit }): Promise<void> {\n const user = await this.getUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n await user.signOut({ redirectUrl: options?.redirectUrl });\n }\n }\n\n async getAccessToken(options?: { tokenStore?: TokenStoreInit }): Promise<string | null> {\n const user = await this.getUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return await user.getAccessToken();\n }\n return null;\n }\n\n useAccessToken(options?: { tokenStore?: TokenStoreInit }): string | null {\n const user = this.useUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return user.useAccessToken();\n }\n return null;\n }\n\n async getRefreshToken(options?: { tokenStore?: TokenStoreInit }): Promise<string | null> {\n const user = await this.getUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return await user.getRefreshToken();\n }\n return null;\n }\n\n useRefreshToken(options?: { tokenStore?: TokenStoreInit }): string | null {\n const user = this.useUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return user.useRefreshToken();\n }\n return null;\n }\n\n async getAuthHeaders(options?: { tokenStore?: TokenStoreInit }): Promise<{ \"x-stack-auth\": string }> {\n return {\n \"x-stack-auth\": JSON.stringify(await this.getAuthJson(options)),\n };\n }\n\n useAuthHeaders(options?: { tokenStore?: TokenStoreInit }): { \"x-stack-auth\": string } {\n return {\n \"x-stack-auth\": JSON.stringify(this.useAuthJson(options)),\n };\n }\n\n async getAuthJson(options?: { tokenStore?: TokenStoreInit }): Promise<{ accessToken: string | null, refreshToken: string | null }> {\n const user = await this.getUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return await user.getAuthJson();\n }\n return { accessToken: null, refreshToken: null };\n }\n\n useAuthJson(options?: { tokenStore?: TokenStoreInit }): { accessToken: string | null, refreshToken: string | null } {\n const user = this.useUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return user.useAuthJson();\n }\n return { accessToken: null, refreshToken: null };\n }\n\n async getProject(): Promise<Project> {\n const crud = Result.orThrow(await this._currentProjectCache.getOrWait([], \"write-only\"));\n return this._clientProjectFromCrud(crud);\n }\n\n useProject(): Project {\n const crud = useAsyncCache(this._currentProjectCache, [], \"clientApp.useProject()\");\n return useMemo(() => this._clientProjectFromCrud(crud), [crud]);\n }\n\n protected async _listOwnedProjects(session: InternalSession): Promise<AdminOwnedProject[]> {\n this._ensureInternalProject();\n const crud = Result.orThrow(await this._ownedProjectsCache.getOrWait([session], \"write-only\"));\n return crud.map((j) => this._getOwnedAdminApp(j.id, session)._adminOwnedProjectFromCrud(\n j,\n () => this._refreshOwnedProjects(session),\n ));\n }\n\n protected _useOwnedProjects(session: InternalSession): AdminOwnedProject[] {\n this._ensureInternalProject();\n const projects = useAsyncCache(this._ownedProjectsCache, [session], \"clientApp.useOwnedProjects()\");\n return useMemo(() => projects.map((j) => this._getOwnedAdminApp(j.id, session)._adminOwnedProjectFromCrud(\n j,\n () => this._refreshOwnedProjects(session),\n )), [projects]);\n }\n protected async _createProject(session: InternalSession, newProject: AdminProjectUpdateOptions & { displayName: string, teamId: string }): Promise<AdminOwnedProject> {\n this._ensureInternalProject();\n const crud = await this._interface.createProject(adminProjectCreateOptionsToCrud(newProject), session);\n const res = this._getOwnedAdminApp(crud.id, session)._adminOwnedProjectFromCrud(\n crud,\n () => this._refreshOwnedProjects(session),\n );\n await this._refreshOwnedProjects(session);\n return res;\n }\n\n protected async _refreshUser(session: InternalSession) {\n // TODO this should take a user ID instead of a session, and automatically refresh all sessions with that user ID\n await this._refreshSession(session);\n }\n\n protected async _refreshSession(session: InternalSession) {\n await this._currentUserCache.refresh([session]);\n // Suggest updating the access token so it contains the updated user/session data\n session.suggestAccessTokenExpired();\n }\n\n protected async _refreshUsers() {\n // nothing yet\n }\n\n protected async _refreshProject() {\n await this._currentProjectCache.refresh([]);\n }\n\n protected async _refreshOwnedProjects(session: InternalSession) {\n await this._ownedProjectsCache.refresh([session]);\n }\n\n static get [stackAppInternalsSymbol]() {\n return {\n fromClientJson: <HasTokenStore extends boolean, ProjectId extends string>(\n json: StackClientAppJson<HasTokenStore, ProjectId>\n ): StackClientApp<HasTokenStore, ProjectId> => {\n const providedCheckString = JSON.stringify(omit(json, [/* none currently */]));\n const existing = allClientApps.get(json.uniqueIdentifier);\n if (existing) {\n const [existingCheckString, clientApp] = existing;\n if (existingCheckString !== undefined && existingCheckString !== providedCheckString) {\n throw new StackAssertionError(\"The provided app JSON does not match the configuration of the existing client app with the same unique identifier\", { providedObj: json, existingString: existingCheckString });\n }\n return clientApp as any;\n }\n\n return new _StackClientAppImplIncomplete<HasTokenStore, ProjectId>({\n ...omit(json, [\"uniqueIdentifier\"]) as any,\n }, {\n uniqueIdentifier: json.uniqueIdentifier,\n checkString: providedCheckString,\n });\n }\n };\n }\n\n get [stackAppInternalsSymbol]() {\n return {\n toClientJson: (): StackClientAppJson<HasTokenStore, ProjectId> => {\n if (!(\"publishableClientKey\" in this._interface.options)) {\n // TODO find a way to do this\n throw new StackAssertionError(\"Cannot serialize to JSON from an application without a publishable client key\");\n }\n\n if (typeof this._redirectMethod !== \"string\") {\n throw new StackAssertionError(\"Cannot serialize to JSON from an application with a non-string redirect method\");\n }\n\n return {\n baseUrl: this._options.baseUrl,\n projectId: this.projectId,\n publishableClientKey: this._interface.options.publishableClientKey,\n tokenStore: this._tokenStoreInit,\n urls: this._urlOptions,\n oauthScopesOnSignIn: this._oauthScopesOnSignIn,\n uniqueIdentifier: this._getUniqueIdentifier(),\n redirectMethod: this._redirectMethod,\n extraRequestHeaders: this._options.extraRequestHeaders,\n };\n },\n setCurrentUser: (userJsonPromise: Promise<CurrentUserCrud['Client']['Read'] | null>) => {\n runAsynchronously(async () => {\n await this._currentUserCache.forceSetCachedValueAsync([await this._getSession()], Result.fromPromise(userJsonPromise));\n });\n },\n getConstructorOptions: () => this._options,\n sendRequest: async (\n path: string,\n requestOptions: RequestInit,\n requestType: \"client\" | \"server\" | \"admin\" = \"client\",\n ) => {\n return await this._interface.sendClientRequest(path, requestOptions, await this._getSession(), requestType);\n },\n };\n };\n}\n"],"mappings":";AAIA,SAAS,eAAe,qBAAqB,yBAAyB;AACtE,SAAS,aAAa,4BAA4B;AAiBlD,SAAS,uBAAuB;AAChC,SAAS,oBAAoB;AAE7B,SAAS,qBAAqB;AAC9B,SAAS,qBAAqB,cAAc,gBAAgB;AAC5D,SAAS,iBAAiB;AAC1B,SAAS,uBAAuB;AAEhC,SAAS,iBAAiB,YAAY;AACtC,SAAS,cAAc,mBAAmB,YAAY;AACtD,SAAS,SAAS,cAAc,WAAW;AAC3C,SAAS,cAAc;AACvB,SAAS,OAAO,iBAAiB;AACjC,SAAS,UAAU,yBAAyB;AAC5C,SAAS,iBAAiB,kBAAkB;AAC5C,SAAS,oBAAoB;AAC7B,YAAY,YAAY;AACxB,OAAO,SAAS,aAAa,eAAe;AAE5C,SAAS,4BAA4B;AACrC,SAAS,4BAA4B,mBAAmB,uBAAuB;AAC/E,SAAuB,2BAA2B,oBAAoB,+BAA+B,cAAc,oBAAoB,YAAY,uBAAuB,mBAAmB,+BAA+B;AAC5N,SAA6D,mCAAmC;AAChG,SAA2K,+BAA+B;AAE1M,SAAmF,mCAAmC,yCAAyC;AAI/J,SAAgE,uCAAuC;AACvG,SAA0G,yBAAyB,+BAA+B;AAClK,SAA8K,yBAAyB,gCAAgC;AAGvO,SAAsB,eAAe,aAAa,sBAAsB,uBAAuB,YAAY,+BAA+B,qBAAqB,gCAAgC,SAAS,iCAAiC;AAEzO,SAAS,qBAAqB;AAE9B,IAAI,gBAAgB;AAGpB,IAAM,UAAW,WAAmB,WAAW,EAAE,KAAK,CAAC,EAAE;AAGzD,IAAM,gBAAgB,oBAAI,IAA8E;AAIjG,IAAM,iCAAN,MAAM,+BAAoJ;AAAA,EAoT/J,YAAY,SAAqE,cAAsG;AAxSvL,SAAU,oBAAwC;AAOlD,SAAQ,mCAAmC;AAC3C,SAAiB,kBAAkB,IAAI,gBAAwF;AAE/H,SAAiB,oBAAoB,qBAAqB,OAAO,YAAY;AAC3E,UAAI,KAAK,kCAAkC;AACzC,cAAM,KAAK,GAAI;AAAA,MACjB;AACA,UAAI,QAAQ,mBAAmB,GAAG;AAiBhC,eAAO;AAAA,MACT;AACA,aAAO,MAAM,KAAK,WAAW,qBAAqB,OAAO;AAAA,IAC3D,CAAC;AACD,SAAiB,uBAAuB,YAAY,YAAY;AAC9D,aAAO,OAAO,QAAQ,MAAM,KAAK,WAAW,iBAAiB,CAAC;AAAA,IAChE,CAAC;AACD,SAAiB,sBAAsB,qBAAqB,OAAO,YAAY;AAC7E,aAAO,MAAM,KAAK,WAAW,aAAa,OAAO;AAAA,IACnD,CAAC;AACD,SAAiB,+BAA+B,qBAG9C,OAAO,SAAS,CAAC,QAAQ,SAAS,MAAM;AACxC,aAAO,MAAM,KAAK,WAAW,+BAA+B,EAAE,QAAQ,UAAU,GAAG,OAAO;AAAA,IAC5F,CAAC;AACD,SAAiB,sCAAsC,qBAGrD,OAAO,SAAS,CAAC,SAAS,MAAM;AAChC,aAAO,MAAM,KAAK,WAAW,kCAAkC,EAAE,UAAU,GAAG,OAAO;AAAA,IACvF,CAAC;AACD,SAAiB,yBAAyB,qBAAqB,OAAO,YAAY;AAChF,aAAO,MAAM,KAAK,WAAW,qBAAqB,OAAO;AAAA,IAC3D,CAAC;AACD,SAAiB,+CAA+C;AAAA,MAC9D,OAAO,SAAS,CAAC,YAAY,KAAK,MAAM;AACtC,YAAI;AACF,gBAAM,SAAS,MAAM,KAAK,WAAW,0BAA0B,YAAY,SAAS,IAAI,OAAO;AAC/F,iBAAO,EAAE,aAAa,OAAO,aAAa;AAAA,QAC5C,SAAS,KAAK;AACZ,cAAI,EAAE,YAAY,wCAAwC,WAAW,GAAG,KAAK,YAAY,kCAAkC,WAAW,GAAG,IAAI;AAC3I,kBAAM;AAAA,UACR;AAAA,QACF;AACA,eAAO;AAAA,MACT;AAAA,IACF;AACA,SAAiB,mCAAmC;AAAA,MAClD,OAAO,SAAS,CAAC,YAAY,OAAO,QAAQ,MAAM;AAChD,eAAO,MAAM,KAAK,+BAA+B;AAAA,UAC/C,SAAS,YAAY,OAAO,QAAQ,MAAM,KAAK,kBAAkB,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AAAA,UACnG,qBAAqB,YAAY,OAAO,QAAQ,MAAM,KAAK,6CAA6C,UAAU,CAAC,SAAS,YAAY,SAAS,EAAE,GAAY,YAAY,CAAC;AAAA,UAC5K,eAAe,MAAM,cAAc,KAAK,8CAA8C,CAAC,SAAS,YAAY,SAAS,EAAE,GAAY,6BAA6B;AAAA,UAChK;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF,CAAC;AAAA,MACH;AAAA,IACF;AACA,SAAiB,2BAA2B;AAAA,MAC1C,OAAO,SAAS,CAAC,MAAM,MAAM;AAC3B,eAAO,MAAM,KAAK,WAAW,uBAAuB,EAAE,OAAO,GAAG,OAAO;AAAA,MACzE;AAAA,IACF;AACA,SAAiB,wBAAwB;AAAA,MACvC,OAAO,SAAS,CAAC,MAAM,MAAM;AAC3B,eAAO,MAAM,KAAK,WAAW,oBAAoB,EAAE,OAAO,GAAG,OAAO;AAAA,MACtE;AAAA,IACF;AACA,SAAiB,+BAA+B;AAAA,MAC9C,OAAO,SAAS,CAAC,MAAM,MAAM;AAC3B,eAAO,MAAM,KAAK,WAAW,qBAAqB,EAAE,QAAQ,QAAQ,KAAK,GAAG,OAAO;AAAA,MACrF;AAAA,IACF;AACA,SAAiB,8BAA8B;AAAA,MAC7C,OAAO,YAAY;AACjB,eAAO,MAAM,KAAK,WAAW,0BAA0B,OAAO;AAAA,MAChE;AAAA,IACF;AAEA,SAAiB,oBAAoB;AAAA,MACnC,OAAO,YAAY;AACjB,cAAM,UAAU,MAAM,KAAK,WAAW,mBAAmB,EAAE,SAAS,KAAK,GAAG,SAAS,QAAQ;AAC7F,eAAO;AAAA,MACT;AAAA,IACF;AAEA,SAAiB,oBAAoB;AAAA,MACnC,OAAO,SAAS,CAAC,MAAM,MAAM;AAC3B,cAAM,UAAU,MAAM,KAAK,WAAW,mBAAmB,EAAE,SAAS,OAAO,GAAG,SAAS,QAAQ;AAC/F,eAAO;AAAA,MACT;AAAA,IACF;AAEA,SAAiB,+BAA+B;AAAA,MAC9C,OAAO,YAAY;AACjB,cAAM,UAAU,MAAM,KAAK,WAAW,2BAA2B,OAAO;AACxE,eAAO;AAAA,MACT;AAAA,IACF;AAEA,SAAiB,kCAAkC;AAAA,MACjD,OAAO,YAAY;AACjB,eAAO,MAAM,KAAK,WAAW,mBAAmB,EAAE,SAAS,KAAK,GAAG,OAAO;AAAA,MAC5E;AAAA,IACF;AAEA,SAAiB,iBAAiB;AAAA,MAChC,OAAO,SAAS,CAAC,QAAQ,MAAM,MAAM;AACnC,eAAO,MAAM,KAAK,WAAW,QAAQ,EAAE,QAAQ,OAAO,GAAG,OAAO;AAAA,MAClE;AAAA,IACF;AAEA,SAAiB,iBAAiB;AAAA,MAChC,OAAO,SAAS,CAAC,QAAQ,MAAM,MAAM;AACnC,eAAO,MAAM,KAAK,WAAW,QAAQ,EAAE,QAAQ,OAAO,GAAG,OAAO;AAAA,MAClE;AAAA,IACF;AAEA,SAAiB,mBAAmB;AAAA,MAClC,OAAO,SAAS,CAAC,kBAAkB,MAAM,MAAM;AAC7C,eAAO,MAAM,KAAK,WAAW,QAAQ,EAAE,kBAAkB,OAAO,GAAG,OAAO;AAAA,MAC5E;AAAA,IACF;AAEA,SAAiB,qBAAqB;AAAA,MACpC,OAAO,SAAS,CAAC,QAAQ,QAAQ,KAAK,MAAM;AAC1C,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,qBAAqB;AAAA,MACpC,OAAO,SAAS,CAAC,QAAQ,QAAQ,KAAK,MAAM;AAC1C,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,uBAAuB;AAAA,MACtC,OAAO,SAAS,CAAC,kBAAkB,QAAQ,KAAK,MAAM;AACpD,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,qBAAqB;AAAA,MACpC,OAAO,SAAS,CAAC,QAAQ,QAAQ,KAAK,MAAM;AAC1C,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,qBAAqB;AAAA,MACpC,OAAO,SAAS,CAAC,QAAQ,QAAQ,KAAK,MAAM;AAC1C,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,wBAAwB;AAAA,MAUvC,OAAO,SAAS,CAAC,cAAc,UAAU,MAAM;AAC7C,eAAO,MAAM,KAAK,WAAW,mBAAmB,cAAc,YAAY,OAAO;AAAA,MACnF;AAAA,IACF;AAEA,SAAiB,0BAA0B;AAAA,MACzC,OAAO,CAAC,GAAG,MAAM,MAAM,KAAK,0BAA0B,GAAU;AAAA,IAClE;AAEA,SAAiB,4BAA4B;AAAA,MAC3C,OAAO,CAAC,MAAM,MAAM,MAAM,KAAK,wBAAwB,MAAM;AAAA,IAC/D;AAEA,SAAQ,6BAA4F;AA8IpG,SAAU,oBAAoB,sBAAsB;AACpD,SAAU,gCAAgC,oBAAI,QAAoC;AAClF,SAAU,sBAAsB,oBAAI,QAAyC;AAC7E,SAAU,iCAA4D;AACtE,SAAQ,sCAA8C;AAmXtD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,SAAQ,qCAAqC,oBAAI,QAA0D;AA9bzG,UAAM,kBAAkB,0BAA0B,OAAO;AAEzD,QAAI,CAAC,+BAA8B,sBAAsB,OAAO;AAC9D,YAAM,IAAI,oBAAoB,2SAA2S;AAAA,IAC3U;AAEA,SAAK,WAAW;AAChB,SAAK,gBAAgB;AAErB,UAAM,YAAY,gBAAgB,aAAa,oBAAoB;AACnE,QAAI,cAAc,cAAc,CAAE,UAAU,MAAM,6EAA6E,GAAI;AACjI,YAAM,IAAI,MAAM,uBAAuB,SAAS,4FAA4F;AAAA,IAC9I;AAEA,QAAI,gBAAgB,aAAa,WAAW;AAC1C,WAAK,aAAa,aAAa;AAAA,IACjC,OAAO;AACL,WAAK,aAAa,IAAI,qBAAqB;AAAA,QACzC,YAAY,MAAM,WAAW,gBAAgB,OAAO;AAAA,QACpD,qBAAqB,gBAAgB,uBAAuB,8BAA8B;AAAA,QAC1F;AAAA,QACA;AAAA,QACA,sBAAsB,gBAAgB,wBAAwB,+BAA+B;AAAA,QAC7F,gBAAgB,YAAY;AAAA,QAC5B;AAAA,MACF,CAAC;AAAA,IACH;AAEA,SAAK,kBAAkB,gBAAgB;AACvC,SAAK,kBAAkB,gBAAgB,kBAAkB;AACzD,SAAK,cAAc,gBAAgB,QAAQ,CAAC;AAC5C,SAAK,uBAAuB,gBAAgB,uBAAuB,CAAC;AAEpE,QAAI,gBAAgB,aAAa,kBAAkB;AACjD,WAAK,oBAAoB,aAAa;AACtC,WAAK,sBAAsB;AAAA,IAC7B;AAAA,EACF;AAAA,EA1GA,MAAgB,sBAA6C;AAC3D,QAAI,KAAK,oBAAoB,mBAAmB,KAAK,oBAAoB,UAAU;AACjF,aAAO,MAAM,mBAAmB;AAAA,IAClC,OAAO;AACL,aAAO,MAAM,8BAA8B;AAAA,IAC7C;AAAA,EACF;AAAA,EAEA,MAAgB,+BAA+B,SAMmC;AAChF,UAAM,OAAO,MAAM,QAAQ,QAAQ;AACnC,QAAI,gBAAgB;AACpB,QAAI,CAAC,QAAQ,CAAC,KAAK,gBAAgB,KAAK,CAAC,MAAM,EAAE,OAAO,QAAQ,UAAU,GAAG;AAC3E,sBAAgB;AAAA,IAClB;AAEA,UAAM,QAAQ,MAAM,QAAQ,oBAAoB;AAChD,QAAI,CAAC,OAAO;AACV,sBAAgB;AAAA,IAClB;AAEA,QAAI,CAAC,iBAAiB,QAAQ,UAAU;AACtC,UAAI,CAAC,QAAQ,SAAS;AACpB,cAAM,IAAI,MAAM;AAAA;AAAA;AAAA;AAAA,SAIf;AAAA,MACH;AACA,YAAM;AAAA,QACJ,KAAK;AAAA,QACL;AAAA,UACE,UAAU,QAAQ;AAAA,UAClB,aAAa,KAAK,KAAK;AAAA,UACvB,kBAAkB,KAAK,KAAK;AAAA,UAC5B,eAAe,kBAAkB,QAAQ,SAAS,KAAK,KAAK,qBAAqB,QAAQ,UAAU,KAAK,CAAC,GAAG,KAAK,GAAG,CAAC;AAAA,QACvH;AAAA,QACA,QAAQ;AAAA,MACV;AACA,aAAO,MAAM,aAAa;AAAA,IAC5B,WAAW,CAAC,eAAe;AACzB,aAAO;AAAA,IACT;AAEA,WAAO;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,MAAM,iBAAiB;AACrB,cAAM,SAAS,MAAM,QAAQ,oBAAoB;AACjD,YAAI,CAAC,QAAQ;AACX,gBAAM,IAAI,oBAAoB,2BAA2B;AAAA,QAC3D;AACA,eAAO;AAAA,MACT;AAAA,MACA,iBAAiB;AACf,cAAM,SAAS,QAAQ,cAAc;AACrC,YAAI,CAAC,QAAQ;AACX,gBAAM,IAAI,oBAAoB,2BAA2B;AAAA,QAC3D;AACA,eAAO;AAAA,MACT;AAAA,IACF;AAAA,EACF;AAAA,EA0CU,wBAAwB;AAChC,QAAI,CAAC,KAAK,mBAAmB;AAC3B,YAAM,IAAI,oBAAoB,mCAAmC;AAAA,IACnE;AACA,QAAI,cAAc,IAAI,KAAK,iBAAiB,GAAG;AAC7C,YAAM,IAAI,oBAAoB,mEAAmE;AAAA,IACnG;AACA,kBAAc,IAAI,KAAK,mBAAmB,CAAC,KAAK,eAAe,eAAe,QAAW,IAAI,CAAC;AAAA,EAChG;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOU,uBAAuB;AAC/B,QAAI,CAAC,KAAK,mBAAmB;AAC3B,WAAK,oBAAoB,aAAa;AACtC,WAAK,sBAAsB;AAAA,IAC7B;AACA,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,MAAgB,qBAAqB,MAAc,SAAc;AAC/D,WAAO,MAAM,KAAK,WAAW,oBAAoB,EAAE,GAAG,SAAS,KAAK,CAAC;AAAA,EACvE;AAAA,EAEU,wBAAwB,MAAc,SAAqB;AACnE,sBAAkB,KAAK,qBAAqB,MAAM,OAAO,CAAC;AAC1D,UAAM,IAAI,oBAAoB,GAAG,IAAI,sFAAsF;AAAA,EAC7H;AAAA,EAOA,IAAc,gCAAgC;AAC5C,WAAO,iBAAiB,KAAK,SAAS;AAAA,EACxC;AAAA,EACA,IAAc,0BAA0B;AACtC,WAAO,iBAAiB,KAAK,SAAS;AAAA,EACxC;AAAA,EACQ,2CAA2C,QAAyB;AAC1E,WAAO,GAAG,SAAS,YAAY,EAAE,GAAG,KAAK,uBAAuB;AAAA,EAClE;AAAA,EACQ,4BAA4B,QAAwB;AAC1D,UAAM,UAAU,aAAa,IAAI,YAAY,EAAE,OAAO,OAAO,YAAY,CAAC,CAAC;AAC3E,WAAO,GAAG,KAAK,uBAAuB,YAAY,OAAO;AAAA,EAC3D;AAAA,EACQ,0BAA0B,cAAsB,WAA2B;AACjF,WAAO,KAAK,UAAU;AAAA,MACpB,eAAe;AAAA,MACf,mBAAmB;AAAA,IACrB,CAAC;AAAA,EACH;AAAA,EACQ,yBAAyB,cAA6B,aAA2C;AACvG,WAAO,gBAAgB,cAAc,KAAK,UAAU,CAAC,cAAc,WAAW,CAAC,IAAI;AAAA,EACrF;AAAA,EACQ,8BAA8B,OAAsF;AAC1H,QAAI,CAAC,OAAO;AACV,aAAO;AAAA,IACT;AACA,UAAM,SAAS,UAAU,KAAK;AAC9B,QAAI,OAAO,WAAW,QAAQ,OAAO,OAAO,SAAS,YAAY,OAAO,SAAS,MAAM;AACrF,cAAQ,KAAK,2CAA2C;AACxD,aAAO;AAAA,IACT;AACA,UAAM,OAAO,OAAO;AACpB,UAAM,eAAe,mBAAmB,QAAQ,OAAO,KAAK,kBAAkB,WAAW,KAAK,gBAAgB;AAC9G,UAAM,YAAY,uBAAuB,QAAQ,OAAO,KAAK,sBAAsB,WAAW,KAAK,oBAAoB;AACvH,QAAI,CAAC,cAAc;AACjB,cAAQ,KAAK,sDAAsD;AACnE,aAAO;AAAA,IACT;AACA,WAAO;AAAA,MACL;AAAA,MACA;AAAA,IACF;AAAA,EAEF;AAAA,EACQ,kCAAkC,SAAoF;AAC5H,UAAM,EAAE,aAAa,mBAAmB,IAAI,KAAK,mCAAmC;AACpF,eAAW,QAAQ,aAAa;AAC9B,YAAM,QAAQ,QAAQ,IAAI;AAC1B,UAAI,OAAO;AACT,eAAO,EAAE,cAAc,OAAO,WAAW,KAAK;AAAA,MAChD;AAAA,IACF;AAEA,QAAI,WAAsE;AAC1E,eAAW,CAAC,MAAM,KAAK,KAAK,OAAO,QAAQ,OAAO,GAAG;AACnD,UAAI,CAAC,mBAAmB,KAAK,YAAU,KAAK,WAAW,MAAM,CAAC,EAAG;AACjE,YAAM,SAAS,KAAK,8BAA8B,KAAK;AACvD,UAAI,CAAC,OAAQ;AACb,YAAM,qBAAqB,OAAO,aAAa,OAAO;AACtD,YAAM,oBAAoB,UAAU,aAAa,OAAO;AACxD,UAAI,CAAC,YAAY,qBAAqB,mBAAmB;AACvD,mBAAW;AAAA,MACb;AAAA,IACF;AAEA,QAAI,CAAC,UAAU;AACb,aAAO,EAAE,cAAc,MAAM,WAAW,KAAK;AAAA,IAC/C;AAEA,WAAO;AAAA,MACL,cAAc,SAAS;AAAA,MACvB,WAAW,SAAS,aAAa;AAAA,IACnC;AAAA,EACF;AAAA,EACU,sBAAsB,SAAsC;AACpE,UAAM,EAAE,aAAa,IAAI,KAAK,kCAAkC,OAAO;AACvE,UAAM,oBAAoB,QAAQ,KAAK,sBAAsB,KAAK;AAClE,QAAI,cAA6B;AACjC,QAAI,qBAAqB,kBAAkB,WAAW,IAAK,GAAG;AAC5D,YAAM,SAAS,UAAU,iBAAiB;AAC1C,UACE,OAAO,WAAW,QAClB,OAAO,OAAO,SAAS,YACvB,OAAO,SAAS,QAChB,MAAM,QAAQ,OAAO,IAAI,KACzB,OAAO,KAAK,WAAW,KACvB,OAAO,OAAO,KAAK,CAAC,MAAM,YAC1B,OAAO,OAAO,KAAK,CAAC,MAAM,UAC1B;AACA,YAAI,OAAO,KAAK,CAAC,MAAM,cAAc;AACnC,wBAAc,OAAO,KAAK,CAAC;AAAA,QAC7B;AAAA,MACF,OAAO;AACL,gBAAQ,KAAK,wCAAwC;AAAA,MACvD;AAAA,IACF;AACA,WAAO;AAAA,MACL;AAAA,MACA;AAAA,IACF;AAAA,EACF;AAAA,EACA,IAAc,yBAAyB;AAKrC,WAAO;AAAA,EACT;AAAA,EACQ,wBAAwC;AAC9C,QAAI,CAAC,cAAc,GAAG;AACpB,YAAM,IAAI,oBAAoB,2CAA2C;AAAA,IAC3E;AACA,WAAc,mBAAY,SAAS,UAAU,EAAE;AAAA,EACjD;AAAA,EACQ,qCAA8F;AACpG,WAAO;AAAA,MACL,aAAa,CAAC,KAAK,+BAA+B,eAAe;AAAA,MACjE,oBAAoB;AAAA,QAClB,GAAG,KAAK,uBAAuB;AAAA,QAC/B,UAAU,KAAK,uBAAuB;AAAA,MACxC;AAAA,IACF;AAAA,EACF;AAAA,EACQ,gCAAgC,SAAsC;AAC5E,UAAM,EAAE,aAAa,mBAAmB,IAAI,KAAK,mCAAmC;AACpF,UAAM,QAAQ,oBAAI,IAAY;AAC9B,eAAW,QAAQ,aAAa;AAC9B,UAAI,QAAQ,IAAI,GAAG;AACjB,cAAM,IAAI,IAAI;AAAA,MAChB;AAAA,IACF;AACA,eAAW,QAAQ,OAAO,KAAK,OAAO,GAAG;AACvC,UAAI,mBAAmB,KAAK,YAAU,KAAK,WAAW,MAAM,CAAC,GAAG;AAC9D,cAAM,IAAI,IAAI;AAAA,MAChB;AAAA,IACF;AACA,WAAO;AAAA,EACT;AAAA,EACQ,4BACN,iBACA,cACA,aACA,mBACA;AACA,UAAM,cAAc,KAAK,gCAAgC,eAAe;AACxE,gBAAY,OAAO,iBAAiB;AACpC,UAAM,YAAY,eAAe,KAAK,IAAI,IAAI;AAC9C,UAAM,qBAAqB,gBAAgB,cAAc,OAAO,KAAK,0BAA0B,cAAc,SAAS,IAAI;AAC1H,UAAM,qBAAqB,KAAK,yBAAyB,cAAc,WAAW;AAClF,WAAO;AAAA,MACL;AAAA,MACA;AAAA,MACA;AAAA,MACA,qBAAqB,CAAC,GAAG,WAAW;AAAA,IACtC;AAAA,EACF;AAAA,EACQ,gCAAgC,cAA6B,WAA0B,SAA+B;AAC5H,sBAAkB,YAAY;AAC5B,WAAK;AACL,YAAM,cAAc,KAAK;AACzB,UAAI;AACJ,UAAI,cAAc,GAAG;AACnB,mBAAW,OAAO,SAAS;AAAA,MAC7B;AACA,UAAI,CAAC,UAAU;AACb,gBAAQ,KAAK,8DAA8D;AAC3E;AAAA,MACF;AACA,YAAM,SAAS,MAAM,KAAK,0BAA0B,UAAU,CAAC,QAAQ,GAAG,YAAY;AAEtF,YAAM,gBAAgB,EAAE,QAAQ,KAAK,KAAK,KAAK,KAAK,uBAAuB,KAAK;AAChF,YAAM,YAAY,OAAO,cAAsBA,WAAyB;AACtE,cAAM,OAAO,KAAK,4BAA4B,YAAY;AAC1D,cAAM,UAAU,EAAE,GAAG,eAAe,QAAQ,aAAa;AACzD,YAAI,YAAY,WAAW;AACzB,kCAAwB,MAAMA,QAAO,OAAO;AAAA,QAC9C,OAAO;AACL,gBAAM,kBAAkB,MAAMA,QAAO,OAAO;AAAA,QAC9C;AAAA,MACF;AAEA,UAAI,OAAO,WAAW,WAAW,CAAC,OAAO,QAAQ,gBAAgB,KAAK,qCAAqC;AACzG;AAAA,MACF;AACA,YAAM,QAAQ,gBAAgB,YAAY,KAAK,0BAA0B,cAAc,SAAS,IAAI;AACpG,YAAM,UAAU,OAAO,MAAM,KAAK;AAClC,YAAM,WAAW,MAAM,sBAAsB;AAC7C,YAAM,kBAAkB,KAAK,2CAA2C,QAAQ,GAAG,MAAM,aAAa;AAAA,IACxG,CAAC;AAAA,EACH;AAAA,EACA,MAAc,wBAAwB,eAA+C;AACnF,UAAM,UAAU,OAAO,QAAQ,MAAM,KAAK,WAAW,iBAAiB,CAAC;AACvE,UAAM,UAAU,QAAQ,OAAO,QAAQ,IAAI,OAAK,EAAE,OAAO,KAAK,EAAE,QAAQ,gBAAgB,EAAE,EAAE,MAAM,GAAG,EAAE,CAAC,GAAG,YAAY,CAAC;AACxH,UAAM,mBAAmB,QAAQ,OAAO,OAAK,EAAE,WAAW,KAAK,CAAC;AAChE,UAAM,QAAQ,cAAc,MAAM,GAAG;AACrC,aAAS,IAAI,MAAM,SAAS,GAAG,KAAK,GAAG,KAAK;AAC1C,YAAM,eAAe,MAAM,MAAM,CAAC,EAAE,KAAK,GAAG;AAC5C,UAAI,QAAQ,SAAS,YAAY,KAAK,iBAAiB,SAAS,QAAQ,YAAY,GAAG;AACrF,eAAO;AAAA,MACT;AAAA,IACF;AAEA,WAAO;AAAA,EACT;AAAA,EAEU,8BAAkD;AAC1D,QAAI,CAAC,cAAc,GAAG;AACpB,YAAM,IAAI,MAAM,8CAA8C;AAAA,IAChE;AAEA,QAAI,KAAK,mCAAmC,MAAM;AAChD,YAAM,kBAAkB,CAAC,QAA4B;AACnD,cAAM,SAAS,KAAK,sBAAsB,KAAK,sBAAsB,CAAC;AACtE,eAAO;AAAA,UACL,cAAc,OAAO;AAAA,UACrB,aAAa,OAAO,gBAAgB,KAAK,iBAAiB,OAAO,eAAe,IAAI,cAAc;AAAA,QACpG;AAAA,MACF;AACA,WAAK,iCAAiC,IAAI,MAAmB,gBAAgB,IAAI,CAAC;AAClF,UAAI,wBAAwB;AAE5B,kBAAY,MAAM;AAChB,YAAI,uBAAuB;AACzB,gBAAM,WAAW,KAAK,+BAAgC,IAAI;AAC1D,gBAAM,eAAe,gBAAgB,QAAQ;AAC7C,cAAI,CAAC,gBAAgB,cAAc,QAAQ,GAAG;AAC5C,iBAAK,+BAAgC,IAAI,YAAY;AAAA,UACvD;AAAA,QACF;AAAA,MACF,GAAG,GAAG;AACN,WAAK,+BAA+B,SAAS,CAAC,UAAU;AACtD,YAAI;AACF,gBAAM,eAAe,MAAM;AAC3B,gBAAM,SAAS,OAAO,SAAS,aAAa;AAC5C,gBAAM,cAAc,KAAK,2CAA2C,MAAM;AAC1E,gBAAM,EAAE,WAAW,oBAAoB,oBAAoB,oBAAoB,IAAI,KAAK;AAAA,YACtF,KAAK,sBAAsB;AAAA,YAC3B;AAAA,YACA,MAAM,eAAe;AAAA,YACrB;AAAA,UACF;AACA,kCAAwB,aAAa,oBAAoB,EAAE,QAAQ,KAAK,KAAK,KAAK,KAAK,OAAO,CAAC;AAC/F,kCAAwB,KAAK,wBAAwB,oBAAoB,EAAE,QAAQ,KAAK,KAAK,GAAG,CAAC;AACjG,8BAAoB,QAAQ,CAAC,SAAS,mBAAmB,MAAM,CAAC,CAAC,CAAC;AAClE,eAAK,gCAAgC,cAAc,WAAW,SAAS;AACvE,kCAAwB;AAAA,QAC1B,SAAS,GAAG;AACV,cAAI,CAAC,cAAc,GAAG;AAEpB,oCAAwB;AAAA,UAC1B,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF,CAAC;AAAA,IACH;AAEA,WAAO,KAAK;AAAA,EACd;AAAA,EACU,uBAAuB,cAA4B,wBAA6D;AACxH,UAAM,iBAAiB,2BAA2B,SAAY,KAAK,kBAAkB;AAErF,YAAQ,gBAAgB;AAAA,MACtB,KAAK,UAAU;AACb,eAAO,KAAK,4BAA4B;AAAA,MAC1C;AAAA,MACA,KAAK,iBAAiB;AACpB,YAAI,cAAc,GAAG;AACnB,iBAAO,KAAK,4BAA4B;AAAA,QAC1C,OAAO;AACL,gBAAM,SAAS,KAAK,sBAAsB,aAAa,OAAO,CAAC;AAC/D,gBAAM,QAAQ,IAAI,MAAmB,MAAM;AAC3C,gBAAM,SAAS,CAAC,UAAU;AACxB,8BAAkB,YAAY;AAY5B,oBAAM,eAAe,MAAM;AAC3B,oBAAM,SAAS,MAAM,sBAAsB;AAC3C,oBAAM,cAAc,KAAK,2CAA2C,MAAM;AAC1E,oBAAM,EAAE,WAAW,oBAAoB,oBAAoB,oBAAoB,IAAI,KAAK;AAAA,gBACtF,aAAa,OAAO;AAAA,gBACpB;AAAA,gBACA,MAAM,eAAe;AAAA,gBACrB;AAAA,cACF;AACA,oBAAM,QAAQ,IAAI;AAAA,gBAChB,kBAAkB,aAAa,oBAAoB,EAAE,QAAQ,KAAK,KAAK,KAAK,KAAK,uBAAuB,KAAK,CAAC;AAAA,gBAC9G,kBAAkB,KAAK,wBAAwB,oBAAoB,EAAE,QAAQ,KAAK,KAAK,IAAI,uBAAuB,KAAK,CAAC;AAAA,cAC1H,CAAC;AACD,kBAAI,oBAAoB,SAAS,GAAG;AAClC,sBAAM,QAAQ;AAAA,kBACZ,oBAAoB;AAAA,oBAAI,CAAC,SACvB,aAAa,MAAM,EAAE,uBAAuB,KAAK,CAAC;AAAA,kBACpD;AAAA,gBACF;AAAA,cACF;AACA,mBAAK,gCAAgC,cAAc,WAAW,QAAQ;AAAA,YACxE,CAAC;AAAA,UACH,CAAC;AACD,iBAAO;AAAA,QACT;AAAA,MACF;AAAA,MACA,KAAK,UAAU;AACb,eAAO,KAAK;AAAA,MACd;AAAA,MACA,SAAS;AACP,YAAI,mBAAmB,MAAM;AAC3B,iBAAO,sBAAsB;AAAA,QAC/B,WAAW,OAAO,mBAAmB,YAAY,aAAa,gBAAgB;AAC5E,cAAI,KAAK,oBAAoB,IAAI,cAAc,EAAG,QAAO,KAAK,oBAAoB,IAAI,cAAc;AAGpG,gBAAM,kBAAkB,eAAe,QAAQ,IAAI,cAAc;AACjE,cAAI,iBAAiB;AACnB,gBAAIC;AACJ,gBAAI;AACF,cAAAA,UAAS,KAAK,MAAM,eAAe;AACnC,kBAAI,OAAOA,YAAW,SAAU,OAAM,IAAI,MAAM,2CAA2C;AAC3F,kBAAIA,YAAW,KAAM,OAAM,IAAI,MAAM,sCAAsC;AAAA,YAC7E,SAAS,GAAG;AACV,oBAAM,IAAI,MAAM,gCAAgC,eAAe,IAAI,EAAE,OAAO,EAAE,CAAC;AAAA,YACjF;AACA,mBAAO,KAAK,uBAAuB,cAAc;AAAA,cAC/C,aAAaA,QAAO,eAAe;AAAA,cACnC,cAAcA,QAAO,gBAAgB;AAAA,YACvC,CAAC;AAAA,UACH;AAGA,gBAAM,eAAe,eAAe,QAAQ,IAAI,QAAQ;AACxD,gBAAM,SAAgB,mBAAY,gBAAgB,EAAE;AACpD,gBAAM,MAAM,IAAI,MAAmB,KAAK,sBAAsB,MAAM,CAAC;AACrE,eAAK,oBAAoB,IAAI,gBAAgB,GAAG;AAChD,iBAAO;AAAA,QACT,WAAW,iBAAiB,kBAAkB,kBAAkB,gBAAgB;AAC9E,iBAAO,IAAI,MAAmB;AAAA,YAC5B,cAAc,eAAe;AAAA,YAC7B,aAAa,eAAe;AAAA,UAC9B,CAAC;AAAA,QACH;AAEA,cAAM,IAAI,MAAM,uBAAuB,cAAc,EAAE;AAAA,MACzD;AAAA,IACF;AAAA,EACF;AAAA,EAEU,eAAe,wBAA6D;AACpF,iBAAa;AACb,UAAM,eAAe,0BAA0B;AAC/C,UAAM,aAAa,KAAK,uBAAuB,cAAc,sBAAsB;AACnF,WAAO;AAAA,EACT;AAAA,EAWU,0BAA0B,YAAiD;AACnF,UAAM,WAAW,WAAW,IAAI;AAChC,UAAM,aAAa,gBAAgB,oBAAoB,QAAQ;AAC/D,UAAM,WAAW,aAAa,KAAK,mCAAmC,IAAI,UAAU,GAAG,IAAI,UAAU,IAAI;AACzG,QAAI,SAAU,QAAO;AAErB,UAAM,UAAU,KAAK,WAAW,cAAc;AAAA,MAC5C,cAAc,SAAS;AAAA,MACvB,aAAa,SAAS;AAAA,IACxB,CAAC;AACD,YAAQ,oBAAoB,CAAC,mBAAmB;AAC9C,iBAAW,OAAO,CAAC,SAAS;AAAA,QAC1B,GAAG;AAAA,QACH,aAAa,gBAAgB,SAAS;AAAA,MACxC,EAAE;AAAA,IACJ,CAAC;AACD,YAAQ,aAAa,MAAM;AACzB,iBAAW,OAAO,CAAC,SAAS;AAAA,QAC1B,GAAG;AAAA,QACH,aAAa;AAAA,QACb,cAAc;AAAA,MAChB,EAAE;AAAA,IACJ,CAAC;AAED,QAAI,uBAAuB,KAAK,mCAAmC,IAAI,UAAU,KAAK,oBAAI,IAAI;AAC9F,SAAK,mCAAmC,IAAI,YAAY,oBAAoB;AAC5E,yBAAqB,IAAI,YAAY,OAAO;AAC5C,WAAO;AAAA,EACT;AAAA,EAEA,MAAgB,YAAY,wBAAmE;AAC7F,UAAM,aAAa,KAAK,uBAAuB,MAAM,KAAK,oBAAoB,GAAG,sBAAsB;AACvG,UAAM,UAAU,KAAK,0BAA0B,UAAU;AACzD,WAAO;AAAA,EACT;AAAA,EAEU,YAAY,wBAA0D;AAC9E,UAAM,aAAa,KAAK,eAAe,sBAAsB;AAC7D,UAAM,YAAY,YAAY,CAAC,OAAmB;AAChD,YAAM,EAAE,YAAY,IAAI,WAAW,SAAS,MAAM;AAChD,WAAG;AAAA,MACL,CAAC;AACD,aAAO;AAAA,IACT,GAAG,CAAC,UAAU,CAAC;AACf,UAAM,cAAc,YAAY,MAAM,KAAK,0BAA0B,UAAU,GAAG,CAAC,UAAU,CAAC;AAC9F,WAAO,MAAM,qBAAqB,WAAW,aAAa,WAAW;AAAA,EACvE;AAAA,EAEA,MAAgB,2BAA2B,QAA8D;AACvG,QAAI,EAAE,iBAAiB,WAAW,EAAE,kBAAkB,SAAS;AAC7D,YAAM,IAAI,oBAAoB,kDAAkD,EAAE,OAAO,CAAC;AAAA,IAC5F;AACA,UAAM,aAAa,KAAK,uBAAuB,MAAM,KAAK,oBAAoB,CAAC;AAC/E,eAAW,IAAI,MAAM;AAAA,EACvB;AAAA,EAEU,yBAAyB,wBAAkF;AACnH,YAAQ,2BAA2B,SAAY,yBAAyB,KAAK,qBAAqB;AAAA,EACpG;AAAA,EAEU,4BAA4B,wBAA0F;AAC9H,QAAI,CAAC,KAAK,yBAAyB,sBAAsB,GAAG;AAC1D,YAAM,IAAI,MAAM,uVAAuV;AAAA,IACzW;AAAA,EACF;AAAA,EAEU,qBAAwD;AAChE,WAAO,KAAK,cAAc;AAAA,EAC5B;AAAA,EAEU,yBAAoE;AAC5E,QAAI,CAAC,KAAK,mBAAmB,GAAG;AAC9B,YAAM,IAAI,MAAM,mFAAmF;AAAA,IACrG;AAAA,EACF;AAAA,EAEU,uBAAuB,MAAqD;AACpF,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK;AAAA,MAClB,QAAQ;AAAA,QACN,eAAe,KAAK,OAAO;AAAA,QAC3B,mBAAmB,KAAK,OAAO;AAAA,QAC/B,kBAAkB,KAAK,OAAO;AAAA,QAC9B,gBAAgB,KAAK,OAAO;AAAA,QAC5B,2BAA2B,KAAK,OAAO;AAAA,QACvC,2BAA2B,KAAK,OAAO;AAAA,QACvC,kBAAkB,KAAK,OAAO;AAAA,QAC9B,kBAAkB,KAAK,OAAO;AAAA,QAC9B,gBAAgB,KAAK,OAAO,wBAAwB,IAAI,CAAC,OAAO;AAAA,UAC9D,IAAI,EAAE;AAAA,QACR,EAAE;AAAA,MACJ;AAAA,IACF;AAAA,EACF;AAAA,EAEU,0BAA0B,MAAwG;AAC1I,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,IACX;AAAA,EACF;AAAA,EAEU,wBAAwB,MAA0D;AAC1F,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa;AAAA,QACX,aAAa,KAAK;AAAA,QAClB,iBAAiB,KAAK;AAAA,MACxB;AAAA,IACF;AAAA,EACF;AAAA,EAEU,8BAA8B,SAA0B,MAA4D;AAC5H,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,gBAAgB,KAAK;AAAA,MACrB,WAAW,IAAI,KAAK,KAAK,iBAAiB;AAAA,MAC1C,QAAQ,YAAY;AAClB,cAAM,KAAK,WAAW,qBAAqB,KAAK,IAAI,KAAK,SAAS,OAAO;AACzE,cAAM,KAAK,sBAAsB,QAAQ,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,MAClE;AAAA,IACF;AAAA,EACF;AAAA,EAEU,oBACR,MACyG;AACzG,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK;AAAA,MAClB,WAAW,KAAK,oBAAoB,IAAI,KAAK,KAAK,iBAAiB,IAAI;AAAA,MACvE,mBAAmB,KAAK,6BAA6B,IAAI,KAAK,KAAK,0BAA0B,IAAI;AAAA,MACjG,WAAW,IAAI,KAAK,KAAK,iBAAiB;AAAA,MAC1C,GAAI,KAAK,SAAS,SAAS,EAAE,MAAM,QAAQ,QAAQ,KAAK,QAAQ,IAAI,EAAE,MAAM,QAAQ,QAAQ,KAAK,QAAQ;AAAA,MACzG,OAAO,OAAO,KAAK,UAAU,WAAW,KAAK,QAAQ;AAAA,QACnD,UAAU,KAAK,MAAM;AAAA,MACvB;AAAA,MACA,SAAS,WAAY;AACnB,eAAO,KAAK,WAAW,MAAM;AAAA,MAC/B;AAAA,MACA,YAAY,WAAY;AACtB,YAAI,KAAK,mBAAmB;AAC1B,iBAAO;AAAA,QACT;AACA,YAAI,KAAK,aAAa,KAAK,YAAY,oBAAI,KAAK,GAAG;AACjD,iBAAO;AAAA,QACT;AACA,eAAO;AAAA,MACT;AAAA,IACF;AAAA,EACF;AAAA,EAOU,sBAAsB,SAA0B,MAA2N;AACnR,WAAO;AAAA,MACL,GAAG,KAAK,oBAAoB,IAAI;AAAA,MAChC,MAAM,SAAS;AACb,cAAM,KAAK,OAAO,EAAE,SAAS,KAAK,CAAC;AAAA,MACrC;AAAA,MACA,QAAQ,OAAO,YAAiC;AAC9C,cAAM,KAAK,WAAW,oBAAoB,KAAK,SAAS,SAAS,EAAE,SAAS,KAAK,QAAQ,IAAI,EAAE,SAAS,KAAK,QAAQ,GAAG,KAAK,IAAI,SAAS,SAAS,QAAQ;AAC3J,YAAI,KAAK,SAAS,QAAQ;AACxB,gBAAM,KAAK,kBAAkB,QAAQ,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,QAC9D,OAAO;AACL,gBAAM,KAAK,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAAA,QAChD;AAAA,MACF;AAAA,IACF;AAAA,EACF;AAAA,EAEU,oBAAoB,MAAmC,SAAgC;AAC/F,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK;AAAA,MAClB,iBAAiB,KAAK;AAAA,MACtB,gBAAgB,KAAK;AAAA,MACrB,wBAAwB,KAAK;AAAA,MAC7B,GAAG,KAAK,gBAAgB,KAAK,IAAI,QAAQ,OAAO;AAAA,MAChD,MAAM,WAAW,SAAkD;AACjE,cAAM,IAAI,WAAW,mBAAmB;AAAA,UACtC,QAAQ,KAAK;AAAA,UACb,OAAO,QAAQ;AAAA,UACf;AAAA,UACA,aAAa,QAAQ,eAAe,qBAAqB,IAAI,KAAK,gBAAgB,aAAa;AAAA,QACjG,CAAC;AACD,cAAM,IAAI,sBAAsB,QAAQ,CAAC,SAAS,KAAK,EAAE,CAAC;AAAA,MAC5D;AAAA,MACA,MAAM,YAAY;AAChB,cAAM,SAAS,OAAO,QAAQ,MAAM,IAAI,yBAAyB,UAAU,CAAC,SAAS,KAAK,EAAE,GAAG,YAAY,CAAC;AAC5G,eAAO,OAAO,IAAI,CAACC,UAAS,IAAI,wBAAwBA,KAAI,CAAC;AAAA,MAC/D;AAAA,MACA,WAAW;AACT,cAAM,SAAS,cAAc,IAAI,0BAA0B,CAAC,SAAS,KAAK,EAAE,GAAY,iBAAiB;AACzG,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,wBAAwBA,KAAI,CAAC;AAAA,MAC/D;AAAA,MACA,MAAM,kBAAkB;AACtB,cAAM,SAAS,OAAO,QAAQ,MAAM,IAAI,sBAAsB,UAAU,CAAC,SAAS,KAAK,EAAE,GAAG,YAAY,CAAC;AACzG,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,8BAA8B,SAASA,KAAI,CAAC;AAAA,MAC9E;AAAA,MACA,iBAAiB;AACf,cAAM,SAAS,cAAc,IAAI,uBAAuB,CAAC,SAAS,KAAK,EAAE,GAAY,uBAAuB;AAC5G,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,8BAA8B,SAASA,KAAI,CAAC;AAAA,MAC9E;AAAA,MACA,MAAM,OAAO,MAAyB;AACpC,cAAM,IAAI,WAAW,WAAW,EAAE,MAAM,wBAAwB,IAAI,GAAG,QAAQ,KAAK,GAAG,GAAG,OAAO;AACjG,cAAM,IAAI,uBAAuB,QAAQ,CAAC,OAAO,CAAC;AAAA,MACpD;AAAA,MACA,MAAM,SAAS;AACb,cAAM,IAAI,WAAW,WAAW,KAAK,IAAI,OAAO;AAChD,cAAM,IAAI,uBAAuB,QAAQ,CAAC,OAAO,CAAC;AAAA,MACpD;AAAA,MAEA,aAAa;AACX,cAAM,SAAS,cAAc,IAAI,mBAAmB,CAAC,SAAS,KAAK,EAAE,GAAY,mBAAmB;AACpG,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,sBAAsB,SAASA,KAAI,CAAC;AAAA,MACtE;AAAA,MAEA,MAAM,cAAc;AAClB,cAAM,UAAU,OAAO,QAAQ,MAAM,IAAI,kBAAkB,UAAU,CAAC,SAAS,KAAK,EAAE,GAAG,YAAY,CAAC;AACtG,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,sBAAsB,SAASA,KAAI,CAAC;AAAA,MACvE;AAAA,MAEA,MAAM,aAAa,SAAwC;AACzD,cAAM,SAAS,MAAM,IAAI,WAAW;AAAA,UAClC,MAAM,4BAA4B,QAAQ,KAAK,IAAI,OAAO;AAAA,UAC1D;AAAA,UACA;AAAA,QACF;AACA,cAAM,IAAI,kBAAkB,QAAQ,CAAC,SAAS,KAAK,EAAE,CAAC;AACtD,eAAO,IAAI,sBAAsB,SAAS,MAAM;AAAA,MAClD;AAAA,IACF;AAAA,EACF;AAAA,EAEU,8BAA8B,MAA6C,SAA0C;AAC7H,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,OAAO,KAAK;AAAA,MACZ,MAAM,KAAK;AAAA,MACX,YAAY,KAAK;AAAA,MACjB,WAAW,KAAK;AAAA,MAChB,aAAa,KAAK;AAAA,MAElB,MAAM,sBAAsB,SAAoC;AAC9D,cAAM,IAAI,WAAW;AAAA,UACnB,KAAK;AAAA,UACL,SAAS,eAAe,qBAAqB,IAAI,KAAK,mBAAmB,aAAa;AAAA,UACtF;AAAA,QACF;AAAA,MACF;AAAA,MACA,MAAM,OAAO,MAAmC;AAC9C,cAAM,IAAI,WAAW,2BAA2B,KAAK,IAAI,kCAAkC,IAAI,GAAG,OAAO;AACzG,cAAM,IAAI,4BAA4B,QAAQ,CAAC,OAAO,CAAC;AAAA,MACzD;AAAA,MACA,MAAM,SAAS;AACb,cAAM,IAAI,WAAW,2BAA2B,KAAK,IAAI,OAAO;AAChE,cAAM,IAAI,4BAA4B,QAAQ,CAAC,OAAO,CAAC;AAAA,MACzD;AAAA,IACF;AAAA,EACF;AAAA,EACU,oCAAoC,MAAoD,SAAgD;AAChJ,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,MAAM,KAAK;AAAA,MACX,SAAS,KAAK;AAAA,MACd,YAAY,KAAK;AAAA,MAEjB,MAAM,WAAW,SAAkB;AACjC,cAAM,IAAI,WAAW,wBAAwB,KAAK,0BAA0B,SAAS,OAAO;AAC5F,cAAM,IAAI,6BAA6B,QAAQ,CAAC,OAAO,CAAC;AAAA,MAC1D;AAAA,IACF;AAAA,EACF;AAAA,EACU,6BAA6B,MAA2C,SAAyC;AACzH,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,MAAM,KAAK;AAAA,MACX,QAAQ,KAAK;AAAA,MACb,OAAO,KAAK;AAAA,MACZ,aAAa,KAAK;AAAA,MAClB,wBAAwB,KAAK;AAAA,MAE7B,MAAM,OAAO,MAEV;AACD,YAAI;AACF,gBAAM,IAAI,WAAW;AAAA,YACnB,KAAK;AAAA,YACL,KAAK;AAAA,YACL;AAAA,cACE,eAAe,KAAK;AAAA,cACpB,0BAA0B,KAAK;AAAA,YACjC;AAAA,YACA;AAAA,UACF;AACA,gBAAM,IAAI,gCAAgC,QAAQ,CAAC,OAAO,CAAC;AAC3D,iBAAO,OAAO,GAAG,MAAS;AAAA,QAC5B,SAAS,OAAO;AACd,cAAI,YAAY,2CAA2C,WAAW,KAAK,GAAG;AAC5E,mBAAO,OAAO,MAAM,KAAK;AAAA,UAC3B;AACA,gBAAM;AAAA,QACR;AAAA,MACF;AAAA,MAEA,MAAM,SAAS;AACb,cAAM,IAAI,WAAW,oBAAoB,KAAK,SAAS,KAAK,IAAI,OAAO;AACvE,cAAM,IAAI,gCAAgC,QAAQ,CAAC,OAAO,CAAC;AAAA,MAC7D;AAAA,IACF;AAAA,EACF;AAAA,EAEU,oBAAoB,MAAwC;AACpE,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,aAAa,KAAK;AAAA,MAClB,UAAU,KAAK;AAAA,MACf,qBAAqB,KAAK,IAAI,GAAG,KAAK,QAAQ;AAAA,IAChD;AAAA,EACF;AAAA,EAEU,8BAA8B,UAA8D;AACpG,UAAM,WAAW,SAAS,MAAM,IAAI,CAAC,UAAU;AAAA,MAC7C,IAAI,KAAK;AAAA,MACT,UAAU,KAAK;AAAA,MACf,aAAa,KAAK,QAAQ;AAAA,MAC1B,cAAc,KAAK,QAAQ;AAAA,MAC3B,cAAc,KAAK,QAAQ;AAAA,MAC3B,WAAW,KAAK,QAAQ;AAAA,MACxB,MAAM,KAAK;AAAA,MACX,cAAc,KAAK,eAAe;AAAA,QAChC,kBAAkB,KAAK,aAAa,qBAAqB,IAAI,KAAK,KAAK,aAAa,kBAAkB,IAAI;AAAA,QAC1G,mBAAmB,KAAK,aAAa;AAAA,QACrC,cAAc,KAAK,aAAa;AAAA,MAClC,IAAI;AAAA,MACJ,eAAe,KAAK,gBAAgB,IAAI,CAAC,YAAY;AAAA,QACnD,WAAW,OAAO;AAAA,QAClB,aAAa,OAAO,QAAQ;AAAA,QAC5B,QAAQ,OAAO,QAAQ;AAAA,MACzB,EAAE;AAAA,IACJ,EAAE;AACF,WAAO,OAAO,OAAO,UAAU,EAAE,YAAY,SAAS,WAAW,eAAe,KAAK,CAAC;AAAA,EACxF;AAAA,EAEU,8BAA8B,UAA8D;AACpG,UAAM,WAAW,SAAS,MAAM,IAAI,CAAC,UAAU;AAAA,MAC7C,QAAQ,KAAK;AAAA,MACb,aAAa,KAAK;AAAA,MAClB,kBAAkB,KAAK;AAAA,MACvB,WAAW,IAAI,KAAK,KAAK,iBAAiB;AAAA,IAC5C,EAAE;AACF,WAAO,OAAO,OAAO,UAAU,EAAE,YAAY,SAAS,WAAW,eAAe,KAAK,CAAC;AAAA,EACxF;AAAA,EAEU,6BAA6B,UASnB;AAClB,WAAO;AAAA,MACL,aAAa,SAAS;AAAA,MACtB,sBAAsB,SAAS;AAAA,IACjC;AAAA,EACF;AAAA,EAEU,YAAY,SAAgC;AACpD,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,kBAAkB;AAAA,MAClB,gBAAgB;AAAA,QACd,MAAM,YAAY;AAChB,gBAAM,SAAS,MAAM,QAAQ,4BAA4B,KAAQ,IAAM;AACvE,iBAAO;AAAA,YACL,aAAa,QAAQ,YAAY,SAAS;AAAA,YAC1C,cAAc,QAAQ,cAAc,SAAS;AAAA,UAC/C;AAAA,QACF;AAAA,QACA,YAAY;AACV,gBAAM,CAAC,GAAG,UAAU,IAAI,MAAM,SAAS,CAAC;AACxC,gBAAM,UAAU,MAAM;AACpB,kBAAM,EAAE,aAAa,mBAAmB,IAAI,QAAQ,2BAA2B,KAAQ,GAAM;AAC7F,kBAAM,EAAE,aAAa,sBAAsB,IAAI,QAAQ,aAAa,MAAM,WAAW,OAAK,IAAI,CAAC,CAAC;AAChG,kBAAM,EAAE,aAAa,6BAA6B,IAAI,QAAQ,oBAAoB,MAAM,WAAW,OAAK,IAAI,CAAC,CAAC;AAC9G,mBAAO,MAAM;AACX,iCAAmB;AACnB,oCAAsB;AACtB,2CAA6B;AAAA,YAC/B;AAAA,UACF,GAAG,CAAC,CAAC;AAEL,cAAI,cAAc,QAAQ,mBAAmB,IAAI,OAAO,QAAQ,8BAA8B,KAAQ,IAAM;AAC5G,cAAI,gBAAgB,MAAM;AAExB,0BAAc,IAAI,QAAQ,4BAA4B,KAAQ,IAAM,CAAC,GAAG,eAAe;AAAA,UACzF;AACA,iBAAO;AAAA,YACL,aAAa,aAAa,SAAS;AAAA,YACnC,cAAc,QAAQ,gBAAgB,GAAG,SAAS;AAAA,UACpD;AAAA,QACF;AAAA,MACF;AAAA,MACA,MAAM,iBAAyC;AAC7C,cAAM,SAAS,MAAM,KAAK,eAAe,UAAU;AACnD,eAAO,OAAO;AAAA,MAChB;AAAA,MACA,iBAAgC;AAC9B,eAAO,KAAK,eAAe,UAAU,EAAE;AAAA,MACzC;AAAA,MACA,MAAM,kBAA0C;AAC9C,cAAM,SAAS,MAAM,KAAK,eAAe,UAAU;AACnD,eAAO,OAAO;AAAA,MAChB;AAAA,MACA,kBAAiC;AAC/B,eAAO,KAAK,eAAe,UAAU,EAAE;AAAA,MACzC;AAAA,MACA,MAAM,iBAAsD;AAC1D,eAAO;AAAA,UACL,gBAAgB,KAAK,UAAU,MAAM,KAAK,YAAY,CAAC;AAAA,QACzD;AAAA,MACF;AAAA,MACA,iBAA6C;AAC3C,eAAO;AAAA,UACL,gBAAgB,KAAK,UAAU,KAAK,YAAY,CAAC;AAAA,QACnD;AAAA,MACF;AAAA,MACA,MAAM,cAAoF;AACxF,cAAM,SAAS,MAAM,KAAK,eAAe,UAAU;AACnD,eAAO;AAAA,MACT;AAAA,MACA,cAA2E;AACzE,eAAO,KAAK,eAAe,UAAU;AAAA,MACvC;AAAA,MACA,QAAQ,SAA0C;AAChD,eAAO,IAAI,SAAS,SAAS,OAAO;AAAA,MACtC;AAAA,IACF;AAAA,EACF;AAAA,EAEU,6BAA6B,MAAgD,SAAqD;AAC1I,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,aAAa,KAAK;AAAA,MAClB,iBAAiB,KAAK;AAAA,MACtB,MAAM,OAAO,QAA4D;AACvE,cAAM,IAAI,WAAW,wBAAwB;AAAA,UAC3C,QAAQ,KAAK;AAAA,UACb,QAAQ,KAAK;AAAA,UACb,SAAS;AAAA,YACP,cAAc,OAAO;AAAA,YACrB,mBAAmB,OAAO;AAAA,UAC5B;AAAA,QACF,GAAG,OAAO;AACV,cAAM,IAAI,6BAA6B,QAAQ,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,MACxE;AAAA,IACF;AAAA,EACF;AAAA,EAEU,gBAAgB,MAA8F;AACtH,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK;AAAA,MAClB,cAAc,KAAK;AAAA,MACnB,sBAAsB,KAAK;AAAA,MAC3B,iBAAiB,KAAK;AAAA,MACtB,YAAY,IAAI,KAAK,KAAK,mBAAmB;AAAA,MAC7C,gBAAgB,KAAK;AAAA,MACrB,wBAAwB,KAAK;AAAA,MAC7B,aAAa,KAAK;AAAA,MAClB,kBAAkB,KAAK;AAAA,MACvB,gBAAgB,KAAK;AAAA,MACrB,gBAAgB,KAAK;AAAA,MACrB,oBAAoB,KAAK;AAAA,MACzB,uBAAuB,KAAK;AAAA,MAC5B,aAAa,KAAK;AAAA,MAClB,cAAc,KAAK;AAAA,MACnB,kBAAkB,KAAK;AAAA,MACvB,eAAkD;AAChD,eAAO;AAAA,MACT;AAAA,IACF;AAAA,EACF;AAAA,EAEU,4BAA4B,MAAsD,SAAqC;AAC/H,UAAM,MAAM;AAGZ,mBAAe,oBAAoB,IAAkB,SAAmF;AACtI,YAAM,cAAc,SAAS,QAAQ,KAAK,GAAG;AAC7C,aAAO,OAAO,QAAQ,MAAM,IAAI,iCAAiC,UAAU,CAAC,SAAS,IAAI,eAAe,IAAI,SAAS,OAAO,UAAU,GAAG,YAAY,CAAC;AAAA,IACxJ;AAIA,aAAS,oBAAoB,IAAkB,SAA0E;AACvH,YAAM,cAAc,SAAS,QAAQ,KAAK,GAAG;AAC7C,aAAO,cAAc,IAAI,kCAAkC,CAAC,SAAS,IAAI,eAAe,IAAI,SAAS,OAAO,UAAU,GAAY,4BAA4B;AAAA,IAChK;AACA,WAAO;AAAA,MACL,MAAM,oBAAoB;AACxB,cAAM,WAAW,MAAM,IAAI,WAAW,aAAa,OAAO;AAC1D,eAAO,SAAS,MAAM,IAAI,CAACA,UAAS,IAAI,uBAAuBA,KAAI,CAAC;AAAA,MACtE;AAAA,MACA,MAAM,cAAc,WAAmB;AACrC,cAAM,IAAI,WAAW,cAAc,WAAW,OAAO;AAAA,MACvD;AAAA,MACA,eAAe,aAA4B;AACzC,eAAO,KAAK,OAAO,EAAE,YAAY,CAAC;AAAA,MACpC;AAAA,MACA,kBAAkB,UAA+B;AAC/C,eAAO,KAAK,OAAO,EAAE,gBAAgB,SAAS,CAAC;AAAA,MACjD;AAAA,MACA,MAAM,gBAAgB,MAA4B;AAChD,cAAM,KAAK,OAAO,EAAE,gBAAgB,OAAO,SAAS,WAAW,OAAO,MAAM,MAAM,KAAK,CAAC;AAAA,MAC1F;AAAA,MACA;AAAA,MACA;AAAA;AAAA,MACA,MAAM,QAAQ,QAAgB;AAC5B,cAAM,QAAQ,MAAM,KAAK,UAAU;AACnC,eAAO,MAAM,KAAK,CAAC,MAAM,EAAE,OAAO,MAAM,KAAK;AAAA,MAC/C;AAAA,MACA,QAAQ,QAAgB;AACtB,cAAM,QAAQ,KAAK,SAAS;AAC5B,eAAO,QAAQ,MAAM;AACnB,iBAAO,MAAM,KAAK,CAAC,MAAM,EAAE,OAAO,MAAM,KAAK;AAAA,QAC/C,GAAG,CAAC,OAAO,MAAM,CAAC;AAAA,MACpB;AAAA,MACA,MAAM,YAAY;AAChB,cAAM,QAAQ,OAAO,QAAQ,MAAM,IAAI,uBAAuB,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AAChG,eAAO,MAAM,IAAI,CAACA,UAAS,IAAI,oBAAoBA,OAAM,OAAO,CAAC;AAAA,MACnE;AAAA,MACA,WAAW;AACT,cAAM,QAAQ,cAAc,IAAI,wBAAwB,CAAC,OAAO,GAAG,iBAAiB;AACpF,eAAO,QAAQ,MAAM,MAAM,IAAI,CAACA,UAAS,IAAI,oBAAoBA,OAAM,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC;AAAA,MAC3F;AAAA,MACA,MAAM,WAAW,MAAyB;AACxC,cAAMA,QAAO,MAAM,IAAI,WAAW,iBAAiB,wBAAwB,MAAM,IAAI,GAAG,OAAO;AAC/F,cAAM,IAAI,uBAAuB,QAAQ,CAAC,OAAO,CAAC;AAClD,cAAM,KAAK,OAAO,EAAE,gBAAgBA,MAAK,GAAG,CAAC;AAC7C,eAAO,IAAI,oBAAoBA,OAAM,OAAO;AAAA,MAC9C;AAAA,MACA,MAAM,UAAU,MAAY;AAC1B,cAAM,IAAI,WAAW,UAAU,KAAK,IAAI,OAAO;AAAA,MAEjD;AAAA,MACA,MAAM,gBAAgB,gBAAiD,SAA8D;AACnI,YAAI,kBAAkB,QAAQ,gBAAgB;AAC5C,gBAAM,QAAQ;AACd,gBAAM,YAAY,SAAS,aAAa;AACxC,gBAAM,cAAc,OAAO,QAAQ,MAAM,IAAI,6BAA6B,UAAU,CAAC,SAAS,MAAM,IAAI,SAAS,GAAG,YAAY,CAAC;AACjI,iBAAO,YAAY,IAAI,CAACA,UAAS,IAAI,0BAA0BA,KAAI,CAAC;AAAA,QACtE,OAAO;AACL,gBAAM,OAAO;AACb,gBAAM,YAAY,MAAM,aAAa;AACrC,gBAAM,cAAc,OAAO,QAAQ,MAAM,IAAI,oCAAoC,UAAU,CAAC,SAAS,SAAS,GAAG,YAAY,CAAC;AAC9H,iBAAO,YAAY,IAAI,CAACA,UAAS,IAAI,0BAA0BA,KAAI,CAAC;AAAA,QACtE;AAAA,MACF;AAAA,MACA,eAAe,gBAAiD,SAAqD;AACnH,YAAI,kBAAkB,QAAQ,gBAAgB;AAC5C,gBAAM,QAAQ;AACd,gBAAM,YAAY,SAAS,aAAa;AACxC,gBAAM,cAAc,cAAc,IAAI,8BAA8B,CAAC,SAAS,MAAM,IAAI,SAAS,GAAY,uBAAuB;AACpI,iBAAO,QAAQ,MAAM,YAAY,IAAI,CAACA,UAAS,IAAI,0BAA0BA,KAAI,CAAC,GAAG,CAAC,WAAW,CAAC;AAAA,QACpG,OAAO;AACL,gBAAM,OAAO;AACb,gBAAM,YAAY,MAAM,aAAa;AACrC,gBAAM,cAAc,cAAc,IAAI,qCAAqC,CAAC,SAAS,SAAS,GAAY,uBAAuB;AACjI,iBAAO,QAAQ,MAAM,YAAY,IAAI,CAACA,UAAS,IAAI,0BAA0BA,KAAI,CAAC,GAAG,CAAC,WAAW,CAAC;AAAA,QACpG;AAAA,MACF;AAAA,MACA,cAAc,qBAAoC,cAA8C;AAC9F,YAAI,uBAAuB,OAAO,wBAAwB,UAAU;AAClE,gBAAM,QAAQ;AACd,gBAAM,cAAc,KAAK,eAAe,KAAK;AAC7C,iBAAO,QAAQ,MAAM,YAAY,KAAK,CAAC,MAAM,EAAE,OAAO,YAAY,KAAK,MAAM,CAAC,aAAa,YAAY,CAAC;AAAA,QAC1G,OAAO;AACL,gBAAM,MAAM;AACZ,gBAAM,cAAc,KAAK,eAAe;AACxC,iBAAO,QAAQ,MAAM,YAAY,KAAK,CAAC,MAAM,EAAE,OAAO,GAAG,KAAK,MAAM,CAAC,aAAa,GAAG,CAAC;AAAA,QACxF;AAAA,MACF;AAAA,MACA,MAAM,cAAc,qBAAoC,cAAuD;AAC7G,YAAI,uBAAuB,OAAO,wBAAwB,UAAU;AAClE,gBAAM,QAAQ;AACd,gBAAM,cAAc,MAAM,KAAK,gBAAgB,KAAK;AACpD,iBAAO,YAAY,KAAK,CAAC,MAAM,EAAE,OAAO,YAAY,KAAK;AAAA,QAC3D,OAAO;AACL,gBAAM,MAAM;AACZ,gBAAM,cAAc,MAAM,KAAK,gBAAgB;AAC/C,iBAAO,YAAY,KAAK,CAAC,MAAM,EAAE,OAAO,GAAG,KAAK;AAAA,QAClD;AAAA,MACF;AAAA,MACA,MAAM,cAAc,qBAAoC,cAAyC;AAC/F,YAAI,uBAAuB,OAAO,wBAAwB,UAAU;AAClE,gBAAM,QAAQ;AACd,iBAAQ,MAAM,KAAK,cAAc,OAAO,YAAsB,MAAO;AAAA,QACvE,OAAO;AACL,gBAAM,MAAM;AACZ,iBAAQ,MAAM,KAAK,cAAc,GAAG,MAAO;AAAA,QAC7C;AAAA,MACF;AAAA,MACA,MAAM,OAAO,QAAQ;AACnB,eAAO,MAAM,IAAI,kBAAkB,QAAQ,OAAO;AAAA,MACpD;AAAA,MACA,MAAM,sBAAsB,SAAoC;AAC9D,YAAI,CAAC,KAAK,eAAe;AACvB,gBAAM,IAAI,oBAAoB,oCAAoC;AAAA,QACpE;AACA,eAAO,MAAM,IAAI,WAAW;AAAA,UAC1B,KAAK;AAAA,UACL,SAAS,eAAe,qBAAqB,IAAI,KAAK,mBAAmB,aAAa;AAAA,UACtF;AAAA,QACF;AAAA,MACF;AAAA,MACA,MAAM,eAAe,SAAuD;AAC1E,cAAM,SAAS,MAAM,IAAI,WAAW,eAAe,SAAS,OAAO;AACnE,cAAM,IAAI,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAC7C,eAAO;AAAA,MACT;AAAA,MACA,MAAM,YAAY,SAA+B;AAC/C,cAAM,SAAS,MAAM,IAAI,WAAW,YAAY,SAAS,OAAO;AAChE,cAAM,IAAI,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAC7C,eAAO;AAAA,MACT;AAAA,MACA,cAAc,KAAK,iBAAiB,KAAK,oBAAoB,KAAK,eAAe,OAAO;AAAA,MACxF,MAAM,eAAe,MAAY;AAC/B,cAAM,SAAS,OAAO,QAAQ,MAAM,IAAI,6BAA6B,UAAU,CAAC,SAAS,KAAK,EAAE,GAAG,YAAY,CAAC;AAChH,eAAO,IAAI,6BAA6B,QAAQ,OAAO;AAAA,MACzD;AAAA,MACA,eAAe,MAAY;AACzB,cAAM,SAAS,cAAc,IAAI,8BAA8B,CAAC,SAAS,KAAK,EAAE,GAAY,uBAAuB;AACnH,eAAO,IAAI,6BAA6B,QAAQ,OAAO;AAAA,MACzD;AAAA,MACA,MAAM,SAAS;AACb,cAAM,IAAI,WAAW,kBAAkB,OAAO;AAC9C,gBAAQ,YAAY;AAAA,MACtB;AAAA,MACA,MAAM,sBAAsB;AAC1B,cAAM,SAAS,OAAO,QAAQ,MAAM,IAAI,4BAA4B,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AACtG,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,8BAA8BA,OAAM,OAAO,CAAC;AAAA,MAC9E;AAAA,MACA,qBAAqB;AACnB,cAAM,SAAS,cAAc,IAAI,6BAA6B,CAAC,OAAO,GAAY,2BAA2B;AAC7G,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,8BAA8BA,OAAM,OAAO,CAAC;AAAA,MAC9E;AAAA,MACA,MAAM,qBAAqB,MAAmC;AAC5D,cAAMA,QAAO,MAAM,IAAI,WAAW,2BAA2B,kCAAkC,MAAM,IAAI,GAAG,OAAO;AACnH,cAAM,IAAI,4BAA4B,QAAQ,CAAC,OAAO,CAAC;AACvD,eAAO,IAAI,8BAA8BA,OAAM,OAAO;AAAA,MACxD;AAAA,MACA,4BAA4B;AAC1B,cAAM,UAAU,cAAc,IAAI,8BAA8B,CAAC,OAAO,GAAY,kCAAkC;AACtH,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,oCAAoCA,OAAM,OAAO,CAAC;AAAA,MACrF;AAAA,MACA,MAAM,6BAA6B;AACjC,cAAM,UAAU,OAAO,QAAQ,MAAM,IAAI,6BAA6B,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AACxG,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,oCAAoCA,OAAM,OAAO,CAAC;AAAA,MACrF;AAAA,MACA,aAAa;AACX,cAAM,SAAS,cAAc,IAAI,mBAAmB,CAAC,OAAO,GAAY,mBAAmB;AAC3F,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,sBAAsB,SAASA,KAAI,CAAC;AAAA,MACtE;AAAA,MAEA,MAAM,cAAc;AAClB,cAAM,UAAU,MAAM,IAAI,WAAW,mBAAmB,EAAE,SAAS,KAAK,GAAG,SAAS,QAAQ;AAC5F,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,sBAAsB,SAASA,KAAI,CAAC;AAAA,MACvE;AAAA,MAEA,MAAM,aAAa,SAAwC;AACzD,cAAM,SAAS,MAAM,IAAI,WAAW;AAAA,UAClC,MAAM,4BAA4B,QAAQ,MAAM,OAAO;AAAA,UACvD;AAAA,UACA;AAAA,QACF;AACA,cAAM,IAAI,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAC7C,eAAO,IAAI,sBAAsB,SAAS,MAAM;AAAA,MAClD;AAAA,MAEA,oBAAoB;AAClB,cAAM,UAAU,cAAc,IAAI,iCAAiC,CAAC,OAAO,GAAY,0BAA0B;AACjH,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,6BAA6BA,OAAM,OAAO,CAAC;AAAA,MAC9E;AAAA,MAEA,MAAM,qBAAqB;AACzB,cAAM,UAAU,OAAO,QAAQ,MAAM,IAAI,gCAAgC,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AAC3G,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,6BAA6BA,OAAM,OAAO,CAAC;AAAA,MAC9E;AAAA,MAEA,iBAAiB,IAAY;AAC3B,cAAM,YAAY,KAAK,kBAAkB;AACzC,eAAO,QAAQ,MAAM,UAAU,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,KAAK,MAAM,CAAC,WAAW,EAAE,CAAC;AAAA,MAClF;AAAA,MAEA,MAAM,iBAAiB,IAAY;AACjC,cAAM,YAAY,MAAM,KAAK,mBAAmB;AAChD,eAAO,UAAU,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,KAAK;AAAA,MAC/C;AAAA,MAEA,MAAM,gBAAgB,SAA6I;AACjK,cAAM,YAAY,MAAM,IAAI,eAAe,IAAI;AAC/C,YAAI,CAAC,UAAU;AACb,gBAAM,IAAI,oBAAoB,4EAA4E;AAAA,QAC5G;AAEA,cAAM,mBAAmB,MAAM,IAAI,WAAW,4BAA4B,CAAC,GAAG,OAAO;AAErF,YAAI,iBAAiB,WAAW,MAAM;AACpC,iBAAO,OAAO,MAAM,IAAI,YAAY,0BAA0B,2DAA2D,CAAC;AAAA,QAC5H;AAEA,cAAM,EAAE,cAAc,KAAK,IAAI,iBAAiB;AAGhD,YAAI,aAAa,GAAG,OAAO,2CAA2C;AACpE,gBAAM,IAAI,oBAAoB,oEAAoE,aAAa,GAAG,EAAE,EAAE;AAAA,QACxH;AAEA,qBAAa,GAAG,KAAK;AAErB,YAAI;AACJ,YAAI;AACF,oBAAU,MAAM,kBAAkB,EAAE,aAAa,aAAa,CAAC;AAAA,QACjE,SAAS,OAAY;AACnB,cAAI,iBAAiB,eAAe;AAClC,mBAAO,OAAO,MAAM,IAAI,YAAY,qBAAqB,MAAM,SAAS,MAAM,IAAI,CAAC;AAAA,UACrF,OAAO;AAEL,yBAAa,+BAA+B,KAAK;AACjD,mBAAO,OAAO,MAAM,IAAI,YAAY,0BAA0B,2DAA2D,CAAC;AAAA,UAC5H;AAAA,QACF;AAGA,cAAM,qBAAqB,MAAM,IAAI,WAAW,gBAAgB,EAAE,YAAY,SAAS,KAAK,GAAG,OAAO;AAEtG,cAAM,IAAI,aAAa,OAAO;AAC9B,eAAO;AAAA,MACT;AAAA,IACF;AAAA,EACF;AAAA,EAEU,yBAAyB,SAA6C;AAC9E,UAAM,MAAM;AACZ,SAAK,uBAAuB;AAC5B,WAAO;AAAA,MACL,cAAc,YAAiF;AAC7F,eAAO,IAAI,eAAe,SAAS,UAAU;AAAA,MAC/C;AAAA,MACA,MAAM,gBAAgB,qBAA6B,WAAkC;AACnF,cAAM,IAAI,WAAW,gBAAgB,SAAS,qBAAqB,SAAS;AAC5E,cAAM,IAAI,gBAAgB;AAAA,MAC5B;AAAA,MACA,oBAAoB;AAClB,eAAO,IAAI,mBAAmB,OAAO;AAAA,MACvC;AAAA,MACA,mBAAmB;AACjB,eAAO,IAAI,kBAAkB,OAAO;AAAA,MACtC;AAAA,IACF;AAAA,EACF;AAAA,EAEU,gBAAgB,gBAAwB,MAAuB,SAAuD;AAC9H,UAAM,MAAM;AACZ,UAAM,mBAAmB,WAAW,IAAI,WAAW,cAAc,EAAE,cAAc,KAAK,CAAC;AACvF,UAAM,kBAAkB,SAAS,SAAS,EAAE,QAAQ,eAAe,IAAI,EAAE,QAAQ,eAAe;AAChG,WAAO;AAAA,MACL,MAAM,aAAa;AACjB,cAAM,WAAW,OAAO,QAAQ,MAAM,IAAI,sBAAsB,UAAU,CAAC,kBAAkB,MAAM,cAAc,GAAG,YAAY,CAAC;AACjI,eAAO,IAAI,6BAA6B,QAAQ;AAAA,MAClD;AAAA,MACA,aAAa;AACX,cAAM,WAAW,cAAc,IAAI,uBAAuB,CAAC,kBAAkB,MAAM,cAAc,GAAY,uBAAuB;AACpI,eAAO,IAAI,6BAA6B,QAAQ;AAAA,MAClD;AAAA,MACA,MAAM,iCAA4E;AAChF,cAAM,OAAO,MAAM,IAAI,WAAW,uCAAuC,MAAM,gBAAgB,gBAAgB;AAC/G,eAAO;AAAA,UACL,cAAc,KAAK;AAAA,UACnB,iBAAiB,KAAK;AAAA,QACxB;AAAA,MACF;AAAA,MACA,MAAM,uCAAuC,eAA8D;AACzG,cAAM,OAAO,MAAM,IAAI,WAAW,+CAA+C,MAAM,gBAAgB,eAAe,gBAAgB;AACtI,cAAM,IAAI,sBAAsB,QAAQ,CAAC,kBAAkB,MAAM,cAAc,CAAC;AAChF,eAAO,KAAK;AAAA,MACd;AAAA,MACA,MAAM,QAAQ,QAAgB;AAC5B,eAAO,MAAM,IAAI,QAAQ,EAAE,QAAQ,GAAG,gBAAgB,CAAC;AAAA,MACzD;AAAA,MACA,QAAQ,QAAgB;AACtB,eAAO,IAAI,QAAQ,EAAE,QAAQ,GAAG,gBAAgB,CAAC;AAAA,MACnD;AAAA,MACA,MAAM,aAAa,SAAuC;AACxD,eAAO,MAAM,IAAI,aAAa,EAAE,GAAG,SAAS,GAAG,gBAAgB,CAAC;AAAA,MAClE;AAAA,MACA,YAAY,SAAuC;AACjD,eAAO,IAAI,YAAY,EAAE,GAAG,SAAS,GAAG,gBAAgB,CAAC;AAAA,MAC3D;AAAA,MACA,MAAM,aAAa,SAAuC;AACxD,eAAO,MAAM,IAAI,aAAa,EAAE,GAAG,SAAS,GAAG,gBAAgB,CAAC;AAAA,MAClE;AAAA,MACA,YAAY,SAAuC;AACjD,eAAO,IAAI,YAAY,EAAE,GAAG,SAAS,GAAG,gBAAgB,CAAC;AAAA,MAC3D;AAAA,MACA,MAAM,kBAAkB,SAAoD;AAC1E,eAAO,MAAM,IAAI,WAAW,kBAAkB,MAAM,gBAAgB,QAAQ,WAAW,kBAAkB,QAAQ,SAAS;AAAA,MAC5H;AAAA,MACA,MAAM,mBAAmB,SAA8F;AACrH,cAAM,IAAI,WAAW,mBAAmB;AAAA,UACtC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,iBAAiB,QAAQ;AAAA,UACzB,eAAe,QAAQ;AAAA,UACvB,UAAU,QAAQ;AAAA,UAClB,UAAU,QAAQ;AAAA,QACpB,GAAG,gBAAgB;AACnB,cAAM,IAAI,sBAAsB,QAAQ,CAAC,kBAAkB,MAAM,cAAc,CAAC;AAChF,YAAI,SAAS,QAAQ;AACnB,gBAAM,IAAI,mBAAmB,gBAAgB,CAAC,CAAC,eAAe,MAAM,MAAM,kBAAkB,oBAAoB,WAAW,cAAc;AAAA,QAC3I,OAAO;AACL,gBAAM,IAAI,mBAAmB,gBAAgB,CAAC,CAAC,eAAe,MAAM,MAAM,kBAAkB,oBAAoB,WAAW,cAAc;AAAA,QAC3I;AAAA,MACF;AAAA,IACF;AAAA,EACF;AAAA,EAEA,MAAM,QAAQ,SAAgJ;AAC5J,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI,YAAY,SAAS;AACvB,aAAO,OAAO,QAAQ,MAAM,KAAK,eAAe,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,MAAM,GAAG,YAAY,CAAC;AAAA,IACpH,WAAW,YAAY,SAAS;AAC9B,aAAO,OAAO,QAAQ,MAAM,KAAK,eAAe,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,MAAM,GAAG,YAAY,CAAC;AAAA,IACpH,OAAO;AACL,aAAO,OAAO,QAAQ,MAAM,KAAK,iBAAiB,UAAU,CAAC,SAAS,QAAQ,kBAAkB,QAAQ,MAAM,GAAG,YAAY,CAAC;AAAA,IAChI;AACA,WAAO,KAAK,oBAAoB,IAAI;AAAA,EACtC;AAAA,EAEA,QAAQ,SAAuI;AAC7I,UAAM,UAAU,KAAK,YAAY;AACjC,UAAM,CAAC,OAAO,OAAO,IACnB,YAAY,UAAU,CAAC,KAAK,gBAAgB,QAAQ,MAAM,IACxD,YAAY,UAAU,CAAC,KAAK,gBAAgB,QAAQ,MAAM,IAAI,CAAC,KAAK,kBAAkB,QAAQ,gBAAgB;AAClH,UAAM,OAAO,cAAc,OAAO,CAAC,SAAS,SAAS,QAAQ,MAAM,GAAY,eAAe;AAC9F,WAAO,KAAK,oBAAoB,IAAI;AAAA,EACtC;AAAA,EAEA,MAAM,aAAa,SAAwE;AACzF,UAAM,cAAc,MAAM,KAAK,QAAQ;AACvC,UAAM,UAAU,aAAa,oBAAoB,MAAM,KAAK,YAAY;AACxE,QAAI,YAAY,SAAS;AACvB,YAAMC,YAAW,OAAO,QAAQ,MAAM,KAAK,mBAAmB,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC/J,aAAO,KAAK,8BAA8BA,SAAQ;AAAA,IACpD,WAAW,YAAY,SAAS;AAC9B,YAAMA,YAAW,OAAO,QAAQ,MAAM,KAAK,mBAAmB,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC/J,aAAO,KAAK,8BAA8BA,SAAQ;AAAA,IACpD;AACA,UAAM,WAAW,OAAO,QAAQ,MAAM,KAAK,qBAAqB,UAAU,CAAC,SAAS,QAAQ,kBAAkB,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC3K,WAAO,KAAK,8BAA8B,QAAQ;AAAA,EACpD;AAAA,EAEA,MAAM,aAAa,SAAwE;AACzF,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI,YAAY,SAAS;AACvB,YAAMA,YAAW,OAAO,QAAQ,MAAM,KAAK,mBAAmB,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC/J,aAAO,KAAK,8BAA8BA,SAAQ;AAAA,IACpD;AACA,UAAM,WAAW,OAAO,QAAQ,MAAM,KAAK,mBAAmB,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC/J,WAAO,KAAK,8BAA8B,QAAQ;AAAA,EACpD;AAAA,EAEA,MAAM,mBAAmB,SAAuF;AAC9G,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,UAAM,OAAO,MAAM,KAAK,QAAQ;AAChC,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,YAAY,2BAA2B;AAAA,IACnD;AACA,UAAM,eAAe,YAAY,UAAU,SAAS;AACpD,UAAM,aAAa,YAAY,UAAU,QAAQ,SAAS,KAAK;AAC/D,UAAM,KAAK,WAAW,mBAAmB;AAAA,MACvC,eAAe;AAAA,MACf,aAAa;AAAA,MACb,YAAY,QAAQ;AAAA,IACtB,GAAG,OAAO;AACV,QAAI,iBAAiB,QAAQ;AAC3B,YAAM,KAAK,mBAAmB,gBAAgB,CAAC,CAAC,eAAe,MAAM,MAAM,kBAAkB,WAAW,WAAW,UAAU;AAAA,IAC/H,OAAO;AACL,YAAM,KAAK,mBAAmB,gBAAgB,CAAC,CAAC,eAAe,MAAM,MAAM,kBAAkB,WAAW,WAAW,UAAU;AAAA,IAC/H;AAAA,EACF;AAAA,EACA,YAAY,SAA+D;AACzE,UAAM,UAAU,KAAK,YAAY;AACjC,UAAM,QAAQ,YAAY,UAAU,KAAK,qBAAqB,YAAY,UAAU,KAAK,qBAAqB,KAAK;AACnH,UAAM,aAAa;AACnB,UAAM,aAAa,YAAY,UAAU,QAAQ,SAAS,YAAY,UAAU,QAAQ,SAAS,QAAQ;AACzG,UAAM,WAAW,cAAc,OAAO,CAAC,SAAS,YAAY,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAY,UAAU;AAC/H,WAAO,KAAK,8BAA8B,QAAQ;AAAA,EACpD;AAAA,EACA,YAAY,SAA+D;AACzE,UAAM,UAAU,KAAK,YAAY;AACjC,UAAM,QAAQ,YAAY,UAAU,KAAK,qBAAqB,KAAK;AACnE,UAAM,aAAa;AACnB,UAAM,aAAa,YAAY,UAAU,QAAQ,SAAS,QAAQ;AAClE,UAAM,WAAW,cAAc,OAAO,CAAC,SAAS,YAAY,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAY,UAAU;AAC/H,WAAO,KAAK,8BAA8B,QAAQ;AAAA,EACpD;AAAA,EAEU,qBAAqB,MAAsD,SAAyD;AAC5I,UAAM,cAAc,yBAAyB;AAAA,MAC3C,GAAG,KAAK,gBAAgB,IAAI;AAAA,MAC5B,GAAG,KAAK,YAAY,OAAO;AAAA,MAC3B,GAAG,KAAK,4BAA4B,MAAM,OAAO;AAAA,MACjD,GAAG,KAAK,mBAAmB,IAAI,KAAK,yBAAyB,OAAO,IAAI,CAAC;AAAA,MACzE,GAAG,KAAK,gBAAgB,KAAK,IAAI,QAAQ,OAAO;AAAA,IAClD,CAAuB;AACvB,WAAO;AAAA,EACT;AAAA,EACU,uBAAuB,MAAqD;AACpF,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,QAAQ,KAAK;AAAA,MACb,WAAW,IAAI,KAAK,KAAK,UAAU;AAAA,MACnC,iBAAiB,KAAK;AAAA,MACtB,YAAY,KAAK,eAAe,IAAI,KAAK,KAAK,YAAY,IAAI;AAAA,MAC9D,kBAAkB,KAAK,sBAAsB;AAAA,MAC7C,SAAS,KAAK;AAAA,IAChB;AAAA,EACF;AAAA,EAEU,kBAAkB,cAAsB,SAAuE;AACvH,QAAI,CAAC,KAAK,gBAAgB,IAAI,CAAC,SAAS,YAAY,CAAC,GAAG;AACtD,WAAK,gBAAgB,IAAI,CAAC,SAAS,YAAY,GAAG,IAAK,+BAA8B,sBAAsB,MAAQ;AAAA,QACjH,SAAS,KAAK,WAAW,QAAQ,WAAW;AAAA,QAC5C,WAAW;AAAA,QACX,YAAY;AAAA,QACZ,qBAAqB;AAAA,QACrB,qBAAqB;AAAA,MACvB,CAAC,CAAC;AAAA,IACJ;AACA,WAAO,KAAK,gBAAgB,IAAI,CAAC,SAAS,YAAY,CAAC;AAAA,EACzD;AAAA,EAEA,IAAI,YAAuB;AACzB,WAAO,KAAK,WAAW;AAAA,EACzB;AAAA,EAEA,MAAgB,WAAW,KAA+B;AACxD,WAAO,WAAW,GAAG;AAAA,EACvB;AAAA,EAEA,IAAI,OAA8B;AAChC,WAAO,QAAQ,KAAK,WAAW;AAAA,EACjC;AAAA,EAEA,MAAgB,iBAAiB;AAC/B,QAAI,KAAK,oBAAoB,QAAQ;AACnC,aAAO;AAAA,IACT;AACA,WAAO,IAAI,IAAI,OAAO,SAAS,IAAI;AAAA,EACrC;AAAA,EAEA,MAAgB,YAAY,SAAmD;AAC7E,QAAI,KAAK,oBAAoB,QAAQ;AACnC;AAAA,IACF,WAAW,OAAO,KAAK,oBAAoB,YAAY,KAAK,gBAAgB,UAAU;AACpF,WAAK,gBAAgB,SAAS,QAAQ,IAAI,SAAS,CAAC;AAAA,IACtD,OAAO;AACL,UAAI,QAAQ,SAAS;AACnB,eAAO,SAAS,QAAQ,QAAQ,GAAG;AAAA,MACrC,OAAO;AACL,eAAO,SAAS,OAAO,QAAQ,GAAG;AAAA,MACpC;AAAA,IACF;AAEA,UAAM,KAAK,GAAI;AAAA,EACjB;AAAA,EAEA,cAAoC;AAClC,QAAI,OAAO,KAAK,oBAAoB,UAAU;AAC5C,aAAO,KAAK,gBAAgB,YAAY;AAAA,IAC1C,WAAW,KAAK,oBAAoB,UAAU;AAC5C,aAAO,CAAC,OAAe,OAAO,SAAS,OAAO,EAAE;AAAA,IAClD,OAAO;AACL,aAAO,CAAC,OAAe;AAAA,MAAE;AAAA,IAC3B;AAAA,EACF;AAAA,EACA,MAAgB,mBAAmB,KAAa,SAA6B;AAC3E,QAAI,CAAC,MAAM,KAAK,WAAW,GAAG,GAAG;AAC/B,YAAM,IAAI,MAAM,gBAAgB,GAAG,sCAAsC;AAAA,IAC3E;AACA,WAAO,MAAM,KAAK,YAAY,EAAE,KAAK,GAAG,QAAQ,CAAC;AAAA,EACnD;AAAA,EAEA,MAAgB,mBAAmB,aAAgC,SAA6B;AAC9F,QAAI,MAAM,KAAK,KAAK,WAAW;AAC/B,QAAI,CAAC,KAAK;AACR,YAAM,IAAI,MAAM,2BAA2B,WAAW,EAAE;AAAA,IAC1D;AAEA,QAAI,CAAC,SAAS,gBAAgB;AAC5B,UAAI,gBAAgB,iBAAiB,gBAAgB,eAAe;AAClE,YAAI,iBAAiB,OAAO,WAAW,aAAa;AAAA,QAEpD,OAAO;AACL,gBAAM,cAAc,IAAI,gBAAgB,OAAO,SAAS,MAAM;AAC9D,gBAAM,YAAY,IAAI,sBAAsB,KAAK;AAAA,QACnD;AAAA,MACF,WAAW,gBAAgB,YAAY,gBAAgB,YAAY,gBAAgB,cAAc;AAE/F,YAAI,iBAAiB,OAAO,WAAW,aAAa;AAAA,QAEpD,OAAO;AACL,gBAAM,aAAa,IAAI,IAAI,OAAO,SAAS,IAAI;AAC/C,gBAAM,UAAU,IAAI,IAAI,KAAK,UAAU;AACvC,cAAI,WAAW,aAAa,IAAI,sBAAsB,GAAG;AACvD,oBAAQ,aAAa,IAAI,wBAAwB,WAAW,aAAa,IAAI,sBAAsB,CAAE;AAAA,UACvG,WAAW,WAAW,aAAa,QAAQ,YAAY,WAAW,SAAS,QAAQ,MAAM;AACvF,oBAAQ,aAAa,IAAI,wBAAwB,gBAAgB,UAAU,CAAC;AAAA,UAC9E;AACA,gBAAM,gBAAgB,OAAO;AAAA,QAC/B;AAAA,MACF;AAAA,IACF;AAEA,UAAM,KAAK,mBAAmB,KAAK,OAAO;AAAA,EAC5C;AAAA,EAEA,MAAM,iBAAiB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,UAAU,OAAO;AAAA,EAAG;AAAA,EAC/G,MAAM,iBAAiB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,UAAU,OAAO;AAAA,EAAG;AAAA,EAC/G,MAAM,kBAAkB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,WAAW,OAAO;AAAA,EAAG;AAAA,EACjH,MAAM,4BAA4B,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,qBAAqB,OAAO;AAAA,EAAG;AAAA,EACrI,MAAM,wBAAwB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,iBAAiB,OAAO;AAAA,EAAG;AAAA,EAC7H,MAAM,yBAAyB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,kBAAkB,OAAO;AAAA,EAAG;AAAA,EAC/H,MAAM,eAAe,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,QAAQ,OAAO;AAAA,EAAG;AAAA,EAC3G,MAAM,wBAAwB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,iBAAiB,OAAO;AAAA,EAAG;AAAA,EAC7H,MAAM,4BAA4B,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,qBAAqB,OAAO;AAAA,EAAG;AAAA,EACrI,MAAM,sBAAsB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,eAAe,OAAO;AAAA,EAAG;AAAA,EACzH,MAAM,sBAAsB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,eAAe,OAAO;AAAA,EAAG;AAAA,EACzH,MAAM,qBAAqB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,cAAc,OAAO;AAAA,EAAG;AAAA,EACvH,MAAM,uBAAuB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,gBAAgB,OAAO;AAAA,EAAG;AAAA,EAC3H,MAAM,0BAA0B,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,mBAAmB,OAAO;AAAA,EAAG;AAAA,EACjI,MAAM,gBAAgB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,SAAS,OAAO;AAAA,EAAG;AAAA,EAC7G,MAAM,yBAAyB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,kBAAkB,OAAO;AAAA,EAAG;AAAA,EAC/H,MAAM,cAAc,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,OAAO,OAAO;AAAA,EAAG;AAAA,EAEzG,MAAM,wBAAwB,OAAe,SAA6F;AACxI,WAAO,MAAM,KAAK,WAAW,wBAAwB,OAAO,SAAS,eAAe,qBAAqB,KAAK,KAAK,eAAe,aAAa,CAAC;AAAA,EAClJ;AAAA,EAEA,MAAM,mBAAmB,OAAe,SAAkH;AACxJ,WAAO,MAAM,KAAK,WAAW,mBAAmB,OAAO,SAAS,eAAe,qBAAqB,KAAK,KAAK,mBAAmB,aAAa,CAAC;AAAA,EACjJ;AAAA,EAEA,MAAM,cAAc,SAA+G;AACjI,WAAO,MAAM,KAAK,WAAW,cAAc,OAAO;AAAA,EACpD;AAAA,EAEA,MAAM,wBAAwB,MAAgF;AAC5G,WAAO,MAAM,KAAK,WAAW,wBAAwB,IAAI;AAAA,EAC3D;AAAA,EAEA,MAAM,yBAAyB,MAAgF;AAC7G,WAAO,MAAM,KAAK,WAAW,qBAAqB;AAAA,MAChD,MAAM;AAAA,MACN;AAAA,MACA,SAAS,MAAM,KAAK,YAAY;AAAA,IAClC,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,qBAAqB,MAAgF;AACzG,UAAM,SAAS,MAAM,KAAK,WAAW,qBAAqB;AAAA,MACxD,MAAM;AAAA,MACN;AAAA,MACA,SAAS,MAAM,KAAK,YAAY;AAAA,IAClC,CAAC;AAED,QAAI,OAAO,WAAW,MAAM;AAC1B,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAEA,MAAM,yBAAyB,MAAkG;AAC/H,UAAM,SAAS,MAAM,KAAK,WAAW,qBAAqB;AAAA,MACxD,MAAM;AAAA,MACN;AAAA,MACA,SAAS,MAAM,KAAK,YAAY;AAAA,IAClC,CAAC;AAED,QAAI,OAAO,WAAW,MAAM;AAC1B,aAAO,OAAO,GAAG,EAAE,iBAAiB,OAAO,KAAK,kBAAkB,CAAC;AAAA,IACrE,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,MAAgF;AAChG,UAAM,SAAS,MAAM,KAAK,WAAW,YAAY,IAAI;AACrD,UAAM,KAAK,kBAAkB,QAAQ,CAAC,MAAM,KAAK,YAAY,CAAC,CAAC;AAC/D,UAAM,KAAK,4BAA4B,QAAQ,CAAC,MAAM,KAAK,YAAY,CAAC,CAAC;AACzE,WAAO;AAAA,EACT;AAAA,EAMA,MAAM,QAAQ,SAA+F;AAE3G,QAAI,SAAS,OAAO,eAAe,QAAQ,sBAAsB,OAAO;AACtE,YAAM,IAAI,MAAM,wHAAwH;AAAA,IAC1I;AAEA,SAAK,4BAA4B,SAAS,UAAU;AACpD,UAAM,UAAU,MAAM,KAAK,YAAY,SAAS,UAAU;AAC1D,QAAI,OAAO,OAAO,QAAQ,MAAM,KAAK,kBAAkB,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AACzF,UAAM,mBAAmB,SAAS,OAAO,eAAe,SAAS,OAAO;AACxE,UAAM,oBAAoB,SAAS,sBAAsB,QAAQ;AAEjE,QAAI,SAAS,QAAS,KAAK,gBAAgB,CAAC,oBAAsB,KAAK,iBAAiB,CAAC,mBAAoB;AAC3G,cAAQ,SAAS,IAAI;AAAA,QACnB,KAAK,YAAY;AACf,cAAI,CAAC,MAAM,gBAAgB,MAAM,eAAe;AAC9C,kBAAM,KAAK,qBAAqB,EAAE,SAAS,KAAK,CAAC;AAAA,UACnD,OAAO;AACL,kBAAM,KAAK,iBAAiB,EAAE,SAAS,KAAK,CAAC;AAAA,UAC/C;AAEA;AAAA,QACF;AAAA,QACA,KAAK,SAAS;AACZ,gBAAM,IAAI,MAAM,mEAAmE;AAAA,QACrF;AAAA,QACA,KAAK,aAAa;AAChB,gBAAM,SAAS,MAAM,KAAK,mBAAmB;AAC7C,iBAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,QAAQ,IAAI,mCAAmC,mBAAmB,KAAK,CAAC,KAAK,SAAS,mDAAmD;AAAA,QACnL;AAAA,QACA,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK,eAAe;AAClB,iBAAO;AAAA,QACT;AAAA,MACF;AAAA,IACF;AAEA,WAAO,QAAQ,KAAK,qBAAqB,MAAM,OAAO;AAAA,EACxD;AAAA,EAMA,QAAQ,SAAsF;AAE5F,QAAI,SAAS,OAAO,eAAe,QAAQ,sBAAsB,OAAO;AACtE,YAAM,IAAI,MAAM,wHAAwH;AAAA,IAC1I;AAEA,SAAK,4BAA4B,SAAS,UAAU;AAEpD,UAAM,UAAU,KAAK,YAAY,SAAS,UAAU;AACpD,QAAI,OAAO,cAAc,KAAK,mBAAmB,CAAC,OAAO,GAAY,qBAAqB;AAC1F,UAAM,mBAAmB,SAAS,OAAO,eAAe,SAAS,OAAO;AACxE,UAAM,oBAAoB,SAAS,sBAAsB,QAAQ;AAEjE,QAAI,SAAS,QAAS,KAAK,gBAAgB,CAAC,oBAAsB,KAAK,iBAAiB,CAAC,mBAAoB;AAC3G,cAAQ,SAAS,IAAI;AAAA,QACnB,KAAK,YAAY;AACf,cAAI,CAAC,MAAM,gBAAgB,MAAM,eAAe;AAC9C,8BAAkB,KAAK,qBAAqB,EAAE,SAAS,KAAK,CAAC,CAAC;AAAA,UAChE,OAAO;AACL,8BAAkB,KAAK,iBAAiB,EAAE,SAAS,KAAK,CAAC,CAAC;AAAA,UAC5D;AACA,kBAAQ;AACR,gBAAM,IAAI,oBAAoB,6BAA6B;AAAA,QAC7D;AAAA,QACA,KAAK,SAAS;AACZ,gBAAM,IAAI,MAAM,mEAAmE;AAAA,QACrF;AAAA,QACA,KAAK,aAAa;AAGhB,4BAAkB,YAAY;AAC5B,kBAAM,KAAK,mBAAmB;AAC9B,gBAAI,OAAO,WAAW,aAAa;AACjC,qBAAO,SAAS,OAAO;AAAA,YACzB;AAAA,UACF,CAAC;AACD,kBAAQ;AACR,gBAAM,IAAI,oBAAoB,6BAA6B;AAAA,QAC7D;AAAA,QACA,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK,eAAe;AAAA,QAEpB;AAAA,MACF;AAAA,IACF;AAEA,WAAO,QAAQ,MAAM;AACnB,aAAO,QAAQ,KAAK,qBAAqB,MAAM,OAAO;AAAA,IACxD,GAAG,CAAC,MAAM,SAAS,SAAS,EAAE,CAAC;AAAA,EACjC;AAAA,EAEA,gCAAgC,SAA0B,SAA+E;AACvI,UAAM,cAAc,QAAQ,8BAA8B,GAAG,IAAI;AACjE,QAAI,CAAC,aAAa;AAChB,aAAO;AAAA,IACT;AACA,UAAM,cAAc,YAAY,QAAQ;AACxC,QAAI,eAAe,QAAQ,OAAO,aAAa;AAC7C,aAAO;AAAA,IACT;AACA,WAAO;AAAA,MACL,IAAI,YAAY,QAAQ;AAAA,MACxB,cAAc,YAAY,QAAQ;AAAA,MAClC,aAAa,YAAY,QAAQ;AAAA,MACjC,sBAAsB,YAAY,QAAQ;AAAA,MAC1C;AAAA,MACA,cAAc,YAAY,QAAQ;AAAA,MAClC,kBAAkB,YAAY,QAAQ;AAAA,IACxC;AAAA,EACF;AAAA,EAEA,MAAM,0BAA0B,KAAkD;AAChF,UAAM,OAAO,MAAM,IAAI,KAAK,gBAAgB;AAC5C,QAAI,CAAC,MAAM;AACT,aAAO;AAAA,IACT;AACA,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK,QAAQ;AAAA,MAC1B,cAAc,KAAK,SAAS;AAAA,MAC5B,sBAAsB,KAAK;AAAA,MAC3B,aAAa,KAAK;AAAA,MAClB,cAAc,KAAK;AAAA,MACnB,kBAAmB,KAAK,qBAA6E;AAAA,IACvG;AAAA,EACF;AAAA,EAIA,MAAM,eAAe,SAA4G;AAC/H,YAAQ,QAAQ,MAAM;AAAA,MACpB,KAAK,SAAS;AACZ,aAAK,4BAA4B,QAAQ,cAAc,KAAK,eAAe;AAC3E,cAAM,UAAU,MAAM,KAAK,YAAY,QAAQ,UAAU;AACzD,eAAO,KAAK,gCAAgC,SAAS,OAAO;AAAA,MAC9D;AAAA,MACA,KAAK,UAAU;AACb,eAAO,MAAM,KAAK,0BAA0B,QAAQ,GAAG;AAAA,MACzD;AAAA,MACA,SAAS;AAEP,cAAM,IAAI,MAAM,0BAA0B,QAAQ,IAAI,EAAE;AAAA,MAC1D;AAAA,IACF;AAAA,EACF;AAAA,EAGA,eAAe,SAAmG;AAChH,YAAQ,QAAQ,MAAM;AAAA,MACpB,KAAK,SAAS;AACZ,aAAK,4BAA4B,QAAQ,cAAc,KAAK,eAAe;AAC3E,cAAM,UAAU,KAAK,YAAY,QAAQ,UAAU;AACnD,eAAO,KAAK,gCAAgC,SAAS,OAAO;AAAA,MAC9D;AAAA,MACA,KAAK,UAAU;AACb,cAAM,SAAS,cAAc,KAAK,yBAAyB,CAAC,QAAQ,GAAG,GAAY,4BAA4B;AAC/G,eAAO;AAAA,MACT;AAAA,MACA,SAAS;AAEP,cAAM,IAAI,MAAM,0BAA0B,QAAQ,IAAI,EAAE;AAAA,MAC1D;AAAA,IACF;AAAA,EACF;AAAA,EACA,oBAAoB,SAA2G;AAC7H,WAAO,OAAO,SAAyC;AACrD,YAAM,UAAU,MAAM,KAAK,YAAY,QAAQ,cAAc,KAAK,eAAe;AACjF,UAAI,CAAC,KAAK,mBAAmB;AAC3B,cAAMC,UAAS,MAAM,QAAQ,4BAA4B,KAAQ,IAAM;AACvE,eAAOA,SAAQ,YAAY,SAAS;AAAA,MACtC;AACA,YAAM,SAAS,MAAM,QAAQ,eAAe;AAC5C,aAAO,QAAQ,YAAY,SAAS;AAAA,IACtC;AAAA,EACF;AAAA,EAEA,MAAM,wBAAwB,SAA0D;AACtF,UAAM,UAAU,MAAM,KAAK,YAAY,QAAQ,UAAU;AACzD,UAAM,SAAS,MAAM,QAAQ,4BAA4B,KAAQ,IAAM;AACvE,WAAO,QAAQ,YAAY,SAAS;AAAA,EACtC;AAAA,EAEA,MAAgB,kBAAkB,QAA2B,SAA0B;AACrF,UAAM,MAAM,MAAM,KAAK,WAAW,iBAAiB,wBAAwB,MAAM,GAAG,OAAO;AAC3F,UAAM,KAAK,aAAa,OAAO;AAC/B,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,gBAAgB,UAAwB,SAAiC;AAC7E,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,IAAI,MAAM,uEAAuE;AAAA,IACzF;AAEA,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,UAAM;AAAA,MACJ,KAAK;AAAA,MACL;AAAA,QACE;AAAA,QACA,aAAa,SAAS,YAAY,KAAK,KAAK;AAAA,QAC5C,kBAAkB,KAAK,KAAK;AAAA,QAC5B,eAAe,KAAK,qBAAqB,QAAQ,GAAG,KAAK,GAAG;AAAA,MAC9D;AAAA,MACA;AAAA,IACF;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAgB,iBAAiB,OAAyD,SAA0C;AAElI,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO,eAAe,QAAQ,0BAA2B,MAAM,SAAiB,gBAAgB,SAAS,sBAAsB,CAAC;AAAA,IAClI;AAGA,UAAM,KAAK,cAAc;AAEzB,UAAM,IAAI,oBAAoB,8CAA8C;AAAA,EAC9E;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAgB,uBAA6B,UAAgI;AAC3K,QAAI;AACF,aAAO,MAAM,SAAS;AAAA,IACxB,SAAS,GAAG;AACV,UAAI,YAAY,kCAAkC,WAAW,CAAC,GAAG;AAC/D,eAAO,OAAO,GAAG,MAAM,KAAK,iBAAiB,GAAG,MAAM,KAAK,YAAY,CAAC,CAAC;AAAA,MAC3E;AACA,YAAM;AAAA,IACR;AAAA,EACF;AAAA,EAEA,MAAM,qBAAqB,SAI2E;AACpG,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,eAAO,MAAM,KAAK,WAAW,qBAAqB,QAAQ,OAAO,QAAQ,UAAU,OAAO;AAAA,MAC5F,CAAC;AAAA,IACH,SAAS,GAAG;AACV,UAAI,YAAY,gBAAgB,WAAW,CAAC,GAAG;AAC7C,eAAO,OAAO,MAAM,CAAC;AAAA,MACvB;AACA,YAAM;AAAA,IACR;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,UAAI,CAAC,QAAQ,YAAY;AACvB,cAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,MACpD;AACA,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAEA,MAAM,qBAAqB,SAM2F;AACpH,QAAI,QAAQ,0BAA0B,QAAQ,yBAAyB;AACrE,YAAM,IAAI,oBAAoB,4EAA4E;AAAA,IAC5G;AACA,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,UAAM,+BAA+B,QAAQ,yBAAyB,SAAY,QAAQ,2BAA2B,qBAAqB,KAAK,KAAK,mBAAmB,yBAAyB;AAEhM,QAAI,SAAS,MAAM,KAAK,WAAW;AAAA,MACjC,QAAQ;AAAA,MACR,QAAQ;AAAA,MACR;AAAA,MACA;AAAA,IACF;AAIA,QAAI,OAAO,WAAW,WACpB,OAAO,iBAAiB,YAAY,6BACpC,CAAC,QAAQ,0BACT,iCAAiC,QAAW;AAC5C,cAAQ,MAAM,8LAA8L,EAAE,KAAK,6BAA6B,CAAC;AAEjP,eAAS,MAAM,KAAK,WAAW;AAAA,QAC7B,QAAQ;AAAA,QACR,QAAQ;AAAA,QACR;AAAA;AAAA,QACA;AAAA,MACF;AAAA,IACF;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,UAAI,CAAC,QAAQ,YAAY;AACvB,cAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,MACpD;AACA,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAEA,MAAM,qBAAqB;AACzB,SAAK,4BAA4B;AAEjC,QAAI,CAAC,KAAK,4BAA4B;AACpC,WAAK,8BAA8B,YAAY;AAC7C,aAAK,4BAA4B;AACjC,cAAM,UAAU,MAAM,KAAK,YAAY;AACvC,cAAM,SAAS,MAAM,KAAK,WAAW,kBAAkB,OAAO;AAC9D,YAAI,OAAO,WAAW,MAAM;AAC1B,gBAAM,KAAK,2BAA2B,OAAO,IAAI;AAAA,QACnD,OAAO;AACL,gBAAM,IAAI,oBAAoB,kDAAkD;AAAA,QAClF;AACA,aAAK,6BAA6B;AAClC,eAAO,OAAO;AAAA,MAChB,GAAG;AAAA,IACL;AAEA,WAAO,MAAM,KAAK;AAAA,EACpB;AAAA,EAEA,MAAM,oBAAoB,MAAc,SAAuI;AAC7K,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,eAAO,MAAM,KAAK,WAAW,oBAAoB,MAAM,OAAO;AAAA,MAChE,CAAC;AAAA,IACH,SAAS,GAAG;AACV,UAAI,YAAY,gBAAgB,WAAW,CAAC,GAAG;AAC7C,eAAO,OAAO,MAAM,CAAC;AAAA,MACvB;AACA,YAAM;AAAA,IACR;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,UAAI,CAAE,SAAS,YAAa;AAC1B,YAAI,OAAO,KAAK,SAAS;AACvB,gBAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,QACpD,OAAO;AACL,gBAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,QACpD;AAAA,MACF;AACA,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAqBA,MAAM,eAAe,SAM2G;AAE9H,UAAM,WAAW,MAAM,KAAK,WAAW;AAAA,MACrC;AAAA,MACA;AAAA,QACE,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,QAClB;AAAA,QACA,MAAM,KAAK,UAAU;AAAA,UACnB,mBAAmB,QAAQ;AAAA,QAC7B,CAAC;AAAA,MACH;AAAA,MACA;AAAA,IACF;AAEA,QAAI,CAAC,SAAS,IAAI;AAChB,aAAO,OAAO,MAAM,IAAI,YAAY,aAAa,gCAAgC,SAAS,MAAM,IAAI,MAAM,SAAS,KAAK,CAAC,EAAE,CAAC;AAAA,IAC9H;AAEA,UAAM,aAAa,MAAM,SAAS,KAAK;AACvC,UAAM,cAAc,WAAW;AAC/B,UAAM,YAAY,WAAW;AAG7B,UAAM,MAAM,GAAG,QAAQ,MAAM,wCAAwC,mBAAmB,SAAS,CAAC;AAClG,QAAI,QAAQ,YAAY;AACtB,cAAQ,WAAW,GAAG;AAAA,IACxB,OAAO;AACL,cAAQ,IAAI;AAAA,EAAoD,GAAG,EAAE;AAAA,IACvE;AAIA,QAAI,WAAW;AACf,WAAO,YAAY,QAAQ,eAAe,WAAW;AACnD;AACA,YAAM,eAAe,MAAM,KAAK,WAAW,kBAAkB,kBAAkB;AAAA,QAC7E,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,QAClB;AAAA,QACA,MAAM,KAAK,UAAU;AAAA,UACnB,cAAc;AAAA,QAChB,CAAC;AAAA,MACH,GAAG,IAAI;AAEP,UAAI,CAAC,aAAa,IAAI;AACpB,eAAO,OAAO,MAAM,IAAI,YAAY,aAAa,gCAAgC,aAAa,MAAM,IAAI,MAAM,aAAa,KAAK,CAAC,EAAE,CAAC;AAAA,MACtI;AACA,YAAM,aAAa,MAAM,aAAa,KAAK;AAE3C,UAAI,aAAa,WAAW,OAAO,WAAW,WAAW,WAAW;AAClE,eAAO,OAAO,GAAG,WAAW,aAAa;AAAA,MAC3C;AACA,UAAI,WAAW,WAAW,WAAW;AACnC,cAAM,KAAK,QAAQ,kBAAkB,GAAI;AACzC;AAAA,MACF;AACA,UAAI,WAAW,WAAW,WAAW;AACnC,eAAO,OAAO,MAAM,IAAI,YAAY,oBAAoB,uDAAuD,CAAC;AAAA,MAClH;AACA,UAAI,WAAW,WAAW,QAAQ;AAChC,eAAO,OAAO,MAAM,IAAI,YAAY,iBAAiB,kDAAkD,CAAC;AAAA,MAC1G;AACA,aAAO,OAAO,MAAM,IAAI,YAAY,aAAa,4CAA4C,WAAW,MAAM,EAAE,CAAC;AAAA,IACnH;AAEA,WAAO,OAAO,MAAM,IAAI,YAAY,aAAa,2CAA2C,CAAC;AAAA,EAC/F;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,MAAM,cAAc,MAAc,MAAc,SAAuI;AACrL,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,eAAO,MAAM,KAAK,WAAW,cAAc,MAAM,MAAM,OAAO;AAAA,MAChE,CAAC;AAAA,IACH,SAAS,GAAG;