@tetrascience-npm/tetrascience-react-ui 0.4.0-beta.9.1 → 0.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (61) hide show
  1. package/README.md +58 -4
  2. package/dist/athena.d.ts +167 -0
  3. package/dist/databricks.d.ts +129 -0
  4. package/dist/exceptions-DN25pCDi.cjs +2 -0
  5. package/dist/exceptions-DN25pCDi.cjs.map +1 -0
  6. package/dist/exceptions-jCQ6h5C8.js +33 -0
  7. package/dist/exceptions-jCQ6h5C8.js.map +1 -0
  8. package/dist/index.cjs +2021 -0
  9. package/dist/index.cjs.map +1 -0
  10. package/dist/index.css +1 -1
  11. package/dist/index.d.ts +2165 -2020
  12. package/dist/index.js +9461 -2
  13. package/dist/index.js.map +1 -0
  14. package/dist/logo.png +0 -0
  15. package/dist/providers/athena.cjs +2 -0
  16. package/dist/providers/athena.cjs.map +1 -0
  17. package/dist/providers/athena.d.ts +7 -77
  18. package/dist/providers/athena.js +160 -0
  19. package/dist/providers/athena.js.map +1 -0
  20. package/dist/providers/databricks.cjs +2 -0
  21. package/dist/providers/databricks.cjs.map +1 -0
  22. package/dist/providers/databricks.d.ts +7 -41
  23. package/dist/providers/databricks.js +85 -0
  24. package/dist/providers/databricks.js.map +1 -0
  25. package/dist/providers/snowflake.cjs +2 -0
  26. package/dist/providers/snowflake.cjs.map +1 -0
  27. package/dist/providers/snowflake.d.ts +7 -38
  28. package/dist/providers/snowflake.js +122 -0
  29. package/dist/providers/snowflake.js.map +1 -0
  30. package/dist/server.cjs +2 -0
  31. package/dist/server.cjs.map +1 -0
  32. package/dist/server.d.ts +537 -522
  33. package/dist/server.js +266 -0
  34. package/dist/server.js.map +1 -0
  35. package/dist/{providers/types-Ck4uFaGp.d.ts → snowflake.d.ts} +125 -82
  36. package/dist/vite.svg +1 -0
  37. package/package.json +32 -52
  38. package/dist/cjs/index.js +0 -2001
  39. package/dist/cjs/index.js.map +0 -1
  40. package/dist/cjs/providers/athena.js +0 -2
  41. package/dist/cjs/providers/athena.js.map +0 -1
  42. package/dist/cjs/providers/databricks.js +0 -2
  43. package/dist/cjs/providers/databricks.js.map +0 -1
  44. package/dist/cjs/providers/exceptions-CYktpdqW.js +0 -2
  45. package/dist/cjs/providers/exceptions-CYktpdqW.js.map +0 -1
  46. package/dist/cjs/providers/snowflake.js +0 -2
  47. package/dist/cjs/providers/snowflake.js.map +0 -1
  48. package/dist/cjs/server.js +0 -2
  49. package/dist/cjs/server.js.map +0 -1
  50. package/dist/esm/index.js +0 -2001
  51. package/dist/esm/index.js.map +0 -1
  52. package/dist/esm/providers/athena.js +0 -2
  53. package/dist/esm/providers/athena.js.map +0 -1
  54. package/dist/esm/providers/databricks.js +0 -2
  55. package/dist/esm/providers/databricks.js.map +0 -1
  56. package/dist/esm/providers/exceptions-C3uFWZB2.js +0 -2
  57. package/dist/esm/providers/exceptions-C3uFWZB2.js.map +0 -1
  58. package/dist/esm/providers/snowflake.js +0 -2
  59. package/dist/esm/providers/snowflake.js.map +0 -1
  60. package/dist/esm/server.js +0 -2
  61. package/dist/esm/server.js.map +0 -1
@@ -0,0 +1,122 @@
1
+ import { Q as u, I as d, P as w } from "../exceptions-jCQ6h5C8.js";
2
+ import { M as y, a as P } from "../exceptions-jCQ6h5C8.js";
3
+ async function f() {
4
+ try {
5
+ const e = await import("snowflake-sdk");
6
+ return e.default || e;
7
+ } catch {
8
+ throw new d(
9
+ "The 'snowflake-sdk' package is required to use the Snowflake provider. Please install it: npm install snowflake-sdk"
10
+ );
11
+ }
12
+ }
13
+ class m {
14
+ connection;
15
+ /**
16
+ * Initialize the Snowflake data provider
17
+ *
18
+ * @param connection - Snowflake connection
19
+ */
20
+ constructor(o) {
21
+ this.connection = o;
22
+ }
23
+ /**
24
+ * Query the Snowflake database
25
+ *
26
+ * @param sqlText - SQL query to execute
27
+ * @param params - Parameters to pass to the query. For positional binds, use an array.
28
+ * For named binds, use an object with keys matching the bind variable names.
29
+ * @returns Promise resolving to array of row objects
30
+ */
31
+ async query(o, n = {}) {
32
+ const s = (Array.isArray(n), n);
33
+ return new Promise((t, a) => {
34
+ this.connection.execute({
35
+ sqlText: o,
36
+ binds: s,
37
+ complete: (i, c, r) => {
38
+ if (i) {
39
+ a(
40
+ new u(
41
+ `Snowflake provider failed to query the database. Reason: ${i.message}`
42
+ )
43
+ );
44
+ return;
45
+ }
46
+ t(r ?? []);
47
+ }
48
+ });
49
+ });
50
+ }
51
+ /**
52
+ * Close the Snowflake connection
53
+ */
54
+ async close() {
55
+ return new Promise((o, n) => {
56
+ this.connection.destroy((s) => {
57
+ if (s) {
58
+ n(s);
59
+ return;
60
+ }
61
+ o();
62
+ });
63
+ });
64
+ }
65
+ }
66
+ async function k(e) {
67
+ const o = await f(), n = [
68
+ "user",
69
+ "password",
70
+ "account",
71
+ "warehouse",
72
+ "database",
73
+ "schema",
74
+ "role"
75
+ ];
76
+ for (const t of n)
77
+ if (!e.fields[t])
78
+ throw new d(
79
+ `Missing field '${t}' in the provider '${e.name}' to connect to Snowflake using password based authentication.`
80
+ );
81
+ const s = {
82
+ account: e.fields.account,
83
+ username: e.fields.user,
84
+ password: e.fields.password,
85
+ warehouse: e.fields.warehouse,
86
+ database: e.fields.database,
87
+ schema: e.fields.schema,
88
+ role: e.fields.role
89
+ };
90
+ return new Promise((t, a) => {
91
+ o.createConnection(s).connect(
92
+ (c, r) => {
93
+ if (c) {
94
+ a(
95
+ new w(
96
+ `Unable to connect to Snowflake. Reason: ${c.message}`
97
+ )
98
+ );
99
+ return;
100
+ }
101
+ r.execute({
102
+ sqlText: "ALTER SESSION SET TIMEZONE = 'UTC'",
103
+ complete: (l) => {
104
+ l && console.warn(
105
+ `Warning: Failed to set timezone to UTC: ${l.message}`
106
+ ), t(new m(r));
107
+ }
108
+ });
109
+ }
110
+ );
111
+ });
112
+ }
113
+ export {
114
+ d as InvalidProviderConfigurationError,
115
+ y as MissingTableError,
116
+ w as ProviderConnectionError,
117
+ P as ProviderError,
118
+ u as QueryError,
119
+ m as SnowflakeProvider,
120
+ k as buildSnowflakeProvider
121
+ };
122
