@workos-inc/node 8.9.0 → 8.11.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +0,0 @@
1
- {"version":3,"file":"webapi-oTg8yaNv.mjs","names":["encode","decrypt","getCryptoKey","wrap","unwrap","deriveKey","encode","encode","wrap","aeskw.wrap","b64u","unwrap","aeskw.unwrap","subtleAlgorithm","encrypt","decodeBase64URL","b64u","decrypt","ecdhes.allowed","b64u","ecdhes.deriveKey","aeskw.unwrap","rsaes.decrypt","pbes2kw.unwrap","aesGcmKw","jwk.isJWK","jwk.isSecretJWK","invalidKeyInput","jwk.isPrivateJWK","jwk.isPublicJWK","b64u","encode","decrypt","b64u","exportPublic","exportPrivate","ecdhes.allowed","ecdhes.deriveKey","b64u","aeskw.wrap","rsaes.encrypt","pbes2kw.wrap","aesGcmKw","#plaintext","#keyManagementParameters","#protectedHeader","#sharedUnprotectedHeader","#unprotectedHeader","#aad","#cek","#iv","b64u","encode","#parent","#plaintext","#recipients","#protectedHeader","#unprotectedHeader","#aad","b64u","b64u","encode","#payload","#flattened","#payload","#protectedHeader","#unprotectedHeader","b64u","encode","#flattened","#parent","#payload","#signatures","#jwt","#protectedHeader","#jwt","#protectedHeader","#keyManagementParameters","#cek","#iv","#replicateIssuerAsHeader","#replicateSubjectAsHeader","#replicateAudienceAsHeader","encode","b64u","#jwks","#cached","#url","#timeoutDuration","#cooldownDuration","#cacheMaxAge","#headers","#customFetch","#cache","#jwksTimestamp","#local","#pendingFetch","#jwt","b64u.encode","b64u.decode","b64u","b64u"],"sources":["../node_modules/jose/dist/webapi/lib/buffer_utils.js","../node_modules/jose/dist/webapi/lib/base64.js","../node_modules/jose/dist/webapi/util/base64url.js","../node_modules/jose/dist/webapi/util/errors.js","../node_modules/jose/dist/webapi/lib/iv.js","../node_modules/jose/dist/webapi/lib/check_iv_length.js","../node_modules/jose/dist/webapi/lib/check_cek_length.js","../node_modules/jose/dist/webapi/lib/crypto_key.js","../node_modules/jose/dist/webapi/lib/invalid_key_input.js","../node_modules/jose/dist/webapi/lib/is_key_like.js","../node_modules/jose/dist/webapi/lib/decrypt.js","../node_modules/jose/dist/webapi/lib/is_disjoint.js","../node_modules/jose/dist/webapi/lib/is_object.js","../node_modules/jose/dist/webapi/lib/aeskw.js","../node_modules/jose/dist/webapi/lib/digest.js","../node_modules/jose/dist/webapi/lib/ecdhes.js","../node_modules/jose/dist/webapi/lib/pbes2kw.js","../node_modules/jose/dist/webapi/lib/check_key_length.js","../node_modules/jose/dist/webapi/lib/rsaes.js","../node_modules/jose/dist/webapi/lib/cek.js","../node_modules/jose/dist/webapi/lib/asn1.js","../node_modules/jose/dist/webapi/lib/jwk_to_key.js","../node_modules/jose/dist/webapi/key/import.js","../node_modules/jose/dist/webapi/lib/encrypt.js","../node_modules/jose/dist/webapi/lib/aesgcmkw.js","../node_modules/jose/dist/webapi/lib/decrypt_key_management.js","../node_modules/jose/dist/webapi/lib/validate_crit.js","../node_modules/jose/dist/webapi/lib/validate_algorithms.js","../node_modules/jose/dist/webapi/lib/is_jwk.js","../node_modules/jose/dist/webapi/lib/normalize_key.js","../node_modules/jose/dist/webapi/lib/check_key_type.js","../node_modules/jose/dist/webapi/lib/deflate.js","../node_modules/jose/dist/webapi/jwe/flattened/decrypt.js","../node_modules/jose/dist/webapi/jwe/compact/decrypt.js","../node_modules/jose/dist/webapi/jwe/general/decrypt.js","../node_modules/jose/dist/webapi/lib/private_symbols.js","../node_modules/jose/dist/webapi/lib/key_to_jwk.js","../node_modules/jose/dist/webapi/key/export.js","../node_modules/jose/dist/webapi/lib/encrypt_key_management.js","../node_modules/jose/dist/webapi/jwe/flattened/encrypt.js","../node_modules/jose/dist/webapi/jwe/general/encrypt.js","../node_modules/jose/dist/webapi/lib/subtle_dsa.js","../node_modules/jose/dist/webapi/lib/get_sign_verify_key.js","../node_modules/jose/dist/webapi/lib/verify.js","../node_modules/jose/dist/webapi/jws/flattened/verify.js","../node_modules/jose/dist/webapi/jws/compact/verify.js","../node_modules/jose/dist/webapi/jws/general/verify.js","../node_modules/jose/dist/webapi/lib/jwt_claims_set.js","../node_modules/jose/dist/webapi/jwt/verify.js","../node_modules/jose/dist/webapi/jwt/decrypt.js","../node_modules/jose/dist/webapi/jwe/compact/encrypt.js","../node_modules/jose/dist/webapi/lib/sign.js","../node_modules/jose/dist/webapi/jws/flattened/sign.js","../node_modules/jose/dist/webapi/jws/compact/sign.js","../node_modules/jose/dist/webapi/jws/general/sign.js","../node_modules/jose/dist/webapi/jwt/sign.js","../node_modules/jose/dist/webapi/jwt/encrypt.js","../node_modules/jose/dist/webapi/jwk/thumbprint.js","../node_modules/jose/dist/webapi/jwk/embedded.js","../node_modules/jose/dist/webapi/jwks/local.js","../node_modules/jose/dist/webapi/jwks/remote.js","../node_modules/jose/dist/webapi/jwt/unsecured.js","../node_modules/jose/dist/webapi/util/decode_protected_header.js","../node_modules/jose/dist/webapi/util/decode_jwt.js","../node_modules/jose/dist/webapi/key/generate_key_pair.js","../node_modules/jose/dist/webapi/key/generate_secret.js","../node_modules/jose/dist/webapi/index.js"],"sourcesContent":["export const encoder = new TextEncoder();\nexport const decoder = new TextDecoder();\nconst MAX_INT32 = 2 ** 32;\nexport function concat(...buffers) {\n const size = buffers.reduce((acc, { length }) => acc + length, 0);\n const buf = new Uint8Array(size);\n let i = 0;\n for (const buffer of buffers) {\n buf.set(buffer, i);\n i += buffer.length;\n }\n return buf;\n}\nfunction writeUInt32BE(buf, value, offset) {\n if (value < 0 || value >= MAX_INT32) {\n throw new RangeError(`value must be >= 0 and <= ${MAX_INT32 - 1}. Received ${value}`);\n }\n buf.set([value >>> 24, value >>> 16, value >>> 8, value & 0xff], offset);\n}\nexport function uint64be(value) {\n const high = Math.floor(value / MAX_INT32);\n const low = value % MAX_INT32;\n const buf = new Uint8Array(8);\n writeUInt32BE(buf, high, 0);\n writeUInt32BE(buf, low, 4);\n return buf;\n}\nexport function uint32be(value) {\n const buf = new Uint8Array(4);\n writeUInt32BE(buf, value);\n return buf;\n}\nexport function encode(string) {\n const bytes = new Uint8Array(string.length);\n for (let i = 0; i < string.length; i++) {\n const code = string.charCodeAt(i);\n if (code > 127) {\n throw new TypeError('non-ASCII string encountered in encode()');\n }\n bytes[i] = code;\n }\n return bytes;\n}\n","export function encodeBase64(input) {\n if (Uint8Array.prototype.toBase64) {\n return input.toBase64();\n }\n const CHUNK_SIZE = 0x8000;\n const arr = [];\n for (let i = 0; i < input.length; i += CHUNK_SIZE) {\n arr.push(String.fromCharCode.apply(null, input.subarray(i, i + CHUNK_SIZE)));\n }\n return btoa(arr.join(''));\n}\nexport function decodeBase64(encoded) {\n if (Uint8Array.fromBase64) {\n return Uint8Array.fromBase64(encoded);\n }\n const binary = atob(encoded);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes;\n}\n","import { encoder, decoder } from '../lib/buffer_utils.js';\nimport { encodeBase64, decodeBase64 } from '../lib/base64.js';\nexport function decode(input) {\n if (Uint8Array.fromBase64) {\n return Uint8Array.fromBase64(typeof input === 'string' ? input : decoder.decode(input), {\n alphabet: 'base64url',\n });\n }\n let encoded = input;\n if (encoded instanceof Uint8Array) {\n encoded = decoder.decode(encoded);\n }\n encoded = encoded.replace(/-/g, '+').replace(/_/g, '/');\n try {\n return decodeBase64(encoded);\n }\n catch {\n throw new TypeError('The input to be decoded is not correctly encoded.');\n }\n}\nexport function encode(input) {\n let unencoded = input;\n if (typeof unencoded === 'string') {\n unencoded = encoder.encode(unencoded);\n }\n if (Uint8Array.prototype.toBase64) {\n return unencoded.toBase64({ alphabet: 'base64url', omitPadding: true });\n }\n return encodeBase64(unencoded).replace(/=/g, '').replace(/\\+/g, '-').replace(/\\//g, '_');\n}\n","export class JOSEError extends Error {\n static code = 'ERR_JOSE_GENERIC';\n code = 'ERR_JOSE_GENERIC';\n constructor(message, options) {\n super(message, options);\n this.name = this.constructor.name;\n Error.captureStackTrace?.(this, this.constructor);\n }\n}\nexport class JWTClaimValidationFailed extends JOSEError {\n static code = 'ERR_JWT_CLAIM_VALIDATION_FAILED';\n code = 'ERR_JWT_CLAIM_VALIDATION_FAILED';\n claim;\n reason;\n payload;\n constructor(message, payload, claim = 'unspecified', reason = 'unspecified') {\n super(message, { cause: { claim, reason, payload } });\n this.claim = claim;\n this.reason = reason;\n this.payload = payload;\n }\n}\nexport class JWTExpired extends JOSEError {\n static code = 'ERR_JWT_EXPIRED';\n code = 'ERR_JWT_EXPIRED';\n claim;\n reason;\n payload;\n constructor(message, payload, claim = 'unspecified', reason = 'unspecified') {\n super(message, { cause: { claim, reason, payload } });\n this.claim = claim;\n this.reason = reason;\n this.payload = payload;\n }\n}\nexport class JOSEAlgNotAllowed extends JOSEError {\n static code = 'ERR_JOSE_ALG_NOT_ALLOWED';\n code = 'ERR_JOSE_ALG_NOT_ALLOWED';\n}\nexport class JOSENotSupported extends JOSEError {\n static code = 'ERR_JOSE_NOT_SUPPORTED';\n code = 'ERR_JOSE_NOT_SUPPORTED';\n}\nexport class JWEDecryptionFailed extends JOSEError {\n static code = 'ERR_JWE_DECRYPTION_FAILED';\n code = 'ERR_JWE_DECRYPTION_FAILED';\n constructor(message = 'decryption operation failed', options) {\n super(message, options);\n }\n}\nexport class JWEInvalid extends JOSEError {\n static code = 'ERR_JWE_INVALID';\n code = 'ERR_JWE_INVALID';\n}\nexport class JWSInvalid extends JOSEError {\n static code = 'ERR_JWS_INVALID';\n code = 'ERR_JWS_INVALID';\n}\nexport class JWTInvalid extends JOSEError {\n static code = 'ERR_JWT_INVALID';\n code = 'ERR_JWT_INVALID';\n}\nexport class JWKInvalid extends JOSEError {\n static code = 'ERR_JWK_INVALID';\n code = 'ERR_JWK_INVALID';\n}\nexport class JWKSInvalid extends JOSEError {\n static code = 'ERR_JWKS_INVALID';\n code = 'ERR_JWKS_INVALID';\n}\nexport class JWKSNoMatchingKey extends JOSEError {\n static code = 'ERR_JWKS_NO_MATCHING_KEY';\n code = 'ERR_JWKS_NO_MATCHING_KEY';\n constructor(message = 'no applicable key found in the JSON Web Key Set', options) {\n super(message, options);\n }\n}\nexport class JWKSMultipleMatchingKeys extends JOSEError {\n [Symbol.asyncIterator];\n static code = 'ERR_JWKS_MULTIPLE_MATCHING_KEYS';\n code = 'ERR_JWKS_MULTIPLE_MATCHING_KEYS';\n constructor(message = 'multiple matching keys found in the JSON Web Key Set', options) {\n super(message, options);\n }\n}\nexport class JWKSTimeout extends JOSEError {\n static code = 'ERR_JWKS_TIMEOUT';\n code = 'ERR_JWKS_TIMEOUT';\n constructor(message = 'request timed out', options) {\n super(message, options);\n }\n}\nexport class JWSSignatureVerificationFailed extends JOSEError {\n static code = 'ERR_JWS_SIGNATURE_VERIFICATION_FAILED';\n code = 'ERR_JWS_SIGNATURE_VERIFICATION_FAILED';\n constructor(message = 'signature verification failed', options) {\n super(message, options);\n }\n}\n","import { JOSENotSupported } from '../util/errors.js';\nexport function bitLength(alg) {\n switch (alg) {\n case 'A128GCM':\n case 'A128GCMKW':\n case 'A192GCM':\n case 'A192GCMKW':\n case 'A256GCM':\n case 'A256GCMKW':\n return 96;\n case 'A128CBC-HS256':\n case 'A192CBC-HS384':\n case 'A256CBC-HS512':\n return 128;\n default:\n throw new JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);\n }\n}\nexport const generateIv = (alg) => crypto.getRandomValues(new Uint8Array(bitLength(alg) >> 3));\n","import { JWEInvalid } from '../util/errors.js';\nimport { bitLength } from './iv.js';\nexport function checkIvLength(enc, iv) {\n if (iv.length << 3 !== bitLength(enc)) {\n throw new JWEInvalid('Invalid Initialization Vector length');\n }\n}\n","import { JWEInvalid } from '../util/errors.js';\nexport function checkCekLength(cek, expected) {\n const actual = cek.byteLength << 3;\n if (actual !== expected) {\n throw new JWEInvalid(`Invalid Content Encryption Key length. Expected ${expected} bits, got ${actual} bits`);\n }\n}\n","const unusable = (name, prop = 'algorithm.name') => new TypeError(`CryptoKey does not support this operation, its ${prop} must be ${name}`);\nconst isAlgorithm = (algorithm, name) => algorithm.name === name;\nfunction getHashLength(hash) {\n return parseInt(hash.name.slice(4), 10);\n}\nfunction getNamedCurve(alg) {\n switch (alg) {\n case 'ES256':\n return 'P-256';\n case 'ES384':\n return 'P-384';\n case 'ES512':\n return 'P-521';\n default:\n throw new Error('unreachable');\n }\n}\nfunction checkUsage(key, usage) {\n if (usage && !key.usages.includes(usage)) {\n throw new TypeError(`CryptoKey does not support this operation, its usages must include ${usage}.`);\n }\n}\nexport function checkSigCryptoKey(key, alg, usage) {\n switch (alg) {\n case 'HS256':\n case 'HS384':\n case 'HS512': {\n if (!isAlgorithm(key.algorithm, 'HMAC'))\n throw unusable('HMAC');\n const expected = parseInt(alg.slice(2), 10);\n const actual = getHashLength(key.algorithm.hash);\n if (actual !== expected)\n throw unusable(`SHA-${expected}`, 'algorithm.hash');\n break;\n }\n case 'RS256':\n case 'RS384':\n case 'RS512': {\n if (!isAlgorithm(key.algorithm, 'RSASSA-PKCS1-v1_5'))\n throw unusable('RSASSA-PKCS1-v1_5');\n const expected = parseInt(alg.slice(2), 10);\n const actual = getHashLength(key.algorithm.hash);\n if (actual !== expected)\n throw unusable(`SHA-${expected}`, 'algorithm.hash');\n break;\n }\n case 'PS256':\n case 'PS384':\n case 'PS512': {\n if (!isAlgorithm(key.algorithm, 'RSA-PSS'))\n throw unusable('RSA-PSS');\n const expected = parseInt(alg.slice(2), 10);\n const actual = getHashLength(key.algorithm.hash);\n if (actual !== expected)\n throw unusable(`SHA-${expected}`, 'algorithm.hash');\n break;\n }\n case 'Ed25519':\n case 'EdDSA': {\n if (!isAlgorithm(key.algorithm, 'Ed25519'))\n throw unusable('Ed25519');\n break;\n }\n case 'ML-DSA-44':\n case 'ML-DSA-65':\n case 'ML-DSA-87': {\n if (!isAlgorithm(key.algorithm, alg))\n throw unusable(alg);\n break;\n }\n case 'ES256':\n case 'ES384':\n case 'ES512': {\n if (!isAlgorithm(key.algorithm, 'ECDSA'))\n throw unusable('ECDSA');\n const expected = getNamedCurve(alg);\n const actual = key.algorithm.namedCurve;\n if (actual !== expected)\n throw unusable(expected, 'algorithm.namedCurve');\n break;\n }\n default:\n throw new TypeError('CryptoKey does not support this operation');\n }\n checkUsage(key, usage);\n}\nexport function checkEncCryptoKey(key, alg, usage) {\n switch (alg) {\n case 'A128GCM':\n case 'A192GCM':\n case 'A256GCM': {\n if (!isAlgorithm(key.algorithm, 'AES-GCM'))\n throw unusable('AES-GCM');\n const expected = parseInt(alg.slice(1, 4), 10);\n const actual = key.algorithm.length;\n if (actual !== expected)\n throw unusable(expected, 'algorithm.length');\n break;\n }\n case 'A128KW':\n case 'A192KW':\n case 'A256KW': {\n if (!isAlgorithm(key.algorithm, 'AES-KW'))\n throw unusable('AES-KW');\n const expected = parseInt(alg.slice(1, 4), 10);\n const actual = key.algorithm.length;\n if (actual !== expected)\n throw unusable(expected, 'algorithm.length');\n break;\n }\n case 'ECDH': {\n switch (key.algorithm.name) {\n case 'ECDH':\n case 'X25519':\n break;\n default:\n throw unusable('ECDH or X25519');\n }\n break;\n }\n case 'PBES2-HS256+A128KW':\n case 'PBES2-HS384+A192KW':\n case 'PBES2-HS512+A256KW':\n if (!isAlgorithm(key.algorithm, 'PBKDF2'))\n throw unusable('PBKDF2');\n break;\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512': {\n if (!isAlgorithm(key.algorithm, 'RSA-OAEP'))\n throw unusable('RSA-OAEP');\n const expected = parseInt(alg.slice(9), 10) || 1;\n const actual = getHashLength(key.algorithm.hash);\n if (actual !== expected)\n throw unusable(`SHA-${expected}`, 'algorithm.hash');\n break;\n }\n default:\n throw new TypeError('CryptoKey does not support this operation');\n }\n checkUsage(key, usage);\n}\n","function message(msg, actual, ...types) {\n types = types.filter(Boolean);\n if (types.length > 2) {\n const last = types.pop();\n msg += `one of type ${types.join(', ')}, or ${last}.`;\n }\n else if (types.length === 2) {\n msg += `one of type ${types[0]} or ${types[1]}.`;\n }\n else {\n msg += `of type ${types[0]}.`;\n }\n if (actual == null) {\n msg += ` Received ${actual}`;\n }\n else if (typeof actual === 'function' && actual.name) {\n msg += ` Received function ${actual.name}`;\n }\n else if (typeof actual === 'object' && actual != null) {\n if (actual.constructor?.name) {\n msg += ` Received an instance of ${actual.constructor.name}`;\n }\n }\n return msg;\n}\nexport const invalidKeyInput = (actual, ...types) => message('Key must be ', actual, ...types);\nexport const withAlg = (alg, actual, ...types) => message(`Key for the ${alg} algorithm must be `, actual, ...types);\n","export function assertCryptoKey(key) {\n if (!isCryptoKey(key)) {\n throw new Error('CryptoKey instance expected');\n }\n}\nexport const isCryptoKey = (key) => {\n if (key?.[Symbol.toStringTag] === 'CryptoKey')\n return true;\n try {\n return key instanceof CryptoKey;\n }\n catch {\n return false;\n }\n};\nexport const isKeyObject = (key) => key?.[Symbol.toStringTag] === 'KeyObject';\nexport const isKeyLike = (key) => isCryptoKey(key) || isKeyObject(key);\n","import { concat, uint64be } from './buffer_utils.js';\nimport { checkIvLength } from './check_iv_length.js';\nimport { checkCekLength } from './check_cek_length.js';\nimport { JOSENotSupported, JWEDecryptionFailed, JWEInvalid } from '../util/errors.js';\nimport { checkEncCryptoKey } from './crypto_key.js';\nimport { invalidKeyInput } from './invalid_key_input.js';\nimport { isCryptoKey } from './is_key_like.js';\nasync function timingSafeEqual(a, b) {\n if (!(a instanceof Uint8Array)) {\n throw new TypeError('First argument must be a buffer');\n }\n if (!(b instanceof Uint8Array)) {\n throw new TypeError('Second argument must be a buffer');\n }\n const algorithm = { name: 'HMAC', hash: 'SHA-256' };\n const key = (await crypto.subtle.generateKey(algorithm, false, ['sign']));\n const aHmac = new Uint8Array(await crypto.subtle.sign(algorithm, key, a));\n const bHmac = new Uint8Array(await crypto.subtle.sign(algorithm, key, b));\n let out = 0;\n let i = -1;\n while (++i < 32) {\n out |= aHmac[i] ^ bHmac[i];\n }\n return out === 0;\n}\nasync function cbcDecrypt(enc, cek, ciphertext, iv, tag, aad) {\n if (!(cek instanceof Uint8Array)) {\n throw new TypeError(invalidKeyInput(cek, 'Uint8Array'));\n }\n const keySize = parseInt(enc.slice(1, 4), 10);\n const encKey = await crypto.subtle.importKey('raw', cek.subarray(keySize >> 3), 'AES-CBC', false, ['decrypt']);\n const macKey = await crypto.subtle.importKey('raw', cek.subarray(0, keySize >> 3), {\n hash: `SHA-${keySize << 1}`,\n name: 'HMAC',\n }, false, ['sign']);\n const macData = concat(aad, iv, ciphertext, uint64be(aad.length << 3));\n const expectedTag = new Uint8Array((await crypto.subtle.sign('HMAC', macKey, macData)).slice(0, keySize >> 3));\n let macCheckPassed;\n try {\n macCheckPassed = await timingSafeEqual(tag, expectedTag);\n }\n catch {\n }\n if (!macCheckPassed) {\n throw new JWEDecryptionFailed();\n }\n let plaintext;\n try {\n plaintext = new Uint8Array(await crypto.subtle.decrypt({ iv: iv, name: 'AES-CBC' }, encKey, ciphertext));\n }\n catch {\n }\n if (!plaintext) {\n throw new JWEDecryptionFailed();\n }\n return plaintext;\n}\nasync function gcmDecrypt(enc, cek, ciphertext, iv, tag, aad) {\n let encKey;\n if (cek instanceof Uint8Array) {\n encKey = await crypto.subtle.importKey('raw', cek, 'AES-GCM', false, ['decrypt']);\n }\n else {\n checkEncCryptoKey(cek, enc, 'decrypt');\n encKey = cek;\n }\n try {\n return new Uint8Array(await crypto.subtle.decrypt({\n additionalData: aad,\n iv: iv,\n name: 'AES-GCM',\n tagLength: 128,\n }, encKey, concat(ciphertext, tag)));\n }\n catch {\n throw new JWEDecryptionFailed();\n }\n}\nexport async function decrypt(enc, cek, ciphertext, iv, tag, aad) {\n if (!isCryptoKey(cek) && !(cek instanceof Uint8Array)) {\n throw new TypeError(invalidKeyInput(cek, 'CryptoKey', 'KeyObject', 'Uint8Array', 'JSON Web Key'));\n }\n if (!iv) {\n throw new JWEInvalid('JWE Initialization Vector missing');\n }\n if (!tag) {\n throw new JWEInvalid('JWE Authentication Tag missing');\n }\n checkIvLength(enc, iv);\n switch (enc) {\n case 'A128CBC-HS256':\n case 'A192CBC-HS384':\n case 'A256CBC-HS512':\n if (cek instanceof Uint8Array)\n checkCekLength(cek, parseInt(enc.slice(-3), 10));\n return cbcDecrypt(enc, cek, ciphertext, iv, tag, aad);\n case 'A128GCM':\n case 'A192GCM':\n case 'A256GCM':\n if (cek instanceof Uint8Array)\n checkCekLength(cek, parseInt(enc.slice(1, 4), 10));\n return gcmDecrypt(enc, cek, ciphertext, iv, tag, aad);\n default:\n throw new JOSENotSupported('Unsupported JWE Content Encryption Algorithm');\n }\n}\n","export function isDisjoint(...headers) {\n const sources = headers.filter(Boolean);\n if (sources.length === 0 || sources.length === 1) {\n return true;\n }\n let acc;\n for (const header of sources) {\n const parameters = Object.keys(header);\n if (!acc || acc.size === 0) {\n acc = new Set(parameters);\n continue;\n }\n for (const parameter of parameters) {\n if (acc.has(parameter)) {\n return false;\n }\n acc.add(parameter);\n }\n }\n return true;\n}\n","const isObjectLike = (value) => typeof value === 'object' && value !== null;\nexport function isObject(input) {\n if (!isObjectLike(input) || Object.prototype.toString.call(input) !== '[object Object]') {\n return false;\n }\n if (Object.getPrototypeOf(input) === null) {\n return true;\n }\n let proto = input;\n while (Object.getPrototypeOf(proto) !== null) {\n proto = Object.getPrototypeOf(proto);\n }\n return Object.getPrototypeOf(input) === proto;\n}\n","import { checkEncCryptoKey } from './crypto_key.js';\nfunction checkKeySize(key, alg) {\n if (key.algorithm.length !== parseInt(alg.slice(1, 4), 10)) {\n throw new TypeError(`Invalid key size for alg: ${alg}`);\n }\n}\nfunction getCryptoKey(key, alg, usage) {\n if (key instanceof Uint8Array) {\n return crypto.subtle.importKey('raw', key, 'AES-KW', true, [usage]);\n }\n checkEncCryptoKey(key, alg, usage);\n return key;\n}\nexport async function wrap(alg, key, cek) {\n const cryptoKey = await getCryptoKey(key, alg, 'wrapKey');\n checkKeySize(cryptoKey, alg);\n const cryptoKeyCek = await crypto.subtle.importKey('raw', cek, { hash: 'SHA-256', name: 'HMAC' }, true, ['sign']);\n return new Uint8Array(await crypto.subtle.wrapKey('raw', cryptoKeyCek, cryptoKey, 'AES-KW'));\n}\nexport async function unwrap(alg, key, encryptedKey) {\n const cryptoKey = await getCryptoKey(key, alg, 'unwrapKey');\n checkKeySize(cryptoKey, alg);\n const cryptoKeyCek = await crypto.subtle.unwrapKey('raw', encryptedKey, cryptoKey, 'AES-KW', { hash: 'SHA-256', name: 'HMAC' }, true, ['sign']);\n return new Uint8Array(await crypto.subtle.exportKey('raw', cryptoKeyCek));\n}\n","export async function digest(algorithm, data) {\n const subtleDigest = `SHA-${algorithm.slice(-3)}`;\n return new Uint8Array(await crypto.subtle.digest(subtleDigest, data));\n}\n","import { encode, concat, uint32be } from './buffer_utils.js';\nimport { checkEncCryptoKey } from './crypto_key.js';\nimport { digest } from './digest.js';\nfunction lengthAndInput(input) {\n return concat(uint32be(input.length), input);\n}\nasync function concatKdf(Z, L, OtherInfo) {\n const dkLen = L >> 3;\n const hashLen = 32;\n const reps = Math.ceil(dkLen / hashLen);\n const dk = new Uint8Array(reps * hashLen);\n for (let i = 1; i <= reps; i++) {\n const hashInput = new Uint8Array(4 + Z.length + OtherInfo.length);\n hashInput.set(uint32be(i), 0);\n hashInput.set(Z, 4);\n hashInput.set(OtherInfo, 4 + Z.length);\n const hashResult = await digest('sha256', hashInput);\n dk.set(hashResult, (i - 1) * hashLen);\n }\n return dk.slice(0, dkLen);\n}\nexport async function deriveKey(publicKey, privateKey, algorithm, keyLength, apu = new Uint8Array(), apv = new Uint8Array()) {\n checkEncCryptoKey(publicKey, 'ECDH');\n checkEncCryptoKey(privateKey, 'ECDH', 'deriveBits');\n const algorithmID = lengthAndInput(encode(algorithm));\n const partyUInfo = lengthAndInput(apu);\n const partyVInfo = lengthAndInput(apv);\n const suppPubInfo = uint32be(keyLength);\n const suppPrivInfo = new Uint8Array();\n const otherInfo = concat(algorithmID, partyUInfo, partyVInfo, suppPubInfo, suppPrivInfo);\n const Z = new Uint8Array(await crypto.subtle.deriveBits({\n name: publicKey.algorithm.name,\n public: publicKey,\n }, privateKey, getEcdhBitLength(publicKey)));\n return concatKdf(Z, keyLength, otherInfo);\n}\nfunction getEcdhBitLength(publicKey) {\n if (publicKey.algorithm.name === 'X25519') {\n return 256;\n }\n return (Math.ceil(parseInt(publicKey.algorithm.namedCurve.slice(-3), 10) / 8) << 3);\n}\nexport function allowed(key) {\n switch (key.algorithm.namedCurve) {\n case 'P-256':\n case 'P-384':\n case 'P-521':\n return true;\n default:\n return key.algorithm.name === 'X25519';\n }\n}\n","import { encode as b64u } from '../util/base64url.js';\nimport * as aeskw from './aeskw.js';\nimport { checkEncCryptoKey } from './crypto_key.js';\nimport { concat, encode } from './buffer_utils.js';\nimport { JWEInvalid } from '../util/errors.js';\nfunction getCryptoKey(key, alg) {\n if (key instanceof Uint8Array) {\n return crypto.subtle.importKey('raw', key, 'PBKDF2', false, [\n 'deriveBits',\n ]);\n }\n checkEncCryptoKey(key, alg, 'deriveBits');\n return key;\n}\nconst concatSalt = (alg, p2sInput) => concat(encode(alg), Uint8Array.of(0x00), p2sInput);\nasync function deriveKey(p2s, alg, p2c, key) {\n if (!