@zintrust/core 0.4.30 → 0.4.32

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/README.md +15 -0
  2. package/package.json +5 -1
  3. package/src/boot.d.ts +3 -0
  4. package/src/boot.d.ts.map +1 -0
  5. package/src/boot.js +1 -0
  6. package/src/cli/commands/D1ProxyCommand.d.ts.map +1 -1
  7. package/src/cli/commands/D1ProxyCommand.js +24 -159
  8. package/src/cli/commands/KvProxyCommand.d.ts.map +1 -1
  9. package/src/cli/commands/KvProxyCommand.js +23 -155
  10. package/src/cli/commands/ProxyScaffoldUtils.d.ts +31 -0
  11. package/src/cli/commands/ProxyScaffoldUtils.d.ts.map +1 -0
  12. package/src/cli/commands/ProxyScaffoldUtils.js +120 -0
  13. package/src/cli/commands/WranglerProxyCommandUtils.d.ts +26 -0
  14. package/src/cli/commands/WranglerProxyCommandUtils.d.ts.map +1 -0
  15. package/src/cli/commands/WranglerProxyCommandUtils.js +63 -0
  16. package/src/cli/scaffolding/GovernanceScaffolder.d.ts.map +1 -1
  17. package/src/cli/scaffolding/GovernanceScaffolder.js +3 -40
  18. package/src/cli/scaffolding/ProjectScaffolder.d.ts.map +1 -1
  19. package/src/cli/scaffolding/ProjectScaffolder.js +1 -34
  20. package/src/cli/scaffolding/ScaffoldingVersionUtils.d.ts +6 -0
  21. package/src/cli/scaffolding/ScaffoldingVersionUtils.d.ts.map +1 -0
  22. package/src/cli/scaffolding/ScaffoldingVersionUtils.js +34 -0
  23. package/src/index.js +3 -3
  24. package/src/proxy/d1/ZintrustD1Proxy.d.ts +46 -1
  25. package/src/proxy/d1/ZintrustD1Proxy.d.ts.map +1 -1
  26. package/src/proxy/d1/ZintrustD1Proxy.js +356 -31
  27. package/src/proxy/kv/ZintrustKvProxy.d.ts +42 -1
  28. package/src/proxy/kv/ZintrustKvProxy.d.ts.map +1 -1
  29. package/src/proxy/kv/ZintrustKvProxy.js +297 -34
  30. package/src/templates/project/basic/src/boot/bootstrap.ts.tpl +3 -0
@@ -1,39 +1,364 @@
1
- import { isUndefinedOrNull } from '../../helper/index.js';
2
1
  import { Logger } from '../../config/logger.js';
3
- let cached = null;
4
- const load = async () => {
5
- if (cached !== null)
6
- return cached;
2
+ import { isArray, isObject, isString } from '../../helper/index.js';
3
+ import { ErrorHandler } from '../ErrorHandler.js';
4
+ import { RequestValidator } from '../RequestValidator.js';
5
+ import { SigningService } from '../SigningService.js';
6
+ const DEFAULT_SIGNING_WINDOW_MS = 60_000;
7
+ const DEFAULT_MAX_BODY_BYTES = 128 * 1024;
8
+ const DEFAULT_MAX_SQL_BYTES = 32 * 1024;
9
+ const DEFAULT_MAX_PARAMS = 256;
10
+ const json = (status, body) => new Response(JSON.stringify(body), {
11
+ status,
12
+ headers: {
13
+ 'Content-Type': 'application/json; charset=utf-8',
14
+ 'Cache-Control': 'no-store',
15
+ },
16
+ });
17
+ const toErrorResponse = (status, code, message) => {
18
+ const error = ErrorHandler.toProxyError(status, code, message);
19
+ return json(error.status, error.body);
20
+ };
21
+ const getEnvInt = (env, name, fallback) => {
22
+ const raw = env[name];
23
+ if (!isString(raw))
24
+ return fallback;
25
+ const parsed = Number.parseInt(raw, 10);
26