+ //# sourceMappingURL=snowflake.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"snowflake.js","sources":["../../src/server/providers/SnowflakeProvider.ts"],"sourcesContent":["/**\n * Snowflake Data Provider\n *\n * TypeScript equivalent of SnowflakeProvider from\n * ts-lib-ui-kit-streamlit/tetrascience/data_app_providers/provider.py\n *\n * @remarks\n * This provider requires the `snowflake-sdk` package to be installed.\n * It is an optional peer dependency - install it only if you need Snowflake support:\n * ```bash\n * npm install snowflake-sdk\n * # or\n * yarn add snowflake-sdk\n * ```\n */\n\nimport {\n QueryError,\n ProviderConnectionError,\n InvalidProviderConfigurationError,\n} from \"./exceptions\";\n\nimport type { ProviderConfiguration } from \"./types\";\n\n// Type imports for snowflake-sdk (these don't require the package at runtime)\ntype SnowflakeSDK = typeof import(\"snowflake-sdk\");\ntype SnowflakeConnection = import(\"snowflake-sdk\").Connection;\ntype SnowflakeBinds = import(\"snowflake-sdk\").Binds;\ntype SnowflakeError = import(\"snowflake-sdk\").SnowflakeError;\ntype SnowflakeConnectionOptions = import(\"snowflake-sdk\").ConnectionOptions;\ntype SnowflakeRowStatement = import(\"snowflake-sdk\").RowStatement;\ntype SnowflakeFileAndStageBindStatement =\n import(\"snowflake-sdk\").FileAndStageBindStatement;\n\n/**\n * Dynamically import snowflake-sdk\n * @throws {InvalidProviderConfigurationError} If snowflake-sdk is not installed\n */\nasync function getSnowflakeSDK(): Promise<SnowflakeSDK> {\n try {\n const snowflake = await import(\"snowflake-sdk\");\n return snowflake.default || snowflake;\n } catch {\n throw new InvalidProviderConfigurationError(\n \"The 'snowflake-sdk' package is required to use the Snowflake provider. \" +\n \"Please install it: npm install snowflake-sdk\",\n );\n }\n}\n\n/**\n * Snowflake data provider\n */\nexport class SnowflakeProvider {\n private connection: SnowflakeConnection;\n\n /**\n * Initialize the Snowflake data provider\n *\n * @param connection - Snowflake connection\n */\n constructor(connection: SnowflakeConnection) {\n this.connection = connection;\n }\n\n /**\n * Query the Snowflake database\n *\n * @param sqlText - SQL query to execute\n * @param params - Parameters to pass to the query. For positional binds, use an array.\n * For named binds, use an object with keys matching the bind variable names.\n * @returns Promise resolving to array of row objects\n */\n async query(\n sqlText: string,\n params: Record<string, unknown> | unknown[] = {},\n ): Promise<Array<Record<string, unknown>>> {\n // Snowflake SDK supports both positional binds (array) and named binds (object)\n // Pass params directly to preserve named bind semantics\n const binds = Array.isArray(params)\n ? (params as unknown as SnowflakeBinds)\n : (params as unknown as SnowflakeBinds);\n\n return new Promise((resolve, reject) => {\n this.connection.execute({\n sqlText,\n binds,\n complete: (\n err: SnowflakeError | undefined,\n _stmt: SnowflakeRowStatement | SnowflakeFileAndStageBindStatement,\n rows?: Array<Record<string, unknown>>,\n ) => {\n if (err) {\n reject(\n new QueryError(\n `Snowflake provider failed to query the database. Reason: ${err.message}`,\n ),\n );\n return;\n }\n resolve(rows ?? []);\n },\n });\n });\n }\n\n /**\n * Close the Snowflake connection\n */\n async close(): Promise<void> {\n return new Promise((resolve, reject) => {\n this.connection.destroy((err: SnowflakeError | undefined) => {\n if (err) {\n reject(err);\n return;\n }\n resolve();\n });\n });\n }\n}\n\n/**\n * Build a Snowflake data provider from the configuration\n *\n * @param config - Provider configuration\n * @returns Promise resolving to Snowflake data provider\n * @throws {InvalidProviderConfigurationError} If snowflake-sdk is not installed or config is invalid\n */\nexport async function buildSnowflakeProvider(\n config: ProviderConfiguration,\n): Promise<SnowflakeProvider> {\n // Dynamically import snowflake-sdk\n const snowflake = await getSnowflakeSDK();\n\n const requiredFields = [\n \"user\",\n \"password\",\n \"account\",\n \"warehouse\",\n \"database\",\n \"schema\",\n \"role\",\n ] as const;\n\n for (const field of requiredFields) {\n if (!config.fields[field]) {\n throw new InvalidProviderConfigurationError(\n `Missing field '${field}' in the provider '${config.name}' to connect to Snowflake ` +\n \"using password based authentication.\",\n );\n }\n }\n\n const connectionOptions: SnowflakeConnectionOptions = {\n account: config.fields[\"account\"]!,\n username: config.fields[\"user\"]!,\n password: config.fields[\"password\"]!,\n warehouse: config.fields[\"warehouse\"]!,\n database: config.fields[\"database\"]!,\n schema: config.fields[\"schema\"]!,\n role: config.fields[\"role\"]!,\n };\n\n return new Promise((resolve, reject) => {\n const connection = snowflake.createConnection(connectionOptions);\n\n connection.connect(\n (err: SnowflakeError | undefined, conn: SnowflakeConnection) => {\n if (err) {\n reject(\n new ProviderConnectionError(\n `Unable to connect to Snowflake. Reason: ${err.message}`,\n ),\n );\n return;\n }\n\n // Set timezone to UTC after connection.\n // The default timezone is America/Los_Angeles. Timestamps from delta tables will be\n // returned with the timezone `timezone`. NOTE, this is not a timezone conversion.\n // The timezone is replaced without translating the clock time. `timezone` is set UTC\n // to match the timezone of delta table timestamps.