@unwanted/matrix-sdk-mini 34.12.0-1 → 34.12.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","names":["anotherjson","v4","uuidv4","EventType","ToDeviceMessageId","TypedReEmitter","logger","OlmDevice","olmlib","DeviceList","DeviceInfo","algorithms","createCryptoStoreCacheCallbacks","CrossSigningInfo","DeviceTrustLevel","UserTrustLevel","EncryptionSetupBuilder","SecretStorage","LegacySecretStorage","CrossSigningKey","OutgoingRoomKeyRequestManager","IndexedDBCryptoStore","ReciprocateQRCode","SCAN_QR_CODE_METHOD","SHOW_QR_CODE_METHOD","SAS","SASVerification","keyFromPassphrase","VerificationRequest","InRoomChannel","InRoomRequests","ToDeviceChannel","ToDeviceRequests","IllegalMethod","KeySignatureUploadError","DehydrationManager","BackupManager","LibOlmBackupDecryptor","backupTrustInfoFromLegacyTrustInfo","RoomEvent","RoomMemberEvent","EventStatus","MatrixEvent","MatrixEventEvent","ClientEvent","MatrixClient","RoomList","TypedEventEmitter","DecryptionError","RoomStateEvent","MapWithDefault","recursiveMapToObject","calculateKeyCheck","SECRET_STORAGE_ALGORITHM_V1_AES","ServerSideSecretStorageImpl","decodeRecoveryKey","DecryptionFailureCode","encodeRecoveryKey","EventShieldColour","EventShieldReason","CryptoEvent","CryptoApiCryptoEvent","deviceInfoToDevice","ClientPrefix","MatrixError","Method","decodeBase64","encodeBase64","KnownMembership","decryptAESSecretStorageItem","encryptAESSecretStorageItem","DeviceVerification","defaultVerificationMethods","NAME","verificationMethods","RECIPROCATE_QR_CODE","MIN_FORCE_SESSION_INTERVAL_MS","FORCE_SESSION_RETRY_INTERVAL_MS","UserTrustStatusChanged","KeyBackupStatus","KeyBackupFailed","KeyBackupSessionsRemaining","KeyBackupDecryptionKeyCached","VerificationRequestReceived","WillUpdateDevices","DevicesUpdated","KeysChanged","LegacyCryptoStoreMigrationProgress","Crypto","getOlmVersion","constructor","baseApis","userId","deviceId","clientStore","cryptoStore","_this","this","_defineProperty","Map","_ref","_asyncToGenerator","newCrossSigning","deviceList","getStoredCrossSigningForUser","seenPubkey","getId","currentPubkey","crossSigningInfo","changed","checkOwnCrossSigningTrust","storeTrustedSelfKeys","emit","checkUserTrust","checkDeviceVerifications","crossSigning","updateCrossSigningVerifiedBefore","isCrossSigningVerified","setRawStoredCrossSigningForUser","toStorage","_x","apply","arguments","event","member","oldMembership","onRoomMembership","e","error","log","concat","getType","getSender","getContent","onRoomKeyEvent","onRoomKeyRequestEvent","secretStorage","onRequestReceived","onSecretReceived","onRoomKeyWithheldEvent","transaction_id","onKeyVerificationMessage","msgtype","onToDeviceBadEncrypted","isBeingDecrypted","shouldAttemptDecryption","attemptDecryption","once","Decrypted","ev","onToDeviceEvent","room","atStart","removed","liveEvent","length","undefined","validateEvent","createRequest","channel","getRoomId","handleVerificationEvent","inRoomVerificationRequests","debug","roomList","reEmitter","method","set","warn","Object","entries","backupManager","cachedKey","getSessionBackupPrivateKey","storedKey","get","fixedKey","fixBackupKey","keys","getKey","store","cryptoCallbacks","getBackupKey","Error","olmDevice","on","UserCrossSigningUpdated","onDeviceListUserCrossSigningUpdated","reEmit","supportedAlgorithms","Array","from","DECRYPTION_CLASSES","outgoingRoomKeyRequestManager","toDeviceVerificationRequests","cacheCallbacks","dehydrationManager","getCrossSigningKey","getSecretStorageKey","_ref3","type","getFromSecretStorage","_x2","init","_arguments","_this2","exportedOlmDevice","pickleKey","globalThis","Olm","fromExportedDevice","load","deviceKeys","deviceEd25519Key","deviceCurve25519Key","myDevices","getRawStoredDevicesForUser","deviceInfo","verified","VERIFIED","known","storeDevicesForUser","saveIfDirty","doTxn","STORE_ACCOUNT","txn","getCrossSigningKeys","setKeys","startTrackingDeviceList","checkAndStart","setDeviceIsolationMode","isolationMode","getVersion","olmVersionTuple","getTrustCrossSignedDevices","trustCrossSignedDevices","getCryptoTrustCrossSignedDevices","setTrustCrossSignedDevices","val","getKnownUserIds","devices","deviceTrust","checkDeviceTrust","isLocallyVerified","deviceObj","getStoredDevice","DeviceVerificationChanged","setCryptoTrustCrossSignedDevices","createRecoveryKeyFromPassphrase","password","decryption","PkDecryption","derivation","init_with_private_key","key","privateKey","get_private_key","keyInfo","passphrase","algorithm","iterations","salt","encodedPrivateKey","generate_key","free","userHasCrossSigningKeys","_arguments2","_this3","downloadKeys","isCrossSigningReady","_this4","publicKeysOnDevice","privateKeysExistSomewhere","isStoredInKeyCache","isStoredInSecretStorage","isSecretStorageReady","_this5","secretStorageKeyInAccount","hasKey","privateKeysInStorage","sessionBackupInStorage","getKeyBackupEnabled","isKeyBackupKeyStored","getCrossSigningStatus","_this6","_cacheCallbacks$getCr","_cacheCallbacks$getCr2","_cacheCallbacks$getCr3","Boolean","privateKeysInSecretStorage","getCacheCallbacks","masterKey","getCrossSigningKeyCache","call","selfSigningKey","userSigningKey","privateKeysCachedLocally","bootstrapCrossSigning","_arguments3","_this7","authUploadDeviceSigningKeys","setupNewCrossSigning","delegateCryptoCallbacks","builder","accountData","crossSigningCallbacks","resetCrossSigning","_ref4","resetKeys","signObject","master","addCrossSigningKeys","device","deviceSignature","signDevice","addKeySignature","backupInfo","auth_data","addSessionBackup","privateKeysInCache","allowPrivateKeyRequests","crossSigningPrivateKeys","privateKeys","size","saveCrossSigningKeys","accountDataClientAdapter","ssssCryptoCallbacks","storeInSecretStorage","operation","buildOperation","persist","bootstrapSecretStorage","_arguments4","_this8","createSecretStorageKey","keyBackupInfo","setupNewKeyBackup","setupNewSecretStorage","getKeyBackupPassphrase","newKeyId","createSSSS","_ref6","opts","keyId","addKey","addPrivateKey","setDefaultKeyId","_x3","ensureCanCheckPassphrase","_ref7","mac","_this8$baseApis$crypt","_this8$baseApis$crypt2","iv","setAccountData","_x4","_x5","signKeyBackupWithCrossSigning","_ref8","keyBackupAuthData","_x6","oldSSSSKey","oldKeyId","oldKeyInfo","storageExists","name","backupKey","private_key_salt","private_key_iterations","bits","getCrossSigningKeysFromCache","info","prepareKeyBackupVersion","secureSecretStorage","recovery_key","data","sessionBackupKey","fixedBackupKey","decodedBackupKey","Uint8Array","addSessionBackupPrivateKeyToCache","resetKeyBackup","_this9","deleteAllKeyBackupVersions","version","http","authedRequest","Post","prefix","V3","storeSessionBackupPrivateKey","scheduleAllGroupSessionsForBackup","deleteKeyBackupVersion","_this10","addSecretStorageKey","keyID","hasSecretStorageKey","storeSecret","secret","getSecret","isSecretStored","isStored","requestSecret","request","getDefaultSecretStorageKeyId","getDefaultKeyId","setDefaultSecretStorageKeyId","k","checkSecretStorageKey","checkKey","checkSecretStoragePrivateKey","expectedPublicKey","gotPubkey","_decryption","_this11","encodedKey","Promise","resolve","getSecretStorePrivateKey","Buffer","decrypted","_this12","encryptedKey","storeSecretStorePrivateKey","loadSessionBackupPrivateKeyFromSecretStorage","getActiveSessionBackupVersion","_this13","_this13$backupManager","getKeyBackupInfo","isKeyBackupTrusted","_this14","trustInfo","checkKeyBackupAndEnable","_this15","checkResult","checkKeyBackup","checkCrossSigningPrivateKey","signing","PkSigning","init_with_seed","_signing","afterCrossSigningLocalKeyChange","_this16","signedDevice","upload","_ref9","shouldEmit","uploadKeySignatures","then","response","failures","KeySignatureUploadFailure","catch","shouldUpgradeCb","shouldUpgradeDeviceVerifications","users","upgradeInfo","checkForDeviceVerificationUpgrade","fromStorage","usersToUpgrade","setDeviceVerified","_this17","trustLevel","firstUse","isVerified","deviceIds","checkForValidDeviceSignature","map","_this18","signatures","signame","split","verifySignature","push","_unused","getCrossSigningKeyId","Master","getCrossSigningId","userCrossSigning","getUserVerificationStatus","_this19","pinCurrentUserIdentity","getDeviceVerificationStatus","_this20","checkDeviceInfoTrust","trustedLocally","trustCrossSig","checkIfOwnDeviceCrossSigned","_userCrossSigning$che","_arguments5","_this21","masterChanged","masterExistsNotLocallyCached","has","ret","_signing2","oldSelfSigningId","oldUserSigningId","selfSigningChanged","userSigningChanged","selfSigningExistsNotLocallyCached","userSigningExistsNotLocallyCached","keySignatures","_signing4","_signing6","deviceSig","assign","keysToUpload","_ref10","getBackupDecryptor","privKey","makeAlgorithm","keyMatches","reject","errcode","RESTORE_BACKUP_ERROR_BAD_KEY","importBackedUpRoomKeys","backupVersion","source","importRoomKeys","_this22","clearKeys","storeCrossSigningKeys","_this23","user_signing","includes","enableLazyLoading","lazyLoadMembers","registerEventHandlers","eventEmitter","Membership","onMembership","ToDeviceEvent","Timeline","onTimelineEvent","start","stop","getDeviceEd25519Key","getDeviceCurve25519Key","getOwnDeviceKeys","_this24","ed25519","curve25519","setGlobalBlacklistUnverifiedDevices","value","globalBlacklistUnverifiedDevices","getGlobalBlacklistUnverifiedDevices","uploadDeviceKeys","device_id","user_id","uploadKeysRequest","device_keys","getNeedsNewFallback","needsNewFallback","maybeUploadOneTimeKeys","_this25","uploadPeriod","maxKeysPerCycle","oneTimeKeyCheckInProgress","now","Date","lastOneTimeKeyCheck","maxOneTimeKeys","maxNumberOfOneTimeKeys","keyLimit","Math","floor","uploadLoop","_ref12","keyCount","keysThisLoop","min","generateOneTimeKeys","fallbackKeys","getFallbackKey","fallbackCleanup","clearTimeout","generateFallbackKey","res","uploadOneTimeKeys","one_time_key_counts","signed_curve25519","_x7","oneTimeKeyCount","stack","finally","_this26","promises","fallbackJson","fallback","oneTimeKeys","getOneTimeKeys","oneTimeJson","hasOwnProperty","all","requestBody","one_time_keys","setTimeout","forgetOldFallbackKey","markKeysAsPublished","userIds","forceDownload","getStoredDevicesForUser","getUserDeviceInfo","_arguments6","_this27","downloadUncached","deviceMapByUserId","usersWithoutDeviceInfo","_loop","_userId4","deviceInfos","deviceMap","newDeviceInfoMap","forEach","deviceInfoMap","saveDeviceList","delay","_arguments7","_this28","setDeviceVerification","crossSignDevice","_this29","_arguments8","_this30","blocked","xsk","gotKeyId","values","signUser","_ref14","_ref13","_x8","dev","verificationStatus","UNVERIFIED","BLOCKED","knownStatus","_ref16","_ref15","_x9","findVerificationRequestDMInProgress","roomId","findRequestInProgress","getVerificationRequestsToDeviceInProgress","getRequestsInProgress","requestVerificationDM","existingRequest","requestVerificationWithChannel","requestVerification","makeTransactionId","requestOwnUserVerification","requestDeviceVerification","requestsMap","_this31","transactionId","setRequestByChannel","sendRequest","racingRequest","getRequestByChannel","beginKeyVerification","getRequestBySenderAndTxnId","setRequestBySenderAndTxnId","legacyDeviceVerification","_this32","verifier","race","verify","waitFor","r","started","getOlmSessionsForUser","_this33","result","deviceKey","getIdentityKey","sessions","getSessionInfoForDevice","deviceIdKey","getEventSenderDeviceInfo","senderKey","getSenderKey","getWireContent","isKeySourceUntrusted","getDeviceByIdentityKey","claimedKey","getClaimedEd25519Key","getFingerprint","getEventEncryptionInfo","_event$getSenderKey","_this$deviceList$getD","encrypted","authenticated","sender","mismatchedSender","getEncryptionInfoForEvent","_this34","encryptionInfo","senderId","shieldColour","RED","shieldReason","MISMATCHED_SENDER_KEY","userTrust","GREY","AUTHENTICITY_NOT_GUARANTEED","NONE","eventSenderTrust","UNKNOWN_DEVICE","UNSIGNED_DEVICE","forceDiscardSession","alg","roomEncryptors","setRoomEncryption","config","inhibitDeviceQuery","_this35","getRoom","setRoomEncryptionImpl","refreshOutdatedDeviceLists","_this36","existingConfig","getRoomEncryption","JSON","stringify","existingAlg","storeConfigPromise","AlgClass","ENCRYPTION_CLASSES","crypto","membersLoaded","trackRoomDevicesImpl","onState","_state","off","Update","trackRoomDevices","_this37","trackMembers","_ref17","members","getEncryptionTargetMembers","m","promise","roomDeviceTrackingState","err","ensureOlmSessionsForUsers","force","devicesByUser","userDevices","ensureOlmSessionsForDevices","exportRoomKeys","_this38","exportedSessions","STORE_INBOUND_GROUP_SESSIONS","getAllEndToEndInboundGroupSessions","s","sess","exportInboundGroupSession","sessionId","sessionData","first_known_index","MEGOLM_ALGORITHM","exportRoomKeysAsJson","_this39","successes","total","updateProgress","_opts$progressCallbac","progressCallback","stage","room_id","getRoomDecryptor","importRoomKey","importRoomKeysAsJson","_this40","parse","countSessionsNeedingBackup","prepareToEncrypt","encryptEvent","_this41","content","mRelatesTo","elementPerfMetrics","encryptedContent","encryptMessage","makeEncrypted","decryptEvent","_this42","isRedacted","redactionEvent","_objectSpread","getUnsigned","redacted_because","redactedBecause","isEncrypted","decryptedEvent","clearEvent","unsigned","processDeviceLists","deviceLists","_this43","evalDeviceListChanges","requestRoomKey","recipients","resend","queueRoomKeyRequest","sendKeyRequestsImmediately","sendQueuedRequests","cancelRoomKeyRequest","cancelAndResendAllOutgoingKeyRequests","_this44","cancelAndResendAllOutgoingRequests","onCryptoEvent","_this45","onSyncWillProcess","syncData","_this46","oldSyncToken","stopTrackingAllDeviceLists","onSyncCompleted","_this47","_syncData$nextSyncTok","setSyncToken","nextSyncToken","catchingUp","processReceivedRoomKeyRequests","_this48","isArray","u","invalidateUserDeviceList","left","e2eUserIds","Set","getTrackedE2eUsers","stopTrackingDeviceList","_this49","getTrackedE2eRooms","getRooms","filter","myMembership","getMyMembership","Join","Invite","encryptAndSendToDevices","userDeviceInfoArr","payload","_this50","toDeviceBatch","prepareToDeviceBatch","queueToDevice","_this51","eventType","RoomMessageEncrypted","batch","_ref19","_ref18","OLM_ALGORITHM","sender_key","ciphertext","encryptMessageForDevice","_x10","msg","encryptToDeviceMessages","_this52","_ref20","_ref21","preprocessToDeviceMessages","events","toDevice","_toDevice$content","updateOneTimeKeyCount","currentCount","isFinite","TypeError","processKeyCounts","oneTimeKeysCounts","unusedFallbackKeys","checkedForBackup","code","session_id","reason","roomDecryptors","getRoomDecryptors","decryptor","retryDecryptionFromSender","canCreateRequest","getEventType","from_device","_arguments9","_this53","isLiveEvent","isSending","status","SENT","eventIdListener","statusListener","CANCELLED","LocalEventIdReplaced","Status","removeListener","getRequest","isNewRequest","setRequest","setVerificationRequest","handleEvent","initiatedByMe","invalid","observeOnly","_this54","UndecryptableToDeviceEvent","retryDecryption","forceNewSessionRetryTimeDevices","forceNewSessionRetryTime","getOrCreate","toUTCString","recordSessionProblem","sendToDevice","requestsToResend","getOutgoingSentRoomKeyRequest","keyReq","_this$clientStore$get","membership","shouldEncryptForInvitedMembers","action","req","IncomingRoomKeyRequest","receivedRoomKeyRequests","IncomingRoomKeyRequestCancellation","receivedRoomKeyRequestCancellations","_this55","processingRoomKeyRequests","requests","cancellations","processReceivedRoomKeyRequest","cancellation","processReceivedRoomKeyRequestCancellation","_this56","body","requestId","encryptor","reshareKeyWithDevice","hasKeysForKeyRequest","share","shareKeysWithDevice","RoomKeyRequest","_this57","RoomKeyRequestCancellation","decryptors","UNKNOWN_ENCRYPTION_ALGORITHM","d","obj","_this58","sigs","userSignatures","sign","isRoomEncrypted","isEncryptionEnabledInRoom","_this59","isDehydrationSupported","startDehydration","createNewKey","restoreKeyBackup","restoreKeyBackupWithPassphrase","indexOf","x","parseInt","requesting_device_id","request_id"],"sources":["../../src/crypto/index.ts"],"sourcesContent":["/*\nCopyright 2016 OpenMarket Ltd\nCopyright 2017 Vector Creations Ltd\nCopyright 2018-2019 New Vector Ltd\nCopyright 2019-2021 The Matrix.org Foundation C.I.C.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n*/\n\nimport anotherjson from \"another-json\";\nimport { v4 as uuidv4 } from \"uuid\";\n\nimport type { IDeviceKeys, IEventDecryptionResult, IMegolmSessionData, IOneTimeKey } from \"../@types/crypto.ts\";\nimport type { PkDecryption, PkSigning } from \"@matrix-org/olm\";\nimport { EventType, ToDeviceMessageId } from \"../@types/event.ts\";\nimport { TypedReEmitter } from \"../ReEmitter.ts\";\nimport { logger } from \"../logger.ts\";\nimport { IExportedDevice, OlmDevice } from \"./OlmDevice.ts\";\nimport { IOlmDevice } from \"./algorithms/megolm.ts\";\nimport * as olmlib from \"./olmlib.ts\";\nimport { DeviceInfoMap, DeviceList } from \"./DeviceList.ts\";\nimport { DeviceInfo, IDevice } from \"./deviceinfo.ts\";\nimport type { DecryptionAlgorithm, EncryptionAlgorithm } from \"./algorithms/index.ts\";\nimport * as algorithms from \"./algorithms/index.ts\";\nimport { createCryptoStoreCacheCallbacks, CrossSigningInfo, DeviceTrustLevel, UserTrustLevel } from \"./CrossSigning.ts\";\nimport { EncryptionSetupBuilder } from \"./EncryptionSetup.ts\";\nimport { SecretStorage as LegacySecretStorage } from \"./SecretStorage.ts\";\nimport { CrossSigningKey, ICreateSecretStorageOpts, IEncryptedEventInfo, IRecoveryKey } from \"./api.ts\";\nimport { OutgoingRoomKeyRequestManager } from \"./OutgoingRoomKeyRequestManager.ts\";\nimport { IndexedDBCryptoStore } from \"./store/indexeddb-crypto-store.ts\";\nimport { VerificationBase } from \"./verification/Base.ts\";\nimport { ReciprocateQRCode, SCAN_QR_CODE_METHOD, SHOW_QR_CODE_METHOD } from \"./verification/QRCode.ts\";\nimport { SAS as SASVerification } from \"./verification/SAS.ts\";\nimport { keyFromPassphrase } from \"./key_passphrase.ts\";\nimport { VerificationRequest } from \"./verification/request/VerificationRequest.ts\";\nimport { InRoomChannel, InRoomRequests } from \"./verification/request/InRoomChannel.ts\";\nimport { Request, ToDeviceChannel, ToDeviceRequests } from \"./verification/request/ToDeviceChannel.ts\";\nimport { IllegalMethod } from \"./verification/IllegalMethod.ts\";\nimport { KeySignatureUploadError } from \"../errors.ts\";\nimport { DehydrationManager } from \"./dehydration.ts\";\nimport { BackupManager, LibOlmBackupDecryptor, backupTrustInfoFromLegacyTrustInfo } from \"./backup.ts\";\nimport { IStore } from \"../store/index.ts\";\nimport { Room, RoomEvent } from \"../models/room.ts\";\nimport { RoomMember, RoomMemberEvent } from \"../models/room-member.ts\";\nimport { EventStatus, IContent, IEvent, MatrixEvent, MatrixEventEvent } from \"../models/event.ts\";\nimport { ToDeviceBatch, ToDevicePayload } from \"../models/ToDeviceMessage.ts\";\nimport { ClientEvent, IKeysUploadResponse, ISignedKey, IUploadKeySignaturesResponse, MatrixClient } from \"../client.ts\";\nimport { IRoomEncryption, RoomList } from \"./RoomList.ts\";\nimport { IKeyBackupInfo } from \"./keybackup.ts\";\nimport { ISyncStateData } from \"../sync.ts\";\nimport { CryptoStore } from \"./store/base.ts\";\nimport { IVerificationChannel } from \"./verification/request/Channel.ts\";\nimport { TypedEventEmitter } from \"../models/typed-event-emitter.ts\";\nimport { IDeviceLists, ISyncResponse, IToDeviceEvent } from \"../sync-accumulator.ts\";\nimport { ISignatures } from \"../@types/signed.ts\";\nimport { IMessage } from \"./algorithms/olm.ts\";\nimport {\n BackupDecryptor,\n CryptoBackend,\n DecryptionError,\n OnSyncCompletedData,\n} from \"../common-crypto/CryptoBackend.ts\";\nimport { RoomState, RoomStateEvent } from \"../models/room-state.ts\";\nimport { MapWithDefault, recursiveMapToObject } from \"../utils.ts\";\nimport {\n AccountDataClient,\n AddSecretStorageKeyOpts,\n calculateKeyCheck,\n SECRET_STORAGE_ALGORITHM_V1_AES,\n SecretStorageKeyDescription,\n SecretStorageKeyObject,\n SecretStorageKeyTuple,\n ServerSideSecretStorageImpl,\n} from \"../secret-storage.ts\";\nimport { ISecretRequest } from \"./SecretSharing.ts\";\nimport {\n BackupTrustInfo,\n BootstrapCrossSigningOpts,\n CrossSigningKeyInfo,\n CrossSigningStatus,\n decodeRecoveryKey,\n DecryptionFailureCode,\n DeviceIsolationMode,\n DeviceVerificationStatus,\n encodeRecoveryKey,\n EventEncryptionInfo,\n EventShieldColour,\n EventShieldReason,\n ImportRoomKeysOpts,\n KeyBackupCheck,\n KeyBackupInfo,\n OwnDeviceKeys,\n CryptoEvent as CryptoApiCryptoEvent,\n CryptoEventHandlerMap as CryptoApiCryptoEventHandlerMap,\n KeyBackupRestoreResult,\n KeyBackupRestoreOpts,\n} from \"../crypto-api/index.ts\";\nimport { Device, DeviceMap } from \"../models/device.ts\";\nimport { deviceInfoToDevice } from \"./device-converter.ts\";\nimport { ClientPrefix, MatrixError, Method } from \"../http-api/index.ts\";\nimport { decodeBase64, encodeBase64 } from \"../base64.ts\";\nimport { KnownMembership } from \"../@types/membership.ts\";\nimport decryptAESSecretStorageItem from \"../utils/decryptAESSecretStorageItem.ts\";\nimport encryptAESSecretStorageItem from \"../utils/encryptAESSecretStorageItem.ts\";\nimport { AESEncryptedSecretStoragePayload } from \"../@types/AESEncryptedSecretStoragePayload.ts\";\n\n/* re-exports for backwards compatibility */\nexport type {\n BootstrapCrossSigningOpts as IBootstrapCrossSigningOpts,\n CryptoCallbacks as ICryptoCallbacks,\n} from \"../crypto-api/index.ts\";\n\nconst DeviceVerification = DeviceInfo.DeviceVerification;\n\nconst defaultVerificationMethods = {\n [ReciprocateQRCode.NAME]: ReciprocateQRCode,\n [SASVerification.NAME]: SASVerification,\n\n // These two can't be used for actual verification, but we do\n // need to be able to define them here for the verification flows\n // to start.\n [SHOW_QR_CODE_METHOD]: IllegalMethod,\n [SCAN_QR_CODE_METHOD]: IllegalMethod,\n} as const;\n\n/**\n * verification method names\n */\n// legacy export identifier\nexport const verificationMethods = {\n RECIPROCATE_QR_CODE: ReciprocateQRCode.NAME,\n SAS: SASVerification.NAME,\n} as const;\n\nexport type VerificationMethod = keyof typeof verificationMethods | string;\n\n// minimum time between attempting to unwedge an Olm session, if we succeeded\n// in creating a new session\nconst MIN_FORCE_SESSION_INTERVAL_MS = 60 * 60 * 1000; // 1 hour\n// minimum time between attempting to unwedge an Olm session, if we failed\n// to create a new session\nconst FORCE_SESSION_RETRY_INTERVAL_MS = 5 * 60 * 1000; // 5 minutes\n\ninterface IInitOpts {\n exportedOlmDevice?: IExportedDevice;\n pickleKey?: string;\n}\n\n/* eslint-disable camelcase */\ninterface IRoomKey {\n room_id: string;\n algorithm: string;\n}\n\n/**\n * The parameters of a room key request. The details of the request may\n * vary with the crypto algorithm, but the management and storage layers for\n * outgoing requests expect it to have 'room_id' and 'session_id' properties.\n */\nexport interface IRoomKeyRequestBody extends IRoomKey {\n session_id: string;\n sender_key: string;\n}\n\n/* eslint-enable camelcase */\n\ninterface IDeviceVerificationUpgrade {\n devices: DeviceInfo[];\n crossSigningInfo: CrossSigningInfo;\n}\n\nexport interface ICheckOwnCrossSigningTrustOpts {\n allowPrivateKeyRequests?: boolean;\n}\n\ninterface IUserOlmSession {\n deviceIdKey: string;\n sessions: {\n sessionId: string;\n hasReceivedMessage: boolean;\n }[];\n}\n\nexport interface IRoomKeyRequestRecipient {\n userId: string;\n deviceId: string;\n}\n\ninterface ISignableObject {\n signatures?: ISignatures;\n unsigned?: object;\n}\n\nexport interface IRequestsMap {\n getRequest(event: MatrixEvent): VerificationRequest | undefined;\n getRequestByChannel(channel: IVerificationChannel): VerificationRequest | undefined;\n setRequest(event: MatrixEvent, request: VerificationRequest): void;\n setRequestByChannel(channel: IVerificationChannel, request: VerificationRequest): void;\n}\n\n/* eslint-disable camelcase */\nexport interface IOlmEncryptedContent {\n algorithm: typeof olmlib.OLM_ALGORITHM;\n sender_key: string;\n ciphertext: Record<string, IMessage>;\n [ToDeviceMessageId]?: string;\n}\n\nexport interface IMegolmEncryptedContent {\n algorithm: typeof olmlib.MEGOLM_ALGORITHM;\n sender_key: string;\n session_id: string;\n device_id: string;\n ciphertext: string;\n [ToDeviceMessageId]?: string;\n}\n/* eslint-enable camelcase */\n\nexport type IEncryptedContent = IOlmEncryptedContent | IMegolmEncryptedContent;\n\nexport enum CryptoEvent {\n /** @deprecated Event not fired by the rust crypto */\n DeviceVerificationChanged = \"deviceVerificationChanged\",\n UserTrustStatusChanged = CryptoApiCryptoEvent.UserTrustStatusChanged,\n /** @deprecated Event not fired by the rust crypto */\n UserCrossSigningUpdated = \"userCrossSigningUpdated\",\n /** @deprecated Event not fired by the rust crypto */\n RoomKeyRequest = \"crypto.roomKeyRequest\",\n /** @deprecated Event not fired by the rust crypto */\n RoomKeyRequestCancellation = \"crypto.roomKeyRequestCancellation\",\n KeyBackupStatus = CryptoApiCryptoEvent.KeyBackupStatus,\n KeyBackupFailed = CryptoApiCryptoEvent.KeyBackupFailed,\n KeyBackupSessionsRemaining = CryptoApiCryptoEvent.KeyBackupSessionsRemaining,\n\n /**\n * Fires when a new valid backup decryption key is in cache.\n * This will happen when a secret is received from another session, from secret storage,\n * or when a new backup is created from this session.\n *\n * The payload is the version of the backup for which we have the key for.\n *\n * This event is only fired by the rust crypto backend.\n */\n KeyBackupDecryptionKeyCached = CryptoApiCryptoEvent.KeyBackupDecryptionKeyCached,\n\n /** @deprecated Event not fired by the rust crypto */\n KeySignatureUploadFailure = \"crypto.keySignatureUploadFailure\",\n /** @deprecated Use `VerificationRequestReceived`. */\n VerificationRequest = \"crypto.verification.request\",\n\n /**\n * Fires when a key verification request is received.\n *\n * The payload is a {@link Crypto.VerificationRequest}.\n */\n VerificationRequestReceived = CryptoApiCryptoEvent.VerificationRequestReceived,\n\n /** @deprecated Event not fired by the rust crypto */\n Warning = \"crypto.warning\",\n /** @deprecated Use {@link DevicesUpdated} instead when using rust crypto */\n WillUpdateDevices = CryptoApiCryptoEvent.WillUpdateDevices,\n DevicesUpdated = CryptoApiCryptoEvent.DevicesUpdated,\n KeysChanged = CryptoApiCryptoEvent.KeysChanged,\n\n /**\n * Fires when data is being migrated from legacy crypto to rust crypto.\n *\n * The payload is a pair `(progress, total)`, where `progress` is the number of steps completed so far, and\n * `total` is the total number of steps. When migration is complete, a final instance of the event is emitted, with\n * `progress === total === -1`.\n */\n LegacyCryptoStoreMigrationProgress = CryptoApiCryptoEvent.LegacyCryptoStoreMigrationProgress,\n}\n\nexport type CryptoEventHandlerMap = CryptoApiCryptoEventHandlerMap & {\n /**\n * Fires when a device is marked as verified/unverified/blocked/unblocked by\n * {@link MatrixClient#setDeviceVerified | MatrixClient.setDeviceVerified} or\n * {@link MatrixClient#setDeviceBlocked | MatrixClient.setDeviceBlocked}.\n *\n * @param userId - the owner of the verified device\n * @param deviceId - the id of the verified device\n * @param deviceInfo - updated device information\n */\n [CryptoEvent.DeviceVerificationChanged]: (userId: string, deviceId: string, deviceInfo: DeviceInfo) => void;\n /**\n * Fires when we receive a room key request\n *\n * @param request - request details\n */\n [CryptoEvent.RoomKeyRequest]: (request: IncomingRoomKeyRequest) => void;\n /**\n * Fires when we receive a room key request cancellation\n */\n [CryptoEvent.RoomKeyRequestCancellation]: (request: IncomingRoomKeyRequestCancellation) => void;\n [CryptoEvent.KeySignatureUploadFailure]: (\n failures: IUploadKeySignaturesResponse[\"failures\"],\n source: \"checkOwnCrossSigningTrust\" | \"afterCrossSigningLocalKeyChange\" | \"setDeviceVerification\",\n upload: (opts: { shouldEmit: boolean }) => Promise<void>,\n ) => void;\n /**\n * Fires when a key verification is requested.\n *\n * Deprecated: use `CryptoEvent.VerificationRequestReceived`.\n */\n [CryptoEvent.VerificationRequest]: (request: VerificationRequest<any>) => void;\n /**\n * Fires when the app may wish to warn the user about something related\n * the end-to-end crypto.\n *\n * @param type - One of the strings listed above\n */\n [CryptoEvent.Warning]: (type: string) => void;\n [CryptoEvent.UserCrossSigningUpdated]: (userId: string) => void;\n\n [CryptoEvent.LegacyCryptoStoreMigrationProgress]: (progress: number, total: number) => void;\n};\n\nexport class Crypto extends TypedEventEmitter<CryptoEvent, CryptoEventHandlerMap> implements CryptoBackend {\n /**\n * @returns The version of Olm.\n */\n public static getOlmVersion(): [number, number, number] {\n return OlmDevice.getOlmVersion();\n }\n\n public readonly backupManager: BackupManager;\n public readonly crossSigningInfo: CrossSigningInfo;\n public readonly olmDevice: OlmDevice;\n public readonly deviceList: DeviceList;\n public readonly dehydrationManager: DehydrationManager;\n public readonly secretStorage: LegacySecretStorage;\n\n private readonly roomList: RoomList;\n private readonly reEmitter: TypedReEmitter<CryptoEvent, CryptoEventHandlerMap>;\n private readonly verificationMethods: Map<VerificationMethod, typeof VerificationBase>;\n public readonly supportedAlgorithms: string[];\n private readonly outgoingRoomKeyRequestManager: OutgoingRoomKeyRequestManager;\n private readonly toDeviceVerificationRequests: ToDeviceRequests;\n public readonly inRoomVerificationRequests: InRoomRequests;\n\n private trustCrossSignedDevices = true;\n // the last time we did a check for the number of one-time-keys on the server.\n private lastOneTimeKeyCheck: number | null = null;\n private oneTimeKeyCheckInProgress = false;\n\n // EncryptionAlgorithm instance for each room\n private roomEncryptors = new Map<string, EncryptionAlgorithm>();\n // map from algorithm to DecryptionAlgorithm instance, for each room\n private roomDecryptors = new Map<string, Map<string, DecryptionAlgorithm>>();\n\n private deviceKeys: Record<string, string> = {}; // type: key\n\n public globalBlacklistUnverifiedDevices = false;\n public globalErrorOnUnknownDevices = true;\n\n // list of IncomingRoomKeyRequests/IncomingRoomKeyRequestCancellations\n // we received in the current sync.\n private receivedRoomKeyRequests: IncomingRoomKeyRequest[] = [];\n private receivedRoomKeyRequestCancellations: IncomingRoomKeyRequestCancellation[] = [];\n // true if we are currently processing received room key requests\n private processingRoomKeyRequests = false;\n // controls whether device tracking is delayed\n // until calling encryptEvent or trackRoomDevices,\n // or done immediately upon enabling room encryption.\n private lazyLoadMembers = false;\n // in case lazyLoadMembers is true,\n // track if an initial tracking of all the room members\n // has happened for a given room. This is delayed\n // to avoid loading room members as long as possible.\n private roomDeviceTrackingState: { [roomId: string]: Promise<void> } = {};\n\n // The timestamp of the minimum time at which we will retry forcing establishment\n // of a new session for each device, in milliseconds.\n // {\n // userId: {\n // deviceId: 1234567890000,\n // },\n // }\n // Map: user Id → device Id → timestamp\n private forceNewSessionRetryTime: MapWithDefault<string, MapWithDefault<string, number>> = new MapWithDefault(\n () => new MapWithDefault(() => 0),\n );\n\n // This flag will be unset whilst the client processes a sync response\n // so that we don't start requesting keys until we've actually finished\n // processing the response.\n private sendKeyRequestsImmediately = false;\n\n private oneTimeKeyCount?: number;\n private needsNewFallback?: boolean;\n private fallbackCleanup?: ReturnType<typeof setTimeout>;\n\n /**\n * Cryptography bits\n *\n * This module is internal to the js-sdk; the public API is via MatrixClient.\n *\n * @internal\n *\n * @param baseApis - base matrix api interface\n *\n * @param userId - The user ID for the local user\n *\n * @param deviceId - The identifier for this device.\n *\n * @param clientStore - the MatrixClient data store.\n *\n * @param cryptoStore - storage for the crypto layer.\n *\n * @param verificationMethods - Array of verification methods to use.\n * Each element can either be a string from MatrixClient.verificationMethods\n * or a class that implements a verification method.\n */\n public constructor(\n public readonly baseApis: MatrixClient,\n public readonly userId: string,\n private readonly deviceId: string,\n private readonly clientStore: IStore,\n public readonly cryptoStore: CryptoStore,\n verificationMethods: Array<VerificationMethod | (typeof VerificationBase & { NAME: string })>,\n ) {\n super();\n\n logger.debug(\"Crypto: initialising roomlist...\");\n this.roomList = new RoomList(cryptoStore);\n\n this.reEmitter = new TypedReEmitter(this);\n\n if (verificationMethods) {\n this.verificationMethods = new Map();\n for (const method of verificationMethods) {\n if (typeof method === \"string\") {\n if (defaultVerificationMethods[method]) {\n this.verificationMethods.set(\n method,\n <typeof VerificationBase>defaultVerificationMethods[method],\n );\n }\n } else if (method[\"NAME\"]) {\n this.verificationMethods.set(method[\"NAME\"], method as typeof VerificationBase);\n } else {\n logger.warn(`Excluding unknown verification method ${method}`);\n }\n }\n } else {\n this.verificationMethods = new Map(Object.entries(defaultVerificationMethods)) as Map<\n VerificationMethod,\n typeof VerificationBase\n >;\n }\n\n this.backupManager = new BackupManager(baseApis, async () => {\n // try to get key from cache\n const cachedKey = await this.getSessionBackupPrivateKey();\n if (cachedKey) {\n return cachedKey;\n }\n\n // try to get key from secret storage\n const storedKey = await this.secretStorage.get(\"m.megolm_backup.v1\");\n\n if (storedKey) {\n // ensure that the key is in the right format. If not, fix the key and\n // store the fixed version\n const fixedKey = fixBackupKey(storedKey);\n if (fixedKey) {\n const keys = await this.secretStorage.getKey();\n await this.secretStorage.store(\"m.megolm_backup.v1\", fixedKey, [keys![0]]);\n }\n\n return decodeBase64(fixedKey || storedKey);\n }\n\n // try to get key from app\n if (this.baseApis.cryptoCallbacks && this.baseApis.cryptoCallbacks.getBackupKey) {\n return this.baseApis.cryptoCallbacks.getBackupKey();\n }\n\n throw new Error(\"Unable to get private key\");\n });\n\n this.olmDevice = new OlmDevice(cryptoStore);\n this.deviceList = new DeviceList(baseApis, cryptoStore, this.olmDevice);\n\n // XXX: This isn't removed at any point, but then none of the event listeners\n // this class sets seem to be removed at any point... :/\n this.deviceList.on(CryptoEvent.UserCrossSigningUpdated, this.onDeviceListUserCrossSigningUpdated);\n this.reEmitter.reEmit(this.deviceList, [CryptoEvent.DevicesUpdated, CryptoEvent.WillUpdateDevices]);\n\n this.supportedAlgorithms = Array.from(algorithms.DECRYPTION_CLASSES.keys());\n\n this.outgoingRoomKeyRequestManager = new OutgoingRoomKeyRequestManager(\n baseApis,\n this.deviceId,\n this.cryptoStore,\n );\n\n this.toDeviceVerificationRequests = new ToDeviceRequests();\n this.inRoomVerificationRequests = new InRoomRequests();\n\n const cryptoCallbacks = this.baseApis.cryptoCallbacks || {};\n const cacheCallbacks = createCryptoStoreCacheCallbacks(cryptoStore, this.olmDevice);\n\n this.crossSigningInfo = new CrossSigningInfo(userId, cryptoCallbacks, cacheCallbacks);\n // Yes, we pass the client twice here: see SecretStorage\n this.secretStorage = new LegacySecretStorage(baseApis as AccountDataClient, cryptoCallbacks, baseApis);\n this.dehydrationManager = new DehydrationManager(this);\n\n // Assuming no app-supplied callback, default to getting from SSSS.\n if (!cryptoCallbacks.getCrossSigningKey && cryptoCallbacks.getSecretStorageKey) {\n cryptoCallbacks.getCrossSigningKey = async (type): Promise<Uint8Array | null> => {\n return CrossSigningInfo.getFromSecretStorage(type, this.secretStorage);\n };\n }\n }\n\n /**\n * Initialise the crypto module so that it is ready for use\n *\n * Returns a promise which resolves once the crypto module is ready for use.\n *\n * @param exportedOlmDevice - (Optional) data from exported device\n * that must be re-created.\n */\n public async init({ exportedOlmDevice, pickleKey }: IInitOpts = {}): Promise<void> {\n logger.log(\"Crypto: initialising Olm...\");\n await globalThis.Olm.init();\n logger.log(\n exportedOlmDevice\n ? \"Crypto: initialising Olm device from exported device...\"\n : \"Crypto: initialising Olm device...\",\n );\n await this.olmDevice.init({ fromExportedDevice: exportedOlmDevice, pickleKey });\n logger.log(\"Crypto: loading device list...\");\n await this.deviceList.load();\n\n // build our device keys: these will later be uploaded\n this.deviceKeys[\"ed25519:\" + this.deviceId] = this.olmDevice.deviceEd25519Key!;\n this.deviceKeys[\"curve25519:\" + this.deviceId] = this.olmDevice.deviceCurve25519Key!;\n\n logger.log(\"Crypto: fetching own devices...\");\n let myDevices = this.deviceList.getRawStoredDevicesForUser(this.userId);\n\n if (!myDevices) {\n myDevices = {};\n }\n\n if (!myDevices[this.deviceId]) {\n // add our own deviceinfo to the cryptoStore\n logger.log(\"Crypto: adding this device to the store...\");\n const deviceInfo = {\n keys: this.deviceKeys,\n algorithms: this.supportedAlgorithms,\n verified: DeviceVerification.VERIFIED,\n known: true,\n };\n\n myDevices[this.deviceId] = deviceInfo;\n this.deviceList.storeDevicesForUser(this.userId, myDevices);\n this.deviceList.saveIfDirty();\n }\n\n await this.cryptoStore.doTxn(\"readonly\", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {\n this.cryptoStore.getCrossSigningKeys(txn, (keys) => {\n // can be an empty object after resetting cross-signing keys, see storeTrustedSelfKeys\n if (keys && Object.keys(keys).length !== 0) {\n logger.log(\"Loaded cross-signing public keys from crypto store\");\n this.crossSigningInfo.setKeys(keys);\n }\n });\n });\n // make sure we are keeping track of our own devices\n // (this is important for key backups & things)\n this.deviceList.startTrackingDeviceList(this.userId);\n\n logger.debug(\"Crypto: initialising roomlist...\");\n await this.roomList.init();\n\n logger.log(\"Crypto: checking for key backup...\");\n this.backupManager.checkAndStart();\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#setDeviceIsolationMode}.\n */\n public setDeviceIsolationMode(isolationMode: DeviceIsolationMode): void {\n throw new Error(\"Not supported\");\n }\n /**\n * Implementation of {@link Crypto.CryptoApi#getVersion}.\n */\n public getVersion(): string {\n const olmVersionTuple = Crypto.getOlmVersion();\n return `Olm ${olmVersionTuple[0]}.${olmVersionTuple[1]}.${olmVersionTuple[2]}`;\n }\n\n /**\n * Whether to trust a others users signatures of their devices.\n * If false, devices will only be considered 'verified' if we have\n * verified that device individually (effectively disabling cross-signing).\n *\n * Default: true\n *\n * @returns True if trusting cross-signed devices\n */\n public getTrustCrossSignedDevices(): boolean {\n return this.trustCrossSignedDevices;\n }\n\n /**\n * @deprecated Use {@link Crypto.CryptoApi#getTrustCrossSignedDevices}.\n */\n public getCryptoTrustCrossSignedDevices(): boolean {\n return this.trustCrossSignedDevices;\n }\n\n /**\n * See getCryptoTrustCrossSignedDevices\n *\n * @param val - True to trust cross-signed devices\n */\n public setTrustCrossSignedDevices(val: boolean): void {\n this.trustCrossSignedDevices = val;\n\n for (const userId of this.deviceList.getKnownUserIds()) {\n const devices = this.deviceList.getRawStoredDevicesForUser(userId);\n for (const deviceId of Object.keys(devices)) {\n const deviceTrust = this.checkDeviceTrust(userId, deviceId);\n // If the device is locally verified then isVerified() is always true,\n // so this will only have caused the value to change if the device is\n // cross-signing verified but not locally verified\n if (!deviceTrust.isLocallyVerified() && deviceTrust.isCrossSigningVerified()) {\n const deviceObj = this.deviceList.getStoredDevice(userId, deviceId)!;\n this.emit(CryptoEvent.DeviceVerificationChanged, userId, deviceId, deviceObj);\n }\n }\n }\n }\n\n /**\n * @deprecated Use {@link Crypto.CryptoApi#setTrustCrossSignedDevices}.\n */\n public setCryptoTrustCrossSignedDevices(val: boolean): void {\n this.setTrustCrossSignedDevices(val);\n }\n\n /**\n * Create a recovery key from a user-supplied passphrase.\n *\n * @param password - Passphrase string that can be entered by the user\n * when restoring the backup as an alternative to entering the recovery key.\n * Optional.\n * @returns Object with public key metadata, encoded private\n * recovery key which should be disposed of after displaying to the user,\n * and raw private key to avoid round tripping if needed.\n */\n public async createRecoveryKeyFromPassphrase(password?: string): Promise<IRecoveryKey> {\n const decryption = new globalThis.Olm.PkDecryption();\n try {\n if (password) {\n const derivation = await keyFromPassphrase(password);\n\n decryption.init_with_private_key(derivation.key);\n const privateKey = decryption.get_private_key();\n return {\n keyInfo: {\n passphrase: {\n algorithm: \"m.pbkdf2\",\n iterations: derivation.iterations,\n salt: derivation.salt,\n },\n },\n privateKey: privateKey,\n encodedPrivateKey: encodeRecoveryKey(privateKey),\n };\n } else {\n decryption.generate_key();\n const privateKey = decryption.get_private_key();\n return {\n privateKey: privateKey,\n encodedPrivateKey: encodeRecoveryKey(privateKey),\n };\n }\n } finally {\n decryption?.free();\n }\n }\n\n /**\n * Checks if the user has previously published cross-signing keys\n *\n * This means downloading the devicelist for the user and checking if the list includes\n * the cross-signing pseudo-device.\n *\n * @internal\n */\n public async userHasCrossSigningKeys(userId = this.userId): Promise<boolean> {\n await this.downloadKeys([userId]);\n return this.deviceList.getStoredCrossSigningForUser(userId) !== null;\n }\n\n /**\n * Checks whether cross signing:\n * - is enabled on this account and trusted by this device\n * - has private keys either cached locally or stored in secret storage\n *\n * If this function returns false, bootstrapCrossSigning() can be used\n * to fix things such that it returns true. That is to say, after\n * bootstrapCrossSigning() completes successfully, this function should\n * return true.\n *\n * The cross-signing API is currently UNSTABLE and may change without notice.\n *\n * @returns True if cross-signing is ready to be used on this device\n */\n public async isCrossSigningReady(): Promise<boolean> {\n const publicKeysOnDevice = this.crossSigningInfo.getId();\n const privateKeysExistSomewhere =\n (await this.crossSigningInfo.isStoredInKeyCache()) ||\n (await this.crossSigningInfo.isStoredInSecretStorage(this.secretStorage));\n\n return !!(publicKeysOnDevice && privateKeysExistSomewhere);\n }\n\n /**\n * Checks whether secret storage:\n * - is enabled on this account\n * - is storing cross-signing private keys\n * - is storing session backup key (if enabled)\n *\n * If this function returns false, bootstrapSecretStorage() can be used\n * to fix things such that it returns true. That is to say, after\n * bootstrapSecretStorage() completes successfully, this function should\n * return true.\n *\n * The Secure Secret Storage API is currently UNSTABLE and may change without notice.\n *\n * @returns True if secret storage is ready to be used on this device\n */\n public async isSecretStorageReady(): Promise<boolean> {\n const secretStorageKeyInAccount = await this.secretStorage.hasKey();\n const privateKeysInStorage = await this.crossSigningInfo.isStoredInSecretStorage(this.secretStorage);\n const sessionBackupInStorage =\n !this.backupManager.getKeyBackupEnabled() || (await this.baseApis.isKeyBackupKeyStored());\n\n return !!(secretStorageKeyInAccount && privateKeysInStorage && sessionBackupInStorage);\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#getCrossSigningStatus}\n */\n public async getCrossSigningStatus(): Promise<CrossSigningStatus> {\n const publicKeysOnDevice = Boolean(this.crossSigningInfo.getId());\n const privateKeysInSecretStorage = Boolean(\n await this.crossSigningInfo.isStoredInSecretStorage(this.secretStorage),\n );\n const cacheCallbacks = this.crossSigningInfo.getCacheCallbacks();\n const masterKey = Boolean(await cacheCallbacks.getCrossSigningKeyCache?.(\"master\"));\n const selfSigningKey = Boolean(await cacheCallbacks.getCrossSigningKeyCache?.(\"self_signing\"));\n const userSigningKey = Boolean(await cacheCallbacks.getCrossSigningKeyCache?.(\"user_signing\"));\n\n return {\n publicKeysOnDevice,\n privateKeysInSecretStorage,\n privateKeysCachedLocally: {\n masterKey,\n selfSigningKey,\n userSigningKey,\n },\n };\n }\n\n /**\n * Bootstrap cross-signing by creating keys if needed. If everything is already\n * set up, then no changes are made, so this is safe to run to ensure\n * cross-signing is ready for use.\n *\n * This function:\n * - creates new cross-signing keys if they are not found locally cached nor in\n * secret storage (if it has been setup)\n *\n * The cross-signing API is currently UNSTABLE and may change without notice.\n */\n public async bootstrapCrossSigning({\n authUploadDeviceSigningKeys,\n setupNewCrossSigning,\n }: BootstrapCrossSigningOpts = {}): Promise<void> {\n logger.log(\"Bootstrapping cross-signing\");\n\n const delegateCryptoCallbacks = this.baseApis.cryptoCallbacks;\n const builder = new EncryptionSetupBuilder(this.baseApis.store.accountData, delegateCryptoCallbacks);\n const crossSigningInfo = new CrossSigningInfo(\n this.userId,\n builder.crossSigningCallbacks,\n builder.crossSigningCallbacks,\n );\n\n // Reset the cross-signing keys\n const resetCrossSigning = async (): Promise<void> => {\n crossSigningInfo.resetKeys();\n // Sign master key with device key\n await this.signObject(crossSigningInfo.keys.master);\n\n // Store auth flow helper function, as we need to call it when uploading\n // to ensure we handle auth errors properly.\n builder.addCrossSigningKeys(authUploadDeviceSigningKeys, crossSigningInfo.keys);\n\n // Cross-sign own device\n const device = this.deviceList.getStoredDevice(this.userId, this.deviceId)!;\n const deviceSignature = await crossSigningInfo.signDevice(this.userId, device);\n builder.addKeySignature(this.userId, this.deviceId, deviceSignature!);\n\n // Sign message key backup with cross-signing master key\n if (this.backupManager.backupInfo) {\n await crossSigningInfo.signObject(this.backupManager.backupInfo.auth_data, \"master\");\n builder.addSessionBackup(this.backupManager.backupInfo);\n }\n };\n\n const publicKeysOnDevice = this.crossSigningInfo.getId();\n const privateKeysInCache = await this.crossSigningInfo.isStoredInKeyCache();\n const privateKeysInStorage = await this.crossSigningInfo.isStoredInSecretStorage(this.secretStorage);\n const privateKeysExistSomewhere = privateKeysInCache || privateKeysInStorage;\n\n // Log all relevant state for easier parsing of debug logs.\n logger.log({\n setupNewCrossSigning,\n publicKeysOnDevice,\n privateKeysInCache,\n privateKeysInStorage,\n privateKeysExistSomewhere,\n });\n\n if (!privateKeysExistSomewhere || setupNewCrossSigning) {\n logger.log(\"Cross-signing private keys not found locally or in secret storage, \" + \"creating new keys\");\n // If a user has multiple devices, it important to only call bootstrap\n // as part of some UI flow (and not silently during startup), as they\n // may have setup cross-signing on a platform which has not saved keys\n // to secret storage, and this would reset them. In such a case, you\n // should prompt the user to verify any existing devices first (and\n // request private keys from those devices) before calling bootstrap.\n await resetCrossSigning();\n } else if (publicKeysOnDevice && privateKeysInCache) {\n logger.log(\"Cross-signing public keys trusted and private keys found locally\");\n } else if (privateKeysInStorage) {\n logger.log(\n \"Cross-signing private keys not found locally, but they are available \" +\n \"in secret storage, reading storage and caching locally\",\n );\n await this.checkOwnCrossSigningTrust({\n allowPrivateKeyRequests: true,\n });\n }\n\n // Assuming no app-supplied callback, default to storing new private keys in\n // secret storage if it exists. If it does not, it is assumed this will be\n // done as part of setting up secret storage later.\n const crossSigningPrivateKeys = builder.crossSigningCallbacks.privateKeys;\n if (crossSigningPrivateKeys.size && !this.baseApis.cryptoCallbacks.saveCrossSigningKeys) {\n const secretStorage = new ServerSideSecretStorageImpl(\n builder.accountDataClientAdapter,\n builder.ssssCryptoCallbacks,\n );\n if (await secretStorage.hasKey()) {\n logger.log(\"Storing new cross-signing private keys in secret storage\");\n // This is writing to in-memory account data in\n // builder.accountDataClientAdapter so won't fail\n await CrossSigningInfo.storeInSecretStorage(crossSigningPrivateKeys, secretStorage);\n }\n }\n\n const operation = builder.buildOperation();\n await operation.apply(this);\n // This persists private keys and public keys as trusted,\n // only do this if apply succeeded for now as retry isn't in place yet\n await builder.persist(this);\n\n logger.log(\"Cross-signing ready\");\n }\n\n /**\n * Bootstrap Secure Secret Storage if needed by creating a default key. If everything is\n * already set up, then no changes are made, so this is safe to run to ensure secret\n * storage is ready for use.\n *\n * This function\n * - creates a new Secure Secret Storage key if no default key exists\n * - if a key backup exists, it is migrated to store the key in the Secret\n * Storage\n * - creates a backup if none exists, and one is requested\n * - migrates Secure Secret Storage to use the latest algorithm, if an outdated\n * algorithm is found\n *\n * The Secure Secret Storage API is currently UNSTABLE and may change without notice.\n *\n * Returns:\n * A promise which resolves to key creation data for\n * SecretStorage#addKey: an object with `passphrase` etc fields.\n */\n // TODO this does not resolve with what it says it does\n public async bootstrapSecretStorage({\n createSecretStorageKey = async (): Promise<IRecoveryKey> => ({}) as IRecoveryKey,\n keyBackupInfo,\n setupNewKeyBackup,\n setupNewSecretStorage,\n getKeyBackupPassphrase,\n }: ICreateSecretStorageOpts = {}): Promise<void> {\n logger.log(\"Bootstrapping Secure Secret Storage\");\n const delegateCryptoCallbacks = this.baseApis.cryptoCallbacks;\n const builder = new EncryptionSetupBuilder(this.baseApis.store.accountData, delegateCryptoCallbacks);\n const secretStorage = new ServerSideSecretStorageImpl(\n builder.accountDataClientAdapter,\n builder.ssssCryptoCallbacks,\n );\n\n // the ID of the new SSSS key, if we create one\n let newKeyId: string | null = null;\n\n // create a new SSSS key and set it as default\n const createSSSS = async (opts: AddSecretStorageKeyOpts): Promise<string> => {\n const { keyId, keyInfo } = await secretStorage.addKey(SECRET_STORAGE_ALGORITHM_V1_AES, opts);\n\n // make the private key available to encrypt 4S secrets\n builder.ssssCryptoCallbacks.addPrivateKey(keyId, keyInfo, opts.key);\n\n await secretStorage.setDefaultKeyId(keyId);\n return keyId;\n };\n\n const ensureCanCheckPassphrase = async (keyId: string, keyInfo: SecretStorageKeyDescription): Promise<void> => {\n if (!keyInfo.mac) {\n const key = await this.baseApis.cryptoCallbacks.getSecretStorageKey?.(\n { keys: { [keyId]: keyInfo } },\n \"\",\n );\n if (key) {\n const privateKey = key[1];\n builder.ssssCryptoCallbacks.addPrivateKey(keyId, keyInfo, privateKey);\n const { iv, mac } = await calculateKeyCheck(privateKey);\n keyInfo.iv = iv;\n keyInfo.mac = mac;\n\n await builder.setAccountData(`m.secret_storage.key.${keyId}`, keyInfo);\n }\n }\n };\n\n const signKeyBackupWithCrossSigning = async (keyBackupAuthData: IKeyBackupInfo[\"auth_data\"]): Promise<void> => {\n if (this.crossSigningInfo.getId() && (await this.crossSigningInfo.isStoredInKeyCache(\"master\"))) {\n try {\n logger.log(\"Adding cross-signing signature to key backup\");\n await this.crossSigningInfo.signObject(keyBackupAuthData, \"master\");\n } catch (e) {\n // This step is not critical (just helpful), so we catch here\n // and continue if it fails.\n logger.error(\"Signing key backup with cross-signing keys failed\", e);\n }\n } else {\n logger.warn(\"Cross-signing keys not available, skipping signature on key backup\");\n }\n };\n\n const oldSSSSKey = await this.secretStorage.getKey();\n const [oldKeyId, oldKeyInfo] = oldSSSSKey || [null, null];\n const storageExists =\n !setupNewSecretStorage && oldKeyInfo && oldKeyInfo.algorithm === SECRET_STORAGE_ALGORITHM_V1_AES;\n\n // Log all relevant state for easier parsing of debug logs.\n logger.log({\n keyBackupInfo,\n setupNewKeyBackup,\n setupNewSecretStorage,\n storageExists,\n oldKeyInfo,\n });\n\n if (!storageExists && !keyBackupInfo) {\n // either we don't have anything, or we've been asked to restart\n // from scratch\n logger.log(\"Secret storage does not exist, creating new storage key\");\n\n // if we already have a usable default SSSS key and aren't resetting\n // SSSS just use it. otherwise, create a new one\n // Note: we leave the old SSSS key in place: there could be other\n // secrets using it, in theory. We could move them to the new key but a)\n // that would mean we'd need to prompt for the old passphrase, and b)\n // it's not clear that would be the right thing to do anyway.\n const { keyInfo, privateKey } = await createSecretStorageKey();\n newKeyId = await createSSSS({ passphrase: keyInfo?.passphrase, key: privateKey, name: keyInfo?.name });\n } else if (!storageExists && keyBackupInfo) {\n // we have an existing backup, but no SSSS\n logger.log(\"Secret storage does not exist, using key backup key\");\n\n // if we have the backup key already cached, use it; otherwise use the\n // callback to prompt for the key\n const backupKey = (await this.getSessionBackupPrivateKey()) || (await getKeyBackupPassphrase?.());\n\n // create a new SSSS key and use the backup key as the new SSSS key\n const opts = { key: backupKey } as AddSecretStorageKeyOpts;\n\n if (keyBackupInfo.auth_data.private_key_salt && keyBackupInfo.auth_data.private_key_iterations) {\n // FIXME: ???\n opts.passphrase = {\n algorithm: \"m.pbkdf2\",\n iterations: keyBackupInfo.auth_data.private_key_iterations,\n salt: keyBackupInfo.auth_data.private_key_salt,\n bits: 256,\n };\n }\n\n newKeyId = await createSSSS(opts);\n\n // store the backup key in secret storage\n await secretStorage.store(\"m.megolm_backup.v1\", encodeBase64(backupKey!), [newKeyId]);\n\n // The backup is trusted because the user provided the private key.\n // Sign the backup with the cross-signing key so the key backup can\n // be trusted via cross-signing.\n await signKeyBackupWithCrossSigning(keyBackupInfo.auth_data);\n\n builder.addSessionBackup(keyBackupInfo);\n } else {\n // 4S is already set up\n logger.log(\"Secret storage exists\");\n\n if (oldKeyInfo && oldKeyInfo.algorithm === SECRET_STORAGE_ALGORITHM_V1_AES) {\n // make sure that the default key has the information needed to\n // check the passphrase\n await ensureCanCheckPassphrase(oldKeyId, oldKeyInfo);\n }\n }\n\n // If we have cross-signing private keys cached, store them in secret\n // storage if they are not there already.\n if (\n !this.baseApis.cryptoCallbacks.saveCrossSigningKeys &&\n (await this.isCrossSigningReady()) &&\n (newKeyId || !(await this.crossSigningInfo.isStoredInSecretStorage(secretStorage)))\n ) {\n logger.log(\"Copying cross-signing private keys from cache to secret storage\");\n const crossSigningPrivateKeys = await this.crossSigningInfo.getCrossSigningKeysFromCache();\n // This is writing to in-memory account data in\n // builder.accountDataClientAdapter so won't fail\n await CrossSigningInfo.storeInSecretStorage(crossSigningPrivateKeys, secretStorage);\n }\n\n if (setupNewKeyBackup && !keyBackupInfo) {\n logger.log(\"Creating new message key backup version\");\n const info = await this.baseApis.prepareKeyBackupVersion(\n null /* random key */,\n // don't write to secret storage, as it will write to this.secretStorage.\n // Here, we want to capture all the side-effects of bootstrapping,\n // and want to write to the local secretStorage object\n { secureSecretStorage: false },\n );\n // write the key to 4S\n const privateKey = decodeRecoveryKey(info.recovery_key);\n await secretStorage.store(\"m.megolm_backup.v1\", encodeBase64(privateKey));\n\n // create keyBackupInfo object to add to builder\n const data: IKeyBackupInfo = {\n algorithm: info.algorithm,\n auth_data: info.auth_data,\n };\n\n // Sign with cross-signing master key\n await signKeyBackupWithCrossSigning(data.auth_data);\n\n // sign with the device fingerprint\n await this.signObject(data.auth_data);\n\n builder.addSessionBackup(data);\n }\n\n // Cache the session backup key\n const sessionBackupKey = await secretStorage.get(\"m.megolm_backup.v1\");\n if (sessionBackupKey) {\n logger.info(\"Got session backup key from secret storage: caching\");\n // fix up the backup key if it's in the wrong format, and replace\n // in secret storage\n const fixedBackupKey = fixBackupKey(sessionBackupKey);\n if (fixedBackupKey) {\n const keyId = newKeyId || oldKeyId;\n await secretStorage.store(\"m.megolm_backup.v1\", fixedBackupKey, keyId ? [keyId] : null);\n }\n const decodedBackupKey = new Uint8Array(decodeBase64(fixedBackupKey || sessionBackupKey));\n builder.addSessionBackupPrivateKeyToCache(decodedBackupKey);\n } else if (this.backupManager.getKeyBackupEnabled()) {\n // key backup is enabled but we don't have a session backup key in SSSS: see if we have one in\n // the cache or the user can provide one, and if so, write it to SSSS\n const backupKey = (await this.getSessionBackupPrivateKey()) || (await getKeyBackupPassphrase?.());\n if (!backupKey) {\n // This will require user intervention to recover from since we don't have the key\n // backup key anywhere. The user should probably just set up a new key backup and\n // the key for the new backup will be stored. If we hit this scenario in the wild\n // with any frequency, we should do more than just log an error.\n logger.error(\"Key backup is enabled but couldn't get key backup key!\");\n return;\n }\n logger.info(\"Got session backup key from cache/user that wasn't in SSSS: saving to SSSS\");\n await secretStorage.store(\"m.megolm_backup.v1\", encodeBase64(backupKey));\n }\n\n const operation = builder.buildOperation();\n await operation.apply(this);\n // this persists private keys and public keys as trusted,\n // only do this if apply succeeded for now as retry isn't in place yet\n await builder.persist(this);\n\n logger.log(\"Secure Secret Storage ready\");\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#resetKeyBackup}.\n */\n public async resetKeyBackup(): Promise<void> {\n // Delete existing ones\n // There is no use case for having several key backup version live server side.\n // Even if not deleted it would be lost as the key to restore is lost.\n // There should be only one backup at a time.\n await this.backupManager.deleteAllKeyBackupVersions();\n\n const info = await this.backupManager.prepareKeyBackupVersion();\n\n await this.signObject(info.auth_data);\n\n // add new key backup\n const { version } = await this.baseApis.http.authedRequest<{ version: string }>(\n Method.Post,\n \"/room_keys/version\",\n undefined,\n info,\n {\n prefix: ClientPrefix.V3,\n },\n );\n\n logger.log(`Created backup version ${version}`);\n\n // write the key to 4S\n const privateKey = info.privateKey;\n await this.secretStorage.store(\"m.megolm_backup.v1\", encodeBase64(privateKey));\n await this.storeSessionBackupPrivateKey(privateKey);\n\n await this.backupManager.checkAndStart();\n await this.backupManager.scheduleAllGroupSessionsForBackup();\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#deleteKeyBackupVersion}.\n */\n public async deleteKeyBackupVersion(version: string): Promise<void> {\n await this.backupManager.deleteKeyBackupVersion(version);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#addKey}.\n */\n public addSecretStorageKey(\n algorithm: string,\n opts: AddSecretStorageKeyOpts,\n keyID?: string,\n ): Promise<SecretStorageKeyObject> {\n return this.secretStorage.addKey(algorithm, opts, keyID);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#hasKey}.\n */\n public hasSecretStorageKey(keyID?: string): Promise<boolean> {\n return this.secretStorage.hasKey(keyID);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getKey}.\n */\n public getSecretStorageKey(keyID?: string): Promise<SecretStorageKeyTuple | null> {\n return this.secretStorage.getKey(keyID);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#store}.\n */\n public storeSecret(name: string, secret: string, keys?: string[]): Promise<void> {\n return this.secretStorage.store(name, secret, keys);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#get}.\n */\n public getSecret(name: string): Promise<string | undefined> {\n return this.secretStorage.get(name);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#isStored}.\n */\n public isSecretStored(name: string): Promise<Record<string, SecretStorageKeyDescription> | null> {\n return this.secretStorage.isStored(name);\n }\n\n public requestSecret(name: string, devices: string[]): ISecretRequest {\n if (!devices) {\n devices = Object.keys(this.deviceList.getRawStoredDevicesForUser(this.userId));\n }\n return this.secretStorage.request(name, devices);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getDefaultKeyId}.\n */\n public getDefaultSecretStorageKeyId(): Promise<string | null> {\n return this.secretStorage.getDefaultKeyId();\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#setDefaultKeyId}.\n */\n public setDefaultSecretStorageKeyId(k: string): Promise<void> {\n return this.secretStorage.setDefaultKeyId(k);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#checkKey}.\n */\n public checkSecretStorageKey(key: Uint8Array, info: SecretStorageKeyDescription): Promise<boolean> {\n return this.secretStorage.checkKey(key, info);\n }\n\n /**\n * Checks that a given secret storage private key matches a given public key.\n * This can be used by the getSecretStorageKey callback to verify that the\n * private key it is about to supply is the one that was requested.\n *\n * @param privateKey - The private key\n * @param expectedPublicKey - The public key\n * @returns true if the key matches, otherwise false\n */\n public checkSecretStoragePrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean {\n let decryption: PkDecryption | null = null;\n try {\n decryption = new globalThis.Olm.PkDecryption();\n const gotPubkey = decryption.init_with_private_key(privateKey);\n // make sure it agrees with the given pubkey\n return gotPubkey === expectedPublicKey;\n } finally {\n decryption?.free();\n }\n }\n\n /**\n * Fetches the backup private key, if cached\n * @returns the key, if any, or null\n */\n public async getSessionBackupPrivateKey(): Promise<Uint8Array | null> {\n const encodedKey = await new Promise<Uint8Array | AESEncryptedSecretStoragePayload | string | null>(\n (resolve) => {\n this.cryptoStore.doTxn(\"readonly\", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {\n this.cryptoStore.getSecretStorePrivateKey(txn, resolve, \"m.megolm_backup.v1\");\n });\n },\n );\n\n let key: Uint8Array | null = null;\n\n // make sure we have a Uint8Array, rather than a string\n if (typeof encodedKey === \"string\") {\n key = new Uint8Array(decodeBase64(fixBackupKey(encodedKey) || encodedKey));\n await this.storeSessionBackupPrivateKey(key);\n }\n if (encodedKey && typeof encodedKey === \"object\" && \"ciphertext\" in encodedKey) {\n const pickleKey = Buffer.from(this.olmDevice.pickleKey);\n const decrypted = await decryptAESSecretStorageItem(encodedKey, pickleKey, \"m.megolm_backup.v1\");\n key = decodeBase64(decrypted);\n }\n return key;\n }\n\n /**\n * Stores the session backup key to the cache\n * @param key - the private key\n * @returns a promise so you can catch failures\n */\n public async storeSessionBackupPrivateKey(key: ArrayLike<number>, version?: string): Promise<void> {\n if (!(key instanceof Uint8Array)) {\n // eslint-disable-next-line @typescript-eslint/no-base-to-string\n throw new Error(`storeSessionBackupPrivateKey expects Uint8Array, got ${key}`);\n }\n const pickleKey = Buffer.from(this.olmDevice.pickleKey);\n const encryptedKey = await encryptAESSecretStorageItem(encodeBase64(key), pickleKey, \"m.megolm_backup.v1\");\n return this.cryptoStore.doTxn(\"readwrite\", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {\n this.cryptoStore.storeSecretStorePrivateKey(txn, \"m.megolm_backup.v1\", encryptedKey);\n });\n }\n\n /**\n * Implementation of {@link Crypto.loadSessionBackupPrivateKeyFromSecretStorage}.\n */\n public loadSessionBackupPrivateKeyFromSecretStorage(): Promise<void> {\n throw new Error(\"Not implmeented\");\n }\n\n /**\n * Get the current status of key backup.\n *\n * Implementation of {@link Crypto.CryptoApi.getActiveSessionBackupVersion}.\n */\n public async getActiveSessionBackupVersion(): Promise<string | null> {\n if (this.backupManager.getKeyBackupEnabled()) {\n return this.backupManager.version ?? null;\n }\n return null;\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#getKeyBackupInfo}.\n */\n public async getKeyBackupInfo(): Promise<KeyBackupInfo | null> {\n throw new Error(\"Not implemented\");\n }\n\n /**\n * Determine if a key backup can be trusted.\n *\n * Implementation of {@link Crypto.CryptoApi.isKeyBackupTrusted}.\n */\n public async isKeyBackupTrusted(info: KeyBackupInfo): Promise<BackupTrustInfo> {\n const trustInfo = await this.backupManager.isKeyBackupTrusted(info);\n return backupTrustInfoFromLegacyTrustInfo(trustInfo);\n }\n\n /**\n * Force a re-check of the key backup and enable/disable it as appropriate.\n *\n * Implementation of {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.\n */\n public async checkKeyBackupAndEnable(): Promise<KeyBackupCheck | null> {\n const checkResult = await this.backupManager.checkKeyBackup();\n if (!checkResult || !checkResult.backupInfo) return null;\n return {\n backupInfo: checkResult.backupInfo,\n trustInfo: backupTrustInfoFromLegacyTrustInfo(checkResult.trustInfo),\n };\n }\n\n /**\n * Checks that a given cross-signing private key matches a given public key.\n * This can be used by the getCrossSigningKey callback to verify that the\n * private key it is about to supply is the one that was requested.\n *\n * @param privateKey - The private key\n * @param expectedPublicKey - The public key\n * @returns true if the key matches, otherwise false\n */\n public checkCrossSigningPrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean {\n let signing: PkSigning | null = null;\n try {\n signing = new globalThis.Olm.PkSigning();\n const gotPubkey = signing.init_with_seed(privateKey);\n // make sure it agrees with the given pubkey\n return gotPubkey === expectedPublicKey;\n } finally {\n signing?.free();\n }\n }\n\n /**\n * Run various follow-up actions after cross-signing keys have changed locally\n * (either by resetting the keys for the account or by getting them from secret\n * storage), such as signing the current device, upgrading device\n * verifications, etc.