@super-protocol/sdk-js 4.0.14 → 4.0.16

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,230 +0,0 @@
1
- import assert from 'assert';
2
- import forge from 'node-forge';
3
- import { X509CertificateGenerator, BasicConstraintsExtension, ExtendedKeyUsageExtension, Extension, SubjectAlternativeNameExtension, ExtendedKeyUsage, KeyUsageFlags, KeyUsagesExtension, Pkcs10CertificateRequestGenerator, Pkcs10CertificateRequest, X509Certificate, AuthorityInfoAccessExtension, AuthorityKeyIdentifierExtension, SubjectKeyIdentifierExtension, } from '@peculiar/x509';
4
- import { cryptoProvider } from './setup-crypto.js';
5
- import { CryptoKeysTransformer } from '../utils/CryptoKeysTransformer.js';
6
- import { isIpAddress } from '../utils/helper.js';
7
- import { CertificatesHelper } from './helper.js';
8
- const ONE_HOUR_MS = 60 * 60 * 1000; // 1 hour in milliseconds
9
- const notAllowedCertificateCustomExtensions = [...Object.values(forge.pki.oids)];
10
- export class CertificateGenerator {
11
- /**
12
- * Generates certificate based on the provided parameters.
13
- * @param params - Parameters for generating the certificate.
14
- * @returns The generated certificate in PEM format.
15
- */
16
- static async generateCert(params) {
17
- const ca = Boolean(params.ca);
18
- const { publicKey: subjectPublicKey, privateKey: signerPrivateKey } = await CertificateGenerator.getCryptoKeys(params);
19
- const signingAlgorithm = subjectPublicKey.algorithm;
20
- const extensions = [new BasicConstraintsExtension(ca, undefined, true)];
21
- const extendedKeyUsageItems = [];
22
- if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
23
- const generalNames = params.dnsNames.map((dnsName) => ({
24
- type: (isIpAddress(dnsName) ? 'ip' : 'dns'),
25
- value: dnsName,
26
- }));
27
- extensions.push(new SubjectAlternativeNameExtension(generalNames));
28
- extendedKeyUsageItems.push(...[ExtendedKeyUsage.serverAuth, ExtendedKeyUsage.clientAuth]);
29
- }
30
- if (params.ocspSigning) {
31
- extendedKeyUsageItems.push(ExtendedKeyUsage.ocspSigning);
32
- }
33
- if (params.ocspExtension) {
34
- const { ocspUrl, issuerCertUrl } = params.ocspExtension;
35
- extensions.push(new AuthorityInfoAccessExtension({
36
- ocsp: [ocspUrl],
37
- ...(issuerCertUrl ? { caIssuers: [issuerCertUrl] } : {}),
38
- }));
39
- }
40
- if (extendedKeyUsageItems.length) {
41
- extensions.push(new ExtendedKeyUsageExtension(extendedKeyUsageItems, false));
42
- }
43
- let keyUsageFlags = KeyUsageFlags.digitalSignature | KeyUsageFlags.keyEncipherment;
44
- if (params.ca) {
45
- keyUsageFlags |= KeyUsageFlags.keyCertSign;
46
- }
47
- extensions.push(new KeyUsagesExtension(keyUsageFlags, true));
48
- const signerPublicKey = await CryptoKeysTransformer.cryptoPublicFromCryptoPrivate(signerPrivateKey);
49
- extensions.push(...[
50
- await AuthorityKeyIdentifierExtension.create(signerPublicKey),
51
- await SubjectKeyIdentifierExtension.create(subjectPublicKey),
52
- ]);
53
- if (params.customExtensions?.length) {
54
- const filteredExtensions = params.customExtensions.filter((ext) => !notAllowedCertificateCustomExtensions.includes(ext.oid));
55
- for (const customExtension of filteredExtensions) {
56
- if (!customExtension.oid || !customExtension.value) {
57
- throw new Error('Custom extension OID and value are required');
58
- }
59
- extensions.push(new Extension(customExtension.oid, false, customExtension.value));
60
- }
61
- }
62
- const createCertificateParams = {
63
- serialNumber: CertificatesHelper.generateSerialNumber().toString(16),
64
- issuer: CertificatesHelper.serializePrincipalInfo(params.issuer),
65
- subject: CertificatesHelper.serializePrincipalInfo(params.subject),
66
- notBefore: new Date(Date.now() - ONE_HOUR_MS), //1 hour ago to avoid clock skew issues between servers
67
- notAfter: params.notAfter,
68
- publicKey: subjectPublicKey,
69
- signingKey: signerPrivateKey,
70
- signingAlgorithm,
71
- extensions,
72
- };
73
- const cert = await X509CertificateGenerator.create(createCertificateParams);
74
- return cert.toString('pem');
75
- }
76
- /**
77
- * Generates a pair of cryptographic keys based on the specified signature algorithm.