\n conn.execute({\n sqlText: \"ALTER SESSION SET TIMEZONE = 'UTC'\",\n complete: (tzErr: SnowflakeError | undefined) => {\n if (tzErr) {\n // Log warning but don't fail - timezone setting is not critical\n console.warn(\n `Warning: Failed to set timezone to UTC: ${tzErr.message}`,\n );\n }\n resolve(new SnowflakeProvider(conn));\n },\n });\n },\n );\n });\n}\n\n"],"names":["getSnowflakeSDK","snowflake","InvalidProviderConfigurationError","SnowflakeProvider","connection","sqlText","params","binds","resolve","reject","err","_stmt","rows","QueryError","buildSnowflakeProvider","config","requiredFields","field","connectionOptions","conn","ProviderConnectionError","tzErr"],"mappings":";;AAsCA,eAAeA,IAAyC;AACtD,MAAI;AACF,UAAMC,IAAY,MAAM,OAAO,eAAe;AAC9C,WAAOA,EAAU,WAAWA;AAAA,EAC9B,QAAQ;AACN,UAAM,IAAIC;AAAA,MACR;AAAA,IAAA;AAAA,EAGJ;AACF;AAKO,MAAMC,EAAkB;AAAA,EACrB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOR,YAAYC,GAAiC;AAC3C,SAAK,aAAaA;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAUA,MAAM,MACJC,GACAC,IAA8C,IACL;AAGzC,UAAMC,KAAQ,MAAM,QAAQD,CAAM,GAC7BA;AAGL,WAAO,IAAI,QAAQ,CAACE,GAASC,MAAW;AACtC,WAAK,WAAW,QAAQ;AAAA,QACtB,SAAAJ;AAAA,QACA,OAAAE;AAAA,QACA,UAAU,CACRG,GACAC,GACAC,MACG;AACH,cAAIF,GAAK;AACP,YAAAD;AAAA,cACE,IAAII;AAAA,gBACF,4DAA4DH,EAAI,OAAO;AAAA,cAAA;AAAA,YACzE;AAEF;AAAA,UACF;AACA,UAAAF,EAAQI,KAAQ,EAAE;AAAA,QACpB;AAAA,MAAA,CACD;AAAA,IACH,CAAC;AAAA,EACH;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,QAAuB;AAC3B,WAAO,IAAI,QAAQ,CAACJ,GAASC,MAAW;AACtC,WAAK,WAAW,QAAQ,CAACC,MAAoC;AAC3D,YAAIA,GAAK;AACP,UAAAD,EAAOC,CAAG;AACV;AAAA,QACF;AACA,QAAAF,EAAA;AAAA,MACF,CAAC;AAAA,IACH,CAAC;AAAA,EACH;AACF;AASA,eAAsBM,EACpBC,GAC4B;AAE5B,QAAMd,IAAY,MAAMD,EAAA,GAElBgB,IAAiB;AAAA,IACrB;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EAAA;AAGF,aAAWC,KAASD;AAClB,QAAI,CAACD,EAAO,OAAOE,CAAK;AACtB,YAAM,IAAIf;AAAA,QACR,kBAAkBe,CAAK,sBAAsBF,EAAO,IAAI;AAAA,MAAA;AAM9D,QAAMG,IAAgD;AAAA,IACpD,SAASH,EAAO,OAAO;AAAA,IACvB,UAAUA,EAAO,OAAO;AAAA,IACxB,UAAUA,EAAO,OAAO;AAAA,IACxB,WAAWA,EAAO,OAAO;AAAA,IACzB,UAAUA,EAAO,OAAO;AAAA,IACxB,QAAQA,EAAO,OAAO;AAAA,IACtB,MAAMA,EAAO,OAAO;AAAA,EAAM;AAG5B,SAAO,IAAI,QAAQ,CAACP,GAASC,MAAW;AAGtC,IAFmBR,EAAU,iBAAiBiB,CAAiB,EAEpD;AAAA,MACT,CAACR,GAAiCS,MAA8B;AAC9D,YAAIT,GAAK;AACP,UAAAD;AAAA,YACE,IAAIW;AAAA,cACF,2CAA2CV,EAAI,OAAO;AAAA,YAAA;AAAA,UACxD;AAEF;AAAA,QACF;AAOA,QAAAS,EAAK,QAAQ;AAAA,UACX,SAAS;AAAA,UACT,UAAU,CAACE,MAAsC;AAC/C,YAAIA,KAEF,QAAQ;AAAA,cACN,2CAA2CA,EAAM,OAAO;AAAA,YAAA,GAG5Db,EAAQ,IAAIL,EAAkBgB,CAAI,CAAC;AAAA,UACrC;AAAA,QAAA,CACD;AAAA,MACH;AAAA,IAAA;AAAA,EAEJ,CAAC;AACH;"}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const E=require("@tetrascience-npm/ts-connectors-sdk"),t=require("./exceptions-DN25pCDi.cjs"),d=require("./providers/snowflake.cjs"),c=require("./providers/databricks.cjs"),l=require("./providers/athena.cjs"),k=60,p=1e3,I=5*k*p;class v{baseUrlOverride;connectorId;orgSlug;tokenCache;tokenRefreshThresholdMs;tdpClient;constructor(r={}){this.baseUrlOverride=r.baseUrl,this.connectorId=process.env.CONNECTOR_ID,this.orgSlug=process.env.ORG_SLUG,this.tokenCache=new Map,this.tokenRefreshThresholdMs=r.tokenRefreshThresholdMs||I,this.tdpClient=null}getBaseUrl(){const r=this.baseUrlOverride||process.env.TDP_ENDPOINT;if(!r)throw new Error("TDP base URL not configured. Set TDP_ENDPOINT environment variable or pass baseUrl in config.");return r}decodeJwtPayload(r){try{const e=r.split(".");if(e.length!==3)return console.warn("Invalid JWT token format"),null;const i=e[1].replace(/-/g,"+").replace(/_/g,"/"),a=i.padEnd(i.length+(4-i.length%4)%4,"=");return JSON.parse(Buffer.from(a,"base64").toString("utf-8"))}catch(e){return console.warn("Error decoding JWT token:",e),null}}isPayloadExpiringSoon(r){if(!r.exp)return console.warn("JWT token has no expiration claim"),!0;const e=r.exp*p,o=Date.now()+this.tokenRefreshThresholdMs;return e<=o}getValidUserJwt(r){const e=this.tokenCache.get(r);return e&&!this.isPayloadExpiringSoon(e.payload)?e.token:(e&&this.tokenCache.delete(r),null)}async getTdpClient(){if(this.tdpClient!==null)return this.tdpClient;if(!this.connectorId||!this.orgSlug)throw new Error("Missing required configuration: CONNECTOR_ID or ORG_SLUG");const r=this.getBaseUrl();try{const e=new E.TDPClient({tdpEndpoint:r,connectorId:this.connectorId,orgSlug:this.orgSlug,artifactType:"data-app"});return await e.init(),this.tdpClient=e,this.tdpClient}catch(e){throw console.error("Failed to initialize TDP client:",e),e}}async getJwtFromTokenRefInternal(r){const e=await this.getTdpClient();try{const o=await e.getValues([r]);if(o&&o.length>0&&o[0]?.jwt){const i=o[0].jwt,a=this.decodeJwtPayload(i);return a&&this.tokenCache.set(r,{token:i,payload:a}),i}console.error(`No JWT found for key '${r}' in connector store`)}catch(o){console.error("Error retrieving JWT token:",o)}return null}async getJwtFromTokenRef(r){if(!r||!this.orgSlug)return console.warn("Missing required parameters for JWT token retrieval"),null;const e=this.getValidUserJwt(r);return e||this.getJwtFromTokenRefInternal(r)}async getUserToken(r){const e=r["ts-auth-token"]||process.env.TS_AUTH_TOKEN;if(e)return e;const o=r["ts-token-ref"];if(o&&this.connectorId){const i=await this.getJwtFromTokenRef(o);if(i)return i;console.warn("Failed to resolve ts-token-ref to JWT token")}else o&&console.error("Connector ID not configured");return console.warn("No valid authentication token found"),null}async getTokenFromExpressRequest(r){return this.getUserToken(r.cookies||{})}clearCache(){this.tokenCache.clear()}}const b=new v;function m(n,r){if(typeof n!="object"||n===null)throw new t.InvalidProviderConfigurationError(`Invalid provider configuration at index ${r}: expected an object`);const e=n;if(typeof e.name!="string")throw new t.InvalidProviderConfigurationError(`Invalid provider configuration at index ${r}: 'name' must be a string`);if(typeof e.type!="string")throw new t.InvalidProviderConfigurationError(`Invalid provider configuration at index ${r}: 'type' must be a string`);if(typeof e.fields!