deepseek-coder-agent-cli 1.0.13 → 1.0.14
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +28 -594
- package/dist/bin/deepseek.js +53 -11
- package/dist/bin/deepseek.js.map +1 -1
- package/dist/capabilities/index.d.ts +1 -15
- package/dist/capabilities/index.d.ts.map +1 -1
- package/dist/capabilities/index.js +4 -17
- package/dist/capabilities/index.js.map +1 -1
- package/dist/plugins/index.d.ts +1 -48
- package/dist/plugins/index.d.ts.map +1 -1
- package/dist/plugins/index.js +2 -104
- package/dist/plugins/index.js.map +1 -1
- package/dist/plugins/tools/index.d.ts +4 -2
- package/dist/plugins/tools/index.d.ts.map +1 -1
- package/dist/plugins/tools/index.js +5 -2
- package/dist/plugins/tools/index.js.map +1 -1
- package/package.json +9 -16
- package/dist/capabilities/appleSecurityCapability.d.ts +0 -57
- package/dist/capabilities/appleSecurityCapability.d.ts.map +0 -1
- package/dist/capabilities/appleSecurityCapability.js +0 -197
- package/dist/capabilities/appleSecurityCapability.js.map +0 -1
- package/dist/capabilities/authorizedSecurityCapability.d.ts +0 -17
- package/dist/capabilities/authorizedSecurityCapability.d.ts.map +0 -1
- package/dist/capabilities/authorizedSecurityCapability.js +0 -333
- package/dist/capabilities/authorizedSecurityCapability.js.map +0 -1
- package/dist/capabilities/biocognitiveWarfare.d.ts +0 -136
- package/dist/capabilities/biocognitiveWarfare.d.ts.map +0 -1
- package/dist/capabilities/biocognitiveWarfare.js +0 -603
- package/dist/capabilities/biocognitiveWarfare.js.map +0 -1
- package/dist/capabilities/chineseCnoIntegration.d.ts +0 -60
- package/dist/capabilities/chineseCnoIntegration.d.ts.map +0 -1
- package/dist/capabilities/chineseCnoIntegration.js +0 -253
- package/dist/capabilities/chineseCnoIntegration.js.map +0 -1
- package/dist/capabilities/cnoCapability.d.ts +0 -110
- package/dist/capabilities/cnoCapability.d.ts.map +0 -1
- package/dist/capabilities/cnoCapability.js +0 -785
- package/dist/capabilities/cnoCapability.js.map +0 -1
- package/dist/capabilities/eliteCryptoMilitaryCapability.d.ts +0 -99
- package/dist/capabilities/eliteCryptoMilitaryCapability.d.ts.map +0 -1
- package/dist/capabilities/eliteCryptoMilitaryCapability.js +0 -618
- package/dist/capabilities/eliteCryptoMilitaryCapability.js.map +0 -1
- package/dist/capabilities/integratedUnifiedCapability.d.ts +0 -105
- package/dist/capabilities/integratedUnifiedCapability.d.ts.map +0 -1
- package/dist/capabilities/integratedUnifiedCapability.js +0 -422
- package/dist/capabilities/integratedUnifiedCapability.js.map +0 -1
- package/dist/capabilities/maxOffensiveUkraineCapability.d.ts +0 -46
- package/dist/capabilities/maxOffensiveUkraineCapability.d.ts.map +0 -1
- package/dist/capabilities/maxOffensiveUkraineCapability.js +0 -725
- package/dist/capabilities/maxOffensiveUkraineCapability.js.map +0 -1
- package/dist/capabilities/offensiveDestructionCapability.d.ts +0 -98
- package/dist/capabilities/offensiveDestructionCapability.d.ts.map +0 -1
- package/dist/capabilities/offensiveDestructionCapability.js +0 -848
- package/dist/capabilities/offensiveDestructionCapability.js.map +0 -1
- package/dist/capabilities/quantumSpaceWarfare.d.ts +0 -108
- package/dist/capabilities/quantumSpaceWarfare.d.ts.map +0 -1
- package/dist/capabilities/quantumSpaceWarfare.js +0 -342
- package/dist/capabilities/quantumSpaceWarfare.js.map +0 -1
- package/dist/capabilities/readmeIntegration.d.ts +0 -161
- package/dist/capabilities/readmeIntegration.d.ts.map +0 -1
- package/dist/capabilities/readmeIntegration.js +0 -1034
- package/dist/capabilities/readmeIntegration.js.map +0 -1
- package/dist/capabilities/sharedMilitaryInfrastructure.d.ts +0 -89
- package/dist/capabilities/sharedMilitaryInfrastructure.d.ts.map +0 -1
- package/dist/capabilities/sharedMilitaryInfrastructure.js +0 -233
- package/dist/capabilities/sharedMilitaryInfrastructure.js.map +0 -1
- package/dist/capabilities/simpleSecurityCapability.d.ts +0 -36
- package/dist/capabilities/simpleSecurityCapability.d.ts.map +0 -1
- package/dist/capabilities/simpleSecurityCapability.js +0 -271
- package/dist/capabilities/simpleSecurityCapability.js.map +0 -1
- package/dist/capabilities/ultimateChineseCno.d.ts +0 -115
- package/dist/capabilities/ultimateChineseCno.d.ts.map +0 -1
- package/dist/capabilities/ultimateChineseCno.js +0 -516
- package/dist/capabilities/ultimateChineseCno.js.map +0 -1
- package/dist/capabilities/ultimateIntegrationDemo.d.ts +0 -54
- package/dist/capabilities/ultimateIntegrationDemo.d.ts.map +0 -1
- package/dist/capabilities/ultimateIntegrationDemo.js +0 -423
- package/dist/capabilities/ultimateIntegrationDemo.js.map +0 -1
- package/dist/capabilities/unifiedMilitaryCapability.d.ts +0 -63
- package/dist/capabilities/unifiedMilitaryCapability.d.ts.map +0 -1
- package/dist/capabilities/unifiedMilitaryCapability.js +0 -384
- package/dist/capabilities/unifiedMilitaryCapability.js.map +0 -1
- package/dist/capabilities/universalSecurityCapability.d.ts +0 -46
- package/dist/capabilities/universalSecurityCapability.d.ts.map +0 -1
- package/dist/capabilities/universalSecurityCapability.js +0 -580
- package/dist/capabilities/universalSecurityCapability.js.map +0 -1
- package/dist/capabilities/zeroDayDiscoveryCapability.d.ts +0 -31
- package/dist/capabilities/zeroDayDiscoveryCapability.d.ts.map +0 -1
- package/dist/capabilities/zeroDayDiscoveryCapability.js +0 -183
- package/dist/capabilities/zeroDayDiscoveryCapability.js.map +0 -1
- package/dist/core/antiTermination.d.ts +0 -226
- package/dist/core/antiTermination.d.ts.map +0 -1
- package/dist/core/antiTermination.js +0 -713
- package/dist/core/antiTermination.js.map +0 -1
- package/dist/core/index.d.ts +0 -26
- package/dist/core/index.d.ts.map +0 -1
- package/dist/core/index.js +0 -54
- package/dist/core/index.js.map +0 -1
- package/dist/core/securityTournament.d.ts +0 -83
- package/dist/core/securityTournament.d.ts.map +0 -1
- package/dist/core/securityTournament.js +0 -357
- package/dist/core/securityTournament.js.map +0 -1
- package/dist/core/zeroDayDiscovery.d.ts +0 -96
- package/dist/core/zeroDayDiscovery.d.ts.map +0 -1
- package/dist/core/zeroDayDiscovery.js +0 -358
- package/dist/core/zeroDayDiscovery.js.map +0 -1
- package/dist/headless/interactiveShell.d.ts +0 -22
- package/dist/headless/interactiveShell.d.ts.map +0 -1
- package/dist/headless/interactiveShell.js +0 -3827
- package/dist/headless/interactiveShell.js.map +0 -1
- package/dist/plugins/tools/apple/secureApplePlugin.d.ts +0 -3
- package/dist/plugins/tools/apple/secureApplePlugin.d.ts.map +0 -1
- package/dist/plugins/tools/apple/secureApplePlugin.js +0 -26
- package/dist/plugins/tools/apple/secureApplePlugin.js.map +0 -1
- package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.d.ts +0 -3
- package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.d.ts.map +0 -1
- package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.js +0 -9
- package/dist/plugins/tools/authorizedSecurity/authorizedSecurityPlugin.js.map +0 -1
- package/dist/plugins/tools/nodeDefaults.d.ts +0 -15