+ return Number.isFinite(parsed) ? parsed : fallback;
27
+ };
28
+ const isDebugEnabled = (env) => {
29
+ const raw = env.ZT_PROXY_DEBUG;
30
+ if (!isString(raw))
31
+ return false;
32
+ const normalized = raw.trim().toLowerCase();
33
+ return normalized === 'true' || normalized === '1' || normalized === 'yes';
34
+ };
35
+ const safeErrorMessage = (error) => {
36
+ if (error instanceof Error)
37
+ return error.message;
38
+ if (isString(error))
39
+ return error;
40
+ try {
41
+ return JSON.stringify(error);
42
+ }
43
+ catch {
44
+ return 'Unknown D1 error';
45
+ }
46
+ };
47
+ const logProxyError = (env, context, error) => {
48
+ if (!isDebugEnabled(env))
49
+ return;
50
+ Logger.error('[ZintrustD1Proxy] error', {
51
+ ...context,
52
+ message: safeErrorMessage(error).slice(0, 800),
53
+ });
54
+ };
55
+ const normalizeBindingName = (value) => {
56
+ if (!isString(value))
57
+ return null;
58
+ const trimmed = value.trim();
59
+ return trimmed === '' ? null : trimmed;
60
+ };
61
+ const resolveD1Binding = (env) => {
62
+ const candidates = ['DB', 'zintrust_db', normalizeBindingName(env.D1_BINDING)].filter((value, index, values) => isString(value) && value.trim() !== '' && values.indexOf(value) === index);
63
+ const record = env;
64
+ for (const name of candidates) {
65
+ const binding = record[name];
66
+ if (binding !== undefined && binding !== null && typeof binding.prepare === 'function') {
67
+ return binding;
68
+ }
69
+ }
70
+ return null;
71
+ };
72
+ const readBodyBytes = async (request, maxBytes) => {
73
+ const buf = await request.arrayBuffer();
74
+ if (buf.byteLength > maxBytes) {
75
+ return {
76
+ ok: false,
77
+ response: toErrorResponse(413, 'PAYLOAD_TOO_LARGE', 'Body too large'),
78
+ };
79
+ }
80
+ const bytes = new Uint8Array(buf);
81
+ const text = new TextDecoder().decode(bytes);
82
+ return { ok: true, bytes, text };
83
+ };
84
+ const parseOptionalJson = (text) => {
85
+ if (text.trim() === '')
86
+ return { ok: true, payload: null };
87
+ const parsed = RequestValidator.parseJson(text);
88
+ if (!parsed.ok) {
89
+ let message = parsed.error.message;
90
+ if (parsed.error.code === 'INVALID_JSON') {
91
+ message = 'Invalid JSON body';
92
+ }
93
+ else if (parsed.error.code === 'VALIDATION_ERROR') {
94
+ message = 'Invalid body';
95
+ }
96
+ return { ok: false, response: toErrorResponse(400, parsed.error.code, message) };
97
+ }
98
+ return { ok: true, payload: parsed.value };
99
+ };
100
+ const loadSigningSecret = (env) => {
101
+ const direct = isString(env.D1_REMOTE_SECRET) ? env.D1_REMOTE_SECRET.trim() : '';
102
+ if (direct !== '')
103
+ return direct;
104
+ const fallback = isString(env.APP_KEY) ? env.APP_KEY.trim() : '';
105
+ if (fallback !== '')
106
+ return fallback;
107
+ return null;
108
+ };
109
+ const loadStatements = (env) => {
110
+ const raw = env.ZT_D1_STATEMENTS_JSON;
111
+ if (!isString(raw) || raw.trim() === '')
112
+ return null;
7
113
  try {
8
- // Non-literal specifier to avoid tsconfig path alias rewriting in dist builds.