\n */\n private async afterCrossSigningLocalKeyChange(): Promise<void> {\n logger.info(\"Starting cross-signing key change post-processing\");\n\n // sign the current device with the new key, and upload to the server\n const device = this.deviceList.getStoredDevice(this.userId, this.deviceId)!;\n const signedDevice = await this.crossSigningInfo.signDevice(this.userId, device);\n logger.info(`Starting background key sig upload for ${this.deviceId}`);\n\n const upload = ({ shouldEmit = false }): Promise<void> => {\n return this.baseApis\n .uploadKeySignatures({\n [this.userId]: {\n [this.deviceId]: signedDevice!,\n },\n })\n .then((response) => {\n const { failures } = response || {};\n if (Object.keys(failures || []).length > 0) {\n if (shouldEmit) {\n this.baseApis.emit(\n CryptoEvent.KeySignatureUploadFailure,\n failures,\n \"afterCrossSigningLocalKeyChange\",\n upload, // continuation\n );\n }\n throw new KeySignatureUploadError(\"Key upload failed\", { failures });\n }\n logger.info(`Finished background key sig upload for ${this.deviceId}`);\n })\n .catch((e) => {\n logger.error(`Error during background key sig upload for ${this.deviceId}`, e);\n });\n };\n upload({ shouldEmit: true });\n\n const shouldUpgradeCb = this.baseApis.cryptoCallbacks.shouldUpgradeDeviceVerifications;\n if (shouldUpgradeCb) {\n logger.info(\"Starting device verification upgrade\");\n\n // Check all users for signatures if upgrade callback present\n // FIXME: do this in batches\n const users: Record<string, IDeviceVerificationUpgrade> = {};\n for (const [userId, crossSigningInfo] of Object.entries(this.deviceList.crossSigningInfo)) {\n const upgradeInfo = await this.checkForDeviceVerificationUpgrade(\n userId,\n CrossSigningInfo.fromStorage(crossSigningInfo, userId),\n );\n if (upgradeInfo) {\n users[userId] = upgradeInfo;\n }\n }\n\n if (Object.keys(users).length > 0) {\n logger.info(`Found ${Object.keys(users).length} verif users to upgrade`);\n try {\n const usersToUpgrade = await shouldUpgradeCb({ users: users });\n if (usersToUpgrade) {\n for (const userId of usersToUpgrade) {\n if (userId in users) {\n await this.baseApis.setDeviceVerified(userId, users[userId].crossSigningInfo.getId()!);\n }\n }\n }\n } catch (e) {\n logger.log(\"shouldUpgradeDeviceVerifications threw an error: not upgrading\", e);\n }\n }\n\n logger.info(\"Finished device verification upgrade\");\n }\n\n logger.info(\"Finished cross-signing key change post-processing\");\n }\n\n /**\n * Check if a user's cross-signing key is a candidate for upgrading from device\n * verification.\n *\n * @param userId - the user whose cross-signing information is to be checked\n * @param crossSigningInfo - the cross-signing information to check\n */\n private async checkForDeviceVerificationUpgrade(\n userId: string,\n crossSigningInfo: CrossSigningInfo,\n ): Promise<IDeviceVerificationUpgrade | undefined> {\n // only upgrade if this is the first cross-signing key that we've seen for\n // them, and if their cross-signing key isn't already verified\n const trustLevel = this.crossSigningInfo.checkUserTrust(crossSigningInfo);\n if (crossSigningInfo.firstUse && !trustLevel.isVerified()) {\n const devices = this.deviceList.getRawStoredDevicesForUser(userId);\n const deviceIds = await this.checkForValidDeviceSignature(userId, crossSigningInfo.keys.master, devices);\n if (deviceIds.length) {\n return {\n devices: deviceIds.map((deviceId) => DeviceInfo.fromStorage(devices[deviceId], deviceId)),\n crossSigningInfo,\n };\n }\n }\n }\n\n /**\n * Check if the cross-signing key is signed by a verified device.\n *\n * @param userId - the user ID whose key is being checked\n * @param key - the key that is being checked\n * @param devices - the user's devices. Should be a map from device ID\n * to device info\n */\n private async checkForValidDeviceSignature(\n userId: string,\n key: CrossSigningKeyInfo,\n devices: Record<string, IDevice>,\n ): Promise<string[]> {\n const deviceIds: string[] = [];\n if (devices && key.signatures && key.signatures[userId]) {\n for (const signame of Object.keys(key.signatures[userId])) {\n const [, deviceId] = signame.split(\":\", 2);\n if (deviceId in devices && devices[deviceId].verified === DeviceVerification.VERIFIED) {\n try {\n await olmlib.verifySignature(\n this.olmDevice,\n key,\n userId,\n deviceId,\n devices[deviceId].keys[signame],\n );\n deviceIds.push(deviceId);\n } catch {}\n }\n }\n }\n return deviceIds;\n }\n\n /**\n * Get the user's cross-signing key ID.\n *\n * @param type - The type of key to get the ID of. One of\n * \"master\", \"self_signing\", or \"user_signing\". Defaults to \"master\".\n *\n * @returns the key ID\n */\n public getCrossSigningKeyId(type: CrossSigningKey = CrossSigningKey.Master): Promise<string | null> {\n return Promise.resolve(this.getCrossSigningId(type));\n }\n\n // old name, for backwards compatibility\n public getCrossSigningId(type: string): string | null {\n return this.crossSigningInfo.getId(type);\n }\n\n /**\n * Get the cross signing information for a given user.\n *\n * @param userId - the user ID to get the cross-signing info for.\n *\n * @returns the cross signing information for the user.\n */\n public getStoredCrossSigningForUser(userId: string): CrossSigningInfo | null {\n return this.deviceList.getStoredCrossSigningForUser(userId);\n }\n\n /**\n * Check whether a given user is trusted.\n *\n * @param userId - The ID of the user to check.\n *\n * @returns\n */\n public checkUserTrust(userId: string): UserTrustLevel {\n const userCrossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n if (!userCrossSigning) {\n return new UserTrustLevel(false, false, false);\n }\n return this.crossSigningInfo.checkUserTrust(userCrossSigning);\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi.getUserVerificationStatus}.\n */\n public async getUserVerificationStatus(userId: string): Promise<UserTrustLevel> {\n return this.checkUserTrust(userId);\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi.pinCurrentUserIdentity}.\n */\n public async pinCurrentUserIdentity(userId: string): Promise<void> {\n throw new Error(\"not implemented\");\n }\n\n /**\n * Check whether a given device is trusted.\n *\n * @param userId - The ID of the user whose device is to be checked.\n * @param deviceId - The ID of the device to check\n */\n public async getDeviceVerificationStatus(\n userId: string,\n deviceId: string,\n ): Promise<DeviceVerificationStatus | null> {\n const device = this.deviceList.getStoredDevice(userId, deviceId);\n if (!device) {\n return null;\n }\n return this.checkDeviceInfoTrust(userId, device);\n }\n\n /**\n * @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus}.\n */\n public checkDeviceTrust(userId: string, deviceId: string): DeviceTrustLevel {\n const device = this.deviceList.getStoredDevice(userId, deviceId);\n return this.checkDeviceInfoTrust(userId, device);\n }\n\n /**\n * Check whether a given deviceinfo is trusted.\n *\n * @param userId - The ID of the user whose devices is to be checked.\n * @param device - The device info object to check\n *\n * @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus}.\n */\n public checkDeviceInfoTrust(userId: string, device?: DeviceInfo): DeviceTrustLevel {\n const trustedLocally = !!device?.isVerified();\n\n const userCrossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n if (device && userCrossSigning) {\n // The trustCrossSignedDevices only affects trust of other people's cross-signing\n // signatures\n const trustCrossSig = this.trustCrossSignedDevices || userId === this.userId;\n return this.crossSigningInfo.checkDeviceTrust(userCrossSigning, device, trustedLocally, trustCrossSig);\n } else {\n return new DeviceTrustLevel(false, false, trustedLocally, false);\n }\n }\n\n /**\n * Check whether one of our own devices is cross-signed by our\n * user's stored keys, regardless of whether we trust those keys yet.\n *\n * @param deviceId - The ID of the device to check\n *\n * @returns true if the device is cross-signed\n */\n public checkIfOwnDeviceCrossSigned(deviceId: string): boolean {\n const device = this.deviceList.getStoredDevice(this.userId, deviceId);\n if (!device) return false;\n const userCrossSigning = this.deviceList.getStoredCrossSigningForUser(this.userId);\n return (\n userCrossSigning?.checkDeviceTrust(userCrossSigning, device, false, true).isCrossSigningVerified() ?? false\n );\n }\n\n /*\n * Event handler for DeviceList's userNewDevices event\n */\n private onDeviceListUserCrossSigningUpdated = async (userId: string): Promise<void> => {\n if (userId === this.userId) {\n // An update to our own cross-signing key.\n // Get the new key first:\n const newCrossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n const seenPubkey = newCrossSigning ? newCrossSigning.getId() : null;\n const currentPubkey = this.crossSigningInfo.getId();\n const changed = currentPubkey !== seenPubkey;\n\n if (currentPubkey && seenPubkey && !changed) {\n // If it's not changed, just make sure everything is up to date\n await this.checkOwnCrossSigningTrust();\n } else {\n // We'll now be in a state where cross-signing on the account is not trusted\n // because our locally stored cross-signing keys will not match the ones\n // on the server for our account. So we clear our own stored cross-signing keys,\n // effectively disabling cross-signing until the user gets verified by the device\n // that reset the keys\n this.storeTrustedSelfKeys(null);\n // emit cross-signing has been disabled\n this.emit(CryptoEvent.KeysChanged, {});\n // as the trust for our own user has changed,\n // also emit an event for this\n this.emit(CryptoEvent.UserTrustStatusChanged, this.userId, this.checkUserTrust(userId));\n }\n } else {\n await this.checkDeviceVerifications(userId);\n\n // Update verified before latch using the current state and save the new\n // latch value in the device list store.\n const crossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n if (crossSigning) {\n crossSigning.updateCrossSigningVerifiedBefore(this.checkUserTrust(userId).isCrossSigningVerified());\n this.deviceList.setRawStoredCrossSigningForUser(userId, crossSigning.toStorage());\n }\n\n this.emit(CryptoEvent.UserTrustStatusChanged, userId, this.checkUserTrust(userId));\n }\n };\n\n /**\n * Check the copy of our cross-signing key that we have in the device list and\n * see if we can get the private key. If so, mark it as trusted.\n */\n public async checkOwnCrossSigningTrust({\n allowPrivateKeyRequests = false,\n }: ICheckOwnCrossSigningTrustOpts = {}): Promise<void> {\n const userId = this.userId;\n\n // Before proceeding, ensure our cross-signing public keys have been\n // downloaded via the device list.\n await this.downloadKeys([this.userId]);\n\n // Also check which private keys are locally cached.\n const crossSigningPrivateKeys = await this.crossSigningInfo.getCrossSigningKeysFromCache();\n\n // If we see an update to our own master key, check it against the master\n // key we have and, if it matches, mark it as verified\n\n // First, get the new cross-signing info\n const newCrossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n if (!newCrossSigning) {\n logger.error(\n \"Got cross-signing update event for user \" + userId + \" but no new cross-signing information found!\",\n );\n return;\n }\n\n const seenPubkey = newCrossSigning.getId()!;\n const masterChanged = this.crossSigningInfo.getId() !== seenPubkey;\n const masterExistsNotLocallyCached = newCrossSigning.getId() && !crossSigningPrivateKeys.has(\"master\");\n if (masterChanged) {\n logger.info(\"Got new master public key\", seenPubkey);\n }\n if (allowPrivateKeyRequests && (masterChanged || masterExistsNotLocallyCached)) {\n logger.info(\"Attempting to retrieve cross-signing master private key\");\n let signing: PkSigning | null = null;\n // It's important for control flow that we leave any errors alone for\n // higher levels to handle so that e.g. cancelling access properly\n // aborts any larger operation as well.\n try {\n const ret = await this.crossSigningInfo.getCrossSigningKey(\"master\", seenPubkey);\n signing = ret[1];\n logger.info(\"Got cross-signing master private key\");\n } finally {\n signing?.free();\n }\n }\n\n const oldSelfSigningId = this.crossSigningInfo.getId(\"self_signing\");\n const oldUserSigningId = this.crossSigningInfo.getId(\"user_signing\");\n\n // Update the version of our keys in our cross-signing object and the local store\n this.storeTrustedSelfKeys(newCrossSigning.keys);\n\n const selfSigningChanged = oldSelfSigningId !== newCrossSigning.getId(\"self_signing\");\n const userSigningChanged = oldUserSigningId !== newCrossSigning.getId(\"user_signing\");\n\n const selfSigningExistsNotLocallyCached =\n newCrossSigning.getId(\"self_signing\") && !crossSigningPrivateKeys.has(\"self_signing\");\n const userSigningExistsNotLocallyCached =\n newCrossSigning.getId(\"user_signing\") && !crossSigningPrivateKeys.has(\"user_signing\");\n\n const keySignatures: Record<string, ISignedKey> = {};\n\n if (selfSigningChanged) {\n logger.info(\"Got new self-signing key\", newCrossSigning.getId(\"self_signing\"));\n }\n if (allowPrivateKeyRequests && (selfSigningChanged || selfSigningExistsNotLocallyCached)) {\n logger.info(\"Attempting to retrieve cross-signing self-signing private key\");\n let signing: PkSigning | null = null;\n try {\n const ret = await this.crossSigningInfo.getCrossSigningKey(\n \"self_signing\",\n newCrossSigning.getId(\"self_signing\")!,\n );\n signing = ret[1];\n logger.info(\"Got cross-signing self-signing private key\");\n } finally {\n signing?.free();\n }\n\n const device = this.deviceList.getStoredDevice(this.userId, this.deviceId)!;\n const signedDevice = await this.crossSigningInfo.signDevice(this.userId, device);\n keySignatures[this.deviceId] = signedDevice!;\n }\n if (userSigningChanged) {\n logger.info(\"Got new user-signing key\", newCrossSigning.getId(\"user_signing\"));\n }\n if (allowPrivateKeyRequests && (userSigningChanged || userSigningExistsNotLocallyCached)) {\n logger.info(\"Attempting to retrieve cross-signing user-signing private key\");\n let signing: PkSigning | null = null;\n try {\n const ret = await this.crossSigningInfo.getCrossSigningKey(\n \"user_signing\",\n newCrossSigning.getId(\"user_signing\")!,\n );\n signing = ret[1];\n logger.info(\"Got cross-signing user-signing private key\");\n } finally {\n signing?.free();\n }\n }\n\n if (masterChanged) {\n const masterKey = this.crossSigningInfo.keys.master;\n await this.signObject(masterKey);\n const deviceSig = masterKey.signatures![this.userId][\"ed25519:\" + this.deviceId];\n // Include only the _new_ device signature in the upload.\n // We may have existing signatures from deleted devices, which will cause\n // the entire upload to fail.\n keySignatures[this.crossSigningInfo.getId()!] = Object.assign({} as ISignedKey, masterKey, {\n signatures: {\n [this.userId]: {\n [\"ed25519:\" + this.deviceId]: deviceSig,\n },\n },\n });\n }\n\n const keysToUpload = Object.keys(keySignatures);\n if (keysToUpload.length) {\n const upload = ({ shouldEmit = false }): Promise<void> => {\n logger.info(`Starting background key sig upload for ${keysToUpload}`);\n return this.baseApis\n .uploadKeySignatures({ [this.userId]: keySignatures })\n .then((response) => {\n const { failures } = response || {};\n logger.info(`Finished background key sig upload for ${keysToUpload}`);\n if (Object.keys(failures || []).length > 0) {\n if (shouldEmit) {\n this.baseApis.emit(\n CryptoEvent.KeySignatureUploadFailure,\n failures,\n \"checkOwnCrossSigningTrust\",\n upload,\n );\n }\n throw new KeySignatureUploadError(\"Key upload failed\", { failures });\n }\n })\n .catch((e) => {\n logger.error(`Error during background key sig upload for ${keysToUpload}`, e);\n });\n };\n upload({ shouldEmit: true });\n }\n\n this.emit(CryptoEvent.UserTrustStatusChanged, userId, this.checkUserTrust(userId));\n\n if (masterChanged) {\n this.emit(CryptoEvent.KeysChanged, {});\n await this.afterCrossSigningLocalKeyChange();\n }\n\n // Now we may be able to trust our key backup\n await this.backupManager.checkKeyBackup();\n // FIXME: if we previously trusted the backup, should we automatically sign\n // the backup with the new key (if not already signed)?\n }\n\n /**\n * Implementation of {@link CryptoBackend#getBackupDecryptor}.\n */\n public async getBackupDecryptor(backupInfo: KeyBackupInfo, privKey: ArrayLike<number>): Promise<BackupDecryptor> {\n if (!(privKey instanceof Uint8Array)) {\n throw new Error(`getBackupDecryptor expects Uint8Array`);\n }\n\n const algorithm = await BackupManager.makeAlgorithm(backupInfo, async () => {\n return privKey;\n });\n\n // If the pubkey computed from the private data we've been given\n // doesn't match the one in the auth_data, the user has entered\n // a different recovery key / the wrong passphrase.\n if (!(await algorithm.keyMatches(privKey))) {\n return Promise.reject(new MatrixError({ errcode: MatrixClient.RESTORE_BACKUP_ERROR_BAD_KEY }));\n }\n\n return new LibOlmBackupDecryptor(algorithm);\n }\n\n /**\n * Implementation of {@link CryptoBackend#importBackedUpRoomKeys}.\n */\n public importBackedUpRoomKeys(\n keys: IMegolmSessionData[],\n backupVersion: string,\n opts: ImportRoomKeysOpts = {},\n ): Promise<void> {\n opts.source = \"backup\";\n return this.importRoomKeys(keys, opts);\n }\n\n /**\n * Store a set of keys as our own, trusted, cross-signing keys.\n *\n * @param keys - The new trusted set of keys\n */\n private async storeTrustedSelfKeys(keys: Record<string, CrossSigningKeyInfo> | null): Promise<void> {\n if (keys) {\n this.crossSigningInfo.setKeys(keys);\n } else {\n this.crossSigningInfo.clearKeys();\n }\n await this.cryptoStore.doTxn(\"readwrite\", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {\n this.cryptoStore.storeCrossSigningKeys(txn, this.crossSigningInfo.keys);\n });\n }\n\n /**\n * Check if the master key is signed by a verified device, and if so, prompt\n * the application to mark it as verified.\n *\n * @param userId - the user ID whose key should be checked\n */\n private async checkDeviceVerifications(userId: string): Promise<void> {\n const shouldUpgradeCb = this.baseApis.cryptoCallbacks.shouldUpgradeDeviceVerifications;\n if (!shouldUpgradeCb) {\n // Upgrading skipped when callback is not present.\n return;\n }\n logger.info(`Starting device verification upgrade for ${userId}`);\n if (this.crossSigningInfo.keys.user_signing) {\n const crossSigningInfo = this.deviceList.getStoredCrossSigningForUser(userId);\n if (crossSigningInfo) {\n const upgradeInfo = await this.checkForDeviceVerificationUpgrade(userId, crossSigningInfo);\n if (upgradeInfo) {\n const usersToUpgrade = await shouldUpgradeCb({\n users: {\n [userId]: upgradeInfo,\n },\n });\n if (usersToUpgrade.includes(userId)) {\n await this.baseApis.setDeviceVerified(userId, crossSigningInfo.getId()!);\n }\n }\n }\n }\n logger.info(`Finished device verification upgrade for ${userId}`);\n }\n\n /**\n */\n public enableLazyLoading(): void {\n this.lazyLoadMembers = true;\n }\n\n /**\n * Tell the crypto module to register for MatrixClient events which it needs to\n * listen for\n *\n * @param eventEmitter - event source where we can register\n * for event notifications\n */\n public registerEventHandlers(\n eventEmitter: TypedEventEmitter<\n RoomMemberEvent.Membership | ClientEvent.ToDeviceEvent | RoomEvent.Timeline | MatrixEventEvent.Decrypted,\n any\n >,\n ): void {\n eventEmitter.on(RoomMemberEvent.Membership, this.onMembership);\n eventEmitter.on(ClientEvent.ToDeviceEvent, this.onToDeviceEvent);\n eventEmitter.on(RoomEvent.Timeline, this.onTimelineEvent);\n eventEmitter.on(MatrixEventEvent.Decrypted, this.onTimelineEvent);\n }\n\n /**\n * @deprecated this does nothing and will be removed in a future version\n */\n public start(): void {\n logger.warn(\"MatrixClient.crypto.start() is deprecated\");\n }\n\n /** Stop background processes related to crypto */\n public stop(): void {\n this.outgoingRoomKeyRequestManager.stop();\n this.deviceList.stop();\n this.dehydrationManager.stop();\n this.backupManager.stop();\n }\n\n /**\n * Get the Ed25519 key for this device\n *\n * @returns base64-encoded ed25519 key.\n *\n * @deprecated Use {@link Crypto.CryptoApi#getOwnDeviceKeys}.\n */\n public getDeviceEd25519Key(): string | null {\n return this.olmDevice.deviceEd25519Key;\n }\n\n /**\n * Get the Curve25519 key for this device\n *\n * @returns base64-encoded curve25519 key.\n *\n * @deprecated Use {@link Crypto.CryptoApi#getOwnDeviceKeys}\n */\n public getDeviceCurve25519Key(): string | null {\n return this.olmDevice.deviceCurve25519Key;\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#getOwnDeviceKeys}.\n */\n public async getOwnDeviceKeys(): Promise<OwnDeviceKeys> {\n if (!this.olmDevice.deviceCurve25519Key) {\n throw new Error(\"Curve25519 key not yet created\");\n }\n if (!this.olmDevice.deviceEd25519Key) {\n throw new Error(\"Ed25519 key not yet created\");\n }\n return {\n ed25519: this.olmDevice.deviceEd25519Key,\n curve25519: this.olmDevice.deviceCurve25519Key,\n };\n }\n\n /**\n * Set the global override for whether the client should ever send encrypted\n * messages to unverified devices. This provides the default for rooms which\n * do not specify a value.\n *\n * @param value - whether to blacklist all unverified devices by default\n *\n * @deprecated Set {@link Crypto.CryptoApi#globalBlacklistUnverifiedDevices | CryptoApi.globalBlacklistUnverifiedDevices} directly.\n */\n public setGlobalBlacklistUnverifiedDevices(value: boolean): void {\n this.globalBlacklistUnverifiedDevices = value;\n }\n\n /**\n * @returns whether to blacklist all unverified devices by default\n *\n * @deprecated Reference {@link Crypto.CryptoApi#globalBlacklistUnverifiedDevices | CryptoApi.globalBlacklistUnverifiedDevices} directly.\n */\n public getGlobalBlacklistUnverifiedDevices(): boolean {\n return this.globalBlacklistUnverifiedDevices;\n }\n\n /**\n * Upload the device keys to the homeserver.\n * @returns A promise that will resolve when the keys are uploaded.\n */\n public uploadDeviceKeys(): Promise<IKeysUploadResponse> {\n const deviceKeys = {\n algorithms: this.supportedAlgorithms,\n device_id: this.deviceId,\n keys: this.deviceKeys,\n user_id: this.userId,\n };\n\n return this.signObject(deviceKeys).then(() => {\n return this.baseApis.uploadKeysRequest({\n device_keys: deviceKeys as Required<IDeviceKeys>,\n });\n });\n }\n\n public getNeedsNewFallback(): boolean {\n return !!this.needsNewFallback;\n }\n\n // check if it's time to upload one-time keys, and do so if so.\n private maybeUploadOneTimeKeys(): void {\n // frequency with which to check & upload one-time keys\n const uploadPeriod = 1000 * 60; // one minute\n\n // max number of keys to upload at once\n // Creating keys can be an expensive operation so we limit the\n // number we generate in one go to avoid blocking the application\n // for too long.\n const maxKeysPerCycle = 5;\n\n if (this.oneTimeKeyCheckInProgress) {\n return;\n }\n\n const now = Date.now();\n if (this.lastOneTimeKeyCheck !== null && now - this.lastOneTimeKeyCheck < uploadPeriod) {\n // we've done a key upload recently.\n return;\n }\n\n this.lastOneTimeKeyCheck = now;\n\n // We need to keep a pool of one time public keys on the server so that\n // other devices can start conversations with us. But we can only store\n // a finite number of private keys in the olm Account object.\n // To complicate things further then can be a delay between a device\n // claiming a public one time key from the server and it sending us a\n // message. We need to keep the corresponding private key locally until\n // we receive the message.\n // But that message might never arrive leaving us stuck with duff\n // private keys clogging up our local storage.\n // So we need some kind of engineering compromise to balance all of\n // these factors.\n\n // Check how many keys we can store in the Account object.\n const maxOneTimeKeys = this.olmDevice.maxNumberOfOneTimeKeys();\n // Try to keep at most half that number on the server. This leaves the\n // rest of the slots free to hold keys that have been claimed from the\n // server but we haven't received a message for.\n // If we run out of slots when generating new keys then olm will\n // discard the oldest private keys first. This will eventually clean\n // out stale private keys that won't receive a message.\n const keyLimit = Math.floor(maxOneTimeKeys / 2);\n\n const uploadLoop = async (keyCount: number): Promise<void> => {\n while (keyLimit > keyCount || this.getNeedsNewFallback()) {\n // Ask olm to generate new one time keys, then upload them to synapse.\n if (keyLimit > keyCount) {\n logger.info(\"generating oneTimeKeys\");\n const keysThisLoop = Math.min(keyLimit - keyCount, maxKeysPerCycle);\n await this.olmDevice.generateOneTimeKeys(keysThisLoop);\n }\n\n if (this.getNeedsNewFallback()) {\n const fallbackKeys = await this.olmDevice.getFallbackKey();\n // if fallbackKeys is non-empty, we've already generated a\n // fallback key, but it hasn't been published yet, so we\n // can use that instead of generating a new one\n if (!fallbackKeys.curve25519 || Object.keys(fallbackKeys.curve25519).length == 0) {\n logger.info(\"generating fallback key\");\n if (this.fallbackCleanup) {\n // cancel any pending fallback cleanup because generating\n // a new fallback key will already drop the old fallback\n // that would have been dropped, and we don't want to kill\n // the current key\n clearTimeout(this.fallbackCleanup);\n delete this.fallbackCleanup;\n }\n await this.olmDevice.generateFallbackKey();\n }\n }\n\n logger.info(\"calling uploadOneTimeKeys\");\n const res = await this.uploadOneTimeKeys();\n if (res.one_time_key_counts && res.one_time_key_counts.signed_curve25519) {\n // if the response contains a more up to date value use this\n // for the next loop\n keyCount = res.one_time_key_counts.signed_curve25519;\n } else {\n throw new Error(\n \"response for uploading keys does not contain \" + \"one_time_key_counts.signed_curve25519\",\n );\n }\n }\n };\n\n this.oneTimeKeyCheckInProgress = true;\n Promise.resolve()\n .then(() => {\n if (this.oneTimeKeyCount !== undefined) {\n // We already have the current one_time_key count from a /sync response.\n // Use this value instead of asking the server for the current key count.\n return Promise.resolve(this.oneTimeKeyCount);\n }\n // ask the server how many keys we have\n return this.baseApis.uploadKeysRequest({}).then((res) => {\n return res.one_time_key_counts.signed_curve25519 || 0;\n });\n })\n .then((keyCount) => {\n // Start the uploadLoop with the current keyCount. The function checks if\n // we need to upload new keys or not.\n // If there are too many keys on the server then we don't need to\n // create any more keys.\n return uploadLoop(keyCount);\n })\n .catch((e) => {\n logger.error(\"Error uploading one-time keys\", e.stack || e);\n })\n .finally(() => {\n // reset oneTimeKeyCount to prevent start uploading based on old data.\n // it will be set again on the next /sync-response\n this.oneTimeKeyCount = undefined;\n this.oneTimeKeyCheckInProgress = false;\n });\n }\n\n // returns a promise which resolves to the response\n private async uploadOneTimeKeys(): Promise<IKeysUploadResponse> {\n const promises: Promise<unknown>[] = [];\n\n let fallbackJson: Record<string, IOneTimeKey> | undefined;\n if (this.getNeedsNewFallback()) {\n fallbackJson = {};\n const fallbackKeys = await this.olmDevice.getFallbackKey();\n for (const [keyId, key] of Object.entries(fallbackKeys.curve25519)) {\n const k = { key, fallback: true };\n fallbackJson[\"signed_curve25519:\" + keyId] = k;\n promises.push(this.signObject(k));\n }\n this.needsNewFallback = false;\n }\n\n const oneTimeKeys = await this.olmDevice.getOneTimeKeys();\n const oneTimeJson: Record<string, { key: string }> = {};\n\n for (const keyId in oneTimeKeys.curve25519) {\n if (oneTimeKeys.curve25519.hasOwnProperty(keyId)) {\n const k = {\n key: oneTimeKeys.curve25519[keyId],\n };\n oneTimeJson[\"signed_curve25519:\" + keyId] = k;\n promises.push(this.signObject(k));\n }\n }\n\n await Promise.all(promises);\n\n const requestBody: Record<string, any> = {\n one_time_keys: oneTimeJson,\n };\n\n if (fallbackJson) {\n requestBody[\"org.matrix.msc2732.fallback_keys\"] = fallbackJson;\n requestBody[\"fallback_keys\"] = fallbackJson;\n }\n\n const res = await this.baseApis.uploadKeysRequest(requestBody);\n\n if (fallbackJson) {\n this.fallbackCleanup = setTimeout(\n () => {\n delete this.fallbackCleanup;\n this.olmDevice.forgetOldFallbackKey();\n },\n 60 * 60 * 1000,\n );\n }\n\n await this.olmDevice.markKeysAsPublished();\n return res;\n }\n\n /**\n * Download the keys for a list of users and stores the keys in the session\n * store.\n * @param userIds - The users to fetch.\n * @param forceDownload - Always download the keys even if cached.\n *\n * @returns A promise which resolves to a map `userId->deviceId->{@link DeviceInfo}`.\n */\n public downloadKeys(userIds: string[], forceDownload?: boolean): Promise<DeviceInfoMap> {\n return this.deviceList.downloadKeys(userIds, !!forceDownload);\n }\n\n /**\n * Get the stored device keys for a user id\n *\n * @param userId - the user to list keys for.\n *\n * @returns list of devices, or null if we haven't\n * managed to get a list of devices for this user yet.\n */\n public getStoredDevicesForUser(userId: string): Array<DeviceInfo> | null {\n return this.deviceList.getStoredDevicesForUser(userId);\n }\n\n /**\n * Get the device information for the given list of users.\n *\n * @param userIds - The users to fetch.\n * @param downloadUncached - If true, download the device list for users whose device list we are not\n * currently tracking. Defaults to false, in which case such users will not appear at all in the result map.\n *\n * @returns A map `{@link DeviceMap}`.\n */\n public async getUserDeviceInfo(userIds: string[], downloadUncached = false): Promise<DeviceMap> {\n const deviceMapByUserId = new Map<string, Map<string, Device>>();\n // Keep the users without device to download theirs keys\n const usersWithoutDeviceInfo: string[] = [];\n\n for (const userId of userIds) {\n const deviceInfos = await this.getStoredDevicesForUser(userId);\n // If there are device infos for a userId, we transform it into a map\n // Else, the keys will be downloaded after\n if (deviceInfos) {\n const deviceMap = new Map(\n // Convert DeviceInfo to Device\n deviceInfos.map((deviceInfo) => [deviceInfo.deviceId, deviceInfoToDevice(deviceInfo, userId)]),\n );\n deviceMapByUserId.set(userId, deviceMap);\n } else {\n usersWithoutDeviceInfo.push(userId);\n }\n }\n\n // Download device info for users without device infos\n if (downloadUncached && usersWithoutDeviceInfo.length > 0) {\n const newDeviceInfoMap = await this.downloadKeys(usersWithoutDeviceInfo);\n\n newDeviceInfoMap.forEach((deviceInfoMap, userId) => {\n const deviceMap = new Map<string, Device>();\n // Convert DeviceInfo to Device\n deviceInfoMap.forEach((deviceInfo, deviceId) =>\n deviceMap.set(deviceId, deviceInfoToDevice(deviceInfo, userId)),\n );\n\n // Put the new device infos into the returned map\n deviceMapByUserId.set(userId, deviceMap);\n });\n }\n\n return deviceMapByUserId;\n }\n\n /**\n * Get the stored keys for a single device\n *\n *\n * @returns device, or undefined\n * if we don't know about this device\n */\n public getStoredDevice(userId: string, deviceId: string): DeviceInfo | undefined {\n return this.deviceList.getStoredDevice(userId, deviceId);\n }\n\n /**\n * Save the device list, if necessary\n *\n * @param delay - Time in ms before which the save actually happens.\n * By default, the save is delayed for a short period in order to batch\n * multiple writes, but this behaviour can be disabled by passing 0.\n *\n * @returns true if the data was saved, false if\n * it was not (eg. because no changes were pending). The promise\n * will only resolve once the data is saved, so may take some time\n * to resolve.\n */\n public saveDeviceList(delay: number): Promise<boolean> {\n return this.deviceList.saveIfDirty(delay);\n }\n\n /**\n * Mark the given device as locally verified.\n *\n * Implementation of {@link Crypto.CryptoApi#setDeviceVerified}.\n */\n public async setDeviceVerified(userId: string, deviceId: string, verified = true): Promise<void> {\n await this.setDeviceVerification(userId, deviceId, verified);\n }\n\n /**\n * Blindly cross-sign one of our other devices.\n *\n * Implementation of {@link Crypto.CryptoApi#crossSignDevice}.\n */\n public async crossSignDevice(deviceId: string): Promise<void> {\n await this.setDeviceVerified(this.userId, deviceId, true);\n }\n\n /**\n * Update the blocked/verified state of the given device\n *\n * @param userId - owner of the device\n * @param deviceId - unique identifier for the device or user's\n * cross-signing public key ID.\n *\n * @param verified - whether to mark the device as verified. Null to\n * leave unchanged.\n *\n * @param blocked - whether to mark the device as blocked. Null to\n * leave unchanged.\n *\n * @param known - whether to mark that the user has been made aware of\n * the existence of this device. Null to leave unchanged\n *\n * @param keys - The list of keys that was present\n * during the device verification. This will be double checked with the list\n * of keys the given device has currently.\n *\n * @returns updated DeviceInfo\n */\n public async setDeviceVerification(\n userId: string,\n deviceId: string,\n verified: boolean | null = null,\n blocked: boolean | null = null,\n known: boolean | null = null,\n keys?: Record<string, string>,\n ): Promise<DeviceInfo | CrossSigningInfo | CrossSigningKeyInfo | undefined> {\n // Check if the 'device' is actually a cross signing key\n // The js-sdk's verification treats cross-signing keys as devices\n // and so uses this method to mark them verified.\n const xsk = this.deviceList.getStoredCrossSigningForUser(userId);\n if (xsk?.getId() === deviceId) {\n if (blocked !== null || known !== null) {\n throw new Error(\"Cannot set blocked or known for a cross-signing key\");\n }\n if (!verified) {\n throw new Error(\"Cannot set a cross-signing key as unverified\");\n }\n const gotKeyId = keys ? Object.values(keys)[0] : null;\n if (keys && (Object.values(keys).length !== 1 || gotKeyId !== xsk.getId())) {\n throw new Error(`Key did not match expected value: expected ${xsk.getId()}, got ${gotKeyId}`);\n }\n\n if (!this.crossSigningInfo.getId() && userId === this.crossSigningInfo.userId) {\n this.storeTrustedSelfKeys(xsk.keys);\n // This will cause our own user trust to change, so emit the event\n this.emit(CryptoEvent.UserTrustStatusChanged, this.userId, this.checkUserTrust(userId));\n }\n\n // Now sign the master key with our user signing key (unless it's ourself)\n if (userId !== this.userId) {\n logger.info(\"Master key \" + xsk.getId() + \" for \" + userId + \" marked verified. Signing...\");\n const device = await this.crossSigningInfo.signUser(xsk);\n if (device) {\n const upload = async ({ shouldEmit = false }): Promise<void> => {\n logger.info(\"Uploading signature for \" + userId + \"...\");\n const response = await this.baseApis.uploadKeySignatures({\n [userId]: {\n [deviceId]: device,\n },\n });\n const { failures } = response || {};\n if (Object.keys(failures || []).length > 0) {\n if (shouldEmit) {\n this.baseApis.emit(\n CryptoEvent.KeySignatureUploadFailure,\n failures,\n \"setDeviceVerification\",\n upload,\n );\n }\n /* Throwing here causes the process to be cancelled and the other\n * user to be notified */\n throw new KeySignatureUploadError(\"Key upload failed\", { failures });\n }\n };\n await upload({ shouldEmit: true });\n\n // This will emit events when it comes back down the sync\n // (we could do local echo to speed things up)\n }\n return device!;\n } else {\n return xsk;\n }\n }\n\n const devices = this.deviceList.getRawStoredDevicesForUser(userId);\n if (!devices || !devices[deviceId]) {\n throw new Error(\"Unknown device \" + userId + \":\" + deviceId);\n }\n\n const dev = devices[deviceId];\n let verificationStatus = dev.verified;\n\n if (verified) {\n if (keys) {\n for (const [keyId, key] of Object.entries(keys)) {\n if (dev.keys[keyId] !== key) {\n throw new Error(`Key did not match expected value: expected ${key}, got ${dev.keys[keyId]}`);\n }\n }\n }\n verificationStatus = DeviceVerification.VERIFIED;\n } else if (verified !== null && verificationStatus == DeviceVerification.VERIFIED) {\n verificationStatus = DeviceVerification.UNVERIFIED;\n }\n\n if (blocked) {\n verificationStatus = DeviceVerification.BLOCKED;\n } else if (blocked !== null && verificationStatus == DeviceVerification.BLOCKED) {\n verificationStatus = DeviceVerification.UNVERIFIED;\n }\n\n let knownStatus = dev.known;\n if (known !== null) {\n knownStatus = known;\n }\n\n if (dev.verified !== verificationStatus || dev.known !== knownStatus) {\n dev.verified = verificationStatus;\n dev.known = knownStatus;\n this.deviceList.storeDevicesForUser(userId, devices);\n this.deviceList.saveIfDirty();\n }\n\n // do cross-signing\n if (verified && userId === this.userId) {\n logger.info(\"Own device \" + deviceId + \" marked verified: signing\");\n\n // Signing only needed if other device not already signed\n let device: ISignedKey | undefined;\n const deviceTrust = this.checkDeviceTrust(userId, deviceId);\n if (deviceTrust.isCrossSigningVerified()) {\n logger.log(`Own device ${deviceId} already cross-signing verified`);\n } else {\n device = (await this.crossSigningInfo.signDevice(userId, DeviceInfo.fromStorage(dev, deviceId)))!;\n }\n\n if (device) {\n const upload = async ({ shouldEmit = false }): Promise<void> => {\n logger.info(\"Uploading signature for \" + deviceId);\n const response = await this.baseApis.uploadKeySignatures({\n [userId]: {\n [deviceId]: device!,\n },\n });\n const { failures } = response || {};\n if (Object.keys(failures || []).length > 0) {\n if (shouldEmit) {\n this.baseApis.emit(\n CryptoEvent.KeySignatureUploadFailure,\n failures,\n \"setDeviceVerification\",\n upload, // continuation\n );\n }\n throw new KeySignatureUploadError(\"Key upload failed\", { failures });\n }\n };\n await upload({ shouldEmit: true });\n // XXX: we'll need to wait for the device list to be updated\n }\n }\n\n const deviceObj = DeviceInfo.fromStorage(dev, deviceId);\n this.emit(CryptoEvent.DeviceVerificationChanged, userId, deviceId, deviceObj);\n return deviceObj;\n }\n\n public findVerificationRequestDMInProgress(roomId: string, userId?: string): VerificationRequest | undefined {\n return this.inRoomVerificationRequests.findRequestInProgress(roomId, userId);\n }\n\n public getVerificationRequestsToDeviceInProgress(userId: string): VerificationRequest[] {\n return this.toDeviceVerificationRequests.getRequestsInProgress(userId);\n }\n\n public requestVerificationDM(userId: string, roomId: string): Promise<VerificationRequest> {\n const existingRequest = this.inRoomVerificationRequests.findRequestInProgress(roomId);\n if (existingRequest) {\n return Promise.resolve(existingRequest);\n }\n const channel = new InRoomChannel(this.baseApis, roomId, userId);\n return this.requestVerificationWithChannel(userId, channel, this.inRoomVerificationRequests);\n }\n\n /** @deprecated Use `requestOwnUserVerificationToDevice` or `requestDeviceVerification` */\n public requestVerification(userId: string, devices?: string[]): Promise<VerificationRequest> {\n if (!devices) {\n devices = Object.keys(this.deviceList.getRawStoredDevicesForUser(userId));\n }\n const existingRequest = this.toDeviceVerificationRequests.findRequestInProgress(userId, devices);\n if (existingRequest) {\n return Promise.resolve(existingRequest);\n }\n const channel = new ToDeviceChannel(this.baseApis, userId, devices, ToDeviceChannel.makeTransactionId());\n return this.requestVerificationWithChannel(userId, channel, this.toDeviceVerificationRequests);\n }\n\n public requestOwnUserVerification(): Promise<VerificationRequest> {\n return this.requestVerification(this.userId);\n }\n\n public requestDeviceVerification(userId: string, deviceId: string): Promise<VerificationRequest> {\n return this.requestVerification(userId, [deviceId]);\n }\n\n private async requestVerificationWithChannel(\n userId: string,\n channel: IVerificationChannel,\n requestsMap: IRequestsMap,\n ): Promise<VerificationRequest> {\n let request = new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n // if transaction id is already known, add request\n if (channel.transactionId) {\n requestsMap.setRequestByChannel(channel, request);\n }\n await request.sendRequest();\n // don't replace the request created by a racing remote echo\n const racingRequest = requestsMap.getRequestByChannel(channel);\n if (racingRequest) {\n request = racingRequest;\n } else {\n logger.log(\n `Crypto: adding new request to ` + `requestsByTxnId with id ${channel.transactionId} ${channel.roomId}`,\n );\n requestsMap.setRequestByChannel(channel, request);\n }\n return request;\n }\n\n public beginKeyVerification(\n method: string,\n userId: string,\n deviceId: string,\n transactionId: string | null = null,\n ): VerificationBase<any, any> {\n let request: Request | undefined;\n if (transactionId) {\n request = this.toDeviceVerificationRequests.getRequestBySenderAndTxnId(userId, transactionId);\n if (!request) {\n throw new Error(`No request found for user ${userId} with ` + `transactionId ${transactionId}`);\n }\n } else {\n transactionId = ToDeviceChannel.makeTransactionId();\n const channel = new ToDeviceChannel(this.baseApis, userId, [deviceId], transactionId, deviceId);\n request = new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n this.toDeviceVerificationRequests.setRequestBySenderAndTxnId(userId, transactionId, request);\n }\n return request.beginKeyVerification(method, { userId, deviceId });\n }\n\n public async legacyDeviceVerification(\n userId: string,\n deviceId: string,\n method: VerificationMethod,\n ): Promise<VerificationRequest> {\n const transactionId = ToDeviceChannel.makeTransactionId();\n const channel = new ToDeviceChannel(this.baseApis, userId, [deviceId], transactionId, deviceId);\n const request = new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n this.toDeviceVerificationRequests.setRequestBySenderAndTxnId(userId, transactionId, request);\n const verifier = request.beginKeyVerification(method, { userId, deviceId });\n // either reject by an error from verify() while sending .start\n // or resolve when the request receives the\n // local (fake remote) echo for sending the .start event\n await Promise.race([verifier.verify(), request.waitFor((r) => r.started)]);\n return request;\n }\n\n /**\n * Get information on the active olm sessions with a user\n * <p>\n * Returns a map from device id to an object with keys 'deviceIdKey' (the\n * device's curve25519 identity key) and 'sessions' (an array of objects in the\n * same format as that returned by\n * {@link OlmDevice#getSessionInfoForDevice}).\n * <p>\n * This method is provided for debugging purposes.\n *\n * @param userId - id of user to inspect\n */\n public async getOlmSessionsForUser(userId: string): Promise<Record<string, IUserOlmSession>> {\n const devices = this.getStoredDevicesForUser(userId) || [];\n const result: { [deviceId: string]: IUserOlmSession } = {};\n for (const device of devices) {\n const deviceKey = device.getIdentityKey();\n const sessions = await this.olmDevice.getSessionInfoForDevice(deviceKey);\n\n result[device.deviceId] = {\n deviceIdKey: deviceKey,\n sessions: sessions,\n };\n }\n return result;\n }\n\n /**\n * Get the device which sent an event\n *\n * @param event - event to be checked\n */\n public getEventSenderDeviceInfo(event: MatrixEvent): DeviceInfo | null {\n const senderKey = event.getSenderKey();\n const algorithm = event.getWireContent().algorithm;\n\n if (!senderKey || !algorithm) {\n return null;\n }\n\n if (event.isKeySourceUntrusted()) {\n // we got the key for this event from a source that we consider untrusted\n return null;\n }\n\n // senderKey is the Curve25519 identity key of the device which the event\n // was sent from. In the case of Megolm, it's actually the Curve25519\n // identity key of the device which set up the Megolm session.\n\n const device = this.deviceList.getDeviceByIdentityKey(algorithm, senderKey);\n\n if (device === null) {\n // we haven't downloaded the details of this device yet.\n return null;\n }\n\n // so far so good, but now we need to check that the sender of this event\n // hadn't advertised someone else's Curve25519 key as their own. We do that\n // by checking the Ed25519 claimed by the event (or, in the case of megolm,\n // the event which set up the megolm session), to check that it matches the\n // fingerprint of the purported sending device.\n //\n // (see https://github.com/vector-im/vector-web/issues/2215)\n\n const claimedKey = event.getClaimedEd25519Key();\n if (!claimedKey) {\n logger.warn(\"Event \" + event.getId() + \" claims no ed25519 key: \" + \"cannot verify sending device\");\n return null;\n }\n\n if (claimedKey !== device.getFingerprint()) {\n logger.warn(\n \"Event \" +\n event.getId() +\n \" claims ed25519 key \" +\n claimedKey +\n \" but sender device has key \" +\n device.getFingerprint(),\n );\n return null;\n }\n\n return device;\n }\n\n /**\n * Get information about the encryption of an event\n *\n * @param event - event to be checked\n *\n * @returns An object with the fields:\n * - encrypted: whether the event is encrypted (if not encrypted, some of the\n * other properties may not be set)\n * - senderKey: the sender's key\n * - algorithm: the algorithm used to encrypt the event\n * - authenticated: whether we can be sure that the owner of the senderKey\n * sent the event\n * - sender: the sender's device information, if available\n * - mismatchedSender: if the event's ed25519 and curve25519 keys don't match\n * (only meaningful if `sender` is set)\n */\n public getEventEncryptionInfo(event: MatrixEvent): IEncryptedEventInfo {\n const ret: Partial<IEncryptedEventInfo> = {};\n\n ret.senderKey = event.getSenderKey() ?? undefined;\n ret.algorithm = event.getWireContent().algorithm;\n\n if (!ret.senderKey || !ret.algorithm) {\n ret.encrypted = false;\n return ret as IEncryptedEventInfo;\n }\n ret.encrypted = true;\n\n if (event.isKeySourceUntrusted()) {\n // we got the key this event from somewhere else\n // TODO: check if we can trust the forwarders.\n ret.authenticated = false;\n } else {\n ret.authenticated = true;\n }\n\n // senderKey is the Curve25519 identity key of the device which the event\n // was sent from. In the case of Megolm, it's actually the Curve25519\n // identity key of the device which set up the Megolm session.\n\n ret.sender = this.deviceList.getDeviceByIdentityKey(ret.algorithm, ret.senderKey) ?? undefined;\n\n // so far so good, but now we need to check that the sender of this event\n // hadn't advertised someone else's Curve25519 key as their own. We do that\n // by checking the Ed25519 claimed by the event (or, in the case of megolm,\n // the event which set up the megolm session), to check that it matches the\n // fingerprint of the purported sending device.\n //\n // (see https://github.com/vector-im/vector-web/issues/2215)\n\n const claimedKey = event.getClaimedEd25519Key();\n if (!claimedKey) {\n logger.warn(\"Event \" + event.getId() + \" claims no ed25519 key: \" + \"cannot verify sending device\");\n ret.mismatchedSender = true;\n }\n\n if (ret.sender && claimedKey !== ret.sender.getFingerprint()) {\n logger.warn(\n \"Event \" +\n event.getId() +\n \" claims ed25519 key \" +\n claimedKey +\n \"but sender device has key \" +\n ret.sender.getFingerprint(),\n );\n ret.mismatchedSender = true;\n }\n\n return ret as IEncryptedEventInfo;\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi.getEncryptionInfoForEvent}.\n */\n public async getEncryptionInfoForEvent(event: MatrixEvent): Promise<EventEncryptionInfo | null> {\n const encryptionInfo = this.getEventEncryptionInfo(event);\n if (!encryptionInfo.encrypted) {\n return null;\n }\n\n const senderId = event.getSender();\n if (!senderId || encryptionInfo.mismatchedSender) {\n // something definitely wrong is going on here\n\n // previously: E2EState.Warning -> E2ePadlockUnverified -> Red/\"Encrypted by an unverified session\"\n return {\n shieldColour: EventShieldColour.RED,\n shieldReason: EventShieldReason.MISMATCHED_SENDER_KEY,\n };\n }\n\n const userTrust = this.checkUserTrust(senderId);\n if (!userTrust.isCrossSigningVerified()) {\n // If the message is unauthenticated, then display a grey\n // shield, otherwise if the user isn't cross-signed then\n // nothing's needed\n if (!encryptionInfo.authenticated) {\n // previously: E2EState.Unauthenticated -> E2ePadlockUnauthenticated -> Grey/\"The authenticity of this encrypted message can't be guaranteed on this device.\"\n return {\n shieldColour: EventShieldColour.GREY,\n shieldReason: EventShieldReason.AUTHENTICITY_NOT_GUARANTEED,\n };\n } else {\n // previously: E2EState.Normal -> no icon\n return { shieldColour: EventShieldColour.NONE, shieldReason: null };\n }\n }\n\n const eventSenderTrust =\n senderId &&\n encryptionInfo.sender &&\n (await this.getDeviceVerificationStatus(senderId, encryptionInfo.sender.deviceId));\n\n if (!eventSenderTrust) {\n // previously: E2EState.Unknown -> E2ePadlockUnknown -> Grey/\"Encrypted by a deleted session\"\n return {\n shieldColour: EventShieldColour.GREY,\n shieldReason: EventShieldReason.UNKNOWN_DEVICE,\n };\n }\n\n if (!eventSenderTrust.isVerified()) {\n // previously: E2EState.Warning -> E2ePadlockUnverified -> Red/\"Encrypted by an unverified session\"\n return {\n shieldColour: EventShieldColour.RED,\n shieldReason: EventShieldReason.UNSIGNED_DEVICE,\n };\n }\n\n if (!encryptionInfo.authenticated) {\n // previously: E2EState.Unauthenticated -> E2ePadlockUnauthenticated -> Grey/\"The authenticity of this encrypted message can't be guaranteed on this device.\"\n return {\n shieldColour: EventShieldColour.GREY,\n shieldReason: EventShieldReason.AUTHENTICITY_NOT_GUARANTEED,\n };\n }\n\n // previously: E2EState.Verified -> no icon\n return { shieldColour: EventShieldColour.NONE, shieldReason: null };\n }\n\n /**\n * Forces the current outbound group session to be discarded such\n * that another one will be created next time an event is sent.\n *\n * @param roomId - The ID of the room to discard the session for\n *\n * This should not normally be necessary.\n */\n public forceDiscardSession(roomId: string): Promise<void> {\n const alg = this.roomEncryptors.get(roomId);\n if (alg === undefined) throw new Error(\"Room not encrypted\");\n if (alg.forceDiscardSession === undefined) {\n throw new Error(\"Room encryption algorithm doesn't support session discarding\");\n }\n alg.forceDiscardSession();\n return Promise.resolve();\n }\n\n /**\n * Configure a room to use encryption (ie, save a flag in the cryptoStore).\n *\n * @param roomId - The room ID to enable encryption in.\n *\n * @param config - The encryption config for the room.\n *\n * @param inhibitDeviceQuery - true to suppress device list query for\n * users in the room (for now). In case lazy loading is enabled,\n * the device query is always inhibited as the members are not tracked.\n *\n * @deprecated It is normally incorrect to call this method directly. Encryption\n * is enabled by receiving an `m.room.encryption` event (which we may have sent\n * previously).\n */\n public async setRoomEncryption(\n roomId: string,\n config: IRoomEncryption,\n inhibitDeviceQuery?: boolean,\n ): Promise<void> {\n const room = this.clientStore.getRoom(roomId);\n if (!room) {\n throw new Error(`Unable to enable encryption tracking devices in unknown room ${roomId}`);\n }\n await this.setRoomEncryptionImpl(room, config);\n if (!this.lazyLoadMembers && !inhibitDeviceQuery) {\n this.deviceList.refreshOutdatedDeviceLists();\n }\n }\n\n /**\n * Set up encryption for a room.\n *\n * This is called when an <tt>m.room.encryption</tt> event is received. It saves a flag\n * for the room in the cryptoStore (if it wasn't already set), sets up an \"encryptor\" for\n * the room, and enables device-list tracking for the room.\n *\n * It does <em>not</em> initiate a device list query for the room. That is normally\n * done once we finish processing the sync, in onSyncCompleted.\n *\n * @param room - The room to enable encryption in.\n * @param config - The encryption config for the room.\n */\n private async setRoomEncryptionImpl(room: Room, config: IRoomEncryption): Promise<void> {\n const roomId = room.roomId;\n\n // ignore crypto events with no algorithm defined\n // This will happen if a crypto event is redacted before we fetch the room state\n // It would otherwise just throw later as an unknown algorithm would, but we may\n // as well catch this here\n if (!config.algorithm) {\n logger.log(\"Ignoring setRoomEncryption with no algorithm\");\n return;\n }\n\n // if state is being replayed from storage, we might already have a configuration\n // for this room as they are persisted as well.\n // We just need to make sure the algorithm is initialized in this case.\n // However, if the new config is different,\n // we should bail out as room encryption can't be changed once set.\n const existingConfig = this.roomList.getRoomEncryption(roomId);\n if (existingConfig) {\n if (JSON.stringify(existingConfig) != JSON.stringify(config)) {\n logger.error(\"Ignoring m.room.encryption event which requests \" + \"a change of config in \" + roomId);\n return;\n }\n }\n // if we already have encryption in this room, we should ignore this event,\n // as it would reset the encryption algorithm.\n // This is at least expected to be called twice, as sync calls onCryptoEvent\n // for both the timeline and state sections in the /sync response,\n // the encryption event would appear in both.\n // If it's called more than twice though,\n // it signals a bug on client or server.\n const existingAlg = this.roomEncryptors.get(roomId);\n if (existingAlg) {\n return;\n }\n\n // _roomList.getRoomEncryption will not race with _roomList.setRoomEncryption\n // because it first stores in memory. We should await the promise only\n // after all the in-memory state (roomEncryptors and _roomList) has been updated\n // to avoid races when calling this method multiple times. Hence keep a hold of the promise.\n let storeConfigPromise: Promise<void> | null = null;\n if (!existingConfig) {\n storeConfigPromise = this.roomList.setRoomEncryption(roomId, config);\n }\n\n const AlgClass = algorithms.ENCRYPTION_CLASSES.get(config.algorithm);\n if (!AlgClass) {\n throw new Error(\"Unable to encrypt with \" + config.algorithm);\n }\n\n const alg = new AlgClass({\n userId: this.userId,\n deviceId: this.deviceId,\n crypto: this,\n olmDevice: this.olmDevice,\n baseApis: this.baseApis,\n roomId,\n config,\n });\n this.roomEncryptors.set(roomId, alg);\n\n if (storeConfigPromise) {\n await storeConfigPromise;\n }\n\n logger.log(`Enabling encryption in ${roomId}`);\n\n // we don't want to force a download of the full membership list of this room, but as soon as we have that\n // list we can start tracking the device list.\n if (room.membersLoaded()) {\n await this.trackRoomDevicesImpl(room);\n } else {\n // wait for the membership list to be loaded\n const onState = (_state: RoomState): void => {\n room.off(RoomStateEvent.Update, onState);\n if (room.membersLoaded()) {\n this.trackRoomDevicesImpl(room).catch((e) => {\n logger.error(`Error enabling device tracking in ${roomId}`, e);\n });\n }\n };\n room.on(RoomStateEvent.Update, onState);\n }\n }\n\n /**\n * Make sure we are tracking the device lists for all users in this room.\n *\n * @param roomId - The room ID to start tracking devices in.\n * @returns when all devices for the room have been fetched and marked to track\n * @deprecated there's normally no need to call this function: device list tracking\n * will be enabled as soon as we have the full membership list.\n */\n public trackRoomDevices(roomId: string): Promise<void> {\n const room = this.clientStore.getRoom(roomId);\n if (!room) {\n throw new Error(`Unable to start tracking devices in unknown room ${roomId}`);\n }\n return this.trackRoomDevicesImpl(room);\n }\n\n /**\n * Make sure we are tracking the device lists for all users in this room.\n *\n * This is normally called when we are about to send an encrypted event, to make sure\n * we have all the devices in the room; but it is also called when processing an\n * m.room.encryption state event (if lazy-loading is disabled), or when members are\n * loaded (if lazy-loading is enabled), to prepare the device list.\n *\n * @param room - Room to enable device-list tracking in\n */\n private trackRoomDevicesImpl(room: Room): Promise<void> {\n const roomId = room.roomId;\n const trackMembers = async (): Promise<void> => {\n // not an encrypted room\n if (!this.roomEncryptors.has(roomId)) {\n return;\n }\n logger.log(`Starting to track devices for room ${roomId} ...`);\n const members = await room.getEncryptionTargetMembers();\n members.forEach((m) => {\n this.deviceList.startTrackingDeviceList(m.userId);\n });\n };\n\n let promise = this.roomDeviceTrackingState[roomId];\n if (!promise) {\n promise = trackMembers();\n this.roomDeviceTrackingState[roomId] = promise.catch((err) => {\n delete this.roomDeviceTrackingState[roomId];\n throw err;\n });\n }\n return promise;\n }\n\n /**\n * Try to make sure we have established olm sessions for all known devices for\n * the given users.\n *\n * @param users - list of user ids\n * @param force - If true, force a new Olm session to be created. Default false.\n *\n * @returns resolves once the sessions are complete, to\n * an Object mapping from userId to deviceId to\n * `IOlmSessionResult`\n */\n public ensureOlmSessionsForUsers(\n users: string[],\n force?: boolean,\n ): Promise<Map<string, Map<string, olmlib.IOlmSessionResult>>> {\n // map user Id → DeviceInfo[]\n const devicesByUser: Map<string, DeviceInfo[]> = new Map();\n\n for (const userId of users) {\n const userDevices: DeviceInfo[] = [];\n devicesByUser.set(userId, userDevices);\n\n const devices = this.getStoredDevicesForUser(userId) || [];\n for (const deviceInfo of devices) {\n const key = deviceInfo.getIdentityKey();\n if (key == this.olmDevice.deviceCurve25519Key) {\n // don't bother setting up session to ourself\n continue;\n }\n if (deviceInfo.verified == DeviceVerification.BLOCKED) {\n // don't bother setting up sessions with blocked users\n continue;\n }\n\n userDevices.push(deviceInfo);\n }\n }\n\n return olmlib.ensureOlmSessionsForDevices(this.olmDevice, this.baseApis, devicesByUser, force);\n }\n\n /**\n * Get a list containing all of the room keys\n *\n * @returns a list of session export objects\n */\n public async exportRoomKeys(): Promise<IMegolmSessionData[]> {\n const exportedSessions: IMegolmSessionData[] = [];\n await this.cryptoStore.doTxn(\"readonly\", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS], (txn) => {\n this.cryptoStore.getAllEndToEndInboundGroupSessions(txn, (s) => {\n if (s === null) return;\n\n const sess = this.olmDevice.exportInboundGroupSession(s.senderKey, s.sessionId, s.sessionData!);\n delete sess.first_known_index;\n sess.algorithm = olmlib.MEGOLM_ALGORITHM;\n exportedSessions.push(sess);\n });\n });\n\n return exportedSessions;\n }\n\n /**\n * Get a JSON list containing all of the room keys\n *\n * @returns a JSON string encoding a list of session\n * export objects, each of which is an IMegolmSessionData\n */\n public async exportRoomKeysAsJson(): Promise<string> {\n return JSON.stringify(await this.exportRoomKeys());\n }\n\n /**\n * Import a list of room keys previously exported by exportRoomKeys\n *\n * @param keys - a list of session export objects\n * @returns a promise which resolves once the keys have been imported\n */\n public importRoomKeys(keys: IMegolmSessionData[], opts: ImportRoomKeysOpts = {}): Promise<void> {\n let successes = 0;\n let failures = 0;\n const total = keys.length;\n\n function updateProgress(): void {\n opts.progressCallback?.({\n stage: \"load_keys\",\n successes,\n failures,\n total,\n });\n }\n\n return Promise.all(\n keys.map((key) => {\n if (!key.room_id || !key.algorithm) {\n logger.warn(\"ignoring room key entry with missing fields\", key);\n failures++;\n if (opts.progressCallback) {\n updateProgress();\n }\n return null;\n }\n\n const alg = this.getRoomDecryptor(key.room_id, key.algorithm);\n return alg.importRoomKey(key, opts).finally(() => {\n successes++;\n if (opts.progressCallback) {\n updateProgress();\n }\n });\n }),\n ).then();\n }\n\n /**\n * Import a JSON string encoding a list of room keys previously\n * exported by exportRoomKeysAsJson\n *\n * @param keys - a JSON string encoding a list of session export\n * objects, each of which is an IMegolmSessionData\n * @param opts - options object\n * @returns a promise which resolves once the keys have been imported\n */\n public async importRoomKeysAsJson(keys: string, opts?: ImportRoomKeysOpts): Promise<void> {\n return await this.importRoomKeys(JSON.parse(keys));\n }\n\n /**\n * Counts the number of end to end session keys that are waiting to be backed up\n * @returns Promise which resolves to the number of sessions requiring backup\n */\n public countSessionsNeedingBackup(): Promise<number> {\n return this.backupManager.countSessionsNeedingBackup();\n }\n\n /**\n * Perform any background tasks that can be done before a message is ready to\n * send, in order to speed up sending of the message.\n *\n * @param room - the room the event is in\n */\n public prepareToEncrypt(room: Room): void {\n const alg = this.roomEncryptors.get(room.roomId);\n if (alg) {\n alg.prepareToEncrypt(room);\n }\n }\n\n /**\n * Encrypt an event according to the configuration of the room.\n *\n * @param event - event to be sent\n *\n * @param room - destination room.\n *\n * @returns Promise which resolves when the event has been\n * encrypted, or null if nothing was needed\n */\n public async encryptEvent(event: MatrixEvent, room: Room): Promise<void> {\n const roomId = event.getRoomId()!;\n\n const alg = this.roomEncryptors.get(roomId);\n if (!alg) {\n // MatrixClient has already checked that this room should be encrypted,\n // so this is an unexpected situation.\n throw new Error(\n \"Room \" +\n roomId +\n \" was previously configured to use encryption, but is \" +\n \"no longer. Perhaps the homeserver is hiding the \" +\n \"configuration event.\",\n );\n }\n\n // wait for all the room devices to be loaded\n await this.trackRoomDevicesImpl(room);\n\n let content = event.getContent();\n // If event has an m.relates_to then we need\n // to put this on the wrapping event instead\n const mRelatesTo = content[\"m.relates_to\"];\n if (mRelatesTo) {\n // Clone content here so we don't remove `m.relates_to` from the local-echo\n content = Object.assign({}, content);\n delete content[\"m.relates_to\"];\n }\n\n // Treat element's performance metrics the same as `m.relates_to` (when present)\n const elementPerfMetrics = content[\"io.element.performance_metrics\"];\n if (elementPerfMetrics) {\n content = Object.assign({}, content);\n delete content[\"io.element.performance_metrics\"];\n }\n\n const encryptedContent = (await alg.encryptMessage(room, event.getType(), content)) as IContent;\n\n if (mRelatesTo) {\n encryptedContent[\"m.relates_to\"] = mRelatesTo;\n }\n if (elementPerfMetrics) {\n encryptedContent[\"io.element.performance_metrics\"] = elementPerfMetrics;\n }\n\n event.makeEncrypted(\n \"m.room.encrypted\",\n encryptedContent,\n this.olmDevice.deviceCurve25519Key!,\n this.olmDevice.deviceEd25519Key!,\n );\n }\n\n /**\n * Decrypt a received event\n *\n *\n * @returns resolves once we have\n * finished decrypting. Rejects with an `algorithms.DecryptionError` if there\n * is a problem decrypting the event.\n */\n public async decryptEvent(event: MatrixEvent): Promise<IEventDecryptionResult> {\n if (event.isRedacted()) {\n // Try to decrypt the redaction event, to support encrypted\n // redaction reasons. If we can't decrypt, just fall back to using\n // the original redacted_because.\n const redactionEvent = new MatrixEvent({\n room_id: event.getRoomId(),\n ...event.getUnsigned().redacted_because,\n });\n let redactedBecause: IEvent = event.getUnsigned().redacted_because!;\n if (redactionEvent.isEncrypted()) {\n try {\n const decryptedEvent = await this.decryptEvent(redactionEvent);\n redactedBecause = decryptedEvent.clearEvent as IEvent;\n } catch (e) {\n logger.warn(\"Decryption of redaction failed. Falling back to unencrypted event.\", e);\n }\n }\n\n return {\n clearEvent: {\n room_id: event.getRoomId(),\n type: \"m.room.message\",\n content: {},\n unsigned: {\n redacted_because: redactedBecause,\n },\n },\n };\n } else {\n const content = event.getWireContent();\n const alg = this.getRoomDecryptor(event.getRoomId()!, content.algorithm);\n return alg.decryptEvent(event);\n }\n }\n\n /**\n * Handle the notification from /sync that device lists have\n * been changed.\n *\n * @param deviceLists - device_lists field from /sync\n */\n public async processDeviceLists(deviceLists: IDeviceLists): Promise<void> {\n // Here, we're relying on the fact that we only ever save the sync data after\n // sucessfully saving the device list data, so we're guaranteed that the device\n // list store is at least as fresh as the sync token from the sync store, ie.\n // any device changes received in sync tokens prior to the 'next' token here\n // have been processed and are reflected in the current device list.\n // If we didn't make this assumption, we'd have to use the /keys/changes API\n // to get key changes between the sync token in the device list and the 'old'\n // sync token used here to make sure we didn't miss any.\n await this.evalDeviceListChanges(deviceLists);\n }\n\n /**\n * Send a request for some room keys, if we have not already done so\n *\n * @param resend - whether to resend the key request if there is\n * already one\n *\n * @returns a promise that resolves when the key request is queued\n */\n public requestRoomKey(\n requestBody: IRoomKeyRequestBody,\n recipients: IRoomKeyRequestRecipient[],\n resend = false,\n ): Promise<void> {\n return this.outgoingRoomKeyRequestManager\n .queueRoomKeyRequest(requestBody, recipients, resend)\n .then(() => {\n if (this.sendKeyRequestsImmediately) {\n this.outgoingRoomKeyRequestManager.sendQueuedRequests();\n }\n })\n .catch((e) => {\n // this normally means we couldn't talk to the store\n logger.error(\"Error requesting key for event\", e);\n });\n }\n\n /**\n * Cancel any earlier room key request\n *\n * @param requestBody - parameters to match for cancellation\n */\n public cancelRoomKeyRequest(requestBody: IRoomKeyRequestBody): void {\n this.outgoingRoomKeyRequestManager.cancelRoomKeyRequest(requestBody).catch((e) => {\n logger.warn(\"Error clearing pending room key requests\", e);\n });\n }\n\n /**\n * Re-send any outgoing key requests, eg after verification\n * @returns\n */\n public async cancelAndResendAllOutgoingKeyRequests(): Promise<void> {\n await this.outgoingRoomKeyRequestManager.cancelAndResendAllOutgoingRequests();\n }\n\n /**\n * handle an m.room.encryption event\n *\n * @param room - in which the event was received\n * @param event - encryption event to be processed\n */\n public async onCryptoEvent(room: Room, event: MatrixEvent): Promise<void> {\n const content = event.getContent<IRoomEncryption>();\n await this.setRoomEncryptionImpl(room, content);\n }\n\n /**\n * Called before the result of a sync is processed\n *\n * @param syncData - the data from the 'MatrixClient.sync' event\n */\n public async onSyncWillProcess(syncData: ISyncStateData): Promise<void> {\n if (!syncData.oldSyncToken) {\n // If there is no old sync token, we start all our tracking from\n // scratch, so mark everything as untracked. onCryptoEvent will\n // be called for all e2e rooms during the processing of the sync,\n // at which point we'll start tracking all the users of that room.