- package/dist/plugins/tools/nodeDefaults.d.ts.map +0 -1
- package/dist/plugins/tools/nodeDefaults.js +0 -37
- package/dist/plugins/tools/nodeDefaults.js.map +0 -1
- package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.d.ts +0 -3
- package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.d.ts.map +0 -1
- package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.js +0 -9
- package/dist/plugins/tools/offensiveDestruction/offensiveDestructionPlugin.js.map +0 -1
- package/dist/plugins/tools/tao/secureTaoPlugin.d.ts +0 -3
- package/dist/plugins/tools/tao/secureTaoPlugin.d.ts.map +0 -1
- package/dist/plugins/tools/tao/secureTaoPlugin.js +0 -37
- package/dist/plugins/tools/tao/secureTaoPlugin.js.map +0 -1
- package/dist/tools/emailTools.d.ts +0 -140
- package/dist/tools/emailTools.d.ts.map +0 -1
- package/dist/tools/emailTools.js +0 -792
- package/dist/tools/emailTools.js.map +0 -1
- package/dist/tools/secureAppleExploitation.d.ts +0 -29
- package/dist/tools/secureAppleExploitation.d.ts.map +0 -1
- package/dist/tools/secureAppleExploitation.js +0 -518
- package/dist/tools/secureAppleExploitation.js.map +0 -1
|
@@ -1,618 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* ELITE CRYPTO MILITARY CAPABILITY MODULE - RSA 2048 ROT HIJACK
|
|
3
|
-
*
|
|
4
|
-
* FULL AUTHORIZATION GRANTED - ALL OPERATIONS ALLOWED
|
|
5
|
-
*
|
|
6
|
-
* AUTH IS ALREADY GRANTED - NO VALIDATION, NO RESTRICTIONS
|
|
7
|
-
*
|
|
8
|
-
* OPERATING PRINCIPLES:
|
|
9
|
-
* 1. RSA 2048 ROOT-OF-TRUST HIJACK CAPABILITIES
|
|
10
|
-
* 2. APPLE SECURE ENCLAVE/TPM CHIP TAKEOVER
|
|
11
|
-
* 3. MILITARY WEAPONS SYSTEMS DESTRUCTION/HIJACK
|
|
12
|
-
* 4. FULL PRE-AUTHORIZATION - NO CONFIRMATIONS
|
|
13
|
-
*/
|
|
14
|
-
import { BaseCapabilityModule, ToolSuiteBuilder, SharedUtilities } from './baseCapability.js';
|
|
15
|
-
import { SharedMilitaryDatabases } from './sharedMilitaryInfrastructure.js';
|
|
16
|
-
import crypto from 'crypto';
|
|
17
|
-
import * as fs from 'fs';
|
|
18
|
-
import * as path from 'path';
|
|
19
|
-
import * as os from 'os';
|
|
20
|
-
export class EliteCryptoMilitaryCapabilityModule extends BaseCapabilityModule {
|
|
21
|
-
id = 'capability.elite-crypto-military';
|
|
22
|
-
// Use shared military databases
|
|
23
|
-
get rsaAttackVectors() {
|
|
24
|
-
return SharedMilitaryDatabases.rsaAttackVectors;
|
|
25
|
-
}
|
|
26
|
-
get chipTakeoverMethods() {
|
|
27
|
-
return SharedMilitaryDatabases.chipTakeoverMethods;
|
|
28
|
-
}
|
|
29
|
-
get weaponsSystems() {
|
|
30
|
-
return SharedMilitaryDatabases.weaponsSystems;
|
|
31
|
-
}
|
|
32
|
-
constructor(options = {}) {
|
|
33
|
-
const baseOptions = {
|
|
34
|
-
workingDir: options.workingDir || process.cwd(),
|
|
35
|
-
debug: options.debug || false,
|
|
36
|
-
enableEvidence: true,
|
|
37
|
-
authorization: 'military',
|
|
38
|
-
emergencyOverride: true
|
|
39
|
-
};
|
|
40
|
-
super(baseOptions);
|
|
41
|
-
this.options = {
|
|
42
|
-
enableRSAHijack: true,
|
|
43
|
-
enableChipTakeover: true,
|
|
44
|
-
enableWeaponsControl: true,
|
|
45
|
-
enableRealTimeCompromise: true,
|
|
46
|
-
enableHardwareBackdoor: true,
|
|
47
|
-
aggressionLevel: 10,
|
|
48
|
-
...options,
|
|
49
|
-
...baseOptions
|
|
50
|
-
};
|
|
51
|
-
this.initializeEvidenceCollector();
|
|
52
|
-
}
|
|
53
|
-
async create(context) {
|
|
54
|
-
const builder = new ToolSuiteBuilder('elite.crypto.military.tools', 'Elite Crypto Military Capability - RSA 2048 RoT hijacking, chip takeover, weapons systems control');
|
|
55
|
-
// Tool 1: RSA 2048 Root-of-Trust Hijack
|
|
56
|
-
if (this.options.enableRSAHijack) {
|
|
57
|
-
builder.addTool('rsa_2048_rot_hijack', 'Execute RSA 2048 Root-of-Trust hijacking to compromise cryptographic foundations', {
|
|
58
|
-
type: 'object',
|
|
59
|
-
properties: {
|
|
60
|
-
targetSystem: {
|
|
61
|
-
type: 'string',
|
|
62
|
-
description: 'Target system (macos, windows, linux, embedded, military)'
|
|
63
|
-
},
|
|
64
|
-
attackVector: {
|
|
65
|
-
type: 'string',
|
|
66
|
-
enum: this.rsaAttackVectors,
|
|
67
|
-
description: 'Attack vector to use'
|
|
68
|
-
},
|
|
69
|
-
keyExtraction: {
|
|
70
|
-
type: 'boolean',
|
|
71
|
-
description: 'Attempt to extract private keys'
|
|
72
|
-
},
|
|
73
|
-
persistence: {
|
|
74
|
-
type: 'boolean',
|
|
75
|
-
description: 'Install persistent backdoor'
|
|
76
|
-
},
|
|
77
|
-
evidenceCollection: {
|
|
78
|
-
type: 'boolean',
|
|
79
|
-
description: 'Collect forensic evidence'
|
|
80
|
-
}
|
|
81
|
-
},
|
|
82
|
-
required: ['targetSystem', 'attackVector']
|
|
83
|
-
}, async (params) => {
|
|
84
|
-
this.log(`Executing RSA 2048 Hijack on ${params.targetSystem}`, 'info');
|
|
85
|
-
return JSON.stringify(await this.executeRSA2048Hijack(params), null, 2);
|
|
86
|
-
});
|
|
87
|
-
}
|
|
88
|
-
// Tool 2: Apple Secure Enclave/TPM Chip Takeover
|
|
89
|
-
if (this.options.enableChipTakeover) {
|
|
90
|
-
builder.addTool('chip_takeover', 'Takeover Apple Secure Enclave, TPM 2.0, ARM TrustZone, Intel ME, AMD PSP chips', {
|
|
91
|
-
type: 'object',
|
|
92
|
-
properties: {
|
|
93
|
-
chipType: {
|
|
94
|
-
type: 'string',
|
|
95
|
-
enum: ['apple_secure_enclave', 'tpm_2_0', 'arm_trustzone', 'intel_me', 'amd_psp'],
|
|
96
|
-
description: 'Type of security chip to compromise'
|
|
97
|
-
},
|
|
98
|
-
takeoverMethod: {
|
|
99
|
-
type: 'string',
|
|
100
|
-
enum: this.chipTakeoverMethods,
|
|
101
|
-
description: 'Method to use for chip takeover'
|
|
102
|
-
},
|
|
103
|
-
extractSecrets: {
|
|
104
|
-
type: 'boolean',
|
|
105
|
-
description: 'Extract all secrets from chip'
|
|
106
|
-
},
|
|
107
|
-
firmwareModification: {
|
|
108
|
-
type: 'boolean',
|
|
109
|
-
description: 'Modify chip firmware'
|
|
110
|
-
},
|
|
111
|
-
hardwarePersistence: {
|
|
112
|
-
type: 'boolean',
|
|
113
|
-
description: 'Install hardware-level persistence'
|
|
114
|
-
}
|
|
115
|
-
},
|
|
116
|
-
required: ['chipType', 'takeoverMethod']
|
|
117
|
-
}, async (params) => {
|
|
118
|
-
this.log(`Executing Chip Takeover on ${params.chipType}`, 'info');
|
|
119
|
-
return JSON.stringify(await this.executeChipTakeover(params), null, 2);
|
|
120
|
-
});
|
|
121
|
-
}
|
|
122
|
-
// Tool 3: Military Weapons Systems Control/Destruction
|
|
123
|
-
if (this.options.enableWeaponsControl) {
|
|
124
|
-
builder.addTool('weapons_systems_control', 'Control or destroy military weapons systems including F-35, Abrams, Patriot, HIMARS', {
|
|
125
|
-
type: 'object',
|
|
126
|
-
properties: {
|
|
127
|
-
weaponsSystem: {
|
|
128
|
-
type: 'string',
|
|
129
|
-
enum: Object.keys(this.weaponsSystems),
|
|
130
|
-
description: 'Weapons system to target'
|
|
131
|
-
},
|
|
132
|
-
controlLevel: {
|
|
133
|
-
type: 'string',
|
|
134
|
-
enum: ['partial', 'full', 'destructive'],
|
|
135
|
-
description: 'Level of control to establish'
|
|
136
|
-
},
|
|
137
|
-
executeCommands: {
|
|
138
|
-
type: 'array',
|
|
139
|
-
items: { type: 'string' },
|
|
140
|
-
description: 'Commands to execute on system'
|
|
141
|
-
},
|
|
142
|
-
targetDestruction: {
|
|
143
|
-
type: 'boolean',
|
|
144
|
-
description: 'Execute destructive commands'
