hazo_auth 1.6.4 → 1.6.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (36) hide show
  1. package/README.md +46 -1
  2. package/SETUP_CHECKLIST.md +70 -4
  3. package/dist/app/api/hazo_auth/user_management/permissions/route.d.ts +50 -0
  4. package/dist/app/api/hazo_auth/user_management/permissions/route.d.ts.map +1 -0
  5. package/dist/app/api/hazo_auth/user_management/permissions/route.js +257 -0
  6. package/dist/app/api/hazo_auth/user_management/roles/route.d.ts +40 -0
  7. package/dist/app/api/hazo_auth/user_management/roles/route.d.ts.map +1 -0
  8. package/dist/app/api/hazo_auth/user_management/roles/route.js +352 -0
  9. package/dist/app/api/hazo_auth/user_management/users/roles/route.d.ts +37 -0
  10. package/dist/app/api/hazo_auth/user_management/users/roles/route.d.ts.map +1 -0
  11. package/dist/app/api/hazo_auth/user_management/users/roles/route.js +276 -0
  12. package/dist/app/api/hazo_auth/user_management/users/route.d.ts +39 -0
  13. package/dist/app/api/hazo_auth/user_management/users/route.d.ts.map +1 -0
  14. package/dist/app/api/hazo_auth/user_management/users/route.js +170 -0
  15. package/dist/cli/generate.d.ts.map +1 -1
  16. package/dist/cli/generate.js +38 -5
  17. package/dist/cli/validate.d.ts.map +1 -1
  18. package/dist/cli/validate.js +14 -0
  19. package/dist/components/layouts/user_management/index.js +9 -9
  20. package/dist/server/routes/index.d.ts +4 -0
  21. package/dist/server/routes/index.d.ts.map +1 -1
  22. package/dist/server/routes/index.js +5 -0
  23. package/dist/server/routes/user_management_permissions.d.ts +2 -0
  24. package/dist/server/routes/user_management_permissions.d.ts.map +1 -0
  25. package/dist/server/routes/user_management_permissions.js +2 -0
  26. package/dist/server/routes/user_management_roles.d.ts +2 -0
  27. package/dist/server/routes/user_management_roles.d.ts.map +1 -0
  28. package/dist/server/routes/user_management_roles.js +2 -0
  29. package/dist/server/routes/user_management_users.d.ts +2 -0
  30. package/dist/server/routes/user_management_users.d.ts.map +1 -0
  31. package/dist/server/routes/user_management_users.js +2 -0
  32. package/dist/server/routes/user_management_users_roles.d.ts +2 -0
  33. package/dist/server/routes/user_management_users_roles.d.ts.map +1 -0
  34. package/dist/server/routes/user_management_users_roles.js +2 -0
  35. package/hazo_auth_config.example.ini +1 -1
  36. package/package.json +1 -1
package/README.md CHANGED
@@ -648,7 +648,52 @@ export default async function LoginPage() {
648
648
  - `ResetPasswordLayout` - Set new password with token
649
649
  - `EmailVerificationLayout` - Verify email address
650
650
  - `MySettingsLayout` - User profile and settings
651
- - `UserManagementLayout` - Admin user/role management
651
+ - `UserManagementLayout` - Admin user/role management (requires user_management API routes)
652
+
653
+ ### User Management Component
654
+
655
+ The `UserManagementLayout` component provides a comprehensive admin interface for managing users, roles, and permissions. It requires the user_management API routes to be set up in your project.