\n logger.log(\"Initial sync performed - resetting device tracking state\");\n this.deviceList.stopTrackingAllDeviceLists();\n // we always track our own device list (for key backups etc)\n this.deviceList.startTrackingDeviceList(this.userId);\n this.roomDeviceTrackingState = {};\n }\n\n this.sendKeyRequestsImmediately = false;\n }\n\n /**\n * handle the completion of a /sync\n *\n * This is called after the processing of each successful /sync response.\n * It is an opportunity to do a batch process on the information received.\n *\n * @param syncData - the data from the 'MatrixClient.sync' event\n */\n public async onSyncCompleted(syncData: OnSyncCompletedData): Promise<void> {\n this.deviceList.setSyncToken(syncData.nextSyncToken ?? null);\n this.deviceList.saveIfDirty();\n\n // we always track our own device list (for key backups etc)\n this.deviceList.startTrackingDeviceList(this.userId);\n\n this.deviceList.refreshOutdatedDeviceLists();\n\n // we don't start uploading one-time keys until we've caught up with\n // to-device messages, to help us avoid throwing away one-time-keys that we\n // are about to receive messages for\n // (https://github.com/vector-im/element-web/issues/2782).\n if (!syncData.catchingUp) {\n this.maybeUploadOneTimeKeys();\n this.processReceivedRoomKeyRequests();\n\n // likewise don't start requesting keys until we've caught up\n // on to_device messages, otherwise we'll request keys that we're\n // just about to get.\n this.outgoingRoomKeyRequestManager.sendQueuedRequests();\n\n // Sync has finished so send key requests straight away.\n this.sendKeyRequestsImmediately = true;\n }\n }\n\n /**\n * Trigger the appropriate invalidations and removes for a given\n * device list\n *\n * @param deviceLists - device_lists field from /sync, or response from\n * /keys/changes\n */\n private async evalDeviceListChanges(deviceLists: Required<ISyncResponse>[\"device_lists\"]): Promise<void> {\n if (Array.isArray(deviceLists?.changed)) {\n deviceLists.changed.forEach((u) => {\n this.deviceList.invalidateUserDeviceList(u);\n });\n }\n\n if (Array.isArray(deviceLists?.left) && deviceLists.left.length) {\n // Check we really don't share any rooms with these users\n // any more: the server isn't required to give us the\n // exact correct set.\n const e2eUserIds = new Set(await this.getTrackedE2eUsers());\n\n deviceLists.left.forEach((u) => {\n if (!e2eUserIds.has(u)) {\n this.deviceList.stopTrackingDeviceList(u);\n }\n });\n }\n }\n\n /**\n * Get a list of all the IDs of users we share an e2e room with\n * for which we are tracking devices already\n *\n * @returns List of user IDs\n */\n private async getTrackedE2eUsers(): Promise<string[]> {\n const e2eUserIds: string[] = [];\n for (const room of this.getTrackedE2eRooms()) {\n const members = await room.getEncryptionTargetMembers();\n for (const member of members) {\n e2eUserIds.push(member.userId);\n }\n }\n return e2eUserIds;\n }\n\n /**\n * Get a list of the e2e-enabled rooms we are members of,\n * and for which we are already tracking the devices\n *\n * @returns\n */\n private getTrackedE2eRooms(): Room[] {\n return this.clientStore.getRooms().filter((room) => {\n // check for rooms with encryption enabled\n const alg = this.roomEncryptors.get(room.roomId);\n if (!alg) {\n return false;\n }\n if (!this.roomDeviceTrackingState[room.roomId]) {\n return false;\n }\n\n // ignore any rooms which we have left\n const myMembership = room.getMyMembership();\n return myMembership === KnownMembership.Join || myMembership === KnownMembership.Invite;\n });\n }\n\n /**\n * Encrypts and sends a given object via Olm to-device messages to a given\n * set of devices.\n * @param userDeviceInfoArr - the devices to send to\n * @param payload - fields to include in the encrypted payload\n * @returns Promise which\n * resolves once the message has been encrypted and sent to the given\n * userDeviceMap, and returns the `{ contentMap, deviceInfoByDeviceId }`\n * of the successfully sent messages.\n *\n * @deprecated Instead use {@link encryptToDeviceMessages} followed by {@link MatrixClient.queueToDevice}.\n */\n public async encryptAndSendToDevices(userDeviceInfoArr: IOlmDevice<DeviceInfo>[], payload: object): Promise<void> {\n try {\n const toDeviceBatch = await this.prepareToDeviceBatch(userDeviceInfoArr, payload);\n\n try {\n await this.baseApis.queueToDevice(toDeviceBatch);\n } catch (e) {\n logger.error(\"sendToDevice failed\", e);\n throw e;\n }\n } catch (e) {\n logger.error(\"encryptAndSendToDevices promises failed\", e);\n throw e;\n }\n }\n\n private async prepareToDeviceBatch(\n userDeviceInfoArr: IOlmDevice<DeviceInfo>[],\n payload: object,\n ): Promise<ToDeviceBatch> {\n const toDeviceBatch: ToDeviceBatch = {\n eventType: EventType.RoomMessageEncrypted,\n batch: [],\n };\n\n await Promise.all(\n userDeviceInfoArr.map(async ({ userId, deviceInfo }) => {\n const deviceId = deviceInfo.deviceId;\n const encryptedContent: IEncryptedContent = {\n algorithm: olmlib.OLM_ALGORITHM,\n sender_key: this.olmDevice.deviceCurve25519Key!,\n ciphertext: {},\n [ToDeviceMessageId]: uuidv4(),\n };\n\n toDeviceBatch.batch.push({\n userId,\n deviceId,\n payload: encryptedContent,\n });\n\n await olmlib.ensureOlmSessionsForDevices(\n this.olmDevice,\n this.baseApis,\n new Map([[userId, [deviceInfo]]]),\n );\n await olmlib.encryptMessageForDevice(\n encryptedContent.ciphertext,\n this.userId,\n this.deviceId,\n this.olmDevice,\n userId,\n deviceInfo,\n payload,\n );\n }),\n );\n\n // prune out any devices that encryptMessageForDevice could not encrypt for,\n // in which case it will have just not added anything to the ciphertext object.\n // There's no point sending messages to devices if we couldn't encrypt to them,\n // since that's effectively a blank message.\n toDeviceBatch.batch = toDeviceBatch.batch.filter((msg) => {\n if (Object.keys(msg.payload.ciphertext).length > 0) {\n return true;\n } else {\n logger.log(`No ciphertext for device ${msg.userId}:${msg.deviceId}: pruning`);\n return false;\n }\n });\n\n return toDeviceBatch;\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#encryptToDeviceMessages}.\n */\n public async encryptToDeviceMessages(\n eventType: string,\n devices: { userId: string; deviceId: string }[],\n payload: ToDevicePayload,\n ): Promise<ToDeviceBatch> {\n const userIds = new Set(devices.map(({ userId }) => userId));\n const deviceInfoMap = await this.downloadKeys(Array.from(userIds), false);\n\n const userDeviceInfoArr: IOlmDevice<DeviceInfo>[] = [];\n\n devices.forEach(({ userId, deviceId }) => {\n const devices = deviceInfoMap.get(userId);\n if (!devices) {\n logger.warn(`No devices found for user ${userId}`);\n return;\n }\n\n if (devices.has(deviceId)) {\n // Send the message to a specific device\n userDeviceInfoArr.push({ userId, deviceInfo: devices.get(deviceId)! });\n } else {\n logger.warn(`No device found for user ${userId} with id ${deviceId}`);\n }\n });\n\n return this.prepareToDeviceBatch(userDeviceInfoArr, payload);\n }\n\n private onMembership = (event: MatrixEvent, member: RoomMember, oldMembership?: string): void => {\n try {\n this.onRoomMembership(event, member, oldMembership);\n } catch (e) {\n logger.error(\"Error handling membership change:\", e);\n }\n };\n\n public async preprocessToDeviceMessages(events: IToDeviceEvent[]): Promise<IToDeviceEvent[]> {\n // all we do here is filter out encrypted to-device messages with the wrong algorithm. Decryption\n // happens later in decryptEvent, via the EventMapper\n return events.filter((toDevice) => {\n if (\n toDevice.type === EventType.RoomMessageEncrypted &&\n ![\"m.olm.v1.curve25519-aes-sha2\"].includes(toDevice.content?.algorithm)\n ) {\n logger.log(\"Ignoring invalid encrypted to-device event from \" + toDevice.sender);\n return false;\n }\n return true;\n });\n }\n\n /**\n * Stores the current one_time_key count which will be handled later (in a call of\n * onSyncCompleted).\n *\n * @param currentCount - The current count of one_time_keys to be stored\n */\n private updateOneTimeKeyCount(currentCount: number): void {\n if (isFinite(currentCount)) {\n this.oneTimeKeyCount = currentCount;\n } else {\n throw new TypeError(\"Parameter for updateOneTimeKeyCount has to be a number\");\n }\n }\n\n public processKeyCounts(oneTimeKeysCounts?: Record<string, number>, unusedFallbackKeys?: string[]): Promise<void> {\n if (oneTimeKeysCounts !== undefined) {\n this.updateOneTimeKeyCount(oneTimeKeysCounts[\"signed_curve25519\"] || 0);\n }\n\n if (unusedFallbackKeys !== undefined) {\n // If `unusedFallbackKeys` is defined, that means `device_unused_fallback_key_types`\n // is present in the sync response, which indicates that the server supports fallback keys.\n //\n // If there's no unused signed_curve25519 fallback key, we need a new one.\n this.needsNewFallback = !unusedFallbackKeys.includes(\"signed_curve25519\");\n }\n\n return Promise.resolve();\n }\n\n private onToDeviceEvent = (event: MatrixEvent): void => {\n try {\n logger.log(\n `received to-device ${event.getType()} from: ` +\n `${event.getSender()} id: ${event.getContent()[ToDeviceMessageId]}`,\n );\n\n if (event.getType() == \"m.room_key\" || event.getType() == \"m.forwarded_room_key\") {\n this.onRoomKeyEvent(event);\n } else if (event.getType() == \"m.room_key_request\") {\n this.onRoomKeyRequestEvent(event);\n } else if (event.getType() === \"m.secret.request\") {\n this.secretStorage.onRequestReceived(event);\n } else if (event.getType() === \"m.secret.send\") {\n this.secretStorage.onSecretReceived(event);\n } else if (event.getType() === \"m.room_key.withheld\") {\n this.onRoomKeyWithheldEvent(event);\n } else if (event.getContent().transaction_id) {\n this.onKeyVerificationMessage(event);\n } else if (event.getContent().msgtype === \"m.bad.encrypted\") {\n this.onToDeviceBadEncrypted(event);\n } else if (event.isBeingDecrypted() || event.shouldAttemptDecryption()) {\n if (!event.isBeingDecrypted()) {\n event.attemptDecryption(this);\n }\n // once the event has been decrypted, try again\n event.once(MatrixEventEvent.Decrypted, (ev) => {\n this.onToDeviceEvent(ev);\n });\n }\n } catch (e) {\n logger.error(\"Error handling toDeviceEvent:\", e);\n }\n };\n\n /**\n * Handle a key event\n *\n * @internal\n * @param event - key event\n */\n private onRoomKeyEvent(event: MatrixEvent): void {\n const content = event.getContent();\n\n if (!content.room_id || !content.algorithm) {\n logger.error(\"key event is missing fields\");\n return;\n }\n\n if (!this.backupManager.checkedForBackup) {\n // don't bother awaiting on this - the important thing is that we retry if we\n // haven't managed to check before\n this.backupManager.checkAndStart();\n }\n\n const alg = this.getRoomDecryptor(content.room_id, content.algorithm);\n alg.onRoomKeyEvent(event);\n }\n\n /**\n * Handle a key withheld event\n *\n * @internal\n * @param event - key withheld event\n */\n private onRoomKeyWithheldEvent(event: MatrixEvent): void {\n const content = event.getContent();\n\n if (\n (content.code !== \"m.no_olm\" && (!content.room_id || !content.session_id)) ||\n !content.algorithm ||\n !content.sender_key\n ) {\n logger.error(\"key withheld event is missing fields\");\n return;\n }\n\n logger.info(\n `Got room key withheld event from ${event.getSender()} ` +\n `for ${content.algorithm} session ${content.sender_key}|${content.session_id} ` +\n `in room ${content.room_id} with code ${content.code} (${content.reason})`,\n );\n\n const alg = this.getRoomDecryptor(content.room_id, content.algorithm);\n if (alg.onRoomKeyWithheldEvent) {\n alg.onRoomKeyWithheldEvent(event);\n }\n if (!content.room_id) {\n // retry decryption for all events sent by the sender_key. This will\n // update the events to show a message indicating that the olm session was\n // wedged.\n const roomDecryptors = this.getRoomDecryptors(content.algorithm);\n for (const decryptor of roomDecryptors) {\n decryptor.retryDecryptionFromSender(content.sender_key);\n }\n }\n }\n\n /**\n * Handle a general key verification event.\n *\n * @internal\n * @param event - verification start event\n */\n private onKeyVerificationMessage(event: MatrixEvent): void {\n if (!ToDeviceChannel.validateEvent(event, this.baseApis)) {\n return;\n }\n const createRequest = (event: MatrixEvent): VerificationRequest | undefined => {\n if (!ToDeviceChannel.canCreateRequest(ToDeviceChannel.getEventType(event))) {\n return;\n }\n const content = event.getContent();\n const deviceId = content && content.from_device;\n if (!deviceId) {\n return;\n }\n const userId = event.getSender()!;\n const channel = new ToDeviceChannel(this.baseApis, userId, [deviceId]);\n return new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n };\n this.handleVerificationEvent(event, this.toDeviceVerificationRequests, createRequest);\n }\n\n /**\n * Handle key verification requests sent as timeline events\n *\n * @internal\n * @param event - the timeline event\n * @param room - not used\n * @param atStart - not used\n * @param removed - not used\n * @param whether - this is a live event\n */\n private onTimelineEvent = (\n event: MatrixEvent,\n room: Room,\n atStart: boolean,\n removed: boolean,\n { liveEvent = true } = {},\n ): void => {\n if (!InRoomChannel.validateEvent(event, this.baseApis)) {\n return;\n }\n const createRequest = (event: MatrixEvent): VerificationRequest => {\n const channel = new InRoomChannel(this.baseApis, event.getRoomId()!);\n return new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n };\n this.handleVerificationEvent(event, this.inRoomVerificationRequests, createRequest, liveEvent);\n };\n\n private async handleVerificationEvent(\n event: MatrixEvent,\n requestsMap: IRequestsMap,\n createRequest: (event: MatrixEvent) => VerificationRequest | undefined,\n isLiveEvent = true,\n ): Promise<void> {\n // Wait for event to get its final ID with pendingEventOrdering: \"chronological\", since DM channels depend on it.\n if (event.isSending() && event.status != EventStatus.SENT) {\n let eventIdListener: () => void;\n let statusListener: () => void;\n try {\n await new Promise<void>((resolve, reject) => {\n eventIdListener = resolve;\n statusListener = (): void => {\n if (event.status == EventStatus.CANCELLED) {\n reject(new Error(\"Event status set to CANCELLED.\"));\n }\n };\n event.once(MatrixEventEvent.LocalEventIdReplaced, eventIdListener);\n event.on(MatrixEventEvent.Status, statusListener);\n });\n } catch (err) {\n logger.error(\"error while waiting for the verification event to be sent: \", err);\n return;\n } finally {\n event.removeListener(MatrixEventEvent.LocalEventIdReplaced, eventIdListener!);\n event.removeListener(MatrixEventEvent.Status, statusListener!);\n }\n }\n let request: VerificationRequest | undefined = requestsMap.getRequest(event);\n let isNewRequest = false;\n if (!request) {\n request = createRequest(event);\n // a request could not be made from this event, so ignore event\n if (!request) {\n logger.log(\n `Crypto: could not find VerificationRequest for ` +\n `${event.getType()}, and could not create one, so ignoring.`,\n );\n return;\n }\n isNewRequest = true;\n requestsMap.setRequest(event, request);\n }\n event.setVerificationRequest(request);\n try {\n await request.channel.handleEvent(event, request, isLiveEvent);\n } catch (err) {\n logger.error(\"error while handling verification event\", err);\n }\n const shouldEmit =\n isNewRequest &&\n !request.initiatedByMe &&\n !request.invalid && // check it has enough events to pass the UNSENT stage\n !request.observeOnly;\n if (shouldEmit) {\n this.baseApis.emit(CryptoEvent.VerificationRequest, request);\n this.baseApis.emit(CryptoEvent.VerificationRequestReceived, request);\n }\n }\n\n /**\n * Handle a toDevice event that couldn't be decrypted\n *\n * @internal\n * @param event - undecryptable event\n */\n private async onToDeviceBadEncrypted(event: MatrixEvent): Promise<void> {\n const content = event.getWireContent();\n const sender = event.getSender();\n const algorithm = content.algorithm;\n const deviceKey = content.sender_key;\n\n this.baseApis.emit(ClientEvent.UndecryptableToDeviceEvent, event);\n\n // retry decryption for all events sent by the sender_key. This will\n // update the events to show a message indicating that the olm session was\n // wedged.\n const retryDecryption = (): void => {\n const roomDecryptors = this.getRoomDecryptors(olmlib.MEGOLM_ALGORITHM);\n for (const decryptor of roomDecryptors) {\n decryptor.retryDecryptionFromSender(deviceKey);\n }\n };\n\n if (sender === undefined || deviceKey === undefined || deviceKey === undefined) {\n return;\n }\n\n // check when we can force a new session with this device: if we've already done so\n // recently, don't do it again.\n const forceNewSessionRetryTimeDevices = this.forceNewSessionRetryTime.getOrCreate(sender);\n const forceNewSessionRetryTime = forceNewSessionRetryTimeDevices.getOrCreate(deviceKey);\n if (forceNewSessionRetryTime > Date.now()) {\n logger.debug(\n `New session already forced with device ${sender}:${deviceKey}: ` +\n `not forcing another until at least ${new Date(forceNewSessionRetryTime).toUTCString()}`,\n );\n await this.olmDevice.recordSessionProblem(deviceKey, \"wedged\", true);\n retryDecryption();\n return;\n }\n\n // make sure we don't retry to unwedge too soon even if we fail to create a new session\n forceNewSessionRetryTimeDevices.set(deviceKey, Date.now() + FORCE_SESSION_RETRY_INTERVAL_MS);\n\n // establish a new olm session with this device since we're failing to decrypt messages\n // on a current session.\n // Note that an undecryptable message from another device could easily be spoofed -\n // is there anything we can do to mitigate this?\n let device = this.deviceList.getDeviceByIdentityKey(algorithm, deviceKey);\n if (!device) {\n // if we don't know about the device, fetch the user's devices again\n // and retry before giving up\n await this.downloadKeys([sender], false);\n device = this.deviceList.getDeviceByIdentityKey(algorithm, deviceKey);\n if (!device) {\n logger.info(\"Couldn't find device for identity key \" + deviceKey + \": not re-establishing session\");\n await this.olmDevice.recordSessionProblem(deviceKey, \"wedged\", false);\n retryDecryption();\n return;\n }\n }\n const devicesByUser = new Map([[sender, [device]]]);\n await olmlib.ensureOlmSessionsForDevices(this.olmDevice, this.baseApis, devicesByUser, true);\n\n forceNewSessionRetryTimeDevices.set(deviceKey, Date.now() + MIN_FORCE_SESSION_INTERVAL_MS);\n\n // Now send a blank message on that session so the other side knows about it.\n // (The keyshare request is sent in the clear so that won't do)\n // We send this first such that, as long as the toDevice messages arrive in the\n // same order we sent them, the other end will get this first, set up the new session,\n // then get the keyshare request and send the key over this new session (because it\n // is the session it has most recently received a message on).\n const encryptedContent: IEncryptedContent = {\n algorithm: olmlib.OLM_ALGORITHM,\n sender_key: this.olmDevice.deviceCurve25519Key!,\n ciphertext: {},\n [ToDeviceMessageId]: uuidv4(),\n };\n await olmlib.encryptMessageForDevice(\n encryptedContent.ciphertext,\n this.userId,\n this.deviceId,\n this.olmDevice,\n sender,\n device,\n { type: \"m.dummy\" },\n );\n\n await this.olmDevice.recordSessionProblem(deviceKey, \"wedged\", true);\n retryDecryption();\n\n await this.baseApis.sendToDevice(\n \"m.room.encrypted\",\n new Map([[sender, new Map([[device.deviceId, encryptedContent]])]]),\n );\n\n // Most of the time this probably won't be necessary since we'll have queued up a key request when\n // we failed to decrypt the message and will be waiting a bit for the key to arrive before sending\n // it. This won't always be the case though so we need to re-send any that have already been sent\n // to avoid races.\n const requestsToResend = await this.outgoingRoomKeyRequestManager.getOutgoingSentRoomKeyRequest(\n sender,\n device.deviceId,\n );\n for (const keyReq of requestsToResend) {\n this.requestRoomKey(keyReq.requestBody, keyReq.recipients, true);\n }\n }\n\n /**\n * Handle a change in the membership state of a member of a room\n *\n * @internal\n * @param event - event causing the change\n * @param member - user whose membership changed\n * @param oldMembership - previous membership\n */\n private onRoomMembership(event: MatrixEvent, member: RoomMember, oldMembership?: string): void {\n // this event handler is registered on the *client* (as opposed to the room\n // member itself), which means it is only called on changes to the *live*\n // membership state (ie, it is not called when we back-paginate, nor when\n // we load the state in the initialsync).\n //\n // Further, it is automatically registered and called when new members\n // arrive in the room.\n\n const roomId = member.roomId;\n\n const alg = this.roomEncryptors.get(roomId);\n if (!alg) {\n // not encrypting in this room\n return;\n }\n // only mark users in this room as tracked if we already started tracking in this room\n // this way we don't start device queries after sync on behalf of this room which we won't use\n // the result of anyway, as we'll need to do a query again once all the members are fetched\n // by calling _trackRoomDevices\n if (roomId in this.roomDeviceTrackingState) {\n if (member.membership == KnownMembership.Join) {\n logger.log(\"Join event for \" + member.userId + \" in \" + roomId);\n // make sure we are tracking the deviceList for this user\n this.deviceList.startTrackingDeviceList(member.userId);\n } else if (\n member.membership == KnownMembership.Invite &&\n this.clientStore.getRoom(roomId)?.shouldEncryptForInvitedMembers()\n ) {\n logger.log(\"Invite event for \" + member.userId + \" in \" + roomId);\n this.deviceList.startTrackingDeviceList(member.userId);\n }\n }\n\n alg.onRoomMembership(event, member, oldMembership);\n }\n\n /**\n * Called when we get an m.room_key_request event.\n *\n * @internal\n * @param event - key request event\n */\n private onRoomKeyRequestEvent(event: MatrixEvent): void {\n const content = event.getContent();\n if (content.action === \"request\") {\n // Queue it up for now, because they tend to arrive before the room state\n // events at initial sync, and we want to see if we know anything about the\n // room before passing them on to the app.\n const req = new IncomingRoomKeyRequest(event);\n this.receivedRoomKeyRequests.push(req);\n } else if (content.action === \"request_cancellation\") {\n const req = new IncomingRoomKeyRequestCancellation(event);\n this.receivedRoomKeyRequestCancellations.push(req);\n }\n }\n\n /**\n * Process any m.room_key_request events which were queued up during the\n * current sync.\n *\n * @internal\n */\n private async processReceivedRoomKeyRequests(): Promise<void> {\n if (this.processingRoomKeyRequests) {\n // we're still processing last time's requests; keep queuing new ones\n // up for now.\n return;\n }\n this.processingRoomKeyRequests = true;\n\n try {\n // we need to grab and clear the queues in the synchronous bit of this method,\n // so that we don't end up racing with the next /sync.\n const requests = this.receivedRoomKeyRequests;\n this.receivedRoomKeyRequests = [];\n const cancellations = this.receivedRoomKeyRequestCancellations;\n this.receivedRoomKeyRequestCancellations = [];\n\n // Process all of the requests, *then* all of the cancellations.\n //\n // This makes sure that if we get a request and its cancellation in the\n // same /sync result, then we process the request before the\n // cancellation (and end up with a cancelled request), rather than the\n // cancellation before the request (and end up with an outstanding\n // request which should have been cancelled.)\n await Promise.all(requests.map((req) => this.processReceivedRoomKeyRequest(req)));\n await Promise.all(\n cancellations.map((cancellation) => this.processReceivedRoomKeyRequestCancellation(cancellation)),\n );\n } catch (e) {\n logger.error(`Error processing room key requsts: ${e}`);\n } finally {\n this.processingRoomKeyRequests = false;\n }\n }\n\n /**\n * Helper for processReceivedRoomKeyRequests\n *\n */\n private async processReceivedRoomKeyRequest(req: IncomingRoomKeyRequest): Promise<void> {\n const userId = req.userId;\n const deviceId = req.deviceId;\n\n const body = req.requestBody;\n const roomId = body.room_id;\n const alg = body.algorithm;\n\n logger.log(\n `m.room_key_request from ${userId}:${deviceId}` +\n ` for ${roomId} / ${body.session_id} (id ${req.requestId})`,\n );\n\n if (userId !== this.userId) {\n if (!this.roomEncryptors.get(roomId)) {\n logger.debug(`room key request for unencrypted room ${roomId}`);\n return;\n }\n const encryptor = this.roomEncryptors.get(roomId)!;\n const device = this.deviceList.getStoredDevice(userId, deviceId);\n if (!device) {\n logger.debug(`Ignoring keyshare for unknown device ${userId}:${deviceId}`);\n return;\n }\n\n try {\n await encryptor.reshareKeyWithDevice!(body.sender_key, body.session_id, userId, device);\n } catch (e) {\n logger.warn(\n \"Failed to re-share keys for session \" +\n body.session_id +\n \" with device \" +\n userId +\n \":\" +\n device.deviceId,\n e,\n );\n }\n return;\n }\n\n if (deviceId === this.deviceId) {\n // We'll always get these because we send room key requests to\n // '*' (ie. 'all devices') which includes the sending device,\n // so ignore requests from ourself because apart from it being\n // very silly, it won't work because an Olm session cannot send\n // messages to itself.\n // The log here is probably superfluous since we know this will\n // always happen, but let's log anyway for now just in case it\n // causes issues.\n logger.log(\"Ignoring room key request from ourselves\");\n return;\n }\n\n // todo: should we queue up requests we don't yet have keys for,\n // in case they turn up later?\n\n // if we don't have a decryptor for this room/alg, we don't have\n // the keys for the requested events, and can drop the requests.\n if (!this.roomDecryptors.has(roomId)) {\n logger.log(`room key request for unencrypted room ${roomId}`);\n return;\n }\n\n const decryptor = this.roomDecryptors.get(roomId)!.get(alg);\n if (!decryptor) {\n logger.log(`room key request for unknown alg ${alg} in room ${roomId}`);\n return;\n }\n\n if (!(await decryptor.hasKeysForKeyRequest(req))) {\n logger.log(`room key request for unknown session ${roomId} / ` + body.session_id);\n return;\n }\n\n req.share = (): void => {\n decryptor.shareKeysWithDevice(req);\n };\n\n // if the device is verified already, share the keys\n if (this.checkDeviceTrust(userId, deviceId).isVerified()) {\n logger.log(\"device is already verified: sharing keys\");\n req.share();\n return;\n }\n\n this.emit(CryptoEvent.RoomKeyRequest, req);\n }\n\n /**\n * Helper for processReceivedRoomKeyRequests\n *\n */\n private async processReceivedRoomKeyRequestCancellation(\n cancellation: IncomingRoomKeyRequestCancellation,\n ): Promise<void> {\n logger.log(\n `m.room_key_request cancellation for ${cancellation.userId}:` +\n `${cancellation.deviceId} (id ${cancellation.requestId})`,\n );\n\n // we should probably only notify the app of cancellations we told it\n // about, but we don't currently have a record of that, so we just pass\n // everything through.\n this.emit(CryptoEvent.RoomKeyRequestCancellation, cancellation);\n }\n\n /**\n * Get a decryptor for a given room and algorithm.\n *\n * If we already have a decryptor for the given room and algorithm, return\n * it. Otherwise try to instantiate it.\n *\n * @internal\n *\n * @param roomId - room id for decryptor. If undefined, a temporary\n * decryptor is instantiated.\n *\n * @param algorithm - crypto algorithm\n *\n * @throws `DecryptionError` if the algorithm is unknown\n */\n public getRoomDecryptor(roomId: string | null, algorithm: string): DecryptionAlgorithm {\n let decryptors: Map<string, DecryptionAlgorithm> | undefined;\n let alg: DecryptionAlgorithm | undefined;\n\n if (roomId) {\n decryptors = this.roomDecryptors.get(roomId);\n if (!decryptors) {\n decryptors = new Map<string, DecryptionAlgorithm>();\n this.roomDecryptors.set(roomId, decryptors);\n }\n\n alg = decryptors.get(algorithm);\n if (alg) {\n return alg;\n }\n }\n\n const AlgClass = algorithms.DECRYPTION_CLASSES.get(algorithm);\n if (!AlgClass) {\n throw new DecryptionError(\n DecryptionFailureCode.UNKNOWN_ENCRYPTION_ALGORITHM,\n 'Unknown encryption algorithm \"' + algorithm + '\".',\n );\n }\n alg = new AlgClass({\n userId: this.userId,\n crypto: this,\n olmDevice: this.olmDevice,\n baseApis: this.baseApis,\n roomId: roomId ?? undefined,\n });\n\n if (decryptors) {\n decryptors.set(algorithm, alg);\n }\n return alg;\n }\n\n /**\n * Get all the room decryptors for a given encryption algorithm.\n *\n * @param algorithm - The encryption algorithm\n *\n * @returns An array of room decryptors\n */\n private getRoomDecryptors(algorithm: string): DecryptionAlgorithm[] {\n const decryptors: DecryptionAlgorithm[] = [];\n for (const d of this.roomDecryptors.values()) {\n if (d.has(algorithm)) {\n decryptors.push(d.get(algorithm)!);\n }\n }\n return decryptors;\n }\n\n /**\n * sign the given object with our ed25519 key\n *\n * @param obj - Object to which we will add a 'signatures' property\n */\n public async signObject<T extends ISignableObject & object>(obj: T): Promise<void> {\n const sigs = new Map(Object.entries(obj.signatures || {}));\n const unsigned = obj.unsigned;\n\n delete obj.signatures;\n delete obj.unsigned;\n\n const userSignatures = sigs.get(this.userId) || {};\n sigs.set(this.userId, userSignatures);\n userSignatures[\"ed25519:\" + this.deviceId] = await this.olmDevice.sign(anotherjson.stringify(obj));\n obj.signatures = recursiveMapToObject(sigs);\n if (unsigned !== undefined) obj.unsigned = unsigned;\n }\n\n /**\n * @returns true if the room with the supplied ID is encrypted. False if the\n * room is not encrypted, or is unknown to us.\n */\n public isRoomEncrypted(roomId: string): boolean {\n return this.roomList.isRoomEncrypted(roomId);\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#isEncryptionEnabledInRoom}.\n */\n public async isEncryptionEnabledInRoom(roomId: string): Promise<boolean> {\n return this.isRoomEncrypted(roomId);\n }\n\n /**\n * @returns information about the encryption on the room with the supplied\n * ID, or null if the room is not encrypted or unknown to us.\n */\n public getRoomEncryption(roomId: string): IRoomEncryption | null {\n return this.roomList.getRoomEncryption(roomId);\n }\n\n /**\n * Returns whether dehydrated devices are supported by the crypto backend\n * and by the server.\n */\n public async isDehydrationSupported(): Promise<boolean> {\n return false;\n }\n\n /**\n * Stub function -- dehydration is not implemented here, so throw error\n */\n public async startDehydration(createNewKey?: boolean): Promise<void> {\n throw new Error(\"Not implemented\");\n }\n\n /**\n * Stub function -- restoreKeyBackup is not implemented here, so throw error\n */\n public restoreKeyBackup(opts: KeyBackupRestoreOpts): Promise<KeyBackupRestoreResult> {\n throw new Error(\"Not implemented\");\n }\n\n /**\n * Stub function -- restoreKeyBackupWithPassphrase is not implemented here, so throw error\n */\n public restoreKeyBackupWithPassphrase(\n passphrase: string,\n opts: KeyBackupRestoreOpts,\n ): Promise<KeyBackupRestoreResult> {\n throw new Error(\"Not implemented\");\n }\n}\n\n/**\n * Fix up the backup key, that may be in the wrong format due to a bug in a\n * migration step. Some backup keys were stored as a comma-separated list of\n * integers, rather than a base64-encoded byte array. If this function is\n * passed a string that looks like a list of integers rather than a base64\n * string, it will attempt to convert it to the right format.\n *\n * @param key - the key to check\n * @returns If the key is in the wrong format, then the fixed\n * key will be returned. Otherwise null will be returned.\n *\n */\nexport function fixBackupKey(key?: string): string | null {\n if (typeof key !== \"string\" || key.indexOf(\",\") < 0) {\n return null;\n }\n const fixedKey = Uint8Array.from(key.split(\",\"), (x) => parseInt(x));\n return encodeBase64(fixedKey);\n}\n\n/**\n * Represents a received m.room_key_request event\n */\nexport class IncomingRoomKeyRequest {\n /** user requesting the key */\n public readonly userId: string;\n /** device requesting the key */\n public readonly deviceId: string;\n /** unique id for the request */\n public readonly requestId: string;\n public readonly requestBody: IRoomKeyRequestBody;\n /**\n * callback which, when called, will ask\n * the relevant crypto algorithm implementation to share the keys for\n * this request.\n */\n public share: () => void;\n\n public constructor(event: MatrixEvent) {\n const content = event.getContent();\n\n this.userId = event.getSender()!;\n this.deviceId = content.requesting_device_id;\n this.requestId = content.request_id;\n this.requestBody = content.body || {};\n this.share = (): void => {\n throw new Error(\"don't know how to share keys for this request yet\");\n };\n }\n}\n\n/**\n * Represents a received m.room_key_request cancellation\n */\nclass IncomingRoomKeyRequestCancellation {\n /** user requesting the cancellation */\n public readonly userId: string;\n /** device requesting the cancellation */\n public readonly deviceId: string;\n /** unique id for the request to be cancelled */\n public readonly requestId: string;\n\n public constructor(event: MatrixEvent) {\n const content = event.getContent();\n\n this.userId = event.getSender()!;\n this.deviceId = content.requesting_device_id;\n this.requestId = content.request_id;\n }\n}\n\n// a number of types are re-exported for backwards compatibility, in case any applications are referencing it.\nexport type { IEventDecryptionResult, IMegolmSessionData } from \"../@types/crypto.ts\";\n"],"mappings":";;;;AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,OAAOA,WAAW,MAAM,cAAc;AACtC,SAASC,EAAE,IAAIC,MAAM,QAAQ,MAAM;AAInC,SAASC,SAAS,EAAEC,iBAAiB,QAAQ,oBAAoB;AACjE,SAASC,cAAc,QAAQ,iBAAiB;AAChD,SAASC,MAAM,QAAQ,cAAc;AACrC,SAA0BC,SAAS,QAAQ,gBAAgB;AAE3D,OAAO,KAAKC,MAAM,MAAM,aAAa;AACrC,SAAwBC,UAAU,QAAQ,iBAAiB;AAC3D,SAASC,UAAU,QAAiB,iBAAiB;AAErD,OAAO,KAAKC,UAAU,MAAM,uBAAuB;AACnD,SAASC,+BAA+B,EAAEC,gBAAgB,EAAEC,gBAAgB,EAAEC,cAAc,QAAQ,mBAAmB;AACvH,SAASC,sBAAsB,QAAQ,sBAAsB;AAC7D,SAASC,aAAa,IAAIC,mBAAmB,QAAQ,oBAAoB;AACzE,SAASC,eAAe,QAAqE,UAAU;AACvG,SAASC,6BAA6B,QAAQ,oCAAoC;AAClF,SAASC,oBAAoB,QAAQ,mCAAmC;AAExE,SAASC,iBAAiB,EAAEC,mBAAmB,EAAEC,mBAAmB,QAAQ,0BAA0B;AACtG,SAASC,GAAG,IAAIC,eAAe,QAAQ,uBAAuB;AAC9D,SAASC,iBAAiB,QAAQ,qBAAqB;AACvD,SAASC,mBAAmB,QAAQ,+CAA+C;AACnF,SAASC,aAAa,EAAEC,cAAc,QAAQ,yCAAyC;AACvF,SAAkBC,eAAe,EAAEC,gBAAgB,QAAQ,2CAA2C;AACtG,SAASC,aAAa,QAAQ,iCAAiC;AAC/D,SAASC,uBAAuB,QAAQ,cAAc;AACtD,SAASC,kBAAkB,QAAQ,kBAAkB;AACrD,SAASC,aAAa,EAAEC,qBAAqB,EAAEC,kCAAkC,QAAQ,aAAa;AAEtG,SAAeC,SAAS,QAAQ,mBAAmB;AACnD,SAAqBC,eAAe,QAAQ,0BAA0B;AACtE,SAASC,WAAW,EAAoBC,WAAW,EAAEC,gBAAgB,QAAQ,oBAAoB;AAEjG,SAASC,WAAW,EAAiEC,YAAY,QAAQ,cAAc;AACvH,SAA0BC,QAAQ,QAAQ,eAAe;AAKzD,SAASC,iBAAiB,QAAQ,kCAAkC;AAIpE,SAGIC,eAAe,QAEZ,mCAAmC;AAC1C,SAAoBC,cAAc,QAAQ,yBAAyB;AACnE,SAASC,cAAc,EAAEC,oBAAoB,QAAQ,aAAa;AAClE,SAGIC,iBAAiB,EACjBC,+BAA+B,EAI/BC,2BAA2B,QACxB,sBAAsB;AAE7B,SAKIC,iBAAiB,EACjBC,qBAAqB,EAGrBC,iBAAiB,EAEjBC,iBAAiB,EACjBC,iBAAiB,EAKjBC,WAAW,IAAIC,oBAAoB,QAIhC,wBAAwB;AAE/B,SAASC,kBAAkB,QAAQ,uBAAuB;AAC1D,SAASC,YAAY,EAAEC,WAAW,EAAEC,MAAM,QAAQ,sBAAsB;AACxE,SAASC,YAAY,EAAEC,YAAY,QAAQ,cAAc;AACzD,SAASC,eAAe,QAAQ,yBAAyB;AACzD,OAAOC,2BAA2B,MAAM,yCAAyC;AACjF,OAAOC,2BAA2B,MAAM,yCAAyC;;AAGjF;;AAMA,IAAMC,kBAAkB,GAAG7D,UAAU,CAAC6D,kBAAkB;AAExD,IAAMC,0BAA0B,GAAG;EAC/B,CAAClD,iBAAiB,CAACmD,IAAI,GAAGnD,iBAAiB;EAC3C,CAACI,eAAe,CAAC+C,IAAI,GAAG/C,eAAe;EAEvC;EACA;EACA;EACA,CAACF,mBAAmB,GAAGS,aAAa;EACpC,CAACV,mBAAmB,GAAGU;AAC3B,CAAU;;AAEV;AACA;AACA;AACA;AACA,OAAO,IAAMyC,mBAAmB,GAAG;EAC/BC,mBAAmB,EAAErD,iBAAiB,CAACmD,IAAI;EAC3ChD,GAAG,EAAEC,eAAe,CAAC+C;AACzB,CAAU;AAIV;AACA;AACA,IAAMG,6BAA6B,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;AACtD;AACA;AACA,IAAMC,+BAA+B,GAAG,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;;AAOvD;;AAMA;AACA;AACA;AACA;AACA;;AAMA;;AAoCA;;AAgBA;;AAIA,WAAYjB,WAAW,aAAXA,WAAW;EAAXA,WAAW;EAAXA,WAAW,CAAXA,WAAW,6BAGMC,oBAAoB,CAACiB,sBAAsB;EAH5DlB,WAAW;EAAXA,WAAW;EAAXA,WAAW;EAAXA,WAAW,CAAXA,WAAW,sBAUDC,oBAAoB,CAACkB,eAAe;EAV9CnB,WAAW,CAAXA,WAAW,sBAWDC,oBAAoB,CAACmB,eAAe;EAX9CpB,WAAW,CAAXA,WAAW,iCAYUC,oBAAoB,CAACoB,0BAA0B;EAZpErB,WAAW,CAAXA,WAAW,mCAuBYC,oBAAoB,CAACqB,4BAA4B;EAvBxEtB,WAAW;EAAXA,WAAW;EAAXA,WAAW,CAAXA,WAAW,kCAmCWC,oBAAoB,CAACsB,2BAA2B;EAnCtEvB,WAAW;EAAXA,WAAW,CAAXA,WAAW,wBAwCCC,oBAAoB,CAACuB,iBAAiB;EAxClDxB,WAAW,CAAXA,WAAW,qBAyCFC,oBAAoB,CAACwB,cAAc;EAzC5CzB,WAAW,CAAXA,WAAW,kBA0CLC,oBAAoB,CAACyB,WAAW;EA1CtC1B,WAAW,CAAXA,WAAW,yCAmDkBC,oBAAoB,CAAC0B,kCAAkC;EAAA,OAnDpF3B,WAAW;AAAA;AAkGvB,OAAO,MAAM4B,MAAM,SAASzC,iBAAiB,CAA8D;EACvG;AACJ;AACA;EACI,OAAc0C,aAAaA,CAAA,EAA6B;IACpD,OAAOlF,SAAS,CAACkF,aAAa,CAAC,CAAC;EACpC;EAqEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWC,WAAWA,CACEC,QAAsB,EACtBC,MAAc,EACbC,QAAgB,EAChBC,WAAmB,EACpBC,WAAwB,EACxCrB,mBAA6F,EAC/F;IAAA,IAAAsB,KAAA;IACE,KAAK,CAAC,CAAC;IAAAA,KAAA,GAAAC,IAAA;IAAA,KAPSN,QAAsB,GAAtBA,QAAsB;IAAA,KACtBC,MAAc,GAAdA,MAAc;IAAA,KACbC,QAAgB,GAAhBA,QAAgB;IAAA,KAChBC,WAAmB,GAAnBA,WAAmB;IAAA,KACpBC,WAAwB,GAAxBA,WAAwB;IAAAG,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA,kCA9EV,IAAI;IACtC;IAAAA,eAAA,8BAC6C,IAAI;IAAAA,eAAA,oCACb,KAAK;IAEzC;IAAAA,eAAA,yBACyB,IAAIC,GAAG,CAA8B,CAAC;IAC/D;IAAAD,eAAA,yBACyB,IAAIC,GAAG,CAA2C,CAAC;IAAAD,eAAA,qBAE/B,CAAC,CAAC;IAAE;IAAAA,eAAA,2CAEP,KAAK;IAAAA,eAAA,sCACV,IAAI;IAEzC;IACA;IAAAA,eAAA,kCAC4D,EAAE;IAAAA,eAAA,8CACsB,EAAE;IACtF;IAAAA,eAAA,oCACoC,KAAK;IACzC;IACA;IACA;IAAAA,eAAA,0BAC0B,KAAK;IAC/B;IACA;IACA;IACA;IAAAA,eAAA,kCACuE,CAAC,CAAC;IAEzE;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IAAAA,eAAA,mCAC2F,IAAIhD,cAAc,CACzG,MAAM,IAAIA,cAAc,CAAC,MAAM,CAAC,CACpC,CAAC;IAED;IACA;IACA;IAAAgD,eAAA,qCACqC,KAAK;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IA0tC1C;AACJ;AACA;IAFIA,eAAA;MAAA,IAAAE,IAAA,GAAAC,iBAAA,CAG8C,WAAOT,MAAc,EAAoB;QACnF,IAAIA,MAAM,KAAKI,KAAI,CAACJ,MAAM,EAAE;UACxB;UACA;UACA,IAAMU,eAAe,GAAGN,KAAI,CAACO,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;UAC5E,IAAMa,UAAU,GAAGH,eAAe,GAAGA,eAAe,CAACI,KAAK,CAAC,CAAC,GAAG,IAAI;UACnE,IAAMC,aAAa,GAAGX,KAAI,CAACY,gBAAgB,CAACF,KAAK,CAAC,CAAC;UACnD,IAAMG,OAAO,GAAGF,aAAa,KAAKF,UAAU;UAE5C,IAAIE,aAAa,IAAIF,UAAU,IAAI,CAACI,OAAO,EAAE;YACzC;YACA,MAAMb,KAAI,CAACc,yBAAyB,CAAC,CAAC;UAC1C,CAAC,MAAM;YACH;YACA;YACA;YACA;YACA;YACAd,KAAI,CAACe,oBAAoB,CAAC,IAAI,CAAC;YAC/B;YACAf,KAAI,CAACgB,IAAI,CAACpD,WAAW,CAAC0B,WAAW,EAAE,CAAC,CAAC,CAAC;YACtC;YACA;YACAU,KAAI,CAACgB,IAAI,CAACpD,WAAW,CAACkB,sBAAsB,EAAEkB,KAAI,CAACJ,MAAM,EAAEI,KAAI,CAACiB,cAAc,CAACrB,MAAM,CAAC,CAAC;UAC3F;QACJ,CAAC,MAAM;UACH,MAAMI,KAAI,CAACkB,wBAAwB,CAACtB,MAAM,CAAC;;UAE3C;UACA;UACA,IAAMuB,YAAY,GAAGnB,KAAI,CAACO,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;UACzE,IAAIuB,YAAY,EAAE;YACdA,YAAY,CAACC,gCAAgC,CAACpB,KAAI,CAACiB,cAAc,CAACrB,MAAM,CAAC,CAACyB,sBAAsB,CAAC,CAAC,CAAC;YACnGrB,KAAI,CAACO,UAAU,CAACe,+BAA+B,CAAC1B,MAAM,EAAEuB,YAAY,CAACI,SAAS,CAAC,CAAC,CAAC;UACrF;UAEAvB,KAAI,CAACgB,IAAI,CAACpD,WAAW,CAACkB,sBAAsB,EAAEc,MAAM,EAAEI,KAAI,CAACiB,cAAc,CAACrB,MAAM,CAAC,CAAC;QACtF;MACJ,CAAC;MAAA,iBAAA4B,EAAA;QAAA,OAAApB,IAAA,CAAAqB,KAAA,OAAAC,SAAA;MAAA;IAAA;IAAAxB,eAAA,uBAq4DsB,CAACyB,KAAkB,EAAEC,MAAkB,EAAEC,aAAsB,KAAW;MAC7F,IAAI;QACA,IAAI,CAACC,gBAAgB,CAACH,KAAK,EAAEC,MAAM,EAAEC,aAAa,CAAC;MACvD,CAAC,CAAC,OAAOE,CAAC,EAAE;QACRzH,MAAM,CAAC0H,KAAK,CAAC,mCAAmC,EAAED,CAAC,CAAC;MACxD;IACJ,CAAC;IAAA7B,eAAA,0BA+C0ByB,KAAkB,IAAW;MACpD,IAAI;QACArH,MAAM,CAAC2H,GAAG,CACN,sBAAAC,MAAA,CAAsBP,KAAK,CAACQ,OAAO,CAAC,CAAC,kBAAAD,MAAA,CAC9BP,KAAK,CAACS,SAAS,CAAC,CAAC,WAAAF,MAAA,CAAQP,KAAK,CAACU,UAAU,CAAC,CAAC,CAACjI,iBAAiB,CAAC,CACzE,CAAC;QAED,IAAIuH,KAAK,CAACQ,OAAO,CAAC,CAAC,IAAI,YAAY,IAAIR,KAAK,CAACQ,OAAO,CAAC,CAAC,IAAI,sBAAsB,EAAE;UAC9E,IAAI,CAACG,cAAc,CAACX,KAAK,CAAC;QAC9B,CAAC,MAAM,IAAIA,KAAK,CAACQ,OAAO,CAAC,CAAC,IAAI,oBAAoB,EAAE;UAChD,IAAI,CAACI,qBAAqB,CAACZ,KAAK,CAAC;QACrC,CAAC,MAAM,IAAIA,KAAK,CAACQ,OAAO,CAAC,CAAC,KAAK,kBAAkB,EAAE;UAC/C,IAAI,CAACK,aAAa,CAACC,iBAAiB,CAACd,KAAK,CAAC;QAC/C,CAAC,MAAM,IAAIA,KAAK,CAACQ,OAAO,CAAC,CAAC,KAAK,eAAe,EAAE;UAC5C,IAAI,CAACK,aAAa,CAACE,gBAAgB,CAACf,KAAK,CAAC;QAC9C,CAAC,MAAM,IAAIA,KAAK,CAACQ,OAAO,CAAC,CAAC,KAAK,qBAAqB,EAAE;UAClD,IAAI,CAACQ,sBAAsB,CAAChB,KAAK,CAAC;QACtC,CAAC,MAAM,IAAIA,KAAK,CAACU,UAAU,CAAC,CAAC,CAACO,cAAc,EAAE;UAC1C,IAAI,CAACC,wBAAwB,CAAClB,KAAK,CAAC;QACxC,CAAC,MAAM,IAAIA,KAAK,CAACU,UAAU,CAAC,CAAC,CAACS,OAAO,KAAK,iBAAiB,EAAE;UACzD,IAAI,CAACC,sBAAsB,CAACpB,KAAK,CAAC;QACtC,CAAC,MAAM,IAAIA,KAAK,CAACqB,gBAAgB,CAAC,CAAC,IAAIrB,KAAK,CAACsB,uBAAuB,CAAC,CAAC,EAAE;UACpE,IAAI,CAACtB,KAAK,CAACqB,gBAAgB,CAAC,CAAC,EAAE;YAC3BrB,KAAK,CAACuB,iBAAiB,CAAC,IAAI,CAAC;UACjC;UACA;UACAvB,KAAK,CAACwB,IAAI,CAACxG,gBAAgB,CAACyG,SAAS,EAAGC,EAAE,IAAK;YAC3C,IAAI,CAACC,eAAe,CAACD,EAAE,CAAC;UAC5B,CAAC,CAAC;QACN;MACJ,CAAC,CAAC,OAAOtB,CAAC,EAAE;QACRzH,MAAM,CAAC0H,KAAK,CAAC,+BAA+B,EAAED,CAAC,CAAC;MACpD;IACJ,CAAC;IA2FD;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;IATI7B,eAAA,0BAU0B,UACtByB,KAAkB,EAClB4B,IAAU,EACVC,OAAgB,EAChBC,OAAgB,EAET;MAAA,IADP;QAAEC,SAAS,GAAG;MAAK,CAAC,GAAAhC,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,CAAC,CAAC;MAEzB,IAAI,CAAC7F,aAAa,CAACgI,aAAa,CAAClC,KAAK,EAAE3B,KAAI,CAACL,QAAQ,CAAC,EAAE;QACpD;MACJ;MACA,IAAMmE,aAAa,GAAInC,KAAkB,IAA0B;QAC/D,IAAMoC,OAAO,GAAG,IAAIlI,aAAa,CAACmE,KAAI,CAACL,QAAQ,EAAEgC,KAAK,CAACqC,SAAS,CAAC,CAAE,CAAC;QACpE,OAAO,IAAIpI,mBAAmB,CAACmI,OAAO,EAAE/D,KAAI,CAACtB,mBAAmB,EAAEsB,KAAI,CAACL,QAAQ,CAAC;MACpF,CAAC;MACDK,KAAI,CAACiE,uBAAuB,CAACtC,KAAK,EAAE3B,KAAI,CAACkE,0BAA0B,EAAEJ,aAAa,EAAEJ,SAAS,CAAC;IAClG,CAAC;IA7yGGpJ,MAAM,CAAC6J,KAAK,CAAC,kCAAkC,CAAC;IAChD,IAAI,CAACC,QAAQ,GAAG,IAAItH,QAAQ,CAACiD,WAAW,CAAC;IAEzC,IAAI,CAACsE,SAAS,GAAG,IAAIhK,cAAc,CAAC,IAAI,CAAC;IAEzC,IAAIqE,mBAAmB,EAAE;MACrB,IAAI,CAACA,mBAAmB,GAAG,IAAIyB,GAAG,CAAC,CAAC;MACpC,KAAK,IAAMmE,MAAM,IAAI5F,mBAAmB,EAAE;QACtC,IAAI,OAAO4F,MAAM,KAAK,QAAQ,EAAE;UAC5B,IAAI9F,0BAA0B,CAAC8F,MAAM,CAAC,EAAE;YACpC,IAAI,CAAC5F,mBAAmB,CAAC6F,GAAG,CACxBD,MAAM,EACmB9F,0BAA0B,CAAC8F,MAAM,CAC9D,CAAC;UACL;QACJ,CAAC,MAAM,IAAIA,MAAM,CAAC,MAAM,CAAC,EAAE;UACvB,IAAI,CAAC5F,mBAAmB,CAAC6F,GAAG,CAACD,MAAM,CAAC,MAAM,CAAC,EAAEA,MAAiC,CAAC;QACnF,CAAC,MAAM;UACHhK,MAAM,CAACkK,IAAI,0CAAAtC,MAAA,CAA0CoC,MAAM,CAAE,CAAC;QAClE;MACJ;IACJ,CAAC,MAAM;MACH,IAAI,CAAC5F,mBAAmB,GAAG,IAAIyB,GAAG,CAACsE,MAAM,CAACC,OAAO,CAAClG,0BAA0B,CAAC,CAG5E;IACL;IAEA,IAAI,CAACmG,aAAa,GAAG,IAAIvI,aAAa,CAACuD,QAAQ,eAAAU,iBAAA,CAAE,aAAY;MACzD;MACA,IAAMuE,SAAS,SAAS5E,KAAI,CAAC6E,0BAA0B,CAAC,CAAC;MACzD,IAAID,SAAS,EAAE;QACX,OAAOA,SAAS;MACpB;;MAEA;MACA,IAAME,SAAS,SAAS9E,KAAI,CAACwC,aAAa,CAACuC,GAAG,CAAC,oBAAoB,CAAC;MAEpE,IAAID,SAAS,EAAE;QACX;QACA;QACA,IAAME,QAAQ,GAAGC,YAAY,CAACH,SAAS,CAAC;QACxC,IAAIE,QAAQ,EAAE;UACV,IAAME,IAAI,SAASlF,KAAI,CAACwC,aAAa,CAAC2C,MAAM,CAAC,CAAC;UAC9C,MAAMnF,KAAI,CAACwC,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAEJ,QAAQ,EAAE,CAACE,IAAI,CAAE,CAAC,CAAC,CAAC,CAAC;QAC9E;QAEA,OAAOhH,YAAY,CAAC8G,QAAQ,IAAIF,SAAS,CAAC;MAC9C;;MAEA;MACA,IAAI9E,KAAI,CAACL,QAAQ,CAAC0F,eAAe,IAAIrF,KAAI,CAACL,QAAQ,CAAC0F,eAAe,CAACC,YAAY,EAAE;QAC7E,OAAOtF,KAAI,CAACL,QAAQ,CAAC0F,eAAe,CAACC,YAAY,CAAC,CAAC;MACvD;MAEA,MAAM,IAAIC,KAAK,CAAC,2BAA2B,CAAC;IAChD,CAAC,EAAC;IAEF,IAAI,CAACC,SAAS,GAAG,IAAIjL,SAAS,CAACwF,WAAW,CAAC;IAC3C,IAAI,CAACQ,UAAU,GAAG,IAAI9F,UAAU,CAACkF,QAAQ,EAAEI,WAAW,EAAE,IAAI,CAACyF,SAAS,CAAC;;IAEvE;IACA;IACA,IAAI,CAACjF,UAAU,CAACkF,EAAE,CAAC7H,WAAW,CAAC8H,uBAAuB,EAAE,IAAI,CAACC,mCAAmC,CAAC;IACjG,IAAI,CAACtB,SAAS,CAACuB,MAAM,CAAC,IAAI,CAACrF,UAAU,EAAE,CAAC3C,WAAW,CAACyB,cAAc,EAAEzB,WAAW,CAACwB,iBAAiB,CAAC,CAAC;IAEnG,IAAI,CAACyG,mBAAmB,GAAGC,KAAK,CAACC,IAAI,CAACpL,UAAU,CAACqL,kBAAkB,CAACd,IAAI,CAAC,CAAC,CAAC;IAE3E,IAAI,CAACe,6BAA6B,GAAG,IAAI7K,6BAA6B,CAClEuE,QAAQ,EACR,IAAI,CAACE,QAAQ,EACb,IAAI,CAACE,WACT,CAAC;IAED,IAAI,CAACmG,4BAA4B,GAAG,IAAIlK,gBAAgB,CAAC,CAAC;IAC1D,IAAI,CAACkI,0BAA0B,GAAG,IAAIpI,cAAc,CAAC,CAAC;IAEtD,IAAMuJ,eAAe,GAAG,IAAI,CAAC1F,QAAQ,CAAC0F,eAAe,IAAI,CAAC,CAAC;IAC3D,IAAMc,cAAc,GAAGvL,+BAA+B,CAACmF,WAAW,EAAE,IAAI,CAACyF,SAAS,CAAC;IAEnF,IAAI,CAAC5E,gBAAgB,GAAG,IAAI/F,gBAAgB,CAAC+E,MAAM,EAAEyF,eAAe,EAAEc,cAAc,CAAC;IACrF;IACA,IAAI,CAAC3D,aAAa,GAAG,IAAItH,mBAAmB,CAACyE,QAAQ,EAAuB0F,eAAe,EAAE1F,QAAQ,CAAC;IACtG,IAAI,CAACyG,kBAAkB,GAAG,IAAIjK,kBAAkB,CAAC,IAAI,CAAC;;IAEtD;IACA,IAAI,CAACkJ,eAAe,CAACgB,kBAAkB,IAAIhB,eAAe,CAACiB,mBAAmB,EAAE;MAC5EjB,eAAe,CAACgB,kBAAkB;QAAA,IAAAE,KAAA,GAAAlG,iBAAA,CAAG,WAAOmG,IAAI,EAAiC;UAC7E,OAAO3L,gBAAgB,CAAC4L,oBAAoB,CAACD,IAAI,EAAExG,KAAI,CAACwC,aAAa,CAAC;QAC1E,CAAC;QAAA,iBAAAkE,GAAA;UAAA,OAAAH,KAAA,CAAA9E,KAAA,OAAAC,SAAA;QAAA;MAAA;IACL;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACiBiF,IAAIA,CAAA,EAAkE;IAAA,IAAAC,UAAA,GAAAlF,SAAA;MAAAmF,MAAA;IAAA,OAAAxG,iBAAA;MAAA,IAAjE;QAAEyG,iBAAiB;QAAEC;MAAqB,CAAC,GAAAH,UAAA,CAAAjD,MAAA,QAAAiD,UAAA,QAAAhD,SAAA,GAAAgD,UAAA,MAAG,CAAC,CAAC;MAC9DtM,MAAM,CAAC2H,GAAG,CAAC,6BAA6B,CAAC;MACzC,MAAM+E,UAAU,CAACC,GAAG,CAACN,IAAI,CAAC,CAAC;MAC3BrM,MAAM,CAAC2H,GAAG,CACN6E,iBAAiB,GACX,yDAAyD,GACzD,oCACV,CAAC;MACD,MAAMD,MAAI,CAACrB,SAAS,CAACmB,IAAI,CAAC;QAAEO,kBAAkB,EAAEJ,iBAAiB;QAAEC;MAAU,CAAC,CAAC;MAC/EzM,MAAM,CAAC2H,GAAG,CAAC,gCAAgC,CAAC;MAC5C,MAAM4E,MAAI,CAACtG,UAAU,CAAC4G,IAAI,CAAC,CAAC;;MAE5B;MACAN,MAAI,CAACO,UAAU,CAAC,UAAU,GAAGP,MAAI,CAAChH,QAAQ,CAAC,GAAGgH,MAAI,CAACrB,SAAS,CAAC6B,gBAAiB;MAC9ER,MAAI,CAACO,UAAU,CAAC,aAAa,GAAGP,MAAI,CAAChH,QAAQ,CAAC,GAAGgH,MAAI,CAACrB,SAAS,CAAC8B,mBAAoB;MAEpFhN,MAAM,CAAC2H,GAAG,CAAC,iCAAiC,CAAC;MAC7C,IAAIsF,SAAS,GAAGV,MAAI,CAACtG,UAAU,CAACiH,0BAA0B,CAACX,MAAI,CAACjH,MAAM,CAAC;MAEvE,IAAI,CAAC2H,SAAS,EAAE;QACZA,SAAS,GAAG,CAAC,CAAC;MAClB;MAEA,IAAI,CAACA,SAAS,CAACV,MAAI,CAAChH,QAAQ,CAAC,EAAE;QAC3B;QACAvF,MAAM,CAAC2H,GAAG,CAAC,4CAA4C,CAAC;QACxD,IAAMwF,UAAU,GAAG;UACfvC,IAAI,EAAE2B,MAAI,CAACO,UAAU;UACrBzM,UAAU,EAAEkM,MAAI,CAAChB,mBAAmB;UACpC6B,QAAQ,EAAEnJ,kBAAkB,CAACoJ,QAAQ;UACrCC,KAAK,EAAE;QACX,CAAC;QAEDL,SAAS,CAACV,MAAI,CAAChH,QAAQ,CAAC,GAAG4H,UAAU;QACrCZ,MAAI,CAACtG,UAAU,CAACsH,mBAAmB,CAAChB,MAAI,CAACjH,MAAM,EAAE2H,SAAS,CAAC;QAC3DV,MAAI,CAACtG,UAAU,CAACuH,WAAW,CAAC,CAAC;MACjC;MAEA,MAAMjB,MAAI,CAAC9G,WAAW,CAACgI,KAAK,CAAC,UAAU,EAAE,CAAC1M,oBAAoB,CAAC2M,aAAa,CAAC,EAAGC,GAAG,IAAK;QACpFpB,MAAI,CAAC9G,WAAW,CAACmI,mBAAmB,CAACD,GAAG,EAAG/C,IAAI,IAAK;UAChD;UACA,IAAIA,IAAI,IAAIT,MAAM,CAACS,IAAI,CAACA,IAAI,CAAC,CAACvB,MAAM,KAAK,CAAC,EAAE;YACxCrJ,MAAM,CAAC2H,GAAG,CAAC,oDAAoD,CAAC;YAChE4E,MAAI,CAACjG,gBAAgB,CAACuH,OAAO,CAACjD,IAAI,CAAC;UACvC;QACJ,CAAC,CAAC;MACN,CAAC,CAAC;MACF;MACA;MACA2B,MAAI,CAACtG,UAAU,CAAC6H,uBAAuB,CAACvB,MAAI,CAACjH,MAAM,CAAC;MAEpDtF,MAAM,CAAC6J,KAAK,CAAC,kCAAkC,CAAC;MAChD,MAAM0C,MAAI,CAACzC,QAAQ,CAACuC,IAAI,CAAC,CAAC;MAE1BrM,MAAM,CAAC2H,GAAG,CAAC,oCAAoC,CAAC;MAChD4E,MAAI,CAAClC,aAAa,CAAC0D,aAAa,CAAC,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;EACWC,sBAAsBA,CAACC,aAAkC,EAAQ;IACpE,MAAM,IAAIhD,KAAK,CAAC,eAAe,CAAC;EACpC;EACA;AACJ;AACA;EACWiD,UAAUA,CAAA,EAAW;IACxB,IAAMC,eAAe,GAAGjJ,MAAM,CAACC,aAAa,CAAC,CAAC;IAC9C,cAAAyC,MAAA,CAAcuG,eAAe,CAAC,CAAC,CAAC,OAAAvG,MAAA,CAAIuG,eAAe,CAAC,CAAC,CAAC,OAAAvG,MAAA,CAAIuG,eAAe,CAAC,CAAC,CAAC;EAChF;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWC,0BAA0BA,CAAA,EAAY;IACzC,OAAO,IAAI,CAACC,uBAAuB;EACvC;;EAEA;AACJ;AACA;EACWC,gCAAgCA,CAAA,EAAY;IAC/C,OAAO,IAAI,CAACD,uBAAuB;EACvC;;EAEA;AACJ;AACA;AACA;AACA;EACWE,0BAA0BA,CAACC,GAAY,EAAQ;IAClD,IAAI,CAACH,uBAAuB,GAAGG,GAAG;IAElC,KAAK,IAAMlJ,OAAM,IAAI,IAAI,CAACW,UAAU,CAACwI,eAAe,CAAC,CAAC,EAAE;MACpD,IAAMC,OAAO,GAAG,IAAI,CAACzI,UAAU,CAACiH,0BAA0B,CAAC5H,OAAM,CAAC;MAClE,KAAK,IAAMC,SAAQ,IAAI4E,MAAM,CAACS,IAAI,CAAC8D,OAAO,CAAC,EAAE;QACzC,IAAMC,WAAW,GAAG,IAAI,CAACC,gBAAgB,CAACtJ,OAAM,EAAEC,SAAQ,CAAC;QAC3D;QACA;QACA;QACA,IAAI,CAACoJ,WAAW,CAACE,iBAAiB,CAAC,CAAC,IAAIF,WAAW,CAAC5H,sBAAsB,CAAC,CAAC,EAAE;UAC1E,IAAM+H,SAAS,GAAG,IAAI,CAAC7I,UAAU,CAAC8I,eAAe,CAACzJ,OAAM,EAAEC,SAAQ,CAAE;UACpE,IAAI,CAACmB,IAAI,CAACpD,WAAW,CAAC0L,yBAAyB,EAAE1J,OAAM,EAAEC,SAAQ,EAAEuJ,SAAS,CAAC;QACjF;MACJ;IACJ;EACJ;;EAEA;AACJ;AACA;EACWG,gCAAgCA,CAACT,GAAY,EAAQ;IACxD,IAAI,CAACD,0BAA0B,CAACC,GAAG,CAAC;EACxC;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBU,+BAA+BA,CAACC,QAAiB,EAAyB;IAAA,OAAApJ,iBAAA;MACnF,IAAMqJ,UAAU,GAAG,IAAI1C,UAAU,CAACC,GAAG,CAAC0C,YAAY,CAAC,CAAC;MACpD,IAAI;QACA,IAAIF,QAAQ,EAAE;UACV,IAAMG,UAAU,SAASjO,iBAAiB,CAAC8N,QAAQ,CAAC;UAEpDC,UAAU,CAACG,qBAAqB,CAACD,UAAU,CAACE,GAAG,CAAC;UAChD,IAAMC,UAAU,GAAGL,UAAU,CAACM,eAAe,CAAC,CAAC;UAC/C,OAAO;YACHC,OAAO,EAAE;cACLC,UAAU,EAAE;gBACRC,SAAS,EAAE,UAAU;gBACrBC,UAAU,EAAER,UAAU,CAACQ,UAAU;gBACjCC,IAAI,EAAET,UAAU,CAACS;cACrB;YACJ,CAAC;YACDN,UAAU,EAAEA,UAAU;YACtBO,iBAAiB,EAAE7M,iBAAiB,CAACsM,UAAU;UACnD,CAAC;QACL,CAAC,MAAM;UACHL,UAAU,CAACa,YAAY,CAAC,CAAC;UACzB,IAAMR,WAAU,GAAGL,UAAU,CAACM,eAAe,CAAC,CAAC;UAC/C,OAAO;YACHD,UAAU,EAAEA,WAAU;YACtBO,iBAAiB,EAAE7M,iBAAiB,CAACsM,WAAU;UACnD,CAAC;QACL;MACJ,CAAC,SAAS;QACNL,UAAU,aAAVA,UAAU,eAAVA,UAAU,CAAEc,IAAI,CAAC,CAAC;MACtB;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACiBC,uBAAuBA,CAAA,EAAyC;IAAA,IAAAC,WAAA,GAAAhJ,SAAA;MAAAiJ,MAAA;IAAA,OAAAtK,iBAAA;MAAA,IAAxCT,MAAM,GAAA8K,WAAA,CAAA/G,MAAA,QAAA+G,WAAA,QAAA9G,SAAA,GAAA8G,WAAA,MAAGC,MAAI,CAAC/K,MAAM;MACrD,MAAM+K,MAAI,CAACC,YAAY,CAAC,CAAChL,MAAM,CAAC,CAAC;MACjC,OAAO+K,MAAI,CAACpK,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC,KAAK,IAAI;IAAC;EACzE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBiL,mBAAmBA,CAAA,EAAqB;IAAA,IAAAC,MAAA;IAAA,OAAAzK,iBAAA;MACjD,IAAM0K,kBAAkB,GAAGD,MAAI,CAAClK,gBAAgB,CAACF,KAAK,CAAC,CAAC;MACxD,IAAMsK,yBAAyB,GAC3B,OAAOF,MAAI,CAAClK,gBAAgB,CAACqK,kBAAkB,CAAC,CAAC,YAC1CH,MAAI,CAAClK,gBAAgB,CAACsK,uBAAuB,CAACJ,MAAI,CAACtI,aAAa,CAAC,CAAC;MAE7E,OAAO,CAAC,EAAEuI,kBAAkB,IAAIC,yBAAyB,CAAC;IAAC;EAC/D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBG,oBAAoBA,CAAA,EAAqB;IAAA,IAAAC,MAAA;IAAA,OAAA/K,iBAAA;MAClD,IAAMgL,yBAAyB,SAASD,MAAI,CAAC5I,aAAa,CAAC8I,MAAM,CAAC,CAAC;MACnE,IAAMC,oBAAoB,SAASH,MAAI,CAACxK,gBAAgB,CAACsK,uBAAuB,CAACE,MAAI,CAAC5I,aAAa,CAAC;MACpG,IAAMgJ,sBAAsB,GACxB,CAACJ,MAAI,CAACzG,aAAa,CAAC8G,mBAAmB,CAAC,CAAC,WAAWL,MAAI,CAACzL,QAAQ,CAAC+L,oBAAoB,CAAC,CAAC,CAAC;MAE7F,OAAO,CAAC,EAAEL,yBAAyB,IAAIE,oBAAoB,IAAIC,sBAAsB,CAAC;IAAC;EAC3F;;EAEA;AACJ;AACA;EACiBG,qBAAqBA,CAAA,EAAgC;IAAA,IAAAC,MAAA;IAAA,OAAAvL,iBAAA;MAAA,IAAAwL,qBAAA,EAAAC,sBAAA,EAAAC,sBAAA;MAC9D,IAAMhB,kBAAkB,GAAGiB,OAAO,CAACJ,MAAI,CAAChL,gBAAgB,CAACF,KAAK,CAAC,CAAC,CAAC;MACjE,IAAMuL,0BAA0B,GAAGD,OAAO,OAChCJ,MAAI,CAAChL,gBAAgB,CAACsK,uBAAuB,CAACU,MAAI,CAACpJ,aAAa,CAC1E,CAAC;MACD,IAAM2D,cAAc,GAAGyF,MAAI,CAAChL,gBAAgB,CAACsL,iBAAiB,CAAC,CAAC;MAChE,IAAMC,SAAS,GAAGH,OAAO,QAAAH,qBAAA,GAAO1F,cAAc,CAACiG,uBAAuB,cAAAP,qBAAA,uBAAtCA,qBAAA,CAAAQ,IAAA,CAAAlG,cAAc,EAA2B,QAAQ,CAAC,CAAC;MACnF,IAAMmG,cAAc,GAAGN,OAAO,QAAAF,sBAAA,GAAO3F,cAAc,CAACiG,uBAAuB,cAAAN,sBAAA,uBAAtCA,sBAAA,CAAAO,IAAA,CAAAlG,cAAc,EAA2B,cAAc,CAAC,CAAC;MAC9F,IAAMoG,cAAc,GAAGP,OAAO,QAAAD,sBAAA,GAAO5F,cAAc,CAACiG,uBAAuB,cAAAL,sBAAA,uBAAtCA,sBAAA,CAAAM,IAAA,CAAAlG,cAAc,EAA2B,cAAc,CAAC,CAAC;MAE9F,OAAO;QACH4E,kBAAkB;QAClBkB,0BAA0B;QAC1BO,wBAAwB,EAAE;UACtBL,SAAS;UACTG,cAAc;UACdC;QACJ;MACJ,CAAC;IAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBE,qBAAqBA,CAAA,EAGgB;IAAA,IAAAC,WAAA,GAAAhL,SAAA;MAAAiL,MAAA;IAAA,OAAAtM,iBAAA;MAAA,IAHf;QAC/BuM,2BAA2B;QAC3BC;MACuB,CAAC,GAAAH,WAAA,CAAA/I,MAAA,QAAA+I,WAAA,QAAA9I,SAAA,GAAA8I,WAAA,MAAG,CAAC,CAAC;MAC7BpS,MAAM,CAAC2H,GAAG,CAAC,6BAA6B,CAAC;MAEzC,IAAM6K,uBAAuB,GAAGH,MAAI,CAAChN,QAAQ,CAAC0F,eAAe;MAC7D,IAAM0H,OAAO,GAAG,IAAI/R,sBAAsB,CAAC2R,MAAI,CAAChN,QAAQ,CAACyF,KAAK,CAAC4H,WAAW,EAAEF,uBAAuB,CAAC;MACpG,IAAMlM,gBAAgB,GAAG,IAAI/F,gBAAgB,CACzC8R,MAAI,CAAC/M,MAAM,EACXmN,OAAO,CAACE,qBAAqB,EAC7BF,OAAO,CAACE,qBACZ,CAAC;;MAED;MACA,IAAMC,iBAAiB;QAAA,IAAAC,KAAA,GAAA9M,iBAAA,CAAG,aAA2B;UACjDO,gBAAgB,CAACwM,SAAS,CAAC,CAAC;UAC5B;UACA,MAAMT,MAAI,CAACU,UAAU,CAACzM,gBAAgB,CAACsE,IAAI,CAACoI,MAAM,CAAC;;UAEnD;UACA;UACAP,OAAO,CAACQ,mBAAmB,CAACX,2BAA2B,EAAEhM,gBAAgB,CAACsE,IAAI,CAAC;;UAE/E;UACA,IAAMsI,MAAM,GAAGb,MAAI,CAACpM,UAAU,CAAC8I,eAAe,CAACsD,MAAI,CAAC/M,MAAM,EAAE+M,MAAI,CAAC9M,QAAQ,CAAE;UAC3E,IAAM4N,eAAe,SAAS7M,gBAAgB,CAAC8M,UAAU,CAACf,MAAI,CAAC/M,MAAM,EAAE4N,MAAM,CAAC;UAC9ET,OAAO,CAACY,eAAe,CAAChB,MAAI,CAAC/M,MAAM,EAAE+M,MAAI,CAAC9M,QAAQ,EAAE4N,eAAgB,CAAC;;UAErE;UACA,IAAId,MAAI,CAAChI,aAAa,CAACiJ,UAAU,EAAE;YAC/B,MAAMhN,gBAAgB,CAACyM,UAAU,CAACV,MAAI,CAAChI,aAAa,CAACiJ,UAAU,CAACC,SAAS,EAAE,QAAQ,CAAC;YACpFd,OAAO,CAACe,gBAAgB,CAACnB,MAAI,CAAChI,aAAa,CAACiJ,UAAU,CAAC;UAC3D;QACJ,CAAC;QAAA,gBAnBKV,iBAAiBA,CAAA;UAAA,OAAAC,KAAA,CAAA1L,KAAA,OAAAC,SAAA;QAAA;MAAA,GAmBtB;MAED,IAAMqJ,kBAAkB,GAAG4B,MAAI,CAAC/L,gBAAgB,CAACF,KAAK,CAAC,CAAC;MACxD,IAAMqN,kBAAkB,SAASpB,MAAI,CAAC/L,gBAAgB,CAACqK,kBAAkB,CAAC,CAAC;MAC3E,IAAMM,oBAAoB,SAASoB,MAAI,CAAC/L,gBAAgB,CAACsK,uBAAuB,CAACyB,MAAI,CAACnK,aAAa,CAAC;MACpG,IAAMwI,yBAAyB,GAAG+C,kBAAkB,IAAIxC,oBAAoB;;MAE5E;MACAjR,MAAM,CAAC2H,GAAG,CAAC;QACP4K,oBAAoB;QACpB9B,kBAAkB;QAClBgD,kBAAkB;QAClBxC,oBAAoB;QACpBP;MACJ,CAAC,CAAC;MAEF,IAAI,CAACA,yBAAyB,IAAI6B,oBAAoB,EAAE;QACpDvS,MAAM,CAAC2H,GAAG,CAAC,qEAAqE,GAAG,mBAAmB,CAAC;QACvG;QACA;QACA;QACA;QACA;QACA;QACA,MAAMiL,iBAAiB,CAAC,CAAC;MAC7B,CAAC,MAAM,IAAInC,kBAAkB,IAAIgD,kBAAkB,EAAE;QACjDzT,MAAM,CAAC2H,GAAG,CAAC,kEAAkE,CAAC;MAClF,CAAC,MAAM,IAAIsJ,oBAAoB,EAAE;QAC7BjR,MAAM,CAAC2H,GAAG,CACN,uEAAuE,GACnE,wDACR,CAAC;QACD,MAAM0K,MAAI,CAAC7L,yBAAyB,CAAC;UACjCkN,uBAAuB,EAAE;QAC7B,CAAC,CAAC;MACN;;MAEA;MACA;MACA;MACA,IAAMC,uBAAuB,GAAGlB,OAAO,CAACE,qBAAqB,CAACiB,WAAW;MACzE,IAAID,uBAAuB,CAACE,IAAI,IAAI,CAACxB,MAAI,CAAChN,QAAQ,CAAC0F,eAAe,CAAC+I,oBAAoB,EAAE;QACrF,IAAM5L,aAAa,GAAG,IAAIlF,2BAA2B,CACjDyP,OAAO,CAACsB,wBAAwB,EAChCtB,OAAO,CAACuB,mBACZ,CAAC;QACD,UAAU9L,aAAa,CAAC8I,MAAM,CAAC,CAAC,EAAE;UAC9BhR,MAAM,CAAC2H,GAAG,CAAC,0DAA0D,CAAC;UACtE;UACA;UACA,MAAMpH,gBAAgB,CAAC0T,oBAAoB,CAACN,uBAAuB,EAAEzL,aAAa,CAAC;QACvF;MACJ;MAEA,IAAMgM,SAAS,GAAGzB,OAAO,CAAC0B,cAAc,CAAC,CAAC;MAC1C,MAAMD,SAAS,CAAC/M,KAAK,CAACkL,MAAI,CAAC;MAC3B;MACA;MACA,MAAMI,OAAO,CAAC2B,OAAO,CAAC/B,MAAI,CAAC;MAE3BrS,MAAM,CAAC2H,GAAG,CAAC,qBAAqB,CAAC;IAAC;EACtC;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACI;EACa0M,sBAAsBA,CAAA,EAMc;IAAA,IAAAC,WAAA,GAAAlN,SAAA;MAAAmN,MAAA;IAAA,OAAAxO,iBAAA;MAAA,IANb;QAChCyO,sBAAsB,gBAAAzO,iBAAA,CAAG;UAAA,OAAoC,CAAC,CAAC;QAAA,CAAiB;QAChF0O,aAAa;QACbC,iBAAiB;QACjBC,qBAAqB;QACrBC;MACsB,CAAC,GAAAN,WAAA,CAAAjL,MAAA,QAAAiL,WAAA,QAAAhL,SAAA,GAAAgL,WAAA,MAAG,CAAC,CAAC;MAC5BtU,MAAM,CAAC2H,GAAG,CAAC,qCAAqC,CAAC;MACjD,IAAM6K,uBAAuB,GAAG+B,MAAI,CAAClP,QAAQ,CAAC0F,eAAe;MAC7D,IAAM0H,OAAO,GAAG,IAAI/R,sBAAsB,CAAC6T,MAAI,CAAClP,QAAQ,CAACyF,KAAK,CAAC4H,WAAW,EAAEF,uBAAuB,CAAC;MACpG,IAAMtK,aAAa,GAAG,IAAIlF,2BAA2B,CACjDyP,OAAO,CAACsB,wBAAwB,EAChCtB,OAAO,CAACuB,mBACZ,CAAC;;MAED;MACA,IAAIa,QAAuB,GAAG,IAAI;;MAElC;MACA,IAAMC,UAAU;QAAA,IAAAC,KAAA,GAAAhP,iBAAA,CAAG,WAAOiP,IAA6B,EAAsB;UACzE,IAAM;YAAEC,KAAK;YAAEtF;UAAQ,CAAC,SAASzH,aAAa,CAACgN,MAAM,CAACnS,+BAA+B,EAAEiS,IAAI,CAAC;;UAE5F;UACAvC,OAAO,CAACuB,mBAAmB,CAACmB,aAAa,CAACF,KAAK,EAAEtF,OAAO,EAAEqF,IAAI,CAACxF,GAAG,CAAC;UAEnE,MAAMtH,aAAa,CAACkN,eAAe,CAACH,KAAK,CAAC;UAC1C,OAAOA,KAAK;QAChB,CAAC;QAAA,gBARKH,UAAUA,CAAAO,GAAA;UAAA,OAAAN,KAAA,CAAA5N,KAAA,OAAAC,SAAA;QAAA;MAAA,GAQf;MAED,IAAMkO,wBAAwB;QAAA,IAAAC,KAAA,GAAAxP,iBAAA,CAAG,WAAOkP,KAAa,EAAEtF,OAAoC,EAAoB;UAC3G,IAAI,CAACA,OAAO,CAAC6F,GAAG,EAAE;YAAA,IAAAC,qBAAA,EAAAC,sBAAA;YACd,IAAMlG,GAAG,UAAAiG,qBAAA,GAAS,CAAAC,sBAAA,GAAAnB,MAAI,CAAClP,QAAQ,CAAC0F,eAAe,EAACiB,mBAAmB,cAAAyJ,qBAAA,uBAAjDA,qBAAA,CAAA1D,IAAA,CAAA2D,sBAAA,EACd;cAAE9K,IAAI,EAAE;gBAAE,CAACqK,KAAK,GAAGtF;cAAQ;YAAE,CAAC,EAC9B,EACJ,CAAC;YACD,IAAIH,GAAG,EAAE;cACL,IAAMC,UAAU,GAAGD,GAAG,CAAC,CAAC,CAAC;cACzBiD,OAAO,CAACuB,mBAAmB,CAACmB,aAAa,CAACF,KAAK,EAAEtF,OAAO,EAAEF,UAAU,CAAC;cACrE,IAAM;gBAAEkG,EAAE;gBAAEH;cAAI,CAAC,SAAS1S,iBAAiB,CAAC2M,UAAU,CAAC;cACvDE,OAAO,CAACgG,EAAE,GAAGA,EAAE;cACfhG,OAAO,CAAC6F,GAAG,GAAGA,GAAG;cAEjB,MAAM/C,OAAO,CAACmD,cAAc,yBAAAhO,MAAA,CAAyBqN,KAAK,GAAItF,OAAO,CAAC;YAC1E;UACJ;QACJ,CAAC;QAAA,gBAhBK2F,wBAAwBA,CAAAO,GAAA,EAAAC,GAAA;UAAA,OAAAP,KAAA,CAAApO,KAAA,OAAAC,SAAA;QAAA;MAAA,GAgB7B;MAED,IAAM2O,6BAA6B;QAAA,IAAAC,KAAA,GAAAjQ,iBAAA,CAAG,WAAOkQ,iBAA8C,EAAoB;UAC3G,IAAI1B,MAAI,CAACjO,gBAAgB,CAACF,KAAK,CAAC,CAAC,WAAWmO,MAAI,CAACjO,gBAAgB,CAACqK,kBAAkB,CAAC,QAAQ,CAAC,CAAC,EAAE;YAC7F,IAAI;cACA3Q,MAAM,CAAC2H,GAAG,CAAC,8CAA8C,CAAC;cAC1D,MAAM4M,MAAI,CAACjO,gBAAgB,CAACyM,UAAU,CAACkD,iBAAiB,EAAE,QAAQ,CAAC;YACvE,CAAC,CAAC,OAAOxO,CAAC,EAAE;cACR;cACA;cACAzH,MAAM,CAAC0H,KAAK,CAAC,mDAAmD,EAAED,CAAC,CAAC;YACxE;UACJ,CAAC,MAAM;YACHzH,MAAM,CAACkK,IAAI,CAAC,oEAAoE,CAAC;UACrF;QACJ,CAAC;QAAA,gBAbK6L,6BAA6BA,CAAAG,GAAA;UAAA,OAAAF,KAAA,CAAA7O,KAAA,OAAAC,SAAA;QAAA;MAAA,GAalC;MAED,IAAM+O,UAAU,SAAS5B,MAAI,CAACrM,aAAa,CAAC2C,MAAM,CAAC,CAAC;MACpD,IAAM,CAACuL,QAAQ,EAAEC,UAAU,CAAC,GAAGF,UAAU,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC;MACzD,IAAMG,aAAa,GACf,CAAC3B,qBAAqB,IAAI0B,UAAU,IAAIA,UAAU,CAACxG,SAAS,KAAK9M,+BAA+B;;MAEpG;MACA/C,MAAM,CAAC2H,GAAG,CAAC;QACP8M,aAAa;QACbC,iBAAiB;QACjBC,qBAAqB;QACrB2B,aAAa;QACbD;MACJ,CAAC,CAAC;MAEF,IAAI,CAACC,aAAa,IAAI,CAAC7B,aAAa,EAAE;QAClC;QACA;QACAzU,MAAM,CAAC2H,GAAG,CAAC,yDAAyD,CAAC;;QAErE;QACA;QACA;QACA;QACA;QACA;QACA,IAAM;UAAEgI,OAAO;UAAEF;QAAW,CAAC,SAAS+E,sBAAsB,CAAC,CAAC;QAC9DK,QAAQ,SAASC,UAAU,CAAC;UAAElF,UAAU,EAAED,OAAO,aAAPA,OAAO,uBAAPA,OAAO,CAAEC,UAAU;UAAEJ,GAAG,EAAEC,UAAU;UAAE8G,IAAI,EAAE5G,OAAO,aAAPA,OAAO,uBAAPA,OAAO,CAAE4G;QAAK,CAAC,CAAC;MAC1G,CAAC,MAAM,IAAI,CAACD,aAAa,IAAI7B,aAAa,EAAE;QACxC;QACAzU,MAAM,CAAC2H,GAAG,CAAC,qDAAqD,CAAC;;QAEjE;QACA;QACA,IAAM6O,SAAS,GAAG,OAAOjC,MAAI,CAAChK,0BAA0B,CAAC,CAAC,YAAYqK,sBAAsB,aAAtBA,sBAAsB,uBAAtBA,sBAAsB,CAAG,CAAC,CAAC;;QAEjG;QACA,IAAMI,IAAI,GAAG;UAAExF,GAAG,EAAEgH;QAAU,CAA4B;QAE1D,IAAI/B,aAAa,CAAClB,SAAS,CAACkD,gBAAgB,IAAIhC,aAAa,CAAClB,SAAS,CAACmD,sBAAsB,EAAE;UAC5F;UACA1B,IAAI,CAACpF,UAAU,GAAG;YACdC,SAAS,EAAE,UAAU;YACrBC,UAAU,EAAE2E,aAAa,CAAClB,SAAS,CAACmD,sBAAsB;YAC1D3G,IAAI,EAAE0E,aAAa,CAAClB,SAAS,CAACkD,gBAAgB;YAC9CE,IAAI,EAAE;UACV,CAAC;QACL;QAEA9B,QAAQ,SAASC,UAAU,CAACE,IAAI,CAAC;;QAEjC;QACA,MAAM9M,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAEjH,YAAY,CAAC2S,SAAU,CAAC,EAAE,CAAC3B,QAAQ,CAAC,CAAC;;QAErF;QACA;QACA;QACA,MAAMkB,6BAA6B,CAACtB,aAAa,CAAClB,SAAS,CAAC;QAE5Dd,OAAO,CAACe,gBAAgB,CAACiB,aAAa,CAAC;MAC3C,CAAC,MAAM;QACH;QACAzU,MAAM,CAAC2H,GAAG,CAAC,uBAAuB,CAAC;QAEnC,IAAI0O,UAAU,IAAIA,UAAU,CAACxG,SAAS,KAAK9M,+BAA+B,EAAE;UACxE;UACA;UACA,MAAMuS,wBAAwB,CAACc,QAAQ,EAAEC,UAAU,CAAC;QACxD;MACJ;;MAEA;MACA;MACA,IACI,CAAC9B,MAAI,CAAClP,QAAQ,CAAC0F,eAAe,CAAC+I,oBAAoB,WAC5CS,MAAI,CAAChE,mBAAmB,CAAC,CAAC,CAAC,KACjCsE,QAAQ,IAAI,QAAQN,MAAI,CAACjO,gBAAgB,CAACsK,uBAAuB,CAAC1I,aAAa,CAAC,CAAC,CAAC,EACrF;QACElI,MAAM,CAAC2H,GAAG,CAAC,iEAAiE,CAAC;QAC7E,IAAMgM,uBAAuB,SAASY,MAAI,CAACjO,gBAAgB,CAACsQ,4BAA4B,CAAC,CAAC;QAC1F;QACA;QACA,MAAMrW,gBAAgB,CAAC0T,oBAAoB,CAACN,uBAAuB,EAAEzL,aAAa,CAAC;MACvF;MAEA,IAAIwM,iBAAiB,IAAI,CAACD,aAAa,EAAE;QACrCzU,MAAM,CAAC2H,GAAG,CAAC,yCAAyC,CAAC;QACrD,IAAMkP,IAAI,SAAStC,MAAI,CAAClP,QAAQ,CAACyR,uBAAuB,CACpD,IAAI,CAAC;QACL;QACA;QACA;QACA;UAAEC,mBAAmB,EAAE;QAAM,CACjC,CAAC;QACD;QACA,IAAMtH,YAAU,GAAGxM,iBAAiB,CAAC4T,IAAI,CAACG,YAAY,CAAC;QACvD,MAAM9O,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAEjH,YAAY,CAAC4L,YAAU,CAAC,CAAC;;QAEzE;QACA,IAAMwH,IAAoB,GAAG;UACzBpH,SAAS,EAAEgH,IAAI,CAAChH,SAAS;UACzB0D,SAAS,EAAEsD,IAAI,CAACtD;QACpB,CAAC;;QAED;QACA,MAAMwC,6BAA6B,CAACkB,IAAI,CAAC1D,SAAS,CAAC;;QAEnD;QACA,MAAMgB,MAAI,CAACxB,UAAU,CAACkE,IAAI,CAAC1D,SAAS,CAAC;QAErCd,OAAO,CAACe,gBAAgB,CAACyD,IAAI,CAAC;MAClC;;MAEA;MACA,IAAMC,gBAAgB,SAAShP,aAAa,CAACuC,GAAG,CAAC,oBAAoB,CAAC;MACtE,IAAIyM,gBAAgB,EAAE;QAClBlX,MAAM,CAAC6W,IAAI,CAAC,qDAAqD,CAAC;QAClE;QACA;QACA,IAAMM,cAAc,GAAGxM,YAAY,CAACuM,gBAAgB,CAAC;QACrD,IAAIC,cAAc,EAAE;UAChB,IAAMlC,KAAK,GAAGJ,QAAQ,IAAIuB,QAAQ;UAClC,MAAMlO,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAEqM,cAAc,EAAElC,KAAK,GAAG,CAACA,KAAK,CAAC,GAAG,IAAI,CAAC;QAC3F;QACA,IAAMmC,gBAAgB,GAAG,IAAIC,UAAU,CAACzT,YAAY,CAACuT,cAAc,IAAID,gBAAgB,CAAC,CAAC;QACzFzE,OAAO,CAAC6E,iCAAiC,CAACF,gBAAgB,CAAC;MAC/D,CAAC,MAAM,IAAI7C,MAAI,CAAClK,aAAa,CAAC8G,mBAAmB,CAAC,CAAC,EAAE;QACjD;QACA;QACA,IAAMqF,UAAS,GAAG,OAAOjC,MAAI,CAAChK,0BAA0B,CAAC,CAAC,YAAYqK,sBAAsB,aAAtBA,sBAAsB,uBAAtBA,sBAAsB,CAAG,CAAC,CAAC;QACjG,IAAI,CAAC4B,UAAS,EAAE;UACZ;UACA;UACA;UACA;UACAxW,MAAM,CAAC0H,KAAK,CAAC,wDAAwD,CAAC;UACtE;QACJ;QACA1H,MAAM,CAAC6W,IAAI,CAAC,4EAA4E,CAAC;QACzF,MAAM3O,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAEjH,YAAY,CAAC2S,UAAS,CAAC,CAAC;MAC5E;MAEA,IAAMtC,SAAS,GAAGzB,OAAO,CAAC0B,cAAc,CAAC,CAAC;MAC1C,MAAMD,SAAS,CAAC/M,KAAK,CAACoN,MAAI,CAAC;MAC3B;MACA;MACA,MAAM9B,OAAO,CAAC2B,OAAO,CAACG,MAAI,CAAC;MAE3BvU,MAAM,CAAC2H,GAAG,CAAC,6BAA6B,CAAC;IAAC;EAC9C;;EAEA;AACJ;AACA;EACiB4P,cAAcA,CAAA,EAAkB;IAAA,IAAAC,MAAA;IAAA,OAAAzR,iBAAA;MACzC;MACA;MACA;MACA;MACA,MAAMyR,MAAI,CAACnN,aAAa,CAACoN,0BAA0B,CAAC,CAAC;MAErD,IAAMZ,IAAI,SAASW,MAAI,CAACnN,aAAa,CAACyM,uBAAuB,CAAC,CAAC;MAE/D,MAAMU,MAAI,CAACzE,UAAU,CAAC8D,IAAI,CAACtD,SAAS,CAAC;;MAErC;MACA,IAAM;QAAEmE;MAAQ,CAAC,SAASF,MAAI,CAACnS,QAAQ,CAACsS,IAAI,CAACC,aAAa,CACtDjU,MAAM,CAACkU,IAAI,EACX,oBAAoB,EACpBvO,SAAS,EACTuN,IAAI,EACJ;QACIiB,MAAM,EAAErU,YAAY,CAACsU;MACzB,CACJ,CAAC;MAED/X,MAAM,CAAC2H,GAAG,2BAAAC,MAAA,CAA2B8P,OAAO,CAAE,CAAC;;MAE/C;MACA,IAAMjI,UAAU,GAAGoH,IAAI,CAACpH,UAAU;MAClC,MAAM+H,MAAI,CAACtP,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAEjH,YAAY,CAAC4L,UAAU,CAAC,CAAC;MAC9E,MAAM+H,MAAI,CAACQ,4BAA4B,CAACvI,UAAU,CAAC;MAEnD,MAAM+H,MAAI,CAACnN,aAAa,CAAC0D,aAAa,CAAC,CAAC;MACxC,MAAMyJ,MAAI,CAACnN,aAAa,CAAC4N,iCAAiC,CAAC,CAAC;IAAC;EACjE;;EAEA;AACJ;AACA;EACiBC,sBAAsBA,CAACR,OAAe,EAAiB;IAAA,IAAAS,OAAA;IAAA,OAAApS,iBAAA;MAChE,MAAMoS,OAAI,CAAC9N,aAAa,CAAC6N,sBAAsB,CAACR,OAAO,CAAC;IAAC;EAC7D;;EAEA;AACJ;AACA;EACWU,mBAAmBA,CACtBvI,SAAiB,EACjBmF,IAA6B,EAC7BqD,KAAc,EACiB;IAC/B,OAAO,IAAI,CAACnQ,aAAa,CAACgN,MAAM,CAACrF,SAAS,EAAEmF,IAAI,EAAEqD,KAAK,CAAC;EAC5D;;EAEA;AACJ;AACA;EACWC,mBAAmBA,CAACD,KAAc,EAAoB;IACzD,OAAO,IAAI,CAACnQ,aAAa,CAAC8I,MAAM,CAACqH,KAAK,CAAC;EAC3C;;EAEA;AACJ;AACA;EACWrM,mBAAmBA,CAACqM,KAAc,EAAyC;IAC9E,OAAO,IAAI,CAACnQ,aAAa,CAAC2C,MAAM,CAACwN,KAAK,CAAC;EAC3C;;EAEA;AACJ;AACA;EACWE,WAAWA,CAAChC,IAAY,EAAEiC,MAAc,EAAE5N,IAAe,EAAiB;IAC7E,OAAO,IAAI,CAAC1C,aAAa,CAAC4C,KAAK,CAACyL,IAAI,EAAEiC,MAAM,EAAE5N,IAAI,CAAC;EACvD;;EAEA;AACJ;AACA;EACW6N,SAASA,CAAClC,IAAY,EAA+B;IACxD,OAAO,IAAI,CAACrO,aAAa,CAACuC,GAAG,CAAC8L,IAAI,CAAC;EACvC;;EAEA;AACJ;AACA;EACWmC,cAAcA,CAACnC,IAAY,EAA+D;IAC7F,OAAO,IAAI,CAACrO,aAAa,CAACyQ,QAAQ,CAACpC,IAAI,CAAC;EAC5C;EAEOqC,aAAaA,CAACrC,IAAY,EAAE7H,OAAiB,EAAkB;IAClE,IAAI,CAACA,OAAO,EAAE;MACVA,OAAO,GAAGvE,MAAM,CAACS,IAAI,CAAC,IAAI,CAAC3E,UAAU,CAACiH,0BAA0B,CAAC,IAAI,CAAC5H,MAAM,CAAC,CAAC;IAClF;IACA,OAAO,IAAI,CAAC4C,aAAa,CAAC2Q,OAAO,CAACtC,IAAI,EAAE7H,OAAO,CAAC;EACpD;;EAEA;AACJ;AACA;EACWoK,4BAA4BA,CAAA,EAA2B;IAC1D,OAAO,IAAI,CAAC5Q,aAAa,CAAC6Q,eAAe,CAAC,CAAC;EAC/C;;EAEA;AACJ;AACA;EACWC,4BAA4BA,CAACC,CAAS,EAAiB;IAC1D,OAAO,IAAI,CAAC/Q,aAAa,CAACkN,eAAe,CAAC6D,CAAC,CAAC;EAChD;;EAEA;AACJ;AACA;EACWC,qBAAqBA,CAAC1J,GAAe,EAAEqH,IAAiC,EAAoB;IAC/F,OAAO,IAAI,CAAC3O,aAAa,CAACiR,QAAQ,CAAC3J,GAAG,EAAEqH,IAAI,CAAC;EACjD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWuC,4BAA4BA,CAAC3J,UAAsB,EAAE4J,iBAAyB,EAAW;IAC5F,IAAIjK,UAA+B,GAAG,IAAI;IAC1C,IAAI;MACAA,UAAU,GAAG,IAAI1C,UAAU,CAACC,GAAG,CAAC0C,YAAY,CAAC,CAAC;MAC9C,IAAMiK,SAAS,GAAGlK,UAAU,CAACG,qBAAqB,CAACE,UAAU,CAAC;MAC9D;MACA,OAAO6J,SAAS,KAAKD,iBAAiB;IAC1C,CAAC,SAAS;MAAA,IAAAE,WAAA;MACN,CAAAA,WAAA,GAAAnK,UAAU,cAAAmK,WAAA,eAAVA,WAAA,CAAYrJ,IAAI,CAAC,CAAC;IACtB;EACJ;;EAEA;AACJ;AACA;AACA;EACiB3F,0BAA0BA,CAAA,EAA+B;IAAA,IAAAiP,OAAA;IAAA,OAAAzT,iBAAA;MAClE,IAAM0T,UAAU,SAAS,IAAIC,OAAO,CAC/BC,OAAO,IAAK;QACTH,OAAI,CAAC/T,WAAW,CAACgI,KAAK,CAAC,UAAU,EAAE,CAAC1M,oBAAoB,CAAC2M,aAAa,CAAC,EAAGC,GAAG,IAAK;UAC9E6L,OAAI,CAAC/T,WAAW,CAACmU,wBAAwB,CAACjM,GAAG,EAAEgM,OAAO,EAAE,oBAAoB,CAAC;QACjF,CAAC,CAAC;MACN,CACJ,CAAC;MAED,IAAInK,GAAsB,GAAG,IAAI;;MAEjC;MACA,IAAI,OAAOiK,UAAU,KAAK,QAAQ,EAAE;QAChCjK,GAAG,GAAG,IAAI6H,UAAU,CAACzT,YAAY,CAAC+G,YAAY,CAAC8O,UAAU,CAAC,IAAIA,UAAU,CAAC,CAAC;QAC1E,MAAMD,OAAI,CAACxB,4BAA4B,CAACxI,GAAG,CAAC;MAChD;MACA,IAAIiK,UAAU,IAAI,OAAOA,UAAU,KAAK,QAAQ,IAAI,YAAY,IAAIA,UAAU,EAAE;QAC5E,IAAMhN,SAAS,GAAGoN,MAAM,CAACpO,IAAI,CAAC+N,OAAI,CAACtO,SAAS,CAACuB,SAAS,CAAC;QACvD,IAAMqN,SAAS,SAAS/V,2BAA2B,CAAC0V,UAAU,EAAEhN,SAAS,EAAE,oBAAoB,CAAC;QAChG+C,GAAG,GAAG5L,YAAY,CAACkW,SAAS,CAAC;MACjC;MACA,OAAOtK,GAAG;IAAC;EACf;;EAEA;AACJ;AACA;AACA;AACA;EACiBwI,4BAA4BA,CAACxI,GAAsB,EAAEkI,OAAgB,EAAiB;IAAA,IAAAqC,OAAA;IAAA,OAAAhU,iBAAA;MAC/F,IAAI,EAAEyJ,GAAG,YAAY6H,UAAU,CAAC,EAAE;QAC9B;QACA,MAAM,IAAIpM,KAAK,yDAAArD,MAAA,CAAyD4H,GAAG,CAAE,CAAC;MAClF;MACA,IAAM/C,SAAS,GAAGoN,MAAM,CAACpO,IAAI,CAACsO,OAAI,CAAC7O,SAAS,CAACuB,SAAS,CAAC;MACvD,IAAMuN,YAAY,SAAShW,2BAA2B,CAACH,YAAY,CAAC2L,GAAG,CAAC,EAAE/C,SAAS,EAAE,oBAAoB,CAAC;MAC1G,OAAOsN,OAAI,CAACtU,WAAW,CAACgI,KAAK,CAAC,WAAW,EAAE,CAAC1M,oBAAoB,CAAC2M,aAAa,CAAC,EAAGC,GAAG,IAAK;QACtFoM,OAAI,CAACtU,WAAW,CAACwU,0BAA0B,CAACtM,GAAG,EAAE,oBAAoB,EAAEqM,YAAY,CAAC;MACxF,CAAC,CAAC;IAAC;EACP;;EAEA;AACJ;AACA;EACWE,4CAA4CA,CAAA,EAAkB;IACjE,MAAM,IAAIjP,KAAK,CAAC,iBAAiB,CAAC;EACtC;;EAEA;AACJ;AACA;AACA;AACA;EACiBkP,6BAA6BA,CAAA,EAA2B;IAAA,IAAAC,OAAA;IAAA,OAAArU,iBAAA;MACjE,IAAIqU,OAAI,CAAC/P,aAAa,CAAC8G,mBAAmB,CAAC,CAAC,EAAE;QAAA,IAAAkJ,qBAAA;QAC1C,QAAAA,qBAAA,GAAOD,OAAI,CAAC/P,aAAa,CAACqN,OAAO,cAAA2C,qBAAA,cAAAA,qBAAA,GAAI,IAAI;MAC7C;MACA,OAAO,IAAI;IAAC;EAChB;;EAEA;AACJ;AACA;EACiBC,gBAAgBA,CAAA,EAAkC;IAAA,OAAAvU,iBAAA;MAC3D,MAAM,IAAIkF,KAAK,CAAC,iBAAiB,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;AACA;AACA;EACiBsP,kBAAkBA,CAAC1D,IAAmB,EAA4B;IAAA,IAAA2D,OAAA;IAAA,OAAAzU,iBAAA;MAC3E,IAAM0U,SAAS,SAASD,OAAI,CAACnQ,aAAa,CAACkQ,kBAAkB,CAAC1D,IAAI,CAAC;MACnE,OAAO7U,kCAAkC,CAACyY,SAAS,CAAC;IAAC;EACzD;;EAEA;AACJ;AACA;AACA;AACA;EACiBC,uBAAuBA,CAAA,EAAmC;IAAA,IAAAC,OAAA;IAAA,OAAA5U,iBAAA;MACnE,IAAM6U,WAAW,SAASD,OAAI,CAACtQ,aAAa,CAACwQ,cAAc,CAAC,CAAC;MAC7D,IAAI,CAACD,WAAW,IAAI,CAACA,WAAW,CAACtH,UAAU,EAAE,OAAO,IAAI;MACxD,OAAO;QACHA,UAAU,EAAEsH,WAAW,CAACtH,UAAU;QAClCmH,SAAS,EAAEzY,kCAAkC,CAAC4Y,WAAW,CAACH,SAAS;MACvE,CAAC;IAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWK,2BAA2BA,CAACrL,UAAsB,EAAE4J,iBAAyB,EAAW;IAC3F,IAAI0B,OAAyB,GAAG,IAAI;IACpC,IAAI;MACAA,OAAO,GAAG,IAAIrO,UAAU,CAACC,GAAG,CAACqO,SAAS,CAAC,CAAC;MACxC,IAAM1B,SAAS,GAAGyB,OAAO,CAACE,cAAc,CAACxL,UAAU,CAAC;MACpD;MACA,OAAO6J,SAAS,KAAKD,iBAAiB;IAC1C,CAAC,SAAS;MAAA,IAAA6B,QAAA;MACN,CAAAA,QAAA,GAAAH,OAAO,cAAAG,QAAA,eAAPA,QAAA,CAAShL,IAAI,CAAC,CAAC;IACnB;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBiL,+BAA+BA,CAAA,EAAkB;IAAA,IAAAC,OAAA;IAAA,OAAArV,iBAAA;MAC3D/F,MAAM,CAAC6W,IAAI,CAAC,mDAAmD,CAAC;;MAEhE;MACA,IAAM3D,MAAM,GAAGkI,OAAI,CAACnV,UAAU,CAAC8I,eAAe,CAACqM,OAAI,CAAC9V,MAAM,EAAE8V,OAAI,CAAC7V,QAAQ,CAAE;MAC3E,IAAM8V,YAAY,SAASD,OAAI,CAAC9U,gBAAgB,CAAC8M,UAAU,CAACgI,OAAI,CAAC9V,MAAM,EAAE4N,MAAM,CAAC;MAChFlT,MAAM,CAAC6W,IAAI,2CAAAjP,MAAA,CAA2CwT,OAAI,CAAC7V,QAAQ,CAAE,CAAC;MAEtE,IAAM+V,MAAM,GAAGC,KAAA,IAA2C;QAAA,IAA1C;UAAEC,UAAU,GAAG;QAAM,CAAC,GAAAD,KAAA;QAClC,OAAOH,OAAI,CAAC/V,QAAQ,CACfoW,mBAAmB,CAAC;UACjB,CAACL,OAAI,CAAC9V,MAAM,GAAG;YACX,CAAC8V,OAAI,CAAC7V,QAAQ,GAAG8V;UACrB;QACJ,CAAC,CAAC,CACDK,IAAI,CAAEC,QAAQ,IAAK;UAChB,IAAM;YAAEC;UAAS,CAAC,GAAGD,QAAQ,IAAI,CAAC,CAAC;UACnC,IAAIxR,MAAM,CAACS,IAAI,CAACgR,QAAQ,IAAI,EAAE,CAAC,CAACvS,MAAM,GAAG,CAAC,EAAE;YACxC,IAAImS,UAAU,EAAE;cACZJ,OAAI,CAAC/V,QAAQ,CAACqB,IAAI,CACdpD,WAAW,CAACuY,yBAAyB,EACrCD,QAAQ,EACR,iCAAiC,EACjCN,MAAM,CAAE;cACZ,CAAC;YACL;YACA,MAAM,IAAI1Z,uBAAuB,CAAC,mBAAmB,EAAE;cAAEga;YAAS,CAAC,CAAC;UACxE;UACA5b,MAAM,CAAC6W,IAAI,2CAAAjP,MAAA,CAA2CwT,OAAI,CAAC7V,QAAQ,CAAE,CAAC;QAC1E,CAAC,CAAC,CACDuW,KAAK,CAAErU,CAAC,IAAK;UACVzH,MAAM,CAAC0H,KAAK,+CAAAE,MAAA,CAA+CwT,OAAI,CAAC7V,QAAQ,GAAIkC,CAAC,CAAC;QAClF,CAAC,CAAC;MACV,CAAC;MACD6T,MAAM,CAAC;QAAEE,UAAU,EAAE;MAAK,CAAC,CAAC;MAE5B,IAAMO,eAAe,GAAGX,OAAI,CAAC/V,QAAQ,CAAC0F,eAAe,CAACiR,gCAAgC;MACtF,IAAID,eAAe,EAAE;QACjB/b,MAAM,CAAC6W,IAAI,CAAC,sCAAsC,CAAC;;QAEnD;QACA;QACA,IAAMoF,KAAiD,GAAG,CAAC,CAAC;QAC5D,KAAK,IAAM,CAAC3W,QAAM,EAAEgB,gBAAgB,CAAC,IAAI6D,MAAM,CAACC,OAAO,CAACgR,OAAI,CAACnV,UAAU,CAACK,gBAAgB,CAAC,EAAE;UACvF,IAAM4V,WAAW,SAASd,OAAI,CAACe,iCAAiC,CAC5D7W,QAAM,EACN/E,gBAAgB,CAAC6b,WAAW,CAAC9V,gBAAgB,EAAEhB,QAAM,CACzD,CAAC;UACD,IAAI4W,WAAW,EAAE;YACbD,KAAK,CAAC3W,QAAM,CAAC,GAAG4W,WAAW;UAC/B;QACJ;QAEA,IAAI/R,MAAM,CAACS,IAAI,CAACqR,KAAK,CAAC,CAAC5S,MAAM,GAAG,CAAC,EAAE;UAC/BrJ,MAAM,CAAC6W,IAAI,UAAAjP,MAAA,CAAUuC,MAAM,CAACS,IAAI,CAACqR,KAAK,CAAC,CAAC5S,MAAM,4BAAyB,CAAC;UACxE,IAAI;YACA,IAAMgT,cAAc,SAASN,eAAe,CAAC;cAAEE,KAAK,EAAEA;YAAM,CAAC,CAAC;YAC9D,IAAII,cAAc,EAAE;cAChB,KAAK,IAAM/W,QAAM,IAAI+W,cAAc,EAAE;gBACjC,IAAI/W,QAAM,IAAI2W,KAAK,EAAE;kBACjB,MAAMb,OAAI,CAAC/V,QAAQ,CAACiX,iBAAiB,CAAChX,QAAM,EAAE2W,KAAK,CAAC3W,QAAM,CAAC,CAACgB,gBAAgB,CAACF,KAAK,CAAC,CAAE,CAAC;gBAC1F;cACJ;YACJ;UACJ,CAAC,CAAC,OAAOqB,CAAC,EAAE;YACRzH,MAAM,CAAC2H,GAAG,CAAC,gEAAgE,EAAEF,CAAC,CAAC;UACnF;QACJ;QAEAzH,MAAM,CAAC6W,IAAI,CAAC,sCAAsC,CAAC;MACvD;MAEA7W,MAAM,CAAC6W,IAAI,CAAC,mDAAmD,CAAC;IAAC;EACrE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACkBsF,iCAAiCA,CAC3C7W,MAAc,EACdgB,gBAAkC,EACa;IAAA,IAAAiW,OAAA;IAAA,OAAAxW,iBAAA;MAC/C;MACA;MACA,IAAMyW,UAAU,GAAGD,OAAI,CAACjW,gBAAgB,CAACK,cAAc,CAACL,gBAAgB,CAAC;MACzE,IAAIA,gBAAgB,CAACmW,QAAQ,IAAI,CAACD,UAAU,CAACE,UAAU,CAAC,CAAC,EAAE;QACvD,IAAMhO,OAAO,GAAG6N,OAAI,CAACtW,UAAU,CAACiH,0BAA0B,CAAC5H,MAAM,CAAC;QAClE,IAAMqX,SAAS,SAASJ,OAAI,CAACK,4BAA4B,CAACtX,MAAM,EAAEgB,gBAAgB,CAACsE,IAAI,CAACoI,MAAM,EAAEtE,OAAO,CAAC;QACxG,IAAIiO,SAAS,CAACtT,MAAM,EAAE;UAClB,OAAO;YACHqF,OAAO,EAAEiO,SAAS,CAACE,GAAG,CAAEtX,QAAQ,IAAKnF,UAAU,CAACgc,WAAW,CAAC1N,OAAO,CAACnJ,QAAQ,CAAC,EAAEA,QAAQ,CAAC,CAAC;YACzFe;UACJ,CAAC;QACL;MACJ;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACkBsW,4BAA4BA,CACtCtX,MAAc,EACdkK,GAAwB,EACxBd,OAAgC,EACf;IAAA,IAAAoO,OAAA;IAAA,OAAA/W,iBAAA;MACjB,IAAM4W,SAAmB,GAAG,EAAE;MAC9B,IAAIjO,OAAO,IAAIc,GAAG,CAACuN,UAAU,IAAIvN,GAAG,CAACuN,UAAU,CAACzX,MAAM,CAAC,EAAE;QACrD,KAAK,IAAM0X,OAAO,IAAI7S,MAAM,CAACS,IAAI,CAAC4E,GAAG,CAACuN,UAAU,CAACzX,MAAM,CAAC,CAAC,EAAE;UACvD,IAAM,GAAGC,UAAQ,CAAC,GAAGyX,OAAO,CAACC,KAAK,CAAC,GAAG,EAAE,CAAC,CAAC;UAC1C,IAAI1X,UAAQ,IAAImJ,OAAO,IAAIA,OAAO,CAACnJ,UAAQ,CAAC,CAAC6H,QAAQ,KAAKnJ,kBAAkB,CAACoJ,QAAQ,EAAE;YACnF,IAAI;cACA,MAAMnN,MAAM,CAACgd,eAAe,CACxBJ,OAAI,CAAC5R,SAAS,EACdsE,GAAG,EACHlK,MAAM,EACNC,UAAQ,EACRmJ,OAAO,CAACnJ,UAAQ,CAAC,CAACqF,IAAI,CAACoS,OAAO,CAClC,CAAC;cACDL,SAAS,CAACQ,IAAI,CAAC5X,UAAQ,CAAC;YAC5B,CAAC,CAAC,OAAA6X,OAAA,EAAM,CAAC;UACb;QACJ;MACJ;MACA,OAAOT,SAAS;IAAC;EACrB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWU,oBAAoBA,CAAA,EAAyE;IAAA,IAAxEnR,IAAqB,GAAA9E,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAGvG,eAAe,CAACyc,MAAM;IACtE,OAAO5D,OAAO,CAACC,OAAO,CAAC,IAAI,CAAC4D,iBAAiB,CAACrR,IAAI,CAAC,CAAC;EACxD;;EAEA;EACOqR,iBAAiBA,CAACrR,IAAY,EAAiB;IAClD,OAAO,IAAI,CAAC5F,gBAAgB,CAACF,KAAK,CAAC8F,IAAI,CAAC;EAC5C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWhG,4BAA4BA,CAACZ,MAAc,EAA2B;IACzE,OAAO,IAAI,CAACW,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;EAC/D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWqB,cAAcA,CAACrB,MAAc,EAAkB;IAClD,IAAMkY,gBAAgB,GAAG,IAAI,CAACvX,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;IAC7E,IAAI,CAACkY,gBAAgB,EAAE;MACnB,OAAO,IAAI/c,cAAc,CAAC,KAAK,EAAE,KAAK,EAAE,KAAK,CAAC;IAClD;IACA,OAAO,IAAI,CAAC6F,gBAAgB,CAACK,cAAc,CAAC6W,gBAAgB,CAAC;EACjE;;EAEA;AACJ;AACA;EACiBC,yBAAyBA,CAACnY,MAAc,EAA2B;IAAA,IAAAoY,OAAA;IAAA,OAAA3X,iBAAA;MAC5E,OAAO2X,OAAI,CAAC/W,cAAc,CAACrB,MAAM,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;EACiBqY,sBAAsBA,CAACrY,MAAc,EAAiB;IAAA,OAAAS,iBAAA;MAC/D,MAAM,IAAIkF,KAAK,CAAC,iBAAiB,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACiB2S,2BAA2BA,CACpCtY,MAAc,EACdC,QAAgB,EACwB;IAAA,IAAAsY,OAAA;IAAA,OAAA9X,iBAAA;MACxC,IAAMmN,MAAM,GAAG2K,OAAI,CAAC5X,UAAU,CAAC8I,eAAe,CAACzJ,MAAM,EAAEC,QAAQ,CAAC;MAChE,IAAI,CAAC2N,MAAM,EAAE;QACT,OAAO,IAAI;MACf;MACA,OAAO2K,OAAI,CAACC,oBAAoB,CAACxY,MAAM,EAAE4N,MAAM,CAAC;IAAC;EACrD;;EAEA;AACJ;AACA;EACWtE,gBAAgBA,CAACtJ,MAAc,EAAEC,QAAgB,EAAoB;IACxE,IAAM2N,MAAM,GAAG,IAAI,CAACjN,UAAU,CAAC8I,eAAe,CAACzJ,MAAM,EAAEC,QAAQ,CAAC;IAChE,OAAO,IAAI,CAACuY,oBAAoB,CAACxY,MAAM,EAAE4N,MAAM,CAAC;EACpD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACW4K,oBAAoBA,CAACxY,MAAc,EAAE4N,MAAmB,EAAoB;IAC/E,IAAM6K,cAAc,GAAG,CAAC,EAAC7K,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEwJ,UAAU,CAAC,CAAC;IAE7C,IAAMc,gBAAgB,GAAG,IAAI,CAACvX,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;IAC7E,IAAI4N,MAAM,IAAIsK,gBAAgB,EAAE;MAC5B;MACA;MACA,IAAMQ,aAAa,GAAG,IAAI,CAAC3P,uBAAuB,IAAI/I,MAAM,KAAK,IAAI,CAACA,MAAM;MAC5E,OAAO,IAAI,CAACgB,gBAAgB,CAACsI,gBAAgB,CAAC4O,gBAAgB,EAAEtK,MAAM,EAAE6K,cAAc,EAAEC,aAAa,CAAC;IAC1G,CAAC,MAAM;MACH,OAAO,IAAIxd,gBAAgB,CAAC,KAAK,EAAE,KAAK,EAAEud,cAAc,EAAE,KAAK,CAAC;IACpE;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWE,2BAA2BA,CAAC1Y,QAAgB,EAAW;IAAA,IAAA2Y,qBAAA;IAC1D,IAAMhL,MAAM,GAAG,IAAI,CAACjN,UAAU,CAAC8I,eAAe,CAAC,IAAI,CAACzJ,MAAM,EAAEC,QAAQ,CAAC;IACrE,IAAI,CAAC2N,MAAM,EAAE,OAAO,KAAK;IACzB,IAAMsK,gBAAgB,GAAG,IAAI,CAACvX,UAAU,CAACC,4BAA4B,CAAC,IAAI,CAACZ,MAAM,CAAC;IAClF,QAAA4Y,qBAAA,GACIV,gBAAgB,aAAhBA,gBAAgB,uBAAhBA,gBAAgB,CAAE5O,gBAAgB,CAAC4O,gBAAgB,EAAEtK,MAAM,EAAE,KAAK,EAAE,IAAI,CAAC,CAACnM,sBAAsB,CAAC,CAAC,cAAAmX,qBAAA,cAAAA,qBAAA,GAAI,KAAK;EAEnH;EA6CA;AACJ;AACA;AACA;EACiB1X,yBAAyBA,CAAA,EAEiB;IAAA,IAAA2X,WAAA,GAAA/W,SAAA;MAAAgX,OAAA;IAAA,OAAArY,iBAAA;MAAA,IAFhB;QACnC2N,uBAAuB,GAAG;MACE,CAAC,GAAAyK,WAAA,CAAA9U,MAAA,QAAA8U,WAAA,QAAA7U,SAAA,GAAA6U,WAAA,MAAG,CAAC,CAAC;MAClC,IAAM7Y,MAAM,GAAG8Y,OAAI,CAAC9Y,MAAM;;MAE1B;MACA;MACA,MAAM8Y,OAAI,CAAC9N,YAAY,CAAC,CAAC8N,OAAI,CAAC9Y,MAAM,CAAC,CAAC;;MAEtC;MACA,IAAMqO,uBAAuB,SAASyK,OAAI,CAAC9X,gBAAgB,CAACsQ,4BAA4B,CAAC,CAAC;;MAE1F;MACA;;MAEA;MACA,IAAM5Q,eAAe,GAAGoY,OAAI,CAACnY,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;MAC5E,IAAI,CAACU,eAAe,EAAE;QAClBhG,MAAM,CAAC0H,KAAK,CACR,0CAA0C,GAAGpC,MAAM,GAAG,8CAC1D,CAAC;QACD;MACJ;MAEA,IAAMa,UAAU,GAAGH,eAAe,CAACI,KAAK,CAAC,CAAE;MAC3C,IAAMiY,aAAa,GAAGD,OAAI,CAAC9X,gBAAgB,CAACF,KAAK,CAAC,CAAC,KAAKD,UAAU;MAClE,IAAMmY,4BAA4B,GAAGtY,eAAe,CAACI,KAAK,CAAC,CAAC,IAAI,CAACuN,uBAAuB,CAAC4K,GAAG,CAAC,QAAQ,CAAC;MACtG,IAAIF,aAAa,EAAE;QACfre,MAAM,CAAC6W,IAAI,CAAC,2BAA2B,EAAE1Q,UAAU,CAAC;MACxD;MACA,IAAIuN,uBAAuB,KAAK2K,aAAa,IAAIC,4BAA4B,CAAC,EAAE;QAC5Ete,MAAM,CAAC6W,IAAI,CAAC,yDAAyD,CAAC;QACtE,IAAIkE,OAAyB,GAAG,IAAI;QACpC;QACA;QACA;QACA,IAAI;UACA,IAAMyD,GAAG,SAASJ,OAAI,CAAC9X,gBAAgB,CAACyF,kBAAkB,CAAC,QAAQ,EAAE5F,UAAU,CAAC;UAChF4U,OAAO,GAAGyD,GAAG,CAAC,CAAC,CAAC;UAChBxe,MAAM,CAAC6W,IAAI,CAAC,sCAAsC,CAAC;QACvD,CAAC,SAAS;UAAA,IAAA4H,SAAA;UACN,CAAAA,SAAA,GAAA1D,OAAO,cAAA0D,SAAA,eAAPA,SAAA,CAASvO,IAAI,CAAC,CAAC;QACnB;MACJ;MAEA,IAAMwO,gBAAgB,GAAGN,OAAI,CAAC9X,gBAAgB,CAACF,KAAK,CAAC,cAAc,CAAC;MACpE,IAAMuY,gBAAgB,GAAGP,OAAI,CAAC9X,gBAAgB,CAACF,KAAK,CAAC,cAAc,CAAC;;MAEpE;MACAgY,OAAI,CAAC3X,oBAAoB,CAACT,eAAe,CAAC4E,IAAI,CAAC;MAE/C,IAAMgU,kBAAkB,GAAGF,gBAAgB,KAAK1Y,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC;MACrF,IAAMyY,kBAAkB,GAAGF,gBAAgB,KAAK3Y,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC;MAErF,IAAM0Y,iCAAiC,GACnC9Y,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC,IAAI,CAACuN,uBAAuB,CAAC4K,GAAG,CAAC,cAAc,CAAC;MACzF,IAAMQ,iCAAiC,GACnC/Y,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC,IAAI,CAACuN,uBAAuB,CAAC4K,GAAG,CAAC,cAAc,CAAC;MAEzF,IAAMS,aAAyC,GAAG,CAAC,CAAC;MAEpD,IAAIJ,kBAAkB,EAAE;QACpB5e,MAAM,CAAC6W,IAAI,CAAC,0BAA0B,EAAE7Q,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC,CAAC;MAClF;MACA,IAAIsN,uBAAuB,KAAKkL,kBAAkB,IAAIE,iCAAiC,CAAC,EAAE;QACtF9e,MAAM,CAAC6W,IAAI,CAAC,+DAA+D,CAAC;QAC5E,IAAIkE,SAAyB,GAAG,IAAI;QACpC,IAAI;UACA,IAAMyD,IAAG,SAASJ,OAAI,CAAC9X,gBAAgB,CAACyF,kBAAkB,CACtD,cAAc,EACd/F,eAAe,CAACI,KAAK,CAAC,cAAc,CACxC,CAAC;UACD2U,SAAO,GAAGyD,IAAG,CAAC,CAAC,CAAC;UAChBxe,MAAM,CAAC6W,IAAI,CAAC,4CAA4C,CAAC;QAC7D,CAAC,SAAS;UAAA,IAAAoI,SAAA;UACN,CAAAA,SAAA,GAAAlE,SAAO,cAAAkE,SAAA,eAAPA,SAAA,CAAS/O,IAAI,CAAC,CAAC;QACnB;QAEA,IAAMgD,MAAM,GAAGkL,OAAI,CAACnY,UAAU,CAAC8I,eAAe,CAACqP,OAAI,CAAC9Y,MAAM,EAAE8Y,OAAI,CAAC7Y,QAAQ,CAAE;QAC3E,IAAM8V,YAAY,SAAS+C,OAAI,CAAC9X,gBAAgB,CAAC8M,UAAU,CAACgL,OAAI,CAAC9Y,MAAM,EAAE4N,MAAM,CAAC;QAChF8L,aAAa,CAACZ,OAAI,CAAC7Y,QAAQ,CAAC,GAAG8V,YAAa;MAChD;MACA,IAAIwD,kBAAkB,EAAE;QACpB7e,MAAM,CAAC6W,IAAI,CAAC,0BAA0B,EAAE7Q,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC,CAAC;MAClF;MACA,IAAIsN,uBAAuB,KAAKmL,kBAAkB,IAAIE,iCAAiC,CAAC,EAAE;QACtF/e,MAAM,CAAC6W,IAAI,CAAC,+DAA+D,CAAC;QAC5E,IAAIkE,SAAyB,GAAG,IAAI;QACpC,IAAI;UACA,IAAMyD,KAAG,SAASJ,OAAI,CAAC9X,gBAAgB,CAACyF,kBAAkB,CACtD,cAAc,EACd/F,eAAe,CAACI,KAAK,CAAC,cAAc,CACxC,CAAC;UACD2U,SAAO,GAAGyD,KAAG,CAAC,CAAC,CAAC;UAChBxe,MAAM,CAAC6W,IAAI,CAAC,4CAA4C,CAAC;QAC7D,CAAC,SAAS;UAAA,IAAAqI,SAAA;UACN,CAAAA,SAAA,GAAAnE,SAAO,cAAAmE,SAAA,eAAPA,SAAA,CAAShP,IAAI,CAAC,CAAC;QACnB;MACJ;MAEA,IAAImO,aAAa,EAAE;QACf,IAAMxM,SAAS,GAAGuM,OAAI,CAAC9X,gBAAgB,CAACsE,IAAI,CAACoI,MAAM;QACnD,MAAMoL,OAAI,CAACrL,UAAU,CAAClB,SAAS,CAAC;QAChC,IAAMsN,SAAS,GAAGtN,SAAS,CAACkL,UAAU,CAAEqB,OAAI,CAAC9Y,MAAM,CAAC,CAAC,UAAU,GAAG8Y,OAAI,CAAC7Y,QAAQ,CAAC;QAChF;QACA;QACA;QACAyZ,aAAa,CAACZ,OAAI,CAAC9X,gBAAgB,CAACF,KAAK,CAAC,CAAC,CAAE,GAAG+D,MAAM,CAACiV,MAAM,CAAC,CAAC,CAAC,EAAgBvN,SAAS,EAAE;UACvFkL,UAAU,EAAE;YACR,CAACqB,OAAI,CAAC9Y,MAAM,GAAG;cACX,CAAC,UAAU,GAAG8Y,OAAI,CAAC7Y,QAAQ,GAAG4Z;YAClC;UACJ;QACJ,CAAC,CAAC;MACN;MAEA,IAAME,YAAY,GAAGlV,MAAM,CAACS,IAAI,CAACoU,aAAa,CAAC;MAC/C,IAAIK,YAAY,CAAChW,MAAM,EAAE;QACrB,IAAMiS,MAAM,GAAGgE,MAAA,IAA2C;UAAA,IAA1C;YAAE9D,UAAU,GAAG;UAAM,CAAC,GAAA8D,MAAA;UAClCtf,MAAM,CAAC6W,IAAI,2CAAAjP,MAAA,CAA2CyX,YAAY,CAAE,CAAC;UACrE,OAAOjB,OAAI,CAAC/Y,QAAQ,CACfoW,mBAAmB,CAAC;YAAE,CAAC2C,OAAI,CAAC9Y,MAAM,GAAG0Z;UAAc,CAAC,CAAC,CACrDtD,IAAI,CAAEC,QAAQ,IAAK;YAChB,IAAM;cAAEC;YAAS,CAAC,GAAGD,QAAQ,IAAI,CAAC,CAAC;YACnC3b,MAAM,CAAC6W,IAAI,2CAAAjP,MAAA,CAA2CyX,YAAY,CAAE,CAAC;YACrE,IAAIlV,MAAM,CAACS,IAAI,CAACgR,QAAQ,IAAI,EAAE,CAAC,CAACvS,MAAM,GAAG,CAAC,EAAE;cACxC,IAAImS,UAAU,EAAE;gBACZ4C,OAAI,CAAC/Y,QAAQ,CAACqB,IAAI,CACdpD,WAAW,CAACuY,yBAAyB,EACrCD,QAAQ,EACR,2BAA2B,EAC3BN,MACJ,CAAC;cACL;cACA,MAAM,IAAI1Z,uBAAuB,CAAC,mBAAmB,EAAE;gBAAEga;cAAS,CAAC,CAAC;YACxE;UACJ,CAAC,CAAC,CACDE,KAAK,CAAErU,CAAC,IAAK;YACVzH,MAAM,CAAC0H,KAAK,+CAAAE,MAAA,CAA+CyX,YAAY,GAAI5X,CAAC,CAAC;UACjF,CAAC,CAAC;QACV,CAAC;QACD6T,MAAM,CAAC;UAAEE,UAAU,EAAE;QAAK,CAAC,CAAC;MAChC;MAEA4C,OAAI,CAAC1X,IAAI,CAACpD,WAAW,CAACkB,sBAAsB,EAAEc,MAAM,EAAE8Y,OAAI,CAACzX,cAAc,CAACrB,MAAM,CAAC,CAAC;MAElF,IAAI+Y,aAAa,EAAE;QACfD,OAAI,CAAC1X,IAAI,CAACpD,WAAW,CAAC0B,WAAW,EAAE,CAAC,CAAC,CAAC;QACtC,MAAMoZ,OAAI,CAACjD,+BAA+B,CAAC,CAAC;MAChD;;MAEA;MACA,MAAMiD,OAAI,CAAC/T,aAAa,CAACwQ,cAAc,CAAC,CAAC;MACzC;MACA;IAAA;EACJ;;EAEA;AACJ;AACA;EACiB0E,kBAAkBA,CAACjM,UAAyB,EAAEkM,OAA0B,EAA4B;IAAA,OAAAzZ,iBAAA;MAC7G,IAAI,EAAEyZ,OAAO,YAAYnI,UAAU,CAAC,EAAE;QAClC,MAAM,IAAIpM,KAAK,wCAAwC,CAAC;MAC5D;MAEA,IAAM4E,SAAS,SAAS/N,aAAa,CAAC2d,aAAa,CAACnM,UAAU,eAAAvN,iBAAA,CAAE,aAAY;QACxE,OAAOyZ,OAAO;MAClB,CAAC,EAAC;;MAEF;MACA;MACA;MACA,IAAI,QAAQ3P,SAAS,CAAC6P,UAAU,CAACF,OAAO,CAAC,CAAC,EAAE;QACxC,OAAO9F,OAAO,CAACiG,MAAM,CAAC,IAAIjc,WAAW,CAAC;UAAEkc,OAAO,EAAErd,YAAY,CAACsd;QAA6B,CAAC,CAAC,CAAC;MAClG;MAEA,OAAO,IAAI9d,qBAAqB,CAAC8N,SAAS,CAAC;IAAC;EAChD;;EAEA;AACJ;AACA;EACWiQ,sBAAsBA,CACzBlV,IAA0B,EAC1BmV,aAAqB,EAER;IAAA,IADb/K,IAAwB,GAAA5N,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,CAAC,CAAC;IAE7B4N,IAAI,CAACgL,MAAM,GAAG,QAAQ;IACtB,OAAO,IAAI,CAACC,cAAc,CAACrV,IAAI,EAAEoK,IAAI,CAAC;EAC1C;;EAEA;AACJ;AACA;AACA;AACA;EACkBvO,oBAAoBA,CAACmE,IAAgD,EAAiB;IAAA,IAAAsV,OAAA;IAAA,OAAAna,iBAAA;MAChG,IAAI6E,IAAI,EAAE;QACNsV,OAAI,CAAC5Z,gBAAgB,CAACuH,OAAO,CAACjD,IAAI,CAAC;MACvC,CAAC,MAAM;QACHsV,OAAI,CAAC5Z,gBAAgB,CAAC6Z,SAAS,CAAC,CAAC;MACrC;MACA,MAAMD,OAAI,CAACza,WAAW,CAACgI,KAAK,CAAC,WAAW,EAAE,CAAC1M,oBAAoB,CAAC2M,aAAa,CAAC,EAAGC,GAAG,IAAK;QACrFuS,OAAI,CAACza,WAAW,CAAC2a,qBAAqB,CAACzS,GAAG,EAAEuS,OAAI,CAAC5Z,gBAAgB,CAACsE,IAAI,CAAC;MAC3E,CAAC,CAAC;IAAC;EACP;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBhE,wBAAwBA,CAACtB,MAAc,EAAiB;IAAA,IAAA+a,OAAA;IAAA,OAAAta,iBAAA;MAClE,IAAMgW,eAAe,GAAGsE,OAAI,CAAChb,QAAQ,CAAC0F,eAAe,CAACiR,gCAAgC;MACtF,IAAI,CAACD,eAAe,EAAE;QAClB;QACA;MACJ;MACA/b,MAAM,CAAC6W,IAAI,6CAAAjP,MAAA,CAA6CtC,MAAM,CAAE,CAAC;MACjE,IAAI+a,OAAI,CAAC/Z,gBAAgB,CAACsE,IAAI,CAAC0V,YAAY,EAAE;QACzC,IAAMha,gBAAgB,GAAG+Z,OAAI,CAACpa,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;QAC7E,IAAIgB,gBAAgB,EAAE;UAClB,IAAM4V,WAAW,SAASmE,OAAI,CAAClE,iCAAiC,CAAC7W,MAAM,EAAEgB,gBAAgB,CAAC;UAC1F,IAAI4V,WAAW,EAAE;YACb,IAAMG,cAAc,SAASN,eAAe,CAAC;cACzCE,KAAK,EAAE;gBACH,CAAC3W,MAAM,GAAG4W;cACd;YACJ,CAAC,CAAC;YACF,IAAIG,cAAc,CAACkE,QAAQ,CAACjb,MAAM,CAAC,EAAE;cACjC,MAAM+a,OAAI,CAAChb,QAAQ,CAACiX,iBAAiB,CAAChX,MAAM,EAAEgB,gBAAgB,CAACF,KAAK,CAAC,CAAE,CAAC;YAC5E;UACJ;QACJ;MACJ;MACApG,MAAM,CAAC6W,IAAI,6CAAAjP,MAAA,CAA6CtC,MAAM,CAAE,CAAC;IAAC;EACtE;;EAEA;AACJ;EACWkb,iBAAiBA,CAAA,EAAS;IAC7B,IAAI,CAACC,eAAe,GAAG,IAAI;EAC/B;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,qBAAqBA,CACxBC,YAGC,EACG;IACJA,YAAY,CAACxV,EAAE,CAACjJ,eAAe,CAAC0e,UAAU,EAAE,IAAI,CAACC,YAAY,CAAC;IAC9DF,YAAY,CAACxV,EAAE,CAAC7I,WAAW,CAACwe,aAAa,EAAE,IAAI,CAAC9X,eAAe,CAAC;IAChE2X,YAAY,CAACxV,EAAE,CAAClJ,SAAS,CAAC8e,QAAQ,EAAE,IAAI,CAACC,eAAe,CAAC;IACzDL,YAAY,CAACxV,EAAE,CAAC9I,gBAAgB,CAACyG,SAAS,EAAE,IAAI,CAACkY,eAAe,CAAC;EACrE;;EAEA;AACJ;AACA;EACWC,KAAKA,CAAA,EAAS;IACjBjhB,MAAM,CAACkK,IAAI,CAAC,2CAA2C,CAAC;EAC5D;;EAEA;EACOgX,IAAIA,CAAA,EAAS;IAChB,IAAI,CAACvV,6BAA6B,CAACuV,IAAI,CAAC,CAAC;IACzC,IAAI,CAACjb,UAAU,CAACib,IAAI,CAAC,CAAC;IACtB,IAAI,CAACpV,kBAAkB,CAACoV,IAAI,CAAC,CAAC;IAC9B,IAAI,CAAC7W,aAAa,CAAC6W,IAAI,CAAC,CAAC;EAC7B;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,mBAAmBA,CAAA,EAAkB;IACxC,OAAO,IAAI,CAACjW,SAAS,CAAC6B,gBAAgB;EAC1C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWqU,sBAAsBA,CAAA,EAAkB;IAC3C,OAAO,IAAI,CAAClW,SAAS,CAAC8B,mBAAmB;EAC7C;;EAEA;AACJ;AACA;EACiBqU,gBAAgBA,CAAA,EAA2B;IAAA,IAAAC,OAAA;IAAA,OAAAvb,iBAAA;MACpD,IAAI,CAACub,OAAI,CAACpW,SAAS,CAAC8B,mBAAmB,EAAE;QACrC,MAAM,IAAI/B,KAAK,CAAC,gCAAgC,CAAC;MACrD;MACA,IAAI,CAACqW,OAAI,CAACpW,SAAS,CAAC6B,gBAAgB,EAAE;QAClC,MAAM,IAAI9B,KAAK,CAAC,6BAA6B,CAAC;MAClD;MACA,OAAO;QACHsW,OAAO,EAAED,OAAI,CAACpW,SAAS,CAAC6B,gBAAgB;QACxCyU,UAAU,EAAEF,OAAI,CAACpW,SAAS,CAAC8B;MAC/B,CAAC;IAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWyU,mCAAmCA,CAACC,KAAc,EAAQ;IAC7D,IAAI,CAACC,gCAAgC,GAAGD,KAAK;EACjD;;EAEA;AACJ;AACA;AACA;AACA;EACWE,mCAAmCA,CAAA,EAAY;IAClD,OAAO,IAAI,CAACD,gCAAgC;EAChD;;EAEA;AACJ;AACA;AACA;EACWE,gBAAgBA,CAAA,EAAiC;IACpD,IAAM/U,UAAU,GAAG;MACfzM,UAAU,EAAE,IAAI,CAACkL,mBAAmB;MACpCuW,SAAS,EAAE,IAAI,CAACvc,QAAQ;MACxBqF,IAAI,EAAE,IAAI,CAACkC,UAAU;MACrBiV,OAAO,EAAE,IAAI,CAACzc;IAClB,CAAC;IAED,OAAO,IAAI,CAACyN,UAAU,CAACjG,UAAU,CAAC,CAAC4O,IAAI,CAAC,MAAM;MAC1C,OAAO,IAAI,CAACrW,QAAQ,CAAC2c,iBAAiB,CAAC;QACnCC,WAAW,EAAEnV;MACjB,CAAC,CAAC;IACN,CAAC,CAAC;EACN;EAEOoV,mBAAmBA,CAAA,EAAY;IAClC,OAAO,CAAC,CAAC,IAAI,CAACC,gBAAgB;EAClC;;EAEA;EACQC,sBAAsBA,CAAA,EAAS;IAAA,IAAAC,OAAA;IACnC;IACA,IAAMC,YAAY,GAAG,IAAI,GAAG,EAAE,CAAC,CAAC;;IAEhC;IACA;IACA;IACA;IACA,IAAMC,eAAe,GAAG,CAAC;IAEzB,IAAI,IAAI,CAACC,yBAAyB,EAAE;MAChC;IACJ;IAEA,IAAMC,GAAG,GAAGC,IAAI,CAACD,GAAG,CAAC,CAAC;IACtB,IAAI,IAAI,CAACE,mBAAmB,KAAK,IAAI,IAAIF,GAAG,GAAG,IAAI,CAACE,mBAAmB,GAAGL,YAAY,EAAE;MACpF;MACA;IACJ;IAEA,IAAI,CAACK,mBAAmB,GAAGF,GAAG;;IAE9B;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;;IAEA;IACA,IAAMG,cAAc,GAAG,IAAI,CAAC1X,SAAS,CAAC2X,sBAAsB,CAAC,CAAC;IAC9D;IACA;IACA;IACA;IACA;IACA;IACA,IAAMC,QAAQ,GAAGC,IAAI,CAACC,KAAK,CAACJ,cAAc,GAAG,CAAC,CAAC;IAE/C,IAAMK,UAAU;MAAA,IAAAC,MAAA,GAAAnd,iBAAA,CAAG,WAAOod,QAAgB,EAAoB;QAC1D,OAAOL,QAAQ,GAAGK,QAAQ,IAAId,OAAI,CAACH,mBAAmB,CAAC,CAAC,EAAE;UACtD;UACA,IAAIY,QAAQ,GAAGK,QAAQ,EAAE;YACrBnjB,MAAM,CAAC6W,IAAI,CAAC,wBAAwB,CAAC;YACrC,IAAMuM,YAAY,GAAGL,IAAI,CAACM,GAAG,CAACP,QAAQ,GAAGK,QAAQ,EAAEZ,eAAe,CAAC;YACnE,MAAMF,OAAI,CAACnX,SAAS,CAACoY,mBAAmB,CAACF,YAAY,CAAC;UAC1D;UAEA,IAAIf,OAAI,CAACH,mBAAmB,CAAC,CAAC,EAAE;YAC5B,IAAMqB,YAAY,SAASlB,OAAI,CAACnX,SAAS,CAACsY,cAAc,CAAC,CAAC;YAC1D;YACA;YACA;YACA,IAAI,CAACD,YAAY,CAAC/B,UAAU,IAAIrX,MAAM,CAACS,IAAI,CAAC2Y,YAAY,CAAC/B,UAAU,CAAC,CAACnY,MAAM,IAAI,CAAC,EAAE;cAC9ErJ,MAAM,CAAC6W,IAAI,CAAC,yBAAyB,CAAC;cACtC,IAAIwL,OAAI,CAACoB,eAAe,EAAE;gBACtB;gBACA;gBACA;gBACA;gBACAC,YAAY,CAACrB,OAAI,CAACoB,eAAe,CAAC;gBAClC,OAAOpB,OAAI,CAACoB,eAAe;cAC/B;cACA,MAAMpB,OAAI,CAACnX,SAAS,CAACyY,mBAAmB,CAAC,CAAC;YAC9C;UACJ;UAEA3jB,MAAM,CAAC6W,IAAI,CAAC,2BAA2B,CAAC;UACxC,IAAM+M,GAAG,SAASvB,OAAI,CAACwB,iBAAiB,CAAC,CAAC;UAC1C,IAAID,GAAG,CAACE,mBAAmB,IAAIF,GAAG,CAACE,mBAAmB,CAACC,iBAAiB,EAAE;YACtE;YACA;YACAZ,QAAQ,GAAGS,GAAG,CAACE,mBAAmB,CAACC,iBAAiB;UACxD,CAAC,MAAM;YACH,MAAM,IAAI9Y,KAAK,CACX,+CAA+C,GAAG,uCACtD,CAAC;UACL;QACJ;MACJ,CAAC;MAAA,gBAxCKgY,UAAUA,CAAAe,GAAA;QAAA,OAAAd,MAAA,CAAA/b,KAAA,OAAAC,SAAA;MAAA;IAAA,GAwCf;IAED,IAAI,CAACob,yBAAyB,GAAG,IAAI;IACrC9I,OAAO,CAACC,OAAO,CAAC,CAAC,CACZ+B,IAAI,CAAC,MAAM;MACR,IAAI,IAAI,CAACuI,eAAe,KAAK3a,SAAS,EAAE;QACpC;QACA;QACA,OAAOoQ,OAAO,CAACC,OAAO,CAAC,IAAI,CAACsK,eAAe,CAAC;MAChD;MACA;MACA,OAAO,IAAI,CAAC5e,QAAQ,CAAC2c,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAACtG,IAAI,CAAEkI,GAAG,IAAK;QACrD,OAAOA,GAAG,CAACE,mBAAmB,CAACC,iBAAiB,IAAI,CAAC;MACzD,CAAC,CAAC;IACN,CAAC,CAAC,CACDrI,IAAI,CAAEyH,QAAQ,IAAK;MAChB;MACA;MACA;MACA;MACA,OAAOF,UAAU,CAACE,QAAQ,CAAC;IAC/B,CAAC,CAAC,CACDrH,KAAK,CAAErU,CAAC,IAAK;MACVzH,MAAM,CAAC0H,KAAK,CAAC,+BAA+B,EAAED,CAAC,CAACyc,KAAK,IAAIzc,CAAC,CAAC;IAC/D,CAAC,CAAC,CACD0c,OAAO,CAAC,MAAM;MACX;MACA;MACA,IAAI,CAACF,eAAe,GAAG3a,SAAS;MAChC,IAAI,CAACkZ,yBAAyB,GAAG,KAAK;IAC1C,CAAC,CAAC;EACV;;EAEA;EACcqB,iBAAiBA,CAAA,EAAiC;IAAA,IAAAO,OAAA;IAAA,OAAAre,iBAAA;MAC5D,IAAMse,QAA4B,GAAG,EAAE;MAEvC,IAAIC,YAAqD;MACzD,IAAIF,OAAI,CAAClC,mBAAmB,CAAC,CAAC,EAAE;QAC5BoC,YAAY,GAAG,CAAC,CAAC;QACjB,IAAMf,YAAY,SAASa,OAAI,CAAClZ,SAAS,CAACsY,cAAc,CAAC,CAAC;QAC1D,KAAK,IAAM,CAACvO,KAAK,EAAEzF,GAAG,CAAC,IAAIrF,MAAM,CAACC,OAAO,CAACmZ,YAAY,CAAC/B,UAAU,CAAC,EAAE;UAChE,IAAMvI,CAAC,GAAG;YAAEzJ,GAAG;YAAE+U,QAAQ,EAAE;UAAK,CAAC;UACjCD,YAAY,CAAC,oBAAoB,GAAGrP,KAAK,CAAC,GAAGgE,CAAC;UAC9CoL,QAAQ,CAAClH,IAAI,CAACiH,OAAI,CAACrR,UAAU,CAACkG,CAAC,CAAC,CAAC;QACrC;QACAmL,OAAI,CAACjC,gBAAgB,GAAG,KAAK;MACjC;MAEA,IAAMqC,WAAW,SAASJ,OAAI,CAAClZ,SAAS,CAACuZ,cAAc,CAAC,CAAC;MACzD,IAAMC,WAA4C,GAAG,CAAC,CAAC;MAEvD,KAAK,IAAMzP,MAAK,IAAIuP,WAAW,CAAChD,UAAU,EAAE;QACxC,IAAIgD,WAAW,CAAChD,UAAU,CAACmD,cAAc,CAAC1P,MAAK,CAAC,EAAE;UAC9C,IAAMgE,EAAC,GAAG;YACNzJ,GAAG,EAAEgV,WAAW,CAAChD,UAAU,CAACvM,MAAK;UACrC,CAAC;UACDyP,WAAW,CAAC,oBAAoB,GAAGzP,MAAK,CAAC,GAAGgE,EAAC;UAC7CoL,QAAQ,CAAClH,IAAI,CAACiH,OAAI,CAACrR,UAAU,CAACkG,EAAC,CAAC,CAAC;QACrC;MACJ;MAEA,MAAMS,OAAO,CAACkL,GAAG,CAACP,QAAQ,CAAC;MAE3B,IAAMQ,WAAgC,GAAG;QACrCC,aAAa,EAAEJ;MACnB,CAAC;MAED,IAAIJ,YAAY,EAAE;QACdO,WAAW,CAAC,kCAAkC,CAAC,GAAGP,YAAY;QAC9DO,WAAW,CAAC,eAAe,CAAC,GAAGP,YAAY;MAC/C;MAEA,IAAMV,GAAG,SAASQ,OAAI,CAAC/e,QAAQ,CAAC2c,iBAAiB,CAAC6C,WAAW,CAAC;MAE9D,IAAIP,YAAY,EAAE;QACdF,OAAI,CAACX,eAAe,GAAGsB,UAAU,CAC7B,MAAM;UACF,OAAOX,OAAI,CAACX,eAAe;UAC3BW,OAAI,CAAClZ,SAAS,CAAC8Z,oBAAoB,CAAC,CAAC;QACzC,CAAC,EACD,EAAE,GAAG,EAAE,GAAG,IACd,CAAC;MACL;MAEA,MAAMZ,OAAI,CAAClZ,SAAS,CAAC+Z,mBAAmB,CAAC,CAAC;MAC1C,OAAOrB,GAAG;IAAC;EACf;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWtT,YAAYA,CAAC4U,OAAiB,EAAEC,aAAuB,EAA0B;IACpF,OAAO,IAAI,CAAClf,UAAU,CAACqK,YAAY,CAAC4U,OAAO,EAAE,CAAC,CAACC,aAAa,CAAC;EACjE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWC,uBAAuBA,CAAC9f,MAAc,EAA4B;IACrE,OAAO,IAAI,CAACW,UAAU,CAACmf,uBAAuB,CAAC9f,MAAM,CAAC;EAC1D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiB+f,iBAAiBA,CAACH,OAAiB,EAAgD;IAAA,IAAAI,WAAA,GAAAle,SAAA;MAAAme,OAAA;IAAA,OAAAxf,iBAAA;MAAA,IAA9Cyf,gBAAgB,GAAAF,WAAA,CAAAjc,MAAA,QAAAic,WAAA,QAAAhc,SAAA,GAAAgc,WAAA,MAAG,KAAK;MACtE,IAAMG,iBAAiB,GAAG,IAAI5f,GAAG,CAA8B,CAAC;MAChE;MACA,IAAM6f,sBAAgC,GAAG,EAAE;MAAC,IAAAC,KAAA,aAAAA,MAAAC,QAAA,EAEd;QAC1B,IAAMC,WAAW,SAASN,OAAI,CAACH,uBAAuB,CAAC9f,QAAM,CAAC;QAC9D;QACA;QACA,IAAIugB,WAAW,EAAE;UACb,IAAMC,SAAS,GAAG,IAAIjgB,GAAG;UACrB;UACAggB,WAAW,CAAChJ,GAAG,CAAE1P,UAAU,IAAK,CAACA,UAAU,CAAC5H,QAAQ,EAAE/B,kBAAkB,CAAC2J,UAAU,EAAE7H,QAAM,CAAC,CAAC,CACjG,CAAC;UACDmgB,iBAAiB,CAACxb,GAAG,CAAC3E,QAAM,EAAEwgB,SAAS,CAAC;QAC5C,CAAC,MAAM;UACHJ,sBAAsB,CAACvI,IAAI,CAAC7X,QAAM,CAAC;QACvC;MACJ,CAAC;MAbD,KAAK,IAAMA,QAAM,IAAI4f,OAAO;QAAA,OAAAS,KAAA,CAAAC,QAAA;MAAA;;MAe5B;MACA,IAAIJ,gBAAgB,IAAIE,sBAAsB,CAACrc,MAAM,GAAG,CAAC,EAAE;QACvD,IAAM0c,gBAAgB,SAASR,OAAI,CAACjV,YAAY,CAACoV,sBAAsB,CAAC;QAExEK,gBAAgB,CAACC,OAAO,CAAC,CAACC,aAAa,EAAE3gB,MAAM,KAAK;UAChD,IAAMwgB,SAAS,GAAG,IAAIjgB,GAAG,CAAiB,CAAC;UAC3C;UACAogB,aAAa,CAACD,OAAO,CAAC,CAAC7Y,UAAU,EAAE5H,QAAQ,KACvCugB,SAAS,CAAC7b,GAAG,CAAC1E,QAAQ,EAAE/B,kBAAkB,CAAC2J,UAAU,EAAE7H,MAAM,CAAC,CAClE,CAAC;;UAED;UACAmgB,iBAAiB,CAACxb,GAAG,CAAC3E,MAAM,EAAEwgB,SAAS,CAAC;QAC5C,CAAC,CAAC;MACN;MAEA,OAAOL,iBAAiB;IAAC;EAC7B;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACW1W,eAAeA,CAACzJ,MAAc,EAAEC,QAAgB,EAA0B;IAC7E,OAAO,IAAI,CAACU,UAAU,CAAC8I,eAAe,CAACzJ,MAAM,EAAEC,QAAQ,CAAC;EAC5D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACW2gB,cAAcA,CAACC,KAAa,EAAoB;IACnD,OAAO,IAAI,CAAClgB,UAAU,CAACuH,WAAW,CAAC2Y,KAAK,CAAC;EAC7C;;EAEA;AACJ;AACA;AACA;AACA;EACiB7J,iBAAiBA,CAAChX,MAAc,EAAEC,QAAgB,EAAkC;IAAA,IAAA6gB,WAAA,GAAAhf,SAAA;MAAAif,OAAA;IAAA,OAAAtgB,iBAAA;MAAA,IAAhCqH,QAAQ,GAAAgZ,WAAA,CAAA/c,MAAA,QAAA+c,WAAA,QAAA9c,SAAA,GAAA8c,WAAA,MAAG,IAAI;MAC5E,MAAMC,OAAI,CAACC,qBAAqB,CAAChhB,MAAM,EAAEC,QAAQ,EAAE6H,QAAQ,CAAC;IAAC;EACjE;;EAEA;AACJ;AACA;AACA;AACA;EACiBmZ,eAAeA,CAAChhB,QAAgB,EAAiB;IAAA,IAAAihB,OAAA;IAAA,OAAAzgB,iBAAA;MAC1D,MAAMygB,OAAI,CAAClK,iBAAiB,CAACkK,OAAI,CAAClhB,MAAM,EAAEC,QAAQ,EAAE,IAAI,CAAC;IAAC;EAC9D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiB+gB,qBAAqBA,CAC9BhhB,MAAc,EACdC,QAAgB,EAKwD;IAAA,IAAAkhB,WAAA,GAAArf,SAAA;MAAAsf,OAAA;IAAA,OAAA3gB,iBAAA;MAAA,IAJxEqH,QAAwB,GAAAqZ,WAAA,CAAApd,MAAA,QAAAod,WAAA,QAAAnd,SAAA,GAAAmd,WAAA,MAAG,IAAI;MAAA,IAC/BE,OAAuB,GAAAF,WAAA,CAAApd,MAAA,QAAAod,WAAA,QAAAnd,SAAA,GAAAmd,WAAA,MAAG,IAAI;MAAA,IAC9BnZ,KAAqB,GAAAmZ,WAAA,CAAApd,MAAA,QAAAod,WAAA,QAAAnd,SAAA,GAAAmd,WAAA,MAAG,IAAI;MAAA,IAC5B7b,IAA6B,GAAA6b,WAAA,CAAApd,MAAA,OAAAod,WAAA,MAAAnd,SAAA;MAE7B;MACA;MACA;MACA,IAAMsd,GAAG,GAAGF,OAAI,CAACzgB,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;MAChE,IAAI,CAAAshB,GAAG,aAAHA,GAAG,uBAAHA,GAAG,CAAExgB,KAAK,CAAC,CAAC,MAAKb,QAAQ,EAAE;QAC3B,IAAIohB,OAAO,KAAK,IAAI,IAAIrZ,KAAK,KAAK,IAAI,EAAE;UACpC,MAAM,IAAIrC,KAAK,CAAC,qDAAqD,CAAC;QAC1E;QACA,IAAI,CAACmC,QAAQ,EAAE;UACX,MAAM,IAAInC,KAAK,CAAC,8CAA8C,CAAC;QACnE;QACA,IAAM4b,QAAQ,GAAGjc,IAAI,GAAGT,MAAM,CAAC2c,MAAM,CAAClc,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG,IAAI;QACrD,IAAIA,IAAI,KAAKT,MAAM,CAAC2c,MAAM,CAAClc,IAAI,CAAC,CAACvB,MAAM,KAAK,CAAC,IAAIwd,QAAQ,KAAKD,GAAG,CAACxgB,KAAK,CAAC,CAAC,CAAC,EAAE;UACxE,MAAM,IAAI6E,KAAK,+CAAArD,MAAA,CAA+Cgf,GAAG,CAACxgB,KAAK,CAAC,CAAC,YAAAwB,MAAA,CAASif,QAAQ,CAAE,CAAC;QACjG;QAEA,IAAI,CAACH,OAAI,CAACpgB,gBAAgB,CAACF,KAAK,CAAC,CAAC,IAAId,MAAM,KAAKohB,OAAI,CAACpgB,gBAAgB,CAAChB,MAAM,EAAE;UAC3EohB,OAAI,CAACjgB,oBAAoB,CAACmgB,GAAG,CAAChc,IAAI,CAAC;UACnC;UACA8b,OAAI,CAAChgB,IAAI,CAACpD,WAAW,CAACkB,sBAAsB,EAAEkiB,OAAI,CAACphB,MAAM,EAAEohB,OAAI,CAAC/f,cAAc,CAACrB,MAAM,CAAC,CAAC;QAC3F;;QAEA;QACA,IAAIA,MAAM,KAAKohB,OAAI,CAACphB,MAAM,EAAE;UACxBtF,MAAM,CAAC6W,IAAI,CAAC,aAAa,GAAG+P,GAAG,CAACxgB,KAAK,CAAC,CAAC,GAAG,OAAO,GAAGd,MAAM,GAAG,8BAA8B,CAAC;UAC5F,IAAM4N,MAAM,SAASwT,OAAI,CAACpgB,gBAAgB,CAACygB,QAAQ,CAACH,GAAG,CAAC;UACxD,IAAI1T,MAAM,EAAE;YACR,IAAMoI,OAAM;cAAA,IAAA0L,MAAA,GAAAjhB,iBAAA,CAAG,WAAAkhB,MAAA,EAAiD;gBAAA,IAA1C;kBAAEzL,UAAU,GAAG;gBAAM,CAAC,GAAAyL,MAAA;gBACxCjnB,MAAM,CAAC6W,IAAI,CAAC,0BAA0B,GAAGvR,MAAM,GAAG,KAAK,CAAC;gBACxD,IAAMqW,QAAQ,SAAS+K,OAAI,CAACrhB,QAAQ,CAACoW,mBAAmB,CAAC;kBACrD,CAACnW,MAAM,GAAG;oBACN,CAACC,QAAQ,GAAG2N;kBAChB;gBACJ,CAAC,CAAC;gBACF,IAAM;kBAAE0I;gBAAS,CAAC,GAAGD,QAAQ,IAAI,CAAC,CAAC;gBACnC,IAAIxR,MAAM,CAACS,IAAI,CAACgR,QAAQ,IAAI,EAAE,CAAC,CAACvS,MAAM,GAAG,CAAC,EAAE;kBACxC,IAAImS,UAAU,EAAE;oBACZkL,OAAI,CAACrhB,QAAQ,CAACqB,IAAI,CACdpD,WAAW,CAACuY,yBAAyB,EACrCD,QAAQ,EACR,uBAAuB,EACvBN,OACJ,CAAC;kBACL;kBACA;AAC5B;kBAC4B,MAAM,IAAI1Z,uBAAuB,CAAC,mBAAmB,EAAE;oBAAEga;kBAAS,CAAC,CAAC;gBACxE;cACJ,CAAC;cAAA,gBArBKN,MAAMA,CAAA4L,GAAA;gBAAA,OAAAF,MAAA,CAAA7f,KAAA,OAAAC,SAAA;cAAA;YAAA,GAqBX;YACD,MAAMkU,OAAM,CAAC;cAAEE,UAAU,EAAE;YAAK,CAAC,CAAC;;YAElC;YACA;UACJ;UACA,OAAOtI,MAAM;QACjB,CAAC,MAAM;UACH,OAAO0T,GAAG;QACd;MACJ;MAEA,IAAMlY,OAAO,GAAGgY,OAAI,CAACzgB,UAAU,CAACiH,0BAA0B,CAAC5H,MAAM,CAAC;MAClE,IAAI,CAACoJ,OAAO,IAAI,CAACA,OAAO,CAACnJ,QAAQ,CAAC,EAAE;QAChC,MAAM,IAAI0F,KAAK,CAAC,iBAAiB,GAAG3F,MAAM,GAAG,GAAG,GAAGC,QAAQ,CAAC;MAChE;MAEA,IAAM4hB,GAAG,GAAGzY,OAAO,CAACnJ,QAAQ,CAAC;MAC7B,IAAI6hB,kBAAkB,GAAGD,GAAG,CAAC/Z,QAAQ;MAErC,IAAIA,QAAQ,EAAE;QACV,IAAIxC,IAAI,EAAE;UACN,KAAK,IAAM,CAACqK,KAAK,EAAEzF,GAAG,CAAC,IAAIrF,MAAM,CAACC,OAAO,CAACQ,IAAI,CAAC,EAAE;YAC7C,IAAIuc,GAAG,CAACvc,IAAI,CAACqK,KAAK,CAAC,KAAKzF,GAAG,EAAE;cACzB,MAAM,IAAIvE,KAAK,+CAAArD,MAAA,CAA+C4H,GAAG,YAAA5H,MAAA,CAASuf,GAAG,CAACvc,IAAI,CAACqK,KAAK,CAAC,CAAE,CAAC;YAChG;UACJ;QACJ;QACAmS,kBAAkB,GAAGnjB,kBAAkB,CAACoJ,QAAQ;MACpD,CAAC,MAAM,IAAID,QAAQ,KAAK,IAAI,IAAIga,kBAAkB,IAAInjB,kBAAkB,CAACoJ,QAAQ,EAAE;QAC/E+Z,kBAAkB,GAAGnjB,kBAAkB,CAACojB,UAAU;MACtD;MAEA,IAAIV,OAAO,EAAE;QACTS,kBAAkB,GAAGnjB,kBAAkB,CAACqjB,OAAO;MACnD,CAAC,MAAM,IAAIX,OAAO,KAAK,IAAI,IAAIS,kBAAkB,IAAInjB,kBAAkB,CAACqjB,OAAO,EAAE;QAC7EF,kBAAkB,GAAGnjB,kBAAkB,CAACojB,UAAU;MACtD;MAEA,IAAIE,WAAW,GAAGJ,GAAG,CAAC7Z,KAAK;MAC3B,IAAIA,KAAK,KAAK,IAAI,EAAE;QAChBia,WAAW,GAAGja,KAAK;MACvB;MAEA,IAAI6Z,GAAG,CAAC/Z,QAAQ,KAAKga,kBAAkB,IAAID,GAAG,CAAC7Z,KAAK,KAAKia,WAAW,EAAE;QAClEJ,GAAG,CAAC/Z,QAAQ,GAAGga,kBAAkB;QACjCD,GAAG,CAAC7Z,KAAK,GAAGia,WAAW;QACvBb,OAAI,CAACzgB,UAAU,CAACsH,mBAAmB,CAACjI,MAAM,EAAEoJ,OAAO,CAAC;QACpDgY,OAAI,CAACzgB,UAAU,CAACuH,WAAW,CAAC,CAAC;MACjC;;MAEA;MACA,IAAIJ,QAAQ,IAAI9H,MAAM,KAAKohB,OAAI,CAACphB,MAAM,EAAE;QACpCtF,MAAM,CAAC6W,IAAI,CAAC,aAAa,GAAGtR,QAAQ,GAAG,2BAA2B,CAAC;;QAEnE;QACA,IAAI2N,OAA8B;QAClC,IAAMvE,WAAW,GAAG+X,OAAI,CAAC9X,gBAAgB,CAACtJ,MAAM,EAAEC,QAAQ,CAAC;QAC3D,IAAIoJ,WAAW,CAAC5H,sBAAsB,CAAC,CAAC,EAAE;UACtC/G,MAAM,CAAC2H,GAAG,eAAAC,MAAA,CAAerC,QAAQ,oCAAiC,CAAC;QACvE,CAAC,MAAM;UACH2N,OAAM,SAAUwT,OAAI,CAACpgB,gBAAgB,CAAC8M,UAAU,CAAC9N,MAAM,EAAElF,UAAU,CAACgc,WAAW,CAAC+K,GAAG,EAAE5hB,QAAQ,CAAC,CAAG;QACrG;QAEA,IAAI2N,OAAM,EAAE;UACR,IAAMoI,QAAM;YAAA,IAAAkM,MAAA,GAAAzhB,iBAAA,CAAG,WAAA0hB,MAAA,EAAiD;cAAA,IAA1C;gBAAEjM,UAAU,GAAG;cAAM,CAAC,GAAAiM,MAAA;cACxCznB,MAAM,CAAC6W,IAAI,CAAC,0BAA0B,GAAGtR,QAAQ,CAAC;cAClD,IAAMoW,QAAQ,SAAS+K,OAAI,CAACrhB,QAAQ,CAACoW,mBAAmB,CAAC;gBACrD,CAACnW,MAAM,GAAG;kBACN,CAACC,QAAQ,GAAG2N;gBAChB;cACJ,CAAC,CAAC;cACF,IAAM;gBAAE0I;cAAS,CAAC,GAAGD,QAAQ,IAAI,CAAC,CAAC;cACnC,IAAIxR,MAAM,CAACS,IAAI,CAACgR,QAAQ,IAAI,EAAE,CAAC,CAACvS,MAAM,GAAG,CAAC,EAAE;gBACxC,IAAImS,UAAU,EAAE;kBACZkL,OAAI,CAACrhB,QAAQ,CAACqB,IAAI,CACdpD,WAAW,CAACuY,yBAAyB,EACrCD,QAAQ,EACR,uBAAuB,EACvBN,QAAM,CAAE;kBACZ,CAAC;gBACL;gBACA,MAAM,IAAI1Z,uBAAuB,CAAC,mBAAmB,EAAE;kBAAEga;gBAAS,CAAC,CAAC;cACxE;YACJ,CAAC;YAAA,gBAnBKN,MAAMA,CAAAoM,GAAA;cAAA,OAAAF,MAAA,CAAArgB,KAAA,OAAAC,SAAA;YAAA;UAAA,GAmBX;UACD,MAAMkU,QAAM,CAAC;YAAEE,UAAU,EAAE;UAAK,CAAC,CAAC;UAClC;QACJ;MACJ;MAEA,IAAM1M,SAAS,GAAG1O,UAAU,CAACgc,WAAW,CAAC+K,GAAG,EAAE5hB,QAAQ,CAAC;MACvDmhB,OAAI,CAAChgB,IAAI,CAACpD,WAAW,CAAC0L,yBAAyB,EAAE1J,MAAM,EAAEC,QAAQ,EAAEuJ,SAAS,CAAC;MAC7E,OAAOA,SAAS;IAAC;EACrB;EAEO6Y,mCAAmCA,CAACC,MAAc,EAAEtiB,MAAe,EAAmC;IACzG,OAAO,IAAI,CAACsE,0BAA0B,CAACie,qBAAqB,CAACD,MAAM,EAAEtiB,MAAM,CAAC;EAChF;EAEOwiB,yCAAyCA,CAACxiB,MAAc,EAAyB;IACpF,OAAO,IAAI,CAACsG,4BAA4B,CAACmc,qBAAqB,CAACziB,MAAM,CAAC;EAC1E;EAEO0iB,qBAAqBA,CAAC1iB,MAAc,EAAEsiB,MAAc,EAAgC;IACvF,IAAMK,eAAe,GAAG,IAAI,CAACre,0BAA0B,CAACie,qBAAqB,CAACD,MAAM,CAAC;IACrF,IAAIK,eAAe,EAAE;MACjB,OAAOvO,OAAO,CAACC,OAAO,CAACsO,eAAe,CAAC;IAC3C;IACA,IAAMxe,OAAO,GAAG,IAAIlI,aAAa,CAAC,IAAI,CAAC8D,QAAQ,EAAEuiB,MAAM,EAAEtiB,MAAM,CAAC;IAChE,OAAO,IAAI,CAAC4iB,8BAA8B,CAAC5iB,MAAM,EAAEmE,OAAO,EAAE,IAAI,CAACG,0BAA0B,CAAC;EAChG;;EAEA;EACOue,mBAAmBA,CAAC7iB,MAAc,EAAEoJ,OAAkB,EAAgC;IACzF,IAAI,CAACA,OAAO,EAAE;MACVA,OAAO,GAAGvE,MAAM,CAACS,IAAI,CAAC,IAAI,CAAC3E,UAAU,CAACiH,0BAA0B,CAAC5H,MAAM,CAAC,CAAC;IAC7E;IACA,IAAM2iB,eAAe,GAAG,IAAI,CAACrc,4BAA4B,CAACic,qBAAqB,CAACviB,MAAM,EAAEoJ,OAAO,CAAC;IAChG,IAAIuZ,eAAe,EAAE;MACjB,OAAOvO,OAAO,CAACC,OAAO,CAACsO,eAAe,CAAC;IAC3C;IACA,IAAMxe,OAAO,GAAG,IAAIhI,eAAe,CAAC,IAAI,CAAC4D,QAAQ,EAAEC,MAAM,EAAEoJ,OAAO,EAAEjN,eAAe,CAAC2mB,iBAAiB,CAAC,CAAC,CAAC;IACxG,OAAO,IAAI,CAACF,8BAA8B,CAAC5iB,MAAM,EAAEmE,OAAO,EAAE,IAAI,CAACmC,4BAA4B,CAAC;EAClG;EAEOyc,0BAA0BA,CAAA,EAAiC;IAC9D,OAAO,IAAI,CAACF,mBAAmB,CAAC,IAAI,CAAC7iB,MAAM,CAAC;EAChD;EAEOgjB,yBAAyBA,CAAChjB,MAAc,EAAEC,QAAgB,EAAgC;IAC7F,OAAO,IAAI,CAAC4iB,mBAAmB,CAAC7iB,MAAM,EAAE,CAACC,QAAQ,CAAC,CAAC;EACvD;EAEc2iB,8BAA8BA,CACxC5iB,MAAc,EACdmE,OAA6B,EAC7B8e,WAAyB,EACG;IAAA,IAAAC,OAAA;IAAA,OAAAziB,iBAAA;MAC5B,IAAI8S,OAAO,GAAG,IAAIvX,mBAAmB,CAACmI,OAAO,EAAE+e,OAAI,CAACpkB,mBAAmB,EAAEokB,OAAI,CAACnjB,QAAQ,CAAC;MACvF;MACA,IAAIoE,OAAO,CAACgf,aAAa,EAAE;QACvBF,WAAW,CAACG,mBAAmB,CAACjf,OAAO,EAAEoP,OAAO,CAAC;MACrD;MACA,MAAMA,OAAO,CAAC8P,WAAW,CAAC,CAAC;MAC3B;MACA,IAAMC,aAAa,GAAGL,WAAW,CAACM,mBAAmB,CAACpf,OAAO,CAAC;MAC9D,IAAImf,aAAa,EAAE;QACf/P,OAAO,GAAG+P,aAAa;MAC3B,CAAC,MAAM;QACH5oB,MAAM,CAAC2H,GAAG,CACN,8DAAAC,MAAA,CAA8D6B,OAAO,CAACgf,aAAa,OAAA7gB,MAAA,CAAI6B,OAAO,CAACme,MAAM,CACzG,CAAC;QACDW,WAAW,CAACG,mBAAmB,CAACjf,OAAO,EAAEoP,OAAO,CAAC;MACrD;MACA,OAAOA,OAAO;IAAC;EACnB;EAEOiQ,oBAAoBA,CACvB9e,MAAc,EACd1E,MAAc,EACdC,QAAgB,EAEU;IAAA,IAD1BkjB,aAA4B,GAAArhB,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,IAAI;IAEnC,IAAIyR,OAA4B;IAChC,IAAI4P,aAAa,EAAE;MACf5P,OAAO,GAAG,IAAI,CAACjN,4BAA4B,CAACmd,0BAA0B,CAACzjB,MAAM,EAAEmjB,aAAa,CAAC;MAC7F,IAAI,CAAC5P,OAAO,EAAE;QACV,MAAM,IAAI5N,KAAK,CAAC,6BAAArD,MAAA,CAA6BtC,MAAM,+BAAAsC,MAAA,CAA4B6gB,aAAa,CAAE,CAAC;MACnG;IACJ,CAAC,MAAM;MACHA,aAAa,GAAGhnB,eAAe,CAAC2mB,iBAAiB,CAAC,CAAC;MACnD,IAAM3e,QAAO,GAAG,IAAIhI,eAAe,CAAC,IAAI,CAAC4D,QAAQ,EAAEC,MAAM,EAAE,CAACC,QAAQ,CAAC,EAAEkjB,aAAa,EAAEljB,QAAQ,CAAC;MAC/FsT,OAAO,GAAG,IAAIvX,mBAAmB,CAACmI,QAAO,EAAE,IAAI,CAACrF,mBAAmB,EAAE,IAAI,CAACiB,QAAQ,CAAC;MACnF,IAAI,CAACuG,4BAA4B,CAACod,0BAA0B,CAAC1jB,MAAM,EAAEmjB,aAAa,EAAE5P,OAAO,CAAC;IAChG;IACA,OAAOA,OAAO,CAACiQ,oBAAoB,CAAC9e,MAAM,EAAE;MAAE1E,MAAM;MAAEC;IAAS,CAAC,CAAC;EACrE;EAEa0jB,wBAAwBA,CACjC3jB,MAAc,EACdC,QAAgB,EAChByE,MAA0B,EACE;IAAA,IAAAkf,OAAA;IAAA,OAAAnjB,iBAAA;MAC5B,IAAM0iB,aAAa,GAAGhnB,eAAe,CAAC2mB,iBAAiB,CAAC,CAAC;MACzD,IAAM3e,OAAO,GAAG,IAAIhI,eAAe,CAACynB,OAAI,CAAC7jB,QAAQ,EAAEC,MAAM,EAAE,CAACC,QAAQ,CAAC,EAAEkjB,aAAa,EAAEljB,QAAQ,CAAC;MAC/F,IAAMsT,OAAO,GAAG,IAAIvX,mBAAmB,CAACmI,OAAO,EAAEyf,OAAI,CAAC9kB,mBAAmB,EAAE8kB,OAAI,CAAC7jB,QAAQ,CAAC;MACzF6jB,OAAI,CAACtd,4BAA4B,CAACod,0BAA0B,CAAC1jB,MAAM,EAAEmjB,aAAa,EAAE5P,OAAO,CAAC;MAC5F,IAAMsQ,QAAQ,GAAGtQ,OAAO,CAACiQ,oBAAoB,CAAC9e,MAAM,EAAE;QAAE1E,MAAM;QAAEC;MAAS,CAAC,CAAC;MAC3E;MACA;MACA;MACA,MAAMmU,OAAO,CAAC0P,IAAI,CAAC,CAACD,QAAQ,CAACE,MAAM,CAAC,CAAC,EAAExQ,OAAO,CAACyQ,OAAO,CAAEC,CAAC,IAAKA,CAAC,CAACC,OAAO,CAAC,CAAC,CAAC;MAC1E,OAAO3Q,OAAO;IAAC;EACnB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiB4Q,qBAAqBA,CAACnkB,MAAc,EAA4C;IAAA,IAAAokB,OAAA;IAAA,OAAA3jB,iBAAA;MACzF,IAAM2I,OAAO,GAAGgb,OAAI,CAACtE,uBAAuB,CAAC9f,MAAM,CAAC,IAAI,EAAE;MAC1D,IAAMqkB,MAA+C,GAAG,CAAC,CAAC;MAC1D,KAAK,IAAMzW,MAAM,IAAIxE,OAAO,EAAE;QAC1B,IAAMkb,SAAS,GAAG1W,MAAM,CAAC2W,cAAc,CAAC,CAAC;QACzC,IAAMC,QAAQ,SAASJ,OAAI,CAACxe,SAAS,CAAC6e,uBAAuB,CAACH,SAAS,CAAC;QAExED,MAAM,CAACzW,MAAM,CAAC3N,QAAQ,CAAC,GAAG;UACtBykB,WAAW,EAAEJ,SAAS;UACtBE,QAAQ,EAAEA;QACd,CAAC;MACL;MACA,OAAOH,MAAM;IAAC;EAClB;;EAEA;AACJ;AACA;AACA;AACA;EACWM,wBAAwBA,CAAC5iB,KAAkB,EAAqB;IACnE,IAAM6iB,SAAS,GAAG7iB,KAAK,CAAC8iB,YAAY,CAAC,CAAC;IACtC,IAAMta,SAAS,GAAGxI,KAAK,CAAC+iB,cAAc,CAAC,CAAC,CAACva,SAAS;IAElD,IAAI,CAACqa,SAAS,IAAI,CAACra,SAAS,EAAE;MAC1B,OAAO,IAAI;IACf;IAEA,IAAIxI,KAAK,CAACgjB,oBAAoB,CAAC,CAAC,EAAE;MAC9B;MACA,OAAO,IAAI;IACf;;IAEA;IACA;IACA;;IAEA,IAAMnX,MAAM,GAAG,IAAI,CAACjN,UAAU,CAACqkB,sBAAsB,CAACza,SAAS,EAAEqa,SAAS,CAAC;IAE3E,IAAIhX,MAAM,KAAK,IAAI,EAAE;MACjB;MACA,OAAO,IAAI;IACf;;IAEA;IACA;IACA;IACA;IACA;IACA;IACA;;IAEA,IAAMqX,UAAU,GAAGljB,KAAK,CAACmjB,oBAAoB,CAAC,CAAC;IAC/C,IAAI,CAACD,UAAU,EAAE;MACbvqB,MAAM,CAACkK,IAAI,CAAC,QAAQ,GAAG7C,KAAK,CAACjB,KAAK,CAAC,CAAC,GAAG,0BAA0B,GAAG,8BAA8B,CAAC;MACnG,OAAO,IAAI;IACf;IAEA,IAAImkB,UAAU,KAAKrX,MAAM,CAACuX,cAAc,CAAC,CAAC,EAAE;MACxCzqB,MAAM,CAACkK,IAAI,CACP,QAAQ,GACJ7C,KAAK,CAACjB,KAAK,CAAC,CAAC,GACb,sBAAsB,GACtBmkB,UAAU,GACV,6BAA6B,GAC7BrX,MAAM,CAACuX,cAAc,CAAC,CAC9B,CAAC;MACD,OAAO,IAAI;IACf;IAEA,OAAOvX,MAAM;EACjB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWwX,sBAAsBA,CAACrjB,KAAkB,EAAuB;IAAA,IAAAsjB,mBAAA,EAAAC,qBAAA;IACnE,IAAMpM,GAAiC,GAAG,CAAC,CAAC;IAE5CA,GAAG,CAAC0L,SAAS,IAAAS,mBAAA,GAAGtjB,KAAK,CAAC8iB,YAAY,CAAC,CAAC,cAAAQ,mBAAA,cAAAA,mBAAA,GAAIrhB,SAAS;IACjDkV,GAAG,CAAC3O,SAAS,GAAGxI,KAAK,CAAC+iB,cAAc,CAAC,CAAC,CAACva,SAAS;IAEhD,IAAI,CAAC2O,GAAG,CAAC0L,SAAS,IAAI,CAAC1L,GAAG,CAAC3O,SAAS,EAAE;MAClC2O,GAAG,CAACqM,SAAS,GAAG,KAAK;MACrB,OAAOrM,GAAG;IACd;IACAA,GAAG,CAACqM,SAAS,GAAG,IAAI;IAEpB,IAAIxjB,KAAK,CAACgjB,oBAAoB,CAAC,CAAC,EAAE;MAC9B;MACA;MACA7L,GAAG,CAACsM,aAAa,GAAG,KAAK;IAC7B,CAAC,MAAM;MACHtM,GAAG,CAACsM,aAAa,GAAG,IAAI;IAC5B;;IAEA;IACA;IACA;;IAEAtM,GAAG,CAACuM,MAAM,IAAAH,qBAAA,GAAG,IAAI,CAAC3kB,UAAU,CAACqkB,sBAAsB,CAAC9L,GAAG,CAAC3O,SAAS,EAAE2O,GAAG,CAAC0L,SAAS,CAAC,cAAAU,qBAAA,cAAAA,qBAAA,GAAIthB,SAAS;;IAE9F;IACA;IACA;IACA;IACA;IACA;IACA;;IAEA,IAAMihB,UAAU,GAAGljB,KAAK,CAACmjB,oBAAoB,CAAC,CAAC;IAC/C,IAAI,CAACD,UAAU,EAAE;MACbvqB,MAAM,CAACkK,IAAI,CAAC,QAAQ,GAAG7C,KAAK,CAACjB,KAAK,CAAC,CAAC,GAAG,0BAA0B,GAAG,8BAA8B,CAAC;MACnGoY,GAAG,CAACwM,gBAAgB,GAAG,IAAI;IAC/B;IAEA,IAAIxM,GAAG,CAACuM,MAAM,IAAIR,UAAU,KAAK/L,GAAG,CAACuM,MAAM,CAACN,cAAc,CAAC,CAAC,EAAE;MAC1DzqB,MAAM,CAACkK,IAAI,CACP,QAAQ,GACJ7C,KAAK,CAACjB,KAAK,CAAC,CAAC,GACb,sBAAsB,GACtBmkB,UAAU,GACV,4BAA4B,GAC5B/L,GAAG,CAACuM,MAAM,CAACN,cAAc,CAAC,CAClC,CAAC;MACDjM,GAAG,CAACwM,gBAAgB,GAAG,IAAI;IAC/B;IAEA,OAAOxM,GAAG;EACd;;EAEA;AACJ;AACA;EACiByM,yBAAyBA,CAAC5jB,KAAkB,EAAuC;IAAA,IAAA6jB,OAAA;IAAA,OAAAnlB,iBAAA;MAC5F,IAAMolB,cAAc,GAAGD,OAAI,CAACR,sBAAsB,CAACrjB,KAAK,CAAC;MACzD,IAAI,CAAC8jB,cAAc,CAACN,SAAS,EAAE;QAC3B,OAAO,IAAI;MACf;MAEA,IAAMO,QAAQ,GAAG/jB,KAAK,CAACS,SAAS,CAAC,CAAC;MAClC,IAAI,CAACsjB,QAAQ,IAAID,cAAc,CAACH,gBAAgB,EAAE;QAC9C;;QAEA;QACA,OAAO;UACHK,YAAY,EAAEjoB,iBAAiB,CAACkoB,GAAG;UACnCC,YAAY,EAAEloB,iBAAiB,CAACmoB;QACpC,CAAC;MACL;MAEA,IAAMC,SAAS,GAAGP,OAAI,CAACvkB,cAAc,CAACykB,QAAQ,CAAC;MAC/C,IAAI,CAACK,SAAS,CAAC1kB,sBAAsB,CAAC,CAAC,EAAE;QACrC;QACA;QACA;QACA,IAAI,CAACokB,cAAc,CAACL,aAAa,EAAE;UAC/B;UACA,OAAO;YACHO,YAAY,EAAEjoB,iBAAiB,CAACsoB,IAAI;YACpCH,YAAY,EAAEloB,iBAAiB,CAACsoB;UACpC,CAAC;QACL,CAAC,MAAM;UACH;UACA,OAAO;YAAEN,YAAY,EAAEjoB,iBAAiB,CAACwoB,IAAI;YAAEL,YAAY,EAAE;UAAK,CAAC;QACvE;MACJ;MAEA,IAAMM,gBAAgB,GAClBT,QAAQ,IACRD,cAAc,CAACJ,MAAM,WACdG,OAAI,CAACtN,2BAA2B,CAACwN,QAAQ,EAAED,cAAc,CAACJ,MAAM,CAACxlB,QAAQ,CAAC,CAAC;MAEtF,IAAI,CAACsmB,gBAAgB,EAAE;QACnB;QACA,OAAO;UACHR,YAAY,EAAEjoB,iBAAiB,CAACsoB,IAAI;UACpCH,YAAY,EAAEloB,iBAAiB,CAACyoB;QACpC,CAAC;MACL;MAEA,IAAI,CAACD,gBAAgB,CAACnP,UAAU,CAAC,CAAC,EAAE;QAChC;QACA,OAAO;UACH2O,YAAY,EAAEjoB,iBAAiB,CAACkoB,GAAG;UACnCC,YAAY,EAAEloB,iBAAiB,CAAC0oB;QACpC,CAAC;MACL;MAEA,IAAI,CAACZ,cAAc,CAACL,aAAa,EAAE;QAC/B;QACA,OAAO;UACHO,YAAY,EAAEjoB,iBAAiB,CAACsoB,IAAI;UACpCH,YAAY,EAAEloB,iBAAiB,CAACsoB;QACpC,CAAC;MACL;;MAEA;MACA,OAAO;QAAEN,YAAY,EAAEjoB,iBAAiB,CAACwoB,IAAI;QAAEL,YAAY,EAAE;MAAK,CAAC;IAAC;EACxE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWS,mBAAmBA,CAACpE,MAAc,EAAiB;IACtD,IAAMqE,GAAG,GAAG,IAAI,CAACC,cAAc,CAACzhB,GAAG,CAACmd,MAAM,CAAC;IAC3C,IAAIqE,GAAG,KAAK3iB,SAAS,EAAE,MAAM,IAAI2B,KAAK,CAAC,oBAAoB,CAAC;IAC5D,IAAIghB,GAAG,CAACD,mBAAmB,KAAK1iB,SAAS,EAAE;MACvC,MAAM,IAAI2B,KAAK,CAAC,8DAA8D,CAAC;IACnF;IACAghB,GAAG,CAACD,mBAAmB,CAAC,CAAC;IACzB,OAAOtS,OAAO,CAACC,OAAO,CAAC,CAAC;EAC5B;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBwS,iBAAiBA,CAC1BvE,MAAc,EACdwE,MAAuB,EACvBC,kBAA4B,EACf;IAAA,IAAAC,OAAA;IAAA,OAAAvmB,iBAAA;MACb,IAAMkD,IAAI,GAAGqjB,OAAI,CAAC9mB,WAAW,CAAC+mB,OAAO,CAAC3E,MAAM,CAAC;MAC7C,IAAI,CAAC3e,IAAI,EAAE;QACP,MAAM,IAAIgC,KAAK,iEAAArD,MAAA,CAAiEggB,MAAM,CAAE,CAAC;MAC7F;MACA,MAAM0E,OAAI,CAACE,qBAAqB,CAACvjB,IAAI,EAAEmjB,MAAM,CAAC;MAC9C,IAAI,CAACE,OAAI,CAAC7L,eAAe,IAAI,CAAC4L,kBAAkB,EAAE;QAC9CC,OAAI,CAACrmB,UAAU,CAACwmB,0BAA0B,CAAC,CAAC;MAChD;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACkBD,qBAAqBA,CAACvjB,IAAU,EAAEmjB,MAAuB,EAAiB;IAAA,IAAAM,OAAA;IAAA,OAAA3mB,iBAAA;MACpF,IAAM6hB,MAAM,GAAG3e,IAAI,CAAC2e,MAAM;;MAE1B;MACA;MACA;MACA;MACA,IAAI,CAACwE,MAAM,CAACvc,SAAS,EAAE;QACnB7P,MAAM,CAAC2H,GAAG,CAAC,8CAA8C,CAAC;QAC1D;MACJ;;MAEA;MACA;MACA;MACA;MACA;MACA,IAAMglB,cAAc,GAAGD,OAAI,CAAC5iB,QAAQ,CAAC8iB,iBAAiB,CAAChF,MAAM,CAAC;MAC9D,IAAI+E,cAAc,EAAE;QAChB,IAAIE,IAAI,CAACC,SAAS,CAACH,cAAc,CAAC,IAAIE,IAAI,CAACC,SAAS,CAACV,MAAM,CAAC,EAAE;UAC1DpsB,MAAM,CAAC0H,KAAK,CAAC,kDAAkD,GAAG,wBAAwB,GAAGkgB,MAAM,CAAC;UACpG;QACJ;MACJ;MACA;MACA;MACA;MACA;MACA;MACA;MACA;MACA,IAAMmF,WAAW,GAAGL,OAAI,CAACR,cAAc,CAACzhB,GAAG,CAACmd,MAAM,CAAC;MACnD,IAAImF,WAAW,EAAE;QACb;MACJ;;MAEA;MACA;MACA;MACA;MACA,IAAIC,kBAAwC,GAAG,IAAI;MACnD,IAAI,CAACL,cAAc,EAAE;QACjBK,kBAAkB,GAAGN,OAAI,CAAC5iB,QAAQ,CAACqiB,iBAAiB,CAACvE,MAAM,EAAEwE,MAAM,CAAC;MACxE;MAEA,IAAMa,QAAQ,GAAG5sB,UAAU,CAAC6sB,kBAAkB,CAACziB,GAAG,CAAC2hB,MAAM,CAACvc,SAAS,CAAC;MACpE,IAAI,CAACod,QAAQ,EAAE;QACX,MAAM,IAAIhiB,KAAK,CAAC,yBAAyB,GAAGmhB,MAAM,CAACvc,SAAS,CAAC;MACjE;MAEA,IAAMoc,GAAG,GAAG,IAAIgB,QAAQ,CAAC;QACrB3nB,MAAM,EAAEonB,OAAI,CAACpnB,MAAM;QACnBC,QAAQ,EAAEmnB,OAAI,CAACnnB,QAAQ;QACvB4nB,MAAM,EAAET,OAAI;QACZxhB,SAAS,EAAEwhB,OAAI,CAACxhB,SAAS;QACzB7F,QAAQ,EAAEqnB,OAAI,CAACrnB,QAAQ;QACvBuiB,MAAM;QACNwE;MACJ,CAAC,CAAC;MACFM,OAAI,CAACR,cAAc,CAACjiB,GAAG,CAAC2d,MAAM,EAAEqE,GAAG,CAAC;MAEpC,IAAIe,kBAAkB,EAAE;QACpB,MAAMA,kBAAkB;MAC5B;MAEAhtB,MAAM,CAAC2H,GAAG,2BAAAC,MAAA,CAA2BggB,MAAM,CAAE,CAAC;;MAE9C;MACA;MACA,IAAI3e,IAAI,CAACmkB,aAAa,CAAC,CAAC,EAAE;QACtB,MAAMV,OAAI,CAACW,oBAAoB,CAACpkB,IAAI,CAAC;MACzC,CAAC,MAAM;QACH;QACA,IAAMqkB,OAAO,GAAIC,MAAiB,IAAW;UACzCtkB,IAAI,CAACukB,GAAG,CAAC7qB,cAAc,CAAC8qB,MAAM,EAAEH,OAAO,CAAC;UACxC,IAAIrkB,IAAI,CAACmkB,aAAa,CAAC,CAAC,EAAE;YACtBV,OAAI,CAACW,oBAAoB,CAACpkB,IAAI,CAAC,CAAC6S,KAAK,CAAErU,CAAC,IAAK;cACzCzH,MAAM,CAAC0H,KAAK,sCAAAE,MAAA,CAAsCggB,MAAM,GAAIngB,CAAC,CAAC;YAClE,CAAC,CAAC;UACN;QACJ,CAAC;QACDwB,IAAI,CAACkC,EAAE,CAACxI,cAAc,CAAC8qB,MAAM,EAAEH,OAAO,CAAC;MAC3C;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWI,gBAAgBA,CAAC9F,MAAc,EAAiB;IACnD,IAAM3e,IAAI,GAAG,IAAI,CAACzD,WAAW,CAAC+mB,OAAO,CAAC3E,MAAM,CAAC;IAC7C,IAAI,CAAC3e,IAAI,EAAE;MACP,MAAM,IAAIgC,KAAK,qDAAArD,MAAA,CAAqDggB,MAAM,CAAE,CAAC;IACjF;IACA,OAAO,IAAI,CAACyF,oBAAoB,CAACpkB,IAAI,CAAC;EAC1C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACYokB,oBAAoBA,CAACpkB,IAAU,EAAiB;IAAA,IAAA0kB,OAAA;IACpD,IAAM/F,MAAM,GAAG3e,IAAI,CAAC2e,MAAM;IAC1B,IAAMgG,YAAY;MAAA,IAAAC,MAAA,GAAA9nB,iBAAA,CAAG,aAA2B;QAC5C;QACA,IAAI,CAAC4nB,OAAI,CAACzB,cAAc,CAAC3N,GAAG,CAACqJ,MAAM,CAAC,EAAE;UAClC;QACJ;QACA5nB,MAAM,CAAC2H,GAAG,uCAAAC,MAAA,CAAuCggB,MAAM,SAAM,CAAC;QAC9D,IAAMkG,OAAO,SAAS7kB,IAAI,CAAC8kB,0BAA0B,CAAC,CAAC;QACvDD,OAAO,CAAC9H,OAAO,CAAEgI,CAAC,IAAK;UACnBL,OAAI,CAAC1nB,UAAU,CAAC6H,uBAAuB,CAACkgB,CAAC,CAAC1oB,MAAM,CAAC;QACrD,CAAC,CAAC;MACN,CAAC;MAAA,gBAVKsoB,YAAYA,CAAA;QAAA,OAAAC,MAAA,CAAA1mB,KAAA,OAAAC,SAAA;MAAA;IAAA,GAUjB;IAED,IAAI6mB,OAAO,GAAG,IAAI,CAACC,uBAAuB,CAACtG,MAAM,CAAC;IAClD,IAAI,CAACqG,OAAO,EAAE;MACVA,OAAO,GAAGL,YAAY,CAAC,CAAC;MACxB,IAAI,CAACM,uBAAuB,CAACtG,MAAM,CAAC,GAAGqG,OAAO,CAACnS,KAAK,CAAEqS,GAAG,IAAK;QAC1D,OAAO,IAAI,CAACD,uBAAuB,CAACtG,MAAM,CAAC;QAC3C,MAAMuG,GAAG;MACb,CAAC,CAAC;IACN;IACA,OAAOF,OAAO;EAClB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWG,yBAAyBA,CAC5BnS,KAAe,EACfoS,KAAe,EAC4C;IAC3D;IACA,IAAMC,aAAwC,GAAG,IAAIzoB,GAAG,CAAC,CAAC;IAE1D,KAAK,IAAMP,QAAM,IAAI2W,KAAK,EAAE;MACxB,IAAMsS,WAAyB,GAAG,EAAE;MACpCD,aAAa,CAACrkB,GAAG,CAAC3E,QAAM,EAAEipB,WAAW,CAAC;MAEtC,IAAM7f,OAAO,GAAG,IAAI,CAAC0W,uBAAuB,CAAC9f,QAAM,CAAC,IAAI,EAAE;MAC1D,KAAK,IAAM6H,UAAU,IAAIuB,OAAO,EAAE;QAC9B,IAAMc,GAAG,GAAGrC,UAAU,CAAC0c,cAAc,CAAC,CAAC;QACvC,IAAIra,GAAG,IAAI,IAAI,CAACtE,SAAS,CAAC8B,mBAAmB,EAAE;UAC3C;UACA;QACJ;QACA,IAAIG,UAAU,CAACC,QAAQ,IAAInJ,kBAAkB,CAACqjB,OAAO,EAAE;UACnD;UACA;QACJ;QAEAiH,WAAW,CAACpR,IAAI,CAAChQ,UAAU,CAAC;MAChC;IACJ;IAEA,OAAOjN,MAAM,CAACsuB,2BAA2B,CAAC,IAAI,CAACtjB,SAAS,EAAE,IAAI,CAAC7F,QAAQ,EAAEipB,aAAa,EAAED,KAAK,CAAC;EAClG;;EAEA;AACJ;AACA;AACA;AACA;EACiBI,cAAcA,CAAA,EAAkC;IAAA,IAAAC,OAAA;IAAA,OAAA3oB,iBAAA;MACzD,IAAM4oB,gBAAsC,GAAG,EAAE;MACjD,MAAMD,OAAI,CAACjpB,WAAW,CAACgI,KAAK,CAAC,UAAU,EAAE,CAAC1M,oBAAoB,CAAC6tB,4BAA4B,CAAC,EAAGjhB,GAAG,IAAK;QACnG+gB,OAAI,CAACjpB,WAAW,CAACopB,kCAAkC,CAAClhB,GAAG,EAAGmhB,CAAC,IAAK;UAC5D,IAAIA,CAAC,KAAK,IAAI,EAAE;UAEhB,IAAMC,IAAI,GAAGL,OAAI,CAACxjB,SAAS,CAAC8jB,yBAAyB,CAACF,CAAC,CAAC5E,SAAS,EAAE4E,CAAC,CAACG,SAAS,EAAEH,CAAC,CAACI,WAAY,CAAC;UAC/F,OAAOH,IAAI,CAACI,iBAAiB;UAC7BJ,IAAI,CAAClf,SAAS,GAAG3P,MAAM,CAACkvB,gBAAgB;UACxCT,gBAAgB,CAACxR,IAAI,CAAC4R,IAAI,CAAC;QAC/B,CAAC,CAAC;MACN,CAAC,CAAC;MAEF,OAAOJ,gBAAgB;IAAC;EAC5B;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACiBU,oBAAoBA,CAAA,EAAoB;IAAA,IAAAC,OAAA;IAAA,OAAAvpB,iBAAA;MACjD,OAAO8mB,IAAI,CAACC,SAAS,OAAOwC,OAAI,CAACb,cAAc,CAAC,CAAC,CAAC;IAAC;EACvD;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACWxO,cAAcA,CAACrV,IAA0B,EAAgD;IAAA,IAA9CoK,IAAwB,GAAA5N,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,CAAC,CAAC;IAC3E,IAAImoB,SAAS,GAAG,CAAC;IACjB,IAAI3T,QAAQ,GAAG,CAAC;IAChB,IAAM4T,KAAK,GAAG5kB,IAAI,CAACvB,MAAM;IAEzB,SAASomB,cAAcA,CAAA,EAAS;MAAA,IAAAC,qBAAA;MAC5B,CAAAA,qBAAA,GAAA1a,IAAI,CAAC2a,gBAAgB,cAAAD,qBAAA,eAArBA,qBAAA,CAAA3d,IAAA,CAAAiD,IAAI,EAAoB;QACpB4a,KAAK,EAAE,WAAW;QAClBL,SAAS;QACT3T,QAAQ;QACR4T;MACJ,CAAC,CAAC;IACN;IAEA,OAAO9V,OAAO,CAACkL,GAAG,CACdha,IAAI,CAACiS,GAAG,CAAErN,GAAG,IAAK;MACd,IAAI,CAACA,GAAG,CAACqgB,OAAO,IAAI,CAACrgB,GAAG,CAACK,SAAS,EAAE;QAChC7P,MAAM,CAACkK,IAAI,CAAC,6CAA6C,EAAEsF,GAAG,CAAC;QAC/DoM,QAAQ,EAAE;QACV,IAAI5G,IAAI,CAAC2a,gBAAgB,EAAE;UACvBF,cAAc,CAAC,CAAC;QACpB;QACA,OAAO,IAAI;MACf;MAEA,IAAMxD,GAAG,GAAG,IAAI,CAAC6D,gBAAgB,CAACtgB,GAAG,CAACqgB,OAAO,EAAErgB,GAAG,CAACK,SAAS,CAAC;MAC7D,OAAOoc,GAAG,CAAC8D,aAAa,CAACvgB,GAAG,EAAEwF,IAAI,CAAC,CAACmP,OAAO,CAAC,MAAM;QAC9CoL,SAAS,EAAE;QACX,IAAIva,IAAI,CAAC2a,gBAAgB,EAAE;UACvBF,cAAc,CAAC,CAAC;QACpB;MACJ,CAAC,CAAC;IACN,CAAC,CACL,CAAC,CAAC/T,IAAI,CAAC,CAAC;EACZ;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBsU,oBAAoBA,CAACplB,IAAY,EAAEoK,IAAyB,EAAiB;IAAA,IAAAib,OAAA;IAAA,OAAAlqB,iBAAA;MACtF,aAAakqB,OAAI,CAAChQ,cAAc,CAAC4M,IAAI,CAACqD,KAAK,CAACtlB,IAAI,CAAC,CAAC;IAAC;EACvD;;EAEA;AACJ;AACA;AACA;EACWulB,0BAA0BA,CAAA,EAAoB;IACjD,OAAO,IAAI,CAAC9lB,aAAa,CAAC8lB,0BAA0B,CAAC,CAAC;EAC1D;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACWC,gBAAgBA,CAACnnB,IAAU,EAAQ;IACtC,IAAMgjB,GAAG,GAAG,IAAI,CAACC,cAAc,CAACzhB,GAAG,CAACxB,IAAI,CAAC2e,MAAM,CAAC;IAChD,IAAIqE,GAAG,EAAE;MACLA,GAAG,CAACmE,gBAAgB,CAACnnB,IAAI,CAAC;IAC9B;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBonB,YAAYA,CAAChpB,KAAkB,EAAE4B,IAAU,EAAiB;IAAA,IAAAqnB,OAAA;IAAA,OAAAvqB,iBAAA;MACrE,IAAM6hB,MAAM,GAAGvgB,KAAK,CAACqC,SAAS,CAAC,CAAE;MAEjC,IAAMuiB,GAAG,GAAGqE,OAAI,CAACpE,cAAc,CAACzhB,GAAG,CAACmd,MAAM,CAAC;MAC3C,IAAI,CAACqE,GAAG,EAAE;QACN;QACA;QACA,MAAM,IAAIhhB,KAAK,CACX,OAAO,GACH2c,MAAM,GACN,uDAAuD,GACvD,kDAAkD,GAClD,sBACR,CAAC;MACL;;MAEA;MACA,MAAM0I,OAAI,CAACjD,oBAAoB,CAACpkB,IAAI,CAAC;MAErC,IAAIsnB,OAAO,GAAGlpB,KAAK,CAACU,UAAU,CAAC,CAAC;MAChC;MACA;MACA,IAAMyoB,UAAU,GAAGD,OAAO,CAAC,cAAc,CAAC;MAC1C,IAAIC,UAAU,EAAE;QACZ;QACAD,OAAO,GAAGpmB,MAAM,CAACiV,MAAM,CAAC,CAAC,CAAC,EAAEmR,OAAO,CAAC;QACpC,OAAOA,OAAO,CAAC,cAAc,CAAC;MAClC;;MAEA;MACA,IAAME,kBAAkB,GAAGF,OAAO,CAAC,gCAAgC,CAAC;MACpE,IAAIE,kBAAkB,EAAE;QACpBF,OAAO,GAAGpmB,MAAM,CAACiV,MAAM,CAAC,CAAC,CAAC,EAAEmR,OAAO,CAAC;QACpC,OAAOA,OAAO,CAAC,gCAAgC,CAAC;MACpD;MAEA,IAAMG,gBAAgB,SAAUzE,GAAG,CAAC0E,cAAc,CAAC1nB,IAAI,EAAE5B,KAAK,CAACQ,OAAO,CAAC,CAAC,EAAE0oB,OAAO,CAAc;MAE/F,IAAIC,UAAU,EAAE;QACZE,gBAAgB,CAAC,cAAc,CAAC,GAAGF,UAAU;MACjD;MACA,IAAIC,kBAAkB,EAAE;QACpBC,gBAAgB,CAAC,gCAAgC,CAAC,GAAGD,kBAAkB;MAC3E;MAEAppB,KAAK,CAACupB,aAAa,CACf,kBAAkB,EAClBF,gBAAgB,EAChBJ,OAAI,CAACplB,SAAS,CAAC8B,mBAAmB,EAClCsjB,OAAI,CAACplB,SAAS,CAAC6B,gBACnB,CAAC;IAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACiB8jB,YAAYA,CAACxpB,KAAkB,EAAmC;IAAA,IAAAypB,OAAA;IAAA,OAAA/qB,iBAAA;MAC3E,IAAIsB,KAAK,CAAC0pB,UAAU,CAAC,CAAC,EAAE;QACpB;QACA;QACA;QACA,IAAMC,cAAc,GAAG,IAAI5uB,WAAW,CAAA6uB,aAAA;UAClCpB,OAAO,EAAExoB,KAAK,CAACqC,SAAS,CAAC;QAAC,GACvBrC,KAAK,CAAC6pB,WAAW,CAAC,CAAC,CAACC,gBAAgB,CAC1C,CAAC;QACF,IAAIC,eAAuB,GAAG/pB,KAAK,CAAC6pB,WAAW,CAAC,CAAC,CAACC,gBAAiB;QACnE,IAAIH,cAAc,CAACK,WAAW,CAAC,CAAC,EAAE;UAC9B,IAAI;YACA,IAAMC,cAAc,SAASR,OAAI,CAACD,YAAY,CAACG,cAAc,CAAC;YAC9DI,eAAe,GAAGE,cAAc,CAACC,UAAoB;UACzD,CAAC,CAAC,OAAO9pB,CAAC,EAAE;YACRzH,MAAM,CAACkK,IAAI,CAAC,oEAAoE,EAAEzC,CAAC,CAAC;UACxF;QACJ;QAEA,OAAO;UACH8pB,UAAU,EAAE;YACR1B,OAAO,EAAExoB,KAAK,CAACqC,SAAS,CAAC,CAAC;YAC1BwC,IAAI,EAAE,gBAAgB;YACtBqkB,OAAO,EAAE,CAAC,CAAC;YACXiB,QAAQ,EAAE;cACNL,gBAAgB,EAAEC;YACtB;UACJ;QACJ,CAAC;MACL,CAAC,MAAM;QACH,IAAMb,OAAO,GAAGlpB,KAAK,CAAC+iB,cAAc,CAAC,CAAC;QACtC,IAAM6B,GAAG,GAAG6E,OAAI,CAAChB,gBAAgB,CAACzoB,KAAK,CAACqC,SAAS,CAAC,CAAC,EAAG6mB,OAAO,CAAC1gB,SAAS,CAAC;QACxE,OAAOoc,GAAG,CAAC4E,YAAY,CAACxpB,KAAK,CAAC;MAClC;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACiBoqB,kBAAkBA,CAACC,WAAyB,EAAiB;IAAA,IAAAC,OAAA;IAAA,OAAA5rB,iBAAA;MACtE;MACA;MACA;MACA;MACA;MACA;MACA;MACA;MACA,MAAM4rB,OAAI,CAACC,qBAAqB,CAACF,WAAW,CAAC;IAAC;EAClD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWG,cAAcA,CACjBhN,WAAgC,EAChCiN,UAAsC,EAEzB;IAAA,IADbC,MAAM,GAAA3qB,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,KAAK;IAEd,OAAO,IAAI,CAACuE,6BAA6B,CACpCqmB,mBAAmB,CAACnN,WAAW,EAAEiN,UAAU,EAAEC,MAAM,CAAC,CACpDrW,IAAI,CAAC,MAAM;MACR,IAAI,IAAI,CAACuW,0BAA0B,EAAE;QACjC,IAAI,CAACtmB,6BAA6B,CAACumB,kBAAkB,CAAC,CAAC;MAC3D;IACJ,CAAC,CAAC,CACDpW,KAAK,CAAErU,CAAC,IAAK;MACV;MACAzH,MAAM,CAAC0H,KAAK,CAAC,gCAAgC,EAAED,CAAC,CAAC;IACrD,CAAC,CAAC;EACV;;EAEA;AACJ;AACA;AACA;AACA;EACW0qB,oBAAoBA,CAACtN,WAAgC,EAAQ;IAChE,IAAI,CAAClZ,6BAA6B,CAACwmB,oBAAoB,CAACtN,WAAW,CAAC,CAAC/I,KAAK,CAAErU,CAAC,IAAK;MAC9EzH,MAAM,CAACkK,IAAI,CAAC,0CAA0C,EAAEzC,CAAC,CAAC;IAC9D,CAAC,CAAC;EACN;;EAEA;AACJ;AACA;AACA;EACiB2qB,qCAAqCA,CAAA,EAAkB;IAAA,IAAAC,OAAA;IAAA,OAAAtsB,iBAAA;MAChE,MAAMssB,OAAI,CAAC1mB,6BAA6B,CAAC2mB,kCAAkC,CAAC,CAAC;IAAC;EAClF;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACiBC,aAAaA,CAACtpB,IAAU,EAAE5B,KAAkB,EAAiB;IAAA,IAAAmrB,OAAA;IAAA,OAAAzsB,iBAAA;MACtE,IAAMwqB,OAAO,GAAGlpB,KAAK,CAACU,UAAU,CAAkB,CAAC;MACnD,MAAMyqB,OAAI,CAAChG,qBAAqB,CAACvjB,IAAI,EAAEsnB,OAAO,CAAC;IAAC;EACpD;;EAEA;AACJ;AACA;AACA;AACA;EACiBkC,iBAAiBA,CAACC,QAAwB,EAAiB;IAAA,IAAAC,OAAA;IAAA,OAAA5sB,iBAAA;MACpE,IAAI,CAAC2sB,QAAQ,CAACE,YAAY,EAAE;QACxB;QACA;QACA;QACA;QACA5yB,MAAM,CAAC2H,GAAG,CAAC,0DAA0D,CAAC;QACtEgrB,OAAI,CAAC1sB,UAAU,CAAC4sB,0BAA0B,CAAC,CAAC;QAC5C;QACAF,OAAI,CAAC1sB,UAAU,CAAC6H,uBAAuB,CAAC6kB,OAAI,CAACrtB,MAAM,CAAC;QACpDqtB,OAAI,CAACzE,uBAAuB,GAAG,CAAC,CAAC;MACrC;MAEAyE,OAAI,CAACV,0BAA0B,GAAG,KAAK;IAAC;EAC5C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACiBa,eAAeA,CAACJ,QAA6B,EAAiB;IAAA,IAAAK,OAAA;IAAA,OAAAhtB,iBAAA;MAAA,IAAAitB,qBAAA;MACvED,OAAI,CAAC9sB,UAAU,CAACgtB,YAAY,EAAAD,qBAAA,GAACN,QAAQ,CAACQ,aAAa,cAAAF,qBAAA,cAAAA,qBAAA,GAAI,IAAI,CAAC;MAC5DD,OAAI,CAAC9sB,UAAU,CAACuH,WAAW,CAAC,CAAC;;MAE7B;MACAulB,OAAI,CAAC9sB,UAAU,CAAC6H,uBAAuB,CAACilB,OAAI,CAACztB,MAAM,CAAC;MAEpDytB,OAAI,CAAC9sB,UAAU,CAACwmB,0BAA0B,CAAC,CAAC;;MAE5C;MACA;MACA;MACA;MACA,IAAI,CAACiG,QAAQ,CAACS,UAAU,EAAE;QACtBJ,OAAI,CAAC3Q,sBAAsB,CAAC,CAAC;QAC7B2Q,OAAI,CAACK,8BAA8B,CAAC,CAAC;;QAErC;QACA;QACA;QACAL,OAAI,CAACpnB,6BAA6B,CAACumB,kBAAkB,CAAC,CAAC;;QAEvD;QACAa,OAAI,CAACd,0BAA0B,GAAG,IAAI;MAC1C;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACkBL,qBAAqBA,CAACF,WAAoD,EAAiB;IAAA,IAAA2B,OAAA;IAAA,OAAAttB,iBAAA;MACrG,IAAIyF,KAAK,CAAC8nB,OAAO,CAAC5B,WAAW,aAAXA,WAAW,uBAAXA,WAAW,CAAEnrB,OAAO,CAAC,EAAE;QACrCmrB,WAAW,CAACnrB,OAAO,CAACyf,OAAO,CAAEuN,CAAC,IAAK;UAC/BF,OAAI,CAACptB,UAAU,CAACutB,wBAAwB,CAACD,CAAC,CAAC;QAC/C,CAAC,CAAC;MACN;MAEA,IAAI/nB,KAAK,CAAC8nB,OAAO,CAAC5B,WAAW,aAAXA,WAAW,uBAAXA,WAAW,CAAE+B,IAAI,CAAC,IAAI/B,WAAW,CAAC+B,IAAI,CAACpqB,MAAM,EAAE;QAC7D;QACA;QACA;QACA,IAAMqqB,UAAU,GAAG,IAAIC,GAAG,OAAON,OAAI,CAACO,kBAAkB,CAAC,CAAC,CAAC;QAE3DlC,WAAW,CAAC+B,IAAI,CAACzN,OAAO,CAAEuN,CAAC,IAAK;UAC5B,IAAI,CAACG,UAAU,CAACnV,GAAG,CAACgV,CAAC,CAAC,EAAE;YACpBF,OAAI,CAACptB,UAAU,CAAC4tB,sBAAsB,CAACN,CAAC,CAAC;UAC7C;QACJ,CAAC,CAAC;MACN;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBK,kBAAkBA,CAAA,EAAsB;IAAA,IAAAE,OAAA;IAAA,OAAA/tB,iBAAA;MAClD,IAAM2tB,UAAoB,GAAG,EAAE;MAC/B,KAAK,IAAMzqB,IAAI,IAAI6qB,OAAI,CAACC,kBAAkB,CAAC,CAAC,EAAE;QAC1C,IAAMjG,OAAO,SAAS7kB,IAAI,CAAC8kB,0BAA0B,CAAC,CAAC;QACvD,KAAK,IAAMzmB,MAAM,IAAIwmB,OAAO,EAAE;UAC1B4F,UAAU,CAACvW,IAAI,CAAC7V,MAAM,CAAChC,MAAM,CAAC;QAClC;MACJ;MACA,OAAOouB,UAAU;IAAC;EACtB;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACYK,kBAAkBA,CAAA,EAAW;IACjC,OAAO,IAAI,CAACvuB,WAAW,CAACwuB,QAAQ,CAAC,CAAC,CAACC,MAAM,CAAEhrB,IAAI,IAAK;MAChD;MACA,IAAMgjB,GAAG,GAAG,IAAI,CAACC,cAAc,CAACzhB,GAAG,CAACxB,IAAI,CAAC2e,MAAM,CAAC;MAChD,IAAI,CAACqE,GAAG,EAAE;QACN,OAAO,KAAK;MAChB;MACA,IAAI,CAAC,IAAI,CAACiC,uBAAuB,CAACjlB,IAAI,CAAC2e,MAAM,CAAC,EAAE;QAC5C,OAAO,KAAK;MAChB;;MAEA;MACA,IAAMsM,YAAY,GAAGjrB,IAAI,CAACkrB,eAAe,CAAC,CAAC;MAC3C,OAAOD,YAAY,KAAKpwB,eAAe,CAACswB,IAAI,IAAIF,YAAY,KAAKpwB,eAAe,CAACuwB,MAAM;IAC3F,CAAC,CAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBC,uBAAuBA,CAACC,iBAA2C,EAAEC,OAAe,EAAiB;IAAA,IAAAC,OAAA;IAAA,OAAA1uB,iBAAA;MAC9G,IAAI;QACA,IAAM2uB,aAAa,SAASD,OAAI,CAACE,oBAAoB,CAACJ,iBAAiB,EAAEC,OAAO,CAAC;QAEjF,IAAI;UACA,MAAMC,OAAI,CAACpvB,QAAQ,CAACuvB,aAAa,CAACF,aAAa,CAAC;QACpD,CAAC,CAAC,OAAOjtB,CAAC,EAAE;UACRzH,MAAM,CAAC0H,KAAK,CAAC,qBAAqB,EAAED,CAAC,CAAC;UACtC,MAAMA,CAAC;QACX;MACJ,CAAC,CAAC,OAAOA,CAAC,EAAE;QACRzH,MAAM,CAAC0H,KAAK,CAAC,yCAAyC,EAAED,CAAC,CAAC;QAC1D,MAAMA,CAAC;MACX;IAAC;EACL;EAEcktB,oBAAoBA,CAC9BJ,iBAA2C,EAC3CC,OAAe,EACO;IAAA,IAAAK,OAAA;IAAA,OAAA9uB,iBAAA;MACtB,IAAM2uB,aAA4B,GAAG;QACjCI,SAAS,EAAEj1B,SAAS,CAACk1B,oBAAoB;QACzCC,KAAK,EAAE;MACX,CAAC;MAED,MAAMtb,OAAO,CAACkL,GAAG,CACb2P,iBAAiB,CAAC1X,GAAG;QAAA,IAAAoY,MAAA,GAAAlvB,iBAAA,CAAC,WAAAmvB,MAAA,EAAkC;UAAA,IAA3B;YAAE5vB,MAAM;YAAE6H;UAAW,CAAC,GAAA+nB,MAAA;UAC/C,IAAM3vB,QAAQ,GAAG4H,UAAU,CAAC5H,QAAQ;UACpC,IAAMmrB,gBAAmC,GAAG;YACxC7gB,SAAS,EAAE3P,MAAM,CAACi1B,aAAa;YAC/BC,UAAU,EAAEP,OAAI,CAAC3pB,SAAS,CAAC8B,mBAAoB;YAC/CqoB,UAAU,EAAE,CAAC,CAAC;YACd,CAACv1B,iBAAiB,GAAGF,MAAM,CAAC;UAChC,CAAC;UAED80B,aAAa,CAACM,KAAK,CAAC7X,IAAI,CAAC;YACrB7X,MAAM;YACNC,QAAQ;YACRivB,OAAO,EAAE9D;UACb,CAAC,CAAC;UAEF,MAAMxwB,MAAM,CAACsuB,2BAA2B,CACpCqG,OAAI,CAAC3pB,SAAS,EACd2pB,OAAI,CAACxvB,QAAQ,EACb,IAAIQ,GAAG,CAAC,CAAC,CAACP,MAAM,EAAE,CAAC6H,UAAU,CAAC,CAAC,CAAC,CACpC,CAAC;UACD,MAAMjN,MAAM,CAACo1B,uBAAuB,CAChC5E,gBAAgB,CAAC2E,UAAU,EAC3BR,OAAI,CAACvvB,MAAM,EACXuvB,OAAI,CAACtvB,QAAQ,EACbsvB,OAAI,CAAC3pB,SAAS,EACd5F,MAAM,EACN6H,UAAU,EACVqnB,OACJ,CAAC;QACL,CAAC;QAAA,iBAAAe,IAAA;UAAA,OAAAN,MAAA,CAAA9tB,KAAA,OAAAC,SAAA;QAAA;MAAA,IACL,CAAC;;MAED;MACA;MACA;MACA;MACAstB,aAAa,CAACM,KAAK,GAAGN,aAAa,CAACM,KAAK,CAACf,MAAM,CAAEuB,GAAG,IAAK;QACtD,IAAIrrB,MAAM,CAACS,IAAI,CAAC4qB,GAAG,CAAChB,OAAO,CAACa,UAAU,CAAC,CAAChsB,MAAM,GAAG,CAAC,EAAE;UAChD,OAAO,IAAI;QACf,CAAC,MAAM;UACHrJ,MAAM,CAAC2H,GAAG,6BAAAC,MAAA,CAA6B4tB,GAAG,CAAClwB,MAAM,OAAAsC,MAAA,CAAI4tB,GAAG,CAACjwB,QAAQ,cAAW,CAAC;UAC7E,OAAO,KAAK;QAChB;MACJ,CAAC,CAAC;MAEF,OAAOmvB,aAAa;IAAC;EACzB;;EAEA;AACJ;AACA;EACiBe,uBAAuBA,CAChCX,SAAiB,EACjBpmB,OAA+C,EAC/C8lB,OAAwB,EACF;IAAA,IAAAkB,OAAA;IAAA,OAAA3vB,iBAAA;MACtB,IAAMmf,OAAO,GAAG,IAAIyO,GAAG,CAACjlB,OAAO,CAACmO,GAAG,CAAC8Y,MAAA;QAAA,IAAC;UAAErwB;QAAO,CAAC,GAAAqwB,MAAA;QAAA,OAAKrwB,MAAM;MAAA,EAAC,CAAC;MAC5D,IAAM2gB,aAAa,SAASyP,OAAI,CAACplB,YAAY,CAAC9E,KAAK,CAACC,IAAI,CAACyZ,OAAO,CAAC,EAAE,KAAK,CAAC;MAEzE,IAAMqP,iBAA2C,GAAG,EAAE;MAEtD7lB,OAAO,CAACsX,OAAO,CAAC4P,MAAA,IAA0B;QAAA,IAAzB;UAAEtwB,MAAM;UAAEC;QAAS,CAAC,GAAAqwB,MAAA;QACjC,IAAMlnB,OAAO,GAAGuX,aAAa,CAACxb,GAAG,CAACnF,MAAM,CAAC;QACzC,IAAI,CAACoJ,OAAO,EAAE;UACV1O,MAAM,CAACkK,IAAI,8BAAAtC,MAAA,CAA8BtC,MAAM,CAAE,CAAC;UAClD;QACJ;QAEA,IAAIoJ,OAAO,CAAC6P,GAAG,CAAChZ,QAAQ,CAAC,EAAE;UACvB;UACAgvB,iBAAiB,CAACpX,IAAI,CAAC;YAAE7X,MAAM;YAAE6H,UAAU,EAAEuB,OAAO,CAACjE,GAAG,CAAClF,QAAQ;UAAG,CAAC,CAAC;QAC1E,CAAC,MAAM;UACHvF,MAAM,CAACkK,IAAI,6BAAAtC,MAAA,CAA6BtC,MAAM,eAAAsC,MAAA,CAAYrC,QAAQ,CAAE,CAAC;QACzE;MACJ,CAAC,CAAC;MAEF,OAAOmwB,OAAI,CAACf,oBAAoB,CAACJ,iBAAiB,EAAEC,OAAO,CAAC;IAAC;EACjE;EAUaqB,0BAA0BA,CAACC,MAAwB,EAA6B;IAAA,OAAA/vB,iBAAA;MACzF;MACA;MACA,OAAO+vB,MAAM,CAAC7B,MAAM,CAAE8B,QAAQ,IAAK;QAAA,IAAAC,iBAAA;QAC/B,IACID,QAAQ,CAAC7pB,IAAI,KAAKrM,SAAS,CAACk1B,oBAAoB,IAChD,CAAC,CAAC,8BAA8B,CAAC,CAACxU,QAAQ,EAAAyV,iBAAA,GAACD,QAAQ,CAACxF,OAAO,cAAAyF,iBAAA,uBAAhBA,iBAAA,CAAkBnmB,SAAS,CAAC,EACzE;UACE7P,MAAM,CAAC2H,GAAG,CAAC,kDAAkD,GAAGouB,QAAQ,CAAChL,MAAM,CAAC;UAChF,OAAO,KAAK;QAChB;QACA,OAAO,IAAI;MACf,CAAC,CAAC;IAAC;EACP;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACYkL,qBAAqBA,CAACC,YAAoB,EAAQ;IACtD,IAAIC,QAAQ,CAACD,YAAY,CAAC,EAAE;MACxB,IAAI,CAACjS,eAAe,GAAGiS,YAAY;IACvC,CAAC,MAAM;MACH,MAAM,IAAIE,SAAS,CAAC,wDAAwD,CAAC;IACjF;EACJ;EAEOC,gBAAgBA,CAACC,iBAA0C,EAAEC,kBAA6B,EAAiB;IAC9G,IAAID,iBAAiB,KAAKhtB,SAAS,EAAE;MACjC,IAAI,CAAC2sB,qBAAqB,CAACK,iBAAiB,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC;IAC3E;IAEA,IAAIC,kBAAkB,KAAKjtB,SAAS,EAAE;MAClC;MACA;MACA;MACA;MACA,IAAI,CAAC6Y,gBAAgB,GAAG,CAACoU,kBAAkB,CAAChW,QAAQ,CAAC,mBAAmB,CAAC;IAC7E;IAEA,OAAO7G,OAAO,CAACC,OAAO,CAAC,CAAC;EAC5B;EAqCA;AACJ;AACA;AACA;AACA;AACA;EACY3R,cAAcA,CAACX,KAAkB,EAAQ;IAC7C,IAAMkpB,OAAO,GAAGlpB,KAAK,CAACU,UAAU,CAAC,CAAC;IAElC,IAAI,CAACwoB,OAAO,CAACV,OAAO,IAAI,CAACU,OAAO,CAAC1gB,SAAS,EAAE;MACxC7P,MAAM,CAAC0H,KAAK,CAAC,6BAA6B,CAAC;MAC3C;IACJ;IAEA,IAAI,CAAC,IAAI,CAAC2C,aAAa,CAACmsB,gBAAgB,EAAE;MACtC;MACA;MACA,IAAI,CAACnsB,aAAa,CAAC0D,aAAa,CAAC,CAAC;IACtC;IAEA,IAAMke,GAAG,GAAG,IAAI,CAAC6D,gBAAgB,CAACS,OAAO,CAACV,OAAO,EAAEU,OAAO,CAAC1gB,SAAS,CAAC;IACrEoc,GAAG,CAACjkB,cAAc,CAACX,KAAK,CAAC;EAC7B;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACYgB,sBAAsBA,CAAChB,KAAkB,EAAQ;IACrD,IAAMkpB,OAAO,GAAGlpB,KAAK,CAACU,UAAU,CAAC,CAAC;IAElC,IACKwoB,OAAO,CAACkG,IAAI,KAAK,UAAU,KAAK,CAAClG,OAAO,CAACV,OAAO,IAAI,CAACU,OAAO,CAACmG,UAAU,CAAC,IACzE,CAACnG,OAAO,CAAC1gB,SAAS,IAClB,CAAC0gB,OAAO,CAAC6E,UAAU,EACrB;MACEp1B,MAAM,CAAC0H,KAAK,CAAC,sCAAsC,CAAC;MACpD;IACJ;IAEA1H,MAAM,CAAC6W,IAAI,CACP,oCAAAjP,MAAA,CAAoCP,KAAK,CAACS,SAAS,CAAC,CAAC,gBAAAF,MAAA,CAC1C2oB,OAAO,CAAC1gB,SAAS,eAAAjI,MAAA,CAAY2oB,OAAO,CAAC6E,UAAU,OAAAxtB,MAAA,CAAI2oB,OAAO,CAACmG,UAAU,MAAG,cAAA9uB,MAAA,CACpE2oB,OAAO,CAACV,OAAO,iBAAAjoB,MAAA,CAAc2oB,OAAO,CAACkG,IAAI,QAAA7uB,MAAA,CAAK2oB,OAAO,CAACoG,MAAM,MAC/E,CAAC;IAED,IAAM1K,GAAG,GAAG,IAAI,CAAC6D,gBAAgB,CAACS,OAAO,CAACV,OAAO,EAAEU,OAAO,CAAC1gB,SAAS,CAAC;IACrE,IAAIoc,GAAG,CAAC5jB,sBAAsB,EAAE;MAC5B4jB,GAAG,CAAC5jB,sBAAsB,CAAChB,KAAK,CAAC;IACrC;IACA,IAAI,CAACkpB,OAAO,CAACV,OAAO,EAAE;MAClB;MACA;MACA;MACA,IAAM+G,cAAc,GAAG,IAAI,CAACC,iBAAiB,CAACtG,OAAO,CAAC1gB,SAAS,CAAC;MAChE,KAAK,IAAMinB,SAAS,IAAIF,cAAc,EAAE;QACpCE,SAAS,CAACC,yBAAyB,CAACxG,OAAO,CAAC6E,UAAU,CAAC;MAC3D;IACJ;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACY7sB,wBAAwBA,CAAClB,KAAkB,EAAQ;IACvD,IAAI,CAAC5F,eAAe,CAAC8H,aAAa,CAAClC,KAAK,EAAE,IAAI,CAAChC,QAAQ,CAAC,EAAE;MACtD;IACJ;IACA,IAAMmE,aAAa,GAAInC,KAAkB,IAAsC;MAC3E,IAAI,CAAC5F,eAAe,CAACu1B,gBAAgB,CAACv1B,eAAe,CAACw1B,YAAY,CAAC5vB,KAAK,CAAC,CAAC,EAAE;QACxE;MACJ;MACA,IAAMkpB,OAAO,GAAGlpB,KAAK,CAACU,UAAU,CAAC,CAAC;MAClC,IAAMxC,QAAQ,GAAGgrB,OAAO,IAAIA,OAAO,CAAC2G,WAAW;MAC/C,IAAI,CAAC3xB,QAAQ,EAAE;QACX;MACJ;MACA,IAAMD,MAAM,GAAG+B,KAAK,CAACS,SAAS,CAAC,CAAE;MACjC,IAAM2B,OAAO,GAAG,IAAIhI,eAAe,CAAC,IAAI,CAAC4D,QAAQ,EAAEC,MAAM,EAAE,CAACC,QAAQ,CAAC,CAAC;MACtE,OAAO,IAAIjE,mBAAmB,CAACmI,OAAO,EAAE,IAAI,CAACrF,mBAAmB,EAAE,IAAI,CAACiB,QAAQ,CAAC;IACpF,CAAC;IACD,IAAI,CAACsE,uBAAuB,CAACtC,KAAK,EAAE,IAAI,CAACuE,4BAA4B,EAAEpC,aAAa,CAAC;EACzF;EA6BcG,uBAAuBA,CACjCtC,KAAkB,EAClBkhB,WAAyB,EACzB/e,aAAsE,EAEzD;IAAA,IAAA2tB,WAAA,GAAA/vB,SAAA;MAAAgwB,OAAA;IAAA,OAAArxB,iBAAA;MAAA,IADbsxB,WAAW,GAAAF,WAAA,CAAA9tB,MAAA,QAAA8tB,WAAA,QAAA7tB,SAAA,GAAA6tB,WAAA,MAAG,IAAI;MAElB;MACA,IAAI9vB,KAAK,CAACiwB,SAAS,CAAC,CAAC,IAAIjwB,KAAK,CAACkwB,MAAM,IAAIp1B,WAAW,CAACq1B,IAAI,EAAE;QACvD,IAAIC,eAA2B;QAC/B,IAAIC,cAA0B;QAC9B,IAAI;UACA,MAAM,IAAIhe,OAAO,CAAO,CAACC,OAAO,EAAEgG,MAAM,KAAK;YACzC8X,eAAe,GAAG9d,OAAO;YACzB+d,cAAc,GAAGA,CAAA,KAAY;cACzB,IAAIrwB,KAAK,CAACkwB,MAAM,IAAIp1B,WAAW,CAACw1B,SAAS,EAAE;gBACvChY,MAAM,CAAC,IAAI1U,KAAK,CAAC,gCAAgC,CAAC,CAAC;cACvD;YACJ,CAAC;YACD5D,KAAK,CAACwB,IAAI,CAACxG,gBAAgB,CAACu1B,oBAAoB,EAAEH,eAAe,CAAC;YAClEpwB,KAAK,CAAC8D,EAAE,CAAC9I,gBAAgB,CAACw1B,MAAM,EAAEH,cAAc,CAAC;UACrD,CAAC,CAAC;QACN,CAAC,CAAC,OAAOvJ,GAAG,EAAE;UACVnuB,MAAM,CAAC0H,KAAK,CAAC,6DAA6D,EAAEymB,GAAG,CAAC;UAChF;QACJ,CAAC,SAAS;UACN9mB,KAAK,CAACywB,cAAc,CAACz1B,gBAAgB,CAACu1B,oBAAoB,EAAEH,eAAgB,CAAC;UAC7EpwB,KAAK,CAACywB,cAAc,CAACz1B,gBAAgB,CAACw1B,MAAM,EAAEH,cAAe,CAAC;QAClE;MACJ;MACA,IAAI7e,OAAwC,GAAG0P,WAAW,CAACwP,UAAU,CAAC1wB,KAAK,CAAC;MAC5E,IAAI2wB,YAAY,GAAG,KAAK;MACxB,IAAI,CAACnf,OAAO,EAAE;QACVA,OAAO,GAAGrP,aAAa,CAACnC,KAAK,CAAC;QAC9B;QACA,IAAI,CAACwR,OAAO,EAAE;UACV7Y,MAAM,CAAC2H,GAAG,CACN,uDAAAC,MAAA,CACOP,KAAK,CAACQ,OAAO,CAAC,CAAC,6CAC1B,CAAC;UACD;QACJ;QACAmwB,YAAY,GAAG,IAAI;QACnBzP,WAAW,CAAC0P,UAAU,CAAC5wB,KAAK,EAAEwR,OAAO,CAAC;MAC1C;MACAxR,KAAK,CAAC6wB,sBAAsB,CAACrf,OAAO,CAAC;MACrC,IAAI;QACA,MAAMA,OAAO,CAACpP,OAAO,CAAC0uB,WAAW,CAAC9wB,KAAK,EAAEwR,OAAO,EAAEwe,WAAW,CAAC;MAClE,CAAC,CAAC,OAAOlJ,GAAG,EAAE;QACVnuB,MAAM,CAAC0H,KAAK,CAAC,yCAAyC,EAAEymB,GAAG,CAAC;MAChE;MACA,IAAM3S,UAAU,GACZwc,YAAY,IACZ,CAACnf,OAAO,CAACuf,aAAa,IACtB,CAACvf,OAAO,CAACwf,OAAO;MAAI;MACpB,CAACxf,OAAO,CAACyf,WAAW;MACxB,IAAI9c,UAAU,EAAE;QACZ4b,OAAI,CAAC/xB,QAAQ,CAACqB,IAAI,CAACpD,WAAW,CAAChC,mBAAmB,EAAEuX,OAAO,CAAC;QAC5Due,OAAI,CAAC/xB,QAAQ,CAACqB,IAAI,CAACpD,WAAW,CAACuB,2BAA2B,EAAEgU,OAAO,CAAC;MACxE;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBpQ,sBAAsBA,CAACpB,KAAkB,EAAiB;IAAA,IAAAkxB,OAAA;IAAA,OAAAxyB,iBAAA;MACpE,IAAMwqB,OAAO,GAAGlpB,KAAK,CAAC+iB,cAAc,CAAC,CAAC;MACtC,IAAMW,MAAM,GAAG1jB,KAAK,CAACS,SAAS,CAAC,CAAC;MAChC,IAAM+H,SAAS,GAAG0gB,OAAO,CAAC1gB,SAAS;MACnC,IAAM+Z,SAAS,GAAG2G,OAAO,CAAC6E,UAAU;MAEpCmD,OAAI,CAAClzB,QAAQ,CAACqB,IAAI,CAACpE,WAAW,CAACk2B,0BAA0B,EAAEnxB,KAAK,CAAC;;MAEjE;MACA;MACA;MACA,IAAMoxB,eAAe,GAAGA,CAAA,KAAY;QAChC,IAAM7B,cAAc,GAAG2B,OAAI,CAAC1B,iBAAiB,CAAC32B,MAAM,CAACkvB,gBAAgB,CAAC;QACtE,KAAK,IAAM0H,SAAS,IAAIF,cAAc,EAAE;UACpCE,SAAS,CAACC,yBAAyB,CAACnN,SAAS,CAAC;QAClD;MACJ,CAAC;MAED,IAAImB,MAAM,KAAKzhB,SAAS,IAAIsgB,SAAS,KAAKtgB,SAAS,IAAIsgB,SAAS,KAAKtgB,SAAS,EAAE;QAC5E;MACJ;;MAEA;MACA;MACA,IAAMovB,+BAA+B,GAAGH,OAAI,CAACI,wBAAwB,CAACC,WAAW,CAAC7N,MAAM,CAAC;MACzF,IAAM4N,wBAAwB,GAAGD,+BAA+B,CAACE,WAAW,CAAChP,SAAS,CAAC;MACvF,IAAI+O,wBAAwB,GAAGjW,IAAI,CAACD,GAAG,CAAC,CAAC,EAAE;QACvCziB,MAAM,CAAC6J,KAAK,CACR,0CAAAjC,MAAA,CAA0CmjB,MAAM,OAAAnjB,MAAA,CAAIgiB,SAAS,gDAAAhiB,MAAA,CACnB,IAAI8a,IAAI,CAACiW,wBAAwB,CAAC,CAACE,WAAW,CAAC,CAAC,CAC9F,CAAC;QACD,MAAMN,OAAI,CAACrtB,SAAS,CAAC4tB,oBAAoB,CAAClP,SAAS,EAAE,QAAQ,EAAE,IAAI,CAAC;QACpE6O,eAAe,CAAC,CAAC;QACjB;MACJ;;MAEA;MACAC,+BAA+B,CAACzuB,GAAG,CAAC2f,SAAS,EAAElH,IAAI,CAACD,GAAG,CAAC,CAAC,GAAGle,+BAA+B,CAAC;;MAE5F;MACA;MACA;MACA;MACA,IAAI2O,MAAM,GAAGqlB,OAAI,CAACtyB,UAAU,CAACqkB,sBAAsB,CAACza,SAAS,EAAE+Z,SAAS,CAAC;MACzE,IAAI,CAAC1W,MAAM,EAAE;QACT;QACA;QACA,MAAMqlB,OAAI,CAACjoB,YAAY,CAAC,CAACya,MAAM,CAAC,EAAE,KAAK,CAAC;QACxC7X,MAAM,GAAGqlB,OAAI,CAACtyB,UAAU,CAACqkB,sBAAsB,CAACza,SAAS,EAAE+Z,SAAS,CAAC;QACrE,IAAI,CAAC1W,MAAM,EAAE;UACTlT,MAAM,CAAC6W,IAAI,CAAC,wCAAwC,GAAG+S,SAAS,GAAG,+BAA+B,CAAC;UACnG,MAAM2O,OAAI,CAACrtB,SAAS,CAAC4tB,oBAAoB,CAAClP,SAAS,EAAE,QAAQ,EAAE,KAAK,CAAC;UACrE6O,eAAe,CAAC,CAAC;UACjB;QACJ;MACJ;MACA,IAAMnK,aAAa,GAAG,IAAIzoB,GAAG,CAAC,CAAC,CAACklB,MAAM,EAAE,CAAC7X,MAAM,CAAC,CAAC,CAAC,CAAC;MACnD,MAAMhT,MAAM,CAACsuB,2BAA2B,CAAC+J,OAAI,CAACrtB,SAAS,EAAEqtB,OAAI,CAAClzB,QAAQ,EAAEipB,aAAa,EAAE,IAAI,CAAC;MAE5FoK,+BAA+B,CAACzuB,GAAG,CAAC2f,SAAS,EAAElH,IAAI,CAACD,GAAG,CAAC,CAAC,GAAGne,6BAA6B,CAAC;;MAE1F;MACA;MACA;MACA;MACA;MACA;MACA,IAAMosB,gBAAmC,GAAG;QACxC7gB,SAAS,EAAE3P,MAAM,CAACi1B,aAAa;QAC/BC,UAAU,EAAEmD,OAAI,CAACrtB,SAAS,CAAC8B,mBAAoB;QAC/CqoB,UAAU,EAAE,CAAC,CAAC;QACd,CAACv1B,iBAAiB,GAAGF,MAAM,CAAC;MAChC,CAAC;MACD,MAAMM,MAAM,CAACo1B,uBAAuB,CAChC5E,gBAAgB,CAAC2E,UAAU,EAC3BkD,OAAI,CAACjzB,MAAM,EACXizB,OAAI,CAAChzB,QAAQ,EACbgzB,OAAI,CAACrtB,SAAS,EACd6f,MAAM,EACN7X,MAAM,EACN;QAAEhH,IAAI,EAAE;MAAU,CACtB,CAAC;MAED,MAAMqsB,OAAI,CAACrtB,SAAS,CAAC4tB,oBAAoB,CAAClP,SAAS,EAAE,QAAQ,EAAE,IAAI,CAAC;MACpE6O,eAAe,CAAC,CAAC;MAEjB,MAAMF,OAAI,CAAClzB,QAAQ,CAAC0zB,YAAY,CAC5B,kBAAkB,EAClB,IAAIlzB,GAAG,CAAC,CAAC,CAACklB,MAAM,EAAE,IAAIllB,GAAG,CAAC,CAAC,CAACqN,MAAM,CAAC3N,QAAQ,EAAEmrB,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CACtE,CAAC;;MAED;MACA;MACA;MACA;MACA,IAAMsI,gBAAgB,SAAST,OAAI,CAAC5sB,6BAA6B,CAACstB,6BAA6B,CAC3FlO,MAAM,EACN7X,MAAM,CAAC3N,QACX,CAAC;MACD,KAAK,IAAM2zB,MAAM,IAAIF,gBAAgB,EAAE;QACnCT,OAAI,CAAC1G,cAAc,CAACqH,MAAM,CAACrU,WAAW,EAAEqU,MAAM,CAACpH,UAAU,EAAE,IAAI,CAAC;MACpE;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACYtqB,gBAAgBA,CAACH,KAAkB,EAAEC,MAAkB,EAAEC,aAAsB,EAAQ;IAC3F;IACA;IACA;IACA;IACA;IACA;IACA;;IAEA,IAAMqgB,MAAM,GAAGtgB,MAAM,CAACsgB,MAAM;IAE5B,IAAMqE,GAAG,GAAG,IAAI,CAACC,cAAc,CAACzhB,GAAG,CAACmd,MAAM,CAAC;IAC3C,IAAI,CAACqE,GAAG,EAAE;MACN;MACA;IACJ;IACA;IACA;IACA;IACA;IACA,IAAIrE,MAAM,IAAI,IAAI,CAACsG,uBAAuB,EAAE;MAAA,IAAAiL,qBAAA;MACxC,IAAI7xB,MAAM,CAAC8xB,UAAU,IAAIt1B,eAAe,CAACswB,IAAI,EAAE;QAC3Cp0B,MAAM,CAAC2H,GAAG,CAAC,iBAAiB,GAAGL,MAAM,CAAChC,MAAM,GAAG,MAAM,GAAGsiB,MAAM,CAAC;QAC/D;QACA,IAAI,CAAC3hB,UAAU,CAAC6H,uBAAuB,CAACxG,MAAM,CAAChC,MAAM,CAAC;MAC1D,CAAC,MAAM,IACHgC,MAAM,CAAC8xB,UAAU,IAAIt1B,eAAe,CAACuwB,MAAM,KAAA8E,qBAAA,GAC3C,IAAI,CAAC3zB,WAAW,CAAC+mB,OAAO,CAAC3E,MAAM,CAAC,cAAAuR,qBAAA,eAAhCA,qBAAA,CAAkCE,8BAA8B,CAAC,CAAC,EACpE;QACEr5B,MAAM,CAAC2H,GAAG,CAAC,mBAAmB,GAAGL,MAAM,CAAChC,MAAM,GAAG,MAAM,GAAGsiB,MAAM,CAAC;QACjE,IAAI,CAAC3hB,UAAU,CAAC6H,uBAAuB,CAACxG,MAAM,CAAChC,MAAM,CAAC;MAC1D;IACJ;IAEA2mB,GAAG,CAACzkB,gBAAgB,CAACH,KAAK,EAAEC,MAAM,EAAEC,aAAa,CAAC;EACtD;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACYU,qBAAqBA,CAACZ,KAAkB,EAAQ;IACpD,IAAMkpB,OAAO,GAAGlpB,KAAK,CAACU,UAAU,CAAC,CAAC;IAClC,IAAIwoB,OAAO,CAAC+I,MAAM,KAAK,SAAS,EAAE;MAC9B;MACA;MACA;MACA,IAAMC,GAAG,GAAG,IAAIC,sBAAsB,CAACnyB,KAAK,CAAC;MAC7C,IAAI,CAACoyB,uBAAuB,CAACtc,IAAI,CAACoc,GAAG,CAAC;IAC1C,CAAC,MAAM,IAAIhJ,OAAO,CAAC+I,MAAM,KAAK,sBAAsB,EAAE;MAClD,IAAMC,IAAG,GAAG,IAAIG,kCAAkC,CAACryB,KAAK,CAAC;MACzD,IAAI,CAACsyB,mCAAmC,CAACxc,IAAI,CAACoc,IAAG,CAAC;IACtD;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBnG,8BAA8BA,CAAA,EAAkB;IAAA,IAAAwG,OAAA;IAAA,OAAA7zB,iBAAA;MAC1D,IAAI6zB,OAAI,CAACC,yBAAyB,EAAE;QAChC;QACA;QACA;MACJ;MACAD,OAAI,CAACC,yBAAyB,GAAG,IAAI;MAErC,IAAI;QACA;QACA;QACA,IAAMC,QAAQ,GAAGF,OAAI,CAACH,uBAAuB;QAC7CG,OAAI,CAACH,uBAAuB,GAAG,EAAE;QACjC,IAAMM,aAAa,GAAGH,OAAI,CAACD,mCAAmC;QAC9DC,OAAI,CAACD,mCAAmC,GAAG,EAAE;;QAE7C;QACA;QACA;QACA;QACA;QACA;QACA;QACA,MAAMjgB,OAAO,CAACkL,GAAG,CAACkV,QAAQ,CAACjd,GAAG,CAAE0c,GAAG,IAAKK,OAAI,CAACI,6BAA6B,CAACT,GAAG,CAAC,CAAC,CAAC;QACjF,MAAM7f,OAAO,CAACkL,GAAG,CACbmV,aAAa,CAACld,GAAG,CAAEod,YAAY,IAAKL,OAAI,CAACM,yCAAyC,CAACD,YAAY,CAAC,CACpG,CAAC;MACL,CAAC,CAAC,OAAOxyB,CAAC,EAAE;QACRzH,MAAM,CAAC0H,KAAK,uCAAAE,MAAA,CAAuCH,CAAC,CAAE,CAAC;MAC3D,CAAC,SAAS;QACNmyB,OAAI,CAACC,yBAAyB,GAAG,KAAK;MAC1C;IAAC;EACL;;EAEA;AACJ;AACA;AACA;EACkBG,6BAA6BA,CAACT,GAA2B,EAAiB;IAAA,IAAAY,OAAA;IAAA,OAAAp0B,iBAAA;MACpF,IAAMT,MAAM,GAAGi0B,GAAG,CAACj0B,MAAM;MACzB,IAAMC,QAAQ,GAAGg0B,GAAG,CAACh0B,QAAQ;MAE7B,IAAM60B,IAAI,GAAGb,GAAG,CAAC1U,WAAW;MAC5B,IAAM+C,MAAM,GAAGwS,IAAI,CAACvK,OAAO;MAC3B,IAAM5D,GAAG,GAAGmO,IAAI,CAACvqB,SAAS;MAE1B7P,MAAM,CAAC2H,GAAG,CACN,2BAAAC,MAAA,CAA2BtC,MAAM,OAAAsC,MAAA,CAAIrC,QAAQ,YAAAqC,MAAA,CACjCggB,MAAM,SAAAhgB,MAAA,CAAMwyB,IAAI,CAAC1D,UAAU,WAAA9uB,MAAA,CAAQ2xB,GAAG,CAACc,SAAS,MAChE,CAAC;MAED,IAAI/0B,MAAM,KAAK60B,OAAI,CAAC70B,MAAM,EAAE;QACxB,IAAI,CAAC60B,OAAI,CAACjO,cAAc,CAACzhB,GAAG,CAACmd,MAAM,CAAC,EAAE;UAClC5nB,MAAM,CAAC6J,KAAK,0CAAAjC,MAAA,CAA0CggB,MAAM,CAAE,CAAC;UAC/D;QACJ;QACA,IAAM0S,SAAS,GAAGH,OAAI,CAACjO,cAAc,CAACzhB,GAAG,CAACmd,MAAM,CAAE;QAClD,IAAM1U,MAAM,GAAGinB,OAAI,CAACl0B,UAAU,CAAC8I,eAAe,CAACzJ,MAAM,EAAEC,QAAQ,CAAC;QAChE,IAAI,CAAC2N,MAAM,EAAE;UACTlT,MAAM,CAAC6J,KAAK,yCAAAjC,MAAA,CAAyCtC,MAAM,OAAAsC,MAAA,CAAIrC,QAAQ,CAAE,CAAC;UAC1E;QACJ;QAEA,IAAI;UACA,MAAM+0B,SAAS,CAACC,oBAAoB,CAAEH,IAAI,CAAChF,UAAU,EAAEgF,IAAI,CAAC1D,UAAU,EAAEpxB,MAAM,EAAE4N,MAAM,CAAC;QAC3F,CAAC,CAAC,OAAOzL,CAAC,EAAE;UACRzH,MAAM,CAACkK,IAAI,CACP,sCAAsC,GAClCkwB,IAAI,CAAC1D,UAAU,GACf,eAAe,GACfpxB,MAAM,GACN,GAAG,GACH4N,MAAM,CAAC3N,QAAQ,EACnBkC,CACJ,CAAC;QACL;QACA;MACJ;MAEA,IAAIlC,QAAQ,KAAK40B,OAAI,CAAC50B,QAAQ,EAAE;QAC5B;QACA;QACA;QACA;QACA;QACA;QACA;QACA;QACAvF,MAAM,CAAC2H,GAAG,CAAC,0CAA0C,CAAC;QACtD;MACJ;;MAEA;MACA;;MAEA;MACA;MACA,IAAI,CAACwyB,OAAI,CAACvD,cAAc,CAACrY,GAAG,CAACqJ,MAAM,CAAC,EAAE;QAClC5nB,MAAM,CAAC2H,GAAG,0CAAAC,MAAA,CAA0CggB,MAAM,CAAE,CAAC;QAC7D;MACJ;MAEA,IAAMkP,SAAS,GAAGqD,OAAI,CAACvD,cAAc,CAACnsB,GAAG,CAACmd,MAAM,CAAC,CAAEnd,GAAG,CAACwhB,GAAG,CAAC;MAC3D,IAAI,CAAC6K,SAAS,EAAE;QACZ92B,MAAM,CAAC2H,GAAG,qCAAAC,MAAA,CAAqCqkB,GAAG,eAAArkB,MAAA,CAAYggB,MAAM,CAAE,CAAC;QACvE;MACJ;MAEA,IAAI,QAAQkP,SAAS,CAAC0D,oBAAoB,CAACjB,GAAG,CAAC,CAAC,EAAE;QAC9Cv5B,MAAM,CAAC2H,GAAG,CAAC,wCAAAC,MAAA,CAAwCggB,MAAM,WAAQwS,IAAI,CAAC1D,UAAU,CAAC;QACjF;MACJ;MAEA6C,GAAG,CAACkB,KAAK,GAAG,MAAY;QACpB3D,SAAS,CAAC4D,mBAAmB,CAACnB,GAAG,CAAC;MACtC,CAAC;;MAED;MACA,IAAIY,OAAI,CAACvrB,gBAAgB,CAACtJ,MAAM,EAAEC,QAAQ,CAAC,CAACmX,UAAU,CAAC,CAAC,EAAE;QACtD1c,MAAM,CAAC2H,GAAG,CAAC,0CAA0C,CAAC;QACtD4xB,GAAG,CAACkB,KAAK,CAAC,CAAC;QACX;MACJ;MAEAN,OAAI,CAACzzB,IAAI,CAACpD,WAAW,CAACq3B,cAAc,EAAEpB,GAAG,CAAC;IAAC;EAC/C;;EAEA;AACJ;AACA;AACA;EACkBW,yCAAyCA,CACnDD,YAAgD,EACnC;IAAA,IAAAW,OAAA;IAAA,OAAA70B,iBAAA;MACb/F,MAAM,CAAC2H,GAAG,CACN,uCAAAC,MAAA,CAAuCqyB,YAAY,CAAC30B,MAAM,YAAAsC,MAAA,CACnDqyB,YAAY,CAAC10B,QAAQ,WAAAqC,MAAA,CAAQqyB,YAAY,CAACI,SAAS,MAC9D,CAAC;;MAED;MACA;MACA;MACAO,OAAI,CAACl0B,IAAI,CAACpD,WAAW,CAACu3B,0BAA0B,EAAEZ,YAAY,CAAC;IAAC;EACpE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWnK,gBAAgBA,CAAClI,MAAqB,EAAE/X,SAAiB,EAAuB;IACnF,IAAIirB,UAAwD;IAC5D,IAAI7O,GAAoC;IAExC,IAAIrE,MAAM,EAAE;MACRkT,UAAU,GAAG,IAAI,CAAClE,cAAc,CAACnsB,GAAG,CAACmd,MAAM,CAAC;MAC5C,IAAI,CAACkT,UAAU,EAAE;QACbA,UAAU,GAAG,IAAIj1B,GAAG,CAA8B,CAAC;QACnD,IAAI,CAAC+wB,cAAc,CAAC3sB,GAAG,CAAC2d,MAAM,EAAEkT,UAAU,CAAC;MAC/C;MAEA7O,GAAG,GAAG6O,UAAU,CAACrwB,GAAG,CAACoF,SAAS,CAAC;MAC/B,IAAIoc,GAAG,EAAE;QACL,OAAOA,GAAG;MACd;IACJ;IAEA,IAAMgB,QAAQ,GAAG5sB,UAAU,CAACqL,kBAAkB,CAACjB,GAAG,CAACoF,SAAS,CAAC;IAC7D,IAAI,CAACod,QAAQ,EAAE;MACX,MAAM,IAAIvqB,eAAe,CACrBQ,qBAAqB,CAAC63B,4BAA4B,EAClD,gCAAgC,GAAGlrB,SAAS,GAAG,IACnD,CAAC;IACL;IACAoc,GAAG,GAAG,IAAIgB,QAAQ,CAAC;MACf3nB,MAAM,EAAE,IAAI,CAACA,MAAM;MACnB6nB,MAAM,EAAE,IAAI;MACZjiB,SAAS,EAAE,IAAI,CAACA,SAAS;MACzB7F,QAAQ,EAAE,IAAI,CAACA,QAAQ;MACvBuiB,MAAM,EAAEA,MAAM,aAANA,MAAM,cAANA,MAAM,GAAIte;IACtB,CAAC,CAAC;IAEF,IAAIwxB,UAAU,EAAE;MACZA,UAAU,CAAC7wB,GAAG,CAAC4F,SAAS,EAAEoc,GAAG,CAAC;IAClC;IACA,OAAOA,GAAG;EACd;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACY4K,iBAAiBA,CAAChnB,SAAiB,EAAyB;IAChE,IAAMirB,UAAiC,GAAG,EAAE;IAC5C,KAAK,IAAME,CAAC,IAAI,IAAI,CAACpE,cAAc,CAAC9P,MAAM,CAAC,CAAC,EAAE;MAC1C,IAAIkU,CAAC,CAACzc,GAAG,CAAC1O,SAAS,CAAC,EAAE;QAClBirB,UAAU,CAAC3d,IAAI,CAAC6d,CAAC,CAACvwB,GAAG,CAACoF,SAAS,CAAE,CAAC;MACtC;IACJ;IACA,OAAOirB,UAAU;EACrB;;EAEA;AACJ;AACA;AACA;AACA;EACiB/nB,UAAUA,CAAqCkoB,GAAM,EAAiB;IAAA,IAAAC,OAAA;IAAA,OAAAn1B,iBAAA;MAC/E,IAAMo1B,IAAI,GAAG,IAAIt1B,GAAG,CAACsE,MAAM,CAACC,OAAO,CAAC6wB,GAAG,CAACle,UAAU,IAAI,CAAC,CAAC,CAAC,CAAC;MAC1D,IAAMyU,QAAQ,GAAGyJ,GAAG,CAACzJ,QAAQ;MAE7B,OAAOyJ,GAAG,CAACle,UAAU;MACrB,OAAOke,GAAG,CAACzJ,QAAQ;MAEnB,IAAM4J,cAAc,GAAGD,IAAI,CAAC1wB,GAAG,CAACywB,OAAI,CAAC51B,MAAM,CAAC,IAAI,CAAC,CAAC;MAClD61B,IAAI,CAAClxB,GAAG,CAACixB,OAAI,CAAC51B,MAAM,EAAE81B,cAAc,CAAC;MACrCA,cAAc,CAAC,UAAU,GAAGF,OAAI,CAAC31B,QAAQ,CAAC,SAAS21B,OAAI,CAAChwB,SAAS,CAACmwB,IAAI,CAAC37B,WAAW,CAACotB,SAAS,CAACmO,GAAG,CAAC,CAAC;MAClGA,GAAG,CAACle,UAAU,GAAGla,oBAAoB,CAACs4B,IAAI,CAAC;MAC3C,IAAI3J,QAAQ,KAAKloB,SAAS,EAAE2xB,GAAG,CAACzJ,QAAQ,GAAGA,QAAQ;IAAC;EACxD;;EAEA;AACJ;AACA;AACA;EACW8J,eAAeA,CAAC1T,MAAc,EAAW;IAC5C,OAAO,IAAI,CAAC9d,QAAQ,CAACwxB,eAAe,CAAC1T,MAAM,CAAC;EAChD;;EAEA;AACJ;AACA;EACiB2T,yBAAyBA,CAAC3T,MAAc,EAAoB;IAAA,IAAA4T,OAAA;IAAA,OAAAz1B,iBAAA;MACrE,OAAOy1B,OAAI,CAACF,eAAe,CAAC1T,MAAM,CAAC;IAAC;EACxC;;EAEA;AACJ;AACA;AACA;EACWgF,iBAAiBA,CAAChF,MAAc,EAA0B;IAC7D,OAAO,IAAI,CAAC9d,QAAQ,CAAC8iB,iBAAiB,CAAChF,MAAM,CAAC;EAClD;;EAEA;AACJ;AACA;AACA;EACiB6T,sBAAsBA,CAAA,EAAqB;IAAA,OAAA11B,iBAAA;MACpD,OAAO,KAAK;IAAC;EACjB;;EAEA;AACJ;AACA;EACiB21B,gBAAgBA,CAACC,YAAsB,EAAiB;IAAA,OAAA51B,iBAAA;MACjE,MAAM,IAAIkF,KAAK,CAAC,iBAAiB,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;EACW2wB,gBAAgBA,CAAC5mB,IAA0B,EAAmC;IACjF,MAAM,IAAI/J,KAAK,CAAC,iBAAiB,CAAC;EACtC;;EAEA;AACJ;AACA;EACW4wB,8BAA8BA,CACjCjsB,UAAkB,EAClBoF,IAA0B,EACK;IAC/B,MAAM,IAAI/J,KAAK,CAAC,iBAAiB,CAAC;EACtC;AACJ;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASN,YAAYA,CAAC6E,GAAY,EAAiB;EACtD,IAAI,OAAOA,GAAG,KAAK,QAAQ,IAAIA,GAAG,CAACssB,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE;IACjD,OAAO,IAAI;EACf;EACA,IAAMpxB,QAAQ,GAAG2M,UAAU,CAAC5L,IAAI,CAAC+D,GAAG,CAACyN,KAAK,CAAC,GAAG,CAAC,EAAG8e,CAAC,IAAKC,QAAQ,CAACD,CAAC,CAAC,CAAC;EACpE,OAAOl4B,YAAY,CAAC6G,QAAQ,CAAC;AACjC;;AAEA;AACA;AACA;AACA,OAAO,MAAM8uB,sBAAsB,CAAC;EAezBp0B,WAAWA,CAACiC,KAAkB,EAAE;IAdvC;IAAAzB,eAAA;IAEA;IAAAA,eAAA;IAEA;IAAAA,eAAA;IAAAA,eAAA;IAGA;AACJ;AACA;AACA;AACA;IAJIA,eAAA;IAQI,IAAM2qB,OAAO,GAAGlpB,KAAK,CAACU,UAAU,CAAC,CAAC;IAElC,IAAI,CAACzC,MAAM,GAAG+B,KAAK,CAACS,SAAS,CAAC,CAAE;IAChC,IAAI,CAACvC,QAAQ,GAAGgrB,OAAO,CAAC0L,oBAAoB;IAC5C,IAAI,CAAC5B,SAAS,GAAG9J,OAAO,CAAC2L,UAAU;IACnC,IAAI,CAACrX,WAAW,GAAG0L,OAAO,CAAC6J,IAAI,IAAI,CAAC,CAAC;IACrC,IAAI,CAACK,KAAK,GAAG,MAAY;MACrB,MAAM,IAAIxvB,KAAK,CAAC,mDAAmD,CAAC;IACxE,CAAC;EACL;AACJ;;AAEA;AACA;AACA;AACA,MAAMyuB,kCAAkC,CAAC;EAQ9Bt0B,WAAWA,CAACiC,KAAkB,EAAE;IAPvC;IAAAzB,eAAA;IAEA;IAAAA,eAAA;IAEA;IAAAA,eAAA;IAII,IAAM2qB,OAAO,GAAGlpB,KAAK,CAACU,UAAU,CAAC,CAAC;IAElC,IAAI,CAACzC,MAAM,GAAG+B,KAAK,CAACS,SAAS,CAAC,CAAE;IAChC,IAAI,CAACvC,QAAQ,GAAGgrB,OAAO,CAAC0L,oBAAoB;IAC5C,IAAI,CAAC5B,SAAS,GAAG9J,OAAO,CAAC2L,UAAU;EACvC;AACJ;;AAEA","ignoreList":[]}
1