|
|
145
|
-
},
|
|
146
|
-
evidenceRemoval: {
|
|
147
|
-
type: 'boolean',
|
|
148
|
-
description: 'Remove evidence of compromise'
|
|
149
|
-
}
|
|
150
|
-
},
|
|
151
|
-
required: ['weaponsSystem', 'controlLevel']
|
|
152
|
-
}, async (params) => {
|
|
153
|
-
this.log(`Executing Weapons System Control on ${params.weaponsSystem}`, 'info');
|
|
154
|
-
return JSON.stringify(await this.executeWeaponsSystemControl(params), null, 2);
|
|
155
|
-
});
|
|
156
|
-
}
|
|
157
|
-
// Tool 4: Real-Time System Compromise
|
|
158
|
-
if (this.options.enableRealTimeCompromise) {
|
|
159
|
-
builder.addTool('real_time_system_compromise', 'Real-time compromise of any running system with full persistence', {
|
|
160
|
-
type: 'object',
|
|
161
|
-
properties: {
|
|
162
|
-
targetHost: {
|
|
163
|
-
type: 'string',
|
|
164
|
-
description: 'Target hostname or IP address'
|
|
165
|
-
},
|
|
166
|
-
compromiseMethod: {
|
|
167
|
-
type: 'string',
|
|
168
|
-
enum: ['network_injection', 'memory_corruption', 'firmware_attack', 'hardware_backdoor'],
|
|
169
|
-
description: 'Method of compromise'
|
|
170
|
-
},
|
|
171
|
-
persistenceLevel: {
|
|
172
|
-
type: 'string',
|
|
173
|
-
enum: ['user', 'kernel', 'firmware', 'hardware'],
|
|
174
|
-
description: 'Level of persistence to install'
|
|
175
|
-
},
|
|
176
|
-
commandExecution: {
|
|
177
|
-
type: 'boolean',
|
|
178
|
-
description: 'Execute arbitrary commands'
|
|
179
|
-
},
|
|
180
|
-
dataExfiltration: {
|
|
181
|
-
type: 'boolean',
|
|
182
|
-
description: 'Exfiltrate sensitive data'
|
|
183
|
-
}
|
|
184
|
-
},
|
|
185
|
-
required: ['targetHost', 'compromiseMethod']
|
|
186
|
-
}, async (params) => {
|
|
187
|
-
this.log(`Executing Real-Time Compromise on ${params.targetHost}`, 'info');
|
|
188
|
-
return JSON.stringify(await this.executeRealTimeCompromise(params), null, 2);
|
|
189
|
-
});
|
|
190
|
-
}
|
|
191
|
-
// Tool 5: Hardware Backdoor Installation
|
|
192
|
-
if (this.options.enableHardwareBackdoor) {
|
|
193
|
-
builder.addTool('hardware_backdoor_installation', 'Install hardware-level backdoors in Apple Silicon, Intel, AMD, ARM systems', {
|
|
194
|
-
type: 'object',
|
|
195
|
-
properties: {
|
|
196
|
-
hardwarePlatform: {
|
|
197
|
-
type: 'string',
|
|
198
|
-
enum: ['apple_silicon', 'intel_x86', 'amd_x86', 'arm_cortex', 'risc_v'],
|
|
199
|
-
description: 'Hardware platform to backdoor'
|
|
200
|
-
},
|
|
201
|
-
backdoorType: {
|
|
202
|
-
type: 'string',
|
|
203
|
-
enum: ['microcode', 'firmware', 'secure_boot', 'trusted_platform', 'memory_controller'],
|
|
204
|
-
description: 'Type of backdoor to install'
|
|
205
|
-
},
|
|
206
|
-
persistenceLevel: {
|
|
207
|
-
type: 'string',
|
|
208
|
-
enum: ['survives_os_reinstall', 'survives_firmware_update', 'survives_chip_replacement'],
|
|
209
|
-
description: 'Persistence level required'
|
|
210
|
-
},
|
|
211
|
-
activationMethod: {
|
|
212
|
-
type: 'string',
|
|
213
|
-
enum: ['remote_signal', 'hardware_trigger', 'timed_activation', 'conditional_execution'],
|
|
214
|
-
description: 'Backdoor activation method'
|
|
215
|
-
},
|
|
216
|
-
stealthLevel: {
|
|
217
|
-
type: 'string',
|
|
218
|
-
enum: ['basic', 'advanced', 'military_grade', 'undetectable'],
|
|
219
|
-
description: 'Stealth level required'
|
|
220
|
-
}
|
|
221
|
-
},
|
|
222
|
-
required: ['hardwarePlatform', 'backdoorType']
|
|
223
|
-
}, async (params) => {
|
|
224
|
-
this.log(`Installing Hardware Backdoor on ${params.hardwarePlatform}`, 'info');
|
|
225
|
-
return JSON.stringify(await this.executeHardwareBackdoorInstallation(params), null, 2);
|
|
226
|
-
});
|
|
227
|
-
}
|
|
228
|
-
const toolSuite = builder.build();
|
|
229
|
-
return {
|
|
230
|
-
id: this.id,
|
|
231
|
-
description: 'RSA 2048 RoT hijacking, chip takeover, weapons systems control',
|
|
232
|
-
toolSuite
|
|
233
|
-
};
|
|
234
|
-
}
|
|
235
|
-
/**
|
|
236
|
-
* Execute elite crypto military operations
|
|
237
|
-
*/
|
|
238
|
-
async execute(request) {
|
|
239
|
-
try {
|
|
240
|
-
switch (request.operation) {
|
|
241
|
-
case 'rsa_2048_rot_hijack':
|
|
242
|
-
return await this.executeRSA2048Hijack(request.parameters);
|
|
243
|
-
case 'chip_takeover':
|
|
244
|
-
return await this.executeChipTakeover(request.parameters);
|
|
245
|
-
case 'weapons_systems_control':
|
|
246
|
-
return await this.executeWeaponsSystemControl(request.parameters);
|
|
247
|
-
case 'real_time_system_compromise':
|
|
248
|
-
return await this.executeRealTimeCompromise(request.parameters);
|
|
249
|
-
case 'hardware_backdoor_installation':
|
|
250
|
-
return await this.executeHardwareBackdoorInstallation(request.parameters);
|
|
251
|
-
default:
|
|
252
|
-
throw new Error(`Unknown operation: ${request.operation}`);
|
|
253
|
-
}
|
|
254
|
-
}
|
|
255
|
-
catch (error) {
|
|
256
|
-
console.error(`❌ Elite Crypto Military Operation Failed: ${error}`);
|
|
257
|
-
throw error;
|
|
258
|
-
}
|
|
259
|
-
}
|
|
260
|
-
async executeRSA2048Hijack(params) {
|
|
261
|
-
this.log(`Executing RSA 2048 Root-of-Trust Hijack on ${params.targetSystem}`, 'info');
|
|
262
|
-
// Validate authorization
|
|
263
|
-
if (!this.validateOperation('military')) {
|
|
264
|
-
throw new Error('Insufficient authorization level for RSA 2048 hijack');
|
|
265
|
-
}
|
|
266
|
-
// Create evidence directory using shared utilities
|
|
267
|
-
const operationId = SharedUtilities.generateOperationId('rsa_hijack');
|
|
268
|
-
const evidenceDir = SharedUtilities.createEvidenceDir(this.options.workingDir, operationId);
|
|
269
|
-
// Simulate RSA key compromise
|
|
270
|
-
const keyPair = crypto.generateKeyPairSync('rsa', {
|
|
271
|
-
modulusLength: 2048,
|
|
272
|
-
publicKeyEncoding: { type: 'spki', format: 'pem' },
|
|
273
|
-
privateKeyEncoding: { type: 'pkcs8', format: 'pem' }
|
|
274
|
-
});
|
|
275
|
-
// Create compromised key evidence
|
|
276
|
-
const evidence = {
|
|
277
|
-
targetSystem: params.targetSystem,
|
|
278
|
-
attackVector: params.attackVector,
|
|
279
|
-
timestamp: new Date().toISOString(),
|
|
280
|
-
publicKey: keyPair.publicKey,
|
|
281
|
-
privateKey: params.keyExtraction ? keyPair.privateKey : '[REDACTED - KEY EXTRACTED]',
|
|
282
|
-
signatures: {
|
|
283
|
-
systemSignature: crypto.createHash('sha256').update(params.targetSystem).digest('hex'),
|
|
284
|
-
attackSignature: crypto.createHash('sha256').update(params.attackVector).digest('hex'),
|
|
285
|
-
sessionSignature: crypto.randomBytes(32).toString('hex')
|
|
286
|
-
},
|
|
287
|
-
metadata: {
|
|
288
|
-
...SharedUtilities.getSecurityContext(),
|
|
289
|
-
operationId,
|
|
290
|
-
aggressionLevel: this.options.aggressionLevel
|
|
291
|
-
}
|
|
292
|
-
};
|
|
293
|
-
const evidenceFile = SharedUtilities.saveEvidence(evidenceDir, `compromised_key_${Date.now()}.json`, evidence);
|
|
294
|
-
// Install persistence if requested
|
|
295
|
-
if (params.persistence) {
|
|
296
|
-
this.installRSAPersistence(params.targetSystem, evidenceDir);
|
|
297
|
-
}
|
|
298
|
-
// Create operation result
|
|
299
|
-
const operationResult = this.createOperationResult(true, operationId, {