78
- * @param signatureAlgorithm - The algorithm to use for key generation.
79
- * @returns A promise that resolves to a CryptoKeyPair containing the public and private keys.
80
- */
81
- static generateKeys(signatureAlgorithm) {
82
- const algorithm = CertificateGenerator.getAlgorithm(signatureAlgorithm);
83
- return cryptoProvider.subtle.generateKey(algorithm, true, ['sign', 'verify']);
84
- }
85
- /**
86
- * Generates a Certificate Signing Request (CSR) based on the provided parameters.
87
- * @param params - Parameters for generating the CSR.
88
- * @returns The generated CSR in PEM format.
89
- */
90
- static async generateCsr(params) {
91
- const keys = await CertificateGenerator.getCryptoKeys(params);
92
- const signingAlgorithm = keys.publicKey.algorithm;
93
- signingAlgorithm.hash = { name: 'SHA-256' };
94
- const extensions = [];
95
- if (signingAlgorithm.namedCurve !== 'K-256' && params.dnsNames?.length) {
96
- const generalNames = params.dnsNames.map((dnsName) => ({
97
- type: (isIpAddress(dnsName) ? 'ip' : 'dns'),
98
- value: dnsName,
99
- }));
100
- extensions.push(new SubjectAlternativeNameExtension(generalNames));
101
- }
102
- if (params.customExtensions?.length) {
103
- for (const customExtension of params.customExtensions) {
104
- if (!customExtension.oid || !customExtension.value) {
105
- throw new Error(`Some custom extension missed OID or value`);
106
- }
107
- extensions.push(new Extension(customExtension.oid, false, customExtension.value));
108
- }
109
- }
110
- const createCsrParams = {
111
- name: CertificatesHelper.serializePrincipalInfo(params.subject),
112
- keys,
113
- signingAlgorithm,
114
- extensions,
115
- };
116
- const csr = await Pkcs10CertificateRequestGenerator.create(createCsrParams);
117
- return csr.toString('pem');
118
- }
119
- /**
120
- * Verifies self-signed certificate
121
- * @param rawCert - the certificate
122
- * @returns An object containing the verification result.
123
- */
124
- verifySelfSignedCert(rawCert) {
125
- const cert = new X509Certificate(rawCert);
126
- if (cert.issuer !== cert.subject) {
127
- return Promise.resolve({ isValid: false });
128
- }
129
- return cert.verify().then((isValid) => ({ isValid }));
130
- }
131
- /**
132
- * Parses a certificate
133
- * @param rawCert - the certificate
134
- * @returns An object containing the parsed certificate details.