="object"||e.fields===null)throw new t.InvalidProviderConfigurationError(`Invalid provider configuration at index ${r}: 'fields' must be an object`);return{name:e.name,type:e.type,iconUrl:typeof e.iconUrl=="string"?e.iconUrl:void 0,fields:e.fields}}function S(n){try{const r=JSON.parse(n);if(!Array.isArray(r))throw new t.InvalidProviderConfigurationError("Invalid provider configuration: expected an array of provider configurations");return r.map(m)}catch(r){throw r instanceof t.InvalidProviderConfigurationError?r:new t.InvalidProviderConfigurationError(`Invalid provider configuration JSON in DATA_APP_PROVIDER_CONFIG: ${r instanceof Error?r.message:String(r)}`)}}async function O(n,r={}){const e=r.providerConfigOverride||process.env.DATA_APP_PROVIDER_CONFIG;if(e)return S(e);if(!n.isInitialized)throw new Error("TDPClient is not initialized. Call await client.init() before using getProviderConfigurations.");const o=r.connectorId||process.env.CONNECTOR_ID;if(!o)return console.warn("Environment variable CONNECTOR_ID is not set. Unable to fetch providers."),[];const i=n.config.orgSlug,h=(await n.api.dataApps.getOrganizationBySlug(i)).id,P=await n.api.dataApps.getContainerDataApp(o),u=[];for(const w of P.providers){const s=await n.api.dataApps.getProviderById(w.id,h),f={};for(const g of s.secrets){const y=g.name,C=process.env[g.envName];f[y]=C}const T={name:s.name,type:s.type,iconUrl:s.iconUrl,fields:f};u.push(T)}return u}function N(n){return n.map(r=>({name:r.name,type:r.type,iconUrl:r.iconUrl??null,availableFields:Object.keys(r.fields)}))}function U(n,r){return n.find(e=>e.name===r)}function D(n,r){return n.filter(e=>e.type===r)}function _(n){return n.map(r=>r.name)}function R(n){return[...new Set(n.map(r=>r.type))]}async function A(n){switch(n.type){case"snowflake":return d.buildSnowflakeProvider(n);case"databricks":return c.buildDatabricksProvider(n);case"athena":return l.getTdpAthenaProvider();default:throw new t.InvalidProviderConfigurationError(`Unsupported provider type: ${n.type}`)}}exports.InvalidProviderConfigurationError=t.InvalidProviderConfigurationError;exports.MissingTableError=t.MissingTableError;exports.ProviderConnectionError=t.ProviderConnectionError;exports.ProviderError=t.ProviderError;exports.QueryError=t.QueryError;exports.SnowflakeProvider=d.SnowflakeProvider;exports.buildSnowflakeProvider=d.buildSnowflakeProvider;exports.DatabricksProvider=c.DatabricksProvider;exports.buildDatabricksProvider=c.buildDatabricksProvider;exports.AthenaProvider=l.AthenaProvider;exports.getTdpAthenaProvider=l.getTdpAthenaProvider;exports.JwtTokenManager=v;exports.buildProvider=A;exports.getProviderByName=U;exports.getProviderConfigurations=O;exports.getProviderInfoList=N;exports.getProviderNames=_;exports.getProviderTypes=R;exports.getProvidersByType=D;exports.jwtManager=b;
2
+ //# sourceMappingURL=server.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"server.cjs","sources":["../src/server/auth/JwtTokenManager.ts","../src/server/providers/getProviderConfigurations.ts","../src/server/providers/providerDiscovery.ts","../src/server/providers/buildProvider.ts"],"sourcesContent":["/**\n * JWT Token Manager for TetraScience Data Apps\n *\n * Handles authentication token retrieval from Express request cookies,\n * supporting both direct JWT tokens (ts-auth-token) and token references\n * (ts-token-ref) that are resolved via the connector K/V store.\n *\n * Note: This manager does not perform cryptographic verification of JWT signatures.\n * Signature verification is the responsibility of the consuming application or\n * the upstream authentication layer. The JWT payload is decoded only to read\n * expiration times for cache invalidation.\n */\n\nimport { TDPClient } from \"@tetrascience-npm/ts-connectors-sdk\";\n\n/** Configuration options for JwtTokenManager */\nexport interface JwtTokenManagerConfig {\n baseUrl?: string;\n tokenRefreshThresholdMs?: number;\n}\n\n/** Cookie dictionary type - matches Express req.cookies */\nexport interface CookieDict {\n [key: string]: string;\n}\n\n/** Express-like request interface (works with Express, Koa, etc.) */\nexport interface ExpressRequestLike {\n cookies?: CookieDict;\n}\n\n/** JWT payload structure */\ninterface JwtPayload {\n exp?: number;\n iat?: number;\n [key: string]: unknown;\n}\n\n/** Cached token entry storing both raw token and parsed payload */\ninterface CachedTokenEntry {\n token: string;\n payload: JwtPayload;\n}\n\n/** Number of seconds in a minute */\nconst SECONDS_PER_MINUTE = 60;\n/** Milliseconds per second */\nconst MS_PER_SECOND = 1000;\nconst DEFAULT_TOKEN_REFRESH_THRESHOLD_MS = 5 * SECONDS_PER_MINUTE * MS_PER_SECOND; // 5 minutes\n\n/**\n * Manages JWT token retrieval from request cookies.\n * Supports both ts-auth-token (direct JWT) and ts-token-ref (resolved via connector store).\n */\nexport class JwtTokenManager {\n private baseUrlOverride: string | undefined;\n private connectorId: string | undefined;\n private orgSlug: string | undefined;\n private tokenCache: Map<string, CachedTokenEntry>;\n private tokenRefreshThresholdMs: number;\n private tdpClient: TDPClient | null;\n\n constructor(config: JwtTokenManagerConfig = {}) {\n this.baseUrlOverride = config.baseUrl;\n this.connectorId = process.env.CONNECTOR_ID;\n this.orgSlug = process.env.ORG_SLUG;\n this.tokenCache = new Map();\n this.tokenRefreshThresholdMs = config.tokenRefreshThresholdMs || DEFAULT_TOKEN_REFRESH_THRESHOLD_MS;\n this.tdpClient = null;\n }\n\n /**\n * Get the base URL for TDP API calls.\n * Throws an error if not configured (either via config.baseUrl or TDP_ENDPOINT env var).\n */\n private getBaseUrl(): string {\n const baseUrl = this.baseUrlOverride || process.env.TDP_ENDPOINT;\n if (!baseUrl) {\n throw new Error(\"TDP base URL not configured. Set TDP_ENDPOINT environment variable or pass baseUrl in config.\");\n }\n return baseUrl;\n }\n\n /**\n * Decode JWT payload without verifying signature.\n * Used only for reading expiration times for cache invalidation.\n * Signature verification is NOT performed here.\n */\n private decodeJwtPayload(token: string): JwtPayload | null {\n try {\n const parts = token.split(\".\");\n if (parts.length !