(p2s instanceof Uint8Array) || p2s.length < 8) {\n throw new JWEInvalid('PBES2 Salt Input must be 8 or more octets');\n }\n const salt = concatSalt(alg, p2s);\n const keylen = parseInt(alg.slice(13, 16), 10);\n const subtleAlg = {\n hash: `SHA-${alg.slice(8, 11)}`,\n iterations: p2c,\n name: 'PBKDF2',\n salt,\n };\n const cryptoKey = await getCryptoKey(key, alg);\n return new Uint8Array(await crypto.subtle.deriveBits(subtleAlg, cryptoKey, keylen));\n}\nexport async function wrap(alg, key, cek, p2c = 2048, p2s = crypto.getRandomValues(new Uint8Array(16))) {\n const derived = await deriveKey(p2s, alg, p2c, key);\n const encryptedKey = await aeskw.wrap(alg.slice(-6), derived, cek);\n return { encryptedKey, p2c, p2s: b64u(p2s) };\n}\nexport async function unwrap(alg, key, encryptedKey, p2c, p2s) {\n const derived = await deriveKey(p2s, alg, p2c, key);\n return aeskw.unwrap(alg.slice(-6), derived, encryptedKey);\n}\n","export function checkKeyLength(alg, key) {\n if (alg.startsWith('RS') || alg.startsWith('PS')) {\n const { modulusLength } = key.algorithm;\n if (typeof modulusLength !== 'number' || modulusLength < 2048) {\n throw new TypeError(`${alg} requires key modulusLength to be 2048 bits or larger`);\n }\n }\n}\n","import { checkEncCryptoKey } from './crypto_key.js';\nimport { checkKeyLength } from './check_key_length.js';\nimport { JOSENotSupported } from '../util/errors.js';\nconst subtleAlgorithm = (alg) => {\n switch (alg) {\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512':\n return 'RSA-OAEP';\n default:\n throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);\n }\n};\nexport async function encrypt(alg, key, cek) {\n checkEncCryptoKey(key, alg, 'encrypt');\n checkKeyLength(alg, key);\n return new Uint8Array(await crypto.subtle.encrypt(subtleAlgorithm(alg), key, cek));\n}\nexport async function decrypt(alg, key, encryptedKey) {\n checkEncCryptoKey(key, alg, 'decrypt');\n checkKeyLength(alg, key);\n return new Uint8Array(await crypto.subtle.decrypt(subtleAlgorithm(alg), key, encryptedKey));\n}\n","import { JOSENotSupported } from '../util/errors.js';\nexport function cekLength(alg) {\n switch (alg) {\n case 'A128GCM':\n return 128;\n case 'A192GCM':\n return 192;\n case 'A256GCM':\n case 'A128CBC-HS256':\n return 256;\n case 'A192CBC-HS384':\n return 384;\n case 'A256CBC-HS512':\n return 512;\n default:\n throw new JOSENotSupported(`Unsupported JWE Algorithm: ${alg}`);\n }\n}\nexport const generateCek = (alg) => crypto.getRandomValues(new Uint8Array(cekLength(alg) >> 3));\n","import { invalidKeyInput } from './invalid_key_input.js';\nimport { encodeBase64, decodeBase64 } from '../lib/base64.js';\nimport { JOSENotSupported } from '../util/errors.js';\nimport { isCryptoKey, isKeyObject } from './is_key_like.js';\nconst formatPEM = (b64, descriptor) => {\n const newlined = (b64.match(/.{1,64}/g) || []).join('\\n');\n return `-----BEGIN ${descriptor}-----\\n${newlined}\\n-----END ${descriptor}-----`;\n};\nconst genericExport = async (keyType, keyFormat, key) => {\n if (isKeyObject(key)) {\n if (key.type !== keyType) {\n throw new TypeError(`key is not a ${keyType} key`);\n }\n return key.export({ format: 'pem', type: keyFormat });\n }\n if (!isCryptoKey(key)) {\n throw new TypeError(invalidKeyInput(key, 'CryptoKey', 'KeyObject'));\n }\n if (!key.extractable) {\n throw new TypeError('CryptoKey is not extractable');\n }\n if (key.type !== keyType) {\n throw new TypeError(`key is not a ${keyType} key`);\n }\n return formatPEM(encodeBase64(new Uint8Array(await crypto.subtle.exportKey(keyFormat, key))), `${keyType.toUpperCase()} KEY`);\n};\nexport const toSPKI = (key) => genericExport('public', 'spki', key);\nexport const toPKCS8 = (key) => genericExport('private', 'pkcs8', key);\nconst bytesEqual = (a, b) => {\n if (a.byteLength !== b.length)\n return false;\n for (let i = 0; i < a.byteLength; i++) {\n if (a[i] !== b[i])\n return false;\n }\n return true;\n};\nconst createASN1State = (data) => ({ data, pos: 0 });\nconst parseLength = (state) => {\n const first = state.data[state.pos++];\n if (first & 0x80) {\n const lengthOfLen = first & 0x7f;\n let length = 0;\n for (let i = 0; i < lengthOfLen; i++) {\n length = (length << 8) | state.data[state.pos++];\n }\n return length;\n }\n return first;\n};\nconst skipElement = (state, count = 1) => {\n if (count <= 0)\n return;\n state.pos++;\n const length = parseLength(state);\n state.pos += length;\n if (count > 1) {\n skipElement(state, count - 1);\n }\n};\nconst expectTag = (state, expectedTag, errorMessage) => {\n if (state.data[state.pos++] !== expectedTag) {\n throw new Error(errorMessage);\n }\n};\nconst getSubarray = (state, length) => {\n const result = state.data.subarray(state.pos, state.pos + length);\n state.pos += length;\n return result;\n};\nconst parseAlgorithmOID = (state) => {\n expectTag(state, 0x06, 'Expected algorithm OID');\n const oidLen = parseLength(state);\n return getSubarray(state, oidLen);\n};\nfunction parsePKCS8Header(state) {\n expectTag(state, 0x30, 'Invalid PKCS#8 structure');\n parseLength(state);\n expectTag(state, 0x02, 'Expected version field');\n const verLen = parseLength(state);\n state.pos += verLen;\n expectTag(state, 0x30, 'Expected algorithm identifier');\n const algIdLen = parseLength(state);\n const algIdStart = state.pos;\n return { algIdStart, algIdLength: algIdLen };\n}\nfunction parseSPKIHeader(state) {\n expectTag(state, 0x30, 'Invalid SPKI structure');\n parseLength(state);\n expectTag(state, 0x30, 'Expected algorithm identifier');\n const algIdLen = parseLength(state);\n const algIdStart = state.pos;\n return { algIdStart, algIdLength: algIdLen };\n}\nconst parseECAlgorithmIdentifier = (state) => {\n const algOid = parseAlgorithmOID(state);\n if (bytesEqual(algOid, [0x2b, 0x65, 0x6e])) {\n return 'X25519';\n }\n if (!bytesEqual(algOid, [0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 0x01])) {\n throw new Error('Unsupported key algorithm');\n }\n expectTag(state, 0x06, 'Expected curve OID');\n const curveOidLen = parseLength(state);\n const curveOid = getSubarray(state, curveOidLen);\n for (const { name, oid } of [\n { name: 'P-256', oid: [0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07] },\n { name: 'P-384', oid: [0x2b, 0x81, 0x04, 0x00, 0x22] },\n { name: 'P-521', oid: [0x2b, 0x81, 0x04, 0x00, 0x23] },\n ]) {\n if (bytesEqual(curveOid, oid)) {\n return name;\n }\n }\n throw new Error('Unsupported named curve');\n};\nconst genericImport = async (keyFormat, keyData, alg, options) => {\n let algorithm;\n let keyUsages;\n const isPublic = keyFormat === 'spki';\n const getSigUsages = () => (isPublic ? ['verify'] : ['sign']);\n const getEncUsages = () => isPublic ? ['encrypt', 'wrapKey'] : ['decrypt', 'unwrapKey'];\n switch (alg) {\n case 'PS256':\n case 'PS384':\n case 'PS512':\n algorithm = { name: 'RSA-PSS', hash: `SHA-${alg.slice(-3)}` };\n keyUsages = getSigUsages();\n break;\n case 'RS256':\n case 'RS384':\n case 'RS512':\n algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${alg.slice(-3)}` };\n keyUsages = getSigUsages();\n break;\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512':\n algorithm = {\n name: 'RSA-OAEP',\n hash: `SHA-${parseInt(alg.slice(-3), 10) || 1}`,\n };\n keyUsages = getEncUsages();\n break;\n case 'ES256':\n case 'ES384':\n case 'ES512': {\n const curveMap = { ES256: 'P-256', ES384: 'P-384', ES512: 'P-521' };\n algorithm = { name: 'ECDSA', namedCurve: curveMap[alg] };\n keyUsages = getSigUsages();\n break;\n }\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW': {\n try {\n const namedCurve = options.getNamedCurve(keyData);\n algorithm = namedCurve === 'X25519' ? { name: 'X25519' } : { name: 'ECDH', namedCurve };\n }\n catch (cause) {\n throw new JOSENotSupported('Invalid or unsupported key format');\n }\n keyUsages = isPublic ? [] : ['deriveBits'];\n break;\n }\n case 'Ed25519':\n case 'EdDSA':\n algorithm = { name: 'Ed25519' };\n keyUsages = getSigUsages();\n break;\n case 'ML-DSA-44':\n case 'ML-DSA-65':\n case 'ML-DSA-87':\n algorithm = { name: alg };\n keyUsages = getSigUsages();\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported \"alg\" (Algorithm) value');\n }\n return crypto.subtle.importKey(keyFormat, keyData, algorithm, options?.extractable ?? (isPublic ? true : false), keyUsages);\n};\nconst processPEMData = (pem, pattern) => {\n return decodeBase64(pem.replace(pattern, ''));\n};\nexport const fromPKCS8 = (pem, alg, options) => {\n const keyData = processPEMData(pem, /(?:-----(?:BEGIN|END) PRIVATE KEY-----|\\s)/g);\n let opts = options;\n if (alg?.startsWith?.('ECDH-ES')) {\n opts ||= {};\n opts.getNamedCurve = (keyData) => {\n const state = createASN1State(keyData);\n parsePKCS8Header(state);\n return parseECAlgorithmIdentifier(state);\n };\n }\n return genericImport('pkcs8', keyData, alg, opts);\n};\nexport const fromSPKI = (pem, alg, options) => {\n const keyData = processPEMData(pem, /(?:-----(?:BEGIN|END) PUBLIC KEY-----|\\s)/g);\n let opts = options;\n if (alg?.startsWith?.('ECDH-ES')) {\n opts ||= {};\n opts.getNamedCurve = (keyData) => {\n const state = createASN1State(keyData);\n parseSPKIHeader(state);\n return parseECAlgorithmIdentifier(state);\n };\n }\n return genericImport('spki', keyData, alg, opts);\n};\nfunction spkiFromX509(buf) {\n const state = createASN1State(buf);\n expectTag(state, 0x30, 'Invalid certificate structure');\n parseLength(state);\n expectTag(state, 0x30, 'Invalid tbsCertificate structure');\n parseLength(state);\n if (buf[state.pos] === 0xa0) {\n skipElement(state, 6);\n }\n else {\n skipElement(state, 5);\n }\n const spkiStart = state.pos;\n expectTag(state, 0x30, 'Invalid SPKI structure');\n const spkiContentLen = parseLength(state);\n return buf.subarray(spkiStart, spkiStart + spkiContentLen + (state.pos - spkiStart));\n}\nfunction extractX509SPKI(x509) {\n const derBytes = processPEMData(x509, /(?:-----(?:BEGIN|END) CERTIFICATE-----|\\s)/g);\n return spkiFromX509(derBytes);\n}\nexport const fromX509 = (pem, alg, options) => {\n let spki;\n try {\n spki = extractX509SPKI(pem);\n }\n catch (cause) {\n throw new TypeError('Failed to parse the X.509 certificate', { cause });\n }\n return fromSPKI(formatPEM(encodeBase64(spki), 'PUBLIC KEY'), alg, options);\n};\n","import { JOSENotSupported } from '../util/errors.js';\nfunction subtleMapping(jwk) {\n let algorithm;\n let keyUsages;\n switch (jwk.kty) {\n case 'AKP': {\n switch (jwk.alg) {\n case 'ML-DSA-44':\n case 'ML-DSA-65':\n case 'ML-DSA-87':\n algorithm = { name: jwk.alg };\n keyUsages = jwk.priv ? ['sign'] : ['verify'];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n case 'RSA': {\n switch (jwk.alg) {\n case 'PS256':\n case 'PS384':\n case 'PS512':\n algorithm = { name: 'RSA-PSS', hash: `SHA-${jwk.alg.slice(-3)}` };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'RS256':\n case 'RS384':\n case 'RS512':\n algorithm = { name: 'RSASSA-PKCS1-v1_5', hash: `SHA-${jwk.alg.slice(-3)}` };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512':\n algorithm = {\n name: 'RSA-OAEP',\n hash: `SHA-${parseInt(jwk.alg.slice(-3), 10) || 1}`,\n };\n keyUsages = jwk.d ? ['decrypt', 'unwrapKey'] : ['encrypt', 'wrapKey'];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n case 'EC': {\n switch (jwk.alg) {\n case 'ES256':\n algorithm = { name: 'ECDSA', namedCurve: 'P-256' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ES384':\n algorithm = { name: 'ECDSA', namedCurve: 'P-384' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ES512':\n algorithm = { name: 'ECDSA', namedCurve: 'P-521' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW':\n algorithm = { name: 'ECDH', namedCurve: jwk.crv };\n keyUsages = jwk.d ? ['deriveBits'] : [];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n case 'OKP': {\n switch (jwk.alg) {\n case 'Ed25519':\n case 'EdDSA':\n algorithm = { name: 'Ed25519' };\n keyUsages = jwk.d ? ['sign'] : ['verify'];\n break;\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW':\n algorithm = { name: jwk.crv };\n keyUsages = jwk.d ? ['deriveBits'] : [];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n break;\n }\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"kty\" (Key Type) Parameter value');\n }\n return { algorithm, keyUsages };\n}\nexport async function jwkToKey(jwk) {\n if (!jwk.alg) {\n throw new TypeError('\"alg\" argument is required when \"jwk.alg\" is not present');\n }\n const { algorithm, keyUsages } = subtleMapping(jwk);\n const keyData = { ...jwk };\n if (keyData.kty !== 'AKP') {\n delete keyData.alg;\n }\n delete keyData.use;\n return crypto.subtle.importKey('jwk', keyData, algorithm, jwk.ext ?? (jwk.d || jwk.priv ? false : true), jwk.key_ops ?? keyUsages);\n}\n","import { decode as decodeBase64URL } from '../util/base64url.js';\nimport { fromSPKI, fromPKCS8, fromX509 } from '../lib/asn1.js';\nimport { jwkToKey } from '../lib/jwk_to_key.js';\nimport { JOSENotSupported } from '../util/errors.js';\nimport { isObject } from '../lib/is_object.js';\nexport async function importSPKI(spki, alg, options) {\n if (typeof spki !== 'string' || spki.indexOf('-----BEGIN PUBLIC KEY-----') !== 0) {\n throw new TypeError('\"spki\" must be SPKI formatted string');\n }\n return fromSPKI(spki, alg, options);\n}\nexport async function importX509(x509, alg, options) {\n if (typeof x509 !== 'string' || x509.indexOf('-----BEGIN CERTIFICATE-----') !== 0) {\n throw new TypeError('\"x509\" must be X.509 formatted string');\n }\n return fromX509(x509, alg, options);\n}\nexport async function importPKCS8(pkcs8, alg, options) {\n if (typeof pkcs8 !== 'string' || pkcs8.indexOf('-----BEGIN PRIVATE KEY-----') !== 0) {\n throw new TypeError('\"pkcs8\" must be PKCS#8 formatted string');\n }\n return fromPKCS8(pkcs8, alg, options);\n}\nexport async function importJWK(jwk, alg, options) {\n if (!isObject(jwk)) {\n throw new TypeError('JWK must be an object');\n }\n let ext;\n alg ??= jwk.alg;\n ext ??= options?.extractable ?? jwk.ext;\n switch (jwk.kty) {\n case 'oct':\n if (typeof jwk.k !== 'string' || !jwk.k) {\n throw new TypeError('missing \"k\" (Key Value) Parameter value');\n }\n return decodeBase64URL(jwk.k);\n case 'RSA':\n if ('oth' in jwk && jwk.oth !== undefined) {\n throw new JOSENotSupported('RSA JWK \"oth\" (Other Primes Info) Parameter value is not supported');\n }\n return jwkToKey({ ...jwk, alg, ext });\n case 'AKP': {\n if (typeof jwk.alg !== 'string' || !jwk.alg) {\n throw new TypeError('missing \"alg\" (Algorithm) Parameter value');\n }\n if (alg !== undefined && alg !== jwk.alg) {\n throw new TypeError('JWK alg and alg option value mismatch');\n }\n return jwkToKey({ ...jwk, ext });\n }\n case 'EC':\n case 'OKP':\n return jwkToKey({ ...jwk, alg, ext });\n default:\n throw new JOSENotSupported('Unsupported \"kty\" (Key Type) Parameter value');\n }\n}\n","import { concat, uint64be } from './buffer_utils.js';\nimport { checkIvLength } from './check_iv_length.js';\nimport { checkCekLength } from './check_cek_length.js';\nimport { checkEncCryptoKey } from './crypto_key.js';\nimport { invalidKeyInput } from './invalid_key_input.js';\nimport { generateIv } from './iv.js';\nimport { JOSENotSupported } from '../util/errors.js';\nimport { isCryptoKey } from './is_key_like.js';\nasync function cbcEncrypt(enc, plaintext, cek, iv, aad) {\n if (!(cek instanceof Uint8Array)) {\n throw new TypeError(invalidKeyInput(cek, 'Uint8Array'));\n }\n const keySize = parseInt(enc.slice(1, 4), 10);\n const encKey = await crypto.subtle.importKey('raw', cek.subarray(keySize >> 3), 'AES-CBC', false, ['encrypt']);\n const macKey = await crypto.subtle.importKey('raw', cek.subarray(0, keySize >> 3), {\n hash: `SHA-${keySize << 1}`,\n name: 'HMAC',\n }, false, ['sign']);\n const ciphertext = new Uint8Array(await crypto.subtle.encrypt({\n iv: iv,\n name: 'AES-CBC',\n }, encKey, plaintext));\n const macData = concat(aad, iv, ciphertext, uint64be(aad.length << 3));\n const tag = new Uint8Array((await crypto.subtle.sign('HMAC', macKey, macData)).slice(0, keySize >> 3));\n return { ciphertext, tag, iv };\n}\nasync function gcmEncrypt(enc, plaintext, cek, iv, aad) {\n let encKey;\n if (cek instanceof Uint8Array) {\n encKey = await crypto.subtle.importKey('raw', cek, 'AES-GCM', false, ['encrypt']);\n }\n else {\n checkEncCryptoKey(cek, enc, 'encrypt');\n encKey = cek;\n }\n const encrypted = new Uint8Array(await crypto.subtle.encrypt({\n additionalData: aad,\n iv: iv,\n name: 'AES-GCM',\n tagLength: 128,\n }, encKey, plaintext));\n const tag = encrypted.slice(-16);\n const ciphertext = encrypted.slice(0, -16);\n return { ciphertext, tag, iv };\n}\nexport async function encrypt(enc, plaintext, cek, iv, aad) {\n if (!isCryptoKey(cek) && !(cek instanceof Uint8Array)) {\n throw new TypeError(invalidKeyInput(cek, 'CryptoKey', 'KeyObject', 'Uint8Array', 'JSON Web Key'));\n }\n if (iv) {\n checkIvLength(enc, iv);\n }\n else {\n iv = generateIv(enc);\n }\n switch (enc) {\n case 'A128CBC-HS256':\n case 'A192CBC-HS384':\n case 'A256CBC-HS512':\n if (cek instanceof Uint8Array) {\n checkCekLength(cek, parseInt(enc.slice(-3), 10));\n }\n return cbcEncrypt(enc, plaintext, cek, iv, aad);\n case 'A128GCM':\n case 'A192GCM':\n case 'A256GCM':\n if (cek instanceof Uint8Array) {\n checkCekLength(cek, parseInt(enc.slice(1, 4), 10));\n }\n return gcmEncrypt(enc, plaintext, cek, iv, aad);\n default:\n throw new JOSENotSupported('Unsupported JWE Content Encryption Algorithm');\n }\n}\n","import { encrypt } from './encrypt.js';\nimport { decrypt } from './decrypt.js';\nimport { encode as b64u } from '../util/base64url.js';\nexport async function wrap(alg, key, cek, iv) {\n const jweAlgorithm = alg.slice(0, 7);\n const wrapped = await encrypt(jweAlgorithm, cek, key, iv, new Uint8Array());\n return {\n encryptedKey: wrapped.ciphertext,\n iv: b64u(wrapped.iv),\n tag: b64u(wrapped.tag),\n };\n}\nexport async function unwrap(alg, key, encryptedKey, iv, tag) {\n const jweAlgorithm = alg.slice(0, 7);\n return decrypt(jweAlgorithm, key, encryptedKey, iv, tag, new Uint8Array());\n}\n","import * as aeskw from './aeskw.js';\nimport * as ecdhes from './ecdhes.js';\nimport * as pbes2kw from './pbes2kw.js';\nimport * as rsaes from './rsaes.js';\nimport { decode as b64u } from '../util/base64url.js';\nimport { JOSENotSupported, JWEInvalid } from '../util/errors.js';\nimport { cekLength } from '../lib/cek.js';\nimport { importJWK } from '../key/import.js';\nimport { isObject } from './is_object.js';\nimport { unwrap as aesGcmKw } from './aesgcmkw.js';\nimport { assertCryptoKey } from './is_key_like.js';\nexport async function decryptKeyManagement(alg, key, encryptedKey, joseHeader, options) {\n switch (alg) {\n case 'dir': {\n if (encryptedKey !== undefined)\n throw new JWEInvalid('Encountered unexpected JWE Encrypted Key');\n return key;\n }\n case 'ECDH-ES':\n if (encryptedKey !== undefined)\n throw new JWEInvalid('Encountered unexpected JWE Encrypted Key');\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW': {\n if (!isObject(joseHeader.epk))\n throw new JWEInvalid(`JOSE Header \"epk\" (Ephemeral Public Key) missing or invalid`);\n assertCryptoKey(key);\n if (!ecdhes.allowed(key))\n throw new JOSENotSupported('ECDH with the provided key is not allowed or not supported by your javascript runtime');\n const epk = await importJWK(joseHeader.epk, alg);\n assertCryptoKey(epk);\n let partyUInfo;\n let partyVInfo;\n if (joseHeader.apu !== undefined) {\n if (typeof joseHeader.apu !== 'string')\n throw new JWEInvalid(`JOSE Header \"apu\" (Agreement PartyUInfo) invalid`);\n try {\n partyUInfo = b64u(joseHeader.apu);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the apu');\n }\n }\n if (joseHeader.apv !== undefined) {\n if (typeof joseHeader.apv !== 'string')\n throw new JWEInvalid(`JOSE Header \"apv\" (Agreement PartyVInfo) invalid`);\n try {\n partyVInfo = b64u(joseHeader.apv);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the apv');\n }\n }\n const sharedSecret = await ecdhes.deriveKey(epk, key, alg === 'ECDH-ES' ? joseHeader.enc : alg, alg === 'ECDH-ES' ? cekLength(joseHeader.enc) : parseInt(alg.slice(-5, -2), 10), partyUInfo, partyVInfo);\n if (alg === 'ECDH-ES')\n return sharedSecret;\n if (encryptedKey === undefined)\n throw new JWEInvalid('JWE Encrypted Key missing');\n return aeskw.unwrap(alg.slice(-6), sharedSecret, encryptedKey);\n }\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512': {\n if (encryptedKey === undefined)\n throw new JWEInvalid('JWE Encrypted Key missing');\n assertCryptoKey(key);\n return rsaes.decrypt(alg, key, encryptedKey);\n }\n case 'PBES2-HS256+A128KW':\n case 'PBES2-HS384+A192KW':\n case 'PBES2-HS512+A256KW': {\n if (encryptedKey === undefined)\n throw new JWEInvalid('JWE Encrypted Key missing');\n if (typeof joseHeader.p2c !== 'number')\n throw new JWEInvalid(`JOSE Header \"p2c\" (PBES2 Count) missing or invalid`);\n const p2cLimit = options?.maxPBES2Count || 10_000;\n if (joseHeader.p2c > p2cLimit)\n throw new JWEInvalid(`JOSE Header \"p2c\" (PBES2 Count) out is of acceptable bounds`);\n if (typeof joseHeader.p2s !== 'string')\n throw new JWEInvalid(`JOSE Header \"p2s\" (PBES2 Salt) missing or invalid`);\n let p2s;\n try {\n p2s = b64u(joseHeader.p2s);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the p2s');\n }\n return pbes2kw.unwrap(alg, key, encryptedKey, joseHeader.p2c, p2s);\n }\n case 'A128KW':\n case 'A192KW':\n case 'A256KW': {\n if (encryptedKey === undefined)\n throw new JWEInvalid('JWE Encrypted Key missing');\n return aeskw.unwrap(alg, key, encryptedKey);\n }\n case 'A128GCMKW':\n case 'A192GCMKW':\n case 'A256GCMKW': {\n if (encryptedKey === undefined)\n throw new JWEInvalid('JWE Encrypted Key missing');\n if (typeof joseHeader.iv !== 'string')\n throw new JWEInvalid(`JOSE Header \"iv\" (Initialization Vector) missing or invalid`);\n if (typeof joseHeader.tag !== 'string')\n throw new JWEInvalid(`JOSE Header \"tag\" (Authentication Tag) missing or invalid`);\n let iv;\n try {\n iv = b64u(joseHeader.iv);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the iv');\n }\n let tag;\n try {\n tag = b64u(joseHeader.tag);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the tag');\n }\n return aesGcmKw(alg, key, encryptedKey, iv, tag);\n }\n default: {\n throw new JOSENotSupported('Invalid or unsupported \"alg\" (JWE Algorithm) header value');\n }\n }\n}\n","import { JOSENotSupported, JWEInvalid, JWSInvalid } from '../util/errors.js';\nexport function validateCrit(Err, recognizedDefault, recognizedOption, protectedHeader, joseHeader) {\n if (joseHeader.crit !== undefined && protectedHeader?.crit === undefined) {\n throw new Err('\"crit\" (Critical) Header Parameter MUST be integrity protected');\n }\n if (!protectedHeader || protectedHeader.crit === undefined) {\n return new Set();\n }\n if (!Array.isArray(protectedHeader.crit) ||\n protectedHeader.crit.length === 0 ||\n protectedHeader.crit.some((input) => typeof input !== 'string' || input.length === 0)) {\n throw new Err('\"crit\" (Critical) Header Parameter MUST be an array of non-empty strings when present');\n }\n let recognized;\n if (recognizedOption !== undefined) {\n recognized = new Map([...Object.entries(recognizedOption), ...recognizedDefault.entries()]);\n }\n else {\n recognized = recognizedDefault;\n }\n for (const parameter of protectedHeader.crit) {\n if (!recognized.has(parameter)) {\n throw new JOSENotSupported(`Extension Header Parameter \"${parameter}\" is not recognized`);\n }\n if (joseHeader[parameter] === undefined) {\n throw new Err(`Extension Header Parameter \"${parameter}\" is missing`);\n }\n if (recognized.get(parameter) && protectedHeader[parameter] === undefined) {\n throw new Err(`Extension Header Parameter \"${parameter}\" MUST be integrity protected`);\n }\n }\n return new Set(protectedHeader.crit);\n}\n","export function validateAlgorithms(option, algorithms) {\n if (algorithms !== undefined &&\n (!Array.isArray(algorithms) || algorithms.some((s) => typeof s !== 'string'))) {\n throw new TypeError(`\"${option}\" option must be an array of strings`);\n }\n if (!algorithms) {\n return undefined;\n }\n return new Set(algorithms);\n}\n","import { isObject } from './is_object.js';\nexport const isJWK = (key) => isObject(key) && typeof key.kty === 'string';\nexport const isPrivateJWK = (key) => key.kty !== 'oct' &&\n ((key.kty === 'AKP' && typeof key.priv === 'string') || typeof key.d === 'string');\nexport const isPublicJWK = (key) => key.kty !== 'oct' && key.d === undefined && key.priv === undefined;\nexport const isSecretJWK = (key) => key.kty === 'oct' && typeof key.k === 'string';\n","import { isJWK } from './is_jwk.js';\nimport { decode } from '../util/base64url.js';\nimport { jwkToKey } from './jwk_to_key.js';\nimport { isCryptoKey, isKeyObject } from './is_key_like.js';\nlet cache;\nconst handleJWK = async (key, jwk, alg, freeze = false) => {\n cache ||= new WeakMap();\n let cached = cache.get(key);\n if (cached?.[alg]) {\n return cached[alg];\n }\n const cryptoKey = await jwkToKey({ ...jwk, alg });\n if (freeze)\n Object.freeze(key);\n if (!cached) {\n cache.set(key, { [alg]: cryptoKey });\n }\n else {\n cached[alg] = cryptoKey;\n }\n return cryptoKey;\n};\nconst handleKeyObject = (keyObject, alg) => {\n cache ||= new WeakMap();\n let cached = cache.get(keyObject);\n if (cached?.