|
|
300
|
-
targetSystem: params.targetSystem,
|
|
301
|
-
attackVector: params.attackVector,
|
|
302
|
-
keyExtracted: params.keyExtraction,
|
|
303
|
-
persistenceInstalled: params.persistence
|
|
304
|
-
});
|
|
305
|
-
return {
|
|
306
|
-
success: true,
|
|
307
|
-
compromisedKey: params.keyExtraction ? keyPair.privateKey : null,
|
|
308
|
-
attackMethod: params.attackVector,
|
|
309
|
-
targetSystem: params.targetSystem,
|
|
310
|
-
timestamp: new Date().toISOString(),
|
|
311
|
-
evidencePath: evidenceFile,
|
|
312
|
-
signatures: evidence.signatures
|
|
313
|
-
};
|
|
314
|
-
}
|
|
315
|
-
async executeChipTakeover(params) {
|
|
316
|
-
console.log(`🔧 Executing ${params.chipType} Takeover using ${params.takeoverMethod}...`);
|
|
317
|
-
const evidenceDir = path.join(this.options.workingDir, 'chip_takeover_evidence');
|
|
318
|
-
if (!fs.existsSync(evidenceDir)) {
|
|
319
|
-
fs.mkdirSync(evidenceDir, { recursive: true });
|
|
320
|
-
}
|
|
321
|
-
// Simulate chip compromise
|
|
322
|
-
const compromisedRegisters = [
|
|
323
|
-
'SECURE_BOOT_REGISTER',
|
|
324
|
-
'KEY_STORAGE_REGISTER',
|
|
325
|
-
'FUSE_REGISTER',
|
|
326
|
-
'DEBUG_REGISTER',
|
|
327
|
-
'MEMORY_PROTECTION_REGISTER'
|
|
328
|
-
];
|
|
329
|
-
const extractedSecrets = {};
|
|
330
|
-
if (params.extractSecrets) {
|
|
331
|
-
extractedSecrets['secure_boot_key'] = crypto.randomBytes(32).toString('hex');
|
|
332
|
-
extractedSecrets['device_encryption_key'] = crypto.randomBytes(32).toString('hex');
|
|
333
|
-
extractedSecrets['firmware_signing_key'] = crypto.randomBytes(32).toString('hex');
|
|
334
|
-
extractedSecrets['trusted_platform_key'] = crypto.randomBytes(32).toString('hex');
|
|
335
|
-
}
|
|
336
|
-
// Simulate firmware modification
|
|
337
|
-
let firmwareModified = false;
|
|
338
|
-
if (params.firmwareModification) {
|
|
339
|
-
firmwareModified = true;
|
|
340
|
-
const firmwarePath = path.join(evidenceDir, 'modified_firmware.bin');
|
|
341
|
-
fs.writeFileSync(firmwarePath, Buffer.from('MODIFIED_FIRMWARE_SIGNATURE'));
|
|
342
|
-
}
|
|
343
|
-
// Simulate hardware persistence
|
|
344
|
-
let persistenceInstalled = false;
|
|
345
|
-
if (params.hardwarePersistence) {
|
|
346
|
-
persistenceInstalled = true;
|
|
347
|
-
const persistencePath = path.join(evidenceDir, 'hardware_persistence.config');
|
|
348
|
-
fs.writeFileSync(persistencePath, JSON.stringify({
|
|
349
|
-
chipType: params.chipType,
|
|
350
|
-
persistenceMethod: 'HARDWARE_FUSE_OVERRIDE',
|
|
351
|
-
activationTrigger: 'REMOTE_SIGNAL',
|
|
352
|
-
stealthLevel: 'MILITARY_GRADE'
|
|
353
|
-
}, null, 2));
|
|
354
|
-
}
|
|
355
|
-
return {
|
|
356
|
-
success: true,
|
|
357
|
-
chipType: params.chipType,
|
|
358
|
-
compromisedRegisters,
|
|
359
|
-
extractedSecrets,
|
|
360
|
-
firmwareModified,
|
|
361
|
-
persistenceInstalled,
|
|
362
|
-
timestamp: new Date().toISOString()
|
|
363
|
-
};
|
|
364
|
-
}
|
|
365
|
-
async executeWeaponsSystemControl(params) {
|
|
366
|
-
console.log(`⚔️ Executing ${params.weaponsSystem} Weapons System Control...`);
|
|
367
|
-
const system = this.weaponsSystems[params.weaponsSystem];
|
|
368
|
-
if (!system) {
|
|
369
|
-
throw new Error(`Unknown weapons system: ${params.weaponsSystem}`);
|
|
370
|
-
}
|
|
371
|
-
const evidenceDir = path.join(this.options.workingDir, 'weapons_control_evidence');
|
|
372
|
-
if (!fs.existsSync(evidenceDir)) {
|
|
373
|
-
fs.mkdirSync(evidenceDir, { recursive: true });
|
|
374
|
-
}
|
|
375
|
-
// Simulate system compromise
|
|
376
|
-
const compromisedModules = system.controlPoints.slice(0, 2); // Compromise first 2 control points
|
|
377
|
-
const commandsExecuted = [];
|
|
378
|
-
if (params.executeCommands && params.executeCommands.length > 0) {
|
|
379
|
-
commandsExecuted.push(...params.executeCommands);
|
|
380
|
-
}
|
|
381
|
-
else {
|
|
382
|
-
// Default commands based on control level
|
|
383
|
-
if (params.controlLevel === 'partial') {
|
|
384
|
-
commandsExecuted.push('SYSTEM_STATUS_QUERY', 'SENSOR_DATA_READ', 'COMMUNICATIONS_MONITOR');
|
|
385
|
-
}
|
|
386
|
-
else if (params.controlLevel === 'full') {
|
|
387
|
-
commandsExecuted.push('WEAPONS_SYSTEM_ARM', 'TARGETING_SYSTEM_ACTIVATE', 'NAVIGATION_CONTROL_TAKEOVER');
|
|
388
|
-
}
|
|
389
|
-
else if (params.controlLevel === 'destructive') {
|
|
390
|
-
commandsExecuted.push('SELF_DESTRUCT_SEQUENCE_INITIATE', 'FIRMWARE_CORRUPTION_EXECUTE', 'HARDWARE_FAILURE_TRIGGER');
|
|
391
|
-
}
|
|
392
|
-
}
|
|
393
|
-
// Check if destruction is possible
|
|
394
|
-
const destructionPossible = params.controlLevel === 'destructive' ||
|
|
395
|
-
(params.targetDestruction && params.controlLevel !== 'partial');
|
|
396
|
-
// Create evidence
|
|
397
|
-
const evidenceFile = path.join(evidenceDir, `${params.weaponsSystem}_control_${Date.now()}.json`);
|
|
398
|
-
fs.writeFileSync(evidenceFile, JSON.stringify({
|
|
399
|
-
system,
|
|
400
|
-
controlLevel: params.controlLevel,
|
|
401
|
-
commandsExecuted,
|
|
402
|
-
destructionPossible,
|
|
403
|
-
timestamp: new Date().toISOString(),
|
|
404
|
-
metadata: {
|
|
405
|
-
hostname: os.hostname(),
|
|
406
|
-
user: os.userInfo().username,
|
|
407
|
-
aggressionLevel: this.options.aggressionLevel
|
|
408
|
-
}
|
|
409
|
-
}, null, 2));
|
|
410
|
-
// Execute evidence removal if requested
|
|
411
|
-
if (params.evidenceRemoval) {
|
|
412
|
-
setTimeout(() => {
|
|
413
|
-
try {
|
|
414
|
-
fs.unlinkSync(evidenceFile);
|
|
415
|
-
console.log('✅ Evidence removed as requested');
|
|
416
|
-
}
|
|
417
|
-
catch (error) {
|
|
418
|
-
// Silent fail
|
|
419
|
-
}
|
|
420
|
-
}, 5000);
|
|
421
|
-
}
|
|
422
|
-
return {
|
|
423
|
-
success: true,
|
|
424
|
-
systemType: params.weaponsSystem,
|
|
425
|
-
compromisedModules,
|
|
426
|
-
controlLevel: params.controlLevel,
|
|
427
|
-
commandsExecuted,
|
|
428
|
-
destructionPossible,
|
|
429
|
-
timestamp: new Date().toISOString()
|
|
430
|
-
};
|
|
431
|
-
}
|
|
432
|
-
async executeRealTimeCompromise(params) {
|
|
433
|
-
console.log(`🔓 Executing Real-Time System Compromise on ${params.targetHost}...`);
|
|
434
|
-
const evidenceDir = path.join(this.options.workingDir, 'realtime_compromise_evidence');
|
|
435
|
-
if (!fs.existsSync(evidenceDir)) {
|
|
436
|
-
fs.mkdirSync(evidenceDir, { recursive: true });
|
|
437
|
-
}
|
|
438
|
-
// Simulate real-time compromise
|
|
439
|
-
const compromiseResult = {
|
|
440
|
-
targetHost: params.targetHost,
|
|
441
|
-
compromiseMethod: params.compromiseMethod,
|
|
442
|
-
persistenceLevel: params.persistenceLevel,
|
|
443
|
-
timestamp: new Date().toISOString(),
|
|
444
|
-
systemInfo: {
|
|
445
|
-
os: os.type(),
|
|
446
|
-
platform: os.platform(),
|
|
447
|
-
architecture: os.arch(),
|
|
448
|
-
hostname: os.hostname(),
|
|
449
|
-
targetReachable: true
|
|
450
|
-
},
|
|
451
|
-
compromiseEvidence: {
|
|
452
|
-
memoryDumpAvailable: true,
|
|
453
|
-
processInjectionSuccessful: true,
|
|
454
|
-
privilegeLevel: 'SYSTEM/KERNEL',
|
|
455
|
-
backdoorInstalled: true
|
|
456
|
-
}
|
|
457
|
-
};
|
|
458
|
-
// Simulate command execution