656
+
657
+ **Required Permissions:**
658
+ - `admin_user_management` - Access to Users tab
659
+ - `admin_role_management` - Access to Roles tab
660
+ - `admin_permission_management` - Access to Permissions tab
661
+
662
+ **Required API Routes:**
663
+ The `UserManagementLayout` component requires the following API routes to be created in your project:
664
+
665
+ ```typescript
666
+ // app/api/hazo_auth/user_management/users/route.ts
667
+ export { GET, PATCH, POST } from "hazo_auth/server/routes";
668
+
669
+ // app/api/hazo_auth/user_management/permissions/route.ts
670
+ export { GET, POST, PUT, DELETE } from "hazo_auth/server/routes";
671
+
672
+ // app/api/hazo_auth/user_management/roles/route.ts
673
+ export { GET, POST, PUT } from "hazo_auth/server/routes";
674
+
675
+ // app/api/hazo_auth/user_management/users/roles/route.ts
676
+ export { GET, POST, PUT } from "hazo_auth/server/routes";
677
+ ```
678
+
679
+ **Note:** These routes are automatically created when you run `npx hazo_auth generate-routes`. The routes handle:
680
+ - **Users:** List users, deactivate users, send password reset emails
681
+ - **Permissions:** List permissions (from DB and config), migrate config permissions to DB, create/update/delete permissions
682
+ - **Roles:** List roles with permissions, create roles, update role-permission assignments
683
+ - **User Roles:** Get user roles, assign roles to users, bulk update user role assignments
684
+
685
+ **Example Usage:**
686
+
687
+ ```tsx
688
+ // app/hazo_auth/user_management/page.tsx
689
+ import { UserManagementLayout } from "hazo_auth/components/layouts/user_management";
690
+
691
+ export default function UserManagementPage() {
692
+ return <UserManagementLayout />;
693
+ }
694
+ ```
695
+
696
+ The component automatically shows/hides tabs based on the user's permissions, so users will only see the tabs they have access to.
652
697
 
653
698
  **Shared Components:**
654
699
  - `ProfilePicMenu` / `ProfilePicMenuWrapper` - Navbar profile menu
@@ -392,6 +392,41 @@ SELECT table_name FROM information_schema.tables WHERE table_name LIKE 'hazo_%';
392
392
 
393
393
  ---
394
394
 
395
+ ## Phase 3.1: Configure Default Permissions (Optional)
396
+
397
+ The `hazo_auth_config.ini` file includes default permissions that will be available in the Permissions tab. These defaults are already configured when you run `npx hazo_auth init`.
398
+
399
+ **Default permissions included:**
400
+ - `admin_user_management`
401
+ - `admin_role_management`
402
+ - `admin_permission_management`
403
+
404
+ **To customize permissions:**
405
+
406
+ Edit `hazo_auth_config.ini`:
407
+ ```ini
408
+ [hazo_auth__user_management]
409
+ application_permission_list_defaults = admin_user_management,admin_role_management,admin_permission_management
410
+ ```
411
+
412
+ **To initialize permissions and create a super user:**
413
+
414
+ After setting up your database and configuring permissions, you can run:
415
+ ```bash
416
+ npm run init-users
417
+ ```
418
+
419
+ This script will:
420
+ 1. Create all permissions from `application_permission_list_defaults`
421
+ 2. Create a `default_super_user_role` role with all permissions
422
+ 3. Assign the role to the user specified in `default_super_user_email` (configure in `[hazo_auth__initial_setup]` section)
423
+
424
+ **Checklist:**
425
+ - [ ] Default permissions configured in `hazo_auth_config.ini` (already set by default)
426
+ - [ ] `default_super_user_email` configured if you want to use `init-users` script
427
+
428
+ ---
429
+
395
430
  ## Phase 4: API Routes
396
431
 
397
432
  Create API route files in your project. Each file re-exports handlers from hazo_auth.
@@ -427,8 +462,14 @@ app/api/hazo_auth/
427
462
  ├── library_photos/route.ts
428
463
  ├── get_auth/route.ts
429
464
  ├── validate_reset_token/route.ts
430
- └── profile_picture/
431
- └── [filename]/route.ts
465
+ ├── profile_picture/
466
+ └── [filename]/route.ts
467
+ └── user_management/
468
+ ├── users/route.ts
469
+ ├── permissions/route.ts
470
+ ├── roles/route.ts
471
+ └── users/
472
+ └── roles/route.ts
432
473
  ```
433
474
 
434
475
  **Example route file content:**
@@ -513,9 +554,34 @@ export { POST } from "hazo_auth/server/routes/validate_reset_token";
513
554
  export { GET } from "hazo_auth/server/routes/profile_picture_filename";
514
555
  ```
515
556
 
557
+ **User Management routes (optional - required if using UserManagementLayout):**
558
+
559
+ `app/api/hazo_auth/user_management/users/route.ts`:
560
+ ```typescript
561
+ export { GET, PATCH, POST } from "hazo_auth/server/routes";
562
+ ```
563
+
564
+ `app/api/hazo_auth/user_management/permissions/route.ts`:
565
+ ```typescript
566
+ export { GET, POST, PUT, DELETE } from "hazo_auth/server/routes";
567
+ ```
568
+
569
+ `app/api/hazo_auth/user_management/roles/route.ts`:
570
+ ```typescript
571
+ export { GET, POST, PUT } from "hazo_auth/server/routes";
572
+ ```
573
+
574
+ `app/api/hazo_auth/user_management/users/roles/route.ts`:
575
+ ```typescript
576
+ export { GET, POST, PUT } from "hazo_auth/server/routes";
577
+ ```
578
+
579
+ **Note:** The `generate-routes` command automatically creates all user_management routes. These routes are required if you plan to use the `UserManagementLayout` component for managing users, roles, and permissions.