[alg]) {\n return cached[alg];\n }\n const isPublic = keyObject.type === 'public';\n const extractable = isPublic ? true : false;\n let cryptoKey;\n if (keyObject.asymmetricKeyType === 'x25519') {\n switch (alg) {\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW':\n break;\n default:\n throw new TypeError('given KeyObject instance cannot be used for this algorithm');\n }\n cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, isPublic ? [] : ['deriveBits']);\n }\n if (keyObject.asymmetricKeyType === 'ed25519') {\n if (alg !== 'EdDSA' && alg !== 'Ed25519') {\n throw new TypeError('given KeyObject instance cannot be used for this algorithm');\n }\n cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [\n isPublic ? 'verify' : 'sign',\n ]);\n }\n switch (keyObject.asymmetricKeyType) {\n case 'ml-dsa-44':\n case 'ml-dsa-65':\n case 'ml-dsa-87': {\n if (alg !== keyObject.asymmetricKeyType.toUpperCase()) {\n throw new TypeError('given KeyObject instance cannot be used for this algorithm');\n }\n cryptoKey = keyObject.toCryptoKey(keyObject.asymmetricKeyType, extractable, [\n isPublic ? 'verify' : 'sign',\n ]);\n }\n }\n if (keyObject.asymmetricKeyType === 'rsa') {\n let hash;\n switch (alg) {\n case 'RSA-OAEP':\n hash = 'SHA-1';\n break;\n case 'RS256':\n case 'PS256':\n case 'RSA-OAEP-256':\n hash = 'SHA-256';\n break;\n case 'RS384':\n case 'PS384':\n case 'RSA-OAEP-384':\n hash = 'SHA-384';\n break;\n case 'RS512':\n case 'PS512':\n case 'RSA-OAEP-512':\n hash = 'SHA-512';\n break;\n default:\n throw new TypeError('given KeyObject instance cannot be used for this algorithm');\n }\n if (alg.startsWith('RSA-OAEP')) {\n return keyObject.toCryptoKey({\n name: 'RSA-OAEP',\n hash,\n }, extractable, isPublic ? ['encrypt'] : ['decrypt']);\n }\n cryptoKey = keyObject.toCryptoKey({\n name: alg.startsWith('PS') ? 'RSA-PSS' : 'RSASSA-PKCS1-v1_5',\n hash,\n }, extractable, [isPublic ? 'verify' : 'sign']);\n }\n if (keyObject.asymmetricKeyType === 'ec') {\n const nist = new Map([\n ['prime256v1', 'P-256'],\n ['secp384r1', 'P-384'],\n ['secp521r1', 'P-521'],\n ]);\n const namedCurve = nist.get(keyObject.asymmetricKeyDetails?.namedCurve);\n if (!namedCurve) {\n throw new TypeError('given KeyObject instance cannot be used for this algorithm');\n }\n if (alg === 'ES256' && namedCurve === 'P-256') {\n cryptoKey = keyObject.toCryptoKey({\n name: 'ECDSA',\n namedCurve,\n }, extractable, [isPublic ? 'verify' : 'sign']);\n }\n if (alg === 'ES384' && namedCurve === 'P-384') {\n cryptoKey = keyObject.toCryptoKey({\n name: 'ECDSA',\n namedCurve,\n }, extractable, [isPublic ? 'verify' : 'sign']);\n }\n if (alg === 'ES512' && namedCurve === 'P-521') {\n cryptoKey = keyObject.toCryptoKey({\n name: 'ECDSA',\n namedCurve,\n }, extractable, [isPublic ? 'verify' : 'sign']);\n }\n if (alg.startsWith('ECDH-ES')) {\n cryptoKey = keyObject.toCryptoKey({\n name: 'ECDH',\n namedCurve,\n }, extractable, isPublic ? [] : ['deriveBits']);\n }\n }\n if (!cryptoKey) {\n throw new TypeError('given KeyObject instance cannot be used for this algorithm');\n }\n if (!cached) {\n cache.set(keyObject, { [alg]: cryptoKey });\n }\n else {\n cached[alg] = cryptoKey;\n }\n return cryptoKey;\n};\nexport async function normalizeKey(key, alg) {\n if (key instanceof Uint8Array) {\n return key;\n }\n if (isCryptoKey(key)) {\n return key;\n }\n if (isKeyObject(key)) {\n if (key.type === 'secret') {\n return key.export();\n }\n if ('toCryptoKey' in key && typeof key.toCryptoKey === 'function') {\n try {\n return handleKeyObject(key, alg);\n }\n catch (err) {\n if (err instanceof TypeError) {\n throw err;\n }\n }\n }\n let jwk = key.export({ format: 'jwk' });\n return handleJWK(key, jwk, alg);\n }\n if (isJWK(key)) {\n if (key.k) {\n return decode(key.k);\n }\n return handleJWK(key, key, alg, true);\n }\n throw new Error('unreachable');\n}\n","import { withAlg as invalidKeyInput } from './invalid_key_input.js';\nimport { isKeyLike } from './is_key_like.js';\nimport * as jwk from './is_jwk.js';\nconst tag = (key) => key?.[Symbol.toStringTag];\nconst jwkMatchesOp = (alg, key, usage) => {\n if (key.use !== undefined) {\n let expected;\n switch (usage) {\n case 'sign':\n case 'verify':\n expected = 'sig';\n break;\n case 'encrypt':\n case 'decrypt':\n expected = 'enc';\n break;\n }\n if (key.use !== expected) {\n throw new TypeError(`Invalid key for this operation, its \"use\" must be \"${expected}\" when present`);\n }\n }\n if (key.alg !== undefined && key.alg !== alg) {\n throw new TypeError(`Invalid key for this operation, its \"alg\" must be \"${alg}\" when present`);\n }\n if (Array.isArray(key.key_ops)) {\n let expectedKeyOp;\n switch (true) {\n case usage === 'sign' || usage === 'verify':\n case alg === 'dir':\n case alg.includes('CBC-HS'):\n expectedKeyOp = usage;\n break;\n case alg.startsWith('PBES2'):\n expectedKeyOp = 'deriveBits';\n break;\n case /^A\\d{3}(?:GCM)?(?:KW)?$/.test(alg):\n if (!alg.includes('GCM') && alg.endsWith('KW')) {\n expectedKeyOp = usage === 'encrypt' ? 'wrapKey' : 'unwrapKey';\n }\n else {\n expectedKeyOp = usage;\n }\n break;\n case usage === 'encrypt' && alg.startsWith('RSA'):\n expectedKeyOp = 'wrapKey';\n break;\n case usage === 'decrypt':\n expectedKeyOp = alg.startsWith('RSA') ? 'unwrapKey' : 'deriveBits';\n break;\n }\n if (expectedKeyOp && key.key_ops?.includes?.(expectedKeyOp) === false) {\n throw new TypeError(`Invalid key for this operation, its \"key_ops\" must include \"${expectedKeyOp}\" when present`);\n }\n }\n return true;\n};\nconst symmetricTypeCheck = (alg, key, usage) => {\n if (key instanceof Uint8Array)\n return;\n if (jwk.isJWK(key)) {\n if (jwk.isSecretJWK(key) && jwkMatchesOp(alg, key, usage))\n return;\n throw new TypeError(`JSON Web Key for symmetric algorithms must have JWK \"kty\" (Key Type) equal to \"oct\" and the JWK \"k\" (Key Value) present`);\n }\n if (!isKeyLike(key)) {\n throw new TypeError(invalidKeyInput(alg, key, 'CryptoKey', 'KeyObject', 'JSON Web Key', 'Uint8Array'));\n }\n if (key.type !== 'secret') {\n throw new TypeError(`${tag(key)} instances for symmetric algorithms must be of type \"secret\"`);\n }\n};\nconst asymmetricTypeCheck = (alg, key, usage) => {\n if (jwk.isJWK(key)) {\n switch (usage) {\n case 'decrypt':\n case 'sign':\n if (jwk.isPrivateJWK(key) && jwkMatchesOp(alg, key, usage))\n return;\n throw new TypeError(`JSON Web Key for this operation must be a private JWK`);\n case 'encrypt':\n case 'verify':\n if (jwk.isPublicJWK(key) && jwkMatchesOp(alg, key, usage))\n return;\n throw new TypeError(`JSON Web Key for this operation must be a public JWK`);\n }\n }\n if (!isKeyLike(key)) {\n throw new TypeError(invalidKeyInput(alg, key, 'CryptoKey', 'KeyObject', 'JSON Web Key'));\n }\n if (key.type === 'secret') {\n throw new TypeError(`${tag(key)} instances for asymmetric algorithms must not be of type \"secret\"`);\n }\n if (key.type === 'public') {\n switch (usage) {\n case 'sign':\n throw new TypeError(`${tag(key)} instances for asymmetric algorithm signing must be of type \"private\"`);\n case 'decrypt':\n throw new TypeError(`${tag(key)} instances for asymmetric algorithm decryption must be of type \"private\"`);\n }\n }\n if (key.type === 'private') {\n switch (usage) {\n case 'verify':\n throw new TypeError(`${tag(key)} instances for asymmetric algorithm verifying must be of type \"public\"`);\n case 'encrypt':\n throw new TypeError(`${tag(key)} instances for asymmetric algorithm encryption must be of type \"public\"`);\n }\n }\n};\nexport function checkKeyType(alg, key, usage) {\n switch (alg.substring(0, 2)) {\n case 'A1':\n case 'A2':\n case 'di':\n case 'HS':\n case 'PB':\n symmetricTypeCheck(alg, key, usage);\n break;\n default:\n asymmetricTypeCheck(alg, key, usage);\n }\n}\n","import { JOSENotSupported, JWEInvalid } from '../util/errors.js';\nimport { concat } from './buffer_utils.js';\nfunction supported(name) {\n if (typeof globalThis[name] === 'undefined') {\n throw new JOSENotSupported(`JWE \"zip\" (Compression Algorithm) Header Parameter requires the ${name} API.`);\n }\n}\nexport async function compress(input) {\n supported('CompressionStream');\n const cs = new CompressionStream('deflate-raw');\n const writer = cs.writable.getWriter();\n writer.write(input);\n writer.close();\n const chunks = [];\n const reader = cs.readable.getReader();\n for (;;) {\n const { value, done } = await reader.read();\n if (done)\n break;\n chunks.push(value);\n }\n return concat(...chunks);\n}\nexport async function decompress(input, maxLength) {\n supported('DecompressionStream');\n const ds = new DecompressionStream('deflate-raw');\n const writer = ds.writable.getWriter();\n writer.write(input);\n writer.close();\n const chunks = [];\n let length = 0;\n const reader = ds.readable.getReader();\n for (;;) {\n const { value, done } = await reader.read();\n if (done)\n break;\n chunks.push(value);\n length += value.byteLength;\n if (maxLength !== Infinity && length > maxLength) {\n throw new JWEInvalid('Decompressed plaintext exceeded the configured limit');\n }\n }\n return concat(...chunks);\n}\n","import { decode as b64u } from '../../util/base64url.js';\nimport { decrypt } from '../../lib/decrypt.js';\nimport { JOSEAlgNotAllowed, JOSENotSupported, JWEInvalid } from '../../util/errors.js';\nimport { isDisjoint } from '../../lib/is_disjoint.js';\nimport { isObject } from '../../lib/is_object.js';\nimport { decryptKeyManagement } from '../../lib/decrypt_key_management.js';\nimport { decoder, concat, encode } from '../../lib/buffer_utils.js';\nimport { generateCek } from '../../lib/cek.js';\nimport { validateCrit } from '../../lib/validate_crit.js';\nimport { validateAlgorithms } from '../../lib/validate_algorithms.js';\nimport { normalizeKey } from '../../lib/normalize_key.js';\nimport { checkKeyType } from '../../lib/check_key_type.js';\nimport { decompress } from '../../lib/deflate.js';\nexport async function flattenedDecrypt(jwe, key, options) {\n if (!isObject(jwe)) {\n throw new JWEInvalid('Flattened JWE must be an object');\n }\n if (jwe.protected === undefined && jwe.header === undefined && jwe.unprotected === undefined) {\n throw new JWEInvalid('JOSE Header missing');\n }\n if (jwe.iv !== undefined && typeof jwe.iv !== 'string') {\n throw new JWEInvalid('JWE Initialization Vector incorrect type');\n }\n if (typeof jwe.ciphertext !== 'string') {\n throw new JWEInvalid('JWE Ciphertext missing or incorrect type');\n }\n if (jwe.tag !== undefined && typeof jwe.tag !== 'string') {\n throw new JWEInvalid('JWE Authentication Tag incorrect type');\n }\n if (jwe.protected !== undefined && typeof jwe.protected !== 'string') {\n throw new JWEInvalid('JWE Protected Header incorrect type');\n }\n if (jwe.encrypted_key !== undefined && typeof jwe.encrypted_key !== 'string') {\n throw new JWEInvalid('JWE Encrypted Key incorrect type');\n }\n if (jwe.aad !== undefined && typeof jwe.aad !== 'string') {\n throw new JWEInvalid('JWE AAD incorrect type');\n }\n if (jwe.header !== undefined && !isObject(jwe.header)) {\n throw new JWEInvalid('JWE Shared Unprotected Header incorrect type');\n }\n if (jwe.unprotected !== undefined && !isObject(jwe.unprotected)) {\n throw new JWEInvalid('JWE Per-Recipient Unprotected Header incorrect type');\n }\n let parsedProt;\n if (jwe.protected) {\n try {\n const protectedHeader = b64u(jwe.protected);\n parsedProt = JSON.parse(decoder.decode(protectedHeader));\n }\n catch {\n throw new JWEInvalid('JWE Protected Header is invalid');\n }\n }\n if (!isDisjoint(parsedProt, jwe.header, jwe.unprotected)) {\n throw new JWEInvalid('JWE Protected, JWE Unprotected Header, and JWE Per-Recipient Unprotected Header Parameter names must be disjoint');\n }\n const joseHeader = {\n ...parsedProt,\n ...jwe.header,\n ...jwe.unprotected,\n };\n validateCrit(JWEInvalid, new Map(), options?.crit, parsedProt, joseHeader);\n if (joseHeader.zip !== undefined && joseHeader.zip !== 'DEF') {\n throw new JOSENotSupported('Unsupported JWE \"zip\" (Compression Algorithm) Header Parameter value.');\n }\n if (joseHeader.zip !== undefined && !parsedProt?.zip) {\n throw new JWEInvalid('JWE \"zip\" (Compression Algorithm) Header Parameter MUST be in a protected header.');\n }\n const { alg, enc } = joseHeader;\n if (typeof alg !== 'string' || !alg) {\n throw new JWEInvalid('missing JWE Algorithm (alg) in JWE Header');\n }\n if (typeof enc !== 'string' || !enc) {\n throw new JWEInvalid('missing JWE Encryption Algorithm (enc) in JWE Header');\n }\n const keyManagementAlgorithms = options && validateAlgorithms('keyManagementAlgorithms', options.keyManagementAlgorithms);\n const contentEncryptionAlgorithms = options &&\n validateAlgorithms('contentEncryptionAlgorithms', options.contentEncryptionAlgorithms);\n if ((keyManagementAlgorithms && !keyManagementAlgorithms.has(alg)) ||\n (!keyManagementAlgorithms && alg.startsWith('PBES2'))) {\n throw new JOSEAlgNotAllowed('\"alg\" (Algorithm) Header Parameter value not allowed');\n }\n if (contentEncryptionAlgorithms && !contentEncryptionAlgorithms.has(enc)) {\n throw new JOSEAlgNotAllowed('\"enc\" (Encryption Algorithm) Header Parameter value not allowed');\n }\n let encryptedKey;\n if (jwe.encrypted_key !== undefined) {\n try {\n encryptedKey = b64u(jwe.encrypted_key);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the encrypted_key');\n }\n }\n let resolvedKey = false;\n if (typeof key === 'function') {\n key = await key(parsedProt, jwe);\n resolvedKey = true;\n }\n checkKeyType(alg === 'dir' ? enc : alg, key, 'decrypt');\n const k = await normalizeKey(key, alg);\n let cek;\n try {\n cek = await decryptKeyManagement(alg, k, encryptedKey, joseHeader, options);\n }\n catch (err) {\n if (err instanceof TypeError || err instanceof JWEInvalid || err instanceof JOSENotSupported) {\n throw err;\n }\n cek = generateCek(enc);\n }\n let iv;\n let tag;\n if (jwe.iv !== undefined) {\n try {\n iv = b64u(jwe.iv);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the iv');\n }\n }\n if (jwe.tag !== undefined) {\n try {\n tag = b64u(jwe.tag);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the tag');\n }\n }\n const protectedHeader = jwe.protected !== undefined ? encode(jwe.protected) : new Uint8Array();\n let additionalData;\n if (jwe.aad !== undefined) {\n additionalData = concat(protectedHeader, encode('.'), encode(jwe.aad));\n }\n else {\n additionalData = protectedHeader;\n }\n let ciphertext;\n try {\n ciphertext = b64u(jwe.ciphertext);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the ciphertext');\n }\n const plaintext = await decrypt(enc, cek, ciphertext, iv, tag, additionalData);\n const result = { plaintext };\n if (joseHeader.zip === 'DEF') {\n const maxDecompressedLength = options?.maxDecompressedLength ?? 250_000;\n if (maxDecompressedLength === 0) {\n throw new JOSENotSupported('JWE \"zip\" (Compression Algorithm) Header Parameter is not supported.');\n }\n if (maxDecompressedLength !== Infinity &&\n (!Number.isSafeInteger(maxDecompressedLength) || maxDecompressedLength < 1)) {\n throw new TypeError('maxDecompressedLength must be 0, a positive safe integer, or Infinity');\n }\n result.plaintext = await decompress(plaintext, maxDecompressedLength);\n }\n if (jwe.protected !== undefined) {\n result.protectedHeader = parsedProt;\n }\n if (jwe.aad !== undefined) {\n try {\n result.additionalAuthenticatedData = b64u(jwe.aad);\n }\n catch {\n throw new JWEInvalid('Failed to base64url decode the aad');\n }\n }\n if (jwe.unprotected !== undefined) {\n result.sharedUnprotectedHeader = jwe.unprotected;\n }\n if (jwe.header !== undefined) {\n result.unprotectedHeader = jwe.header;\n }\n if (resolvedKey) {\n return { ...result, key: k };\n }\n return result;\n}\n","import { flattenedDecrypt } from '../flattened/decrypt.js';\nimport { JWEInvalid } from '../../util/errors.js';\nimport { decoder } from '../../lib/buffer_utils.js';\nexport async function compactDecrypt(jwe, key, options) {\n if (jwe instanceof Uint8Array) {\n jwe = decoder.decode(jwe);\n }\n if (typeof jwe !== 'string') {\n throw new JWEInvalid('Compact JWE must be a string or Uint8Array');\n }\n const { 0: protectedHeader, 1: encryptedKey, 2: iv, 3: ciphertext, 4: tag, length, } = jwe.split('.');\n if (length !== 5) {\n throw new JWEInvalid('Invalid Compact JWE');\n }\n const decrypted = await flattenedDecrypt({\n ciphertext,\n iv: iv || undefined,\n protected: protectedHeader,\n tag: tag || undefined,\n encrypted_key: encryptedKey || undefined,\n }, key, options);\n const result = { plaintext: decrypted.plaintext, protectedHeader: decrypted.protectedHeader };\n if (typeof key === 'function') {\n return { ...result, key: decrypted.key };\n }\n return result;\n}\n","import { flattenedDecrypt } from '../flattened/decrypt.js';\nimport { JWEDecryptionFailed, JWEInvalid } from '../../util/errors.js';\nimport { isObject } from '../../lib/is_object.js';\nexport async function generalDecrypt(jwe, key, options) {\n if (!isObject(jwe)) {\n throw new JWEInvalid('General JWE must be an object');\n }\n if (!Array.isArray(jwe.recipients) || !jwe.recipients.every(isObject)) {\n throw new JWEInvalid('JWE Recipients missing or incorrect type');\n }\n if (!jwe.recipients.length) {\n throw new JWEInvalid('JWE Recipients has no members');\n }\n for (const recipient of jwe.recipients) {\n try {\n return await flattenedDecrypt({\n aad: jwe.aad,\n ciphertext: jwe.ciphertext,\n encrypted_key: recipient.encrypted_key,\n header: recipient.header,\n iv: jwe.iv,\n protected: jwe.protected,\n tag: jwe.tag,\n unprotected: jwe.unprotected,\n }, key, options);\n }\n catch {\n }\n }\n throw new JWEDecryptionFailed();\n}\n","export const unprotected = Symbol();\n","import { invalidKeyInput } from './invalid_key_input.js';\nimport { encode as b64u } from '../util/base64url.js';\nimport { isCryptoKey, isKeyObject } from './is_key_like.js';\nexport async function keyToJWK(key) {\n if (isKeyObject(key)) {\n if (key.type === 'secret') {\n key = key.export();\n }\n else {\n return key.export({ format: 'jwk' });\n }\n }\n if (key instanceof Uint8Array) {\n return {\n kty: 'oct',\n k: b64u(key),\n };\n }\n if (!isCryptoKey(key)) {\n throw new TypeError(invalidKeyInput(key, 'CryptoKey', 'KeyObject', 'Uint8Array'));\n }\n if (!key.extractable) {\n throw new TypeError('non-extractable CryptoKey cannot be exported as a JWK');\n }\n const { ext, key_ops, alg, use, ...jwk } = await crypto.subtle.exportKey('jwk', key);\n if (jwk.kty === 'AKP') {\n ;\n jwk.alg = alg;\n }\n return jwk;\n}\n","import { toSPKI as exportPublic, toPKCS8 as exportPrivate } from '../lib/asn1.js';\nimport { keyToJWK } from '../lib/key_to_jwk.js';\nexport async function exportSPKI(key) {\n return exportPublic(key);\n}\nexport async function exportPKCS8(key) {\n return exportPrivate(key);\n}\nexport async function exportJWK(key) {\n return keyToJWK(key);\n}\n","import * as aeskw from './aeskw.js';\nimport * as ecdhes from './ecdhes.js';\nimport * as pbes2kw from './pbes2kw.js';\nimport * as rsaes from './rsaes.js';\nimport { encode as b64u } from '../util/base64url.js';\nimport { normalizeKey } from './normalize_key.js';\nimport { generateCek, cekLength } from '../lib/cek.js';\nimport { JOSENotSupported } from '../util/errors.js';\nimport { exportJWK } from '../key/export.js';\nimport { wrap as aesGcmKw } from './aesgcmkw.js';\nimport { assertCryptoKey } from './is_key_like.js';\nexport async function encryptKeyManagement(alg, enc, key, providedCek, providedParameters = {}) {\n let encryptedKey;\n let parameters;\n let cek;\n switch (alg) {\n case 'dir': {\n cek = key;\n break;\n }\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW': {\n assertCryptoKey(key);\n if (!ecdhes.allowed(key)) {\n throw new JOSENotSupported('ECDH with the provided key is not allowed or not supported by your javascript runtime');\n }\n const { apu, apv } = providedParameters;\n let ephemeralKey;\n if (providedParameters.epk) {\n ephemeralKey = (await normalizeKey(providedParameters.epk, alg));\n }\n else {\n ephemeralKey = (await crypto.subtle.generateKey(key.algorithm, true, ['deriveBits'])).privateKey;\n }\n const { x, y, crv, kty } = await exportJWK(ephemeralKey);\n const sharedSecret = await ecdhes.deriveKey(key, ephemeralKey, alg === 'ECDH-ES' ? enc : alg, alg === 'ECDH-ES' ? cekLength(enc) : parseInt(alg.slice(-5, -2), 10), apu, apv);\n parameters = { epk: { x, crv, kty } };\n if (kty === 'EC')\n parameters.epk.y = y;\n if (apu)\n parameters.apu = b64u(apu);\n if (apv)\n parameters.apv = b64u(apv);\n if (alg === 'ECDH-ES') {\n cek = sharedSecret;\n break;\n }\n cek = providedCek || generateCek(enc);\n const kwAlg = alg.slice(-6);\n encryptedKey = await aeskw.wrap(kwAlg, sharedSecret, cek);\n break;\n }\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512': {\n cek = providedCek || generateCek(enc);\n assertCryptoKey(key);\n encryptedKey = await rsaes.encrypt(alg, key, cek);\n break;\n }\n case 'PBES2-HS256+A128KW':\n case 'PBES2-HS384+A192KW':\n case 'PBES2-HS512+A256KW': {\n cek = providedCek || generateCek(enc);\n const { p2c, p2s } = providedParameters;\n ({ encryptedKey, ...parameters } = await pbes2kw.wrap(alg, key, cek, p2c, p2s));\n break;\n }\n case 'A128KW':\n case 'A192KW':\n case 'A256KW': {\n cek = providedCek || generateCek(enc);\n encryptedKey = await aeskw.wrap(alg, key, cek);\n break;\n }\n case 'A128GCMKW':\n case 'A192GCMKW':\n case 'A256GCMKW': {\n cek = providedCek || generateCek(enc);\n const { iv } = providedParameters;\n ({ encryptedKey, ...parameters } = await aesGcmKw(alg, key, cek, iv));\n break;\n }\n default: {\n throw new JOSENotSupported('Invalid or unsupported \"alg\" (JWE Algorithm) header value');\n }\n }\n return { cek, encryptedKey, parameters };\n}\n","import { encode as b64u } from '../../util/base64url.js';\nimport { unprotected } from '../../lib/private_symbols.js';\nimport { encrypt } from '../../lib/encrypt.js';\nimport { encryptKeyManagement } from '../../lib/encrypt_key_management.js';\nimport { JOSENotSupported, JWEInvalid } from '../../util/errors.js';\nimport { isDisjoint } from '../../lib/is_disjoint.js';\nimport { concat, encode } from '../../lib/buffer_utils.js';\nimport { validateCrit } from '../../lib/validate_crit.js';\nimport { normalizeKey } from '../../lib/normalize_key.js';\nimport { checkKeyType } from '../../lib/check_key_type.js';\nimport { compress } from '../../lib/deflate.js';\nexport class FlattenedEncrypt {\n #plaintext;\n #protectedHeader;\n #sharedUnprotectedHeader;\n #unprotectedHeader;\n #aad;\n #cek;\n #iv;\n #keyManagementParameters;\n constructor(plaintext) {\n if (!(plaintext instanceof Uint8Array)) {\n throw new TypeError('plaintext must be an instance of Uint8Array');\n }\n this.#plaintext = plaintext;\n }\n setKeyManagementParameters(parameters) {\n if (this.#keyManagementParameters) {\n throw new TypeError('setKeyManagementParameters can only be called once');\n }\n this.#keyManagementParameters = parameters;\n return this;\n }\n setProtectedHeader(protectedHeader) {\n if (this.#protectedHeader) {\n throw new TypeError('setProtectedHeader can only be called once');\n }\n this.#protectedHeader = protectedHeader;\n return this;\n }\n setSharedUnprotectedHeader(sharedUnprotectedHeader) {\n if (this.#sharedUnprotectedHeader) {\n throw new TypeError('setSharedUnprotectedHeader can only be called once');\n }\n this.#sharedUnprotectedHeader = sharedUnprotectedHeader;\n return this;\n }\n setUnprotectedHeader(unprotectedHeader) {\n if (this.#unprotectedHeader) {\n throw new TypeError('setUnprotectedHeader can only be called once');\n }\n this.#unprotectedHeader = unprotectedHeader;\n return this;\n }\n setAdditionalAuthenticatedData(aad) {\n this.#aad = aad;\n return this;\n }\n setContentEncryptionKey(cek) {\n if (this.#cek) {\n throw new TypeError('setContentEncryptionKey can only be called once');\n }\n this.#cek = cek;\n return this;\n }\n setInitializationVector(iv) {\n if (this.#iv) {\n throw new TypeError('setInitializationVector can only be called once');\n }\n this.#iv = iv;\n return this;\n }\n async encrypt(key, options) {\n if (!this.#protectedHeader && !this.#unprotectedHeader && !this.#sharedUnprotectedHeader) {\n throw new JWEInvalid('either setProtectedHeader, setUnprotectedHeader, or sharedUnprotectedHeader must be called before #encrypt()');\n }\n if (!isDisjoint(this.#protectedHeader, this.#unprotectedHeader, this.#sharedUnprotectedHeader)) {\n throw new JWEInvalid('JWE Protected, JWE Shared Unprotected and JWE Per-Recipient Header Parameter names must be disjoint');\n }\n const joseHeader = {\n ...this.#protectedHeader,\n ...this.#unprotectedHeader,\n ...this.#sharedUnprotectedHeader,\n };\n validateCrit(JWEInvalid, new Map(), options?.crit, this.#protectedHeader, joseHeader);\n if (joseHeader.zip !== undefined && joseHeader.zip !== 'DEF') {\n throw new JOSENotSupported('Unsupported JWE \"zip\" (Compression Algorithm) Header Parameter value.');\n }\n if (joseHeader.zip !== undefined && !this.#protectedHeader?.zip) {\n throw new JWEInvalid('JWE \"zip\" (Compression Algorithm) Header Parameter MUST be in a protected header.');\n }\n const { alg, enc } = joseHeader;\n if (typeof alg !== 'string' || !alg) {\n throw new JWEInvalid('JWE \"alg\" (Algorithm) Header Parameter missing or invalid');\n }\n if (typeof enc !== 'string' || !enc) {\n throw new JWEInvalid('JWE \"enc\" (Encryption Algorithm) Header Parameter missing or invalid');\n }\n let encryptedKey;\n if (this.