UNPKG

@iotize/tap

Version:

IoTize Device client for Javascript

299 lines 24.2 kB
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } return new (P || (P = Promise))(function (resolve, reject) { function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } step((generator = generator.apply(thisArg, _arguments || [])).next()); }); }; import './tap-encryption-extension'; // Imports... import '@iotize/tap/service/impl/group'; import '@iotize/tap/service/impl/interface'; import { bufferToHexString } from '@iotize/common/byte-converter'; import { KaitaiStreamWriter } from '@iotize/common/byte-stream'; import { TapError } from '@iotize/tap'; import { StringConverter } from '@iotize/tap/client/impl'; import { hmacSHA256, pbkdf2 } from '@iotize/tap/crypto'; import { isCodeError } from '@iotize/common/error'; import { debug } from './debug'; import { TapAuthError } from './tap-auth-error'; import { hashLoginPassword, XOR } from './utility'; const TAG = 'Scram'; export function DEFAULT_SCRAM_SALT_GENERATOR() { const data = new Array(ScramAuth.USER_SALT_SIZE).fill(0).map((_) => { return Math.floor(Math.random() * 0xff); }); // To be 100% sure that salt will never be [0,0,0,0] which will disable login for the user if (data[0] === 0) { data[0] = 1; } return Uint8Array.from(data); } export class ScramAuth { // protected _sessionState!: BehaviorSubject<SessionState>; // /** // * Listen to session state changed // */ // public get sessionState(): Observable<SessionState> { // return this._sessionState.asObservable(); // } // /** // * Get current session state // */ // public get sessionStateSnapshot(): SessionState { // return this._sessionState.value; // } constructor(tap) { this.tap = tap; this.nonceGenerator = () => { return Math.floor(Math.random() * 0xffffffff); }; this.saltGenerator = DEFAULT_SCRAM_SALT_GENERATOR; // this.sessionData = {}; } // async changeCurrentUserPassword(newPassword: string): Promise<void> { // let groupId = (await this.device.service.interface.getCurrentGroupId()).body()!; // if (!this.sessionData.options || !groupId){ // throw new AuthError(AuthError.Code.NOT_LOGGED_IN, 'Cannot change password, your are not logged in'); // } // let newPasswordKey: Uint8Array = ScramAuth.createScramPasswordKey(newPassword, this.sessionData.options); // (await this.device.service.group.changePasswordKey(groupId, newPasswordKey)).successful(); // } // /** // * Enable/Disable scram for this tap // * @param enabled // */ // async enable(enabled = true): Promise<void> { // const lockInfo = (await this.device.service.interface.getSecurityOptions()).body(); // if (lockInfo.scramActivated === enabled) { // return; // } // lockInfo.scramActivated = enabled; // if (enabled) { // lockInfo.hashPassword = true; // } // (await this.device.service.interface.putSecurityOptions(lockInfo)).successful(); // } changePassword(newPassword, groupId, salt = this.saltGenerator()) { return __awaiter(this, void 0, void 0, function* () { const options = { iterationNumber: (yield this.tap.service.scram.getHashIteration()).body(), salt, }; const newPasswordKey = ScramAuth.createScramPasswordKey(newPassword, options); debug(TAG, `Changing password key: ${bufferToHexString(newPasswordKey)} salt=${bufferToHexString(salt)}; iteration=${options.iterationNumber} for user id "${groupId}"`); (yield this.tap.service.group.changePasswordKey(groupId, newPasswordKey)).successful(); }); } /** * Perform login * * @param params * * @throws Error if scram is not activated */ login(params) { return __awaiter(this, void 0, void 0, function* () { const clientNonce = this.generateNonce(); debug(TAG, 'clientNonce', clientNonce); const loginParams = { username: params.username, clientNonce, }; const loginBody = (yield this.tap.service.scram.login(loginParams)).body(); const keys = ScramAuth.computeKeys(params, loginBody, clientNonce); const sessionData = {}; sessionData.storedKey = keys.storedKey; sessionData.serverKey = keys.serverKey; const serverNonce = loginBody.serverNonce; const deviceServerProof = (yield this.tap.service.scram.loginProof(keys.clientProof)).body(); const expectedServerProof = keys.serverProof; // TODO maybe we can find something better to test array equals ... if (bufferToHexString(expectedServerProof) !== bufferToHexString(deviceServerProof)) { throw new TapAuthError.InvalidServerKey(expectedServerProof, deviceServerProof); } sessionData.clientNonce = clientNonce; sessionData.key = ScramAuth.computeSessionKey(clientNonce, serverNonce, loginBody.salt, keys.serverKey, keys.storedKey); return sessionData; }); } static createScramPasswordKey(newPassword, options) { const keys = ScramAuth.computeBaseKeys(newPassword, options); const saltCopy = new Uint8Array(options.salt); const buffer = KaitaiStreamWriter.create(ScramAuth.SCRAM_PASSWORD_LENGTH); buffer .writeBytes(keys.storedKey, ScramAuth.KEY_SIZE) .writeBytes(keys.serverKey, ScramAuth.KEY_SIZE) .writeBytes(saltCopy, ScramAuth.USER_SALT_SIZE); return buffer.toBytes; } static computeBaseKeys(password, options) { const hashedPassword = hashLoginPassword(password); // debug(TAG, 'ScramAuth', 'hashedPassword', bufferToHexString(hashedPassword)); const saltedPassword = ScramAuth.saltedPassword(hashedPassword, options.salt, options.iterationNumber); // debug(TAG, 'ScramAuth', 'saltedPassword', bufferToHexString(saltedPassword)); // let clientKey: Uint8Array = ScramAuth.clientKey(saltedPassword); // debug(TAG, 'ScramAuth', 'clientKey', bufferToHexString(clientKey)); const storedKey = ScramAuth.storedKey(saltedPassword); debug(TAG, 'storeKey', bufferToHexString(storedKey)); const serverKey = ScramAuth.serverKey(saltedPassword); debug(TAG, 'serverKey', bufferToHexString(serverKey)); return { hashedPassword, saltedPassword, storedKey, serverKey, }; } static computeKeys(credentials, loginBody, clientNonce) { const keys = ScramAuth.computeBaseKeys(credentials.password, loginBody); const clientProof = ScramAuth.clientProof(keys.storedKey, clientNonce, loginBody.serverNonce); // debug(TAG, 'ScramAuth', 'clientProof', bufferToHexString(clientProof)); const serverProof = ScramAuth.serverProof(keys.serverKey, clientNonce, loginBody.serverNonce); // debug(TAG, 'ScramAuth', 'serverProof', bufferToHexString(serverProof)); return Object.assign(Object.assign({}, keys), { clientProof, serverProof }); } logout() { return __awaiter(this, void 0, void 0, function* () { try { const response = yield this.tap.service.interface.logout(); response.successful(); this.tap.encryption.stop(); } catch (err) { if (isCodeError(TapError.Code.ScramNotStartedYet, err) || isCodeError(TapError.Code.InvalidScramKey, err)) { // ignore error this.tap.encryption.stop(); return; } throw err; } }); } static clientProof(storedKey, clientNonce, serverNonce) { return ScramAuth.computeProof(storedKey, clientNonce, serverNonce).subarray(0, ScramAuth.KEY_SIZE); } static serverProof(serverKey, clientNonce, serverNonce) { return