580
+
516
581
  **Checklist:**
517
- - [ ] All 16 API route files created
518
- - [ ] Each file exports the correct HTTP method (POST, GET, PATCH, DELETE)
582
+ - [ ] All 16 core API route files created
583
+ - [ ] User management routes created (if using UserManagementLayout)
584
+ - [ ] Each file exports the correct HTTP method (POST, GET, PATCH, DELETE, PUT)
519
585
 
520
586
  ---
521
587
 
@@ -0,0 +1,50 @@
1
+ import { NextRequest, NextResponse } from "next/server";
2
+ export declare const dynamic = "force-dynamic";
3
+ /**
4
+ * GET - Fetch all permissions from database and config
5
+ */
6
+ export declare function GET(request: NextRequest): Promise<NextResponse<{
7
+ error: string;
8
+ }> | NextResponse<{
9
+ success: boolean;
10
+ db_permissions: {
11
+ id: unknown;
12
+ permission_name: unknown;
13
+ description: {};
14
+ }[];
15
+ config_permissions: string[];
16
+ }>>;
17
+ /**
18
+ * POST - Create new permission or migrate config permissions to database
19
+ */
20
+ export declare function POST(request: NextRequest): Promise<NextResponse<{
21
+ success: boolean;
22
+ created: string[];
23
+ skipped: string[];
24
+ }> | NextResponse<{
25
+ error: string;
26
+ }> | NextResponse<{
27
+ success: boolean;
28
+ permission: {
29
+ id: number;
30
+ permission_name: string;
31
+ description: any;
32
+ };
33
+ }>>;
34
+ /**
35
+ * PUT - Update permission description
36
+ */
37
+ export declare function PUT(request: NextRequest): Promise<NextResponse<{
38
+ error: string;
39
+ }> | NextResponse<{
40
+ success: boolean;
41
+ }>>;
42
+ /**
43
+ * DELETE - Delete permission from database
44
+ */
45
+ export declare function DELETE(request: NextRequest): Promise<NextResponse<{
46
+ error: string;
47
+ }> | NextResponse<{
48
+ success: boolean;
49
+ }>>;
50
+ //# sourceMappingURL=route.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"route.d.ts","sourceRoot":"","sources":["../../../../../../src/app/api/hazo_auth/user_management/permissions/route.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,WAAW,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AAQxD,eAAO,MAAM,OAAO,kBAAkB,CAAC;AAGvC;;GAEG;AACH,wBAAsB,GAAG,CAAC,OAAO,EAAE,WAAW;;;;;;;;;;IAgE7C;AAED;;GAEG;AACH,wBAAsB,IAAI,CAAC,OAAO,EAAE,WAAW;;;;;;;;;;;;;IAyJ9C;AAED;;GAEG;AACH,wBAAsB,GAAG,CAAC,OAAO,EAAE,WAAW;;;;IAkD7C;AAED;;GAEG;AACH,wBAAsB,MAAM,CAAC,OAAO,EAAE,WAAW;;;;IAmEhD"}
@@ -0,0 +1,257 @@
1
+ // file_description: API route for permissions management operations (list, migrate from config, update, delete)
2
+ // section: imports
3
+ import { NextResponse } from "next/server";
4
+ import { get_hazo_connect_instance } from "../../../../../lib/hazo_connect_instance.server";
5
+ import { createCrudService } from "hazo_connect/server";
6
+ import { create_app_logger } from "../../../../../lib/app_logger";
7
+ import { get_filename, get_line_number } from "../../../../../lib/utils/api_route_helpers";
8
+ import { get_user_management_config } from "../../../../../lib/user_management_config.server";
9
+ // section: route_config
10
+ export const dynamic = 'force-dynamic';
11
+ // section: api_handler
12
+ /**
13
+ * GET - Fetch all permissions from database and config
14
+ */
15
+ export async function GET(request) {
16
+ const logger = create_app_logger();
17
+ try {
18
+ const hazoConnect = get_hazo_connect_instance();
19
+ const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
20
+ // Fetch all permissions from database (empty object means no filter - get all records)
21
+ const db_permissions = await permissions_service.findBy({});
22
+ if (!Array.isArray(db_permissions)) {
23
+ return NextResponse.json({ error: "Failed to fetch permissions" }, { status: 500 });