135
- */
136
- static async parseCert(rawCert) {
137
- const cert = new X509Certificate(rawCert);
138
- const publicKey = await cryptoProvider.subtle.importKey('spki', cert.publicKey.rawData, Object.assign(cert.signatureAlgorithm, cert.publicKey.algorithm), true, ['verify']);
139
- const authorityKeyIdentifierExt = cert.extensions.find((ext) => ext instanceof AuthorityKeyIdentifierExtension);
140
- const authorityKeyIdentifier = authorityKeyIdentifierExt?.keyId;
141
- const subjectKeyIdentifierExt = cert.extensions.find((ext) => ext instanceof SubjectKeyIdentifierExtension);
142
- const subjectKeyIdentifier = subjectKeyIdentifierExt?.keyId;
143
- return {
144
- serialNumberHex: cert.serialNumber,
145
- publicKey,
146
- subject: cert.subject,
147
- issuer: cert.issuer,
148
- notBefore: cert.notBefore,
149
- notAfter: cert.notAfter,
150
- dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(cert.extensions),
151
- authorityKeyIdentifier,
152
- subjectKeyIdentifier,
153
- extensions: cert.extensions
154
- .filter((ext) => ext.type !== forge.pki.oids['subjectAltName'])
155
- .map((ext) => ({
156
- oid: ext.type,
157
- value: Buffer.from(ext.value),
158
- })),
159
- };
160
- }
161
- /**
162
- * Checks and parses a Certificate Signing Request (CSR) in PEM format.
163
- * @param csrPem - The CSR in PEM format.
164
- * @returns An object containing the parsed CSR details.
165
- */
166
- static async checkAndParseCsr(csrPem) {
167
- const csr = new Pkcs10CertificateRequest(csrPem);
168
- const isValid = await csr.verify();
169
- if (!isValid) {
170
- throw new Error('CSR signature verification failed');
171
- }
172
- const publicKey = await cryptoProvider.subtle.importKey('spki', csr.publicKey.rawData, Object.assign(csr.signatureAlgorithm, csr.publicKey.algorithm), true, ['verify']);
173
- const parsedCsr = {
174
- subject: csr.subject,
175
- publicKey,
176
- dnsNames: CertificateGenerator.extractDnsNamesFromExtensions(csr.extensions),
177
- extensions: csr.extensions
178
- .filter((ext) => ext.type !== forge.pki.oids['subjectAltName'])
179
- .map((ext) => ({
180
- oid: ext.type,
181
- value: Buffer.from(ext.value),
182
- })),
183
- };
184
- return parsedCsr;
185
- }
186
- static async getCryptoKeys({ privateKey, publicKey }) {
187
- const [pubKey, privKey] = await Promise.all([
188
- typeof publicKey === 'string'
189
- ? CryptoKeysTransformer.spkiPemToCryptoKey(publicKey)
190
- : publicKey,
191
- typeof privateKey === 'string'
192
- ? CryptoKeysTransformer.pkcs8PemToCryptoKey(privateKey)
193
- : privateKey,
194
- ]);
195
- assert.deepEqual(pubKey.algorithm, privKey.algorithm, 'Both keys must have same algorithm defined');
196
- return { publicKey: pubKey, privateKey: privKey };
197
- }
198
- static getAlgorithm(signatureAlgorithm) {
199
- switch (signatureAlgorithm) {
200
- case 'RSASSA-PKCS1-SHA256':
201
- return {
202
- name: 'RSASSA-PKCS1-v1_5',
203
- hash: 'SHA-256',
204
- publicExponent: new Uint8Array([1, 0, 1]), // 65537
205
- modulusLength: 2048,
206
- };
207
- case 'ECDSA-P-256-SHA256':
208
- return {
209
- name: 'ECDSA',
210