9
- const pkgName = '@zintrust/cloudflare-d1-proxy';
10
- cached = (await import(pkgName));
11
- return cached;
114
+ const parsed = JSON.parse(raw);
115
+ if (!isObject(parsed))
116
+ return null;
117
+ return parsed;
118
+ }
119
+ catch {
120
+ return null;
121
+ }
122
+ };
123
+ const isMutatingSql = (sql) => {
124
+ const normalized = sql.trimStart().toLowerCase();
125
+ return (normalized.startsWith('insert') ||
126
+ normalized.startsWith('update') ||
127
+ normalized.startsWith('delete') ||
128
+ normalized.startsWith('create') ||
129
+ normalized.startsWith('drop') ||
130
+ normalized.startsWith('alter') ||
131
+ normalized.startsWith('replace'));
132
+ };
133
+ const verifyNonceKv = async (kv, keyId, nonce, ttlMs) => {
134
+ const ttlSeconds = Math.max(1, Math.ceil(ttlMs / 1000));
135
+ const storageKey = `nonce:${keyId}:${nonce}`;
136
+ const existing = await kv.get(storageKey);
137
+ if (existing !== null)
138
+ return false;
139
+ await kv.put(storageKey, '1', { expirationTtl: ttlSeconds });
140
+ return true;
141
+ };
142
+ const verifySignedRequest = async (request, env, bodyBytes) => {
143
+ const secret = loadSigningSecret(env);
144
+ if (secret === null) {
145
+ return toErrorResponse(401, 'CONFIG_ERROR', 'Missing signing secret (D1_REMOTE_SECRET or APP_KEY)');
146
+ }
147
+ const windowMs = getEnvInt(env, 'ZT_PROXY_SIGNING_WINDOW_MS', DEFAULT_SIGNING_WINDOW_MS);
148
+ const verifyResult = await SigningService.verifyWithKeyProvider({
149
+ method: request.method,
150
+ url: request.url,
151
+ body: bodyBytes,
152
+ headers: request.headers,
153
+ windowMs,
154
+ getSecretForKeyId: (_keyId) => secret,
155
+ verifyNonce: env.ZT_NONCES === undefined
156
+ ? undefined
157
+ : async (keyId, nonce, ttlMs) => verifyNonceKv(env.ZT_NONCES, keyId, nonce, ttlMs),
158
+ });
159
+ if (!verifyResult.ok) {
160
+ return toErrorResponse(verifyResult.status, verifyResult.code, verifyResult.message);
161
+ }
162
+ return { ok: true };
163
+ };
164
+ const requireDb = (env) => {
165
+ const db = resolveD1Binding(env);
166
+ if (db === null) {
167
+ return toErrorResponse(400, 'CONFIG_ERROR', 'Missing D1 binding (DB) or binding name via D1_BINDING');
168
+ }
169
+ return db;
170
+ };
171
+ const toD1ExceptionResponse = (error) => {
172
+ const message = safeErrorMessage(error);
173
+ return toErrorResponse(500, 'D1_ERROR', message);
174
+ };
175
+ const parseSqlPayload = (payload) => {
176
+ if (!isObject(payload)) {
177
+ return { ok: false, response: toErrorResponse(400, 'VALIDATION_ERROR', 'Invalid body') };
178
+ }
179
+ const sql = payload['sql'];
180
+ const params = payload['params'];
181
+ if (!isString(sql)) {
182
+ return {
183
+ ok: false,
184
+ response: toErrorResponse(400, 'VALIDATION_ERROR', 'sql must be a string'),
185
+ };
186
+ }
187
+ return { ok: true, sql, params: isArray(params) ? params : [] };
188
+ };
189
+ const enforceSqlLimits = (env, sql, params) => {
190
+ const maxSqlBytes = getEnvInt(env, 'ZT_MAX_SQL_BYTES', DEFAULT_MAX_SQL_BYTES);
191
+ const maxParams = getEnvInt(env, 'ZT_MAX_PARAMS', DEFAULT_MAX_PARAMS);
192
+ if (new TextEncoder().encode(sql).byteLength > maxSqlBytes) {
193
+ return toErrorResponse(413, 'PAYLOAD_TOO_LARGE', 'SQL too large');
194
+ }
195
+ if (params.length > maxParams) {
196
+ return toErrorResponse(400, 'VALIDATION_ERROR', 'Too many params');
197
+ }
198
+ return null;
199
+ };
200