24
+ }
25
+ // Get config permissions
26
+ const config = get_user_management_config();
27
+ const config_permission_names = config.application_permission_list_defaults || [];
28
+ // Get DB permission names
29
+ const db_permission_names = db_permissions.map((p) => p.permission_name);
30
+ // Find config permissions not in DB
31
+ const config_only_permissions = config_permission_names.filter((name) => !db_permission_names.includes(name));
32
+ logger.info("user_management_permissions_fetched", {
33
+ filename: get_filename(),
34
+ line_number: get_line_number(),
35
+ db_count: db_permissions.length,
36
+ config_count: config_permission_names.length,
37
+ });
38
+ return NextResponse.json({
39
+ success: true,
40
+ db_permissions: db_permissions.map((p) => ({
41
+ id: p.id,
42
+ permission_name: p.permission_name,
43
+ description: p.description || "",
44
+ })),
45
+ config_permissions: config_only_permissions,
46
+ }, { status: 200 });
47
+ }
48
+ catch (error) {
49
+ const error_message = error instanceof Error ? error.message : "Unknown error";
50
+ const error_stack = error instanceof Error ? error.stack : undefined;
51
+ logger.error("user_management_permissions_fetch_error", {
52
+ filename: get_filename(),
53
+ line_number: get_line_number(),
54
+ error_message,
55
+ error_stack,
56
+ });
57
+ return NextResponse.json({ error: "Failed to fetch permissions" }, { status: 500 });
58
+ }
59
+ }
60
+ /**
61
+ * POST - Create new permission or migrate config permissions to database
62
+ */
63
+ export async function POST(request) {
64
+ const logger = create_app_logger();
65
+ try {
66
+ const { searchParams } = new URL(request.url);
67
+ const action = searchParams.get("action");
68
+ // Handle migrate action
69
+ if (action === "migrate") {
70
+ const hazoConnect = get_hazo_connect_instance();
71
+ const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
72
+ // Get config permissions
73
+ const config = get_user_management_config();
74
+ const config_permission_names = config.application_permission_list_defaults || [];
75
+ if (config_permission_names.length === 0) {
76
+ return NextResponse.json({
77
+ success: true,
78
+ message: "No permissions to migrate",
79
+ created: [],
80
+ skipped: [],
81
+ }, { status: 200 });
82
+ }
83
+ // Get existing permissions from DB (empty object means no filter - get all records)
84
+ const db_permissions = await permissions_service.findBy({});
85
+ const db_permission_names = Array.isArray(db_permissions)
86
+ ? db_permissions.map((p) => p.permission_name)
87
+ : [];
88
+ const now = new Date().toISOString();
89
+ const created = [];
90
+ const skipped = [];
91
+ // Migrate each config permission
92
+ for (const permission_name of config_permission_names) {
93
+ if (db_permission_names.includes(permission_name)) {
94
+ // Skip if already exists
95
+ skipped.push(permission_name);
96
+ continue;
97
+ }
98
+ // Create new permission
99
+ await permissions_service.insert({
100
+ permission_name: permission_name.trim(),
101
+ description: "",
102
+ created_at: now,
103
+ changed_at: now,
104
+ });
105
+ created.push(permission_name);
106
+ }
107
+ logger.info("user_management_permissions_migrated", {
108
+ filename: get_filename(),
109
+ line_number: get_line_number(),
110
+ created_count: created.length,
111
+ skipped_count: skipped.length,
112
+ });
113
+ return NextResponse.json({
114
+ success: true,
115
+ created,
116
+ skipped,
117
+ }, { status: 200 });
118
+ }
119
+ // Handle create new permission
120
+ const body = await request.json();
121
+ const { permission_name, description } = body;
122