#cek && (alg === 'dir' || alg === 'ECDH-ES')) {\n throw new TypeError(`setContentEncryptionKey cannot be called with JWE \"alg\" (Algorithm) Header ${alg}`);\n }\n checkKeyType(alg === 'dir' ? enc : alg, key, 'encrypt');\n let cek;\n {\n let parameters;\n const k = await normalizeKey(key, alg);\n ({ cek, encryptedKey, parameters } = await encryptKeyManagement(alg, enc, k, this.#cek, this.#keyManagementParameters));\n if (parameters) {\n if (options && unprotected in options) {\n if (!this.#unprotectedHeader) {\n this.setUnprotectedHeader(parameters);\n }\n else {\n this.#unprotectedHeader = { ...this.#unprotectedHeader, ...parameters };\n }\n }\n else if (!this.#protectedHeader) {\n this.setProtectedHeader(parameters);\n }\n else {\n this.#protectedHeader = { ...this.#protectedHeader, ...parameters };\n }\n }\n }\n let additionalData;\n let protectedHeaderS;\n let protectedHeaderB;\n let aadMember;\n if (this.#protectedHeader) {\n protectedHeaderS = b64u(JSON.stringify(this.#protectedHeader));\n protectedHeaderB = encode(protectedHeaderS);\n }\n else {\n protectedHeaderS = '';\n protectedHeaderB = new Uint8Array();\n }\n if (this.#aad) {\n aadMember = b64u(this.#aad);\n const aadMemberBytes = encode(aadMember);\n additionalData = concat(protectedHeaderB, encode('.'), aadMemberBytes);\n }\n else {\n additionalData = protectedHeaderB;\n }\n let plaintext = this.#plaintext;\n if (joseHeader.zip === 'DEF') {\n plaintext = await compress(plaintext);\n }\n const { ciphertext, tag, iv } = await encrypt(enc, plaintext, cek, this.#iv, additionalData);\n const jwe = {\n ciphertext: b64u(ciphertext),\n };\n if (iv) {\n jwe.iv = b64u(iv);\n }\n if (tag) {\n jwe.tag = b64u(tag);\n }\n if (encryptedKey) {\n jwe.encrypted_key = b64u(encryptedKey);\n }\n if (aadMember) {\n jwe.aad = aadMember;\n }\n if (this.#protectedHeader) {\n jwe.protected = protectedHeaderS;\n }\n if (this.#sharedUnprotectedHeader) {\n jwe.unprotected = this.#sharedUnprotectedHeader;\n }\n if (this.#unprotectedHeader) {\n jwe.header = this.#unprotectedHeader;\n }\n return jwe;\n }\n}\n","import { FlattenedEncrypt } from '../flattened/encrypt.js';\nimport { unprotected } from '../../lib/private_symbols.js';\nimport { JOSENotSupported, JWEInvalid } from '../../util/errors.js';\nimport { generateCek } from '../../lib/cek.js';\nimport { isDisjoint } from '../../lib/is_disjoint.js';\nimport { encryptKeyManagement } from '../../lib/encrypt_key_management.js';\nimport { encode as b64u } from '../../util/base64url.js';\nimport { validateCrit } from '../../lib/validate_crit.js';\nimport { normalizeKey } from '../../lib/normalize_key.js';\nimport { checkKeyType } from '../../lib/check_key_type.js';\nclass IndividualRecipient {\n #parent;\n unprotectedHeader;\n keyManagementParameters;\n key;\n options;\n constructor(enc, key, options) {\n this.#parent = enc;\n this.key = key;\n this.options = options;\n }\n setUnprotectedHeader(unprotectedHeader) {\n if (this.unprotectedHeader) {\n throw new TypeError('setUnprotectedHeader can only be called once');\n }\n this.unprotectedHeader = unprotectedHeader;\n return this;\n }\n setKeyManagementParameters(parameters) {\n if (this.keyManagementParameters) {\n throw new TypeError('setKeyManagementParameters can only be called once');\n }\n this.keyManagementParameters = parameters;\n return this;\n }\n addRecipient(...args) {\n return this.#parent.addRecipient(...args);\n }\n encrypt(...args) {\n return this.#parent.encrypt(...args);\n }\n done() {\n return this.#parent;\n }\n}\nexport class GeneralEncrypt {\n #plaintext;\n #recipients = [];\n #protectedHeader;\n #unprotectedHeader;\n #aad;\n constructor(plaintext) {\n this.#plaintext = plaintext;\n }\n addRecipient(key, options) {\n const recipient = new IndividualRecipient(this, key, { crit: options?.crit });\n this.#recipients.push(recipient);\n return recipient;\n }\n setProtectedHeader(protectedHeader) {\n if (this.#protectedHeader) {\n throw new TypeError('setProtectedHeader can only be called once');\n }\n this.#protectedHeader = protectedHeader;\n return this;\n }\n setSharedUnprotectedHeader(sharedUnprotectedHeader) {\n if (this.#unprotectedHeader) {\n throw new TypeError('setSharedUnprotectedHeader can only be called once');\n }\n this.#unprotectedHeader = sharedUnprotectedHeader;\n return this;\n }\n setAdditionalAuthenticatedData(aad) {\n this.#aad = aad;\n return this;\n }\n async encrypt() {\n if (!this.#recipients.length) {\n throw new JWEInvalid('at least one recipient must be added');\n }\n if (this.#recipients.length === 1) {\n const [recipient] = this.#recipients;\n const flattened = await new FlattenedEncrypt(this.#plaintext)\n .setAdditionalAuthenticatedData(this.#aad)\n .setProtectedHeader(this.#protectedHeader)\n .setSharedUnprotectedHeader(this.#unprotectedHeader)\n .setUnprotectedHeader(recipient.unprotectedHeader)\n .encrypt(recipient.key, { ...recipient.options });\n const jwe = {\n ciphertext: flattened.ciphertext,\n iv: flattened.iv,\n recipients: [{}],\n tag: flattened.tag,\n };\n if (flattened.aad)\n jwe.aad = flattened.aad;\n if (flattened.protected)\n jwe.protected = flattened.protected;\n if (flattened.unprotected)\n jwe.unprotected = flattened.unprotected;\n if (flattened.encrypted_key)\n jwe.recipients[0].encrypted_key = flattened.encrypted_key;\n if (flattened.header)\n jwe.recipients[0].header = flattened.header;\n return jwe;\n }\n let enc;\n for (let i = 0; i < this.#recipients.length; i++) {\n const recipient = this.#recipients[i];\n if (!isDisjoint(this.#protectedHeader, this.#unprotectedHeader, recipient.unprotectedHeader)) {\n throw new JWEInvalid('JWE Protected, JWE Shared Unprotected and JWE Per-Recipient Header Parameter names must be disjoint');\n }\n const joseHeader = {\n ...this.#protectedHeader,\n ...this.#unprotectedHeader,\n ...recipient.unprotectedHeader,\n };\n const { alg } = joseHeader;\n if (typeof alg !== 'string' || !alg) {\n throw new JWEInvalid('JWE \"alg\" (Algorithm) Header Parameter missing or invalid');\n }\n if (alg === 'dir' || alg === 'ECDH-ES') {\n throw new JWEInvalid('\"dir\" and \"ECDH-ES\" alg may only be used with a single recipient');\n }\n if (typeof joseHeader.enc !== 'string' || !joseHeader.enc) {\n throw new JWEInvalid('JWE \"enc\" (Encryption Algorithm) Header Parameter missing or invalid');\n }\n if (!enc) {\n enc = joseHeader.enc;\n }\n else if (enc !== joseHeader.enc) {\n throw new JWEInvalid('JWE \"enc\" (Encryption Algorithm) Header Parameter must be the same for all recipients');\n }\n validateCrit(JWEInvalid, new Map(), recipient.options.crit, this.#protectedHeader, joseHeader);\n if (joseHeader.zip !== undefined && joseHeader.zip !== 'DEF') {\n throw new JOSENotSupported('Unsupported JWE \"zip\" (Compression Algorithm) Header Parameter value.');\n }\n if (joseHeader.zip !== undefined && !this.#protectedHeader?.zip) {\n throw new JWEInvalid('JWE \"zip\" (Compression Algorithm) Header Parameter MUST be in a protected header.');\n }\n }\n const cek = generateCek(enc);\n const jwe = {\n ciphertext: '',\n recipients: [],\n };\n for (let i = 0; i < this.#recipients.length; i++) {\n const recipient = this.#recipients[i];\n const target = {};\n jwe.recipients.push(target);\n if (i === 0) {\n const flattened = await new FlattenedEncrypt(this.#plaintext)\n .setAdditionalAuthenticatedData(this.#aad)\n .setContentEncryptionKey(cek)\n .setProtectedHeader(this.#protectedHeader)\n .setSharedUnprotectedHeader(this.#unprotectedHeader)\n .setUnprotectedHeader(recipient.unprotectedHeader)\n .setKeyManagementParameters(recipient.keyManagementParameters)\n .encrypt(recipient.key, {\n ...recipient.options,\n [unprotected]: true,\n });\n jwe.ciphertext = flattened.ciphertext;\n jwe.iv = flattened.iv;\n jwe.tag = flattened.tag;\n if (flattened.aad)\n jwe.aad = flattened.aad;\n if (flattened.protected)\n jwe.protected = flattened.protected;\n if (flattened.unprotected)\n jwe.unprotected = flattened.unprotected;\n target.encrypted_key = flattened.encrypted_key;\n if (flattened.header)\n target.header = flattened.header;\n continue;\n }\n const alg = recipient.unprotectedHeader?.alg ||\n this.#protectedHeader?.alg ||\n this.#unprotectedHeader?.alg;\n checkKeyType(alg === 'dir' ? enc : alg, recipient.key, 'encrypt');\n const k = await normalizeKey(recipient.key, alg);\n const { encryptedKey, parameters } = await encryptKeyManagement(alg, enc, k, cek, recipient.keyManagementParameters);\n target.encrypted_key = b64u(encryptedKey);\n if (recipient.unprotectedHeader || parameters)\n target.header = { ...recipient.unprotectedHeader, ...parameters };\n }\n return jwe;\n }\n}\n","import { JOSENotSupported } from '../util/errors.js';\nexport function subtleAlgorithm(alg, algorithm) {\n const hash = `SHA-${alg.slice(-3)}`;\n switch (alg) {\n case 'HS256':\n case 'HS384':\n case 'HS512':\n return { hash, name: 'HMAC' };\n case 'PS256':\n case 'PS384':\n case 'PS512':\n return { hash, name: 'RSA-PSS', saltLength: parseInt(alg.slice(-3), 10) >> 3 };\n case 'RS256':\n case 'RS384':\n case 'RS512':\n return { hash, name: 'RSASSA-PKCS1-v1_5' };\n case 'ES256':\n case 'ES384':\n case 'ES512':\n return { hash, name: 'ECDSA', namedCurve: algorithm.namedCurve };\n case 'Ed25519':\n case 'EdDSA':\n return { name: 'Ed25519' };\n case 'ML-DSA-44':\n case 'ML-DSA-65':\n case 'ML-DSA-87':\n return { name: alg };\n default:\n throw new JOSENotSupported(`alg ${alg} is not supported either by JOSE or your javascript runtime`);\n }\n}\n","import { checkSigCryptoKey } from './crypto_key.js';\nimport { invalidKeyInput } from './invalid_key_input.js';\nexport async function getSigKey(alg, key, usage) {\n if (key instanceof Uint8Array) {\n if (!alg.startsWith('HS')) {\n throw new TypeError(invalidKeyInput(key, 'CryptoKey', 'KeyObject', 'JSON Web Key'));\n }\n return crypto.subtle.importKey('raw', key, { hash: `SHA-${alg.slice(-3)}`, name: 'HMAC' }, false, [usage]);\n }\n checkSigCryptoKey(key, alg, usage);\n return key;\n}\n","import { subtleAlgorithm } from './subtle_dsa.js';\nimport { checkKeyLength } from './check_key_length.js';\nimport { getSigKey } from './get_sign_verify_key.js';\nexport async function verify(alg, key, signature, data) {\n const cryptoKey = await getSigKey(alg, key, 'verify');\n checkKeyLength(alg, cryptoKey);\n const algorithm = subtleAlgorithm(alg, cryptoKey.algorithm);\n try {\n return await crypto.subtle.verify(algorithm, cryptoKey, signature, data);\n }\n catch {\n return false;\n }\n}\n","import { decode as b64u } from '../../util/base64url.js';\nimport { verify } from '../../lib/verify.js';\nimport { JOSEAlgNotAllowed, JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js';\nimport { concat, encoder, decoder, encode } from '../../lib/buffer_utils.js';\nimport { isDisjoint } from '../../lib/is_disjoint.js';\nimport { isObject } from '../../lib/is_object.js';\nimport { checkKeyType } from '../../lib/check_key_type.js';\nimport { validateCrit } from '../../lib/validate_crit.js';\nimport { validateAlgorithms } from '../../lib/validate_algorithms.js';\nimport { normalizeKey } from '../../lib/normalize_key.js';\nexport async function flattenedVerify(jws, key, options) {\n if (!isObject(jws)) {\n throw new JWSInvalid('Flattened JWS must be an object');\n }\n if (jws.protected === undefined && jws.header === undefined) {\n throw new JWSInvalid('Flattened JWS must have either of the \"protected\" or \"header\" members');\n }\n if (jws.protected !== undefined && typeof jws.protected !== 'string') {\n throw new JWSInvalid('JWS Protected Header incorrect type');\n }\n if (jws.payload === undefined) {\n throw new JWSInvalid('JWS Payload missing');\n }\n if (typeof jws.signature !== 'string') {\n throw new JWSInvalid('JWS Signature missing or incorrect type');\n }\n if (jws.header !== undefined && !isObject(jws.header)) {\n throw new JWSInvalid('JWS Unprotected Header incorrect type');\n }\n let parsedProt = {};\n if (jws.protected) {\n try {\n const protectedHeader = b64u(jws.protected);\n parsedProt = JSON.parse(decoder.decode(protectedHeader));\n }\n catch {\n throw new JWSInvalid('JWS Protected Header is invalid');\n }\n }\n if (!isDisjoint(parsedProt, jws.header)) {\n throw new JWSInvalid('JWS Protected and JWS Unprotected Header Parameter names must be disjoint');\n }\n const joseHeader = {\n ...parsedProt,\n ...jws.header,\n };\n const extensions = validateCrit(JWSInvalid, new Map([['b64', true]]), options?.crit, parsedProt, joseHeader);\n let b64 = true;\n if (extensions.has('b64')) {\n b64 = parsedProt.b64;\n if (typeof b64 !== 'boolean') {\n throw new JWSInvalid('The \"b64\" (base64url-encode payload) Header Parameter must be a boolean');\n }\n }\n const { alg } = joseHeader;\n if (typeof alg !== 'string' || !alg) {\n throw new JWSInvalid('JWS \"alg\" (Algorithm) Header Parameter missing or invalid');\n }\n const algorithms = options && validateAlgorithms('algorithms', options.algorithms);\n if (algorithms && !algorithms.has(alg)) {\n throw new JOSEAlgNotAllowed('\"alg\" (Algorithm) Header Parameter value not allowed');\n }\n if (b64) {\n if (typeof jws.payload !== 'string') {\n throw new JWSInvalid('JWS Payload must be a string');\n }\n }\n else if (typeof jws.payload !== 'string' && !(jws.payload instanceof Uint8Array)) {\n throw new JWSInvalid('JWS Payload must be a string or an Uint8Array instance');\n }\n let resolvedKey = false;\n if (typeof key === 'function') {\n key = await key(parsedProt, jws);\n resolvedKey = true;\n }\n checkKeyType(alg, key, 'verify');\n const data = concat(jws.protected !== undefined ? encode(jws.protected) : new Uint8Array(), encode('.'), typeof jws.payload === 'string'\n ? b64\n ? encode(jws.payload)\n : encoder.encode(jws.payload)\n : jws.payload);\n let signature;\n try {\n signature = b64u(jws.signature);\n }\n catch {\n throw new JWSInvalid('Failed to base64url decode the signature');\n }\n const k = await normalizeKey(key, alg);\n const verified = await verify(alg, k, signature, data);\n if (!verified) {\n throw new JWSSignatureVerificationFailed();\n }\n let payload;\n if (b64) {\n try {\n payload = b64u(jws.payload);\n }\n catch {\n throw new JWSInvalid('Failed to base64url decode the payload');\n }\n }\n else if (typeof jws.payload === 'string') {\n payload = encoder.encode(jws.payload);\n }\n else {\n payload = jws.payload;\n }\n const result = { payload };\n if (jws.protected !== undefined) {\n result.protectedHeader = parsedProt;\n }\n if (jws.header !== undefined) {\n result.unprotectedHeader = jws.header;\n }\n if (resolvedKey) {\n return { ...result, key: k };\n }\n return result;\n}\n","import { flattenedVerify } from '../flattened/verify.js';\nimport { JWSInvalid } from '../../util/errors.js';\nimport { decoder } from '../../lib/buffer_utils.js';\nexport async function compactVerify(jws, key, options) {\n if (jws instanceof Uint8Array) {\n jws = decoder.decode(jws);\n }\n if (typeof jws !== 'string') {\n throw new JWSInvalid('Compact JWS must be a string or Uint8Array');\n }\n const { 0: protectedHeader, 1: payload, 2: signature, length } = jws.split('.');\n if (length !== 3) {\n throw new JWSInvalid('Invalid Compact JWS');\n }\n const verified = await flattenedVerify({ payload, protected: protectedHeader, signature }, key, options);\n const result = { payload: verified.payload, protectedHeader: verified.protectedHeader };\n if (typeof key === 'function') {\n return { ...result, key: verified.key };\n }\n return result;\n}\n","import { flattenedVerify } from '../flattened/verify.js';\nimport { JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js';\nimport { isObject } from '../../lib/is_object.js';\nexport async function generalVerify(jws, key, options) {\n if (!isObject(jws)) {\n throw new JWSInvalid('General JWS must be an object');\n }\n if (!Array.isArray(jws.signatures) || !jws.signatures.every(isObject)) {\n throw new JWSInvalid('JWS Signatures missing or incorrect type');\n }\n for (const signature of jws.signatures) {\n try {\n return await flattenedVerify({\n header: signature.header,\n payload: jws.payload,\n protected: signature.protected,\n signature: signature.signature,\n }, key, options);\n }\n catch {\n }\n }\n throw new JWSSignatureVerificationFailed();\n}\n","import { JWTClaimValidationFailed, JWTExpired, JWTInvalid } from '../util/errors.js';\nimport { encoder, decoder } from './buffer_utils.js';\nimport { isObject } from './is_object.js';\nconst epoch = (date) => Math.floor(date.getTime() / 1000);\nconst minute = 60;\nconst hour = minute * 60;\nconst day = hour * 24;\nconst week = day * 7;\nconst year = day * 365.25;\nconst REGEX = /^(\\+|\\-)? ?(\\d+|\\d+\\.\\d+) ?(seconds?|secs?|s|minutes?|mins?|m|hours?|hrs?|h|days?|d|weeks?|w|years?|yrs?|y)(?: (ago|from now))?$/i;\nexport function secs(str) {\n const matched = REGEX.exec(str);\n if (!matched || (matched[4] && matched[1])) {\n throw new TypeError('Invalid time period format');\n }\n const value = parseFloat(matched[2]);\n const unit = matched[3].toLowerCase();\n let numericDate;\n switch (unit) {\n case 'sec':\n case 'secs':\n case 'second':\n case 'seconds':\n case 's':\n numericDate = Math.round(value);\n break;\n case 'minute':\n case 'minutes':\n case 'min':\n case 'mins':\n case 'm':\n numericDate = Math.round(value * minute);\n break;\n case 'hour':\n case 'hours':\n case 'hr':\n case 'hrs':\n case 'h':\n numericDate = Math.round(value * hour);\n break;\n case 'day':\n case 'days':\n case 'd':\n numericDate = Math.round(value * day);\n break;\n case 'week':\n case 'weeks':\n case 'w':\n numericDate = Math.round(value * week);\n break;\n default:\n numericDate = Math.round(value * year);\n break;\n }\n if (matched[1] === '-' || matched[4] === 'ago') {\n return -numericDate;\n }\n return numericDate;\n}\nfunction validateInput(label, input) {\n if (!Number.isFinite(input)) {\n throw new TypeError(`Invalid ${label} input`);\n }\n return input;\n}\nconst normalizeTyp = (value) => {\n if (value.includes('/')) {\n return value.toLowerCase();\n }\n return `application/${value.toLowerCase()}`;\n};\nconst checkAudiencePresence = (audPayload, audOption) => {\n if (typeof audPayload === 'string') {\n return audOption.includes(audPayload);\n }\n if (Array.isArray(audPayload)) {\n return audOption.some(Set.prototype.has.bind(new Set(audPayload)));\n }\n return false;\n};\nexport function validateClaimsSet(protectedHeader, encodedPayload, options = {}) {\n let payload;\n try {\n payload = JSON.parse(decoder.decode(encodedPayload));\n }\n catch {\n }\n if (!isObject(payload)) {\n throw new JWTInvalid('JWT Claims Set must be a top-level JSON object');\n }\n const { typ } = options;\n if (typ &&\n (typeof protectedHeader.typ !== 'string' ||\n normalizeTyp(protectedHeader.typ) !== normalizeTyp(typ))) {\n throw new JWTClaimValidationFailed('unexpected \"typ\" JWT header value', payload, 'typ', 'check_failed');\n }\n const { requiredClaims = [], issuer, subject, audience, maxTokenAge } = options;\n const presenceCheck = [...requiredClaims];\n if (maxTokenAge !== undefined)\n presenceCheck.push('iat');\n if (audience !== undefined)\n presenceCheck.push('aud');\n if (subject !== undefined)\n presenceCheck.push('sub');\n if (issuer !== undefined)\n presenceCheck.push('iss');\n for (const claim of new Set(presenceCheck.reverse())) {\n if (!(claim in payload)) {\n throw new JWTClaimValidationFailed(`missing required \"${claim}\" claim`, payload, claim, 'missing');\n }\n }\n if (issuer &&\n !(Array.isArray(issuer) ? issuer : [issuer]).includes(payload.iss)) {\n throw new JWTClaimValidationFailed('unexpected \"iss\" claim value', payload, 'iss', 'check_failed');\n }\n if (subject && payload.sub !== subject) {\n throw new JWTClaimValidationFailed('unexpected \"sub\" claim value', payload, 'sub', 'check_failed');\n }\n if (audience &&\n !checkAudiencePresence(payload.aud, typeof audience === 'string' ? [audience] : audience)) {\n throw new JWTClaimValidationFailed('unexpected \"aud\" claim value', payload, 'aud', 'check_failed');\n }\n let tolerance;\n switch (typeof options.clockTolerance) {\n case 'string':\n tolerance = secs(options.clockTolerance);\n break;\n case 'number':\n tolerance = options.clockTolerance;\n break;\n case 'undefined':\n tolerance = 0;\n break;\n default:\n throw new TypeError('Invalid clockTolerance option type');\n }\n const { currentDate } = options;\n const now = epoch(currentDate || new Date());\n if ((payload.iat !== undefined || maxTokenAge) && typeof payload.iat !== 'number') {\n throw new JWTClaimValidationFailed('\"iat\" claim must be a number', payload, 'iat', 'invalid');\n }\n if (payload.nbf !== undefined) {\n if (typeof payload.nbf !== 'number') {\n throw new JWTClaimValidationFailed('\"nbf\" claim must be a number', payload, 'nbf', 'invalid');\n }\n if (payload.nbf > now + tolerance) {\n throw new JWTClaimValidationFailed('\"nbf\" claim timestamp check failed', payload, 'nbf', 'check_failed');\n }\n }\n if (payload.exp !== undefined) {\n if (typeof payload.exp !== 'number') {\n throw new JWTClaimValidationFailed('\"exp\" claim must be a number', payload, 'exp', 'invalid');\n }\n if (payload.exp <= now - tolerance) {\n throw new JWTExpired('\"exp\" claim timestamp check failed', payload, 'exp', 'check_failed');\n }\n }\n if (maxTokenAge) {\n const age = now - payload.iat;\n const max = typeof maxTokenAge === 'number' ? maxTokenAge : secs(maxTokenAge);\n if (age - tolerance > max) {\n throw new JWTExpired('\"iat\" claim timestamp check failed (too far in the past)', payload, 'iat', 'check_failed');\n }\n if (age < 0 - tolerance) {\n throw new JWTClaimValidationFailed('\"iat\" claim timestamp check failed (it should be in the past)', payload, 'iat', 'check_failed');\n }\n }\n return payload;\n}\nexport class JWTClaimsBuilder {\n #payload;\n constructor(payload) {\n if (!isObject(payload)) {\n throw new TypeError('JWT Claims Set MUST be an object');\n }\n this.#payload = structuredClone(payload);\n }\n data() {\n return encoder.encode(JSON.stringify(this.#payload));\n }\n get iss() {\n return this.#payload.iss;\n }\n set iss(value) {\n this.#payload.iss = value;\n }\n get sub() {\n return this.#payload.sub;\n }\n set sub(value) {\n this.#payload.sub = value;\n }\n get aud() {\n return this.#payload.aud;\n }\n set aud(value) {\n this.#payload.aud = value;\n }\n set jti(value) {\n this.#payload.jti = value;\n }\n set nbf(value) {\n if (typeof value === 'number') {\n this.#payload.nbf = validateInput('setNotBefore', value);\n }\n else if (value instanceof Date) {\n this.#payload.nbf = validateInput('setNotBefore', epoch(value));\n }\n else {\n this.#payload.nbf = epoch(new Date()) + secs(value);\n }\n }\n set exp(value) {\n if (typeof value === 'number') {\n this.#payload.exp = validateInput('setExpirationTime', value);\n }\n else if (value instanceof Date) {\n this.#payload.exp = validateInput('setExpirationTime', epoch(value));\n }\n else {\n this.#payload.exp = epoch(new Date()) + secs(value);\n }\n }\n set iat(value) {\n if (value === undefined) {\n this.#payload.iat = epoch(new Date());\n }\n else if (value instanceof Date) {\n this.#payload.iat = validateInput('setIssuedAt', epoch(value));\n }\n else if (typeof value === 'string') {\n this.#payload.iat = validateInput('setIssuedAt', epoch(new Date()) + secs(value));\n }\n else {\n this.#payload.iat = validateInput('setIssuedAt', value);\n }\n }\n}\n","import { compactVerify } from '../jws/compact/verify.js';\nimport { validateClaimsSet } from '../lib/jwt_claims_set.js';\nimport { JWTInvalid } from '../util/errors.js';\nexport async function jwtVerify(jwt, key, options) {\n const verified = await compactVerify(jwt, key, options);\n if (verified.protectedHeader.crit?.includes('b64') && verified.protectedHeader.b64 === false) {\n throw new JWTInvalid('JWTs MUST NOT use unencoded payload');\n }\n const payload = validateClaimsSet(verified.protectedHeader, verified.payload, options);\n const result = { payload, protectedHeader: verified.protectedHeader };\n if (typeof key === 'function') {\n return { ...result, key: verified.key };\n }\n return result;\n}\n","import { compactDecrypt } from '../jwe/compact/decrypt.js';\nimport { validateClaimsSet } from '../lib/jwt_claims_set.js';\nimport { JWTClaimValidationFailed } from '../util/errors.js';\nexport async function jwtDecrypt(jwt, key, options) {\n const decrypted = await compactDecrypt(jwt, key, options);\n const payload = validateClaimsSet(decrypted.protectedHeader, decrypted.plaintext, options);\n const { protectedHeader } = decrypted;\n if (protectedHeader.iss !== undefined && protectedHeader.iss !== payload.iss) {\n throw new JWTClaimValidationFailed('replicated \"iss\" claim header parameter mismatch', payload, 'iss', 'mismatch');\n }\n if (protectedHeader.sub !== undefined && protectedHeader.sub !== payload.sub) {\n throw new JWTClaimValidationFailed('replicated \"sub\" claim header parameter mismatch', payload, 'sub', 'mismatch');\n }\n if (protectedHeader.aud !== undefined &&\n JSON.stringify(protectedHeader.aud) !== JSON.stringify(payload.aud)) {\n throw new JWTClaimValidationFailed('replicated \"aud\" claim header parameter mismatch', payload, 'aud', 'mismatch');\n }\n const result = { payload, protectedHeader };\n if (typeof key === 'function') {\n return { ...result, key: decrypted.key };\n }\n return result;\n}\n","import { FlattenedEncrypt } from '../flattened/encrypt.js';\nexport class CompactEncrypt {\n #flattened;\n constructor(plaintext) {\n this.