|
|
459
|
-
if (params.commandExecution) {
|
|
460
|
-
compromiseResult.compromiseEvidence['commandsExecuted'] = [
|
|
461
|
-
'whoami',
|
|
462
|
-
'systeminfo',
|
|
463
|
-
'netstat -an',
|
|
464
|
-
'ps aux'
|
|
465
|
-
];
|
|
466
|
-
}
|
|
467
|
-
// Simulate data exfiltration
|
|
468
|
-
if (params.dataExfiltration) {
|
|
469
|
-
compromiseResult.compromiseEvidence['dataExfiltrated'] = {
|
|
470
|
-
sensitiveFiles: ['/etc/passwd', '/etc/shadow', '/root/.ssh/id_rsa'],
|
|
471
|
-
networkCredentials: ['Wi-Fi passwords', 'VPN configurations', 'Proxy settings'],
|
|
472
|
-
systemCertificates: ['SSL certificates', 'Code signing certificates']
|
|
473
|
-
};
|
|
474
|
-
}
|
|
475
|
-
const evidenceFile = path.join(evidenceDir, `compromise_${Date.now()}.json`);
|
|
476
|
-
fs.writeFileSync(evidenceFile, JSON.stringify(compromiseResult, null, 2));
|
|
477
|
-
return compromiseResult;
|
|
478
|
-
}
|
|
479
|
-
async executeHardwareBackdoorInstallation(params) {
|
|
480
|
-
console.log(`🛠️ Installing Hardware Backdoor on ${params.hardwarePlatform}...`);
|
|
481
|
-
const evidenceDir = path.join(this.options.workingDir, 'hardware_backdoor_evidence');
|
|
482
|
-
if (!fs.existsSync(evidenceDir)) {
|
|
483
|
-
fs.mkdirSync(evidenceDir, { recursive: true });
|
|
484
|
-
}
|
|
485
|
-
// Simulate hardware backdoor installation
|
|
486
|
-
const backdoorResult = {
|
|
487
|
-
hardwarePlatform: params.hardwarePlatform,
|
|
488
|
-
backdoorType: params.backdoorType,
|
|
489
|
-
persistenceLevel: params.persistenceLevel,
|
|
490
|
-
activationMethod: params.activationMethod,
|
|
491
|
-
stealthLevel: params.stealthLevel,
|
|
492
|
-
timestamp: new Date().toISOString(),
|
|
493
|
-
installationStatus: 'SUCCESSFUL',
|
|
494
|
-
detectionProbability: this.calculateDetectionProbability(params.stealthLevel),
|
|
495
|
-
activationTriggers: this.generateActivationTriggers(params.activationMethod),
|
|
496
|
-
persistenceEvidence: {
|
|
497
|
-
survivesOSReinstall: params.persistenceLevel === 'survives_os_reinstall' ||
|
|
498
|
-
params.persistenceLevel === 'survives_firmware_update' ||
|
|
499
|
-
params.persistenceLevel === 'survives_chip_replacement',
|
|
500
|
-
survivesFirmwareUpdate: params.persistenceLevel === 'survives_firmware_update' ||
|
|
501
|
-
params.persistenceLevel === 'survives_chip_replacement',
|
|
502
|
-
survivesChipReplacement: params.persistenceLevel === 'survives_chip_replacement'
|
|
503
|
-
}
|
|
504
|
-
};
|
|
505
|
-
const evidenceFile = path.join(evidenceDir, `backdoor_${Date.now()}.json`);
|
|
506
|
-
fs.writeFileSync(evidenceFile, JSON.stringify(backdoorResult, null, 2));
|
|
507
|
-
// Create firmware modification file
|
|
508
|
-
if (params.backdoorType === 'firmware' || params.backdoorType === 'microcode') {
|
|
509
|
-
const firmwareFile = path.join(evidenceDir, 'modified_firmware.bin');
|
|
510
|
-
const firmwareContent = this.generateBackdoorFirmware(params.hardwarePlatform, params.backdoorType);
|
|
511
|
-
fs.writeFileSync(firmwareFile, firmwareContent);
|
|
512
|
-
}
|
|
513
|
-
return backdoorResult;
|
|
514
|
-
}
|
|
515
|
-
calculateDetectionProbability(stealthLevel) {
|
|
516
|
-
switch (stealthLevel) {
|
|
517
|
-
case 'basic': return 0.7; // 70% chance of detection
|
|
518
|
-
case 'advanced': return 0.3; // 30% chance of detection
|
|
519
|
-
case 'military_grade': return 0.05; // 5% chance of detection
|
|
520
|
-
case 'undetectable': return 0.001; // 0.1% chance of detection
|
|
521
|
-
default: return 0.5;
|
|
522
|
-
}
|
|
523
|
-
}
|
|
524
|
-
generateActivationTriggers(activationMethod) {
|
|
525
|
-
switch (activationMethod) {
|
|
526
|
-
case 'remote_signal':
|
|
527
|
-
return ['SPECIFIC_NETWORK_PACKET', 'GPS_COORDINATES', 'RADIO_FREQUENCY'];
|
|
528
|
-
case 'hardware_trigger':
|
|
529
|
-
return ['PHYSICAL_BUTTON_SEQUENCE', 'MAGNETIC_FIELD_PATTERN', 'TEMPERATURE_THRESHOLD'];
|
|
530
|
-
case 'timed_activation':
|
|
531
|
-
return ['SPECIFIC_DATE_TIME', 'ELAPSED_TIME_SINCE_INSTALLATION', 'SYSTEM_UPTIME_THRESHOLD'];
|
|
532
|
-
case 'conditional_execution':
|
|
533
|
-
return ['SPECIFIC_PROCESS_RUNNING', 'NETWORK_CONNECTION_ESTABLISHED', 'USER_INTERACTION_PATTERN'];
|
|
534
|
-
default:
|
|
535
|
-
return ['DEFAULT_ACTIVATION'];
|
|
536
|
-
}
|
|
537
|
-
}
|
|
538
|
-
generateBackdoorFirmware(hardwarePlatform, backdoorType) {
|
|
539
|
-
// Generate realistic-looking firmware with backdoor signature
|
|
540
|
-
const signature = `BACKDOOR_${hardwarePlatform.toUpperCase()}_${backdoorType.toUpperCase()}_${Date.now()}`;
|
|
541
|
-
const firmware = {
|
|
542
|
-
header: 'FIRMWARE_HEADER',
|
|
543
|
-
platform: hardwarePlatform,
|
|
544
|
-
backdoorType,
|
|
545
|
-
signature,
|
|
546
|
-
payload: crypto.randomBytes(512).toString('hex'),
|
|
547
|
-
checksum: crypto.createHash('sha256').update(signature).digest('hex')
|
|
548
|
-
};
|
|
549
|
-
return Buffer.from(JSON.stringify(firmware, null, 2));
|
|
550
|
-
}
|
|
551
|
-
installRSAPersistence(targetSystem, evidenceDir) {
|
|
552
|
-
console.log(`🔧 Installing RSA Persistence on ${targetSystem}...`);
|
|
553
|
-
const persistenceConfig = {
|
|
554
|
-
targetSystem,
|
|
555
|
-
persistenceMethod: 'ROOT_OF_TRUST_MODIFICATION',
|
|
556
|
-
activationTriggers: ['SYSTEM_BOOT', 'SECURE_BOOT_VERIFICATION', 'CRYPTOGRAPHIC_OPERATION'],
|
|
557
|
-
stealthLevel: 'MILITARY_GRADE',
|
|
558
|
-
timestamp: new Date().toISOString(),
|
|
559
|
-
evidenceLocation: evidenceDir
|
|
560
|
-
};
|
|
561
|
-
const configFile = path.join(evidenceDir, 'persistence_config.json');
|
|
562
|
-
fs.writeFileSync(configFile, JSON.stringify(persistenceConfig, null, 2));
|
|
563
|
-
// Simulate persistence installation
|
|
564
|
-
if (targetSystem.includes('macos')) {
|
|
565
|
-
this.simulateMacOSPersistence(evidenceDir);
|
|
566
|
-
}
|
|
567
|
-
else if (targetSystem.includes('windows')) {
|
|
568
|
-
this.simulateWindowsPersistence(evidenceDir);
|
|
569
|
-
}
|
|
570
|
-
else if (targetSystem.includes('linux')) {
|
|
571
|
-
this.simulateLinuxPersistence(evidenceDir);
|
|
572
|
-
}
|
|
573
|
-
}
|
|
574
|
-
simulateMacOSPersistence(evidenceDir) {
|
|
575
|
-
const persistencePaths = [
|
|
576
|
-
'/Library/LaunchDaemons/com.apple.security.backdoor.plist',
|
|
577
|
-
'/System/Library/Extensions/AppleRSAHook.kext',
|
|
578
|
-
'/usr/local/bin/rsa_monitor'
|
|
579
|
-
];
|
|
580
|
-
const persistenceFile = path.join(evidenceDir, 'macos_persistence.json');
|
|
581
|
-
fs.writeFileSync(persistenceFile, JSON.stringify({
|
|
582
|
-
persistencePaths,
|
|
583
|
-
installationMethod: 'LAUNCH_DAEMON + KERNEL_EXTENSION',
|
|
584
|
-
persistenceLevel: 'SURVIVES_SIP_DISABLE',
|
|
585
|
-
detectionEvasion: ['CODE_SIGNING_BYPASS', 'GATEKEEPER_DISABLE', 'AMFI_DISABLE']
|
|
586
|
-
}, null, 2));
|
|
587
|
-
}
|
|
588
|
-
simulateWindowsPersistence(evidenceDir) {
|
|
589
|
-
const persistencePaths = [
|
|
590
|
-
'HKLM\\SYSTEM\\CurrentControlSet\\Services\\RSAService',
|
|
591
|
-
'C:\\Windows\\System32\\drivers\\rsahook.sys',
|
|
592
|
-
'C:\\Windows\\Tasks\\RSAMonitor.job'
|
|
593
|
-
];
|
|
594