+ const readAndVerifyJson = async (request, env) => {
201
+ const maxBodyBytes = getEnvInt(env, 'ZT_MAX_BODY_BYTES', DEFAULT_MAX_BODY_BYTES);
202
+ const bodyResult = await readBodyBytes(request, maxBodyBytes);
203
+ if (!bodyResult.ok)
204
+ return { ok: false, response: bodyResult.response };
205
+ const auth = await verifySignedRequest(request, env, bodyResult.bytes);
206
+ if (auth instanceof Response)
207
+ return { ok: false, response: auth };
208
+ const parsed = parseOptionalJson(bodyResult.text);
209
+ if (!parsed.ok)
210
+ return { ok: false, response: parsed.response };
211
+ return { ok: true, payload: parsed.payload, bodyBytes: bodyResult.bytes };
212
+ };
213
+ const handleQuery = async (request, env) => {
214
+ try {
215
+ const check = await readAndVerifyJson(request, env);
216
+ if (!check.ok)
217
+ return check.response;
218
+ const db = requireDb(env);
219
+ if (db instanceof Response)
220
+ return db;
221
+ const parsed = parseSqlPayload(check.payload);
222
+ if (!parsed.ok)
223
+ return parsed.response;
224
+ const limit = enforceSqlLimits(env, parsed.sql, parsed.params);
225
+ if (limit !== null)
226
+ return limit;
227
+ const result = await db
228
+ .prepare(parsed.sql)
229
+ .bind(...parsed.params)
230
+ .all();
231
+ const rows = result.results ?? [];
232
+ return json(200, { rows, rowCount: rows.length });
12
233
  }
13
234
  catch (error) {
14
- Logger.error(`Optional dependency not installed: @zintrust/cloudflare-d1-proxy. Install it to use ZintrustD1Proxy.`, { error: error instanceof Error ? error.message : String(error) });
15
- }
16
- return undefined;
17
- };
18
- // Proxy surface that defers loading until first usage.
19
- export const ZintrustD1Proxy = new Proxy({}, {
20
- get(_target, prop) {
21
- if (prop === Symbol.toStringTag)
22
- return 'ZintrustD1Proxy';
23
- return async (...args) => {
24
- const mod = await load();
25
- if (isUndefinedOrNull(mod) || typeof mod !== 'object')
26
- return undefined;
27
- const target = mod.ZintrustD1Proxy ?? mod.default;
28
- if (!target || typeof target !== 'object') {
29
- Logger.error(`Invalid module export from @zintrust/cloudflare-d1-proxy: missing ZintrustD1Proxy`);
30
- return undefined;
31
- }
32
- const value = target[prop];
33
- if (typeof value !== 'function')
34
- return value;
35
- return value(...args);
235
+ logProxyError(env, { op: 'query', path: '/zin/d1/query' }, error);
236
+ return toD1ExceptionResponse(error);
237
+ }
238
+ };
239
+ const handleQueryOne = async (request, env) => {
240
+ try {
241
+ const check = await readAndVerifyJson(request, env);
242
+ if (!check.ok)
243
+ return check.response;
244
+ const db = requireDb(env);
245
+ if (db instanceof Response)
246
+ return db;
247
+ const parsed = parseSqlPayload(check.payload);
248
+ if (!parsed.ok)
249
+ return parsed.response;
250
+ const limit = enforceSqlLimits(env, parsed.sql, parsed.params);
251
+ if (limit !== null)
252
+ return limit;
253
+ const row = await db
254
+ .prepare(parsed.sql)
255
+ .bind(...parsed.params)
256
+ .first();
257
+ return json(200, { row: row ?? null });
258
+ }
259
+ catch (error) {
260
+ logProxyError(env, { op: 'queryOne', path: '/zin/d1/queryOne' }, error);
261
+ return toD1ExceptionResponse(error);
262
+ }
263
+ };
264
+ const handleExec = async (request, env) => {
265
+ try {
266
+ const check = await readAndVerifyJson(request, env);
267
+ if (!check.ok)
268