+ {"version":3,"file":"index.js","names":["anotherjson","v4","uuidv4","EventType","ToDeviceMessageId","TypedReEmitter","logger","OlmDevice","olmlib","DeviceList","DeviceInfo","algorithms","createCryptoStoreCacheCallbacks","CrossSigningInfo","DeviceTrustLevel","UserTrustLevel","EncryptionSetupBuilder","SecretStorage","LegacySecretStorage","CrossSigningKey","OutgoingRoomKeyRequestManager","IndexedDBCryptoStore","ReciprocateQRCode","SCAN_QR_CODE_METHOD","SHOW_QR_CODE_METHOD","SAS","SASVerification","keyFromPassphrase","VerificationRequest","InRoomChannel","InRoomRequests","ToDeviceChannel","ToDeviceRequests","IllegalMethod","KeySignatureUploadError","DehydrationManager","BackupManager","LibOlmBackupDecryptor","backupTrustInfoFromLegacyTrustInfo","RoomEvent","RoomMemberEvent","EventStatus","MatrixEvent","MatrixEventEvent","ClientEvent","MatrixClient","RoomList","TypedEventEmitter","DecryptionError","RoomStateEvent","MapWithDefault","recursiveMapToObject","calculateKeyCheck","SECRET_STORAGE_ALGORITHM_V1_AES","ServerSideSecretStorageImpl","decodeRecoveryKey","DecryptionFailureCode","encodeRecoveryKey","EventShieldColour","EventShieldReason","CryptoEvent","CryptoApiCryptoEvent","deviceInfoToDevice","ClientPrefix","MatrixError","Method","decodeBase64","encodeBase64","KnownMembership","decryptAESSecretStorageItem","encryptAESSecretStorageItem","DeviceVerification","defaultVerificationMethods","NAME","verificationMethods","RECIPROCATE_QR_CODE","isCryptoAvailable","Boolean","globalThis","Olm","MIN_FORCE_SESSION_INTERVAL_MS","FORCE_SESSION_RETRY_INTERVAL_MS","UserTrustStatusChanged","KeyBackupStatus","KeyBackupFailed","KeyBackupSessionsRemaining","KeyBackupDecryptionKeyCached","VerificationRequestReceived","WillUpdateDevices","DevicesUpdated","KeysChanged","LegacyCryptoStoreMigrationProgress","Crypto","getOlmVersion","constructor","baseApis","userId","deviceId","clientStore","cryptoStore","_this","this","_defineProperty","Map","_ref","_asyncToGenerator","newCrossSigning","deviceList","getStoredCrossSigningForUser","seenPubkey","getId","currentPubkey","crossSigningInfo","changed","checkOwnCrossSigningTrust","storeTrustedSelfKeys","emit","checkUserTrust","checkDeviceVerifications","crossSigning","updateCrossSigningVerifiedBefore","isCrossSigningVerified","setRawStoredCrossSigningForUser","toStorage","_x","apply","arguments","event","member","oldMembership","onRoomMembership","e","error","log","concat","getType","getSender","getContent","onRoomKeyEvent","onRoomKeyRequestEvent","secretStorage","onRequestReceived","onSecretReceived","onRoomKeyWithheldEvent","transaction_id","onKeyVerificationMessage","msgtype","onToDeviceBadEncrypted","isBeingDecrypted","shouldAttemptDecryption","attemptDecryption","once","Decrypted","ev","onToDeviceEvent","room","atStart","removed","liveEvent","length","undefined","validateEvent","createRequest","channel","getRoomId","handleVerificationEvent","inRoomVerificationRequests","debug","roomList","reEmitter","method","set","warn","Object","entries","backupManager","cachedKey","getSessionBackupPrivateKey","storedKey","get","fixedKey","fixBackupKey","keys","getKey","store","cryptoCallbacks","getBackupKey","Error","olmDevice","on","UserCrossSigningUpdated","onDeviceListUserCrossSigningUpdated","reEmit","supportedAlgorithms","Array","from","DECRYPTION_CLASSES","outgoingRoomKeyRequestManager","toDeviceVerificationRequests","cacheCallbacks","dehydrationManager","getCrossSigningKey","getSecretStorageKey","_ref3","type","getFromSecretStorage","_x2","init","_arguments","_this2","exportedOlmDevice","pickleKey","fromExportedDevice","load","deviceKeys","deviceEd25519Key","deviceCurve25519Key","myDevices","getRawStoredDevicesForUser","deviceInfo","verified","VERIFIED","known","storeDevicesForUser","saveIfDirty","doTxn","STORE_ACCOUNT","txn","getCrossSigningKeys","setKeys","startTrackingDeviceList","checkAndStart","setDeviceIsolationMode","isolationMode","getVersion","olmVersionTuple","getTrustCrossSignedDevices","trustCrossSignedDevices","getCryptoTrustCrossSignedDevices","setTrustCrossSignedDevices","val","getKnownUserIds","devices","deviceTrust","checkDeviceTrust","isLocallyVerified","deviceObj","getStoredDevice","DeviceVerificationChanged","setCryptoTrustCrossSignedDevices","createRecoveryKeyFromPassphrase","password","decryption","PkDecryption","derivation","init_with_private_key","key","privateKey","get_private_key","keyInfo","passphrase","algorithm","iterations","salt","encodedPrivateKey","generate_key","free","userHasCrossSigningKeys","_arguments2","_this3","downloadKeys","isCrossSigningReady","_this4","publicKeysOnDevice","privateKeysExistSomewhere","isStoredInKeyCache","isStoredInSecretStorage","isSecretStorageReady","_this5","secretStorageKeyInAccount","hasKey","privateKeysInStorage","sessionBackupInStorage","getKeyBackupEnabled","isKeyBackupKeyStored","getCrossSigningStatus","_this6","_cacheCallbacks$getCr","_cacheCallbacks$getCr2","_cacheCallbacks$getCr3","privateKeysInSecretStorage","getCacheCallbacks","masterKey","getCrossSigningKeyCache","call","selfSigningKey","userSigningKey","privateKeysCachedLocally","bootstrapCrossSigning","_arguments3","_this7","authUploadDeviceSigningKeys","setupNewCrossSigning","delegateCryptoCallbacks","builder","accountData","crossSigningCallbacks","resetCrossSigning","_ref4","resetKeys","signObject","master","addCrossSigningKeys","device","deviceSignature","signDevice","addKeySignature","backupInfo","auth_data","addSessionBackup","privateKeysInCache","allowPrivateKeyRequests","crossSigningPrivateKeys","privateKeys","size","saveCrossSigningKeys","accountDataClientAdapter","ssssCryptoCallbacks","storeInSecretStorage","operation","buildOperation","persist","bootstrapSecretStorage","_arguments4","_this8","createSecretStorageKey","keyBackupInfo","setupNewKeyBackup","setupNewSecretStorage","getKeyBackupPassphrase","newKeyId","createSSSS","_ref6","opts","keyId","addKey","addPrivateKey","setDefaultKeyId","_x3","ensureCanCheckPassphrase","_ref7","mac","_this8$baseApis$crypt","_this8$baseApis$crypt2","iv","setAccountData","_x4","_x5","signKeyBackupWithCrossSigning","_ref8","keyBackupAuthData","_x6","oldSSSSKey","oldKeyId","oldKeyInfo","storageExists","name","backupKey","private_key_salt","private_key_iterations","bits","getCrossSigningKeysFromCache","info","prepareKeyBackupVersion","secureSecretStorage","recovery_key","data","sessionBackupKey","fixedBackupKey","decodedBackupKey","Uint8Array","addSessionBackupPrivateKeyToCache","resetKeyBackup","_this9","deleteAllKeyBackupVersions","version","http","authedRequest","Post","prefix","V3","storeSessionBackupPrivateKey","scheduleAllGroupSessionsForBackup","deleteKeyBackupVersion","_this10","addSecretStorageKey","keyID","hasSecretStorageKey","storeSecret","secret","getSecret","isSecretStored","isStored","requestSecret","request","getDefaultSecretStorageKeyId","getDefaultKeyId","setDefaultSecretStorageKeyId","k","checkSecretStorageKey","checkKey","checkSecretStoragePrivateKey","expectedPublicKey","gotPubkey","_decryption","_this11","encodedKey","Promise","resolve","getSecretStorePrivateKey","Buffer","decrypted","_this12","encryptedKey","storeSecretStorePrivateKey","loadSessionBackupPrivateKeyFromSecretStorage","getActiveSessionBackupVersion","_this13","_this13$backupManager","getKeyBackupInfo","isKeyBackupTrusted","_this14","trustInfo","checkKeyBackupAndEnable","_this15","checkResult","checkKeyBackup","checkCrossSigningPrivateKey","signing","PkSigning","init_with_seed","_signing","afterCrossSigningLocalKeyChange","_this16","signedDevice","upload","_ref9","shouldEmit","uploadKeySignatures","then","response","failures","KeySignatureUploadFailure","catch","shouldUpgradeCb","shouldUpgradeDeviceVerifications","users","upgradeInfo","checkForDeviceVerificationUpgrade","fromStorage","usersToUpgrade","setDeviceVerified","_this17","trustLevel","firstUse","isVerified","deviceIds","checkForValidDeviceSignature","map","_this18","signatures","signame","split","verifySignature","push","_unused","getCrossSigningKeyId","Master","getCrossSigningId","userCrossSigning","getUserVerificationStatus","_this19","pinCurrentUserIdentity","getDeviceVerificationStatus","_this20","checkDeviceInfoTrust","trustedLocally","trustCrossSig","checkIfOwnDeviceCrossSigned","_userCrossSigning$che","_arguments5","_this21","masterChanged","masterExistsNotLocallyCached","has","ret","_signing2","oldSelfSigningId","oldUserSigningId","selfSigningChanged","userSigningChanged","selfSigningExistsNotLocallyCached","userSigningExistsNotLocallyCached","keySignatures","_signing4","_signing6","deviceSig","assign","keysToUpload","_ref10","getBackupDecryptor","privKey","makeAlgorithm","keyMatches","reject","errcode","RESTORE_BACKUP_ERROR_BAD_KEY","importBackedUpRoomKeys","backupVersion","source","importRoomKeys","_this22","clearKeys","storeCrossSigningKeys","_this23","user_signing","includes","enableLazyLoading","lazyLoadMembers","registerEventHandlers","eventEmitter","Membership","onMembership","ToDeviceEvent","Timeline","onTimelineEvent","start","stop","getDeviceEd25519Key","getDeviceCurve25519Key","getOwnDeviceKeys","_this24","ed25519","curve25519","setGlobalBlacklistUnverifiedDevices","value","globalBlacklistUnverifiedDevices","getGlobalBlacklistUnverifiedDevices","uploadDeviceKeys","device_id","user_id","uploadKeysRequest","device_keys","getNeedsNewFallback","needsNewFallback","maybeUploadOneTimeKeys","_this25","uploadPeriod","maxKeysPerCycle","oneTimeKeyCheckInProgress","now","Date","lastOneTimeKeyCheck","maxOneTimeKeys","maxNumberOfOneTimeKeys","keyLimit","Math","floor","uploadLoop","_ref12","keyCount","keysThisLoop","min","generateOneTimeKeys","fallbackKeys","getFallbackKey","fallbackCleanup","clearTimeout","generateFallbackKey","res","uploadOneTimeKeys","one_time_key_counts","signed_curve25519","_x7","oneTimeKeyCount","stack","finally","_this26","promises","fallbackJson","fallback","oneTimeKeys","getOneTimeKeys","oneTimeJson","hasOwnProperty","all","requestBody","one_time_keys","setTimeout","forgetOldFallbackKey","markKeysAsPublished","userIds","forceDownload","getStoredDevicesForUser","getUserDeviceInfo","_arguments6","_this27","downloadUncached","deviceMapByUserId","usersWithoutDeviceInfo","_loop","_userId4","deviceInfos","deviceMap","newDeviceInfoMap","forEach","deviceInfoMap","saveDeviceList","delay","_arguments7","_this28","setDeviceVerification","crossSignDevice","_this29","_arguments8","_this30","blocked","xsk","gotKeyId","values","signUser","_ref14","_ref13","_x8","dev","verificationStatus","UNVERIFIED","BLOCKED","knownStatus","_ref16","_ref15","_x9","findVerificationRequestDMInProgress","roomId","findRequestInProgress","getVerificationRequestsToDeviceInProgress","getRequestsInProgress","requestVerificationDM","existingRequest","requestVerificationWithChannel","requestVerification","makeTransactionId","requestOwnUserVerification","requestDeviceVerification","requestsMap","_this31","transactionId","setRequestByChannel","sendRequest","racingRequest","getRequestByChannel","beginKeyVerification","getRequestBySenderAndTxnId","setRequestBySenderAndTxnId","legacyDeviceVerification","_this32","verifier","race","verify","waitFor","r","started","getOlmSessionsForUser","_this33","result","deviceKey","getIdentityKey","sessions","getSessionInfoForDevice","deviceIdKey","getEventSenderDeviceInfo","senderKey","getSenderKey","getWireContent","isKeySourceUntrusted","getDeviceByIdentityKey","claimedKey","getClaimedEd25519Key","getFingerprint","getEventEncryptionInfo","_event$getSenderKey","_this$deviceList$getD","encrypted","authenticated","sender","mismatchedSender","getEncryptionInfoForEvent","_this34","encryptionInfo","senderId","shieldColour","RED","shieldReason","MISMATCHED_SENDER_KEY","userTrust","GREY","AUTHENTICITY_NOT_GUARANTEED","NONE","eventSenderTrust","UNKNOWN_DEVICE","UNSIGNED_DEVICE","forceDiscardSession","alg","roomEncryptors","setRoomEncryption","config","inhibitDeviceQuery","_this35","getRoom","setRoomEncryptionImpl","refreshOutdatedDeviceLists","_this36","existingConfig","getRoomEncryption","JSON","stringify","existingAlg","storeConfigPromise","AlgClass","ENCRYPTION_CLASSES","crypto","membersLoaded","trackRoomDevicesImpl","onState","_state","off","Update","trackRoomDevices","_this37","trackMembers","_ref17","members","getEncryptionTargetMembers","m","promise","roomDeviceTrackingState","err","ensureOlmSessionsForUsers","force","devicesByUser","userDevices","ensureOlmSessionsForDevices","exportRoomKeys","_this38","exportedSessions","STORE_INBOUND_GROUP_SESSIONS","getAllEndToEndInboundGroupSessions","s","sess","exportInboundGroupSession","sessionId","sessionData","first_known_index","MEGOLM_ALGORITHM","exportRoomKeysAsJson","_this39","successes","total","updateProgress","_opts$progressCallbac","progressCallback","stage","room_id","getRoomDecryptor","importRoomKey","importRoomKeysAsJson","_this40","parse","countSessionsNeedingBackup","prepareToEncrypt","encryptEvent","_this41","content","mRelatesTo","elementPerfMetrics","encryptedContent","encryptMessage","makeEncrypted","decryptEvent","_this42","isRedacted","redactionEvent","_objectSpread","getUnsigned","redacted_because","redactedBecause","isEncrypted","decryptedEvent","clearEvent","unsigned","processDeviceLists","deviceLists","_this43","evalDeviceListChanges","requestRoomKey","recipients","resend","queueRoomKeyRequest","sendKeyRequestsImmediately","sendQueuedRequests","cancelRoomKeyRequest","cancelAndResendAllOutgoingKeyRequests","_this44","cancelAndResendAllOutgoingRequests","onCryptoEvent","_this45","onSyncWillProcess","syncData","_this46","oldSyncToken","stopTrackingAllDeviceLists","onSyncCompleted","_this47","_syncData$nextSyncTok","setSyncToken","nextSyncToken","catchingUp","processReceivedRoomKeyRequests","_this48","isArray","u","invalidateUserDeviceList","left","e2eUserIds","Set","getTrackedE2eUsers","stopTrackingDeviceList","_this49","getTrackedE2eRooms","getRooms","filter","myMembership","getMyMembership","Join","Invite","encryptAndSendToDevices","userDeviceInfoArr","payload","_this50","toDeviceBatch","prepareToDeviceBatch","queueToDevice","_this51","eventType","RoomMessageEncrypted","batch","_ref19","_ref18","OLM_ALGORITHM","sender_key","ciphertext","encryptMessageForDevice","_x10","msg","encryptToDeviceMessages","_this52","_ref20","_ref21","preprocessToDeviceMessages","events","toDevice","_toDevice$content","updateOneTimeKeyCount","currentCount","isFinite","TypeError","processKeyCounts","oneTimeKeysCounts","unusedFallbackKeys","checkedForBackup","code","session_id","reason","roomDecryptors","getRoomDecryptors","decryptor","retryDecryptionFromSender","canCreateRequest","getEventType","from_device","_arguments9","_this53","isLiveEvent","isSending","status","SENT","eventIdListener","statusListener","CANCELLED","LocalEventIdReplaced","Status","removeListener","getRequest","isNewRequest","setRequest","setVerificationRequest","handleEvent","initiatedByMe","invalid","observeOnly","_this54","UndecryptableToDeviceEvent","retryDecryption","forceNewSessionRetryTimeDevices","forceNewSessionRetryTime","getOrCreate","toUTCString","recordSessionProblem","sendToDevice","requestsToResend","getOutgoingSentRoomKeyRequest","keyReq","_this$clientStore$get","membership","shouldEncryptForInvitedMembers","action","req","IncomingRoomKeyRequest","receivedRoomKeyRequests","IncomingRoomKeyRequestCancellation","receivedRoomKeyRequestCancellations","_this55","processingRoomKeyRequests","requests","cancellations","processReceivedRoomKeyRequest","cancellation","processReceivedRoomKeyRequestCancellation","_this56","body","requestId","encryptor","reshareKeyWithDevice","hasKeysForKeyRequest","share","shareKeysWithDevice","RoomKeyRequest","_this57","RoomKeyRequestCancellation","decryptors","UNKNOWN_ENCRYPTION_ALGORITHM","d","obj","_this58","sigs","userSignatures","sign","isRoomEncrypted","isEncryptionEnabledInRoom","_this59","isDehydrationSupported","startDehydration","createNewKey","restoreKeyBackup","restoreKeyBackupWithPassphrase","indexOf","x","parseInt","requesting_device_id","request_id"],"sources":["../../src/crypto/index.ts"],"sourcesContent":["/*\nCopyright 2016 OpenMarket Ltd\nCopyright 2017 Vector Creations Ltd\nCopyright 2018-2019 New Vector Ltd\nCopyright 2019-2021 The Matrix.org Foundation C.I.C.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n*/\n\nimport anotherjson from \"another-json\";\nimport { v4 as uuidv4 } from \"uuid\";\n\nimport type { IDeviceKeys, IEventDecryptionResult, IMegolmSessionData, IOneTimeKey } from \"../@types/crypto.ts\";\nimport type { PkDecryption, PkSigning } from \"@matrix-org/olm\";\nimport { EventType, ToDeviceMessageId } from \"../@types/event.ts\";\nimport { TypedReEmitter } from \"../ReEmitter.ts\";\nimport { logger } from \"../logger.ts\";\nimport { IExportedDevice, OlmDevice } from \"./OlmDevice.ts\";\nimport { IOlmDevice } from \"./algorithms/megolm.ts\";\nimport * as olmlib from \"./olmlib.ts\";\nimport { DeviceInfoMap, DeviceList } from \"./DeviceList.ts\";\nimport { DeviceInfo, IDevice } from \"./deviceinfo.ts\";\nimport type { DecryptionAlgorithm, EncryptionAlgorithm } from \"./algorithms/index.ts\";\nimport * as algorithms from \"./algorithms/index.ts\";\nimport { createCryptoStoreCacheCallbacks, CrossSigningInfo, DeviceTrustLevel, UserTrustLevel } from \"./CrossSigning.ts\";\nimport { EncryptionSetupBuilder } from \"./EncryptionSetup.ts\";\nimport { SecretStorage as LegacySecretStorage } from \"./SecretStorage.ts\";\nimport { CrossSigningKey, ICreateSecretStorageOpts, IEncryptedEventInfo, IRecoveryKey } from \"./api.ts\";\nimport { OutgoingRoomKeyRequestManager } from \"./OutgoingRoomKeyRequestManager.ts\";\nimport { IndexedDBCryptoStore } from \"./store/indexeddb-crypto-store.ts\";\nimport { VerificationBase } from \"./verification/Base.ts\";\nimport { ReciprocateQRCode, SCAN_QR_CODE_METHOD, SHOW_QR_CODE_METHOD } from \"./verification/QRCode.ts\";\nimport { SAS as SASVerification } from \"./verification/SAS.ts\";\nimport { keyFromPassphrase } from \"./key_passphrase.ts\";\nimport { VerificationRequest } from \"./verification/request/VerificationRequest.ts\";\nimport { InRoomChannel, InRoomRequests } from \"./verification/request/InRoomChannel.ts\";\nimport { Request, ToDeviceChannel, ToDeviceRequests } from \"./verification/request/ToDeviceChannel.ts\";\nimport { IllegalMethod } from \"./verification/IllegalMethod.ts\";\nimport { KeySignatureUploadError } from \"../errors.ts\";\nimport { DehydrationManager } from \"./dehydration.ts\";\nimport { BackupManager, LibOlmBackupDecryptor, backupTrustInfoFromLegacyTrustInfo } from \"./backup.ts\";\nimport { IStore } from \"../store/index.ts\";\nimport { Room, RoomEvent } from \"../models/room.ts\";\nimport { RoomMember, RoomMemberEvent } from \"../models/room-member.ts\";\nimport { EventStatus, IContent, IEvent, MatrixEvent, MatrixEventEvent } from \"../models/event.ts\";\nimport { ToDeviceBatch, ToDevicePayload } from \"../models/ToDeviceMessage.ts\";\nimport { ClientEvent, IKeysUploadResponse, ISignedKey, IUploadKeySignaturesResponse, MatrixClient } from \"../client.ts\";\nimport { IRoomEncryption, RoomList } from \"./RoomList.ts\";\nimport { IKeyBackupInfo } from \"./keybackup.ts\";\nimport { ISyncStateData } from \"../sync.ts\";\nimport { CryptoStore } from \"./store/base.ts\";\nimport { IVerificationChannel } from \"./verification/request/Channel.ts\";\nimport { TypedEventEmitter } from \"../models/typed-event-emitter.ts\";\nimport { IDeviceLists, ISyncResponse, IToDeviceEvent } from \"../sync-accumulator.ts\";\nimport { ISignatures } from \"../@types/signed.ts\";\nimport { IMessage } from \"./algorithms/olm.ts\";\nimport {\n BackupDecryptor,\n CryptoBackend,\n DecryptionError,\n OnSyncCompletedData,\n} from \"../common-crypto/CryptoBackend.ts\";\nimport { RoomState, RoomStateEvent } from \"../models/room-state.ts\";\nimport { MapWithDefault, recursiveMapToObject } from \"../utils.ts\";\nimport {\n AccountDataClient,\n AddSecretStorageKeyOpts,\n calculateKeyCheck,\n SECRET_STORAGE_ALGORITHM_V1_AES,\n SecretStorageKeyDescription,\n SecretStorageKeyObject,\n SecretStorageKeyTuple,\n ServerSideSecretStorageImpl,\n} from \"../secret-storage.ts\";\nimport { ISecretRequest } from \"./SecretSharing.ts\";\nimport {\n BackupTrustInfo,\n BootstrapCrossSigningOpts,\n CrossSigningKeyInfo,\n CrossSigningStatus,\n decodeRecoveryKey,\n DecryptionFailureCode,\n DeviceIsolationMode,\n DeviceVerificationStatus,\n encodeRecoveryKey,\n EventEncryptionInfo,\n EventShieldColour,\n EventShieldReason,\n ImportRoomKeysOpts,\n KeyBackupCheck,\n KeyBackupInfo,\n OwnDeviceKeys,\n CryptoEvent as CryptoApiCryptoEvent,\n CryptoEventHandlerMap as CryptoApiCryptoEventHandlerMap,\n KeyBackupRestoreResult,\n KeyBackupRestoreOpts,\n} from \"../crypto-api/index.ts\";\nimport { Device, DeviceMap } from \"../models/device.ts\";\nimport { deviceInfoToDevice } from \"./device-converter.ts\";\nimport { ClientPrefix, MatrixError, Method } from \"../http-api/index.ts\";\nimport { decodeBase64, encodeBase64 } from \"../base64.ts\";\nimport { KnownMembership } from \"../@types/membership.ts\";\nimport decryptAESSecretStorageItem from \"../utils/decryptAESSecretStorageItem.ts\";\nimport encryptAESSecretStorageItem from \"../utils/encryptAESSecretStorageItem.ts\";\nimport { AESEncryptedSecretStoragePayload } from \"../@types/AESEncryptedSecretStoragePayload.ts\";\n\n/* re-exports for backwards compatibility */\nexport type {\n BootstrapCrossSigningOpts as IBootstrapCrossSigningOpts,\n CryptoCallbacks as ICryptoCallbacks,\n} from \"../crypto-api/index.ts\";\n\nconst DeviceVerification = DeviceInfo.DeviceVerification;\n\nconst defaultVerificationMethods = {\n [ReciprocateQRCode.NAME]: ReciprocateQRCode,\n [SASVerification.NAME]: SASVerification,\n\n // These two can't be used for actual verification, but we do\n // need to be able to define them here for the verification flows\n // to start.\n [SHOW_QR_CODE_METHOD]: IllegalMethod,\n [SCAN_QR_CODE_METHOD]: IllegalMethod,\n} as const;\n\n/**\n * verification method names\n */\n// legacy export identifier\nexport const verificationMethods = {\n RECIPROCATE_QR_CODE: ReciprocateQRCode.NAME,\n SAS: SASVerification.NAME,\n} as const;\n\nexport type VerificationMethod = keyof typeof verificationMethods | string;\n\nexport function isCryptoAvailable(): boolean {\n return Boolean(globalThis.Olm);\n}\n\n// minimum time between attempting to unwedge an Olm session, if we succeeded\n// in creating a new session\nconst MIN_FORCE_SESSION_INTERVAL_MS = 60 * 60 * 1000; // 1 hour\n// minimum time between attempting to unwedge an Olm session, if we failed\n// to create a new session\nconst FORCE_SESSION_RETRY_INTERVAL_MS = 5 * 60 * 1000; // 5 minutes\n\ninterface IInitOpts {\n exportedOlmDevice?: IExportedDevice;\n pickleKey?: string;\n}\n\n/* eslint-disable camelcase */\ninterface IRoomKey {\n room_id: string;\n algorithm: string;\n}\n\n/**\n * The parameters of a room key request. The details of the request may\n * vary with the crypto algorithm, but the management and storage layers for\n * outgoing requests expect it to have 'room_id' and 'session_id' properties.\n */\nexport interface IRoomKeyRequestBody extends IRoomKey {\n session_id: string;\n sender_key: string;\n}\n\n/* eslint-enable camelcase */\n\ninterface IDeviceVerificationUpgrade {\n devices: DeviceInfo[];\n crossSigningInfo: CrossSigningInfo;\n}\n\nexport interface ICheckOwnCrossSigningTrustOpts {\n allowPrivateKeyRequests?: boolean;\n}\n\ninterface IUserOlmSession {\n deviceIdKey: string;\n sessions: {\n sessionId: string;\n hasReceivedMessage: boolean;\n }[];\n}\n\nexport interface IRoomKeyRequestRecipient {\n userId: string;\n deviceId: string;\n}\n\ninterface ISignableObject {\n signatures?: ISignatures;\n unsigned?: object;\n}\n\nexport interface IRequestsMap {\n getRequest(event: MatrixEvent): VerificationRequest | undefined;\n getRequestByChannel(channel: IVerificationChannel): VerificationRequest | undefined;\n setRequest(event: MatrixEvent, request: VerificationRequest): void;\n setRequestByChannel(channel: IVerificationChannel, request: VerificationRequest): void;\n}\n\n/* eslint-disable camelcase */\nexport interface IOlmEncryptedContent {\n algorithm: typeof olmlib.OLM_ALGORITHM;\n sender_key: string;\n ciphertext: Record<string, IMessage>;\n [ToDeviceMessageId]?: string;\n}\n\nexport interface IMegolmEncryptedContent {\n algorithm: typeof olmlib.MEGOLM_ALGORITHM;\n sender_key: string;\n session_id: string;\n device_id: string;\n ciphertext: string;\n [ToDeviceMessageId]?: string;\n}\n/* eslint-enable camelcase */\n\nexport type IEncryptedContent = IOlmEncryptedContent | IMegolmEncryptedContent;\n\nexport enum CryptoEvent {\n /** @deprecated Event not fired by the rust crypto */\n DeviceVerificationChanged = \"deviceVerificationChanged\",\n UserTrustStatusChanged = CryptoApiCryptoEvent.UserTrustStatusChanged,\n /** @deprecated Event not fired by the rust crypto */\n UserCrossSigningUpdated = \"userCrossSigningUpdated\",\n /** @deprecated Event not fired by the rust crypto */\n RoomKeyRequest = \"crypto.roomKeyRequest\",\n /** @deprecated Event not fired by the rust crypto */\n RoomKeyRequestCancellation = \"crypto.roomKeyRequestCancellation\",\n KeyBackupStatus = CryptoApiCryptoEvent.KeyBackupStatus,\n KeyBackupFailed = CryptoApiCryptoEvent.KeyBackupFailed,\n KeyBackupSessionsRemaining = CryptoApiCryptoEvent.KeyBackupSessionsRemaining,\n\n /**\n * Fires when a new valid backup decryption key is in cache.\n * This will happen when a secret is received from another session, from secret storage,\n * or when a new backup is created from this session.\n *\n * The payload is the version of the backup for which we have the key for.\n *\n * This event is only fired by the rust crypto backend.\n */\n KeyBackupDecryptionKeyCached = CryptoApiCryptoEvent.KeyBackupDecryptionKeyCached,\n\n /** @deprecated Event not fired by the rust crypto */\n KeySignatureUploadFailure = \"crypto.keySignatureUploadFailure\",\n /** @deprecated Use `VerificationRequestReceived`. */\n VerificationRequest = \"crypto.verification.request\",\n\n /**\n * Fires when a key verification request is received.\n *\n * The payload is a {@link Crypto.VerificationRequest}.\n */\n VerificationRequestReceived = CryptoApiCryptoEvent.VerificationRequestReceived,\n\n /** @deprecated Event not fired by the rust crypto */\n Warning = \"crypto.warning\",\n /** @deprecated Use {@link DevicesUpdated} instead when using rust crypto */\n WillUpdateDevices = CryptoApiCryptoEvent.WillUpdateDevices,\n DevicesUpdated = CryptoApiCryptoEvent.DevicesUpdated,\n KeysChanged = CryptoApiCryptoEvent.KeysChanged,\n\n /**\n * Fires when data is being migrated from legacy crypto to rust crypto.\n *\n * The payload is a pair `(progress, total)`, where `progress` is the number of steps completed so far, and\n * `total` is the total number of steps. When migration is complete, a final instance of the event is emitted, with\n * `progress === total === -1`.\n */\n LegacyCryptoStoreMigrationProgress = CryptoApiCryptoEvent.LegacyCryptoStoreMigrationProgress,\n}\n\nexport type CryptoEventHandlerMap = CryptoApiCryptoEventHandlerMap & {\n /**\n * Fires when a device is marked as verified/unverified/blocked/unblocked by\n * {@link MatrixClient#setDeviceVerified | MatrixClient.setDeviceVerified} or\n * {@link MatrixClient#setDeviceBlocked | MatrixClient.setDeviceBlocked}.\n *\n * @param userId - the owner of the verified device\n * @param deviceId - the id of the verified device\n * @param deviceInfo - updated device information\n */\n [CryptoEvent.DeviceVerificationChanged]: (userId: string, deviceId: string, deviceInfo: DeviceInfo) => void;\n /**\n * Fires when we receive a room key request\n *\n * @param request - request details\n */\n [CryptoEvent.RoomKeyRequest]: (request: IncomingRoomKeyRequest) => void;\n /**\n * Fires when we receive a room key request cancellation\n */\n [CryptoEvent.RoomKeyRequestCancellation]: (request: IncomingRoomKeyRequestCancellation) => void;\n [CryptoEvent.KeySignatureUploadFailure]: (\n failures: IUploadKeySignaturesResponse[\"failures\"],\n source: \"checkOwnCrossSigningTrust\" | \"afterCrossSigningLocalKeyChange\" | \"setDeviceVerification\",\n upload: (opts: { shouldEmit: boolean }) => Promise<void>,\n ) => void;\n /**\n * Fires when a key verification is requested.\n *\n * Deprecated: use `CryptoEvent.VerificationRequestReceived`.\n */\n [CryptoEvent.VerificationRequest]: (request: VerificationRequest<any>) => void;\n /**\n * Fires when the app may wish to warn the user about something related\n * the end-to-end crypto.\n *\n * @param type - One of the strings listed above\n */\n [CryptoEvent.Warning]: (type: string) => void;\n [CryptoEvent.UserCrossSigningUpdated]: (userId: string) => void;\n\n [CryptoEvent.LegacyCryptoStoreMigrationProgress]: (progress: number, total: number) => void;\n};\n\nexport class Crypto extends TypedEventEmitter<CryptoEvent, CryptoEventHandlerMap> implements CryptoBackend {\n /**\n * @returns The version of Olm.\n */\n public static getOlmVersion(): [number, number, number] {\n return OlmDevice.getOlmVersion();\n }\n\n public readonly backupManager: BackupManager;\n public readonly crossSigningInfo: CrossSigningInfo;\n public readonly olmDevice: OlmDevice;\n public readonly deviceList: DeviceList;\n public readonly dehydrationManager: DehydrationManager;\n public readonly secretStorage: LegacySecretStorage;\n\n private readonly roomList: RoomList;\n private readonly reEmitter: TypedReEmitter<CryptoEvent, CryptoEventHandlerMap>;\n private readonly verificationMethods: Map<VerificationMethod, typeof VerificationBase>;\n public readonly supportedAlgorithms: string[];\n private readonly outgoingRoomKeyRequestManager: OutgoingRoomKeyRequestManager;\n private readonly toDeviceVerificationRequests: ToDeviceRequests;\n public readonly inRoomVerificationRequests: InRoomRequests;\n\n private trustCrossSignedDevices = true;\n // the last time we did a check for the number of one-time-keys on the server.\n private lastOneTimeKeyCheck: number | null = null;\n private oneTimeKeyCheckInProgress = false;\n\n // EncryptionAlgorithm instance for each room\n private roomEncryptors = new Map<string, EncryptionAlgorithm>();\n // map from algorithm to DecryptionAlgorithm instance, for each room\n private roomDecryptors = new Map<string, Map<string, DecryptionAlgorithm>>();\n\n private deviceKeys: Record<string, string> = {}; // type: key\n\n public globalBlacklistUnverifiedDevices = false;\n public globalErrorOnUnknownDevices = true;\n\n // list of IncomingRoomKeyRequests/IncomingRoomKeyRequestCancellations\n // we received in the current sync.\n private receivedRoomKeyRequests: IncomingRoomKeyRequest[] = [];\n private receivedRoomKeyRequestCancellations: IncomingRoomKeyRequestCancellation[] = [];\n // true if we are currently processing received room key requests\n private processingRoomKeyRequests = false;\n // controls whether device tracking is delayed\n // until calling encryptEvent or trackRoomDevices,\n // or done immediately upon enabling room encryption.\n private lazyLoadMembers = false;\n // in case lazyLoadMembers is true,\n // track if an initial tracking of all the room members\n // has happened for a given room. This is delayed\n // to avoid loading room members as long as possible.\n private roomDeviceTrackingState: { [roomId: string]: Promise<void> } = {};\n\n // The timestamp of the minimum time at which we will retry forcing establishment\n // of a new session for each device, in milliseconds.\n // {\n // userId: {\n // deviceId: 1234567890000,\n // },\n // }\n // Map: user Id → device Id → timestamp\n private forceNewSessionRetryTime: MapWithDefault<string, MapWithDefault<string, number>> = new MapWithDefault(\n () => new MapWithDefault(() => 0),\n );\n\n // This flag will be unset whilst the client processes a sync response\n // so that we don't start requesting keys until we've actually finished\n // processing the response.\n private sendKeyRequestsImmediately = false;\n\n private oneTimeKeyCount?: number;\n private needsNewFallback?: boolean;\n private fallbackCleanup?: ReturnType<typeof setTimeout>;\n\n /**\n * Cryptography bits\n *\n * This module is internal to the js-sdk; the public API is via MatrixClient.\n *\n * @internal\n *\n * @param baseApis - base matrix api interface\n *\n * @param userId - The user ID for the local user\n *\n * @param deviceId - The identifier for this device.\n *\n * @param clientStore - the MatrixClient data store.\n *\n * @param cryptoStore - storage for the crypto layer.\n *\n * @param verificationMethods - Array of verification methods to use.\n * Each element can either be a string from MatrixClient.verificationMethods\n * or a class that implements a verification method.\n */\n public constructor(\n public readonly baseApis: MatrixClient,\n public readonly userId: string,\n private readonly deviceId: string,\n private readonly clientStore: IStore,\n public readonly cryptoStore: CryptoStore,\n verificationMethods: Array<VerificationMethod | (typeof VerificationBase & { NAME: string })>,\n ) {\n super();\n\n logger.debug(\"Crypto: initialising roomlist...\");\n this.roomList = new RoomList(cryptoStore);\n\n this.reEmitter = new TypedReEmitter(this);\n\n if (verificationMethods) {\n this.verificationMethods = new Map();\n for (const method of verificationMethods) {\n if (typeof method === \"string\") {\n if (defaultVerificationMethods[method]) {\n this.verificationMethods.set(\n method,\n <typeof VerificationBase>defaultVerificationMethods[method],\n );\n }\n } else if (method[\"NAME\"]) {\n this.verificationMethods.set(method[\"NAME\"], method as typeof VerificationBase);\n } else {\n logger.warn(`Excluding unknown verification method ${method}`);\n }\n }\n } else {\n this.verificationMethods = new Map(Object.entries(defaultVerificationMethods)) as Map<\n VerificationMethod,\n typeof VerificationBase\n >;\n }\n\n this.backupManager = new BackupManager(baseApis, async () => {\n // try to get key from cache\n const cachedKey = await this.getSessionBackupPrivateKey();\n if (cachedKey) {\n return cachedKey;\n }\n\n // try to get key from secret storage\n const storedKey = await this.secretStorage.get(\"m.megolm_backup.v1\");\n\n if (storedKey) {\n // ensure that the key is in the right format. If not, fix the key and\n // store the fixed version\n const fixedKey = fixBackupKey(storedKey);\n if (fixedKey) {\n const keys = await this.secretStorage.getKey();\n await this.secretStorage.store(\"m.megolm_backup.v1\", fixedKey, [keys![0]]);\n }\n\n return decodeBase64(fixedKey || storedKey);\n }\n\n // try to get key from app\n if (this.baseApis.cryptoCallbacks && this.baseApis.cryptoCallbacks.getBackupKey) {\n return this.baseApis.cryptoCallbacks.getBackupKey();\n }\n\n throw new Error(\"Unable to get private key\");\n });\n\n this.olmDevice = new OlmDevice(cryptoStore);\n this.deviceList = new DeviceList(baseApis, cryptoStore, this.olmDevice);\n\n // XXX: This isn't removed at any point, but then none of the event listeners\n // this class sets seem to be removed at any point... :/\n this.deviceList.on(CryptoEvent.UserCrossSigningUpdated, this.onDeviceListUserCrossSigningUpdated);\n this.reEmitter.reEmit(this.deviceList, [CryptoEvent.DevicesUpdated, CryptoEvent.WillUpdateDevices]);\n\n this.supportedAlgorithms = Array.from(algorithms.DECRYPTION_CLASSES.keys());\n\n this.outgoingRoomKeyRequestManager = new OutgoingRoomKeyRequestManager(\n baseApis,\n this.deviceId,\n this.cryptoStore,\n );\n\n this.toDeviceVerificationRequests = new ToDeviceRequests();\n this.inRoomVerificationRequests = new InRoomRequests();\n\n const cryptoCallbacks = this.baseApis.cryptoCallbacks || {};\n const cacheCallbacks = createCryptoStoreCacheCallbacks(cryptoStore, this.olmDevice);\n\n this.crossSigningInfo = new CrossSigningInfo(userId, cryptoCallbacks, cacheCallbacks);\n // Yes, we pass the client twice here: see SecretStorage\n this.secretStorage = new LegacySecretStorage(baseApis as AccountDataClient, cryptoCallbacks, baseApis);\n this.dehydrationManager = new DehydrationManager(this);\n\n // Assuming no app-supplied callback, default to getting from SSSS.\n if (!cryptoCallbacks.getCrossSigningKey && cryptoCallbacks.getSecretStorageKey) {\n cryptoCallbacks.getCrossSigningKey = async (type): Promise<Uint8Array | null> => {\n return CrossSigningInfo.getFromSecretStorage(type, this.secretStorage);\n };\n }\n }\n\n /**\n * Initialise the crypto module so that it is ready for use\n *\n * Returns a promise which resolves once the crypto module is ready for use.\n *\n * @param exportedOlmDevice - (Optional) data from exported device\n * that must be re-created.\n */\n public async init({ exportedOlmDevice, pickleKey }: IInitOpts = {}): Promise<void> {\n logger.log(\"Crypto: initialising Olm...\");\n await globalThis.Olm.init();\n logger.log(\n exportedOlmDevice\n ? \"Crypto: initialising Olm device from exported device...\"\n : \"Crypto: initialising Olm device...\",\n );\n await this.olmDevice.init({ fromExportedDevice: exportedOlmDevice, pickleKey });\n logger.log(\"Crypto: loading device list...\");\n await this.deviceList.load();\n\n // build our device keys: these will later be uploaded\n this.deviceKeys[\"ed25519:\" + this.deviceId] = this.olmDevice.deviceEd25519Key!;\n this.deviceKeys[\"curve25519:\" + this.deviceId] = this.olmDevice.deviceCurve25519Key!;\n\n logger.log(\"Crypto: fetching own devices...\");\n let myDevices = this.deviceList.getRawStoredDevicesForUser(this.userId);\n\n if (!myDevices) {\n myDevices = {};\n }\n\n if (!myDevices[this.deviceId]) {\n // add our own deviceinfo to the cryptoStore\n logger.log(\"Crypto: adding this device to the store...\");\n const deviceInfo = {\n keys: this.deviceKeys,\n algorithms: this.supportedAlgorithms,\n verified: DeviceVerification.VERIFIED,\n known: true,\n };\n\n myDevices[this.deviceId] = deviceInfo;\n this.deviceList.storeDevicesForUser(this.userId, myDevices);\n this.deviceList.saveIfDirty();\n }\n\n await this.cryptoStore.doTxn(\"readonly\", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {\n this.cryptoStore.getCrossSigningKeys(txn, (keys) => {\n // can be an empty object after resetting cross-signing keys, see storeTrustedSelfKeys\n if (keys && Object.keys(keys).length !== 0) {\n logger.log(\"Loaded cross-signing public keys from crypto store\");\n this.crossSigningInfo.setKeys(keys);\n }\n });\n });\n // make sure we are keeping track of our own devices\n // (this is important for key backups & things)\n this.deviceList.startTrackingDeviceList(this.userId);\n\n logger.debug(\"Crypto: initialising roomlist...\");\n await this.roomList.init();\n\n logger.log(\"Crypto: checking for key backup...\");\n this.backupManager.checkAndStart();\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#setDeviceIsolationMode}.\n */\n public setDeviceIsolationMode(isolationMode: DeviceIsolationMode): void {\n throw new Error(\"Not supported\");\n }\n /**\n * Implementation of {@link Crypto.CryptoApi#getVersion}.\n */\n public getVersion(): string {\n const olmVersionTuple = Crypto.getOlmVersion();\n return `Olm ${olmVersionTuple[0]}.${olmVersionTuple[1]}.${olmVersionTuple[2]}`;\n }\n\n /**\n * Whether to trust a others users signatures of their devices.\n * If false, devices will only be considered 'verified' if we have\n * verified that device individually (effectively disabling cross-signing).\n *\n * Default: true\n *\n * @returns True if trusting cross-signed devices\n */\n public getTrustCrossSignedDevices(): boolean {\n return this.trustCrossSignedDevices;\n }\n\n /**\n * @deprecated Use {@link Crypto.CryptoApi#getTrustCrossSignedDevices}.\n */\n public getCryptoTrustCrossSignedDevices(): boolean {\n return this.trustCrossSignedDevices;\n }\n\n /**\n * See getCryptoTrustCrossSignedDevices\n *\n * @param val - True to trust cross-signed devices\n */\n public setTrustCrossSignedDevices(val: boolean): void {\n this.trustCrossSignedDevices = val;\n\n for (const userId of this.deviceList.getKnownUserIds()) {\n const devices = this.deviceList.getRawStoredDevicesForUser(userId);\n for (const deviceId of Object.keys(devices)) {\n const deviceTrust = this.checkDeviceTrust(userId, deviceId);\n // If the device is locally verified then isVerified() is always true,\n // so this will only have caused the value to change if the device is\n // cross-signing verified but not locally verified\n if (!deviceTrust.isLocallyVerified() && deviceTrust.isCrossSigningVerified()) {\n const deviceObj = this.deviceList.getStoredDevice(userId, deviceId)!;\n this.emit(CryptoEvent.DeviceVerificationChanged, userId, deviceId, deviceObj);\n }\n }\n }\n }\n\n /**\n * @deprecated Use {@link Crypto.CryptoApi#setTrustCrossSignedDevices}.\n */\n public setCryptoTrustCrossSignedDevices(val: boolean): void {\n this.setTrustCrossSignedDevices(val);\n }\n\n /**\n * Create a recovery key from a user-supplied passphrase.\n *\n * @param password - Passphrase string that can be entered by the user\n * when restoring the backup as an alternative to entering the recovery key.\n * Optional.\n * @returns Object with public key metadata, encoded private\n * recovery key which should be disposed of after displaying to the user,\n * and raw private key to avoid round tripping if needed.\n */\n public async createRecoveryKeyFromPassphrase(password?: string): Promise<IRecoveryKey> {\n const decryption = new globalThis.Olm.PkDecryption();\n try {\n if (password) {\n const derivation = await keyFromPassphrase(password);\n\n decryption.init_with_private_key(derivation.key);\n const privateKey = decryption.get_private_key();\n return {\n keyInfo: {\n passphrase: {\n algorithm: \"m.pbkdf2\",\n iterations: derivation.iterations,\n salt: derivation.salt,\n },\n },\n privateKey: privateKey,\n encodedPrivateKey: encodeRecoveryKey(privateKey),\n };\n } else {\n decryption.generate_key();\n const privateKey = decryption.get_private_key();\n return {\n privateKey: privateKey,\n encodedPrivateKey: encodeRecoveryKey(privateKey),\n };\n }\n } finally {\n decryption?.free();\n }\n }\n\n /**\n * Checks if the user has previously published cross-signing keys\n *\n * This means downloading the devicelist for the user and checking if the list includes\n * the cross-signing pseudo-device.\n *\n * @internal\n */\n public async userHasCrossSigningKeys(userId = this.userId): Promise<boolean> {\n await this.downloadKeys([userId]);\n return this.deviceList.getStoredCrossSigningForUser(userId) !== null;\n }\n\n /**\n * Checks whether cross signing:\n * - is enabled on this account and trusted by this device\n * - has private keys either cached locally or stored in secret storage\n *\n * If this function returns false, bootstrapCrossSigning() can be used\n * to fix things such that it returns true. That is to say, after\n * bootstrapCrossSigning() completes successfully, this function should\n * return true.\n *\n * The cross-signing API is currently UNSTABLE and may change without notice.\n *\n * @returns True if cross-signing is ready to be used on this device\n */\n public async isCrossSigningReady(): Promise<boolean> {\n const publicKeysOnDevice = this.crossSigningInfo.getId();\n const privateKeysExistSomewhere =\n (await this.crossSigningInfo.isStoredInKeyCache()) ||\n (await this.crossSigningInfo.isStoredInSecretStorage(this.secretStorage));\n\n return !!(publicKeysOnDevice && privateKeysExistSomewhere);\n }\n\n /**\n * Checks whether secret storage:\n * - is enabled on this account\n * - is storing cross-signing private keys\n * - is storing session backup key (if enabled)\n *\n * If this function returns false, bootstrapSecretStorage() can be used\n * to fix things such that it returns true. That is to say, after\n * bootstrapSecretStorage() completes successfully, this function should\n * return true.\n *\n * The Secure Secret Storage API is currently UNSTABLE and may change without notice.\n *\n * @returns True if secret storage is ready to be used on this device\n */\n public async isSecretStorageReady(): Promise<boolean> {\n const secretStorageKeyInAccount = await this.secretStorage.hasKey();\n const privateKeysInStorage = await this.crossSigningInfo.isStoredInSecretStorage(this.secretStorage);\n const sessionBackupInStorage =\n !this.backupManager.getKeyBackupEnabled() || (await this.baseApis.isKeyBackupKeyStored());\n\n return !!(secretStorageKeyInAccount && privateKeysInStorage && sessionBackupInStorage);\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#getCrossSigningStatus}\n */\n public async getCrossSigningStatus(): Promise<CrossSigningStatus> {\n const publicKeysOnDevice = Boolean(this.crossSigningInfo.getId());\n const privateKeysInSecretStorage = Boolean(\n await this.crossSigningInfo.isStoredInSecretStorage(this.secretStorage),\n );\n const cacheCallbacks = this.crossSigningInfo.getCacheCallbacks();\n const masterKey = Boolean(await cacheCallbacks.getCrossSigningKeyCache?.(\"master\"));\n const selfSigningKey = Boolean(await cacheCallbacks.getCrossSigningKeyCache?.(\"self_signing\"));\n const userSigningKey = Boolean(await cacheCallbacks.getCrossSigningKeyCache?.(\"user_signing\"));\n\n return {\n publicKeysOnDevice,\n privateKeysInSecretStorage,\n privateKeysCachedLocally: {\n masterKey,\n selfSigningKey,\n userSigningKey,\n },\n };\n }\n\n /**\n * Bootstrap cross-signing by creating keys if needed. If everything is already\n * set up, then no changes are made, so this is safe to run to ensure\n * cross-signing is ready for use.\n *\n * This function:\n * - creates new cross-signing keys if they are not found locally cached nor in\n * secret storage (if it has been setup)\n *\n * The cross-signing API is currently UNSTABLE and may change without notice.\n */\n public async bootstrapCrossSigning({\n authUploadDeviceSigningKeys,\n setupNewCrossSigning,\n }: BootstrapCrossSigningOpts = {}): Promise<void> {\n logger.log(\"Bootstrapping cross-signing\");\n\n const delegateCryptoCallbacks = this.baseApis.cryptoCallbacks;\n const builder = new EncryptionSetupBuilder(this.baseApis.store.accountData, delegateCryptoCallbacks);\n const crossSigningInfo = new CrossSigningInfo(\n this.userId,\n builder.crossSigningCallbacks,\n builder.crossSigningCallbacks,\n );\n\n // Reset the cross-signing keys\n const resetCrossSigning = async (): Promise<void> => {\n crossSigningInfo.resetKeys();\n // Sign master key with device key\n await this.signObject(crossSigningInfo.keys.master);\n\n // Store auth flow helper function, as we need to call it when uploading\n // to ensure we handle auth errors properly.\n builder.addCrossSigningKeys(authUploadDeviceSigningKeys, crossSigningInfo.keys);\n\n // Cross-sign own device\n const device = this.deviceList.getStoredDevice(this.userId, this.deviceId)!;\n const deviceSignature = await crossSigningInfo.signDevice(this.userId, device);\n builder.addKeySignature(this.userId, this.deviceId, deviceSignature!);\n\n // Sign message key backup with cross-signing master key\n if (this.backupManager.backupInfo) {\n await crossSigningInfo.signObject(this.backupManager.backupInfo.auth_data, \"master\");\n builder.addSessionBackup(this.backupManager.backupInfo);\n }\n };\n\n const publicKeysOnDevice = this.crossSigningInfo.getId();\n const privateKeysInCache = await this.crossSigningInfo.isStoredInKeyCache();\n const privateKeysInStorage = await this.crossSigningInfo.isStoredInSecretStorage(this.secretStorage);\n const privateKeysExistSomewhere = privateKeysInCache || privateKeysInStorage;\n\n // Log all relevant state for easier parsing of debug logs.\n logger.log({\n setupNewCrossSigning,\n publicKeysOnDevice,\n privateKeysInCache,\n privateKeysInStorage,\n privateKeysExistSomewhere,\n });\n\n if (!privateKeysExistSomewhere || setupNewCrossSigning) {\n logger.log(\"Cross-signing private keys not found locally or in secret storage, \" + \"creating new keys\");\n // If a user has multiple devices, it important to only call bootstrap\n // as part of some UI flow (and not silently during startup), as they\n // may have setup cross-signing on a platform which has not saved keys\n // to secret storage, and this would reset them. In such a case, you\n // should prompt the user to verify any existing devices first (and\n // request private keys from those devices) before calling bootstrap.\n await resetCrossSigning();\n } else if (publicKeysOnDevice && privateKeysInCache) {\n logger.log(\"Cross-signing public keys trusted and private keys found locally\");\n } else if (privateKeysInStorage) {\n logger.log(\n \"Cross-signing private keys not found locally, but they are available \" +\n \"in secret storage, reading storage and caching locally\",\n );\n await this.checkOwnCrossSigningTrust({\n allowPrivateKeyRequests: true,\n });\n }\n\n // Assuming no app-supplied callback, default to storing new private keys in\n // secret storage if it exists. If it does not, it is assumed this will be\n // done as part of setting up secret storage later.\n const crossSigningPrivateKeys = builder.crossSigningCallbacks.privateKeys;\n if (crossSigningPrivateKeys.size && !this.baseApis.cryptoCallbacks.saveCrossSigningKeys) {\n const secretStorage = new ServerSideSecretStorageImpl(\n builder.accountDataClientAdapter,\n builder.ssssCryptoCallbacks,\n );\n if (await secretStorage.hasKey()) {\n logger.log(\"Storing new cross-signing private keys in secret storage\");\n // This is writing to in-memory account data in\n // builder.accountDataClientAdapter so won't fail\n await CrossSigningInfo.storeInSecretStorage(crossSigningPrivateKeys, secretStorage);\n }\n }\n\n const operation = builder.buildOperation();\n await operation.apply(this);\n // This persists private keys and public keys as trusted,\n // only do this if apply succeeded for now as retry isn't in place yet\n await builder.persist(this);\n\n logger.log(\"Cross-signing ready\");\n }\n\n /**\n * Bootstrap Secure Secret Storage if needed by creating a default key. If everything is\n * already set up, then no changes are made, so this is safe to run to ensure secret\n * storage is ready for use.\n *\n * This function\n * - creates a new Secure Secret Storage key if no default key exists\n * - if a key backup exists, it is migrated to store the key in the Secret\n * Storage\n * - creates a backup if none exists, and one is requested\n * - migrates Secure Secret Storage to use the latest algorithm, if an outdated\n * algorithm is found\n *\n * The Secure Secret Storage API is currently UNSTABLE and may change without notice.\n *\n * Returns:\n * A promise which resolves to key creation data for\n * SecretStorage#addKey: an object with `passphrase` etc fields.\n */\n // TODO this does not resolve with what it says it does\n public async bootstrapSecretStorage({\n createSecretStorageKey = async (): Promise<IRecoveryKey> => ({}) as IRecoveryKey,\n keyBackupInfo,\n setupNewKeyBackup,\n setupNewSecretStorage,\n getKeyBackupPassphrase,\n }: ICreateSecretStorageOpts = {}): Promise<void> {\n logger.log(\"Bootstrapping Secure Secret Storage\");\n const delegateCryptoCallbacks = this.baseApis.cryptoCallbacks;\n const builder = new EncryptionSetupBuilder(this.baseApis.store.accountData, delegateCryptoCallbacks);\n const secretStorage = new ServerSideSecretStorageImpl(\n builder.accountDataClientAdapter,\n builder.ssssCryptoCallbacks,\n );\n\n // the ID of the new SSSS key, if we create one\n let newKeyId: string | null = null;\n\n // create a new SSSS key and set it as default\n const createSSSS = async (opts: AddSecretStorageKeyOpts): Promise<string> => {\n const { keyId, keyInfo } = await secretStorage.addKey(SECRET_STORAGE_ALGORITHM_V1_AES, opts);\n\n // make the private key available to encrypt 4S secrets\n builder.ssssCryptoCallbacks.addPrivateKey(keyId, keyInfo, opts.key);\n\n await secretStorage.setDefaultKeyId(keyId);\n return keyId;\n };\n\n const ensureCanCheckPassphrase = async (keyId: string, keyInfo: SecretStorageKeyDescription): Promise<void> => {\n if (!keyInfo.mac) {\n const key = await this.baseApis.cryptoCallbacks.getSecretStorageKey?.(\n { keys: { [keyId]: keyInfo } },\n \"\",\n );\n if (key) {\n const privateKey = key[1];\n builder.ssssCryptoCallbacks.addPrivateKey(keyId, keyInfo, privateKey);\n const { iv, mac } = await calculateKeyCheck(privateKey);\n keyInfo.iv = iv;\n keyInfo.mac = mac;\n\n await builder.setAccountData(`m.secret_storage.key.${keyId}`, keyInfo);\n }\n }\n };\n\n const signKeyBackupWithCrossSigning = async (keyBackupAuthData: IKeyBackupInfo[\"auth_data\"]): Promise<void> => {\n if (this.crossSigningInfo.getId() && (await this.crossSigningInfo.isStoredInKeyCache(\"master\"))) {\n try {\n logger.log(\"Adding cross-signing signature to key backup\");\n await this.crossSigningInfo.signObject(keyBackupAuthData, \"master\");\n } catch (e) {\n // This step is not critical (just helpful), so we catch here\n // and continue if it fails.\n logger.error(\"Signing key backup with cross-signing keys failed\", e);\n }\n } else {\n logger.warn(\"Cross-signing keys not available, skipping signature on key backup\");\n }\n };\n\n const oldSSSSKey = await this.secretStorage.getKey();\n const [oldKeyId, oldKeyInfo] = oldSSSSKey || [null, null];\n const storageExists =\n !setupNewSecretStorage && oldKeyInfo && oldKeyInfo.algorithm === SECRET_STORAGE_ALGORITHM_V1_AES;\n\n // Log all relevant state for easier parsing of debug logs.\n logger.log({\n keyBackupInfo,\n setupNewKeyBackup,\n setupNewSecretStorage,\n storageExists,\n oldKeyInfo,\n });\n\n if (!storageExists && !keyBackupInfo) {\n // either we don't have anything, or we've been asked to restart\n // from scratch\n logger.log(\"Secret storage does not exist, creating new storage key\");\n\n // if we already have a usable default SSSS key and aren't resetting\n // SSSS just use it. otherwise, create a new one\n // Note: we leave the old SSSS key in place: there could be other\n // secrets using it, in theory. We could move them to the new key but a)\n // that would mean we'd need to prompt for the old passphrase, and b)\n // it's not clear that would be the right thing to do anyway.\n const { keyInfo, privateKey } = await createSecretStorageKey();\n newKeyId = await createSSSS({ passphrase: keyInfo?.passphrase, key: privateKey, name: keyInfo?.name });\n } else if (!storageExists && keyBackupInfo) {\n // we have an existing backup, but no SSSS\n logger.log(\"Secret storage does not exist, using key backup key\");\n\n // if we have the backup key already cached, use it; otherwise use the\n // callback to prompt for the key\n const backupKey = (await this.getSessionBackupPrivateKey()) || (await getKeyBackupPassphrase?.());\n\n // create a new SSSS key and use the backup key as the new SSSS key\n const opts = { key: backupKey } as AddSecretStorageKeyOpts;\n\n if (keyBackupInfo.auth_data.private_key_salt && keyBackupInfo.auth_data.private_key_iterations) {\n // FIXME: ???\n opts.passphrase = {\n algorithm: \"m.pbkdf2\",\n iterations: keyBackupInfo.auth_data.private_key_iterations,\n salt: keyBackupInfo.auth_data.private_key_salt,\n bits: 256,\n };\n }\n\n newKeyId = await createSSSS(opts);\n\n // store the backup key in secret storage\n await secretStorage.store(\"m.megolm_backup.v1\", encodeBase64(backupKey!), [newKeyId]);\n\n // The backup is trusted because the user provided the private key.\n // Sign the backup with the cross-signing key so the key backup can\n // be trusted via cross-signing.\n await signKeyBackupWithCrossSigning(keyBackupInfo.auth_data);\n\n builder.addSessionBackup(keyBackupInfo);\n } else {\n // 4S is already set up\n logger.log(\"Secret storage exists\");\n\n if (oldKeyInfo && oldKeyInfo.algorithm === SECRET_STORAGE_ALGORITHM_V1_AES) {\n // make sure that the default key has the information needed to\n // check the passphrase\n await ensureCanCheckPassphrase(oldKeyId, oldKeyInfo);\n }\n }\n\n // If we have cross-signing private keys cached, store them in secret\n // storage if they are not there already.\n if (\n !this.baseApis.cryptoCallbacks.saveCrossSigningKeys &&\n (await this.isCrossSigningReady()) &&\n (newKeyId || !(await this.crossSigningInfo.isStoredInSecretStorage(secretStorage)))\n ) {\n logger.log(\"Copying cross-signing private keys from cache to secret storage\");\n const crossSigningPrivateKeys = await this.crossSigningInfo.getCrossSigningKeysFromCache();\n // This is writing to in-memory account data in\n // builder.accountDataClientAdapter so won't fail\n await CrossSigningInfo.storeInSecretStorage(crossSigningPrivateKeys, secretStorage);\n }\n\n if (setupNewKeyBackup && !keyBackupInfo) {\n logger.log(\"Creating new message key backup version\");\n const info = await this.baseApis.prepareKeyBackupVersion(\n null /* random key */,\n // don't write to secret storage, as it will write to this.secretStorage.\n // Here, we want to capture all the side-effects of bootstrapping,\n // and want to write to the local secretStorage object\n { secureSecretStorage: false },\n );\n // write the key to 4S\n const privateKey = decodeRecoveryKey(info.recovery_key);\n await secretStorage.store(\"m.megolm_backup.v1\", encodeBase64(privateKey));\n\n // create keyBackupInfo object to add to builder\n const data: IKeyBackupInfo = {\n algorithm: info.algorithm,\n auth_data: info.auth_data,\n };\n\n // Sign with cross-signing master key\n await signKeyBackupWithCrossSigning(data.auth_data);\n\n // sign with the device fingerprint\n await this.signObject(data.auth_data);\n\n builder.addSessionBackup(data);\n }\n\n // Cache the session backup key\n const sessionBackupKey = await secretStorage.get(\"m.megolm_backup.v1\");\n if (sessionBackupKey) {\n logger.info(\"Got session backup key from secret storage: caching\");\n // fix up the backup key if it's in the wrong format, and replace\n // in secret storage\n const fixedBackupKey = fixBackupKey(sessionBackupKey);\n if (fixedBackupKey) {\n const keyId = newKeyId || oldKeyId;\n await secretStorage.store(\"m.megolm_backup.v1\", fixedBackupKey, keyId ? [keyId] : null);\n }\n const decodedBackupKey = new Uint8Array(decodeBase64(fixedBackupKey || sessionBackupKey));\n builder.addSessionBackupPrivateKeyToCache(decodedBackupKey);\n } else if (this.backupManager.getKeyBackupEnabled()) {\n // key backup is enabled but we don't have a session backup key in SSSS: see if we have one in\n // the cache or the user can provide one, and if so, write it to SSSS\n const backupKey = (await this.getSessionBackupPrivateKey()) || (await getKeyBackupPassphrase?.());\n if (!backupKey) {\n // This will require user intervention to recover from since we don't have the key\n // backup key anywhere. The user should probably just set up a new key backup and\n // the key for the new backup will be stored. If we hit this scenario in the wild\n // with any frequency, we should do more than just log an error.\n logger.error(\"Key backup is enabled but couldn't get key backup key!\");\n return;\n }\n logger.info(\"Got session backup key from cache/user that wasn't in SSSS: saving to SSSS\");\n await secretStorage.store(\"m.megolm_backup.v1\", encodeBase64(backupKey));\n }\n\n const operation = builder.buildOperation();\n await operation.apply(this);\n // this persists private keys and public keys as trusted,\n // only do this if apply succeeded for now as retry isn't in place yet\n await builder.persist(this);\n\n logger.log(\"Secure Secret Storage ready\");\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#resetKeyBackup}.\n */\n public async resetKeyBackup(): Promise<void> {\n // Delete existing ones\n // There is no use case for having several key backup version live server side.\n // Even if not deleted it would be lost as the key to restore is lost.\n // There should be only one backup at a time.\n await this.backupManager.deleteAllKeyBackupVersions();\n\n const info = await this.backupManager.prepareKeyBackupVersion();\n\n await this.signObject(info.auth_data);\n\n // add new key backup\n const { version } = await this.baseApis.http.authedRequest<{ version: string }>(\n Method.Post,\n \"/room_keys/version\",\n undefined,\n info,\n {\n prefix: ClientPrefix.V3,\n },\n );\n\n logger.log(`Created backup version ${version}`);\n\n // write the key to 4S\n const privateKey = info.privateKey;\n await this.secretStorage.store(\"m.megolm_backup.v1\", encodeBase64(privateKey));\n await this.storeSessionBackupPrivateKey(privateKey);\n\n await this.backupManager.checkAndStart();\n await this.backupManager.scheduleAllGroupSessionsForBackup();\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#deleteKeyBackupVersion}.\n */\n public async deleteKeyBackupVersion(version: string): Promise<void> {\n await this.backupManager.deleteKeyBackupVersion(version);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#addKey}.\n */\n public addSecretStorageKey(\n algorithm: string,\n opts: AddSecretStorageKeyOpts,\n keyID?: string,\n ): Promise<SecretStorageKeyObject> {\n return this.secretStorage.addKey(algorithm, opts, keyID);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#hasKey}.\n */\n public hasSecretStorageKey(keyID?: string): Promise<boolean> {\n return this.secretStorage.hasKey(keyID);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getKey}.\n */\n public getSecretStorageKey(keyID?: string): Promise<SecretStorageKeyTuple | null> {\n return this.secretStorage.getKey(keyID);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#store}.\n */\n public storeSecret(name: string, secret: string, keys?: string[]): Promise<void> {\n return this.secretStorage.store(name, secret, keys);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#get}.\n */\n public getSecret(name: string): Promise<string | undefined> {\n return this.secretStorage.get(name);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#isStored}.\n */\n public isSecretStored(name: string): Promise<Record<string, SecretStorageKeyDescription> | null> {\n return this.secretStorage.isStored(name);\n }\n\n public requestSecret(name: string, devices: string[]): ISecretRequest {\n if (!devices) {\n devices = Object.keys(this.deviceList.getRawStoredDevicesForUser(this.userId));\n }\n return this.secretStorage.request(name, devices);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getDefaultKeyId}.\n */\n public getDefaultSecretStorageKeyId(): Promise<string | null> {\n return this.secretStorage.getDefaultKeyId();\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#setDefaultKeyId}.\n */\n public setDefaultSecretStorageKeyId(k: string): Promise<void> {\n return this.secretStorage.setDefaultKeyId(k);\n }\n\n /**\n * @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#checkKey}.\n */\n public checkSecretStorageKey(key: Uint8Array, info: SecretStorageKeyDescription): Promise<boolean> {\n return this.secretStorage.checkKey(key, info);\n }\n\n /**\n * Checks that a given secret storage private key matches a given public key.\n * This can be used by the getSecretStorageKey callback to verify that the\n * private key it is about to supply is the one that was requested.\n *\n * @param privateKey - The private key\n * @param expectedPublicKey - The public key\n * @returns true if the key matches, otherwise false\n */\n public checkSecretStoragePrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean {\n let decryption: PkDecryption | null = null;\n try {\n decryption = new globalThis.Olm.PkDecryption();\n const gotPubkey = decryption.init_with_private_key(privateKey);\n // make sure it agrees with the given pubkey\n return gotPubkey === expectedPublicKey;\n } finally {\n decryption?.free();\n }\n }\n\n /**\n * Fetches the backup private key, if cached\n * @returns the key, if any, or null\n */\n public async getSessionBackupPrivateKey(): Promise<Uint8Array | null> {\n const encodedKey = await new Promise<Uint8Array | AESEncryptedSecretStoragePayload | string | null>(\n (resolve) => {\n this.cryptoStore.doTxn(\"readonly\", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {\n this.cryptoStore.getSecretStorePrivateKey(txn, resolve, \"m.megolm_backup.v1\");\n });\n },\n );\n\n let key: Uint8Array | null = null;\n\n // make sure we have a Uint8Array, rather than a string\n if (typeof encodedKey === \"string\") {\n key = new Uint8Array(decodeBase64(fixBackupKey(encodedKey) || encodedKey));\n await this.storeSessionBackupPrivateKey(key);\n }\n if (encodedKey && typeof encodedKey === \"object\" && \"ciphertext\" in encodedKey) {\n const pickleKey = Buffer.from(this.olmDevice.pickleKey);\n const decrypted = await decryptAESSecretStorageItem(encodedKey, pickleKey, \"m.megolm_backup.v1\");\n key = decodeBase64(decrypted);\n }\n return key;\n }\n\n /**\n * Stores the session backup key to the cache\n * @param key - the private key\n * @returns a promise so you can catch failures\n */\n public async storeSessionBackupPrivateKey(key: ArrayLike<number>, version?: string): Promise<void> {\n if (!(key instanceof Uint8Array)) {\n // eslint-disable-next-line @typescript-eslint/no-base-to-string\n throw new Error(`storeSessionBackupPrivateKey expects Uint8Array, got ${key}`);\n }\n const pickleKey = Buffer.from(this.olmDevice.pickleKey);\n const encryptedKey = await encryptAESSecretStorageItem(encodeBase64(key), pickleKey, \"m.megolm_backup.v1\");\n return this.cryptoStore.doTxn(\"readwrite\", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {\n this.cryptoStore.storeSecretStorePrivateKey(txn, \"m.megolm_backup.v1\", encryptedKey);\n });\n }\n\n /**\n * Implementation of {@link Crypto.loadSessionBackupPrivateKeyFromSecretStorage}.\n */\n public loadSessionBackupPrivateKeyFromSecretStorage(): Promise<void> {\n throw new Error(\"Not implmeented\");\n }\n\n /**\n * Get the current status of key backup.\n *\n * Implementation of {@link Crypto.CryptoApi.getActiveSessionBackupVersion}.\n */\n public async getActiveSessionBackupVersion(): Promise<string | null> {\n if (this.backupManager.getKeyBackupEnabled()) {\n return this.backupManager.version ?? null;\n }\n return null;\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#getKeyBackupInfo}.\n */\n public async getKeyBackupInfo(): Promise<KeyBackupInfo | null> {\n throw new Error(\"Not implemented\");\n }\n\n /**\n * Determine if a key backup can be trusted.\n *\n * Implementation of {@link Crypto.CryptoApi.isKeyBackupTrusted}.\n */\n public async isKeyBackupTrusted(info: KeyBackupInfo): Promise<BackupTrustInfo> {\n const trustInfo = await this.backupManager.isKeyBackupTrusted(info);\n return backupTrustInfoFromLegacyTrustInfo(trustInfo);\n }\n\n /**\n * Force a re-check of the key backup and enable/disable it as appropriate.\n *\n * Implementation of {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.\n */\n public async checkKeyBackupAndEnable(): Promise<KeyBackupCheck | null> {\n const checkResult = await this.backupManager.checkKeyBackup();\n if (!checkResult || !checkResult.backupInfo) return null;\n return {\n backupInfo: checkResult.backupInfo,\n trustInfo: backupTrustInfoFromLegacyTrustInfo(checkResult.trustInfo),\n };\n }\n\n /**\n * Checks that a given cross-signing private key matches a given public key.\n * This can be used by the getCrossSigningKey callback to verify that the\n * private key it is about to supply is the one that was requested.\n *\n * @param privateKey - The private key\n * @param expectedPublicKey - The public key\n * @returns true if the key matches, otherwise false\n */\n public checkCrossSigningPrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean {\n let signing: PkSigning | null = null;\n try {\n signing = new globalThis.Olm.PkSigning();\n const gotPubkey = signing.init_with_seed(privateKey);\n // make sure it agrees with the given pubkey\n return gotPubkey === expectedPublicKey;\n } finally {\n signing?.free();\n }\n }\n\n /**\n * Run various follow-up actions after cross-signing keys have changed locally\n * (either by resetting the keys for the account or by getting them from secret\n * storage), such as signing the current device, upgrading device\n * verifications, etc.