AACV,UAAI,aAAa,YAAY,iBAAiB;AAC5C,eAAO,OAAO,MAAM,CAAC;AAAA,MACvB;AACA,YAAM;AAAA,IACR;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,UAAI,CAAE,SAAS,YAAa;AAC1B,YAAI,OAAO,KAAK,SAAS;AACvB,gBAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,QACpD,OAAO;AACL,gBAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,QACpD;AAAA,MACF;AACA,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B;AACA,WAAO,OAAO,MAAM,OAAO,KAAK;AAAA,EAClC;AAAA,EAEA,MAAM,oBAAmK;AACvK,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,cAAM,mBAAmB,MAAM,KAAK,WAAW,8BAA8B,CAAC,GAAG,OAAO;AACxF,YAAI,iBAAiB,WAAW,MAAM;AACpC,iBAAO,OAAO,MAAM,IAAI,YAAY,4BAA4B,6DAA6D,CAAC;AAAA,QAChI;AAEA,cAAM,EAAE,cAAc,KAAK,IAAI,iBAAiB;AAGhD,YAAI,aAAa,SAAS,2CAA2C;AACnE,gBAAM,IAAI,oBAAoB,oEAAoE,aAAa,IAAI,EAAE;AAAA,QACvH;AACA,qBAAa,OAAO,OAAO,SAAS;AAEpC,cAAM,0BAA0B,MAAM,oBAAoB,EAAE,aAAa,aAAa,CAAC;AACvF,eAAO,MAAM,KAAK,WAAW,kBAAkB,EAAE,yBAAyB,KAAK,GAAG,OAAO;AAAA,MAC3F,CAAC;AAAA,IACH,SAAS,OAAO;AACd,UAAI,iBAAiB,eAAe;AAClC,eAAO,OAAO,MAAM,IAAI,YAAY,qBAAqB,MAAM,SAAS,MAAM,IAAI,CAAC;AAAA,MACrF,OAAO;AAEL,eAAO,OAAO,MAAM,IAAI,YAAY,4BAA4B,gCAAgC,CAAC;AAAA,MACnG;AAAA,IACF;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,YAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAClD,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAGA,MAAM,oBAAoB;AACxB,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,IAAI,MAAM,yEAAyE;AAAA,IAC3F;AACA,SAAK,4BAA4B;AACjC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,eAAO,MAAM,kBAAkB,KAAK,YAAY,KAAK,KAAK,aAAa;AAAA,MACzE,CAAC;AAAA,IACH,SAAS,GAAG;AACV,UAAI,YAAY,gBAAgB,WAAW,CAAC,GAAG;AAC7C,cAAM,iDAAiD;AACvD,eAAO;AAAA,MACT,OAAO;AACL,cAAM;AAAA,MACR;AAAA,IACF;AACA,QAAI,OAAO,WAAW,QAAQ,OAAO,MAAM;AACzC,YAAM,KAAK,2BAA2B,OAAO,IAAI;AAGjD,UAAI,8BAA8B,OAAO,QAAQ,OAAO,KAAK,0BAA0B;AACrF,cAAM,KAAK,YAAY,EAAE,KAAK,OAAO,KAAK,0BAA0B,SAAS,KAAK,CAAC;AACnF,eAAO;AAAA,MACT,WAAW,OAAO,KAAK,SAAS;AAC9B,cAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAClD,eAAO;AAAA,MACT,OAAO;AACL,cAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAClD,eAAO;AAAA,MACT;AAAA,IACF;AACA,WAAO;AAAA,EACT;AAAA,EAEA,MAAgB,SAAS,SAA0B,SAAyD;AAC1G,UAAM,UAAU,cAAc,YAAY;AACxC,YAAM,KAAK,WAAW,QAAQ,OAAO;AACrC,UAAI,SAAS,aAAa;AACxB,cAAM,KAAK,YAAY,EAAE,KAAK,QAAQ,aAAa,SAAS,KAAK,CAAC;AAAA,MACpE,OAAO;AACL,cAAM,KAAK,uBAAuB;AAAA,MACpC;AAAA,IACF,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,QAAQ,SAAsF;AAClG,UAAM,OAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACvF,QAAI,MAAM;AACR,YAAM,KAAK,QAAQ,EAAE,aAAa,SAAS,YAAY,CAAC;AAAA,IAC1D;AAAA,EACF;AAAA,EAEA,MAAM,eAAe,SAAmE;AACtF,UAAM,OAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACvF,QAAI,MAAM;AACR,aAAO,MAAM,KAAK,eAAe;AAAA,IACnC;AACA,WAAO;AAAA,EACT;AAAA,EAEA,eAAe,SAA0D;AACvE,UAAM,OAAO,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACjF,QAAI,MAAM;AACR,aAAO,KAAK,eAAe;AAAA,IAC7B;AACA,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,gBAAgB,SAAmE;AACvF,UAAM,OAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACvF,QAAI,MAAM;AACR,aAAO,MAAM,KAAK,gBAAgB;AAAA,IACpC;AACA,WAAO;AAAA,EACT;AAAA,EAEA,gBAAgB,SAA0D;AACxE,UAAM,OAAO,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACjF,QAAI,MAAM;AACR,aAAO,KAAK,gBAAgB;AAAA,IAC9B;AACA,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,eAAe,SAAgF;AACnG,WAAO;AAAA,MACL,gBAAgB,KAAK,UAAU,MAAM,KAAK,YAAY,OAAO,CAAC;AAAA,IAChE;AAAA,EACF;AAAA,EAEA,eAAe,SAAuE;AACpF,WAAO;AAAA,MACL,gBAAgB,KAAK,UAAU,KAAK,YAAY,OAAO,CAAC;AAAA,IAC1D;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,SAAiH;AACjI,UAAM,OAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACvF,QAAI,MAAM;AACR,aAAO,MAAM,KAAK,YAAY;AAAA,IAChC;AACA,WAAO,EAAE,aAAa,MAAM,cAAc,KAAK;AAAA,EACjD;AAAA,EAEA,YAAY,SAAwG;AAClH,UAAM,OAAO,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACjF,QAAI,MAAM;AACR,aAAO,KAAK,YAAY;AAAA,IAC1B;AACA,WAAO,EAAE,aAAa,MAAM,cAAc,KAAK;AAAA,EACjD;AAAA,EAEA,MAAM,aAA+B;AACnC,UAAM,OAAO,OAAO,QAAQ,MAAM,KAAK,qBAAqB,UAAU,CAAC,GAAG,YAAY,CAAC;AACvF,WAAO,KAAK,uBAAuB,IAAI;AAAA,EACzC;AAAA,EAEA,aAAsB;AACpB,UAAM,OAAO,cAAc,KAAK,sBAAsB,CAAC,GAAG,wBAAwB;AAClF,WAAO,QAAQ,MAAM,KAAK,uBAAuB,IAAI,GAAG,CAAC,IAAI,CAAC;AAAA,EAChE;AAAA,EAEA,MAAgB,mBAAmB,SAAwD;AACzF,SAAK,uBAAuB;AAC5B,UAAM,OAAO,OAAO,QAAQ,MAAM,KAAK,oBAAoB,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AAC7F,WAAO,KAAK,IAAI,CAAC,MAAM,KAAK,kBAAkB,EAAE,IAAI,OAAO,EAAE;AAAA,MAC3D;AAAA,MACA,MAAM,KAAK,sBAAsB,OAAO;AAAA,IAC1C,CAAC;AAAA,EACH;AAAA,EAEU,kBAAkB,SAA+C;AACzE,SAAK,uBAAuB;AAC5B,UAAM,WAAW,cAAc,KAAK,qBAAqB,CAAC,OAAO,GAAG,8BAA8B;AAClG,WAAO,QAAQ,MAAM,SAAS,IAAI,CAAC,MAAM,KAAK,kBAAkB,EAAE,IAAI,OAAO,EAAE;AAAA,MAC7E;AAAA,MACA,MAAM,KAAK,sBAAsB,OAAO;AAAA,IAC1C,CAAC,GAAG,CAAC,QAAQ,CAAC;AAAA,EAChB;AAAA,EACA,MAAgB,eAAe,SAA0B,YAA6G;AACpK,SAAK,uBAAuB;AAC5B,UAAM,OAAO,MAAM,KAAK,WAAW,cAAc,gCAAgC,UAAU,GAAG,OAAO;AACrG,UAAM,MAAM,KAAK,kBAAkB,KAAK,IAAI,OAAO,EAAE;AAAA,MACnD;AAAA,MACA,MAAM,KAAK,sBAAsB,OAAO;AAAA,IAC1C;AACA,UAAM,KAAK,sBAAsB,OAAO;AACxC,WAAO;AAAA,EACT;AAAA,EAEA,MAAgB,aAAa,SAA0B;AAErD,UAAM,KAAK,gBAAgB,OAAO;AAAA,EACpC;AAAA,EAEA,MAAgB,gBAAgB,SAA0B;AACxD,UAAM,KAAK,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAE9C,YAAQ,0BAA0B;AAAA,EACpC;AAAA,EAEA,MAAgB,gBAAgB;AAAA,EAEhC;AAAA,EAEA,MAAgB,kBAAkB;AAChC,UAAM,KAAK,qBAAqB,QAAQ,CAAC,CAAC;AAAA,EAC5C;AAAA,EAEA,MAAgB,sBAAsB,SAA0B;AAC9D,UAAM,KAAK,oBAAoB,QAAQ,CAAC,OAAO,CAAC;AAAA,EAClD;AAAA,EAEA,YAAY,uBAAuB,IAAI;AACrC,WAAO;AAAA,MACL,gBAAgB,CACd,SAC6C;AAC7C,cAAM,sBAAsB,KAAK,UAAU,KAAK,MAAM;AAAA;AAAA,QAAqB,CAAC,CAAC;AAC7E,cAAM,WAAW,cAAc,IAAI,KAAK,gBAAgB;AACxD,YAAI,UAAU;AACZ,gBAAM,CAAC,qBAAqB,SAAS,IAAI;AACzC,cAAI,wBAAwB,UAAa,wBAAwB,qBAAqB;AACpF,kBAAM,IAAI,oBAAoB,qHAAqH,EAAE,aAAa,MAAM,gBAAgB,oBAAoB,CAAC;AAAA,UAC/M;AACA,iBAAO;AAAA,QACT;AAEA,eAAO,IAAI,+BAAwD;AAAA,UACjE,GAAG,KAAK,MAAM,CAAC,kBAAkB,CAAC;AAAA,QACpC,GAAG;AAAA,UACD,kBAAkB,KAAK;AAAA,UACvB,aAAa;AAAA,QACf,CAAC;AAAA,MACH;AAAA,IACF;AAAA,EACF;AAAA,EAEA,KAAK,uBAAuB,IAAI;AAC9B,WAAO;AAAA,MACL,cAAc,MAAoD;AAChE,YAAI,EAAE,0BAA0B,KAAK,WAAW,UAAU;AAExD,gBAAM,IAAI,oBAAoB,+EAA+E;AAAA,QAC/G;AAEA,YAAI,OAAO,KAAK,oBAAoB,UAAU;AAC5C,gBAAM,IAAI,oBAAoB,gFAAgF;AAAA,QAChH;AAEA,eAAO;AAAA,UACL,SAAS,KAAK,SAAS;AAAA,UACvB,WAAW,KAAK;AAAA,UAChB,sBAAsB,KAAK,WAAW,QAAQ;AAAA,UAC9C,YAAY,KAAK;AAAA,UACjB,MAAM,KAAK;AAAA,UACX,qBAAqB,KAAK;AAAA,UAC1B,kBAAkB,KAAK,qBAAqB;AAAA,UAC5C,gBAAgB,KAAK;AAAA,UACrB,qBAAqB,KAAK,SAAS;AAAA,QACrC;AAAA,MACF;AAAA,MACA,gBAAgB,CAAC,oBAAuE;AACtF,0BAAkB,YAAY;AAC5B,gBAAM,KAAK,kBAAkB,yBAAyB,CAAC,MAAM,KAAK,YAAY,CAAC,GAAG,OAAO,YAAY,eAAe,CAAC;AAAA,QACvH,CAAC;AAAA,MACH;AAAA,MACA,uBAAuB,MAAM,KAAK;AAAA,MAClC,aAAa,OACX,MACA,gBACA,cAA6C,aAC1C;AACH,eAAO,MAAM,KAAK,WAAW,kBAAkB,MAAM,gBAAgB,MAAM,KAAK,YAAY,GAAG,WAAW;AAAA,MAC5G;AAAA,IACF;AAAA,EACF;AACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAtmFa,+BAQK,wBAA+G,EAAE,OAAO,OAAU;AAR7I,IAAM,gCAAN;","names":["value","parsed","crud","response","tokens"]}
|
|
1
|
+
{"version":3,"sources":["../../../../../../src/lib/stack-app/apps/implementations/client-app-impl.ts"],"sourcesContent":["\n//===========================================\n// THIS FILE IS AUTO-GENERATED FROM TEMPLATE. DO NOT EDIT IT DIRECTLY, INSTEAD EDIT THE CORRESPONDING FILE IN packages/template\n//===========================================\nimport { WebAuthnError, startAuthentication, startRegistration } from \"@simplewebauthn/browser\";\nimport { KnownErrors, StackClientInterface } from \"@stackframe/stack-shared\";\nimport { ContactChannelsCrud } from \"@stackframe/stack-shared/dist/interface/crud/contact-channels\";\nimport { CurrentUserCrud } from \"@stackframe/stack-shared/dist/interface/crud/current-user\";\nimport type { CustomerInvoicesListResponse } from \"@stackframe/stack-shared/dist/interface/crud/invoices\";\nimport { ItemCrud } from \"@stackframe/stack-shared/dist/interface/crud/items\";\nimport { NotificationPreferenceCrud } from \"@stackframe/stack-shared/dist/interface/crud/notification-preferences\";\nimport { OAuthProviderCrud } from \"@stackframe/stack-shared/dist/interface/crud/oauth-providers\";\nimport type { CustomerProductsListResponse } from \"@stackframe/stack-shared/dist/interface/crud/products\";\nimport { TeamApiKeysCrud, UserApiKeysCrud, teamApiKeysCreateOutputSchema, userApiKeysCreateOutputSchema } from \"@stackframe/stack-shared/dist/interface/crud/project-api-keys\";\nimport { ProjectPermissionsCrud } from \"@stackframe/stack-shared/dist/interface/crud/project-permissions\";\nimport { ClientProjectsCrud } from \"@stackframe/stack-shared/dist/interface/crud/projects\";\nimport { SessionsCrud } from \"@stackframe/stack-shared/dist/interface/crud/sessions\";\nimport { TeamInvitationCrud } from \"@stackframe/stack-shared/dist/interface/crud/team-invitation\";\nimport { TeamMemberProfilesCrud } from \"@stackframe/stack-shared/dist/interface/crud/team-member-profiles\";\nimport { TeamPermissionsCrud } from \"@stackframe/stack-shared/dist/interface/crud/team-permissions\";\nimport { TeamsCrud } from \"@stackframe/stack-shared/dist/interface/crud/teams\";\nimport { UsersCrud } from \"@stackframe/stack-shared/dist/interface/crud/users\";\nimport { InternalSession } from \"@stackframe/stack-shared/dist/sessions\";\nimport { encodeBase32 } from \"@stackframe/stack-shared/dist/utils/bytes\";\nimport { scrambleDuringCompileTime } from \"@stackframe/stack-shared/dist/utils/compile-time\";\nimport { isBrowserLike } from \"@stackframe/stack-shared/dist/utils/env\";\nimport { StackAssertionError, captureError, throwErr } from \"@stackframe/stack-shared/dist/utils/errors\";\nimport { parseJson } from \"@stackframe/stack-shared/dist/utils/json\";\nimport { DependenciesMap } from \"@stackframe/stack-shared/dist/utils/maps\";\nimport { ProviderType } from \"@stackframe/stack-shared/dist/utils/oauth\";\nimport { deepPlainEquals, omit } from \"@stackframe/stack-shared/dist/utils/objects\";\nimport { neverResolve, runAsynchronously, wait } from \"@stackframe/stack-shared/dist/utils/promises\";\nimport { suspend, suspendIfSsr, use } from \"@stackframe/stack-shared/dist/utils/react\";\nimport { Result } from \"@stackframe/stack-shared/dist/utils/results\";\nimport { Store, storeLock } from \"@stackframe/stack-shared/dist/utils/stores\";\nimport { deindent, mergeScopeStrings } from \"@stackframe/stack-shared/dist/utils/strings\";\nimport { getRelativePart, isRelative } from \"@stackframe/stack-shared/dist/utils/urls\";\nimport { generateUuid } from \"@stackframe/stack-shared/dist/utils/uuids\";\nimport * as cookie from \"cookie\";\nimport React, { useCallback, useMemo } from \"react\"; // THIS_LINE_PLATFORM react-like\nimport type * as yup from \"yup\";\nimport { constructRedirectUrl } from \"../../../../utils/url\";\nimport { addNewOAuthProviderOrScope, callOAuthCallback, signInWithOAuth } from \"../../../auth\";\nimport { CookieHelper, createBrowserCookieHelper, createCookieHelper, createPlaceholderCookieHelper, deleteCookie, deleteCookieClient, isSecure as isSecureCookieContext, setOrDeleteCookie, setOrDeleteCookieClient } from \"../../../cookie\";\nimport { ApiKey, ApiKeyCreationOptions, ApiKeyUpdateOptions, apiKeyCreationOptionsToCrud } from \"../../api-keys\";\nimport { ConvexCtx, GetCurrentPartialUserOptions, GetCurrentUserOptions, HandlerUrls, OAuthScopesOnSignIn, RedirectMethod, RedirectToOptions, RequestLike, TokenStoreInit, stackAppInternalsSymbol } from \"../../common\";\nimport { OAuthConnection } from \"../../connected-accounts\";\nimport { ContactChannel, ContactChannelCreateOptions, ContactChannelUpdateOptions, contactChannelCreateOptionsToCrud, contactChannelUpdateOptionsToCrud } from \"../../contact-channels\";\nimport { Customer, CustomerBilling, CustomerDefaultPaymentMethod, CustomerInvoiceStatus, CustomerInvoicesList, CustomerInvoicesListOptions, CustomerInvoicesRequestOptions, CustomerPaymentMethodSetupIntent, CustomerProductsList, CustomerProductsListOptions, CustomerProductsRequestOptions, Item } from \"../../customers\";\nimport { NotificationCategory } from \"../../notification-categories\";\nimport { TeamPermission } from \"../../permissions\";\nimport { AdminOwnedProject, AdminProjectUpdateOptions, Project, adminProjectCreateOptionsToCrud } from \"../../projects\";\nimport { EditableTeamMemberProfile, Team, TeamCreateOptions, TeamInvitation, TeamUpdateOptions, TeamUser, teamCreateOptionsToCrud, teamUpdateOptionsToCrud } from \"../../teams\";\nimport { ActiveSession, Auth, BaseUser, CurrentUser, InternalUserExtra, OAuthProvider, ProjectCurrentUser, SyncedPartialUser, TokenPartialUser, UserExtra, UserUpdateOptions, userUpdateOptionsToCrud, withUserDestructureGuard } from \"../../users\";\nimport { StackClientApp, StackClientAppConstructorOptions, StackClientAppJson } from \"../interfaces/client-app\";\nimport { _StackAdminAppImplIncomplete } from \"./admin-app-impl\";\nimport { TokenObject, clientVersion, createCache, createCacheBySession, createEmptyTokenStore, getBaseUrl, getDefaultExtraRequestHeaders, getDefaultProjectId, getDefaultPublishableClientKey, getUrls, resolveConstructorOptions } from \"./common\";\n\nimport { useAsyncCache } from \"./common\";\n\nlet isReactServer = false;\n\n// hack to make sure process is defined in non-node environments\nconst process = (globalThis as any).process ?? { env: {} }; // THIS_LINE_PLATFORM js react\n\n\nconst allClientApps = new Map<string, [checkString: string | undefined, app: StackClientApp<any, any>]>();\n\ntype StackClientAppImplConstructorOptionsResolved<HasTokenStore extends boolean, ProjectId extends string> = StackClientAppConstructorOptions<HasTokenStore, ProjectId> & { inheritsFrom?: undefined };\n\nexport class _StackClientAppImplIncomplete<HasTokenStore extends boolean, ProjectId extends string = string> implements StackClientApp<HasTokenStore, ProjectId> {\n /**\n * There is a circular dependency between the admin app and the client app, as the former inherits from the latter and\n * the latter needs to use the former when creating a new instance of an internal project.\n *\n * To break it, we set the admin app here lazily instead of importing it directly. This variable is set by ./index.ts,\n * which imports both this file and ./admin-app-impl.ts.\n */\n static readonly LazyStackAdminAppImpl: { value: typeof import(\"./admin-app-impl\")._StackAdminAppImplIncomplete | undefined } = { value: undefined };\n\n protected readonly _options: StackClientAppImplConstructorOptionsResolved<HasTokenStore, ProjectId>;\n protected readonly _extraOptions: { uniqueIdentifier?: string, checkString?: string, interface?: StackClientInterface } | undefined;\n protected _uniqueIdentifier: string | undefined = undefined;\n protected _interface: StackClientInterface;\n protected readonly _tokenStoreInit: TokenStoreInit<HasTokenStore>;\n protected readonly _redirectMethod: RedirectMethod | undefined;\n protected readonly _urlOptions: Partial<HandlerUrls>;\n protected readonly _oauthScopesOnSignIn: Partial<OAuthScopesOnSignIn>;\n\n private __DEMO_ENABLE_SLIGHT_FETCH_DELAY = false;\n private readonly _ownedAdminApps = new DependenciesMap<[InternalSession, string], _StackAdminAppImplIncomplete<false, string>>();\n\n private readonly _currentUserCache = createCacheBySession(async (session) => {\n if (this.__DEMO_ENABLE_SLIGHT_FETCH_DELAY) {\n await wait(2000);\n }\n if (session.isKnownToBeInvalid()) {\n // let's save ourselves a network request\n //\n // this also makes a certain race condition less likely to happen. particularly, it's quite common for code to\n // look like this:\n //\n // const user = await useUser({ or: \"required\" });\n // const something = user.useSomething();\n //\n // now, let's say the session is invalidated. this will trigger a refresh to refresh both the user and the\n // something. however, it's not guaranteed that the user will return first, so useUser might still return a\n // user object while the something request has already completed (and failed, because the session is invalid).\n // by returning null quickly here without a request, it is very very likely for the user request to complete\n // first.\n //\n // TODO HACK: the above is a bit of a hack, and we should probably think of more consistent ways to handle this.\n // it also only works for the user endpoint, and only if the session is known to be invalid.\n return null;\n }\n return await this._interface.getClientUserByToken(session);\n });\n private readonly _currentProjectCache = createCache(async () => {\n return Result.orThrow(await this._interface.getClientProject());\n });\n private readonly _ownedProjectsCache = createCacheBySession(async (session) => {\n return await this._interface.listProjects(session);\n });\n private readonly _currentUserPermissionsCache = createCacheBySession<\n [string, boolean],\n TeamPermissionsCrud['Client']['Read'][]\n >(async (session, [teamId, recursive]) => {\n return await this._interface.listCurrentUserTeamPermissions({ teamId, recursive }, session);\n });\n private readonly _currentUserProjectPermissionsCache = createCacheBySession<\n [boolean],\n ProjectPermissionsCrud['Client']['Read'][]\n >(async (session, [recursive]) => {\n return await this._interface.listCurrentUserProjectPermissions({ recursive }, session);\n });\n private readonly _currentUserTeamsCache = createCacheBySession(async (session) => {\n return await this._interface.listCurrentUserTeams(session);\n });\n private readonly _currentUserOAuthConnectionAccessTokensCache = createCacheBySession<[string, string], { accessToken: string } | null>(\n async (session, [providerId, scope]) => {\n try {\n const result = await this._interface.createProviderAccessToken(providerId, scope || \"\", session);\n return { accessToken: result.access_token };\n } catch (err) {\n if (!(KnownErrors.OAuthConnectionDoesNotHaveRequiredScope.isInstance(err) || KnownErrors.OAuthConnectionNotConnectedToUser.isInstance(err))) {\n throw err;\n }\n }\n return null;\n }\n );\n private readonly _currentUserOAuthConnectionCache = createCacheBySession<[ProviderType, string, boolean], OAuthConnection | null>(\n async (session, [providerId, scope, redirect]) => {\n return await this._getUserOAuthConnectionCacheFn({\n getUser: async () => Result.orThrow(await this._currentUserCache.getOrWait([session], \"write-only\")),\n getOrWaitOAuthToken: async () => Result.orThrow(await this._currentUserOAuthConnectionAccessTokensCache.getOrWait([session, providerId, scope || \"\"] as const, \"write-only\")),\n useOAuthToken: () => useAsyncCache(this._currentUserOAuthConnectionAccessTokensCache, [session, providerId, scope || \"\"] as const, \"connection.useAccessToken()\"),\n providerId,\n scope,\n redirect,\n session,\n });\n }\n );\n private readonly _teamMemberProfilesCache = createCacheBySession<[string], TeamMemberProfilesCrud['Client']['Read'][]>(\n async (session, [teamId]) => {\n return await this._interface.listTeamMemberProfiles({ teamId }, session);\n }\n );\n private readonly _teamInvitationsCache = createCacheBySession<[string], TeamInvitationCrud['Client']['Read'][]>(\n async (session, [teamId]) => {\n return await this._interface.listTeamInvitations({ teamId }, session);\n }\n );\n private readonly _currentUserTeamProfileCache = createCacheBySession<[string], TeamMemberProfilesCrud['Client']['Read']>(\n async (session, [teamId]) => {\n return await this._interface.getTeamMemberProfile({ teamId, userId: 'me' }, session);\n }\n );\n private readonly _clientContactChannelsCache = createCacheBySession<[], ContactChannelsCrud['Client']['Read'][]>(\n async (session) => {\n return await this._interface.listClientContactChannels(session);\n }\n );\n\n private readonly _userApiKeysCache = createCacheBySession<[], UserApiKeysCrud['Client']['Read'][]>(\n async (session) => {\n const results = await this._interface.listProjectApiKeys({ user_id: 'me' }, session, \"client\");\n return results as UserApiKeysCrud['Client']['Read'][];\n }\n );\n\n private readonly _teamApiKeysCache = createCacheBySession<[string], TeamApiKeysCrud['Client']['Read'][]>(\n async (session, [teamId]) => {\n const results = await this._interface.listProjectApiKeys({ team_id: teamId }, session, \"client\");\n return results as TeamApiKeysCrud['Client']['Read'][];\n }\n );\n\n private readonly _notificationCategoriesCache = createCacheBySession<[], NotificationPreferenceCrud['Client']['Read'][]>(\n async (session) => {\n const results = await this._interface.listNotificationCategories(session);\n return results as NotificationPreferenceCrud['Client']['Read'][];\n }\n );\n\n private readonly _currentUserOAuthProvidersCache = createCacheBySession<[], OAuthProviderCrud['Client']['Read'][]>(\n async (session) => {\n return await this._interface.listOAuthProviders({ user_id: 'me' }, session);\n }\n );\n\n private readonly _userItemCache = createCacheBySession<[string, string], ItemCrud['Client']['Read']>(\n async (session, [userId, itemId]) => {\n return await this._interface.getItem({ userId, itemId }, session);\n }\n );\n\n private readonly _teamItemCache = createCacheBySession<[string, string], ItemCrud['Client']['Read']>(\n async (session, [teamId, itemId]) => {\n return await this._interface.getItem({ teamId, itemId }, session);\n }\n );\n\n private readonly _customItemCache = createCacheBySession<[string, string], ItemCrud['Client']['Read']>(\n async (session, [customCustomerId, itemId]) => {\n return await this._interface.getItem({ customCustomerId, itemId }, session);\n }\n );\n\n private readonly _userProductsCache = createCacheBySession<[string, string | null, number | null], CustomerProductsListResponse>(\n async (session, [userId, cursor, limit]) => {\n return await this._interface.listProducts({\n customer_type: \"user\",\n customer_id: userId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _teamProductsCache = createCacheBySession<[string, string | null, number | null], CustomerProductsListResponse>(\n async (session, [teamId, cursor, limit]) => {\n return await this._interface.listProducts({\n customer_type: \"team\",\n customer_id: teamId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _customProductsCache = createCacheBySession<[string, string | null, number | null], CustomerProductsListResponse>(\n async (session, [customCustomerId, cursor, limit]) => {\n return await this._interface.listProducts({\n customer_type: \"custom\",\n customer_id: customCustomerId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _userInvoicesCache = createCacheBySession<[string, string | null, number | null], CustomerInvoicesListResponse>(\n async (session, [userId, cursor, limit]) => {\n return await this._interface.listInvoices({\n customer_type: \"user\",\n customer_id: userId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _teamInvoicesCache = createCacheBySession<[string, string | null, number | null], CustomerInvoicesListResponse>(\n async (session, [teamId, cursor, limit]) => {\n return await this._interface.listInvoices({\n customer_type: \"team\",\n customer_id: teamId,\n cursor: cursor ?? undefined,\n limit: limit ?? undefined,\n }, session);\n }\n );\n\n private readonly _customerBillingCache = createCacheBySession<[\"user\" | \"team\", string], {\n has_customer: boolean,\n default_payment_method: {\n id: string,\n brand: string | null,\n last4: string | null,\n exp_month: number | null,\n exp_year: number | null,\n } | null,\n }>(\n async (session, [customerType, customerId]) => {\n return await this._interface.getCustomerBilling(customerType, customerId, session);\n }\n );\n\n private readonly _convexPartialUserCache = createCache<[unknown], TokenPartialUser | null>(\n async ([ctx]) => await this._getPartialUserFromConvex(ctx as any)\n );\n\n private readonly _trustedParentDomainCache = createCache<[string], string | null>(\n async ([domain]) => await this._getTrustedParentDomain(domain)\n );\n\n private _anonymousSignUpInProgress: Promise<{ accessToken: string, refreshToken: string }> | null = null;\n\n protected async _createCookieHelper(): Promise<CookieHelper> {\n if (this._tokenStoreInit === 'nextjs-cookie' || this._tokenStoreInit === 'cookie') {\n return await createCookieHelper();\n } else {\n return await createPlaceholderCookieHelper();\n }\n }\n\n protected async _getUserOAuthConnectionCacheFn(options: {\n getUser: () => Promise<CurrentUserCrud['Client']['Read'] | null>,\n getOrWaitOAuthToken: () => Promise<{ accessToken: string } | null>,\n useOAuthToken: () => { accessToken: string } | null,\n providerId: ProviderType,\n scope: string | null,\n } & ({ redirect: true, session: InternalSession | null } | { redirect: false }),) {\n const user = await options.getUser();\n let hasConnection = true;\n if (!user || !user.oauth_providers.find((p) => p.id === options.providerId)) {\n hasConnection = false;\n }\n\n const token = await options.getOrWaitOAuthToken();\n if (!token) {\n hasConnection = false;\n }\n\n if (!hasConnection && options.redirect) {\n if (!options.session) {\n throw new Error(deindent`\n Cannot add new scopes to a user that is not a CurrentUser. Please ensure that you are calling this function on a CurrentUser object, or remove the 'or: redirect' option.\n\n Often, you can solve this by calling this function in the browser instead, or by removing the 'or: redirect' option and dealing with the case where the user doesn't have enough permissions.\n `);\n }\n await addNewOAuthProviderOrScope(\n this._interface,\n {\n provider: options.providerId,\n redirectUrl: this.urls.oauthCallback,\n errorRedirectUrl: this.urls.error,\n providerScope: mergeScopeStrings(options.scope || \"\", (this._oauthScopesOnSignIn[options.providerId] ?? []).join(\" \")),\n },\n options.session,\n );\n return await neverResolve();\n } else if (!hasConnection) {\n return null;\n }\n\n return {\n id: options.providerId,\n async getAccessToken() {\n const result = await options.getOrWaitOAuthToken();\n if (!result) {\n throw new StackAssertionError(\"No access token available\");\n }\n return result;\n },\n useAccessToken() {\n const result = options.useOAuthToken();\n if (!result) {\n throw new StackAssertionError(\"No access token available\");\n }\n return result;\n }\n };\n }\n\n constructor(options: StackClientAppConstructorOptions<HasTokenStore, ProjectId>, extraOptions?: { uniqueIdentifier?: string, checkString?: string, interface?: StackClientInterface }) {\n const resolvedOptions = resolveConstructorOptions(options);\n\n if (!_StackClientAppImplIncomplete.LazyStackAdminAppImpl.value) {\n throw new StackAssertionError(\"Admin app implementation not initialized. Did you import the _StackClientApp from stack-app/apps/implementations/index.ts? You can't import it directly from ./apps/implementations/client-app-impl.ts as that causes a circular dependency (see the comment at _LazyStackAdminAppImpl for more details).\");\n }\n\n this._options = resolvedOptions;\n this._extraOptions = extraOptions;\n\n const projectId = resolvedOptions.projectId ?? getDefaultProjectId();\n if (projectId !== \"internal\" && !(projectId.match(/^[0-9a-f]{8}-[0-9a-f]{4}-[1-8][0-9a-f]{3}-[089ab][0-9a-f]{3}-[0-9a-f]{12}$/i))) {\n throw new Error(`Invalid project ID: ${projectId}. Project IDs must be UUIDs. Please check your environment variables and/or your StackApp.`);\n }\n\n if (extraOptions && extraOptions.interface) {\n this._interface = extraOptions.interface;\n } else {\n this._interface = new StackClientInterface({\n getBaseUrl: () => getBaseUrl(resolvedOptions.baseUrl),\n extraRequestHeaders: resolvedOptions.extraRequestHeaders ?? getDefaultExtraRequestHeaders(),\n projectId,\n clientVersion,\n publishableClientKey: resolvedOptions.publishableClientKey ?? getDefaultPublishableClientKey(),\n prepareRequest: async () => {\n }\n });\n }\n\n this._tokenStoreInit = resolvedOptions.tokenStore;\n this._redirectMethod = resolvedOptions.redirectMethod || \"none\";\n this._urlOptions = resolvedOptions.urls ?? {};\n this._oauthScopesOnSignIn = resolvedOptions.oauthScopesOnSignIn ?? {};\n\n if (extraOptions && extraOptions.uniqueIdentifier) {\n this._uniqueIdentifier = extraOptions.uniqueIdentifier;\n this._initUniqueIdentifier();\n }\n }\n\n protected _initUniqueIdentifier() {\n if (!this._uniqueIdentifier) {\n throw new StackAssertionError(\"Unique identifier not initialized\");\n }\n if (allClientApps.has(this._uniqueIdentifier)) {\n throw new StackAssertionError(\"A Stack client app with the same unique identifier already exists\");\n }\n allClientApps.set(this._uniqueIdentifier, [this._extraOptions?.checkString ?? undefined, this]);\n }\n\n /**\n * Cloudflare workers does not allow use of randomness on the global scope (on which the Stack app is probably\n * initialized). For that reason, we generate the unique identifier lazily when it is first needed instead of in the\n * constructor.\n */\n protected _getUniqueIdentifier() {\n if (!this._uniqueIdentifier) {\n this._uniqueIdentifier = generateUuid();\n this._initUniqueIdentifier();\n }\n return this._uniqueIdentifier!;\n }\n\n protected async _checkFeatureSupport(name: string, options: any) {\n return await this._interface.checkFeatureSupport({ ...options, name });\n }\n\n protected _useCheckFeatureSupport(name: string, options: any): never {\n runAsynchronously(this._checkFeatureSupport(name, options));\n throw new StackAssertionError(`${name} is not currently supported. Please reach out to Stack support for more information.`);\n }\n\n protected _memoryTokenStore = createEmptyTokenStore();\n protected _nextServerCookiesTokenStores = new WeakMap<object, Store<TokenObject>>();\n protected _requestTokenStores = new WeakMap<RequestLike, Store<TokenObject>>();\n protected _storedBrowserCookieTokenStore: Store<TokenObject> | null = null;\n private _mostRecentQueuedCookieRefreshIndex: number = 0;\n protected get _legacyRefreshTokenCookieName() {\n return `stack-refresh-${this.projectId}`;\n }\n protected get _refreshTokenCookieName() {\n return `stack-refresh-${this.projectId}`;\n }\n private _getRefreshTokenDefaultCookieNameForSecure(secure: boolean): string {\n return `${secure ? \"__Host-\" : \"\"}${this._refreshTokenCookieName}--default`;\n }\n private _getCustomRefreshCookieName(domain: string): string {\n const encoded = encodeBase32(new TextEncoder().encode(domain.toLowerCase()));\n return `${this._refreshTokenCookieName}--custom-${encoded}`;\n }\n private _formatRefreshCookieValue(refreshToken: string, updatedAt: number): string {\n return JSON.stringify({\n refresh_token: refreshToken,\n updated_at_millis: updatedAt,\n });\n }\n private _formatAccessCookieValue(refreshToken: string | null, accessToken: string | null): string | null {\n return refreshToken && accessToken ? JSON.stringify([refreshToken, accessToken]) : null;\n }\n private _parseStructuredRefreshCookie(value: string | undefined): { refreshToken: string, updatedAt: number | null } | null {\n if (!value) {\n return null;\n }\n const parsed = parseJson(value);\n if (parsed.status !