+ return check.response;
269
+ const db = requireDb(env);
270
+ if (db instanceof Response)
271
+ return db;
272
+ const parsed = parseSqlPayload(check.payload);
273
+ if (!parsed.ok)
274
+ return parsed.response;
275
+ const limit = enforceSqlLimits(env, parsed.sql, parsed.params);
276
+ if (limit !== null)
277
+ return limit;
278
+ const out = await db
279
+ .prepare(parsed.sql)
280
+ .bind(...parsed.params)
281
+ .run();
282
+ return json(200, { ok: true, meta: out.meta });
283
+ }
284
+ catch (error) {
285
+ logProxyError(env, { op: 'exec', path: '/zin/d1/exec' }, error);
286
+ return toD1ExceptionResponse(error);
287
+ }
288
+ };
289
+ const parseStatementPayload = (payload) => {
290
+ if (!isObject(payload)) {
291
+ return { ok: false, response: toErrorResponse(400, 'VALIDATION_ERROR', 'Invalid body') };
292
+ }
293
+ const statementId = payload['statementId'];
294
+ const params = payload['params'];
295
+ if (!isString(statementId) || statementId.trim() === '') {
296
+ return {
297
+ ok: false,
298
+ response: toErrorResponse(400, 'VALIDATION_ERROR', 'statementId must be a string'),
36
299
  };
300
+ }
301
+ return { ok: true, statementId, params: isArray(params) ? params : [] };
302
+ };
303
+ const handleStatement = async (request, env) => {
304
+ try {
305
+ const check = await readAndVerifyJson(request, env);
306
+ if (!check.ok)
307
+ return check.response;
308
+ const db = requireDb(env);
309
+ if (db instanceof Response)
310
+ return db;
311
+ const statements = loadStatements(env);
312
+ if (statements === null) {
313
+ return toErrorResponse(400, 'CONFIG_ERROR', 'Missing or invalid ZT_D1_STATEMENTS_JSON');
314
+ }
315
+ const parsed = parseStatementPayload(check.payload);
316
+ if (!parsed.ok)
317
+ return parsed.response;
318
+ const sql = statements[parsed.statementId];
319
+ if (!isString(sql) || sql.trim() === '') {
320
+ return toErrorResponse(404, 'NOT_FOUND', 'Unknown statementId');
321
+ }
322
+ if (isMutatingSql(sql)) {
323
+ const out = await db
324
+ .prepare(sql)
325
+ .bind(...parsed.params)
326
+ .run();
327
+ return json(200, { ok: true, meta: out.meta });
328
+ }
329
+ const out = await db
330
+ .prepare(sql)
331
+ .bind(...parsed.params)
332
+ .all();
333
+ const rows = out.results ?? [];
334
+ return json(200, { rows, rowCount: rows.length });
335
+ }
336
+ catch (error) {
337
+ logProxyError(env, { op: 'statement', path: '/zin/d1/statement' }, error);
338
+ return toD1ExceptionResponse(error);
339
+ }
340
+ };
341
+ export const ZintrustD1Proxy = Object.freeze({
342
+ _ZINTRUST_CLOUDFLARE_D1_PROXY_VERSION: '0.1.15',
343
+ _ZINTRUST_CLOUDFLARE_D1_PROXY_BUILD_DATE: '__BUILD_DATE__',
344
+ async fetch(request, env) {
345
+ const url = new URL(request.url);
346
+ const methodError = RequestValidator.requirePost(request.method);
347
+ if (methodError !== null) {
348
+ return toErrorResponse(405, methodError.code, 'Method not allowed');
349
+ }
350
+ switch (url.pathname) {
351
+ case '/zin/d1/query':
352
+ return handleQuery(request, env);
353
+ case '/zin/d1/queryOne':
354
+ return handleQueryOne(request, env);
355
+ case '/zin/d1/exec':
356
+ return handleExec(request, env);
357
+ case '/zin/d1/statement':
358
+ return handleStatement(request, env);
359
+ default:
360
+ return toErrorResponse(404, 'NOT_FOUND', 'Not found');
361
+ }
37
362
  },
38
363
  });
39
364
  export default ZintrustD1Proxy;
@@ -1,3 +1,44 @@
1