+ if (!permission_name || typeof permission_name !== "string" || permission_name.trim().length === 0) {
123
+ return NextResponse.json({ error: "permission_name is required and must be a non-empty string" }, { status: 400 });
124
+ }
125
+ const hazoConnect = get_hazo_connect_instance();
126
+ const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
127
+ // Check if permission already exists
128
+ const existing_permissions = await permissions_service.findBy({
129
+ permission_name: permission_name.trim(),
130
+ });
131
+ if (Array.isArray(existing_permissions) && existing_permissions.length > 0) {
132
+ return NextResponse.json({ error: "Permission with this name already exists" }, { status: 409 });
133
+ }
134
+ // Create new permission
135
+ const now = new Date().toISOString();
136
+ const new_permission_result = await permissions_service.insert({
137
+ permission_name: permission_name.trim(),
138
+ description: (description || "").trim(),
139
+ created_at: now,
140
+ changed_at: now,
141
+ });
142
+ // insert() returns an array, get the first element
143
+ if (!Array.isArray(new_permission_result) || new_permission_result.length === 0) {
144
+ return NextResponse.json({ error: "Failed to create permission - no record returned" }, { status: 500 });
145
+ }
146
+ const new_permission = new_permission_result[0];
147
+ logger.info("user_management_permission_created", {
148
+ filename: get_filename(),
149
+ line_number: get_line_number(),
150
+ permission_id: new_permission.id,
151
+ permission_name: permission_name.trim(),
152
+ });
153
+ return NextResponse.json({
154
+ success: true,
155
+ permission: {
156
+ id: new_permission.id,
157
+ permission_name: permission_name.trim(),
158
+ description: (description || "").trim(),
159
+ },
160
+ }, { status: 201 });
161
+ }
162
+ catch (error) {
163
+ const error_message = error instanceof Error ? error.message : "Unknown error";
164
+ const error_stack = error instanceof Error ? error.stack : undefined;
165
+ logger.error("user_management_permissions_post_error", {
166
+ filename: get_filename(),
167
+ line_number: get_line_number(),
168
+ error_message,
169
+ error_stack,
170
+ });
171
+ return NextResponse.json({ error: "Failed to create permission" }, { status: 500 });
172
+ }
173
+ }
174
+ /**
175
+ * PUT - Update permission description
176
+ */
177
+ export async function PUT(request) {
178
+ const logger = create_app_logger();
179
+ try {
180
+ const body = await request.json();
181
+ const { permission_id, description } = body;
182
+ if (!permission_id || typeof description !== "string") {
183
+ return NextResponse.json({ error: "permission_id and description are required" }, { status: 400 });
184
+ }
185
+ const hazoConnect = get_hazo_connect_instance();
186
+ const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
187
+ // Update permission with changed_at timestamp
188
+ const now = new Date().toISOString();
189
+ await permissions_service.updateById(permission_id, {
190
+ description: description.trim(),
191
+ changed_at: now,
192
+ });
193
+ logger.info("user_management_permission_updated", {
194
+ filename: get_filename(),
195
+ line_number: get_line_number(),
196
+ permission_id,
197
+ });
198
+ return NextResponse.json({ success: true }, { status: 200 });
199
+ }
200
+ catch (error) {
201
+ const error_message = error instanceof Error ? error.message : "Unknown error";
202
+ const error_stack = error instanceof Error ? error.stack : undefined;
203
+ logger.error("user_management_permission_update_error", {
204
+ filename: get_filename(),
205
+ line_number: get_line_number(),
206
+ error_message,
207
+ error_stack,
208
+ });
209