== \"ok\" || typeof parsed.data !== \"object\" || parsed.data === null) {\n console.warn(\"Failed to parse structured refresh cookie\");\n return null;\n }\n const data = parsed.data;\n const refreshToken = \"refresh_token\" in data && typeof data.refresh_token === \"string\" ? data.refresh_token : null;\n const updatedAt = \"updated_at_millis\" in data && typeof data.updated_at_millis === \"number\" ? data.updated_at_millis : null;\n if (!refreshToken) {\n console.warn(\"Refresh token not found in structured refresh cookie\");\n return null;\n }\n return {\n refreshToken,\n updatedAt,\n };\n\n }\n private _extractRefreshTokenFromCookieMap(cookies: cookie.Cookies): { refreshToken: string | null, updatedAt: number | null } {\n const { legacyNames, structuredPrefixes } = this._getRefreshTokenCookieNamePatterns();\n for (const name of legacyNames) {\n const value = cookies[name];\n if (value) {\n return { refreshToken: value, updatedAt: null };\n }\n }\n\n let selected: { refreshToken: string, updatedAt: number | null } | null = null;\n for (const [name, value] of Object.entries(cookies)) {\n if (!structuredPrefixes.some(prefix => name.startsWith(prefix))) continue;\n const parsed = this._parseStructuredRefreshCookie(value);\n if (!parsed) continue;\n const candidateUpdatedAt = parsed.updatedAt ?? Number.NEGATIVE_INFINITY;\n const selectedUpdatedAt = selected?.updatedAt ?? Number.NEGATIVE_INFINITY;\n if (!selected || candidateUpdatedAt > selectedUpdatedAt) {\n selected = parsed;\n }\n }\n\n if (!selected) {\n return { refreshToken: null, updatedAt: null };\n }\n\n return {\n refreshToken: selected.refreshToken,\n updatedAt: selected.updatedAt ?? null,\n };\n }\n protected _getTokensFromCookies(cookies: cookie.Cookies): TokenObject {\n const { refreshToken } = this._extractRefreshTokenFromCookieMap(cookies);\n const accessTokenCookie = cookies[this._accessTokenCookieName] ?? null;\n let accessToken: string | null = null;\n if (accessTokenCookie && accessTokenCookie.startsWith('[\\\"')) {\n const parsed = parseJson(accessTokenCookie);\n if (\n parsed.status === \"ok\" &&\n typeof parsed.data === \"object\" &&\n parsed.data !== null &&\n Array.isArray(parsed.data) &&\n parsed.data.length === 2 &&\n typeof parsed.data[0] === \"string\" &&\n typeof parsed.data[1] === \"string\"\n ) {\n if (parsed.data[0] === refreshToken) {\n accessToken = parsed.data[1];\n }\n } else {\n console.warn(\"Access token cookie has invalid format\");\n }\n }\n return {\n refreshToken,\n accessToken,\n };\n }\n protected get _accessTokenCookieName() {\n // The access token, unlike the refresh token, should not depend on the project ID. We never want to store the\n // access token in cookies more than once because of how big it is (there's a limit of 4096 bytes for all cookies\n // together). This means that, if you have multiple projects on the same domain, some of them will need to refetch\n // the access token on page reload.\n return `stack-access`;\n }\n private _getAllBrowserCookies(): cookie.Cookies {\n if (!isBrowserLike()) {\n throw new StackAssertionError(\"Cannot get browser cookies on the server!\");\n }\n return cookie.parseCookie(document.cookie || \"\");\n }\n private _getRefreshTokenCookieNamePatterns(): { legacyNames: string[], structuredPrefixes: string[] } {\n return {\n legacyNames: [this._legacyRefreshTokenCookieName, \"stack-refresh\"],\n structuredPrefixes: [\n `${this._refreshTokenCookieName}--`,\n `__Host-${this._refreshTokenCookieName}--`,\n ],\n };\n }\n private _collectRefreshTokenCookieNames(cookies: cookie.Cookies): Set<string> {\n const { legacyNames, structuredPrefixes } = this._getRefreshTokenCookieNamePatterns();\n const names = new Set<string>();\n for (const name of legacyNames) {\n if (cookies[name]) {\n names.add(name);\n }\n }\n for (const name of Object.keys(cookies)) {\n if (structuredPrefixes.some(prefix => name.startsWith(prefix))) {\n names.add(name);\n }\n }\n return names;\n }\n private _prepareRefreshCookieUpdate(\n existingCookies: cookie.Cookies,\n refreshToken: string | null,\n accessToken: string | null,\n defaultCookieName: string,\n ) {\n const cookieNames = this._collectRefreshTokenCookieNames(existingCookies);\n cookieNames.delete(defaultCookieName);\n const updatedAt = refreshToken ? Date.now() : null;\n const refreshCookieValue = refreshToken && updatedAt !== null ? this._formatRefreshCookieValue(refreshToken, updatedAt) : null;\n const accessTokenPayload = this._formatAccessCookieValue(refreshToken, accessToken);\n return {\n updatedAt,\n refreshCookieValue,\n accessTokenPayload,\n cookieNamesToDelete: [...cookieNames],\n };\n }\n private _queueCustomRefreshCookieUpdate(refreshToken: string | null, updatedAt: number | null, context: \"browser\" | \"server\") {\n runAsynchronously(async () => {\n this._mostRecentQueuedCookieRefreshIndex++;\n const updateIndex = this._mostRecentQueuedCookieRefreshIndex;\n let hostname;\n if (isBrowserLike()) {\n hostname = window.location.hostname;\n }\n if (!hostname) {\n console.warn(\"No hostname found when queueing custom refresh cookie update\");\n return;\n }\n const domain = await this._trustedParentDomainCache.getOrWait([hostname], \"read-write\");\n\n const cookieOptions = { maxAge: 60 * 60 * 24 * 365, noOpIfServerComponent: true };\n const setCookie = async (targetDomain: string, value: string | null) => {\n const name = this._getCustomRefreshCookieName(targetDomain);\n const options = { ...cookieOptions, domain: targetDomain };\n if (context === \"browser\") {\n setOrDeleteCookieClient(name, value, options);\n } else {\n await setOrDeleteCookie(name, value, options);\n }\n };\n\n if (domain.status === \"error\" || !domain.data || updateIndex !== this._mostRecentQueuedCookieRefreshIndex) {\n return;\n }\n const value = refreshToken && updatedAt ? this._formatRefreshCookieValue(refreshToken, updatedAt) : null;\n await setCookie(domain.data, value);\n const isSecure = await isSecureCookieContext();\n await setOrDeleteCookie(this._getRefreshTokenDefaultCookieNameForSecure(isSecure), null, cookieOptions);\n });\n }\n private async _getTrustedParentDomain(currentDomain: string): Promise<string | null> {\n const project = Result.orThrow(await this._interface.getClientProject());\n const domains = project.config.domains.map(d => d.domain.trim().replace(/^https?:\\/\\//, \"\").split(\"/\")[0]?.toLowerCase());\n const trustedWildcards = domains.filter(d => d.startsWith(\"**.\"));\n const parts = currentDomain.split('.');\n for (let i = parts.length - 2; i >= 0; i--) {\n const parentDomain = parts.slice(i).join('.');\n if (domains.includes(parentDomain) && trustedWildcards.includes(\"**.\" + parentDomain)) {\n return parentDomain;\n }\n }\n\n return null;\n }\n\n protected _getBrowserCookieTokenStore(): Store<TokenObject> {\n if (!isBrowserLike()) {\n throw new Error(\"Cannot use cookie token store on the server!\");\n }\n\n if (this._storedBrowserCookieTokenStore === null) {\n const getCurrentValue = (old: TokenObject | null) => {\n const tokens = this._getTokensFromCookies(this._getAllBrowserCookies());\n return {\n refreshToken: tokens.refreshToken,\n accessToken: tokens.accessToken ?? (old?.refreshToken === tokens.refreshToken ? old.accessToken : null),\n };\n };\n this._storedBrowserCookieTokenStore = new Store<TokenObject>(getCurrentValue(null));\n let hasSucceededInWriting = true;\n\n setInterval(() => {\n if (hasSucceededInWriting) {\n const oldValue = this._storedBrowserCookieTokenStore!.get();\n const currentValue = getCurrentValue(oldValue);\n if (!deepPlainEquals(currentValue, oldValue)) {\n this._storedBrowserCookieTokenStore!.set(currentValue);\n }\n }\n }, 100);\n this._storedBrowserCookieTokenStore.onChange((value) => {\n try {\n const refreshToken = value.refreshToken;\n const secure = window.location.protocol === \"https:\";\n const defaultName = this._getRefreshTokenDefaultCookieNameForSecure(secure);\n const { updatedAt, refreshCookieValue, accessTokenPayload, cookieNamesToDelete } = this._prepareRefreshCookieUpdate(\n this._getAllBrowserCookies(),\n refreshToken,\n value.accessToken ?? null,\n defaultName,\n );\n setOrDeleteCookieClient(defaultName, refreshCookieValue, { maxAge: 60 * 60 * 24 * 365, secure });\n setOrDeleteCookieClient(this._accessTokenCookieName, accessTokenPayload, { maxAge: 60 * 60 * 24 });\n cookieNamesToDelete.forEach((name) => deleteCookieClient(name, {}));\n this._queueCustomRefreshCookieUpdate(refreshToken, updatedAt, \"browser\");\n hasSucceededInWriting = true;\n } catch (e) {\n if (!isBrowserLike()) {\n // Setting cookies inside RSCs is not allowed, so we just ignore it\n hasSucceededInWriting = false;\n } else {\n throw e;\n }\n }\n });\n }\n\n return this._storedBrowserCookieTokenStore;\n };\n protected _getOrCreateTokenStore(cookieHelper: CookieHelper, overrideTokenStoreInit?: TokenStoreInit): Store<TokenObject> {\n const tokenStoreInit = overrideTokenStoreInit === undefined ? this._tokenStoreInit : overrideTokenStoreInit;\n\n switch (tokenStoreInit) {\n case \"cookie\": {\n return this._getBrowserCookieTokenStore();\n }\n case \"nextjs-cookie\": {\n if (isBrowserLike()) {\n return this._getBrowserCookieTokenStore();\n } else {\n const tokens = this._getTokensFromCookies(cookieHelper.getAll());\n const store = new Store<TokenObject>(tokens);\n store.onChange((value) => {\n runAsynchronously(async () => {\n // TODO HACK this is a bit of a hack; while the order happens to work in practice (because the only actual\n // async operation is waiting for the `cookies()` to resolve which always happens at the same time during\n // the same request), it's not guaranteed to be free of race conditions if there are many updates happening\n // at the same time\n //\n // instead, we should create a per-request cookie helper outside of the store onChange and reuse that\n //\n // but that's kinda hard to do because Next.js doesn't expose a documented way to find out which request\n // we're currently processing, and hence we can't find out which per-request cookie helper to use\n //\n // so hack it is\n const refreshToken = value.refreshToken;\n const secure = await isSecureCookieContext();\n const defaultName = this._getRefreshTokenDefaultCookieNameForSecure(secure);\n const { updatedAt, refreshCookieValue, accessTokenPayload, cookieNamesToDelete } = this._prepareRefreshCookieUpdate(\n cookieHelper.getAll(),\n refreshToken,\n value.accessToken ?? null,\n defaultName,\n );\n await Promise.all([\n setOrDeleteCookie(defaultName, refreshCookieValue, { maxAge: 60 * 60 * 24 * 365, noOpIfServerComponent: true }),\n setOrDeleteCookie(this._accessTokenCookieName, accessTokenPayload, { maxAge: 60 * 60 * 24, noOpIfServerComponent: true }),\n ]);\n if (cookieNamesToDelete.length > 0) {\n await Promise.all(\n cookieNamesToDelete.map((name) =>\n deleteCookie(name, { noOpIfServerComponent: true }),\n ),\n );\n }\n this._queueCustomRefreshCookieUpdate(refreshToken, updatedAt, \"server\");\n });\n });\n return store;\n }\n }\n case \"memory\": {\n return this._memoryTokenStore;\n }\n default: {\n if (tokenStoreInit === null) {\n return createEmptyTokenStore();\n } else if (typeof tokenStoreInit === \"object\" && \"headers\" in tokenStoreInit) {\n if (this._requestTokenStores.has(tokenStoreInit)) return this._requestTokenStores.get(tokenStoreInit)!;\n\n // x-stack-auth header\n const stackAuthHeader = tokenStoreInit.headers.get(\"x-stack-auth\");\n if (stackAuthHeader) {\n let parsed;\n try {\n parsed = JSON.parse(stackAuthHeader);\n if (typeof parsed !== \"object\") throw new Error(\"x-stack-auth header must be a JSON object\");\n if (parsed === null) throw new Error(\"x-stack-auth header must not be null\");\n } catch (e) {\n throw new Error(`Invalid x-stack-auth header: ${stackAuthHeader}`, { cause: e });\n }\n return this._getOrCreateTokenStore(cookieHelper, {\n accessToken: parsed.accessToken ?? null,\n refreshToken: parsed.refreshToken ?? null,\n });\n }\n\n // read from cookies\n const cookieHeader = tokenStoreInit.headers.get(\"cookie\");\n const parsed = cookie.parseCookie(cookieHeader || \"\");\n const res = new Store<TokenObject>(this._getTokensFromCookies(parsed));\n this._requestTokenStores.set(tokenStoreInit, res);\n return res;\n } else if (\"accessToken\" in tokenStoreInit || \"refreshToken\" in tokenStoreInit) {\n return new Store<TokenObject>({\n refreshToken: tokenStoreInit.refreshToken,\n accessToken: tokenStoreInit.accessToken,\n });\n }\n\n throw new Error(`Invalid token store ${tokenStoreInit}`);\n }\n }\n }\n\n protected _useTokenStore(overrideTokenStoreInit?: TokenStoreInit): Store<TokenObject> {\n suspendIfSsr();\n const cookieHelper = createBrowserCookieHelper();\n const tokenStore = this._getOrCreateTokenStore(cookieHelper, overrideTokenStoreInit);\n return tokenStore;\n }\n\n /**\n * A map from token stores and session keys to sessions.\n *\n * This isn't just a map from session keys to sessions for two reasons:\n *\n * - So we can garbage-collect Session objects when the token store is garbage-collected\n * - So different token stores are separated and don't leak information between each other, eg. if the same user sends two requests to the same server they should get a different session object\n */\n private _sessionsByTokenStoreAndSessionKey = new WeakMap<Store<TokenObject>, Map<string, InternalSession>>();\n protected _getSessionFromTokenStore(tokenStore: Store<TokenObject>): InternalSession {\n const tokenObj = tokenStore.get();\n const sessionKey = InternalSession.calculateSessionKey(tokenObj);\n const existing = sessionKey ? this._sessionsByTokenStoreAndSessionKey.get(tokenStore)?.get(sessionKey) : null;\n if (existing) return existing;\n\n const session = this._interface.createSession({\n refreshToken: tokenObj.refreshToken,\n accessToken: tokenObj.accessToken,\n });\n session.onAccessTokenChange((newAccessToken) => {\n tokenStore.update((old) => ({\n ...old,\n accessToken: newAccessToken?.token ?? null\n }));\n });\n session.onInvalidate(() => {\n tokenStore.update((old) => ({\n ...old,\n accessToken: null,\n refreshToken: null,\n }));\n });\n\n let sessionsBySessionKey = this._sessionsByTokenStoreAndSessionKey.get(tokenStore) ?? new Map();\n this._sessionsByTokenStoreAndSessionKey.set(tokenStore, sessionsBySessionKey);\n sessionsBySessionKey.set(sessionKey, session);\n return session;\n }\n\n protected async _getSession(overrideTokenStoreInit?: TokenStoreInit): Promise<InternalSession> {\n const tokenStore = this._getOrCreateTokenStore(await this._createCookieHelper(), overrideTokenStoreInit);\n const session = this._getSessionFromTokenStore(tokenStore);\n return session;\n }\n\n protected _useSession(overrideTokenStoreInit?: TokenStoreInit): InternalSession {\n const tokenStore = this._useTokenStore(overrideTokenStoreInit);\n const subscribe = useCallback((cb: () => void) => {\n const { unsubscribe } = tokenStore.onChange(() => {\n cb();\n });\n return unsubscribe;\n }, [tokenStore]);\n const getSnapshot = useCallback(() => this._getSessionFromTokenStore(tokenStore), [tokenStore]);\n return React.useSyncExternalStore(subscribe, getSnapshot, getSnapshot);\n }\n\n protected async _signInToAccountWithTokens(tokens: { accessToken: string | null, refreshToken: string }) {\n if (!(\"accessToken\" in tokens) || !(\"refreshToken\" in tokens)) {\n throw new StackAssertionError(\"Invalid tokens object; can't sign in with this\", { tokens });\n }\n const tokenStore = this._getOrCreateTokenStore(await this._createCookieHelper());\n tokenStore.set(tokens);\n }\n\n protected _hasPersistentTokenStore(overrideTokenStoreInit?: TokenStoreInit): this is StackClientApp<true, ProjectId> {\n return (overrideTokenStoreInit !== undefined ? overrideTokenStoreInit : this._tokenStoreInit) !== null;\n }\n\n protected _ensurePersistentTokenStore(overrideTokenStoreInit?: TokenStoreInit): asserts this is StackClientApp<true, ProjectId> {\n if (!this._hasPersistentTokenStore(overrideTokenStoreInit)) {\n throw new Error(\"Cannot call this function on a Stack app without a persistent token store. Make sure the tokenStore option on the constructor is set to a non-null value when initializing Stack.\\n\\nStack uses token stores to access access tokens of the current user. For example, on web frontends it is commonly the string value 'cookies' for cookie storage.\");\n }\n }\n\n protected _isInternalProject(): this is { projectId: \"internal\" } {\n return this.projectId === \"internal\";\n }\n\n protected _ensureInternalProject(): asserts this is { projectId: \"internal\" } {\n if (!this._isInternalProject()) {\n throw new Error(\"Cannot call this function on a Stack app with a project ID other than 'internal'.\");\n }\n }\n\n protected _clientProjectFromCrud(crud: ClientProjectsCrud['Client']['Read']): Project {\n return {\n id: crud.id,\n displayName: crud.display_name,\n config: {\n signUpEnabled: crud.config.sign_up_enabled,\n credentialEnabled: crud.config.credential_enabled,\n magicLinkEnabled: crud.config.magic_link_enabled,\n passkeyEnabled: crud.config.passkey_enabled,\n clientTeamCreationEnabled: crud.config.client_team_creation_enabled,\n clientUserDeletionEnabled: crud.config.client_user_deletion_enabled,\n allowTeamApiKeys: crud.config.allow_team_api_keys,\n allowUserApiKeys: crud.config.allow_user_api_keys,\n oauthProviders: crud.config.enabled_oauth_providers.map((p) => ({\n id: p.id,\n })),\n }\n };\n }\n\n protected _clientPermissionFromCrud(crud: TeamPermissionsCrud['Client']['Read'] | ProjectPermissionsCrud['Client']['Read']): TeamPermission {\n return {\n id: crud.id,\n };\n }\n\n protected _clientTeamUserFromCrud(crud: TeamMemberProfilesCrud['Client']['Read']): TeamUser {\n return {\n id: crud.user_id,\n teamProfile: {\n displayName: crud.display_name,\n profileImageUrl: crud.profile_image_url,\n }\n };\n }\n\n protected _clientTeamInvitationFromCrud(session: InternalSession, crud: TeamInvitationCrud['Client']['Read']): TeamInvitation {\n return {\n id: crud.id,\n recipientEmail: crud.recipient_email,\n expiresAt: new Date(crud.expires_at_millis),\n revoke: async () => {\n await this._interface.revokeTeamInvitation(crud.id, crud.team_id, session);\n await this._teamInvitationsCache.refresh([session, crud.team_id]);\n },\n };\n }\n\n protected _baseApiKeyFromCrud(\n crud: TeamApiKeysCrud['Client']['Read'] | UserApiKeysCrud['Client']['Read'] | yup.InferType<typeof teamApiKeysCreateOutputSchema> | yup.InferType<typeof userApiKeysCreateOutputSchema>\n ): Omit<ApiKey<\"user\", boolean>, \"revoke\" | \"update\"> | Omit<ApiKey<\"team\", boolean>, \"revoke\" | \"update\"> {\n return {\n id: crud.id,\n description: crud.description,\n expiresAt: crud.expires_at_millis ? new Date(crud.expires_at_millis) : undefined,\n manuallyRevokedAt: crud.manually_revoked_at_millis ? new Date(crud.manually_revoked_at_millis) : null,\n createdAt: new Date(crud.created_at_millis),\n ...(crud.type === \"team\" ? { type: \"team\", teamId: crud.team_id } : { type: \"user\", userId: crud.user_id }),\n value: typeof crud.value === \"string\" ? crud.value : {\n lastFour: crud.value.last_four,\n },\n isValid: function () {\n return this.whyInvalid() === null;\n },\n whyInvalid: function () {\n if (this.manuallyRevokedAt) {\n return \"manually-revoked\";\n }\n if (this.expiresAt && this.expiresAt < new Date()) {\n return \"expired\";\n }\n return null;\n },\n };\n }\n\n\n protected _clientApiKeyFromCrud(session: InternalSession, crud: TeamApiKeysCrud['Client']['Read']): ApiKey<\"team\">;\n protected _clientApiKeyFromCrud(session: InternalSession, crud: UserApiKeysCrud['Client']['Read']): ApiKey<\"user\">;\n protected _clientApiKeyFromCrud(session: InternalSession, crud: yup.InferType<typeof teamApiKeysCreateOutputSchema>): ApiKey<\"team\", true>;\n protected _clientApiKeyFromCrud(session: InternalSession, crud: yup.InferType<typeof userApiKeysCreateOutputSchema>): ApiKey<\"user\", true>;\n protected _clientApiKeyFromCrud(session: InternalSession, crud: TeamApiKeysCrud['Client']['Read'] | UserApiKeysCrud['Client']['Read'] | yup.InferType<typeof teamApiKeysCreateOutputSchema> | yup.InferType<typeof userApiKeysCreateOutputSchema>): ApiKey<\"user\" | \"team\", boolean> {\n return {\n ...this._baseApiKeyFromCrud(crud),\n async revoke() {\n await this.update({ revoked: true });\n },\n update: async (options: ApiKeyUpdateOptions) => {\n await this._interface.updateProjectApiKey(crud.type === \"team\" ? { team_id: crud.team_id } : { user_id: crud.user_id }, crud.id, options, session, \"client\");\n if (crud.type === \"team\") {\n await this._teamApiKeysCache.refresh([session, crud.team_id]);\n } else {\n await this._userApiKeysCache.refresh([session]);\n }\n },\n };\n }\n\n protected _clientTeamFromCrud(crud: TeamsCrud['Client']['Read'], session: InternalSession): Team {\n const app = this;\n return {\n id: crud.id,\n displayName: crud.display_name,\n profileImageUrl: crud.profile_image_url,\n clientMetadata: crud.client_metadata,\n clientReadOnlyMetadata: crud.client_read_only_metadata,\n ...this._createCustomer(crud.id, \"team\", session),\n async inviteUser(options: { email: string, callbackUrl?: string }) {\n await app._interface.sendTeamInvitation({\n teamId: crud.id,\n email: options.email,\n session,\n callbackUrl: options.callbackUrl ?? constructRedirectUrl(app.urls.teamInvitation, \"callbackUrl\"),\n });\n await app._teamInvitationsCache.refresh([session, crud.id]);\n },\n async listUsers() {\n const result = Result.orThrow(await app._teamMemberProfilesCache.getOrWait([session, crud.id], \"write-only\"));\n return result.map((crud) => app._clientTeamUserFromCrud(crud));\n },\n useUsers() {\n const result = useAsyncCache(app._teamMemberProfilesCache, [session, crud.id] as const, \"team.useUsers()\");\n return result.map((crud) => app._clientTeamUserFromCrud(crud));\n },\n async listInvitations() {\n const result = Result.orThrow(await app._teamInvitationsCache.getOrWait([session, crud.id], \"write-only\"));\n return result.map((crud) => app._clientTeamInvitationFromCrud(session, crud));\n },\n useInvitations() {\n const result = useAsyncCache(app._teamInvitationsCache, [session, crud.id] as const, \"team.useInvitations()\");\n return result.map((crud) => app._clientTeamInvitationFromCrud(session, crud));\n },\n async update(data: TeamUpdateOptions) {\n await app._interface.updateTeam({ data: teamUpdateOptionsToCrud(data), teamId: crud.id }, session);\n await app._currentUserTeamsCache.refresh([session]);\n },\n async delete() {\n await app._interface.deleteTeam(crud.id, session);\n await app._currentUserTeamsCache.refresh([session]);\n },\n\n useApiKeys() {\n const result = useAsyncCache(app._teamApiKeysCache, [session, crud.id] as const, \"team.useApiKeys()\");\n return result.map((crud) => app._clientApiKeyFromCrud(session, crud));\n },\n\n async listApiKeys() {\n const results = Result.orThrow(await app._teamApiKeysCache.getOrWait([session, crud.id], \"write-only\"));\n return results.map((crud) => app._clientApiKeyFromCrud(session, crud));\n },\n\n async createApiKey(options: ApiKeyCreationOptions<\"team\">) {\n const result = await app._interface.createProjectApiKey(\n await apiKeyCreationOptionsToCrud(\"team\", crud.id, options),\n session,\n \"client\",\n );\n await app._teamApiKeysCache.refresh([session, crud.id]);\n return app._clientApiKeyFromCrud(session, result);\n },\n };\n }\n\n protected _clientContactChannelFromCrud(crud: ContactChannelsCrud['Client']['Read'], session: InternalSession): ContactChannel {\n const app = this;\n return {\n id: crud.id,\n value: crud.value,\n type: crud.type,\n isVerified: crud.is_verified,\n isPrimary: crud.is_primary,\n usedForAuth: crud.used_for_auth,\n\n async sendVerificationEmail(options?: { callbackUrl?: string }) {\n await app._interface.sendCurrentUserContactChannelVerificationEmail(\n crud.id,\n options?.callbackUrl || constructRedirectUrl(app.urls.emailVerification, \"callbackUrl\"),\n session\n );\n },\n async update(data: ContactChannelUpdateOptions) {\n await app._interface.updateClientContactChannel(crud.id, contactChannelUpdateOptionsToCrud(data), session);\n await app._clientContactChannelsCache.refresh([session]);\n },\n async delete() {\n await app._interface.deleteClientContactChannel(crud.id, session);\n await app._clientContactChannelsCache.refresh([session]);\n },\n };\n }\n protected _clientNotificationCategoryFromCrud(crud: NotificationPreferenceCrud['Client']['Read'], session: InternalSession): NotificationCategory {\n const app = this;\n return {\n id: crud.notification_category_id,\n name: crud.notification_category_name,\n enabled: crud.enabled,\n canDisable: crud.can_disable,\n\n async setEnabled(enabled: boolean) {\n await app._interface.setNotificationsEnabled(crud.notification_category_id, enabled, session);\n await app._notificationCategoriesCache.refresh([session]);\n },\n };\n }\n protected _clientOAuthProviderFromCrud(crud: OAuthProviderCrud['Client']['Read'], session: InternalSession): OAuthProvider {\n const app = this;\n return {\n id: crud.id,\n type: crud.type,\n userId: crud.user_id,\n email: crud.email,\n allowSignIn: crud.allow_sign_in,\n allowConnectedAccounts: crud.allow_connected_accounts,\n\n async update(data: { allowSignIn?: boolean, allowConnectedAccounts?: boolean }): Promise<Result<void,\n InstanceType<typeof KnownErrors.OAuthProviderAccountIdAlreadyUsedForSignIn>\n >> {\n try {\n await app._interface.updateOAuthProvider(\n crud.user_id,\n crud.id,\n {\n allow_sign_in: data.allowSignIn,\n allow_connected_accounts: data.allowConnectedAccounts,\n },\n session\n );\n await app._currentUserOAuthProvidersCache.refresh([session]);\n return Result.ok(undefined);\n } catch (error) {\n if (KnownErrors.OAuthProviderAccountIdAlreadyUsedForSignIn.isInstance(error)) {\n return Result.error(error);\n }\n throw error;\n }\n },\n\n async delete() {\n await app._interface.deleteOAuthProvider(crud.user_id, crud.id, session);\n await app._currentUserOAuthProvidersCache.refresh([session]);\n },\n };\n }\n\n protected _clientItemFromCrud(crud: ItemCrud['Client']['Read']): Item {\n const app = this;\n return {\n displayName: crud.display_name,\n quantity: crud.quantity,\n nonNegativeQuantity: Math.max(0, crud.quantity),\n };\n }\n\n protected _customerProductsFromResponse(response: CustomerProductsListResponse): CustomerProductsList {\n const products = response.items.map((item) => ({\n id: item.id,\n quantity: item.quantity,\n displayName: item.product.display_name,\n customerType: item.product.customer_type,\n isServerOnly: item.product.server_only,\n stackable: item.product.stackable,\n type: item.type,\n subscription: item.subscription ? {\n currentPeriodEnd: item.subscription.current_period_end ? new Date(item.subscription.current_period_end) : null,\n cancelAtPeriodEnd: item.subscription.cancel_at_period_end,\n isCancelable: item.subscription.is_cancelable,\n } : null,\n switchOptions: item.switch_options?.map((option) => ({\n productId: option.product_id,\n displayName: option.product.display_name,\n prices: option.product.prices,\n })),\n }));\n return Object.assign(products, { nextCursor: response.pagination.next_cursor ?? null });\n }\n\n protected _customerInvoicesFromResponse(response: CustomerInvoicesListResponse): CustomerInvoicesList {\n const invoices = response.items.map((item) => ({\n status: item.status as CustomerInvoiceStatus,\n amountTotal: item.amount_total,\n hostedInvoiceUrl: item.hosted_invoice_url,\n createdAt: new Date(item.created_at_millis),\n }));\n return Object.assign(invoices, { nextCursor: response.pagination.next_cursor ?? null });\n }\n\n protected _customerBillingFromResponse(response: {\n has_customer: boolean,\n default_payment_method: {\n id: string,\n brand: string | null,\n last4: string | null,\n exp_month: number | null,\n exp_year: number | null,\n } | null,\n }): CustomerBilling {\n return {\n hasCustomer: response.has_customer,\n defaultPaymentMethod: response.default_payment_method,\n };\n }\n\n protected _createAuth(session: InternalSession): Auth {\n const app = this;\n return {\n _internalSession: session,\n currentSession: {\n async getTokens() {\n const tokens = await session.getOrFetchLikelyValidTokens(20_000, 75_000);\n return {\n accessToken: tokens?.accessToken.token ?? null,\n refreshToken: tokens?.refreshToken?.token ?? null,\n };\n },\n useTokens() {\n const [_, setCounter] = React.useState(0);\n React.useEffect(() => {\n const { unsubscribe: unsubscribeRefresh } = session.startRefreshingAccessToken(30_000, 60_000);\n const { unsubscribe: unsubscribeInvalidate } = session.onInvalidate(() => setCounter(c => c + 1));\n const { unsubscribe: unsubscribeAccessTokenChange } = session.onAccessTokenChange(() => setCounter(c => c + 1));\n return () => {\n unsubscribeRefresh();\n unsubscribeInvalidate();\n unsubscribeAccessTokenChange();\n };\n }, []);\n\n let accessToken = session.isKnownToBeInvalid() ? null : session.getAccessTokenIfNotExpiredYet(20_000, 75_000);\n if (accessToken === null) {\n // note: tokens is never actually assigned here in practice because getOrFetchLikelyValidTokens is always a fresh promise so the `use` hook always throws, but this is more idiomatic and makes the type checker happy\n accessToken = use(session.getOrFetchLikelyValidTokens(20_000, 75_000))?.accessToken ?? null;\n }\n return {\n accessToken: accessToken?.token ?? null,\n refreshToken: session.getRefreshToken()?.token ?? null,\n };\n },\n },\n async getAccessToken(): Promise<string | null> {\n const tokens = await this.currentSession.getTokens();\n return tokens.accessToken;\n },\n useAccessToken(): string | null {\n return this.currentSession.useTokens().accessToken;\n },\n async getRefreshToken(): Promise<string | null> {\n const tokens = await this.currentSession.getTokens();\n return tokens.refreshToken;\n },\n useRefreshToken(): string | null {\n return this.currentSession.useTokens().refreshToken;\n },\n async getAuthHeaders(): Promise<{ \"x-stack-auth\": string }> {\n return {\n \"x-stack-auth\": JSON.stringify(await this.getAuthJson()),\n };\n },\n useAuthHeaders(): { \"x-stack-auth\": string } {\n return {\n \"x-stack-auth\": JSON.stringify(this.useAuthJson()),\n };\n },\n async getAuthJson(): Promise<{ accessToken: string | null, refreshToken: string | null }> {\n const tokens = await this.currentSession.getTokens();\n return tokens;\n },\n useAuthJson(): { accessToken: string | null, refreshToken: string | null } {\n return this.currentSession.useTokens();\n },\n signOut(options?: { redirectUrl?: URL | string }) {\n return app._signOut(session, options);\n },\n };\n }\n\n protected _editableTeamProfileFromCrud(crud: TeamMemberProfilesCrud['Client']['Read'], session: InternalSession): EditableTeamMemberProfile {\n const app = this;\n return {\n displayName: crud.display_name,\n profileImageUrl: crud.profile_image_url,\n async update(update: { displayName?: string, profileImageUrl?: string }) {\n await app._interface.updateTeamMemberProfile({\n teamId: crud.team_id,\n userId: crud.user_id,\n profile: {\n display_name: update.displayName,\n profile_image_url: update.profileImageUrl,\n },\n }, session);\n await app._currentUserTeamProfileCache.refresh([session, crud.team_id]);\n }\n };\n }\n\n protected _createBaseUser(crud: NonNullable<CurrentUserCrud['Client']['Read']> | UsersCrud['Server']['Read']): BaseUser {\n return {\n id: crud.id,\n displayName: crud.display_name,\n primaryEmail: crud.primary_email,\n primaryEmailVerified: crud.primary_email_verified,\n profileImageUrl: crud.profile_image_url,\n signedUpAt: new Date(crud.signed_up_at_millis),\n clientMetadata: crud.client_metadata,\n clientReadOnlyMetadata: crud.client_read_only_metadata,\n hasPassword: crud.has_password,\n emailAuthEnabled: crud.auth_with_email,\n otpAuthEnabled: crud.otp_auth_enabled,\n oauthProviders: crud.oauth_providers,\n passkeyAuthEnabled: crud.passkey_auth_enabled,\n isMultiFactorRequired: crud.requires_totp_mfa,\n isAnonymous: crud.is_anonymous,\n isRestricted: crud.is_restricted,\n restrictedReason: crud.restricted_reason,\n toClientJson(): CurrentUserCrud['Client']['Read'] {\n return crud;\n }\n };\n }\n\n protected _createUserExtraFromCurrent(crud: NonNullable<CurrentUserCrud['Client']['Read']>, session: InternalSession): UserExtra {\n const app = this;\n async function getConnectedAccount(id: ProviderType, options?: { scopes?: string[] }): Promise<OAuthConnection | null>;\n async function getConnectedAccount(id: ProviderType, options: { or: 'redirect', scopes?: string[] }): Promise<OAuthConnection>;\n async function getConnectedAccount(id: ProviderType, options?: { or?: 'redirect', scopes?: string[] }): Promise<OAuthConnection | null> {\n const scopeString = options?.scopes?.join(\" \");\n return Result.orThrow(await app._currentUserOAuthConnectionCache.getOrWait([session, id, scopeString || \"\", options?.or === 'redirect'], \"write-only\"));\n }\n\n function useConnectedAccount(id: ProviderType, options?: { scopes?: string[] }): OAuthConnection | null;\n function useConnectedAccount(id: ProviderType, options: { or: 'redirect', scopes?: string[] }): OAuthConnection;\n function useConnectedAccount(id: ProviderType, options?: { or?: 'redirect', scopes?: string[] }): OAuthConnection | null {\n const scopeString = options?.scopes?.join(\" \");\n return useAsyncCache(app._currentUserOAuthConnectionCache, [session, id, scopeString || \"\", options?.or === 'redirect'] as const, \"user.useConnectedAccount()\");\n }\n return {\n async getActiveSessions() {\n const sessions = await app._interface.listSessions(session);\n return sessions.items.map((crud) => app._clientSessionFromCrud(crud));\n },\n async revokeSession(sessionId: string) {\n await app._interface.deleteSession(sessionId, session);\n },\n setDisplayName(displayName: string | null) {\n return this.update({ displayName });\n },\n setClientMetadata(metadata: Record<string, any>) {\n return this.update({ clientMetadata: metadata });\n },\n async setSelectedTeam(team: Team | string | null) {\n await this.update({ selectedTeamId: typeof team === 'string' ? team : team?.id ?? null });\n },\n getConnectedAccount,\n useConnectedAccount, // THIS_LINE_PLATFORM react-like\n async getTeam(teamId: string) {\n const teams = await this.listTeams();\n return teams.find((t) => t.id === teamId) ?? null;\n },\n useTeam(teamId: string) {\n const teams = this.useTeams();\n return useMemo(() => {\n return teams.find((t) => t.id === teamId) ?? null;\n }, [teams, teamId]);\n },\n async listTeams() {\n const teams = Result.orThrow(await app._currentUserTeamsCache.getOrWait([session], \"write-only\"));\n return teams.map((crud) => app._clientTeamFromCrud(crud, session));\n },\n useTeams() {\n const teams = useAsyncCache(app._currentUserTeamsCache, [session], \"user.useTeams()\");\n return useMemo(() => teams.map((crud) => app._clientTeamFromCrud(crud, session)), [teams]);\n },\n async createTeam(data: TeamCreateOptions) {\n const crud = await app._interface.createClientTeam(teamCreateOptionsToCrud(data, 'me'), session);\n await app._currentUserTeamsCache.refresh([session]);\n await this.update({ selectedTeamId: crud.id });\n return app._clientTeamFromCrud(crud, session);\n },\n async leaveTeam(team: Team) {\n await app._interface.leaveTeam(team.id, session);\n // TODO: refresh cache\n },\n async listPermissions(scopeOrOptions?: Team | { recursive?: boolean }, options?: { recursive?: boolean }): Promise<TeamPermission[]> {\n if (scopeOrOptions && 'id' in scopeOrOptions) {\n const scope = scopeOrOptions;\n const recursive = options?.recursive ?? true;\n const permissions = Result.orThrow(await app._currentUserPermissionsCache.getOrWait([session, scope.id, recursive], \"write-only\"));\n return permissions.map((crud) => app._clientPermissionFromCrud(crud));\n } else {\n const opts = scopeOrOptions;\n const recursive = opts?.recursive ?? true;\n const permissions = Result.orThrow(await app._currentUserProjectPermissionsCache.getOrWait([session, recursive], \"write-only\"));\n return permissions.map((crud) => app._clientPermissionFromCrud(crud));\n }\n },\n usePermissions(scopeOrOptions?: Team | { recursive?: boolean }, options?: { recursive?: boolean }): TeamPermission[] {\n if (scopeOrOptions && 'id' in scopeOrOptions) {\n const scope = scopeOrOptions;\n const recursive = options?.recursive ?? true;\n const permissions = useAsyncCache(app._currentUserPermissionsCache, [session, scope.id, recursive] as const, \"user.usePermissions()\");\n return useMemo(() => permissions.map((crud) => app._clientPermissionFromCrud(crud)), [permissions]);\n } else {\n const opts = scopeOrOptions;\n const recursive = opts?.recursive ?? true;\n const permissions = useAsyncCache(app._currentUserProjectPermissionsCache, [session, recursive] as const, \"user.usePermissions()\");\n return useMemo(() => permissions.map((crud) => app._clientPermissionFromCrud(crud)), [permissions]);\n }\n },\n usePermission(scopeOrPermissionId: Team | string, permissionId?: string): TeamPermission | null {\n if (scopeOrPermissionId && typeof scopeOrPermissionId !== 'string') {\n const scope = scopeOrPermissionId;\n const permissions = this.usePermissions(scope);\n return useMemo(() => permissions.find((p) => p.id === permissionId) ?? null, [permissions, permissionId]);\n } else {\n const pid = scopeOrPermissionId;\n const permissions = this.usePermissions();\n return useMemo(() => permissions.find((p) => p.id === pid) ?? null, [permissions, pid]);\n }\n },\n async getPermission(scopeOrPermissionId: Team | string, permissionId?: string): Promise<TeamPermission | null> {\n if (scopeOrPermissionId && typeof scopeOrPermissionId !== 'string') {\n const scope = scopeOrPermissionId;\n const permissions = await this.listPermissions(scope);\n return permissions.find((p) => p.id === permissionId) ?? null;\n } else {\n const pid = scopeOrPermissionId;\n const permissions = await this.listPermissions();\n return permissions.find((p) => p.id === pid) ?? null;\n }\n },\n async hasPermission(scopeOrPermissionId: Team | string, permissionId?: string): Promise<boolean> {\n if (scopeOrPermissionId && typeof scopeOrPermissionId !== 'string') {\n const scope = scopeOrPermissionId;\n return (await this.getPermission(scope, permissionId as string)) !== null;\n } else {\n const pid = scopeOrPermissionId;\n return (await this.getPermission(pid)) !== null;\n }\n },\n async update(update) {\n return await app._updateClientUser(update, session);\n },\n async sendVerificationEmail(options?: { callbackUrl?: string }) {\n if (!crud.primary_email) {\n throw new StackAssertionError(\"User does not have a primary email\");\n }\n return await app._interface.sendVerificationEmail(\n crud.primary_email,\n options?.callbackUrl ?? constructRedirectUrl(app.urls.emailVerification, \"callbackUrl\"),\n session\n );\n },\n async updatePassword(options: { oldPassword: string, newPassword: string }) {\n const result = await app._interface.updatePassword(options, session);\n await app._currentUserCache.refresh([session]);\n return result;\n },\n async setPassword(options: { password: string }) {\n const result = await app._interface.setPassword(options, session);\n await app._currentUserCache.refresh([session]);\n return result;\n },\n selectedTeam: crud.selected_team && this._clientTeamFromCrud(crud.selected_team, session),\n async getTeamProfile(team: Team) {\n const result = Result.orThrow(await app._currentUserTeamProfileCache.getOrWait([session, team.id], \"write-only\"));\n return app._editableTeamProfileFromCrud(result, session);\n },\n useTeamProfile(team: Team) {\n const result = useAsyncCache(app._currentUserTeamProfileCache, [session, team.id] as const, \"user.useTeamProfile()\");\n return app._editableTeamProfileFromCrud(result, session);\n },\n async delete() {\n await app._interface.deleteCurrentUser(session);\n session.markInvalid();\n },\n async listContactChannels() {\n const result = Result.orThrow(await app._clientContactChannelsCache.getOrWait([session], \"write-only\"));\n return result.map((crud) => app._clientContactChannelFromCrud(crud, session));\n },\n useContactChannels() {\n const result = useAsyncCache(app._clientContactChannelsCache, [session] as const, \"user.useContactChannels()\");\n return result.map((crud) => app._clientContactChannelFromCrud(crud, session));\n },\n async createContactChannel(data: ContactChannelCreateOptions) {\n const crud = await app._interface.createClientContactChannel(contactChannelCreateOptionsToCrud('me', data), session);\n await app._clientContactChannelsCache.refresh([session]);\n return app._clientContactChannelFromCrud(crud, session);\n },\n useNotificationCategories() {\n const results = useAsyncCache(app._notificationCategoriesCache, [session] as const, \"user.useNotificationCategories()\");\n return results.map((crud) => app._clientNotificationCategoryFromCrud(crud, session));\n },\n async listNotificationCategories() {\n const results = Result.orThrow(await app._notificationCategoriesCache.getOrWait([session], \"write-only\"));\n return results.map((crud) => app._clientNotificationCategoryFromCrud(crud, session));\n },\n useApiKeys() {\n const result = useAsyncCache(app._userApiKeysCache, [session] as const, \"user.useApiKeys()\");\n return result.map((crud) => app._clientApiKeyFromCrud(session, crud));\n },\n\n async listApiKeys() {\n const results = await app._interface.listProjectApiKeys({ user_id: 'me' }, session, \"client\");\n return results.map((crud) => app._clientApiKeyFromCrud(session, crud));\n },\n\n async createApiKey(options: ApiKeyCreationOptions<\"user\">) {\n const result = await app._interface.createProjectApiKey(\n await apiKeyCreationOptionsToCrud(\"user\", \"me\", options),\n session,\n \"client\",\n );\n await app._userApiKeysCache.refresh([session]);\n return app._clientApiKeyFromCrud(session, result);\n },\n\n useOAuthProviders() {\n const results = useAsyncCache(app._currentUserOAuthProvidersCache, [session] as const, \"user.useOAuthProviders()\");\n return results.map((crud) => app._clientOAuthProviderFromCrud(crud, session));\n },\n\n async listOAuthProviders() {\n const results = Result.orThrow(await app._currentUserOAuthProvidersCache.getOrWait([session], \"write-only\"));\n return results.map((crud) => app._clientOAuthProviderFromCrud(crud, session));\n },\n\n useOAuthProvider(id: string) {\n const providers = this.useOAuthProviders();\n return useMemo(() => providers.find((p) => p.id === id) ?? null, [providers, id]);\n },\n\n async getOAuthProvider(id: string) {\n const providers = await this.listOAuthProviders();\n return providers.find((p) => p.id === id) ?? null;\n },\n\n async registerPasskey(options?: { hostname?: string }): Promise<Result<undefined, KnownErrors[\"PasskeyRegistrationFailed\"] | KnownErrors[\"PasskeyWebAuthnError\"]>> {\n const hostname = (await app._getCurrentUrl())?.hostname;\n if (!hostname) {\n throw new StackAssertionError(\"hostname must be provided if the Stack App does not have a redirect method\");\n }\n\n const initiationResult = await app._interface.initiatePasskeyRegistration({}, session);\n\n if (initiationResult.status !== \"ok\") {\n return Result.error(new KnownErrors.PasskeyRegistrationFailed(\"Failed to get initiation options for passkey registration\"));\n }\n\n const { options_json, code } = initiationResult.data;\n\n // HACK: Override the rpID to be the actual domain\n if (options_json.rp.id !== \"THIS_VALUE_WILL_BE_REPLACED.example.com\") {\n throw new StackAssertionError(`Expected returned RP ID from server to equal sentinel, but found ${options_json.rp.id}`);\n }\n\n options_json.rp.id = hostname;\n\n let attResp;\n try {\n attResp = await startRegistration({ optionsJSON: options_json });\n } catch (error: any) {\n if (error instanceof WebAuthnError) {\n return Result.error(new KnownErrors.PasskeyWebAuthnError(error.message, error.name));\n } else {\n // This should never happen\n captureError(\"passkey-registration-failed\", error);\n return Result.error(new KnownErrors.PasskeyRegistrationFailed(\"Failed to start passkey registration due to unknown error\"));\n }\n }\n\n\n const registrationResult = await app._interface.registerPasskey({ credential: attResp, code }, session);\n\n await app._refreshUser(session);\n return registrationResult;\n },\n };\n }\n\n protected _createInternalUserExtra(session: InternalSession): InternalUserExtra {\n const app = this;\n this._ensureInternalProject();\n return {\n createProject(newProject: AdminProjectUpdateOptions & { displayName: string, teamId: string }) {\n return app._createProject(session, newProject);\n },\n async transferProject(projectIdToTransfer: string, newTeamId: string): Promise<void> {\n await app._interface.transferProject(session, projectIdToTransfer, newTeamId);\n await app._refreshProject();\n },\n listOwnedProjects() {\n return app._listOwnedProjects(session);\n },\n useOwnedProjects() {\n return app._useOwnedProjects(session);\n },\n };\n }\n\n protected _createCustomer(userIdOrTeamId: string, type: \"user\" | \"team\", session: InternalSession | null): Omit<Customer, \"id\"> {\n const app = this;\n const effectiveSession = session ?? app._interface.createSession({ refreshToken: null });\n const customerOptions = type === \"user\" ? { userId: userIdOrTeamId } : { teamId: userIdOrTeamId };\n return {\n async getBilling() {\n const response = Result.orThrow(await app._customerBillingCache.getOrWait([effectiveSession, type, userIdOrTeamId], \"write-only\"));\n return app._customerBillingFromResponse(response);\n },\n useBilling() {\n const response = useAsyncCache(app._customerBillingCache, [effectiveSession, type, userIdOrTeamId] as const, \"customer.useBilling()\");\n return app._customerBillingFromResponse(response);\n },\n async createPaymentMethodSetupIntent(): Promise<CustomerPaymentMethodSetupIntent> {\n const body = await app._interface.createCustomerPaymentMethodSetupIntent(type, userIdOrTeamId, effectiveSession);\n return {\n clientSecret: body.client_secret,\n stripeAccountId: body.stripe_account_id,\n };\n },\n async setDefaultPaymentMethodFromSetupIntent(setupIntentId: string): Promise<CustomerDefaultPaymentMethod> {\n const body = await app._interface.setDefaultCustomerPaymentMethodFromSetupIntent(type, userIdOrTeamId, setupIntentId, effectiveSession);\n await app._customerBillingCache.refresh([effectiveSession, type, userIdOrTeamId]);\n return body.default_payment_method;\n },\n async getItem(itemId: string) {\n return await app.getItem({ itemId, ...customerOptions });\n },\n useItem(itemId: string) {\n return app.useItem({ itemId, ...customerOptions });\n },\n async listProducts(options?: CustomerProductsListOptions) {\n return await app.listProducts({ ...options, ...customerOptions });\n },\n useProducts(options?: CustomerProductsListOptions) {\n return app.useProducts({ ...options, ...customerOptions });\n },\n async listInvoices(options?: CustomerInvoicesListOptions) {\n return await app.listInvoices({ ...options, ...customerOptions });\n },\n useInvoices(options?: CustomerInvoicesListOptions) {\n return app.useInvoices({ ...options, ...customerOptions });\n },\n async createCheckoutUrl(options: { productId: string, returnUrl?: string }) {\n return await app._interface.createCheckoutUrl(type, userIdOrTeamId, options.productId, effectiveSession, options.returnUrl, \"client\");\n },\n async switchSubscription(options: { fromProductId: string, toProductId: string, priceId?: string, quantity?: number }) {\n await app._interface.switchSubscription({\n customer_type: type,\n customer_id: userIdOrTeamId,\n from_product_id: options.fromProductId,\n to_product_id: options.toProductId,\n price_id: options.priceId,\n quantity: options.quantity,\n }, effectiveSession);\n await app._customerBillingCache.refresh([effectiveSession, type, userIdOrTeamId]);\n if (type === \"user\") {\n await app._userProductsCache.invalidateWhere(([cachedSession, userId]) => cachedSession === effectiveSession && userId === userIdOrTeamId);\n } else {\n await app._teamProductsCache.invalidateWhere(([cachedSession, teamId]) => cachedSession === effectiveSession && teamId === userIdOrTeamId);\n }\n },\n };\n }\n\n async getItem(options: { itemId: string, userId: string } | { itemId: string, teamId: string } | { itemId: string, customCustomerId: string }): Promise<Item> {\n const session = await this._getSession();\n let crud: ItemCrud['Client']['Read'];\n if (\"userId\" in options) {\n crud = Result.orThrow(await this._userItemCache.getOrWait([session, options.userId, options.itemId], \"write-only\"));\n } else if (\"teamId\" in options) {\n crud = Result.orThrow(await this._teamItemCache.getOrWait([session, options.teamId, options.itemId], \"write-only\"));\n } else {\n crud = Result.orThrow(await this._customItemCache.getOrWait([session, options.customCustomerId, options.itemId], \"write-only\"));\n }\n return this._clientItemFromCrud(crud);\n }\n\n useItem(options: { itemId: string, userId: string } | { itemId: string, teamId: string } | { itemId: string, customCustomerId: string }): Item {\n const session = this._useSession();\n const [cache, ownerId] =\n \"userId\" in options ? [this._userItemCache, options.userId] :\n \"teamId\" in options ? [this._teamItemCache, options.teamId] : [this._customItemCache, options.customCustomerId];\n const crud = useAsyncCache(cache, [session, ownerId, options.itemId] as const, \"app.useItem()\");\n return this._clientItemFromCrud(crud);\n }\n\n async listProducts(options: CustomerProductsRequestOptions): Promise<CustomerProductsList> {\n const currentUser = await this.getUser();\n const session = currentUser?._internalSession ?? await this._getSession();\n if (\"userId\" in options) {\n const response = Result.orThrow(await this._userProductsCache.getOrWait([session, options.userId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerProductsFromResponse(response);\n } else if (\"teamId\" in options) {\n const response = Result.orThrow(await this._teamProductsCache.getOrWait([session, options.teamId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerProductsFromResponse(response);\n }\n const response = Result.orThrow(await this._customProductsCache.getOrWait([session, options.customCustomerId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerProductsFromResponse(response);\n }\n\n async listInvoices(options: CustomerInvoicesRequestOptions): Promise<CustomerInvoicesList> {\n const session = await this._getSession();\n if (\"userId\" in options) {\n const response = Result.orThrow(await this._userInvoicesCache.getOrWait([session, options.userId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerInvoicesFromResponse(response);\n }\n const response = Result.orThrow(await this._teamInvoicesCache.getOrWait([session, options.teamId, options.cursor ?? null, options.limit ?? null], \"write-only\"));\n return this._customerInvoicesFromResponse(response);\n }\n\n async cancelSubscription(options: { productId: string } | { productId: string, teamId: string }): Promise<void> {\n const session = await this._getSession();\n const user = await this.getUser();\n if (!user) {\n throw new KnownErrors.UserAuthenticationRequired();\n }\n const customerType = \"teamId\" in options ? \"team\" : \"user\";\n const customerId = \"teamId\" in options ? options.teamId : user.id;\n await this._interface.cancelSubscription({\n customer_type: customerType,\n customer_id: customerId,\n product_id: options.productId,\n }, session);\n if (customerType === \"user\") {\n await this._userProductsCache.invalidateWhere(([cachedSession, userId]) => cachedSession === session && userId === customerId);\n } else {\n await this._teamProductsCache.invalidateWhere(([cachedSession, teamId]) => cachedSession === session && teamId === customerId);\n }\n }\n useProducts(options: CustomerProductsRequestOptions): CustomerProductsList {\n const session = this._useSession();\n const cache = \"userId\" in options ? this._userProductsCache : \"teamId\" in options ? this._teamProductsCache : this._customProductsCache;\n const debugLabel = \"clientApp.useProducts()\";\n const customerId = \"userId\" in options ? options.userId : \"teamId\" in options ? options.teamId : options.customCustomerId;\n const response = useAsyncCache(cache, [session, customerId, options.cursor ?? null, options.limit ?? null] as const, debugLabel);\n return this._customerProductsFromResponse(response);\n }\n useInvoices(options: CustomerInvoicesRequestOptions): CustomerInvoicesList {\n const session = this._useSession();\n const cache = \"userId\" in options ? this._userInvoicesCache : this._teamInvoicesCache;\n const debugLabel = \"clientApp.useInvoices()\";\n const customerId = \"userId\" in options ? options.userId : options.teamId;\n const response = useAsyncCache(cache, [session, customerId, options.cursor ?? null, options.limit ?? null] as const, debugLabel);\n return this._customerInvoicesFromResponse(response);\n }\n\n protected _currentUserFromCrud(crud: NonNullable<CurrentUserCrud['Client']['Read']>, session: InternalSession): ProjectCurrentUser<ProjectId> {\n const currentUser = withUserDestructureGuard({\n ...this._createBaseUser(crud),\n ...this._createAuth(session),\n ...this._createUserExtraFromCurrent(crud, session),\n ...this._isInternalProject() ? this._createInternalUserExtra(session) : {},\n ...this._createCustomer(crud.id, \"user\", session),\n } satisfies CurrentUser);\n return currentUser as ProjectCurrentUser<ProjectId>;\n }\n protected _clientSessionFromCrud(crud: SessionsCrud['Client']['Read']): ActiveSession {\n return {\n id: crud.id,\n userId: crud.user_id,\n createdAt: new Date(crud.created_at),\n isImpersonation: crud.is_impersonation,\n lastUsedAt: crud.last_used_at ? new Date(crud.last_used_at) : undefined,\n isCurrentSession: crud.is_current_session ?? false,\n geoInfo: crud.last_used_at_end_user_ip_info,\n };\n }\n\n protected _getOwnedAdminApp(forProjectId: string, session: InternalSession): _StackAdminAppImplIncomplete<false, string> {\n if (!this._ownedAdminApps.has([session, forProjectId])) {\n this._ownedAdminApps.set([session, forProjectId], new (_StackClientAppImplIncomplete.LazyStackAdminAppImpl.value!)({\n baseUrl: this._interface.options.getBaseUrl(),\n projectId: forProjectId,\n tokenStore: null,\n projectOwnerSession: session,\n noAutomaticPrefetch: true,\n }));\n }\n return this._ownedAdminApps.get([session, forProjectId])!;\n }\n\n get projectId(): ProjectId {\n return this._interface.projectId as ProjectId;\n }\n\n protected async _isTrusted(url: string): Promise<boolean> {\n return isRelative(url);\n }\n\n get urls(): Readonly<HandlerUrls> {\n return getUrls(this._urlOptions);\n }\n\n protected async _getCurrentUrl() {\n if (this._redirectMethod === \"none\") {\n return null;\n }\n return new URL(window.location.href);\n }\n\n protected async _redirectTo(options: { url: URL | string, replace?: boolean }) {\n if (this._redirectMethod === \"none\") {\n return;\n } else if (typeof this._redirectMethod === \"object\" && this._redirectMethod.navigate) {\n this._redirectMethod.navigate(options.url.toString());\n } else {\n if (options.replace) {\n window.location.replace(options.url);\n } else {\n window.location.assign(options.url);\n }\n }\n\n await wait(2000);\n }\n\n useNavigate(): (to: string) => void {\n if (typeof this._redirectMethod === \"object\") {\n return this._redirectMethod.useNavigate();\n } else if (this._redirectMethod === \"window\") {\n return (to: string) => window.location.assign(to);\n } else {\n return (to: string) => { };\n }\n }\n protected async _redirectIfTrusted(url: string, options?: RedirectToOptions) {\n if (!await this._isTrusted(url)) {\n throw new Error(`Redirect URL ${url} is not trusted; should be relative.`);\n }\n return await this._redirectTo({ url, ...options });\n }\n\n protected async _redirectToHandler(handlerName: keyof HandlerUrls, options?: RedirectToOptions) {\n let url = this.urls[handlerName];\n if (!url) {\n throw new Error(`No URL for handler name ${handlerName}`);\n }\n\n if (!options?.noRedirectBack) {\n if (handlerName === \"afterSignIn\" || handlerName === \"afterSignUp\") {\n if (isReactServer || typeof window === \"undefined\") {\n // TODO implement this\n } else {\n const queryParams = new URLSearchParams(window.location.search);\n url = queryParams.get(\"after_auth_return_to\") || url;\n }\n } else if (handlerName === \"signIn\" || handlerName === \"signUp\" || handlerName === \"onboarding\") {\n // For signIn, signUp, and onboarding, preserve the return URL so user can be redirected back after completing the flow\n if (isReactServer || typeof window === \"undefined\") {\n // TODO implement this\n } else {\n const currentUrl = new URL(window.location.href);\n const nextUrl = new URL(url, currentUrl);\n if (currentUrl.searchParams.has(\"after_auth_return_to\")) {\n nextUrl.searchParams.set(\"after_auth_return_to\", currentUrl.searchParams.get(\"after_auth_return_to\")!);\n } else if (currentUrl.protocol === nextUrl.protocol && currentUrl.host === nextUrl.host) {\n nextUrl.searchParams.set(\"after_auth_return_to\", getRelativePart(currentUrl));\n }\n url = getRelativePart(nextUrl);\n }\n }\n }\n\n await this._redirectIfTrusted(url, options);\n }\n\n async redirectToSignIn(options?: RedirectToOptions) { return await this._redirectToHandler(\"signIn\", options); }\n async redirectToSignUp(options?: RedirectToOptions) { return await this._redirectToHandler(\"signUp\", options); }\n async redirectToSignOut(options?: RedirectToOptions) { return await this._redirectToHandler(\"signOut\", options); }\n async redirectToEmailVerification(options?: RedirectToOptions) { return await this._redirectToHandler(\"emailVerification\", options); }\n async redirectToPasswordReset(options?: RedirectToOptions) { return await this._redirectToHandler(\"passwordReset\", options); }\n async redirectToForgotPassword(options?: RedirectToOptions) { return await this._redirectToHandler(\"forgotPassword\", options); }\n async redirectToHome(options?: RedirectToOptions) { return await this._redirectToHandler(\"home\", options); }\n async redirectToOAuthCallback(options?: RedirectToOptions) { return await this._redirectToHandler(\"oauthCallback\", options); }\n async redirectToMagicLinkCallback(options?: RedirectToOptions) { return await this._redirectToHandler(\"magicLinkCallback\", options); }\n async redirectToAfterSignIn(options?: RedirectToOptions) { return await this._redirectToHandler(\"afterSignIn\", options); }\n async redirectToAfterSignUp(options?: RedirectToOptions) { return await this._redirectToHandler(\"afterSignUp\", options); }\n async redirectToOnboarding(options?: RedirectToOptions) { return await this._redirectToHandler(\"onboarding\", options); }\n async redirectToAfterSignOut(options?: RedirectToOptions) { return await this._redirectToHandler(\"afterSignOut\", options); }\n async redirectToAccountSettings(options?: RedirectToOptions) { return await this._redirectToHandler(\"accountSettings\", options); }\n async redirectToError(options?: RedirectToOptions) { return await this._redirectToHandler(\"error\", options); }\n async redirectToTeamInvitation(options?: RedirectToOptions) { return await this._redirectToHandler(\"teamInvitation\", options); }\n async redirectToMfa(options?: RedirectToOptions) { return await this._redirectToHandler(\"mfa\", options); }\n\n async sendForgotPasswordEmail(email: string, options?: { callbackUrl?: string }): Promise<Result<undefined, KnownErrors[\"UserNotFound\"]>> {\n return await this._interface.sendForgotPasswordEmail(email, options?.callbackUrl ?? constructRedirectUrl(this.urls.passwordReset, \"callbackUrl\"));\n }\n\n async sendMagicLinkEmail(email: string, options?: { callbackUrl?: string }): Promise<Result<{ nonce: string }, KnownErrors[\"RedirectUrlNotWhitelisted\"]>> {\n return await this._interface.sendMagicLinkEmail(email, options?.callbackUrl ?? constructRedirectUrl(this.urls.magicLinkCallback, \"callbackUrl\"));\n }\n\n async resetPassword(options: { password: string, code: string }): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n return await this._interface.resetPassword(options);\n }\n\n async verifyPasswordResetCode(code: string): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n return await this._interface.verifyPasswordResetCode(code);\n }\n\n async verifyTeamInvitationCode(code: string): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n return await this._interface.acceptTeamInvitation({\n type: 'check',\n code,\n session: await this._getSession(),\n });\n }\n\n async acceptTeamInvitation(code: string): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n const result = await this._interface.acceptTeamInvitation({\n type: 'use',\n code,\n session: await this._getSession(),\n });\n\n if (result.status === 'ok') {\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n async getTeamInvitationDetails(code: string): Promise<Result<{ teamDisplayName: string }, KnownErrors[\"VerificationCodeError\"]>> {\n const result = await this._interface.acceptTeamInvitation({\n type: 'details',\n code,\n session: await this._getSession(),\n });\n\n if (result.status === 'ok') {\n return Result.ok({ teamDisplayName: result.data.team_display_name });\n } else {\n return Result.error(result.error);\n }\n }\n\n async verifyEmail(code: string): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"]>> {\n const result = await this._interface.verifyEmail(code);\n await this._currentUserCache.refresh([await this._getSession()]);\n await this._clientContactChannelsCache.refresh([await this._getSession()]);\n return result;\n }\n\n async getUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'redirect' }): Promise<ProjectCurrentUser<ProjectId>>;\n async getUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'throw' }): Promise<ProjectCurrentUser<ProjectId>>;\n async getUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'anonymous' }): Promise<ProjectCurrentUser<ProjectId>>;\n async getUser(options?: GetCurrentUserOptions<HasTokenStore>): Promise<ProjectCurrentUser<ProjectId> | null>;\n async getUser(options?: GetCurrentUserOptions<HasTokenStore>): Promise<ProjectCurrentUser<ProjectId> | null> {\n // Validate that includeRestricted: false and or: 'anonymous' are mutually exclusive\n if (options?.or === 'anonymous' && options.includeRestricted === false) {\n throw new Error(\"Cannot use { or: 'anonymous' } with { includeRestricted: false }. Anonymous users implicitly include restricted users.