- export declare const ZintrustKvProxy: Record<string, unknown>;
1
+ type KVNamespacePutOptions = {
2
+ expirationTtl?: number;
3
+ };
4
+ type KvGetType = 'text' | 'json' | 'arrayBuffer';
5
+ type KVListResult = {
6
+ keys: Array<{
7
+ name: string;
8
+ }>;
9
+ cursor: string;
10
+ list_complete: boolean;
11
+ };
12
+ type KVNamespace = {
13
+ get: {
14
+ (key: string): Promise<string | null>;
15
+ (key: string, type: 'json'): Promise<Record<string, unknown> | null>;
16
+ (key: string, type: 'arrayBuffer'): Promise<ArrayBuffer | null>;
17
+ (key: string, type: KvGetType): Promise<Record<string, unknown> | ArrayBuffer | string | null>;
18
+ };
19
+ put: (key: string, value: string, options?: KVNamespacePutOptions) => Promise<void>;
20
+ delete: (key: string) => Promise<void>;
21
+ list: (options: {
22
+ prefix?: string;
23
+ limit?: number;
24
+ cursor?: string;
25
+ }) => Promise<KVListResult>;
26
+ };
27
+ type KvEnv = {
28
+ CACHE?: KVNamespace;
29
+ KV_NAMESPACE?: string;
30
+ APP_KEY?: string;
31
+ KV_REMOTE_SECRET?: string;
32
+ ZT_PROXY_SIGNING_WINDOW_MS?: string;
33
+ ZT_NONCES?: KVNamespace;
34
+ ZT_MAX_BODY_BYTES?: string;
35
+ ZT_KV_PREFIX?: string;
36
+ ZT_KV_LIST_LIMIT?: string;
37
+ };
38
+ export declare const ZintrustKvProxy: Readonly<{
39
+ _ZINTRUST_CLOUDFLARE_KV_PROXY_VERSION: "0.1.15";
40
+ _ZINTRUST_CLOUDFLARE_KV_PROXY_BUILD_DATE: "__BUILD_DATE__";
41
+ fetch(request: Request, env: KvEnv): Promise<Response>;
42
+ }>;
2
43
  export default ZintrustKvProxy;
3
44
  //# sourceMappingURL=ZintrustKvProxy.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"ZintrustKvProxy.d.ts","sourceRoot":"","sources":["../../../../src/proxy/kv/ZintrustKvProxy.ts"],"names":[],"mappings":"AA2BA,eAAO,MAAM,eAAe,EAuBZ,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;AAExC,eAAe,eAAe,CAAC"}
1
+ {"version":3,"file":"ZintrustKvProxy.d.ts","sourceRoot":"","sources":["../../../../src/proxy/kv/ZintrustKvProxy.ts"],"names":[],"mappings":"AAKA,KAAK,qBAAqB,GAAG;IAC3B,aAAa,CAAC,EAAE,MAAM,CAAC;CACxB,CAAC;AAEF,KAAK,SAAS,GAAG,MAAM,GAAG,MAAM,GAAG,aAAa,CAAC;AAEjD,KAAK,YAAY,GAAG;IAClB,IAAI,EAAE,KAAK,CAAC;QAAE,IAAI,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IAC9B,MAAM,EAAE,MAAM,CAAC;IACf,aAAa,EAAE,OAAO,CAAC;CACxB,CAAC;AAEF,KAAK,WAAW,GAAG;IACjB,GAAG,EAAE;QACH,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;QACtC,CAAC,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC;QACrE,CAAC,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,aAAa,GAAG,OAAO,CAAC,WAAW,GAAG,IAAI,CAAC,CAAC;QAChE,CAAC,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,WAAW,GAAG,MAAM,GAAG,IAAI,CAAC,CAAC;KAChG,CAAC;IACF,GAAG,EAAE,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,qBAAqB,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACpF,MAAM,EAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,CAAC,IAAI,CAAC,CAAC;IACvC,IAAI,EAAE,CAAC,OAAO,EAAE;QAAE,MAAM,CAAC,EAAE,MAAM,CAAC;QAAC,KAAK,CAAC,EAAE,MAAM,CAAC;QAAC,MAAM,CAAC,EAAE,MAAM,CAAA;KAAE,KAAK,OAAO,CAAC,YAAY,CAAC,CAAC;CAChG,CAAC;AAEF,KAAK,KAAK,GAAG;IACX,KAAK,CAAC,EAAE,WAAW,CAAC;IACpB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,gBAAgB,CAAC,EAAE,MAAM,CAAC;IAC1B,0BAA0B,CAAC,EAAE,MAAM,CAAC;IACpC,SAAS,CAAC,EAAE,WAAW,CAAC;IACxB,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,gBAAgB,CAAC,EAAE,MAAM,CAAC;CAC3B,CAAC;AA0WF,eAAO,MAAM,eAAe;;;mBAGL,OAAO,OAAO,KAAK,GAAG,OAAO,CAAC,QAAQ,CAAC;EAqB5D,CAAC;AAEH,eAAe,eAAe,CAAC"}