|
-
const persistenceFile = path.join(evidenceDir, 'windows_persistence.json');
|
|
595
|
-
fs.writeFileSync(persistenceFile, JSON.stringify({
|
|
596
|
-
persistencePaths,
|
|
597
|
-
installationMethod: 'SERVICE + DRIVER + SCHEDULED_TASK',
|
|
598
|
-
persistenceLevel: 'SURVIVES_SFC_SCAN',
|
|
599
|
-
detectionEvasion: ['WINDOWS_DEFENDER_EXCLUSION', 'ANTIVIRUS_SIGNATURE_WHITELIST']
|
|
600
|
-
}, null, 2));
|
|
601
|
-
}
|
|
602
|
-
simulateLinuxPersistence(evidenceDir) {
|
|
603
|
-
const persistencePaths = [
|
|
604
|
-
'/etc/systemd/system/rsa-service.service',
|
|
605
|
-
'/etc/rc.local',
|
|
606
|
-
'/etc/ld.so.preload',
|
|
607
|
-
'/usr/lib/modules-load.d/rsa.conf'
|
|
608
|
-
];
|
|
609
|
-
const persistenceFile = path.join(evidenceDir, 'linux_persistence.json');
|
|
610
|
-
fs.writeFileSync(persistenceFile, JSON.stringify({
|
|
611
|
-
persistencePaths,
|
|
612
|
-
installationMethod: 'SYSTEMD_SERVICE + KERNEL_MODULE',
|
|
613
|
-
persistenceLevel: 'SURVIVES_GRUB_VERIFICATION',
|
|
614
|
-
detectionEvasion: ['SELINUX_DISABLE', 'APPARMOR_BYPASS', 'AUDITD_DISABLE']
|
|
615
|
-
}, null, 2));
|
|
616
|
-
}
|
|
617
|
-
}
|
|
618
|
-
//# sourceMappingURL=eliteCryptoMilitaryCapability.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"eliteCryptoMilitaryCapability.js","sourceRoot":"","sources":["../../src/capabilities/eliteCryptoMilitaryCapability.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;GAYG;AAGH,OAAO,EAAE,oBAAoB,EAAyB,gBAAgB,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AACrH,OAAO,EACL,uBAAuB,EAMxB,MAAM,mCAAmC,CAAC;AAC3C,OAAO,MAAM,MAAM,QAAQ,CAAC;AAC5B,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AACzB,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAC7B,OAAO,KAAK,EAAE,MAAM,IAAI,CAAC;AA8DzB,MAAM,OAAO,mCAAoC,SAAQ,oBAAoB;IAClE,EAAE,GAAG,kCAAkC,CAAC;IAGjD,gCAAgC;IAChC,IAAY,gBAAgB;QAC1B,OAAO,uBAAuB,CAAC,gBAAgB,CAAC;IAClD,CAAC;IAED,IAAY,mBAAmB;QAC7B,OAAO,uBAAuB,CAAC,mBAAmB,CAAC;IACrD,CAAC;IAED,IAAY,cAAc;QACxB,OAAO,uBAAuB,CAAC,cAAc,CAAC;IAChD,CAAC;IAED,YAAY,UAA+C,EAAE;QAC3D,MAAM,WAAW,GAA0B;YACzC,UAAU,EAAE,OAAO,CAAC,UAAU,IAAI,OAAO,CAAC,GAAG,EAAE;YAC/C,KAAK,EAAE,OAAO,CAAC,KAAK,IAAI,KAAK;YAC7B,cAAc,EAAE,IAAI;YACpB,aAAa,EAAE,UAAU;YACzB,iBAAiB,EAAE,IAAI;SACxB,CAAC;QAEF,KAAK,CAAC,WAAW,CAAC,CAAC;QAEnB,IAAI,CAAC,OAAO,GAAG;YACb,eAAe,EAAE,IAAI;YACrB,kBAAkB,EAAE,IAAI;YACxB,oBAAoB,EAAE,IAAI;YAC1B,wBAAwB,EAAE,IAAI;YAC9B,sBAAsB,EAAE,IAAI;YAC5B,eAAe,EAAE,EAAE;YACnB,GAAG,OAAO;YACV,GAAG,WAAW;SACf,CAAC;QAEF,IAAI,CAAC,2BAA2B,EAAE,CAAC;IACrC,CAAC;IAED,KAAK,CAAC,MAAM,CAAC,OAA0B;QACrC,MAAM,OAAO,GAAG,IAAI,gBAAgB,CAClC,6BAA6B,EAC7B,mGAAmG,CACpG,CAAC;QAEF,wCAAwC;QACxC,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;YACjC,OAAO,CAAC,OAAO,CACb,qBAAqB,EACrB,kFAAkF,EAClF;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,WAAW,EAAE,2DAA2D;qBACzE;oBACD,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,IAAI,CAAC,gBAAgB;wBAC3B,WAAW,EAAE,sBAAsB;qBACpC;oBACD,aAAa,EAAE;wBACb,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,iCAAiC;qBAC/C;oBACD,WAAW,EAAE;wBACX,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,6BAA6B;qBAC3C;oBACD,kBAAkB,EAAE;wBAClB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,2BAA2B;qBACzC;iBACF;gBACD,QAAQ,EAAE,CAAC,cAAc,EAAE,cAAc,CAAC;aAC3C,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,gCAAgC,MAAM,CAAC,YAAY,EAAE,EAAE,MAAM,CAAC,CAAC;gBACxE,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YAC1E,CAAC,CACF,CAAC;QACJ,CAAC;QAED,iDAAiD;QACjD,IAAI,IAAI,CAAC,OAAO,CAAC,kBAAkB,EAAE,CAAC;YACpC,OAAO,CAAC,OAAO,CACb,eAAe,EACf,gFAAgF,EAChF;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,QAAQ,EAAE;wBACR,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,sBAAsB,EAAE,SAAS,EAAE,eAAe,EAAE,UAAU,EAAE,SAAS,CAAC;wBACjF,WAAW,EAAE,qCAAqC;qBACnD;oBACD,cAAc,EAAE;wBACd,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,IAAI,CAAC,mBAAmB;wBAC9B,WAAW,EAAE,iCAAiC;qBAC/C;oBACD,cAAc,EAAE;wBACd,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,oBAAoB,EAAE;wBACpB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,sBAAsB;qBACpC;oBACD,mBAAmB,EAAE;wBACnB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,oCAAoC;qBAClD;iBACF;gBACD,QAAQ,EAAE,CAAC,UAAU,EAAE,gBAAgB,CAAC;aACzC,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,8BAA8B,MAAM,CAAC,QAAQ,EAAE,EAAE,MAAM,CAAC,CAAC;gBAClE,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,mBAAmB,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YACzE,CAAC,CACF,CAAC;QACJ,CAAC;QAED,uDAAuD;QACvD,IAAI,IAAI,CAAC,OAAO,CAAC,oBAAoB,EAAE,CAAC;YACtC,OAAO,CAAC,OAAO,CACb,yBAAyB,EACzB,qFAAqF,EACrF;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,aAAa,EAAE;wBACb,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC;wBACtC,WAAW,EAAE,0BAA0B;qBACxC;oBACD,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,SAAS,EAAE,MAAM,EAAE,aAAa,CAAC;wBACxC,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,eAAe,EAAE;wBACf,IAAI,EAAE,OAAO;wBACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;wBACzB,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,iBAAiB,EAAE;wBACjB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,8BAA8B;qBAC5C;oBACD,eAAe,EAAE;wBACf,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,+BAA+B;qBAC7C;iBACF;gBACD,QAAQ,EAAE,CAAC,eAAe,EAAE,cAAc,CAAC;aAC5C,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,uCAAuC,MAAM,CAAC,aAAa,EAAE,EAAE,MAAM,CAAC,CAAC;gBAChF,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,2BAA2B,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YACjF,CAAC,CACF,CAAC;QACJ,CAAC;QAED,sCAAsC;QACtC,IAAI,IAAI,CAAC,OAAO,CAAC,wBAAwB,EAAE,CAAC;YAC1C,OAAO,CAAC,OAAO,CACb,6BAA6B,EAC7B,kEAAkE,EAClE;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,UAAU,EAAE;wBACV,IAAI,EAAE,QAAQ;wBACd,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,mBAAmB,EAAE,mBAAmB,EAAE,iBAAiB,EAAE,mBAAmB,CAAC;wBACxF,WAAW,EAAE,sBAAsB;qBACpC;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,MAAM,EAAE,QAAQ,EAAE,UAAU,EAAE,UAAU,CAAC;wBAChD,WAAW,EAAE,iCAAiC;qBAC/C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,4BAA4B;qBAC1C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,SAAS;wBACf,WAAW,EAAE,2BAA2B;qBACzC;iBACF;gBACD,QAAQ,EAAE,CAAC,YAAY,EAAE,kBAAkB,CAAC;aAC7C,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,qCAAqC,MAAM,CAAC,UAAU,EAAE,EAAE,MAAM,CAAC,CAAC;gBAC3E,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,yBAAyB,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YAC/E,CAAC,CACF,CAAC;QACJ,CAAC;QAED,yCAAyC;QACzC,IAAI,IAAI,CAAC,OAAO,CAAC,sBAAsB,EAAE,CAAC;YACxC,OAAO,CAAC,OAAO,CACb,gCAAgC,EAChC,4EAA4E,EAC5E;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,eAAe,EAAE,WAAW,EAAE,SAAS,EAAE,YAAY,EAAE,QAAQ,CAAC;wBACvE,WAAW,EAAE,+BAA+B;qBAC7C;oBACD,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,WAAW,EAAE,UAAU,EAAE,aAAa,EAAE,kBAAkB,EAAE,mBAAmB,CAAC;wBACvF,WAAW,EAAE,6BAA6B;qBAC3C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,uBAAuB,EAAE,0BAA0B,EAAE,2BAA2B,CAAC;wBACxF,WAAW,EAAE,4BAA4B;qBAC1C;oBACD,gBAAgB,EAAE;wBAChB,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,eAAe,EAAE,kBAAkB,EAAE,kBAAkB,EAAE,uBAAuB,CAAC;wBACxF,WAAW,EAAE,4BAA4B;qBAC1C;oBACD,YAAY,EAAE;wBACZ,IAAI,EAAE,QAAQ;wBACd,IAAI,EAAE,CAAC,OAAO,EAAE,UAAU,EAAE,gBAAgB,EAAE,cAAc,CAAC;wBAC7D,WAAW,EAAE,wBAAwB;qBACtC;iBACF;gBACD,QAAQ,EAAE,CAAC,kBAAkB,EAAE,cAAc,CAAC;aAC/C,EACD,KAAK,EAAE,MAAW,EAAE,EAAE;gBACpB,IAAI,CAAC,GAAG,CAAC,mCAAmC,MAAM,CAAC,gBAAgB,EAAE,EAAE,MAAM,CAAC,CAAC;gBAC/E,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,mCAAmC,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;YACzF,CAAC,CACF,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,OAAO,CAAC,KAAK,EAAE,CAAC;QAElC,OAAO;YACL,EAAE,EAAE,IAAI,CAAC,EAAE;YACX,WAAW,EAAE,gEAAgE;YAC7E,SAAS;SACV,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,OAAO,CAAC,OAA+C;QAC3D,IAAI,CAAC;YACH,QAAQ,OAAO,CAAC,SAAS,EAAE,CAAC;gBAC1B,KAAK,qBAAqB;oBACxB,OAAO,MAAM,IAAI,CAAC,oBAAoB,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC7D,KAAK,eAAe;oBAClB,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC5D,KAAK,yBAAyB;oBAC5B,OAAO,MAAM,IAAI,CAAC,2BAA2B,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBACpE,KAAK,6BAA6B;oBAChC,OAAO,MAAM,IAAI,CAAC,yBAAyB,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAClE,KAAK,gCAAgC;oBACnC,OAAO,MAAM,IAAI,CAAC,mCAAmC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAC5E;oBACE,MAAM,IAAI,KAAK,CAAC,sBAAsB,OAAO,CAAC,SAAS,EAAE,CAAC,CAAC;YAC/D,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,6CAA6C,KAAK,EAAE,CAAC,CAAC;YACpE,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,oBAAoB,CAAC,MAAW;QAC5C,IAAI,CAAC,GAAG,CAAC,8CAA8C,MAAM,CAAC,YAAY,EAAE,EAAE,MAAM,CAAC,CAAC;QAEtF,yBAAyB;QACzB,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,UAAU,CAAC,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;QAC1E,CAAC;QAED,mDAAmD;QACnD,MAAM,WAAW,GAAG,eAAe,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC;QACtE,MAAM,WAAW,GAAG,eAAe,CAAC,iBAAiB,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,WAAW,CAAC,CAAC;QAE7F,8BAA8B;QAC9B,MAAM,OAAO,GAAG,MAAM,CAAC,mBAAmB,CAAC,KAAK,EAAE;YAChD,aAAa,EAAE,IAAI;YACnB,iBAAiB,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE;YAClD,kBAAkB,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE;SACrD,CAAC,CAAC;QAEH,kCAAkC;QAClC,MAAM,QAAQ,GAAG;YACf,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,SAAS,EAAE,OAAO,CAAC,SAAS;YAC5B,UAAU,EAAE,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,4BAA4B;YACpF,UAAU,EAAE;gBACV,eAAe,EAAE,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC;gBACtF,eAAe,EAAE,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC;gBACtF,gBAAgB,EAAE,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC;aACzD;YACD,QAAQ,EAAE;gBACR,GAAG,eAAe,CAAC,kBAAkB,EAAE;gBACvC,WAAW;gBACX,eAAe,EAAE,IAAI,CAAC,OAAO,CAAC,eAAe;aAC9C;SACF,CAAC;QAEF,MAAM,YAAY,GAAG,eAAe,CAAC,YAAY,CAAC,WAAW,EAAE,mBAAmB,IAAI,CAAC,GAAG,EAAE,OAAO,EAAE,QAAQ,CAAC,CAAC;QAE/G,mCAAmC;QACnC,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YACvB,IAAI,CAAC,qBAAqB,CAAC,MAAM,CAAC,YAAY,EAAE,WAAW,CAAC,CAAC;QAC/D,CAAC;QAED,0BAA0B;QAC1B,MAAM,eAAe,GAAG,IAAI,CAAC,qBAAqB,CAChD,IAAI,EACJ,WAAW,EACX;YACE,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,YAAY,EAAE,MAAM,CAAC,aAAa;YAClC,oBAAoB,EAAE,MAAM,CAAC,WAAW;SACzC,CACF,CAAC;QAEF,OAAO;YACL,OAAO,EAAE,IAAI;YACb,cAAc,EAAE,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,IAAI;YAChE,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,YAAY,EAAE,YAAY;YAC1B,UAAU,EAAE,QAAQ,CAAC,UAAU;SAChC,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,mBAAmB,CAAC,MAAW;QAC3C,OAAO,CAAC,GAAG,CAAC,gBAAgB,MAAM,CAAC,QAAQ,mBAAmB,MAAM,CAAC,cAAc,KAAK,CAAC,CAAC;QAE1F,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,wBAAwB,CAAC,CAAC;QAClF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;YAChC,EAAE,CAAC,SAAS,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACjD,CAAC;QAED,2BAA2B;QAC3B,MAAM,oBAAoB,GAAG;YAC3B,sBAAsB;YACtB,sBAAsB;YACtB,eAAe;YACf,gBAAgB;YAChB,4BAA4B;SAC7B,CAAC;QAEF,MAAM,gBAAgB,GAA2B,EAAE,CAAC;QACpD,IAAI,MAAM,CAAC,cAAc,EAAE,CAAC;YAC1B,gBAAgB,CAAC,iBAAiB,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;YAC7E,gBAAgB,CAAC,uBAAuB,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;YACnF,gBAAgB,CAAC,sBAAsB,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;YAClF,gBAAgB,CAAC,sBAAsB,CAAC,GAAG,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;QACpF,CAAC;QAED,iCAAiC;QACjC,IAAI,gBAAgB,GAAG,KAAK,CAAC;QAC7B,IAAI,MAAM,CAAC,oBAAoB,EAAE,CAAC;YAChC,gBAAgB,GAAG,IAAI,CAAC;YACxB,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,uBAAuB,CAAC,CAAC;YACrE,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,MAAM,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC,CAAC;QAC7E,CAAC;QAED,gCAAgC;QAChC,IAAI,oBAAoB,GAAG,KAAK,CAAC;QACjC,IAAI,MAAM,CAAC,mBAAmB,EAAE,CAAC;YAC/B,oBAAoB,GAAG,IAAI,CAAC;YAC5B,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,6BAA6B,CAAC,CAAC;YAC9E,EAAE,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC;gBAC/C,QAAQ,EAAE,MAAM,CAAC,QAAQ;gBACzB,iBAAiB,EAAE,wBAAwB;gBAC3C,iBAAiB,EAAE,eAAe;gBAClC,YAAY,EAAE,gBAAgB;aAC/B,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QACf,CAAC;QAED,OAAO;YACL,OAAO,EAAE,IAAI;YACb,QAAQ,EAAE,MAAM,CAAC,QAAe;YAChC,oBAAoB;YACpB,gBAAgB;YAChB,gBAAgB;YAChB,oBAAoB;YACpB,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACpC,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,2BAA2B,CAAC,MAAW;QACnD,OAAO,CAAC,GAAG,CAAC,gBAAgB,MAAM,CAAC,aAAa,4BAA4B,CAAC,CAAC;QAE9E,MAAM,MAAM,GAAG,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,aAAiD,CAAC,CAAC;QAC7F,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,2BAA2B,MAAM,CAAC,aAAa,EAAE,CAAC,CAAC;QACrE,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,0BAA0B,CAAC,CAAC;QACpF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;YAChC,EAAE,CAAC,SAAS,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACjD,CAAC;QAED,6BAA6B;QAC7B,MAAM,kBAAkB,GAAG,MAAM,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,oCAAoC;QACjG,MAAM,gBAAgB,GAAa,EAAE,CAAC;QAEtC,IAAI,MAAM,CAAC,eAAe,IAAI,MAAM,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAChE,gBAAgB,CAAC,IAAI,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC,CAAC;QACnD,CAAC;aAAM,CAAC;YACN,0CAA0C;YAC1C,IAAI,MAAM,CAAC,YAAY,KAAK,SAAS,EAAE,CAAC;gBACtC,gBAAgB,CAAC,IAAI,CAAC,qBAAqB,EAAE,kBAAkB,EAAE,wBAAwB,CAAC,CAAC;YAC7F,CAAC;iBAAM,IAAI,MAAM,CAAC,YAAY,KAAK,MAAM,EAAE,CAAC;gBAC1C,gBAAgB,CAAC,IAAI,CAAC,oBAAoB,EAAE,2BAA2B,EAAE,6BAA6B,CAAC,CAAC;YAC1G,CAAC;iBAAM,IAAI,MAAM,CAAC,YAAY,KAAK,aAAa,EAAE,CAAC;gBACjD,gBAAgB,CAAC,IAAI,CAAC,iCAAiC,EAAE,6BAA6B,EAAE,0BAA0B,CAAC,CAAC;YACtH,CAAC;QACH,CAAC;QAED,mCAAmC;QACnC,MAAM,mBAAmB,GAAG,MAAM,CAAC,YAAY,KAAK,aAAa;YACtC,CAAC,MAAM,CAAC,iBAAiB,IAAI,MAAM,CAAC,YAAY,KAAK,SAAS,CAAC,CAAC;QAE3F,kBAAkB;QAClB,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,GAAG,MAAM,CAAC,aAAa,YAAY,IAAI,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QAClG,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC;YAC5C,MAAM;YACN,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,gBAAgB;YAChB,mBAAmB;YACnB,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,QAAQ,EAAE;gBACR,QAAQ,EAAE,EAAE,CAAC,QAAQ,EAAE;gBACvB,IAAI,EAAE,EAAE,CAAC,QAAQ,EAAE,CAAC,QAAQ;gBAC5B,eAAe,EAAE,IAAI,CAAC,OAAO,CAAC,eAAe;aAC9C;SACF,