\");\n }\n\n this._ensurePersistentTokenStore(options?.tokenStore);\n const session = await this._getSession(options?.tokenStore);\n let crud = Result.orThrow(await this._currentUserCache.getOrWait([session], \"write-only\"));\n const includeAnonymous = options?.or === \"anonymous\" || options?.or === \"anonymous-if-exists[deprecated]\";\n const includeRestricted = options?.includeRestricted === true || includeAnonymous;\n\n if (crud === null || (crud.is_anonymous && !includeAnonymous) || (crud.is_restricted && !includeRestricted)) {\n switch (options?.or) {\n case 'redirect': {\n if (!crud?.is_anonymous && crud?.is_restricted) {\n await this.redirectToOnboarding({ replace: true });\n } else {\n await this.redirectToSignIn({ replace: true });\n }\n // TODO: We should probably `await neverResolve()` here instead of returning null. I (Konsti) wanna do it in a release with few changes though because I'm not sure if it'll break anything\n break;\n }\n case 'throw': {\n throw new Error(\"User is not signed in but getUser was called with { or: 'throw' }\");\n }\n case 'anonymous': {\n const tokens = await this._signUpAnonymously();\n return await this.getUser({ tokenStore: tokens, or: \"anonymous-if-exists[deprecated]\", includeRestricted: true }) ?? throwErr(\"Something went wrong while signing up anonymously\");\n }\n case undefined:\n case \"anonymous-if-exists[deprecated]\":\n case \"return-null\": {\n return null;\n }\n }\n }\n\n return crud && this._currentUserFromCrud(crud, session);\n }\n\n useUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'redirect' }): ProjectCurrentUser<ProjectId>;\n useUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'throw' }): ProjectCurrentUser<ProjectId>;\n useUser(options: GetCurrentUserOptions<HasTokenStore> & { or: 'anonymous' }): ProjectCurrentUser<ProjectId>;\n useUser(options?: GetCurrentUserOptions<HasTokenStore>): ProjectCurrentUser<ProjectId> | null;\n useUser(options?: GetCurrentUserOptions<HasTokenStore>): ProjectCurrentUser<ProjectId> | null {\n // Validate that includeRestricted: false and or: 'anonymous' are mutually exclusive\n if (options?.or === 'anonymous' && options.includeRestricted === false) {\n throw new Error(\"Cannot use { or: 'anonymous' } with { includeRestricted: false }. Anonymous users implicitly include restricted users.\");\n }\n\n this._ensurePersistentTokenStore(options?.tokenStore);\n\n const session = this._useSession(options?.tokenStore);\n let crud = useAsyncCache(this._currentUserCache, [session] as const, \"clientApp.useUser()\");\n const includeAnonymous = options?.or === \"anonymous\" || options?.or === \"anonymous-if-exists[deprecated]\";\n const includeRestricted = options?.includeRestricted === true || includeAnonymous;\n\n if (crud === null || (crud.is_anonymous && !includeAnonymous) || (crud.is_restricted && !includeRestricted)) {\n switch (options?.or) {\n case 'redirect': {\n if (!crud?.is_anonymous && crud?.is_restricted) {\n runAsynchronously(this.redirectToOnboarding({ replace: true }));\n } else {\n runAsynchronously(this.redirectToSignIn({ replace: true }));\n }\n suspend();\n throw new StackAssertionError(\"suspend should never return\");\n }\n case 'throw': {\n throw new Error(\"User is not signed in but useUser was called with { or: 'throw' }\");\n }\n case 'anonymous': {\n // TODO we should think about the behavior when calling useUser (or getUser) in anonymous with a custom token store. signUpAnonymously always sets the current token store on app level, instead of the one passed to this function\n // TODO we shouldn't reload & suspend here, instead we should use a promise that resolves to the new anonymous user\n runAsynchronously(async () => {\n await this._signUpAnonymously();\n if (typeof window !== \"undefined\") {\n window.location.reload();\n }\n });\n suspend();\n throw new StackAssertionError(\"suspend should never return\");\n }\n case undefined:\n case \"anonymous-if-exists[deprecated]\":\n case \"return-null\": {\n // do nothing\n }\n }\n }\n\n return useMemo(() => {\n return crud && this._currentUserFromCrud(crud, session);\n }, [crud, session, options?.or]);\n }\n\n _getTokenPartialUserFromSession(session: InternalSession, options: GetCurrentPartialUserOptions<HasTokenStore>): TokenPartialUser | null {\n const accessToken = session.getAccessTokenIfNotExpiredYet(0, null);\n if (!accessToken) {\n return null;\n }\n const isAnonymous = accessToken.payload.is_anonymous;\n if (isAnonymous && options.or !== \"anonymous\") {\n return null;\n }\n return {\n id: accessToken.payload.sub,\n primaryEmail: accessToken.payload.email,\n displayName: accessToken.payload.name,\n primaryEmailVerified: accessToken.payload.email_verified,\n isAnonymous,\n isRestricted: accessToken.payload.is_restricted,\n restrictedReason: accessToken.payload.restricted_reason,\n } satisfies TokenPartialUser;\n }\n\n async _getPartialUserFromConvex(ctx: ConvexCtx): Promise<TokenPartialUser | null> {\n const auth = await ctx.auth.getUserIdentity();\n if (!auth) {\n return null;\n }\n return {\n id: auth.subject,\n displayName: auth.name ?? null,\n primaryEmail: auth.email ?? null,\n primaryEmailVerified: auth.email_verified as boolean,\n isAnonymous: auth.is_anonymous as boolean,\n isRestricted: auth.is_restricted as boolean,\n restrictedReason: (auth.restricted_reason as { type: \"anonymous\" | \"email_not_verified\" } | null) ?? null,\n };\n }\n\n async getPartialUser(options: GetCurrentPartialUserOptions<HasTokenStore> & { from: 'token' }): Promise<TokenPartialUser | null>;\n async getPartialUser(options: GetCurrentPartialUserOptions<HasTokenStore> & { from: 'convex' }): Promise<TokenPartialUser | null>;\n async getPartialUser(options: GetCurrentPartialUserOptions<HasTokenStore>): Promise<SyncedPartialUser | TokenPartialUser | null> {\n switch (options.from) {\n case \"token\": {\n this._ensurePersistentTokenStore(options.tokenStore ?? this._tokenStoreInit);\n const session = await this._getSession(options.tokenStore);\n return this._getTokenPartialUserFromSession(session, options);\n }\n case \"convex\": {\n return await this._getPartialUserFromConvex(options.ctx);\n }\n default: {\n // @ts-expect-error\n throw new Error(`Invalid 'from' option: ${options.from}`);\n }\n }\n }\n usePartialUser(options: GetCurrentPartialUserOptions<HasTokenStore> & { from: 'token' }): TokenPartialUser | null;\n usePartialUser(options: GetCurrentPartialUserOptions<HasTokenStore> & { from: 'convex' }): TokenPartialUser | null;\n usePartialUser(options: GetCurrentPartialUserOptions<HasTokenStore>): TokenPartialUser | SyncedPartialUser | null {\n switch (options.from) {\n case \"token\": {\n this._ensurePersistentTokenStore(options.tokenStore ?? this._tokenStoreInit);\n const session = this._useSession(options.tokenStore);\n return this._getTokenPartialUserFromSession(session, options);\n }\n case \"convex\": {\n const result = useAsyncCache(this._convexPartialUserCache, [options.ctx] as const, \"clientApp.usePartialUser()\");\n return result;\n }\n default: {\n // @ts-expect-error\n throw new Error(`Invalid 'from' option: ${options.from}`);\n }\n }\n }\n getConvexClientAuth(options: { tokenStore: TokenStoreInit }): (args: { forceRefreshToken: boolean }) => Promise<string | null> {\n return async (args: { forceRefreshToken: boolean }) => {\n const session = await this._getSession(options.tokenStore ?? this._tokenStoreInit);\n if (!args.forceRefreshToken) {\n const tokens = await session.getOrFetchLikelyValidTokens(20_000, 75_000);\n return tokens?.accessToken.token ?? null;\n }\n const tokens = await session.fetchNewTokens();\n return tokens?.accessToken.token ?? null;\n };\n }\n\n async getConvexHttpClientAuth(options: { tokenStore: TokenStoreInit }): Promise<string> {\n const session = await this._getSession(options.tokenStore);\n const tokens = await session.getOrFetchLikelyValidTokens(20_000, 75_000);\n return tokens?.accessToken.token ?? \"\";\n }\n\n protected async _updateClientUser(update: UserUpdateOptions, session: InternalSession) {\n const res = await this._interface.updateClientUser(userUpdateOptionsToCrud(update), session);\n await this._refreshUser(session);\n return res;\n }\n\n async signInWithOAuth(provider: ProviderType, options?: { returnTo?: string }) {\n if (typeof window === \"undefined\") {\n throw new Error(\"signInWithOAuth can currently only be called in a browser environment\");\n }\n\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n await signInWithOAuth(\n this._interface,\n {\n provider,\n redirectUrl: options?.returnTo ?? this.urls.oauthCallback,\n errorRedirectUrl: this.urls.error,\n providerScope: this._oauthScopesOnSignIn[provider]?.join(\" \"),\n },\n session,\n );\n }\n\n /**\n * Handles MFA verification by redirecting to the OTP page\n */\n protected async _experimentalMfa(error: KnownErrors['MultiFactorAuthenticationRequired'], session: InternalSession): Promise<never> {\n // Store the attempt code in session storage so the OTP page can access it\n if (typeof window !== 'undefined') {\n window.sessionStorage.setItem('stack_mfa_attempt_code', (error.details as any)?.attempt_code ?? throwErr(\"attempt code missing\"));\n }\n\n // Redirect to the MFA page\n await this.redirectToMfa();\n\n throw new StackAssertionError(\"we should have redirected in redirectToMfa()\");\n }\n\n /**\n * @deprecated\n * TODO remove\n */\n protected async _catchMfaRequiredError<T, E>(callback: () => Promise<Result<T, E>>): Promise<Result<T | { accessToken: string, refreshToken: string, newUser: boolean }, E>> {\n try {\n return await callback();\n } catch (e) {\n if (KnownErrors.MultiFactorAuthenticationRequired.isInstance(e)) {\n return Result.ok(await this._experimentalMfa(e, await this._getSession()));\n }\n throw e;\n }\n }\n\n async signInWithCredential(options: {\n email: string,\n password: string,\n noRedirect?: boolean,\n }): Promise<Result<undefined, KnownErrors[\"EmailPasswordMismatch\"] | KnownErrors[\"InvalidTotpCode\"]>> {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n return await this._interface.signInWithCredential(options.email, options.password, session);\n });\n } catch (e) {\n if (KnownErrors.InvalidTotpCode.isInstance(e)) {\n return Result.error(e);\n }\n throw e;\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n if (!options.noRedirect) {\n await this.redirectToAfterSignIn({ replace: true });\n }\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n async signUpWithCredential(options: {\n email: string,\n password: string,\n noRedirect?: boolean,\n noVerificationCallback?: boolean,\n verificationCallbackUrl?: string,\n }): Promise<Result<undefined, KnownErrors[\"UserWithEmailAlreadyExists\"] | KnownErrors['PasswordRequirementsNotMet']>> {\n if (options.noVerificationCallback && options.verificationCallbackUrl) {\n throw new StackAssertionError(\"verificationCallbackUrl is not allowed when noVerificationCallback is true\");\n }\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n const emailVerificationRedirectUrl = options.noVerificationCallback ? undefined : options.verificationCallbackUrl ?? constructRedirectUrl(this.urls.emailVerification, \"verificationCallbackUrl\");\n\n let result = await this._interface.signUpWithCredential(\n options.email,\n options.password,\n emailVerificationRedirectUrl,\n session\n );\n\n // If the redirect URL is not whitelisted and we didn't explicitly opt out of verification,\n // retry with undefined (no email verification) and log a warning\n if (result.status === 'error' &&\n result.error instanceof KnownErrors.RedirectUrlNotWhitelisted &&\n !options.noVerificationCallback &&\n emailVerificationRedirectUrl !== undefined) {\n console.error(\"Warning: The verification callback URL is not trusted. Proceeding with signup without email verification. Please add your domain to the trusted domains list in your Stack Auth dashboard.\", { url: emailVerificationRedirectUrl });\n\n result = await this._interface.signUpWithCredential(\n options.email,\n options.password,\n undefined, // No email verification\n session\n );\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n if (!options.noRedirect) {\n await this.redirectToAfterSignUp({ replace: true });\n }\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n async _signUpAnonymously() {\n this._ensurePersistentTokenStore();\n\n if (!this._anonymousSignUpInProgress) {\n this._anonymousSignUpInProgress = (async () => {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n const result = await this._interface.signUpAnonymously(session);\n if (result.status === \"ok\") {\n await this._signInToAccountWithTokens(result.data);\n } else {\n throw new StackAssertionError(\"signUpAnonymously() should never return an error\");\n }\n this._anonymousSignUpInProgress = null;\n return result.data;\n })();\n }\n\n return await this._anonymousSignUpInProgress;\n }\n\n async signInWithMagicLink(code: string, options?: { noRedirect?: boolean }): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"] | KnownErrors[\"InvalidTotpCode\"]>> {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n return await this._interface.signInWithMagicLink(code, session);\n });\n } catch (e) {\n if (KnownErrors.InvalidTotpCode.isInstance(e)) {\n return Result.error(e);\n }\n throw e;\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n if (!(options?.noRedirect)) {\n if (result.data.newUser) {\n await this.redirectToAfterSignUp({ replace: true });\n } else {\n await this.redirectToAfterSignIn({ replace: true });\n }\n }\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n /**\n * Initiates a CLI authentication process that allows a command line application\n * to get a refresh token for a user's account.\n *\n * This process works as follows:\n * 1. The CLI app calls this method, which initiates the auth process with the server\n * 2. The server returns a polling code and a login code\n * 3. The CLI app opens a browser window to the appUrl with the login code as a parameter\n * 4. The user logs in through the browser and confirms the authorization\n * 5. The CLI app polls for the refresh token using the polling code\n *\n * @param options Options for the CLI login\n * @param options.appUrl The URL of the app that will handle the CLI auth confirmation\n * @param options.expiresInMillis Optional duration in milliseconds before the auth attempt expires (default: 2 hours)\n * @param options.maxAttempts Optional maximum number of polling attempts (default: Infinity)\n * @param options.waitTimeMillis Optional time to wait between polling attempts (default: 2 seconds)\n * @param options.promptLink Optional function to call with the login URL to prompt the user to open the browser\n * @returns Result containing either the refresh token or an error\n */\n async promptCliLogin(options: {\n appUrl: string,\n expiresInMillis?: number,\n maxAttempts?: number,\n waitTimeMillis?: number,\n promptLink?: (url: string) => void,\n }): Promise<Result<string, KnownErrors[\"CliAuthError\"] | KnownErrors[\"CliAuthExpiredError\"] | KnownErrors[\"CliAuthUsedError\"]>> {\n // Step 1: Initiate the CLI auth process\n const response = await this._interface.sendClientRequest(\n \"/auth/cli\",\n {\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n },\n body: JSON.stringify({\n expires_in_millis: options.expiresInMillis,\n }),\n },\n null\n );\n\n if (!response.ok) {\n return Result.error(new KnownErrors.CliAuthError(`Failed to initiate CLI auth: ${response.status} ${await response.text()}`));\n }\n\n const initResult = await response.json();\n const pollingCode = initResult.polling_code;\n const loginCode = initResult.login_code;\n\n // Step 2: Open the browser for the user to authenticate\n const url = `${options.appUrl}/handler/cli-auth-confirm?login_code=${encodeURIComponent(loginCode)}`;\n if (options.promptLink) {\n options.promptLink(url);\n } else {\n console.log(`Please visit the following URL to authenticate:\\n${url}`);\n }\n\n\n // Step 3: Poll for the token\n let attempts = 0;\n while (attempts < (options.maxAttempts ?? Infinity)) {\n attempts++;\n const pollResponse = await this._interface.sendClientRequest(\"/auth/cli/poll\", {\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n },\n body: JSON.stringify({\n polling_code: pollingCode,\n }),\n }, null);\n\n if (!pollResponse.ok) {\n return Result.error(new KnownErrors.CliAuthError(`Failed to initiate CLI auth: ${pollResponse.status} ${await pollResponse.text()}`));\n }\n const pollResult = await pollResponse.json();\n\n if (pollResponse.status === 201 && pollResult.status === \"success\") {\n return Result.ok(pollResult.refresh_token);\n }\n if (pollResult.status === \"waiting\") {\n await wait(options.waitTimeMillis ?? 2000);\n continue;\n }\n if (pollResult.status === \"expired\") {\n return Result.error(new KnownErrors.CliAuthExpiredError(\"CLI authentication request expired. Please try again.\"));\n }\n if (pollResult.status === \"used\") {\n return Result.error(new KnownErrors.CliAuthUsedError(\"This authentication token has already been used.\"));\n }\n return Result.error(new KnownErrors.CliAuthError(`Unexpected status from CLI auth polling: ${pollResult.status}`));\n }\n\n return Result.error(new KnownErrors.CliAuthError(\"Timed out waiting for CLI authentication.\"));\n }\n\n /*\n * Completes the MFA sign-in process by verifying the provided OTP code\n * @param totp The TOTP (Time-based One-Time Password) provided by the user\n * @param code The Attempt code provided by the user\n * @param options Additional options for the sign-in process\n * @returns A Result indicating success or failure\n */\n async signInWithMfa(totp: string, code: string, options?: { noRedirect?: boolean }): Promise<Result<undefined, KnownErrors[\"VerificationCodeError\"] | KnownErrors[\"InvalidTotpCode\"]>> {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n return await this._interface.signInWithMfa(totp, code, session);\n });\n } catch (e) {\n if (e instanceof KnownErrors.InvalidTotpCode) {\n return Result.error(e);\n }\n throw e;\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n if (!(options?.noRedirect)) {\n if (result.data.newUser) {\n await this.redirectToAfterSignUp({ replace: true });\n } else {\n await this.redirectToAfterSignIn({ replace: true });\n }\n }\n return Result.ok(undefined);\n }\n return Result.error(result.error);\n }\n\n async signInWithPasskey(): Promise<Result<undefined, KnownErrors[\"PasskeyAuthenticationFailed\"] | KnownErrors[\"InvalidTotpCode\"] | KnownErrors[\"PasskeyWebAuthnError\"]>> {\n this._ensurePersistentTokenStore();\n const session = await this._getSession();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n const initiationResult = await this._interface.initiatePasskeyAuthentication({}, session);\n if (initiationResult.status !== \"ok\") {\n return Result.error(new KnownErrors.PasskeyAuthenticationFailed(\"Failed to get initiation options for passkey authentication\"));\n }\n\n const { options_json, code } = initiationResult.data;\n\n // HACK: Override the rpID to be the actual domain\n if (options_json.rpId !== \"THIS_VALUE_WILL_BE_REPLACED.example.com\") {\n throw new StackAssertionError(`Expected returned RP ID from server to equal sentinel, but found ${options_json.rpId}`);\n }\n options_json.rpId = window.location.hostname;\n\n const authentication_response = await startAuthentication({ optionsJSON: options_json });\n return await this._interface.signInWithPasskey({ authentication_response, code }, session);\n });\n } catch (error) {\n if (error instanceof WebAuthnError) {\n return Result.error(new KnownErrors.PasskeyWebAuthnError(error.message, error.name));\n } else {\n // This should never happen\n return Result.error(new KnownErrors.PasskeyAuthenticationFailed(\"Failed to sign in with passkey\"));\n }\n }\n\n if (result.status === 'ok') {\n await this._signInToAccountWithTokens(result.data);\n await this.redirectToAfterSignIn({ replace: true });\n return Result.ok(undefined);\n } else {\n return Result.error(result.error);\n }\n }\n\n\n async callOAuthCallback() {\n if (typeof window === \"undefined\") {\n throw new Error(\"callOAuthCallback can currently only be called in a browser environment\");\n }\n this._ensurePersistentTokenStore();\n let result;\n try {\n result = await this._catchMfaRequiredError(async () => {\n return await callOAuthCallback(this._interface, this.urls.oauthCallback);\n });\n } catch (e) {\n if (KnownErrors.InvalidTotpCode.isInstance(e)) {\n alert(\"Invalid TOTP code. Please try signing in again.\");\n return false;\n } else {\n throw e;\n }\n }\n if (result.status === 'ok' && result.data) {\n await this._signInToAccountWithTokens(result.data);\n // TODO fix afterCallbackRedirectUrl for MFA (currently not passed because /mfa/sign-in doesn't return it)\n // or just get rid of afterCallbackRedirectUrl entirely tbh\n if (\"afterCallbackRedirectUrl\" in result.data && result.data.afterCallbackRedirectUrl) {\n await this._redirectTo({ url: result.data.afterCallbackRedirectUrl, replace: true });\n return true;\n } else if (result.data.newUser) {\n await this.redirectToAfterSignUp({ replace: true });\n return true;\n } else {\n await this.redirectToAfterSignIn({ replace: true });\n return true;\n }\n }\n return false;\n }\n\n protected async _signOut(session: InternalSession, options?: { redirectUrl?: URL | string }): Promise<void> {\n await storeLock.withWriteLock(async () => {\n await this._interface.signOut(session);\n if (options?.redirectUrl) {\n await this._redirectTo({ url: options.redirectUrl, replace: true });\n } else {\n await this.redirectToAfterSignOut();\n }\n });\n }\n\n async signOut(options?: { redirectUrl?: URL | string, tokenStore?: TokenStoreInit }): Promise<void> {\n const user = await this.getUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n await user.signOut({ redirectUrl: options?.redirectUrl });\n }\n }\n\n async getAccessToken(options?: { tokenStore?: TokenStoreInit }): Promise<string | null> {\n const user = await this.getUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return await user.getAccessToken();\n }\n return null;\n }\n\n useAccessToken(options?: { tokenStore?: TokenStoreInit }): string | null {\n const user = this.useUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return user.useAccessToken();\n }\n return null;\n }\n\n async getRefreshToken(options?: { tokenStore?: TokenStoreInit }): Promise<string | null> {\n const user = await this.getUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return await user.getRefreshToken();\n }\n return null;\n }\n\n useRefreshToken(options?: { tokenStore?: TokenStoreInit }): string | null {\n const user = this.useUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return user.useRefreshToken();\n }\n return null;\n }\n\n async getAuthHeaders(options?: { tokenStore?: TokenStoreInit }): Promise<{ \"x-stack-auth\": string }> {\n return {\n \"x-stack-auth\": JSON.stringify(await this.getAuthJson(options)),\n };\n }\n\n useAuthHeaders(options?: { tokenStore?: TokenStoreInit }): { \"x-stack-auth\": string } {\n return {\n \"x-stack-auth\": JSON.stringify(this.useAuthJson(options)),\n };\n }\n\n async getAuthJson(options?: { tokenStore?: TokenStoreInit }): Promise<{ accessToken: string | null, refreshToken: string | null }> {\n const user = await this.getUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return await user.getAuthJson();\n }\n return { accessToken: null, refreshToken: null };\n }\n\n useAuthJson(options?: { tokenStore?: TokenStoreInit }): { accessToken: string | null, refreshToken: string | null } {\n const user = this.useUser({ tokenStore: options?.tokenStore ?? undefined as any });\n if (user) {\n return user.useAuthJson();\n }\n return { accessToken: null, refreshToken: null };\n }\n\n async getProject(): Promise<Project> {\n const crud = Result.orThrow(await this._currentProjectCache.getOrWait([], \"write-only\"));\n return this._clientProjectFromCrud(crud);\n }\n\n useProject(): Project {\n const crud = useAsyncCache(this._currentProjectCache, [], \"clientApp.useProject()\");\n return useMemo(() => this._clientProjectFromCrud(crud), [crud]);\n }\n\n protected async _listOwnedProjects(session: InternalSession): Promise<AdminOwnedProject[]> {\n this._ensureInternalProject();\n const crud = Result.orThrow(await this._ownedProjectsCache.getOrWait([session], \"write-only\"));\n return crud.map((j) => this._getOwnedAdminApp(j.id, session)._adminOwnedProjectFromCrud(\n j,\n () => this._refreshOwnedProjects(session),\n ));\n }\n\n protected _useOwnedProjects(session: InternalSession): AdminOwnedProject[] {\n this._ensureInternalProject();\n const projects = useAsyncCache(this._ownedProjectsCache, [session], \"clientApp.useOwnedProjects()\");\n return useMemo(() => projects.map((j) => this._getOwnedAdminApp(j.id, session)._adminOwnedProjectFromCrud(\n j,\n () => this._refreshOwnedProjects(session),\n )), [projects]);\n }\n protected async _createProject(session: InternalSession, newProject: AdminProjectUpdateOptions & { displayName: string, teamId: string }): Promise<AdminOwnedProject> {\n this._ensureInternalProject();\n const crud = await this._interface.createProject(adminProjectCreateOptionsToCrud(newProject), session);\n const res = this._getOwnedAdminApp(crud.id, session)._adminOwnedProjectFromCrud(\n crud,\n () => this._refreshOwnedProjects(session),\n );\n await this._refreshOwnedProjects(session);\n return res;\n }\n\n protected async _refreshUser(session: InternalSession) {\n // TODO this should take a user ID instead of a session, and automatically refresh all sessions with that user ID\n await this._refreshSession(session);\n }\n\n protected async _refreshSession(session: InternalSession) {\n await this._currentUserCache.refresh([session]);\n // Suggest updating the access token so it contains the updated user/session data\n session.suggestAccessTokenExpired();\n }\n\n protected async _refreshUsers() {\n // nothing yet\n }\n\n protected async _refreshProject() {\n await this._currentProjectCache.refresh([]);\n }\n\n protected async _refreshOwnedProjects(session: InternalSession) {\n await this._ownedProjectsCache.refresh([session]);\n }\n\n static get [stackAppInternalsSymbol]() {\n return {\n fromClientJson: <HasTokenStore extends boolean, ProjectId extends string>(\n json: StackClientAppJson<HasTokenStore, ProjectId>\n ): StackClientApp<HasTokenStore, ProjectId> => {\n const providedCheckString = JSON.stringify(omit(json, [/* none currently */]));\n const existing = allClientApps.get(json.uniqueIdentifier);\n if (existing) {\n const [existingCheckString, clientApp] = existing;\n if (existingCheckString !== undefined && existingCheckString !== providedCheckString) {\n throw new StackAssertionError(\"The provided app JSON does not match the configuration of the existing client app with the same unique identifier\", { providedObj: json, existingString: existingCheckString });\n }\n return clientApp as any;\n }\n\n return new _StackClientAppImplIncomplete<HasTokenStore, ProjectId>({\n ...omit(json, [\"uniqueIdentifier\"]) as any,\n }, {\n uniqueIdentifier: json.uniqueIdentifier,\n checkString: providedCheckString,\n });\n }\n };\n }\n\n get [stackAppInternalsSymbol]() {\n return {\n toClientJson: (): StackClientAppJson<HasTokenStore, ProjectId> => {\n if (!(\"publishableClientKey\" in this._interface.options)) {\n // TODO find a way to do this\n throw new StackAssertionError(\"Cannot serialize to JSON from an application without a publishable client key\");\n }\n\n if (typeof this._redirectMethod !