#flattened = new FlattenedEncrypt(plaintext);\n }\n setContentEncryptionKey(cek) {\n this.#flattened.setContentEncryptionKey(cek);\n return this;\n }\n setInitializationVector(iv) {\n this.#flattened.setInitializationVector(iv);\n return this;\n }\n setProtectedHeader(protectedHeader) {\n this.#flattened.setProtectedHeader(protectedHeader);\n return this;\n }\n setKeyManagementParameters(parameters) {\n this.#flattened.setKeyManagementParameters(parameters);\n return this;\n }\n async encrypt(key, options) {\n const jwe = await this.#flattened.encrypt(key, options);\n return [jwe.protected, jwe.encrypted_key, jwe.iv, jwe.ciphertext, jwe.tag].join('.');\n }\n}\n","import { subtleAlgorithm } from './subtle_dsa.js';\nimport { checkKeyLength } from './check_key_length.js';\nimport { getSigKey } from './get_sign_verify_key.js';\nexport async function sign(alg, key, data) {\n const cryptoKey = await getSigKey(alg, key, 'sign');\n checkKeyLength(alg, cryptoKey);\n const signature = await crypto.subtle.sign(subtleAlgorithm(alg, cryptoKey.algorithm), cryptoKey, data);\n return new Uint8Array(signature);\n}\n","import { encode as b64u } from '../../util/base64url.js';\nimport { sign } from '../../lib/sign.js';\nimport { isDisjoint } from '../../lib/is_disjoint.js';\nimport { JWSInvalid } from '../../util/errors.js';\nimport { concat, encode } from '../../lib/buffer_utils.js';\nimport { checkKeyType } from '../../lib/check_key_type.js';\nimport { validateCrit } from '../../lib/validate_crit.js';\nimport { normalizeKey } from '../../lib/normalize_key.js';\nexport class FlattenedSign {\n #payload;\n #protectedHeader;\n #unprotectedHeader;\n constructor(payload) {\n if (!(payload instanceof Uint8Array)) {\n throw new TypeError('payload must be an instance of Uint8Array');\n }\n this.#payload = payload;\n }\n setProtectedHeader(protectedHeader) {\n if (this.#protectedHeader) {\n throw new TypeError('setProtectedHeader can only be called once');\n }\n this.#protectedHeader = protectedHeader;\n return this;\n }\n setUnprotectedHeader(unprotectedHeader) {\n if (this.#unprotectedHeader) {\n throw new TypeError('setUnprotectedHeader can only be called once');\n }\n this.#unprotectedHeader = unprotectedHeader;\n return this;\n }\n async sign(key, options) {\n if (!this.#protectedHeader && !this.#unprotectedHeader) {\n throw new JWSInvalid('either setProtectedHeader or setUnprotectedHeader must be called before #sign()');\n }\n if (!isDisjoint(this.#protectedHeader, this.#unprotectedHeader)) {\n throw new JWSInvalid('JWS Protected and JWS Unprotected Header Parameter names must be disjoint');\n }\n const joseHeader = {\n ...this.#protectedHeader,\n ...this.#unprotectedHeader,\n };\n const extensions = validateCrit(JWSInvalid, new Map([['b64', true]]), options?.crit, this.#protectedHeader, joseHeader);\n let b64 = true;\n if (extensions.has('b64')) {\n b64 = this.#protectedHeader.b64;\n if (typeof b64 !== 'boolean') {\n throw new JWSInvalid('The \"b64\" (base64url-encode payload) Header Parameter must be a boolean');\n }\n }\n const { alg } = joseHeader;\n if (typeof alg !== 'string' || !alg) {\n throw new JWSInvalid('JWS \"alg\" (Algorithm) Header Parameter missing or invalid');\n }\n checkKeyType(alg, key, 'sign');\n let payloadS;\n let payloadB;\n if (b64) {\n payloadS = b64u(this.#payload);\n payloadB = encode(payloadS);\n }\n else {\n payloadB = this.#payload;\n payloadS = '';\n }\n let protectedHeaderString;\n let protectedHeaderBytes;\n if (this.#protectedHeader) {\n protectedHeaderString = b64u(JSON.stringify(this.#protectedHeader));\n protectedHeaderBytes = encode(protectedHeaderString);\n }\n else {\n protectedHeaderString = '';\n protectedHeaderBytes = new Uint8Array();\n }\n const data = concat(protectedHeaderBytes, encode('.'), payloadB);\n const k = await normalizeKey(key, alg);\n const signature = await sign(alg, k, data);\n const jws = {\n signature: b64u(signature),\n payload: payloadS,\n };\n if (this.#unprotectedHeader) {\n jws.header = this.#unprotectedHeader;\n }\n if (this.#protectedHeader) {\n jws.protected = protectedHeaderString;\n }\n return jws;\n }\n}\n","import { FlattenedSign } from '../flattened/sign.js';\nexport class CompactSign {\n #flattened;\n constructor(payload) {\n this.#flattened = new FlattenedSign(payload);\n }\n setProtectedHeader(protectedHeader) {\n this.#flattened.setProtectedHeader(protectedHeader);\n return this;\n }\n async sign(key, options) {\n const jws = await this.#flattened.sign(key, options);\n if (jws.payload === undefined) {\n throw new TypeError('use the flattened module for creating JWS with b64: false');\n }\n return `${jws.protected}.${jws.payload}.${jws.signature}`;\n }\n}\n","import { FlattenedSign } from '../flattened/sign.js';\nimport { JWSInvalid } from '../../util/errors.js';\nclass IndividualSignature {\n #parent;\n protectedHeader;\n unprotectedHeader;\n options;\n key;\n constructor(sig, key, options) {\n this.#parent = sig;\n this.key = key;\n this.options = options;\n }\n setProtectedHeader(protectedHeader) {\n if (this.protectedHeader) {\n throw new TypeError('setProtectedHeader can only be called once');\n }\n this.protectedHeader = protectedHeader;\n return this;\n }\n setUnprotectedHeader(unprotectedHeader) {\n if (this.unprotectedHeader) {\n throw new TypeError('setUnprotectedHeader can only be called once');\n }\n this.unprotectedHeader = unprotectedHeader;\n return this;\n }\n addSignature(...args) {\n return this.#parent.addSignature(...args);\n }\n sign(...args) {\n return this.#parent.sign(...args);\n }\n done() {\n return this.#parent;\n }\n}\nexport class GeneralSign {\n #payload;\n #signatures = [];\n constructor(payload) {\n this.#payload = payload;\n }\n addSignature(key, options) {\n const signature = new IndividualSignature(this, key, options);\n this.#signatures.push(signature);\n return signature;\n }\n async sign() {\n if (!this.#signatures.length) {\n throw new JWSInvalid('at least one signature must be added');\n }\n const jws = {\n signatures: [],\n payload: '',\n };\n for (let i = 0; i < this.#signatures.length; i++) {\n const signature = this.#signatures[i];\n const flattened = new FlattenedSign(this.#payload);\n flattened.setProtectedHeader(signature.protectedHeader);\n flattened.setUnprotectedHeader(signature.unprotectedHeader);\n const { payload, ...rest } = await flattened.sign(signature.key, signature.options);\n if (i === 0) {\n jws.payload = payload;\n }\n else if (jws.payload !== payload) {\n throw new JWSInvalid('inconsistent use of JWS Unencoded Payload (RFC7797)');\n }\n jws.signatures.push(rest);\n }\n return jws;\n }\n}\n","import { CompactSign } from '../jws/compact/sign.js';\nimport { JWTInvalid } from '../util/errors.js';\nimport { JWTClaimsBuilder } from '../lib/jwt_claims_set.js';\nexport class SignJWT {\n #protectedHeader;\n #jwt;\n constructor(payload = {}) {\n this.#jwt = new JWTClaimsBuilder(payload);\n }\n setIssuer(issuer) {\n this.#jwt.iss = issuer;\n return this;\n }\n setSubject(subject) {\n this.#jwt.sub = subject;\n return this;\n }\n setAudience(audience) {\n this.#jwt.aud = audience;\n return this;\n }\n setJti(jwtId) {\n this.#jwt.jti = jwtId;\n return this;\n }\n setNotBefore(input) {\n this.#jwt.nbf = input;\n return this;\n }\n setExpirationTime(input) {\n this.#jwt.exp = input;\n return this;\n }\n setIssuedAt(input) {\n this.#jwt.iat = input;\n return this;\n }\n setProtectedHeader(protectedHeader) {\n this.#protectedHeader = protectedHeader;\n return this;\n }\n async sign(key, options) {\n const sig = new CompactSign(this.#jwt.data());\n sig.setProtectedHeader(this.#protectedHeader);\n if (Array.isArray(this.#protectedHeader?.crit) &&\n this.#protectedHeader.crit.includes('b64') &&\n this.#protectedHeader.b64 === false) {\n throw new JWTInvalid('JWTs MUST NOT use unencoded payload');\n }\n return sig.sign(key, options);\n }\n}\n","import { CompactEncrypt } from '../jwe/compact/encrypt.js';\nimport { JWTClaimsBuilder } from '../lib/jwt_claims_set.js';\nexport class EncryptJWT {\n #cek;\n #iv;\n #keyManagementParameters;\n #protectedHeader;\n #replicateIssuerAsHeader;\n #replicateSubjectAsHeader;\n #replicateAudienceAsHeader;\n #jwt;\n constructor(payload = {}) {\n this.#jwt = new JWTClaimsBuilder(payload);\n }\n setIssuer(issuer) {\n this.#jwt.iss = issuer;\n return this;\n }\n setSubject(subject) {\n this.#jwt.sub = subject;\n return this;\n }\n setAudience(audience) {\n this.#jwt.aud = audience;\n return this;\n }\n setJti(jwtId) {\n this.#jwt.jti = jwtId;\n return this;\n }\n setNotBefore(input) {\n this.#jwt.nbf = input;\n return this;\n }\n setExpirationTime(input) {\n this.#jwt.exp = input;\n return this;\n }\n setIssuedAt(input) {\n this.#jwt.iat = input;\n return this;\n }\n setProtectedHeader(protectedHeader) {\n if (this.#protectedHeader) {\n throw new TypeError('setProtectedHeader can only be called once');\n }\n this.#protectedHeader = protectedHeader;\n return this;\n }\n setKeyManagementParameters(parameters) {\n if (this.#keyManagementParameters) {\n throw new TypeError('setKeyManagementParameters can only be called once');\n }\n this.#keyManagementParameters = parameters;\n return this;\n }\n setContentEncryptionKey(cek) {\n if (this.#cek) {\n throw new TypeError('setContentEncryptionKey can only be called once');\n }\n this.#cek = cek;\n return this;\n }\n setInitializationVector(iv) {\n if (this.#iv) {\n throw new TypeError('setInitializationVector can only be called once');\n }\n this.#iv = iv;\n return this;\n }\n replicateIssuerAsHeader() {\n this.#replicateIssuerAsHeader = true;\n return this;\n }\n replicateSubjectAsHeader() {\n this.#replicateSubjectAsHeader = true;\n return this;\n }\n replicateAudienceAsHeader() {\n this.#replicateAudienceAsHeader = true;\n return this;\n }\n async encrypt(key, options) {\n const enc = new CompactEncrypt(this.#jwt.data());\n if (this.#protectedHeader &&\n (this.#replicateIssuerAsHeader ||\n this.#replicateSubjectAsHeader ||\n this.#replicateAudienceAsHeader)) {\n this.#protectedHeader = {\n ...this.#protectedHeader,\n iss: this.#replicateIssuerAsHeader ? this.#jwt.iss : undefined,\n sub: this.#replicateSubjectAsHeader ? this.#jwt.sub : undefined,\n aud: this.#replicateAudienceAsHeader ? this.#jwt.aud : undefined,\n };\n }\n enc.setProtectedHeader(this.#protectedHeader);\n if (this.#iv) {\n enc.setInitializationVector(this.#iv);\n }\n if (this.#cek) {\n enc.setContentEncryptionKey(this.#cek);\n }\n if (this.#keyManagementParameters) {\n enc.setKeyManagementParameters(this.#keyManagementParameters);\n }\n return enc.encrypt(key, options);\n }\n}\n","import { digest } from '../lib/digest.js';\nimport { encode as b64u } from '../util/base64url.js';\nimport { JOSENotSupported, JWKInvalid } from '../util/errors.js';\nimport { encode } from '../lib/buffer_utils.js';\nimport { isKeyLike } from '../lib/is_key_like.js';\nimport { isJWK } from '../lib/is_jwk.js';\nimport { exportJWK } from '../key/export.js';\nimport { invalidKeyInput } from '../lib/invalid_key_input.js';\nconst check = (value, description) => {\n if (typeof value !== 'string' || !value) {\n throw new JWKInvalid(`${description} missing or invalid`);\n }\n};\nexport async function calculateJwkThumbprint(key, digestAlgorithm) {\n let jwk;\n if (isJWK(key)) {\n jwk = key;\n }\n else if (isKeyLike(key)) {\n jwk = await exportJWK(key);\n }\n else {\n throw new TypeError(invalidKeyInput(key, 'CryptoKey', 'KeyObject', 'JSON Web Key'));\n }\n digestAlgorithm ??= 'sha256';\n if (digestAlgorithm !== 'sha256' &&\n digestAlgorithm !== 'sha384' &&\n digestAlgorithm !== 'sha512') {\n throw new TypeError('digestAlgorithm must one of \"sha256\", \"sha384\", or \"sha512\"');\n }\n let components;\n switch (jwk.kty) {\n case 'AKP':\n check(jwk.alg, '\"alg\" (Algorithm) Parameter');\n check(jwk.pub, '\"pub\" (Public key) Parameter');\n components = { alg: jwk.alg, kty: jwk.kty, pub: jwk.pub };\n break;\n case 'EC':\n check(jwk.crv, '\"crv\" (Curve) Parameter');\n check(jwk.x, '\"x\" (X Coordinate) Parameter');\n check(jwk.y, '\"y\" (Y Coordinate) Parameter');\n components = { crv: jwk.crv, kty: jwk.kty, x: jwk.x, y: jwk.y };\n break;\n case 'OKP':\n check(jwk.crv, '\"crv\" (Subtype of Key Pair) Parameter');\n check(jwk.x, '\"x\" (Public Key) Parameter');\n components = { crv: jwk.crv, kty: jwk.kty, x: jwk.x };\n break;\n case 'RSA':\n check(jwk.e, '\"e\" (Exponent) Parameter');\n check(jwk.n, '\"n\" (Modulus) Parameter');\n components = { e: jwk.e, kty: jwk.kty, n: jwk.n };\n break;\n case 'oct':\n check(jwk.k, '\"k\" (Key Value) Parameter');\n components = { k: jwk.k, kty: jwk.kty };\n break;\n default:\n throw new JOSENotSupported('\"kty\" (Key Type) Parameter missing or unsupported');\n }\n const data = encode(JSON.stringify(components));\n return b64u(await digest(digestAlgorithm, data));\n}\nexport async function calculateJwkThumbprintUri(key, digestAlgorithm) {\n digestAlgorithm ??= 'sha256';\n const thumbprint = await calculateJwkThumbprint(key, digestAlgorithm);\n return `urn:ietf:params:oauth:jwk-thumbprint:sha-${digestAlgorithm.slice(-3)}:${thumbprint}`;\n}\n","import { importJWK } from '../key/import.js';\nimport { isObject } from '../lib/is_object.js';\nimport { JWSInvalid } from '../util/errors.js';\nexport async function EmbeddedJWK(protectedHeader, token) {\n const joseHeader = {\n ...protectedHeader,\n ...token?.header,\n };\n if (!isObject(joseHeader.jwk)) {\n throw new JWSInvalid('\"jwk\" (JSON Web Key) Header Parameter must be a JSON object');\n }\n const key = await importJWK({ ...joseHeader.jwk, ext: true }, joseHeader.alg);\n if (key instanceof Uint8Array || key.type !== 'public') {\n throw new JWSInvalid('\"jwk\" (JSON Web Key) Header Parameter must be a public key');\n }\n return key;\n}\n","import { importJWK } from '../key/import.js';\nimport { JWKSInvalid, JOSENotSupported, JWKSNoMatchingKey, JWKSMultipleMatchingKeys, } from '../util/errors.js';\nimport { isObject } from '../lib/is_object.js';\nfunction getKtyFromAlg(alg) {\n switch (typeof alg === 'string' && alg.slice(0, 2)) {\n case 'RS':\n case 'PS':\n return 'RSA';\n case 'ES':\n return 'EC';\n case 'Ed':\n return 'OKP';\n case 'ML':\n return 'AKP';\n default:\n throw new JOSENotSupported('Unsupported \"alg\" value for a JSON Web Key Set');\n }\n}\nfunction isJWKSLike(jwks) {\n return (jwks &&\n typeof jwks === 'object' &&\n Array.isArray(jwks.keys) &&\n jwks.keys.every(isJWKLike));\n}\nfunction isJWKLike(key) {\n return isObject(key);\n}\nclass LocalJWKSet {\n #jwks;\n #cached = new WeakMap();\n constructor(jwks) {\n if (!isJWKSLike(jwks)) {\n throw new JWKSInvalid('JSON Web Key Set malformed');\n }\n this.#jwks = structuredClone(jwks);\n }\n jwks() {\n return this.#jwks;\n }\n async getKey(protectedHeader, token) {\n const { alg, kid } = { ...protectedHeader, ...token?.header };\n const kty = getKtyFromAlg(alg);\n const candidates = this.#jwks.keys.filter((jwk) => {\n let candidate = kty === jwk.kty;\n if (candidate && typeof kid === 'string') {\n candidate = kid === jwk.kid;\n }\n if (candidate && (typeof jwk.alg === 'string' || kty === 'AKP')) {\n candidate = alg === jwk.alg;\n }\n if (candidate && typeof jwk.use === 'string') {\n candidate = jwk.use === 'sig';\n }\n if (candidate && Array.isArray(jwk.key_ops)) {\n candidate = jwk.key_ops.includes('verify');\n }\n if (candidate) {\n switch (alg) {\n case 'ES256':\n candidate = jwk.crv === 'P-256';\n break;\n case 'ES384':\n candidate = jwk.crv === 'P-384';\n break;\n case 'ES512':\n candidate = jwk.crv === 'P-521';\n break;\n case 'Ed25519':\n case 'EdDSA':\n candidate = jwk.crv === 'Ed25519';\n break;\n }\n }\n return candidate;\n });\n const { 0: jwk, length } = candidates;\n if (length === 0) {\n throw new JWKSNoMatchingKey();\n }\n if (length !== 1) {\n const error = new JWKSMultipleMatchingKeys();\n const _cached = this.#cached;\n error[Symbol.asyncIterator] = async function* () {\n for (const jwk of candidates) {\n try {\n yield await importWithAlgCache(_cached, jwk, alg);\n }\n catch { }\n }\n };\n throw error;\n }\n return importWithAlgCache(this.#cached, jwk, alg);\n }\n}\nasync function importWithAlgCache(cache, jwk, alg) {\n const cached = cache.get(jwk) || cache.set(jwk, {}).get(jwk);\n if (cached[alg] === undefined) {\n const key = await importJWK({ ...jwk, ext: true }, alg);\n if (key instanceof Uint8Array || key.type !== 'public') {\n throw new JWKSInvalid('JSON Web Key Set members must be public keys');\n }\n cached[alg] = key;\n }\n return cached[alg];\n}\nexport function createLocalJWKSet(jwks) {\n const set = new LocalJWKSet(jwks);\n const localJWKSet = async (protectedHeader, token) => set.getKey(protectedHeader, token);\n Object.defineProperties(localJWKSet, {\n jwks: {\n value: () => structuredClone(set.jwks()),\n enumerable: false,\n configurable: false,\n writable: false,\n },\n });\n return localJWKSet;\n}\n","import { JOSEError, JWKSNoMatchingKey, JWKSTimeout } from '../util/errors.js';\nimport { createLocalJWKSet } from './local.js';\nimport { isObject } from '../lib/is_object.js';\nfunction isCloudflareWorkers() {\n return (typeof WebSocketPair !== 'undefined' ||\n (typeof navigator !== 'undefined' && navigator.userAgent === 'Cloudflare-Workers') ||\n (typeof EdgeRuntime !== 'undefined' && EdgeRuntime === 'vercel'));\n}\nlet USER_AGENT;\nif (typeof navigator === 'undefined' || !navigator.userAgent?.startsWith?.('Mozilla/5.0 ')) {\n const NAME = 'jose';\n const VERSION = 'v6.2.0';\n USER_AGENT = `${NAME}/${VERSION}`;\n}\nexport const customFetch = Symbol();\nasync function fetchJwks(url, headers, signal, fetchImpl = fetch) {\n const response = await fetchImpl(url, {\n method: 'GET',\n signal,\n redirect: 'manual',\n headers,\n }).catch((err) => {\n if (err.name === 'TimeoutError') {\n throw new JWKSTimeout();\n }\n throw err;\n });\n if (response.status !== 200) {\n throw new JOSEError('Expected 200 OK from the JSON Web Key Set HTTP response');\n }\n try {\n return await response.json();\n }\n catch {\n throw new JOSEError('Failed to parse the JSON Web Key Set HTTP response as JSON');\n }\n}\nexport const jwksCache = Symbol();\nfunction isFreshJwksCache(input, cacheMaxAge) {\n if (typeof input !== 'object' || input === null) {\n return false;\n }\n if (!('uat' in input) || typeof input.uat !== 'number' || Date.now() - input.uat >= cacheMaxAge) {\n return false;\n }\n if (!('jwks' in input) ||\n !isObject(input.jwks) ||\n !Array.isArray(input.jwks.keys) ||\n !Array.prototype.every.call(input.jwks.keys, isObject)) {\n return false;\n }\n return true;\n}\nclass RemoteJWKSet {\n #url;\n #timeoutDuration;\n #cooldownDuration;\n #cacheMaxAge;\n #jwksTimestamp;\n #pendingFetch;\n #headers;\n #customFetch;\n #local;\n #cache;\n constructor(url, options) {\n if (!(url instanceof URL)) {\n throw new TypeError('url must be an instance of URL');\n }\n this.#url = new URL(url.href);\n this.#timeoutDuration =\n typeof options?.timeoutDuration === 'number' ? options?.timeoutDuration : 5000;\n this.#cooldownDuration =\n typeof options?.cooldownDuration === 'number' ? options?.cooldownDuration : 30000;\n this.#cacheMaxAge = typeof options?.cacheMaxAge === 'number' ? options?.cacheMaxAge : 600000;\n this.#headers = new Headers(options?.headers);\n if (USER_AGENT && !this.#headers.has('User-Agent')) {\n this.#headers.set('User-Agent', USER_AGENT);\n }\n if (!this.#headers.has('accept')) {\n this.#headers.set('accept', 'application/json');\n this.#headers.append('accept', 'application/jwk-set+json');\n }\n this.#customFetch = options?.[customFetch];\n if (options?.[jwksCache] !== undefined) {\n this.#cache = options?.[jwksCache];\n if (isFreshJwksCache(options?.[jwksCache], this.#cacheMaxAge)) {\n this.#jwksTimestamp = this.#cache.uat;\n this.#local = createLocalJWKSet(this.#cache.jwks);\n }\n }\n }\n pendingFetch() {\n return !!this.#pendingFetch;\n }\n coolingDown() {\n return typeof this.#jwksTimestamp === 'number'\n ? Date.now() < this.#jwksTimestamp + this.#cooldownDuration\n : false;\n }\n fresh() {\n return typeof this.#jwksTimestamp === 'number'\n ? Date.now() < this.#jwksTimestamp + this.#cacheMaxAge\n : false;\n }\n jwks() {\n return this.#local?.jwks();\n }\n async getKey(protectedHeader, token) {\n if (!this.#local || !this.fresh()) {\n await this.reload();\n }\n try {\n return await this.#local(protectedHeader, token);\n }\n catch (err) {\n if (err instanceof JWKSNoMatchingKey) {\n if (this.coolingDown() === false) {\n await this.reload();\n return this.#local(protectedHeader, token);\n }\n }\n throw err;\n }\n }\n async reload() {\n if (this.#pendingFetch && isCloudflareWorkers()) {\n this.#pendingFetch = undefined;\n }\n this.#pendingFetch ||= fetchJwks(this.#url.href, this.#headers, AbortSignal.timeout(this.#timeoutDuration), this.#customFetch)\n .then((json) => {\n this.#local = createLocalJWKSet(json);\n if (this.#cache) {\n this.#cache.uat = Date.now();\n this.#cache.jwks = json;\n }\n this.#jwksTimestamp = Date.now();\n this.#pendingFetch = undefined;\n })\n .catch((err) => {\n this.#pendingFetch = undefined;\n throw err;\n });\n await this.#pendingFetch;\n }\n}\nexport function createRemoteJWKSet(url, options) {\n const set = new RemoteJWKSet(url, options);\n const remoteJWKSet = async (protectedHeader, token) => set.getKey(protectedHeader, token);\n Object.defineProperties(remoteJWKSet, {\n coolingDown: {\n get: () => set.coolingDown(),\n enumerable: true,\n configurable: false,\n },\n fresh: {\n get: () => set.fresh(),\n enumerable: true,\n configurable: false,\n },\n reload: {\n value: () => set.reload(),\n enumerable: true,\n configurable: false,\n writable: false,\n },\n reloading: {\n get: () => set.pendingFetch(),\n enumerable: true,\n configurable: false,\n },\n jwks: {\n value: () => set.jwks(),\n enumerable: true,\n configurable: false,\n writable: false,\n },\n });\n return remoteJWKSet;\n}\n","import * as b64u from '../util/base64url.js';\nimport { decoder } from '../lib/buffer_utils.js';\nimport { JWTInvalid } from '../util/errors.js';\nimport { validateClaimsSet, JWTClaimsBuilder } from '../lib/jwt_claims_set.js';\nexport class UnsecuredJWT {\n #jwt;\n constructor(payload = {}) {\n this.#jwt = new JWTClaimsBuilder(payload);\n }\n encode() {\n const header = b64u.encode(JSON.stringify({ alg: 'none' }));\n const payload = b64u.encode(this.#jwt.data());\n return `${header}.${payload}.`;\n }\n setIssuer(issuer) {\n this.#jwt.iss = issuer;\n return this;\n }\n setSubject(subject) {\n this.#jwt.sub = subject;\n return this;\n }\n setAudience(audience) {\n this.#jwt.aud = audience;\n return this;\n }\n setJti(jwtId) {\n this.#jwt.jti = jwtId;\n return this;\n }\n setNotBefore(input) {\n this.#jwt.nbf = input;\n return this;\n }\n setExpirationTime(input) {\n this.#jwt.exp = input;\n return this;\n }\n setIssuedAt(input) {\n this.#jwt.iat = input;\n return this;\n }\n static decode(jwt, options) {\n if (typeof jwt !== 'string') {\n throw new JWTInvalid('Unsecured JWT must be a string');\n }\n const { 0: encodedHeader, 1: encodedPayload, 2: signature, length } = jwt.split('.');\n if (length !== 3 || signature !== '') {\n throw new JWTInvalid('Invalid Unsecured JWT');\n }\n let header;\n try {\n header = JSON.parse(decoder.decode(b64u.decode(encodedHeader)));\n if (header.alg !== 'none')\n throw new Error();\n }\n catch {\n throw new JWTInvalid('Invalid Unsecured JWT');\n }\n const payload = validateClaimsSet(header, b64u.decode(encodedPayload), options);\n return { payload, header };\n }\n}\n","import { decode as b64u } from './base64url.js';\nimport { decoder } from '../lib/buffer_utils.js';\nimport { isObject } from '../lib/is_object.js';\nexport function decodeProtectedHeader(token) {\n let protectedB64u;\n if (typeof token === 'string') {\n const parts = token.split('.');\n if (parts.length === 3 || parts.length === 5) {\n ;\n [protectedB64u] = parts;\n }\n }\n else if (typeof token === 'object' && token) {\n if ('protected' in token) {\n protectedB64u = token.protected;\n }\n else {\n throw new TypeError('Token does not contain a Protected Header');\n }\n }\n try {\n if (typeof protectedB64u !== 'string' || !protectedB64u) {\n throw new Error();\n }\n const result = JSON.parse(decoder.decode(b64u(protectedB64u)));\n if (!isObject(result)) {\n throw new Error();\n }\n return result;\n }\n catch {\n throw new TypeError('Invalid Token or Protected Header formatting');\n }\n}\n","import { decode as b64u } from './base64url.js';\nimport { decoder } from '../lib/buffer_utils.js';\nimport { isObject } from '../lib/is_object.js';\nimport { JWTInvalid } from './errors.js';\nexport function decodeJwt(jwt) {\n if (typeof jwt !== 'string')\n throw new JWTInvalid('JWTs must use Compact JWS serialization, JWT must be a string');\n const { 1: payload, length } = jwt.split('.');\n if (length === 5)\n throw new JWTInvalid('Only JWTs using Compact JWS serialization can be decoded');\n if (length !== 3)\n throw new JWTInvalid('Invalid JWT');\n if (!payload)\n throw new JWTInvalid('JWTs must contain a payload');\n let decoded;\n try {\n decoded = b64u(payload);\n }\n catch {\n throw new JWTInvalid('Failed to base64url decode the payload');\n }\n let result;\n try {\n result = JSON.parse(decoder.decode(decoded));\n }\n catch {\n throw new JWTInvalid('Failed to parse the decoded payload as JSON');\n }\n if (!isObject(result))\n throw new JWTInvalid('Invalid JWT Claims Set');\n return result;\n}\n","import { JOSENotSupported } from '../util/errors.js';\nfunction getModulusLengthOption(options) {\n const modulusLength = options?.modulusLength ?? 