ScramAuth.computeProof(serverKey, serverNonce, clientNonce).subarray(0, ScramAuth.KEY_SIZE); } // getSessionKey(): Uint8Array { // if (!this.sessionData.key) { // throw new Error('Session not started'); // } // return this.sessionData.key; // } generateNonce() { return this.nonceGenerator(); } /** * SaltedPwd = PBKDF2 ( HashedPassword, UserSalt, ItCnt ) * @param password * @param userSalt * @param iteration */ static saltedPassword(hashedPassword, userSalt, iterations) { return pbkdf2(hashedPassword, userSalt, iterations); } /** * ClientKey = HMAC ( SaltedPwd | « ClientKey ») * @param saltedPassword */ // public static clientKey(saltedPassword: InputDataType): Uint8Array{ // let encodedLabel = ScramAuth.encodeLabel(ScramAuth.CLIENT_KEY_LABEL); // let encodedLabel2 : Uint8Array = KaitaiStreamWriter.mergeArrays( // encodedLabel, // Uint8Array.from([0]) // ).data; // // debug(TAG, 'ScramAuth', 'clientKey()', 'data => ', bufferToHexString(data), 'len', data.length, `(${saltedPassword.length} + ${encodedLabel.length})`); // return ScramAuth.HMAC( // saltedPassword, // // userSalt // encodedLabel2 // ).subarray(0, ScramAuth.KEY_SIZE); // } /** * StoredKey = H ( ClientKey ) * @param saltedPassword */ static storedKey(saltedPassword) { return ScramAuth.HASH(saltedPassword, ScramAuth.CLIENT_KEY_LABEL, ScramAuth.CLIENT_KEY_ITERATION_NUMBER); } static serverKey(saltedPassword) { return ScramAuth.HASH(saltedPassword, ScramAuth.SERVER_KEY_LABEL, ScramAuth.SERVER_KEY_ITERATION_NUMBER); } static HASH(key, label, iteration) { return pbkdf2(key, label, iteration, ScramAuth.KEY_SIZE / 4); } /** * ClientSignature = HMAC ( StoredKey | ClientNonce | ServerNonce ) * @param key * @param nonce1 * @param nonce2 */ static computeProof(key, nonce1, nonce2) { const buffer = KaitaiStreamWriter.create(key.length + ScramAuth.CLIENT_NONCE_SIZE + ScramAuth.SERVER_NONCE_SIZE); buffer .writeU(nonce1, ScramAuth.CLIENT_NONCE_SIZE) .writeBytes(key) .writeU(nonce2, ScramAuth.SERVER_NONCE_SIZE); return hmacSHA256(buffer.toBytes, key); } /** * ClientProofCheck = StoredKey ^ ClientProof * @param storedKey * @param clientProof */ static clientProofCheck(storedKey, clientProof) { return XOR(storedKey, clientProof); } /** * CommunicationKey = H ( ClientNonce | ServerNonce | StoredKey | « CommunicationKey » ) * @param clientNonce * @param serverNonce * @param storedKey */ static computeSessionKey(clientNonce, serverNonce, userSalt, serverKey, storedKey) { const encodedLabel = ScramAuth.encodeLabel(ScramAuth.COMMUNICATION_KEY_LABEL); const buffer = KaitaiStreamWriter.create(ScramAuth.CLIENT_NONCE_SIZE + ScramAuth.SERVER_NONCE_SIZE + userSalt.length + serverKey.length + storedKey.length); buffer .writeU(clientNonce, ScramAuth.CLIENT_NONCE_SIZE) .writeBytes(serverKey) .writeBytes(userSalt) .writeBytes(storedKey) .writeU(serverNonce, ScramAuth.SERVER_NONCE_SIZE); // .add(encodedLabel) return hmacSHA256(buffer.toBytes, serverKey).subarray(0, ScramAuth.KEY_SIZE); } /** * * @param input */ static encodeLabel(input) { return this.stringConverter.encode(input); } } ScramAuth.CRC_LENGTH = 4; ScramAuth.CLIENT_NONCE_SIZE = 4; ScramAuth.SERVER_NONCE_SIZE = 4; ScramAuth.ITERATION_NUMBER_SIZE = 4; // public sessionData: ScramAuth.SessionData; ScramAuth.COMMUNICATION_KEY_LABEL = 'CommunicationKey'; // static CLIENT_PROOF_LABEL: string = "ClientProof"; ScramAuth.CLIENT_KEY_LABEL = 'ClientKey'; ScramAuth.SERVER_KEY_LABEL = 'ServerKey'; ScramAuth.KEY_SIZE = 16; ScramAuth.CLIENT_KEY_ITERATION_NUMBER = 2; ScramAuth.SERVER_KEY_ITERATION_NUMBER = 2; ScramAuth.USER_SALT_SIZE = 4; ScramAuth.SCRAM_PASSWORD_LENGTH = ScramAuth.KEY_SIZE * 2 + ScramAuth.USER_SALT_SIZE; ScramAuth.stringConverter = StringConverter.ascii(); //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"scram-auth.js","sourceRoot":"","sources":["../../../../../../auth/src/lib/scram-auth.