== \"string\") {\n throw new StackAssertionError(\"Cannot serialize to JSON from an application with a non-string redirect method\");\n }\n\n return {\n baseUrl: this._options.baseUrl,\n projectId: this.projectId,\n publishableClientKey: this._interface.options.publishableClientKey,\n tokenStore: this._tokenStoreInit,\n urls: this._urlOptions,\n oauthScopesOnSignIn: this._oauthScopesOnSignIn,\n uniqueIdentifier: this._getUniqueIdentifier(),\n redirectMethod: this._redirectMethod,\n extraRequestHeaders: this._options.extraRequestHeaders,\n };\n },\n setCurrentUser: (userJsonPromise: Promise<CurrentUserCrud['Client']['Read'] | null>) => {\n runAsynchronously(async () => {\n await this._currentUserCache.forceSetCachedValueAsync([await this._getSession()], Result.fromPromise(userJsonPromise));\n });\n },\n getConstructorOptions: () => this._options,\n sendRequest: async (\n path: string,\n requestOptions: RequestInit,\n requestType: \"client\" | \"server\" | \"admin\" = \"client\",\n ) => {\n return await this._interface.sendClientRequest(path, requestOptions, await this._getSession(), requestType);\n },\n };\n };\n}\n"],"mappings":";AAIA,SAAS,eAAe,qBAAqB,yBAAyB;AACtE,SAAS,aAAa,4BAA4B;AAiBlD,SAAS,uBAAuB;AAChC,SAAS,oBAAoB;AAE7B,SAAS,qBAAqB;AAC9B,SAAS,qBAAqB,cAAc,gBAAgB;AAC5D,SAAS,iBAAiB;AAC1B,SAAS,uBAAuB;AAEhC,SAAS,iBAAiB,YAAY;AACtC,SAAS,cAAc,mBAAmB,YAAY;AACtD,SAAS,SAAS,cAAc,WAAW;AAC3C,SAAS,cAAc;AACvB,SAAS,OAAO,iBAAiB;AACjC,SAAS,UAAU,yBAAyB;AAC5C,SAAS,iBAAiB,kBAAkB;AAC5C,SAAS,oBAAoB;AAC7B,YAAY,YAAY;AACxB,OAAO,SAAS,aAAa,eAAe;AAE5C,SAAS,4BAA4B;AACrC,SAAS,4BAA4B,mBAAmB,uBAAuB;AAC/E,SAAuB,2BAA2B,oBAAoB,+BAA+B,cAAc,oBAAoB,YAAY,uBAAuB,mBAAmB,+BAA+B;AAC5N,SAA6D,mCAAmC;AAChG,SAA2K,+BAA+B;AAE1M,SAAmF,mCAAmC,yCAAyC;AAI/J,SAAgE,uCAAuC;AACvG,SAA0G,yBAAyB,+BAA+B;AAClK,SAA8K,yBAAyB,gCAAgC;AAGvO,SAAsB,eAAe,aAAa,sBAAsB,uBAAuB,YAAY,+BAA+B,qBAAqB,gCAAgC,SAAS,iCAAiC;AAEzO,SAAS,qBAAqB;AAE9B,IAAI,gBAAgB;AAGpB,IAAM,UAAW,WAAmB,WAAW,EAAE,KAAK,CAAC,EAAE;AAGzD,IAAM,gBAAgB,oBAAI,IAA8E;AAIjG,IAAM,iCAAN,MAAM,+BAAoJ;AAAA,EAoT/J,YAAY,SAAqE,cAAsG;AAxSvL,SAAU,oBAAwC;AAOlD,SAAQ,mCAAmC;AAC3C,SAAiB,kBAAkB,IAAI,gBAAwF;AAE/H,SAAiB,oBAAoB,qBAAqB,OAAO,YAAY;AAC3E,UAAI,KAAK,kCAAkC;AACzC,cAAM,KAAK,GAAI;AAAA,MACjB;AACA,UAAI,QAAQ,mBAAmB,GAAG;AAiBhC,eAAO;AAAA,MACT;AACA,aAAO,MAAM,KAAK,WAAW,qBAAqB,OAAO;AAAA,IAC3D,CAAC;AACD,SAAiB,uBAAuB,YAAY,YAAY;AAC9D,aAAO,OAAO,QAAQ,MAAM,KAAK,WAAW,iBAAiB,CAAC;AAAA,IAChE,CAAC;AACD,SAAiB,sBAAsB,qBAAqB,OAAO,YAAY;AAC7E,aAAO,MAAM,KAAK,WAAW,aAAa,OAAO;AAAA,IACnD,CAAC;AACD,SAAiB,+BAA+B,qBAG9C,OAAO,SAAS,CAAC,QAAQ,SAAS,MAAM;AACxC,aAAO,MAAM,KAAK,WAAW,+BAA+B,EAAE,QAAQ,UAAU,GAAG,OAAO;AAAA,IAC5F,CAAC;AACD,SAAiB,sCAAsC,qBAGrD,OAAO,SAAS,CAAC,SAAS,MAAM;AAChC,aAAO,MAAM,KAAK,WAAW,kCAAkC,EAAE,UAAU,GAAG,OAAO;AAAA,IACvF,CAAC;AACD,SAAiB,yBAAyB,qBAAqB,OAAO,YAAY;AAChF,aAAO,MAAM,KAAK,WAAW,qBAAqB,OAAO;AAAA,IAC3D,CAAC;AACD,SAAiB,+CAA+C;AAAA,MAC9D,OAAO,SAAS,CAAC,YAAY,KAAK,MAAM;AACtC,YAAI;AACF,gBAAM,SAAS,MAAM,KAAK,WAAW,0BAA0B,YAAY,SAAS,IAAI,OAAO;AAC/F,iBAAO,EAAE,aAAa,OAAO,aAAa;AAAA,QAC5C,SAAS,KAAK;AACZ,cAAI,EAAE,YAAY,wCAAwC,WAAW,GAAG,KAAK,YAAY,kCAAkC,WAAW,GAAG,IAAI;AAC3I,kBAAM;AAAA,UACR;AAAA,QACF;AACA,eAAO;AAAA,MACT;AAAA,IACF;AACA,SAAiB,mCAAmC;AAAA,MAClD,OAAO,SAAS,CAAC,YAAY,OAAO,QAAQ,MAAM;AAChD,eAAO,MAAM,KAAK,+BAA+B;AAAA,UAC/C,SAAS,YAAY,OAAO,QAAQ,MAAM,KAAK,kBAAkB,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AAAA,UACnG,qBAAqB,YAAY,OAAO,QAAQ,MAAM,KAAK,6CAA6C,UAAU,CAAC,SAAS,YAAY,SAAS,EAAE,GAAY,YAAY,CAAC;AAAA,UAC5K,eAAe,MAAM,cAAc,KAAK,8CAA8C,CAAC,SAAS,YAAY,SAAS,EAAE,GAAY,6BAA6B;AAAA,UAChK;AAAA,UACA;AAAA,UACA;AAAA,UACA;AAAA,QACF,CAAC;AAAA,MACH;AAAA,IACF;AACA,SAAiB,2BAA2B;AAAA,MAC1C,OAAO,SAAS,CAAC,MAAM,MAAM;AAC3B,eAAO,MAAM,KAAK,WAAW,uBAAuB,EAAE,OAAO,GAAG,OAAO;AAAA,MACzE;AAAA,IACF;AACA,SAAiB,wBAAwB;AAAA,MACvC,OAAO,SAAS,CAAC,MAAM,MAAM;AAC3B,eAAO,MAAM,KAAK,WAAW,oBAAoB,EAAE,OAAO,GAAG,OAAO;AAAA,MACtE;AAAA,IACF;AACA,SAAiB,+BAA+B;AAAA,MAC9C,OAAO,SAAS,CAAC,MAAM,MAAM;AAC3B,eAAO,MAAM,KAAK,WAAW,qBAAqB,EAAE,QAAQ,QAAQ,KAAK,GAAG,OAAO;AAAA,MACrF;AAAA,IACF;AACA,SAAiB,8BAA8B;AAAA,MAC7C,OAAO,YAAY;AACjB,eAAO,MAAM,KAAK,WAAW,0BAA0B,OAAO;AAAA,MAChE;AAAA,IACF;AAEA,SAAiB,oBAAoB;AAAA,MACnC,OAAO,YAAY;AACjB,cAAM,UAAU,MAAM,KAAK,WAAW,mBAAmB,EAAE,SAAS,KAAK,GAAG,SAAS,QAAQ;AAC7F,eAAO;AAAA,MACT;AAAA,IACF;AAEA,SAAiB,oBAAoB;AAAA,MACnC,OAAO,SAAS,CAAC,MAAM,MAAM;AAC3B,cAAM,UAAU,MAAM,KAAK,WAAW,mBAAmB,EAAE,SAAS,OAAO,GAAG,SAAS,QAAQ;AAC/F,eAAO;AAAA,MACT;AAAA,IACF;AAEA,SAAiB,+BAA+B;AAAA,MAC9C,OAAO,YAAY;AACjB,cAAM,UAAU,MAAM,KAAK,WAAW,2BAA2B,OAAO;AACxE,eAAO;AAAA,MACT;AAAA,IACF;AAEA,SAAiB,kCAAkC;AAAA,MACjD,OAAO,YAAY;AACjB,eAAO,MAAM,KAAK,WAAW,mBAAmB,EAAE,SAAS,KAAK,GAAG,OAAO;AAAA,MAC5E;AAAA,IACF;AAEA,SAAiB,iBAAiB;AAAA,MAChC,OAAO,SAAS,CAAC,QAAQ,MAAM,MAAM;AACnC,eAAO,MAAM,KAAK,WAAW,QAAQ,EAAE,QAAQ,OAAO,GAAG,OAAO;AAAA,MAClE;AAAA,IACF;AAEA,SAAiB,iBAAiB;AAAA,MAChC,OAAO,SAAS,CAAC,QAAQ,MAAM,MAAM;AACnC,eAAO,MAAM,KAAK,WAAW,QAAQ,EAAE,QAAQ,OAAO,GAAG,OAAO;AAAA,MAClE;AAAA,IACF;AAEA,SAAiB,mBAAmB;AAAA,MAClC,OAAO,SAAS,CAAC,kBAAkB,MAAM,MAAM;AAC7C,eAAO,MAAM,KAAK,WAAW,QAAQ,EAAE,kBAAkB,OAAO,GAAG,OAAO;AAAA,MAC5E;AAAA,IACF;AAEA,SAAiB,qBAAqB;AAAA,MACpC,OAAO,SAAS,CAAC,QAAQ,QAAQ,KAAK,MAAM;AAC1C,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,qBAAqB;AAAA,MACpC,OAAO,SAAS,CAAC,QAAQ,QAAQ,KAAK,MAAM;AAC1C,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,uBAAuB;AAAA,MACtC,OAAO,SAAS,CAAC,kBAAkB,QAAQ,KAAK,MAAM;AACpD,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,qBAAqB;AAAA,MACpC,OAAO,SAAS,CAAC,QAAQ,QAAQ,KAAK,MAAM;AAC1C,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,qBAAqB;AAAA,MACpC,OAAO,SAAS,CAAC,QAAQ,QAAQ,KAAK,MAAM;AAC1C,eAAO,MAAM,KAAK,WAAW,aAAa;AAAA,UACxC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,QAAQ,UAAU;AAAA,UAClB,OAAO,SAAS;AAAA,QAClB,GAAG,OAAO;AAAA,MACZ;AAAA,IACF;AAEA,SAAiB,wBAAwB;AAAA,MAUvC,OAAO,SAAS,CAAC,cAAc,UAAU,MAAM;AAC7C,eAAO,MAAM,KAAK,WAAW,mBAAmB,cAAc,YAAY,OAAO;AAAA,MACnF;AAAA,IACF;AAEA,SAAiB,0BAA0B;AAAA,MACzC,OAAO,CAAC,GAAG,MAAM,MAAM,KAAK,0BAA0B,GAAU;AAAA,IAClE;AAEA,SAAiB,4BAA4B;AAAA,MAC3C,OAAO,CAAC,MAAM,MAAM,MAAM,KAAK,wBAAwB,MAAM;AAAA,IAC/D;AAEA,SAAQ,6BAA4F;AA8IpG,SAAU,oBAAoB,sBAAsB;AACpD,SAAU,gCAAgC,oBAAI,QAAoC;AAClF,SAAU,sBAAsB,oBAAI,QAAyC;AAC7E,SAAU,iCAA4D;AACtE,SAAQ,sCAA8C;AAmXtD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,SAAQ,qCAAqC,oBAAI,QAA0D;AA9bzG,UAAM,kBAAkB,0BAA0B,OAAO;AAEzD,QAAI,CAAC,+BAA8B,sBAAsB,OAAO;AAC9D,YAAM,IAAI,oBAAoB,2SAA2S;AAAA,IAC3U;AAEA,SAAK,WAAW;AAChB,SAAK,gBAAgB;AAErB,UAAM,YAAY,gBAAgB,aAAa,oBAAoB;AACnE,QAAI,cAAc,cAAc,CAAE,UAAU,MAAM,6EAA6E,GAAI;AACjI,YAAM,IAAI,MAAM,uBAAuB,SAAS,4FAA4F;AAAA,IAC9I;AAEA,QAAI,gBAAgB,aAAa,WAAW;AAC1C,WAAK,aAAa,aAAa;AAAA,IACjC,OAAO;AACL,WAAK,aAAa,IAAI,qBAAqB;AAAA,QACzC,YAAY,MAAM,WAAW,gBAAgB,OAAO;AAAA,QACpD,qBAAqB,gBAAgB,uBAAuB,8BAA8B;AAAA,QAC1F;AAAA,QACA;AAAA,QACA,sBAAsB,gBAAgB,wBAAwB,+BAA+B;AAAA,QAC7F,gBAAgB,YAAY;AAAA,QAC5B;AAAA,MACF,CAAC;AAAA,IACH;AAEA,SAAK,kBAAkB,gBAAgB;AACvC,SAAK,kBAAkB,gBAAgB,kBAAkB;AACzD,SAAK,cAAc,gBAAgB,QAAQ,CAAC;AAC5C,SAAK,uBAAuB,gBAAgB,uBAAuB,CAAC;AAEpE,QAAI,gBAAgB,aAAa,kBAAkB;AACjD,WAAK,oBAAoB,aAAa;AACtC,WAAK,sBAAsB;AAAA,IAC7B;AAAA,EACF;AAAA,EA1GA,MAAgB,sBAA6C;AAC3D,QAAI,KAAK,oBAAoB,mBAAmB,KAAK,oBAAoB,UAAU;AACjF,aAAO,MAAM,mBAAmB;AAAA,IAClC,OAAO;AACL,aAAO,MAAM,8BAA8B;AAAA,IAC7C;AAAA,EACF;AAAA,EAEA,MAAgB,+BAA+B,SAMmC;AAChF,UAAM,OAAO,MAAM,QAAQ,QAAQ;AACnC,QAAI,gBAAgB;AACpB,QAAI,CAAC,QAAQ,CAAC,KAAK,gBAAgB,KAAK,CAAC,MAAM,EAAE,OAAO,QAAQ,UAAU,GAAG;AAC3E,sBAAgB;AAAA,IAClB;AAEA,UAAM,QAAQ,MAAM,QAAQ,oBAAoB;AAChD,QAAI,CAAC,OAAO;AACV,sBAAgB;AAAA,IAClB;AAEA,QAAI,CAAC,iBAAiB,QAAQ,UAAU;AACtC,UAAI,CAAC,QAAQ,SAAS;AACpB,cAAM,IAAI,MAAM;AAAA;AAAA;AAAA;AAAA,SAIf;AAAA,MACH;AACA,YAAM;AAAA,QACJ,KAAK;AAAA,QACL;AAAA,UACE,UAAU,QAAQ;AAAA,UAClB,aAAa,KAAK,KAAK;AAAA,UACvB,kBAAkB,KAAK,KAAK;AAAA,UAC5B,eAAe,kBAAkB,QAAQ,SAAS,KAAK,KAAK,qBAAqB,QAAQ,UAAU,KAAK,CAAC,GAAG,KAAK,GAAG,CAAC;AAAA,QACvH;AAAA,QACA,QAAQ;AAAA,MACV;AACA,aAAO,MAAM,aAAa;AAAA,IAC5B,WAAW,CAAC,eAAe;AACzB,aAAO;AAAA,IACT;AAEA,WAAO;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,MAAM,iBAAiB;AACrB,cAAM,SAAS,MAAM,QAAQ,oBAAoB;AACjD,YAAI,CAAC,QAAQ;AACX,gBAAM,IAAI,oBAAoB,2BAA2B;AAAA,QAC3D;AACA,eAAO;AAAA,MACT;AAAA,MACA,iBAAiB;AACf,cAAM,SAAS,QAAQ,cAAc;AACrC,YAAI,CAAC,QAAQ;AACX,gBAAM,IAAI,oBAAoB,2BAA2B;AAAA,QAC3D;AACA,eAAO;AAAA,MACT;AAAA,IACF;AAAA,EACF;AAAA,EA0CU,wBAAwB;AAChC,QAAI,CAAC,KAAK,mBAAmB;AAC3B,YAAM,IAAI,oBAAoB,mCAAmC;AAAA,IACnE;AACA,QAAI,cAAc,IAAI,KAAK,iBAAiB,GAAG;AAC7C,YAAM,IAAI,oBAAoB,mEAAmE;AAAA,IACnG;AACA,kBAAc,IAAI,KAAK,mBAAmB,CAAC,KAAK,eAAe,eAAe,QAAW,IAAI,CAAC;AAAA,EAChG;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOU,uBAAuB;AAC/B,QAAI,CAAC,KAAK,mBAAmB;AAC3B,WAAK,oBAAoB,aAAa;AACtC,WAAK,sBAAsB;AAAA,IAC7B;AACA,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,MAAgB,qBAAqB,MAAc,SAAc;AAC/D,WAAO,MAAM,KAAK,WAAW,oBAAoB,EAAE,GAAG,SAAS,KAAK,CAAC;AAAA,EACvE;AAAA,EAEU,wBAAwB,MAAc,SAAqB;AACnE,sBAAkB,KAAK,qBAAqB,MAAM,OAAO,CAAC;AAC1D,UAAM,IAAI,oBAAoB,GAAG,IAAI,sFAAsF;AAAA,EAC7H;AAAA,EAOA,IAAc,gCAAgC;AAC5C,WAAO,iBAAiB,KAAK,SAAS;AAAA,EACxC;AAAA,EACA,IAAc,0BAA0B;AACtC,WAAO,iBAAiB,KAAK,SAAS;AAAA,EACxC;AAAA,EACQ,2CAA2C,QAAyB;AAC1E,WAAO,GAAG,SAAS,YAAY,EAAE,GAAG,KAAK,uBAAuB;AAAA,EAClE;AAAA,EACQ,4BAA4B,QAAwB;AAC1D,UAAM,UAAU,aAAa,IAAI,YAAY,EAAE,OAAO,OAAO,YAAY,CAAC,CAAC;AAC3E,WAAO,GAAG,KAAK,uBAAuB,YAAY,OAAO;AAAA,EAC3D;AAAA,EACQ,0BAA0B,cAAsB,WAA2B;AACjF,WAAO,KAAK,UAAU;AAAA,MACpB,eAAe;AAAA,MACf,mBAAmB;AAAA,IACrB,CAAC;AAAA,EACH;AAAA,EACQ,yBAAyB,cAA6B,aAA2C;AACvG,WAAO,gBAAgB,cAAc,KAAK,UAAU,CAAC,cAAc,WAAW,CAAC,IAAI;AAAA,EACrF;AAAA,EACQ,8BAA8B,OAAsF;AAC1H,QAAI,CAAC,OAAO;AACV,aAAO;AAAA,IACT;AACA,UAAM,SAAS,UAAU,KAAK;AAC9B,QAAI,OAAO,WAAW,QAAQ,OAAO,OAAO,SAAS,YAAY,OAAO,SAAS,MAAM;AACrF,cAAQ,KAAK,2CAA2C;AACxD,aAAO;AAAA,IACT;AACA,UAAM,OAAO,OAAO;AACpB,UAAM,eAAe,mBAAmB,QAAQ,OAAO,KAAK,kBAAkB,WAAW,KAAK,gBAAgB;AAC9G,UAAM,YAAY,uBAAuB,QAAQ,OAAO,KAAK,sBAAsB,WAAW,KAAK,oBAAoB;AACvH,QAAI,CAAC,cAAc;AACjB,cAAQ,KAAK,sDAAsD;AACnE,aAAO;AAAA,IACT;AACA,WAAO;AAAA,MACL;AAAA,MACA;AAAA,IACF;AAAA,EAEF;AAAA,EACQ,kCAAkC,SAAoF;AAC5H,UAAM,EAAE,aAAa,mBAAmB,IAAI,KAAK,mCAAmC;AACpF,eAAW,QAAQ,aAAa;AAC9B,YAAM,QAAQ,QAAQ,IAAI;AAC1B,UAAI,OAAO;AACT,eAAO,EAAE,cAAc,OAAO,WAAW,KAAK;AAAA,MAChD;AAAA,IACF;AAEA,QAAI,WAAsE;AAC1E,eAAW,CAAC,MAAM,KAAK,KAAK,OAAO,QAAQ,OAAO,GAAG;AACnD,UAAI,CAAC,mBAAmB,KAAK,YAAU,KAAK,WAAW,MAAM,CAAC,EAAG;AACjE,YAAM,SAAS,KAAK,8BAA8B,KAAK;AACvD,UAAI,CAAC,OAAQ;AACb,YAAM,qBAAqB,OAAO,aAAa,OAAO;AACtD,YAAM,oBAAoB,UAAU,aAAa,OAAO;AACxD,UAAI,CAAC,YAAY,qBAAqB,mBAAmB;AACvD,mBAAW;AAAA,MACb;AAAA,IACF;AAEA,QAAI,CAAC,UAAU;AACb,aAAO,EAAE,cAAc,MAAM,WAAW,KAAK;AAAA,IAC/C;AAEA,WAAO;AAAA,MACL,cAAc,SAAS;AAAA,MACvB,WAAW,SAAS,aAAa;AAAA,IACnC;AAAA,EACF;AAAA,EACU,sBAAsB,SAAsC;AACpE,UAAM,EAAE,aAAa,IAAI,KAAK,kCAAkC,OAAO;AACvE,UAAM,oBAAoB,QAAQ,KAAK,sBAAsB,KAAK;AAClE,QAAI,cAA6B;AACjC,QAAI,qBAAqB,kBAAkB,WAAW,IAAK,GAAG;AAC5D,YAAM,SAAS,UAAU,iBAAiB;AAC1C,UACE,OAAO,WAAW,QAClB,OAAO,OAAO,SAAS,YACvB,OAAO,SAAS,QAChB,MAAM,QAAQ,OAAO,IAAI,KACzB,OAAO,KAAK,WAAW,KACvB,OAAO,OAAO,KAAK,CAAC,MAAM,YAC1B,OAAO,OAAO,KAAK,CAAC,MAAM,UAC1B;AACA,YAAI,OAAO,KAAK,CAAC,MAAM,cAAc;AACnC,wBAAc,OAAO,KAAK,CAAC;AAAA,QAC7B;AAAA,MACF,OAAO;AACL,gBAAQ,KAAK,wCAAwC;AAAA,MACvD;AAAA,IACF;AACA,WAAO;AAAA,MACL;AAAA,MACA;AAAA,IACF;AAAA,EACF;AAAA,EACA,IAAc,yBAAyB;AAKrC,WAAO;AAAA,EACT;AAAA,EACQ,wBAAwC;AAC9C,QAAI,CAAC,cAAc,GAAG;AACpB,YAAM,IAAI,oBAAoB,2CAA2C;AAAA,IAC3E;AACA,WAAc,mBAAY,SAAS,UAAU,EAAE;AAAA,EACjD;AAAA,EACQ,qCAA8F;AACpG,WAAO;AAAA,MACL,aAAa,CAAC,KAAK,+BAA+B,eAAe;AAAA,MACjE,oBAAoB;AAAA,QAClB,GAAG,KAAK,uBAAuB;AAAA,QAC/B,UAAU,KAAK,uBAAuB;AAAA,MACxC;AAAA,IACF;AAAA,EACF;AAAA,EACQ,gCAAgC,SAAsC;AAC5E,UAAM,EAAE,aAAa,mBAAmB,IAAI,KAAK,mCAAmC;AACpF,UAAM,QAAQ,oBAAI,IAAY;AAC9B,eAAW,QAAQ,aAAa;AAC9B,UAAI,QAAQ,IAAI,GAAG;AACjB,cAAM,IAAI,IAAI;AAAA,MAChB;AAAA,IACF;AACA,eAAW,QAAQ,OAAO,KAAK,OAAO,GAAG;AACvC,UAAI,mBAAmB,KAAK,YAAU,KAAK,WAAW,MAAM,CAAC,GAAG;AAC9D,cAAM,IAAI,IAAI;AAAA,MAChB;AAAA,IACF;AACA,WAAO;AAAA,EACT;AAAA,EACQ,4BACN,iBACA,cACA,aACA,mBACA;AACA,UAAM,cAAc,KAAK,gCAAgC,eAAe;AACxE,gBAAY,OAAO,iBAAiB;AACpC,UAAM,YAAY,eAAe,KAAK,IAAI,IAAI;AAC9C,UAAM,qBAAqB,gBAAgB,cAAc,OAAO,KAAK,0BAA0B,cAAc,SAAS,IAAI;AAC1H,UAAM,qBAAqB,KAAK,yBAAyB,cAAc,WAAW;AAClF,WAAO;AAAA,MACL;AAAA,MACA;AAAA,MACA;AAAA,MACA,qBAAqB,CAAC,GAAG,WAAW;AAAA,IACtC;AAAA,EACF;AAAA,EACQ,gCAAgC,cAA6B,WAA0B,SAA+B;AAC5H,sBAAkB,YAAY;AAC5B,WAAK;AACL,YAAM,cAAc,KAAK;AACzB,UAAI;AACJ,UAAI,cAAc,GAAG;AACnB,mBAAW,OAAO,SAAS;AAAA,MAC7B;AACA,UAAI,CAAC,UAAU;AACb,gBAAQ,KAAK,8DAA8D;AAC3E;AAAA,MACF;AACA,YAAM,SAAS,MAAM,KAAK,0BAA0B,UAAU,CAAC,QAAQ,GAAG,YAAY;AAEtF,YAAM,gBAAgB,EAAE,QAAQ,KAAK,KAAK,KAAK,KAAK,uBAAuB,KAAK;AAChF,YAAM,YAAY,OAAO,cAAsBA,WAAyB;AACtE,cAAM,OAAO,KAAK,4BAA4B,YAAY;AAC1D,cAAM,UAAU,EAAE,GAAG,eAAe,QAAQ,aAAa;AACzD,YAAI,YAAY,WAAW;AACzB,kCAAwB,MAAMA,QAAO,OAAO;AAAA,QAC9C,OAAO;AACL,gBAAM,kBAAkB,MAAMA,QAAO,OAAO;AAAA,QAC9C;AAAA,MACF;AAEA,UAAI,OAAO,WAAW,WAAW,CAAC,OAAO,QAAQ,gBAAgB,KAAK,qCAAqC;AACzG;AAAA,MACF;AACA,YAAM,QAAQ,gBAAgB,YAAY,KAAK,0BAA0B,cAAc,SAAS,IAAI;AACpG,YAAM,UAAU,OAAO,MAAM,KAAK;AAClC,YAAM,WAAW,MAAM,sBAAsB;AAC7C,YAAM,kBAAkB,KAAK,2CAA2C,QAAQ,GAAG,MAAM,aAAa;AAAA,IACxG,CAAC;AAAA,EACH;AAAA,EACA,MAAc,wBAAwB,eAA+C;AACnF,UAAM,UAAU,OAAO,QAAQ,MAAM,KAAK,WAAW,iBAAiB,CAAC;AACvE,UAAM,UAAU,QAAQ,OAAO,QAAQ,IAAI,OAAK,EAAE,OAAO,KAAK,EAAE,QAAQ,gBAAgB,EAAE,EAAE,MAAM,GAAG,EAAE,CAAC,GAAG,YAAY,CAAC;AACxH,UAAM,mBAAmB,QAAQ,OAAO,OAAK,EAAE,WAAW,KAAK,CAAC;AAChE,UAAM,QAAQ,cAAc,MAAM,GAAG;AACrC,aAAS,IAAI,MAAM,SAAS,GAAG,KAAK,GAAG,KAAK;AAC1C,YAAM,eAAe,MAAM,MAAM,CAAC,EAAE,KAAK,GAAG;AAC5C,UAAI,QAAQ,SAAS,YAAY,KAAK,iBAAiB,SAAS,QAAQ,YAAY,GAAG;AACrF,eAAO;AAAA,MACT;AAAA,IACF;AAEA,WAAO;AAAA,EACT;AAAA,EAEU,8BAAkD;AAC1D,QAAI,CAAC,cAAc,GAAG;AACpB,YAAM,IAAI,MAAM,8CAA8C;AAAA,IAChE;AAEA,QAAI,KAAK,mCAAmC,MAAM;AAChD,YAAM,kBAAkB,CAAC,QAA4B;AACnD,cAAM,SAAS,KAAK,sBAAsB,KAAK,sBAAsB,CAAC;AACtE,eAAO;AAAA,UACL,cAAc,OAAO;AAAA,UACrB,aAAa,OAAO,gBAAgB,KAAK,iBAAiB,OAAO,eAAe,IAAI,cAAc;AAAA,QACpG;AAAA,MACF;AACA,WAAK,iCAAiC,IAAI,MAAmB,gBAAgB,IAAI,CAAC;AAClF,UAAI,wBAAwB;AAE5B,kBAAY,MAAM;AAChB,YAAI,uBAAuB;AACzB,gBAAM,WAAW,KAAK,+BAAgC,IAAI;AAC1D,gBAAM,eAAe,gBAAgB,QAAQ;AAC7C,cAAI,CAAC,gBAAgB,cAAc,QAAQ,GAAG;AAC5C,iBAAK,+BAAgC,IAAI,YAAY;AAAA,UACvD;AAAA,QACF;AAAA,MACF,GAAG,GAAG;AACN,WAAK,+BAA+B,SAAS,CAAC,UAAU;AACtD,YAAI;AACF,gBAAM,eAAe,MAAM;AAC3B,gBAAM,SAAS,OAAO,SAAS,aAAa;AAC5C,gBAAM,cAAc,KAAK,2CAA2C,MAAM;AAC1E,gBAAM,EAAE,WAAW,oBAAoB,oBAAoB,oBAAoB,IAAI,KAAK;AAAA,YACtF,KAAK,sBAAsB;AAAA,YAC3B;AAAA,YACA,MAAM,eAAe;AAAA,YACrB;AAAA,UACF;AACA,kCAAwB,aAAa,oBAAoB,EAAE,QAAQ,KAAK,KAAK,KAAK,KAAK,OAAO,CAAC;AAC/F,kCAAwB,KAAK,wBAAwB,oBAAoB,EAAE,QAAQ,KAAK,KAAK,GAAG,CAAC;AACjG,8BAAoB,QAAQ,CAAC,SAAS,mBAAmB,MAAM,CAAC,CAAC,CAAC;AAClE,eAAK,gCAAgC,cAAc,WAAW,SAAS;AACvE,kCAAwB;AAAA,QAC1B,SAAS,GAAG;AACV,cAAI,CAAC,cAAc,GAAG;AAEpB,oCAAwB;AAAA,UAC1B,OAAO;AACL,kBAAM;AAAA,UACR;AAAA,QACF;AAAA,MACF,CAAC;AAAA,IACH;AAEA,WAAO,KAAK;AAAA,EACd;AAAA,EACU,uBAAuB,cAA4B,wBAA6D;AACxH,UAAM,iBAAiB,2BAA2B,SAAY,KAAK,kBAAkB;AAErF,YAAQ,gBAAgB;AAAA,MACtB,KAAK,UAAU;AACb,eAAO,KAAK,4BAA4B;AAAA,MAC1C;AAAA,MACA,KAAK,iBAAiB;AACpB,YAAI,cAAc,GAAG;AACnB,iBAAO,KAAK,4BAA4B;AAAA,QAC1C,OAAO;AACL,gBAAM,SAAS,KAAK,sBAAsB,aAAa,OAAO,CAAC;AAC/D,gBAAM,QAAQ,IAAI,MAAmB,MAAM;AAC3C,gBAAM,SAAS,CAAC,UAAU;AACxB,8BAAkB,YAAY;AAY5B,oBAAM,eAAe,MAAM;AAC3B,oBAAM,SAAS,MAAM,sBAAsB;AAC3C,oBAAM,cAAc,KAAK,2CAA2C,MAAM;AAC1E,oBAAM,EAAE,WAAW,oBAAoB,oBAAoB,oBAAoB,IAAI,KAAK;AAAA,gBACtF,aAAa,OAAO;AAAA,gBACpB;AAAA,gBACA,MAAM,eAAe;AAAA,gBACrB;AAAA,cACF;AACA,oBAAM,QAAQ,IAAI;AAAA,gBAChB,kBAAkB,aAAa,oBAAoB,EAAE,QAAQ,KAAK,KAAK,KAAK,KAAK,uBAAuB,KAAK,CAAC;AAAA,gBAC9G,kBAAkB,KAAK,wBAAwB,oBAAoB,EAAE,QAAQ,KAAK,KAAK,IAAI,uBAAuB,KAAK,CAAC;AAAA,cAC1H,CAAC;AACD,kBAAI,oBAAoB,SAAS,GAAG;AAClC,sBAAM,QAAQ;AAAA,kBACZ,oBAAoB;AAAA,oBAAI,CAAC,SACvB,aAAa,MAAM,EAAE,uBAAuB,KAAK,CAAC;AAAA,kBACpD;AAAA,gBACF;AAAA,cACF;AACA,mBAAK,gCAAgC,cAAc,WAAW,QAAQ;AAAA,YACxE,CAAC;AAAA,UACH,CAAC;AACD,iBAAO;AAAA,QACT;AAAA,MACF;AAAA,MACA,KAAK,UAAU;AACb,eAAO,KAAK;AAAA,MACd;AAAA,MACA,SAAS;AACP,YAAI,mBAAmB,MAAM;AAC3B,iBAAO,sBAAsB;AAAA,QAC/B,WAAW,OAAO,mBAAmB,YAAY,aAAa,gBAAgB;AAC5E,cAAI,KAAK,oBAAoB,IAAI,cAAc,EAAG,QAAO,KAAK,oBAAoB,IAAI,cAAc;AAGpG,gBAAM,kBAAkB,eAAe,QAAQ,IAAI,cAAc;AACjE,cAAI,iBAAiB;AACnB,gBAAIC;AACJ,gBAAI;AACF,cAAAA,UAAS,KAAK,MAAM,eAAe;AACnC,kBAAI,OAAOA,YAAW,SAAU,OAAM,IAAI,MAAM,2CAA2C;AAC3F,kBAAIA,YAAW,KAAM,OAAM,IAAI,MAAM,sCAAsC;AAAA,YAC7E,SAAS,GAAG;AACV,oBAAM,IAAI,MAAM,gCAAgC,eAAe,IAAI,EAAE,OAAO,EAAE,CAAC;AAAA,YACjF;AACA,mBAAO,KAAK,uBAAuB,cAAc;AAAA,cAC/C,aAAaA,QAAO,eAAe;AAAA,cACnC,cAAcA,QAAO,gBAAgB;AAAA,YACvC,CAAC;AAAA,UACH;AAGA,gBAAM,eAAe,eAAe,QAAQ,IAAI,QAAQ;AACxD,gBAAM,SAAgB,mBAAY,gBAAgB,EAAE;AACpD,gBAAM,MAAM,IAAI,MAAmB,KAAK,sBAAsB,MAAM,CAAC;AACrE,eAAK,oBAAoB,IAAI,gBAAgB,GAAG;AAChD,iBAAO;AAAA,QACT,WAAW,iBAAiB,kBAAkB,kBAAkB,gBAAgB;AAC9E,iBAAO,IAAI,MAAmB;AAAA,YAC5B,cAAc,eAAe;AAAA,YAC7B,aAAa,eAAe;AAAA,UAC9B,CAAC;AAAA,QACH;AAEA,cAAM,IAAI,MAAM,uBAAuB,cAAc,EAAE;AAAA,MACzD;AAAA,IACF;AAAA,EACF;AAAA,EAEU,eAAe,wBAA6D;AACpF,iBAAa;AACb,UAAM,eAAe,0BAA0B;AAC/C,UAAM,aAAa,KAAK,uBAAuB,cAAc,sBAAsB;AACnF,WAAO;AAAA,EACT;AAAA,EAWU,0BAA0B,YAAiD;AACnF,UAAM,WAAW,WAAW,IAAI;AAChC,UAAM,aAAa,gBAAgB,oBAAoB,QAAQ;AAC/D,UAAM,WAAW,aAAa,KAAK,mCAAmC,IAAI,UAAU,GAAG,IAAI,UAAU,IAAI;AACzG,QAAI,SAAU,QAAO;AAErB,UAAM,UAAU,KAAK,WAAW,cAAc;AAAA,MAC5C,cAAc,SAAS;AAAA,MACvB,aAAa,SAAS;AAAA,IACxB,CAAC;AACD,YAAQ,oBAAoB,CAAC,mBAAmB;AAC9C,iBAAW,OAAO,CAAC,SAAS;AAAA,QAC1B,GAAG;AAAA,QACH,aAAa,gBAAgB,SAAS;AAAA,MACxC,EAAE;AAAA,IACJ,CAAC;AACD,YAAQ,aAAa,MAAM;AACzB,iBAAW,OAAO,CAAC,SAAS;AAAA,QAC1B,GAAG;AAAA,QACH,aAAa;AAAA,QACb,cAAc;AAAA,MAChB,EAAE;AAAA,IACJ,CAAC;AAED,QAAI,uBAAuB,KAAK,mCAAmC,IAAI,UAAU,KAAK,oBAAI,IAAI;AAC9F,SAAK,mCAAmC,IAAI,YAAY,oBAAoB;AAC5E,yBAAqB,IAAI,YAAY,OAAO;AAC5C,WAAO;AAAA,EACT;AAAA,EAEA,MAAgB,YAAY,wBAAmE;AAC7F,UAAM,aAAa,KAAK,uBAAuB,MAAM,KAAK,oBAAoB,GAAG,sBAAsB;AACvG,UAAM,UAAU,KAAK,0BAA0B,UAAU;AACzD,WAAO;AAAA,EACT;AAAA,EAEU,YAAY,wBAA0D;AAC9E,UAAM,aAAa,KAAK,eAAe,sBAAsB;AAC7D,UAAM,YAAY,YAAY,CAAC,OAAmB;AAChD,YAAM,EAAE,YAAY,IAAI,WAAW,SAAS,MAAM;AAChD,WAAG;AAAA,MACL,CAAC;AACD,aAAO;AAAA,IACT,GAAG,CAAC,UAAU,CAAC;AACf,UAAM,cAAc,YAAY,MAAM,KAAK,0BAA0B,UAAU,GAAG,CAAC,UAAU,CAAC;AAC9F,WAAO,MAAM,qBAAqB,WAAW,aAAa,WAAW;AAAA,EACvE;AAAA,EAEA,MAAgB,2BAA2B,QAA8D;AACvG,QAAI,EAAE,iBAAiB,WAAW,EAAE,kBAAkB,SAAS;AAC7D,YAAM,IAAI,oBAAoB,kDAAkD,EAAE,OAAO,CAAC;AAAA,IAC5F;AACA,UAAM,aAAa,KAAK,uBAAuB,MAAM,KAAK,oBAAoB,CAAC;AAC/E,eAAW,IAAI,MAAM;AAAA,EACvB;AAAA,EAEU,yBAAyB,wBAAkF;AACnH,YAAQ,2BAA2B,SAAY,yBAAyB,KAAK,qBAAqB;AAAA,EACpG;AAAA,EAEU,4BAA4B,wBAA0F;AAC9H,QAAI,CAAC,KAAK,yBAAyB,sBAAsB,GAAG;AAC1D,YAAM,IAAI,MAAM,uVAAuV;AAAA,IACzW;AAAA,EACF;AAAA,EAEU,qBAAwD;AAChE,WAAO,KAAK,cAAc;AAAA,EAC5B;AAAA,EAEU,yBAAoE;AAC5E,QAAI,CAAC,KAAK,mBAAmB,GAAG;AAC9B,YAAM,IAAI,MAAM,mFAAmF;AAAA,IACrG;AAAA,EACF;AAAA,EAEU,uBAAuB,MAAqD;AACpF,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK;AAAA,MAClB,QAAQ;AAAA,QACN,eAAe,KAAK,OAAO;AAAA,QAC3B,mBAAmB,KAAK,OAAO;AAAA,QAC/B,kBAAkB,KAAK,OAAO;AAAA,QAC9B,gBAAgB,KAAK,OAAO;AAAA,QAC5B,2BAA2B,KAAK,OAAO;AAAA,QACvC,2BAA2B,KAAK,OAAO;AAAA,QACvC,kBAAkB,KAAK,OAAO;AAAA,QAC9B,kBAAkB,KAAK,OAAO;AAAA,QAC9B,gBAAgB,KAAK,OAAO,wBAAwB,IAAI,CAAC,OAAO;AAAA,UAC9D,IAAI,EAAE;AAAA,QACR,EAAE;AAAA,MACJ;AAAA,IACF;AAAA,EACF;AAAA,EAEU,0BAA0B,MAAwG;AAC1I,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,IACX;AAAA,EACF;AAAA,EAEU,wBAAwB,MAA0D;AAC1F,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa;AAAA,QACX,aAAa,KAAK;AAAA,QAClB,iBAAiB,KAAK;AAAA,MACxB;AAAA,IACF;AAAA,EACF;AAAA,EAEU,8BAA8B,SAA0B,MAA4D;AAC5H,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,gBAAgB,KAAK;AAAA,MACrB,WAAW,IAAI,KAAK,KAAK,iBAAiB;AAAA,MAC1C,QAAQ,YAAY;AAClB,cAAM,KAAK,WAAW,qBAAqB,KAAK,IAAI,KAAK,SAAS,OAAO;AACzE,cAAM,KAAK,sBAAsB,QAAQ,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,MAClE;AAAA,IACF;AAAA,EACF;AAAA,EAEU,oBACR,MACyG;AACzG,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK;AAAA,MAClB,WAAW,KAAK,oBAAoB,IAAI,KAAK,KAAK,iBAAiB,IAAI;AAAA,MACvE,mBAAmB,KAAK,6BAA6B,IAAI,KAAK,KAAK,0BAA0B,IAAI;AAAA,MACjG,WAAW,IAAI,KAAK,KAAK,iBAAiB;AAAA,MAC1C,GAAI,KAAK,SAAS,SAAS,EAAE,MAAM,QAAQ,QAAQ,KAAK,QAAQ,IAAI,EAAE,MAAM,QAAQ,QAAQ,KAAK,QAAQ;AAAA,MACzG,OAAO,OAAO,KAAK,UAAU,WAAW,KAAK,QAAQ;AAAA,QACnD,UAAU,KAAK,MAAM;AAAA,MACvB;AAAA,MACA,SAAS,WAAY;AACnB,eAAO,KAAK,WAAW,MAAM;AAAA,MAC/B;AAAA,MACA,YAAY,WAAY;AACtB,YAAI,KAAK,mBAAmB;AAC1B,iBAAO;AAAA,QACT;AACA,YAAI,KAAK,aAAa,KAAK,YAAY,oBAAI,KAAK,GAAG;AACjD,iBAAO;AAAA,QACT;AACA,eAAO;AAAA,MACT;AAAA,IACF;AAAA,EACF;AAAA,EAOU,sBAAsB,SAA0B,MAA2N;AACnR,WAAO;AAAA,MACL,GAAG,KAAK,oBAAoB,IAAI;AAAA,MAChC,MAAM,SAAS;AACb,cAAM,KAAK,OAAO,EAAE,SAAS,KAAK,CAAC;AAAA,MACrC;AAAA,MACA,QAAQ,OAAO,YAAiC;AAC9C,cAAM,KAAK,WAAW,oBAAoB,KAAK,SAAS,SAAS,EAAE,SAAS,KAAK,QAAQ,IAAI,EAAE,SAAS,KAAK,QAAQ,GAAG,KAAK,IAAI,SAAS,SAAS,QAAQ;AAC3J,YAAI,KAAK,SAAS,QAAQ;AACxB,gBAAM,KAAK,kBAAkB,QAAQ,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,QAC9D,OAAO;AACL,gBAAM,KAAK,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAAA,QAChD;AAAA,MACF;AAAA,IACF;AAAA,EACF;AAAA,EAEU,oBAAoB,MAAmC,SAAgC;AAC/F,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK;AAAA,MAClB,iBAAiB,KAAK;AAAA,MACtB,gBAAgB,KAAK;AAAA,MACrB,wBAAwB,KAAK;AAAA,MAC7B,GAAG,KAAK,gBAAgB,KAAK,IAAI,QAAQ,OAAO;AAAA,MAChD,MAAM,WAAW,SAAkD;AACjE,cAAM,IAAI,WAAW,mBAAmB;AAAA,UACtC,QAAQ,KAAK;AAAA,UACb,OAAO,QAAQ;AAAA,UACf;AAAA,UACA,aAAa,QAAQ,eAAe,qBAAqB,IAAI,KAAK,gBAAgB,aAAa;AAAA,QACjG,CAAC;AACD,cAAM,IAAI,sBAAsB,QAAQ,CAAC,SAAS,KAAK,EAAE,CAAC;AAAA,MAC5D;AAAA,MACA,MAAM,YAAY;AAChB,cAAM,SAAS,OAAO,QAAQ,MAAM,IAAI,yBAAyB,UAAU,CAAC,SAAS,KAAK,EAAE,GAAG,YAAY,CAAC;AAC5G,eAAO,OAAO,IAAI,CAACC,UAAS,IAAI,wBAAwBA,KAAI,CAAC;AAAA,MAC/D;AAAA,MACA,WAAW;AACT,cAAM,SAAS,cAAc,IAAI,0BAA0B,CAAC,SAAS,KAAK,EAAE,GAAY,iBAAiB;AACzG,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,wBAAwBA,KAAI,CAAC;AAAA,MAC/D;AAAA,MACA,MAAM,kBAAkB;AACtB,cAAM,SAAS,OAAO,QAAQ,MAAM,IAAI,sBAAsB,UAAU,CAAC,SAAS,KAAK,EAAE,GAAG,YAAY,CAAC;AACzG,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,8BAA8B,SAASA,KAAI,CAAC;AAAA,MAC9E;AAAA,MACA,iBAAiB;AACf,cAAM,SAAS,cAAc,IAAI,uBAAuB,CAAC,SAAS,KAAK,EAAE,GAAY,uBAAuB;AAC5G,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,8BAA8B,SAASA,KAAI,CAAC;AAAA,MAC9E;AAAA,MACA,MAAM,OAAO,MAAyB;AACpC,cAAM,IAAI,WAAW,WAAW,EAAE,MAAM,wBAAwB,IAAI,GAAG,QAAQ,KAAK,GAAG,GAAG,OAAO;AACjG,cAAM,IAAI,uBAAuB,QAAQ,CAAC,OAAO,CAAC;AAAA,MACpD;AAAA,MACA,MAAM,SAAS;AACb,cAAM,IAAI,WAAW,WAAW,KAAK,IAAI,OAAO;AAChD,cAAM,IAAI,uBAAuB,QAAQ,CAAC,OAAO,CAAC;AAAA,MACpD;AAAA,MAEA,aAAa;AACX,cAAM,SAAS,cAAc,IAAI,mBAAmB,CAAC,SAAS,KAAK,EAAE,GAAY,mBAAmB;AACpG,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,sBAAsB,SAASA,KAAI,CAAC;AAAA,MACtE;AAAA,MAEA,MAAM,cAAc;AAClB,cAAM,UAAU,OAAO,QAAQ,MAAM,IAAI,kBAAkB,UAAU,CAAC,SAAS,KAAK,EAAE,GAAG,YAAY,CAAC;AACtG,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,sBAAsB,SAASA,KAAI,CAAC;AAAA,MACvE;AAAA,MAEA,MAAM,aAAa,SAAwC;AACzD,cAAM,SAAS,MAAM,IAAI,WAAW;AAAA,UAClC,MAAM,4BAA4B,QAAQ,KAAK,IAAI,OAAO;AAAA,UAC1D;AAAA,UACA;AAAA,QACF;AACA,cAAM,IAAI,kBAAkB,QAAQ,CAAC,SAAS,KAAK,EAAE,CAAC;AACtD,eAAO,IAAI,sBAAsB,SAAS,MAAM;AAAA,MAClD;AAAA,IACF;AAAA,EACF;AAAA,EAEU,8BAA8B,MAA6C,SAA0C;AAC7H,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,OAAO,KAAK;AAAA,MACZ,MAAM,KAAK;AAAA,MACX,YAAY,KAAK;AAAA,MACjB,WAAW,KAAK;AAAA,MAChB,aAAa,KAAK;AAAA,MAElB,MAAM,sBAAsB,SAAoC;AAC9D,cAAM,IAAI,WAAW;AAAA,UACnB,KAAK;AAAA,UACL,SAAS,eAAe,qBAAqB,IAAI,KAAK,mBAAmB,aAAa;AAAA,UACtF;AAAA,QACF;AAAA,MACF;AAAA,MACA,MAAM,OAAO,MAAmC;AAC9C,cAAM,IAAI,WAAW,2BAA2B,KAAK,IAAI,kCAAkC,IAAI,GAAG,OAAO;AACzG,cAAM,IAAI,4BAA4B,QAAQ,CAAC,OAAO,CAAC;AAAA,MACzD;AAAA,MACA,MAAM,SAAS;AACb,cAAM,IAAI,WAAW,2BAA2B,KAAK,IAAI,OAAO;AAChE,cAAM,IAAI,4BAA4B,QAAQ,CAAC,OAAO,CAAC;AAAA,MACzD;AAAA,IACF;AAAA,EACF;AAAA,EACU,oCAAoC,MAAoD,SAAgD;AAChJ,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,MAAM,KAAK;AAAA,MACX,SAAS,KAAK;AAAA,MACd,YAAY,KAAK;AAAA,MAEjB,MAAM,WAAW,SAAkB;AACjC,cAAM,IAAI,WAAW,wBAAwB,KAAK,0BAA0B,SAAS,OAAO;AAC5F,cAAM,IAAI,6BAA6B,QAAQ,CAAC,OAAO,CAAC;AAAA,MAC1D;AAAA,IACF;AAAA,EACF;AAAA,EACU,6BAA6B,MAA2C,SAAyC;AACzH,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,MAAM,KAAK;AAAA,MACX,QAAQ,KAAK;AAAA,MACb,OAAO,KAAK;AAAA,MACZ,aAAa,KAAK;AAAA,MAClB,wBAAwB,KAAK;AAAA,MAE7B,MAAM,OAAO,MAEV;AACD,YAAI;AACF,gBAAM,IAAI,WAAW;AAAA,YACnB,KAAK;AAAA,YACL,KAAK;AAAA,YACL;AAAA,cACE,eAAe,KAAK;AAAA,cACpB,0BAA0B,KAAK;AAAA,YACjC;AAAA,YACA;AAAA,UACF;AACA,gBAAM,IAAI,gCAAgC,QAAQ,CAAC,OAAO,CAAC;AAC3D,iBAAO,OAAO,GAAG,MAAS;AAAA,QAC5B,SAAS,OAAO;AACd,cAAI,YAAY,2CAA2C,WAAW,KAAK,GAAG;AAC5E,mBAAO,OAAO,MAAM,KAAK;AAAA,UAC3B;AACA,gBAAM;AAAA,QACR;AAAA,MACF;AAAA,MAEA,MAAM,SAAS;AACb,cAAM,IAAI,WAAW,oBAAoB,KAAK,SAAS,KAAK,IAAI,OAAO;AACvE,cAAM,IAAI,gCAAgC,QAAQ,CAAC,OAAO,CAAC;AAAA,MAC7D;AAAA,IACF;AAAA,EACF;AAAA,EAEU,oBAAoB,MAAwC;AACpE,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,aAAa,KAAK;AAAA,MAClB,UAAU,KAAK;AAAA,MACf,qBAAqB,KAAK,IAAI,GAAG,KAAK,QAAQ;AAAA,IAChD;AAAA,EACF;AAAA,EAEU,8BAA8B,UAA8D;AACpG,UAAM,WAAW,SAAS,MAAM,IAAI,CAAC,UAAU;AAAA,MAC7C,IAAI,KAAK;AAAA,MACT,UAAU,KAAK;AAAA,MACf,aAAa,KAAK,QAAQ;AAAA,MAC1B,cAAc,KAAK,QAAQ;AAAA,MAC3B,cAAc,KAAK,QAAQ;AAAA,MAC3B,WAAW,KAAK,QAAQ;AAAA,MACxB,MAAM,KAAK;AAAA,MACX,cAAc,KAAK,eAAe;AAAA,QAChC,kBAAkB,KAAK,aAAa,qBAAqB,IAAI,KAAK,KAAK,aAAa,kBAAkB,IAAI;AAAA,QAC1G,mBAAmB,KAAK,aAAa;AAAA,QACrC,cAAc,KAAK,aAAa;AAAA,MAClC,IAAI;AAAA,MACJ,eAAe,KAAK,gBAAgB,IAAI,CAAC,YAAY;AAAA,QACnD,WAAW,OAAO;AAAA,QAClB,aAAa,OAAO,QAAQ;AAAA,QAC5B,QAAQ,OAAO,QAAQ;AAAA,MACzB,EAAE;AAAA,IACJ,EAAE;AACF,WAAO,OAAO,OAAO,UAAU,EAAE,YAAY,SAAS,WAAW,eAAe,KAAK,CAAC;AAAA,EACxF;AAAA,EAEU,8BAA8B,UAA8D;AACpG,UAAM,WAAW,SAAS,MAAM,IAAI,CAAC,UAAU;AAAA,MAC7C,QAAQ,KAAK;AAAA,MACb,aAAa,KAAK;AAAA,MAClB,kBAAkB,KAAK;AAAA,MACvB,WAAW,IAAI,KAAK,KAAK,iBAAiB;AAAA,IAC5C,EAAE;AACF,WAAO,OAAO,OAAO,UAAU,EAAE,YAAY,SAAS,WAAW,eAAe,KAAK,CAAC;AAAA,EACxF;AAAA,EAEU,6BAA6B,UASnB;AAClB,WAAO;AAAA,MACL,aAAa,SAAS;AAAA,MACtB,sBAAsB,SAAS;AAAA,IACjC;AAAA,EACF;AAAA,EAEU,YAAY,SAAgC;AACpD,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,kBAAkB;AAAA,MAClB,gBAAgB;AAAA,QACd,MAAM,YAAY;AAChB,gBAAM,SAAS,MAAM,QAAQ,4BAA4B,KAAQ,IAAM;AACvE,iBAAO;AAAA,YACL,aAAa,QAAQ,YAAY,SAAS;AAAA,YAC1C,cAAc,QAAQ,cAAc,SAAS;AAAA,UAC/C;AAAA,QACF;AAAA,QACA,YAAY;AACV,gBAAM,CAAC,GAAG,UAAU,IAAI,MAAM,SAAS,CAAC;AACxC,gBAAM,UAAU,MAAM;AACpB,kBAAM,EAAE,aAAa,mBAAmB,IAAI,QAAQ,2BAA2B,KAAQ,GAAM;AAC7F,kBAAM,EAAE,aAAa,sBAAsB,IAAI,QAAQ,aAAa,MAAM,WAAW,OAAK,IAAI,CAAC,CAAC;AAChG,kBAAM,EAAE,aAAa,6BAA6B,IAAI,QAAQ,oBAAoB,MAAM,WAAW,OAAK,IAAI,CAAC,CAAC;AAC9G,mBAAO,MAAM;AACX,iCAAmB;AACnB,oCAAsB;AACtB,2CAA6B;AAAA,YAC/B;AAAA,UACF,GAAG,CAAC,CAAC;AAEL,cAAI,cAAc,QAAQ,mBAAmB,IAAI,OAAO,QAAQ,8BAA8B,KAAQ,IAAM;AAC5G,cAAI,gBAAgB,MAAM;AAExB,0BAAc,IAAI,QAAQ,4BAA4B,KAAQ,IAAM,CAAC,GAAG,eAAe;AAAA,UACzF;AACA,iBAAO;AAAA,YACL,aAAa,aAAa,SAAS;AAAA,YACnC,cAAc,QAAQ,gBAAgB,GAAG,SAAS;AAAA,UACpD;AAAA,QACF;AAAA,MACF;AAAA,MACA,MAAM,iBAAyC;AAC7C,cAAM,SAAS,MAAM,KAAK,eAAe,UAAU;AACnD,eAAO,OAAO;AAAA,MAChB;AAAA,MACA,iBAAgC;AAC9B,eAAO,KAAK,eAAe,UAAU,EAAE;AAAA,MACzC;AAAA,MACA,MAAM,kBAA0C;AAC9C,cAAM,SAAS,MAAM,KAAK,eAAe,UAAU;AACnD,eAAO,OAAO;AAAA,MAChB;AAAA,MACA,kBAAiC;AAC/B,eAAO,KAAK,eAAe,UAAU,EAAE;AAAA,MACzC;AAAA,MACA,MAAM,iBAAsD;AAC1D,eAAO;AAAA,UACL,gBAAgB,KAAK,UAAU,MAAM,KAAK,YAAY,CAAC;AAAA,QACzD;AAAA,MACF;AAAA,MACA,iBAA6C;AAC3C,eAAO;AAAA,UACL,gBAAgB,KAAK,UAAU,KAAK,YAAY,CAAC;AAAA,QACnD;AAAA,MACF;AAAA,MACA,MAAM,cAAoF;AACxF,cAAM,SAAS,MAAM,KAAK,eAAe,UAAU;AACnD,eAAO;AAAA,MACT;AAAA,MACA,cAA2E;AACzE,eAAO,KAAK,eAAe,UAAU;AAAA,MACvC;AAAA,MACA,QAAQ,SAA0C;AAChD,eAAO,IAAI,SAAS,SAAS,OAAO;AAAA,MACtC;AAAA,IACF;AAAA,EACF;AAAA,EAEU,6BAA6B,MAAgD,SAAqD;AAC1I,UAAM,MAAM;AACZ,WAAO;AAAA,MACL,aAAa,KAAK;AAAA,MAClB,iBAAiB,KAAK;AAAA,MACtB,MAAM,OAAO,QAA4D;AACvE,cAAM,IAAI,WAAW,wBAAwB;AAAA,UAC3C,QAAQ,KAAK;AAAA,UACb,QAAQ,KAAK;AAAA,UACb,SAAS;AAAA,YACP,cAAc,OAAO;AAAA,YACrB,mBAAmB,OAAO;AAAA,UAC5B;AAAA,QACF,GAAG,OAAO;AACV,cAAM,IAAI,6BAA6B,QAAQ,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,MACxE;AAAA,IACF;AAAA,EACF;AAAA,EAEU,gBAAgB,MAA8F;AACtH,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK;AAAA,MAClB,cAAc,KAAK;AAAA,MACnB,sBAAsB,KAAK;AAAA,MAC3B,iBAAiB,KAAK;AAAA,MACtB,YAAY,IAAI,KAAK,KAAK,mBAAmB;AAAA,MAC7C,gBAAgB,KAAK;AAAA,MACrB,wBAAwB,KAAK;AAAA,MAC7B,aAAa,KAAK;AAAA,MAClB,kBAAkB,KAAK;AAAA,MACvB,gBAAgB,KAAK;AAAA,MACrB,gBAAgB,KAAK;AAAA,MACrB,oBAAoB,KAAK;AAAA,MACzB,uBAAuB,KAAK;AAAA,MAC5B,aAAa,KAAK;AAAA,MAClB,cAAc,KAAK;AAAA,MACnB,kBAAkB,KAAK;AAAA,MACvB,eAAkD;AAChD,eAAO;AAAA,MACT;AAAA,IACF;AAAA,EACF;AAAA,EAEU,4BAA4B,MAAsD,SAAqC;AAC/H,UAAM,MAAM;AAGZ,mBAAe,oBAAoB,IAAkB,SAAmF;AACtI,YAAM,cAAc,SAAS,QAAQ,KAAK,GAAG;AAC7C,aAAO,OAAO,QAAQ,MAAM,IAAI,iCAAiC,UAAU,CAAC,SAAS,IAAI,eAAe,IAAI,SAAS,OAAO,UAAU,GAAG,YAAY,CAAC;AAAA,IACxJ;AAIA,aAAS,oBAAoB,IAAkB,SAA0E;AACvH,YAAM,cAAc,SAAS,QAAQ,KAAK,GAAG;AAC7C,aAAO,cAAc,IAAI,kCAAkC,CAAC,SAAS,IAAI,eAAe,IAAI,SAAS,OAAO,UAAU,GAAY,4BAA4B;AAAA,IAChK;AACA,WAAO;AAAA,MACL,MAAM,oBAAoB;AACxB,cAAM,WAAW,MAAM,IAAI,WAAW,aAAa,OAAO;AAC1D,eAAO,SAAS,MAAM,IAAI,CAACA,UAAS,IAAI,uBAAuBA,KAAI,CAAC;AAAA,MACtE;AAAA,MACA,MAAM,cAAc,WAAmB;AACrC,cAAM,IAAI,WAAW,cAAc,WAAW,OAAO;AAAA,MACvD;AAAA,MACA,eAAe,aAA4B;AACzC,eAAO,KAAK,OAAO,EAAE,YAAY,CAAC;AAAA,MACpC;AAAA,MACA,kBAAkB,UAA+B;AAC/C,eAAO,KAAK,OAAO,EAAE,gBAAgB,SAAS,CAAC;AAAA,MACjD;AAAA,MACA,MAAM,gBAAgB,MAA4B;AAChD,cAAM,KAAK,OAAO,EAAE,gBAAgB,OAAO,SAAS,WAAW,OAAO,MAAM,MAAM,KAAK,CAAC;AAAA,MAC1F;AAAA,MACA;AAAA,MACA;AAAA;AAAA,MACA,MAAM,QAAQ,QAAgB;AAC5B,cAAM,QAAQ,MAAM,KAAK,UAAU;AACnC,eAAO,MAAM,KAAK,CAAC,MAAM,EAAE,OAAO,MAAM,KAAK;AAAA,MAC/C;AAAA,MACA,QAAQ,QAAgB;AACtB,cAAM,QAAQ,KAAK,SAAS;AAC5B,eAAO,QAAQ,MAAM;AACnB,iBAAO,MAAM,KAAK,CAAC,MAAM,EAAE,OAAO,MAAM,KAAK;AAAA,QAC/C,GAAG,CAAC,OAAO,MAAM,CAAC;AAAA,MACpB;AAAA,MACA,MAAM,YAAY;AAChB,cAAM,QAAQ,OAAO,QAAQ,MAAM,IAAI,uBAAuB,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AAChG,eAAO,MAAM,IAAI,CAACA,UAAS,IAAI,oBAAoBA,OAAM,OAAO,CAAC;AAAA,MACnE;AAAA,MACA,WAAW;AACT,cAAM,QAAQ,cAAc,IAAI,wBAAwB,CAAC,OAAO,GAAG,iBAAiB;AACpF,eAAO,QAAQ,MAAM,MAAM,IAAI,CAACA,UAAS,IAAI,oBAAoBA,OAAM,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC;AAAA,MAC3F;AAAA,MACA,MAAM,WAAW,MAAyB;AACxC,cAAMA,QAAO,MAAM,IAAI,WAAW,iBAAiB,wBAAwB,MAAM,IAAI,GAAG,OAAO;AAC/F,cAAM,IAAI,uBAAuB,QAAQ,CAAC,OAAO,CAAC;AAClD,cAAM,KAAK,OAAO,EAAE,gBAAgBA,MAAK,GAAG,CAAC;AAC7C,eAAO,IAAI,oBAAoBA,OAAM,OAAO;AAAA,MAC9C;AAAA,MACA,MAAM,UAAU,MAAY;AAC1B,cAAM,IAAI,WAAW,UAAU,KAAK,IAAI,OAAO;AAAA,MAEjD;AAAA,MACA,MAAM,gBAAgB,gBAAiD,SAA8D;AACnI,YAAI,kBAAkB,QAAQ,gBAAgB;AAC5C,gBAAM,QAAQ;AACd,gBAAM,YAAY,SAAS,aAAa;AACxC,gBAAM,cAAc,OAAO,QAAQ,MAAM,IAAI,6BAA6B,UAAU,CAAC,SAAS,MAAM,IAAI,SAAS,GAAG,YAAY,CAAC;AACjI,iBAAO,YAAY,IAAI,CAACA,UAAS,IAAI,0BAA0BA,KAAI,CAAC;AAAA,QACtE,OAAO;AACL,gBAAM,OAAO;AACb,gBAAM,YAAY,MAAM,aAAa;AACrC,gBAAM,cAAc,OAAO,QAAQ,MAAM,IAAI,oCAAoC,UAAU,CAAC,SAAS,SAAS,GAAG,YAAY,CAAC;AAC9H,iBAAO,YAAY,IAAI,CAACA,UAAS,IAAI,0BAA0BA,KAAI,CAAC;AAAA,QACtE;AAAA,MACF;AAAA,MACA,eAAe,gBAAiD,SAAqD;AACnH,YAAI,kBAAkB,QAAQ,gBAAgB;AAC5C,gBAAM,QAAQ;AACd,gBAAM,YAAY,SAAS,aAAa;AACxC,gBAAM,cAAc,cAAc,IAAI,8BAA8B,CAAC,SAAS,MAAM,IAAI,SAAS,GAAY,uBAAuB;AACpI,iBAAO,QAAQ,MAAM,YAAY,IAAI,CAACA,UAAS,IAAI,0BAA0BA,KAAI,CAAC,GAAG,CAAC,WAAW,CAAC;AAAA,QACpG,OAAO;AACL,gBAAM,OAAO;AACb,gBAAM,YAAY,MAAM,aAAa;AACrC,gBAAM,cAAc,cAAc,IAAI,qCAAqC,CAAC,SAAS,SAAS,GAAY,uBAAuB;AACjI,iBAAO,QAAQ,MAAM,YAAY,IAAI,CAACA,UAAS,IAAI,0BAA0BA,KAAI,CAAC,GAAG,CAAC,WAAW,CAAC;AAAA,QACpG;AAAA,MACF;AAAA,MACA,cAAc,qBAAoC,cAA8C;AAC9F,YAAI,uBAAuB,OAAO,wBAAwB,UAAU;AAClE,gBAAM,QAAQ;AACd,gBAAM,cAAc,KAAK,eAAe,KAAK;AAC7C,iBAAO,QAAQ,MAAM,YAAY,KAAK,CAAC,MAAM,EAAE,OAAO,YAAY,KAAK,MAAM,CAAC,aAAa,YAAY,CAAC;AAAA,QAC1G,OAAO;AACL,gBAAM,MAAM;AACZ,gBAAM,cAAc,KAAK,eAAe;AACxC,iBAAO,QAAQ,MAAM,YAAY,KAAK,CAAC,MAAM,EAAE,OAAO,GAAG,KAAK,MAAM,CAAC,aAAa,GAAG,CAAC;AAAA,QACxF;AAAA,MACF;AAAA,MACA,MAAM,cAAc,qBAAoC,cAAuD;AAC7G,YAAI,uBAAuB,OAAO,wBAAwB,UAAU;AAClE,gBAAM,QAAQ;AACd,gBAAM,cAAc,MAAM,KAAK,gBAAgB,KAAK;AACpD,iBAAO,YAAY,KAAK,CAAC,MAAM,EAAE,OAAO,YAAY,KAAK;AAAA,QAC3D,OAAO;AACL,gBAAM,MAAM;AACZ,gBAAM,cAAc,MAAM,KAAK,gBAAgB;AAC/C,iBAAO,YAAY,KAAK,CAAC,MAAM,EAAE,OAAO,GAAG,KAAK;AAAA,QAClD;AAAA,MACF;AAAA,MACA,MAAM,cAAc,qBAAoC,cAAyC;AAC/F,YAAI,uBAAuB,OAAO,wBAAwB,UAAU;AAClE,gBAAM,QAAQ;AACd,iBAAQ,MAAM,KAAK,cAAc,OAAO,YAAsB,MAAO;AAAA,QACvE,OAAO;AACL,gBAAM,MAAM;AACZ,iBAAQ,MAAM,