2048;\n if (typeof modulusLength !== 'number' || modulusLength < 2048) {\n throw new JOSENotSupported('Invalid or unsupported modulusLength option provided, 2048 bits or larger keys must be used');\n }\n return modulusLength;\n}\nexport async function generateKeyPair(alg, options) {\n let algorithm;\n let keyUsages;\n switch (alg) {\n case 'PS256':\n case 'PS384':\n case 'PS512':\n algorithm = {\n name: 'RSA-PSS',\n hash: `SHA-${alg.slice(-3)}`,\n publicExponent: Uint8Array.of(0x01, 0x00, 0x01),\n modulusLength: getModulusLengthOption(options),\n };\n keyUsages = ['sign', 'verify'];\n break;\n case 'RS256':\n case 'RS384':\n case 'RS512':\n algorithm = {\n name: 'RSASSA-PKCS1-v1_5',\n hash: `SHA-${alg.slice(-3)}`,\n publicExponent: Uint8Array.of(0x01, 0x00, 0x01),\n modulusLength: getModulusLengthOption(options),\n };\n keyUsages = ['sign', 'verify'];\n break;\n case 'RSA-OAEP':\n case 'RSA-OAEP-256':\n case 'RSA-OAEP-384':\n case 'RSA-OAEP-512':\n algorithm = {\n name: 'RSA-OAEP',\n hash: `SHA-${parseInt(alg.slice(-3), 10) || 1}`,\n publicExponent: Uint8Array.of(0x01, 0x00, 0x01),\n modulusLength: getModulusLengthOption(options),\n };\n keyUsages = ['decrypt', 'unwrapKey', 'encrypt', 'wrapKey'];\n break;\n case 'ES256':\n algorithm = { name: 'ECDSA', namedCurve: 'P-256' };\n keyUsages = ['sign', 'verify'];\n break;\n case 'ES384':\n algorithm = { name: 'ECDSA', namedCurve: 'P-384' };\n keyUsages = ['sign', 'verify'];\n break;\n case 'ES512':\n algorithm = { name: 'ECDSA', namedCurve: 'P-521' };\n keyUsages = ['sign', 'verify'];\n break;\n case 'Ed25519':\n case 'EdDSA': {\n keyUsages = ['sign', 'verify'];\n algorithm = { name: 'Ed25519' };\n break;\n }\n case 'ML-DSA-44':\n case 'ML-DSA-65':\n case 'ML-DSA-87': {\n keyUsages = ['sign', 'verify'];\n algorithm = { name: alg };\n break;\n }\n case 'ECDH-ES':\n case 'ECDH-ES+A128KW':\n case 'ECDH-ES+A192KW':\n case 'ECDH-ES+A256KW': {\n keyUsages = ['deriveBits'];\n const crv = options?.crv ?? 'P-256';\n switch (crv) {\n case 'P-256':\n case 'P-384':\n case 'P-521': {\n algorithm = { name: 'ECDH', namedCurve: crv };\n break;\n }\n case 'X25519':\n algorithm = { name: 'X25519' };\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported crv option provided, supported values are P-256, P-384, P-521, and X25519');\n }\n break;\n }\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n return crypto.subtle.generateKey(algorithm, options?.extractable ?? false, keyUsages);\n}\n","import { JOSENotSupported } from '../util/errors.js';\nexport async function generateSecret(alg, options) {\n let length;\n let algorithm;\n let keyUsages;\n switch (alg) {\n case 'HS256':\n case 'HS384':\n case 'HS512':\n length = parseInt(alg.slice(-3), 10);\n algorithm = { name: 'HMAC', hash: `SHA-${length}`, length };\n keyUsages = ['sign', 'verify'];\n break;\n case 'A128CBC-HS256':\n case 'A192CBC-HS384':\n case 'A256CBC-HS512':\n length = parseInt(alg.slice(-3), 10);\n return crypto.getRandomValues(new Uint8Array(length >> 3));\n case 'A128KW':\n case 'A192KW':\n case 'A256KW':\n length = parseInt(alg.slice(1, 4), 10);\n algorithm = { name: 'AES-KW', length };\n keyUsages = ['wrapKey', 'unwrapKey'];\n break;\n case 'A128GCMKW':\n case 'A192GCMKW':\n case 'A256GCMKW':\n case 'A128GCM':\n case 'A192GCM':\n case 'A256GCM':\n length = parseInt(alg.slice(1, 4), 10);\n algorithm = { name: 'AES-GCM', length };\n keyUsages = ['encrypt', 'decrypt'];\n break;\n default:\n throw new JOSENotSupported('Invalid or unsupported JWK \"alg\" (Algorithm) Parameter value');\n }\n return crypto.subtle.generateKey(algorithm, options?.extractable ?? false, keyUsages);\n}\n","export { compactDecrypt } from './jwe/compact/decrypt.js';\nexport { flattenedDecrypt } from './jwe/flattened/decrypt.js';\nexport { generalDecrypt } from './jwe/general/decrypt.js';\nexport { GeneralEncrypt } from './jwe/general/encrypt.js';\nexport { compactVerify } from './jws/compact/verify.js';\nexport { flattenedVerify } from './jws/flattened/verify.js';\nexport { generalVerify } from './jws/general/verify.js';\nexport { jwtVerify } from './jwt/verify.js';\nexport { jwtDecrypt } from './jwt/decrypt.js';\nexport { CompactEncrypt } from './jwe/compact/encrypt.js';\nexport { FlattenedEncrypt } from './jwe/flattened/encrypt.js';\nexport { CompactSign } from './jws/compact/sign.js';\nexport { FlattenedSign } from './jws/flattened/sign.js';\nexport { GeneralSign } from './jws/general/sign.js';\nexport { SignJWT } from './jwt/sign.js';\nexport { EncryptJWT } from './jwt/encrypt.js';\nexport { calculateJwkThumbprint, calculateJwkThumbprintUri } from './jwk/thumbprint.js';\nexport { EmbeddedJWK } from './jwk/embedded.js';\nexport { createLocalJWKSet } from './jwks/local.js';\nexport { createRemoteJWKSet, jwksCache, customFetch } from './jwks/remote.js';\nexport { UnsecuredJWT } from './jwt/unsecured.js';\nexport { exportPKCS8, exportSPKI, exportJWK } from './key/export.js';\nexport { importSPKI, importPKCS8, importX509, importJWK } from './key/import.js';\nexport { decodeProtectedHeader } from './util/decode_protected_header.js';\nexport { decodeJwt } from './util/decode_jwt.js';\nimport * as errors from './util/errors.js';\nexport { errors };\nexport { generateKeyPair } from './key/generate_key_pair.js';\nexport { generateSecret } from './key/generate_secret.js';\nimport * as base64url from './util/base64url.js';\nexport { base64url };\nexport const cryptoRuntime = 'WebCryptoAPI';\n"],"x_google_ignoreList":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66],"mappings":";;;;;;;;;;;;;AAAA,MAAa,UAAU,IAAI,aAAa;AACxC,MAAa,UAAU,IAAI,aAAa;AACxC,MAAM,YAAY,KAAK;AACvB,SAAgB,OAAO,GAAG,SAAS;CAC/B,MAAM,OAAO,QAAQ,QAAQ,KAAK,EAAE,aAAa,MAAM,QAAQ,EAAE;CACjE,MAAM,MAAM,IAAI,WAAW,KAAK;CAChC,IAAI,IAAI;AACR,MAAK,MAAM,UAAU,SAAS;AAC1B,MAAI,IAAI,QAAQ,EAAE;AAClB,OAAK,OAAO;;AAEhB,QAAO;;AAEX,SAAS,cAAc,KAAK,OAAO,QAAQ;AACvC,KAAI,QAAQ,KAAK,SAAS,UACtB,OAAM,IAAI,WAAW,6BAA6B,YAAY,EAAE,aAAa,QAAQ;AAEzF,KAAI,IAAI;EAAC,UAAU;EAAI,UAAU;EAAI,UAAU;EAAG,QAAQ;EAAK,EAAE,OAAO;;AAE5E,SAAgB,SAAS,OAAO;CAC5B,MAAM,OAAO,KAAK,MAAM,QAAQ,UAAU;CAC1C,MAAM,MAAM,QAAQ;CACpB,MAAM,MAAM,IAAI,WAAW,EAAE;AAC7B,eAAc,KAAK,MAAM,EAAE;AAC3B,eAAc,KAAK,KAAK,EAAE;AAC1B,QAAO;;AAEX,SAAgB,SAAS,OAAO;CAC5B,MAAM,MAAM,IAAI,WAAW,EAAE;AAC7B,eAAc,KAAK,MAAM;AACzB,QAAO;;AAEX,SAAgBA,SAAO,QAAQ;CAC3B,MAAM,QAAQ,IAAI,WAAW,OAAO,OAAO;AAC3C,MAAK,IAAI,IAAI,GAAG,IAAI,OAAO,QAAQ,KAAK;EACpC,MAAM,OAAO,OAAO,WAAW,EAAE;AACjC,MAAI,OAAO,IACP,OAAM,IAAI,UAAU,2CAA2C;AAEnE,QAAM,KAAK;;AAEf,QAAO;;;;ACzCX,SAAgB,aAAa,OAAO;AAChC,KAAI,WAAW,UAAU,SACrB,QAAO,MAAM,UAAU;CAE3B,MAAM,aAAa;CACnB,MAAM,MAAM,EAAE;AACd,MAAK,IAAI,IAAI,GAAG,IAAI,MAAM,QAAQ,KAAK,WACnC,KAAI,KAAK,OAAO,aAAa,MAAM,MAAM,MAAM,SAAS,GAAG,IAAI,WAAW,CAAC,CAAC;AAEhF,QAAO,KAAK,IAAI,KAAK,GAAG,CAAC;;AAE7B,SAAgB,aAAa,SAAS;AAClC,KAAI,WAAW,WACX,QAAO,WAAW,WAAW,QAAQ;CAEzC,MAAM,SAAS,KAAK,QAAQ;CAC5B,MAAM,QAAQ,IAAI,WAAW,OAAO,OAAO;AAC3C,MAAK,IAAI,IAAI,GAAG,IAAI,OAAO,QAAQ,IAC/B,OAAM,KAAK,OAAO,WAAW,EAAE;AAEnC,QAAO;;;;;;;;AClBX,SAAgB,OAAO,OAAO;AAC1B,KAAI,WAAW,WACX,QAAO,WAAW,WAAW,OAAO,UAAU,WAAW,QAAQ,QAAQ,OAAO,MAAM,EAAE,EACpF,UAAU,aACb,CAAC;CAEN,IAAI,UAAU;AACd,KAAI,mBAAmB,WACnB,WAAU,QAAQ,OAAO,QAAQ;AAErC,WAAU,QAAQ,QAAQ,MAAM,IAAI,CAAC,QAAQ,MAAM,IAAI;AACvD,KAAI;AACA,SAAO,aAAa,QAAQ;SAE1B;AACF,QAAM,IAAI,UAAU,oDAAoD;;;AAGhF,SAAgB,OAAO,OAAO;CAC1B,IAAI,YAAY;AAChB,KAAI,OAAO,cAAc,SACrB,aAAY,QAAQ,OAAO,UAAU;AAEzC,KAAI,WAAW,UAAU,SACrB,QAAO,UAAU,SAAS;EAAE,UAAU;EAAa,aAAa;EAAM,CAAC;AAE3E,QAAO,aAAa,UAAU,CAAC,QAAQ,MAAM,GAAG,CAAC,QAAQ,OAAO,IAAI,CAAC,QAAQ,OAAO,IAAI;;;;;;;;;;;;;;;;;;;;;AC5B5F,IAAa,YAAb,cAA+B,MAAM;CACjC,OAAO,OAAO;CACd,OAAO;CACP,YAAY,SAAS,SAAS;AAC1B,QAAM,SAAS,QAAQ;AACvB,OAAK,OAAO,KAAK,YAAY;AAC7B,QAAM,oBAAoB,MAAM,KAAK,YAAY;;;AAGzD,IAAa,2BAAb,cAA8C,UAAU;CACpD,OAAO,OAAO;CACd,OAAO;CACP;CACA;CACA;CACA,YAAY,SAAS,SAAS,QAAQ,eAAe,SAAS,eAAe;AACzE,QAAM,SAAS,EAAE,OAAO;GAAE;GAAO;GAAQ;GAAS,EAAE,CAAC;AACrD,OAAK,QAAQ;AACb,OAAK,SAAS;AACd,OAAK,UAAU;;;AAGvB,IAAa,aAAb,cAAgC,UAAU;CACtC,OAAO,OAAO;CACd,OAAO;CACP;CACA;CACA;CACA,YAAY,SAAS,SAAS,QAAQ,eAAe,SAAS,eAAe;AACzE,QAAM,SAAS,EAAE,OAAO;GAAE;GAAO;GAAQ;GAAS,EAAE,CAAC;AACrD,OAAK,QAAQ;AACb,OAAK,SAAS;AACd,OAAK,UAAU;;;AAGvB,IAAa,oBAAb,cAAuC,UAAU;CAC7C,OAAO,OAAO;CACd,OAAO;;AAEX,IAAa,mBAAb,cAAsC,UAAU;CAC5C,OAAO,OAAO;CACd,OAAO;;AAEX,IAAa,sBAAb,cAAyC,UAAU;CAC/C,OAAO,OAAO;CACd,OAAO;CACP,YAAY,UAAU,+BAA+B,SAAS;AAC1D,QAAM,SAAS,QAAQ;;;AAG/B,IAAa,aAAb,cAAgC,UAAU;CACtC,OAAO,OAAO;CACd,OAAO;;AAEX,IAAa,aAAb,cAAgC,UAAU;CACtC,OAAO,OAAO;CACd,OAAO;;AAEX,IAAa,aAAb,cAAgC,UAAU;CACtC,OAAO,OAAO;CACd,OAAO;;AAEX,IAAa,aAAb,cAAgC,UAAU;CACtC,OAAO,OAAO;CACd,OAAO;;AAEX,IAAa,cAAb,cAAiC,UAAU;CACvC,OAAO,OAAO;CACd,OAAO;;AAEX,IAAa,oBAAb,cAAuC,UAAU;CAC7C,OAAO,OAAO;CACd,OAAO;CACP,YAAY,UAAU,mDAAmD,SAAS;AAC9E,QAAM,SAAS,QAAQ;;;AAG/B,IAAa,2BAAb,cAA8C,UAAU;CACpD,CAAC,OAAO;CACR,OAAO,OAAO;CACd,OAAO;CACP,YAAY,UAAU,wDAAwD,SAAS;AACnF,QAAM,SAAS,QAAQ;;;AAG/B,IAAa,cAAb,cAAiC,UAAU;CACvC,OAAO,OAAO;CACd,OAAO;CACP,YAAY,UAAU,qBAAqB,SAAS;AAChD,QAAM,SAAS,QAAQ;;;AAG/B,IAAa,iCAAb,cAAoD,UAAU;CAC1D,OAAO,OAAO;CACd,OAAO;CACP,YAAY,UAAU,iCAAiC,SAAS;AAC5D,QAAM,SAAS,QAAQ;;;;;AC/F/B,SAAgB,UAAU,KAAK;AAC3B,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK,YACD,QAAO;EACX,KAAK;EACL,KAAK;EACL,KAAK,gBACD,QAAO;EACX,QACI,OAAM,IAAI,iBAAiB,8BAA8B,MAAM;;;AAG3E,MAAa,cAAc,QAAQ,OAAO,gBAAgB,IAAI,WAAW,UAAU,IAAI,IAAI,EAAE,CAAC;;;AChB9F,SAAgB,cAAc,KAAK,IAAI;AACnC,KAAI,GAAG,UAAU,MAAM,UAAU,IAAI,CACjC,OAAM,IAAI,WAAW,uCAAuC;;;;ACHpE,SAAgB,eAAe,KAAK,UAAU;CAC1C,MAAM,SAAS,IAAI,cAAc;AACjC,KAAI,WAAW,SACX,OAAM,IAAI,WAAW,mDAAmD,SAAS,aAAa,OAAO,OAAO;;;;ACJpH,MAAM,YAAY,MAAM,OAAO,qCAAqB,IAAI,UAAU,kDAAkD,KAAK,WAAW,OAAO;AAC3I,MAAM,eAAe,WAAW,SAAS,UAAU,SAAS;AAC5D,SAAS,cAAc,MAAM;AACzB,QAAO,SAAS,KAAK,KAAK,MAAM,EAAE,EAAE,GAAG;;AAE3C,SAAS,cAAc,KAAK;AACxB,SAAQ,KAAR;EACI,KAAK,QACD,QAAO;EACX,KAAK,QACD,QAAO;EACX,KAAK,QACD,QAAO;EACX,QACI,OAAM,IAAI,MAAM,cAAc;;;AAG1C,SAAS,WAAW,KAAK,OAAO;AAC5B,KAAI,SAAS,CAAC,IAAI,OAAO,SAAS,MAAM,CACpC,OAAM,IAAI,UAAU,sEAAsE,MAAM,GAAG;;AAG3G,SAAgB,kBAAkB,KAAK,KAAK,OAAO;AAC/C,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK,SAAS;AACV,OAAI,CAAC,YAAY,IAAI,WAAW,OAAO,CACnC,OAAM,SAAS,OAAO;GAC1B,MAAM,WAAW,SAAS,IAAI,MAAM,EAAE,EAAE,GAAG;AAE3C,OADe,cAAc,IAAI,UAAU,KAAK,KACjC,SACX,OAAM,SAAS,OAAO,YAAY,iBAAiB;AACvD;;EAEJ,KAAK;EACL,KAAK;EACL,KAAK,SAAS;AACV,OAAI,CAAC,YAAY,IAAI,WAAW,oBAAoB,CAChD,OAAM,SAAS,oBAAoB;GACvC,MAAM,WAAW,SAAS,IAAI,MAAM,EAAE,EAAE,GAAG;AAE3C,OADe,cAAc,IAAI,UAAU,KAAK,KACjC,SACX,OAAM,SAAS,OAAO,YAAY,iBAAiB;AACvD;;EAEJ,KAAK;EACL,KAAK;EACL,KAAK,SAAS;AACV,OAAI,CAAC,YAAY,IAAI,WAAW,UAAU,CACtC,OAAM,SAAS,UAAU;GAC7B,MAAM,WAAW,SAAS,IAAI,MAAM,EAAE,EAAE,GAAG;AAE3C,OADe,cAAc,IAAI,UAAU,KAAK,KACjC,SACX,OAAM,SAAS,OAAO,YAAY,iBAAiB;AACvD;;EAEJ,KAAK;EACL,KAAK;AACD,OAAI,CAAC,YAAY,IAAI,WAAW,UAAU,CACtC,OAAM,SAAS,UAAU;AAC7B;EAEJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI,CAAC,YAAY,IAAI,WAAW,IAAI,CAChC,OAAM,SAAS,IAAI;AACvB;EAEJ,KAAK;EACL,KAAK;EACL,KAAK,SAAS;AACV,OAAI,CAAC,YAAY,IAAI,WAAW,QAAQ,CACpC,OAAM,SAAS,QAAQ;GAC3B,MAAM,WAAW,cAAc,IAAI;AAEnC,OADe,IAAI,UAAU,eACd,SACX,OAAM,SAAS,UAAU,uBAAuB;AACpD;;EAEJ,QACI,OAAM,IAAI,UAAU,4CAA4C;;AAExE,YAAW,KAAK,MAAM;;AAE1B,SAAgB,kBAAkB,KAAK,KAAK,OAAO;AAC/C,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK,WAAW;AACZ,OAAI,CAAC,YAAY,IAAI,WAAW,UAAU,CACtC,OAAM,SAAS,UAAU;GAC7B,MAAM,WAAW,SAAS,IAAI,MAAM,GAAG,EAAE,EAAE,GAAG;AAE9C,OADe,IAAI,UAAU,WACd,SACX,OAAM,SAAS,UAAU,mBAAmB;AAChD;;EAEJ,KAAK;EACL,KAAK;EACL,KAAK,UAAU;AACX,OAAI,CAAC,YAAY,IAAI,WAAW,SAAS,CACrC,OAAM,SAAS,SAAS;GAC5B,MAAM,WAAW,SAAS,IAAI,MAAM,GAAG,EAAE,EAAE,GAAG;AAE9C,OADe,IAAI,UAAU,WACd,SACX,OAAM,SAAS,UAAU,mBAAmB;AAChD;;EAEJ,KAAK;AACD,WAAQ,IAAI,UAAU,MAAtB;IACI,KAAK;IACL,KAAK,SACD;IACJ,QACI,OAAM,SAAS,iBAAiB;;AAExC;EAEJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI,CAAC,YAAY,IAAI,WAAW,SAAS,CACrC,OAAM,SAAS,SAAS;AAC5B;EACJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK,gBAAgB;AACjB,OAAI,CAAC,YAAY,IAAI,WAAW,WAAW,CACvC,OAAM,SAAS,WAAW;GAC9B,MAAM,WAAW,SAAS,IAAI,MAAM,EAAE,EAAE,GAAG,IAAI;AAE/C,OADe,cAAc,IAAI,UAAU,KAAK,KACjC,SACX,OAAM,SAAS,OAAO,YAAY,iBAAiB;AACvD;;EAEJ,QACI,OAAM,IAAI,UAAU,4CAA4C;;AAExE,YAAW,KAAK,MAAM;;;;AC7I1B,SAAS,QAAQ,KAAK,QAAQ,GAAG,OAAO;AACpC,SAAQ,MAAM,OAAO,QAAQ;AAC7B,KAAI,MAAM,SAAS,GAAG;EAClB,MAAM,OAAO,MAAM,KAAK;AACxB,SAAO,eAAe,MAAM,KAAK,KAAK,CAAC,OAAO,KAAK;YAE9C,MAAM,WAAW,EACtB,QAAO,eAAe,MAAM,GAAG,MAAM,MAAM,GAAG;KAG9C,QAAO,WAAW,MAAM,GAAG;AAE/B,KAAI,UAAU,KACV,QAAO,aAAa;UAEf,OAAO,WAAW,cAAc,OAAO,KAC5C,QAAO,sBAAsB,OAAO;UAE/B,OAAO,WAAW,YAAY,UAAU;MACzC,OAAO,aAAa,KACpB,QAAO,4BAA4B,OAAO,YAAY;;AAG9D,QAAO;;AAEX,MAAa,mBAAmB,QAAQ,GAAG,UAAU,QAAQ,gBAAgB,QAAQ,GAAG,MAAM;AAC9F,MAAa,WAAW,KAAK,QAAQ,GAAG,UAAU,QAAQ,eAAe,IAAI,sBAAsB,QAAQ,GAAG,MAAM;;;AC1BpH,SAAgB,gBAAgB,KAAK;AACjC,KAAI,CAAC,YAAY,IAAI,CACjB,OAAM,IAAI,MAAM,8BAA8B;;AAGtD,MAAa,eAAe,QAAQ;AAChC,KAAI,MAAM,OAAO,iBAAiB,YAC9B,QAAO;AACX,KAAI;AACA,SAAO,eAAe;SAEpB;AACF,SAAO;;;AAGf,MAAa,eAAe,QAAQ,MAAM,OAAO,iBAAiB;AAClE,MAAa,aAAa,QAAQ,YAAY,IAAI,IAAI,YAAY,IAAI;;;ACTtE,eAAe,gBAAgB,GAAG,GAAG;AACjC,KAAI,EAAE,aAAa,YACf,OAAM,IAAI,UAAU,kCAAkC;AAE1D,KAAI,EAAE,aAAa,YACf,OAAM,IAAI,UAAU,mCAAmC;CAE3D,MAAM,YAAY;EAAE,MAAM;EAAQ,MAAM;EAAW;CACnD,MAAM,MAAO,MAAM,OAAO,OAAO,YAAY,WAAW,OAAO,CAAC,OAAO,CAAC;CACxE,MAAM,QAAQ,IAAI,WAAW,MAAM,OAAO,OAAO,KAAK,WAAW,KAAK,EAAE,CAAC;CACzE,MAAM,QAAQ,IAAI,WAAW,MAAM,OAAO,OAAO,KAAK,WAAW,KAAK,EAAE,CAAC;CACzE,IAAI,MAAM;CACV,IAAI,IAAI;AACR,QAAO,EAAE,IAAI,GACT,QAAO,MAAM,KAAK,MAAM;AAE5B,QAAO,QAAQ;;AAEnB,eAAe,WAAW,KAAK,KAAK,YAAY,IAAI,KAAK,KAAK;AAC1D,KAAI,EAAE,eAAe,YACjB,OAAM,IAAI,UAAU,gBAAgB,KAAK,aAAa,CAAC;CAE3D,MAAM,UAAU,SAAS,IAAI,MAAM,GAAG,EAAE,EAAE,GAAG;CAC7C,MAAM,SAAS,MAAM,OAAO,OAAO,UAAU,OAAO,IAAI,SAAS,WAAW,EAAE,EAAE,WAAW,OAAO,CAAC,UAAU,CAAC;CAC9G,MAAM,SAAS,MAAM,OAAO,OAAO,UAAU,OAAO,IAAI,SAAS,GAAG,WAAW,EAAE,EAAE;EAC/E,MAAM,OAAO,WAAW;EACxB,MAAM;EACT,EAAE,OAAO,CAAC,OAAO,CAAC;CACnB,MAAM,UAAU,OAAO,KAAK,IAAI,YAAY,SAAS,IAAI,UAAU,EAAE,CAAC;CACtE,MAAM,cAAc,IAAI,YAAY,MAAM,OAAO,OAAO,KAAK,QAAQ,QAAQ,QAAQ,EAAE,MAAM,GAAG,WAAW,EAAE,CAAC;CAC9G,IAAI;AACJ,KAAI;AACA,mBAAiB,MAAM,gBAAgB,KAAK,YAAY;SAEtD;AAEN,KAAI,CAAC,eACD,OAAM,IAAI,qBAAqB;CAEnC,IAAI;AACJ,KAAI;AACA,cAAY,IAAI,WAAW,MAAM,OAAO,OAAO,QAAQ;GAAM;GAAI,MAAM;GAAW,EAAE,QAAQ,WAAW,CAAC;SAEtG;AAEN,KAAI,CAAC,UACD,OAAM,IAAI,qBAAqB;AAEnC,QAAO;;AAEX,eAAe,WAAW,KAAK,KAAK,YAAY,IAAI,KAAK,KAAK;CAC1D,IAAI;AACJ,KAAI,eAAe,WACf,UAAS,MAAM,OAAO,OAAO,UAAU,OAAO,KAAK,WAAW,OAAO,CAAC,UAAU,CAAC;MAEhF;AACD,oBAAkB,KAAK,KAAK,UAAU;AACtC,WAAS;;AAEb,KAAI;AACA,SAAO,IAAI,WAAW,MAAM,OAAO,OAAO,QAAQ;GAC9C,gBAAgB;GACZ;GACJ,MAAM;GACN,WAAW;GACd,EAAE,QAAQ,OAAO,YAAY,IAAI,CAAC,CAAC;SAElC;AACF,QAAM,IAAI,qBAAqB;;;AAGvC,eAAsBC,UAAQ,KAAK,KAAK,YAAY,IAAI,KAAK,KAAK;AAC9D,KAAI,CAAC,YAAY,IAAI,IAAI,EAAE,eAAe,YACtC,OAAM,IAAI,UAAU,gBAAgB,KAAK,aAAa,aAAa,cAAc,eAAe,CAAC;AAErG,KAAI,CAAC,GACD,OAAM,IAAI,WAAW,oCAAoC;AAE7D,KAAI,CAAC,IACD,OAAM,IAAI,WAAW,iCAAiC;AAE1D,eAAc,KAAK,GAAG;AACtB,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI,eAAe,WACf,gBAAe,KAAK,SAAS,IAAI,MAAM,GAAG,EAAE,GAAG,CAAC;AACpD,UAAO,WAAW,KAAK,KAAK,YAAY,IAAI,KAAK,IAAI;EACzD,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI,eAAe,WACf,gBAAe,KAAK,SAAS,IAAI,MAAM,GAAG,EAAE,EAAE,GAAG,CAAC;AACtD,UAAO,WAAW,KAAK,KAAK,YAAY,IAAI,KAAK,IAAI;EACzD,QACI,OAAM,IAAI,iBAAiB,+CAA+C;;;;;ACvGtF,SAAgB,WAAW,GAAG,SAAS;CACnC,MAAM,UAAU,QAAQ,OAAO,QAAQ;AACvC,KAAI,QAAQ,WAAW,KAAK,QAAQ,WAAW,EAC3C,QAAO;CAEX,IAAI;AACJ,MAAK,MAAM,UAAU,SAAS;EAC1B,MAAM,aAAa,OAAO,KAAK,OAAO;AACtC,MAAI,CAAC,OAAO,IAAI,SAAS,GAAG;AACxB,SAAM,IAAI,IAAI,WAAW;AACzB;;AAEJ,OAAK,MAAM,aAAa,YAAY;AAChC,OAAI,IAAI,IAAI,UAAU,CAClB,QAAO;AAEX,OAAI,IAAI,UAAU;;;AAG1B,QAAO;;;;ACnBX,MAAM,gBAAgB,UAAU,OAAO,UAAU,YAAY,UAAU;AACvE,SAAgB,SAAS,OAAO;AAC5B,KAAI,CAAC,aAAa,MAAM,IAAI,OAAO,UAAU,SAAS,KAAK,MAAM,KAAK,kBAClE,QAAO;AAEX,KAAI,OAAO,eAAe,MAAM,KAAK,KACjC,QAAO;CAEX,IAAI,QAAQ;AACZ,QAAO,OAAO,eAAe,MAAM,KAAK,KACpC,SAAQ,OAAO,eAAe,MAAM;AAExC,QAAO,OAAO,eAAe,MAAM,KAAK;;;;ACX5C,SAAS,aAAa,KAAK,KAAK;AAC5B,KAAI,IAAI,UAAU,WAAW,SAAS,IAAI,MAAM,GAAG,EAAE,EAAE,GAAG,CACtD,OAAM,IAAI,UAAU,6BAA6B,MAAM;;AAG/D,SAASC,eAAa,KAAK,KAAK,OAAO;AACnC,KAAI,eAAe,WACf,QAAO,OAAO,OAAO,UAAU,OAAO,KAAK,UAAU,MAAM,CAAC,MAAM,CAAC;AAEvE,mBAAkB,KAAK,KAAK,MAAM;AAClC,QAAO;;AAEX,eAAsBC,OAAK,KAAK,KAAK,KAAK;CACtC,MAAM,YAAY,MAAMD,eAAa,KAAK,KAAK,UAAU;AACzD,cAAa,WAAW,IAAI;CAC5B,MAAM,eAAe,MAAM,OAAO,OAAO,UAAU,OAAO,KAAK;EAAE,MAAM;EAAW,MAAM;EAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;AACjH,QAAO,IAAI,WAAW,MAAM,OAAO,OAAO,QAAQ,OAAO,cAAc,WAAW,SAAS,CAAC;;AAEhG,eAAsBE,SAAO,KAAK,KAAK,cAAc;CACjD,MAAM,YAAY,MAAMF,eAAa,KAAK,KAAK,YAAY;AAC3D,cAAa,WAAW,IAAI;CAC5B,MAAM,eAAe,MAAM,OAAO,OAAO,UAAU,OAAO,cAAc,WAAW,UAAU;EAAE,MAAM;EAAW,MAAM;EAAQ,EAAE,MAAM,CAAC,OAAO,CAAC;AAC/I,QAAO,IAAI,WAAW,MAAM,OAAO,OAAO,UAAU,OAAO,aAAa,CAAC;;;;ACvB7E,eAAsB,OAAO,WAAW,MAAM;CAC1C,MAAM,eAAe,OAAO,UAAU,MAAM,GAAG;AAC/C,QAAO,IAAI,WAAW,MAAM,OAAO,OAAO,OAAO,cAAc,KAAK,CAAC;;;;ACCzE,SAAS,eAAe,OAAO;AAC3B,QAAO,OAAO,SAAS,MAAM,OAAO,EAAE,MAAM;;AAEhD,eAAe,UAAU,GAAG,GAAG,WAAW;CACtC,MAAM,QAAQ,KAAK;CACnB,MAAM,UAAU;CAChB,MAAM,OAAO,KAAK,KAAK,QAAQ,QAAQ;CACvC,MAAM,KAAK,IAAI,WAAW,OAAO,QAAQ;AACzC,MAAK,IAAI,IAAI,GAAG,KAAK,MAAM,KAAK;EAC5B,MAAM,YAAY,IAAI,WAAW,IAAI,EAAE,SAAS,UAAU,OAAO;AACjE,YAAU,IAAI,SAAS,EAAE,EAAE,EAAE;AAC7B,YAAU,IAAI,GAAG,EAAE;AACnB,YAAU,IAAI,WAAW,IAAI,EAAE,OAAO;EACtC,MAAM,aAAa,MAAM,OAAO,UAAU,UAAU;AACpD,KAAG,IAAI,aAAa,IAAI,KAAK,QAAQ;;AAEzC,QAAO,GAAG,MAAM,GAAG,MAAM;;AAE7B,eAAsBG,YAAU,WAAW,YAAY,WAAW,WAAW,MAAM,IAAI,YAAY,EAAE,MAAM,IAAI,YAAY,EAAE;AACzH,mBAAkB,WAAW,OAAO;AACpC,mBAAkB,YAAY,QAAQ,aAAa;CAMnD,MAAM,YAAY,OALE,eAAeC,SAAO,UAAU,CAAC,EAClC,eAAe,IAAI,EACnB,eAAe,IAAI,EAClB,SAAS,UAAU,EAClB,IAAI,YAAY,CACmD;AAKxF,QAAO,UAJG,IAAI,WAAW,MAAM,OAAO,OAAO,WAAW;EACpD,MAAM,UAAU,UAAU;EAC1B,QAAQ;EACX,EAAE,YAAY,iBAAiB,UAAU,CAAC,CAAC,EACxB,WAAW,UAAU;;AAE7C,SAAS,iBAAiB,WAAW;AACjC,KAAI,UAAU,UAAU,SAAS,SAC7B,QAAO;AAEX,QAAQ,KAAK,KAAK,SAAS,UAAU,UAAU,WAAW,MAAM,GAAG,EAAE,GAAG,GAAG,EAAE,IAAI;;AAErF,SAAgB,QAAQ,KAAK;AACzB,SAAQ,IAAI,UAAU,YAAtB;EACI,KAAK;EACL,KAAK;EACL,KAAK,QACD,QAAO;EACX,QACI,QAAO,IAAI,UAAU,SAAS;;;;;AC5C1C,SAAS,aAAa,KAAK,KAAK;AAC5B,KAAI,eAAe,WACf,QAAO,OAAO,OAAO,UAAU,OAAO,KAAK,UAAU,OAAO,CACxD,aACH,CAAC;AAEN,mBAAkB,KAAK,KAAK,aAAa;AACzC,QAAO;;AAEX,MAAM,cAAc,KAAK,aAAa,OAAOC,SAAO,IAAI,EAAE,WAAW,GAAG,EAAK,EAAE,SAAS;AACxF,eAAe,UAAU,KAAK,KAAK,KAAK,KAAK;AACzC,KAAI,EAAE,eAAe,eAAe,IAAI,SAAS,EAC7C,OAAM,IAAI,WAAW,4CAA4C;CAErE,MAAM,OAAO,WAAW,KAAK,IAAI;CACjC,MAAM,SAAS,SAAS,IAAI,MAAM,IAAI,GAAG,EAAE,GAAG;CAC9C,MAAM,YAAY;EACd,MAAM,OAAO,IAAI,MAAM,GAAG,GAAG;EAC7B,YAAY;EACZ,MAAM;EACN;EACH;CACD,MAAM,YAAY,MAAM,aAAa,KAAK,IAAI;AAC9C,QAAO,IAAI,WAAW,MAAM,OAAO,OAAO,WAAW,WAAW,WAAW,OAAO,CAAC;;AAEvF,eAAsBC,OAAK,KAAK,KAAK,KAAK,MAAM,MAAM,MAAM,OAAO,gBAAgB,IAAI,WAAW,GAAG,CAAC,EAAE;CACpG,MAAM,UAAU,MAAM,UAAU,KAAK,KAAK,KAAK,IAAI;AAEnD,QAAO;EAAE,cADY,MAAMC,OAAW,IAAI,MAAM,GAAG,EAAE,SAAS,IAAI;EAC3C;EAAK,KAAKC,OAAK,IAAI;EAAE;;AAEhD,eAAsBC,SAAO,KAAK,KAAK,cAAc,KAAK,KAAK;CAC3D,MAAM,UAAU,MAAM,UAAU,KAAK,KAAK,KAAK,IAAI;AACnD,QAAOC,SAAa,IAAI,MAAM,GAAG,EAAE,SAAS,aAAa;;;;ACrC7D,SAAgB,eAAe,KAAK,KAAK;AACrC,KAAI,IAAI,WAAW,KAAK,IAAI,IAAI,WAAW,KAAK,EAAE;EAC9C,MAAM,EAAE,kBAAkB,IAAI;AAC9B,MAAI,OAAO,kBAAkB,YAAY,gBAAgB,KACrD,OAAM,IAAI,UAAU,GAAG,IAAI,uDAAuD;;;;;ACD9F,MAAMC,qBAAmB,QAAQ;AAC7B,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK,eACD,QAAO;EACX,QACI,OAAM,IAAI,iBAAiB,OAAO,IAAI,6DAA6D;;;AAG/G,eAAsBC,UAAQ,KAAK,KAAK,KAAK;AACzC,mBAAkB,KAAK,KAAK,UAAU;AACtC,gBAAe,KAAK,IAAI;AACxB,QAAO,IAAI,WAAW,MAAM,OAAO,OAAO,QAAQD,kBAAgB,IAAI,EAAE,KAAK,IAAI,CAAC;;AAEtF,eAAsB,QAAQ,KAAK,KAAK,cAAc;AAClD,mBAAkB,KAAK,KAAK,UAAU;AACtC,gBAAe,KAAK,IAAI;AACxB,QAAO,IAAI,WAAW,MAAM,OAAO,OAAO,QAAQA,kBAAgB,IAAI,EAAE,KAAK,aAAa,CAAC;;;;ACrB/F,SAAgB,UAAU,KAAK;AAC3B,SAAQ,KAAR;EACI,KAAK,UACD,QAAO;EACX,KAAK,UACD,QAAO;EACX,KAAK;EACL,KAAK,gBACD,QAAO;EACX,KAAK,gBACD,QAAO;EACX,KAAK,gBACD,QAAO;EACX,QACI,OAAM,IAAI,iBAAiB,8BAA8B,MAAM;;;AAG3E,MAAa,eAAe,QAAQ,OAAO,gBAAgB,IAAI,WAAW,UAAU,IAAI,IAAI,EAAE,CAAC;;;ACd/F,MAAM,aAAa,KAAK,eAAe;AAEnC,QAAO,cAAc,WAAW,UADd,IAAI,MAAM,WAAW,IAAI,EAAE,EAAE,KAAK,KAAK,CACP,aAAa,WAAW;;AAE9E,MAAM,gBAAgB,OAAO,SAAS,WAAW,QAAQ;AACrD,KAAI,YAAY,IAAI,EAAE;AAClB,MAAI,IAAI,SAAS,QACb,OAAM,IAAI,UAAU,gBAAgB,QAAQ,MAAM;AAEtD,SAAO,IAAI,OAAO;GAAE,QAAQ;GAAO,MAAM;GAAW,CAAC;;AAEzD,KAAI,CAAC,YAAY,IAAI,CACjB,OAAM,IAAI,UAAU,gBAAgB,KAAK,aAAa,YAAY,CAAC;AAEvE,KAAI,CAAC,IAAI,YACL,OAAM,IAAI,UAAU,+BAA+B;AAEvD,KAAI,IAAI,SAAS,QACb,OAAM,IAAI,UAAU,gBAAgB,QAAQ,MAAM;AAEtD,QAAO,UAAU,aAAa,IAAI,WAAW,MAAM,OAAO,OAAO,UAAU,WAAW,IAAI,CAAC,CAAC,EAAE,GAAG,QAAQ,aAAa,CAAC,MAAM;;AAEjI,MAAa,UAAU,QAAQ,cAAc,UAAU,QAAQ,IAAI;AACnE,MAAa,WAAW,QAAQ,cAAc,WAAW,SAAS,IAAI;AACtE,MAAM,cAAc,GAAG,MAAM;AACzB,KAAI,EAAE,eAAe,EAAE,OACnB,QAAO;AACX,MAAK,IAAI,IAAI,GAAG,IAAI,EAAE,YAAY,IAC9B,KAAI,EAAE,OAAO,EAAE,GACX,QAAO;AAEf,QAAO;;AAEX,MAAM,mBAAmB,UAAU;CAAE;CAAM,KAAK;CAAG;AACnD,MAAM,eAAe,UAAU;CAC3B,MAAM,QAAQ,MAAM,KAAK,MAAM;AAC/B,KAAI,QAAQ,KAAM;EACd,MAAM,cAAc,QAAQ;EAC5B,IAAI,SAAS;AACb,OAAK,IAAI,IAAI,GAAG,IAAI,aAAa,IAC7B,UAAU,UAAU,IAAK,MAAM,KAAK,MAAM;AAE9C,SAAO;;AAEX,QAAO;;AAEX,MAAM,eAAe,OAAO,QAAQ,MAAM;AACtC,KAAI,SAAS,EACT;AACJ,OAAM;CACN,MAAM,SAAS,YAAY,MAAM;AACjC,OAAM,OAAO;AACb,KAAI,QAAQ,EACR,aAAY,OAAO,QAAQ,EAAE;;AAGrC,MAAM,aAAa,OAAO,aAAa,iBAAiB;AACpD,KAAI,MAAM,KAAK,MAAM,WAAW,YAC5B,OAAM,IAAI,MAAM,aAAa;;AAGrC,MAAM,eAAe,OAAO,WAAW;CACnC,MAAM,SAAS,MAAM,KAAK,SAAS,MAAM,KAAK,MAAM,MAAM,OAAO;AACjE,OAAM,OAAO;AACb,QAAO;;AAEX,MAAM,qBAAqB,UAAU;AACjC,WAAU,OAAO,GAAM,yBAAyB;AAEhD,QAAO,YAAY,OADJ,YAAY,MAAM,CACA;;AAErC,SAAS,iBAAiB,OAAO;AAC7B,WAAU,OAAO,IAAM,2BAA2B;AAClD,aAAY,MAAM;AAClB,WAAU,OAAO,GAAM,yBAAyB;CAChD,MAAM,SAAS,YAAY,MAAM;AACjC,OAAM,OAAO;AACb,WAAU,OAAO,IAAM,gCAAgC;CACvD,MAAM,WAAW,YAAY,MAAM;AAEnC,QAAO;EAAE,YADU,MAAM;EACJ,aAAa;EAAU;;AAEhD,SAAS,gBAAgB,OAAO;AAC5B,WAAU,OAAO,IAAM,yBAAyB;AAChD,aAAY,MAAM;AAClB,WAAU,OAAO,IAAM,gCAAgC;CACvD,MAAM,WAAW,YAAY,MAAM;AAEnC,QAAO;EAAE,YADU,MAAM;EACJ,aAAa;EAAU;;AAEhD,MAAM,8BAA8B,UAAU;CAC1C,MAAM,SAAS,kBAAkB,MAAM;AACvC,KAAI,WAAW,QAAQ;EAAC;EAAM;EAAM;EAAK,CAAC,CACtC,QAAO;AAEX,KAAI,CAAC,WAAW,QAAQ;EAAC;EAAM;EAAM;EAAM;EAAM;EAAM;EAAM;EAAK,CAAC,CAC/D,OAAM,IAAI,MAAM,4BAA4B;AAEhD,WAAU,OAAO,GAAM,qBAAqB;CAE5C,MAAM,WAAW,YAAY,OADT,YAAY,MAAM,CACU;AAChD,MAAK,MAAM,EAAE,MAAM,SAAS;EACxB;GAAE,MAAM;GAAS,KAAK;IAAC;IAAM;IAAM;IAAM;IAAM;IAAM;IAAM;IAAM;IAAK;GAAE;EACxE;GAAE,MAAM;GAAS,KAAK;IAAC;IAAM;IAAM;IAAM;IAAM;IAAK;GAAE;EACtD;GAAE,MAAM;GAAS,KAAK;IAAC;IAAM;IAAM;IAAM;IAAM;IAAK;GAAE;EACzD,CACG,KAAI,WAAW,UAAU,IAAI,CACzB,QAAO;AAGf,OAAM,IAAI,MAAM,0BAA0B;;AAE9C,MAAM,gBAAgB,OAAO,WAAW,SAAS,KAAK,YAAY;CAC9D,IAAI;CACJ,IAAI;CACJ,MAAM,WAAW,cAAc;CAC/B,MAAM,qBAAsB,WAAW,CAAC,SAAS,GAAG,CAAC,OAAO;CAC5D,MAAM,qBAAqB,WAAW,CAAC,WAAW,UAAU,GAAG,CAAC,WAAW,YAAY;AACvF,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK;AACD,eAAY;IAAE,MAAM;IAAW,MAAM,OAAO,IAAI,MAAM,GAAG;IAAI;AAC7D,eAAY,cAAc;AAC1B;EACJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,eAAY;IAAE,MAAM;IAAqB,MAAM,OAAO,IAAI,MAAM,GAAG;IAAI;AACvE,eAAY,cAAc;AAC1B;EACJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,eAAY;IACR,MAAM;IACN,MAAM,OAAO,SAAS,IAAI,MAAM,GAAG,EAAE,GAAG,IAAI;IAC/C;AACD,eAAY,cAAc;AAC1B;EACJ,KAAK;EACL,KAAK;EACL,KAAK;AAED,eAAY;IAAE,MAAM;IAAS,YADZ;KAAE,OAAO;KAAS,OAAO;KAAS,OAAO;KAAS,CACjB;IAAM;AACxD,eAAY,cAAc;AAC1B;EAEJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI;IACA,MAAM,aAAa,QAAQ,cAAc,QAAQ;AACjD,gBAAY,eAAe,WAAW,EAAE,MAAM,UAAU,GAAG;KAAE,MAAM;KAAQ;KAAY;YAEpF,OAAO;AACV,UAAM,IAAI,iBAAiB,oCAAoC;;AAEnE,eAAY,WAAW,EAAE,GAAG,CAAC,aAAa;AAC1C;EAEJ,KAAK;EACL,KAAK;AACD,eAAY,EAAE,MAAM,WAAW;AAC/B,eAAY,cAAc;AAC1B;EACJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,eAAY,EAAE,MAAM,KAAK;AACzB,eAAY,cAAc;AAC1B;EACJ,QACI,OAAM,IAAI,iBAAiB,mDAAiD;;AAEpF,QAAO,OAAO,OAAO,UAAU,WAAW,SAAS,WAAW,SAAS,gBAAgB,WAAW,OAAO,QAAQ,UAAU;;AAE/H,MAAM,kBAAkB,KAAK,YAAY;AACrC,QAAO,aAAa,IAAI,QAAQ,SAAS,GAAG,CAAC;;AAEjD,MAAa,aAAa,KAAK,KAAK,YAAY;CAC5C,MAAM,UAAU,eAAe,KAAK,8CAA8C;CAClF,IAAI,OAAO;AACX,KAAI,KAAK,aAAa,UAAU,EAAE;AAC9B,WAAS,EAAE;AACX,OAAK,iBAAiB,YAAY;GAC9B,MAAM,QAAQ,gBAAgB,QAAQ;AACtC,oBAAiB,MAAM;AACvB,UAAO,2BAA2B,MAAM;;;AAGhD,QAAO,cAAc,SAAS,SAAS,KAAK,KAAK;;AAErD,MAAa,YAAY,KAAK,KAAK,YAAY;CAC3C,MAAM,UAAU,eAAe,KAAK,6CAA6C;CACjF,IAAI,OAAO;AACX,KAAI,KAAK,aAAa,UAAU,EAAE;AAC9B,WAAS,EAAE;AACX,OAAK,iBAAiB,YAAY;GAC9B,MAAM,QAAQ,gBAAgB,QAAQ;AACtC,mBAAgB,MAAM;AACtB,UAAO,2BAA2B,MAAM;;;AAGhD,QAAO,cAAc,QAAQ,SAAS,KAAK,KAAK;;AAEpD,SAAS,aAAa,KAAK;CACvB,MAAM,QAAQ,gBAAgB,IAAI;AAClC,WAAU,OAAO,IAAM,gCAAgC;AACvD,aAAY,MAAM;AAClB,WAAU,OAAO,IAAM,mCAAmC;AAC1D,aAAY,MAAM;AAClB,KAAI,IAAI,MAAM,SAAS,IACnB,aAAY,OAAO,EAAE;KAGrB,aAAY,OAAO,EAAE;CAEzB,MAAM,YAAY,MAAM;AACxB,WAAU,OAAO,IAAM,yBAAyB;CAChD,MAAM,iBAAiB,YAAY,MAAM;AACzC,QAAO,IAAI,SAAS,WAAW,YAAY,kBAAkB,MAAM,MAAM,WAAW;;AAExF,SAAS,gBAAgB,MAAM;AAE3B,QAAO,aADU,eAAe,MAAM,8CAA8C,CACvD;;AAEjC,MAAa,YAAY,KAAK,KAAK,YAAY;CAC3C,IAAI;AACJ,KAAI;AACA,SAAO,gBAAgB,IAAI;UAExB,OAAO;AACV,QAAM,IAAI,UAAU,yCAAyC,EAAE,OAAO,CAAC;;AAE3E,QAAO,SAAS,UAAU,aAAa,KAAK,EAAE,aAAa,EAAE,KAAK,QAAQ;;;;AChP9E,SAAS,cAAc,KAAK;CACxB,IAAI;CACJ,IAAI;AACJ,SAAQ,IAAI,KAAZ;EACI,KAAK;AACD,WAAQ,IAAI,KAAZ;IACI,KAAK;IACL,KAAK;IACL,KAAK;AACD,iBAAY,EAAE,MAAM,IAAI,KAAK;AAC7B,iBAAY,IAAI,OAAO,CAAC,OAAO,GAAG,CAAC,SAAS;AAC5C;IACJ,QACI,OAAM,IAAI,iBAAiB,iEAA+D;;AAElG;EAEJ,KAAK;AACD,WAAQ,IAAI,KAAZ;IACI,KAAK;IACL,KAAK;IACL,KAAK;AACD,iBAAY;MAAE,MAAM;MAAW,MAAM,OAAO,IAAI,IAAI,MAAM,GAAG;MAAI;AACjE,iBAAY,IAAI,IAAI,CAAC,OAAO,GAAG,CAAC,SAAS;AACzC;IACJ,KAAK;IACL,KAAK;IACL,KAAK;AACD,iBAAY;MAAE,MAAM;MAAqB,MAAM,OAAO,IAAI,IAAI,MAAM,GAAG;MAAI;AAC3E,iBAAY,IAAI,IAAI,CAAC,OAAO,GAAG,CAAC,SAAS;AACzC;IACJ,KAAK;IACL,KAAK;IACL,KAAK;IACL,KAAK;AACD,iBAAY;MACR,MAAM;MACN,MAAM,OAAO,SAAS,IAAI,IAAI,MAAM,GAAG,EAAE,GAAG,IAAI;MACnD;AACD,iBAAY,IAAI,IAAI,CAAC,WAAW,YAAY,GAAG,CAAC,WAAW,UAAU;AACrE;IACJ,QACI,OAAM,IAAI,iBAAiB,iEAA+D;;AAElG;EAEJ,KAAK;AACD,WAAQ,IAAI,KAAZ;IACI,KAAK;AACD,iBAAY;MAAE,MAAM;MAAS,YAAY;MAAS;AAClD,iBAAY,