- namedCurve: 'P-256',
211
- };
212
- case 'ECDSA-secp256k1-SHA256':
213
- return {
214
- name: 'ECDSA',
215
- namedCurve: 'K-256',
216
- };
217
- default:
218
- throw new Error(`Unsupported signature algorithm: ${signatureAlgorithm}`);
219
- }
220
- }
221
- static extractDnsNamesFromExtensions(extensions) {
222
- const subjectAltNameExt = extensions.find((ext) => ext.type === forge.pki.oids['subjectAltName']);
223
- if (!subjectAltNameExt) {
224
- return;
225
- }
226
- const dnsNames = subjectAltNameExt.names.items.map((item) => item.value);
227
- return dnsNames;
228
- }
229
- }
230
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"generator.js","sourceRoot":"","sources":["../../../src/certificates/generator.ts"],"names":[],"mappings":"AAAA,OAAO,MAAM,MAAM,QAAQ,CAAC;AAC5B,OAAO,KAAK,MAAM,YAAY,CAAC;AAC/B,OAAO,EAEL,wBAAwB,EACxB,yBAAyB,EACzB,yBAAyB,EACzB,SAAS,EACT,+BAA+B,EAG/B,gBAAgB,EAChB,aAAa,EACb,kBAAkB,EAClB,iCAAiC,EAEjC,wBAAwB,EACxB,eAAe,EACf,4BAA4B,EAC5B,+BAA+B,EAC/B,6BAA6B,GAE9B,MAAM,gBAAgB,CAAC;AAUxB,OAAO,EAAE,cAAc,EAAE,MAAM,mBAAmB,CAAC;AACnD,OAAO,EAAE,qBAAqB,EAAE,MAAM,mCAAmC,CAAC;AAC1E,OAAO,EAAE,WAAW,EAAE,MAAM,oBAAoB,CAAC;AACjD,OAAO,EAAE,kBAAkB,EAAE,MAAM,aAAa,CAAC;AAEjD,MAAM,WAAW,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,yBAAyB;AAE7D,MAAM,qCAAqC,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;AAEjF,MAAM,OAAO,oBAAoB;IAC/B;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,MAA0B;QAClD,MAAM,EAAE,GAAG,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QAE9B,MAAM,EAAE,SAAS,EAAE,gBAAgB,EAAE,UAAU,EAAE,gBAAgB,EAAE,GACjE,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACnD,MAAM,gBAAgB,GAAG,gBAAgB,CAAC,SAAyB,CAAC;QAEpE,MAAM,UAAU,GAAgB,CAAC,IAAI,yBAAyB,CAAC,EAAE,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC,CAAC;QAErF,MAAM,qBAAqB,GAAuB,EAAE,CAAC;QAErD,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;YAEnE,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC,gBAAgB,CAAC,UAAU,EAAE,gBAAgB,CAAC,UAAU,CAAC,CAAC,CAAC;QAC5F,CAAC;QAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YACvB,qBAAqB,CAAC,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;YACzB,MAAM,EAAE,OAAO,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC,aAAa,CAAC;YACxD,UAAU,CAAC,IAAI,CACb,IAAI,4BAA4B,CAAC;gBAC/B,IAAI,EAAE,CAAC,OAAO,CAAC;gBACf,GAAG,CAAC,aAAa,CAAC,CAAC,CAAC,EAAE,SAAS,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;aACzD,CAAC,CACH,CAAC;QACJ,CAAC;QAED,IAAI,qBAAqB,CAAC,MAAM,EAAE,CAAC;YACjC,UAAU,CAAC,IAAI,CAAC,IAAI,yBAAyB,CAAC,qBAAqB,EAAE,KAAK,CAAC,CAAC,CAAC;QAC/E,CAAC;QAED,IAAI,aAAa,GAAG,aAAa,CAAC,gBAAgB,GAAG,aAAa,CAAC,eAAe,CAAC;QACnF,IAAI,MAAM,CAAC,EAAE,EAAE,CAAC;YACd,aAAa,IAAI,aAAa,CAAC,WAAW,CAAC;QAC7C,CAAC;QACD,UAAU,CAAC,IAAI,CAAC,IAAI,kBAAkB,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC,CAAC;QAE7D,MAAM,eAAe,GACnB,MAAM,qBAAqB,CAAC,6BAA6B,CAAC,gBAAgB,CAAC,CAAC;QAC9E,UAAU,CAAC,IAAI,CACb,GAAG;YACD,MAAM,+BAA+B,CAAC,MAAM,CAAC,eAAe,CAAC;YAC7D,MAAM,6BAA6B,CAAC,MAAM,CAAC,gBAAgB,CAAC;SAC7D,CACF,CAAC;QAEF,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,MAAM,kBAAkB,GAAG,MAAM,CAAC,gBAAgB,CAAC,MAAM,CACvD,