== 3) {\n console.warn(\"Invalid JWT token format\");\n return null;\n }\n\n const payload = parts[1];\n const base64 = payload.replace(/-/g, \"+\").replace(/_/g, \"/\");\n const paddedBase64 = base64.padEnd(base64.length + ((4 - (base64.length % 4)) % 4), \"=\");\n\n // Use Buffer.from for Node.js compatibility (atob not available in all runtimes)\n return JSON.parse(Buffer.from(paddedBase64, \"base64\").toString(\"utf-8\"));\n } catch (error) {\n console.warn(\"Error decoding JWT token:\", error);\n return null;\n }\n }\n\n /** Check if payload is expiring within the refresh threshold */\n private isPayloadExpiringSoon(payload: JwtPayload): boolean {\n if (!payload.exp) {\n console.warn(\"JWT token has no expiration claim\");\n return true;\n }\n\n const expiryTimeMs = payload.exp * MS_PER_SECOND;\n const refreshTimeMs = Date.now() + this.tokenRefreshThresholdMs;\n return expiryTimeMs <= refreshTimeMs;\n }\n\n /** Get valid cached token if not expiring */\n private getValidUserJwt(tokenRef: string): string | null {\n const cached = this.tokenCache.get(tokenRef);\n if (cached && !this.isPayloadExpiringSoon(cached.payload)) {\n return cached.token;\n }\n // Clean up expired entry to prevent unbounded cache growth\n if (cached) {\n // TODO: If data apps become high-traffic, consider enhancing with\n // an LRU cache (e.g., lru-cache package) to purge stale entries automatically\n this.tokenCache.delete(tokenRef);\n }\n return null;\n }\n\n /** Initialize or get TDP client */\n private async getTdpClient(): Promise<TDPClient> {\n if (this.tdpClient !== null) {\n return this.tdpClient;\n }\n\n if (!this.connectorId || !this.orgSlug) {\n throw new Error(\"Missing required configuration: CONNECTOR_ID or ORG_SLUG\");\n }\n\n // getBaseUrl() throws if TDP_ENDPOINT not configured - let it propagate\n const baseUrl = this.getBaseUrl();\n\n try {\n const client = new TDPClient({\n tdpEndpoint: baseUrl,\n connectorId: this.connectorId,\n orgSlug: this.orgSlug,\n artifactType: \"data-app\",\n });\n\n await client.init();\n // Only assign after successful initialization to allow retry on failure\n this.tdpClient = client;\n return this.tdpClient;\n } catch (error) {\n // Log init errors but rethrow so callers know something went wrong\n console.error(\"Failed to initialize TDP client:\", error);\n throw error;\n }\n }\n\n /** Retrieve JWT from connector K/V store using getValues (calls getConnectorData internally) */\n private async getJwtFromTokenRefInternal(tokenRef: string): Promise<string | null> {\n // getTdpClient() throws on config errors - let those propagate\n const tdpClient = await this.getTdpClient();\n\n try {\n // getValues returns array of values for the given keys\n // Each value is expected to have a jwt property: { jwt: \"...\" }\n const values = await tdpClient.getValues([tokenRef]);\n\n if (values && values.length > 0 && values[0]?.jwt) {\n const jwtToken = values[0].jwt;\n // Parse and cache both the raw token and its payload to avoid repeated decoding\n const payload = this.decodeJwtPayload(jwtToken);\n if (payload) {\n this.tokenCache.set(tokenRef, { token: jwtToken, payload });\n }\n return jwtToken;\n }\n\n console.error(`No JWT found for key '${tokenRef}' in connector store`);\n } catch (error) {\n console.error(\"Error retrieving JWT token:\", error);\n }\n\n return null;\n }\n\n /** Resolve ts-token-ref to full JWT token (with caching) */\n async getJwtFromTokenRef(tokenRef: string): Promise<string | null> {\n if (!tokenRef || !this.orgSlug) {\n console.warn(\"Missing required parameters for JWT token retrieval\");\n return null;\n }\n\n const cachedUserToken = this.getValidUserJwt(tokenRef);\n if (cachedUserToken) {\n return cachedUserToken;\n }\n\n return this.getJwtFromTokenRefInternal(tokenRef);\n }\n\n /** Get token from cookies (ts-auth-token or resolved ts-token-ref) */\n async getUserToken(cookies: CookieDict): Promise<string | null> {\n // Prefer ts-auth-token or TS_AUTH_TOKEN env var (latter is for local dev testing)\n const authToken = cookies[\"ts-auth-token\"] || process.env.TS_AUTH_TOKEN;\n if (authToken) {\n return authToken;\n }\n\n // Try to resolve ts-token-ref\n const tokenRef = cookies[\"ts-token-ref\"];\n if (tokenRef && this.connectorId) {\n const jwtToken = await this.getJwtFromTokenRef(tokenRef);\n if (jwtToken) {\n return jwtToken;\n }\n console.warn(\"Failed to resolve ts-token-ref to JWT token\");\n } else if (tokenRef) {\n console.error(\"Connector ID not configured\");\n }\n\n console.warn(\"No valid authentication token found\");\n return null;\n }\n\n /**\n * Get user token from an Express request object.\n * This is the primary method for Express middleware integration.\n *\n * @example\n * ```typescript\n * import { jwtManager } from '@tetrascience-npm/tetrascience-react-ui/server';\n *\n * app.use(async (req, res, next) => {\n * const token = await jwtManager.getTokenFromExpressRequest(req);\n * req.tdpAuth = { token, orgSlug: process.env.ORG_SLUG };\n * next();\n * });\n * ```\n */\n async getTokenFromExpressRequest(req: ExpressRequestLike): Promise<string | null> {\n // Handle missing cookies gracefully (e.g., if cookie-parser middleware not installed)\n return this.getUserToken(req.cookies || {});\n }\n\n /** Clear the token cache */\n clearCache(): void {\n this.tokenCache.clear();\n }\n}\n\n/**\n * Global singleton instance.\n *\n * Note: This instance is created when the module is imported. Configuration\n * that depends on environment variables (CONNECTOR_ID, ORG_SLUG, TDP_ENDPOINT)\n * is read at module load time. Ensure these environment\n * variables are set before importing this module.\n *\n * If you need different configuration at runtime, create a new JwtTokenManager\n * instance instead of using this singleton.\n */\nexport const jwtManager = new JwtTokenManager();\n","/**\n * Get Provider Configurations\n *\n * TypeScript equivalent of get_provider_configurations from\n * ts-lib-ui-kit-streamlit/tetrascience/data_app_providers/provider.py\n *\n * Retrieves data app provider configurations either from environment variable\n * override or by fetching from the TDP API.\n */\n\nimport { InvalidProviderConfigurationError } from \"./exceptions\";\n\nimport type {\n GetProviderConfigurationsOptions,\n ProviderConfiguration,\n} from \"./types\";\nimport type { TDPClient } from \"@tetrascience-npm/ts-connectors-sdk\";\n\n// Re-export for backwards compatibility\nexport { InvalidProviderConfigurationError };\n\n/**\n * Validates and parses a single provider configuration object.