\n */\n private async afterCrossSigningLocalKeyChange(): Promise<void> {\n logger.info(\"Starting cross-signing key change post-processing\");\n\n // sign the current device with the new key, and upload to the server\n const device = this.deviceList.getStoredDevice(this.userId, this.deviceId)!;\n const signedDevice = await this.crossSigningInfo.signDevice(this.userId, device);\n logger.info(`Starting background key sig upload for ${this.deviceId}`);\n\n const upload = ({ shouldEmit = false }): Promise<void> => {\n return this.baseApis\n .uploadKeySignatures({\n [this.userId]: {\n [this.deviceId]: signedDevice!,\n },\n })\n .then((response) => {\n const { failures } = response || {};\n if (Object.keys(failures || []).length > 0) {\n if (shouldEmit) {\n this.baseApis.emit(\n CryptoEvent.KeySignatureUploadFailure,\n failures,\n \"afterCrossSigningLocalKeyChange\",\n upload, // continuation\n );\n }\n throw new KeySignatureUploadError(\"Key upload failed\", { failures });\n }\n logger.info(`Finished background key sig upload for ${this.deviceId}`);\n })\n .catch((e) => {\n logger.error(`Error during background key sig upload for ${this.deviceId}`, e);\n });\n };\n upload({ shouldEmit: true });\n\n const shouldUpgradeCb = this.baseApis.cryptoCallbacks.shouldUpgradeDeviceVerifications;\n if (shouldUpgradeCb) {\n logger.info(\"Starting device verification upgrade\");\n\n // Check all users for signatures if upgrade callback present\n // FIXME: do this in batches\n const users: Record<string, IDeviceVerificationUpgrade> = {};\n for (const [userId, crossSigningInfo] of Object.entries(this.deviceList.crossSigningInfo)) {\n const upgradeInfo = await this.checkForDeviceVerificationUpgrade(\n userId,\n CrossSigningInfo.fromStorage(crossSigningInfo, userId),\n );\n if (upgradeInfo) {\n users[userId] = upgradeInfo;\n }\n }\n\n if (Object.keys(users).length > 0) {\n logger.info(`Found ${Object.keys(users).length} verif users to upgrade`);\n try {\n const usersToUpgrade = await shouldUpgradeCb({ users: users });\n if (usersToUpgrade) {\n for (const userId of usersToUpgrade) {\n if (userId in users) {\n await this.baseApis.setDeviceVerified(userId, users[userId].crossSigningInfo.getId()!);\n }\n }\n }\n } catch (e) {\n logger.log(\"shouldUpgradeDeviceVerifications threw an error: not upgrading\", e);\n }\n }\n\n logger.info(\"Finished device verification upgrade\");\n }\n\n logger.info(\"Finished cross-signing key change post-processing\");\n }\n\n /**\n * Check if a user's cross-signing key is a candidate for upgrading from device\n * verification.\n *\n * @param userId - the user whose cross-signing information is to be checked\n * @param crossSigningInfo - the cross-signing information to check\n */\n private async checkForDeviceVerificationUpgrade(\n userId: string,\n crossSigningInfo: CrossSigningInfo,\n ): Promise<IDeviceVerificationUpgrade | undefined> {\n // only upgrade if this is the first cross-signing key that we've seen for\n // them, and if their cross-signing key isn't already verified\n const trustLevel = this.crossSigningInfo.checkUserTrust(crossSigningInfo);\n if (crossSigningInfo.firstUse && !trustLevel.isVerified()) {\n const devices = this.deviceList.getRawStoredDevicesForUser(userId);\n const deviceIds = await this.checkForValidDeviceSignature(userId, crossSigningInfo.keys.master, devices);\n if (deviceIds.length) {\n return {\n devices: deviceIds.map((deviceId) => DeviceInfo.fromStorage(devices[deviceId], deviceId)),\n crossSigningInfo,\n };\n }\n }\n }\n\n /**\n * Check if the cross-signing key is signed by a verified device.\n *\n * @param userId - the user ID whose key is being checked\n * @param key - the key that is being checked\n * @param devices - the user's devices. Should be a map from device ID\n * to device info\n */\n private async checkForValidDeviceSignature(\n userId: string,\n key: CrossSigningKeyInfo,\n devices: Record<string, IDevice>,\n ): Promise<string[]> {\n const deviceIds: string[] = [];\n if (devices && key.signatures && key.signatures[userId]) {\n for (const signame of Object.keys(key.signatures[userId])) {\n const [, deviceId] = signame.split(\":\", 2);\n if (deviceId in devices && devices[deviceId].verified === DeviceVerification.VERIFIED) {\n try {\n await olmlib.verifySignature(\n this.olmDevice,\n key,\n userId,\n deviceId,\n devices[deviceId].keys[signame],\n );\n deviceIds.push(deviceId);\n } catch {}\n }\n }\n }\n return deviceIds;\n }\n\n /**\n * Get the user's cross-signing key ID.\n *\n * @param type - The type of key to get the ID of. One of\n * \"master\", \"self_signing\", or \"user_signing\". Defaults to \"master\".\n *\n * @returns the key ID\n */\n public getCrossSigningKeyId(type: CrossSigningKey = CrossSigningKey.Master): Promise<string | null> {\n return Promise.resolve(this.getCrossSigningId(type));\n }\n\n // old name, for backwards compatibility\n public getCrossSigningId(type: string): string | null {\n return this.crossSigningInfo.getId(type);\n }\n\n /**\n * Get the cross signing information for a given user.\n *\n * @param userId - the user ID to get the cross-signing info for.\n *\n * @returns the cross signing information for the user.\n */\n public getStoredCrossSigningForUser(userId: string): CrossSigningInfo | null {\n return this.deviceList.getStoredCrossSigningForUser(userId);\n }\n\n /**\n * Check whether a given user is trusted.\n *\n * @param userId - The ID of the user to check.\n *\n * @returns\n */\n public checkUserTrust(userId: string): UserTrustLevel {\n const userCrossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n if (!userCrossSigning) {\n return new UserTrustLevel(false, false, false);\n }\n return this.crossSigningInfo.checkUserTrust(userCrossSigning);\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi.getUserVerificationStatus}.\n */\n public async getUserVerificationStatus(userId: string): Promise<UserTrustLevel> {\n return this.checkUserTrust(userId);\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi.pinCurrentUserIdentity}.\n */\n public async pinCurrentUserIdentity(userId: string): Promise<void> {\n throw new Error(\"not implemented\");\n }\n\n /**\n * Check whether a given device is trusted.\n *\n * @param userId - The ID of the user whose device is to be checked.\n * @param deviceId - The ID of the device to check\n */\n public async getDeviceVerificationStatus(\n userId: string,\n deviceId: string,\n ): Promise<DeviceVerificationStatus | null> {\n const device = this.deviceList.getStoredDevice(userId, deviceId);\n if (!device) {\n return null;\n }\n return this.checkDeviceInfoTrust(userId, device);\n }\n\n /**\n * @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus}.\n */\n public checkDeviceTrust(userId: string, deviceId: string): DeviceTrustLevel {\n const device = this.deviceList.getStoredDevice(userId, deviceId);\n return this.checkDeviceInfoTrust(userId, device);\n }\n\n /**\n * Check whether a given deviceinfo is trusted.\n *\n * @param userId - The ID of the user whose devices is to be checked.\n * @param device - The device info object to check\n *\n * @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus}.\n */\n public checkDeviceInfoTrust(userId: string, device?: DeviceInfo): DeviceTrustLevel {\n const trustedLocally = !!device?.isVerified();\n\n const userCrossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n if (device && userCrossSigning) {\n // The trustCrossSignedDevices only affects trust of other people's cross-signing\n // signatures\n const trustCrossSig = this.trustCrossSignedDevices || userId === this.userId;\n return this.crossSigningInfo.checkDeviceTrust(userCrossSigning, device, trustedLocally, trustCrossSig);\n } else {\n return new DeviceTrustLevel(false, false, trustedLocally, false);\n }\n }\n\n /**\n * Check whether one of our own devices is cross-signed by our\n * user's stored keys, regardless of whether we trust those keys yet.\n *\n * @param deviceId - The ID of the device to check\n *\n * @returns true if the device is cross-signed\n */\n public checkIfOwnDeviceCrossSigned(deviceId: string): boolean {\n const device = this.deviceList.getStoredDevice(this.userId, deviceId);\n if (!device) return false;\n const userCrossSigning = this.deviceList.getStoredCrossSigningForUser(this.userId);\n return (\n userCrossSigning?.checkDeviceTrust(userCrossSigning, device, false, true).isCrossSigningVerified() ?? false\n );\n }\n\n /*\n * Event handler for DeviceList's userNewDevices event\n */\n private onDeviceListUserCrossSigningUpdated = async (userId: string): Promise<void> => {\n if (userId === this.userId) {\n // An update to our own cross-signing key.\n // Get the new key first:\n const newCrossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n const seenPubkey = newCrossSigning ? newCrossSigning.getId() : null;\n const currentPubkey = this.crossSigningInfo.getId();\n const changed = currentPubkey !== seenPubkey;\n\n if (currentPubkey && seenPubkey && !changed) {\n // If it's not changed, just make sure everything is up to date\n await this.checkOwnCrossSigningTrust();\n } else {\n // We'll now be in a state where cross-signing on the account is not trusted\n // because our locally stored cross-signing keys will not match the ones\n // on the server for our account. So we clear our own stored cross-signing keys,\n // effectively disabling cross-signing until the user gets verified by the device\n // that reset the keys\n this.storeTrustedSelfKeys(null);\n // emit cross-signing has been disabled\n this.emit(CryptoEvent.KeysChanged, {});\n // as the trust for our own user has changed,\n // also emit an event for this\n this.emit(CryptoEvent.UserTrustStatusChanged, this.userId, this.checkUserTrust(userId));\n }\n } else {\n await this.checkDeviceVerifications(userId);\n\n // Update verified before latch using the current state and save the new\n // latch value in the device list store.\n const crossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n if (crossSigning) {\n crossSigning.updateCrossSigningVerifiedBefore(this.checkUserTrust(userId).isCrossSigningVerified());\n this.deviceList.setRawStoredCrossSigningForUser(userId, crossSigning.toStorage());\n }\n\n this.emit(CryptoEvent.UserTrustStatusChanged, userId, this.checkUserTrust(userId));\n }\n };\n\n /**\n * Check the copy of our cross-signing key that we have in the device list and\n * see if we can get the private key. If so, mark it as trusted.\n */\n public async checkOwnCrossSigningTrust({\n allowPrivateKeyRequests = false,\n }: ICheckOwnCrossSigningTrustOpts = {}): Promise<void> {\n const userId = this.userId;\n\n // Before proceeding, ensure our cross-signing public keys have been\n // downloaded via the device list.\n await this.downloadKeys([this.userId]);\n\n // Also check which private keys are locally cached.\n const crossSigningPrivateKeys = await this.crossSigningInfo.getCrossSigningKeysFromCache();\n\n // If we see an update to our own master key, check it against the master\n // key we have and, if it matches, mark it as verified\n\n // First, get the new cross-signing info\n const newCrossSigning = this.deviceList.getStoredCrossSigningForUser(userId);\n if (!newCrossSigning) {\n logger.error(\n \"Got cross-signing update event for user \" + userId + \" but no new cross-signing information found!\",\n );\n return;\n }\n\n const seenPubkey = newCrossSigning.getId()!;\n const masterChanged = this.crossSigningInfo.getId() !== seenPubkey;\n const masterExistsNotLocallyCached = newCrossSigning.getId() && !crossSigningPrivateKeys.has(\"master\");\n if (masterChanged) {\n logger.info(\"Got new master public key\", seenPubkey);\n }\n if (allowPrivateKeyRequests && (masterChanged || masterExistsNotLocallyCached)) {\n logger.info(\"Attempting to retrieve cross-signing master private key\");\n let signing: PkSigning | null = null;\n // It's important for control flow that we leave any errors alone for\n // higher levels to handle so that e.g. cancelling access properly\n // aborts any larger operation as well.\n try {\n const ret = await this.crossSigningInfo.getCrossSigningKey(\"master\", seenPubkey);\n signing = ret[1];\n logger.info(\"Got cross-signing master private key\");\n } finally {\n signing?.free();\n }\n }\n\n const oldSelfSigningId = this.crossSigningInfo.getId(\"self_signing\");\n const oldUserSigningId = this.crossSigningInfo.getId(\"user_signing\");\n\n // Update the version of our keys in our cross-signing object and the local store\n this.storeTrustedSelfKeys(newCrossSigning.keys);\n\n const selfSigningChanged = oldSelfSigningId !== newCrossSigning.getId(\"self_signing\");\n const userSigningChanged = oldUserSigningId !== newCrossSigning.getId(\"user_signing\");\n\n const selfSigningExistsNotLocallyCached =\n newCrossSigning.getId(\"self_signing\") && !crossSigningPrivateKeys.has(\"self_signing\");\n const userSigningExistsNotLocallyCached =\n newCrossSigning.getId(\"user_signing\") && !crossSigningPrivateKeys.has(\"user_signing\");\n\n const keySignatures: Record<string, ISignedKey> = {};\n\n if (selfSigningChanged) {\n logger.info(\"Got new self-signing key\", newCrossSigning.getId(\"self_signing\"));\n }\n if (allowPrivateKeyRequests && (selfSigningChanged || selfSigningExistsNotLocallyCached)) {\n logger.info(\"Attempting to retrieve cross-signing self-signing private key\");\n let signing: PkSigning | null = null;\n try {\n const ret = await this.crossSigningInfo.getCrossSigningKey(\n \"self_signing\",\n newCrossSigning.getId(\"self_signing\")!,\n );\n signing = ret[1];\n logger.info(\"Got cross-signing self-signing private key\");\n } finally {\n signing?.free();\n }\n\n const device = this.deviceList.getStoredDevice(this.userId, this.deviceId)!;\n const signedDevice = await this.crossSigningInfo.signDevice(this.userId, device);\n keySignatures[this.deviceId] = signedDevice!;\n }\n if (userSigningChanged) {\n logger.info(\"Got new user-signing key\", newCrossSigning.getId(\"user_signing\"));\n }\n if (allowPrivateKeyRequests && (userSigningChanged || userSigningExistsNotLocallyCached)) {\n logger.info(\"Attempting to retrieve cross-signing user-signing private key\");\n let signing: PkSigning | null = null;\n try {\n const ret = await this.crossSigningInfo.getCrossSigningKey(\n \"user_signing\",\n newCrossSigning.getId(\"user_signing\")!,\n );\n signing = ret[1];\n logger.info(\"Got cross-signing user-signing private key\");\n } finally {\n signing?.free();\n }\n }\n\n if (masterChanged) {\n const masterKey = this.crossSigningInfo.keys.master;\n await this.signObject(masterKey);\n const deviceSig = masterKey.signatures![this.userId][\"ed25519:\" + this.deviceId];\n // Include only the _new_ device signature in the upload.\n // We may have existing signatures from deleted devices, which will cause\n // the entire upload to fail.\n keySignatures[this.crossSigningInfo.getId()!] = Object.assign({} as ISignedKey, masterKey, {\n signatures: {\n [this.userId]: {\n [\"ed25519:\" + this.deviceId]: deviceSig,\n },\n },\n });\n }\n\n const keysToUpload = Object.keys(keySignatures);\n if (keysToUpload.length) {\n const upload = ({ shouldEmit = false }): Promise<void> => {\n logger.info(`Starting background key sig upload for ${keysToUpload}`);\n return this.baseApis\n .uploadKeySignatures({ [this.userId]: keySignatures })\n .then((response) => {\n const { failures } = response || {};\n logger.info(`Finished background key sig upload for ${keysToUpload}`);\n if (Object.keys(failures || []).length > 0) {\n if (shouldEmit) {\n this.baseApis.emit(\n CryptoEvent.KeySignatureUploadFailure,\n failures,\n \"checkOwnCrossSigningTrust\",\n upload,\n );\n }\n throw new KeySignatureUploadError(\"Key upload failed\", { failures });\n }\n })\n .catch((e) => {\n logger.error(`Error during background key sig upload for ${keysToUpload}`, e);\n });\n };\n upload({ shouldEmit: true });\n }\n\n this.emit(CryptoEvent.UserTrustStatusChanged, userId, this.checkUserTrust(userId));\n\n if (masterChanged) {\n this.emit(CryptoEvent.KeysChanged, {});\n await this.afterCrossSigningLocalKeyChange();\n }\n\n // Now we may be able to trust our key backup\n await this.backupManager.checkKeyBackup();\n // FIXME: if we previously trusted the backup, should we automatically sign\n // the backup with the new key (if not already signed)?\n }\n\n /**\n * Implementation of {@link CryptoBackend#getBackupDecryptor}.\n */\n public async getBackupDecryptor(backupInfo: KeyBackupInfo, privKey: ArrayLike<number>): Promise<BackupDecryptor> {\n if (!(privKey instanceof Uint8Array)) {\n throw new Error(`getBackupDecryptor expects Uint8Array`);\n }\n\n const algorithm = await BackupManager.makeAlgorithm(backupInfo, async () => {\n return privKey;\n });\n\n // If the pubkey computed from the private data we've been given\n // doesn't match the one in the auth_data, the user has entered\n // a different recovery key / the wrong passphrase.\n if (!(await algorithm.keyMatches(privKey))) {\n return Promise.reject(new MatrixError({ errcode: MatrixClient.RESTORE_BACKUP_ERROR_BAD_KEY }));\n }\n\n return new LibOlmBackupDecryptor(algorithm);\n }\n\n /**\n * Implementation of {@link CryptoBackend#importBackedUpRoomKeys}.\n */\n public importBackedUpRoomKeys(\n keys: IMegolmSessionData[],\n backupVersion: string,\n opts: ImportRoomKeysOpts = {},\n ): Promise<void> {\n opts.source = \"backup\";\n return this.importRoomKeys(keys, opts);\n }\n\n /**\n * Store a set of keys as our own, trusted, cross-signing keys.\n *\n * @param keys - The new trusted set of keys\n */\n private async storeTrustedSelfKeys(keys: Record<string, CrossSigningKeyInfo> | null): Promise<void> {\n if (keys) {\n this.crossSigningInfo.setKeys(keys);\n } else {\n this.crossSigningInfo.clearKeys();\n }\n await this.cryptoStore.doTxn(\"readwrite\", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {\n this.cryptoStore.storeCrossSigningKeys(txn, this.crossSigningInfo.keys);\n });\n }\n\n /**\n * Check if the master key is signed by a verified device, and if so, prompt\n * the application to mark it as verified.\n *\n * @param userId - the user ID whose key should be checked\n */\n private async checkDeviceVerifications(userId: string): Promise<void> {\n const shouldUpgradeCb = this.baseApis.cryptoCallbacks.shouldUpgradeDeviceVerifications;\n if (!shouldUpgradeCb) {\n // Upgrading skipped when callback is not present.\n return;\n }\n logger.info(`Starting device verification upgrade for ${userId}`);\n if (this.crossSigningInfo.keys.user_signing) {\n const crossSigningInfo = this.deviceList.getStoredCrossSigningForUser(userId);\n if (crossSigningInfo) {\n const upgradeInfo = await this.checkForDeviceVerificationUpgrade(userId, crossSigningInfo);\n if (upgradeInfo) {\n const usersToUpgrade = await shouldUpgradeCb({\n users: {\n [userId]: upgradeInfo,\n },\n });\n if (usersToUpgrade.includes(userId)) {\n await this.baseApis.setDeviceVerified(userId, crossSigningInfo.getId()!);\n }\n }\n }\n }\n logger.info(`Finished device verification upgrade for ${userId}`);\n }\n\n /**\n */\n public enableLazyLoading(): void {\n this.lazyLoadMembers = true;\n }\n\n /**\n * Tell the crypto module to register for MatrixClient events which it needs to\n * listen for\n *\n * @param eventEmitter - event source where we can register\n * for event notifications\n */\n public registerEventHandlers(\n eventEmitter: TypedEventEmitter<\n RoomMemberEvent.Membership | ClientEvent.ToDeviceEvent | RoomEvent.Timeline | MatrixEventEvent.Decrypted,\n any\n >,\n ): void {\n eventEmitter.on(RoomMemberEvent.Membership, this.onMembership);\n eventEmitter.on(ClientEvent.ToDeviceEvent, this.onToDeviceEvent);\n eventEmitter.on(RoomEvent.Timeline, this.onTimelineEvent);\n eventEmitter.on(MatrixEventEvent.Decrypted, this.onTimelineEvent);\n }\n\n /**\n * @deprecated this does nothing and will be removed in a future version\n */\n public start(): void {\n logger.warn(\"MatrixClient.crypto.start() is deprecated\");\n }\n\n /** Stop background processes related to crypto */\n public stop(): void {\n this.outgoingRoomKeyRequestManager.stop();\n this.deviceList.stop();\n this.dehydrationManager.stop();\n this.backupManager.stop();\n }\n\n /**\n * Get the Ed25519 key for this device\n *\n * @returns base64-encoded ed25519 key.\n *\n * @deprecated Use {@link Crypto.CryptoApi#getOwnDeviceKeys}.\n */\n public getDeviceEd25519Key(): string | null {\n return this.olmDevice.deviceEd25519Key;\n }\n\n /**\n * Get the Curve25519 key for this device\n *\n * @returns base64-encoded curve25519 key.\n *\n * @deprecated Use {@link Crypto.CryptoApi#getOwnDeviceKeys}\n */\n public getDeviceCurve25519Key(): string | null {\n return this.olmDevice.deviceCurve25519Key;\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#getOwnDeviceKeys}.\n */\n public async getOwnDeviceKeys(): Promise<OwnDeviceKeys> {\n if (!this.olmDevice.deviceCurve25519Key) {\n throw new Error(\"Curve25519 key not yet created\");\n }\n if (!this.olmDevice.deviceEd25519Key) {\n throw new Error(\"Ed25519 key not yet created\");\n }\n return {\n ed25519: this.olmDevice.deviceEd25519Key,\n curve25519: this.olmDevice.deviceCurve25519Key,\n };\n }\n\n /**\n * Set the global override for whether the client should ever send encrypted\n * messages to unverified devices. This provides the default for rooms which\n * do not specify a value.\n *\n * @param value - whether to blacklist all unverified devices by default\n *\n * @deprecated Set {@link Crypto.CryptoApi#globalBlacklistUnverifiedDevices | CryptoApi.globalBlacklistUnverifiedDevices} directly.\n */\n public setGlobalBlacklistUnverifiedDevices(value: boolean): void {\n this.globalBlacklistUnverifiedDevices = value;\n }\n\n /**\n * @returns whether to blacklist all unverified devices by default\n *\n * @deprecated Reference {@link Crypto.CryptoApi#globalBlacklistUnverifiedDevices | CryptoApi.globalBlacklistUnverifiedDevices} directly.\n */\n public getGlobalBlacklistUnverifiedDevices(): boolean {\n return this.globalBlacklistUnverifiedDevices;\n }\n\n /**\n * Upload the device keys to the homeserver.\n * @returns A promise that will resolve when the keys are uploaded.\n */\n public uploadDeviceKeys(): Promise<IKeysUploadResponse> {\n const deviceKeys = {\n algorithms: this.supportedAlgorithms,\n device_id: this.deviceId,\n keys: this.deviceKeys,\n user_id: this.userId,\n };\n\n return this.signObject(deviceKeys).then(() => {\n return this.baseApis.uploadKeysRequest({\n device_keys: deviceKeys as Required<IDeviceKeys>,\n });\n });\n }\n\n public getNeedsNewFallback(): boolean {\n return !!this.needsNewFallback;\n }\n\n // check if it's time to upload one-time keys, and do so if so.\n private maybeUploadOneTimeKeys(): void {\n // frequency with which to check & upload one-time keys\n const uploadPeriod = 1000 * 60; // one minute\n\n // max number of keys to upload at once\n // Creating keys can be an expensive operation so we limit the\n // number we generate in one go to avoid blocking the application\n // for too long.\n const maxKeysPerCycle = 5;\n\n if (this.oneTimeKeyCheckInProgress) {\n return;\n }\n\n const now = Date.now();\n if (this.lastOneTimeKeyCheck !== null && now - this.lastOneTimeKeyCheck < uploadPeriod) {\n // we've done a key upload recently.\n return;\n }\n\n this.lastOneTimeKeyCheck = now;\n\n // We need to keep a pool of one time public keys on the server so that\n // other devices can start conversations with us. But we can only store\n // a finite number of private keys in the olm Account object.\n // To complicate things further then can be a delay between a device\n // claiming a public one time key from the server and it sending us a\n // message. We need to keep the corresponding private key locally until\n // we receive the message.\n // But that message might never arrive leaving us stuck with duff\n // private keys clogging up our local storage.\n // So we need some kind of engineering compromise to balance all of\n // these factors.\n\n // Check how many keys we can store in the Account object.\n const maxOneTimeKeys = this.olmDevice.maxNumberOfOneTimeKeys();\n // Try to keep at most half that number on the server. This leaves the\n // rest of the slots free to hold keys that have been claimed from the\n // server but we haven't received a message for.\n // If we run out of slots when generating new keys then olm will\n // discard the oldest private keys first. This will eventually clean\n // out stale private keys that won't receive a message.\n const keyLimit = Math.floor(maxOneTimeKeys / 2);\n\n const uploadLoop = async (keyCount: number): Promise<void> => {\n while (keyLimit > keyCount || this.getNeedsNewFallback()) {\n // Ask olm to generate new one time keys, then upload them to synapse.\n if (keyLimit > keyCount) {\n logger.info(\"generating oneTimeKeys\");\n const keysThisLoop = Math.min(keyLimit - keyCount, maxKeysPerCycle);\n await this.olmDevice.generateOneTimeKeys(keysThisLoop);\n }\n\n if (this.getNeedsNewFallback()) {\n const fallbackKeys = await this.olmDevice.getFallbackKey();\n // if fallbackKeys is non-empty, we've already generated a\n // fallback key, but it hasn't been published yet, so we\n // can use that instead of generating a new one\n if (!fallbackKeys.curve25519 || Object.keys(fallbackKeys.curve25519).length == 0) {\n logger.info(\"generating fallback key\");\n if (this.fallbackCleanup) {\n // cancel any pending fallback cleanup because generating\n // a new fallback key will already drop the old fallback\n // that would have been dropped, and we don't want to kill\n // the current key\n clearTimeout(this.fallbackCleanup);\n delete this.fallbackCleanup;\n }\n await this.olmDevice.generateFallbackKey();\n }\n }\n\n logger.info(\"calling uploadOneTimeKeys\");\n const res = await this.uploadOneTimeKeys();\n if (res.one_time_key_counts && res.one_time_key_counts.signed_curve25519) {\n // if the response contains a more up to date value use this\n // for the next loop\n keyCount = res.one_time_key_counts.signed_curve25519;\n } else {\n throw new Error(\n \"response for uploading keys does not contain \" + \"one_time_key_counts.signed_curve25519\",\n );\n }\n }\n };\n\n this.oneTimeKeyCheckInProgress = true;\n Promise.resolve()\n .then(() => {\n if (this.oneTimeKeyCount !== undefined) {\n // We already have the current one_time_key count from a /sync response.\n // Use this value instead of asking the server for the current key count.\n return Promise.resolve(this.oneTimeKeyCount);\n }\n // ask the server how many keys we have\n return this.baseApis.uploadKeysRequest({}).then((res) => {\n return res.one_time_key_counts.signed_curve25519 || 0;\n });\n })\n .then((keyCount) => {\n // Start the uploadLoop with the current keyCount. The function checks if\n // we need to upload new keys or not.\n // If there are too many keys on the server then we don't need to\n // create any more keys.\n return uploadLoop(keyCount);\n })\n .catch((e) => {\n logger.error(\"Error uploading one-time keys\", e.stack || e);\n })\n .finally(() => {\n // reset oneTimeKeyCount to prevent start uploading based on old data.\n // it will be set again on the next /sync-response\n this.oneTimeKeyCount = undefined;\n this.oneTimeKeyCheckInProgress = false;\n });\n }\n\n // returns a promise which resolves to the response\n private async uploadOneTimeKeys(): Promise<IKeysUploadResponse> {\n const promises: Promise<unknown>[] = [];\n\n let fallbackJson: Record<string, IOneTimeKey> | undefined;\n if (this.getNeedsNewFallback()) {\n fallbackJson = {};\n const fallbackKeys = await this.olmDevice.getFallbackKey();\n for (const [keyId, key] of Object.entries(fallbackKeys.curve25519)) {\n const k = { key, fallback: true };\n fallbackJson[\"signed_curve25519:\" + keyId] = k;\n promises.push(this.signObject(k));\n }\n this.needsNewFallback = false;\n }\n\n const oneTimeKeys = await this.olmDevice.getOneTimeKeys();\n const oneTimeJson: Record<string, { key: string }> = {};\n\n for (const keyId in oneTimeKeys.curve25519) {\n if (oneTimeKeys.curve25519.hasOwnProperty(keyId)) {\n const k = {\n key: oneTimeKeys.curve25519[keyId],\n };\n oneTimeJson[\"signed_curve25519:\" + keyId] = k;\n promises.push(this.signObject(k));\n }\n }\n\n await Promise.all(promises);\n\n const requestBody: Record<string, any> = {\n one_time_keys: oneTimeJson,\n };\n\n if (fallbackJson) {\n requestBody[\"org.matrix.msc2732.fallback_keys\"] = fallbackJson;\n requestBody[\"fallback_keys\"] = fallbackJson;\n }\n\n const res = await this.baseApis.uploadKeysRequest(requestBody);\n\n if (fallbackJson) {\n this.fallbackCleanup = setTimeout(\n () => {\n delete this.fallbackCleanup;\n this.olmDevice.forgetOldFallbackKey();\n },\n 60 * 60 * 1000,\n );\n }\n\n await this.olmDevice.markKeysAsPublished();\n return res;\n }\n\n /**\n * Download the keys for a list of users and stores the keys in the session\n * store.\n * @param userIds - The users to fetch.\n * @param forceDownload - Always download the keys even if cached.\n *\n * @returns A promise which resolves to a map `userId->deviceId->{@link DeviceInfo}`.\n */\n public downloadKeys(userIds: string[], forceDownload?: boolean): Promise<DeviceInfoMap> {\n return this.deviceList.downloadKeys(userIds, !!forceDownload);\n }\n\n /**\n * Get the stored device keys for a user id\n *\n * @param userId - the user to list keys for.\n *\n * @returns list of devices, or null if we haven't\n * managed to get a list of devices for this user yet.\n */\n public getStoredDevicesForUser(userId: string): Array<DeviceInfo> | null {\n return this.deviceList.getStoredDevicesForUser(userId);\n }\n\n /**\n * Get the device information for the given list of users.\n *\n * @param userIds - The users to fetch.\n * @param downloadUncached - If true, download the device list for users whose device list we are not\n * currently tracking. Defaults to false, in which case such users will not appear at all in the result map.\n *\n * @returns A map `{@link DeviceMap}`.\n */\n public async getUserDeviceInfo(userIds: string[], downloadUncached = false): Promise<DeviceMap> {\n const deviceMapByUserId = new Map<string, Map<string, Device>>();\n // Keep the users without device to download theirs keys\n const usersWithoutDeviceInfo: string[] = [];\n\n for (const userId of userIds) {\n const deviceInfos = await this.getStoredDevicesForUser(userId);\n // If there are device infos for a userId, we transform it into a map\n // Else, the keys will be downloaded after\n if (deviceInfos) {\n const deviceMap = new Map(\n // Convert DeviceInfo to Device\n deviceInfos.map((deviceInfo) => [deviceInfo.deviceId, deviceInfoToDevice(deviceInfo, userId)]),\n );\n deviceMapByUserId.set(userId, deviceMap);\n } else {\n usersWithoutDeviceInfo.push(userId);\n }\n }\n\n // Download device info for users without device infos\n if (downloadUncached && usersWithoutDeviceInfo.length > 0) {\n const newDeviceInfoMap = await this.downloadKeys(usersWithoutDeviceInfo);\n\n newDeviceInfoMap.forEach((deviceInfoMap, userId) => {\n const deviceMap = new Map<string, Device>();\n // Convert DeviceInfo to Device\n deviceInfoMap.forEach((deviceInfo, deviceId) =>\n deviceMap.set(deviceId, deviceInfoToDevice(deviceInfo, userId)),\n );\n\n // Put the new device infos into the returned map\n deviceMapByUserId.set(userId, deviceMap);\n });\n }\n\n return deviceMapByUserId;\n }\n\n /**\n * Get the stored keys for a single device\n *\n *\n * @returns device, or undefined\n * if we don't know about this device\n */\n public getStoredDevice(userId: string, deviceId: string): DeviceInfo | undefined {\n return this.deviceList.getStoredDevice(userId, deviceId);\n }\n\n /**\n * Save the device list, if necessary\n *\n * @param delay - Time in ms before which the save actually happens.\n * By default, the save is delayed for a short period in order to batch\n * multiple writes, but this behaviour can be disabled by passing 0.\n *\n * @returns true if the data was saved, false if\n * it was not (eg. because no changes were pending). The promise\n * will only resolve once the data is saved, so may take some time\n * to resolve.\n */\n public saveDeviceList(delay: number): Promise<boolean> {\n return this.deviceList.saveIfDirty(delay);\n }\n\n /**\n * Mark the given device as locally verified.\n *\n * Implementation of {@link Crypto.CryptoApi#setDeviceVerified}.\n */\n public async setDeviceVerified(userId: string, deviceId: string, verified = true): Promise<void> {\n await this.setDeviceVerification(userId, deviceId, verified);\n }\n\n /**\n * Blindly cross-sign one of our other devices.\n *\n * Implementation of {@link Crypto.CryptoApi#crossSignDevice}.\n */\n public async crossSignDevice(deviceId: string): Promise<void> {\n await this.setDeviceVerified(this.userId, deviceId, true);\n }\n\n /**\n * Update the blocked/verified state of the given device\n *\n * @param userId - owner of the device\n * @param deviceId - unique identifier for the device or user's\n * cross-signing public key ID.\n *\n * @param verified - whether to mark the device as verified. Null to\n * leave unchanged.\n *\n * @param blocked - whether to mark the device as blocked. Null to\n * leave unchanged.\n *\n * @param known - whether to mark that the user has been made aware of\n * the existence of this device. Null to leave unchanged\n *\n * @param keys - The list of keys that was present\n * during the device verification. This will be double checked with the list\n * of keys the given device has currently.\n *\n * @returns updated DeviceInfo\n */\n public async setDeviceVerification(\n userId: string,\n deviceId: string,\n verified: boolean | null = null,\n blocked: boolean | null = null,\n known: boolean | null = null,\n keys?: Record<string, string>,\n ): Promise<DeviceInfo | CrossSigningInfo | CrossSigningKeyInfo | undefined> {\n // Check if the 'device' is actually a cross signing key\n // The js-sdk's verification treats cross-signing keys as devices\n // and so uses this method to mark them verified.\n const xsk = this.deviceList.getStoredCrossSigningForUser(userId);\n if (xsk?.getId() === deviceId) {\n if (blocked !== null || known !== null) {\n throw new Error(\"Cannot set blocked or known for a cross-signing key\");\n }\n if (!verified) {\n throw new Error(\"Cannot set a cross-signing key as unverified\");\n }\n const gotKeyId = keys ? Object.values(keys)[0] : null;\n if (keys && (Object.values(keys).length !== 1 || gotKeyId !== xsk.getId())) {\n throw new Error(`Key did not match expected value: expected ${xsk.getId()}, got ${gotKeyId}`);\n }\n\n if (!this.crossSigningInfo.getId() && userId === this.crossSigningInfo.userId) {\n this.storeTrustedSelfKeys(xsk.keys);\n // This will cause our own user trust to change, so emit the event\n this.emit(CryptoEvent.UserTrustStatusChanged, this.userId, this.checkUserTrust(userId));\n }\n\n // Now sign the master key with our user signing key (unless it's ourself)\n if (userId !== this.userId) {\n logger.info(\"Master key \" + xsk.getId() + \" for \" + userId + \" marked verified. Signing...\");\n const device = await this.crossSigningInfo.signUser(xsk);\n if (device) {\n const upload = async ({ shouldEmit = false }): Promise<void> => {\n logger.info(\"Uploading signature for \" + userId + \"...\");\n const response = await this.baseApis.uploadKeySignatures({\n [userId]: {\n [deviceId]: device,\n },\n });\n const { failures } = response || {};\n if (Object.keys(failures || []).length > 0) {\n if (shouldEmit) {\n this.baseApis.emit(\n CryptoEvent.KeySignatureUploadFailure,\n failures,\n \"setDeviceVerification\",\n upload,\n );\n }\n /* Throwing here causes the process to be cancelled and the other\n * user to be notified */\n throw new KeySignatureUploadError(\"Key upload failed\", { failures });\n }\n };\n await upload({ shouldEmit: true });\n\n // This will emit events when it comes back down the sync\n // (we could do local echo to speed things up)\n }\n return device!;\n } else {\n return xsk;\n }\n }\n\n const devices = this.deviceList.getRawStoredDevicesForUser(userId);\n if (!devices || !devices[deviceId]) {\n throw new Error(\"Unknown device \" + userId + \":\" + deviceId);\n }\n\n const dev = devices[deviceId];\n let verificationStatus = dev.verified;\n\n if (verified) {\n if (keys) {\n for (const [keyId, key] of Object.entries(keys)) {\n if (dev.keys[keyId] !== key) {\n throw new Error(`Key did not match expected value: expected ${key}, got ${dev.keys[keyId]}`);\n }\n }\n }\n verificationStatus = DeviceVerification.VERIFIED;\n } else if (verified !== null && verificationStatus == DeviceVerification.VERIFIED) {\n verificationStatus = DeviceVerification.UNVERIFIED;\n }\n\n if (blocked) {\n verificationStatus = DeviceVerification.BLOCKED;\n } else if (blocked !== null && verificationStatus == DeviceVerification.BLOCKED) {\n verificationStatus = DeviceVerification.UNVERIFIED;\n }\n\n let knownStatus = dev.known;\n if (known !== null) {\n knownStatus = known;\n }\n\n if (dev.verified !== verificationStatus || dev.known !== knownStatus) {\n dev.verified = verificationStatus;\n dev.known = knownStatus;\n this.deviceList.storeDevicesForUser(userId, devices);\n this.deviceList.saveIfDirty();\n }\n\n // do cross-signing\n if (verified && userId === this.userId) {\n logger.info(\"Own device \" + deviceId + \" marked verified: signing\");\n\n // Signing only needed if other device not already signed\n let device: ISignedKey | undefined;\n const deviceTrust = this.checkDeviceTrust(userId, deviceId);\n if (deviceTrust.isCrossSigningVerified()) {\n logger.log(`Own device ${deviceId} already cross-signing verified`);\n } else {\n device = (await this.crossSigningInfo.signDevice(userId, DeviceInfo.fromStorage(dev, deviceId)))!;\n }\n\n if (device) {\n const upload = async ({ shouldEmit = false }): Promise<void> => {\n logger.info(\"Uploading signature for \" + deviceId);\n const response = await this.baseApis.uploadKeySignatures({\n [userId]: {\n [deviceId]: device!,\n },\n });\n const { failures } = response || {};\n if (Object.keys(failures || []).length > 0) {\n if (shouldEmit) {\n this.baseApis.emit(\n CryptoEvent.KeySignatureUploadFailure,\n failures,\n \"setDeviceVerification\",\n upload, // continuation\n );\n }\n throw new KeySignatureUploadError(\"Key upload failed\", { failures });\n }\n };\n await upload({ shouldEmit: true });\n // XXX: we'll need to wait for the device list to be updated\n }\n }\n\n const deviceObj = DeviceInfo.fromStorage(dev, deviceId);\n this.emit(CryptoEvent.DeviceVerificationChanged, userId, deviceId, deviceObj);\n return deviceObj;\n }\n\n public findVerificationRequestDMInProgress(roomId: string, userId?: string): VerificationRequest | undefined {\n return this.inRoomVerificationRequests.findRequestInProgress(roomId, userId);\n }\n\n public getVerificationRequestsToDeviceInProgress(userId: string): VerificationRequest[] {\n return this.toDeviceVerificationRequests.getRequestsInProgress(userId);\n }\n\n public requestVerificationDM(userId: string, roomId: string): Promise<VerificationRequest> {\n const existingRequest = this.inRoomVerificationRequests.findRequestInProgress(roomId);\n if (existingRequest) {\n return Promise.resolve(existingRequest);\n }\n const channel = new InRoomChannel(this.baseApis, roomId, userId);\n return this.requestVerificationWithChannel(userId, channel, this.inRoomVerificationRequests);\n }\n\n /** @deprecated Use `requestOwnUserVerificationToDevice` or `requestDeviceVerification` */\n public requestVerification(userId: string, devices?: string[]): Promise<VerificationRequest> {\n if (!devices) {\n devices = Object.keys(this.deviceList.getRawStoredDevicesForUser(userId));\n }\n const existingRequest = this.toDeviceVerificationRequests.findRequestInProgress(userId, devices);\n if (existingRequest) {\n return Promise.resolve(existingRequest);\n }\n const channel = new ToDeviceChannel(this.baseApis, userId, devices, ToDeviceChannel.makeTransactionId());\n return this.requestVerificationWithChannel(userId, channel, this.toDeviceVerificationRequests);\n }\n\n public requestOwnUserVerification(): Promise<VerificationRequest> {\n return this.requestVerification(this.userId);\n }\n\n public requestDeviceVerification(userId: string, deviceId: string): Promise<VerificationRequest> {\n return this.requestVerification(userId, [deviceId]);\n }\n\n private async requestVerificationWithChannel(\n userId: string,\n channel: IVerificationChannel,\n requestsMap: IRequestsMap,\n ): Promise<VerificationRequest> {\n let request = new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n // if transaction id is already known, add request\n if (channel.transactionId) {\n requestsMap.setRequestByChannel(channel, request);\n }\n await request.sendRequest();\n // don't replace the request created by a racing remote echo\n const racingRequest = requestsMap.getRequestByChannel(channel);\n if (racingRequest) {\n request = racingRequest;\n } else {\n logger.log(\n `Crypto: adding new request to ` + `requestsByTxnId with id ${channel.transactionId} ${channel.roomId}`,\n );\n requestsMap.setRequestByChannel(channel, request);\n }\n return request;\n }\n\n public beginKeyVerification(\n method: string,\n userId: string,\n deviceId: string,\n transactionId: string | null = null,\n ): VerificationBase<any, any> {\n let request: Request | undefined;\n if (transactionId) {\n request = this.toDeviceVerificationRequests.getRequestBySenderAndTxnId(userId, transactionId);\n if (!request) {\n throw new Error(`No request found for user ${userId} with ` + `transactionId ${transactionId}`);\n }\n } else {\n transactionId = ToDeviceChannel.makeTransactionId();\n const channel = new ToDeviceChannel(this.baseApis, userId, [deviceId], transactionId, deviceId);\n request = new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n this.toDeviceVerificationRequests.setRequestBySenderAndTxnId(userId, transactionId, request);\n }\n return request.beginKeyVerification(method, { userId, deviceId });\n }\n\n public async legacyDeviceVerification(\n userId: string,\n deviceId: string,\n method: VerificationMethod,\n ): Promise<VerificationRequest> {\n const transactionId = ToDeviceChannel.makeTransactionId();\n const channel = new ToDeviceChannel(this.baseApis, userId, [deviceId], transactionId, deviceId);\n const request = new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n this.toDeviceVerificationRequests.setRequestBySenderAndTxnId(userId, transactionId, request);\n const verifier = request.beginKeyVerification(method, { userId, deviceId });\n // either reject by an error from verify() while sending .start\n // or resolve when the request receives the\n // local (fake remote) echo for sending the .start event\n await Promise.race([verifier.verify(), request.waitFor((r) => r.started)]);\n return request;\n }\n\n /**\n * Get information on the active olm sessions with a user\n * <p>\n * Returns a map from device id to an object with keys 'deviceIdKey' (the\n * device's curve25519 identity key) and 'sessions' (an array of objects in the\n * same format as that returned by\n * {@link OlmDevice#getSessionInfoForDevice}).\n * <p>\n * This method is provided for debugging purposes.\n *\n * @param userId - id of user to inspect\n */\n public async getOlmSessionsForUser(userId: string): Promise<Record<string, IUserOlmSession>> {\n const devices = this.getStoredDevicesForUser(userId) || [];\n const result: { [deviceId: string]: IUserOlmSession } = {};\n for (const device of devices) {\n const deviceKey = device.getIdentityKey();\n const sessions = await this.olmDevice.getSessionInfoForDevice(deviceKey);\n\n result[device.deviceId] = {\n deviceIdKey: deviceKey,\n sessions: sessions,\n };\n }\n return result;\n }\n\n /**\n * Get the device which sent an event\n *\n * @param event - event to be checked\n */\n public getEventSenderDeviceInfo(event: MatrixEvent): DeviceInfo | null {\n const senderKey = event.getSenderKey();\n const algorithm = event.getWireContent().algorithm;\n\n if (!senderKey || !algorithm) {\n return null;\n }\n\n if (event.isKeySourceUntrusted()) {\n // we got the key for this event from a source that we consider untrusted\n return null;\n }\n\n // senderKey is the Curve25519 identity key of the device which the event\n // was sent from. In the case of Megolm, it's actually the Curve25519\n // identity key of the device which set up the Megolm session.\n\n const device = this.deviceList.getDeviceByIdentityKey(algorithm, senderKey);\n\n if (device === null) {\n // we haven't downloaded the details of this device yet.\n return null;\n }\n\n // so far so good, but now we need to check that the sender of this event\n // hadn't advertised someone else's Curve25519 key as their own. We do that\n // by checking the Ed25519 claimed by the event (or, in the case of megolm,\n // the event which set up the megolm session), to check that it matches the\n // fingerprint of the purported sending device.\n //\n // (see https://github.com/vector-im/vector-web/issues/2215)\n\n const claimedKey = event.getClaimedEd25519Key();\n if (!claimedKey) {\n logger.warn(\"Event \" + event.getId() + \" claims no ed25519 key: \" + \"cannot verify sending device\");\n return null;\n }\n\n if (claimedKey !== device.getFingerprint()) {\n logger.warn(\n \"Event \" +\n event.getId() +\n \" claims ed25519 key \" +\n claimedKey +\n \" but sender device has key \" +\n device.getFingerprint(),\n );\n return null;\n }\n\n return device;\n }\n\n /**\n * Get information about the encryption of an event\n *\n * @param event - event to be checked\n *\n * @returns An object with the fields:\n * - encrypted: whether the event is encrypted (if not encrypted, some of the\n * other properties may not be set)\n * - senderKey: the sender's key\n * - algorithm: the algorithm used to encrypt the event\n * - authenticated: whether we can be sure that the owner of the senderKey\n * sent the event\n * - sender: the sender's device information, if available\n * - mismatchedSender: if the event's ed25519 and curve25519 keys don't match\n * (only meaningful if `sender` is set)\n */\n public getEventEncryptionInfo(event: MatrixEvent): IEncryptedEventInfo {\n const ret: Partial<IEncryptedEventInfo> = {};\n\n ret.senderKey = event.getSenderKey() ?? undefined;\n ret.algorithm = event.getWireContent().algorithm;\n\n if (!ret.senderKey || !ret.algorithm) {\n ret.encrypted = false;\n return ret as IEncryptedEventInfo;\n }\n ret.encrypted = true;\n\n if (event.isKeySourceUntrusted()) {\n // we got the key this event from somewhere else\n // TODO: check if we can trust the forwarders.\n ret.authenticated = false;\n } else {\n ret.authenticated = true;\n }\n\n // senderKey is the Curve25519 identity key of the device which the event\n // was sent from. In the case of Megolm, it's actually the Curve25519\n // identity key of the device which set up the Megolm session.\n\n ret.sender = this.deviceList.getDeviceByIdentityKey(ret.algorithm, ret.senderKey) ?? undefined;\n\n // so far so good, but now we need to check that the sender of this event\n // hadn't advertised someone else's Curve25519 key as their own. We do that\n // by checking the Ed25519 claimed by the event (or, in the case of megolm,\n // the event which set up the megolm session), to check that it matches the\n // fingerprint of the purported sending device.\n //\n // (see https://github.com/vector-im/vector-web/issues/2215)\n\n const claimedKey = event.getClaimedEd25519Key();\n if (!claimedKey) {\n logger.warn(\"Event \" + event.getId() + \" claims no ed25519 key: \" + \"cannot verify sending device\");\n ret.mismatchedSender = true;\n }\n\n if (ret.sender && claimedKey !== ret.sender.getFingerprint()) {\n logger.warn(\n \"Event \" +\n event.getId() +\n \" claims ed25519 key \" +\n claimedKey +\n \"but sender device has key \" +\n ret.sender.getFingerprint(),\n );\n ret.mismatchedSender = true;\n }\n\n return ret as IEncryptedEventInfo;\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi.getEncryptionInfoForEvent}.\n */\n public async getEncryptionInfoForEvent(event: MatrixEvent): Promise<EventEncryptionInfo | null> {\n const encryptionInfo = this.getEventEncryptionInfo(event);\n if (!encryptionInfo.encrypted) {\n return null;\n }\n\n const senderId = event.getSender();\n if (!senderId || encryptionInfo.mismatchedSender) {\n // something definitely wrong is going on here\n\n // previously: E2EState.Warning -> E2ePadlockUnverified -> Red/\"Encrypted by an unverified session\"\n return {\n shieldColour: EventShieldColour.RED,\n shieldReason: EventShieldReason.MISMATCHED_SENDER_KEY,\n };\n }\n\n const userTrust = this.checkUserTrust(senderId);\n if (!userTrust.isCrossSigningVerified()) {\n // If the message is unauthenticated, then display a grey\n // shield, otherwise if the user isn't cross-signed then\n // nothing's needed\n if (!encryptionInfo.authenticated) {\n // previously: E2EState.Unauthenticated -> E2ePadlockUnauthenticated -> Grey/\"The authenticity of this encrypted message can't be guaranteed on this device.\"\n return {\n shieldColour: EventShieldColour.GREY,\n shieldReason: EventShieldReason.AUTHENTICITY_NOT_GUARANTEED,\n };\n } else {\n // previously: E2EState.Normal -> no icon\n return { shieldColour: EventShieldColour.NONE, shieldReason: null };\n }\n }\n\n const eventSenderTrust =\n senderId &&\n encryptionInfo.sender &&\n (await this.getDeviceVerificationStatus(senderId, encryptionInfo.sender.deviceId));\n\n if (!eventSenderTrust) {\n // previously: E2EState.Unknown -> E2ePadlockUnknown -> Grey/\"Encrypted by a deleted session\"\n return {\n shieldColour: EventShieldColour.GREY,\n shieldReason: EventShieldReason.UNKNOWN_DEVICE,\n };\n }\n\n if (!eventSenderTrust.isVerified()) {\n // previously: E2EState.Warning -> E2ePadlockUnverified -> Red/\"Encrypted by an unverified session\"\n return {\n shieldColour: EventShieldColour.RED,\n shieldReason: EventShieldReason.UNSIGNED_DEVICE,\n };\n }\n\n if (!encryptionInfo.authenticated) {\n // previously: E2EState.Unauthenticated -> E2ePadlockUnauthenticated -> Grey/\"The authenticity of this encrypted message can't be guaranteed on this device.\"\n return {\n shieldColour: EventShieldColour.GREY,\n shieldReason: EventShieldReason.AUTHENTICITY_NOT_GUARANTEED,\n };\n }\n\n // previously: E2EState.Verified -> no icon\n return { shieldColour: EventShieldColour.NONE, shieldReason: null };\n }\n\n /**\n * Forces the current outbound group session to be discarded such\n * that another one will be created next time an event is sent.\n *\n * @param roomId - The ID of the room to discard the session for\n *\n * This should not normally be necessary.\n */\n public forceDiscardSession(roomId: string): Promise<void> {\n const alg = this.roomEncryptors.get(roomId);\n if (alg === undefined) throw new Error(\"Room not encrypted\");\n if (alg.forceDiscardSession === undefined) {\n throw new Error(\"Room encryption algorithm doesn't support session discarding\");\n }\n alg.forceDiscardSession();\n return Promise.resolve();\n }\n\n /**\n * Configure a room to use encryption (ie, save a flag in the cryptoStore).\n *\n * @param roomId - The room ID to enable encryption in.\n *\n * @param config - The encryption config for the room.\n *\n * @param inhibitDeviceQuery - true to suppress device list query for\n * users in the room (for now). In case lazy loading is enabled,\n * the device query is always inhibited as the members are not tracked.\n *\n * @deprecated It is normally incorrect to call this method directly. Encryption\n * is enabled by receiving an `m.room.encryption` event (which we may have sent\n * previously).\n */\n public async setRoomEncryption(\n roomId: string,\n config: IRoomEncryption,\n inhibitDeviceQuery?: boolean,\n ): Promise<void> {\n const room = this.clientStore.getRoom(roomId);\n if (!room) {\n throw new Error(`Unable to enable encryption tracking devices in unknown room ${roomId}`);\n }\n await this.setRoomEncryptionImpl(room, config);\n if (!this.lazyLoadMembers && !inhibitDeviceQuery) {\n this.deviceList.refreshOutdatedDeviceLists();\n }\n }\n\n /**\n * Set up encryption for a room.\n *\n * This is called when an <tt>m.room.encryption</tt> event is received. It saves a flag\n * for the room in the cryptoStore (if it wasn't already set), sets up an \"encryptor\" for\n * the room, and enables device-list tracking for the room.\n *\n * It does <em>not</em> initiate a device list query for the room. That is normally\n * done once we finish processing the sync, in onSyncCompleted.\n *\n * @param room - The room to enable encryption in.\n * @param config - The encryption config for the room.\n */\n private async setRoomEncryptionImpl(room: Room, config: IRoomEncryption): Promise<void> {\n const roomId = room.roomId;\n\n // ignore crypto events with no algorithm defined\n // This will happen if a crypto event is redacted before we fetch the room state\n // It would otherwise just throw later as an unknown algorithm would, but we may\n // as well catch this here\n if (!config.algorithm) {\n logger.log(\"Ignoring setRoomEncryption with no algorithm\");\n return;\n }\n\n // if state is being replayed from storage, we might already have a configuration\n // for this room as they are persisted as well.\n // We just need to make sure the algorithm is initialized in this case.\n // However, if the new config is different,\n // we should bail out as room encryption can't be changed once set.\n const existingConfig = this.roomList.getRoomEncryption(roomId);\n if (existingConfig) {\n if (JSON.stringify(existingConfig) != JSON.stringify(config)) {\n logger.error(\"Ignoring m.room.encryption event which requests \" + \"a change of config in \" + roomId);\n return;\n }\n }\n // if we already have encryption in this room, we should ignore this event,\n // as it would reset the encryption algorithm.\n // This is at least expected to be called twice, as sync calls onCryptoEvent\n // for both the timeline and state sections in the /sync response,\n // the encryption event would appear in both.\n // If it's called more than twice though,\n // it signals a bug on client or server.\n const existingAlg = this.roomEncryptors.get(roomId);\n if (existingAlg) {\n return;\n }\n\n // _roomList.getRoomEncryption will not race with _roomList.setRoomEncryption\n // because it first stores in memory. We should await the promise only\n // after all the in-memory state (roomEncryptors and _roomList) has been updated\n // to avoid races when calling this method multiple times. Hence keep a hold of the promise.\n let storeConfigPromise: Promise<void> | null = null;\n if (!existingConfig) {\n storeConfigPromise = this.roomList.setRoomEncryption(roomId, config);\n }\n\n const AlgClass = algorithms.ENCRYPTION_CLASSES.get(config.algorithm);\n if (!AlgClass) {\n throw new Error(\"Unable to encrypt with \" + config.algorithm);\n }\n\n const alg = new AlgClass({\n userId: this.userId,\n deviceId: this.deviceId,\n crypto: this,\n olmDevice: this.olmDevice,\n baseApis: this.baseApis,\n roomId,\n config,\n });\n this.roomEncryptors.set(roomId, alg);\n\n if (storeConfigPromise) {\n await storeConfigPromise;\n }\n\n logger.log(`Enabling encryption in ${roomId}`);\n\n // we don't want to force a download of the full membership list of this room, but as soon as we have that\n // list we can start tracking the device list.\n if (room.membersLoaded()) {\n await this.trackRoomDevicesImpl(room);\n } else {\n // wait for the membership list to be loaded\n const onState = (_state: RoomState): void => {\n room.off(RoomStateEvent.Update, onState);\n if (room.membersLoaded()) {\n this.trackRoomDevicesImpl(room).catch((e) => {\n logger.error(`Error enabling device tracking in ${roomId}`, e);\n });\n }\n };\n room.on(RoomStateEvent.Update, onState);\n }\n }\n\n /**\n * Make sure we are tracking the device lists for all users in this room.\n *\n * @param roomId - The room ID to start tracking devices in.\n * @returns when all devices for the room have been fetched and marked to track\n * @deprecated there's normally no need to call this function: device list tracking\n * will be enabled as soon as we have the full membership list.\n */\n public trackRoomDevices(roomId: string): Promise<void> {\n const room = this.clientStore.getRoom(roomId);\n if (!room) {\n throw new Error(`Unable to start tracking devices in unknown room ${roomId}`);\n }\n return this.trackRoomDevicesImpl(room);\n }\n\n /**\n * Make sure we are tracking the device lists for all users in this room.\n *\n * This is normally called when we are about to send an encrypted event, to make sure\n * we have all the devices in the room; but it is also called when processing an\n * m.room.encryption state event (if lazy-loading is disabled), or when members are\n * loaded (if lazy-loading is enabled), to prepare the device list.\n *\n * @param room - Room to enable device-list tracking in\n */\n private trackRoomDevicesImpl(room: Room): Promise<void> {\n const roomId = room.roomId;\n const trackMembers = async (): Promise<void> => {\n // not an encrypted room\n if (!this.roomEncryptors.has(roomId)) {\n return;\n }\n logger.log(`Starting to track devices for room ${roomId} ...`);\n const members = await room.getEncryptionTargetMembers();\n members.forEach((m) => {\n this.deviceList.startTrackingDeviceList(m.userId);\n });\n };\n\n let promise = this.roomDeviceTrackingState[roomId];\n if (!promise) {\n promise = trackMembers();\n this.roomDeviceTrackingState[roomId] = promise.catch((err) => {\n delete this.roomDeviceTrackingState[roomId];\n throw err;\n });\n }\n return promise;\n }\n\n /**\n * Try to make sure we have established olm sessions for all known devices for\n * the given users.\n *\n * @param users - list of user ids\n * @param force - If true, force a new Olm session to be created. Default false.\n *\n * @returns resolves once the sessions are complete, to\n * an Object mapping from userId to deviceId to\n * `IOlmSessionResult`\n */\n public ensureOlmSessionsForUsers(\n users: string[],\n force?: boolean,\n ): Promise<Map<string, Map<string, olmlib.IOlmSessionResult>>> {\n // map user Id → DeviceInfo[]\n const devicesByUser: Map<string, DeviceInfo[]> = new Map();\n\n for (const userId of users) {\n const userDevices: DeviceInfo[] = [];\n devicesByUser.set(userId, userDevices);\n\n const devices = this.getStoredDevicesForUser(userId) || [];\n for (const deviceInfo of devices) {\n const key = deviceInfo.getIdentityKey();\n if (key == this.olmDevice.deviceCurve25519Key) {\n // don't bother setting up session to ourself\n continue;\n }\n if (deviceInfo.verified == DeviceVerification.BLOCKED) {\n // don't bother setting up sessions with blocked users\n continue;\n }\n\n userDevices.push(deviceInfo);\n }\n }\n\n return olmlib.ensureOlmSessionsForDevices(this.olmDevice, this.baseApis, devicesByUser, force);\n }\n\n /**\n * Get a list containing all of the room keys\n *\n * @returns a list of session export objects\n */\n public async exportRoomKeys(): Promise<IMegolmSessionData[]> {\n const exportedSessions: IMegolmSessionData[] = [];\n await this.cryptoStore.doTxn(\"readonly\", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS], (txn) => {\n this.cryptoStore.getAllEndToEndInboundGroupSessions(txn, (s) => {\n if (s === null) return;\n\n const sess = this.olmDevice.exportInboundGroupSession(s.senderKey, s.sessionId, s.sessionData!);\n delete sess.first_known_index;\n sess.algorithm = olmlib.MEGOLM_ALGORITHM;\n exportedSessions.push(sess);\n });\n });\n\n return exportedSessions;\n }\n\n /**\n * Get a JSON list containing all of the room keys\n *\n * @returns a JSON string encoding a list of session\n * export objects, each of which is an IMegolmSessionData\n */\n public async exportRoomKeysAsJson(): Promise<string> {\n return JSON.stringify(await this.exportRoomKeys());\n }\n\n /**\n * Import a list of room keys previously exported by exportRoomKeys\n *\n * @param keys - a list of session export objects\n * @returns a promise which resolves once the keys have been imported\n */\n public importRoomKeys(keys: IMegolmSessionData[], opts: ImportRoomKeysOpts = {}): Promise<void> {\n let successes = 0;\n let failures = 0;\n const total = keys.length;\n\n function updateProgress(): void {\n opts.progressCallback?.({\n stage: \"load_keys\",\n successes,\n failures,\n total,\n });\n }\n\n return Promise.all(\n keys.map((key) => {\n if (!key.room_id || !key.algorithm) {\n logger.warn(\"ignoring room key entry with missing fields\", key);\n failures++;\n if (opts.progressCallback) {\n updateProgress();\n }\n return null;\n }\n\n const alg = this.getRoomDecryptor(key.room_id, key.algorithm);\n return alg.importRoomKey(key, opts).finally(() => {\n successes++;\n if (opts.progressCallback) {\n updateProgress();\n }\n });\n }),\n ).then();\n }\n\n /**\n * Import a JSON string encoding a list of room keys previously\n * exported by exportRoomKeysAsJson\n *\n * @param keys - a JSON string encoding a list of session export\n * objects, each of which is an IMegolmSessionData\n * @param opts - options object\n * @returns a promise which resolves once the keys have been imported\n */\n public async importRoomKeysAsJson(keys: string, opts?: ImportRoomKeysOpts): Promise<void> {\n return await this.importRoomKeys(JSON.parse(keys));\n }\n\n /**\n * Counts the number of end to end session keys that are waiting to be backed up\n * @returns Promise which resolves to the number of sessions requiring backup\n */\n public countSessionsNeedingBackup(): Promise<number> {\n return this.backupManager.countSessionsNeedingBackup();\n }\n\n /**\n * Perform any background tasks that can be done before a message is ready to\n * send, in order to speed up sending of the message.\n *\n * @param room - the room the event is in\n */\n public prepareToEncrypt(room: Room): void {\n const alg = this.roomEncryptors.get(room.roomId);\n if (alg) {\n alg.prepareToEncrypt(room);\n }\n }\n\n /**\n * Encrypt an event according to the configuration of the room.\n *\n * @param event - event to be sent\n *\n * @param room - destination room.\n *\n * @returns Promise which resolves when the event has been\n * encrypted, or null if nothing was needed\n */\n public async encryptEvent(event: MatrixEvent, room: Room): Promise<void> {\n const roomId = event.getRoomId()!;\n\n const alg = this.roomEncryptors.get(roomId);\n if (!alg) {\n // MatrixClient has already checked that this room should be encrypted,\n // so this is an unexpected situation.\n throw new Error(\n \"Room \" +\n roomId +\n \" was previously configured to use encryption, but is \" +\n \"no longer. Perhaps the homeserver is hiding the \" +\n \"configuration event.\",\n );\n }\n\n // wait for all the room devices to be loaded\n await this.trackRoomDevicesImpl(room);\n\n let content = event.getContent();\n // If event has an m.relates_to then we need\n // to put this on the wrapping event instead\n const mRelatesTo = content[\"m.relates_to\"];\n if (mRelatesTo) {\n // Clone content here so we don't remove `m.relates_to` from the local-echo\n content = Object.assign({}, content);\n delete content[\"m.relates_to\"];\n }\n\n // Treat element's performance metrics the same as `m.relates_to` (when present)\n const elementPerfMetrics = content[\"io.element.performance_metrics\"];\n if (elementPerfMetrics) {\n content = Object.assign({}, content);\n delete content[\"io.element.performance_metrics\"];\n }\n\n const encryptedContent = (await alg.encryptMessage(room, event.getType(), content)) as IContent;\n\n if (mRelatesTo) {\n encryptedContent[\"m.relates_to\"] = mRelatesTo;\n }\n if (elementPerfMetrics) {\n encryptedContent[\"io.element.performance_metrics\"] = elementPerfMetrics;\n }\n\n event.makeEncrypted(\n \"m.room.encrypted\",\n encryptedContent,\n this.olmDevice.deviceCurve25519Key!,\n this.olmDevice.deviceEd25519Key!,\n );\n }\n\n /**\n * Decrypt a received event\n *\n *\n * @returns resolves once we have\n * finished decrypting. Rejects with an `algorithms.DecryptionError` if there\n * is a problem decrypting the event.\n */\n public async decryptEvent(event: MatrixEvent): Promise<IEventDecryptionResult> {\n if (event.isRedacted()) {\n // Try to decrypt the redaction event, to support encrypted\n // redaction reasons. If we can't decrypt, just fall back to using\n // the original redacted_because.\n const redactionEvent = new MatrixEvent({\n room_id: event.getRoomId(),\n ...event.getUnsigned().redacted_because,\n });\n let redactedBecause: IEvent = event.getUnsigned().redacted_because!;\n if (redactionEvent.isEncrypted()) {\n try {\n const decryptedEvent = await this.decryptEvent(redactionEvent);\n redactedBecause = decryptedEvent.clearEvent as IEvent;\n } catch (e) {\n logger.warn(\"Decryption of redaction failed. Falling back to unencrypted event.\", e);\n }\n }\n\n return {\n clearEvent: {\n room_id: event.getRoomId(),\n type: \"m.room.message\",\n content: {},\n unsigned: {\n redacted_because: redactedBecause,\n },\n },\n };\n } else {\n const content = event.getWireContent();\n const alg = this.getRoomDecryptor(event.getRoomId()!, content.algorithm);\n return alg.decryptEvent(event);\n }\n }\n\n /**\n * Handle the notification from /sync that device lists have\n * been changed.\n *\n * @param deviceLists - device_lists field from /sync\n */\n public async processDeviceLists(deviceLists: IDeviceLists): Promise<void> {\n // Here, we're relying on the fact that we only ever save the sync data after\n // sucessfully saving the device list data, so we're guaranteed that the device\n // list store is at least as fresh as the sync token from the sync store, ie.\n // any device changes received in sync tokens prior to the 'next' token here\n // have been processed and are reflected in the current device list.\n // If we didn't make this assumption, we'd have to use the /keys/changes API\n // to get key changes between the sync token in the device list and the 'old'\n // sync token used here to make sure we didn't miss any.\n await this.evalDeviceListChanges(deviceLists);\n }\n\n /**\n * Send a request for some room keys, if we have not already done so\n *\n * @param resend - whether to resend the key request if there is\n * already one\n *\n * @returns a promise that resolves when the key request is queued\n */\n public requestRoomKey(\n requestBody: IRoomKeyRequestBody,\n recipients: IRoomKeyRequestRecipient[],\n resend = false,\n ): Promise<void> {\n return this.outgoingRoomKeyRequestManager\n .queueRoomKeyRequest(requestBody, recipients, resend)\n .then(() => {\n if (this.sendKeyRequestsImmediately) {\n this.outgoingRoomKeyRequestManager.sendQueuedRequests();\n }\n })\n .catch((e) => {\n // this normally means we couldn't talk to the store\n logger.error(\"Error requesting key for event\", e);\n });\n }\n\n /**\n * Cancel any earlier room key request\n *\n * @param requestBody - parameters to match for cancellation\n */\n public cancelRoomKeyRequest(requestBody: IRoomKeyRequestBody): void {\n this.outgoingRoomKeyRequestManager.cancelRoomKeyRequest(requestBody).catch((e) => {\n logger.warn(\"Error clearing pending room key requests\", e);\n });\n }\n\n /**\n * Re-send any outgoing key requests, eg after verification\n * @returns\n */\n public async cancelAndResendAllOutgoingKeyRequests(): Promise<void> {\n await this.outgoingRoomKeyRequestManager.cancelAndResendAllOutgoingRequests();\n }\n\n /**\n * handle an m.room.encryption event\n *\n * @param room - in which the event was received\n * @param event - encryption event to be processed\n */\n public async onCryptoEvent(room: Room, event: MatrixEvent): Promise<void> {\n const content = event.getContent<IRoomEncryption>();\n await this.setRoomEncryptionImpl(room, content);\n }\n\n /**\n * Called before the result of a sync is processed\n *\n * @param syncData - the data from the 'MatrixClient.sync' event\n */\n public async onSyncWillProcess(syncData: ISyncStateData): Promise<void> {\n if (!syncData.oldSyncToken) {\n // If there is no old sync token, we start all our tracking from\n // scratch, so mark everything as untracked. onCryptoEvent will\n // be called for all e2e rooms during the processing of the sync,\n // at which point we'll start tracking all the users of that room.