IAAI,IAAI,CAAC,OAAO,GAAG,CAAC,SAAS;AACzC;IACJ,KAAK;AACD,iBAAY;MAAE,MAAM;MAAS,YAAY;MAAS;AAClD,iBAAY,IAAI,IAAI,CAAC,OAAO,GAAG,CAAC,SAAS;AACzC;IACJ,KAAK;AACD,iBAAY;MAAE,MAAM;MAAS,YAAY;MAAS;AAClD,iBAAY,IAAI,IAAI,CAAC,OAAO,GAAG,CAAC,SAAS;AACzC;IACJ,KAAK;IACL,KAAK;IACL,KAAK;IACL,KAAK;AACD,iBAAY;MAAE,MAAM;MAAQ,YAAY,IAAI;MAAK;AACjD,iBAAY,IAAI,IAAI,CAAC,aAAa,GAAG,EAAE;AACvC;IACJ,QACI,OAAM,IAAI,iBAAiB,iEAA+D;;AAElG;EAEJ,KAAK;AACD,WAAQ,IAAI,KAAZ;IACI,KAAK;IACL,KAAK;AACD,iBAAY,EAAE,MAAM,WAAW;AAC/B,iBAAY,IAAI,IAAI,CAAC,OAAO,GAAG,CAAC,SAAS;AACzC;IACJ,KAAK;IACL,KAAK;IACL,KAAK;IACL,KAAK;AACD,iBAAY,EAAE,MAAM,IAAI,KAAK;AAC7B,iBAAY,IAAI,IAAI,CAAC,aAAa,GAAG,EAAE;AACvC;IACJ,QACI,OAAM,IAAI,iBAAiB,iEAA+D;;AAElG;EAEJ,QACI,OAAM,IAAI,iBAAiB,gEAA8D;;AAEjG,QAAO;EAAE;EAAW;EAAW;;AAEnC,eAAsB,SAAS,KAAK;AAChC,KAAI,CAAC,IAAI,IACL,OAAM,IAAI,UAAU,+DAA2D;CAEnF,MAAM,EAAE,WAAW,cAAc,cAAc,IAAI;CACnD,MAAM,UAAU,EAAE,GAAG,KAAK;AAC1B,KAAI,QAAQ,QAAQ,MAChB,QAAO,QAAQ;AAEnB,QAAO,QAAQ;AACf,QAAO,OAAO,OAAO,UAAU,OAAO,SAAS,WAAW,IAAI,QAAQ,IAAI,KAAK,IAAI,OAAO,QAAQ,OAAO,IAAI,WAAW,UAAU;;;;ACtGtI,eAAsB,WAAW,MAAM,KAAK,SAAS;AACjD,KAAI,OAAO,SAAS,YAAY,KAAK,QAAQ,6BAA6B,KAAK,EAC3E,OAAM,IAAI,UAAU,yCAAuC;AAE/D,QAAO,SAAS,MAAM,KAAK,QAAQ;;AAEvC,eAAsB,WAAW,MAAM,KAAK,SAAS;AACjD,KAAI,OAAO,SAAS,YAAY,KAAK,QAAQ,8BAA8B,KAAK,EAC5E,OAAM,IAAI,UAAU,0CAAwC;AAEhE,QAAO,SAAS,MAAM,KAAK,QAAQ;;AAEvC,eAAsB,YAAY,OAAO,KAAK,SAAS;AACnD,KAAI,OAAO,UAAU,YAAY,MAAM,QAAQ,8BAA8B,KAAK,EAC9E,OAAM,IAAI,UAAU,4CAA0C;AAElE,QAAO,UAAU,OAAO,KAAK,QAAQ;;AAEzC,eAAsB,UAAU,KAAK,KAAK,SAAS;AAC/C,KAAI,CAAC,SAAS,IAAI,CACd,OAAM,IAAI,UAAU,wBAAwB;CAEhD,IAAI;AACJ,SAAQ,IAAI;AACZ,SAAQ,SAAS,eAAe,IAAI;AACpC,SAAQ,IAAI,KAAZ;EACI,KAAK;AACD,OAAI,OAAO,IAAI,MAAM,YAAY,CAAC,IAAI,EAClC,OAAM,IAAI,UAAU,4CAA0C;AAElE,UAAOE,OAAgB,IAAI,EAAE;EACjC,KAAK;AACD,OAAI,SAAS,OAAO,IAAI,QAAQ,KAAA,EAC5B,OAAM,IAAI,iBAAiB,uEAAqE;AAEpG,UAAO,SAAS;IAAE,GAAG;IAAK;IAAK;IAAK,CAAC;EACzC,KAAK;AACD,OAAI,OAAO,IAAI,QAAQ,YAAY,CAAC,IAAI,IACpC,OAAM,IAAI,UAAU,8CAA4C;AAEpE,OAAI,QAAQ,KAAA,KAAa,QAAQ,IAAI,IACjC,OAAM,IAAI,UAAU,wCAAwC;AAEhE,UAAO,SAAS;IAAE,GAAG;IAAK;IAAK,CAAC;EAEpC,KAAK;EACL,KAAK,MACD,QAAO,SAAS;GAAE,GAAG;GAAK;GAAK;GAAK,CAAC;EACzC,QACI,OAAM,IAAI,iBAAiB,iDAA+C;;;;;AC9CtF,eAAe,WAAW,KAAK,WAAW,KAAK,IAAI,KAAK;AACpD,KAAI,EAAE,eAAe,YACjB,OAAM,IAAI,UAAU,gBAAgB,KAAK,aAAa,CAAC;CAE3D,MAAM,UAAU,SAAS,IAAI,MAAM,GAAG,EAAE,EAAE,GAAG;CAC7C,MAAM,SAAS,MAAM,OAAO,OAAO,UAAU,OAAO,IAAI,SAAS,WAAW,EAAE,EAAE,WAAW,OAAO,CAAC,UAAU,CAAC;CAC9G,MAAM,SAAS,MAAM,OAAO,OAAO,UAAU,OAAO,IAAI,SAAS,GAAG,WAAW,EAAE,EAAE;EAC/E,MAAM,OAAO,WAAW;EACxB,MAAM;EACT,EAAE,OAAO,CAAC,OAAO,CAAC;CACnB,MAAM,aAAa,IAAI,WAAW,MAAM,OAAO,OAAO,QAAQ;EACtD;EACJ,MAAM;EACT,EAAE,QAAQ,UAAU,CAAC;CACtB,MAAM,UAAU,OAAO,KAAK,IAAI,YAAY,SAAS,IAAI,UAAU,EAAE,CAAC;AAEtE,QAAO;EAAE;EAAY,KADT,IAAI,YAAY,MAAM,OAAO,OAAO,KAAK,QAAQ,QAAQ,QAAQ,EAAE,MAAM,GAAG,WAAW,EAAE,CAAC;EAC5E;EAAI;;AAElC,eAAe,WAAW,KAAK,WAAW,KAAK,IAAI,KAAK;CACpD,IAAI;AACJ,KAAI,eAAe,WACf,UAAS,MAAM,OAAO,OAAO,UAAU,OAAO,KAAK,WAAW,OAAO,CAAC,UAAU,CAAC;MAEhF;AACD,oBAAkB,KAAK,KAAK,UAAU;AACtC,WAAS;;CAEb,MAAM,YAAY,IAAI,WAAW,MAAM,OAAO,OAAO,QAAQ;EACzD,gBAAgB;EACZ;EACJ,MAAM;EACN,WAAW;EACd,EAAE,QAAQ,UAAU,CAAC;CACtB,MAAM,MAAM,UAAU,MAAM,IAAI;AAEhC,QAAO;EAAE,YADU,UAAU,MAAM,GAAG,IAAI;EACrB;EAAK;EAAI;;AAElC,eAAsB,QAAQ,KAAK,WAAW,KAAK,IAAI,KAAK;AACxD,KAAI,CAAC,YAAY,IAAI,IAAI,EAAE,eAAe,YACtC,OAAM,IAAI,UAAU,gBAAgB,KAAK,aAAa,aAAa,cAAc,eAAe,CAAC;AAErG,KAAI,GACA,eAAc,KAAK,GAAG;KAGtB,MAAK,WAAW,IAAI;AAExB,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI,eAAe,WACf,gBAAe,KAAK,SAAS,IAAI,MAAM,GAAG,EAAE,GAAG,CAAC;AAEpD,UAAO,WAAW,KAAK,WAAW,KAAK,IAAI,IAAI;EACnD,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI,eAAe,WACf,gBAAe,KAAK,SAAS,IAAI,MAAM,GAAG,EAAE,EAAE,GAAG,CAAC;AAEtD,UAAO,WAAW,KAAK,WAAW,KAAK,IAAI,IAAI;EACnD,QACI,OAAM,IAAI,iBAAiB,+CAA+C;;;;;ACpEtF,eAAsB,KAAK,KAAK,KAAK,KAAK,IAAI;CAE1C,MAAM,UAAU,MAAM,QADD,IAAI,MAAM,GAAG,EAAE,EACQ,KAAK,KAAK,IAAI,IAAI,YAAY,CAAC;AAC3E,QAAO;EACH,cAAc,QAAQ;EACtB,IAAIC,OAAK,QAAQ,GAAG;EACpB,KAAKA,OAAK,QAAQ,IAAI;EACzB;;AAEL,eAAsB,OAAO,KAAK,KAAK,cAAc,IAAI,KAAK;AAE1D,QAAOC,UADc,IAAI,MAAM,GAAG,EAAE,EACP,KAAK,cAAc,IAAI,KAAK,IAAI,YAAY,CAAC;;;;ACH9E,eAAsB,qBAAqB,KAAK,KAAK,cAAc,YAAY,SAAS;AACpF,SAAQ,KAAR;EACI,KAAK;AACD,OAAI,iBAAiB,KAAA,EACjB,OAAM,IAAI,WAAW,2CAA2C;AACpE,UAAO;EAEX,KAAK,UACD,KAAI,iBAAiB,KAAA,EACjB,OAAM,IAAI,WAAW,2CAA2C;EACxE,KAAK;EACL,KAAK;EACL,KAAK,kBAAkB;AACnB,OAAI,CAAC,SAAS,WAAW,IAAI,CACzB,OAAM,IAAI,WAAW,8DAA8D;AACvF,mBAAgB,IAAI;AACpB,OAAI,CAACC,QAAe,IAAI,CACpB,OAAM,IAAI,iBAAiB,wFAAwF;GACvH,MAAM,MAAM,MAAM,UAAU,WAAW,KAAK,IAAI;AAChD,mBAAgB,IAAI;GACpB,IAAI;GACJ,IAAI;AACJ,OAAI,WAAW,QAAQ,KAAA,GAAW;AAC9B,QAAI,OAAO,WAAW,QAAQ,SAC1B,OAAM,IAAI,WAAW,mDAAmD;AAC5E,QAAI;AACA,kBAAaC,OAAK,WAAW,IAAI;YAE/B;AACF,WAAM,IAAI,WAAW,qCAAqC;;;AAGlE,OAAI,WAAW,QAAQ,KAAA,GAAW;AAC9B,QAAI,OAAO,WAAW,QAAQ,SAC1B,OAAM,IAAI,WAAW,mDAAmD;AAC5E,QAAI;AACA,kBAAaA,OAAK,WAAW,IAAI;YAE/B;AACF,WAAM,IAAI,WAAW,qCAAqC;;;GAGlE,MAAM,eAAe,MAAMC,YAAiB,KAAK,KAAK,QAAQ,YAAY,WAAW,MAAM,KAAK,QAAQ,YAAY,UAAU,WAAW,IAAI,GAAG,SAAS,IAAI,MAAM,IAAI,GAAG,EAAE,GAAG,EAAE,YAAY,WAAW;AACxM,OAAI,QAAQ,UACR,QAAO;AACX,OAAI,iBAAiB,KAAA,EACjB,OAAM,IAAI,WAAW,4BAA4B;AACrD,UAAOC,SAAa,IAAI,MAAM,GAAG,EAAE,cAAc,aAAa;;EAElE,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI,iBAAiB,KAAA,EACjB,OAAM,IAAI,WAAW,4BAA4B;AACrD,mBAAgB,IAAI;AACpB,UAAOC,QAAc,KAAK,KAAK,aAAa;EAEhD,KAAK;EACL,KAAK;EACL,KAAK,sBAAsB;AACvB,OAAI,iBAAiB,KAAA,EACjB,OAAM,IAAI,WAAW,4BAA4B;AACrD,OAAI,OAAO,WAAW,QAAQ,SAC1B,OAAM,IAAI,WAAW,qDAAqD;GAC9E,MAAM,WAAW,SAAS,iBAAiB;AAC3C,OAAI,WAAW,MAAM,SACjB,OAAM,IAAI,WAAW,8DAA8D;AACvF,OAAI,OAAO,WAAW,QAAQ,SAC1B,OAAM,IAAI,WAAW,oDAAoD;GAC7E,IAAI;AACJ,OAAI;AACA,UAAMH,OAAK,WAAW,IAAI;WAExB;AACF,UAAM,IAAI,WAAW,qCAAqC;;AAE9D,UAAOI,SAAe,KAAK,KAAK,cAAc,WAAW,KAAK,IAAI;;EAEtE,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI,iBAAiB,KAAA,EACjB,OAAM,IAAI,WAAW,4BAA4B;AACrD,UAAOF,SAAa,KAAK,KAAK,aAAa;EAE/C,KAAK;EACL,KAAK;EACL,KAAK,aAAa;AACd,OAAI,iBAAiB,KAAA,EACjB,OAAM,IAAI,WAAW,4BAA4B;AACrD,OAAI,OAAO,WAAW,OAAO,SACzB,OAAM,IAAI,WAAW,8DAA8D;AACvF,OAAI,OAAO,WAAW,QAAQ,SAC1B,OAAM,IAAI,WAAW,4DAA4D;GACrF,IAAI;AACJ,OAAI;AACA,SAAKF,OAAK,WAAW,GAAG;WAEtB;AACF,UAAM,IAAI,WAAW,oCAAoC;;GAE7D,IAAI;AACJ,OAAI;AACA,UAAMA,OAAK,WAAW,IAAI;WAExB;AACF,UAAM,IAAI,WAAW,qCAAqC;;AAE9D,UAAOK,OAAS,KAAK,KAAK,cAAc,IAAI,IAAI;;EAEpD,QACI,OAAM,IAAI,iBAAiB,8DAA4D;;;;;AC1HnG,SAAgB,aAAa,KAAK,mBAAmB,kBAAkB,iBAAiB,YAAY;AAChG,KAAI,WAAW,SAAS,KAAA,KAAa,iBAAiB,SAAS,KAAA,EAC3D,OAAM,IAAI,IAAI,mEAAiE;AAEnF,KAAI,CAAC,mBAAmB,gBAAgB,SAAS,KAAA,EAC7C,wBAAO,IAAI,KAAK;AAEpB,KAAI,CAAC,MAAM,QAAQ,gBAAgB,KAAK,IACpC,gBAAgB,KAAK,WAAW,KAChC,gBAAgB,KAAK,MAAM,UAAU,OAAO,UAAU,YAAY,MAAM,WAAW,EAAE,CACrF,OAAM,IAAI,IAAI,0FAAwF;CAE1G,IAAI;AACJ,KAAI,qBAAqB,KAAA,EACrB,cAAa,IAAI,IAAI,CAAC,GAAG,OAAO,QAAQ,iBAAiB,EAAE,GAAG,kBAAkB,SAAS,CAAC,CAAC;KAG3F,cAAa;AAEjB,MAAK,MAAM,aAAa,gBAAgB,MAAM;AAC1C,MAAI,CAAC,WAAW,IAAI,UAAU,CAC1B,OAAM,IAAI,iBAAiB,+BAA+B,UAAU,qBAAqB;AAE7F,MAAI,WAAW,eAAe,KAAA,EAC1B,OAAM,IAAI,IAAI,+BAA+B,UAAU,cAAc;AAEzE,MAAI,WAAW,IAAI,UAAU,IAAI,gBAAgB,eAAe,KAAA,EAC5D,OAAM,IAAI,IAAI,+BAA+B,UAAU,+BAA+B;;AAG9F,QAAO,IAAI,IAAI,gBAAgB,KAAK;;;;AC/BxC,SAAgB,mBAAmB,QAAQ,YAAY;AACnD,KAAI,eAAe,KAAA,MACd,CAAC,MAAM,QAAQ,WAAW,IAAI,WAAW,MAAM,MAAM,OAAO,MAAM,SAAS,EAC5E,OAAM,IAAI,UAAU,IAAI,OAAO,sCAAsC;AAEzE,KAAI,CAAC,WACD;AAEJ,QAAO,IAAI,IAAI,WAAW;;;;ACP9B,MAAa,SAAS,QAAQ,SAAS,IAAI,IAAI,OAAO,IAAI,QAAQ;AAClE,MAAa,gBAAgB,QAAQ,IAAI,QAAQ,UAC3C,IAAI,QAAQ,SAAS,OAAO,IAAI,SAAS,YAAa,OAAO,IAAI,MAAM;AAC7E,MAAa,eAAe,QAAQ,IAAI,QAAQ,SAAS,IAAI,MAAM,KAAA,KAAa,IAAI,SAAS,KAAA;AAC7F,MAAa,eAAe,QAAQ,IAAI,QAAQ,SAAS,OAAO,IAAI,MAAM;;;ACD1E,IAAI;AACJ,MAAM,YAAY,OAAO,KAAK,KAAK,KAAK,SAAS,UAAU;AACvD,2BAAU,IAAI,SAAS;CACvB,IAAI,SAAS,MAAM,IAAI,IAAI;AAC3B,KAAI,SAAS,KACT,QAAO,OAAO;CAElB,MAAM,YAAY,MAAM,SAAS;EAAE,GAAG;EAAK;EAAK,CAAC;AACjD,KAAI,OACA,QAAO,OAAO,IAAI;AACtB,KAAI,CAAC,OACD,OAAM,IAAI,KAAK,GAAG,MAAM,WAAW,CAAC;KAGpC,QAAO,OAAO;AAElB,QAAO;;AAEX,MAAM,mBAAmB,WAAW,QAAQ;AACxC,2BAAU,IAAI,SAAS;CACvB,IAAI,SAAS,MAAM,IAAI,UAAU;AACjC,KAAI,SAAS,KACT,QAAO,OAAO;CAElB,MAAM,WAAW,UAAU,SAAS;CACpC,MAAM,cAAc,WAAW,OAAO;CACtC,IAAI;AACJ,KAAI,UAAU,sBAAsB,UAAU;AAC1C,UAAQ,KAAR;GACI,KAAK;GACL,KAAK;GACL,KAAK;GACL,KAAK,iBACD;GACJ,QACI,OAAM,IAAI,UAAU,6DAA6D;;AAEzF,cAAY,UAAU,YAAY,UAAU,mBAAmB,aAAa,WAAW,EAAE,GAAG,CAAC,aAAa,CAAC;;AAE/G,KAAI,UAAU,sBAAsB,WAAW;AAC3C,MAAI,QAAQ,WAAW,QAAQ,UAC3B,OAAM,IAAI,UAAU,6DAA6D;AAErF,cAAY,UAAU,YAAY,UAAU,mBAAmB,aAAa,CACxE,WAAW,WAAW,OACzB,CAAC;;AAEN,SAAQ,UAAU,mBAAlB;EACI,KAAK;EACL,KAAK;EACL,KAAK;AACD,OAAI,QAAQ,UAAU,kBAAkB,aAAa,CACjD,OAAM,IAAI,UAAU,6DAA6D;AAErF,eAAY,UAAU,YAAY,UAAU,mBAAmB,aAAa,CACxE,WAAW,WAAW,OACzB,CAAC;;AAGV,KAAI,UAAU,sBAAsB,OAAO;EACvC,IAAI;AACJ,UAAQ,KAAR;GACI,KAAK;AACD,WAAO;AACP;GACJ,KAAK;GACL,KAAK;GACL,KAAK;AACD,WAAO;AACP;GACJ,KAAK;GACL,KAAK;GACL,KAAK;AACD,WAAO;AACP;GACJ,KAAK;GACL,KAAK;GACL,KAAK;AACD,WAAO;AACP;GACJ,QACI,OAAM,IAAI,UAAU,6DAA6D;;AAEzF,MAAI,IAAI,WAAW,WAAW,CAC1B,QAAO,UAAU,YAAY;GACzB,MAAM;GACN;GACH,EAAE,aAAa,WAAW,CAAC,UAAU,GAAG,CAAC,UAAU,CAAC;AAEzD,cAAY,UAAU,YAAY;GAC9B,MAAM,IAAI,WAAW,KAAK,GAAG,YAAY;GACzC;GACH,EAAE,aAAa,CAAC,WAAW,WAAW,OAAO,CAAC;;AAEnD,KAAI,UAAU,sBAAsB,MAAM;EAMtC,MAAM,aALO,IAAI,IAAI;GACjB,CAAC,cAAc,QAAQ;GACvB,CAAC,aAAa,QAAQ;GACtB,CAAC,aAAa,QAAQ;GACzB,CAAC,CACsB,IAAI,UAAU,sBAAsB,WAAW;AACvE,MAAI,CAAC,WACD,OAAM,IAAI,UAAU,6DAA6D;AAErF,MAAI,QAAQ,WAAW,eAAe,QAClC,aAAY,UAAU,YAAY;GAC9B,MAAM;GACN;GACH,EAAE,aAAa,CAAC,WAAW,WAAW,OAAO,CAAC;AAEnD,MAAI,QAAQ,WAAW,eAAe,QAClC,aAAY,UAAU,YAAY;GAC9B,MAAM;GACN;GACH,EAAE,aAAa,CAAC,WAAW,WAAW,OAAO,CAAC;AAEnD,MAAI,QAAQ,WAAW,eAAe,QAClC,aAAY,UAAU,YAAY;GAC9B,MAAM;GACN;GACH,EAAE,aAAa,CAAC,WAAW,WAAW,OAAO,CAAC;AAEnD,MAAI,IAAI,WAAW,UAAU,CACzB,aAAY,UAAU,YAAY;GAC9B,MAAM;GACN;GACH,EAAE,aAAa,WAAW,EAAE,GAAG,CAAC,aAAa,CAAC;;AAGvD,KAAI,CAAC,UACD,OAAM,IAAI,UAAU,6DAA6D;AAErF,KAAI,CAAC,OACD,OAAM,IAAI,WAAW,GAAG,MAAM,WAAW,CAAC;KAG1C,QAAO,OAAO;AAElB,QAAO;;AAEX,eAAsB,aAAa,KAAK,KAAK;AACzC,KAAI,eAAe,WACf,QAAO;AAEX,KAAI,YAAY,IAAI,CAChB,QAAO;AAEX,KAAI,YAAY,IAAI,EAAE;AAClB,MAAI,IAAI,SAAS,SACb,QAAO,IAAI,QAAQ;AAEvB,MAAI,iBAAiB,OAAO,OAAO,IAAI,gBAAgB,WACnD,KAAI;AACA,UAAO,gBAAgB,KAAK,IAAI;WAE7B,KAAK;AACR,OAAI,eAAe,UACf,OAAM;;AAKlB,SAAO,UAAU,KADP,IAAI,OAAO,EAAE,QAAQ,OAAO,CAAC,EACZ,IAAI;;AAEnC,KAAI,MAAM,IAAI,EAAE;AACZ,MAAI,IAAI,EACJ,QAAO,OAAO,IAAI,EAAE;AAExB,SAAO,UAAU,KAAK,KAAK,KAAK,KAAK;;AAEzC,OAAM,IAAI,MAAM,cAAc;;;;AC3KlC,MAAM,OAAO,QAAQ,MAAM,OAAO;AAClC,MAAM,gBAAgB,KAAK,KAAK,UAAU;AACtC,KAAI,IAAI,QAAQ,KAAA,GAAW;EACvB,IAAI;AACJ,UAAQ,OAAR;GACI,KAAK;GACL,KAAK;AACD,eAAW;AACX;GACJ,KAAK;GACL,KAAK;AACD,eAAW;AACX;;AAER,MAAI,IAAI,QAAQ,SACZ,OAAM,IAAI,UAAU,sDAAsD,SAAS,gBAAgB;;AAG3G,KAAI,IAAI,QAAQ,KAAA,KAAa,IAAI,QAAQ,IACrC,OAAM,IAAI,UAAU,sDAAsD,IAAI,gBAAgB;AAElG,KAAI,MAAM,QAAQ,IAAI,QAAQ,EAAE;EAC5B,IAAI;AACJ,UAAQ,MAAR;GACI,KAAK,UAAU,UAAU,UAAU;GACnC,KAAK,QAAQ;GACb,KAAK,IAAI,SAAS,SAAS;AACvB,oBAAgB;AAChB;GACJ,KAAK,IAAI,WAAW,QAAQ;AACxB,oBAAgB;AAChB;GACJ,KAAK,0BAA0B,KAAK,IAAI;AACpC,QAAI,CAAC,IAAI,SAAS,MAAM,IAAI,IAAI,SAAS,KAAK,CAC1C,iBAAgB,UAAU,YAAY,YAAY;QAGlD,iBAAgB;AAEpB;GACJ,KAAK,UAAU,aAAa,IAAI,WAAW,MAAM;AAC7C,oBAAgB;AAChB;GACJ,KAAK,UAAU;AACX,oBAAgB,IAAI,WAAW,MAAM,GAAG,cAAc;AACtD;;AAER,MAAI,iBAAiB,IAAI,SAAS,WAAW,cAAc,KAAK,MAC5D,OAAM,IAAI,UAAU,+DAA+D,cAAc,gBAAgB;;AAGzH,QAAO;;AAEX,MAAM,sBAAsB,KAAK,KAAK,UAAU;AAC5C,KAAI,eAAe,WACf;AACJ,KAAIC,MAAU,IAAI,EAAE;AAChB,MAAIC,YAAgB,IAAI,IAAI,aAAa,KAAK,KAAK,MAAM,CACrD;AACJ,QAAM,IAAI,UAAU,0HAA0H;;AAElJ,KAAI,CAAC,UAAU,IAAI,CACf,OAAM,IAAI,UAAUC,QAAgB,KAAK,KAAK,aAAa,aAAa,gBAAgB,aAAa,CAAC;AAE1G,KAAI,IAAI,SAAS,SACb,OAAM,IAAI,UAAU,GAAG,IAAI,IAAI,CAAC,8DAA8D;;AAGtG,MAAM,uBAAuB,KAAK,KAAK,UAAU;AAC7C,KAAIF,MAAU,IAAI,CACd,SAAQ,OAAR;EACI,KAAK;EACL,KAAK;AACD,OAAIG,aAAiB,IAAI,IAAI,aAAa,KAAK,KAAK,MAAM,CACtD;AACJ,SAAM,IAAI,UAAU,wDAAwD;EAChF,KAAK;EACL,KAAK;AACD,OAAIC,YAAgB,IAAI,IAAI,aAAa,KAAK,KAAK,MAAM,CACrD;AACJ,SAAM,IAAI,UAAU,uDAAuD;;AAGvF,KAAI,CAAC,UAAU,IAAI,CACf,OAAM,IAAI,UAAUF,QAAgB,KAAK,KAAK,aAAa,aAAa,eAAe,CAAC;AAE5F,KAAI,IAAI,SAAS,SACb,OAAM,IAAI,UAAU,GAAG,IAAI,IAAI,CAAC,mEAAmE;AAEvG,KAAI,IAAI,SAAS,SACb,SAAQ,OAAR;EACI,KAAK,OACD,OAAM,IAAI,UAAU,GAAG,IAAI,IAAI,CAAC,uEAAuE;EAC3G,KAAK,UACD,OAAM,IAAI,UAAU,GAAG,IAAI,IAAI,CAAC,0EAA0E;;AAGtH,KAAI,IAAI,SAAS,UACb,SAAQ,OAAR;EACI,KAAK,SACD,OAAM,IAAI,UAAU,GAAG,IAAI,IAAI,CAAC,wEAAwE;EAC5G,KAAK,UACD,OAAM,IAAI,UAAU,GAAG,IAAI,IAAI,CAAC,yEAAyE;;;AAIzH,SAAgB,aAAa,KAAK,KAAK,OAAO;AAC1C,SAAQ,IAAI,UAAU,GAAG,EAAE,EAA3B;EACI,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,sBAAmB,KAAK,KAAK,MAAM;AACnC;EACJ,QACI,qBAAoB,KAAK,KAAK,MAAM;;;;;ACrHhD,SAAS,UAAU,MAAM;AACrB,KAAI,OAAO,WAAW,UAAU,YAC5B,OAAM,IAAI,iBAAiB,mEAAmE,KAAK,OAAO;;AAGlH,eAAsB,SAAS,OAAO;AAClC,WAAU,oBAAoB;CAC9B,MAAM,KAAK,IAAI,kBAAkB,cAAc;CAC/C,MAAM,SAAS,GAAG,SAAS,WAAW;AACtC,QAAO,MAAM,MAAM;AACnB,QAAO,OAAO;CACd,MAAM,SAAS,EAAE;CACjB,MAAM,SAAS,GAAG,SAAS,WAAW;AACtC,UAAS;EACL,MAAM,EAAE,OAAO,SAAS,MAAM,OAAO,MAAM;AAC3C,MAAI,KACA;AACJ,SAAO,KAAK,MAAM;;AAEtB,QAAO,OAAO,GAAG,OAAO;;AAE5B,eAAsB,WAAW,OAAO,WAAW;AAC/C,WAAU,sBAAsB;CAChC,MAAM,KAAK,IAAI,oBAAoB,cAAc;CACjD,MAAM,SAAS,GAAG,SAAS,WAAW;AACtC,QAAO,MAAM,MAAM;AACnB,QAAO,OAAO;CACd,MAAM,SAAS,EAAE;CACjB,IAAI,SAAS;CACb,MAAM,SAAS,GAAG,SAAS,WAAW;AACtC,UAAS;EACL,MAAM,EAAE,OAAO,SAAS,MAAM,OAAO,MAAM;AAC3C,MAAI,KACA;AACJ,SAAO,KAAK,MAAM;AAClB,YAAU,MAAM;AAChB,MAAI,cAAc,YAAY,SAAS,UACnC,OAAM,IAAI,WAAW,uDAAuD;;AAGpF,QAAO,OAAO,GAAG,OAAO;;;;AC7B5B,eAAsB,iBAAiB,KAAK,KAAK,SAAS;AACtD,KAAI,CAAC,SAAS,IAAI,CACd,OAAM,IAAI,WAAW,kCAAkC;AAE3D,KAAI,IAAI,cAAc,KAAA,KAAa,IAAI,WAAW,KAAA,KAAa,IAAI,gBAAgB,KAAA,EAC/E,OAAM,IAAI,WAAW,sBAAsB;AAE/C,KAAI,IAAI,OAAO,KAAA,KAAa,OAAO,IAAI,OAAO,SAC1C,OAAM,IAAI,WAAW,2CAA2C;AAEpE,KAAI,OAAO,IAAI,eAAe,SAC1B,OAAM,IAAI,WAAW,2CAA2C;AAEpE,KAAI,IAAI,QAAQ,KAAA,KAAa,OAAO,IAAI,QAAQ,SAC5C,OAAM,IAAI,WAAW,wCAAwC;AAEjE,KAAI,IAAI,cAAc,KAAA,KAAa,OAAO,IAAI,cAAc,SACxD,OAAM,IAAI,WAAW,sCAAsC;AAE/D,KAAI,IAAI,kBAAkB,KAAA,KAAa,OAAO,IAAI,kBAAkB,SAChE,OAAM,IAAI,WAAW,mCAAmC;AAE5D,KAAI,IAAI,QAAQ,KAAA,KAAa,OAAO,IAAI,QAAQ,SAC5C,OAAM,IAAI,WAAW,yBAAyB;AAElD,KAAI,IAAI,WAAW,KAAA,KAAa,CAAC,SAAS,IAAI,OAAO,CACjD,OAAM,IAAI,WAAW,+CAA+C;AAExE,KAAI,IAAI,gBAAgB,KAAA,KAAa,CAAC,SAAS,IAAI,YAAY,CAC3D,OAAM,IAAI,WAAW,sDAAsD;CAE/E,IAAI;AACJ,KAAI,IAAI,UACJ,KAAI;EACA,MAAM,kBAAkBG,OAAK,IAAI,UAAU;AAC3C,eAAa,KAAK,MAAM,QAAQ,OAAO,gBAAgB,CAAC;SAEtD;AACF,QAAM,IAAI,WAAW,kCAAkC;;AAG/D,KAAI,CAAC,WAAW,YAAY,IAAI,QAAQ,IAAI,YAAY,CACpD,OAAM,IAAI,WAAW,mHAAmH;CAE5I,MAAM,aAAa;EACf,GAAG;EACH,GAAG,IAAI;EACP,GAAG,IAAI;EACV;AACD,cAAa,4BAAY,IAAI,KAAK,EAAE,SAAS,MAAM,YAAY,WAAW;AAC1E,KAAI,WAAW,QAAQ,KAAA,KAAa,WAAW,QAAQ,MACnD,OAAM,IAAI,iBAAiB,0EAAwE;AAEvG,KAAI,WAAW,QAAQ,KAAA,KAAa,CAAC,YAAY,IAC7C,OAAM,IAAI,WAAW,sFAAoF;CAE7G,MAAM,EAAE,KAAK,QAAQ;AACrB,KAAI,OAAO,QAAQ,YAAY,CAAC,IAC5B,OAAM,IAAI,WAAW,4CAA4C;AAErE,KAAI,OAAO,QAAQ,YAAY,CAAC,IAC5B,OAAM,IAAI,WAAW,uDAAuD;CAEhF,MAAM,0BAA0B,WAAW,mBAAmB,2BAA2B,QAAQ,wBAAwB;CACzH,MAAM,8BAA8B,WAChC,mBAAmB,+BAA+B,QAAQ,4BAA4B;AAC1F,KAAK,2BAA2B,CAAC,wBAAwB,IAAI,IAAI,IAC5D,CAAC,2BAA2B,IAAI,WAAW,QAAQ,CACpD,OAAM,IAAI,kBAAkB,yDAAuD;AAEvF,KAAI,+BAA+B,CAAC,4BAA4B,IAAI,IAAI,CACpE,OAAM,IAAI,kBAAkB,oEAAkE;CAElG,IAAI;AACJ,KAAI,IAAI,kBAAkB,KAAA,EACtB,KAAI;AACA,iBAAeA,OAAK,IAAI,cAAc;SAEpC;AACF,QAAM,IAAI,WAAW,+CAA+C;;CAG5E,IAAI,cAAc;AAClB,KAAI,OAAO,QAAQ,YAAY;AAC3B,QAAM,MAAM,IAAI,YAAY,IAAI;AAChC,gBAAc;;AAElB,cAAa,QAAQ,QAAQ,MAAM,KAAK,KAAK,UAAU;CACvD,MAAM,IAAI,MAAM,aAAa,KAAK,IAAI;CACtC,IAAI;AACJ,KAAI;AACA,QAAM,MAAM,qBAAqB,KAAK,GAAG,cAAc,YAAY,QAAQ;UAExE,KAAK;AACR,MAAI,eAAe,aAAa,eAAe,cAAc,eAAe,iBACxE,OAAM;AAEV,QAAM,YAAY,IAAI;;CAE1B,IAAI;CACJ,IAAI;AACJ,KAAI,IAAI,OAAO,KAAA,EACX,KAAI;AACA,OAAKA,OAAK,IAAI,GAAG;SAEf;AACF,QAAM,IAAI,WAAW,oCAAoC;;AAGjE,KAAI,IAAI,QAAQ,KAAA,EACZ,KAAI;AACA,QAAMA,OAAK,IAAI,IAAI;SAEjB;AACF,QAAM,IAAI,WAAW,qCAAqC;;CAGlE,MAAM,kBAAkB,IAAI,cAAc,KAAA,IAAYC,SAAO,IAAI,UAAU,GAAG,IAAI,YAAY;CAC9F,IAAI;AACJ,KAAI,IAAI,QAAQ,KAAA,EACZ,kBAAiB,OAAO,iBAAiBA,SAAO,IAAI,EAAEA,SAAO,IAAI,IAAI,CAAC;KAGtE,kBAAiB;CAErB,IAAI;AACJ,KAAI;AACA,eAAaD,OAAK,IAAI,WAAW;SAE/B;AACF,QAAM,IAAI,WAAW,4CAA4C;;CAErE,MAAM,YAAY,MAAME,UAAQ,KAAK,KAAK,YAAY,IAAI,KAAK,eAAe;CAC9E,MAAM,SAAS,EAAE,WAAW;AAC5B,KAAI,WAAW,QAAQ,OAAO;EAC1B,MAAM,wBAAwB,SAAS,yBAAyB;AAChE,MAAI,0BAA0B,EAC1B,OAAM,IAAI,iBAAiB,yEAAuE;AAEtG,MAAI,0BAA0B,aACzB,CAAC,OAAO,cAAc,sBAAsB,IAAI,wBAAwB,GACzE,OAAM,IAAI,UAAU,wEAAwE;AAEhG,SAAO,YAAY,MAAM,WAAW,WAAW,sBAAsB;;AAEzE,KAAI,IAAI,cAAc,KAAA,EAClB,QAAO,kBAAkB;AAE7B,KAAI,IAAI,QAAQ,KAAA,EACZ,KAAI;AACA,SAAO,8BAA8BF,OAAK,IAAI,IAAI;SAEhD;AACF,QAAM,IAAI,WAAW,qCAAqC;;AAGlE,KAAI,IAAI,gBAAgB,KAAA,EACpB,QAAO,0BAA0B,IAAI;AAEzC,KAAI,IAAI,WAAW,KAAA,EACf,QAAO,oBAAoB,IAAI;AAEnC,KAAI,YACA,QAAO;EAAE,GAAG;EAAQ,KAAK;EAAG;AAEhC,QAAO;;;;AC/KX,eAAsB,eAAe,KAAK,KAAK,SAAS;AACpD,KAAI,eAAe,WACf,OAAM,QAAQ,OAAO,IAAI;AAE7B,KAAI,OAAO,QAAQ,SACf,OAAM,IAAI,WAAW,6CAA6C;CAEtE,MAAM,EAAE,GAAG,iBAAiB,GAAG,cAAc,GAAG,IAAI,GAAG,YAAY,GAAG,KAAK,WAAY,IAAI,MAAM,IAAI;AACrG,KAAI,WAAW,EACX,OAAM,IAAI,WAAW,sBAAsB;CAE/C,MAAM,YAAY,MAAM,iBAAiB;EACrC;EACA,IAAI,MAAM,KAAA;EACV,WAAW;EACX,KAAK,OAAO,KAAA;EACZ,eAAe,gBAAgB,KAAA;EAClC,EAAE,KAAK,QAAQ;CAChB,MAAM,SAAS;EAAE,WAAW,UAAU;EAAW,iBAAiB,UAAU;EAAiB;AAC7F,KAAI,OAAO,QAAQ,WACf,QAAO;EAAE,GAAG;EAAQ,KAAK,UAAU;EAAK;AAE5C,QAAO;;;;ACtBX,eAAsB,eAAe,KAAK,KAAK,SAAS;AACpD,KAAI,CAAC,SAAS,IAAI,CACd,OAAM,IAAI,WAAW,gCAAgC;AAEzD,KAAI,CAAC,MAAM,QAAQ,IAAI,WAAW,IAAI,CAAC,IAAI,WAAW,MAAM,SAAS,CACjE,OAAM,IAAI,WAAW,2CAA2C;AAEpE,KAAI,CAAC,IAAI,WAAW,OAChB,OAAM,IAAI,WAAW,gCAAgC;AAEzD,MAAK,MAAM,aAAa,IAAI,WACxB,KAAI;AACA,SAAO,MAAM,iBAAiB;GAC1B,KAAK,IAAI;GACT,YAAY,IAAI;GAChB,eAAe,UAAU;GACzB,QAAQ,UAAU;GAClB,IAAI,IAAI;GACR,WAAW,IAAI;GACf,KAAK,IAAI;GACT,aAAa,IAAI;GACpB,EAAE,KAAK,QAAQ;SAEd;AAGV,OAAM,IAAI,qBAAqB;;;;AC7BnC,MAAa,cAAc,QAAQ;;;ACGnC,eAAsB,SAAS,KAAK;AAChC,KAAI,YAAY,IAAI,CAChB,KAAI,IAAI,SAAS,SACb,OAAM,IAAI,QAAQ;KAGlB,QAAO,IAAI,OAAO,EAAE,QAAQ,OAAO,CAAC;AAG5C,KAAI,eAAe,WACf,QAAO;EACH,KAAK;EACL,GAAGG,OAAK,IAAI;EACf;AAEL,KAAI,CAAC,YAAY,IAAI,CACjB,OAAM,IAAI,UAAU,gBAAgB,KAAK,aAAa,aAAa,aAAa,CAAC;AAErF,KAAI,CAAC,IAAI,YACL,OAAM,IAAI,UAAU,wDAAwD;CAEhF,MAAM,EAAE,KAAK,SAAS,KAAK,KAAK,GAAG,QAAQ,MAAM,OAAO,OAAO,UAAU,OAAO,IAAI;AACpF,KAAI,IAAI,QAAQ,MAEZ,KAAI,MAAM;AAEd,QAAO;;;;AC3BX,eAAsB,WAAW,KAAK;AAClC,QAAOC,OAAa,IAAI;;AAE5B,eAAsB,YAAY,KAAK;AACnC,QAAOC,QAAc,IAAI;;AAE7B,eAAsB,UAAU,KAAK;AACjC,QAAO,SAAS,IAAI;;;;ACExB,eAAsB,qBAAqB,KAAK,KAAK,KAAK,aAAa,qBAAqB,EAAE,EAAE;CAC5F,IAAI;CACJ,IAAI;CACJ,IAAI;AACJ,SAAQ,KAAR;EACI,KAAK;AACD,SAAM;AACN;EAEJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK,kBAAkB;AACnB,mBAAgB,IAAI;AACpB,OAAI,CAACC,QAAe,IAAI,CACpB,OAAM,IAAI,iBAAiB,wFAAwF;GAEvH,MAAM,EAAE,KAAK,QAAQ;GACrB,IAAI;AACJ,OAAI,mBAAmB,IACnB,gBAAgB,MAAM,aAAa,mBAAmB,KAAK,IAAI;OAG/D,iBAAgB,MAAM,OAAO,OAAO,YAAY,IAAI,WAAW,MAAM,CAAC,aAAa,CAAC,EAAE;GAE1F,MAAM,EAAE,GAAG,GAAG,KAAK,QAAQ,MAAM,UAAU,aAAa;GACxD,MAAM,eAAe,MAAMC,YAAiB,KAAK,cAAc,QAAQ,YAAY,MAAM,KAAK,QAAQ,YAAY,UAAU,IAAI,GAAG,SAAS,IAAI,MAAM,IAAI,GAAG,EAAE,GAAG,EAAE,KAAK,IAAI;AAC7K,gBAAa,EAAE,KAAK;IAAE;IAAG;IAAK;IAAK,EAAE;AACrC,OAAI,QAAQ,KACR,YAAW,IAAI,IAAI;AACvB,OAAI,IACA,YAAW,MAAMC,OAAK,IAAI;AAC9B,OAAI,IACA,YAAW,MAAMA,OAAK,IAAI;AAC9B,OAAI,QAAQ,WAAW;AACnB,UAAM;AACN;;AAEJ,SAAM,eAAe,YAAY,IAAI;AAErC,kBAAe,MAAMC,OADP,IAAI,MAAM,GAAG,EACY,cAAc,IAAI;AACzD;;EAEJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,SAAM,eAAe,YAAY,IAAI;AACrC,mBAAgB,IAAI;AACpB,kBAAe,MAAMC,UAAc,KAAK,KAAK,IAAI;AACjD;EAEJ,KAAK;EACL,KAAK;EACL,KAAK,sBAAsB;AACvB,SAAM,eAAe,YAAY,IAAI;GACrC,MAAM,EAAE,KAAK,QAAQ;AACrB,IAAC,CAAE,iBAAiB,cAAe,MAAMC,OAAa,KAAK,KAAK,KAAK,KAAK,IAAI;AAC9E;;EAEJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,SAAM,eAAe,YAAY,IAAI;AACrC,kBAAe,MAAMF,OAAW,KAAK,KAAK,IAAI;AAC9C;EAEJ,KAAK;EACL,KAAK;EACL,KAAK,aAAa;AACd,SAAM,eAAe,YAAY,IAAI;GACrC,MAAM,EAAE,OAAO;AACf,IAAC,CAAE,iBAAiB,cAAe,MAAMG,KAAS,KAAK,KAAK,KAAK,GAAG;AACpE;;EAEJ,QACI,OAAM,IAAI,iBAAiB,8DAA4D;;AAG/F,QAAO;EAAE;EAAK;EAAc;EAAY;;;;AC/E5C,IAAa,mBAAb,MAA8B;CAC1B;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA,YAAY,WAAW;AACnB,MAAI,EAAE,qBAAqB,YACvB,OAAM,IAAI,UAAU,8CAA8C;AAEtE,QAAA,YAAkB;;CAEtB,2BAA2B,YAAY;AACnC,MAAI,MAAA,wBACA,OAAM,IAAI,UAAU,qDAAqD;AAE7E,QAAA,0BAAgC;AAChC,SAAO;;CAEX,mBAAmB,iBAAiB;AAChC,MAAI,MAAA,gBACA,OAAM,IAAI,UAAU,6CAA6C;AAErE,QAAA,kBAAwB;AACxB,SAAO;;CAEX,2BAA2B,yBAAyB;AAChD,MAAI,MAAA,wBACA,OAAM,IAAI,UAAU,qDAAqD;AAE7E,QAAA,0BAAgC;AAChC,SAAO;;CAEX,qBAAqB,mBAAmB;AACpC,MAAI,MAAA,kBACA,OAAM,IAAI,UAAU,+CAA+C;AAEvE,QAAA,oBAA0B;AAC1B,SAAO;;CAEX,+BAA+B,KAAK;AAChC,QAAA,MAAY;AACZ,SAAO;;CAEX,wBAAwB,KAAK;AACzB,MAAI,MAAA,IACA,OAAM,IAAI,UAAU,kDAAkD;AAE1E,QAAA,MAAY;AACZ,SAAO;;CAEX,wBAAwB,IAAI;AACxB,MAAI,MAAA,GACA,OAAM,IAAI,UAAU,kDAAkD;AAE1E,QAAA,KAAW;AACX,SAAO;;CAEX,MAAM,QAAQ,KAAK,SAAS;AACxB,MAAI,CAAC,MAAA,mBAAyB,CAAC,MAAA,qBAA2B,CAAC,MAAA,wBACvD,OAAM,IAAI,WAAW,+GAA+G;AAExI,MAAI,CAAC,WAAW,MAAA,iBAAuB,MAAA,mBAAyB,MAAA,wBAA8B,CAC1F,OAAM,IAAI,WAAW,sGAAsG;EAE/H,MAAM,aAAa;GACf,GAAG,MAAA;GACH,GAAG,MAAA;GACH,GAAG,MAAA;GACN;AACD,eAAa,4BAAY,IAAI,KAAK,EAAE,SAAS,MAAM,MAAA,iBAAuB,WAAW;AACrF,MAAI,WAAW,QAAQ,KAAA,KAAa,WAAW,QAAQ,MACnD,OAAM,IAAI,iBAAiB,0EAAwE;AAEvG,MAAI,WAAW,QAAQ,KAAA,KAAa,CAAC,MAAA,iBAAuB,IACxD,OAAM,IAAI,WAAW,sFAAoF;EAE7G,MAAM,EAAE,KAAK,QAAQ;AACrB,MAAI,OAAO,QAAQ,YAAY,CAAC,IAC5B,OAAM,IAAI,WAAW,8DAA4D;AAErF,MAAI,OAAO,QAAQ,YAAY,CAAC,IAC5B,OAAM,IAAI,WAAW,yEAAuE;EAEhG,IAAI;AACJ,MAAI,MAAA,QAAc,QAAQ,SAAS,QAAQ,WACvC,OAAM,IAAI,UAAU,8EAA8E,MAAM;AAE5G,eAAa,QAAQ,QAAQ,MAAM,KAAK,KAAK,UAAU;EACvD,IAAI;EACJ;GACI,IAAI;GACJ,MAAM,IAAI,MAAM,aAAa,KAAK,IAAI;AACtC,IAAC,CAAE,KAAK,cAAc,cAAe,MAAM,qBAAqB,KAAK,KAAK,GAAG,MAAA,KAAW,MAAA,wBAA8B;AACtH,OAAI,WACA,KAAI,WAAW,eAAe,QAC1B,KAAI,CAAC,MAAA,kBACD,MAAK,qBAAqB,WAAW;OAGrC,OAAA,oBAA0B;IAAE,GAAG,MAAA;IAAyB,GAAG;IAAY;YAGtE,CAAC,MAAA,gBACN,MAAK,mBAAmB,WAAW;OAGnC,OAAA,kBAAwB;IAAE,GAAG,MAAA;IAAuB,GAAG;IAAY;;EAI/E,IAAI;EACJ,IAAI;EACJ,IAAI;EACJ,IAAI;AACJ,MAAI,MAAA,iBAAuB;AACvB,sBAAmBS,OAAK,KAAK,UAAU,MAAA,gBAAsB,CAAC;AAC9D,sBAAmBC,SAAO,iBAAiB;SAE1C;AACD,sBAAmB;AACnB,sBAAmB,IAAI,YAAY;;AAEvC,MAAI,MAAA,KAAW;AACX,eAAYD,OAAK,MAAA,IAAU;GAC3B,MAAM,iBAAiBC,SAAO,UAAU;AACxC,oBAAiB,OAAO,kBAAkBA,SAAO,IAAI,EAAE,eAAe;QAGtE,kBAAiB;EAErB,IAAI,YAAY,MAAA;AAChB,MAAI,WAAW,QAAQ,MACnB,aAAY,MAAM,SAAS,UAAU;EAEzC,MAAM,EAAE,YAAY,KAAK,OAAO,MAAM,QAAQ,KAAK,WAAW,KAAK,MAAA,IAAU,eAAe;EAC5F,MAAM,MAAM,EACR,YAAYD,OAAK,WAAW,EAC/B;AACD,MAAI,GACA,KAAI,KAAKA,OAAK,GAAG;AAErB,MAAI,IACA,KAAI,MAAMA,OAAK,IAAI;AAEvB,MAAI,aACA,KAAI,gBAAgBA,OAAK,aAAa;AAE1C,MAAI,UACA,KAAI,MAAM;AAEd,MAAI,MAAA,gBACA,KAAI,YAAY;AAEpB,MAAI,MAAA,wBACA,KAAI,cAAc,MAAA;AAEtB,MAAI,MAAA,kBACA,KAAI,SAAS,MAAA;AAEjB,SAAO;;;;;ACpKf,IAAM,sBAAN,MAA0B;CACtB;CACA;CACA;CACA;CACA;CACA,YAAY,KAAK,KAAK,SAAS;AAC3B,QAAA,SAAe;AACf,OAAK,MAAM;AACX,OAAK,UAAU;;CAEnB,qBAAqB,mBAAmB;AACpC,MAAI,KAAK,kBACL,OAAM,IAAI,UAAU,+CAA+C;AAEvE,OAAK,oBAAoB;AACzB,SAAO;;CAEX,2BAA2B,YAAY;AACnC,MAAI,KAAK,wBACL,OAAM,IAAI,UAAU,qDAAqD;AAE7E,OAAK,0BAA0B;AAC/B,SAAO;;CAEX,aAAa,GAAG,MAAM;AAClB,SAAO,MAAA,OAAa,aAAa,GAAG,KAAK;;CAE7C,QAAQ,GAAG,MAAM;AACb,SAAO,MAAA,OAAa,QAAQ,GAAG,KAAK;;CAExC,OAAO;AACH,SAAO,MAAA;;;AAGf,IAAa,iBAAb,MAA4B;CACxB;CACA,cAAc,EAAE;CAChB;CACA;CACA;CACA,YAAY,WAAW;AACnB,QAAA,YAAkB;;CAEtB,aAAa,KAAK,SAAS;EACvB,MAAM,YAAY,IAAI,oBAAoB,MAAM,KAAK,EAAE,MAAM,SAAS,MAAM,CAAC;AAC7E,QAAA,WAAiB,KAAK,UAAU;AAChC,SAAO;;CAEX,mBAAmB,iBAAiB;AAChC,MAAI,MAAA,gBACA,OAAM,IAAI,UAAU,6CAA6C;AAErE,QAAA,kBAAwB;AACxB,SAAO;;CAEX,2BAA2B,yBAAyB;AAChD,MAAI,MAAA,kBACA,OAAM,IAAI,UAAU,qDAAqD;AAE7E,QAAA,oBAA0B;AAC1B,SAAO;;CAEX,+BAA+B,KAAK;AAChC,QAAA,MAAY;AACZ,SAAO;;CAEX,MAAM,UAAU;AACZ,MAAI,CAAC,MAAA,WAAiB,OAClB,OAAM,IAAI,WAAW,uCAAuC;AAEhE,MAAI,MAAA,WAAiB,WAAW,GAAG;GAC/B,MAAM,CAAC,aAAa,MAAA;GACpB,MAAM,YAAY,MAAM,IAAI,iBAAiB,MAAA,UAAgB,CACxD,+BAA+B,MAAA,IAAU,CACzC,mBAAmB,MAAA,gBAAsB,CACzC,2BAA2B,MAAA,kBAAwB,CACnD,qBAAqB,UAAU,kBAAkB,CACjD,QAAQ,UAAU,KAAK,EAAE,GAAG,UAAU,SAAS,CAAC;GACrD,MAAM,MAAM;IACR,YAAY,UAAU;IACtB,IAAI,UAAU;IACd,YAAY,CAAC,EAAE,CAAC;IAChB,KAAK,UAAU;IAClB;AACD,OAAI,UAAU,IACV,KAAI,MAAM,UAAU;AACxB,OAAI,UAAU,UACV,KAAI,YAAY,UAAU;AAC9B,OAAI,UAAU,YACV,KAAI,cAAc,UAAU;AAChC,OAAI,UAAU,cACV,KAAI,WAAW,GAAG,gBAAgB,UAAU;AAChD,OAAI,UAAU,OACV,KAAI,WAAW,GAAG,SAAS,UAAU;AACzC,UAAO;;EAEX,IAAI;AACJ,OAAK,IAAI,IAAI,GAAG,IAAI,MAAA,WAAiB,QAAQ,KAAK;GAC9C,MAAM,YAAY,MAAA,WAAiB;AACnC,OAAI,CAAC,WAAW,MAAA,iBAAuB,MAAA,mBAAyB,UAAU,kBAAkB,CACxF,OAAM,IAAI,WAAW,sGAAsG;GAE/H,MAAM,aAAa;IACf,GAAG,MAAA;IACH,GAAG,MAAA;IACH,GAAG,UAAU;IAChB;GACD,MAAM,EAAE,QAAQ;AAChB,OAAI,OAAO,QAAQ,YAAY,CAAC,IAC5B,OAAM,IAAI,WAAW,8DAA4D;AAErF,OAAI,QAAQ,SAAS,QAAQ,UACzB,OAAM,IAAI,WAAW,uEAAmE;AAE5F,OAAI,OAAO,WAAW,QAAQ,YAAY,CAAC,WAAW,IAClD,OAAM,IAAI,WAAW,yEAAuE;AAEhG,OAAI,CAAC,IACD,OAAM,WAAW;YAEZ,QAAQ,WAAW,IACxB,OAAM,IAAI,WAAW,0FAAwF;AAEjH,gBAAa,4BAAY,IAAI,KAAK,EAAE,UAAU,QAAQ,MAAM,MAAA,iBAAuB,WAAW;AAC9F,OAAI,WAAW,QAAQ,KAAA,KAAa,WAAW,QAAQ,MACnD,OAAM,IAAI,iBAAiB,0EAAwE;AAEvG,OAAI,WAAW,QAAQ,KAAA,KAAa,CAAC,MAAA,iBAAuB,IACxD,OAAM,IAAI,WAAW,sFAAoF;;EAGjH,MAAM,MAAM,YAAY,IAAI;EAC5B,MAAM,MAAM;GACR,YAAY;GACZ,YAAY,EAAE;GACjB;AACD,OAAK,IAAI,IAAI,GAAG,IAAI,MAAA,WAAiB,QAAQ,KAAK;GAC9C,MAAM,YAAY,MAAA,WAAiB;GACnC,MAAM,SAAS,EAAE;AACjB,OAAI,WAAW,KAAK,OAAO;AAC3B,OAAI,MAAM,GAAG;IACT,MAAM,YAAY,MAAM,IAAI,iBAAiB,MAAA,UAAgB,CACxD,+BAA+B,MAAA,IAAU,CACzC,wBAAwB,IAAI,CAC5B,mBAAmB,MAAA,gBAAsB,CACzC,2BAA2B,MAAA,kBAAwB,CACnD,qBAAqB,UAAU,kBAAkB,CACjD,2BAA2B,UAAU,wBAAwB,CAC7D,QAAQ,UAAU,KAAK;KACxB,GAAG,UAAU;MACZ,cAAc;KAClB,CAAC;AACF,QAAI,aAAa,UAAU;AAC3B,QAAI,KAAK,UAAU;AACnB,QAAI,MAAM,UAAU;AACpB,QAAI,UAAU,IACV,KAAI,MAAM,UAAU;AACxB,QAAI,UAAU,UACV,KAAI,YAAY,UAAU;AAC9B,QAAI,UAAU,YACV,KAAI,cAAc,UAAU;AAChC,WAAO,gBAAgB,UAAU;AACjC,QAAI,UAAU,OACV,QAAO,SAAS,UAAU;AAC9B;;GAEJ,MAAM,MAAM,UAAU,mBAAmB,OACrC,MAAA,iBAAuB,OACvB,MAAA,mBAAyB;AAC7B,gBAAa,QAAQ,QAAQ,MAAM,KAAK,UAAU,KAAK,UAAU;GACjE,MAAM,IAAI,MAAM,aAAa,UAAU,KAAK,IAAI;GAChD,MAAM,EAAE,cAAc,eAAe,MAAM,qBAAqB,KAAK,KAAK,GAAG,KAAK,UAAU,wBAAwB;AACpH,UAAO,gBAAgBQ,OAAK,aAAa;AACzC,OAAI,UAAU,qBAAqB,WAC/B,QAAO,SAAS;IAAE,GAAG,UAAU;IAAmB,GAAG;IAAY;;AAEzE,SAAO;;;;;AC1Lf,SAAgB,gBAAgB,KAAK,WAAW;CAC5C,MAAM,OAAO,OAAO,IAAI,MAAM,GAAG;AACjC,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK,QACD,QAAO;GAAE;GAAM,MAAM;GAAQ;EACjC,KAAK;EACL,KAAK;EACL,KAAK,QACD,QAAO;GAAE;GAAM,MAAM;GAAW,YAAY,SAAS,IAAI,MAAM,GAAG,EAAE,GAAG,IAAI;GAAG;EAClF,KAAK;EACL,KAAK;EACL,KAAK,QACD,QAAO;GAAE;GAAM,MAAM;GAAqB;EAC9C,KAAK;EACL,KAAK;EACL,KAAK,QACD,QAAO;