\n * @internal\n */\nfunction validateProviderConfigItem(\n item: unknown,\n index: number,\n): ProviderConfiguration {\n if (typeof item !== \"object\" || item === null) {\n throw new InvalidProviderConfigurationError(\n `Invalid provider configuration at index ${index}: expected an object`,\n );\n }\n\n const obj = item as Record<string, unknown>;\n\n if (typeof obj.name !== \"string\") {\n throw new InvalidProviderConfigurationError(\n `Invalid provider configuration at index ${index}: 'name' must be a string`,\n );\n }\n if (typeof obj.type !== \"string\") {\n throw new InvalidProviderConfigurationError(\n `Invalid provider configuration at index ${index}: 'type' must be a string`,\n );\n }\n if (typeof obj.fields !== \"object\" || obj.fields === null) {\n throw new InvalidProviderConfigurationError(\n `Invalid provider configuration at index ${index}: 'fields' must be an object`,\n );\n }\n\n return {\n name: obj.name,\n type: obj.type,\n iconUrl: typeof obj.iconUrl === \"string\" ? obj.iconUrl : undefined,\n fields: obj.fields as Record<string, string | undefined>,\n } satisfies ProviderConfiguration;\n}\n\n/**\n * Parses provider configurations from a JSON config string.\n * @internal\n */\nfunction parseProviderConfigOverride(\n configStr: string,\n): ProviderConfiguration[] {\n try {\n const parsed = JSON.parse(configStr);\n\n // Validate it's an array\n if (!Array.isArray(parsed)) {\n throw new InvalidProviderConfigurationError(\n \"Invalid provider configuration: expected an array of provider configurations\",\n );\n }\n\n // Validate each entry has required fields\n return parsed.map(validateProviderConfigItem);\n } catch (e) {\n if (e instanceof InvalidProviderConfigurationError) {\n throw e;\n }\n throw new InvalidProviderConfigurationError(\n `Invalid provider configuration JSON in DATA_APP_PROVIDER_CONFIG: ${e instanceof Error ? e.message : String(e)}`,\n );\n }\n}\n\n/**\n * Get the provider configurations.\n *\n * There are two ways to get the provider configurations:\n * 1. If the environment variable `DATA_APP_PROVIDER_CONFIG` is set or\n * providerConfigOverride is provided, the provider configurations are read from it.\n * 2. If the environment variable `CONNECTOR_ID` is set or connectorId is provided,\n * the provider configurations are fetched from TDP. The secrets are read from\n * environment variables.\n * 3. If neither of the above is set, an empty array is returned.\n *\n * Option 1 is used for local development to specify the provider configurations directly.\n * Option 2 is used in production to fetch the provider configurations from TDP.\n *\n * @param client - Initialized TDPClient instance (call client.init() first)\n * @param options - Optional configuration overrides\n * @returns Array of provider configurations\n * @throws {InvalidProviderConfigurationError} If provider config JSON is invalid\n * @throws {Error} If TDPClient is not initialized\n *\n * @example\n * ```typescript\n * import { TDPClient } from '@tetrascience-npm/ts-connectors-sdk';\n * import { getProviderConfigurations } from '@tetrascience-npm/tetrascience-react-ui/server';\n *\n * // Initialize TDPClient with user's JWT token\n * // Other fields (tdpEndpoint, connectorId, orgSlug) are read from environment variables\n * const client = new TDPClient({\n * authToken: userJwtToken, // from jwtManager.getTokenFromExpressRequest(req)\n * artifactType: \"data-app\",\n * });\n * await client.init();\n *\n * const providers = await getProviderConfigurations(client);\n *\n * for (const provider of providers) {\n * console.log(`Provider: ${provider.name} (${provider.type})`);\n * }\n * ```\n */\nexport async function getProviderConfigurations(\n client: TDPClient,\n options: GetProviderConfigurationsOptions = {},\n): Promise<ProviderConfiguration[]> {\n // Check for override from options or environment variable\n const configStr =\n options.providerConfigOverride || process.env.DATA_APP_PROVIDER_CONFIG;\n\n if (configStr) {\n return parseProviderConfigOverride(configStr);\n }\n\n // Ensure TDPClient is initialized\n if (!client.isInitialized) {\n throw new Error(\n \"TDPClient is not initialized. Call await client.init() before using getProviderConfigurations.\",\n );\n }\n\n // Get connector ID from options or environment variable\n const connectorId = options.connectorId || process.env.CONNECTOR_ID;\n\n if (!connectorId) {\n console.warn(\n \"Environment variable CONNECTOR_ID is not set. Unable to fetch providers.\",\n );\n return [];\n }\n\n // Get orgId from organization lookup (needed for getProviderById)\n const orgSlug = client.config.orgSlug;\n const organization = await client.api!.dataApps.getOrganizationBySlug(orgSlug);\n const orgId = organization.id;\n\n // Fetch container data app from TDP\n const containerApp = await client.api!.dataApps.getContainerDataApp(connectorId);\n\n // Get provider configurations with secrets from environment variables\n const providerConfigurations: ProviderConfiguration[] = [];\n\n for (const minimalProvider of containerApp.providers) {\n // Get full provider with secret names\n const provider = await client.api!.dataApps.getProviderById(\n minimalProvider.id,\n orgId,\n );\n\n // Build fields from environment variables\n // Use secret.name as the key (canonical field name like \"user\", \"password\", \"server_hostname\")\n // and read the value from the environment variable specified by secret.envName\n const fields: Record<string, string | undefined> = {};\n for (const secret of provider.secrets) {\n const fieldName = secret.name;\n const secretValue = process.env[secret.envName];\n fields[fieldName] = secretValue;\n }\n\n const config: ProviderConfiguration = {\n name: provider.name,\n type: provider.type,\n iconUrl: provider.iconUrl,\n fields,\n };\n\n providerConfigurations.push(config);\n }\n\n return providerConfigurations;\n}\n\n","/**\n * Provider Discovery Helpers\n *\n * Convenience functions for common provider discovery patterns in data apps.