\n logger.log(\"Initial sync performed - resetting device tracking state\");\n this.deviceList.stopTrackingAllDeviceLists();\n // we always track our own device list (for key backups etc)\n this.deviceList.startTrackingDeviceList(this.userId);\n this.roomDeviceTrackingState = {};\n }\n\n this.sendKeyRequestsImmediately = false;\n }\n\n /**\n * handle the completion of a /sync\n *\n * This is called after the processing of each successful /sync response.\n * It is an opportunity to do a batch process on the information received.\n *\n * @param syncData - the data from the 'MatrixClient.sync' event\n */\n public async onSyncCompleted(syncData: OnSyncCompletedData): Promise<void> {\n this.deviceList.setSyncToken(syncData.nextSyncToken ?? null);\n this.deviceList.saveIfDirty();\n\n // we always track our own device list (for key backups etc)\n this.deviceList.startTrackingDeviceList(this.userId);\n\n this.deviceList.refreshOutdatedDeviceLists();\n\n // we don't start uploading one-time keys until we've caught up with\n // to-device messages, to help us avoid throwing away one-time-keys that we\n // are about to receive messages for\n // (https://github.com/vector-im/element-web/issues/2782).\n if (!syncData.catchingUp) {\n this.maybeUploadOneTimeKeys();\n this.processReceivedRoomKeyRequests();\n\n // likewise don't start requesting keys until we've caught up\n // on to_device messages, otherwise we'll request keys that we're\n // just about to get.\n this.outgoingRoomKeyRequestManager.sendQueuedRequests();\n\n // Sync has finished so send key requests straight away.\n this.sendKeyRequestsImmediately = true;\n }\n }\n\n /**\n * Trigger the appropriate invalidations and removes for a given\n * device list\n *\n * @param deviceLists - device_lists field from /sync, or response from\n * /keys/changes\n */\n private async evalDeviceListChanges(deviceLists: Required<ISyncResponse>[\"device_lists\"]): Promise<void> {\n if (Array.isArray(deviceLists?.changed)) {\n deviceLists.changed.forEach((u) => {\n this.deviceList.invalidateUserDeviceList(u);\n });\n }\n\n if (Array.isArray(deviceLists?.left) && deviceLists.left.length) {\n // Check we really don't share any rooms with these users\n // any more: the server isn't required to give us the\n // exact correct set.\n const e2eUserIds = new Set(await this.getTrackedE2eUsers());\n\n deviceLists.left.forEach((u) => {\n if (!e2eUserIds.has(u)) {\n this.deviceList.stopTrackingDeviceList(u);\n }\n });\n }\n }\n\n /**\n * Get a list of all the IDs of users we share an e2e room with\n * for which we are tracking devices already\n *\n * @returns List of user IDs\n */\n private async getTrackedE2eUsers(): Promise<string[]> {\n const e2eUserIds: string[] = [];\n for (const room of this.getTrackedE2eRooms()) {\n const members = await room.getEncryptionTargetMembers();\n for (const member of members) {\n e2eUserIds.push(member.userId);\n }\n }\n return e2eUserIds;\n }\n\n /**\n * Get a list of the e2e-enabled rooms we are members of,\n * and for which we are already tracking the devices\n *\n * @returns\n */\n private getTrackedE2eRooms(): Room[] {\n return this.clientStore.getRooms().filter((room) => {\n // check for rooms with encryption enabled\n const alg = this.roomEncryptors.get(room.roomId);\n if (!alg) {\n return false;\n }\n if (!this.roomDeviceTrackingState[room.roomId]) {\n return false;\n }\n\n // ignore any rooms which we have left\n const myMembership = room.getMyMembership();\n return myMembership === KnownMembership.Join || myMembership === KnownMembership.Invite;\n });\n }\n\n /**\n * Encrypts and sends a given object via Olm to-device messages to a given\n * set of devices.\n * @param userDeviceInfoArr - the devices to send to\n * @param payload - fields to include in the encrypted payload\n * @returns Promise which\n * resolves once the message has been encrypted and sent to the given\n * userDeviceMap, and returns the `{ contentMap, deviceInfoByDeviceId }`\n * of the successfully sent messages.\n *\n * @deprecated Instead use {@link encryptToDeviceMessages} followed by {@link MatrixClient.queueToDevice}.\n */\n public async encryptAndSendToDevices(userDeviceInfoArr: IOlmDevice<DeviceInfo>[], payload: object): Promise<void> {\n try {\n const toDeviceBatch = await this.prepareToDeviceBatch(userDeviceInfoArr, payload);\n\n try {\n await this.baseApis.queueToDevice(toDeviceBatch);\n } catch (e) {\n logger.error(\"sendToDevice failed\", e);\n throw e;\n }\n } catch (e) {\n logger.error(\"encryptAndSendToDevices promises failed\", e);\n throw e;\n }\n }\n\n private async prepareToDeviceBatch(\n userDeviceInfoArr: IOlmDevice<DeviceInfo>[],\n payload: object,\n ): Promise<ToDeviceBatch> {\n const toDeviceBatch: ToDeviceBatch = {\n eventType: EventType.RoomMessageEncrypted,\n batch: [],\n };\n\n await Promise.all(\n userDeviceInfoArr.map(async ({ userId, deviceInfo }) => {\n const deviceId = deviceInfo.deviceId;\n const encryptedContent: IEncryptedContent = {\n algorithm: olmlib.OLM_ALGORITHM,\n sender_key: this.olmDevice.deviceCurve25519Key!,\n ciphertext: {},\n [ToDeviceMessageId]: uuidv4(),\n };\n\n toDeviceBatch.batch.push({\n userId,\n deviceId,\n payload: encryptedContent,\n });\n\n await olmlib.ensureOlmSessionsForDevices(\n this.olmDevice,\n this.baseApis,\n new Map([[userId, [deviceInfo]]]),\n );\n await olmlib.encryptMessageForDevice(\n encryptedContent.ciphertext,\n this.userId,\n this.deviceId,\n this.olmDevice,\n userId,\n deviceInfo,\n payload,\n );\n }),\n );\n\n // prune out any devices that encryptMessageForDevice could not encrypt for,\n // in which case it will have just not added anything to the ciphertext object.\n // There's no point sending messages to devices if we couldn't encrypt to them,\n // since that's effectively a blank message.\n toDeviceBatch.batch = toDeviceBatch.batch.filter((msg) => {\n if (Object.keys(msg.payload.ciphertext).length > 0) {\n return true;\n } else {\n logger.log(`No ciphertext for device ${msg.userId}:${msg.deviceId}: pruning`);\n return false;\n }\n });\n\n return toDeviceBatch;\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#encryptToDeviceMessages}.\n */\n public async encryptToDeviceMessages(\n eventType: string,\n devices: { userId: string; deviceId: string }[],\n payload: ToDevicePayload,\n ): Promise<ToDeviceBatch> {\n const userIds = new Set(devices.map(({ userId }) => userId));\n const deviceInfoMap = await this.downloadKeys(Array.from(userIds), false);\n\n const userDeviceInfoArr: IOlmDevice<DeviceInfo>[] = [];\n\n devices.forEach(({ userId, deviceId }) => {\n const devices = deviceInfoMap.get(userId);\n if (!devices) {\n logger.warn(`No devices found for user ${userId}`);\n return;\n }\n\n if (devices.has(deviceId)) {\n // Send the message to a specific device\n userDeviceInfoArr.push({ userId, deviceInfo: devices.get(deviceId)! });\n } else {\n logger.warn(`No device found for user ${userId} with id ${deviceId}`);\n }\n });\n\n return this.prepareToDeviceBatch(userDeviceInfoArr, payload);\n }\n\n private onMembership = (event: MatrixEvent, member: RoomMember, oldMembership?: string): void => {\n try {\n this.onRoomMembership(event, member, oldMembership);\n } catch (e) {\n logger.error(\"Error handling membership change:\", e);\n }\n };\n\n public async preprocessToDeviceMessages(events: IToDeviceEvent[]): Promise<IToDeviceEvent[]> {\n // all we do here is filter out encrypted to-device messages with the wrong algorithm. Decryption\n // happens later in decryptEvent, via the EventMapper\n return events.filter((toDevice) => {\n if (\n toDevice.type === EventType.RoomMessageEncrypted &&\n ![\"m.olm.v1.curve25519-aes-sha2\"].includes(toDevice.content?.algorithm)\n ) {\n logger.log(\"Ignoring invalid encrypted to-device event from \" + toDevice.sender);\n return false;\n }\n return true;\n });\n }\n\n /**\n * Stores the current one_time_key count which will be handled later (in a call of\n * onSyncCompleted).\n *\n * @param currentCount - The current count of one_time_keys to be stored\n */\n private updateOneTimeKeyCount(currentCount: number): void {\n if (isFinite(currentCount)) {\n this.oneTimeKeyCount = currentCount;\n } else {\n throw new TypeError(\"Parameter for updateOneTimeKeyCount has to be a number\");\n }\n }\n\n public processKeyCounts(oneTimeKeysCounts?: Record<string, number>, unusedFallbackKeys?: string[]): Promise<void> {\n if (oneTimeKeysCounts !== undefined) {\n this.updateOneTimeKeyCount(oneTimeKeysCounts[\"signed_curve25519\"] || 0);\n }\n\n if (unusedFallbackKeys !== undefined) {\n // If `unusedFallbackKeys` is defined, that means `device_unused_fallback_key_types`\n // is present in the sync response, which indicates that the server supports fallback keys.\n //\n // If there's no unused signed_curve25519 fallback key, we need a new one.\n this.needsNewFallback = !unusedFallbackKeys.includes(\"signed_curve25519\");\n }\n\n return Promise.resolve();\n }\n\n private onToDeviceEvent = (event: MatrixEvent): void => {\n try {\n logger.log(\n `received to-device ${event.getType()} from: ` +\n `${event.getSender()} id: ${event.getContent()[ToDeviceMessageId]}`,\n );\n\n if (event.getType() == \"m.room_key\" || event.getType() == \"m.forwarded_room_key\") {\n this.onRoomKeyEvent(event);\n } else if (event.getType() == \"m.room_key_request\") {\n this.onRoomKeyRequestEvent(event);\n } else if (event.getType() === \"m.secret.request\") {\n this.secretStorage.onRequestReceived(event);\n } else if (event.getType() === \"m.secret.send\") {\n this.secretStorage.onSecretReceived(event);\n } else if (event.getType() === \"m.room_key.withheld\") {\n this.onRoomKeyWithheldEvent(event);\n } else if (event.getContent().transaction_id) {\n this.onKeyVerificationMessage(event);\n } else if (event.getContent().msgtype === \"m.bad.encrypted\") {\n this.onToDeviceBadEncrypted(event);\n } else if (event.isBeingDecrypted() || event.shouldAttemptDecryption()) {\n if (!event.isBeingDecrypted()) {\n event.attemptDecryption(this);\n }\n // once the event has been decrypted, try again\n event.once(MatrixEventEvent.Decrypted, (ev) => {\n this.onToDeviceEvent(ev);\n });\n }\n } catch (e) {\n logger.error(\"Error handling toDeviceEvent:\", e);\n }\n };\n\n /**\n * Handle a key event\n *\n * @internal\n * @param event - key event\n */\n private onRoomKeyEvent(event: MatrixEvent): void {\n const content = event.getContent();\n\n if (!content.room_id || !content.algorithm) {\n logger.error(\"key event is missing fields\");\n return;\n }\n\n if (!this.backupManager.checkedForBackup) {\n // don't bother awaiting on this - the important thing is that we retry if we\n // haven't managed to check before\n this.backupManager.checkAndStart();\n }\n\n const alg = this.getRoomDecryptor(content.room_id, content.algorithm);\n alg.onRoomKeyEvent(event);\n }\n\n /**\n * Handle a key withheld event\n *\n * @internal\n * @param event - key withheld event\n */\n private onRoomKeyWithheldEvent(event: MatrixEvent): void {\n const content = event.getContent();\n\n if (\n (content.code !== \"m.no_olm\" && (!content.room_id || !content.session_id)) ||\n !content.algorithm ||\n !content.sender_key\n ) {\n logger.error(\"key withheld event is missing fields\");\n return;\n }\n\n logger.info(\n `Got room key withheld event from ${event.getSender()} ` +\n `for ${content.algorithm} session ${content.sender_key}|${content.session_id} ` +\n `in room ${content.room_id} with code ${content.code} (${content.reason})`,\n );\n\n const alg = this.getRoomDecryptor(content.room_id, content.algorithm);\n if (alg.onRoomKeyWithheldEvent) {\n alg.onRoomKeyWithheldEvent(event);\n }\n if (!content.room_id) {\n // retry decryption for all events sent by the sender_key. This will\n // update the events to show a message indicating that the olm session was\n // wedged.\n const roomDecryptors = this.getRoomDecryptors(content.algorithm);\n for (const decryptor of roomDecryptors) {\n decryptor.retryDecryptionFromSender(content.sender_key);\n }\n }\n }\n\n /**\n * Handle a general key verification event.\n *\n * @internal\n * @param event - verification start event\n */\n private onKeyVerificationMessage(event: MatrixEvent): void {\n if (!ToDeviceChannel.validateEvent(event, this.baseApis)) {\n return;\n }\n const createRequest = (event: MatrixEvent): VerificationRequest | undefined => {\n if (!ToDeviceChannel.canCreateRequest(ToDeviceChannel.getEventType(event))) {\n return;\n }\n const content = event.getContent();\n const deviceId = content && content.from_device;\n if (!deviceId) {\n return;\n }\n const userId = event.getSender()!;\n const channel = new ToDeviceChannel(this.baseApis, userId, [deviceId]);\n return new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n };\n this.handleVerificationEvent(event, this.toDeviceVerificationRequests, createRequest);\n }\n\n /**\n * Handle key verification requests sent as timeline events\n *\n * @internal\n * @param event - the timeline event\n * @param room - not used\n * @param atStart - not used\n * @param removed - not used\n * @param whether - this is a live event\n */\n private onTimelineEvent = (\n event: MatrixEvent,\n room: Room,\n atStart: boolean,\n removed: boolean,\n { liveEvent = true } = {},\n ): void => {\n if (!InRoomChannel.validateEvent(event, this.baseApis)) {\n return;\n }\n const createRequest = (event: MatrixEvent): VerificationRequest => {\n const channel = new InRoomChannel(this.baseApis, event.getRoomId()!);\n return new VerificationRequest(channel, this.verificationMethods, this.baseApis);\n };\n this.handleVerificationEvent(event, this.inRoomVerificationRequests, createRequest, liveEvent);\n };\n\n private async handleVerificationEvent(\n event: MatrixEvent,\n requestsMap: IRequestsMap,\n createRequest: (event: MatrixEvent) => VerificationRequest | undefined,\n isLiveEvent = true,\n ): Promise<void> {\n // Wait for event to get its final ID with pendingEventOrdering: \"chronological\", since DM channels depend on it.\n if (event.isSending() && event.status != EventStatus.SENT) {\n let eventIdListener: () => void;\n let statusListener: () => void;\n try {\n await new Promise<void>((resolve, reject) => {\n eventIdListener = resolve;\n statusListener = (): void => {\n if (event.status == EventStatus.CANCELLED) {\n reject(new Error(\"Event status set to CANCELLED.\"));\n }\n };\n event.once(MatrixEventEvent.LocalEventIdReplaced, eventIdListener);\n event.on(MatrixEventEvent.Status, statusListener);\n });\n } catch (err) {\n logger.error(\"error while waiting for the verification event to be sent: \", err);\n return;\n } finally {\n event.removeListener(MatrixEventEvent.LocalEventIdReplaced, eventIdListener!);\n event.removeListener(MatrixEventEvent.Status, statusListener!);\n }\n }\n let request: VerificationRequest | undefined = requestsMap.getRequest(event);\n let isNewRequest = false;\n if (!request) {\n request = createRequest(event);\n // a request could not be made from this event, so ignore event\n if (!request) {\n logger.log(\n `Crypto: could not find VerificationRequest for ` +\n `${event.getType()}, and could not create one, so ignoring.`,\n );\n return;\n }\n isNewRequest = true;\n requestsMap.setRequest(event, request);\n }\n event.setVerificationRequest(request);\n try {\n await request.channel.handleEvent(event, request, isLiveEvent);\n } catch (err) {\n logger.error(\"error while handling verification event\", err);\n }\n const shouldEmit =\n isNewRequest &&\n !request.initiatedByMe &&\n !request.invalid && // check it has enough events to pass the UNSENT stage\n !request.observeOnly;\n if (shouldEmit) {\n this.baseApis.emit(CryptoEvent.VerificationRequest, request);\n this.baseApis.emit(CryptoEvent.VerificationRequestReceived, request);\n }\n }\n\n /**\n * Handle a toDevice event that couldn't be decrypted\n *\n * @internal\n * @param event - undecryptable event\n */\n private async onToDeviceBadEncrypted(event: MatrixEvent): Promise<void> {\n const content = event.getWireContent();\n const sender = event.getSender();\n const algorithm = content.algorithm;\n const deviceKey = content.sender_key;\n\n this.baseApis.emit(ClientEvent.UndecryptableToDeviceEvent, event);\n\n // retry decryption for all events sent by the sender_key. This will\n // update the events to show a message indicating that the olm session was\n // wedged.\n const retryDecryption = (): void => {\n const roomDecryptors = this.getRoomDecryptors(olmlib.MEGOLM_ALGORITHM);\n for (const decryptor of roomDecryptors) {\n decryptor.retryDecryptionFromSender(deviceKey);\n }\n };\n\n if (sender === undefined || deviceKey === undefined || deviceKey === undefined) {\n return;\n }\n\n // check when we can force a new session with this device: if we've already done so\n // recently, don't do it again.\n const forceNewSessionRetryTimeDevices = this.forceNewSessionRetryTime.getOrCreate(sender);\n const forceNewSessionRetryTime = forceNewSessionRetryTimeDevices.getOrCreate(deviceKey);\n if (forceNewSessionRetryTime > Date.now()) {\n logger.debug(\n `New session already forced with device ${sender}:${deviceKey}: ` +\n `not forcing another until at least ${new Date(forceNewSessionRetryTime).toUTCString()}`,\n );\n await this.olmDevice.recordSessionProblem(deviceKey, \"wedged\", true);\n retryDecryption();\n return;\n }\n\n // make sure we don't retry to unwedge too soon even if we fail to create a new session\n forceNewSessionRetryTimeDevices.set(deviceKey, Date.now() + FORCE_SESSION_RETRY_INTERVAL_MS);\n\n // establish a new olm session with this device since we're failing to decrypt messages\n // on a current session.\n // Note that an undecryptable message from another device could easily be spoofed -\n // is there anything we can do to mitigate this?\n let device = this.deviceList.getDeviceByIdentityKey(algorithm, deviceKey);\n if (!device) {\n // if we don't know about the device, fetch the user's devices again\n // and retry before giving up\n await this.downloadKeys([sender], false);\n device = this.deviceList.getDeviceByIdentityKey(algorithm, deviceKey);\n if (!device) {\n logger.info(\"Couldn't find device for identity key \" + deviceKey + \": not re-establishing session\");\n await this.olmDevice.recordSessionProblem(deviceKey, \"wedged\", false);\n retryDecryption();\n return;\n }\n }\n const devicesByUser = new Map([[sender, [device]]]);\n await olmlib.ensureOlmSessionsForDevices(this.olmDevice, this.baseApis, devicesByUser, true);\n\n forceNewSessionRetryTimeDevices.set(deviceKey, Date.now() + MIN_FORCE_SESSION_INTERVAL_MS);\n\n // Now send a blank message on that session so the other side knows about it.\n // (The keyshare request is sent in the clear so that won't do)\n // We send this first such that, as long as the toDevice messages arrive in the\n // same order we sent them, the other end will get this first, set up the new session,\n // then get the keyshare request and send the key over this new session (because it\n // is the session it has most recently received a message on).\n const encryptedContent: IEncryptedContent = {\n algorithm: olmlib.OLM_ALGORITHM,\n sender_key: this.olmDevice.deviceCurve25519Key!,\n ciphertext: {},\n [ToDeviceMessageId]: uuidv4(),\n };\n await olmlib.encryptMessageForDevice(\n encryptedContent.ciphertext,\n this.userId,\n this.deviceId,\n this.olmDevice,\n sender,\n device,\n { type: \"m.dummy\" },\n );\n\n await this.olmDevice.recordSessionProblem(deviceKey, \"wedged\", true);\n retryDecryption();\n\n await this.baseApis.sendToDevice(\n \"m.room.encrypted\",\n new Map([[sender, new Map([[device.deviceId, encryptedContent]])]]),\n );\n\n // Most of the time this probably won't be necessary since we'll have queued up a key request when\n // we failed to decrypt the message and will be waiting a bit for the key to arrive before sending\n // it. This won't always be the case though so we need to re-send any that have already been sent\n // to avoid races.\n const requestsToResend = await this.outgoingRoomKeyRequestManager.getOutgoingSentRoomKeyRequest(\n sender,\n device.deviceId,\n );\n for (const keyReq of requestsToResend) {\n this.requestRoomKey(keyReq.requestBody, keyReq.recipients, true);\n }\n }\n\n /**\n * Handle a change in the membership state of a member of a room\n *\n * @internal\n * @param event - event causing the change\n * @param member - user whose membership changed\n * @param oldMembership - previous membership\n */\n private onRoomMembership(event: MatrixEvent, member: RoomMember, oldMembership?: string): void {\n // this event handler is registered on the *client* (as opposed to the room\n // member itself), which means it is only called on changes to the *live*\n // membership state (ie, it is not called when we back-paginate, nor when\n // we load the state in the initialsync).\n //\n // Further, it is automatically registered and called when new members\n // arrive in the room.\n\n const roomId = member.roomId;\n\n const alg = this.roomEncryptors.get(roomId);\n if (!alg) {\n // not encrypting in this room\n return;\n }\n // only mark users in this room as tracked if we already started tracking in this room\n // this way we don't start device queries after sync on behalf of this room which we won't use\n // the result of anyway, as we'll need to do a query again once all the members are fetched\n // by calling _trackRoomDevices\n if (roomId in this.roomDeviceTrackingState) {\n if (member.membership == KnownMembership.Join) {\n logger.log(\"Join event for \" + member.userId + \" in \" + roomId);\n // make sure we are tracking the deviceList for this user\n this.deviceList.startTrackingDeviceList(member.userId);\n } else if (\n member.membership == KnownMembership.Invite &&\n this.clientStore.getRoom(roomId)?.shouldEncryptForInvitedMembers()\n ) {\n logger.log(\"Invite event for \" + member.userId + \" in \" + roomId);\n this.deviceList.startTrackingDeviceList(member.userId);\n }\n }\n\n alg.onRoomMembership(event, member, oldMembership);\n }\n\n /**\n * Called when we get an m.room_key_request event.\n *\n * @internal\n * @param event - key request event\n */\n private onRoomKeyRequestEvent(event: MatrixEvent): void {\n const content = event.getContent();\n if (content.action === \"request\") {\n // Queue it up for now, because they tend to arrive before the room state\n // events at initial sync, and we want to see if we know anything about the\n // room before passing them on to the app.\n const req = new IncomingRoomKeyRequest(event);\n this.receivedRoomKeyRequests.push(req);\n } else if (content.action === \"request_cancellation\") {\n const req = new IncomingRoomKeyRequestCancellation(event);\n this.receivedRoomKeyRequestCancellations.push(req);\n }\n }\n\n /**\n * Process any m.room_key_request events which were queued up during the\n * current sync.\n *\n * @internal\n */\n private async processReceivedRoomKeyRequests(): Promise<void> {\n if (this.processingRoomKeyRequests) {\n // we're still processing last time's requests; keep queuing new ones\n // up for now.\n return;\n }\n this.processingRoomKeyRequests = true;\n\n try {\n // we need to grab and clear the queues in the synchronous bit of this method,\n // so that we don't end up racing with the next /sync.\n const requests = this.receivedRoomKeyRequests;\n this.receivedRoomKeyRequests = [];\n const cancellations = this.receivedRoomKeyRequestCancellations;\n this.receivedRoomKeyRequestCancellations = [];\n\n // Process all of the requests, *then* all of the cancellations.\n //\n // This makes sure that if we get a request and its cancellation in the\n // same /sync result, then we process the request before the\n // cancellation (and end up with a cancelled request), rather than the\n // cancellation before the request (and end up with an outstanding\n // request which should have been cancelled.)\n await Promise.all(requests.map((req) => this.processReceivedRoomKeyRequest(req)));\n await Promise.all(\n cancellations.map((cancellation) => this.processReceivedRoomKeyRequestCancellation(cancellation)),\n );\n } catch (e) {\n logger.error(`Error processing room key requsts: ${e}`);\n } finally {\n this.processingRoomKeyRequests = false;\n }\n }\n\n /**\n * Helper for processReceivedRoomKeyRequests\n *\n */\n private async processReceivedRoomKeyRequest(req: IncomingRoomKeyRequest): Promise<void> {\n const userId = req.userId;\n const deviceId = req.deviceId;\n\n const body = req.requestBody;\n const roomId = body.room_id;\n const alg = body.algorithm;\n\n logger.log(\n `m.room_key_request from ${userId}:${deviceId}` +\n ` for ${roomId} / ${body.session_id} (id ${req.requestId})`,\n );\n\n if (userId !== this.userId) {\n if (!this.roomEncryptors.get(roomId)) {\n logger.debug(`room key request for unencrypted room ${roomId}`);\n return;\n }\n const encryptor = this.roomEncryptors.get(roomId)!;\n const device = this.deviceList.getStoredDevice(userId, deviceId);\n if (!device) {\n logger.debug(`Ignoring keyshare for unknown device ${userId}:${deviceId}`);\n return;\n }\n\n try {\n await encryptor.reshareKeyWithDevice!(body.sender_key, body.session_id, userId, device);\n } catch (e) {\n logger.warn(\n \"Failed to re-share keys for session \" +\n body.session_id +\n \" with device \" +\n userId +\n \":\" +\n device.deviceId,\n e,\n );\n }\n return;\n }\n\n if (deviceId === this.deviceId) {\n // We'll always get these because we send room key requests to\n // '*' (ie. 'all devices') which includes the sending device,\n // so ignore requests from ourself because apart from it being\n // very silly, it won't work because an Olm session cannot send\n // messages to itself.\n // The log here is probably superfluous since we know this will\n // always happen, but let's log anyway for now just in case it\n // causes issues.\n logger.log(\"Ignoring room key request from ourselves\");\n return;\n }\n\n // todo: should we queue up requests we don't yet have keys for,\n // in case they turn up later?\n\n // if we don't have a decryptor for this room/alg, we don't have\n // the keys for the requested events, and can drop the requests.\n if (!this.roomDecryptors.has(roomId)) {\n logger.log(`room key request for unencrypted room ${roomId}`);\n return;\n }\n\n const decryptor = this.roomDecryptors.get(roomId)!.get(alg);\n if (!decryptor) {\n logger.log(`room key request for unknown alg ${alg} in room ${roomId}`);\n return;\n }\n\n if (!(await decryptor.hasKeysForKeyRequest(req))) {\n logger.log(`room key request for unknown session ${roomId} / ` + body.session_id);\n return;\n }\n\n req.share = (): void => {\n decryptor.shareKeysWithDevice(req);\n };\n\n // if the device is verified already, share the keys\n if (this.checkDeviceTrust(userId, deviceId).isVerified()) {\n logger.log(\"device is already verified: sharing keys\");\n req.share();\n return;\n }\n\n this.emit(CryptoEvent.RoomKeyRequest, req);\n }\n\n /**\n * Helper for processReceivedRoomKeyRequests\n *\n */\n private async processReceivedRoomKeyRequestCancellation(\n cancellation: IncomingRoomKeyRequestCancellation,\n ): Promise<void> {\n logger.log(\n `m.room_key_request cancellation for ${cancellation.userId}:` +\n `${cancellation.deviceId} (id ${cancellation.requestId})`,\n );\n\n // we should probably only notify the app of cancellations we told it\n // about, but we don't currently have a record of that, so we just pass\n // everything through.\n this.emit(CryptoEvent.RoomKeyRequestCancellation, cancellation);\n }\n\n /**\n * Get a decryptor for a given room and algorithm.\n *\n * If we already have a decryptor for the given room and algorithm, return\n * it. Otherwise try to instantiate it.\n *\n * @internal\n *\n * @param roomId - room id for decryptor. If undefined, a temporary\n * decryptor is instantiated.\n *\n * @param algorithm - crypto algorithm\n *\n * @throws `DecryptionError` if the algorithm is unknown\n */\n public getRoomDecryptor(roomId: string | null, algorithm: string): DecryptionAlgorithm {\n let decryptors: Map<string, DecryptionAlgorithm> | undefined;\n let alg: DecryptionAlgorithm | undefined;\n\n if (roomId) {\n decryptors = this.roomDecryptors.get(roomId);\n if (!decryptors) {\n decryptors = new Map<string, DecryptionAlgorithm>();\n this.roomDecryptors.set(roomId, decryptors);\n }\n\n alg = decryptors.get(algorithm);\n if (alg) {\n return alg;\n }\n }\n\n const AlgClass = algorithms.DECRYPTION_CLASSES.get(algorithm);\n if (!AlgClass) {\n throw new DecryptionError(\n DecryptionFailureCode.UNKNOWN_ENCRYPTION_ALGORITHM,\n 'Unknown encryption algorithm \"' + algorithm + '\".',\n );\n }\n alg = new AlgClass({\n userId: this.userId,\n crypto: this,\n olmDevice: this.olmDevice,\n baseApis: this.baseApis,\n roomId: roomId ?? undefined,\n });\n\n if (decryptors) {\n decryptors.set(algorithm, alg);\n }\n return alg;\n }\n\n /**\n * Get all the room decryptors for a given encryption algorithm.\n *\n * @param algorithm - The encryption algorithm\n *\n * @returns An array of room decryptors\n */\n private getRoomDecryptors(algorithm: string): DecryptionAlgorithm[] {\n const decryptors: DecryptionAlgorithm[] = [];\n for (const d of this.roomDecryptors.values()) {\n if (d.has(algorithm)) {\n decryptors.push(d.get(algorithm)!);\n }\n }\n return decryptors;\n }\n\n /**\n * sign the given object with our ed25519 key\n *\n * @param obj - Object to which we will add a 'signatures' property\n */\n public async signObject<T extends ISignableObject & object>(obj: T): Promise<void> {\n const sigs = new Map(Object.entries(obj.signatures || {}));\n const unsigned = obj.unsigned;\n\n delete obj.signatures;\n delete obj.unsigned;\n\n const userSignatures = sigs.get(this.userId) || {};\n sigs.set(this.userId, userSignatures);\n userSignatures[\"ed25519:\" + this.deviceId] = await this.olmDevice.sign(anotherjson.stringify(obj));\n obj.signatures = recursiveMapToObject(sigs);\n if (unsigned !== undefined) obj.unsigned = unsigned;\n }\n\n /**\n * @returns true if the room with the supplied ID is encrypted. False if the\n * room is not encrypted, or is unknown to us.\n */\n public isRoomEncrypted(roomId: string): boolean {\n return this.roomList.isRoomEncrypted(roomId);\n }\n\n /**\n * Implementation of {@link Crypto.CryptoApi#isEncryptionEnabledInRoom}.\n */\n public async isEncryptionEnabledInRoom(roomId: string): Promise<boolean> {\n return this.isRoomEncrypted(roomId);\n }\n\n /**\n * @returns information about the encryption on the room with the supplied\n * ID, or null if the room is not encrypted or unknown to us.\n */\n public getRoomEncryption(roomId: string): IRoomEncryption | null {\n return this.roomList.getRoomEncryption(roomId);\n }\n\n /**\n * Returns whether dehydrated devices are supported by the crypto backend\n * and by the server.\n */\n public async isDehydrationSupported(): Promise<boolean> {\n return false;\n }\n\n /**\n * Stub function -- dehydration is not implemented here, so throw error\n */\n public async startDehydration(createNewKey?: boolean): Promise<void> {\n throw new Error(\"Not implemented\");\n }\n\n /**\n * Stub function -- restoreKeyBackup is not implemented here, so throw error\n */\n public restoreKeyBackup(opts: KeyBackupRestoreOpts): Promise<KeyBackupRestoreResult> {\n throw new Error(\"Not implemented\");\n }\n\n /**\n * Stub function -- restoreKeyBackupWithPassphrase is not implemented here, so throw error\n */\n public restoreKeyBackupWithPassphrase(\n passphrase: string,\n opts: KeyBackupRestoreOpts,\n ): Promise<KeyBackupRestoreResult> {\n throw new Error(\"Not implemented\");\n }\n}\n\n/**\n * Fix up the backup key, that may be in the wrong format due to a bug in a\n * migration step. Some backup keys were stored as a comma-separated list of\n * integers, rather than a base64-encoded byte array. If this function is\n * passed a string that looks like a list of integers rather than a base64\n * string, it will attempt to convert it to the right format.\n *\n * @param key - the key to check\n * @returns If the key is in the wrong format, then the fixed\n * key will be returned. Otherwise null will be returned.\n *\n */\nexport function fixBackupKey(key?: string): string | null {\n if (typeof key !== \"string\" || key.indexOf(\",\") < 0) {\n return null;\n }\n const fixedKey = Uint8Array.from(key.split(\",\"), (x) => parseInt(x));\n return encodeBase64(fixedKey);\n}\n\n/**\n * Represents a received m.room_key_request event\n */\nexport class IncomingRoomKeyRequest {\n /** user requesting the key */\n public readonly userId: string;\n /** device requesting the key */\n public readonly deviceId: string;\n /** unique id for the request */\n public readonly requestId: string;\n public readonly requestBody: IRoomKeyRequestBody;\n /**\n * callback which, when called, will ask\n * the relevant crypto algorithm implementation to share the keys for\n * this request.\n */\n public share: () => void;\n\n public constructor(event: MatrixEvent) {\n const content = event.getContent();\n\n this.userId = event.getSender()!;\n this.deviceId = content.requesting_device_id;\n this.requestId = content.request_id;\n this.requestBody = content.body || {};\n this.share = (): void => {\n throw new Error(\"don't know how to share keys for this request yet\");\n };\n }\n}\n\n/**\n * Represents a received m.room_key_request cancellation\n */\nclass IncomingRoomKeyRequestCancellation {\n /** user requesting the cancellation */\n public readonly userId: string;\n /** device requesting the cancellation */\n public readonly deviceId: string;\n /** unique id for the request to be cancelled */\n public readonly requestId: string;\n\n public constructor(event: MatrixEvent) {\n const content = event.getContent();\n\n this.userId = event.getSender()!;\n this.deviceId = content.requesting_device_id;\n this.requestId = content.request_id;\n }\n}\n\n// a number of types are re-exported for backwards compatibility, in case any applications are referencing it.\nexport type { IEventDecryptionResult, IMegolmSessionData } from \"../@types/crypto.ts\";\n"],"mappings":";;;;AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,OAAOA,WAAW,MAAM,cAAc;AACtC,SAASC,EAAE,IAAIC,MAAM,QAAQ,MAAM;AAInC,SAASC,SAAS,EAAEC,iBAAiB,QAAQ,oBAAoB;AACjE,SAASC,cAAc,QAAQ,iBAAiB;AAChD,SAASC,MAAM,QAAQ,cAAc;AACrC,SAA0BC,SAAS,QAAQ,gBAAgB;AAE3D,OAAO,KAAKC,MAAM,MAAM,aAAa;AACrC,SAAwBC,UAAU,QAAQ,iBAAiB;AAC3D,SAASC,UAAU,QAAiB,iBAAiB;AAErD,OAAO,KAAKC,UAAU,MAAM,uBAAuB;AACnD,SAASC,+BAA+B,EAAEC,gBAAgB,EAAEC,gBAAgB,EAAEC,cAAc,QAAQ,mBAAmB;AACvH,SAASC,sBAAsB,QAAQ,sBAAsB;AAC7D,SAASC,aAAa,IAAIC,mBAAmB,QAAQ,oBAAoB;AACzE,SAASC,eAAe,QAAqE,UAAU;AACvG,SAASC,6BAA6B,QAAQ,oCAAoC;AAClF,SAASC,oBAAoB,QAAQ,mCAAmC;AAExE,SAASC,iBAAiB,EAAEC,mBAAmB,EAAEC,mBAAmB,QAAQ,0BAA0B;AACtG,SAASC,GAAG,IAAIC,eAAe,QAAQ,uBAAuB;AAC9D,SAASC,iBAAiB,QAAQ,qBAAqB;AACvD,SAASC,mBAAmB,QAAQ,+CAA+C;AACnF,SAASC,aAAa,EAAEC,cAAc,QAAQ,yCAAyC;AACvF,SAAkBC,eAAe,EAAEC,gBAAgB,QAAQ,2CAA2C;AACtG,SAASC,aAAa,QAAQ,iCAAiC;AAC/D,SAASC,uBAAuB,QAAQ,cAAc;AACtD,SAASC,kBAAkB,QAAQ,kBAAkB;AACrD,SAASC,aAAa,EAAEC,qBAAqB,EAAEC,kCAAkC,QAAQ,aAAa;AAEtG,SAAeC,SAAS,QAAQ,mBAAmB;AACnD,SAAqBC,eAAe,QAAQ,0BAA0B;AACtE,SAASC,WAAW,EAAoBC,WAAW,EAAEC,gBAAgB,QAAQ,oBAAoB;AAEjG,SAASC,WAAW,EAAiEC,YAAY,QAAQ,cAAc;AACvH,SAA0BC,QAAQ,QAAQ,eAAe;AAKzD,SAASC,iBAAiB,QAAQ,kCAAkC;AAIpE,SAGIC,eAAe,QAEZ,mCAAmC;AAC1C,SAAoBC,cAAc,QAAQ,yBAAyB;AACnE,SAASC,cAAc,EAAEC,oBAAoB,QAAQ,aAAa;AAClE,SAGIC,iBAAiB,EACjBC,+BAA+B,EAI/BC,2BAA2B,QACxB,sBAAsB;AAE7B,SAKIC,iBAAiB,EACjBC,qBAAqB,EAGrBC,iBAAiB,EAEjBC,iBAAiB,EACjBC,iBAAiB,EAKjBC,WAAW,IAAIC,oBAAoB,QAIhC,wBAAwB;AAE/B,SAASC,kBAAkB,QAAQ,uBAAuB;AAC1D,SAASC,YAAY,EAAEC,WAAW,EAAEC,MAAM,QAAQ,sBAAsB;AACxE,SAASC,YAAY,EAAEC,YAAY,QAAQ,cAAc;AACzD,SAASC,eAAe,QAAQ,yBAAyB;AACzD,OAAOC,2BAA2B,MAAM,yCAAyC;AACjF,OAAOC,2BAA2B,MAAM,yCAAyC;;AAGjF;;AAMA,IAAMC,kBAAkB,GAAG7D,UAAU,CAAC6D,kBAAkB;AAExD,IAAMC,0BAA0B,GAAG;EAC/B,CAAClD,iBAAiB,CAACmD,IAAI,GAAGnD,iBAAiB;EAC3C,CAACI,eAAe,CAAC+C,IAAI,GAAG/C,eAAe;EAEvC;EACA;EACA;EACA,CAACF,mBAAmB,GAAGS,aAAa;EACpC,CAACV,mBAAmB,GAAGU;AAC3B,CAAU;;AAEV;AACA;AACA;AACA;AACA,OAAO,IAAMyC,mBAAmB,GAAG;EAC/BC,mBAAmB,EAAErD,iBAAiB,CAACmD,IAAI;EAC3ChD,GAAG,EAAEC,eAAe,CAAC+C;AACzB,CAAU;AAIV,OAAO,SAASG,iBAAiBA,CAAA,EAAY;EACzC,OAAOC,OAAO,CAACC,UAAU,CAACC,GAAG,CAAC;AAClC;;AAEA;AACA;AACA,IAAMC,6BAA6B,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;AACtD;AACA;AACA,IAAMC,+BAA+B,GAAG,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;;AAOvD;;AAMA;AACA;AACA;AACA;AACA;;AAMA;;AAoCA;;AAgBA;;AAIA,WAAYrB,WAAW,aAAXA,WAAW;EAAXA,WAAW;EAAXA,WAAW,CAAXA,WAAW,6BAGMC,oBAAoB,CAACqB,sBAAsB;EAH5DtB,WAAW;EAAXA,WAAW;EAAXA,WAAW;EAAXA,WAAW,CAAXA,WAAW,sBAUDC,oBAAoB,CAACsB,eAAe;EAV9CvB,WAAW,CAAXA,WAAW,sBAWDC,oBAAoB,CAACuB,eAAe;EAX9CxB,WAAW,CAAXA,WAAW,iCAYUC,oBAAoB,CAACwB,0BAA0B;EAZpEzB,WAAW,CAAXA,WAAW,mCAuBYC,oBAAoB,CAACyB,4BAA4B;EAvBxE1B,WAAW;EAAXA,WAAW;EAAXA,WAAW,CAAXA,WAAW,kCAmCWC,oBAAoB,CAAC0B,2BAA2B;EAnCtE3B,WAAW;EAAXA,WAAW,CAAXA,WAAW,wBAwCCC,oBAAoB,CAAC2B,iBAAiB;EAxClD5B,WAAW,CAAXA,WAAW,qBAyCFC,oBAAoB,CAAC4B,cAAc;EAzC5C7B,WAAW,CAAXA,WAAW,kBA0CLC,oBAAoB,CAAC6B,WAAW;EA1CtC9B,WAAW,CAAXA,WAAW,yCAmDkBC,oBAAoB,CAAC8B,kCAAkC;EAAA,OAnDpF/B,WAAW;AAAA;AAkGvB,OAAO,MAAMgC,MAAM,SAAS7C,iBAAiB,CAA8D;EACvG;AACJ;AACA;EACI,OAAc8C,aAAaA,CAAA,EAA6B;IACpD,OAAOtF,SAAS,CAACsF,aAAa,CAAC,CAAC;EACpC;EAqEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWC,WAAWA,CACEC,QAAsB,EACtBC,MAAc,EACbC,QAAgB,EAChBC,WAAmB,EACpBC,WAAwB,EACxCzB,mBAA6F,EAC/F;IAAA,IAAA0B,KAAA;IACE,KAAK,CAAC,CAAC;IAAAA,KAAA,GAAAC,IAAA;IAAA,KAPSN,QAAsB,GAAtBA,QAAsB;IAAA,KACtBC,MAAc,GAAdA,MAAc;IAAA,KACbC,QAAgB,GAAhBA,QAAgB;IAAA,KAChBC,WAAmB,GAAnBA,WAAmB;IAAA,KACpBC,WAAwB,GAAxBA,WAAwB;IAAAG,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA,kCA9EV,IAAI;IACtC;IAAAA,eAAA,8BAC6C,IAAI;IAAAA,eAAA,oCACb,KAAK;IAEzC;IAAAA,eAAA,yBACyB,IAAIC,GAAG,CAA8B,CAAC;IAC/D;IAAAD,eAAA,yBACyB,IAAIC,GAAG,CAA2C,CAAC;IAAAD,eAAA,qBAE/B,CAAC,CAAC;IAAE;IAAAA,eAAA,2CAEP,KAAK;IAAAA,eAAA,sCACV,IAAI;IAEzC;IACA;IAAAA,eAAA,kCAC4D,EAAE;IAAAA,eAAA,8CACsB,EAAE;IACtF;IAAAA,eAAA,oCACoC,KAAK;IACzC;IACA;IACA;IAAAA,eAAA,0BAC0B,KAAK;IAC/B;IACA;IACA;IACA;IAAAA,eAAA,kCACuE,CAAC,CAAC;IAEzE;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IAAAA,eAAA,mCAC2F,IAAIpD,cAAc,CACzG,MAAM,IAAIA,cAAc,CAAC,MAAM,CAAC,CACpC,CAAC;IAED;IACA;IACA;IAAAoD,eAAA,qCACqC,KAAK;IAAAA,eAAA;IAAAA,eAAA;IAAAA,eAAA;IA0tC1C;AACJ;AACA;IAFIA,eAAA;MAAA,IAAAE,IAAA,GAAAC,iBAAA,CAG8C,WAAOT,MAAc,EAAoB;QACnF,IAAIA,MAAM,KAAKI,KAAI,CAACJ,MAAM,EAAE;UACxB;UACA;UACA,IAAMU,eAAe,GAAGN,KAAI,CAACO,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;UAC5E,IAAMa,UAAU,GAAGH,eAAe,GAAGA,eAAe,CAACI,KAAK,CAAC,CAAC,GAAG,IAAI;UACnE,IAAMC,aAAa,GAAGX,KAAI,CAACY,gBAAgB,CAACF,KAAK,CAAC,CAAC;UACnD,IAAMG,OAAO,GAAGF,aAAa,KAAKF,UAAU;UAE5C,IAAIE,aAAa,IAAIF,UAAU,IAAI,CAACI,OAAO,EAAE;YACzC;YACA,MAAMb,KAAI,CAACc,yBAAyB,CAAC,CAAC;UAC1C,CAAC,MAAM;YACH;YACA;YACA;YACA;YACA;YACAd,KAAI,CAACe,oBAAoB,CAAC,IAAI,CAAC;YAC/B;YACAf,KAAI,CAACgB,IAAI,CAACxD,WAAW,CAAC8B,WAAW,EAAE,CAAC,CAAC,CAAC;YACtC;YACA;YACAU,KAAI,CAACgB,IAAI,CAACxD,WAAW,CAACsB,sBAAsB,EAAEkB,KAAI,CAACJ,MAAM,EAAEI,KAAI,CAACiB,cAAc,CAACrB,MAAM,CAAC,CAAC;UAC3F;QACJ,CAAC,MAAM;UACH,MAAMI,KAAI,CAACkB,wBAAwB,CAACtB,MAAM,CAAC;;UAE3C;UACA;UACA,IAAMuB,YAAY,GAAGnB,KAAI,CAACO,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;UACzE,IAAIuB,YAAY,EAAE;YACdA,YAAY,CAACC,gCAAgC,CAACpB,KAAI,CAACiB,cAAc,CAACrB,MAAM,CAAC,CAACyB,sBAAsB,CAAC,CAAC,CAAC;YACnGrB,KAAI,CAACO,UAAU,CAACe,+BAA+B,CAAC1B,MAAM,EAAEuB,YAAY,CAACI,SAAS,CAAC,CAAC,CAAC;UACrF;UAEAvB,KAAI,CAACgB,IAAI,CAACxD,WAAW,CAACsB,sBAAsB,EAAEc,MAAM,EAAEI,KAAI,CAACiB,cAAc,CAACrB,MAAM,CAAC,CAAC;QACtF;MACJ,CAAC;MAAA,iBAAA4B,EAAA;QAAA,OAAApB,IAAA,CAAAqB,KAAA,OAAAC,SAAA;MAAA;IAAA;IAAAxB,eAAA,uBAq4DsB,CAACyB,KAAkB,EAAEC,MAAkB,EAAEC,aAAsB,KAAW;MAC7F,IAAI;QACA,IAAI,CAACC,gBAAgB,CAACH,KAAK,EAAEC,MAAM,EAAEC,aAAa,CAAC;MACvD,CAAC,CAAC,OAAOE,CAAC,EAAE;QACR7H,MAAM,CAAC8H,KAAK,CAAC,mCAAmC,EAAED,CAAC,CAAC;MACxD;IACJ,CAAC;IAAA7B,eAAA,0BA+C0ByB,KAAkB,IAAW;MACpD,IAAI;QACAzH,MAAM,CAAC+H,GAAG,CACN,sBAAAC,MAAA,CAAsBP,KAAK,CAACQ,OAAO,CAAC,CAAC,kBAAAD,MAAA,CAC9BP,KAAK,CAACS,SAAS,CAAC,CAAC,WAAAF,MAAA,CAAQP,KAAK,CAACU,UAAU,CAAC,CAAC,CAACrI,iBAAiB,CAAC,CACzE,CAAC;QAED,IAAI2H,KAAK,CAACQ,OAAO,CAAC,CAAC,IAAI,YAAY,IAAIR,KAAK,CAACQ,OAAO,CAAC,CAAC,IAAI,sBAAsB,EAAE;UAC9E,IAAI,CAACG,cAAc,CAACX,KAAK,CAAC;QAC9B,CAAC,MAAM,IAAIA,KAAK,CAACQ,OAAO,CAAC,CAAC,IAAI,oBAAoB,EAAE;UAChD,IAAI,CAACI,qBAAqB,CAACZ,KAAK,CAAC;QACrC,CAAC,MAAM,IAAIA,KAAK,CAACQ,OAAO,CAAC,CAAC,KAAK,kBAAkB,EAAE;UAC/C,IAAI,CAACK,aAAa,CAACC,iBAAiB,CAACd,KAAK,CAAC;QAC/C,CAAC,MAAM,IAAIA,KAAK,CAACQ,OAAO,CAAC,CAAC,KAAK,eAAe,EAAE;UAC5C,IAAI,CAACK,aAAa,CAACE,gBAAgB,CAACf,KAAK,CAAC;QAC9C,CAAC,MAAM,IAAIA,KAAK,CAACQ,OAAO,CAAC,CAAC,KAAK,qBAAqB,EAAE;UAClD,IAAI,CAACQ,sBAAsB,CAAChB,KAAK,CAAC;QACtC,CAAC,MAAM,IAAIA,KAAK,CAACU,UAAU,CAAC,CAAC,CAACO,cAAc,EAAE;UAC1C,IAAI,CAACC,wBAAwB,CAAClB,KAAK,CAAC;QACxC,CAAC,MAAM,IAAIA,KAAK,CAACU,UAAU,CAAC,CAAC,CAACS,OAAO,KAAK,iBAAiB,EAAE;UACzD,IAAI,CAACC,sBAAsB,CAACpB,KAAK,CAAC;QACtC,CAAC,MAAM,IAAIA,KAAK,CAACqB,gBAAgB,CAAC,CAAC,IAAIrB,KAAK,CAACsB,uBAAuB,CAAC,CAAC,EAAE;UACpE,IAAI,CAACtB,KAAK,CAACqB,gBAAgB,CAAC,CAAC,EAAE;YAC3BrB,KAAK,CAACuB,iBAAiB,CAAC,IAAI,CAAC;UACjC;UACA;UACAvB,KAAK,CAACwB,IAAI,CAAC5G,gBAAgB,CAAC6G,SAAS,EAAGC,EAAE,IAAK;YAC3C,IAAI,CAACC,eAAe,CAACD,EAAE,CAAC;UAC5B,CAAC,CAAC;QACN;MACJ,CAAC,CAAC,OAAOtB,CAAC,EAAE;QACR7H,MAAM,CAAC8H,KAAK,CAAC,+BAA+B,EAAED,CAAC,CAAC;MACpD;IACJ,CAAC;IA2FD;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;IATI7B,eAAA,0BAU0B,UACtByB,KAAkB,EAClB4B,IAAU,EACVC,OAAgB,EAChBC,OAAgB,EAET;MAAA,IADP;QAAEC,SAAS,GAAG;MAAK,CAAC,GAAAhC,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,CAAC,CAAC;MAEzB,IAAI,CAACjG,aAAa,CAACoI,aAAa,CAAClC,KAAK,EAAE3B,KAAI,CAACL,QAAQ,CAAC,EAAE;QACpD;MACJ;MACA,IAAMmE,aAAa,GAAInC,KAAkB,IAA0B;QAC/D,IAAMoC,OAAO,GAAG,IAAItI,aAAa,CAACuE,KAAI,CAACL,QAAQ,EAAEgC,KAAK,CAACqC,SAAS,CAAC,CAAE,CAAC;QACpE,OAAO,IAAIxI,mBAAmB,CAACuI,OAAO,EAAE/D,KAAI,CAAC1B,mBAAmB,EAAE0B,KAAI,CAACL,QAAQ,CAAC;MACpF,CAAC;MACDK,KAAI,CAACiE,uBAAuB,CAACtC,KAAK,EAAE3B,KAAI,CAACkE,0BAA0B,EAAEJ,aAAa,EAAEJ,SAAS,CAAC;IAClG,CAAC;IA7yGGxJ,MAAM,CAACiK,KAAK,CAAC,kCAAkC,CAAC;IAChD,IAAI,CAACC,QAAQ,GAAG,IAAI1H,QAAQ,CAACqD,WAAW,CAAC;IAEzC,IAAI,CAACsE,SAAS,GAAG,IAAIpK,cAAc,CAAC,IAAI,CAAC;IAEzC,IAAIqE,mBAAmB,EAAE;MACrB,IAAI,CAACA,mBAAmB,GAAG,IAAI6B,GAAG,CAAC,CAAC;MACpC,KAAK,IAAMmE,MAAM,IAAIhG,mBAAmB,EAAE;QACtC,IAAI,OAAOgG,MAAM,KAAK,QAAQ,EAAE;UAC5B,IAAIlG,0BAA0B,CAACkG,MAAM,CAAC,EAAE;YACpC,IAAI,CAAChG,mBAAmB,CAACiG,GAAG,CACxBD,MAAM,EACmBlG,0BAA0B,CAACkG,MAAM,CAC9D,CAAC;UACL;QACJ,CAAC,MAAM,IAAIA,MAAM,CAAC,MAAM,CAAC,EAAE;UACvB,IAAI,CAAChG,mBAAmB,CAACiG,GAAG,CAACD,MAAM,CAAC,MAAM,CAAC,EAAEA,MAAiC,CAAC;QACnF,CAAC,MAAM;UACHpK,MAAM,CAACsK,IAAI,0CAAAtC,MAAA,CAA0CoC,MAAM,CAAE,CAAC;QAClE;MACJ;IACJ,CAAC,MAAM;MACH,IAAI,CAAChG,mBAAmB,GAAG,IAAI6B,GAAG,CAACsE,MAAM,CAACC,OAAO,CAACtG,0BAA0B,CAAC,CAG5E;IACL;IAEA,IAAI,CAACuG,aAAa,GAAG,IAAI3I,aAAa,CAAC2D,QAAQ,eAAAU,iBAAA,CAAE,aAAY;MACzD;MACA,IAAMuE,SAAS,SAAS5E,KAAI,CAAC6E,0BAA0B,CAAC,CAAC;MACzD,IAAID,SAAS,EAAE;QACX,OAAOA,SAAS;MACpB;;MAEA;MACA,IAAME,SAAS,SAAS9E,KAAI,CAACwC,aAAa,CAACuC,GAAG,CAAC,oBAAoB,CAAC;MAEpE,IAAID,SAAS,EAAE;QACX;QACA;QACA,IAAME,QAAQ,GAAGC,YAAY,CAACH,SAAS,CAAC;QACxC,IAAIE,QAAQ,EAAE;UACV,IAAME,IAAI,SAASlF,KAAI,CAACwC,aAAa,CAAC2C,MAAM,CAAC,CAAC;UAC9C,MAAMnF,KAAI,CAACwC,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAEJ,QAAQ,EAAE,CAACE,IAAI,CAAE,CAAC,CAAC,CAAC,CAAC;QAC9E;QAEA,OAAOpH,YAAY,CAACkH,QAAQ,IAAIF,SAAS,CAAC;MAC9C;;MAEA;MACA,IAAI9E,KAAI,CAACL,QAAQ,CAAC0F,eAAe,IAAIrF,KAAI,CAACL,QAAQ,CAAC0F,eAAe,CAACC,YAAY,EAAE;QAC7E,OAAOtF,KAAI,CAACL,QAAQ,CAAC0F,eAAe,CAACC,YAAY,CAAC,CAAC;MACvD;MAEA,MAAM,IAAIC,KAAK,CAAC,2BAA2B,CAAC;IAChD,CAAC,EAAC;IAEF,IAAI,CAACC,SAAS,GAAG,IAAIrL,SAAS,CAAC4F,WAAW,CAAC;IAC3C,IAAI,CAACQ,UAAU,GAAG,IAAIlG,UAAU,CAACsF,QAAQ,EAAEI,WAAW,EAAE,IAAI,CAACyF,SAAS,CAAC;;IAEvE;IACA;IACA,IAAI,CAACjF,UAAU,CAACkF,EAAE,CAACjI,WAAW,CAACkI,uBAAuB,EAAE,IAAI,CAACC,mCAAmC,CAAC;IACjG,IAAI,CAACtB,SAAS,CAACuB,MAAM,CAAC,IAAI,CAACrF,UAAU,EAAE,CAAC/C,WAAW,CAAC6B,cAAc,EAAE7B,WAAW,CAAC4B,iBAAiB,CAAC,CAAC;IAEnG,IAAI,CAACyG,mBAAmB,GAAGC,KAAK,CAACC,IAAI,CAACxL,UAAU,CAACyL,kBAAkB,CAACd,IAAI,CAAC,CAAC,CAAC;IAE3E,IAAI,CAACe,6BAA6B,GAAG,IAAIjL,6BAA6B,CAClE2E,QAAQ,EACR,IAAI,CAACE,QAAQ,EACb,IAAI,CAACE,WACT,CAAC;IAED,IAAI,CAACmG,4BAA4B,GAAG,IAAItK,gBAAgB,CAAC,CAAC;IAC1D,IAAI,CAACsI,0BAA0B,GAAG,IAAIxI,cAAc,CAAC,CAAC;IAEtD,IAAM2J,eAAe,GAAG,IAAI,CAAC1F,QAAQ,CAAC0F,eAAe,IAAI,CAAC,CAAC;IAC3D,IAAMc,cAAc,GAAG3L,+BAA+B,CAACuF,WAAW,EAAE,IAAI,CAACyF,SAAS,CAAC;IAEnF,IAAI,CAAC5E,gBAAgB,GAAG,IAAInG,gBAAgB,CAACmF,MAAM,EAAEyF,eAAe,EAAEc,cAAc,CAAC;IACrF;IACA,IAAI,CAAC3D,aAAa,GAAG,IAAI1H,mBAAmB,CAAC6E,QAAQ,EAAuB0F,eAAe,EAAE1F,QAAQ,CAAC;IACtG,IAAI,CAACyG,kBAAkB,GAAG,IAAIrK,kBAAkB,CAAC,IAAI,CAAC;;IAEtD;IACA,IAAI,CAACsJ,eAAe,CAACgB,kBAAkB,IAAIhB,eAAe,CAACiB,mBAAmB,EAAE;MAC5EjB,eAAe,CAACgB,kBAAkB;QAAA,IAAAE,KAAA,GAAAlG,iBAAA,CAAG,WAAOmG,IAAI,EAAiC;UAC7E,OAAO/L,gBAAgB,CAACgM,oBAAoB,CAACD,IAAI,EAAExG,KAAI,CAACwC,aAAa,CAAC;QAC1E,CAAC;QAAA,iBAAAkE,GAAA;UAAA,OAAAH,KAAA,CAAA9E,KAAA,OAAAC,SAAA;QAAA;MAAA;IACL;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACiBiF,IAAIA,CAAA,EAAkE;IAAA,IAAAC,UAAA,GAAAlF,SAAA;MAAAmF,MAAA;IAAA,OAAAxG,iBAAA;MAAA,IAAjE;QAAEyG,iBAAiB;QAAEC;MAAqB,CAAC,GAAAH,UAAA,CAAAjD,MAAA,QAAAiD,UAAA,QAAAhD,SAAA,GAAAgD,UAAA,MAAG,CAAC,CAAC;MAC9D1M,MAAM,CAAC+H,GAAG,CAAC,6BAA6B,CAAC;MACzC,MAAMvD,UAAU,CAACC,GAAG,CAACgI,IAAI,CAAC,CAAC;MAC3BzM,MAAM,CAAC+H,GAAG,CACN6E,iBAAiB,GACX,yDAAyD,GACzD,oCACV,CAAC;MACD,MAAMD,MAAI,CAACrB,SAAS,CAACmB,IAAI,CAAC;QAAEK,kBAAkB,EAAEF,iBAAiB;QAAEC;MAAU,CAAC,CAAC;MAC/E7M,MAAM,CAAC+H,GAAG,CAAC,gCAAgC,CAAC;MAC5C,MAAM4E,MAAI,CAACtG,UAAU,CAAC0G,IAAI,CAAC,CAAC;;MAE5B;MACAJ,MAAI,CAACK,UAAU,CAAC,UAAU,GAAGL,MAAI,CAAChH,QAAQ,CAAC,GAAGgH,MAAI,CAACrB,SAAS,CAAC2B,gBAAiB;MAC9EN,MAAI,CAACK,UAAU,CAAC,aAAa,GAAGL,MAAI,CAAChH,QAAQ,CAAC,GAAGgH,MAAI,CAACrB,SAAS,CAAC4B,mBAAoB;MAEpFlN,MAAM,CAAC+H,GAAG,CAAC,iCAAiC,CAAC;MAC7C,IAAIoF,SAAS,GAAGR,MAAI,CAACtG,UAAU,CAAC+G,0BAA0B,CAACT,MAAI,CAACjH,MAAM,CAAC;MAEvE,IAAI,CAACyH,SAAS,EAAE;QACZA,SAAS,GAAG,CAAC,CAAC;MAClB;MAEA,IAAI,CAACA,SAAS,CAACR,MAAI,CAAChH,QAAQ,CAAC,EAAE;QAC3B;QACA3F,MAAM,CAAC+H,GAAG,CAAC,4CAA4C,CAAC;QACxD,IAAMsF,UAAU,GAAG;UACfrC,IAAI,EAAE2B,MAAI,CAACK,UAAU;UACrB3M,UAAU,EAAEsM,MAAI,CAAChB,mBAAmB;UACpC2B,QAAQ,EAAErJ,kBAAkB,CAACsJ,QAAQ;UACrCC,KAAK,EAAE;QACX,CAAC;QAEDL,SAAS,CAACR,MAAI,CAAChH,QAAQ,CAAC,GAAG0H,UAAU;QACrCV,MAAI,CAACtG,UAAU,CAACoH,mBAAmB,CAACd,MAAI,CAACjH,MAAM,EAAEyH,SAAS,CAAC;QAC3DR,MAAI,CAACtG,UAAU,CAACqH,WAAW,CAAC,CAAC;MACjC;MAEA,MAAMf,MAAI,CAAC9G,WAAW,CAAC8H,KAAK,CAAC,UAAU,EAAE,CAAC5M,oBAAoB,CAAC6M,aAAa,CAAC,EAAGC,GAAG,IAAK;QACpFlB,MAAI,CAAC9G,WAAW,CAACiI,mBAAmB,CAACD,GAAG,EAAG7C,IAAI,IAAK;UAChD;UACA,IAAIA,IAAI,IAAIT,MAAM,CAACS,IAAI,CAACA,IAAI,CAAC,CAACvB,MAAM,KAAK,CAAC,EAAE;YACxCzJ,MAAM,CAAC+H,GAAG,CAAC,oDAAoD,CAAC;YAChE4E,MAAI,CAACjG,gBAAgB,CAACqH,OAAO,CAAC/C,IAAI,CAAC;UACvC;QACJ,CAAC,CAAC;MACN,CAAC,CAAC;MACF;MACA;MACA2B,MAAI,CAACtG,UAAU,CAAC2H,uBAAuB,CAACrB,MAAI,CAACjH,MAAM,CAAC;MAEpD1F,MAAM,CAACiK,KAAK,CAAC,kCAAkC,CAAC;MAChD,MAAM0C,MAAI,CAACzC,QAAQ,CAACuC,IAAI,CAAC,CAAC;MAE1BzM,MAAM,CAAC+H,GAAG,CAAC,oCAAoC,CAAC;MAChD4E,MAAI,CAAClC,aAAa,CAACwD,aAAa,CAAC,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;EACWC,sBAAsBA,CAACC,aAAkC,EAAQ;IACpE,MAAM,IAAI9C,KAAK,CAAC,eAAe,CAAC;EACpC;EACA;AACJ;AACA;EACW+C,UAAUA,CAAA,EAAW;IACxB,IAAMC,eAAe,GAAG/I,MAAM,CAACC,aAAa,CAAC,CAAC;IAC9C,cAAAyC,MAAA,CAAcqG,eAAe,CAAC,CAAC,CAAC,OAAArG,MAAA,CAAIqG,eAAe,CAAC,CAAC,CAAC,OAAArG,MAAA,CAAIqG,eAAe,CAAC,CAAC,CAAC;EAChF;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWC,0BAA0BA,CAAA,EAAY;IACzC,OAAO,IAAI,CAACC,uBAAuB;EACvC;;EAEA;AACJ;AACA;EACWC,gCAAgCA,CAAA,EAAY;IAC/C,OAAO,IAAI,CAACD,uBAAuB;EACvC;;EAEA;AACJ;AACA;AACA;AACA;EACWE,0BAA0BA,CAACC,GAAY,EAAQ;IAClD,IAAI,CAACH,uBAAuB,GAAGG,GAAG;IAElC,KAAK,IAAMhJ,OAAM,IAAI,IAAI,CAACW,UAAU,CAACsI,eAAe,CAAC,CAAC,EAAE;MACpD,IAAMC,OAAO,GAAG,IAAI,CAACvI,UAAU,CAAC+G,0BAA0B,CAAC1H,OAAM,CAAC;MAClE,KAAK,IAAMC,SAAQ,IAAI4E,MAAM,CAACS,IAAI,CAAC4D,OAAO,CAAC,EAAE;QACzC,IAAMC,WAAW,GAAG,IAAI,CAACC,gBAAgB,CAACpJ,OAAM,EAAEC,SAAQ,CAAC;QAC3D;QACA;QACA;QACA,IAAI,CAACkJ,WAAW,CAACE,iBAAiB,CAAC,CAAC,IAAIF,WAAW,CAAC1H,sBAAsB,CAAC,CAAC,EAAE;UAC1E,IAAM6H,SAAS,GAAG,IAAI,CAAC3I,UAAU,CAAC4I,eAAe,CAACvJ,OAAM,EAAEC,SAAQ,CAAE;UACpE,IAAI,CAACmB,IAAI,CAACxD,WAAW,CAAC4L,yBAAyB,EAAExJ,OAAM,EAAEC,SAAQ,EAAEqJ,SAAS,CAAC;QACjF;MACJ;IACJ;EACJ;;EAEA;AACJ;AACA;EACWG,gCAAgCA,CAACT,GAAY,EAAQ;IACxD,IAAI,CAACD,0BAA0B,CAACC,GAAG,CAAC;EACxC;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBU,+BAA+BA,CAACC,QAAiB,EAAyB;IAAA,OAAAlJ,iBAAA;MACnF,IAAMmJ,UAAU,GAAG,IAAI9K,UAAU,CAACC,GAAG,CAAC8K,YAAY,CAAC,CAAC;MACpD,IAAI;QACA,IAAIF,QAAQ,EAAE;UACV,IAAMG,UAAU,SAASnO,iBAAiB,CAACgO,QAAQ,CAAC;UAEpDC,UAAU,CAACG,qBAAqB,CAACD,UAAU,CAACE,GAAG,CAAC;UAChD,IAAMC,UAAU,GAAGL,UAAU,CAACM,eAAe,CAAC,CAAC;UAC/C,OAAO;YACHC,OAAO,EAAE;cACLC,UAAU,EAAE;gBACRC,SAAS,EAAE,UAAU;gBACrBC,UAAU,EAAER,UAAU,CAACQ,UAAU;gBACjCC,IAAI,EAAET,UAAU,CAACS;cACrB;YACJ,CAAC;YACDN,UAAU,EAAEA,UAAU;YACtBO,iBAAiB,EAAE/M,iBAAiB,CAACwM,UAAU;UACnD,CAAC;QACL,CAAC,MAAM;UACHL,UAAU,CAACa,YAAY,CAAC,CAAC;UACzB,IAAMR,WAAU,GAAGL,UAAU,CAACM,eAAe,CAAC,CAAC;UAC/C,OAAO;YACHD,UAAU,EAAEA,WAAU;YACtBO,iBAAiB,EAAE/M,iBAAiB,CAACwM,WAAU;UACnD,CAAC;QACL;MACJ,CAAC,SAAS;QACNL,UAAU,aAAVA,UAAU,eAAVA,UAAU,CAAEc,IAAI,CAAC,CAAC;MACtB;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACiBC,uBAAuBA,CAAA,EAAyC;IAAA,IAAAC,WAAA,GAAA9I,SAAA;MAAA+I,MAAA;IAAA,OAAApK,iBAAA;MAAA,IAAxCT,MAAM,GAAA4K,WAAA,CAAA7G,MAAA,QAAA6G,WAAA,QAAA5G,SAAA,GAAA4G,WAAA,MAAGC,MAAI,CAAC7K,MAAM;MACrD,MAAM6K,MAAI,CAACC,YAAY,CAAC,CAAC9K,MAAM,CAAC,CAAC;MACjC,OAAO6K,MAAI,CAAClK,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC,KAAK,IAAI;IAAC;EACzE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiB+K,mBAAmBA,CAAA,EAAqB;IAAA,IAAAC,MAAA;IAAA,OAAAvK,iBAAA;MACjD,IAAMwK,kBAAkB,GAAGD,MAAI,CAAChK,gBAAgB,CAACF,KAAK,CAAC,CAAC;MACxD,IAAMoK,yBAAyB,GAC3B,OAAOF,MAAI,CAAChK,gBAAgB,CAACmK,kBAAkB,CAAC,CAAC,YAC1CH,MAAI,CAAChK,gBAAgB,CAACoK,uBAAuB,CAACJ,MAAI,CAACpI,aAAa,CAAC,CAAC;MAE7E,OAAO,CAAC,EAAEqI,kBAAkB,IAAIC,yBAAyB,CAAC;IAAC;EAC/D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBG,oBAAoBA,CAAA,EAAqB;IAAA,IAAAC,MAAA;IAAA,OAAA7K,iBAAA;MAClD,IAAM8K,yBAAyB,SAASD,MAAI,CAAC1I,aAAa,CAAC4I,MAAM,CAAC,CAAC;MACnE,IAAMC,oBAAoB,SAASH,MAAI,CAACtK,gBAAgB,CAACoK,uBAAuB,CAACE,MAAI,CAAC1I,aAAa,CAAC;MACpG,IAAM8I,sBAAsB,GACxB,CAACJ,MAAI,CAACvG,aAAa,CAAC4G,mBAAmB,CAAC,CAAC,WAAWL,MAAI,CAACvL,QAAQ,CAAC6L,oBAAoB,CAAC,CAAC,CAAC;MAE7F,OAAO,CAAC,EAAEL,yBAAyB,IAAIE,oBAAoB,IAAIC,sBAAsB,CAAC;IAAC;EAC3F;;EAEA;AACJ;AACA;EACiBG,qBAAqBA,CAAA,EAAgC;IAAA,IAAAC,MAAA;IAAA,OAAArL,iBAAA;MAAA,IAAAsL,qBAAA,EAAAC,sBAAA,EAAAC,sBAAA;MAC9D,IAAMhB,kBAAkB,GAAGpM,OAAO,CAACiN,MAAI,CAAC9K,gBAAgB,CAACF,KAAK,CAAC,CAAC,CAAC;MACjE,IAAMoL,0BAA0B,GAAGrN,OAAO,OAChCiN,MAAI,CAAC9K,gBAAgB,CAACoK,uBAAuB,CAACU,MAAI,CAAClJ,aAAa,CAC1E,CAAC;MACD,IAAM2D,cAAc,GAAGuF,MAAI,CAAC9K,gBAAgB,CAACmL,iBAAiB,CAAC,CAAC;MAChE,IAAMC,SAAS,GAAGvN,OAAO,QAAAkN,qBAAA,GAAOxF,cAAc,CAAC8F,uBAAuB,cAAAN,qBAAA,uBAAtCA,qBAAA,CAAAO,IAAA,CAAA/F,cAAc,EAA2B,QAAQ,CAAC,CAAC;MACnF,IAAMgG,cAAc,GAAG1N,OAAO,QAAAmN,sBAAA,GAAOzF,cAAc,CAAC8F,uBAAuB,cAAAL,sBAAA,uBAAtCA,sBAAA,CAAAM,IAAA,CAAA/F,cAAc,EAA2B,cAAc,CAAC,CAAC;MAC9F,IAAMiG,cAAc,GAAG3N,OAAO,QAAAoN,sBAAA,GAAO1F,cAAc,CAAC8F,uBAAuB,cAAAJ,sBAAA,uBAAtCA,sBAAA,CAAAK,IAAA,CAAA/F,cAAc,EAA2B,cAAc,CAAC,CAAC;MAE9F,OAAO;QACH0E,kBAAkB;QAClBiB,0BAA0B;QAC1BO,wBAAwB,EAAE;UACtBL,SAAS;UACTG,cAAc;UACdC;QACJ;MACJ,CAAC;IAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBE,qBAAqBA,CAAA,EAGgB;IAAA,IAAAC,WAAA,GAAA7K,SAAA;MAAA8K,MAAA;IAAA,OAAAnM,iBAAA;MAAA,IAHf;QAC/BoM,2BAA2B;QAC3BC;MACuB,CAAC,GAAAH,WAAA,CAAA5I,MAAA,QAAA4I,WAAA,QAAA3I,SAAA,GAAA2I,WAAA,MAAG,CAAC,CAAC;MAC7BrS,MAAM,CAAC+H,GAAG,CAAC,6BAA6B,CAAC;MAEzC,IAAM0K,uBAAuB,GAAGH,MAAI,CAAC7M,QAAQ,CAAC0F,eAAe;MAC7D,IAAMuH,OAAO,GAAG,IAAIhS,sBAAsB,CAAC4R,MAAI,CAAC7M,QAAQ,CAACyF,KAAK,CAACyH,WAAW,EAAEF,uBAAuB,CAAC;MACpG,IAAM/L,gBAAgB,GAAG,IAAInG,gBAAgB,CACzC+R,MAAI,CAAC5M,MAAM,EACXgN,OAAO,CAACE,qBAAqB,EAC7BF,OAAO,CAACE,qBACZ,CAAC;;MAED;MACA,IAAMC,iBAAiB;QAAA,IAAAC,KAAA,GAAA3M,iBAAA,CAAG,aAA2B;UACjDO,gBAAgB,CAACqM,SAAS,CAAC,CAAC;UAC5B;UACA,MAAMT,MAAI,CAACU,UAAU,CAACtM,gBAAgB,CAACsE,IAAI,CAACiI,MAAM,CAAC;;UAEnD;UACA;UACAP,OAAO,CAACQ,mBAAmB,CAACX,2BAA2B,EAAE7L,gBAAgB,CAACsE,IAAI,CAAC;;UAE/E;UACA,IAAMmI,MAAM,GAAGb,MAAI,CAACjM,UAAU,CAAC4I,eAAe,CAACqD,MAAI,CAAC5M,MAAM,EAAE4M,MAAI,CAAC3M,QAAQ,CAAE;UAC3E,IAAMyN,eAAe,SAAS1M,gBAAgB,CAAC2M,UAAU,CAACf,MAAI,CAAC5M,MAAM,EAAEyN,MAAM,CAAC;UAC9ET,OAAO,CAACY,eAAe,CAAChB,MAAI,CAAC5M,MAAM,EAAE4M,MAAI,CAAC3M,QAAQ,EAAEyN,eAAgB,CAAC;;UAErE;UACA,IAAId,MAAI,CAAC7H,aAAa,CAAC8I,UAAU,EAAE;YAC/B,MAAM7M,gBAAgB,CAACsM,UAAU,CAACV,MAAI,CAAC7H,aAAa,CAAC8I,UAAU,CAACC,SAAS,EAAE,QAAQ,CAAC;YACpFd,OAAO,CAACe,gBAAgB,CAACnB,MAAI,CAAC7H,aAAa,CAAC8I,UAAU,CAAC;UAC3D;QACJ,CAAC;QAAA,gBAnBKV,iBAAiBA,CAAA;UAAA,OAAAC,KAAA,CAAAvL,KAAA,OAAAC,SAAA;QAAA;MAAA,GAmBtB;MAED,IAAMmJ,kBAAkB,GAAG2B,MAAI,CAAC5L,gBAAgB,CAACF,KAAK,CAAC,CAAC;MACxD,IAAMkN,kBAAkB,SAASpB,MAAI,CAAC5L,gBAAgB,CAACmK,kBAAkB,CAAC,CAAC;MAC3E,IAAMM,oBAAoB,SAASmB,MAAI,CAAC5L,gBAAgB,CAACoK,uBAAuB,CAACwB,MAAI,CAAChK,aAAa,CAAC;MACpG,IAAMsI,yBAAyB,GAAG8C,kBAAkB,IAAIvC,oBAAoB;;MAE5E;MACAnR,MAAM,CAAC+H,GAAG,CAAC;QACPyK,oBAAoB;QACpB7B,kBAAkB;QAClB+C,kBAAkB;QAClBvC,oBAAoB;QACpBP;MACJ,CAAC,CAAC;MAEF,IAAI,CAACA,yBAAyB,IAAI4B,oBAAoB,EAAE;QACpDxS,MAAM,CAAC+H,GAAG,CAAC,qEAAqE,GAAG,mBAAmB,CAAC;QACvG;QACA;QACA;QACA;QACA;QACA;QACA,MAAM8K,iBAAiB,CAAC,CAAC;MAC7B,CAAC,MAAM,IAAIlC,kBAAkB,IAAI+C,kBAAkB,EAAE;QACjD1T,MAAM,CAAC+H,GAAG,CAAC,kEAAkE,CAAC;MAClF,CAAC,MAAM,IAAIoJ,oBAAoB,EAAE;QAC7BnR,MAAM,CAAC+H,GAAG,CACN,uEAAuE,GACnE,wDACR,CAAC;QACD,MAAMuK,MAAI,CAAC1L,yBAAyB,CAAC;UACjC+M,uBAAuB,EAAE;QAC7B,CAAC,CAAC;MACN;;MAEA;MACA;MACA;MACA,IAAMC,uBAAuB,GAAGlB,OAAO,CAACE,qBAAqB,CAACiB,WAAW;MACzE,IAAID,uBAAuB,CAACE,IAAI,IAAI,CAACxB,MAAI,CAAC7M,QAAQ,CAAC0F,eAAe,CAAC4I,oBAAoB,EAAE;QACrF,IAAMzL,aAAa,GAAG,IAAItF,2BAA2B,CACjD0P,OAAO,CAACsB,wBAAwB,EAChCtB,OAAO,CAACuB,mBACZ,CAAC;QACD,UAAU3L,aAAa,CAAC4I,MAAM,CAAC,CAAC,EAAE;UAC9BlR,MAAM,CAAC+H,GAAG,CAAC,0DAA0D,CAAC;UACtE;UACA;UACA,MAAMxH,gBAAgB,CAAC2T,oBAAoB,CAACN,uBAAuB,EAAEtL,aAAa,CAAC;QACvF;MACJ;MAEA,IAAM6L,SAAS,GAAGzB,OAAO,CAAC0B,cAAc,CAAC,CAAC;MAC1C,MAAMD,SAAS,CAAC5M,KAAK,CAAC+K,MAAI,CAAC;MAC3B;MACA;MACA,MAAMI,OAAO,CAAC2B,OAAO,CAAC/B,MAAI,CAAC;MAE3BtS,MAAM,CAAC+H,GAAG,CAAC,qBAAqB,CAAC;IAAC;EACtC;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACI;EACauM,sBAAsBA,CAAA,EAMc;IAAA,IAAAC,WAAA,GAAA/M,SAAA;MAAAgN,MAAA;IAAA,OAAArO,iBAAA;MAAA,IANb;QAChCsO,sBAAsB,gBAAAtO,iBAAA,CAAG;UAAA,OAAoC,CAAC,CAAC;QAAA,CAAiB;QAChFuO,aAAa;QACbC,iBAAiB;QACjBC,qBAAqB;QACrBC;MACsB,CAAC,GAAAN,WAAA,CAAA9K,MAAA,QAAA8K,WAAA,QAAA7K,SAAA,GAAA6K,WAAA,MAAG,CAAC,CAAC;MAC5BvU,MAAM,CAAC+H,GAAG,CAAC,qCAAqC,CAAC;MACjD,IAAM0K,uBAAuB,GAAG+B,MAAI,CAAC/O,QAAQ,CAAC0F,eAAe;MAC7D,IAAMuH,OAAO,GAAG,IAAIhS,sBAAsB,CAAC8T,MAAI,CAAC/O,QAAQ,CAACyF,KAAK,CAACyH,WAAW,EAAEF,uBAAuB,CAAC;MACpG,IAAMnK,aAAa,GAAG,IAAItF,2BAA2B,CACjD0P,OAAO,CAACsB,wBAAwB,EAChCtB,OAAO,CAACuB,mBACZ,CAAC;;MAED;MACA,IAAIa,QAAuB,GAAG,IAAI;;MAElC;MACA,IAAMC,UAAU;QAAA,IAAAC,KAAA,GAAA7O,iBAAA,CAAG,WAAO8O,IAA6B,EAAsB;UACzE,IAAM;YAAEC,KAAK;YAAErF;UAAQ,CAAC,SAASvH,aAAa,CAAC6M,MAAM,CAACpS,+BAA+B,EAAEkS,IAAI,CAAC;;UAE5F;UACAvC,OAAO,CAACuB,mBAAmB,CAACmB,aAAa,CAACF,KAAK,EAAErF,OAAO,EAAEoF,IAAI,CAACvF,GAAG,CAAC;UAEnE,MAAMpH,aAAa,CAAC+M,eAAe,CAACH,KAAK,CAAC;UAC1C,OAAOA,KAAK;QAChB,CAAC;QAAA,gBARKH,UAAUA,CAAAO,GAAA;UAAA,OAAAN,KAAA,CAAAzN,KAAA,OAAAC,SAAA;QAAA;MAAA,GAQf;MAED,IAAM+N,wBAAwB;QAAA,IAAAC,KAAA,GAAArP,iBAAA,CAAG,WAAO+O,KAAa,EAAErF,OAAoC,EAAoB;UAC3G,IAAI,CAACA,OAAO,CAAC4F,GAAG,EAAE;YAAA,IAAAC,qBAAA,EAAAC,sBAAA;YACd,IAAMjG,GAAG,UAAAgG,qBAAA,GAAS,CAAAC,sBAAA,GAAAnB,MAAI,CAAC/O,QAAQ,CAAC0F,eAAe,EAACiB,mBAAmB,cAAAsJ,qBAAA,uBAAjDA,qBAAA,CAAA1D,IAAA,CAAA2D,sBAAA,EACd;cAAE3K,IAAI,EAAE;gBAAE,CAACkK,KAAK,GAAGrF;cAAQ;YAAE,CAAC,EAC9B,EACJ,CAAC;YACD,IAAIH,GAAG,EAAE;cACL,IAAMC,UAAU,GAAGD,GAAG,CAAC,CAAC,CAAC;cACzBgD,OAAO,CAACuB,mBAAmB,CAACmB,aAAa,CAACF,KAAK,EAAErF,OAAO,EAAEF,UAAU,CAAC;cACrE,IAAM;gBAAEiG,EAAE;gBAAEH;cAAI,CAAC,SAAS3S,iBAAiB,CAAC6M,UAAU,CAAC;cACvDE,OAAO,CAAC+F,EAAE,GAAGA,EAAE;cACf/F,OAAO,CAAC4F,GAAG,GAAGA,GAAG;cAEjB,MAAM/C,OAAO,CAACmD,cAAc,yBAAA7N,MAAA,CAAyBkN,KAAK,GAAIrF,OAAO,CAAC;YAC1E;UACJ;QACJ,CAAC;QAAA,gBAhBK0F,wBAAwBA,CAAAO,GAAA,EAAAC,GAAA;UAAA,OAAAP,KAAA,CAAAjO,KAAA,OAAAC,SAAA;QAAA;MAAA,GAgB7B;MAED,IAAMwO,6BAA6B;QAAA,IAAAC,KAAA,GAAA9P,iBAAA,CAAG,WAAO+P,iBAA8C,EAAoB;UAC3G,IAAI1B,MAAI,CAAC9N,gBAAgB,CAACF,KAAK,CAAC,CAAC,WAAWgO,MAAI,CAAC9N,gBAAgB,CAACmK,kBAAkB,CAAC,QAAQ,CAAC,CAAC,EAAE;YAC7F,IAAI;cACA7Q,MAAM,CAAC+H,GAAG,CAAC,8CAA8C,CAAC;cAC1D,MAAMyM,MAAI,CAAC9N,gBAAgB,CAACsM,UAAU,CAACkD,iBAAiB,EAAE,QAAQ,CAAC;YACvE,CAAC,CAAC,OAAOrO,CAAC,EAAE;cACR;cACA;cACA7H,MAAM,CAAC8H,KAAK,CAAC,mDAAmD,EAAED,CAAC,CAAC;YACxE;UACJ,CAAC,MAAM;YACH7H,MAAM,CAACsK,IAAI,CAAC,oEAAoE,CAAC;UACrF;QACJ,CAAC;QAAA,gBAbK0L,6BAA6BA,CAAAG,GAAA;UAAA,OAAAF,KAAA,CAAA1O,KAAA,OAAAC,SAAA;QAAA;MAAA,GAalC;MAED,IAAM4O,UAAU,SAAS5B,MAAI,CAAClM,aAAa,CAAC2C,MAAM,CAAC,CAAC;MACpD,IAAM,CAACoL,QAAQ,EAAEC,UAAU,CAAC,GAAGF,UAAU,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC;MACzD,IAAMG,aAAa,GACf,CAAC3B,qBAAqB,IAAI0B,UAAU,IAAIA,UAAU,CAACvG,SAAS,KAAKhN,+BAA+B;;MAEpG;MACA/C,MAAM,CAAC+H,GAAG,CAAC;QACP2M,aAAa;QACbC,iBAAiB;QACjBC,qBAAqB;QACrB2B,aAAa;QACbD;MACJ,CAAC,CAAC;MAEF,IAAI,CAACC,aAAa,IAAI,CAAC7B,aAAa,EAAE;QAClC;QACA;QACA1U,MAAM,CAAC+H,GAAG,CAAC,yDAAyD,CAAC;;QAErE;QACA;QACA;QACA;QACA;QACA;QACA,IAAM;UAAE8H,OAAO;UAAEF;QAAW,CAAC,SAAS8E,sBAAsB,CAAC,CAAC;QAC9DK,QAAQ,SAASC,UAAU,CAAC;UAAEjF,UAAU,EAAED,OAAO,aAAPA,OAAO,uBAAPA,OAAO,CAAEC,UAAU;UAAEJ,GAAG,EAAEC,UAAU;UAAE6G,IAAI,EAAE3G,OAAO,aAAPA,OAAO,uBAAPA,OAAO,CAAE2G;QAAK,CAAC,CAAC;MAC1G,CAAC,MAAM,IAAI,CAACD,aAAa,IAAI7B,aAAa,EAAE;QACxC;QACA1U,MAAM,CAAC+H,GAAG,CAAC,qDAAqD,CAAC;;QAEjE;QACA;QACA,IAAM0O,SAAS,GAAG,OAAOjC,MAAI,CAAC7J,0BAA0B,CAAC,CAAC,YAAYkK,sBAAsB,aAAtBA,sBAAsB,uBAAtBA,sBAAsB,CAAG,CAAC,CAAC;;QAEjG;QACA,IAAMI,IAAI,GAAG;UAAEvF,GAAG,EAAE+G;QAAU,CAA4B;QAE1D,IAAI/B,aAAa,CAAClB,SAAS,CAACkD,gBAAgB,IAAIhC,aAAa,CAAClB,SAAS,CAACmD,sBAAsB,EAAE;UAC5F;UACA1B,IAAI,CAACnF,UAAU,GAAG;YACdC,SAAS,EAAE,UAAU;YACrBC,UAAU,EAAE0E,aAAa,CAAClB,SAAS,CAACmD,sBAAsB;YAC1D1G,IAAI,EAAEyE,aAAa,CAAClB,SAAS,CAACkD,gBAAgB;YAC9CE,IAAI,EAAE;UACV,CAAC;QACL;QAEA9B,QAAQ,SAASC,UAAU,CAACE,IAAI,CAAC;;QAEjC;QACA,MAAM3M,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAErH,YAAY,CAAC4S,SAAU,CAAC,EAAE,CAAC3B,QAAQ,CAAC,CAAC;;QAErF;QACA;QACA;QACA,MAAMkB,6BAA6B,CAACtB,aAAa,CAAClB,SAAS,CAAC;QAE5Dd,OAAO,CAACe,gBAAgB,CAACiB,aAAa,CAAC;MAC3C,CAAC,MAAM;QACH;QACA1U,MAAM,CAAC+H,GAAG,CAAC,uBAAuB,CAAC;QAEnC,IAAIuO,UAAU,IAAIA,UAAU,CAACvG,SAAS,KAAKhN,+BAA+B,EAAE;UACxE;UACA;UACA,MAAMwS,wBAAwB,CAACc,QAAQ,EAAEC,UAAU,CAAC;QACxD;MACJ;;MAEA;MACA;MACA,IACI,CAAC9B,MAAI,CAAC/O,QAAQ,CAAC0F,eAAe,CAAC4I,oBAAoB,WAC5CS,MAAI,CAAC/D,mBAAmB,CAAC,CAAC,CAAC,KACjCqE,QAAQ,IAAI,QAAQN,MAAI,CAAC9N,gBAAgB,CAACoK,uBAAuB,CAACxI,aAAa,CAAC,CAAC,CAAC,EACrF;QACEtI,MAAM,CAAC+H,GAAG,CAAC,iEAAiE,CAAC;QAC7E,IAAM6L,uBAAuB,SAASY,MAAI,CAAC9N,gBAAgB,CAACmQ,4BAA4B,CAAC,CAAC;QAC1F;QACA;QACA,MAAMtW,gBAAgB,CAAC2T,oBAAoB,CAACN,uBAAuB,EAAEtL,aAAa,CAAC;MACvF;MAEA,IAAIqM,iBAAiB,IAAI,CAACD,aAAa,EAAE;QACrC1U,MAAM,CAAC+H,GAAG,CAAC,yCAAyC,CAAC;QACrD,IAAM+O,IAAI,SAAStC,MAAI,CAAC/O,QAAQ,CAACsR,uBAAuB,CACpD,IAAI,CAAC;QACL;QACA;QACA;QACA;UAAEC,mBAAmB,EAAE;QAAM,CACjC,CAAC;QACD;QACA,IAAMrH,YAAU,GAAG1M,iBAAiB,CAAC6T,IAAI,CAACG,YAAY,CAAC;QACvD,MAAM3O,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAErH,YAAY,CAAC8L,YAAU,CAAC,CAAC;;QAEzE;QACA,IAAMuH,IAAoB,GAAG;UACzBnH,SAAS,EAAE+G,IAAI,CAAC/G,SAAS;UACzByD,SAAS,EAAEsD,IAAI,CAACtD;QACpB,CAAC;;QAED;QACA,MAAMwC,6BAA6B,CAACkB,IAAI,CAAC1D,SAAS,CAAC;;QAEnD;QACA,MAAMgB,MAAI,CAACxB,UAAU,CAACkE,IAAI,CAAC1D,SAAS,CAAC;QAErCd,OAAO,CAACe,gBAAgB,CAACyD,IAAI,CAAC;MAClC;;MAEA;MACA,IAAMC,gBAAgB,SAAS7O,aAAa,CAACuC,GAAG,CAAC,oBAAoB,CAAC;MACtE,IAAIsM,gBAAgB,EAAE;QAClBnX,MAAM,CAAC8W,IAAI,CAAC,qDAAqD,CAAC;QAClE;QACA;QACA,IAAMM,cAAc,GAAGrM,YAAY,CAACoM,gBAAgB,CAAC;QACrD,IAAIC,cAAc,EAAE;UAChB,IAAMlC,KAAK,GAAGJ,QAAQ,IAAIuB,QAAQ;UAClC,MAAM/N,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAEkM,cAAc,EAAElC,KAAK,GAAG,CAACA,KAAK,CAAC,GAAG,IAAI,CAAC;QAC3F;QACA,IAAMmC,gBAAgB,GAAG,IAAIC,UAAU,CAAC1T,YAAY,CAACwT,cAAc,IAAID,gBAAgB,CAAC,CAAC;QACzFzE,OAAO,CAAC6E,iCAAiC,CAACF,gBAAgB,CAAC;MAC/D,CAAC,MAAM,IAAI7C,MAAI,CAAC/J,aAAa,CAAC4G,mBAAmB,CAAC,CAAC,EAAE;QACjD;QACA;QACA,IAAMoF,UAAS,GAAG,OAAOjC,MAAI,CAAC7J,0BAA0B,CAAC,CAAC,YAAYkK,sBAAsB,aAAtBA,sBAAsB,uBAAtBA,sBAAsB,CAAG,CAAC,CAAC;QACjG,IAAI,CAAC4B,UAAS,EAAE;UACZ;UACA;UACA;UACA;UACAzW,MAAM,CAAC8H,KAAK,CAAC,wDAAwD,CAAC;UACtE;QACJ;QACA9H,MAAM,CAAC8W,IAAI,CAAC,4EAA4E,CAAC;QACzF,MAAMxO,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAErH,YAAY,CAAC4S,UAAS,CAAC,CAAC;MAC5E;MAEA,IAAMtC,SAAS,GAAGzB,OAAO,CAAC0B,cAAc,CAAC,CAAC;MAC1C,MAAMD,SAAS,CAAC5M,KAAK,CAACiN,MAAI,CAAC;MAC3B;MACA;MACA,MAAM9B,OAAO,CAAC2B,OAAO,CAACG,MAAI,CAAC;MAE3BxU,MAAM,CAAC+H,GAAG,CAAC,6BAA6B,CAAC;IAAC;EAC9C;;EAEA;AACJ;AACA;EACiByP,cAAcA,CAAA,EAAkB;IAAA,IAAAC,MAAA;IAAA,OAAAtR,iBAAA;MACzC;MACA;MACA;MACA;MACA,MAAMsR,MAAI,CAAChN,aAAa,CAACiN,0BAA0B,CAAC,CAAC;MAErD,IAAMZ,IAAI,SAASW,MAAI,CAAChN,aAAa,CAACsM,uBAAuB,CAAC,CAAC;MAE/D,MAAMU,MAAI,CAACzE,UAAU,CAAC8D,IAAI,CAACtD,SAAS,CAAC;;MAErC;MACA,IAAM;QAAEmE;MAAQ,CAAC,SAASF,MAAI,CAAChS,QAAQ,CAACmS,IAAI,CAACC,aAAa,CACtDlU,MAAM,CAACmU,IAAI,EACX,oBAAoB,EACpBpO,SAAS,EACToN,IAAI,EACJ;QACIiB,MAAM,EAAEtU,YAAY,CAACuU;MACzB,CACJ,CAAC;MAEDhY,MAAM,CAAC+H,GAAG,2BAAAC,MAAA,CAA2B2P,OAAO,CAAE,CAAC;;MAE/C;MACA,IAAMhI,UAAU,GAAGmH,IAAI,CAACnH,UAAU;MAClC,MAAM8H,MAAI,CAACnP,aAAa,CAAC4C,KAAK,CAAC,oBAAoB,EAAErH,YAAY,CAAC8L,UAAU,CAAC,CAAC;MAC9E,MAAM8H,MAAI,CAACQ,4BAA4B,CAACtI,UAAU,CAAC;MAEnD,MAAM8H,MAAI,CAAChN,aAAa,CAACwD,aAAa,CAAC,CAAC;MACxC,MAAMwJ,MAAI,CAAChN,aAAa,CAACyN,iCAAiC,CAAC,CAAC;IAAC;EACjE;;EAEA;AACJ;AACA;EACiBC,sBAAsBA,CAACR,OAAe,EAAiB;IAAA,IAAAS,OAAA;IAAA,OAAAjS,iBAAA;MAChE,MAAMiS,OAAI,CAAC3N,aAAa,CAAC0N,sBAAsB,CAACR,OAAO,CAAC;IAAC;EAC7D;;EAEA;AACJ;AACA;EACWU,mBAAmBA,CACtBtI,SAAiB,EACjBkF,IAA6B,EAC7BqD,KAAc,EACiB;IAC/B,OAAO,IAAI,CAAChQ,aAAa,CAAC6M,MAAM,CAACpF,SAAS,EAAEkF,IAAI,EAAEqD,KAAK,CAAC;EAC5D;;EAEA;AACJ;AACA;EACWC,mBAAmBA,CAACD,KAAc,EAAoB;IACzD,OAAO,IAAI,CAAChQ,aAAa,CAAC4I,MAAM,CAACoH,KAAK,CAAC;EAC3C;;EAEA;AACJ;AACA;EACWlM,mBAAmBA,CAACkM,KAAc,EAAyC;IAC9E,OAAO,IAAI,CAAChQ,aAAa,CAAC2C,MAAM,CAACqN,KAAK,CAAC;EAC3C;;EAEA;AACJ;AACA;EACWE,WAAWA,CAAChC,IAAY,EAAEiC,MAAc,EAAEzN,IAAe,EAAiB;IAC7E,OAAO,IAAI,CAAC1C,aAAa,CAAC4C,KAAK,CAACsL,IAAI,EAAEiC,MAAM,EAAEzN,IAAI,CAAC;EACvD;;EAEA;AACJ;AACA;EACW0N,SAASA,CAAClC,IAAY,EAA+B;IACxD,OAAO,IAAI,CAAClO,aAAa,CAACuC,GAAG,CAAC2L,IAAI,CAAC;EACvC;;EAEA;AACJ;AACA;EACWmC,cAAcA,CAACnC,IAAY,EAA+D;IAC7F,OAAO,IAAI,CAAClO,aAAa,CAACsQ,QAAQ,CAACpC,IAAI,CAAC;EAC5C;EAEOqC,aAAaA,CAACrC,IAAY,EAAE5H,OAAiB,EAAkB;IAClE,IAAI,CAACA,OAAO,EAAE;MACVA,OAAO,GAAGrE,MAAM,CAACS,IAAI,CAAC,IAAI,CAAC3E,UAAU,CAAC+G,0BAA0B,CAAC,IAAI,CAAC1H,MAAM,CAAC,CAAC;IAClF;IACA,OAAO,IAAI,CAAC4C,aAAa,CAACwQ,OAAO,CAACtC,IAAI,EAAE5H,OAAO,CAAC;EACpD;;EAEA;AACJ;AACA;EACWmK,4BAA4BA,CAAA,EAA2B;IAC1D,OAAO,IAAI,CAACzQ,aAAa,CAAC0Q,eAAe,CAAC,CAAC;EAC/C;;EAEA;AACJ;AACA;EACWC,4BAA4BA,CAACC,CAAS,EAAiB;IAC1D,OAAO,IAAI,CAAC5Q,aAAa,CAAC+M,eAAe,CAAC6D,CAAC,CAAC;EAChD;;EAEA;AACJ;AACA;EACWC,qBAAqBA,CAACzJ,GAAe,EAAEoH,IAAiC,EAAoB;IAC/F,OAAO,IAAI,CAACxO,aAAa,CAAC8Q,QAAQ,CAAC1J,GAAG,EAAEoH,IAAI,CAAC;EACjD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWuC,4BAA4BA,CAAC1J,UAAsB,EAAE2J,iBAAyB,EAAW;IAC5F,IAAIhK,UAA+B,GAAG,IAAI;IAC1C,IAAI;MACAA,UAAU,GAAG,IAAI9K,UAAU,CAACC,GAAG,CAAC8K,YAAY,CAAC,CAAC;MAC9C,IAAMgK,SAAS,GAAGjK,UAAU,CAACG,qBAAqB,CAACE,UAAU,CAAC;MAC9D;MACA,OAAO4J,SAAS,KAAKD,iBAAiB;IAC1C,CAAC,SAAS;MAAA,IAAAE,WAAA;MACN,CAAAA,WAAA,GAAAlK,UAAU,cAAAkK,WAAA,eAAVA,WAAA,CAAYpJ,IAAI,CAAC,CAAC;IACtB;EACJ;;EAEA;AACJ;AACA;AACA;EACiBzF,0BAA0BA,CAAA,EAA+B;IAAA,IAAA8O,OAAA;IAAA,OAAAtT,iBAAA;MAClE,IAAMuT,UAAU,SAAS,IAAIC,OAAO,CAC/BC,OAAO,IAAK;QACTH,OAAI,CAAC5T,WAAW,CAAC8H,KAAK,CAAC,UAAU,EAAE,CAAC5M,oBAAoB,CAAC6M,aAAa,CAAC,EAAGC,GAAG,IAAK;UAC9E4L,OAAI,CAAC5T,WAAW,CAACgU,wBAAwB,CAAChM,GAAG,EAAE+L,OAAO,EAAE,oBAAoB,CAAC;QACjF,CAAC,CAAC;MACN,CACJ,CAAC;MAED,IAAIlK,GAAsB,GAAG,IAAI;;MAEjC;MACA,IAAI,OAAOgK,UAAU,KAAK,QAAQ,EAAE;QAChChK,GAAG,GAAG,IAAI4H,UAAU,CAAC1T,YAAY,CAACmH,YAAY,CAAC2O,UAAU,CAAC,IAAIA,UAAU,CAAC,CAAC;QAC1E,MAAMD,OAAI,CAACxB,4BAA4B,CAACvI,GAAG,CAAC;MAChD;MACA,IAAIgK,UAAU,IAAI,OAAOA,UAAU,KAAK,QAAQ,IAAI,YAAY,IAAIA,UAAU,EAAE;QAC5E,IAAM7M,SAAS,GAAGiN,MAAM,CAACjO,IAAI,CAAC4N,OAAI,CAACnO,SAAS,CAACuB,SAAS,CAAC;QACvD,IAAMkN,SAAS,SAAShW,2BAA2B,CAAC2V,UAAU,EAAE7M,SAAS,EAAE,oBAAoB,CAAC;QAChG6C,GAAG,GAAG9L,YAAY,CAACmW,SAAS,CAAC;MACjC;MACA,OAAOrK,GAAG;IAAC;EACf;;EAEA;AACJ;AACA;AACA;AACA;EACiBuI,4BAA4BA,CAACvI,GAAsB,EAAEiI,OAAgB,EAAiB;IAAA,IAAAqC,OAAA;IAAA,OAAA7T,iBAAA;MAC/F,IAAI,EAAEuJ,GAAG,YAAY4H,UAAU,CAAC,EAAE;QAC9B;QACA,MAAM,IAAIjM,KAAK,yDAAArD,MAAA,CAAyD0H,GAAG,CAAE,CAAC;MAClF;MACA,IAAM7C,SAAS,GAAGiN,MAAM,CAACjO,IAAI,CAACmO,OAAI,CAAC1O,SAAS,CAACuB,SAAS,CAAC;MACvD,IAAMoN,YAAY,SAASjW,2BAA2B,CAACH,YAAY,CAAC6L,GAAG,CAAC,EAAE7C,SAAS,EAAE,oBAAoB,CAAC;MAC1G,OAAOmN,OAAI,CAACnU,WAAW,CAAC8H,KAAK,CAAC,WAAW,EAAE,CAAC5M,oBAAoB,CAAC6M,aAAa,CAAC,EAAGC,GAAG,IAAK;QACtFmM,OAAI,CAACnU,WAAW,CAACqU,0BAA0B,CAACrM,GAAG,EAAE,oBAAoB,EAAEoM,YAAY,CAAC;MACxF,CAAC,CAAC;IAAC;EACP;;EAEA;AACJ;AACA;EACWE,4CAA4CA,CAAA,EAAkB;IACjE,MAAM,IAAI9O,KAAK,CAAC,iBAAiB,CAAC;EACtC;;EAEA;AACJ;AACA;AACA;AACA;EACiB+O,6BAA6BA,CAAA,EAA2B;IAAA,IAAAC,OAAA;IAAA,OAAAlU,iBAAA;MACjE,IAAIkU,OAAI,CAAC5P,aAAa,CAAC4G,mBAAmB,CAAC,CAAC,EAAE;QAAA,IAAAiJ,qBAAA;QAC1C,QAAAA,qBAAA,GAAOD,OAAI,CAAC5P,aAAa,CAACkN,OAAO,cAAA2C,qBAAA,cAAAA,qBAAA,GAAI,IAAI;MAC7C;MACA,OAAO,IAAI;IAAC;EAChB;;EAEA;AACJ;AACA;EACiBC,gBAAgBA,CAAA,EAAkC;IAAA,OAAApU,iBAAA;MAC3D,MAAM,IAAIkF,KAAK,CAAC,iBAAiB,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;AACA;AACA;EACiBmP,kBAAkBA,CAAC1D,IAAmB,EAA4B;IAAA,IAAA2D,OAAA;IAAA,OAAAtU,iBAAA;MAC3E,IAAMuU,SAAS,SAASD,OAAI,CAAChQ,aAAa,CAAC+P,kBAAkB,CAAC1D,IAAI,CAAC;MACnE,OAAO9U,kCAAkC,CAAC0Y,SAAS,CAAC;IAAC;EACzD;;EAEA;AACJ;AACA;AACA;AACA;EACiBC,uBAAuBA,CAAA,EAAmC;IAAA,IAAAC,OAAA;IAAA,OAAAzU,iBAAA;MACnE,IAAM0U,WAAW,SAASD,OAAI,CAACnQ,aAAa,CAACqQ,cAAc,CAAC,CAAC;MAC7D,IAAI,CAACD,WAAW,IAAI,CAACA,WAAW,CAACtH,UAAU,EAAE,OAAO,IAAI;MACxD,OAAO;QACHA,UAAU,EAAEsH,WAAW,CAACtH,UAAU;QAClCmH,SAAS,EAAE1Y,kCAAkC,CAAC6Y,WAAW,CAACH,SAAS;MACvE,CAAC;IAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWK,2BAA2BA,CAACpL,UAAsB,EAAE2J,iBAAyB,EAAW;IAC3F,IAAI0B,OAAyB,GAAG,IAAI;IACpC,IAAI;MACAA,OAAO,GAAG,IAAIxW,UAAU,CAACC,GAAG,CAACwW,SAAS,CAAC,CAAC;MACxC,IAAM1B,SAAS,GAAGyB,OAAO,CAACE,cAAc,CAACvL,UAAU,CAAC;MACpD;MACA,OAAO4J,SAAS,KAAKD,iBAAiB;IAC1C,CAAC,SAAS;MAAA,IAAA6B,QAAA;MACN,CAAAA,QAAA,GAAAH,OAAO,cAAAG,QAAA,eAAPA,QAAA,CAAS/K,IAAI,CAAC,CAAC;IACnB;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBgL,+BAA+BA,CAAA,EAAkB;IAAA,IAAAC,OAAA;IAAA,OAAAlV,iBAAA;MAC3DnG,MAAM,CAAC8W,IAAI,CAAC,mDAAmD,CAAC;;MAEhE;MACA,IAAM3D,MAAM,GAAGkI,OAAI,CAAChV,UAAU,CAAC4I,eAAe,CAACoM,OAAI,CAAC3V,MAAM,EAAE2V,OAAI,CAAC1V,QAAQ,CAAE;MAC3E,IAAM2V,YAAY,SAASD,OAAI,CAAC3U,gBAAgB,CAAC2M,UAAU,CAACgI,OAAI,CAAC3V,MAAM,EAAEyN,MAAM,CAAC;MAChFnT,MAAM,CAAC8W,IAAI,2CAAA9O,MAAA,CAA2CqT,OAAI,CAAC1V,QAAQ,CAAE,CAAC;MAEtE,IAAM4V,MAAM,GAAGC,KAAA,IAA2C;QAAA,IAA1C;UAAEC,UAAU,GAAG;QAAM,CAAC,GAAAD,KAAA;QAClC,OAAOH,OAAI,CAAC5V,QAAQ,CACfiW,mBAAmB,CAAC;UACjB,CAACL,OAAI,CAAC3V,MAAM,GAAG;YACX,CAAC2V,OAAI,CAAC1V,QAAQ,GAAG2V;UACrB;QACJ,CAAC,CAAC,CACDK,IAAI,CAAEC,QAAQ,IAAK;UAChB,IAAM;YAAEC;UAAS,CAAC,GAAGD,QAAQ,IAAI,CAAC,CAAC;UACnC,IAAIrR,MAAM,CAACS,IAAI,CAAC6Q,QAAQ,IAAI,EAAE,CAAC,CAACpS,MAAM,GAAG,CAAC,EAAE;YACxC,IAAIgS,UAAU,EAAE;cACZJ,OAAI,CAAC5V,QAAQ,CAACqB,IAAI,CACdxD,WAAW,CAACwY,yBAAyB,EACrCD,QAAQ,EACR,iCAAiC,EACjCN,MAAM,CAAE;cACZ,CAAC;YACL;YACA,MAAM,IAAI3Z,uBAAuB,CAAC,mBAAmB,EAAE;cAAEia;YAAS,CAAC,CAAC;UACxE;UACA7b,MAAM,CAAC8W,IAAI,2CAAA9O,MAAA,CAA2CqT,OAAI,CAAC1V,QAAQ,CAAE,CAAC;QAC1E,CAAC,CAAC,CACDoW,KAAK,CAAElU,CAAC,IAAK;UACV7H,MAAM,CAAC8H,KAAK,+CAAAE,MAAA,CAA+CqT,OAAI,CAAC1V,QAAQ,GAAIkC,CAAC,CAAC;QAClF,CAAC,CAAC;MACV,CAAC;MACD0T,MAAM,CAAC;QAAEE,UAAU,EAAE;MAAK,CAAC,CAAC;MAE5B,IAAMO,eAAe,GAAGX,OAAI,CAAC5V,QAAQ,CAAC0F,eAAe,CAAC8Q,gCAAgC;MACtF,IAAID,eAAe,EAAE;QACjBhc,MAAM,CAAC8W,IAAI,CAAC,sCAAsC,CAAC;;QAEnD;QACA;QACA,IAAMoF,KAAiD,GAAG,CAAC,CAAC;QAC5D,KAAK,IAAM,CAACxW,QAAM,EAAEgB,gBAAgB,CAAC,IAAI6D,MAAM,CAACC,OAAO,CAAC6Q,OAAI,CAAChV,UAAU,CAACK,gBAAgB,CAAC,EAAE;UACvF,IAAMyV,WAAW,SAASd,OAAI,CAACe,iCAAiC,CAC5D1W,QAAM,EACNnF,gBAAgB,CAAC8b,WAAW,CAAC3V,gBAAgB,EAAEhB,QAAM,CACzD,CAAC;UACD,IAAIyW,WAAW,EAAE;YACbD,KAAK,CAACxW,QAAM,CAAC,GAAGyW,WAAW;UAC/B;QACJ;QAEA,IAAI5R,MAAM,CAACS,IAAI,CAACkR,KAAK,CAAC,CAACzS,MAAM,GAAG,CAAC,EAAE;UAC/BzJ,MAAM,CAAC8W,IAAI,UAAA9O,MAAA,CAAUuC,MAAM,CAACS,IAAI,CAACkR,KAAK,CAAC,CAACzS,MAAM,4BAAyB,CAAC;UACxE,IAAI;YACA,IAAM6S,cAAc,SAASN,eAAe,CAAC;cAAEE,KAAK,EAAEA;YAAM,CAAC,CAAC;YAC9D,IAAII,cAAc,EAAE;cAChB,KAAK,IAAM5W,QAAM,IAAI4W,cAAc,EAAE;gBACjC,IAAI5W,QAAM,IAAIwW,KAAK,EAAE;kBACjB,MAAMb,OAAI,CAAC5V,QAAQ,CAAC8W,iBAAiB,CAAC7W,QAAM,EAAEwW,KAAK,CAACxW,QAAM,CAAC,CAACgB,gBAAgB,CAACF,KAAK,CAAC,CAAE,CAAC;gBAC1F;cACJ;YACJ;UACJ,CAAC,CAAC,OAAOqB,CAAC,EAAE;YACR7H,