GAAE;GAAM,MAAM;GAAS,YAAY,UAAU;GAAY;EACpE,KAAK;EACL,KAAK,QACD,QAAO,EAAE,MAAM,WAAW;EAC9B,KAAK;EACL,KAAK;EACL,KAAK,YACD,QAAO,EAAE,MAAM,KAAK;EACxB,QACI,OAAM,IAAI,iBAAiB,OAAO,IAAI,6DAA6D;;;;;AC1B/G,eAAsB,UAAU,KAAK,KAAK,OAAO;AAC7C,KAAI,eAAe,YAAY;AAC3B,MAAI,CAAC,IAAI,WAAW,KAAK,CACrB,OAAM,IAAI,UAAU,gBAAgB,KAAK,aAAa,aAAa,eAAe,CAAC;AAEvF,SAAO,OAAO,OAAO,UAAU,OAAO,KAAK;GAAE,MAAM,OAAO,IAAI,MAAM,GAAG;GAAI,MAAM;GAAQ,EAAE,OAAO,CAAC,MAAM,CAAC;;AAE9G,mBAAkB,KAAK,KAAK,MAAM;AAClC,QAAO;;;;ACPX,eAAsB,OAAO,KAAK,KAAK,WAAW,MAAM;CACpD,MAAM,YAAY,MAAM,UAAU,KAAK,KAAK,SAAS;AACrD,gBAAe,KAAK,UAAU;CAC9B,MAAM,YAAY,gBAAgB,KAAK,UAAU,UAAU;AAC3D,KAAI;AACA,SAAO,MAAM,OAAO,OAAO,OAAO,WAAW,WAAW,WAAW,KAAK;SAEtE;AACF,SAAO;;;;;ACDf,eAAsB,gBAAgB,KAAK,KAAK,SAAS;AACrD,KAAI,CAAC,SAAS,IAAI,CACd,OAAM,IAAI,WAAW,kCAAkC;AAE3D,KAAI,IAAI,cAAc,KAAA,KAAa,IAAI,WAAW,KAAA,EAC9C,OAAM,IAAI,WAAW,4EAAwE;AAEjG,KAAI,IAAI,cAAc,KAAA,KAAa,OAAO,IAAI,cAAc,SACxD,OAAM,IAAI,WAAW,sCAAsC;AAE/D,KAAI,IAAI,YAAY,KAAA,EAChB,OAAM,IAAI,WAAW,sBAAsB;AAE/C,KAAI,OAAO,IAAI,cAAc,SACzB,OAAM,IAAI,WAAW,0CAA0C;AAEnE,KAAI,IAAI,WAAW,KAAA,KAAa,CAAC,SAAS,IAAI,OAAO,CACjD,OAAM,IAAI,WAAW,wCAAwC;CAEjE,IAAI,aAAa,EAAE;AACnB,KAAI,IAAI,UACJ,KAAI;EACA,MAAM,kBAAkBC,OAAK,IAAI,UAAU;AAC3C,eAAa,KAAK,MAAM,QAAQ,OAAO,gBAAgB,CAAC;SAEtD;AACF,QAAM,IAAI,WAAW,kCAAkC;;AAG/D,KAAI,CAAC,WAAW,YAAY,IAAI,OAAO,CACnC,OAAM,IAAI,WAAW,4EAA4E;CAErG,MAAM,aAAa;EACf,GAAG;EACH,GAAG,IAAI;EACV;CACD,MAAM,aAAa,aAAa,YAAY,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,EAAE,SAAS,MAAM,YAAY,WAAW;CAC5G,IAAI,MAAM;AACV,KAAI,WAAW,IAAI,MAAM,EAAE;AACvB,QAAM,WAAW;AACjB,MAAI,OAAO,QAAQ,UACf,OAAM,IAAI,WAAW,4EAA0E;;CAGvG,MAAM,EAAE,QAAQ;AAChB,KAAI,OAAO,QAAQ,YAAY,CAAC,IAC5B,OAAM,IAAI,WAAW,8DAA4D;CAErF,MAAM,aAAa,WAAW,mBAAmB,cAAc,QAAQ,WAAW;AAClF,KAAI,cAAc,CAAC,WAAW,IAAI,IAAI,CAClC,OAAM,IAAI,kBAAkB,yDAAuD;AAEvF,KAAI;MACI,OAAO,IAAI,YAAY,SACvB,OAAM,IAAI,WAAW,+BAA+B;YAGnD,OAAO,IAAI,YAAY,YAAY,EAAE,IAAI,mBAAmB,YACjE,OAAM,IAAI,WAAW,yDAAyD;CAElF,IAAI,cAAc;AAClB,KAAI,OAAO,QAAQ,YAAY;AAC3B,QAAM,MAAM,IAAI,YAAY,IAAI;AAChC,gBAAc;;AAElB,cAAa,KAAK,KAAK,SAAS;CAChC,MAAM,OAAO,OAAO,IAAI,cAAc,KAAA,IAAYC,SAAO,IAAI,UAAU,GAAG,IAAI,YAAY,EAAEA,SAAO,IAAI,EAAE,OAAO,IAAI,YAAY,WAC1H,MACIA,SAAO,IAAI,QAAQ,GACnB,QAAQ,OAAO,IAAI,QAAQ,GAC/B,IAAI,QAAQ;CAClB,IAAI;AACJ,KAAI;AACA,cAAYD,OAAK,IAAI,UAAU;SAE7B;AACF,QAAM,IAAI,WAAW,2CAA2C;;CAEpE,MAAM,IAAI,MAAM,aAAa,KAAK,IAAI;AAEtC,KAAI,CADa,MAAM,OAAO,KAAK,GAAG,WAAW,KAAK,CAElD,OAAM,IAAI,gCAAgC;CAE9C,IAAI;AACJ,KAAI,IACA,KAAI;AACA,YAAUA,OAAK,IAAI,QAAQ;SAEzB;AACF,QAAM,IAAI,WAAW,yCAAyC;;UAG7D,OAAO,IAAI,YAAY,SAC5B,WAAU,QAAQ,OAAO,IAAI,QAAQ;KAGrC,WAAU,IAAI;CAElB,MAAM,SAAS,EAAE,SAAS;AAC1B,KAAI,IAAI,cAAc,KAAA,EAClB,QAAO,kBAAkB;AAE7B,KAAI,IAAI,WAAW,KAAA,EACf,QAAO,oBAAoB,IAAI;AAEnC,KAAI,YACA,QAAO;EAAE,GAAG;EAAQ,KAAK;EAAG;AAEhC,QAAO;;;;ACnHX,eAAsB,cAAc,KAAK,KAAK,SAAS;AACnD,KAAI,eAAe,WACf,OAAM,QAAQ,OAAO,IAAI;AAE7B,KAAI,OAAO,QAAQ,SACf,OAAM,IAAI,WAAW,6CAA6C;CAEtE,MAAM,EAAE,GAAG,iBAAiB,GAAG,SAAS,GAAG,WAAW,WAAW,IAAI,MAAM,IAAI;AAC/E,KAAI,WAAW,EACX,OAAM,IAAI,WAAW,sBAAsB;CAE/C,MAAM,WAAW,MAAM,gBAAgB;EAAE;EAAS,WAAW;EAAiB;EAAW,EAAE,KAAK,QAAQ;CACxG,MAAM,SAAS;EAAE,SAAS,SAAS;EAAS,iBAAiB,SAAS;EAAiB;AACvF,KAAI,OAAO,QAAQ,WACf,QAAO;EAAE,GAAG;EAAQ,KAAK,SAAS;EAAK;AAE3C,QAAO;;;;AChBX,eAAsB,cAAc,KAAK,KAAK,SAAS;AACnD,KAAI,CAAC,SAAS,IAAI,CACd,OAAM,IAAI,WAAW,gCAAgC;AAEzD,KAAI,CAAC,MAAM,QAAQ,IAAI,WAAW,IAAI,CAAC,IAAI,WAAW,MAAM,SAAS,CACjE,OAAM,IAAI,WAAW,2CAA2C;AAEpE,MAAK,MAAM,aAAa,IAAI,WACxB,KAAI;AACA,SAAO,MAAM,gBAAgB;GACzB,QAAQ,UAAU;GAClB,SAAS,IAAI;GACb,WAAW,UAAU;GACrB,WAAW,UAAU;GACxB,EAAE,KAAK,QAAQ;SAEd;AAGV,OAAM,IAAI,gCAAgC;;;;ACnB9C,MAAM,SAAS,SAAS,KAAK,MAAM,KAAK,SAAS,GAAG,IAAK;AACzD,MAAM,SAAS;AACf,MAAM,OAAO,SAAS;AACtB,MAAM,MAAM,OAAO;AACnB,MAAM,OAAO,MAAM;AACnB,MAAM,OAAO,MAAM;AACnB,MAAM,QAAQ;AACd,SAAgB,KAAK,KAAK;CACtB,MAAM,UAAU,MAAM,KAAK,IAAI;AAC/B,KAAI,CAAC,WAAY,QAAQ,MAAM,QAAQ,GACnC,OAAM,IAAI,UAAU,6BAA6B;CAErD,MAAM,QAAQ,WAAW,QAAQ,GAAG;CACpC,MAAM,OAAO,QAAQ,GAAG,aAAa;CACrC,IAAI;AACJ,SAAQ,MAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,iBAAc,KAAK,MAAM,MAAM;AAC/B;EACJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,iBAAc,KAAK,MAAM,QAAQ,OAAO;AACxC;EACJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,iBAAc,KAAK,MAAM,QAAQ,KAAK;AACtC;EACJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,iBAAc,KAAK,MAAM,QAAQ,IAAI;AACrC;EACJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,iBAAc,KAAK,MAAM,QAAQ,KAAK;AACtC;EACJ;AACI,iBAAc,KAAK,MAAM,QAAQ,KAAK;AACtC;;AAER,KAAI,QAAQ,OAAO,OAAO,QAAQ,OAAO,MACrC,QAAO,CAAC;AAEZ,QAAO;;AAEX,SAAS,cAAc,OAAO,OAAO;AACjC,KAAI,CAAC,OAAO,SAAS,MAAM,CACvB,OAAM,IAAI,UAAU,WAAW,MAAM,QAAQ;AAEjD,QAAO;;AAEX,MAAM,gBAAgB,UAAU;AAC5B,KAAI,MAAM,SAAS,IAAI,CACnB,QAAO,MAAM,aAAa;AAE9B,QAAO,eAAe,MAAM,aAAa;;AAE7C,MAAM,yBAAyB,YAAY,cAAc;AACrD,KAAI,OAAO,eAAe,SACtB,QAAO,UAAU,SAAS,WAAW;AAEzC,KAAI,MAAM,QAAQ,WAAW,CACzB,QAAO,UAAU,KAAK,IAAI,UAAU,IAAI,KAAK,IAAI,IAAI,WAAW,CAAC,CAAC;AAEtE,QAAO;;AAEX,SAAgB,kBAAkB,iBAAiB,gBAAgB,UAAU,EAAE,EAAE;CAC7E,IAAI;AACJ,KAAI;AACA,YAAU,KAAK,MAAM,QAAQ,OAAO,eAAe,CAAC;SAElD;AAEN,KAAI,CAAC,SAAS,QAAQ,CAClB,OAAM,IAAI,WAAW,iDAAiD;CAE1E,MAAM,EAAE,QAAQ;AAChB,KAAI,QACC,OAAO,gBAAgB,QAAQ,YAC5B,aAAa,gBAAgB,IAAI,KAAK,aAAa,IAAI,EAC3D,OAAM,IAAI,yBAAyB,uCAAqC,SAAS,OAAO,eAAe;CAE3G,MAAM,EAAE,iBAAiB,EAAE,EAAE,QAAQ,SAAS,UAAU,gBAAgB;CACxE,MAAM,gBAAgB,CAAC,GAAG,eAAe;AACzC,KAAI,gBAAgB,KAAA,EAChB,eAAc,KAAK,MAAM;AAC7B,KAAI,aAAa,KAAA,EACb,eAAc,KAAK,MAAM;AAC7B,KAAI,YAAY,KAAA,EACZ,eAAc,KAAK,MAAM;AAC7B,KAAI,WAAW,KAAA,EACX,eAAc,KAAK,MAAM;AAC7B,MAAK,MAAM,SAAS,IAAI,IAAI,cAAc,SAAS,CAAC,CAChD,KAAI,EAAE,SAAS,SACX,OAAM,IAAI,yBAAyB,qBAAqB,MAAM,UAAU,SAAS,OAAO,UAAU;AAG1G,KAAI,UACA,EAAE,MAAM,QAAQ,OAAO,GAAG,SAAS,CAAC,OAAO,EAAE,SAAS,QAAQ,IAAI,CAClE,OAAM,IAAI,yBAAyB,kCAAgC,SAAS,OAAO,eAAe;AAEtG,KAAI,WAAW,QAAQ,QAAQ,QAC3B,OAAM,IAAI,yBAAyB,kCAAgC,SAAS,OAAO,eAAe;AAEtG,KAAI,YACA,CAAC,sBAAsB,QAAQ,KAAK,OAAO,aAAa,WAAW,CAAC,SAAS,GAAG,SAAS,CACzF,OAAM,IAAI,yBAAyB,kCAAgC,SAAS,OAAO,eAAe;CAEtG,IAAI;AACJ,SAAQ,OAAO,QAAQ,gBAAvB;EACI,KAAK;AACD,eAAY,KAAK,QAAQ,eAAe;AACxC;EACJ,KAAK;AACD,eAAY,QAAQ;AACpB;EACJ,KAAK;AACD,eAAY;AACZ;EACJ,QACI,OAAM,IAAI,UAAU,qCAAqC;;CAEjE,MAAM,EAAE,gBAAgB;CACxB,MAAM,MAAM,MAAM,+BAAe,IAAI,MAAM,CAAC;AAC5C,MAAK,QAAQ,QAAQ,KAAA,KAAa,gBAAgB,OAAO,QAAQ,QAAQ,SACrE,OAAM,IAAI,yBAAyB,kCAAgC,SAAS,OAAO,UAAU;AAEjG,KAAI,QAAQ,QAAQ,KAAA,GAAW;AAC3B,MAAI,OAAO,QAAQ,QAAQ,SACvB,OAAM,IAAI,yBAAyB,kCAAgC,SAAS,OAAO,UAAU;AAEjG,MAAI,QAAQ,MAAM,MAAM,UACpB,OAAM,IAAI,yBAAyB,wCAAsC,SAAS,OAAO,eAAe;;AAGhH,KAAI,QAAQ,QAAQ,KAAA,GAAW;AAC3B,MAAI,OAAO,QAAQ,QAAQ,SACvB,OAAM,IAAI,yBAAyB,kCAAgC,SAAS,OAAO,UAAU;AAEjG,MAAI,QAAQ,OAAO,MAAM,UACrB,OAAM,IAAI,WAAW,wCAAsC,SAAS,OAAO,eAAe;;AAGlG,KAAI,aAAa;EACb,MAAM,MAAM,MAAM,QAAQ;EAC1B,MAAM,MAAM,OAAO,gBAAgB,WAAW,cAAc,KAAK,YAAY;AAC7E,MAAI,MAAM,YAAY,IAClB,OAAM,IAAI,WAAW,8DAA4D,SAAS,OAAO,eAAe;AAEpH,MAAI,MAAM,IAAI,UACV,OAAM,IAAI,yBAAyB,mEAAiE,SAAS,OAAO,eAAe;;AAG3I,QAAO;;AAEX,IAAa,mBAAb,MAA8B;CAC1B;CACA,YAAY,SAAS;AACjB,MAAI,CAAC,SAAS,QAAQ,CAClB,OAAM,IAAI,UAAU,mCAAmC;AAE3D,QAAA,UAAgB,gBAAgB,QAAQ;;CAE5C,OAAO;AACH,SAAO,QAAQ,OAAO,KAAK,UAAU,MAAA,QAAc,CAAC;;CAExD,IAAI,MAAM;AACN,SAAO,MAAA,QAAc;;CAEzB,IAAI,IAAI,OAAO;AACX,QAAA,QAAc,MAAM;;CAExB,IAAI,MAAM;AACN,SAAO,MAAA,QAAc;;CAEzB,IAAI,IAAI,OAAO;AACX,QAAA,QAAc,MAAM;;CAExB,IAAI,MAAM;AACN,SAAO,MAAA,QAAc;;CAEzB,IAAI,IAAI,OAAO;AACX,QAAA,QAAc,MAAM;;CAExB,IAAI,IAAI,OAAO;AACX,QAAA,QAAc,MAAM;;CAExB,IAAI,IAAI,OAAO;AACX,MAAI,OAAO,UAAU,SACjB,OAAA,QAAc,MAAM,cAAc,gBAAgB,MAAM;WAEnD,iBAAiB,KACtB,OAAA,QAAc,MAAM,cAAc,gBAAgB,MAAM,MAAM,CAAC;MAG/D,OAAA,QAAc,MAAM,sBAAM,IAAI,MAAM,CAAC,GAAG,KAAK,MAAM;;CAG3D,IAAI,IAAI,OAAO;AACX,MAAI,OAAO,UAAU,SACjB,OAAA,QAAc,MAAM,cAAc,qBAAqB,MAAM;WAExD,iBAAiB,KACtB,OAAA,QAAc,MAAM,cAAc,qBAAqB,MAAM,MAAM,CAAC;MAGpE,OAAA,QAAc,MAAM,sBAAM,IAAI,MAAM,CAAC,GAAG,KAAK,MAAM;;CAG3D,IAAI,IAAI,OAAO;AACX,MAAI,UAAU,KAAA,EACV,OAAA,QAAc,MAAM,sBAAM,IAAI,MAAM,CAAC;WAEhC,iBAAiB,KACtB,OAAA,QAAc,MAAM,cAAc,eAAe,MAAM,MAAM,CAAC;WAEzD,OAAO,UAAU,SACtB,OAAA,QAAc,MAAM,cAAc,eAAe,sBAAM,IAAI,MAAM,CAAC,GAAG,KAAK,MAAM,CAAC;MAGjF,OAAA,QAAc,MAAM,cAAc,eAAe,MAAM;;;;;ACvOnE,eAAsB,UAAU,KAAK,KAAK,SAAS;CAC/C,MAAM,WAAW,MAAM,cAAc,KAAK,KAAK,QAAQ;AACvD,KAAI,SAAS,gBAAgB,MAAM,SAAS,MAAM,IAAI,SAAS,gBAAgB,QAAQ,MACnF,OAAM,IAAI,WAAW,sCAAsC;CAG/D,MAAM,SAAS;EAAE,SADD,kBAAkB,SAAS,iBAAiB,SAAS,SAAS,QAAQ;EAC5D,iBAAiB,SAAS;EAAiB;AACrE,KAAI,OAAO,QAAQ,WACf,QAAO;EAAE,GAAG;EAAQ,KAAK,SAAS;EAAK;AAE3C,QAAO;;;;ACVX,eAAsB,WAAW,KAAK,KAAK,SAAS;CAChD,MAAM,YAAY,MAAM,eAAe,KAAK,KAAK,QAAQ;CACzD,MAAM,UAAU,kBAAkB,UAAU,iBAAiB,UAAU,WAAW,QAAQ;CAC1F,MAAM,EAAE,oBAAoB;AAC5B,KAAI,gBAAgB,QAAQ,KAAA,KAAa,gBAAgB,QAAQ,QAAQ,IACrE,OAAM,IAAI,yBAAyB,sDAAoD,SAAS,OAAO,WAAW;AAEtH,KAAI,gBAAgB,QAAQ,KAAA,KAAa,gBAAgB,QAAQ,QAAQ,IACrE,OAAM,IAAI,yBAAyB,sDAAoD,SAAS,OAAO,WAAW;AAEtH,KAAI,gBAAgB,QAAQ,KAAA,KACxB,KAAK,UAAU,gBAAgB,IAAI,KAAK,KAAK,UAAU,QAAQ,IAAI,CACnE,OAAM,IAAI,yBAAyB,sDAAoD,SAAS,OAAO,WAAW;CAEtH,MAAM,SAAS;EAAE;EAAS;EAAiB;AAC3C,KAAI,OAAO,QAAQ,WACf,QAAO;EAAE,GAAG;EAAQ,KAAK,UAAU;EAAK;AAE5C,QAAO;;;;ACpBX,IAAa,iBAAb,MAA4B;CACxB;CACA,YAAY,WAAW;AACnB,QAAA,YAAkB,IAAI,iBAAiB,UAAU;;CAErD,wBAAwB,KAAK;AACzB,QAAA,UAAgB,wBAAwB,IAAI;AAC5C,SAAO;;CAEX,wBAAwB,IAAI;AACxB,QAAA,UAAgB,wBAAwB,GAAG;AAC3C,SAAO;;CAEX,mBAAmB,iBAAiB;AAChC,QAAA,UAAgB,mBAAmB,gBAAgB;AACnD,SAAO;;CAEX,2BAA2B,YAAY;AACnC,QAAA,UAAgB,2BAA2B,WAAW;AACtD,SAAO;;CAEX,MAAM,QAAQ,KAAK,SAAS;EACxB,MAAM,MAAM,MAAM,MAAA,UAAgB,QAAQ,KAAK,QAAQ;AACvD,SAAO;GAAC,IAAI;GAAW,IAAI;GAAe,IAAI;GAAI,IAAI;GAAY,IAAI;GAAI,CAAC,KAAK,IAAI;;;;;ACrB5F,eAAsB,KAAK,KAAK,KAAK,MAAM;CACvC,MAAM,YAAY,MAAM,UAAU,KAAK,KAAK,OAAO;AACnD,gBAAe,KAAK,UAAU;CAC9B,MAAM,YAAY,MAAM,OAAO,OAAO,KAAK,gBAAgB,KAAK,UAAU,UAAU,EAAE,WAAW,KAAK;AACtG,QAAO,IAAI,WAAW,UAAU;;;;ACCpC,IAAa,gBAAb,MAA2B;CACvB;CACA;CACA;CACA,YAAY,SAAS;AACjB,MAAI,EAAE,mBAAmB,YACrB,OAAM,IAAI,UAAU,4CAA4C;AAEpE,QAAA,UAAgB;;CAEpB,mBAAmB,iBAAiB;AAChC,MAAI,MAAA,gBACA,OAAM,IAAI,UAAU,6CAA6C;AAErE,QAAA,kBAAwB;AACxB,SAAO;;CAEX,qBAAqB,mBAAmB;AACpC,MAAI,MAAA,kBACA,OAAM,IAAI,UAAU,+CAA+C;AAEvE,QAAA,oBAA0B;AAC1B,SAAO;;CAEX,MAAM,KAAK,KAAK,SAAS;AACrB,MAAI,CAAC,MAAA,mBAAyB,CAAC,MAAA,kBAC3B,OAAM,IAAI,WAAW,kFAAkF;AAE3G,MAAI,CAAC,WAAW,MAAA,iBAAuB,MAAA,kBAAwB,CAC3D,OAAM,IAAI,WAAW,4EAA4E;EAErG,MAAM,aAAa;GACf,GAAG,MAAA;GACH,GAAG,MAAA;GACN;EACD,MAAM,aAAa,aAAa,YAAY,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,EAAE,SAAS,MAAM,MAAA,iBAAuB,WAAW;EACvH,IAAI,MAAM;AACV,MAAI,WAAW,IAAI,MAAM,EAAE;AACvB,SAAM,MAAA,gBAAsB;AAC5B,OAAI,OAAO,QAAQ,UACf,OAAM,IAAI,WAAW,4EAA0E;;EAGvG,MAAM,EAAE,QAAQ;AAChB,MAAI,OAAO,QAAQ,YAAY,CAAC,IAC5B,OAAM,IAAI,WAAW,8DAA4D;AAErF,eAAa,KAAK,KAAK,OAAO;EAC9B,IAAI;EACJ,IAAI;AACJ,MAAI,KAAK;AACL,cAAWO,OAAK,MAAA,QAAc;AAC9B,cAAWC,SAAO,SAAS;SAE1B;AACD,cAAW,MAAA;AACX,cAAW;;EAEf,IAAI;EACJ,IAAI;AACJ,MAAI,MAAA,iBAAuB;AACvB,2BAAwBD,OAAK,KAAK,UAAU,MAAA,gBAAsB,CAAC;AACnE,0BAAuBC,SAAO,sBAAsB;SAEnD;AACD,2BAAwB;AACxB,0BAAuB,IAAI,YAAY;;EAE3C,MAAM,OAAO,OAAO,sBAAsBA,SAAO,IAAI,EAAE,SAAS;EAGhE,MAAM,MAAM;GACR,WAAWD,OAFG,MAAM,KAAK,KADnB,MAAM,aAAa,KAAK,IAAI,EACD,KAAK,CAEZ;GAC1B,SAAS;GACZ;AACD,MAAI,MAAA,kBACA,KAAI,SAAS,MAAA;AAEjB,MAAI,MAAA,gBACA,KAAI,YAAY;AAEpB,SAAO;;;;;ACxFf,IAAa,cAAb,MAAyB;CACrB;CACA,YAAY,SAAS;AACjB,QAAA,YAAkB,IAAI,cAAc,QAAQ;;CAEhD,mBAAmB,iBAAiB;AAChC,QAAA,UAAgB,mBAAmB,gBAAgB;AACnD,SAAO;;CAEX,MAAM,KAAK,KAAK,SAAS;EACrB,MAAM,MAAM,MAAM,MAAA,UAAgB,KAAK,KAAK,QAAQ;AACpD,MAAI,IAAI,YAAY,KAAA,EAChB,OAAM,IAAI,UAAU,4DAA4D;AAEpF,SAAO,GAAG,IAAI,UAAU,GAAG,IAAI,QAAQ,GAAG,IAAI;;;;;ACbtD,IAAM,sBAAN,MAA0B;CACtB;CACA;CACA;CACA;CACA;CACA,YAAY,KAAK,KAAK,SAAS;AAC3B,QAAA,SAAe;AACf,OAAK,MAAM;AACX,OAAK,UAAU;;CAEnB,mBAAmB,iBAAiB;AAChC,MAAI,KAAK,gBACL,OAAM,IAAI,UAAU,6CAA6C;AAErE,OAAK,kBAAkB;AACvB,SAAO;;CAEX,qBAAqB,mBAAmB;AACpC,MAAI,KAAK,kBACL,OAAM,IAAI,UAAU,+CAA+C;AAEvE,OAAK,oBAAoB;AACzB,SAAO;;CAEX,aAAa,GAAG,MAAM;AAClB,SAAO,MAAA,OAAa,aAAa,GAAG,KAAK;;CAE7C,KAAK,GAAG,MAAM;AACV,SAAO,MAAA,OAAa,KAAK,GAAG,KAAK;;CAErC,OAAO;AACH,SAAO,MAAA;;;AAGf,IAAa,cAAb,MAAyB;CACrB;CACA,cAAc,EAAE;CAChB,YAAY,SAAS;AACjB,QAAA,UAAgB;;CAEpB,aAAa,KAAK,SAAS;EACvB,MAAM,YAAY,IAAI,oBAAoB,MAAM,KAAK,QAAQ;AAC7D,QAAA,WAAiB,KAAK,UAAU;AAChC,SAAO;;CAEX,MAAM,OAAO;AACT,MAAI,CAAC,MAAA,WAAiB,OAClB,OAAM,IAAI,WAAW,uCAAuC;EAEhE,MAAM,MAAM;GACR,YAAY,EAAE;GACd,SAAS;GACZ;AACD,OAAK,IAAI,IAAI,GAAG,IAAI,MAAA,WAAiB,QAAQ,KAAK;GAC9C,MAAM,YAAY,MAAA,WAAiB;GACnC,MAAM,YAAY,IAAI,cAAc,MAAA,QAAc;AAClD,aAAU,mBAAmB,UAAU,gBAAgB;AACvD,aAAU,qBAAqB,UAAU,kBAAkB;GAC3D,MAAM,EAAE,SAAS,GAAG,SAAS,MAAM,UAAU,KAAK,UAAU,KAAK,UAAU,QAAQ;AACnF,OAAI,MAAM,EACN,KAAI,UAAU;YAET,IAAI,YAAY,QACrB,OAAM,IAAI,WAAW,sDAAsD;AAE/E,OAAI,WAAW,KAAK,KAAK;;AAE7B,SAAO;;;;;ACnEf,IAAa,UAAb,MAAqB;CACjB;CACA;CACA,YAAY,UAAU,EAAE,EAAE;AACtB,QAAA,MAAY,IAAI,iBAAiB,QAAQ;;CAE7C,UAAU,QAAQ;AACd,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,WAAW,SAAS;AAChB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,YAAY,UAAU;AAClB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,OAAO,OAAO;AACV,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,aAAa,OAAO;AAChB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,kBAAkB,OAAO;AACrB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,YAAY,OAAO;AACf,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,mBAAmB,iBAAiB;AAChC,QAAA,kBAAwB;AACxB,SAAO;;CAEX,MAAM,KAAK,KAAK,SAAS;EACrB,MAAM,MAAM,IAAI,YAAY,MAAA,IAAU,MAAM,CAAC;AAC7C,MAAI,mBAAmB,MAAA,gBAAsB;AAC7C,MAAI,MAAM,QAAQ,MAAA,iBAAuB,KAAK,IAC1C,MAAA,gBAAsB,KAAK,SAAS,MAAM,IAC1C,MAAA,gBAAsB,QAAQ,MAC9B,OAAM,IAAI,WAAW,sCAAsC;AAE/D,SAAO,IAAI,KAAK,KAAK,QAAQ;;;;;AC/CrC,IAAa,aAAb,MAAwB;CACpB;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA,YAAY,UAAU,EAAE,EAAE;AACtB,QAAA,MAAY,IAAI,iBAAiB,QAAQ;;CAE7C,UAAU,QAAQ;AACd,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,WAAW,SAAS;AAChB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,YAAY,UAAU;AAClB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,OAAO,OAAO;AACV,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,aAAa,OAAO;AAChB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,kBAAkB,OAAO;AACrB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,YAAY,OAAO;AACf,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,mBAAmB,iBAAiB;AAChC,MAAI,MAAA,gBACA,OAAM,IAAI,UAAU,6CAA6C;AAErE,QAAA,kBAAwB;AACxB,SAAO;;CAEX,2BAA2B,YAAY;AACnC,MAAI,MAAA,wBACA,OAAM,IAAI,UAAU,qDAAqD;AAE7E,QAAA,0BAAgC;AAChC,SAAO;;CAEX,wBAAwB,KAAK;AACzB,MAAI,MAAA,IACA,OAAM,IAAI,UAAU,kDAAkD;AAE1E,QAAA,MAAY;AACZ,SAAO;;CAEX,wBAAwB,IAAI;AACxB,MAAI,MAAA,GACA,OAAM,IAAI,UAAU,kDAAkD;AAE1E,QAAA,KAAW;AACX,SAAO;;CAEX,0BAA0B;AACtB,QAAA,0BAAgC;AAChC,SAAO;;CAEX,2BAA2B;AACvB,QAAA,2BAAiC;AACjC,SAAO;;CAEX,4BAA4B;AACxB,QAAA,4BAAkC;AAClC,SAAO;;CAEX,MAAM,QAAQ,KAAK,SAAS;EACxB,MAAM,MAAM,IAAI,eAAe,MAAA,IAAU,MAAM,CAAC;AAChD,MAAI,MAAA,oBACC,MAAA,2BACG,MAAA,4BACA,MAAA,2BACJ,OAAA,kBAAwB;GACpB,GAAG,MAAA;GACH,KAAK,MAAA,0BAAgC,MAAA,IAAU,MAAM,KAAA;GACrD,KAAK,MAAA,2BAAiC,MAAA,IAAU,MAAM,KAAA;GACtD,KAAK,MAAA,4BAAkC,MAAA,IAAU,MAAM,KAAA;GAC1D;AAEL,MAAI,mBAAmB,MAAA,gBAAsB;AAC7C,MAAI,MAAA,GACA,KAAI,wBAAwB,MAAA,GAAS;AAEzC,MAAI,MAAA,IACA,KAAI,wBAAwB,MAAA,IAAU;AAE1C,MAAI,MAAA,wBACA,KAAI,2BAA2B,MAAA,wBAA8B;AAEjE,SAAO,IAAI,QAAQ,KAAK,QAAQ;;;;;ACjGxC,MAAM,SAAS,OAAO,gBAAgB;AAClC,KAAI,OAAO,UAAU,YAAY,CAAC,MAC9B,OAAM,IAAI,WAAW,GAAG,YAAY,qBAAqB;;AAGjE,eAAsB,uBAAuB,KAAK,iBAAiB;CAC/D,IAAI;AACJ,KAAI,MAAM,IAAI,CACV,OAAM;UAED,UAAU,IAAI,CACnB,OAAM,MAAM,UAAU,IAAI;KAG1B,OAAM,IAAI,UAAU,gBAAgB,KAAK,aAAa,aAAa,eAAe,CAAC;AAEvF,qBAAoB;AACpB,KAAI,oBAAoB,YACpB,oBAAoB,YACpB,oBAAoB,SACpB,OAAM,IAAI,UAAU,oEAA8D;CAEtF,IAAI;AACJ,SAAQ,IAAI,KAAZ;EACI,KAAK;AACD,SAAM,IAAI,KAAK,gCAA8B;AAC7C,SAAM,IAAI,KAAK,iCAA+B;AAC9C,gBAAa;IAAE,KAAK,IAAI;IAAK,KAAK,IAAI;IAAK,KAAK,IAAI;IAAK;AACzD;EACJ,KAAK;AACD,SAAM,IAAI,KAAK,4BAA0B;AACzC,SAAM,IAAI,GAAG,iCAA+B;AAC5C,SAAM,IAAI,GAAG,iCAA+B;AAC5C,gBAAa;IAAE,KAAK,IAAI;IAAK,KAAK,IAAI;IAAK,GAAG,IAAI;IAAG,GAAG,IAAI;IAAG;AAC/D;EACJ,KAAK;AACD,SAAM,IAAI,KAAK,0CAAwC;AACvD,SAAM,IAAI,GAAG,+BAA6B;AAC1C,gBAAa;IAAE,KAAK,IAAI;IAAK,KAAK,IAAI;IAAK,GAAG,IAAI;IAAG;AACrD;EACJ,KAAK;AACD,SAAM,IAAI,GAAG,6BAA2B;AACxC,SAAM,IAAI,GAAG,4BAA0B;AACvC,gBAAa;IAAE,GAAG,IAAI;IAAG,KAAK,IAAI;IAAK,GAAG,IAAI;IAAG;AACjD;EACJ,KAAK;AACD,SAAM,IAAI,GAAG,8BAA4B;AACzC,gBAAa;IAAE,GAAG,IAAI;IAAG,KAAK,IAAI;IAAK;AACvC;EACJ,QACI,OAAM,IAAI,iBAAiB,sDAAoD;;CAEvF,MAAM,OAAOgB,SAAO,KAAK,UAAU,WAAW,CAAC;AAC/C,QAAOC,OAAK,MAAM,OAAO,iBAAiB,KAAK,CAAC;;AAEpD,eAAsB,0BAA0B,KAAK,iBAAiB;AAClE,qBAAoB;CACpB,MAAM,aAAa,MAAM,uBAAuB,KAAK,gBAAgB;AACrE,QAAO,4CAA4C,gBAAgB,MAAM,GAAG,CAAC,GAAG;;;;AC/DpF,eAAsB,YAAY,iBAAiB,OAAO;CACtD,MAAM,aAAa;EACf,GAAG;EACH,GAAG,OAAO;EACb;AACD,KAAI,CAAC,SAAS,WAAW,IAAI,CACzB,OAAM,IAAI,WAAW,gEAA8D;CAEvF,MAAM,MAAM,MAAM,UAAU;EAAE,GAAG,WAAW;EAAK,KAAK;EAAM,EAAE,WAAW,IAAI;AAC7E,KAAI,eAAe,cAAc,IAAI,SAAS,SAC1C,OAAM,IAAI,WAAW,+DAA6D;AAEtF,QAAO;;;;ACZX,SAAS,cAAc,KAAK;AACxB,SAAQ,OAAO,QAAQ,YAAY,IAAI,MAAM,GAAG,EAAE,EAAlD;EACI,KAAK;EACL,KAAK,KACD,QAAO;EACX,KAAK,KACD,QAAO;EACX,KAAK,KACD,QAAO;EACX,KAAK,KACD,QAAO;EACX,QACI,OAAM,IAAI,iBAAiB,mDAAiD;;;AAGxF,SAAS,WAAW,MAAM;AACtB,QAAQ,QACJ,OAAO,SAAS,YAChB,MAAM,QAAQ,KAAK,KAAK,IACxB,KAAK,KAAK,MAAM,UAAU;;AAElC,SAAS,UAAU,KAAK;AACpB,QAAO,SAAS,IAAI;;AAExB,IAAM,cAAN,MAAkB;CACd;CACA,0BAAU,IAAI,SAAS;CACvB,YAAY,MAAM;AACd,MAAI,CAAC,WAAW,KAAK,CACjB,OAAM,IAAI,YAAY,6BAA6B;AAEvD,QAAA,OAAa,gBAAgB,KAAK;;CAEtC,OAAO;AACH,SAAO,MAAA;;CAEX,MAAM,OAAO,iBAAiB,OAAO;EACjC,MAAM,EAAE,KAAK,QAAQ;GAAE,GAAG;GAAiB,GAAG,OAAO;GAAQ;EAC7D,MAAM,MAAM,cAAc,IAAI;EAC9B,MAAM,aAAa,MAAA,KAAW,KAAK,QAAQ,QAAQ;GAC/C,IAAI,YAAY,QAAQ,IAAI;AAC5B,OAAI,aAAa,OAAO,QAAQ,SAC5B,aAAY,QAAQ,IAAI;AAE5B,OAAI,cAAc,OAAO,IAAI,QAAQ,YAAY,QAAQ,OACrD,aAAY,QAAQ,IAAI;AAE5B,OAAI,aAAa,OAAO,IAAI,QAAQ,SAChC,aAAY,IAAI,QAAQ;AAE5B,OAAI,aAAa,MAAM,QAAQ,IAAI,QAAQ,CACvC,aAAY,IAAI,QAAQ,SAAS,SAAS;AAE9C,OAAI,UACA,SAAQ,KAAR;IACI,KAAK;AACD,iBAAY,IAAI,QAAQ;AACxB;IACJ,KAAK;AACD,iBAAY,IAAI,QAAQ;AACxB;IACJ,KAAK;AACD,iBAAY,IAAI,QAAQ;AACxB;IACJ,KAAK;IACL,KAAK;AACD,iBAAY,IAAI,QAAQ;AACxB;;AAGZ,UAAO;IACT;EACF,MAAM,EAAE,GAAG,KAAK,WAAW;AAC3B,MAAI,WAAW,EACX,OAAM,IAAI,mBAAmB;AAEjC,MAAI,WAAW,GAAG;GACd,MAAM,QAAQ,IAAI,0BAA0B;GAC5C,MAAM,UAAU,MAAA;AAChB,SAAM,OAAO,iBAAiB,mBAAmB;AAC7C,SAAK,MAAM,OAAO,WACd,KAAI;AACA,WAAM,MAAM,mBAAmB,SAAS,KAAK,IAAI;YAE/C;;AAGd,SAAM;;AAEV,SAAO,mBAAmB,MAAA,QAAc,KAAK,IAAI;;;AAGzD,eAAe,mBAAmB,OAAO,KAAK,KAAK;CAC/C,MAAM,SAAS,MAAM,IAAI,IAAI,IAAI,MAAM,IAAI,KAAK,EAAE,CAAC,CAAC,IAAI,IAAI;AAC5D,KAAI,OAAO,SAAS,KAAA,GAAW;EAC3B,MAAM,MAAM,MAAM,UAAU;GAAE,GAAG;GAAK,KAAK;GAAM,EAAE,IAAI;AACvD,MAAI,eAAe,cAAc,IAAI,SAAS,SAC1C,OAAM,IAAI,YAAY,+CAA+C;AAEzE,SAAO,OAAO;;AAElB,QAAO,OAAO;;AAElB,SAAgB,kBAAkB,MAAM;CACpC,MAAM,MAAM,IAAI,YAAY,KAAK;CACjC,MAAM,cAAc,OAAO,iBAAiB,UAAU,IAAI,OAAO,iBAAiB,MAAM;AACxF,QAAO,iBAAiB,aAAa,EACjC,MAAM;EACF,aAAa,gBAAgB,IAAI,MAAM,CAAC;EACxC,YAAY;EACZ,cAAc;EACd,UAAU;EACb,EACJ,CAAC;AACF,QAAO;;;;AClHX,SAAS,sBAAsB;AAC3B,QAAQ,OAAO,kBAAkB,eAC5B,OAAO,cAAc,eAAe,UAAU,cAAc,wBAC5D,OAAO,gBAAgB,eAAe,gBAAgB;;AAE/D,IAAI;AACJ,IAAI,OAAO,cAAc,eAAe,CAAC,UAAU,WAAW,aAAa,eAAe,CAGtF,cAAa;AAEjB,MAAa,cAAc,QAAQ;AACnC,eAAe,UAAU,KAAK,SAAS,QAAQ,YAAY,OAAO;CAC9D,MAAM,WAAW,MAAM,UAAU,KAAK;EAClC,QAAQ;EACR;EACA,UAAU;EACV;EACH,CAAC,CAAC,OAAO,QAAQ;AACd,MAAI,IAAI,SAAS,eACb,OAAM,IAAI,aAAa;AAE3B,QAAM;GACR;AACF,KAAI,SAAS,WAAW,IACpB,OAAM,IAAI,UAAU,0DAA0D;AAElF,KAAI;AACA,SAAO,MAAM,SAAS,MAAM;SAE1B;AACF,QAAM,IAAI,UAAU,6DAA6D;;;AAGzF,MAAa,YAAY,QAAQ;AACjC,SAAS,iBAAiB,OAAO,aAAa;AAC1C,KAAI,OAAO,UAAU,YAAY,UAAU,KACvC,QAAO;AAEX,KAAI,EAAE,SAAS,UAAU,OAAO,MAAM,QAAQ,YAAY,KAAK,KAAK,GAAG,MAAM,OAAO,YAChF,QAAO;AAEX,KAAI,EAAE,UAAU,UACZ,CAAC,SAAS,MAAM,KAAK,IACrB,CAAC,MAAM,QAAQ,MAAM,KAAK,KAAK,IAC/B,CAAC,MAAM,UAAU,MAAM,KAAK,MAAM,KAAK,MAAM,SAAS,CACtD,QAAO;AAEX,QAAO;;AAEX,IAAM,eAAN,MAAmB;CACf;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA,YAAY,KAAK,SAAS;AACtB,MAAI,EAAE,eAAe,KACjB,OAAM,IAAI,UAAU,iCAAiC;AAEzD,QAAA,MAAY,IAAI,IAAI,IAAI,KAAK;AAC7B,QAAA,kBACI,OAAO,SAAS,oBAAoB,WAAW,SAAS,kBAAkB;AAC9E,QAAA,mBACI,OAAO,SAAS,qBAAqB,WAAW,SAAS,mBAAmB;AAChF,QAAA,cAAoB,OAAO,SAAS,gBAAgB,WAAW,SAAS,cAAc;AACtF,QAAA,UAAgB,IAAI,QAAQ,SAAS,QAAQ;AAC7C,MAAI,cAAc,CAAC,MAAA,QAAc,IAAI,aAAa,CAC9C,OAAA,QAAc,IAAI,cAAc,WAAW;AAE/C,MAAI,CAAC,MAAA,QAAc,IAAI,SAAS,EAAE;AAC9B,SAAA,QAAc,IAAI,UAAU,mBAAmB;AAC/C,SAAA,QAAc,OAAO,UAAU,2BAA2B;;AAE9D,QAAA,cAAoB,UAAU;AAC9B,MAAI,UAAU,eAAe,KAAA,GAAW;AACpC,SAAA,QAAc,UAAU;AACxB,OAAI,iBAAiB,UAAU,YAAY,MAAA,YAAkB,EAAE;AAC3D,UAAA,gBAAsB,MAAA,MAAY;AAClC,UAAA,QAAc,kBAAkB,MAAA,MAAY,KAAK;;;;CAI7D,eAAe;AACX,SAAO,CAAC,CAAC,MAAA;;CAEb,cAAc;AACV,SAAO,OAAO,MAAA,kBAAwB,WAChC,KAAK,KAAK,GAAG,MAAA,gBAAsB,MAAA,mBACnC;;CAEV,QAAQ;AACJ,SAAO,OAAO,MAAA,kBAAwB,WAChC,KAAK,KAAK,GAAG,MAAA,gBAAsB,MAAA,cACnC;;CAEV,OAAO;AACH,SAAO,MAAA,OAAa,MAAM;;CAE9B,MAAM,OAAO,iBAAiB,OAAO;AACjC,MAAI,CAAC,MAAA,SAAe,CAAC,KAAK,OAAO,CAC7B,OAAM,KAAK,QAAQ;AAEvB,MAAI;AACA,UAAO,MAAM,MAAA,MAAY,iBAAiB,MAAM;WAE7C,KAAK;AACR,OAAI,eAAe;QACX,KAAK,aAAa,KAAK,OAAO;AAC9B,WAAM,KAAK,QAAQ;AACnB,YAAO,MAAA,MAAY,iBAAiB,MAAM;;;AAGlD,SAAM;;;CAGd,MAAM,SAAS;AACX,MAAI,MAAA,gBAAsB,qBAAqB,CAC3C,OAAA,eAAqB,KAAA;AAEzB,QAAA,iBAAuB,UAAU,MAAA,IAAU,MAAM,MAAA,SAAe,YAAY,QAAQ,MAAA,gBAAsB,EAAE,MAAA,YAAkB,CACzH,MAAM,SAAS;AAChB,SAAA,QAAc,kBAAkB,KAAK;AACrC,OAAI,MAAA,OAAa;AACb,UAAA,MAAY,MAAM,KAAK,KAAK;AAC5B,UAAA,MAAY,OAAO;;AAEvB,SAAA,gBAAsB,KAAK,KAAK;AAChC,SAAA,eAAqB,KAAA;IACvB,CACG,OAAO,QAAQ;AAChB,SAAA,eAAqB,KAAA;AACrB,SAAM;IACR;AACF,QAAM,MAAA;;;AAGd,SAAgB,mBAAmB,KAAK,SAAS;CAC7C,MAAM,MAAM,IAAI,aAAa,KAAK,QAAQ;CAC1C,MAAM,eAAe,OAAO,iBAAiB,UAAU,IAAI,OAAO,iBAAiB,MAAM;AACzF,QAAO,iBAAiB,cAAc;EAClC,aAAa;GACT,WAAW,IAAI,aAAa;GAC5B,YAAY;GACZ,cAAc;GACjB;EACD,OAAO;GACH,WAAW,IAAI,OAAO;GACtB,YAAY;GACZ,cAAc;GACjB;EACD,QAAQ;GACJ,aAAa,IAAI,QAAQ;GACzB,YAAY;GACZ,cAAc;GACd,UAAU;GACb;EACD,WAAW;GACP,WAAW,IAAI,cAAc;GAC7B,YAAY;GACZ,cAAc;GACjB;EACD,MAAM;GACF,aAAa,IAAI,MAAM;GACvB,YAAY;GACZ,cAAc;GACd,UAAU;GACb;EACJ,CAAC;AACF,QAAO;;;;AC7KX,IAAa,eAAb,MAA0B;CACtB;CACA,YAAY,UAAU,EAAE,EAAE;AACtB,QAAA,MAAY,IAAI,iBAAiB,QAAQ;;CAE7C,SAAS;AAGL,SAAO,GAFQc,OAAY,KAAK,UAAU,EAAE,KAAK,QAAQ,CAAC,CAAC,CAE1C,GADDA,OAAY,MAAA,IAAU,MAAM,CAAC,CACjB;;CAEhC,UAAU,QAAQ;AACd,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,WAAW,SAAS;AAChB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,YAAY,UAAU;AAClB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,OAAO,OAAO;AACV,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,aAAa,OAAO;AAChB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,kBAAkB,OAAO;AACrB,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,YAAY,OAAO;AACf,QAAA,IAAU,MAAM;AAChB,SAAO;;CAEX,OAAO,OAAO,KAAK,SAAS;AACxB,MAAI,OAAO,QAAQ,SACf,OAAM,IAAI,WAAW,iCAAiC;EAE1D,MAAM,EAAE,GAAG,eAAe,GAAG,gBAAgB,GAAG,WAAW,WAAW,IAAI,MAAM,IAAI;AACpF,MAAI,WAAW,KAAK,cAAc,GAC9B,OAAM,IAAI,WAAW,wBAAwB;EAEjD,IAAI;AACJ,MAAI;AACA,YAAS,KAAK,MAAM,QAAQ,OAAOC,OAAY,cAAc,CAAC,CAAC;AAC/D,OAAI,OAAO,QAAQ,OACf,OAAM,IAAI,OAAO;UAEnB;AACF,SAAM,IAAI,WAAW,wBAAwB;;AAGjD,SAAO;GAAE,SADO,kBAAkB,QAAQA,OAAY,eAAe,EAAE,QAAQ;GAC7D;GAAQ;;;;;ACzDlC,SAAgB,sBAAsB,OAAO;CACzC,IAAI;AACJ,KAAI,OAAO,UAAU,UAAU;EAC3B,MAAM,QAAQ,MAAM,MAAM,IAAI;AAC9B,MAAI,MAAM,WAAW,KAAK,MAAM,WAAW,EAEvC,EAAC,iBAAiB;YAGjB,OAAO,UAAU,YAAY,MAClC,KAAI,eAAe,MACf,iBAAgB,MAAM;KAGtB,OAAM,IAAI,UAAU,4CAA4C;AAGxE,KAAI;AACA,MAAI,OAAO,kBAAkB,YAAY,CAAC,cACtC,OAAM,IAAI,OAAO;EAErB,MAAM,SAAS,KAAK,MAAM,QAAQ,OAAOC,OAAK,cAAc,CAAC,CAAC;AAC9D,MAAI,CAAC,SAAS,OAAO,CACjB,OAAM,IAAI,OAAO;AAErB,SAAO;SAEL;AACF,QAAM,IAAI,UAAU,+CAA+C;;;;;AC3B3E,SAAgB,UAAU,KAAK;AAC3B,KAAI,OAAO,QAAQ,SACf,OAAM,IAAI,WAAW,gEAAgE;CACzF,MAAM,EAAE,GAAG,SAAS,WAAW,IAAI,MAAM,IAAI;AAC7C,KAAI,WAAW,EACX,OAAM,IAAI,WAAW,2DAA2D;AACpF,KAAI,WAAW,EACX,OAAM,IAAI,WAAW,cAAc;AACvC,KAAI,CAAC,QACD,OAAM,IAAI,WAAW,8BAA8B;CACvD,IAAI;AACJ,KAAI;AACA,YAAUC,OAAK,QAAQ;SAErB;AACF,QAAM,IAAI,WAAW,yCAAyC;;CAElE,IAAI;AACJ,KAAI;AACA,WAAS,KAAK,MAAM,QAAQ,OAAO,QAAQ,CAAC;SAE1C;AACF,QAAM,IAAI,WAAW,8CAA8C;;AAEvE,KAAI,CAAC,SAAS,OAAO,CACjB,OAAM,IAAI,WAAW,yBAAyB;AAClD,QAAO;;;;AC7BX,SAAS,uBAAuB,SAAS;CACrC,MAAM,gBAAgB,SAAS,iBAAiB;AAChD,KAAI,OAAO,kBAAkB,YAAY,gBAAgB,KACrD,OAAM,IAAI,iBAAiB,8FAA8F;AAE7H,QAAO;;AAEX,eAAsB,gBAAgB,KAAK,SAAS;CAChD,IAAI;CACJ,IAAI;AACJ,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK;AACD,eAAY;IACR,MAAM;IACN,MAAM,OAAO,IAAI,MAAM,GAAG;IAC1B,gBAAgB,WAAW,GAAG,GAAM,GAAM,EAAK;IAC/C,eAAe,uBAAuB,QAAQ;IACjD;AACD,eAAY,CAAC,QAAQ,SAAS;AAC9B;EACJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,eAAY;IACR,MAAM;IACN,MAAM,OAAO,IAAI,MAAM,GAAG;IAC1B,gBAAgB,WAAW,GAAG,GAAM,GAAM,EAAK;IAC/C,eAAe,uBAAuB,QAAQ;IACjD;AACD,eAAY,CAAC,QAAQ,SAAS;AAC9B;EACJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,eAAY;IACR,MAAM;IACN,MAAM,OAAO,SAAS,IAAI,MAAM,GAAG,EAAE,GAAG,IAAI;IAC5C,gBAAgB,WAAW,GAAG,GAAM,GAAM,EAAK;IAC/C,eAAe,uBAAuB,QAAQ;IACjD;AACD,eAAY;IAAC;IAAW;IAAa;IAAW;IAAU;AAC1D;EACJ,KAAK;AACD,eAAY;IAAE,MAAM;IAAS,YAAY;IAAS;AAClD,eAAY,CAAC,QAAQ,SAAS;AAC9B;EACJ,KAAK;AACD,eAAY;IAAE,MAAM;IAAS,YAAY;IAAS;AAClD,eAAY,CAAC,QAAQ,SAAS;AAC9B;EACJ,KAAK;AACD,eAAY;IAAE,MAAM;IAAS,YAAY;IAAS;AAClD,eAAY,CAAC,QAAQ,SAAS;AAC9B;EACJ,KAAK;EACL,KAAK;AACD,eAAY,CAAC,QAAQ,SAAS;AAC9B,eAAY,EAAE,MAAM,WAAW;AAC/B;EAEJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,eAAY,CAAC,QAAQ,SAAS;AAC9B,eAAY,EAAE,MAAM,KAAK;AACzB;EAEJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK,kBAAkB;AACnB,eAAY,CAAC,aAAa;GAC1B,MAAM,MAAM,SAAS,OAAO;AAC5B,WAAQ,KAAR;IACI,KAAK;IACL,KAAK;IACL,KAAK;AACD,iBAAY;MAAE,MAAM;MAAQ,YAAY;MAAK;AAC7C;IAEJ,KAAK;AACD,iBAAY,EAAE,MAAM,UAAU;AAC9B;IACJ,QACI,OAAM,IAAI,iBAAiB,mGAAmG;;AAEtI;;EAEJ,QACI,OAAM,IAAI,iBAAiB,iEAA+D;;AAElG,QAAO,OAAO,OAAO,YAAY,WAAW,SAAS,eAAe,OAAO,UAAU;;;;AC9FzF,eAAsB,eAAe,KAAK,SAAS;CAC/C,IAAI;CACJ,IAAI;CACJ,IAAI;AACJ,SAAQ,KAAR;EACI,KAAK;EACL,KAAK;EACL,KAAK;AACD,YAAS,SAAS,IAAI,MAAM,GAAG,EAAE,GAAG;AACpC,eAAY;IAAE,MAAM;IAAQ,MAAM,OAAO;IAAU;IAAQ;AAC3D,eAAY,CAAC,QAAQ,SAAS;AAC9B;EACJ,KAAK;EACL,KAAK;EACL,KAAK;AACD,YAAS,SAAS,IAAI,MAAM,GAAG,EAAE,GAAG;AACpC,UAAO,OAAO,gBAAgB,IAAI,WAAW,UAAU,EAAE,CAAC;EAC9D,KAAK;EACL,KAAK;EACL,KAAK;AACD,YAAS,SAAS,IAAI,MAAM,GAAG,EAAE,EAAE,GAAG;AACtC,eAAY;IAAE,MAAM;IAAU;IAAQ;AACtC,eAAY,CAAC,WAAW,YAAY;AACpC;EACJ,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;EACL,KAAK;AACD,YAAS,SAAS,IAAI,MAAM,GAAG,EAAE,EAAE,GAAG;AACtC,eAAY;IAAE,MAAM;IAAW;IAAQ;AACvC,eAAY,CAAC,WAAW,UAAU;AAClC;EACJ,QACI,OAAM,IAAI,iBAAiB,iEAA+D;;AAElG,QAAO,OAAO,OAAO,YAAY,WAAW,SAAS,eAAe,OAAO,UAAU;;;;ACPzF,MAAa,gBAAgB"}