+ return NextResponse.json({ error: "Failed to update permission" }, { status: 500 });
210
+ }
211
+ }
212
+ /**
213
+ * DELETE - Delete permission from database
214
+ */
215
+ export async function DELETE(request) {
216
+ const logger = create_app_logger();
217
+ try {
218
+ const { searchParams } = new URL(request.url);
219
+ const permission_id = searchParams.get("permission_id");
220
+ if (!permission_id) {
221
+ return NextResponse.json({ error: "permission_id is required" }, { status: 400 });
222
+ }
223
+ const permission_id_num = parseInt(permission_id, 10);
224
+ if (isNaN(permission_id_num)) {
225
+ return NextResponse.json({ error: "permission_id must be a number" }, { status: 400 });
226
+ }
227
+ const hazoConnect = get_hazo_connect_instance();
228
+ const permissions_service = createCrudService(hazoConnect, "hazo_permissions");
229
+ const role_permissions_service = createCrudService(hazoConnect, "hazo_role_permissions");
230
+ // Check if permission is used in any role
231
+ const role_permissions = await role_permissions_service.findBy({
232
+ permission_id: permission_id_num,
233
+ });
234
+ if (Array.isArray(role_permissions) && role_permissions.length > 0) {
235
+ return NextResponse.json({ error: "Cannot delete permission that is assigned to roles" }, { status: 409 });
236
+ }
237
+ // Delete permission
238
+ await permissions_service.deleteById(permission_id_num);
239
+ logger.info("user_management_permission_deleted", {
240
+ filename: get_filename(),
241
+ line_number: get_line_number(),
242
+ permission_id: permission_id_num,
243
+ });
244
+ return NextResponse.json({ success: true }, { status: 200 });
245
+ }
246
+ catch (error) {
247
+ const error_message = error instanceof Error ? error.message : "Unknown error";
248
+ const error_stack = error instanceof Error ? error.stack : undefined;
249
+ logger.error("user_management_permission_delete_error", {
250
+ filename: get_filename(),
251
+ line_number: get_line_number(),
252
+ error_message,
253
+ error_stack,
254
+ });
255
+ return NextResponse.json({ error: "Failed to delete permission" }, { status: 500 });
256
+ }
257
+ }
@@ -0,0 +1,40 @@
1
+ import { NextRequest, NextResponse } from "next/server";
2
+ export declare const dynamic = "force-dynamic";
3
+ /**
4
+ * GET - Fetch all roles with their permissions
5
+ */
6
+ export declare function GET(request: NextRequest): Promise<NextResponse<{
7
+ error: string;
8
+ }> | NextResponse<{
9
+ success: boolean;
10
+ roles: {
11
+ role_id: unknown;
12
+ role_name: unknown;
13
+ permissions: string[];
14
+ }[];
15
+ permissions: {
16
+ id: unknown;
17
+ permission_name: unknown;
18
+ }[];
19
+ }>>;
20
+ /**
21
+ * POST - Create new role
22
+ */
23
+ export declare function POST(request: NextRequest): Promise<NextResponse<{
24
+ error: string;
25
+ }> | NextResponse<{
26
+ success: boolean;
27
+ role: {
28
+ role_id: number;
29
+ role_name: string;
30
+ };
31
+ }>>;
32
+ /**
33
+ * PUT - Update role permissions (save role-permission matrix)
34
+ */
35
+ export declare function PUT(request: NextRequest): Promise<NextResponse<{
36
+ error: string;
37
+ }> | NextResponse<{
38
+ success: boolean;
39
+ }>>;
40
+ //# sourceMappingURL=route.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"route.d.ts","sourceRoot":"","sources":["../../../../../../src/app/api/hazo_auth/user_management/roles/route.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,WAAW,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AASxD,eAAO,MAAM,OAAO,kBAAkB,CAAC;AAGvC;;GAEG;AACH,wBAAsB,GAAG,CAAC,OAAO,EAAE,WAAW;;;;;;;;;;;;;IAqF7C;AAED;;GAEG;AACH,wBAAsB,IAAI,CAAC,OAAO,EAAE,WAAW;;;;;;;;IAgF9C;AAED;;GAEG;AACH,wBAAsB,GAAG,CAAC,OAAO,EAAE,WAAW;;;;IAwP7C"}