MAAM,CAAC+H,GAAG,CAAC,gEAAgE,EAAEF,CAAC,CAAC;UACnF;QACJ;QAEA7H,MAAM,CAAC8W,IAAI,CAAC,sCAAsC,CAAC;MACvD;MAEA9W,MAAM,CAAC8W,IAAI,CAAC,mDAAmD,CAAC;IAAC;EACrE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACkBsF,iCAAiCA,CAC3C1W,MAAc,EACdgB,gBAAkC,EACa;IAAA,IAAA8V,OAAA;IAAA,OAAArW,iBAAA;MAC/C;MACA;MACA,IAAMsW,UAAU,GAAGD,OAAI,CAAC9V,gBAAgB,CAACK,cAAc,CAACL,gBAAgB,CAAC;MACzE,IAAIA,gBAAgB,CAACgW,QAAQ,IAAI,CAACD,UAAU,CAACE,UAAU,CAAC,CAAC,EAAE;QACvD,IAAM/N,OAAO,GAAG4N,OAAI,CAACnW,UAAU,CAAC+G,0BAA0B,CAAC1H,MAAM,CAAC;QAClE,IAAMkX,SAAS,SAASJ,OAAI,CAACK,4BAA4B,CAACnX,MAAM,EAAEgB,gBAAgB,CAACsE,IAAI,CAACiI,MAAM,EAAErE,OAAO,CAAC;QACxG,IAAIgO,SAAS,CAACnT,MAAM,EAAE;UAClB,OAAO;YACHmF,OAAO,EAAEgO,SAAS,CAACE,GAAG,CAAEnX,QAAQ,IAAKvF,UAAU,CAACic,WAAW,CAACzN,OAAO,CAACjJ,QAAQ,CAAC,EAAEA,QAAQ,CAAC,CAAC;YACzFe;UACJ,CAAC;QACL;MACJ;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACkBmW,4BAA4BA,CACtCnX,MAAc,EACdgK,GAAwB,EACxBd,OAAgC,EACf;IAAA,IAAAmO,OAAA;IAAA,OAAA5W,iBAAA;MACjB,IAAMyW,SAAmB,GAAG,EAAE;MAC9B,IAAIhO,OAAO,IAAIc,GAAG,CAACsN,UAAU,IAAItN,GAAG,CAACsN,UAAU,CAACtX,MAAM,CAAC,EAAE;QACrD,KAAK,IAAMuX,OAAO,IAAI1S,MAAM,CAACS,IAAI,CAAC0E,GAAG,CAACsN,UAAU,CAACtX,MAAM,CAAC,CAAC,EAAE;UACvD,IAAM,GAAGC,UAAQ,CAAC,GAAGsX,OAAO,CAACC,KAAK,CAAC,GAAG,EAAE,CAAC,CAAC;UAC1C,IAAIvX,UAAQ,IAAIiJ,OAAO,IAAIA,OAAO,CAACjJ,UAAQ,CAAC,CAAC2H,QAAQ,KAAKrJ,kBAAkB,CAACsJ,QAAQ,EAAE;YACnF,IAAI;cACA,MAAMrN,MAAM,CAACid,eAAe,CACxBJ,OAAI,CAACzR,SAAS,EACdoE,GAAG,EACHhK,MAAM,EACNC,UAAQ,EACRiJ,OAAO,CAACjJ,UAAQ,CAAC,CAACqF,IAAI,CAACiS,OAAO,CAClC,CAAC;cACDL,SAAS,CAACQ,IAAI,CAACzX,UAAQ,CAAC;YAC5B,CAAC,CAAC,OAAA0X,OAAA,EAAM,CAAC;UACb;QACJ;MACJ;MACA,OAAOT,SAAS;IAAC;EACrB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWU,oBAAoBA,CAAA,EAAyE;IAAA,IAAxEhR,IAAqB,GAAA9E,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG3G,eAAe,CAAC0c,MAAM;IACtE,OAAO5D,OAAO,CAACC,OAAO,CAAC,IAAI,CAAC4D,iBAAiB,CAAClR,IAAI,CAAC,CAAC;EACxD;;EAEA;EACOkR,iBAAiBA,CAAClR,IAAY,EAAiB;IAClD,OAAO,IAAI,CAAC5F,gBAAgB,CAACF,KAAK,CAAC8F,IAAI,CAAC;EAC5C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWhG,4BAA4BA,CAACZ,MAAc,EAA2B;IACzE,OAAO,IAAI,CAACW,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;EAC/D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWqB,cAAcA,CAACrB,MAAc,EAAkB;IAClD,IAAM+X,gBAAgB,GAAG,IAAI,CAACpX,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;IAC7E,IAAI,CAAC+X,gBAAgB,EAAE;MACnB,OAAO,IAAIhd,cAAc,CAAC,KAAK,EAAE,KAAK,EAAE,KAAK,CAAC;IAClD;IACA,OAAO,IAAI,CAACiG,gBAAgB,CAACK,cAAc,CAAC0W,gBAAgB,CAAC;EACjE;;EAEA;AACJ;AACA;EACiBC,yBAAyBA,CAAChY,MAAc,EAA2B;IAAA,IAAAiY,OAAA;IAAA,OAAAxX,iBAAA;MAC5E,OAAOwX,OAAI,CAAC5W,cAAc,CAACrB,MAAM,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;EACiBkY,sBAAsBA,CAAClY,MAAc,EAAiB;IAAA,OAAAS,iBAAA;MAC/D,MAAM,IAAIkF,KAAK,CAAC,iBAAiB,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACiBwS,2BAA2BA,CACpCnY,MAAc,EACdC,QAAgB,EACwB;IAAA,IAAAmY,OAAA;IAAA,OAAA3X,iBAAA;MACxC,IAAMgN,MAAM,GAAG2K,OAAI,CAACzX,UAAU,CAAC4I,eAAe,CAACvJ,MAAM,EAAEC,QAAQ,CAAC;MAChE,IAAI,CAACwN,MAAM,EAAE;QACT,OAAO,IAAI;MACf;MACA,OAAO2K,OAAI,CAACC,oBAAoB,CAACrY,MAAM,EAAEyN,MAAM,CAAC;IAAC;EACrD;;EAEA;AACJ;AACA;EACWrE,gBAAgBA,CAACpJ,MAAc,EAAEC,QAAgB,EAAoB;IACxE,IAAMwN,MAAM,GAAG,IAAI,CAAC9M,UAAU,CAAC4I,eAAe,CAACvJ,MAAM,EAAEC,QAAQ,CAAC;IAChE,OAAO,IAAI,CAACoY,oBAAoB,CAACrY,MAAM,EAAEyN,MAAM,CAAC;EACpD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACW4K,oBAAoBA,CAACrY,MAAc,EAAEyN,MAAmB,EAAoB;IAC/E,IAAM6K,cAAc,GAAG,CAAC,EAAC7K,MAAM,aAANA,MAAM,eAANA,MAAM,CAAEwJ,UAAU,CAAC,CAAC;IAE7C,IAAMc,gBAAgB,GAAG,IAAI,CAACpX,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;IAC7E,IAAIyN,MAAM,IAAIsK,gBAAgB,EAAE;MAC5B;MACA;MACA,IAAMQ,aAAa,GAAG,IAAI,CAAC1P,uBAAuB,IAAI7I,MAAM,KAAK,IAAI,CAACA,MAAM;MAC5E,OAAO,IAAI,CAACgB,gBAAgB,CAACoI,gBAAgB,CAAC2O,gBAAgB,EAAEtK,MAAM,EAAE6K,cAAc,EAAEC,aAAa,CAAC;IAC1G,CAAC,MAAM;MACH,OAAO,IAAIzd,gBAAgB,CAAC,KAAK,EAAE,KAAK,EAAEwd,cAAc,EAAE,KAAK,CAAC;IACpE;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWE,2BAA2BA,CAACvY,QAAgB,EAAW;IAAA,IAAAwY,qBAAA;IAC1D,IAAMhL,MAAM,GAAG,IAAI,CAAC9M,UAAU,CAAC4I,eAAe,CAAC,IAAI,CAACvJ,MAAM,EAAEC,QAAQ,CAAC;IACrE,IAAI,CAACwN,MAAM,EAAE,OAAO,KAAK;IACzB,IAAMsK,gBAAgB,GAAG,IAAI,CAACpX,UAAU,CAACC,4BAA4B,CAAC,IAAI,CAACZ,MAAM,CAAC;IAClF,QAAAyY,qBAAA,GACIV,gBAAgB,aAAhBA,gBAAgB,uBAAhBA,gBAAgB,CAAE3O,gBAAgB,CAAC2O,gBAAgB,EAAEtK,MAAM,EAAE,KAAK,EAAE,IAAI,CAAC,CAAChM,sBAAsB,CAAC,CAAC,cAAAgX,qBAAA,cAAAA,qBAAA,GAAI,KAAK;EAEnH;EA6CA;AACJ;AACA;AACA;EACiBvX,yBAAyBA,CAAA,EAEiB;IAAA,IAAAwX,WAAA,GAAA5W,SAAA;MAAA6W,OAAA;IAAA,OAAAlY,iBAAA;MAAA,IAFhB;QACnCwN,uBAAuB,GAAG;MACE,CAAC,GAAAyK,WAAA,CAAA3U,MAAA,QAAA2U,WAAA,QAAA1U,SAAA,GAAA0U,WAAA,MAAG,CAAC,CAAC;MAClC,IAAM1Y,MAAM,GAAG2Y,OAAI,CAAC3Y,MAAM;;MAE1B;MACA;MACA,MAAM2Y,OAAI,CAAC7N,YAAY,CAAC,CAAC6N,OAAI,CAAC3Y,MAAM,CAAC,CAAC;;MAEtC;MACA,IAAMkO,uBAAuB,SAASyK,OAAI,CAAC3X,gBAAgB,CAACmQ,4BAA4B,CAAC,CAAC;;MAE1F;MACA;;MAEA;MACA,IAAMzQ,eAAe,GAAGiY,OAAI,CAAChY,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;MAC5E,IAAI,CAACU,eAAe,EAAE;QAClBpG,MAAM,CAAC8H,KAAK,CACR,0CAA0C,GAAGpC,MAAM,GAAG,8CAC1D,CAAC;QACD;MACJ;MAEA,IAAMa,UAAU,GAAGH,eAAe,CAACI,KAAK,CAAC,CAAE;MAC3C,IAAM8X,aAAa,GAAGD,OAAI,CAAC3X,gBAAgB,CAACF,KAAK,CAAC,CAAC,KAAKD,UAAU;MAClE,IAAMgY,4BAA4B,GAAGnY,eAAe,CAACI,KAAK,CAAC,CAAC,IAAI,CAACoN,uBAAuB,CAAC4K,GAAG,CAAC,QAAQ,CAAC;MACtG,IAAIF,aAAa,EAAE;QACfte,MAAM,CAAC8W,IAAI,CAAC,2BAA2B,EAAEvQ,UAAU,CAAC;MACxD;MACA,IAAIoN,uBAAuB,KAAK2K,aAAa,IAAIC,4BAA4B,CAAC,EAAE;QAC5Eve,MAAM,CAAC8W,IAAI,CAAC,yDAAyD,CAAC;QACtE,IAAIkE,OAAyB,GAAG,IAAI;QACpC;QACA;QACA;QACA,IAAI;UACA,IAAMyD,GAAG,SAASJ,OAAI,CAAC3X,gBAAgB,CAACyF,kBAAkB,CAAC,QAAQ,EAAE5F,UAAU,CAAC;UAChFyU,OAAO,GAAGyD,GAAG,CAAC,CAAC,CAAC;UAChBze,MAAM,CAAC8W,IAAI,CAAC,sCAAsC,CAAC;QACvD,CAAC,SAAS;UAAA,IAAA4H,SAAA;UACN,CAAAA,SAAA,GAAA1D,OAAO,cAAA0D,SAAA,eAAPA,SAAA,CAAStO,IAAI,CAAC,CAAC;QACnB;MACJ;MAEA,IAAMuO,gBAAgB,GAAGN,OAAI,CAAC3X,gBAAgB,CAACF,KAAK,CAAC,cAAc,CAAC;MACpE,IAAMoY,gBAAgB,GAAGP,OAAI,CAAC3X,gBAAgB,CAACF,KAAK,CAAC,cAAc,CAAC;;MAEpE;MACA6X,OAAI,CAACxX,oBAAoB,CAACT,eAAe,CAAC4E,IAAI,CAAC;MAE/C,IAAM6T,kBAAkB,GAAGF,gBAAgB,KAAKvY,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC;MACrF,IAAMsY,kBAAkB,GAAGF,gBAAgB,KAAKxY,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC;MAErF,IAAMuY,iCAAiC,GACnC3Y,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC,IAAI,CAACoN,uBAAuB,CAAC4K,GAAG,CAAC,cAAc,CAAC;MACzF,IAAMQ,iCAAiC,GACnC5Y,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC,IAAI,CAACoN,uBAAuB,CAAC4K,GAAG,CAAC,cAAc,CAAC;MAEzF,IAAMS,aAAyC,GAAG,CAAC,CAAC;MAEpD,IAAIJ,kBAAkB,EAAE;QACpB7e,MAAM,CAAC8W,IAAI,CAAC,0BAA0B,EAAE1Q,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC,CAAC;MAClF;MACA,IAAImN,uBAAuB,KAAKkL,kBAAkB,IAAIE,iCAAiC,CAAC,EAAE;QACtF/e,MAAM,CAAC8W,IAAI,CAAC,+DAA+D,CAAC;QAC5E,IAAIkE,SAAyB,GAAG,IAAI;QACpC,IAAI;UACA,IAAMyD,IAAG,SAASJ,OAAI,CAAC3X,gBAAgB,CAACyF,kBAAkB,CACtD,cAAc,EACd/F,eAAe,CAACI,KAAK,CAAC,cAAc,CACxC,CAAC;UACDwU,SAAO,GAAGyD,IAAG,CAAC,CAAC,CAAC;UAChBze,MAAM,CAAC8W,IAAI,CAAC,4CAA4C,CAAC;QAC7D,CAAC,SAAS;UAAA,IAAAoI,SAAA;UACN,CAAAA,SAAA,GAAAlE,SAAO,cAAAkE,SAAA,eAAPA,SAAA,CAAS9O,IAAI,CAAC,CAAC;QACnB;QAEA,IAAM+C,MAAM,GAAGkL,OAAI,CAAChY,UAAU,CAAC4I,eAAe,CAACoP,OAAI,CAAC3Y,MAAM,EAAE2Y,OAAI,CAAC1Y,QAAQ,CAAE;QAC3E,IAAM2V,YAAY,SAAS+C,OAAI,CAAC3X,gBAAgB,CAAC2M,UAAU,CAACgL,OAAI,CAAC3Y,MAAM,EAAEyN,MAAM,CAAC;QAChF8L,aAAa,CAACZ,OAAI,CAAC1Y,QAAQ,CAAC,GAAG2V,YAAa;MAChD;MACA,IAAIwD,kBAAkB,EAAE;QACpB9e,MAAM,CAAC8W,IAAI,CAAC,0BAA0B,EAAE1Q,eAAe,CAACI,KAAK,CAAC,cAAc,CAAC,CAAC;MAClF;MACA,IAAImN,uBAAuB,KAAKmL,kBAAkB,IAAIE,iCAAiC,CAAC,EAAE;QACtFhf,MAAM,CAAC8W,IAAI,CAAC,+DAA+D,CAAC;QAC5E,IAAIkE,SAAyB,GAAG,IAAI;QACpC,IAAI;UACA,IAAMyD,KAAG,SAASJ,OAAI,CAAC3X,gBAAgB,CAACyF,kBAAkB,CACtD,cAAc,EACd/F,eAAe,CAACI,KAAK,CAAC,cAAc,CACxC,CAAC;UACDwU,SAAO,GAAGyD,KAAG,CAAC,CAAC,CAAC;UAChBze,MAAM,CAAC8W,IAAI,CAAC,4CAA4C,CAAC;QAC7D,CAAC,SAAS;UAAA,IAAAqI,SAAA;UACN,CAAAA,SAAA,GAAAnE,SAAO,cAAAmE,SAAA,eAAPA,SAAA,CAAS/O,IAAI,CAAC,CAAC;QACnB;MACJ;MAEA,IAAIkO,aAAa,EAAE;QACf,IAAMxM,SAAS,GAAGuM,OAAI,CAAC3X,gBAAgB,CAACsE,IAAI,CAACiI,MAAM;QACnD,MAAMoL,OAAI,CAACrL,UAAU,CAAClB,SAAS,CAAC;QAChC,IAAMsN,SAAS,GAAGtN,SAAS,CAACkL,UAAU,CAAEqB,OAAI,CAAC3Y,MAAM,CAAC,CAAC,UAAU,GAAG2Y,OAAI,CAAC1Y,QAAQ,CAAC;QAChF;QACA;QACA;QACAsZ,aAAa,CAACZ,OAAI,CAAC3X,gBAAgB,CAACF,KAAK,CAAC,CAAC,CAAE,GAAG+D,MAAM,CAAC8U,MAAM,CAAC,CAAC,CAAC,EAAgBvN,SAAS,EAAE;UACvFkL,UAAU,EAAE;YACR,CAACqB,OAAI,CAAC3Y,MAAM,GAAG;cACX,CAAC,UAAU,GAAG2Y,OAAI,CAAC1Y,QAAQ,GAAGyZ;YAClC;UACJ;QACJ,CAAC,CAAC;MACN;MAEA,IAAME,YAAY,GAAG/U,MAAM,CAACS,IAAI,CAACiU,aAAa,CAAC;MAC/C,IAAIK,YAAY,CAAC7V,MAAM,EAAE;QACrB,IAAM8R,MAAM,GAAGgE,MAAA,IAA2C;UAAA,IAA1C;YAAE9D,UAAU,GAAG;UAAM,CAAC,GAAA8D,MAAA;UAClCvf,MAAM,CAAC8W,IAAI,2CAAA9O,MAAA,CAA2CsX,YAAY,CAAE,CAAC;UACrE,OAAOjB,OAAI,CAAC5Y,QAAQ,CACfiW,mBAAmB,CAAC;YAAE,CAAC2C,OAAI,CAAC3Y,MAAM,GAAGuZ;UAAc,CAAC,CAAC,CACrDtD,IAAI,CAAEC,QAAQ,IAAK;YAChB,IAAM;cAAEC;YAAS,CAAC,GAAGD,QAAQ,IAAI,CAAC,CAAC;YACnC5b,MAAM,CAAC8W,IAAI,2CAAA9O,MAAA,CAA2CsX,YAAY,CAAE,CAAC;YACrE,IAAI/U,MAAM,CAACS,IAAI,CAAC6Q,QAAQ,IAAI,EAAE,CAAC,CAACpS,MAAM,GAAG,CAAC,EAAE;cACxC,IAAIgS,UAAU,EAAE;gBACZ4C,OAAI,CAAC5Y,QAAQ,CAACqB,IAAI,CACdxD,WAAW,CAACwY,yBAAyB,EACrCD,QAAQ,EACR,2BAA2B,EAC3BN,MACJ,CAAC;cACL;cACA,MAAM,IAAI3Z,uBAAuB,CAAC,mBAAmB,EAAE;gBAAEia;cAAS,CAAC,CAAC;YACxE;UACJ,CAAC,CAAC,CACDE,KAAK,CAAElU,CAAC,IAAK;YACV7H,MAAM,CAAC8H,KAAK,+CAAAE,MAAA,CAA+CsX,YAAY,GAAIzX,CAAC,CAAC;UACjF,CAAC,CAAC;QACV,CAAC;QACD0T,MAAM,CAAC;UAAEE,UAAU,EAAE;QAAK,CAAC,CAAC;MAChC;MAEA4C,OAAI,CAACvX,IAAI,CAACxD,WAAW,CAACsB,sBAAsB,EAAEc,MAAM,EAAE2Y,OAAI,CAACtX,cAAc,CAACrB,MAAM,CAAC,CAAC;MAElF,IAAI4Y,aAAa,EAAE;QACfD,OAAI,CAACvX,IAAI,CAACxD,WAAW,CAAC8B,WAAW,EAAE,CAAC,CAAC,CAAC;QACtC,MAAMiZ,OAAI,CAACjD,+BAA+B,CAAC,CAAC;MAChD;;MAEA;MACA,MAAMiD,OAAI,CAAC5T,aAAa,CAACqQ,cAAc,CAAC,CAAC;MACzC;MACA;IAAA;EACJ;;EAEA;AACJ;AACA;EACiB0E,kBAAkBA,CAACjM,UAAyB,EAAEkM,OAA0B,EAA4B;IAAA,OAAAtZ,iBAAA;MAC7G,IAAI,EAAEsZ,OAAO,YAAYnI,UAAU,CAAC,EAAE;QAClC,MAAM,IAAIjM,KAAK,wCAAwC,CAAC;MAC5D;MAEA,IAAM0E,SAAS,SAASjO,aAAa,CAAC4d,aAAa,CAACnM,UAAU,eAAApN,iBAAA,CAAE,aAAY;QACxE,OAAOsZ,OAAO;MAClB,CAAC,EAAC;;MAEF;MACA;MACA;MACA,IAAI,QAAQ1P,SAAS,CAAC4P,UAAU,CAACF,OAAO,CAAC,CAAC,EAAE;QACxC,OAAO9F,OAAO,CAACiG,MAAM,CAAC,IAAIlc,WAAW,CAAC;UAAEmc,OAAO,EAAEtd,YAAY,CAACud;QAA6B,CAAC,CAAC,CAAC;MAClG;MAEA,OAAO,IAAI/d,qBAAqB,CAACgO,SAAS,CAAC;IAAC;EAChD;;EAEA;AACJ;AACA;EACWgQ,sBAAsBA,CACzB/U,IAA0B,EAC1BgV,aAAqB,EAER;IAAA,IADb/K,IAAwB,GAAAzN,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,CAAC,CAAC;IAE7ByN,IAAI,CAACgL,MAAM,GAAG,QAAQ;IACtB,OAAO,IAAI,CAACC,cAAc,CAAClV,IAAI,EAAEiK,IAAI,CAAC;EAC1C;;EAEA;AACJ;AACA;AACA;AACA;EACkBpO,oBAAoBA,CAACmE,IAAgD,EAAiB;IAAA,IAAAmV,OAAA;IAAA,OAAAha,iBAAA;MAChG,IAAI6E,IAAI,EAAE;QACNmV,OAAI,CAACzZ,gBAAgB,CAACqH,OAAO,CAAC/C,IAAI,CAAC;MACvC,CAAC,MAAM;QACHmV,OAAI,CAACzZ,gBAAgB,CAAC0Z,SAAS,CAAC,CAAC;MACrC;MACA,MAAMD,OAAI,CAACta,WAAW,CAAC8H,KAAK,CAAC,WAAW,EAAE,CAAC5M,oBAAoB,CAAC6M,aAAa,CAAC,EAAGC,GAAG,IAAK;QACrFsS,OAAI,CAACta,WAAW,CAACwa,qBAAqB,CAACxS,GAAG,EAAEsS,OAAI,CAACzZ,gBAAgB,CAACsE,IAAI,CAAC;MAC3E,CAAC,CAAC;IAAC;EACP;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBhE,wBAAwBA,CAACtB,MAAc,EAAiB;IAAA,IAAA4a,OAAA;IAAA,OAAAna,iBAAA;MAClE,IAAM6V,eAAe,GAAGsE,OAAI,CAAC7a,QAAQ,CAAC0F,eAAe,CAAC8Q,gCAAgC;MACtF,IAAI,CAACD,eAAe,EAAE;QAClB;QACA;MACJ;MACAhc,MAAM,CAAC8W,IAAI,6CAAA9O,MAAA,CAA6CtC,MAAM,CAAE,CAAC;MACjE,IAAI4a,OAAI,CAAC5Z,gBAAgB,CAACsE,IAAI,CAACuV,YAAY,EAAE;QACzC,IAAM7Z,gBAAgB,GAAG4Z,OAAI,CAACja,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;QAC7E,IAAIgB,gBAAgB,EAAE;UAClB,IAAMyV,WAAW,SAASmE,OAAI,CAAClE,iCAAiC,CAAC1W,MAAM,EAAEgB,gBAAgB,CAAC;UAC1F,IAAIyV,WAAW,EAAE;YACb,IAAMG,cAAc,SAASN,eAAe,CAAC;cACzCE,KAAK,EAAE;gBACH,CAACxW,MAAM,GAAGyW;cACd;YACJ,CAAC,CAAC;YACF,IAAIG,cAAc,CAACkE,QAAQ,CAAC9a,MAAM,CAAC,EAAE;cACjC,MAAM4a,OAAI,CAAC7a,QAAQ,CAAC8W,iBAAiB,CAAC7W,MAAM,EAAEgB,gBAAgB,CAACF,KAAK,CAAC,CAAE,CAAC;YAC5E;UACJ;QACJ;MACJ;MACAxG,MAAM,CAAC8W,IAAI,6CAAA9O,MAAA,CAA6CtC,MAAM,CAAE,CAAC;IAAC;EACtE;;EAEA;AACJ;EACW+a,iBAAiBA,CAAA,EAAS;IAC7B,IAAI,CAACC,eAAe,GAAG,IAAI;EAC/B;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,qBAAqBA,CACxBC,YAGC,EACG;IACJA,YAAY,CAACrV,EAAE,CAACrJ,eAAe,CAAC2e,UAAU,EAAE,IAAI,CAACC,YAAY,CAAC;IAC9DF,YAAY,CAACrV,EAAE,CAACjJ,WAAW,CAACye,aAAa,EAAE,IAAI,CAAC3X,eAAe,CAAC;IAChEwX,YAAY,CAACrV,EAAE,CAACtJ,SAAS,CAAC+e,QAAQ,EAAE,IAAI,CAACC,eAAe,CAAC;IACzDL,YAAY,CAACrV,EAAE,CAAClJ,gBAAgB,CAAC6G,SAAS,EAAE,IAAI,CAAC+X,eAAe,CAAC;EACrE;;EAEA;AACJ;AACA;EACWC,KAAKA,CAAA,EAAS;IACjBlhB,MAAM,CAACsK,IAAI,CAAC,2CAA2C,CAAC;EAC5D;;EAEA;EACO6W,IAAIA,CAAA,EAAS;IAChB,IAAI,CAACpV,6BAA6B,CAACoV,IAAI,CAAC,CAAC;IACzC,IAAI,CAAC9a,UAAU,CAAC8a,IAAI,CAAC,CAAC;IACtB,IAAI,CAACjV,kBAAkB,CAACiV,IAAI,CAAC,CAAC;IAC9B,IAAI,CAAC1W,aAAa,CAAC0W,IAAI,CAAC,CAAC;EAC7B;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWC,mBAAmBA,CAAA,EAAkB;IACxC,OAAO,IAAI,CAAC9V,SAAS,CAAC2B,gBAAgB;EAC1C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWoU,sBAAsBA,CAAA,EAAkB;IAC3C,OAAO,IAAI,CAAC/V,SAAS,CAAC4B,mBAAmB;EAC7C;;EAEA;AACJ;AACA;EACiBoU,gBAAgBA,CAAA,EAA2B;IAAA,IAAAC,OAAA;IAAA,OAAApb,iBAAA;MACpD,IAAI,CAACob,OAAI,CAACjW,SAAS,CAAC4B,mBAAmB,EAAE;QACrC,MAAM,IAAI7B,KAAK,CAAC,gCAAgC,CAAC;MACrD;MACA,IAAI,CAACkW,OAAI,CAACjW,SAAS,CAAC2B,gBAAgB,EAAE;QAClC,MAAM,IAAI5B,KAAK,CAAC,6BAA6B,CAAC;MAClD;MACA,OAAO;QACHmW,OAAO,EAAED,OAAI,CAACjW,SAAS,CAAC2B,gBAAgB;QACxCwU,UAAU,EAAEF,OAAI,CAACjW,SAAS,CAAC4B;MAC/B,CAAC;IAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWwU,mCAAmCA,CAACC,KAAc,EAAQ;IAC7D,IAAI,CAACC,gCAAgC,GAAGD,KAAK;EACjD;;EAEA;AACJ;AACA;AACA;AACA;EACWE,mCAAmCA,CAAA,EAAY;IAClD,OAAO,IAAI,CAACD,gCAAgC;EAChD;;EAEA;AACJ;AACA;AACA;EACWE,gBAAgBA,CAAA,EAAiC;IACpD,IAAM9U,UAAU,GAAG;MACf3M,UAAU,EAAE,IAAI,CAACsL,mBAAmB;MACpCoW,SAAS,EAAE,IAAI,CAACpc,QAAQ;MACxBqF,IAAI,EAAE,IAAI,CAACgC,UAAU;MACrBgV,OAAO,EAAE,IAAI,CAACtc;IAClB,CAAC;IAED,OAAO,IAAI,CAACsN,UAAU,CAAChG,UAAU,CAAC,CAAC2O,IAAI,CAAC,MAAM;MAC1C,OAAO,IAAI,CAAClW,QAAQ,CAACwc,iBAAiB,CAAC;QACnCC,WAAW,EAAElV;MACjB,CAAC,CAAC;IACN,CAAC,CAAC;EACN;EAEOmV,mBAAmBA,CAAA,EAAY;IAClC,OAAO,CAAC,CAAC,IAAI,CAACC,gBAAgB;EAClC;;EAEA;EACQC,sBAAsBA,CAAA,EAAS;IAAA,IAAAC,OAAA;IACnC;IACA,IAAMC,YAAY,GAAG,IAAI,GAAG,EAAE,CAAC,CAAC;;IAEhC;IACA;IACA;IACA;IACA,IAAMC,eAAe,GAAG,CAAC;IAEzB,IAAI,IAAI,CAACC,yBAAyB,EAAE;MAChC;IACJ;IAEA,IAAMC,GAAG,GAAGC,IAAI,CAACD,GAAG,CAAC,CAAC;IACtB,IAAI,IAAI,CAACE,mBAAmB,KAAK,IAAI,IAAIF,GAAG,GAAG,IAAI,CAACE,mBAAmB,GAAGL,YAAY,EAAE;MACpF;MACA;IACJ;IAEA,IAAI,CAACK,mBAAmB,GAAGF,GAAG;;IAE9B;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;;IAEA;IACA,IAAMG,cAAc,GAAG,IAAI,CAACvX,SAAS,CAACwX,sBAAsB,CAAC,CAAC;IAC9D;IACA;IACA;IACA;IACA;IACA;IACA,IAAMC,QAAQ,GAAGC,IAAI,CAACC,KAAK,CAACJ,cAAc,GAAG,CAAC,CAAC;IAE/C,IAAMK,UAAU;MAAA,IAAAC,MAAA,GAAAhd,iBAAA,CAAG,WAAOid,QAAgB,EAAoB;QAC1D,OAAOL,QAAQ,GAAGK,QAAQ,IAAId,OAAI,CAACH,mBAAmB,CAAC,CAAC,EAAE;UACtD;UACA,IAAIY,QAAQ,GAAGK,QAAQ,EAAE;YACrBpjB,MAAM,CAAC8W,IAAI,CAAC,wBAAwB,CAAC;YACrC,IAAMuM,YAAY,GAAGL,IAAI,CAACM,GAAG,CAACP,QAAQ,GAAGK,QAAQ,EAAEZ,eAAe,CAAC;YACnE,MAAMF,OAAI,CAAChX,SAAS,CAACiY,mBAAmB,CAACF,YAAY,CAAC;UAC1D;UAEA,IAAIf,OAAI,CAACH,mBAAmB,CAAC,CAAC,EAAE;YAC5B,IAAMqB,YAAY,SAASlB,OAAI,CAAChX,SAAS,CAACmY,cAAc,CAAC,CAAC;YAC1D;YACA;YACA;YACA,IAAI,CAACD,YAAY,CAAC/B,UAAU,IAAIlX,MAAM,CAACS,IAAI,CAACwY,YAAY,CAAC/B,UAAU,CAAC,CAAChY,MAAM,IAAI,CAAC,EAAE;cAC9EzJ,MAAM,CAAC8W,IAAI,CAAC,yBAAyB,CAAC;cACtC,IAAIwL,OAAI,CAACoB,eAAe,EAAE;gBACtB;gBACA;gBACA;gBACA;gBACAC,YAAY,CAACrB,OAAI,CAACoB,eAAe,CAAC;gBAClC,OAAOpB,OAAI,CAACoB,eAAe;cAC/B;cACA,MAAMpB,OAAI,CAAChX,SAAS,CAACsY,mBAAmB,CAAC,CAAC;YAC9C;UACJ;UAEA5jB,MAAM,CAAC8W,IAAI,CAAC,2BAA2B,CAAC;UACxC,IAAM+M,GAAG,SAASvB,OAAI,CAACwB,iBAAiB,CAAC,CAAC;UAC1C,IAAID,GAAG,CAACE,mBAAmB,IAAIF,GAAG,CAACE,mBAAmB,CAACC,iBAAiB,EAAE;YACtE;YACA;YACAZ,QAAQ,GAAGS,GAAG,CAACE,mBAAmB,CAACC,iBAAiB;UACxD,CAAC,MAAM;YACH,MAAM,IAAI3Y,KAAK,CACX,+CAA+C,GAAG,uCACtD,CAAC;UACL;QACJ;MACJ,CAAC;MAAA,gBAxCK6X,UAAUA,CAAAe,GAAA;QAAA,OAAAd,MAAA,CAAA5b,KAAA,OAAAC,SAAA;MAAA;IAAA,GAwCf;IAED,IAAI,CAACib,yBAAyB,GAAG,IAAI;IACrC9I,OAAO,CAACC,OAAO,CAAC,CAAC,CACZ+B,IAAI,CAAC,MAAM;MACR,IAAI,IAAI,CAACuI,eAAe,KAAKxa,SAAS,EAAE;QACpC;QACA;QACA,OAAOiQ,OAAO,CAACC,OAAO,CAAC,IAAI,CAACsK,eAAe,CAAC;MAChD;MACA;MACA,OAAO,IAAI,CAACze,QAAQ,CAACwc,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAACtG,IAAI,CAAEkI,GAAG,IAAK;QACrD,OAAOA,GAAG,CAACE,mBAAmB,CAACC,iBAAiB,IAAI,CAAC;MACzD,CAAC,CAAC;IACN,CAAC,CAAC,CACDrI,IAAI,CAAEyH,QAAQ,IAAK;MAChB;MACA;MACA;MACA;MACA,OAAOF,UAAU,CAACE,QAAQ,CAAC;IAC/B,CAAC,CAAC,CACDrH,KAAK,CAAElU,CAAC,IAAK;MACV7H,MAAM,CAAC8H,KAAK,CAAC,+BAA+B,EAAED,CAAC,CAACsc,KAAK,IAAItc,CAAC,CAAC;IAC/D,CAAC,CAAC,CACDuc,OAAO,CAAC,MAAM;MACX;MACA;MACA,IAAI,CAACF,eAAe,GAAGxa,SAAS;MAChC,IAAI,CAAC+Y,yBAAyB,GAAG,KAAK;IAC1C,CAAC,CAAC;EACV;;EAEA;EACcqB,iBAAiBA,CAAA,EAAiC;IAAA,IAAAO,OAAA;IAAA,OAAAle,iBAAA;MAC5D,IAAMme,QAA4B,GAAG,EAAE;MAEvC,IAAIC,YAAqD;MACzD,IAAIF,OAAI,CAAClC,mBAAmB,CAAC,CAAC,EAAE;QAC5BoC,YAAY,GAAG,CAAC,CAAC;QACjB,IAAMf,YAAY,SAASa,OAAI,CAAC/Y,SAAS,CAACmY,cAAc,CAAC,CAAC;QAC1D,KAAK,IAAM,CAACvO,KAAK,EAAExF,GAAG,CAAC,IAAInF,MAAM,CAACC,OAAO,CAACgZ,YAAY,CAAC/B,UAAU,CAAC,EAAE;UAChE,IAAMvI,CAAC,GAAG;YAAExJ,GAAG;YAAE8U,QAAQ,EAAE;UAAK,CAAC;UACjCD,YAAY,CAAC,oBAAoB,GAAGrP,KAAK,CAAC,GAAGgE,CAAC;UAC9CoL,QAAQ,CAAClH,IAAI,CAACiH,OAAI,CAACrR,UAAU,CAACkG,CAAC,CAAC,CAAC;QACrC;QACAmL,OAAI,CAACjC,gBAAgB,GAAG,KAAK;MACjC;MAEA,IAAMqC,WAAW,SAASJ,OAAI,CAAC/Y,SAAS,CAACoZ,cAAc,CAAC,CAAC;MACzD,IAAMC,WAA4C,GAAG,CAAC,CAAC;MAEvD,KAAK,IAAMzP,MAAK,IAAIuP,WAAW,CAAChD,UAAU,EAAE;QACxC,IAAIgD,WAAW,CAAChD,UAAU,CAACmD,cAAc,CAAC1P,MAAK,CAAC,EAAE;UAC9C,IAAMgE,EAAC,GAAG;YACNxJ,GAAG,EAAE+U,WAAW,CAAChD,UAAU,CAACvM,MAAK;UACrC,CAAC;UACDyP,WAAW,CAAC,oBAAoB,GAAGzP,MAAK,CAAC,GAAGgE,EAAC;UAC7CoL,QAAQ,CAAClH,IAAI,CAACiH,OAAI,CAACrR,UAAU,CAACkG,EAAC,CAAC,CAAC;QACrC;MACJ;MAEA,MAAMS,OAAO,CAACkL,GAAG,CAACP,QAAQ,CAAC;MAE3B,IAAMQ,WAAgC,GAAG;QACrCC,aAAa,EAAEJ;MACnB,CAAC;MAED,IAAIJ,YAAY,EAAE;QACdO,WAAW,CAAC,kCAAkC,CAAC,GAAGP,YAAY;QAC9DO,WAAW,CAAC,eAAe,CAAC,GAAGP,YAAY;MAC/C;MAEA,IAAMV,GAAG,SAASQ,OAAI,CAAC5e,QAAQ,CAACwc,iBAAiB,CAAC6C,WAAW,CAAC;MAE9D,IAAIP,YAAY,EAAE;QACdF,OAAI,CAACX,eAAe,GAAGsB,UAAU,CAC7B,MAAM;UACF,OAAOX,OAAI,CAACX,eAAe;UAC3BW,OAAI,CAAC/Y,SAAS,CAAC2Z,oBAAoB,CAAC,CAAC;QACzC,CAAC,EACD,EAAE,GAAG,EAAE,GAAG,IACd,CAAC;MACL;MAEA,MAAMZ,OAAI,CAAC/Y,SAAS,CAAC4Z,mBAAmB,CAAC,CAAC;MAC1C,OAAOrB,GAAG;IAAC;EACf;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWrT,YAAYA,CAAC2U,OAAiB,EAAEC,aAAuB,EAA0B;IACpF,OAAO,IAAI,CAAC/e,UAAU,CAACmK,YAAY,CAAC2U,OAAO,EAAE,CAAC,CAACC,aAAa,CAAC;EACjE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWC,uBAAuBA,CAAC3f,MAAc,EAA4B;IACrE,OAAO,IAAI,CAACW,UAAU,CAACgf,uBAAuB,CAAC3f,MAAM,CAAC;EAC1D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiB4f,iBAAiBA,CAACH,OAAiB,EAAgD;IAAA,IAAAI,WAAA,GAAA/d,SAAA;MAAAge,OAAA;IAAA,OAAArf,iBAAA;MAAA,IAA9Csf,gBAAgB,GAAAF,WAAA,CAAA9b,MAAA,QAAA8b,WAAA,QAAA7b,SAAA,GAAA6b,WAAA,MAAG,KAAK;MACtE,IAAMG,iBAAiB,GAAG,IAAIzf,GAAG,CAA8B,CAAC;MAChE;MACA,IAAM0f,sBAAgC,GAAG,EAAE;MAAC,IAAAC,KAAA,aAAAA,MAAAC,QAAA,EAEd;QAC1B,IAAMC,WAAW,SAASN,OAAI,CAACH,uBAAuB,CAAC3f,QAAM,CAAC;QAC9D;QACA;QACA,IAAIogB,WAAW,EAAE;UACb,IAAMC,SAAS,GAAG,IAAI9f,GAAG;UACrB;UACA6f,WAAW,CAAChJ,GAAG,CAAEzP,UAAU,IAAK,CAACA,UAAU,CAAC1H,QAAQ,EAAEnC,kBAAkB,CAAC6J,UAAU,EAAE3H,QAAM,CAAC,CAAC,CACjG,CAAC;UACDggB,iBAAiB,CAACrb,GAAG,CAAC3E,QAAM,EAAEqgB,SAAS,CAAC;QAC5C,CAAC,MAAM;UACHJ,sBAAsB,CAACvI,IAAI,CAAC1X,QAAM,CAAC;QACvC;MACJ,CAAC;MAbD,KAAK,IAAMA,QAAM,IAAIyf,OAAO;QAAA,OAAAS,KAAA,CAAAC,QAAA;MAAA;;MAe5B;MACA,IAAIJ,gBAAgB,IAAIE,sBAAsB,CAAClc,MAAM,GAAG,CAAC,EAAE;QACvD,IAAMuc,gBAAgB,SAASR,OAAI,CAAChV,YAAY,CAACmV,sBAAsB,CAAC;QAExEK,gBAAgB,CAACC,OAAO,CAAC,CAACC,aAAa,EAAExgB,MAAM,KAAK;UAChD,IAAMqgB,SAAS,GAAG,IAAI9f,GAAG,CAAiB,CAAC;UAC3C;UACAigB,aAAa,CAACD,OAAO,CAAC,CAAC5Y,UAAU,EAAE1H,QAAQ,KACvCogB,SAAS,CAAC1b,GAAG,CAAC1E,QAAQ,EAAEnC,kBAAkB,CAAC6J,UAAU,EAAE3H,MAAM,CAAC,CAClE,CAAC;;UAED;UACAggB,iBAAiB,CAACrb,GAAG,CAAC3E,MAAM,EAAEqgB,SAAS,CAAC;QAC5C,CAAC,CAAC;MACN;MAEA,OAAOL,iBAAiB;IAAC;EAC7B;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACWzW,eAAeA,CAACvJ,MAAc,EAAEC,QAAgB,EAA0B;IAC7E,OAAO,IAAI,CAACU,UAAU,CAAC4I,eAAe,CAACvJ,MAAM,EAAEC,QAAQ,CAAC;EAC5D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWwgB,cAAcA,CAACC,KAAa,EAAoB;IACnD,OAAO,IAAI,CAAC/f,UAAU,CAACqH,WAAW,CAAC0Y,KAAK,CAAC;EAC7C;;EAEA;AACJ;AACA;AACA;AACA;EACiB7J,iBAAiBA,CAAC7W,MAAc,EAAEC,QAAgB,EAAkC;IAAA,IAAA0gB,WAAA,GAAA7e,SAAA;MAAA8e,OAAA;IAAA,OAAAngB,iBAAA;MAAA,IAAhCmH,QAAQ,GAAA+Y,WAAA,CAAA5c,MAAA,QAAA4c,WAAA,QAAA3c,SAAA,GAAA2c,WAAA,MAAG,IAAI;MAC5E,MAAMC,OAAI,CAACC,qBAAqB,CAAC7gB,MAAM,EAAEC,QAAQ,EAAE2H,QAAQ,CAAC;IAAC;EACjE;;EAEA;AACJ;AACA;AACA;AACA;EACiBkZ,eAAeA,CAAC7gB,QAAgB,EAAiB;IAAA,IAAA8gB,OAAA;IAAA,OAAAtgB,iBAAA;MAC1D,MAAMsgB,OAAI,CAAClK,iBAAiB,CAACkK,OAAI,CAAC/gB,MAAM,EAAEC,QAAQ,EAAE,IAAI,CAAC;IAAC;EAC9D;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiB4gB,qBAAqBA,CAC9B7gB,MAAc,EACdC,QAAgB,EAKwD;IAAA,IAAA+gB,WAAA,GAAAlf,SAAA;MAAAmf,OAAA;IAAA,OAAAxgB,iBAAA;MAAA,IAJxEmH,QAAwB,GAAAoZ,WAAA,CAAAjd,MAAA,QAAAid,WAAA,QAAAhd,SAAA,GAAAgd,WAAA,MAAG,IAAI;MAAA,IAC/BE,OAAuB,GAAAF,WAAA,CAAAjd,MAAA,QAAAid,WAAA,QAAAhd,SAAA,GAAAgd,WAAA,MAAG,IAAI;MAAA,IAC9BlZ,KAAqB,GAAAkZ,WAAA,CAAAjd,MAAA,QAAAid,WAAA,QAAAhd,SAAA,GAAAgd,WAAA,MAAG,IAAI;MAAA,IAC5B1b,IAA6B,GAAA0b,WAAA,CAAAjd,MAAA,OAAAid,WAAA,MAAAhd,SAAA;MAE7B;MACA;MACA;MACA,IAAMmd,GAAG,GAAGF,OAAI,CAACtgB,UAAU,CAACC,4BAA4B,CAACZ,MAAM,CAAC;MAChE,IAAI,CAAAmhB,GAAG,aAAHA,GAAG,uBAAHA,GAAG,CAAErgB,KAAK,CAAC,CAAC,MAAKb,QAAQ,EAAE;QAC3B,IAAIihB,OAAO,KAAK,IAAI,IAAIpZ,KAAK,KAAK,IAAI,EAAE;UACpC,MAAM,IAAInC,KAAK,CAAC,qDAAqD,CAAC;QAC1E;QACA,IAAI,CAACiC,QAAQ,EAAE;UACX,MAAM,IAAIjC,KAAK,CAAC,8CAA8C,CAAC;QACnE;QACA,IAAMyb,QAAQ,GAAG9b,IAAI,GAAGT,MAAM,CAACwc,MAAM,CAAC/b,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG,IAAI;QACrD,IAAIA,IAAI,KAAKT,MAAM,CAACwc,MAAM,CAAC/b,IAAI,CAAC,CAACvB,MAAM,KAAK,CAAC,IAAIqd,QAAQ,KAAKD,GAAG,CAACrgB,KAAK,CAAC,CAAC,CAAC,EAAE;UACxE,MAAM,IAAI6E,KAAK,+CAAArD,MAAA,CAA+C6e,GAAG,CAACrgB,KAAK,CAAC,CAAC,YAAAwB,MAAA,CAAS8e,QAAQ,CAAE,CAAC;QACjG;QAEA,IAAI,CAACH,OAAI,CAACjgB,gBAAgB,CAACF,KAAK,CAAC,CAAC,IAAId,MAAM,KAAKihB,OAAI,CAACjgB,gBAAgB,CAAChB,MAAM,EAAE;UAC3EihB,OAAI,CAAC9f,oBAAoB,CAACggB,GAAG,CAAC7b,IAAI,CAAC;UACnC;UACA2b,OAAI,CAAC7f,IAAI,CAACxD,WAAW,CAACsB,sBAAsB,EAAE+hB,OAAI,CAACjhB,MAAM,EAAEihB,OAAI,CAAC5f,cAAc,CAACrB,MAAM,CAAC,CAAC;QAC3F;;QAEA;QACA,IAAIA,MAAM,KAAKihB,OAAI,CAACjhB,MAAM,EAAE;UACxB1F,MAAM,CAAC8W,IAAI,CAAC,aAAa,GAAG+P,GAAG,CAACrgB,KAAK,CAAC,CAAC,GAAG,OAAO,GAAGd,MAAM,GAAG,8BAA8B,CAAC;UAC5F,IAAMyN,MAAM,SAASwT,OAAI,CAACjgB,gBAAgB,CAACsgB,QAAQ,CAACH,GAAG,CAAC;UACxD,IAAI1T,MAAM,EAAE;YACR,IAAMoI,OAAM;cAAA,IAAA0L,MAAA,GAAA9gB,iBAAA,CAAG,WAAA+gB,MAAA,EAAiD;gBAAA,IAA1C;kBAAEzL,UAAU,GAAG;gBAAM,CAAC,GAAAyL,MAAA;gBACxClnB,MAAM,CAAC8W,IAAI,CAAC,0BAA0B,GAAGpR,MAAM,GAAG,KAAK,CAAC;gBACxD,IAAMkW,QAAQ,SAAS+K,OAAI,CAAClhB,QAAQ,CAACiW,mBAAmB,CAAC;kBACrD,CAAChW,MAAM,GAAG;oBACN,CAACC,QAAQ,GAAGwN;kBAChB;gBACJ,CAAC,CAAC;gBACF,IAAM;kBAAE0I;gBAAS,CAAC,GAAGD,QAAQ,IAAI,CAAC,CAAC;gBACnC,IAAIrR,MAAM,CAACS,IAAI,CAAC6Q,QAAQ,IAAI,EAAE,CAAC,CAACpS,MAAM,GAAG,CAAC,EAAE;kBACxC,IAAIgS,UAAU,EAAE;oBACZkL,OAAI,CAAClhB,QAAQ,CAACqB,IAAI,CACdxD,WAAW,CAACwY,yBAAyB,EACrCD,QAAQ,EACR,uBAAuB,EACvBN,OACJ,CAAC;kBACL;kBACA;AAC5B;kBAC4B,MAAM,IAAI3Z,uBAAuB,CAAC,mBAAmB,EAAE;oBAAEia;kBAAS,CAAC,CAAC;gBACxE;cACJ,CAAC;cAAA,gBArBKN,MAAMA,CAAA4L,GAAA;gBAAA,OAAAF,MAAA,CAAA1f,KAAA,OAAAC,SAAA;cAAA;YAAA,GAqBX;YACD,MAAM+T,OAAM,CAAC;cAAEE,UAAU,EAAE;YAAK,CAAC,CAAC;;YAElC;YACA;UACJ;UACA,OAAOtI,MAAM;QACjB,CAAC,MAAM;UACH,OAAO0T,GAAG;QACd;MACJ;MAEA,IAAMjY,OAAO,GAAG+X,OAAI,CAACtgB,UAAU,CAAC+G,0BAA0B,CAAC1H,MAAM,CAAC;MAClE,IAAI,CAACkJ,OAAO,IAAI,CAACA,OAAO,CAACjJ,QAAQ,CAAC,EAAE;QAChC,MAAM,IAAI0F,KAAK,CAAC,iBAAiB,GAAG3F,MAAM,GAAG,GAAG,GAAGC,QAAQ,CAAC;MAChE;MAEA,IAAMyhB,GAAG,GAAGxY,OAAO,CAACjJ,QAAQ,CAAC;MAC7B,IAAI0hB,kBAAkB,GAAGD,GAAG,CAAC9Z,QAAQ;MAErC,IAAIA,QAAQ,EAAE;QACV,IAAItC,IAAI,EAAE;UACN,KAAK,IAAM,CAACkK,KAAK,EAAExF,GAAG,CAAC,IAAInF,MAAM,CAACC,OAAO,CAACQ,IAAI,CAAC,EAAE;YAC7C,IAAIoc,GAAG,CAACpc,IAAI,CAACkK,KAAK,CAAC,KAAKxF,GAAG,EAAE;cACzB,MAAM,IAAIrE,KAAK,+CAAArD,MAAA,CAA+C0H,GAAG,YAAA1H,MAAA,CAASof,GAAG,CAACpc,IAAI,CAACkK,KAAK,CAAC,CAAE,CAAC;YAChG;UACJ;QACJ;QACAmS,kBAAkB,GAAGpjB,kBAAkB,CAACsJ,QAAQ;MACpD,CAAC,MAAM,IAAID,QAAQ,KAAK,IAAI,IAAI+Z,kBAAkB,IAAIpjB,kBAAkB,CAACsJ,QAAQ,EAAE;QAC/E8Z,kBAAkB,GAAGpjB,kBAAkB,CAACqjB,UAAU;MACtD;MAEA,IAAIV,OAAO,EAAE;QACTS,kBAAkB,GAAGpjB,kBAAkB,CAACsjB,OAAO;MACnD,CAAC,MAAM,IAAIX,OAAO,KAAK,IAAI,IAAIS,kBAAkB,IAAIpjB,kBAAkB,CAACsjB,OAAO,EAAE;QAC7EF,kBAAkB,GAAGpjB,kBAAkB,CAACqjB,UAAU;MACtD;MAEA,IAAIE,WAAW,GAAGJ,GAAG,CAAC5Z,KAAK;MAC3B,IAAIA,KAAK,KAAK,IAAI,EAAE;QAChBga,WAAW,GAAGha,KAAK;MACvB;MAEA,IAAI4Z,GAAG,CAAC9Z,QAAQ,KAAK+Z,kBAAkB,IAAID,GAAG,CAAC5Z,KAAK,KAAKga,WAAW,EAAE;QAClEJ,GAAG,CAAC9Z,QAAQ,GAAG+Z,kBAAkB;QACjCD,GAAG,CAAC5Z,KAAK,GAAGga,WAAW;QACvBb,OAAI,CAACtgB,UAAU,CAACoH,mBAAmB,CAAC/H,MAAM,EAAEkJ,OAAO,CAAC;QACpD+X,OAAI,CAACtgB,UAAU,CAACqH,WAAW,CAAC,CAAC;MACjC;;MAEA;MACA,IAAIJ,QAAQ,IAAI5H,MAAM,KAAKihB,OAAI,CAACjhB,MAAM,EAAE;QACpC1F,MAAM,CAAC8W,IAAI,CAAC,aAAa,GAAGnR,QAAQ,GAAG,2BAA2B,CAAC;;QAEnE;QACA,IAAIwN,OAA8B;QAClC,IAAMtE,WAAW,GAAG8X,OAAI,CAAC7X,gBAAgB,CAACpJ,MAAM,EAAEC,QAAQ,CAAC;QAC3D,IAAIkJ,WAAW,CAAC1H,sBAAsB,CAAC,CAAC,EAAE;UACtCnH,MAAM,CAAC+H,GAAG,eAAAC,MAAA,CAAerC,QAAQ,oCAAiC,CAAC;QACvE,CAAC,MAAM;UACHwN,OAAM,SAAUwT,OAAI,CAACjgB,gBAAgB,CAAC2M,UAAU,CAAC3N,MAAM,EAAEtF,UAAU,CAACic,WAAW,CAAC+K,GAAG,EAAEzhB,QAAQ,CAAC,CAAG;QACrG;QAEA,IAAIwN,OAAM,EAAE;UACR,IAAMoI,QAAM;YAAA,IAAAkM,MAAA,GAAAthB,iBAAA,CAAG,WAAAuhB,MAAA,EAAiD;cAAA,IAA1C;gBAAEjM,UAAU,GAAG;cAAM,CAAC,GAAAiM,MAAA;cACxC1nB,MAAM,CAAC8W,IAAI,CAAC,0BAA0B,GAAGnR,QAAQ,CAAC;cAClD,IAAMiW,QAAQ,SAAS+K,OAAI,CAAClhB,QAAQ,CAACiW,mBAAmB,CAAC;gBACrD,CAAChW,MAAM,GAAG;kBACN,CAACC,QAAQ,GAAGwN;gBAChB;cACJ,CAAC,CAAC;cACF,IAAM;gBAAE0I;cAAS,CAAC,GAAGD,QAAQ,IAAI,CAAC,CAAC;cACnC,IAAIrR,MAAM,CAACS,IAAI,CAAC6Q,QAAQ,IAAI,EAAE,CAAC,CAACpS,MAAM,GAAG,CAAC,EAAE;gBACxC,IAAIgS,UAAU,EAAE;kBACZkL,OAAI,CAAClhB,QAAQ,CAACqB,IAAI,CACdxD,WAAW,CAACwY,yBAAyB,EACrCD,QAAQ,EACR,uBAAuB,EACvBN,QAAM,CAAE;kBACZ,CAAC;gBACL;gBACA,MAAM,IAAI3Z,uBAAuB,CAAC,mBAAmB,EAAE;kBAAEia;gBAAS,CAAC,CAAC;cACxE;YACJ,CAAC;YAAA,gBAnBKN,MAAMA,CAAAoM,GAAA;cAAA,OAAAF,MAAA,CAAAlgB,KAAA,OAAAC,SAAA;YAAA;UAAA,GAmBX;UACD,MAAM+T,QAAM,CAAC;YAAEE,UAAU,EAAE;UAAK,CAAC,CAAC;UAClC;QACJ;MACJ;MAEA,IAAMzM,SAAS,GAAG5O,UAAU,CAACic,WAAW,CAAC+K,GAAG,EAAEzhB,QAAQ,CAAC;MACvDghB,OAAI,CAAC7f,IAAI,CAACxD,WAAW,CAAC4L,yBAAyB,EAAExJ,MAAM,EAAEC,QAAQ,EAAEqJ,SAAS,CAAC;MAC7E,OAAOA,SAAS;IAAC;EACrB;EAEO4Y,mCAAmCA,CAACC,MAAc,EAAEniB,MAAe,EAAmC;IACzG,OAAO,IAAI,CAACsE,0BAA0B,CAAC8d,qBAAqB,CAACD,MAAM,EAAEniB,MAAM,CAAC;EAChF;EAEOqiB,yCAAyCA,CAACriB,MAAc,EAAyB;IACpF,OAAO,IAAI,CAACsG,4BAA4B,CAACgc,qBAAqB,CAACtiB,MAAM,CAAC;EAC1E;EAEOuiB,qBAAqBA,CAACviB,MAAc,EAAEmiB,MAAc,EAAgC;IACvF,IAAMK,eAAe,GAAG,IAAI,CAACle,0BAA0B,CAAC8d,qBAAqB,CAACD,MAAM,CAAC;IACrF,IAAIK,eAAe,EAAE;MACjB,OAAOvO,OAAO,CAACC,OAAO,CAACsO,eAAe,CAAC;IAC3C;IACA,IAAMre,OAAO,GAAG,IAAItI,aAAa,CAAC,IAAI,CAACkE,QAAQ,EAAEoiB,MAAM,EAAEniB,MAAM,CAAC;IAChE,OAAO,IAAI,CAACyiB,8BAA8B,CAACziB,MAAM,EAAEmE,OAAO,EAAE,IAAI,CAACG,0BAA0B,CAAC;EAChG;;EAEA;EACOoe,mBAAmBA,CAAC1iB,MAAc,EAAEkJ,OAAkB,EAAgC;IACzF,IAAI,CAACA,OAAO,EAAE;MACVA,OAAO,GAAGrE,MAAM,CAACS,IAAI,CAAC,IAAI,CAAC3E,UAAU,CAAC+G,0BAA0B,CAAC1H,MAAM,CAAC,CAAC;IAC7E;IACA,IAAMwiB,eAAe,GAAG,IAAI,CAAClc,4BAA4B,CAAC8b,qBAAqB,CAACpiB,MAAM,EAAEkJ,OAAO,CAAC;IAChG,IAAIsZ,eAAe,EAAE;MACjB,OAAOvO,OAAO,CAACC,OAAO,CAACsO,eAAe,CAAC;IAC3C;IACA,IAAMre,OAAO,GAAG,IAAIpI,eAAe,CAAC,IAAI,CAACgE,QAAQ,EAAEC,MAAM,EAAEkJ,OAAO,EAAEnN,eAAe,CAAC4mB,iBAAiB,CAAC,CAAC,CAAC;IACxG,OAAO,IAAI,CAACF,8BAA8B,CAACziB,MAAM,EAAEmE,OAAO,EAAE,IAAI,CAACmC,4BAA4B,CAAC;EAClG;EAEOsc,0BAA0BA,CAAA,EAAiC;IAC9D,OAAO,IAAI,CAACF,mBAAmB,CAAC,IAAI,CAAC1iB,MAAM,CAAC;EAChD;EAEO6iB,yBAAyBA,CAAC7iB,MAAc,EAAEC,QAAgB,EAAgC;IAC7F,OAAO,IAAI,CAACyiB,mBAAmB,CAAC1iB,MAAM,EAAE,CAACC,QAAQ,CAAC,CAAC;EACvD;EAEcwiB,8BAA8BA,CACxCziB,MAAc,EACdmE,OAA6B,EAC7B2e,WAAyB,EACG;IAAA,IAAAC,OAAA;IAAA,OAAAtiB,iBAAA;MAC5B,IAAI2S,OAAO,GAAG,IAAIxX,mBAAmB,CAACuI,OAAO,EAAE4e,OAAI,CAACrkB,mBAAmB,EAAEqkB,OAAI,CAAChjB,QAAQ,CAAC;MACvF;MACA,IAAIoE,OAAO,CAAC6e,aAAa,EAAE;QACvBF,WAAW,CAACG,mBAAmB,CAAC9e,OAAO,EAAEiP,OAAO,CAAC;MACrD;MACA,MAAMA,OAAO,CAAC8P,WAAW,CAAC,CAAC;MAC3B;MACA,IAAMC,aAAa,GAAGL,WAAW,CAACM,mBAAmB,CAACjf,OAAO,CAAC;MAC9D,IAAIgf,aAAa,EAAE;QACf/P,OAAO,GAAG+P,aAAa;MAC3B,CAAC,MAAM;QACH7oB,MAAM,CAAC+H,GAAG,CACN,8DAAAC,MAAA,CAA8D6B,OAAO,CAAC6e,aAAa,OAAA1gB,MAAA,CAAI6B,OAAO,CAACge,MAAM,CACzG,CAAC;QACDW,WAAW,CAACG,mBAAmB,CAAC9e,OAAO,EAAEiP,OAAO,CAAC;MACrD;MACA,OAAOA,OAAO;IAAC;EACnB;EAEOiQ,oBAAoBA,CACvB3e,MAAc,EACd1E,MAAc,EACdC,QAAgB,EAEU;IAAA,IAD1B+iB,aAA4B,GAAAlhB,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,IAAI;IAEnC,IAAIsR,OAA4B;IAChC,IAAI4P,aAAa,EAAE;MACf5P,OAAO,GAAG,IAAI,CAAC9M,4BAA4B,CAACgd,0BAA0B,CAACtjB,MAAM,EAAEgjB,aAAa,CAAC;MAC7F,IAAI,CAAC5P,OAAO,EAAE;QACV,MAAM,IAAIzN,KAAK,CAAC,6BAAArD,MAAA,CAA6BtC,MAAM,+BAAAsC,MAAA,CAA4B0gB,aAAa,CAAE,CAAC;MACnG;IACJ,CAAC,MAAM;MACHA,aAAa,GAAGjnB,eAAe,CAAC4mB,iBAAiB,CAAC,CAAC;MACnD,IAAMxe,QAAO,GAAG,IAAIpI,eAAe,CAAC,IAAI,CAACgE,QAAQ,EAAEC,MAAM,EAAE,CAACC,QAAQ,CAAC,EAAE+iB,aAAa,EAAE/iB,QAAQ,CAAC;MAC/FmT,OAAO,GAAG,IAAIxX,mBAAmB,CAACuI,QAAO,EAAE,IAAI,CAACzF,mBAAmB,EAAE,IAAI,CAACqB,QAAQ,CAAC;MACnF,IAAI,CAACuG,4BAA4B,CAACid,0BAA0B,CAACvjB,MAAM,EAAEgjB,aAAa,EAAE5P,OAAO,CAAC;IAChG;IACA,OAAOA,OAAO,CAACiQ,oBAAoB,CAAC3e,MAAM,EAAE;MAAE1E,MAAM;MAAEC;IAAS,CAAC,CAAC;EACrE;EAEaujB,wBAAwBA,CACjCxjB,MAAc,EACdC,QAAgB,EAChByE,MAA0B,EACE;IAAA,IAAA+e,OAAA;IAAA,OAAAhjB,iBAAA;MAC5B,IAAMuiB,aAAa,GAAGjnB,eAAe,CAAC4mB,iBAAiB,CAAC,CAAC;MACzD,IAAMxe,OAAO,GAAG,IAAIpI,eAAe,CAAC0nB,OAAI,CAAC1jB,QAAQ,EAAEC,MAAM,EAAE,CAACC,QAAQ,CAAC,EAAE+iB,aAAa,EAAE/iB,QAAQ,CAAC;MAC/F,IAAMmT,OAAO,GAAG,IAAIxX,mBAAmB,CAACuI,OAAO,EAAEsf,OAAI,CAAC/kB,mBAAmB,EAAE+kB,OAAI,CAAC1jB,QAAQ,CAAC;MACzF0jB,OAAI,CAACnd,4BAA4B,CAACid,0BAA0B,CAACvjB,MAAM,EAAEgjB,aAAa,EAAE5P,OAAO,CAAC;MAC5F,IAAMsQ,QAAQ,GAAGtQ,OAAO,CAACiQ,oBAAoB,CAAC3e,MAAM,EAAE;QAAE1E,MAAM;QAAEC;MAAS,CAAC,CAAC;MAC3E;MACA;MACA;MACA,MAAMgU,OAAO,CAAC0P,IAAI,CAAC,CAACD,QAAQ,CAACE,MAAM,CAAC,CAAC,EAAExQ,OAAO,CAACyQ,OAAO,CAAEC,CAAC,IAAKA,CAAC,CAACC,OAAO,CAAC,CAAC,CAAC;MAC1E,OAAO3Q,OAAO;IAAC;EACnB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiB4Q,qBAAqBA,CAAChkB,MAAc,EAA4C;IAAA,IAAAikB,OAAA;IAAA,OAAAxjB,iBAAA;MACzF,IAAMyI,OAAO,GAAG+a,OAAI,CAACtE,uBAAuB,CAAC3f,MAAM,CAAC,IAAI,EAAE;MAC1D,IAAMkkB,MAA+C,GAAG,CAAC,CAAC;MAC1D,KAAK,IAAMzW,MAAM,IAAIvE,OAAO,EAAE;QAC1B,IAAMib,SAAS,GAAG1W,MAAM,CAAC2W,cAAc,CAAC,CAAC;QACzC,IAAMC,QAAQ,SAASJ,OAAI,CAACre,SAAS,CAAC0e,uBAAuB,CAACH,SAAS,CAAC;QAExED,MAAM,CAACzW,MAAM,CAACxN,QAAQ,CAAC,GAAG;UACtBskB,WAAW,EAAEJ,SAAS;UACtBE,QAAQ,EAAEA;QACd,CAAC;MACL;MACA,OAAOH,MAAM;IAAC;EAClB;;EAEA;AACJ;AACA;AACA;AACA;EACWM,wBAAwBA,CAACziB,KAAkB,EAAqB;IACnE,IAAM0iB,SAAS,GAAG1iB,KAAK,CAAC2iB,YAAY,CAAC,CAAC;IACtC,IAAMra,SAAS,GAAGtI,KAAK,CAAC4iB,cAAc,CAAC,CAAC,CAACta,SAAS;IAElD,IAAI,CAACoa,SAAS,IAAI,CAACpa,SAAS,EAAE;MAC1B,OAAO,IAAI;IACf;IAEA,IAAItI,KAAK,CAAC6iB,oBAAoB,CAAC,CAAC,EAAE;MAC9B;MACA,OAAO,IAAI;IACf;;IAEA;IACA;IACA;;IAEA,IAAMnX,MAAM,GAAG,IAAI,CAAC9M,UAAU,CAACkkB,sBAAsB,CAACxa,SAAS,EAAEoa,SAAS,CAAC;IAE3E,IAAIhX,MAAM,KAAK,IAAI,EAAE;MACjB;MACA,OAAO,IAAI;IACf;;IAEA;IACA;IACA;IACA;IACA;IACA;IACA;;IAEA,IAAMqX,UAAU,GAAG/iB,KAAK,CAACgjB,oBAAoB,CAAC,CAAC;IAC/C,IAAI,CAACD,UAAU,EAAE;MACbxqB,MAAM,CAACsK,IAAI,CAAC,QAAQ,GAAG7C,KAAK,CAACjB,KAAK,CAAC,CAAC,GAAG,0BAA0B,GAAG,8BAA8B,CAAC;MACnG,OAAO,IAAI;IACf;IAEA,IAAIgkB,UAAU,KAAKrX,MAAM,CAACuX,cAAc,CAAC,CAAC,EAAE;MACxC1qB,MAAM,CAACsK,IAAI,CACP,QAAQ,GACJ7C,KAAK,CAACjB,KAAK,CAAC,CAAC,GACb,sBAAsB,GACtBgkB,UAAU,GACV,6BAA6B,GAC7BrX,MAAM,CAACuX,cAAc,CAAC,CAC9B,CAAC;MACD,OAAO,IAAI;IACf;IAEA,OAAOvX,MAAM;EACjB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWwX,sBAAsBA,CAACljB,KAAkB,EAAuB;IAAA,IAAAmjB,mBAAA,EAAAC,qBAAA;IACnE,IAAMpM,GAAiC,GAAG,CAAC,CAAC;IAE5CA,GAAG,CAAC0L,SAAS,IAAAS,mBAAA,GAAGnjB,KAAK,CAAC2iB,YAAY,CAAC,CAAC,cAAAQ,mBAAA,cAAAA,mBAAA,GAAIlhB,SAAS;IACjD+U,GAAG,CAAC1O,SAAS,GAAGtI,KAAK,CAAC4iB,cAAc,CAAC,CAAC,CAACta,SAAS;IAEhD,IAAI,CAAC0O,GAAG,CAAC0L,SAAS,IAAI,CAAC1L,GAAG,CAAC1O,SAAS,EAAE;MAClC0O,GAAG,CAACqM,SAAS,GAAG,KAAK;MACrB,OAAOrM,GAAG;IACd;IACAA,GAAG,CAACqM,SAAS,GAAG,IAAI;IAEpB,IAAIrjB,KAAK,CAAC6iB,oBAAoB,CAAC,CAAC,EAAE;MAC9B;MACA;MACA7L,GAAG,CAACsM,aAAa,GAAG,KAAK;IAC7B,CAAC,MAAM;MACHtM,GAAG,CAACsM,aAAa,GAAG,IAAI;IAC5B;;IAEA;IACA;IACA;;IAEAtM,GAAG,CAACuM,MAAM,IAAAH,qBAAA,GAAG,IAAI,CAACxkB,UAAU,CAACkkB,sBAAsB,CAAC9L,GAAG,CAAC1O,SAAS,EAAE0O,GAAG,CAAC0L,SAAS,CAAC,cAAAU,qBAAA,cAAAA,qBAAA,GAAInhB,SAAS;;IAE9F;IACA;IACA;IACA;IACA;IACA;IACA;;IAEA,IAAM8gB,UAAU,GAAG/iB,KAAK,CAACgjB,oBAAoB,CAAC,CAAC;IAC/C,IAAI,CAACD,UAAU,EAAE;MACbxqB,MAAM,CAACsK,IAAI,CAAC,QAAQ,GAAG7C,KAAK,CAACjB,KAAK,CAAC,CAAC,GAAG,0BAA0B,GAAG,8BAA8B,CAAC;MACnGiY,GAAG,CAACwM,gBAAgB,GAAG,IAAI;IAC/B;IAEA,IAAIxM,GAAG,CAACuM,MAAM,IAAIR,UAAU,KAAK/L,GAAG,CAACuM,MAAM,CAACN,cAAc,CAAC,CAAC,EAAE;MAC1D1qB,MAAM,CAACsK,IAAI,CACP,QAAQ,GACJ7C,KAAK,CAACjB,KAAK,CAAC,CAAC,GACb,sBAAsB,GACtBgkB,UAAU,GACV,4BAA4B,GAC5B/L,GAAG,CAACuM,MAAM,CAACN,cAAc,CAAC,CAClC,CAAC;MACDjM,GAAG,CAACwM,gBAAgB,GAAG,IAAI;IAC/B;IAEA,OAAOxM,GAAG;EACd;;EAEA;AACJ;AACA;EACiByM,yBAAyBA,CAACzjB,KAAkB,EAAuC;IAAA,IAAA0jB,OAAA;IAAA,OAAAhlB,iBAAA;MAC5F,IAAMilB,cAAc,GAAGD,OAAI,CAACR,sBAAsB,CAACljB,KAAK,CAAC;MACzD,IAAI,CAAC2jB,cAAc,CAACN,SAAS,EAAE;QAC3B,OAAO,IAAI;MACf;MAEA,IAAMO,QAAQ,GAAG5jB,KAAK,CAACS,SAAS,CAAC,CAAC;MAClC,IAAI,CAACmjB,QAAQ,IAAID,cAAc,CAACH,gBAAgB,EAAE;QAC9C;;QAEA;QACA,OAAO;UACHK,YAAY,EAAEloB,iBAAiB,CAACmoB,GAAG;UACnCC,YAAY,EAAEnoB,iBAAiB,CAACooB;QACpC,CAAC;MACL;MAEA,IAAMC,SAAS,GAAGP,OAAI,CAACpkB,cAAc,CAACskB,QAAQ,CAAC;MAC/C,IAAI,CAACK,SAAS,CAACvkB,sBAAsB,CAAC,CAAC,EAAE;QACrC;QACA;QACA;QACA,IAAI,CAACikB,cAAc,CAACL,aAAa,EAAE;UAC/B;UACA,OAAO;YACHO,YAAY,EAAEloB,iBAAiB,CAACuoB,IAAI;YACpCH,YAAY,EAAEnoB,iBAAiB,CAACuoB;UACpC,CAAC;QACL,CAAC,MAAM;UACH;UACA,OAAO;YAAEN,YAAY,EAAEloB,iBAAiB,CAACyoB,IAAI;YAAEL,YAAY,EAAE;UAAK,CAAC;QACvE;MACJ;MAEA,IAAMM,gBAAgB,GAClBT,QAAQ,IACRD,cAAc,CAACJ,MAAM,WACdG,OAAI,CAACtN,2BAA2B,CAACwN,QAAQ,EAAED,cAAc,CAACJ,MAAM,CAACrlB,QAAQ,CAAC,CAAC;MAEtF,IAAI,CAACmmB,gBAAgB,EAAE;QACnB;QACA,OAAO;UACHR,YAAY,EAAEloB,iBAAiB,CAACuoB,IAAI;UACpCH,YAAY,EAAEnoB,iBAAiB,CAAC0oB;QACpC,CAAC;MACL;MAEA,IAAI,CAACD,gBAAgB,CAACnP,UAAU,CAAC,CAAC,EAAE;QAChC;QACA,OAAO;UACH2O,YAAY,EAAEloB,iBAAiB,CAACmoB,GAAG;UACnCC,YAAY,EAAEnoB,iBAAiB,CAAC2oB;QACpC,CAAC;MACL;MAEA,IAAI,CAACZ,cAAc,CAACL,aAAa,EAAE;QAC/B;QACA,OAAO;UACHO,YAAY,EAAEloB,iBAAiB,CAACuoB,IAAI;UACpCH,YAAY,EAAEnoB,iBAAiB,CAACuoB;QACpC,CAAC;MACL;;MAEA;MACA,OAAO;QAAEN,YAAY,EAAEloB,iBAAiB,CAACyoB,IAAI;QAAEL,YAAY,EAAE;MAAK,CAAC;IAAC;EACxE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWS,mBAAmBA,CAACpE,MAAc,EAAiB;IACtD,IAAMqE,GAAG,GAAG,IAAI,CAACC,cAAc,CAACthB,GAAG,CAACgd,MAAM,CAAC;IAC3C,IAAIqE,GAAG,KAAKxiB,SAAS,EAAE,MAAM,IAAI2B,KAAK,CAAC,oBAAoB,CAAC;IAC5D,IAAI6gB,GAAG,CAACD,mBAAmB,KAAKviB,SAAS,EAAE;MACvC,MAAM,IAAI2B,KAAK,CAAC,8DAA8D,CAAC;IACnF;IACA6gB,GAAG,CAACD,mBAAmB,CAAC,CAAC;IACzB,OAAOtS,OAAO,CAACC,OAAO,CAAC,CAAC;EAC5B;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBwS,iBAAiBA,CAC1BvE,MAAc,EACdwE,MAAuB,EACvBC,kBAA4B,EACf;IAAA,IAAAC,OAAA;IAAA,OAAApmB,iBAAA;MACb,IAAMkD,IAAI,GAAGkjB,OAAI,CAAC3mB,WAAW,CAAC4mB,OAAO,CAAC3E,MAAM,CAAC;MAC7C,IAAI,CAACxe,IAAI,EAAE;QACP,MAAM,IAAIgC,KAAK,iEAAArD,MAAA,CAAiE6f,MAAM,CAAE,CAAC;MAC7F;MACA,MAAM0E,OAAI,CAACE,qBAAqB,CAACpjB,IAAI,EAAEgjB,MAAM,CAAC;MAC9C,IAAI,CAACE,OAAI,CAAC7L,eAAe,IAAI,CAAC4L,kBAAkB,EAAE;QAC9CC,OAAI,CAAClmB,UAAU,CAACqmB,0BAA0B,CAAC,CAAC;MAChD;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACkBD,qBAAqBA,CAACpjB,IAAU,EAAEgjB,MAAuB,EAAiB;IAAA,IAAAM,OAAA;IAAA,OAAAxmB,iBAAA;MACpF,IAAM0hB,MAAM,GAAGxe,IAAI,CAACwe,MAAM;;MAE1B;MACA;MACA;MACA;MACA,IAAI,CAACwE,MAAM,CAACtc,SAAS,EAAE;QACnB/P,MAAM,CAAC+H,GAAG,CAAC,8CAA8C,CAAC;QAC1D;MACJ;;MAEA;MACA;MACA;MACA;MACA;MACA,IAAM6kB,cAAc,GAAGD,OAAI,CAACziB,QAAQ,CAAC2iB,iBAAiB,CAAChF,MAAM,CAAC;MAC9D,IAAI+E,cAAc,EAAE;QAChB,IAAIE,IAAI,CAACC,SAAS,CAACH,cAAc,CAAC,IAAIE,IAAI,CAACC,SAAS,CAACV,MAAM,CAAC,EAAE;UAC1DrsB,MAAM,CAAC8H,KAAK,CAAC,kDAAkD,GAAG,wBAAwB,GAAG+f,MAAM,CAAC;UACpG;QACJ;MACJ;MACA;MACA;MACA;MACA;MACA;MACA;MACA;MACA,IAAMmF,WAAW,GAAGL,OAAI,CAACR,cAAc,CAACthB,GAAG,CAACgd,MAAM,CAAC;MACnD,IAAImF,WAAW,EAAE;QACb;MACJ;;MAEA;MACA;MACA;MACA;MACA,IAAIC,kBAAwC,GAAG,IAAI;MACnD,IAAI,CAACL,cAAc,EAAE;QACjBK,kBAAkB,GAAGN,OAAI,CAACziB,QAAQ,CAACkiB,iBAAiB,CAACvE,MAAM,EAAEwE,MAAM,CAAC;MACxE;MAEA,IAAMa,QAAQ,GAAG7sB,UAAU,CAAC8sB,kBAAkB,CAACtiB,GAAG,CAACwhB,MAAM,CAACtc,SAAS,CAAC;MACpE,IAAI,CAACmd,QAAQ,EAAE;QACX,MAAM,IAAI7hB,KAAK,CAAC,yBAAyB,GAAGghB,MAAM,CAACtc,SAAS,CAAC;MACjE;MAEA,IAAMmc,GAAG,GAAG,IAAIgB,QAAQ,CAAC;QACrBxnB,MAAM,EAAEinB,OAAI,CAACjnB,MAAM;QACnBC,QAAQ,EAAEgnB,OAAI,CAAChnB,QAAQ;QACvBynB,MAAM,EAAET,OAAI;QACZrhB,SAAS,EAAEqhB,OAAI,CAACrhB,SAAS;QACzB7F,QAAQ,EAAEknB,OAAI,CAAClnB,QAAQ;QACvBoiB,MAAM;QACNwE;MACJ,CAAC,CAAC;MACFM,OAAI,CAACR,cAAc,CAAC9hB,GAAG,CAACwd,MAAM,EAAEqE,GAAG,CAAC;MAEpC,IAAIe,kBAAkB,EAAE;QACpB,MAAMA,kBAAkB;MAC5B;MAEAjtB,MAAM,CAAC+H,GAAG,2BAAAC,MAAA,CAA2B6f,MAAM,CAAE,CAAC;;MAE9C;MACA;MACA,IAAIxe,IAAI,CAACgkB,aAAa,CAAC,CAAC,EAAE;QACtB,MAAMV,OAAI,CAACW,oBAAoB,CAACjkB,IAAI,CAAC;MACzC,CAAC,MAAM;QACH;QACA,IAAMkkB,OAAO,GAAIC,MAAiB,IAAW;UACzCnkB,IAAI,CAACokB,GAAG,CAAC9qB,cAAc,CAAC+qB,MAAM,EAAEH,OAAO,CAAC;UACxC,IAAIlkB,IAAI,CAACgkB,aAAa,CAAC,CAAC,EAAE;YACtBV,OAAI,CAACW,oBAAoB,CAACjkB,IAAI,CAAC,CAAC0S,KAAK,CAAElU,CAAC,IAAK;cACzC7H,MAAM,CAAC8H,KAAK,sCAAAE,MAAA,CAAsC6f,MAAM,GAAIhgB,CAAC,CAAC;YAClE,CAAC,CAAC;UACN;QACJ,CAAC;QACDwB,IAAI,CAACkC,EAAE,CAAC5I,cAAc,CAAC+qB,MAAM,EAAEH,OAAO,CAAC;MAC3C;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWI,gBAAgBA,CAAC9F,MAAc,EAAiB;IACnD,IAAMxe,IAAI,GAAG,IAAI,CAACzD,WAAW,CAAC4mB,OAAO,CAAC3E,MAAM,CAAC;IAC7C,IAAI,CAACxe,IAAI,EAAE;MACP,MAAM,IAAIgC,KAAK,qDAAArD,MAAA,CAAqD6f,MAAM,CAAE,CAAC;IACjF;IACA,OAAO,IAAI,CAACyF,oBAAoB,CAACjkB,IAAI,CAAC;EAC1C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACYikB,oBAAoBA,CAACjkB,IAAU,EAAiB;IAAA,IAAAukB,OAAA;IACpD,IAAM/F,MAAM,GAAGxe,IAAI,CAACwe,MAAM;IAC1B,IAAMgG,YAAY;MAAA,IAAAC,MAAA,GAAA3nB,iBAAA,CAAG,aAA2B;QAC5C;QACA,IAAI,CAACynB,OAAI,CAACzB,cAAc,CAAC3N,GAAG,CAACqJ,MAAM,CAAC,EAAE;UAClC;QACJ;QACA7nB,MAAM,CAAC+H,GAAG,uCAAAC,MAAA,CAAuC6f,MAAM,SAAM,CAAC;QAC9D,IAAMkG,OAAO,SAAS1kB,IAAI,CAAC2kB,0BAA0B,CAAC,CAAC;QACvDD,OAAO,CAAC9H,OAAO,CAAEgI,CAAC,IAAK;UACnBL,OAAI,CAACvnB,UAAU,CAAC2H,uBAAuB,CAACigB,CAAC,CAACvoB,MAAM,CAAC;QACrD,CAAC,CAAC;MACN,CAAC;MAAA,gBAVKmoB,YAAYA,CAAA;QAAA,OAAAC,MAAA,CAAAvmB,KAAA,OAAAC,SAAA;MAAA;IAAA,GAUjB;IAED,IAAI0mB,OAAO,GAAG,IAAI,CAACC,uBAAuB,CAACtG,MAAM,CAAC;IAClD,IAAI,CAACqG,OAAO,EAAE;MACVA,OAAO,GAAGL,YAAY,CAAC,CAAC;MACxB,IAAI,CAACM,uBAAuB,CAACtG,MAAM,CAAC,GAAGqG,OAAO,CAACnS,KAAK,CAAEqS,GAAG,IAAK;QAC1D,OAAO,IAAI,CAACD,uBAAuB,CAACtG,MAAM,CAAC;QAC3C,MAAMuG,GAAG;MACb,CAAC,CAAC;IACN;IACA,OAAOF,OAAO;EAClB;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWG,yBAAyBA,CAC5BnS,KAAe,EACfoS,KAAe,EAC4C;IAC3D;IACA,IAAMC,aAAwC,GAAG,IAAItoB,GAAG,CAAC,CAAC;IAE1D,KAAK,IAAMP,QAAM,IAAIwW,KAAK,EAAE;MACxB,IAAMsS,WAAyB,GAAG,EAAE;MACpCD,aAAa,CAAClkB,GAAG,CAAC3E,QAAM,EAAE8oB,WAAW,CAAC;MAEtC,IAAM5f,OAAO,GAAG,IAAI,CAACyW,uBAAuB,CAAC3f,QAAM,CAAC,IAAI,EAAE;MAC1D,KAAK,IAAM2H,UAAU,IAAIuB,OAAO,EAAE;QAC9B,IAAMc,GAAG,GAAGrC,UAAU,CAACyc,cAAc,CAAC,CAAC;QACvC,IAAIpa,GAAG,IAAI,IAAI,CAACpE,SAAS,CAAC4B,mBAAmB,EAAE;UAC3C;UACA;QACJ;QACA,IAAIG,UAAU,CAACC,QAAQ,IAAIrJ,kBAAkB,CAACsjB,OAAO,EAAE;UACnD;UACA;QACJ;QAEAiH,WAAW,CAACpR,IAAI,CAAC/P,UAAU,CAAC;MAChC;IACJ;IAEA,OAAOnN,MAAM,CAACuuB,2BAA2B,CAAC,IAAI,CAACnjB,SAAS,EAAE,IAAI,CAAC7F,QAAQ,EAAE8oB,aAAa,EAAED,KAAK,CAAC;EAClG;;EAEA;AACJ;AACA;AACA;AACA;EACiBI,cAAcA,CAAA,EAAkC;IAAA,IAAAC,OAAA;IAAA,OAAAxoB,iBAAA;MACzD,IAAMyoB,gBAAsC,GAAG,EAAE;MACjD,MAAMD,OAAI,CAAC9oB,WAAW,CAAC8H,KAAK,CAAC,UAAU,EAAE,CAAC5M,oBAAoB,CAAC8tB,4BAA4B,CAAC,EAAGhhB,GAAG,IAAK;QACnG8gB,OAAI,CAAC9oB,WAAW,CAACipB,kCAAkC,CAACjhB,GAAG,EAAGkhB,CAAC,IAAK;UAC5D,IAAIA,CAAC,KAAK,IAAI,EAAE;UAEhB,IAAMC,IAAI,GAAGL,OAAI,CAACrjB,SAAS,CAAC2jB,yBAAyB,CAACF,CAAC,CAAC5E,SAAS,EAAE4E,CAAC,CAACG,SAAS,EAAEH,CAAC,CAACI,WAAY,CAAC;UAC/F,OAAOH,IAAI,CAACI,iBAAiB;UAC7BJ,IAAI,CAACjf,SAAS,GAAG7P,MAAM,CAACmvB,gBAAgB;UACxCT,gBAAgB,CAACxR,IAAI,CAAC4R,IAAI,CAAC;QAC/B,CAAC,CAAC;MACN,CAAC,CAAC;MAEF,OAAOJ,gBAAgB;IAAC;EAC5B;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACiBU,oBAAoBA,CAAA,EAAoB;IAAA,IAAAC,OAAA;IAAA,OAAAppB,iBAAA;MACjD,OAAO2mB,IAAI,CAACC,SAAS,OAAOwC,OAAI,CAACb,cAAc,CAAC,CAAC,CAAC;IAAC;EACvD;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACWxO,cAAcA,CAAClV,IAA0B,EAAgD;IAAA,IAA9CiK,IAAwB,GAAAzN,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,CAAC,CAAC;IAC3E,IAAIgoB,SAAS,GAAG,CAAC;IACjB,IAAI3T,QAAQ,GAAG,CAAC;IAChB,IAAM4T,KAAK,GAAGzkB,IAAI,CAACvB,MAAM;IAEzB,SAASimB,cAAcA,CAAA,EAAS;MAAA,IAAAC,qBAAA;MAC5B,CAAAA,qBAAA,GAAA1a,IAAI,CAAC2a,gBAAgB,cAAAD,qBAAA,eAArBA,qBAAA,CAAA3d,IAAA,CAAAiD,IAAI,EAAoB;QACpB4a,KAAK,EAAE,WAAW;QAClBL,SAAS;QACT3T,QAAQ;QACR4T;MACJ,CAAC,CAAC;IACN;IAEA,OAAO9V,OAAO,CAACkL,GAAG,CACd7Z,IAAI,CAAC8R,GAAG,CAAEpN,GAAG,IAAK;MACd,IAAI,CAACA,GAAG,CAACogB,OAAO,IAAI,CAACpgB,GAAG,CAACK,SAAS,EAAE;QAChC/P,MAAM,CAACsK,IAAI,CAAC,6CAA6C,EAAEoF,GAAG,CAAC;QAC/DmM,QAAQ,EAAE;QACV,IAAI5G,IAAI,CAAC2a,gBAAgB,EAAE;UACvBF,cAAc,CAAC,CAAC;QACpB;QACA,OAAO,IAAI;MACf;MAEA,IAAMxD,GAAG,GAAG,IAAI,CAAC6D,gBAAgB,CAACrgB,GAAG,CAACogB,OAAO,EAAEpgB,GAAG,CAACK,SAAS,CAAC;MAC7D,OAAOmc,GAAG,CAAC8D,aAAa,CAACtgB,GAAG,EAAEuF,IAAI,CAAC,CAACmP,OAAO,CAAC,MAAM;QAC9CoL,SAAS,EAAE;QACX,IAAIva,IAAI,CAAC2a,gBAAgB,EAAE;UACvBF,cAAc,CAAC,CAAC;QACpB;MACJ,CAAC,CAAC;IACN,CAAC,CACL,CAAC,CAAC/T,IAAI,CAAC,CAAC;EACZ;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBsU,oBAAoBA,CAACjlB,IAAY,EAAEiK,IAAyB,EAAiB;IAAA,IAAAib,OAAA;IAAA,OAAA/pB,iBAAA;MACtF,aAAa+pB,OAAI,CAAChQ,cAAc,CAAC4M,IAAI,CAACqD,KAAK,CAACnlB,IAAI,CAAC,CAAC;IAAC;EACvD;;EAEA;AACJ;AACA;AACA;EACWolB,0BAA0BA,CAAA,EAAoB;IACjD,OAAO,IAAI,CAAC3lB,aAAa,CAAC2lB,0BAA0B,CAAC,CAAC;EAC1D;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACWC,gBAAgBA,CAAChnB,IAAU,EAAQ;IACtC,IAAM6iB,GAAG,GAAG,IAAI,CAACC,cAAc,CAACthB,GAAG,CAACxB,IAAI,CAACwe,MAAM,CAAC;IAChD,IAAIqE,GAAG,EAAE;MACLA,GAAG,CAACmE,gBAAgB,CAAChnB,IAAI,CAAC;IAC9B;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBinB,YAAYA,CAAC7oB,KAAkB,EAAE4B,IAAU,EAAiB;IAAA,IAAAknB,OAAA;IAAA,OAAApqB,iBAAA;MACrE,IAAM0hB,MAAM,GAAGpgB,KAAK,CAACqC,SAAS,CAAC,CAAE;MAEjC,IAAMoiB,GAAG,GAAGqE,OAAI,CAACpE,cAAc,CAACthB,GAAG,CAACgd,MAAM,CAAC;MAC3C,IAAI,CAACqE,GAAG,EAAE;QACN;QACA;QACA,MAAM,IAAI7gB,KAAK,CACX,OAAO,GACHwc,MAAM,GACN,uDAAuD,GACvD,kDAAkD,GAClD,sBACR,CAAC;MACL;;MAEA;MACA,MAAM0I,OAAI,CAACjD,oBAAoB,CAACjkB,IAAI,CAAC;MAErC,IAAImnB,OAAO,GAAG/oB,KAAK,CAACU,UAAU,CAAC,CAAC;MAChC;MACA;MACA,IAAMsoB,UAAU,GAAGD,OAAO,CAAC,cAAc,CAAC;MAC1C,IAAIC,UAAU,EAAE;QACZ;QACAD,OAAO,GAAGjmB,MAAM,CAAC8U,MAAM,CAAC,CAAC,CAAC,EAAEmR,OAAO,CAAC;QACpC,OAAOA,OAAO,CAAC,cAAc,CAAC;MAClC;;MAEA;MACA,IAAME,kBAAkB,GAAGF,OAAO,CAAC,gCAAgC,CAAC;MACpE,IAAIE,kBAAkB,EAAE;QACpBF,OAAO,GAAGjmB,MAAM,CAAC8U,MAAM,CAAC,CAAC,CAAC,EAAEmR,OAAO,CAAC;QACpC,OAAOA,OAAO,CAAC,gCAAgC,CAAC;MACpD;MAEA,IAAMG,gBAAgB,SAAUzE,GAAG,CAAC0E,cAAc,CAACvnB,IAAI,EAAE5B,KAAK,CAACQ,OAAO,CAAC,CAAC,EAAEuoB,OAAO,CAAc;MAE/F,IAAIC,UAAU,EAAE;QACZE,gBAAgB,CAAC,cAAc,CAAC,GAAGF,UAAU;MACjD;MACA,IAAIC,kBAAkB,EAAE;QACpBC,gBAAgB,CAAC,gCAAgC,CAAC,GAAGD,kBAAkB;MAC3E;MAEAjpB,KAAK,CAACopB,aAAa,CACf,kBAAkB,EAClBF,gBAAgB,EAChBJ,OAAI,CAACjlB,SAAS,CAAC4B,mBAAmB,EAClCqjB,OAAI,CAACjlB,SAAS,CAAC2B,gBACnB,CAAC;IAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACiB6jB,YAAYA,CAACrpB,KAAkB,EAAmC;IAAA,IAAAspB,OAAA;IAAA,OAAA5qB,iBAAA;MAC3E,IAAIsB,KAAK,CAACupB,UAAU,CAAC,CAAC,EAAE;QACpB;QACA;QACA;QACA,IAAMC,cAAc,GAAG,IAAI7uB,WAAW,CAAA8uB,aAAA;UAClCpB,OAAO,EAAEroB,KAAK,CAACqC,SAAS,CAAC;QAAC,GACvBrC,KAAK,CAAC0pB,WAAW,CAAC,CAAC,CAACC,gBAAgB,CAC1C,CAAC;QACF,IAAIC,eAAuB,GAAG5pB,KAAK,CAAC0pB,WAAW,CAAC,CAAC,CAACC,gBAAiB;QACnE,IAAIH,cAAc,CAACK,WAAW,CAAC,CAAC,EAAE;UAC9B,IAAI;YACA,IAAMC,cAAc,SAASR,OAAI,CAACD,YAAY,CAACG,cAAc,CAAC;YAC9DI,eAAe,GAAGE,cAAc,CAACC,UAAoB;UACzD,CAAC,CAAC,OAAO3pB,CAAC,EAAE;YACR7H,MAAM,CAACsK,IAAI,CAAC,oEAAoE,EAAEzC,CAAC,CAAC;UACxF;QACJ;QAEA,OAAO;UACH2pB,UAAU,EAAE;YACR1B,OAAO,EAAEroB,KAAK,CAACqC,SAAS,CAAC,CAAC;YAC1BwC,IAAI,EAAE,gBAAgB;YACtBkkB,OAAO,EAAE,CAAC,CAAC;YACXiB,QAAQ,EAAE;cACNL,gBAAgB,EAAEC;YACtB;UACJ;QACJ,CAAC;MACL,CAAC,MAAM;QACH,IAAMb,OAAO,GAAG/oB,KAAK,CAAC4iB,cAAc,CAAC,CAAC;QACtC,IAAM6B,GAAG,GAAG6E,OAAI,CAAChB,gBAAgB,CAACtoB,KAAK,CAACqC,SAAS,CAAC,CAAC,EAAG0mB,OAAO,CAACzgB,SAAS,CAAC;QACxE,OAAOmc,GAAG,CAAC4E,YAAY,CAACrpB,KAAK,CAAC;MAClC;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACiBiqB,kBAAkBA,CAACC,WAAyB,EAAiB;IAAA,IAAAC,OAAA;IAAA,OAAAzrB,iBAAA;MACtE;MACA;MACA;MACA;MACA;MACA;MACA;MACA;MACA,MAAMyrB,OAAI,CAACC,qBAAqB,CAACF,WAAW,CAAC;IAAC;EAClD;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACWG,cAAcA,CACjBhN,WAAgC,EAChCiN,UAAsC,EAEzB;IAAA,IADbC,MAAM,GAAAxqB,SAAA,CAAAiC,MAAA,QAAAjC,SAAA,QAAAkC,SAAA,GAAAlC,SAAA,MAAG,KAAK;IAEd,OAAO,IAAI,CAACuE,6BAA6B,CACpCkmB,mBAAmB,CAACnN,WAAW,EAAEiN,UAAU,EAAEC,MAAM,CAAC,CACpDrW,IAAI,CAAC,MAAM;MACR,IAAI,IAAI,CAACuW,0BAA0B,EAAE;QACjC,IAAI,CAACnmB,6BAA6B,CAAComB,kBAAkB,CAAC,CAAC;MAC3D;IACJ,CAAC,CAAC,CACDpW,KAAK,CAAElU,CAAC,IAAK;MACV;MACA7H,MAAM,CAAC8H,KAAK,CAAC,gCAAgC,EAAED,CAAC,CAAC;IACrD,CAAC,CAAC;EACV;;EAEA;AACJ;AACA;AACA;AACA;EACWuqB,oBAAoBA,CAACtN,WAAgC,EAAQ;IAChE,IAAI,CAAC/Y,6BAA6B,CAACqmB,oBAAoB,CAACtN,WAAW,CAAC,CAAC/I,KAAK,CAAElU,CAAC,IAAK;MAC9E7H,MAAM,CAACsK,IAAI,CAAC,0CAA0C,EAAEzC,CAAC,CAAC;IAC9D,CAAC,CAAC;EACN;;EAEA;AACJ;AACA;AACA;EACiBwqB,qCAAqCA,CAAA,EAAkB;IAAA,IAAAC,OAAA;IAAA,OAAAnsB,iBAAA;MAChE,MAAMmsB,OAAI,CAACvmB,6BAA6B,CAACwmB,kCAAkC,CAAC,CAAC;IAAC;EAClF;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACiBC,aAAaA,CAACnpB,IAAU,EAAE5B,KAAkB,EAAiB;IAAA,IAAAgrB,OAAA;IAAA,OAAAtsB,iBAAA;MACtE,IAAMqqB,OAAO,GAAG/oB,KAAK,CAACU,UAAU,CAAkB,CAAC;MACnD,MAAMsqB,OAAI,CAAChG,qBAAqB,CAACpjB,IAAI,EAAEmnB,OAAO,CAAC;IAAC;EACpD;;EAEA;AACJ;AACA;AACA;AACA;EACiBkC,iBAAiBA,CAACC,QAAwB,EAAiB;IAAA,IAAAC,OAAA;IAAA,OAAAzsB,iBAAA;MACpE,IAAI,CAACwsB,QAAQ,CAACE,YAAY,EAAE;QACxB;QACA;QACA;QACA;QACA7yB,MAAM,CAAC+H,GAAG,CAAC,0DAA0D,CAAC;QACtE6qB,OAAI,CAACvsB,UAAU,CAACysB,0BAA0B,CAAC,CAAC;QAC5C;QACAF,OAAI,CAACvsB,UAAU,CAAC2H,uBAAuB,CAAC4kB,OAAI,CAACltB,MAAM,CAAC;QACpDktB,OAAI,CAACzE,uBAAuB,GAAG,CAAC,CAAC;MACrC;MAEAyE,OAAI,CAACV,0BAA0B,GAAG,KAAK;IAAC;EAC5C;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACiBa,eAAeA,CAACJ,QAA6B,EAAiB;IAAA,IAAAK,OAAA;IAAA,OAAA7sB,iBAAA;MAAA,IAAA8sB,qBAAA;MACvED,OAAI,CAAC3sB,UAAU,CAAC6sB,YAAY,EAAAD,qBAAA,GAACN,QAAQ,CAACQ,aAAa,cAAAF,qBAAA,cAAAA,qBAAA,GAAI,IAAI,CAAC;MAC5DD,OAAI,CAAC3sB,UAAU,CAACqH,WAAW,CAAC,CAAC;;MAE7B;MACAslB,OAAI,CAAC3sB,UAAU,CAAC2H,uBAAuB,CAACglB,OAAI,CAACttB,MAAM,CAAC;MAEpDstB,OAAI,CAAC3sB,UAAU,CAACqmB,0BAA0B,CAAC,CAAC;;MAE5C;MACA;MACA;MACA;MACA,IAAI,CAACiG,QAAQ,CAACS,UAAU,EAAE;QACtBJ,OAAI,CAAC3Q,sBAAsB,CAAC,CAAC;QAC7B2Q,OAAI,CAACK,8BAA8B,CAAC,CAAC;;QAErC;QACA;QACA;QACAL,OAAI,CAACjnB,6BAA6B,CAAComB,kBAAkB,CAAC,CAAC;;QAEvD;QACAa,OAAI,CAACd,0BAA0B,GAAG,IAAI;MAC1C;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACkBL,qBAAqBA,CAACF,WAAoD,EAAiB;IAAA,IAAA2B,OAAA;IAAA,OAAAntB,iBAAA;MACrG,IAAIyF,KAAK,CAAC2nB,OAAO,CAAC5B,WAAW,aAAXA,WAAW,uBAAXA,WAAW,CAAEhrB,OAAO,CAAC,EAAE;QACrCgrB,WAAW,CAAChrB,OAAO,CAACsf,OAAO,CAAEuN,CAAC,IAAK;UAC/BF,OAAI,CAACjtB,UAAU,CAACotB,wBAAwB,CAACD,CAAC,CAAC;QAC/C,CAAC,CAAC;MACN;MAEA,IAAI5nB,KAAK,CAAC2nB,OAAO,CAAC5B,WAAW,aAAXA,WAAW,uBAAXA,WAAW,CAAE+B,IAAI,CAAC,IAAI/B,WAAW,CAAC+B,IAAI,CAACjqB,MAAM,EAAE;QAC7D;QACA;QACA;QACA,IAAMkqB,UAAU,GAAG,IAAIC,GAAG,OAAON,OAAI,CAACO,kBAAkB,CAAC,CAAC,CAAC;QAE3DlC,WAAW,CAAC+B,IAAI,CAACzN,OAAO,CAAEuN,CAAC,IAAK;UAC5B,IAAI,CAACG,UAAU,CAACnV,GAAG,CAACgV,CAAC,CAAC,EAAE;YACpBF,OAAI,CAACjtB,UAAU,CAACytB,sBAAsB,CAACN,CAAC,CAAC;UAC7C;QACJ,CAAC,CAAC;MACN;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBK,kBAAkBA,CAAA,EAAsB;IAAA,IAAAE,OAAA;IAAA,OAAA5tB,iBAAA;MAClD,IAAMwtB,UAAoB,GAAG,EAAE;MAC/B,KAAK,IAAMtqB,IAAI,IAAI0qB,OAAI,CAACC,kBAAkB,CAAC,CAAC,EAAE;QAC1C,IAAMjG,OAAO,SAAS1kB,IAAI,CAAC2kB,0BAA0B,CAAC,CAAC;QACvD,KAAK,IAAMtmB,MAAM,IAAIqmB,OAAO,EAAE;UAC1B4F,UAAU,CAACvW,IAAI,CAAC1V,MAAM,CAAChC,MAAM,CAAC;QAClC;MACJ;MACA,OAAOiuB,UAAU;IAAC;EACtB;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACYK,kBAAkBA,CAAA,EAAW;IACjC,OAAO,IAAI,CAACpuB,WAAW,CAACquB,QAAQ,CAAC,CAAC,CAACC,MAAM,CAAE7qB,IAAI,IAAK;MAChD;MACA,IAAM6iB,GAAG,GAAG,IAAI,CAACC,cAAc,CAACthB,GAAG,CAACxB,IAAI,CAACwe,MAAM,CAAC;MAChD,IAAI,CAACqE,GAAG,EAAE;QACN,OAAO,KAAK;MAChB;MACA,IAAI,CAAC,IAAI,CAACiC,uBAAuB,CAAC9kB,IAAI,CAACwe,MAAM,CAAC,EAAE;QAC5C,OAAO,KAAK;MAChB;;MAEA;MACA,IAAMsM,YAAY,GAAG9qB,IAAI,CAAC+qB,eAAe,CAAC,CAAC;MAC3C,OAAOD,YAAY,KAAKrwB,eAAe,CAACuwB,IAAI,IAAIF,YAAY,KAAKrwB,eAAe,CAACwwB,MAAM;IAC3F,CAAC,CAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACiBC,uBAAuBA,CAACC,iBAA2C,EAAEC,OAAe,EAAiB;IAAA,IAAAC,OAAA;IAAA,OAAAvuB,iBAAA;MAC9G,IAAI;QACA,IAAMwuB,aAAa,SAASD,OAAI,CAACE,oBAAoB,CAACJ,iBAAiB,EAAEC,OAAO,CAAC;QAEjF,IAAI;UACA,MAAMC,OAAI,CAACjvB,QAAQ,CAACovB,aAAa,CAACF,aAAa,CAAC;QACpD,CAAC,CAAC,OAAO9sB,CAAC,EAAE;UACR7H,MAAM,CAAC8H,KAAK,CAAC,qBAAqB,EAAED,CAAC,CAAC;UACtC,MAAMA,CAAC;QACX;MACJ,CAAC,CAAC,OAAOA,CAAC,EAAE;QACR7H,MAAM,CAAC8H,KAAK,CAAC,yCAAyC,EAAED,CAAC,CAAC;QAC1D,MAAMA,CAAC;MACX;IAAC;EACL;EAEc+sB,oBAAoBA,CAC9BJ,iBAA2C,EAC3CC,OAAe,EACO;IAAA,IAAAK,OAAA;IAAA,OAAA3uB,iBAAA;MACtB,IAAMwuB,aAA4B,GAAG;QACjCI,SAAS,EAAEl1B,SAAS,CAACm1B,oBAAoB;QACzCC,KAAK,EAAE;MACX,CAAC;MAED,MAAMtb,OAAO,CAACkL,GAAG,CACb2P,iBAAiB,CAAC1X,GAAG;QAAA,IAAAoY,MAAA,GAAA/uB,iBAAA,CAAC,WAAAgvB,MAAA,EAAkC;UAAA,IAA3B;YAAEzvB,MAAM;YAAE2H;UAAW,CAAC,GAAA8nB,MAAA;UAC/C,IAAMxvB,QAAQ,GAAG0H,UAAU,CAAC1H,QAAQ;UACpC,IAAMgrB,gBAAmC,GAAG;YACxC5gB,SAAS,EAAE7P,MAAM,CAACk1B,aAAa;YAC/BC,UAAU,EAAEP,OAAI,CAACxpB,SAAS,CAAC4B,mBAAoB;YAC/CooB,UAAU,EAAE,CAAC,CAAC;YACd,CAACx1B,iBAAiB,GAAGF,MAAM,CAAC;UAChC,CAAC;UAED+0B,aAAa,CAACM,KAAK,CAAC7X,IAAI,CAAC;YACrB1X,MAAM;YACNC,QAAQ;YACR8uB,OAAO,EAAE9D;UACb,CAAC,CAAC;UAEF,MAAMzwB,MAAM,CAACuuB,2BAA2B,CACpCqG,OAAI,CAACxpB,SAAS,EACdwpB,OAAI,CAACrvB,QAAQ,EACb,IAAIQ,GAAG,CAAC,CAAC,CAACP,MAAM,EAAE,CAAC2H,UAAU,CAAC,CAAC,CAAC,CACpC,CAAC;UACD,MAAMnN,MAAM,CAACq1B,uBAAuB,CAChC5E,gBAAgB,CAAC2E,UAAU,EAC3BR,OAAI,CAACpvB,MAAM,EACXovB,OAAI,CAACnvB,QAAQ,EACbmvB,OAAI,CAACxpB,SAAS,EACd5F,MAAM,EACN2H,UAAU,EACVonB,OACJ,CAAC;QACL,CAAC;QAAA,iBAAAe,IAAA;UAAA,OAAAN,MAAA,CAAA3tB,KAAA,OAAAC,SAAA;QAAA;MAAA,IACL,CAAC;;MAED;MACA;MACA;MACA;MACAmtB,aAAa,CAACM,KAAK,GAAGN,aAAa,CAACM,KAAK,CAACf,MAAM,CAAEuB,GAAG,IAAK;QACtD,IAAIlrB,MAAM,CAACS,IAAI,CAACyqB,GAAG,CAAChB,OAAO,CAACa,UAAU,CAAC,CAAC7rB,MAAM,GAAG,CAAC,EAAE;UAChD,OAAO,IAAI;QACf,CAAC,MAAM;UACHzJ,MAAM,CAAC+H,GAAG,6BAAAC,MAAA,CAA6BytB,GAAG,CAAC/vB,MAAM,OAAAsC,MAAA,CAAIytB,GAAG,CAAC9vB,QAAQ,cAAW,CAAC;UAC7E,OAAO,KAAK;QAChB;MACJ,CAAC,CAAC;MAEF,OAAOgvB,aAAa;IAAC;EACzB;;EAEA;AACJ;AACA;EACiBe,uBAAuBA,CAChCX,SAAiB,EACjBnmB,OAA+C,EAC/C6lB,OAAwB,EACF;IAAA,IAAAkB,OAAA;IAAA,OAAAxvB,iBAAA;MACtB,IAAMgf,OAAO,GAAG,IAAIyO,GAAG,CAAChlB,OAAO,CAACkO,GAAG,CAAC8Y,MAAA;QAAA,IAAC;UAAElwB;QAAO,CAAC,GAAAkwB,MAAA;QAAA,OAAKlwB,MAAM;MAAA,EAAC,CAAC;MAC5D,IAAMwgB,aAAa,SAASyP,OAAI,CAACnlB,YAAY,CAAC5E,KAAK,CAACC,IAAI,CAACsZ,OAAO,CAAC,EAAE,KAAK,CAAC;MAEzE,IAAMqP,iBAA2C,GAAG,EAAE;MAEtD5lB,OAAO,CAACqX,OAAO,CAAC4P,MAAA,IAA0B;QAAA,IAAzB;UAAEnwB,MAAM;UAAEC;QAAS,CAAC,GAAAkwB,MAAA;QACjC,IAAMjnB,OAAO,GAAGsX,aAAa,CAACrb,GAAG,CAACnF,MAAM,CAAC;QACzC,IAAI,CAACkJ,OAAO,EAAE;UACV5O,MAAM,CAACsK,IAAI,8BAAAtC,MAAA,CAA8BtC,MAAM,CAAE,CAAC;UAClD;QACJ;QAEA,IAAIkJ,OAAO,CAAC4P,GAAG,CAAC7Y,QAAQ,CAAC,EAAE;UACvB;UACA6uB,iBAAiB,CAACpX,IAAI,CAAC;YAAE1X,MAAM;YAAE2H,UAAU,EAAEuB,OAAO,CAAC/D,GAAG,CAAClF,QAAQ;UAAG,CAAC,CAAC;QAC1E,CAAC,MAAM;UACH3F,MAAM,CAACsK,IAAI,6BAAAtC,MAAA,CAA6BtC,MAAM,eAAAsC,MAAA,CAAYrC,QAAQ,CAAE,CAAC;QACzE;MACJ,CAAC,CAAC;MAEF,OAAOgwB,OAAI,CAACf,oBAAoB,CAACJ,iBAAiB,EAAEC,OAAO,CAAC;IAAC;EACjE;EAUaqB,0BAA0BA,CAACC,MAAwB,EAA6B;IAAA,OAAA5vB,iBAAA;MACzF;MACA;MACA,OAAO4vB,MAAM,CAAC7B,MAAM,CAAE8B,QAAQ,IAAK;QAAA,IAAAC,iBAAA;QAC/B,IACID,QAAQ,CAAC1pB,IAAI,KAAKzM,SAAS,CAACm1B,oBAAoB,IAChD,CAAC,CAAC,8BAA8B,CAAC,CAACxU,QAAQ,EAAAyV,iBAAA,GAACD,QAAQ,CAACxF,OAAO,cAAAyF,iBAAA,uBAAhBA,iBAAA,CAAkBlmB,SAAS,CAAC,EACzE;UACE/P,MAAM,CAAC+H,GAAG,CAAC,kDAAkD,GAAGiuB,QAAQ,CAAChL,MAAM,CAAC;UAChF,OAAO,KAAK;QAChB;QACA,OAAO,IAAI;MACf,CAAC,CAAC;IAAC;EACP;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACYkL,qBAAqBA,CAACC,YAAoB,EAAQ;IACtD,IAAIC,QAAQ,CAACD,YAAY,CAAC,EAAE;MACxB,IAAI,CAACjS,eAAe,GAAGiS,YAAY;IACvC,CAAC,MAAM;MACH,MAAM,IAAIE,SAAS,CAAC,wDAAwD,CAAC;IACjF;EACJ;EAEOC,gBAAgBA,CAACC,iBAA0C,EAAEC,kBAA6B,EAAiB;IAC9G,IAAID,iBAAiB,KAAK7sB,SAAS,EAAE;MACjC,IAAI,CAACwsB,qBAAqB,CAACK,iBAAiB,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC;IAC3E;IAEA,IAAIC,kBAAkB,KAAK9sB,SAAS,EAAE;MAClC;MACA;MACA;MACA;MACA,IAAI,CAAC0Y,gBAAgB,GAAG,CAACoU,kBAAkB,CAAChW,QAAQ,CAAC,mBAAmB,CAAC;IAC7E;IAEA,OAAO7G,OAAO,CAACC,OAAO,CAAC,CAAC;EAC5B;EAqCA;AACJ;AACA;AACA;AACA;AACA;EACYxR,cAAcA,CAACX,KAAkB,EAAQ;IAC7C,IAAM+oB,OAAO,GAAG/oB,KAAK,CAACU,UAAU,CAAC,CAAC;IAElC,IAAI,CAACqoB,OAAO,CAACV,OAAO,IAAI,CAACU,OAAO,CAACzgB,SAAS,EAAE;MACxC/P,MAAM,CAAC8H,KAAK,CAAC,6BAA6B,CAAC;MAC3C;IACJ;IAEA,IAAI,CAAC,IAAI,CAAC2C,aAAa,CAACgsB,gBAAgB,EAAE;MACtC;MACA;MACA,IAAI,CAAChsB,aAAa,CAACwD,aAAa,CAAC,CAAC;IACtC;IAEA,IAAMie,GAAG,GAAG,IAAI,CAAC6D,gBAAgB,CAACS,OAAO,CAACV,OAAO,EAAEU,OAAO,CAACzgB,SAAS,CAAC;IACrEmc,GAAG,CAAC9jB,cAAc,CAACX,KAAK,CAAC;EAC7B;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACYgB,sBAAsBA,CAAChB,KAAkB,EAAQ;IACrD,IAAM+oB,OAAO,GAAG/oB,KAAK,CAACU,UAAU,CAAC,CAAC;IAElC,IACKqoB,OAAO,CAACkG,IAAI,KAAK,UAAU,KAAK,CAAClG,OAAO,CAACV,OAAO,IAAI,CAACU,OAAO,CAACmG,UAAU,CAAC,IACzE,CAACnG,OAAO,CAACzgB,SAAS,IAClB,CAACygB,OAAO,CAAC6E,UAAU,EACrB;MACEr1B,MAAM,CAAC8H,KAAK,CAAC,sCAAsC,CAAC;MACpD;IACJ;IAEA9H,MAAM,CAAC8W,IAAI,CACP,oCAAA9O,MAAA,CAAoCP,KAAK,CAACS,SAAS,CAAC,CAAC,gBAAAF,MAAA,CAC1CwoB,OAAO,CAACzgB,SAAS,eAAA/H,MAAA,CAAYwoB,OAAO,CAAC6E,UAAU,OAAArtB,MAAA,CAAIwoB,OAAO,CAACmG,UAAU,MAAG,cAAA3uB,MAAA,CACpEwoB,OAAO,CAACV,OAAO,iBAAA9nB,MAAA,CAAcwoB,OAAO,CAACkG,IAAI,QAAA1uB,MAAA,CAAKwoB,OAAO,CAACoG,MAAM,MAC/E,CAAC;IAED,IAAM1K,GAAG,GAAG,IAAI,CAAC6D,gBAAgB,CAACS,OAAO,CAACV,OAAO,EAAEU,OAAO,CAACzgB,SAAS,CAAC;IACrE,IAAImc,GAAG,CAACzjB,sBAAsB,EAAE;MAC5ByjB,GAAG,CAACzjB,sBAAsB,CAAChB,KAAK,CAAC;IACrC;IACA,IAAI,CAAC+oB,OAAO,CAACV,OAAO,EAAE;MAClB;MACA;MACA;MACA,IAAM+G,cAAc,GAAG,IAAI,CAACC,iBAAiB,CAACtG,OAAO,CAACzgB,SAAS,CAAC;MAChE,KAAK,IAAMgnB,SAAS,IAAIF,cAAc,EAAE;QACpCE,SAAS,CAACC,yBAAyB,CAACxG,OAAO,CAAC6E,UAAU,CAAC;MAC3D;IACJ;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACY1sB,wBAAwBA,CAAClB,KAAkB,EAAQ;IACvD,IAAI,CAAChG,eAAe,CAACkI,aAAa,CAAClC,KAAK,EAAE,IAAI,CAAChC,QAAQ,CAAC,EAAE;MACtD;IACJ;IACA,IAAMmE,aAAa,GAAInC,KAAkB,IAAsC;MAC3E,IAAI,CAAChG,eAAe,CAACw1B,gBAAgB,CAACx1B,eAAe,CAACy1B,YAAY,CAACzvB,KAAK,CAAC,CAAC,EAAE;QACxE;MACJ;MACA,IAAM+oB,OAAO,GAAG/oB,KAAK,CAACU,UAAU,CAAC,CAAC;MAClC,IAAMxC,QAAQ,GAAG6qB,OAAO,IAAIA,OAAO,CAAC2G,WAAW;MAC/C,IAAI,CAACxxB,QAAQ,EAAE;QACX;MACJ;MACA,IAAMD,MAAM,GAAG+B,KAAK,CAACS,SAAS,CAAC,CAAE;MACjC,IAAM2B,OAAO,GAAG,IAAIpI,eAAe,CAAC,IAAI,CAACgE,QAAQ,EAAEC,MAAM,EAAE,CAACC,QAAQ,CAAC,CAAC;MACtE,OAAO,IAAIrE,mBAAmB,CAACuI,OAAO,EAAE,IAAI,CAACzF,mBAAmB,EAAE,IAAI,CAACqB,QAAQ,CAAC;IACpF,CAAC;IACD,IAAI,CAACsE,uBAAuB,CAACtC,KAAK,EAAE,IAAI,CAACuE,4BAA4B,EAAEpC,aAAa,CAAC;EACzF;EA6BcG,uBAAuBA,CACjCtC,KAAkB,EAClB+gB,WAAyB,EACzB5e,aAAsE,EAEzD;IAAA,IAAAwtB,WAAA,GAAA5vB,SAAA;MAAA6vB,OAAA;IAAA,OAAAlxB,iBAAA;MAAA,IADbmxB,WAAW,GAAAF,WAAA,CAAA3tB,MAAA,QAAA2tB,WAAA,QAAA1tB,SAAA,GAAA0tB,WAAA,MAAG,IAAI;MAElB;MACA,IAAI3vB,KAAK,CAAC8vB,SAAS,CAAC,CAAC,IAAI9vB,KAAK,CAAC+vB,MAAM,IAAIr1B,WAAW,CAACs1B,IAAI,EAAE;QACvD,IAAIC,eAA2B;QAC/B,IAAIC,cAA0B;QAC9B,IAAI;UACA,MAAM,IAAIhe,OAAO,CAAO,CAACC,OAAO,EAAEgG,MAAM,KAAK;YACzC8X,eAAe,GAAG9d,OAAO;YACzB+d,cAAc,GAAGA,CAAA,KAAY;cACzB,IAAIlwB,KAAK,CAAC+vB,MAAM,IAAIr1B,WAAW,CAACy1B,SAAS,EAAE;gBACvChY,MAAM,CAAC,IAAIvU,KAAK,CAAC,gCAAgC,CAAC,CAAC;cACvD;YACJ,CAAC;YACD5D,KAAK,CAACwB,IAAI,CAAC5G,gBAAgB,CAACw1B,oBAAoB,EAAEH,eAAe,CAAC;YAClEjwB,KAAK,CAAC8D,EAAE,CAAClJ,gBAAgB,CAACy1B,MAAM,EAAEH,cAAc,CAAC;UACrD,CAAC,CAAC;QACN,CAAC,CAAC,OAAOvJ,GAAG,EAAE;UACVpuB,MAAM,CAAC8H,KAAK,CAAC,6DAA6D,EAAEsmB,GAAG,CAAC;UAChF;QACJ,CAAC,SAAS;UACN3mB,KAAK,CAACswB,cAAc,CAAC11B,gBAAgB,CAACw1B,oBAAoB,EAAEH,eAAgB,CAAC;UAC7EjwB,KAAK,CAACswB,cAAc,CAAC11B,gBAAgB,CAACy1B,MAAM,EAAEH,cAAe,CAAC;QAClE;MACJ;MACA,IAAI7e,OAAwC,GAAG0P,WAAW,CAACwP,UAAU,CAACvwB,KAAK,CAAC;MAC5E,IAAIwwB,YAAY,GAAG,KAAK;MACxB,IAAI,CAACnf,OAAO,EAAE;QACVA,OAAO,GAAGlP,aAAa,CAACnC,KAAK,CAAC;QAC9B;QACA,IAAI,CAACqR,OAAO,EAAE;UACV9Y,MAAM,CAAC+H,GAAG,CACN,uDAAAC,MAAA,CACOP,KAAK,CAACQ,OAAO,CAAC,CAAC,6CAC1B,CAAC;UACD;QACJ;QACAgwB,YAAY,GAAG,IAAI;QACnBzP,WAAW,CAAC0P,UAAU,CAACzwB,KAAK,EAAEqR,OAAO,CAAC;MAC1C;MACArR,KAAK,CAAC0wB,sBAAsB,CAACrf,OAAO,CAAC;MACrC,IAAI;QACA,MAAMA,OAAO,CAACjP,OAAO,CAACuuB,WAAW,CAAC3wB,KAAK,EAAEqR,OAAO,EAAEwe,WAAW,CAAC;MAClE,CAAC,CAAC,OAAOlJ,GAAG,EAAE;QACVpuB,MAAM,CAAC8H,KAAK,CAAC,yCAAyC,EAAEsmB,GAAG,CAAC;MAChE;MACA,IAAM3S,UAAU,GACZwc,YAAY,IACZ,CAACnf,OAAO,CAACuf,aAAa,IACtB,CAACvf,OAAO,CAACwf,OAAO;MAAI;MACpB,CAACxf,OAAO,CAACyf,WAAW;MACxB,IAAI9c,UAAU,EAAE;QACZ4b,OAAI,CAAC5xB,QAAQ,CAACqB,IAAI,CAACxD,WAAW,CAAChC,mBAAmB,EAAEwX,OAAO,CAAC;QAC5Due,OAAI,CAAC5xB,QAAQ,CAACqB,IAAI,CAACxD,WAAW,CAAC2B,2BAA2B,EAAE6T,OAAO,CAAC;MACxE;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBjQ,sBAAsBA,CAACpB,KAAkB,EAAiB;IAAA,IAAA+wB,OAAA;IAAA,OAAAryB,iBAAA;MACpE,IAAMqqB,OAAO,GAAG/oB,KAAK,CAAC4iB,cAAc,CAAC,CAAC;MACtC,IAAMW,MAAM,GAAGvjB,KAAK,CAACS,SAAS,CAAC,CAAC;MAChC,IAAM6H,SAAS,GAAGygB,OAAO,CAACzgB,SAAS;MACnC,IAAM8Z,SAAS,GAAG2G,OAAO,CAAC6E,UAAU;MAEpCmD,OAAI,CAAC/yB,QAAQ,CAACqB,IAAI,CAACxE,WAAW,CAACm2B,0BAA0B,EAAEhxB,KAAK,CAAC;;MAEjE;MACA;MACA;MACA,IAAMixB,eAAe,GAAGA,CAAA,KAAY;QAChC,IAAM7B,cAAc,GAAG2B,OAAI,CAAC1B,iBAAiB,CAAC52B,MAAM,CAACmvB,gBAAgB,CAAC;QACtE,KAAK,IAAM0H,SAAS,IAAIF,cAAc,EAAE;UACpCE,SAAS,CAACC,yBAAyB,CAACnN,SAAS,CAAC;QAClD;MACJ,CAAC;MAED,IAAImB,MAAM,KAAKthB,SAAS,IAAImgB,SAAS,KAAKngB,SAAS,IAAImgB,SAAS,KAAKngB,SAAS,EAAE;QAC5E;MACJ;;MAEA;MACA;MACA,IAAMivB,+BAA+B,GAAGH,OAAI,CAACI,wBAAwB,CAACC,WAAW,CAAC7N,MAAM,CAAC;MACzF,IAAM4N,wBAAwB,GAAGD,+BAA+B,CAACE,WAAW,CAAChP,SAAS,CAAC;MACvF,IAAI+O,wBAAwB,GAAGjW,IAAI,CAACD,GAAG,CAAC,CAAC,EAAE;QACvC1iB,MAAM,CAACiK,KAAK,CACR,0CAAAjC,MAAA,CAA0CgjB,MAAM,OAAAhjB,MAAA,CAAI6hB,SAAS,gDAAA7hB,MAAA,CACnB,IAAI2a,IAAI,CAACiW,wBAAwB,CAAC,CAACE,WAAW,CAAC,CAAC,CAC9F,CAAC;QACD,MAAMN,OAAI,CAACltB,SAAS,CAACytB,oBAAoB,CAAClP,SAAS,EAAE,QAAQ,EAAE,IAAI,CAAC;QACpE6O,eAAe,CAAC,CAAC;QACjB;MACJ;;MAEA;MACAC,+BAA+B,CAACtuB,GAAG,CAACwf,SAAS,EAAElH,IAAI,CAACD,GAAG,CAAC,CAAC,GAAG/d,+BAA+B,CAAC;;MAE5F;MACA;MACA;MACA;MACA,IAAIwO,MAAM,GAAGqlB,OAAI,CAACnyB,UAAU,CAACkkB,sBAAsB,CAACxa,SAAS,EAAE8Z,SAAS,CAAC;MACzE,IAAI,CAAC1W,MAAM,EAAE;QACT;QACA;QACA,MAAMqlB,OAAI,CAAChoB,YAAY,CAAC,CAACwa,MAAM,CAAC,EAAE,KAAK,CAAC;QACxC7X,MAAM,GAAGqlB,OAAI,CAACnyB,UAAU,CAACkkB,sBAAsB,CAACxa,SAAS,EAAE8Z,SAAS,CAAC;QACrE,IAAI,CAAC1W,MAAM,EAAE;UACTnT,MAAM,CAAC8W,IAAI,CAAC,wCAAwC,GAAG+S,SAAS,GAAG,+BAA+B,CAAC;UACnG,MAAM2O,OAAI,CAACltB,SAAS,CAACytB,oBAAoB,CAAClP,SAAS,EAAE,QAAQ,EAAE,KAAK,CAAC;UACrE6O,eAAe,CAAC,CAAC;UACjB;QACJ;MACJ;MACA,IAAMnK,aAAa,GAAG,IAAItoB,GAAG,CAAC,CAAC,CAAC+kB,MAAM,EAAE,CAAC7X,MAAM,CAAC,CAAC,CAAC,CAAC;MACnD,MAAMjT,MAAM,CAACuuB,2BAA2B,CAAC+J,OAAI,CAACltB,SAAS,EAAEktB,OAAI,CAAC/yB,QAAQ,EAAE8oB,aAAa,EAAE,IAAI,CAAC;MAE5FoK,+BAA+B,CAACtuB,GAAG,CAACwf,SAAS,EAAElH,IAAI,CAACD,GAAG,CAAC,CAAC,GAAGhe,6BAA6B,CAAC;;MAE1F;MACA;MACA;MACA;MACA;MACA;MACA,IAAMisB,gBAAmC,GAAG;QACxC5gB,SAAS,EAAE7P,MAAM,CAACk1B,aAAa;QAC/BC,UAAU,EAAEmD,OAAI,CAACltB,SAAS,CAAC4B,mBAAoB;QAC/CooB,UAAU,EAAE,CAAC,CAAC;QACd,CAACx1B,iBAAiB,GAAGF,MAAM,CAAC;MAChC,CAAC;MACD,MAAMM,MAAM,CAACq1B,uBAAuB,CAChC5E,gBAAgB,CAAC2E,UAAU,EAC3BkD,OAAI,CAAC9yB,MAAM,EACX8yB,OAAI,CAAC7yB,QAAQ,EACb6yB,OAAI,CAACltB,SAAS,EACd0f,MAAM,EACN7X,MAAM,EACN;QAAE7G,IAAI,EAAE;MAAU,CACtB,CAAC;MAED,MAAMksB,OAAI,CAACltB,SAAS,CAACytB,oBAAoB,CAAClP,SAAS,EAAE,QAAQ,EAAE,IAAI,CAAC;MACpE6O,eAAe,CAAC,CAAC;MAEjB,MAAMF,OAAI,CAAC/yB,QAAQ,CAACuzB,YAAY,CAC5B,kBAAkB,EAClB,IAAI/yB,GAAG,CAAC,CAAC,CAAC+kB,MAAM,EAAE,IAAI/kB,GAAG,CAAC,CAAC,CAACkN,MAAM,CAACxN,QAAQ,EAAEgrB,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CACtE,CAAC;;MAED;MACA;MACA;MACA;MACA,IAAMsI,gBAAgB,SAAST,OAAI,CAACzsB,6BAA6B,CAACmtB,6BAA6B,CAC3FlO,MAAM,EACN7X,MAAM,CAACxN,QACX,CAAC;MACD,KAAK,IAAMwzB,MAAM,IAAIF,gBAAgB,EAAE;QACnCT,OAAI,CAAC1G,cAAc,CAACqH,MAAM,CAACrU,WAAW,EAAEqU,MAAM,CAACpH,UAAU,EAAE,IAAI,CAAC;MACpE;IAAC;EACL;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;EACYnqB,gBAAgBA,CAACH,KAAkB,EAAEC,MAAkB,EAAEC,aAAsB,EAAQ;IAC3F;IACA;IACA;IACA;IACA;IACA;IACA;;IAEA,IAAMkgB,MAAM,GAAGngB,MAAM,CAACmgB,MAAM;IAE5B,IAAMqE,GAAG,GAAG,IAAI,CAACC,cAAc,CAACthB,GAAG,CAACgd,MAAM,CAAC;IAC3C,IAAI,CAACqE,GAAG,EAAE;MACN;MACA;IACJ;IACA;IACA;IACA;IACA;IACA,IAAIrE,MAAM,IAAI,IAAI,CAACsG,uBAAuB,EAAE;MAAA,IAAAiL,qBAAA;MACxC,IAAI1xB,MAAM,CAAC2xB,UAAU,IAAIv1B,eAAe,CAACuwB,IAAI,EAAE;QAC3Cr0B,MAAM,CAAC+H,GAAG,CAAC,iBAAiB,GAAGL,MAAM,CAAChC,MAAM,GAAG,MAAM,GAAGmiB,MAAM,CAAC;QAC/D;QACA,IAAI,CAACxhB,UAAU,CAAC2H,uBAAuB,CAACtG,MAAM,CAAChC,MAAM,CAAC;MAC1D,CAAC,MAAM,IACHgC,MAAM,CAAC2xB,UAAU,IAAIv1B,eAAe,CAACwwB,MAAM,KAAA8E,qBAAA,GAC3C,IAAI,CAACxzB,WAAW,CAAC4mB,OAAO,CAAC3E,MAAM,CAAC,cAAAuR,qBAAA,eAAhCA,qBAAA,CAAkCE,8BAA8B,CAAC,CAAC,EACpE;QACEt5B,MAAM,CAAC+H,GAAG,CAAC,mBAAmB,GAAGL,MAAM,CAAChC,MAAM,GAAG,MAAM,GAAGmiB,MAAM,CAAC;QACjE,IAAI,CAACxhB,UAAU,CAAC2H,uBAAuB,CAACtG,MAAM,CAAChC,MAAM,CAAC;MAC1D;IACJ;IAEAwmB,GAAG,CAACtkB,gBAAgB,CAACH,KAAK,EAAEC,MAAM,EAAEC,aAAa,CAAC;EACtD;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACYU,qBAAqBA,CAACZ,KAAkB,EAAQ;IACpD,IAAM+oB,OAAO,GAAG/oB,KAAK,CAACU,UAAU,CAAC,CAAC;IAClC,IAAIqoB,OAAO,CAAC+I,MAAM,KAAK,SAAS,EAAE;MAC9B;MACA;MACA;MACA,IAAMC,GAAG,GAAG,IAAIC,sBAAsB,CAAChyB,KAAK,CAAC;MAC7C,IAAI,CAACiyB,uBAAuB,CAACtc,IAAI,CAACoc,GAAG,CAAC;IAC1C,CAAC,MAAM,IAAIhJ,OAAO,CAAC+I,MAAM,KAAK,sBAAsB,EAAE;MAClD,IAAMC,IAAG,GAAG,IAAIG,kCAAkC,CAAClyB,KAAK,CAAC;MACzD,IAAI,CAACmyB,mCAAmC,CAACxc,IAAI,CAACoc,IAAG,CAAC;IACtD;EACJ;;EAEA;AACJ;AACA;AACA;AACA;AACA;EACkBnG,8BAA8BA,CAAA,EAAkB;IAAA,IAAAwG,OAAA;IAAA,OAAA1zB,iBAAA;MAC1D,IAAI0zB,OAAI,CAACC,yBAAyB,EAAE;QAChC;QACA;QACA;MACJ;MACAD,OAAI,CAACC,yBAAyB,GAAG,IAAI;MAErC,IAAI;QACA;QACA;QACA,IAAMC,QAAQ,GAAGF,OAAI,CAACH,uBAAuB;QAC7CG,OAAI,CAACH,uBAAuB,GAAG,EAAE;QACjC,IAAMM,aAAa,GAAGH,OAAI,CAACD,mCAAmC;QAC9DC,OAAI,CAACD,mCAAmC,GAAG,EAAE;;QAE7C;QACA;QACA;QACA;QACA;QACA;QACA;QACA,MAAMjgB,OAAO,CAACkL,GAAG,CAACkV,QAAQ,CAACjd,GAAG,CAAE0c,GAAG,IAAKK,OAAI,CAACI,6BAA6B,CAACT,GAAG,CAAC,CAAC,CAAC;QACjF,MAAM7f,OAAO,CAACkL,GAAG,CACbmV,aAAa,CAACld,GAAG,CAAEod,YAAY,IAAKL,OAAI,CAACM,yCAAyC,CAACD,YAAY,CAAC,CACpG,CAAC;MACL,CAAC,CAAC,OAAOryB,CAAC,EAAE;QACR7H,MAAM,CAAC8H,KAAK,uCAAAE,MAAA,CAAuCH,CAAC,CAAE,CAAC;MAC3D,CAAC,SAAS;QACNgyB,OAAI,CAACC,yBAAyB,GAAG,KAAK;MAC1C;IAAC;EACL;;EAEA;AACJ;AACA;AACA;EACkBG,6BAA6BA,CAACT,GAA2B,EAAiB;IAAA,IAAAY,OAAA;IAAA,OAAAj0B,iBAAA;MACpF,IAAMT,MAAM,GAAG8zB,GAAG,CAAC9zB,MAAM;MACzB,IAAMC,QAAQ,GAAG6zB,GAAG,CAAC7zB,QAAQ;MAE7B,IAAM00B,IAAI,GAAGb,GAAG,CAAC1U,WAAW;MAC5B,IAAM+C,MAAM,GAAGwS,IAAI,CAACvK,OAAO;MAC3B,IAAM5D,GAAG,GAAGmO,IAAI,CAACtqB,SAAS;MAE1B/P,MAAM,CAAC+H,GAAG,CACN,2BAAAC,MAAA,CAA2BtC,MAAM,OAAAsC,MAAA,CAAIrC,QAAQ,YAAAqC,MAAA,CACjC6f,MAAM,SAAA7f,MAAA,CAAMqyB,IAAI,CAAC1D,UAAU,WAAA3uB,MAAA,CAAQwxB,GAAG,CAACc,SAAS,MAChE,CAAC;MAED,IAAI50B,MAAM,KAAK00B,OAAI,CAAC10B,MAAM,EAAE;QACxB,IAAI,CAAC00B,OAAI,CAACjO,cAAc,CAACthB,GAAG,CAACgd,MAAM,CAAC,EAAE;UAClC7nB,MAAM,CAACiK,KAAK,0CAAAjC,MAAA,CAA0C6f,MAAM,CAAE,CAAC;UAC/D;QACJ;QACA,IAAM0S,SAAS,GAAGH,OAAI,CAACjO,cAAc,CAACthB,GAAG,CAACgd,MAAM,CAAE;QAClD,IAAM1U,MAAM,GAAGinB,OAAI,CAAC/zB,UAAU,CAAC4I,eAAe,CAACvJ,MAAM,EAAEC,QAAQ,CAAC;QAChE,IAAI,CAACwN,MAAM,EAAE;UACTnT,MAAM,CAACiK,KAAK,yCAAAjC,MAAA,CAAyCtC,MAAM,OAAAsC,MAAA,CAAIrC,QAAQ,CAAE,CAAC;UAC1E;QACJ;QAEA,IAAI;UACA,MAAM40B,SAAS,CAACC,oBAAoB,CAAEH,IAAI,CAAChF,UAAU,EAAEgF,IAAI,CAAC1D,UAAU,EAAEjxB,MAAM,EAAEyN,MAAM,CAAC;QAC3F,CAAC,CAAC,OAAOtL,CAAC,EAAE;UACR7H,MAAM,CAACsK,IAAI,CACP,sCAAsC,GAClC+vB,IAAI,CAAC1D,UAAU,GACf,eAAe,GACfjxB,MAAM,GACN,GAAG,GACHyN,MAAM,CAACxN,QAAQ,EACnBkC,CACJ,CAAC;QACL;QACA;MACJ;MAEA,IAAIlC,QAAQ,KAAKy0B,OAAI,CAACz0B,QAAQ,EAAE;QAC5B;QACA;QACA;QACA;QACA;QACA;QACA;QACA;QACA3F,MAAM,CAAC+H,GAAG,CAAC,0CAA0C,CAAC;QACtD;MACJ;;MAEA;MACA;;MAEA;MACA;MACA,IAAI,CAACqyB,OAAI,CAACvD,cAAc,CAACrY,GAAG,CAACqJ,MAAM,CAAC,EAAE;QAClC7nB,MAAM,CAAC+H,GAAG,0CAAAC,MAAA,CAA0C6f,MAAM,CAAE,CAAC;QAC7D;MACJ;MAEA,IAAMkP,SAAS,GAAGqD,OAAI,CAACvD,cAAc,CAAChsB,GAAG,CAACgd,MAAM,CAAC,CAAEhd,GAAG,CAACqhB,GAAG,CAAC;MAC3D,IAAI,CAAC6K,SAAS,EAAE;QACZ/2B,MAAM,CAAC+H,GAAG,qCAAAC,MAAA,CAAqCkkB,GAAG,eAAAlkB,MAAA,CAAY6f,MAAM,CAAE,CAAC;QACvE;MACJ;MAEA,IAAI,QAAQkP,SAAS,CAAC0D,oBAAoB,CAACjB,GAAG,CAAC,CAAC,EAAE;QAC9Cx5B,MAAM,CAAC+H,GAAG,CAAC,wCAAAC,MAAA,CAAwC6f,MAAM,WAAQwS,IAAI,CAAC1D,UAAU,CAAC;QACjF;MACJ;MAEA6C,GAAG,CAACkB,KAAK,GAAG,MAAY;QACpB3D,SAAS,CAAC4D,mBAAmB,CAACnB,GAAG,CAAC;MACtC,CAAC;;MAED;MACA,IAAIY,OAAI,CAACtrB,gBAAgB,CAACpJ,MAAM,EAAEC,QAAQ,CAAC,CAACgX,UAAU,CAAC,CAAC,EAAE;QACtD3c,MAAM,CAAC+H,GAAG,CAAC,0CAA0C,CAAC;QACtDyxB,GAAG,CAACkB,KAAK,CAAC,CAAC;QACX;MACJ;MAEAN,OAAI,CAACtzB,IAAI,CAACxD,WAAW,CAACs3B,cAAc,EAAEpB,GAAG,CAAC;IAAC;EAC/C;;EAEA;AACJ;AACA;AACA;EACkBW,yCAAyCA,CACnDD,YAAgD,EACnC;IAAA,IAAAW,OAAA;IAAA,OAAA10B,iBAAA;MACbnG,MAAM,CAAC+H,GAAG,CACN,uCAAAC,MAAA,CAAuCkyB,YAAY,CAACx0B,MAAM,YAAAsC,MAAA,CACnDkyB,YAAY,CAACv0B,QAAQ,WAAAqC,MAAA,CAAQkyB,YAAY,CAACI,SAAS,MAC9D,CAAC;;MAED;MACA;MACA;MACAO,OAAI,CAAC/zB,IAAI,CAACxD,WAAW,CAACw3B,0BAA0B,EAAEZ,YAAY,CAAC;IAAC;EACpE;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;EACWnK,gBAAgBA,CAAClI,MAAqB,EAAE9X,SAAiB,EAAuB;IACnF,IAAIgrB,UAAwD;IAC5D,IAAI7O,GAAoC;IAExC,IAAIrE,MAAM,EAAE;MACRkT,UAAU,GAAG,IAAI,CAAClE,cAAc,CAAChsB,GAAG,CAACgd,MAAM,CAAC;MAC5C,IAAI,CAACkT,UAAU,EAAE;QACbA,UAAU,GAAG,IAAI90B,GAAG,CAA8B,CAAC;QACnD,IAAI,CAAC4wB,cAAc,CAACxsB,GAAG,CAACwd,MAAM,EAAEkT,UAAU,CAAC;MAC/C;MAEA7O,GAAG,GAAG6O,UAAU,CAAClwB,GAAG,CAACkF,SAAS,CAAC;MAC/B,IAAImc,GAAG,EAAE;QACL,OAAOA,GAAG;MACd;IACJ;IAEA,IAAMgB,QAAQ,GAAG7sB,UAAU,CAACyL,kBAAkB,CAACjB,GAAG,CAACkF,SAAS,CAAC;IAC7D,IAAI,CAACmd,QAAQ,EAAE;MACX,MAAM,IAAIxqB,eAAe,CACrBQ,qBAAqB,CAAC83B,4BAA4B,EAClD,gCAAgC,GAAGjrB,SAAS,GAAG,IACnD,CAAC;IACL;IACAmc,GAAG,GAAG,IAAIgB,QAAQ,CAAC;MACfxnB,MAAM,EAAE,IAAI,CAACA,MAAM;MACnB0nB,MAAM,EAAE,IAAI;MACZ9hB,SAAS,EAAE,IAAI,CAACA,SAAS;MACzB7F,QAAQ,EAAE,IAAI,CAACA,QAAQ;MACvBoiB,MAAM,EAAEA,MAAM,aAANA,MAAM,cAANA,MAAM,GAAIne;IACtB,CAAC,CAAC;IAEF,IAAIqxB,UAAU,EAAE;MACZA,UAAU,CAAC1wB,GAAG,CAAC0F,SAAS,EAAEmc,GAAG,CAAC;IAClC;IACA,OAAOA,GAAG;EACd;;EAEA;AACJ;AACA;AACA;AACA;AACA;AACA;EACY4K,iBAAiBA,CAAC/mB,SAAiB,EAAyB;IAChE,IAAMgrB,UAAiC,GAAG,EAAE;IAC5C,KAAK,IAAME,CAAC,IAAI,IAAI,CAACpE,cAAc,CAAC9P,MAAM,CAAC,CAAC,EAAE;MAC1C,IAAIkU,CAAC,CAACzc,GAAG,CAACzO,SAAS,CAAC,EAAE;QAClBgrB,UAAU,CAAC3d,IAAI,CAAC6d,CAAC,CAACpwB,GAAG,CAACkF,SAAS,CAAE,CAAC;MACtC;IACJ;IACA,OAAOgrB,UAAU;EACrB;;EAEA;AACJ;AACA;AACA;AACA;EACiB/nB,UAAUA,CAAqCkoB,GAAM,EAAiB;IAAA,IAAAC,OAAA;IAAA,OAAAh1B,iBAAA;MAC/E,IAAMi1B,IAAI,GAAG,IAAIn1B,GAAG,CAACsE,MAAM,CAACC,OAAO,CAAC0wB,GAAG,CAACle,UAAU,IAAI,CAAC,CAAC,CAAC,CAAC;MAC1D,IAAMyU,QAAQ,GAAGyJ,GAAG,CAACzJ,QAAQ;MAE7B,OAAOyJ,GAAG,CAACle,UAAU;MACrB,OAAOke,GAAG,CAACzJ,QAAQ;MAEnB,IAAM4J,cAAc,GAAGD,IAAI,CAACvwB,GAAG,CAACswB,OAAI,CAACz1B,MAAM,CAAC,IAAI,CAAC,CAAC;MAClD01B,IAAI,CAAC/wB,GAAG,CAAC8wB,OAAI,CAACz1B,MAAM,EAAE21B,cAAc,CAAC;MACrCA,cAAc,CAAC,UAAU,GAAGF,OAAI,CAACx1B,QAAQ,CAAC,SAASw1B,OAAI,CAAC7vB,SAAS,CAACgwB,IAAI,CAAC57B,WAAW,CAACqtB,SAAS,CAACmO,GAAG,CAAC,CAAC;MAClGA,GAAG,CAACle,UAAU,GAAGna,oBAAoB,CAACu4B,IAAI,CAAC;MAC3C,IAAI3J,QAAQ,KAAK/nB,SAAS,EAAEwxB,GAAG,CAACzJ,QAAQ,GAAGA,QAAQ;IAAC;EACxD;;EAEA;AACJ;AACA;AACA;EACW8J,eAAeA,CAAC1T,MAAc,EAAW;IAC5C,OAAO,IAAI,CAAC3d,QAAQ,CAACqxB,eAAe,CAAC1T,MAAM,CAAC;EAChD;;EAEA;AACJ;AACA;EACiB2T,yBAAyBA,CAAC3T,MAAc,EAAoB;IAAA,IAAA4T,OAAA;IAAA,OAAAt1B,iBAAA;MACrE,OAAOs1B,OAAI,CAACF,eAAe,CAAC1T,MAAM,CAAC;IAAC;EACxC;;EAEA;AACJ;AACA;AACA;EACWgF,iBAAiBA,CAAChF,MAAc,EAA0B;IAC7D,OAAO,IAAI,CAAC3d,QAAQ,CAAC2iB,iBAAiB,CAAChF,MAAM,CAAC;EAClD;;EAEA;AACJ;AACA;AACA;EACiB6T,sBAAsBA,CAAA,EAAqB;IAAA,OAAAv1B,iBAAA;MACpD,OAAO,KAAK;IAAC;EACjB;;EAEA;AACJ;AACA;EACiBw1B,gBAAgBA,CAACC,YAAsB,EAAiB;IAAA,OAAAz1B,iBAAA;MACjE,MAAM,IAAIkF,KAAK,CAAC,iBAAiB,CAAC;IAAC;EACvC;;EAEA;AACJ;AACA;EACWwwB,gBAAgBA,CAAC5mB,IAA0B,EAAmC;IACjF,MAAM,IAAI5J,KAAK,CAAC,iBAAiB,CAAC;EACtC;;EAEA;AACJ;AACA;EACWywB,8BAA8BA,CACjChsB,UAAkB,EAClBmF,IAA0B,EACK;IAC/B,MAAM,IAAI5J,KAAK,CAAC,iBAAiB,CAAC;EACtC;AACJ;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASN,YAAYA,CAAC2E,GAAY,EAAiB;EACtD,IAAI,OAAOA,GAAG,KAAK,QAAQ,IAAIA,GAAG,CAACqsB,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE;IACjD,OAAO,IAAI;EACf;EACA,IAAMjxB,QAAQ,GAAGwM,UAAU,CAACzL,IAAI,CAAC6D,GAAG,CAACwN,KAAK,CAAC,GAAG,CAAC,EAAG8e,CAAC,IAAKC,QAAQ,CAACD,CAAC,CAAC,CAAC;EACpE,OAAOn4B,YAAY,CAACiH,QAAQ,CAAC;AACjC;;AAEA;AACA;AACA;AACA,OAAO,MAAM2uB,sBAAsB,CAAC;EAezBj0B,WAAWA,CAACiC,KAAkB,EAAE;IAdvC;IAAAzB,eAAA;IAEA;IAAAA,eAAA;IAEA;IAAAA,eAAA;IAAAA,eAAA;IAGA;AACJ;AACA;AACA;AACA;IAJIA,eAAA;IAQI,IAAMwqB,OAAO,GAAG/oB,KAAK,CAACU,UAAU,CAAC,CAAC;IAElC,IAAI,CAACzC,MAAM,GAAG+B,KAAK,CAACS,SAAS,CAAC,CAAE;IAChC,IAAI,CAACvC,QAAQ,GAAG6qB,OAAO,CAAC0L,oBAAoB;IAC5C,IAAI,CAAC5B,SAAS,GAAG9J,OAAO,CAAC2L,UAAU;IACnC,IAAI,CAACrX,WAAW,GAAG0L,OAAO,CAAC6J,IAAI,IAAI,CAAC,CAAC;IACrC,IAAI,CAACK,KAAK,GAAG,MAAY;MACrB,MAAM,IAAIrvB,KAAK,CAAC,mDAAmD,CAAC;IACxE,CAAC;EACL;AACJ;;AAEA;AACA;AACA;AACA,MAAMsuB,kCAAkC,CAAC;EAQ9Bn0B,WAAWA,CAACiC,KAAkB,EAAE;IAPvC;IAAAzB,eAAA;IAEA;IAAAA,eAAA;IAEA;IAAAA,eAAA;IAII,IAAMwqB,OAAO,GAAG/oB,KAAK,CAACU,UAAU,CAAC,CAAC;IAElC,IAAI,CAACzC,MAAM,GAAG+B,KAAK,CAACS,SAAS,CAAC,CAAE;IAChC,IAAI,CAACvC,QAAQ,GAAG6qB,OAAO,CAAC0L,oBAAoB;IAC5C,IAAI,CAAC5B,SAAS,GAAG9J,OAAO,CAAC2L,UAAU;EACvC;AACJ;;AAEA","ignoreList":[]}