KAAK,cAAc,GAAG,MAAO;AAAA,QAC7C;AAAA,MACF;AAAA,MACA,MAAM,OAAO,QAAQ;AACnB,eAAO,MAAM,IAAI,kBAAkB,QAAQ,OAAO;AAAA,MACpD;AAAA,MACA,MAAM,sBAAsB,SAAoC;AAC9D,YAAI,CAAC,KAAK,eAAe;AACvB,gBAAM,IAAI,oBAAoB,oCAAoC;AAAA,QACpE;AACA,eAAO,MAAM,IAAI,WAAW;AAAA,UAC1B,KAAK;AAAA,UACL,SAAS,eAAe,qBAAqB,IAAI,KAAK,mBAAmB,aAAa;AAAA,UACtF;AAAA,QACF;AAAA,MACF;AAAA,MACA,MAAM,eAAe,SAAuD;AAC1E,cAAM,SAAS,MAAM,IAAI,WAAW,eAAe,SAAS,OAAO;AACnE,cAAM,IAAI,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAC7C,eAAO;AAAA,MACT;AAAA,MACA,MAAM,YAAY,SAA+B;AAC/C,cAAM,SAAS,MAAM,IAAI,WAAW,YAAY,SAAS,OAAO;AAChE,cAAM,IAAI,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAC7C,eAAO;AAAA,MACT;AAAA,MACA,cAAc,KAAK,iBAAiB,KAAK,oBAAoB,KAAK,eAAe,OAAO;AAAA,MACxF,MAAM,eAAe,MAAY;AAC/B,cAAM,SAAS,OAAO,QAAQ,MAAM,IAAI,6BAA6B,UAAU,CAAC,SAAS,KAAK,EAAE,GAAG,YAAY,CAAC;AAChH,eAAO,IAAI,6BAA6B,QAAQ,OAAO;AAAA,MACzD;AAAA,MACA,eAAe,MAAY;AACzB,cAAM,SAAS,cAAc,IAAI,8BAA8B,CAAC,SAAS,KAAK,EAAE,GAAY,uBAAuB;AACnH,eAAO,IAAI,6BAA6B,QAAQ,OAAO;AAAA,MACzD;AAAA,MACA,MAAM,SAAS;AACb,cAAM,IAAI,WAAW,kBAAkB,OAAO;AAC9C,gBAAQ,YAAY;AAAA,MACtB;AAAA,MACA,MAAM,sBAAsB;AAC1B,cAAM,SAAS,OAAO,QAAQ,MAAM,IAAI,4BAA4B,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AACtG,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,8BAA8BA,OAAM,OAAO,CAAC;AAAA,MAC9E;AAAA,MACA,qBAAqB;AACnB,cAAM,SAAS,cAAc,IAAI,6BAA6B,CAAC,OAAO,GAAY,2BAA2B;AAC7G,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,8BAA8BA,OAAM,OAAO,CAAC;AAAA,MAC9E;AAAA,MACA,MAAM,qBAAqB,MAAmC;AAC5D,cAAMA,QAAO,MAAM,IAAI,WAAW,2BAA2B,kCAAkC,MAAM,IAAI,GAAG,OAAO;AACnH,cAAM,IAAI,4BAA4B,QAAQ,CAAC,OAAO,CAAC;AACvD,eAAO,IAAI,8BAA8BA,OAAM,OAAO;AAAA,MACxD;AAAA,MACA,4BAA4B;AAC1B,cAAM,UAAU,cAAc,IAAI,8BAA8B,CAAC,OAAO,GAAY,kCAAkC;AACtH,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,oCAAoCA,OAAM,OAAO,CAAC;AAAA,MACrF;AAAA,MACA,MAAM,6BAA6B;AACjC,cAAM,UAAU,OAAO,QAAQ,MAAM,IAAI,6BAA6B,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AACxG,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,oCAAoCA,OAAM,OAAO,CAAC;AAAA,MACrF;AAAA,MACA,aAAa;AACX,cAAM,SAAS,cAAc,IAAI,mBAAmB,CAAC,OAAO,GAAY,mBAAmB;AAC3F,eAAO,OAAO,IAAI,CAACA,UAAS,IAAI,sBAAsB,SAASA,KAAI,CAAC;AAAA,MACtE;AAAA,MAEA,MAAM,cAAc;AAClB,cAAM,UAAU,MAAM,IAAI,WAAW,mBAAmB,EAAE,SAAS,KAAK,GAAG,SAAS,QAAQ;AAC5F,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,sBAAsB,SAASA,KAAI,CAAC;AAAA,MACvE;AAAA,MAEA,MAAM,aAAa,SAAwC;AACzD,cAAM,SAAS,MAAM,IAAI,WAAW;AAAA,UAClC,MAAM,4BAA4B,QAAQ,MAAM,OAAO;AAAA,UACvD;AAAA,UACA;AAAA,QACF;AACA,cAAM,IAAI,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAC7C,eAAO,IAAI,sBAAsB,SAAS,MAAM;AAAA,MAClD;AAAA,MAEA,oBAAoB;AAClB,cAAM,UAAU,cAAc,IAAI,iCAAiC,CAAC,OAAO,GAAY,0BAA0B;AACjH,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,6BAA6BA,OAAM,OAAO,CAAC;AAAA,MAC9E;AAAA,MAEA,MAAM,qBAAqB;AACzB,cAAM,UAAU,OAAO,QAAQ,MAAM,IAAI,gCAAgC,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AAC3G,eAAO,QAAQ,IAAI,CAACA,UAAS,IAAI,6BAA6BA,OAAM,OAAO,CAAC;AAAA,MAC9E;AAAA,MAEA,iBAAiB,IAAY;AAC3B,cAAM,YAAY,KAAK,kBAAkB;AACzC,eAAO,QAAQ,MAAM,UAAU,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,KAAK,MAAM,CAAC,WAAW,EAAE,CAAC;AAAA,MAClF;AAAA,MAEA,MAAM,iBAAiB,IAAY;AACjC,cAAM,YAAY,MAAM,KAAK,mBAAmB;AAChD,eAAO,UAAU,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,KAAK;AAAA,MAC/C;AAAA,MAEA,MAAM,gBAAgB,SAA6I;AACjK,cAAM,YAAY,MAAM,IAAI,eAAe,IAAI;AAC/C,YAAI,CAAC,UAAU;AACb,gBAAM,IAAI,oBAAoB,4EAA4E;AAAA,QAC5G;AAEA,cAAM,mBAAmB,MAAM,IAAI,WAAW,4BAA4B,CAAC,GAAG,OAAO;AAErF,YAAI,iBAAiB,WAAW,MAAM;AACpC,iBAAO,OAAO,MAAM,IAAI,YAAY,0BAA0B,2DAA2D,CAAC;AAAA,QAC5H;AAEA,cAAM,EAAE,cAAc,KAAK,IAAI,iBAAiB;AAGhD,YAAI,aAAa,GAAG,OAAO,2CAA2C;AACpE,gBAAM,IAAI,oBAAoB,oEAAoE,aAAa,GAAG,EAAE,EAAE;AAAA,QACxH;AAEA,qBAAa,GAAG,KAAK;AAErB,YAAI;AACJ,YAAI;AACF,oBAAU,MAAM,kBAAkB,EAAE,aAAa,aAAa,CAAC;AAAA,QACjE,SAAS,OAAY;AACnB,cAAI,iBAAiB,eAAe;AAClC,mBAAO,OAAO,MAAM,IAAI,YAAY,qBAAqB,MAAM,SAAS,MAAM,IAAI,CAAC;AAAA,UACrF,OAAO;AAEL,yBAAa,+BAA+B,KAAK;AACjD,mBAAO,OAAO,MAAM,IAAI,YAAY,0BAA0B,2DAA2D,CAAC;AAAA,UAC5H;AAAA,QACF;AAGA,cAAM,qBAAqB,MAAM,IAAI,WAAW,gBAAgB,EAAE,YAAY,SAAS,KAAK,GAAG,OAAO;AAEtG,cAAM,IAAI,aAAa,OAAO;AAC9B,eAAO;AAAA,MACT;AAAA,IACF;AAAA,EACF;AAAA,EAEU,yBAAyB,SAA6C;AAC9E,UAAM,MAAM;AACZ,SAAK,uBAAuB;AAC5B,WAAO;AAAA,MACL,cAAc,YAAiF;AAC7F,eAAO,IAAI,eAAe,SAAS,UAAU;AAAA,MAC/C;AAAA,MACA,MAAM,gBAAgB,qBAA6B,WAAkC;AACnF,cAAM,IAAI,WAAW,gBAAgB,SAAS,qBAAqB,SAAS;AAC5E,cAAM,IAAI,gBAAgB;AAAA,MAC5B;AAAA,MACA,oBAAoB;AAClB,eAAO,IAAI,mBAAmB,OAAO;AAAA,MACvC;AAAA,MACA,mBAAmB;AACjB,eAAO,IAAI,kBAAkB,OAAO;AAAA,MACtC;AAAA,IACF;AAAA,EACF;AAAA,EAEU,gBAAgB,gBAAwB,MAAuB,SAAuD;AAC9H,UAAM,MAAM;AACZ,UAAM,mBAAmB,WAAW,IAAI,WAAW,cAAc,EAAE,cAAc,KAAK,CAAC;AACvF,UAAM,kBAAkB,SAAS,SAAS,EAAE,QAAQ,eAAe,IAAI,EAAE,QAAQ,eAAe;AAChG,WAAO;AAAA,MACL,MAAM,aAAa;AACjB,cAAM,WAAW,OAAO,QAAQ,MAAM,IAAI,sBAAsB,UAAU,CAAC,kBAAkB,MAAM,cAAc,GAAG,YAAY,CAAC;AACjI,eAAO,IAAI,6BAA6B,QAAQ;AAAA,MAClD;AAAA,MACA,aAAa;AACX,cAAM,WAAW,cAAc,IAAI,uBAAuB,CAAC,kBAAkB,MAAM,cAAc,GAAY,uBAAuB;AACpI,eAAO,IAAI,6BAA6B,QAAQ;AAAA,MAClD;AAAA,MACA,MAAM,iCAA4E;AAChF,cAAM,OAAO,MAAM,IAAI,WAAW,uCAAuC,MAAM,gBAAgB,gBAAgB;AAC/G,eAAO;AAAA,UACL,cAAc,KAAK;AAAA,UACnB,iBAAiB,KAAK;AAAA,QACxB;AAAA,MACF;AAAA,MACA,MAAM,uCAAuC,eAA8D;AACzG,cAAM,OAAO,MAAM,IAAI,WAAW,+CAA+C,MAAM,gBAAgB,eAAe,gBAAgB;AACtI,cAAM,IAAI,sBAAsB,QAAQ,CAAC,kBAAkB,MAAM,cAAc,CAAC;AAChF,eAAO,KAAK;AAAA,MACd;AAAA,MACA,MAAM,QAAQ,QAAgB;AAC5B,eAAO,MAAM,IAAI,QAAQ,EAAE,QAAQ,GAAG,gBAAgB,CAAC;AAAA,MACzD;AAAA,MACA,QAAQ,QAAgB;AACtB,eAAO,IAAI,QAAQ,EAAE,QAAQ,GAAG,gBAAgB,CAAC;AAAA,MACnD;AAAA,MACA,MAAM,aAAa,SAAuC;AACxD,eAAO,MAAM,IAAI,aAAa,EAAE,GAAG,SAAS,GAAG,gBAAgB,CAAC;AAAA,MAClE;AAAA,MACA,YAAY,SAAuC;AACjD,eAAO,IAAI,YAAY,EAAE,GAAG,SAAS,GAAG,gBAAgB,CAAC;AAAA,MAC3D;AAAA,MACA,MAAM,aAAa,SAAuC;AACxD,eAAO,MAAM,IAAI,aAAa,EAAE,GAAG,SAAS,GAAG,gBAAgB,CAAC;AAAA,MAClE;AAAA,MACA,YAAY,SAAuC;AACjD,eAAO,IAAI,YAAY,EAAE,GAAG,SAAS,GAAG,gBAAgB,CAAC;AAAA,MAC3D;AAAA,MACA,MAAM,kBAAkB,SAAoD;AAC1E,eAAO,MAAM,IAAI,WAAW,kBAAkB,MAAM,gBAAgB,QAAQ,WAAW,kBAAkB,QAAQ,WAAW,QAAQ;AAAA,MACtI;AAAA,MACA,MAAM,mBAAmB,SAA8F;AACrH,cAAM,IAAI,WAAW,mBAAmB;AAAA,UACtC,eAAe;AAAA,UACf,aAAa;AAAA,UACb,iBAAiB,QAAQ;AAAA,UACzB,eAAe,QAAQ;AAAA,UACvB,UAAU,QAAQ;AAAA,UAClB,UAAU,QAAQ;AAAA,QACpB,GAAG,gBAAgB;AACnB,cAAM,IAAI,sBAAsB,QAAQ,CAAC,kBAAkB,MAAM,cAAc,CAAC;AAChF,YAAI,SAAS,QAAQ;AACnB,gBAAM,IAAI,mBAAmB,gBAAgB,CAAC,CAAC,eAAe,MAAM,MAAM,kBAAkB,oBAAoB,WAAW,cAAc;AAAA,QAC3I,OAAO;AACL,gBAAM,IAAI,mBAAmB,gBAAgB,CAAC,CAAC,eAAe,MAAM,MAAM,kBAAkB,oBAAoB,WAAW,cAAc;AAAA,QAC3I;AAAA,MACF;AAAA,IACF;AAAA,EACF;AAAA,EAEA,MAAM,QAAQ,SAAgJ;AAC5J,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI,YAAY,SAAS;AACvB,aAAO,OAAO,QAAQ,MAAM,KAAK,eAAe,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,MAAM,GAAG,YAAY,CAAC;AAAA,IACpH,WAAW,YAAY,SAAS;AAC9B,aAAO,OAAO,QAAQ,MAAM,KAAK,eAAe,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,MAAM,GAAG,YAAY,CAAC;AAAA,IACpH,OAAO;AACL,aAAO,OAAO,QAAQ,MAAM,KAAK,iBAAiB,UAAU,CAAC,SAAS,QAAQ,kBAAkB,QAAQ,MAAM,GAAG,YAAY,CAAC;AAAA,IAChI;AACA,WAAO,KAAK,oBAAoB,IAAI;AAAA,EACtC;AAAA,EAEA,QAAQ,SAAuI;AAC7I,UAAM,UAAU,KAAK,YAAY;AACjC,UAAM,CAAC,OAAO,OAAO,IACnB,YAAY,UAAU,CAAC,KAAK,gBAAgB,QAAQ,MAAM,IACxD,YAAY,UAAU,CAAC,KAAK,gBAAgB,QAAQ,MAAM,IAAI,CAAC,KAAK,kBAAkB,QAAQ,gBAAgB;AAClH,UAAM,OAAO,cAAc,OAAO,CAAC,SAAS,SAAS,QAAQ,MAAM,GAAY,eAAe;AAC9F,WAAO,KAAK,oBAAoB,IAAI;AAAA,EACtC;AAAA,EAEA,MAAM,aAAa,SAAwE;AACzF,UAAM,cAAc,MAAM,KAAK,QAAQ;AACvC,UAAM,UAAU,aAAa,oBAAoB,MAAM,KAAK,YAAY;AACxE,QAAI,YAAY,SAAS;AACvB,YAAMC,YAAW,OAAO,QAAQ,MAAM,KAAK,mBAAmB,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC/J,aAAO,KAAK,8BAA8BA,SAAQ;AAAA,IACpD,WAAW,YAAY,SAAS;AAC9B,YAAMA,YAAW,OAAO,QAAQ,MAAM,KAAK,mBAAmB,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC/J,aAAO,KAAK,8BAA8BA,SAAQ;AAAA,IACpD;AACA,UAAM,WAAW,OAAO,QAAQ,MAAM,KAAK,qBAAqB,UAAU,CAAC,SAAS,QAAQ,kBAAkB,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC3K,WAAO,KAAK,8BAA8B,QAAQ;AAAA,EACpD;AAAA,EAEA,MAAM,aAAa,SAAwE;AACzF,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI,YAAY,SAAS;AACvB,YAAMA,YAAW,OAAO,QAAQ,MAAM,KAAK,mBAAmB,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC/J,aAAO,KAAK,8BAA8BA,SAAQ;AAAA,IACpD;AACA,UAAM,WAAW,OAAO,QAAQ,MAAM,KAAK,mBAAmB,UAAU,CAAC,SAAS,QAAQ,QAAQ,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAG,YAAY,CAAC;AAC/J,WAAO,KAAK,8BAA8B,QAAQ;AAAA,EACpD;AAAA,EAEA,MAAM,mBAAmB,SAAuF;AAC9G,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,UAAM,OAAO,MAAM,KAAK,QAAQ;AAChC,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,YAAY,2BAA2B;AAAA,IACnD;AACA,UAAM,eAAe,YAAY,UAAU,SAAS;AACpD,UAAM,aAAa,YAAY,UAAU,QAAQ,SAAS,KAAK;AAC/D,UAAM,KAAK,WAAW,mBAAmB;AAAA,MACvC,eAAe;AAAA,MACf,aAAa;AAAA,MACb,YAAY,QAAQ;AAAA,IACtB,GAAG,OAAO;AACV,QAAI,iBAAiB,QAAQ;AAC3B,YAAM,KAAK,mBAAmB,gBAAgB,CAAC,CAAC,eAAe,MAAM,MAAM,kBAAkB,WAAW,WAAW,UAAU;AAAA,IAC/H,OAAO;AACL,YAAM,KAAK,mBAAmB,gBAAgB,CAAC,CAAC,eAAe,MAAM,MAAM,kBAAkB,WAAW,WAAW,UAAU;AAAA,IAC/H;AAAA,EACF;AAAA,EACA,YAAY,SAA+D;AACzE,UAAM,UAAU,KAAK,YAAY;AACjC,UAAM,QAAQ,YAAY,UAAU,KAAK,qBAAqB,YAAY,UAAU,KAAK,qBAAqB,KAAK;AACnH,UAAM,aAAa;AACnB,UAAM,aAAa,YAAY,UAAU,QAAQ,SAAS,YAAY,UAAU,QAAQ,SAAS,QAAQ;AACzG,UAAM,WAAW,cAAc,OAAO,CAAC,SAAS,YAAY,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAY,UAAU;AAC/H,WAAO,KAAK,8BAA8B,QAAQ;AAAA,EACpD;AAAA,EACA,YAAY,SAA+D;AACzE,UAAM,UAAU,KAAK,YAAY;AACjC,UAAM,QAAQ,YAAY,UAAU,KAAK,qBAAqB,KAAK;AACnE,UAAM,aAAa;AACnB,UAAM,aAAa,YAAY,UAAU,QAAQ,SAAS,QAAQ;AAClE,UAAM,WAAW,cAAc,OAAO,CAAC,SAAS,YAAY,QAAQ,UAAU,MAAM,QAAQ,SAAS,IAAI,GAAY,UAAU;AAC/H,WAAO,KAAK,8BAA8B,QAAQ;AAAA,EACpD;AAAA,EAEU,qBAAqB,MAAsD,SAAyD;AAC5I,UAAM,cAAc,yBAAyB;AAAA,MAC3C,GAAG,KAAK,gBAAgB,IAAI;AAAA,MAC5B,GAAG,KAAK,YAAY,OAAO;AAAA,MAC3B,GAAG,KAAK,4BAA4B,MAAM,OAAO;AAAA,MACjD,GAAG,KAAK,mBAAmB,IAAI,KAAK,yBAAyB,OAAO,IAAI,CAAC;AAAA,MACzE,GAAG,KAAK,gBAAgB,KAAK,IAAI,QAAQ,OAAO;AAAA,IAClD,CAAuB;AACvB,WAAO;AAAA,EACT;AAAA,EACU,uBAAuB,MAAqD;AACpF,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,QAAQ,KAAK;AAAA,MACb,WAAW,IAAI,KAAK,KAAK,UAAU;AAAA,MACnC,iBAAiB,KAAK;AAAA,MACtB,YAAY,KAAK,eAAe,IAAI,KAAK,KAAK,YAAY,IAAI;AAAA,MAC9D,kBAAkB,KAAK,sBAAsB;AAAA,MAC7C,SAAS,KAAK;AAAA,IAChB;AAAA,EACF;AAAA,EAEU,kBAAkB,cAAsB,SAAuE;AACvH,QAAI,CAAC,KAAK,gBAAgB,IAAI,CAAC,SAAS,YAAY,CAAC,GAAG;AACtD,WAAK,gBAAgB,IAAI,CAAC,SAAS,YAAY,GAAG,IAAK,+BAA8B,sBAAsB,MAAQ;AAAA,QACjH,SAAS,KAAK,WAAW,QAAQ,WAAW;AAAA,QAC5C,WAAW;AAAA,QACX,YAAY;AAAA,QACZ,qBAAqB;AAAA,QACrB,qBAAqB;AAAA,MACvB,CAAC,CAAC;AAAA,IACJ;AACA,WAAO,KAAK,gBAAgB,IAAI,CAAC,SAAS,YAAY,CAAC;AAAA,EACzD;AAAA,EAEA,IAAI,YAAuB;AACzB,WAAO,KAAK,WAAW;AAAA,EACzB;AAAA,EAEA,MAAgB,WAAW,KAA+B;AACxD,WAAO,WAAW,GAAG;AAAA,EACvB;AAAA,EAEA,IAAI,OAA8B;AAChC,WAAO,QAAQ,KAAK,WAAW;AAAA,EACjC;AAAA,EAEA,MAAgB,iBAAiB;AAC/B,QAAI,KAAK,oBAAoB,QAAQ;AACnC,aAAO;AAAA,IACT;AACA,WAAO,IAAI,IAAI,OAAO,SAAS,IAAI;AAAA,EACrC;AAAA,EAEA,MAAgB,YAAY,SAAmD;AAC7E,QAAI,KAAK,oBAAoB,QAAQ;AACnC;AAAA,IACF,WAAW,OAAO,KAAK,oBAAoB,YAAY,KAAK,gBAAgB,UAAU;AACpF,WAAK,gBAAgB,SAAS,QAAQ,IAAI,SAAS,CAAC;AAAA,IACtD,OAAO;AACL,UAAI,QAAQ,SAAS;AACnB,eAAO,SAAS,QAAQ,QAAQ,GAAG;AAAA,MACrC,OAAO;AACL,eAAO,SAAS,OAAO,QAAQ,GAAG;AAAA,MACpC;AAAA,IACF;AAEA,UAAM,KAAK,GAAI;AAAA,EACjB;AAAA,EAEA,cAAoC;AAClC,QAAI,OAAO,KAAK,oBAAoB,UAAU;AAC5C,aAAO,KAAK,gBAAgB,YAAY;AAAA,IAC1C,WAAW,KAAK,oBAAoB,UAAU;AAC5C,aAAO,CAAC,OAAe,OAAO,SAAS,OAAO,EAAE;AAAA,IAClD,OAAO;AACL,aAAO,CAAC,OAAe;AAAA,MAAE;AAAA,IAC3B;AAAA,EACF;AAAA,EACA,MAAgB,mBAAmB,KAAa,SAA6B;AAC3E,QAAI,CAAC,MAAM,KAAK,WAAW,GAAG,GAAG;AAC/B,YAAM,IAAI,MAAM,gBAAgB,GAAG,sCAAsC;AAAA,IAC3E;AACA,WAAO,MAAM,KAAK,YAAY,EAAE,KAAK,GAAG,QAAQ,CAAC;AAAA,EACnD;AAAA,EAEA,MAAgB,mBAAmB,aAAgC,SAA6B;AAC9F,QAAI,MAAM,KAAK,KAAK,WAAW;AAC/B,QAAI,CAAC,KAAK;AACR,YAAM,IAAI,MAAM,2BAA2B,WAAW,EAAE;AAAA,IAC1D;AAEA,QAAI,CAAC,SAAS,gBAAgB;AAC5B,UAAI,gBAAgB,iBAAiB,gBAAgB,eAAe;AAClE,YAAI,iBAAiB,OAAO,WAAW,aAAa;AAAA,QAEpD,OAAO;AACL,gBAAM,cAAc,IAAI,gBAAgB,OAAO,SAAS,MAAM;AAC9D,gBAAM,YAAY,IAAI,sBAAsB,KAAK;AAAA,QACnD;AAAA,MACF,WAAW,gBAAgB,YAAY,gBAAgB,YAAY,gBAAgB,cAAc;AAE/F,YAAI,iBAAiB,OAAO,WAAW,aAAa;AAAA,QAEpD,OAAO;AACL,gBAAM,aAAa,IAAI,IAAI,OAAO,SAAS,IAAI;AAC/C,gBAAM,UAAU,IAAI,IAAI,KAAK,UAAU;AACvC,cAAI,WAAW,aAAa,IAAI,sBAAsB,GAAG;AACvD,oBAAQ,aAAa,IAAI,wBAAwB,WAAW,aAAa,IAAI,sBAAsB,CAAE;AAAA,UACvG,WAAW,WAAW,aAAa,QAAQ,YAAY,WAAW,SAAS,QAAQ,MAAM;AACvF,oBAAQ,aAAa,IAAI,wBAAwB,gBAAgB,UAAU,CAAC;AAAA,UAC9E;AACA,gBAAM,gBAAgB,OAAO;AAAA,QAC/B;AAAA,MACF;AAAA,IACF;AAEA,UAAM,KAAK,mBAAmB,KAAK,OAAO;AAAA,EAC5C;AAAA,EAEA,MAAM,iBAAiB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,UAAU,OAAO;AAAA,EAAG;AAAA,EAC/G,MAAM,iBAAiB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,UAAU,OAAO;AAAA,EAAG;AAAA,EAC/G,MAAM,kBAAkB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,WAAW,OAAO;AAAA,EAAG;AAAA,EACjH,MAAM,4BAA4B,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,qBAAqB,OAAO;AAAA,EAAG;AAAA,EACrI,MAAM,wBAAwB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,iBAAiB,OAAO;AAAA,EAAG;AAAA,EAC7H,MAAM,yBAAyB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,kBAAkB,OAAO;AAAA,EAAG;AAAA,EAC/H,MAAM,eAAe,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,QAAQ,OAAO;AAAA,EAAG;AAAA,EAC3G,MAAM,wBAAwB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,iBAAiB,OAAO;AAAA,EAAG;AAAA,EAC7H,MAAM,4BAA4B,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,qBAAqB,OAAO;AAAA,EAAG;AAAA,EACrI,MAAM,sBAAsB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,eAAe,OAAO;AAAA,EAAG;AAAA,EACzH,MAAM,sBAAsB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,eAAe,OAAO;AAAA,EAAG;AAAA,EACzH,MAAM,qBAAqB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,cAAc,OAAO;AAAA,EAAG;AAAA,EACvH,MAAM,uBAAuB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,gBAAgB,OAAO;AAAA,EAAG;AAAA,EAC3H,MAAM,0BAA0B,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,mBAAmB,OAAO;AAAA,EAAG;AAAA,EACjI,MAAM,gBAAgB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,SAAS,OAAO;AAAA,EAAG;AAAA,EAC7G,MAAM,yBAAyB,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,kBAAkB,OAAO;AAAA,EAAG;AAAA,EAC/H,MAAM,cAAc,SAA6B;AAAE,WAAO,MAAM,KAAK,mBAAmB,OAAO,OAAO;AAAA,EAAG;AAAA,EAEzG,MAAM,wBAAwB,OAAe,SAA6F;AACxI,WAAO,MAAM,KAAK,WAAW,wBAAwB,OAAO,SAAS,eAAe,qBAAqB,KAAK,KAAK,eAAe,aAAa,CAAC;AAAA,EAClJ;AAAA,EAEA,MAAM,mBAAmB,OAAe,SAAkH;AACxJ,WAAO,MAAM,KAAK,WAAW,mBAAmB,OAAO,SAAS,eAAe,qBAAqB,KAAK,KAAK,mBAAmB,aAAa,CAAC;AAAA,EACjJ;AAAA,EAEA,MAAM,cAAc,SAA+G;AACjI,WAAO,MAAM,KAAK,WAAW,cAAc,OAAO;AAAA,EACpD;AAAA,EAEA,MAAM,wBAAwB,MAAgF;AAC5G,WAAO,MAAM,KAAK,WAAW,wBAAwB,IAAI;AAAA,EAC3D;AAAA,EAEA,MAAM,yBAAyB,MAAgF;AAC7G,WAAO,MAAM,KAAK,WAAW,qBAAqB;AAAA,MAChD,MAAM;AAAA,MACN;AAAA,MACA,SAAS,MAAM,KAAK,YAAY;AAAA,IAClC,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,qBAAqB,MAAgF;AACzG,UAAM,SAAS,MAAM,KAAK,WAAW,qBAAqB;AAAA,MACxD,MAAM;AAAA,MACN;AAAA,MACA,SAAS,MAAM,KAAK,YAAY;AAAA,IAClC,CAAC;AAED,QAAI,OAAO,WAAW,MAAM;AAC1B,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAEA,MAAM,yBAAyB,MAAkG;AAC/H,UAAM,SAAS,MAAM,KAAK,WAAW,qBAAqB;AAAA,MACxD,MAAM;AAAA,MACN;AAAA,MACA,SAAS,MAAM,KAAK,YAAY;AAAA,IAClC,CAAC;AAED,QAAI,OAAO,WAAW,MAAM;AAC1B,aAAO,OAAO,GAAG,EAAE,iBAAiB,OAAO,KAAK,kBAAkB,CAAC;AAAA,IACrE,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,MAAgF;AAChG,UAAM,SAAS,MAAM,KAAK,WAAW,YAAY,IAAI;AACrD,UAAM,KAAK,kBAAkB,QAAQ,CAAC,MAAM,KAAK,YAAY,CAAC,CAAC;AAC/D,UAAM,KAAK,4BAA4B,QAAQ,CAAC,MAAM,KAAK,YAAY,CAAC,CAAC;AACzE,WAAO;AAAA,EACT;AAAA,EAMA,MAAM,QAAQ,SAA+F;AAE3G,QAAI,SAAS,OAAO,eAAe,QAAQ,sBAAsB,OAAO;AACtE,YAAM,IAAI,MAAM,wHAAwH;AAAA,IAC1I;AAEA,SAAK,4BAA4B,SAAS,UAAU;AACpD,UAAM,UAAU,MAAM,KAAK,YAAY,SAAS,UAAU;AAC1D,QAAI,OAAO,OAAO,QAAQ,MAAM,KAAK,kBAAkB,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AACzF,UAAM,mBAAmB,SAAS,OAAO,eAAe,SAAS,OAAO;AACxE,UAAM,oBAAoB,SAAS,sBAAsB,QAAQ;AAEjE,QAAI,SAAS,QAAS,KAAK,gBAAgB,CAAC,oBAAsB,KAAK,iBAAiB,CAAC,mBAAoB;AAC3G,cAAQ,SAAS,IAAI;AAAA,QACnB,KAAK,YAAY;AACf,cAAI,CAAC,MAAM,gBAAgB,MAAM,eAAe;AAC9C,kBAAM,KAAK,qBAAqB,EAAE,SAAS,KAAK,CAAC;AAAA,UACnD,OAAO;AACL,kBAAM,KAAK,iBAAiB,EAAE,SAAS,KAAK,CAAC;AAAA,UAC/C;AAEA;AAAA,QACF;AAAA,QACA,KAAK,SAAS;AACZ,gBAAM,IAAI,MAAM,mEAAmE;AAAA,QACrF;AAAA,QACA,KAAK,aAAa;AAChB,gBAAM,SAAS,MAAM,KAAK,mBAAmB;AAC7C,iBAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,QAAQ,IAAI,mCAAmC,mBAAmB,KAAK,CAAC,KAAK,SAAS,mDAAmD;AAAA,QACnL;AAAA,QACA,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK,eAAe;AAClB,iBAAO;AAAA,QACT;AAAA,MACF;AAAA,IACF;AAEA,WAAO,QAAQ,KAAK,qBAAqB,MAAM,OAAO;AAAA,EACxD;AAAA,EAMA,QAAQ,SAAsF;AAE5F,QAAI,SAAS,OAAO,eAAe,QAAQ,sBAAsB,OAAO;AACtE,YAAM,IAAI,MAAM,wHAAwH;AAAA,IAC1I;AAEA,SAAK,4BAA4B,SAAS,UAAU;AAEpD,UAAM,UAAU,KAAK,YAAY,SAAS,UAAU;AACpD,QAAI,OAAO,cAAc,KAAK,mBAAmB,CAAC,OAAO,GAAY,qBAAqB;AAC1F,UAAM,mBAAmB,SAAS,OAAO,eAAe,SAAS,OAAO;AACxE,UAAM,oBAAoB,SAAS,sBAAsB,QAAQ;AAEjE,QAAI,SAAS,QAAS,KAAK,gBAAgB,CAAC,oBAAsB,KAAK,iBAAiB,CAAC,mBAAoB;AAC3G,cAAQ,SAAS,IAAI;AAAA,QACnB,KAAK,YAAY;AACf,cAAI,CAAC,MAAM,gBAAgB,MAAM,eAAe;AAC9C,8BAAkB,KAAK,qBAAqB,EAAE,SAAS,KAAK,CAAC,CAAC;AAAA,UAChE,OAAO;AACL,8BAAkB,KAAK,iBAAiB,EAAE,SAAS,KAAK,CAAC,CAAC;AAAA,UAC5D;AACA,kBAAQ;AACR,gBAAM,IAAI,oBAAoB,6BAA6B;AAAA,QAC7D;AAAA,QACA,KAAK,SAAS;AACZ,gBAAM,IAAI,MAAM,mEAAmE;AAAA,QACrF;AAAA,QACA,KAAK,aAAa;AAGhB,4BAAkB,YAAY;AAC5B,kBAAM,KAAK,mBAAmB;AAC9B,gBAAI,OAAO,WAAW,aAAa;AACjC,qBAAO,SAAS,OAAO;AAAA,YACzB;AAAA,UACF,CAAC;AACD,kBAAQ;AACR,gBAAM,IAAI,oBAAoB,6BAA6B;AAAA,QAC7D;AAAA,QACA,KAAK;AAAA,QACL,KAAK;AAAA,QACL,KAAK,eAAe;AAAA,QAEpB;AAAA,MACF;AAAA,IACF;AAEA,WAAO,QAAQ,MAAM;AACnB,aAAO,QAAQ,KAAK,qBAAqB,MAAM,OAAO;AAAA,IACxD,GAAG,CAAC,MAAM,SAAS,SAAS,EAAE,CAAC;AAAA,EACjC;AAAA,EAEA,gCAAgC,SAA0B,SAA+E;AACvI,UAAM,cAAc,QAAQ,8BAA8B,GAAG,IAAI;AACjE,QAAI,CAAC,aAAa;AAChB,aAAO;AAAA,IACT;AACA,UAAM,cAAc,YAAY,QAAQ;AACxC,QAAI,eAAe,QAAQ,OAAO,aAAa;AAC7C,aAAO;AAAA,IACT;AACA,WAAO;AAAA,MACL,IAAI,YAAY,QAAQ;AAAA,MACxB,cAAc,YAAY,QAAQ;AAAA,MAClC,aAAa,YAAY,QAAQ;AAAA,MACjC,sBAAsB,YAAY,QAAQ;AAAA,MAC1C;AAAA,MACA,cAAc,YAAY,QAAQ;AAAA,MAClC,kBAAkB,YAAY,QAAQ;AAAA,IACxC;AAAA,EACF;AAAA,EAEA,MAAM,0BAA0B,KAAkD;AAChF,UAAM,OAAO,MAAM,IAAI,KAAK,gBAAgB;AAC5C,QAAI,CAAC,MAAM;AACT,aAAO;AAAA,IACT;AACA,WAAO;AAAA,MACL,IAAI,KAAK;AAAA,MACT,aAAa,KAAK,QAAQ;AAAA,MAC1B,cAAc,KAAK,SAAS;AAAA,MAC5B,sBAAsB,KAAK;AAAA,MAC3B,aAAa,KAAK;AAAA,MAClB,cAAc,KAAK;AAAA,MACnB,kBAAmB,KAAK,qBAA6E;AAAA,IACvG;AAAA,EACF;AAAA,EAIA,MAAM,eAAe,SAA4G;AAC/H,YAAQ,QAAQ,MAAM;AAAA,MACpB,KAAK,SAAS;AACZ,aAAK,4BAA4B,QAAQ,cAAc,KAAK,eAAe;AAC3E,cAAM,UAAU,MAAM,KAAK,YAAY,QAAQ,UAAU;AACzD,eAAO,KAAK,gCAAgC,SAAS,OAAO;AAAA,MAC9D;AAAA,MACA,KAAK,UAAU;AACb,eAAO,MAAM,KAAK,0BAA0B,QAAQ,GAAG;AAAA,MACzD;AAAA,MACA,SAAS;AAEP,cAAM,IAAI,MAAM,0BAA0B,QAAQ,IAAI,EAAE;AAAA,MAC1D;AAAA,IACF;AAAA,EACF;AAAA,EAGA,eAAe,SAAmG;AAChH,YAAQ,QAAQ,MAAM;AAAA,MACpB,KAAK,SAAS;AACZ,aAAK,4BAA4B,QAAQ,cAAc,KAAK,eAAe;AAC3E,cAAM,UAAU,KAAK,YAAY,QAAQ,UAAU;AACnD,eAAO,KAAK,gCAAgC,SAAS,OAAO;AAAA,MAC9D;AAAA,MACA,KAAK,UAAU;AACb,cAAM,SAAS,cAAc,KAAK,yBAAyB,CAAC,QAAQ,GAAG,GAAY,4BAA4B;AAC/G,eAAO;AAAA,MACT;AAAA,MACA,SAAS;AAEP,cAAM,IAAI,MAAM,0BAA0B,QAAQ,IAAI,EAAE;AAAA,MAC1D;AAAA,IACF;AAAA,EACF;AAAA,EACA,oBAAoB,SAA2G;AAC7H,WAAO,OAAO,SAAyC;AACrD,YAAM,UAAU,MAAM,KAAK,YAAY,QAAQ,cAAc,KAAK,eAAe;AACjF,UAAI,CAAC,KAAK,mBAAmB;AAC3B,cAAMC,UAAS,MAAM,QAAQ,4BAA4B,KAAQ,IAAM;AACvE,eAAOA,SAAQ,YAAY,SAAS;AAAA,MACtC;AACA,YAAM,SAAS,MAAM,QAAQ,eAAe;AAC5C,aAAO,QAAQ,YAAY,SAAS;AAAA,IACtC;AAAA,EACF;AAAA,EAEA,MAAM,wBAAwB,SAA0D;AACtF,UAAM,UAAU,MAAM,KAAK,YAAY,QAAQ,UAAU;AACzD,UAAM,SAAS,MAAM,QAAQ,4BAA4B,KAAQ,IAAM;AACvE,WAAO,QAAQ,YAAY,SAAS;AAAA,EACtC;AAAA,EAEA,MAAgB,kBAAkB,QAA2B,SAA0B;AACrF,UAAM,MAAM,MAAM,KAAK,WAAW,iBAAiB,wBAAwB,MAAM,GAAG,OAAO;AAC3F,UAAM,KAAK,aAAa,OAAO;AAC/B,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,gBAAgB,UAAwB,SAAiC;AAC7E,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,IAAI,MAAM,uEAAuE;AAAA,IACzF;AAEA,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,UAAM;AAAA,MACJ,KAAK;AAAA,MACL;AAAA,QACE;AAAA,QACA,aAAa,SAAS,YAAY,KAAK,KAAK;AAAA,QAC5C,kBAAkB,KAAK,KAAK;AAAA,QAC5B,eAAe,KAAK,qBAAqB,QAAQ,GAAG,KAAK,GAAG;AAAA,MAC9D;AAAA,MACA;AAAA,IACF;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAgB,iBAAiB,OAAyD,SAA0C;AAElI,QAAI,OAAO,WAAW,aAAa;AACjC,aAAO,eAAe,QAAQ,0BAA2B,MAAM,SAAiB,gBAAgB,SAAS,sBAAsB,CAAC;AAAA,IAClI;AAGA,UAAM,KAAK,cAAc;AAEzB,UAAM,IAAI,oBAAoB,8CAA8C;AAAA,EAC9E;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAgB,uBAA6B,UAAgI;AAC3K,QAAI;AACF,aAAO,MAAM,SAAS;AAAA,IACxB,SAAS,GAAG;AACV,UAAI,YAAY,kCAAkC,WAAW,CAAC,GAAG;AAC/D,eAAO,OAAO,GAAG,MAAM,KAAK,iBAAiB,GAAG,MAAM,KAAK,YAAY,CAAC,CAAC;AAAA,MAC3E;AACA,YAAM;AAAA,IACR;AAAA,EACF;AAAA,EAEA,MAAM,qBAAqB,SAI2E;AACpG,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,eAAO,MAAM,KAAK,WAAW,qBAAqB,QAAQ,OAAO,QAAQ,UAAU,OAAO;AAAA,MAC5F,CAAC;AAAA,IACH,SAAS,GAAG;AACV,UAAI,YAAY,gBAAgB,WAAW,CAAC,GAAG;AAC7C,eAAO,OAAO,MAAM,CAAC;AAAA,MACvB;AACA,YAAM;AAAA,IACR;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,UAAI,CAAC,QAAQ,YAAY;AACvB,cAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,MACpD;AACA,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAEA,MAAM,qBAAqB,SAM2F;AACpH,QAAI,QAAQ,0BAA0B,QAAQ,yBAAyB;AACrE,YAAM,IAAI,oBAAoB,4EAA4E;AAAA,IAC5G;AACA,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,UAAM,+BAA+B,QAAQ,yBAAyB,SAAY,QAAQ,2BAA2B,qBAAqB,KAAK,KAAK,mBAAmB,yBAAyB;AAEhM,QAAI,SAAS,MAAM,KAAK,WAAW;AAAA,MACjC,QAAQ;AAAA,MACR,QAAQ;AAAA,MACR;AAAA,MACA;AAAA,IACF;AAIA,QAAI,OAAO,WAAW,WACpB,OAAO,iBAAiB,YAAY,6BACpC,CAAC,QAAQ,0BACT,iCAAiC,QAAW;AAC5C,cAAQ,MAAM,8LAA8L,EAAE,KAAK,6BAA6B,CAAC;AAEjP,eAAS,MAAM,KAAK,WAAW;AAAA,QAC7B,QAAQ;AAAA,QACR,QAAQ;AAAA,QACR;AAAA;AAAA,QACA;AAAA,MACF;AAAA,IACF;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,UAAI,CAAC,QAAQ,YAAY;AACvB,cAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,MACpD;AACA,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAEA,MAAM,qBAAqB;AACzB,SAAK,4BAA4B;AAEjC,QAAI,CAAC,KAAK,4BAA4B;AACpC,WAAK,8BAA8B,YAAY;AAC7C,aAAK,4BAA4B;AACjC,cAAM,UAAU,MAAM,KAAK,YAAY;AACvC,cAAM,SAAS,MAAM,KAAK,WAAW,kBAAkB,OAAO;AAC9D,YAAI,OAAO,WAAW,MAAM;AAC1B,gBAAM,KAAK,2BAA2B,OAAO,IAAI;AAAA,QACnD,OAAO;AACL,gBAAM,IAAI,oBAAoB,kDAAkD;AAAA,QAClF;AACA,aAAK,6BAA6B;AAClC,eAAO,OAAO;AAAA,MAChB,GAAG;AAAA,IACL;AAEA,WAAO,MAAM,KAAK;AAAA,EACpB;AAAA,EAEA,MAAM,oBAAoB,MAAc,SAAuI;AAC7K,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,eAAO,MAAM,KAAK,WAAW,oBAAoB,MAAM,OAAO;AAAA,MAChE,CAAC;AAAA,IACH,SAAS,GAAG;AACV,UAAI,YAAY,gBAAgB,WAAW,CAAC,GAAG;AAC7C,eAAO,OAAO,MAAM,CAAC;AAAA,MACvB;AACA,YAAM;AAAA,IACR;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,UAAI,CAAE,SAAS,YAAa;AAC1B,YAAI,OAAO,KAAK,SAAS;AACvB,gBAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,QACpD,OAAO;AACL,gBAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,QACpD;AAAA,MACF;AACA,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAqBA,MAAM,eAAe,SAM2G;AAE9H,UAAM,WAAW,MAAM,KAAK,WAAW;AAAA,MACrC;AAAA,MACA;AAAA,QACE,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,QAClB;AAAA,QACA,MAAM,KAAK,UAAU;AAAA,UACnB,mBAAmB,QAAQ;AAAA,QAC7B,CAAC;AAAA,MACH;AAAA,MACA;AAAA,IACF;AAEA,QAAI,CAAC,SAAS,IAAI;AAChB,aAAO,OAAO,MAAM,IAAI,YAAY,aAAa,gCAAgC,SAAS,MAAM,IAAI,MAAM,SAAS,KAAK,CAAC,EAAE,CAAC;AAAA,IAC9H;AAEA,UAAM,aAAa,MAAM,SAAS,KAAK;AACvC,UAAM,cAAc,WAAW;AAC/B,UAAM,YAAY,WAAW;AAG7B,UAAM,MAAM,GAAG,QAAQ,MAAM,wCAAwC,mBAAmB,SAAS,CAAC;AAClG,QAAI,QAAQ,YAAY;AACtB,cAAQ,WAAW,GAAG;AAAA,IACxB,OAAO;AACL,cAAQ,IAAI;AAAA,EAAoD,GAAG,EAAE;AAAA,IACvE;AAIA,QAAI,WAAW;AACf,WAAO,YAAY,QAAQ,eAAe,WAAW;AACnD;AACA,YAAM,eAAe,MAAM,KAAK,WAAW,kBAAkB,kBAAkB;AAAA,QAC7E,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,QAClB;AAAA,QACA,MAAM,KAAK,UAAU;AAAA,UACnB,cAAc;AAAA,QAChB,CAAC;AAAA,MACH,GAAG,IAAI;AAEP,UAAI,CAAC,aAAa,IAAI;AACpB,eAAO,OAAO,MAAM,IAAI,YAAY,aAAa,gCAAgC,aAAa,MAAM,IAAI,MAAM,aAAa,KAAK,CAAC,EAAE,CAAC;AAAA,MACtI;AACA,YAAM,aAAa,MAAM,aAAa,KAAK;AAE3C,UAAI,aAAa,WAAW,OAAO,WAAW,WAAW,WAAW;AAClE,eAAO,OAAO,GAAG,WAAW,aAAa;AAAA,MAC3C;AACA,UAAI,WAAW,WAAW,WAAW;AACnC,cAAM,KAAK,QAAQ,kBAAkB,GAAI;AACzC;AAAA,MACF;AACA,UAAI,WAAW,WAAW,WAAW;AACnC,eAAO,OAAO,MAAM,IAAI,YAAY,oBAAoB,uDAAuD,CAAC;AAAA,MAClH;AACA,UAAI,WAAW,WAAW,QAAQ;AAChC,eAAO,OAAO,MAAM,IAAI,YAAY,iBAAiB,kDAAkD,CAAC;AAAA,MAC1G;AACA,aAAO,OAAO,MAAM,IAAI,YAAY,aAAa,4CAA4C,WAAW,MAAM,EAAE,CAAC;AAAA,IACnH;AAEA,WAAO,OAAO,MAAM,IAAI,YAAY,aAAa,2CAA2C,CAAC;AAAA,EAC/F;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,MAAM,cAAc,MAAc,MAAc,SAAuI;AACrL,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,eAAO,MAAM,KAAK,WAAW,cAAc,MAAM,MAAM,OAAO;AAAA,MAChE,CAAC;AAAA,IACH,SAAS,GAAG;AACV,UAAI,aAAa,YAAY,iBAAiB;AAC5C,eAAO,OAAO,MAAM,CAAC;AAAA,MACvB;AACA,YAAM;AAAA,IACR;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,UAAI,CAAE,SAAS,YAAa;AAC1B,YAAI,OAAO,KAAK,SAAS;AACvB,gBAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,QACpD,OAAO;AACL,gBAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAAA,QACpD;AAAA,MACF;AACA,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B;AACA,WAAO,OAAO,MAAM,OAAO,KAAK;AAAA,EAClC;AAAA,EAEA,MAAM,oBAAmK;AACvK,SAAK,4BAA4B;AACjC,UAAM,UAAU,MAAM,KAAK,YAAY;AACvC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,cAAM,mBAAmB,MAAM,KAAK,WAAW,8BAA8B,CAAC,GAAG,OAAO;AACxF,YAAI,iBAAiB,WAAW,MAAM;AACpC,iBAAO,OAAO,MAAM,IAAI,YAAY,4BAA4B,6DAA6D,CAAC;AAAA,QAChI;AAEA,cAAM,EAAE,cAAc,KAAK,IAAI,iBAAiB;AAGhD,YAAI,aAAa,SAAS,2CAA2C;AACnE,gBAAM,IAAI,oBAAoB,oEAAoE,aAAa,IAAI,EAAE;AAAA,QACvH;AACA,qBAAa,OAAO,OAAO,SAAS;AAEpC,cAAM,0BAA0B,MAAM,oBAAoB,EAAE,aAAa,aAAa,CAAC;AACvF,eAAO,MAAM,KAAK,WAAW,kBAAkB,EAAE,yBAAyB,KAAK,GAAG,OAAO;AAAA,MAC3F,CAAC;AAAA,IACH,SAAS,OAAO;AACd,UAAI,iBAAiB,eAAe;AAClC,eAAO,OAAO,MAAM,IAAI,YAAY,qBAAqB,MAAM,SAAS,MAAM,IAAI,CAAC;AAAA,MACrF,OAAO;AAEL,eAAO,OAAO,MAAM,IAAI,YAAY,4BAA4B,gCAAgC,CAAC;AAAA,MACnG;AAAA,IACF;AAEA,QAAI,OAAO,WAAW,MAAM;AAC1B,YAAM,KAAK,2BAA2B,OAAO,IAAI;AACjD,YAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAClD,aAAO,OAAO,GAAG,MAAS;AAAA,IAC5B,OAAO;AACL,aAAO,OAAO,MAAM,OAAO,KAAK;AAAA,IAClC;AAAA,EACF;AAAA,EAGA,MAAM,oBAAoB;AACxB,QAAI,OAAO,WAAW,aAAa;AACjC,YAAM,IAAI,MAAM,yEAAyE;AAAA,IAC3F;AACA,SAAK,4BAA4B;AACjC,QAAI;AACJ,QAAI;AACF,eAAS,MAAM,KAAK,uBAAuB,YAAY;AACrD,eAAO,MAAM,kBAAkB,KAAK,YAAY,KAAK,KAAK,aAAa;AAAA,MACzE,CAAC;AAAA,IACH,SAAS,GAAG;AACV,UAAI,YAAY,gBAAgB,WAAW,CAAC,GAAG;AAC7C,cAAM,iDAAiD;AACvD,eAAO;AAAA,MACT,OAAO;AACL,cAAM;AAAA,MACR;AAAA,IACF;AACA,QAAI,OAAO,WAAW,QAAQ,OAAO,MAAM;AACzC,YAAM,KAAK,2BAA2B,OAAO,IAAI;AAGjD,UAAI,8BAA8B,OAAO,QAAQ,OAAO,KAAK,0BAA0B;AACrF,cAAM,KAAK,YAAY,EAAE,KAAK,OAAO,KAAK,0BAA0B,SAAS,KAAK,CAAC;AACnF,eAAO;AAAA,MACT,WAAW,OAAO,KAAK,SAAS;AAC9B,cAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAClD,eAAO;AAAA,MACT,OAAO;AACL,cAAM,KAAK,sBAAsB,EAAE,SAAS,KAAK,CAAC;AAClD,eAAO;AAAA,MACT;AAAA,IACF;AACA,WAAO;AAAA,EACT;AAAA,EAEA,MAAgB,SAAS,SAA0B,SAAyD;AAC1G,UAAM,UAAU,cAAc,YAAY;AACxC,YAAM,KAAK,WAAW,QAAQ,OAAO;AACrC,UAAI,SAAS,aAAa;AACxB,cAAM,KAAK,YAAY,EAAE,KAAK,QAAQ,aAAa,SAAS,KAAK,CAAC;AAAA,MACpE,OAAO;AACL,cAAM,KAAK,uBAAuB;AAAA,MACpC;AAAA,IACF,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,QAAQ,SAAsF;AAClG,UAAM,OAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACvF,QAAI,MAAM;AACR,YAAM,KAAK,QAAQ,EAAE,aAAa,SAAS,YAAY,CAAC;AAAA,IAC1D;AAAA,EACF;AAAA,EAEA,MAAM,eAAe,SAAmE;AACtF,UAAM,OAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACvF,QAAI,MAAM;AACR,aAAO,MAAM,KAAK,eAAe;AAAA,IACnC;AACA,WAAO;AAAA,EACT;AAAA,EAEA,eAAe,SAA0D;AACvE,UAAM,OAAO,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACjF,QAAI,MAAM;AACR,aAAO,KAAK,eAAe;AAAA,IAC7B;AACA,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,gBAAgB,SAAmE;AACvF,UAAM,OAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACvF,QAAI,MAAM;AACR,aAAO,MAAM,KAAK,gBAAgB;AAAA,IACpC;AACA,WAAO;AAAA,EACT;AAAA,EAEA,gBAAgB,SAA0D;AACxE,UAAM,OAAO,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACjF,QAAI,MAAM;AACR,aAAO,KAAK,gBAAgB;AAAA,IAC9B;AACA,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,eAAe,SAAgF;AACnG,WAAO;AAAA,MACL,gBAAgB,KAAK,UAAU,MAAM,KAAK,YAAY,OAAO,CAAC;AAAA,IAChE;AAAA,EACF;AAAA,EAEA,eAAe,SAAuE;AACpF,WAAO;AAAA,MACL,gBAAgB,KAAK,UAAU,KAAK,YAAY,OAAO,CAAC;AAAA,IAC1D;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,SAAiH;AACjI,UAAM,OAAO,MAAM,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACvF,QAAI,MAAM;AACR,aAAO,MAAM,KAAK,YAAY;AAAA,IAChC;AACA,WAAO,EAAE,aAAa,MAAM,cAAc,KAAK;AAAA,EACjD;AAAA,EAEA,YAAY,SAAwG;AAClH,UAAM,OAAO,KAAK,QAAQ,EAAE,YAAY,SAAS,cAAc,OAAiB,CAAC;AACjF,QAAI,MAAM;AACR,aAAO,KAAK,YAAY;AAAA,IAC1B;AACA,WAAO,EAAE,aAAa,MAAM,cAAc,KAAK;AAAA,EACjD;AAAA,EAEA,MAAM,aAA+B;AACnC,UAAM,OAAO,OAAO,QAAQ,MAAM,KAAK,qBAAqB,UAAU,CAAC,GAAG,YAAY,CAAC;AACvF,WAAO,KAAK,uBAAuB,IAAI;AAAA,EACzC;AAAA,EAEA,aAAsB;AACpB,UAAM,OAAO,cAAc,KAAK,sBAAsB,CAAC,GAAG,wBAAwB;AAClF,WAAO,QAAQ,MAAM,KAAK,uBAAuB,IAAI,GAAG,CAAC,IAAI,CAAC;AAAA,EAChE;AAAA,EAEA,MAAgB,mBAAmB,SAAwD;AACzF,SAAK,uBAAuB;AAC5B,UAAM,OAAO,OAAO,QAAQ,MAAM,KAAK,oBAAoB,UAAU,CAAC,OAAO,GAAG,YAAY,CAAC;AAC7F,WAAO,KAAK,IAAI,CAAC,MAAM,KAAK,kBAAkB,EAAE,IAAI,OAAO,EAAE;AAAA,MAC3D;AAAA,MACA,MAAM,KAAK,sBAAsB,OAAO;AAAA,IAC1C,CAAC;AAAA,EACH;AAAA,EAEU,kBAAkB,SAA+C;AACzE,SAAK,uBAAuB;AAC5B,UAAM,WAAW,cAAc,KAAK,qBAAqB,CAAC,OAAO,GAAG,8BAA8B;AAClG,WAAO,QAAQ,MAAM,SAAS,IAAI,CAAC,MAAM,KAAK,kBAAkB,EAAE,IAAI,OAAO,EAAE;AAAA,MAC7E;AAAA,MACA,MAAM,KAAK,sBAAsB,OAAO;AAAA,IAC1C,CAAC,GAAG,CAAC,QAAQ,CAAC;AAAA,EAChB;AAAA,EACA,MAAgB,eAAe,SAA0B,YAA6G;AACpK,SAAK,uBAAuB;AAC5B,UAAM,OAAO,MAAM,KAAK,WAAW,cAAc,gCAAgC,UAAU,GAAG,OAAO;AACrG,UAAM,MAAM,KAAK,kBAAkB,KAAK,IAAI,OAAO,EAAE;AAAA,MACnD;AAAA,MACA,MAAM,KAAK,sBAAsB,OAAO;AAAA,IAC1C;AACA,UAAM,KAAK,sBAAsB,OAAO;AACxC,WAAO;AAAA,EACT;AAAA,EAEA,MAAgB,aAAa,SAA0B;AAErD,UAAM,KAAK,gBAAgB,OAAO;AAAA,EACpC;AAAA,EAEA,MAAgB,gBAAgB,SAA0B;AACxD,UAAM,KAAK,kBAAkB,QAAQ,CAAC,OAAO,CAAC;AAE9C,YAAQ,0BAA0B;AAAA,EACpC;AAAA,EAEA,MAAgB,gBAAgB;AAAA,EAEhC;AAAA,EAEA,MAAgB,kBAAkB;AAChC,UAAM,KAAK,qBAAqB,QAAQ,CAAC,CAAC;AAAA,EAC5C;AAAA,EAEA,MAAgB,sBAAsB,SAA0B;AAC9D,UAAM,KAAK,oBAAoB,QAAQ,CAAC,OAAO,CAAC;AAAA,EAClD;AAAA,EAEA,YAAY,uBAAuB,IAAI;AACrC,WAAO;AAAA,MACL,gBAAgB,CACd,SAC6C;AAC7C,cAAM,sBAAsB,KAAK,UAAU,KAAK,MAAM;AAAA;AAAA,QAAqB,CAAC,CAAC;AAC7E,cAAM,WAAW,cAAc,IAAI,KAAK,gBAAgB;AACxD,YAAI,UAAU;AACZ,gBAAM,CAAC,qBAAqB,SAAS,IAAI;AACzC,cAAI,wBAAwB,UAAa,wBAAwB,qBAAqB;AACpF,kBAAM,IAAI,oBAAoB,qHAAqH,EAAE,aAAa,MAAM,gBAAgB,oBAAoB,CAAC;AAAA,UAC/M;AACA,iBAAO;AAAA,QACT;AAEA,eAAO,IAAI,+BAAwD;AAAA,UACjE,GAAG,KAAK,MAAM,CAAC,kBAAkB,CAAC;AAAA,QACpC,GAAG;AAAA,UACD,kBAAkB,KAAK;AAAA,UACvB,aAAa;AAAA,QACf,CAAC;AAAA,MACH;AAAA,IACF;AAAA,EACF;AAAA,EAEA,KAAK,uBAAuB,IAAI;AAC9B,WAAO;AAAA,MACL,cAAc,MAAoD;AAChE,YAAI,EAAE,0BAA0B,KAAK,WAAW,UAAU;AAExD,gBAAM,IAAI,oBAAoB,+EAA+E;AAAA,QAC/G;AAEA,YAAI,OAAO,KAAK,oBAAoB,UAAU;AAC5C,gBAAM,IAAI,oBAAoB,gFAAgF;AAAA,QAChH;AAEA,eAAO;AAAA,UACL,SAAS,KAAK,SAAS;AAAA,UACvB,WAAW,KAAK;AAAA,UAChB,sBAAsB,KAAK,WAAW,QAAQ;AAAA,UAC9C,YAAY,KAAK;AAAA,UACjB,MAAM,KAAK;AAAA,UACX,qBAAqB,KAAK;AAAA,UAC1B,kBAAkB,KAAK,qBAAqB;AAAA,UAC5C,gBAAgB,KAAK;AAAA,UACrB,qBAAqB,KAAK,SAAS;AAAA,QACrC;AAAA,MACF;AAAA,MACA,gBAAgB,CAAC,oBAAuE;AACtF,0BAAkB,YAAY;AAC5B,gBAAM,KAAK,kBAAkB,yBAAyB,CAAC,MAAM,KAAK,YAAY,CAAC,GAAG,OAAO,YAAY,eAAe,CAAC;AAAA,QACvH,CAAC;AAAA,MACH;AAAA,MACA,uBAAuB,MAAM,KAAK;AAAA,MAClC,aAAa,OACX,MACA,gBACA,cAA6C,aAC1C;AACH,eAAO,MAAM,KAAK,WAAW,kBAAkB,MAAM,gBAAgB,MAAM,KAAK,YAAY,GAAG,WAAW;AAAA,MAC5G;AAAA,IACF;AAAA,EACF;AACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAtmFa,+BAQK,wBAA+G,EAAE,OAAO,OAAU;AAR7I,IAAM,gCAAN;","names":["value","parsed","crud","response","tokens"]}
|