\n * These operate on the ProviderConfiguration[] returned by getProviderConfigurations()\n * and make it easy to populate dropdowns, find providers by name/type, and\n * list available providers without exposing secrets.\n */\n\nimport type { ProviderConfiguration, ProviderInfo } from \"./types\";\n\n/**\n * Extract display-friendly provider information from full configurations.\n *\n * Returns a list of {@link ProviderInfo} objects containing name, type,\n * iconUrl, and the names of available connection fields — suitable for\n * populating UI dropdowns and selection lists without exposing secret values.\n *\n * @param configs - Array of provider configurations from getProviderConfigurations()\n * @returns Array of display-friendly provider info objects\n *\n * @example\n * ```typescript\n * const configs = await getProviderConfigurations(client);\n * const providerList = getProviderInfoList(configs);\n * // [{ name: \"my-snowflake\", type: \"snowflake\", iconUrl: \"...\", availableFields: [\"user\", \"password\", \"account\"] }, ...]\n * ```\n */\nexport function getProviderInfoList(\n configs: ProviderConfiguration[],\n): ProviderInfo[] {\n return configs.map((config) => ({\n name: config.name,\n type: config.type,\n iconUrl: config.iconUrl ?? null,\n availableFields: Object.keys(config.fields),\n }));\n}\n\n/**\n * Find a provider configuration by name.\n *\n * @param configs - Array of provider configurations from getProviderConfigurations()\n * @param name - The provider name to search for (case-sensitive)\n * @returns The matching provider configuration, or undefined if not found\n *\n * @example\n * ```typescript\n * const configs = await getProviderConfigurations(client);\n * const snowflake = getProviderByName(configs, \"my-snowflake-provider\");\n * if (snowflake) {\n * const provider = await buildProvider(snowflake);\n * }\n * ```\n */\nexport function getProviderByName(\n configs: ProviderConfiguration[],\n name: string,\n): ProviderConfiguration | undefined {\n return configs.find((config) => config.name === name);\n}\n\n/**\n * Find all provider configurations of a given type.\n *\n * @param configs - Array of provider configurations from getProviderConfigurations()\n * @param type - The provider type to filter by (e.g., \"snowflake\", \"databricks\", \"athena\")\n * @returns Array of matching provider configurations (may be empty)\n *\n * @example\n * ```typescript\n * const configs = await getProviderConfigurations(client);\n * const snowflakeProviders = getProvidersByType(configs, \"snowflake\");\n * for (const config of snowflakeProviders) {\n * console.log(`Found Snowflake provider: ${config.name}`);\n * }\n * ```\n */\nexport function getProvidersByType(\n configs: ProviderConfiguration[],\n type: string,\n): ProviderConfiguration[] {\n return configs.filter((config) => config.type === type);\n}\n\n/**\n * Get the names of all attached providers.\n *\n * @param configs - Array of provider configurations from getProviderConfigurations()\n * @returns Array of provider names\n *\n * @example\n * ```typescript\n * const configs = await getProviderConfigurations(client);\n * const names = getProviderNames(configs);\n * // [\"my-snowflake\", \"my-databricks\", \"my-athena\"]\n * ```\n */\nexport function getProviderNames(configs: ProviderConfiguration[]): string[] {\n return configs.map((config) => config.name);\n}\n\n/**\n * Get the unique provider types available.\n *\n * @param configs - Array of provider configurations from getProviderConfigurations()\n * @returns Array of unique provider type strings\n *\n * @example\n * ```typescript\n * const configs = await getProviderConfigurations(client);\n * const types = getProviderTypes(configs);\n * // [\"snowflake\", \"databricks\"]\n * ```\n */\nexport function getProviderTypes(configs: ProviderConfiguration[]): string[] {\n return [...new Set(configs.map((config) => config.type))];\n}\n\n","/**\n * Build Provider Factory\n *\n * TypeScript equivalent of build_provider from\n * ts-lib-ui-kit-streamlit/tetrascience/data_app_providers/provider.py\n */\n\nimport { getTdpAthenaProvider } from \"./AthenaProvider\";\nimport {\n buildDatabricksProvider,\n} from \"./DatabricksProvider\";\nimport { InvalidProviderConfigurationError } from \"./getProviderConfigurations\";\nimport {\n buildSnowflakeProvider,\n} from \"./SnowflakeProvider\";\n\nimport type { AthenaProvider} from \"./AthenaProvider\";\nimport type {\n DatabricksProvider} from \"./DatabricksProvider\";\nimport type {\n SnowflakeProvider} from \"./SnowflakeProvider\";\nimport type { ProviderConfiguration } from \"./types\";\n\n/**\n * Union type of all supported data providers\n */\nexport type DataProvider =\n | SnowflakeProvider\n | DatabricksProvider\n | AthenaProvider;\n\n/**\n * Build a data provider from the configuration\n *\n * The return type is a union of specific provider types. More provider types\n * may be added in the future.\n *\n * @param config - Provider configuration\n * @returns Promise resolving to the appropriate data provider\n * @throws {InvalidProviderConfigurationError} If the provider type is not supported\n *\n * @example\n * ```typescript\n * import { TDPClient } from '@tetrascience-npm/ts-connectors-sdk';\n * import { buildProvider, getProviderConfigurations } from '@tetrascience-npm/tetrascience-react-ui/server';\n *\n * // Other fields (tdpEndpoint, connectorId, orgSlug) are read from environment variables\n * const client = new TDPClient({\n * authToken: userJwt,\n * artifactType: \"data-app\",\n * });\n * await client.init();\n * const configs = await getProviderConfigurations(client);\n *\n * const snowflakeConfig = configs.find(c => c.type === 'snowflake');\n * if (snowflakeConfig) {\n * const provider = await buildProvider(snowflakeConfig);\n * const results = await provider.query('SELECT * FROM my_table');\n * }\n * ```\n */\nexport async function buildProvider(\n