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC,qCAAqC,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,CAAC,CAClE,CAAC;YACF,KAAK,MAAM,eAAe,IAAI,kBAAkB,EAAE,CAAC;gBACjD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;gBACjE,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,SAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,uBAAuB,GAAgC;YAC3D,YAAY,EAAE,kBAAkB,CAAC,oBAAoB,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC;YACpE,MAAM,EAAE,kBAAkB,CAAC,sBAAsB,CAAC,MAAM,CAAC,MAAM,CAAC;YAChE,OAAO,EAAE,kBAAkB,CAAC,sBAAsB,CAAC,MAAM,CAAC,OAAO,CAAC;YAClE,SAAS,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,WAAW,CAAC,EAAE,uDAAuD;YACtG,QAAQ,EAAE,MAAM,CAAC,QAAQ;YACzB,SAAS,EAAE,gBAAgB;YAC3B,UAAU,EAAE,gBAAgB;YAC5B,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,IAAI,GAAG,MAAM,wBAAwB,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;QAE5E,OAAO,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC9B,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,YAAY,CAAC,kBAAsC;QACxD,MAAM,SAAS,GAAG,oBAAoB,CAAC,YAAY,CAAC,kBAAkB,CAAC,CAAC;QACxE,OAAO,cAAc,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,EAAE,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;IAChF,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,MAAyB;QAChD,MAAM,IAAI,GAAG,MAAM,oBAAoB,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QAC9D,MAAM,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,SAAyB,CAAC;QAClE,gBAAgB,CAAC,IAAI,GAAG,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;QAE5C,MAAM,UAAU,GAAgB,EAAE,CAAC;QAEnC,IAAI,gBAAgB,CAAC,UAAU,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,EAAE,MAAM,EAAE,CAAC;YACvE,MAAM,YAAY,GAAqB,MAAM,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC;gBACvE,IAAI,EAAE,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,KAAK,CAAoB;gBAC9D,KAAK,EAAE,OAAO;aACf,CAAC,CAAC,CAAC;YACJ,UAAU,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,YAAY,CAAC,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,MAAM,CAAC,gBAAgB,EAAE,MAAM,EAAE,CAAC;YACpC,KAAK,MAAM,eAAe,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;gBACtD,IAAI,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE,CAAC;oBACnD,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;gBAC/D,CAAC;gBACD,UAAU,CAAC,IAAI,CAAC,IAAI,SAAS,CAAC,eAAe,CAAC,GAAG,EAAE,KAAK,EAAE,eAAe,CAAC,KAAK,CAAC,CAAC,CAAC;YACpF,CAAC;QACH,CAAC;QAED,MAAM,eAAe,GAAyC;YAC5D,IAAI,EAAE,kBAAkB,CAAC,sBAAsB,CAAC,MAAM,CAAC,OAAO,CAAC;YAC/D,IAAI;YACJ,gBAAgB;YAChB,UAAU;SACX,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,iCAAiC,CAAC,MAAM,CAAC,eAAe,CAAC,CAAC;QAE5E,OAAO,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;IAC7B,CAAC;IAED;;;;OAIG;IACH,oBAAoB,CAAC,OAAuB;QAC1C,MAAM,IAAI,GAAG,IAAI,eAAe,CAAC,OAAO,CAAC,CAAC;QAE1C,IAAI,IAAI,CAAC,MAAM,KAAK,IAAI,CAAC,OAAO,EAAE,CAAC;YACjC,OAAO,OAAO,CAAC,OAAO,CAAC,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,CAAC;QAC7C,CAAC;QAED,OAAO,IAAI,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;IACxD,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CAAC,OAAuB;QAC5C,MAAM,IAAI,GAAG,IAAI,eAAe,CAAC,OAAO,CAAC,CAAC;QAE1C,MAAM,SAAS,GAAG,MAAM,cAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,IAAI,CAAC,SAAS,CAAC,OAAO,EACtB,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAChE,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,MAAM,yBAAyB,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CACpD,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,YAAY,+BAA+B,CACT,CAAC;QACjD,MAAM,sBAAsB,GAAG,yBAAyB,EAAE,KAAK,CAAC;QAEhE,MAAM,uBAAuB,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAClD,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,YAAY,6BAA6B,CACT,CAAC;QAC/C,MAAM,oBAAoB,GAAG,uBAAuB,EAAE,KAAK,CAAC;QAE5D,OAAO;YACL,eAAe,EAAE,IAAI,CAAC,YAAY;YAClC,SAAS;YACT,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,MAAM,EAAE,IAAI,CAAC,MAAM;YACnB,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,IAAI,CAAC,UAAU,CAAC;YAC7E,sBAAsB;YACtB,oBAAoB;YACpB,UAAU,EAAE,IAAI,CAAC,UAAU;iBACxB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,MAAc;QAC1C,MAAM,GAAG,GAAG,IAAI,wBAAwB,CAAC,MAAM,CAAC,CAAC;QAEjD,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,MAAM,EAAE,CAAC;QACnC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,SAAS,GAAG,MAAM,cAAc,CAAC,MAAM,CAAC,SAAS,CACrD,MAAM,EACN,GAAG,CAAC,SAAS,CAAC,OAAO,EACrB,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,kBAAkB,EAAE,GAAG,CAAC,SAAS,CAAC,SAAS,CAAC,EAC9D,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QAEF,MAAM,SAAS,GAAc;YAC3B,OAAO,EAAE,GAAG,CAAC,OAAO;YACpB,SAAS;YACT,QAAQ,EAAE,oBAAoB,CAAC,6BAA6B,CAAC,GAAG,CAAC,UAAU,CAAC;YAC5E,UAAU,EAAE,GAAG,CAAC,UAAU;iBACvB,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;iBAC9D,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;gBACb,GAAG,EAAE,GAAG,CAAC,IAAI;gBACb,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;aAC9B,CAAC,CAAC;SACN,CAAC;QAEF,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,aAAa,CAAC,EAAE,UAAU,EAAE,SAAS,EAAmB;QAI3E,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YAC1C,OAAO,SAAS,KAAK,QAAQ;gBAC3B,CAAC,CAAC,qBAAqB,CAAC,kBAAkB,CAAC,SAAS,CAAC;gBACrD,CAAC,CAAC,SAAS;YACb,OAAO,UAAU,KAAK,QAAQ;gBAC5B,CAAC,CAAC,qBAAqB,CAAC,mBAAmB,CAAC,UAAU,CAAC;gBACvD,CAAC,CAAC,UAAU;SACf,CAAC,CAAC;QAEH,MAAM,CAAC,SAAS,CACd,MAAM,CAAC,SAAS,EAChB,OAAO,CAAC,SAAS,EACjB,4CAA4C,CAC7C,CAAC;QAEF,OAAO,EAAE,SAAS,EAAE,MAAM,EAAE,UAAU,EAAE,OAAO,EAAE,CAAC;IACpD,CAAC;IAEO,MAAM,CAAC,YAAY,CAAC,kBAA0B;QACpD,QAAQ,kBAAkB,EAAE,CAAC;YAC3B,KAAK,qBAAqB;gBACxB,OAAO;oBACL,IAAI,EAAE,mBAAmB;oBACzB,IAAI,EAAE,SAAS;oBACf,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,EAAE,QAAQ;oBACnD,aAAa,EAAE,IAAI;iBACpB,CAAC;YACJ,KAAK,oBAAoB;gBACvB,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ,KAAK,wBAAwB;gBAC3B,OAAO;oBACL,IAAI,EAAE,OAAO;oBACb,UAAU,EAAE,OAAO;iBACpB,CAAC;YACJ;gBACE,MAAM,IAAI,KAAK,CAAC,oCAAoC,kBAAkB,EAAE,CAAC,CAAC;QAC9E,CAAC;IACH,CAAC;IAEO,MAAM,CAAC,6BAA6B,CAAC,UAAuB;QAClE,MAAM,iBAAiB,GAAG,UAAU,CAAC,IAAI,CACvC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CACR,CAAC;QACjD,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACvB,OAAO;QACT,CAAC;QAED,MAAM,QAAQ,GAAG,iBAAiB,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACzE,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF"}