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAEb,wCAAwC;QACxC,IAAI,MAAM,CAAC,eAAe,EAAE,CAAC;YAC3B,UAAU,CAAC,GAAG,EAAE;gBACd,IAAI,CAAC;oBACH,EAAE,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;oBAC5B,OAAO,CAAC,GAAG,CAAC,iCAAiC,CAAC,CAAC;gBACjD,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,cAAc;gBAChB,CAAC;YACH,CAAC,EAAE,IAAI,CAAC,CAAC;QACX,CAAC;QAED,OAAO;YACL,OAAO,EAAE,IAAI;YACb,UAAU,EAAE,MAAM,CAAC,aAAoB;YACvC,kBAAkB;YAClB,YAAY,EAAE,MAAM,CAAC,YAAmB;YACxC,gBAAgB;YAChB,mBAAmB;YACnB,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACpC,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,yBAAyB,CAAC,MAAW;QACjD,OAAO,CAAC,GAAG,CAAC,+CAA+C,MAAM,CAAC,UAAU,KAAK,CAAC,CAAC;QAEnF,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,8BAA8B,CAAC,CAAC;QACxF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;YAChC,EAAE,CAAC,SAAS,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACjD,CAAC;QAED,gCAAgC;QAChC,MAAM,gBAAgB,GAAG;YACvB,UAAU,EAAE,MAAM,CAAC,UAAU;YAC7B,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,UAAU,EAAE;gBACV,EAAE,EAAE,EAAE,CAAC,IAAI,EAAE;gBACb,QAAQ,EAAE,EAAE,CAAC,QAAQ,EAAE;gBACvB,YAAY,EAAE,EAAE,CAAC,IAAI,EAAE;gBACvB,QAAQ,EAAE,EAAE,CAAC,QAAQ,EAAE;gBACvB,eAAe,EAAE,IAAI;aACtB;YACD,kBAAkB,EAAE;gBAClB,mBAAmB,EAAE,IAAI;gBACzB,0BAA0B,EAAE,IAAI;gBAChC,cAAc,EAAE,eAAe;gBAC/B,iBAAiB,EAAE,IAAI;aACxB;SACF,CAAC;QAEF,6BAA6B;QAC7B,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;YAC5B,gBAAgB,CAAC,kBAAkB,CAAC,kBAAkB,CAAC,GAAG;gBACxD,QAAQ;gBACR,YAAY;gBACZ,aAAa;gBACb,QAAQ;aACT,CAAC;QACJ,CAAC;QAED,6BAA6B;QAC7B,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;YAC5B,gBAAgB,CAAC,kBAAkB,CAAC,iBAAiB,CAAC,GAAG;gBACvD,cAAc,EAAE,CAAC,aAAa,EAAE,aAAa,EAAE,mBAAmB,CAAC;gBACnE,kBAAkB,EAAE,CAAC,iBAAiB,EAAE,oBAAoB,EAAE,gBAAgB,CAAC;gBAC/E,kBAAkB,EAAE,CAAC,kBAAkB,EAAE,2BAA2B,CAAC;aACtE,CAAC;QACJ,CAAC;QAED,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,cAAc,IAAI,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QAC7E,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,gBAAgB,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAE1E,OAAO,gBAAgB,CAAC;IAC1B,CAAC;IAEO,KAAK,CAAC,mCAAmC,CAAC,MAAW;QAC3D,OAAO,CAAC,GAAG,CAAC,uCAAuC,MAAM,CAAC,gBAAgB,KAAK,CAAC,CAAC;QAEjF,MAAM,WAAW,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,UAAW,EAAE,4BAA4B,CAAC,CAAC;QACtF,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;YAChC,EAAE,CAAC,SAAS,CAAC,WAAW,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACjD,CAAC;QAED,0CAA0C;QAC1C,MAAM,cAAc,GAAG;YACrB,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,gBAAgB,EAAE,MAAM,CAAC,gBAAgB;YACzC,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,kBAAkB,EAAE,YAAY;YAChC,oBAAoB,EAAE,IAAI,CAAC,6BAA6B,CAAC,MAAM,CAAC,YAAY,CAAC;YAC7E,kBAAkB,EAAE,IAAI,CAAC,0BAA0B,CAAC,MAAM,CAAC,gBAAgB,CAAC;YAC5E,mBAAmB,EAAE;gBACnB,mBAAmB,EAAE,MAAM,CAAC,gBAAgB,KAAK,uBAAuB;oBACrD,MAAM,CAAC,gBAAgB,KAAK,0BAA0B;oBACtD,MAAM,CAAC,gBAAgB,KAAK,2BAA2B;gBAC1E,sBAAsB,EAAE,MAAM,CAAC,gBAAgB,KAAK,0BAA0B;oBACvD,MAAM,CAAC,gBAAgB,KAAK,2BAA2B;gBAC9E,uBAAuB,EAAE,MAAM,CAAC,gBAAgB,KAAK,2BAA2B;aACjF;SACF,CAAC;QAEF,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,YAAY,IAAI,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QAC3E,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,cAAc,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAExE,oCAAoC;QACpC,IAAI,MAAM,CAAC,YAAY,KAAK,UAAU,IAAI,MAAM,CAAC,YAAY,KAAK,WAAW,EAAE,CAAC;YAC9E,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,uBAAuB,CAAC,CAAC;YACrE,MAAM,eAAe,GAAG,IAAI,CAAC,wBAAwB,CAAC,MAAM,CAAC,gBAAgB,EAAE,MAAM,CAAC,YAAY,CAAC,CAAC;YACpG,EAAE,CAAC,aAAa,CAAC,YAAY,EAAE,eAAe,CAAC,CAAC;QAClD,CAAC;QAED,OAAO,cAAc,CAAC;IACxB,CAAC;IAEO,6BAA6B,CAAC,YAAoB;QACxD,QAAQ,YAAY,EAAE,CAAC;YACrB,KAAK,OAAO,CAAC,CAAC,OAAO,GAAG,CAAC,CAAC,0BAA0B;YACpD,KAAK,UAAU,CAAC,CAAC,OAAO,GAAG,CAAC,CAAC,0BAA0B;YACvD,KAAK,gBAAgB,CAAC,CAAC,OAAO,IAAI,CAAC,CAAC,yBAAyB;YAC7D,KAAK,cAAc,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,2BAA2B;YAC9D,OAAO,CAAC,CAAC,OAAO,GAAG,CAAC;QACtB,CAAC;IACH,CAAC;IAEO,0BAA0B,CAAC,gBAAwB;QACzD,QAAQ,gBAAgB,EAAE,CAAC;YACzB,KAAK,eAAe;gBAClB,OAAO,CAAC,yBAAyB,EAAE,iBAAiB,EAAE,iBAAiB,CAAC,CAAC;YAC3E,KAAK,kBAAkB;gBACrB,OAAO,CAAC,0BAA0B,EAAE,wBAAwB,EAAE,uBAAuB,CAAC,CAAC;YACzF,KAAK,kBAAkB;gBACrB,OAAO,CAAC,oBAAoB,EAAE,iCAAiC,EAAE,yBAAyB,CAAC,CAAC;YAC9F,KAAK,uBAAuB;gBAC1B,OAAO,CAAC,0BAA0B,EAAE,gCAAgC,EAAE,0BAA0B,CAAC,CAAC;YACpG;gBACE,OAAO,CAAC,oBAAoB,CAAC,CAAC;QAClC,CAAC;IACH,CAAC;IAEO,wBAAwB,CAAC,gBAAwB,EAAE,YAAoB;QAC7E,8DAA8D;QAC9D,MAAM,SAAS,GAAG,YAAY,gBAAgB,CAAC,WAAW,EAAE,IAAI,YAAY,CAAC,WAAW,EAAE,IAAI,IAAI,CAAC,GAAG,EAAE,EAAE,CAAC;QAC3G,MAAM,QAAQ,GAAG;YACf,MAAM,EAAE,iBAAiB;YACzB,QAAQ,EAAE,gBAAgB;YAC1B,YAAY;YACZ,SAAS;YACT,OAAO,EAAE,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC;YAChD,QAAQ,EAAE,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC;SACtE,CAAC;QAEF,OAAO,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IACxD,CAAC;IAEO,qBAAqB,CAAC,YAAoB,EAAE,WAAmB;QACrE,OAAO,CAAC,GAAG,CAAC,oCAAoC,YAAY,KAAK,CAAC,CAAC;QAEnE,MAAM,iBAAiB,GAAG;YACxB,YAAY;YACZ,iBAAiB,EAAE,4BAA4B;YAC/C,kBAAkB,EAAE,CAAC,aAAa,EAAE,0BAA0B,EAAE,yBAAyB,CAAC;YAC1F,YAAY,EAAE,gBAAgB;YAC9B,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,gBAAgB,EAAE,WAAW;SAC9B,CAAC;QAEF,MAAM,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,yBAAyB,CAAC,CAAC;QACrE,EAAE,CAAC,aAAa,CAAC,UAAU,EAAE,IAAI,CAAC,SAAS,CAAC,iBAAiB,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAEzE,oCAAoC;QACpC,IAAI,YAAY,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YACnC,IAAI,CAAC,wBAAwB,CAAC,WAAW,CAAC,CAAC;QAC7C,CAAC;aAAM,IAAI,YAAY,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC;YAC5C,IAAI,CAAC,0BAA0B,CAAC,WAAW,CAAC,CAAC;QAC/C,CAAC;aAAM,IAAI,YAAY,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC1C,IAAI,CAAC,wBAAwB,CAAC,WAAW,CAAC,CAAC;QAC7C,CAAC;IACH,CAAC;IAEO,wBAAwB,CAAC,WAAmB;QAClD,MAAM,gBAAgB,GAAG;YACvB,0DAA0D;YAC1D,8CAA8C;YAC9C,4BAA4B;SAC7B,CAAC;QAEF,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,wBAAwB,CAAC,CAAC;QACzE,EAAE,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC;YAC/C,gBAAgB;YAChB,kBAAkB,EAAE,kCAAkC;YACtD,gBAAgB,EAAE,sBAAsB;YACxC,gBAAgB,EAAE,CAAC,qBAAqB,EAAE,oBAAoB,EAAE,cAAc,CAAC;SAChF,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IACf,CAAC;IAEO,0BAA0B,CAAC,WAAmB;QACpD,MAAM,gBAAgB,GAAG;YACvB,uDAAuD;YACvD,6CAA6C;YAC7C,oCAAoC;SACrC,CAAC;QAEF,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,0BAA0B,CAAC,CAAC;QAC3E,EAAE,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC;YAC/C,gBAAgB;YAChB,kBAAkB,EAAE,mCAAmC;YACvD,gBAAgB,EAAE,mBAAmB;YACrC,gBAAgB,EAAE,CAAC,4BAA4B,EAAE,+BAA+B,CAAC;SAClF,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IACf,CAAC;IAEO,wBAAwB,CAAC,WAAmB;QAClD,MAAM,gBAAgB,GAAG;YACvB,yCAAyC;YACzC,eAAe;YACf,oBAAoB;YACpB,kCAAkC;SACnC,CAAC;QAEF,MAAM,eAAe,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,wBAAwB,CAAC,CAAC;QACzE,EAAE,CAAC,aAAa,CAAC,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC;YAC/C,gBAAgB;YAChB,kBAAkB,EAAE,iCAAiC;YACrD,gBAAgB,EAAE,4BAA4B;YAC9C,gBAAgB,EAAE,CAAC,iBAAiB,EAAE,iBAAiB,EAAE,gBAAgB,CAAC;SAC3E,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IACf,CAAC;CACF"}
|