config: ProviderConfiguration,\n): Promise<DataProvider> {\n switch (config.type) {\n case \"snowflake\":\n return buildSnowflakeProvider(config);\n case \"databricks\":\n return buildDatabricksProvider(config);\n case \"athena\":\n // For Athena, we typically use the TDP Athena provider\n return getTdpAthenaProvider();\n default:\n throw new InvalidProviderConfigurationError(\n `Unsupported provider type: ${config.type}`,\n );\n }\n}\n\n"],"names":["SECONDS_PER_MINUTE","MS_PER_SECOND","DEFAULT_TOKEN_REFRESH_THRESHOLD_MS","JwtTokenManager","config","baseUrl","token","parts","base64","paddedBase64","error","payload","expiryTimeMs","refreshTimeMs","tokenRef","cached","client","TDPClient","tdpClient","values","jwtToken","cachedUserToken","cookies","authToken","req","jwtManager","validateProviderConfigItem","item","index","InvalidProviderConfigurationError","obj","parseProviderConfigOverride","configStr","parsed","e","getProviderConfigurations","options","connectorId","orgSlug","orgId","containerApp","providerConfigurations","minimalProvider","provider","fields","secret","fieldName","secretValue","getProviderInfoList","configs","getProviderByName","name","getProvidersByType","type","getProviderNames","getProviderTypes","buildProvider","buildSnowflakeProvider","buildDatabricksProvider","getTdpAthenaProvider"],"mappings":"iSA6CMA,EAAqB,GAErBC,EAAgB,IAChBC,EAAqC,EAAIF,EAAqBC,EAM7D,MAAME,CAAgB,CACnB,gBACA,YACA,QACA,WACA,wBACA,UAER,YAAYC,EAAgC,GAAI,CAC9C,KAAK,gBAAkBA,EAAO,QAC9B,KAAK,YAAc,QAAQ,IAAI,aAC/B,KAAK,QAAU,QAAQ,IAAI,SAC3B,KAAK,eAAiB,IACtB,KAAK,wBAA0BA,EAAO,yBAA2BF,EACjE,KAAK,UAAY,IACnB,CAMQ,YAAqB,CAC3B,MAAMG,EAAU,KAAK,iBAAmB,QAAQ,IAAI,aACpD,GAAI,CAACA,EACH,MAAM,IAAI,MAAM,+FAA+F,EAEjH,OAAOA,CACT,CAOQ,iBAAiBC,EAAkC,CACzD,GAAI,CACF,MAAMC,EAAQD,EAAM,MAAM,GAAG,EAC7B,GAAIC,EAAM,SAAW,EACnB,eAAQ,KAAK,0BAA0B,EAChC,KAIT,MAAMC,EADUD,EAAM,CAAC,EACA,QAAQ,KAAM,GAAG,EAAE,QAAQ,KAAM,GAAG,EACrDE,EAAeD,EAAO,OAAOA,EAAO,QAAW,EAAKA,EAAO,OAAS,GAAM,EAAI,GAAG,EAGvF,OAAO,KAAK,MAAM,OAAO,KAAKC,EAAc,QAAQ,EAAE,SAAS,OAAO,CAAC,CACzE,OAASC,EAAO,CACd,eAAQ,KAAK,4BAA6BA,CAAK,EACxC,IACT,CACF,CAGQ,sBAAsBC,EAA8B,CAC1D,GAAI,CAACA,EAAQ,IACX,eAAQ,KAAK,mCAAmC,EACzC,GAGT,MAAMC,EAAeD,EAAQ,IAAMV,EAC7BY,EAAgB,KAAK,IAAA,EAAQ,KAAK,wBACxC,OAAOD,GAAgBC,CACzB,CAGQ,gBAAgBC,EAAiC,CACvD,MAAMC,EAAS,KAAK,WAAW,IAAID,CAAQ,EAC3C,OAAIC,GAAU,CAAC,KAAK,sBAAsBA,EAAO,OAAO,EAC/CA,EAAO,OAGZA,GAGF,KAAK,WAAW,OAAOD,CAAQ,EAE1B,KACT,CAGA,MAAc,cAAmC,CAC/C,GAAI,KAAK,YAAc,KACrB,OAAO,KAAK,UAGd,GAAI,CAAC,KAAK,aAAe,CAAC,KAAK,QAC7B,MAAM,IAAI,MAAM,0DAA0D,EAI5E,MAAMT,EAAU,KAAK,WAAA,EAErB,GAAI,CACF,MAAMW,EAAS,IAAIC,YAAU,CAC3B,YAAaZ,EACb,YAAa,KAAK,YAClB,QAAS,KAAK,QACd,aAAc,UAAA,CACf,EAED,aAAMW,EAAO,KAAA,EAEb,KAAK,UAAYA,EACV,KAAK,SACd,OAASN,EAAO,CAEd,cAAQ,MAAM,mCAAoCA,CAAK,EACjDA,CACR,CACF,CAGA,MAAc,2BAA2BI,EAA0C,CAEjF,MAAMI,EAAY,MAAM,KAAK,aAAA,EAE7B,GAAI,CAGF,MAAMC,EAAS,MAAMD,EAAU,UAAU,CAACJ,CAAQ,CAAC,EAEnD,GAAIK,GAAUA,EAAO,OAAS,GAAKA,EAAO,CAAC,GAAG,IAAK,CACjD,MAAMC,EAAWD,EAAO,CAAC,EAAE,IAErBR,EAAU,KAAK,iBAAiBS,CAAQ,EAC9C,OAAIT,GACF,KAAK,WAAW,IAAIG,EAAU,CAAE,MAAOM,EAAU,QAAAT,EAAS,EAErDS,CACT,CAEA,QAAQ,MAAM,yBAAyBN,CAAQ,sBAAsB,CACvE,OAASJ,EAAO,CACd,QAAQ,MAAM,8BAA+BA,CAAK,CACpD,CAEA,OAAO,IACT,CAGA,MAAM,mBAAmBI,EAA0C,CACjE,GAAI,CAACA,GAAY,CAAC,KAAK,QACrB,eAAQ,KAAK,qDAAqD,EAC3D,KAGT,MAAMO,EAAkB,KAAK,gBAAgBP,CAAQ,EACrD,OAAIO,GAIG,KAAK,2BAA2BP,CAAQ,CACjD,CAGA,MAAM,aAAaQ,EAA6C,CAE9D,MAAMC,EAAYD,EAAQ,eAAe,GAAK,QAAQ,IAAI,cAC1D,GAAIC,EACF,OAAOA,EAIT,MAAMT,EAAWQ,EAAQ,cAAc,EACvC,GAAIR,GAAY,KAAK,YAAa,CAChC,MAAMM,EAAW,MAAM,KAAK,mBAAmBN,CAAQ,EACvD,GAAIM,EACF,OAAOA,EAET,QAAQ,KAAK,6CAA6C,CAC5D,MAAWN,GACT,QAAQ,MAAM,6BAA6B,EAG7C,eAAQ,KAAK,qCAAqC,EAC3C,IACT,CAiBA,MAAM,2BAA2BU,EAAiD,CAEhF,OAAO,KAAK,aAAaA,EAAI,SAAW,CAAA,CAAE,CAC5C,CAGA,YAAmB,CACjB,KAAK,WAAW,MAAA,CAClB,CACF,CAaO,MAAMC,EAAa,IAAItB,ECtP9B,SAASuB,EACPC,EACAC,EACuB,CACvB,GAAI,OAAOD,GAAS,UAAYA,IAAS,KACvC,MAAM,IAAIE,EAAAA,kCACR,2CAA2CD,CAAK,sBAAA,EAIpD,MAAME,EAAMH,EAEZ,GAAI,OAAOG,EAAI,MAAS,SACtB,MAAM,IAAID,EAAAA,kCACR,2CAA2CD,CAAK,2BAAA,EAGpD,GAAI,OAAOE,EAAI,MAAS,SACtB,MAAM,IAAID,EAAAA,kCACR,2CAA2CD,CAAK,2BAAA,EAGpD,GAAI,OAAOE,EAAI,QAAW,UAAYA,EAAI,SAAW,KACnD,MAAM,IAAID,EAAAA,kCACR,2CAA2CD,CAAK,8BAAA,EAIpD,MAAO,CACL,KAAME,EAAI,KACV,KAAMA,EAAI,KACV,QAAS,OAAOA,EAAI,SAAY,SAAWA,EAAI,QAAU,OACzD,OAAQA,EAAI,MAAA,CAEhB,CAMA,SAASC,EACPC,EACyB,CACzB,GAAI,CACF,MAAMC,EAAS,KAAK,MAAMD,CAAS,EAGnC,GAAI,CAAC,MAAM,QAAQC,CAAM,EACvB,MAAM,IAAIJ,EAAAA,kCACR,8EAAA,EAKJ,OAAOI,EAAO,IAAIP,CAA0B,CAC9C,OAASQ,EAAG,CACV,MAAIA,aAAaL,EAAAA,kCACTK,EAEF,IAAIL,EAAAA,kCACR,oEAAoEK,aAAa,MAAQA,EAAE,QAAU,OAAOA,CAAC,CAAC,EAAA,CAElH,CACF,CA0CA,eAAsBC,EACpBnB,EACAoB,EAA4C,GACV,CAElC,MAAMJ,EACJI,EAAQ,wBAA0B,QAAQ,IAAI,yBAEhD,GAAIJ,EACF,OAAOD,EAA4BC,CAAS,EAI9C,GAAI,CAAChB,EAAO,cACV,MAAM,IAAI,MACR,gGAAA,EAKJ,MAAMqB,EAAcD,EAAQ,aAAe,QAAQ,IAAI,aAEvD,GAAI,CAACC,EACH,eAAQ,KACN,0EAAA,EAEK,CAAA,EAIT,MAAMC,EAAUtB,EAAO,OAAO,QAExBuB,GADe,MAAMvB,EAAO,IAAK,SAAS,sBAAsBsB,CAAO,GAClD,GAGrBE,EAAe,MAAMxB,EAAO,IAAK,SAAS,oBAAoBqB,CAAW,EAGzEI,EAAkD,CAAA,EAExD,UAAWC,KAAmBF,EAAa,UAAW,CAEpD,MAAMG,EAAW,MAAM3B,EAAO,IAAK,SAAS,gBAC1C0B,EAAgB,GAChBH,CAAA,EAMIK,EAA6C,CAAA,EACnD,UAAWC,KAAUF,EAAS,QAAS,CACrC,MAAMG,EAAYD,EAAO,KACnBE,EAAc,QAAQ,IAAIF,EAAO,OAAO,EAC9CD,EAAOE,CAAS,EAAIC,CACtB,CAEA,MAAM3C,EAAgC,CACpC,KAAMuC,EAAS,KACf,KAAMA,EAAS,KACf,QAASA,EAAS,QAClB,OAAAC,CAAA,EAGFH,EAAuB,KAAKrC,CAAM,CACpC,CAEA,OAAOqC,CACT,CC1KO,SAASO,EACdC,EACgB,CAChB,OAAOA,EAAQ,IAAK7C,IAAY,CAC9B,KAAMA,EAAO,KACb,KAAMA,EAAO,KACb,QAASA,EAAO,SAAW,KAC3B,gBAAiB,OAAO,KAAKA,EAAO,MAAM,CAAA,EAC1C,CACJ,CAkBO,SAAS8C,EACdD,EACAE,EACmC,CACnC,OAAOF,EAAQ,KAAM7C,GAAWA,EAAO,OAAS+C,CAAI,CACtD,CAkBO,SAASC,EACdH,EACAI,EACyB,CACzB,OAAOJ,EAAQ,OAAQ7C,GAAWA,EAAO,OAASiD,CAAI,CACxD,CAeO,SAASC,EAAiBL,EAA4C,CAC3E,OAAOA,EAAQ,IAAK7C,GAAWA,EAAO,IAAI,CAC5C,CAeO,SAASmD,EAAiBN,EAA4C,CAC3E,MAAO,CAAC,GAAG,IAAI,IAAIA,EAAQ,IAAK7C,GAAWA,EAAO,IAAI,CAAC,CAAC,CAC1D,CCxDA,eAAsBoD,EACpBpD,EACuB,CACvB,OAAQA,EAAO,KAAA,CACb,IAAK,YACH,OAAOqD,EAAAA,uBAAuBrD,CAAM,EACtC,IAAK,aACH,OAAOsD,EAAAA,wBAAwBtD,CAAM,EACvC,IAAK,SAEH,OAAOuD,uBAAA,EACT,QACE,MAAM,IAAI9B,EAAAA,kCACR,8BAA8BzB,EAAO,IAAI,EAAA,CAC3C,CAEN"}