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,4BAA4B,CAAC;AACpC,aAAa;AACb,OAAO,gCAAgC,CAAC;AACxC,OAAO,oCAAoC,CAAC;AAE5C,OAAO,EAAE,iBAAiB,EAAE,MAAM,+BAA+B,CAAC;AAClE,OAAO,EAAE,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AAEhE,OAAO,EAAO,QAAQ,EAAE,MAAM,aAAa,CAAC;AAC5C,OAAO,EAAE,eAAe,EAAE,MAAM,yBAAyB,CAAC;AAC1D,OAAO,EAAE,UAAU,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAMxD,OAAO,EAAE,WAAW,EAAE,MAAM,sBAAsB,CAAC;AACnD,OAAO,EAAE,KAAK,EAAE,MAAM,SAAS,CAAC;AAEhC,OAAO,EAAE,YAAY,EAAE,MAAM,kBAAkB,CAAC;AAChD,OAAO,EAAE,iBAAiB,EAAE,GAAG,EAAE,MAAM,WAAW,CAAC;AAEnD,MAAM,GAAG,GAAG,OAAO,CAAC;AA0BpB,MAAM,UAAU,4BAA4B;IAC1C,MAAM,IAAI,GAAG,IAAI,KAAK,CAAC,SAAS,CAAC,cAAc,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;QACjE,OAAO,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,IAAI,CAAC,CAAC;IAC1C,CAAC,CAAC,CAAC;IACH,0FAA0F;IAC1F,IAAI,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC,EAAE;QACjB,IAAI,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;KACb;IACD,OAAO,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;AAC/B,CAAC;AAED,MAAM,OAAO,SAAS;IA6BpB,2DAA2D;IAE3D,MAAM;IACN,qCAAqC;IACrC,MAAM;IACN,wDAAwD;IACxD,gDAAgD;IAChD,IAAI;IAEJ,MAAM;IACN,+BAA+B;IAC/B,MAAM;IACN,oDAAoD;IACpD,uCAAuC;IACvC,IAAI;IAEJ,YAAsB,GAAQ;QAAR,QAAG,GAAH,GAAG,CAAK;QAvBvB,mBAAc,GAAiB,GAAW,EAAE;YACjD,OAAO,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,UAAU,CAAC,CAAC;QAChD,CAAC,CAAC;QACK,kBAAa,GAAqB,4BAA4B,CAAC;QAqBpE,yBAAyB;IAC3B,CAAC;IAED,wEAAwE;IACxE,uFAAuF;IACvF,kDAAkD;IAClD,+GAA+G;IAC/G,QAAQ;IACR,gHAAgH;IAChH,iGAAiG;IACjG,IAAI;IAEJ,MAAM;IACN,uCAAuC;IACvC,oBAAoB;IACpB,MAAM;IACN,gDAAgD;IAChD,0FAA0F;IAC1F,iDAAiD;IACjD,kBAAkB;IAClB,QAAQ;IACR,yCAAyC;IACzC,qBAAqB;IACrB,wCAAwC;IACxC,QAAQ;IACR,uFAAuF;IACvF,IAAI;IAEE,cAAc,CAClB,WAAmB,EACnB,OAAe,EACf,OAAmB,IAAI,CAAC,aAAa,EAAE;;YAEvC,MAAM,OAAO,GAAG;gBACd,eAAe,EAAE,CAAC,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,gBAAgB,EAAE,CAAC,CAAC,IAAI,EAAE;gBACzE,IAAI;aACL,CAAC;YACF,MAAM,cAAc,GAAe,SAAS,CAAC,sBAAsB,CACjE,WAAW,EACX,OAAO,CACR,CAAC;YACF,KAAK,CACH,GAAG,EACH,0BAA0B,iBAAiB,CACzC,cAAc,CACf,SAAS,iBAAiB,CAAC,IAAI,CAAC,eAC/B,OAAO,CAAC,eACV,iBAAiB,OAAO,GAAG,CAC5B,CAAC;YACF,CACE,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,iBAAiB,CAAC,OAAO,EAAE,cAAc,CAAC,CACxE,CAAC,UAAU,EAAE,CAAC;QACjB,CAAC;KAAA;IAED;;;;;;OAMG;IACU,KAAK,CAAC,MAAwB;;YACzC,MAAM,WAAW,GAAG,IAAI,CAAC,aAAa,EAAE,CAAC;YACzC,KAAK,CAAC,GAAG,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YACvC,MAAM,WAAW,GAAqB;gBACpC,QAAQ,EAAE,MAAM,CAAC,QAAQ;gBACzB,WAAW;aACZ,CAAC;YACF,MAAM,SAAS,GAA2B,CACxC,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,WAAW,CAAC,CAChD,CAAC,IAAI,EAAE,CAAC;YAET,MAAM,IAAI,GAAG,SAAS,CAAC,WAAW,CAAC,MAAM,EAAE,SAAS,EAAE,WAAW,CAAC,CAAC;YAEnE,MAAM,WAAW,GAAmC,EAAE,CAAC;YACvD,WAAW,CAAC,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC;YACvC,WAAW,CAAC,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC;YAEvC,MAAM,WAAW,GAAG,SAAS,CAAC,WAAW,CAAC;YAE1C,MAAM,iBAAiB,GAAe,CACpC,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,CAC1D,CAAC,IAAI,EAAE,CAAC;YACT,MAAM,mBAAmB,GAAG,IAAI,CAAC,WAAW,CAAC;YAE7C,mEAAmE;YACnE,IACE,iBAAiB,CAAC,mBAAmB,CAAC;gBACtC,iBAAiB,CAAC,iBAAiB,CAAC,EACpC;gBACA,MAAM,IAAI,YAAY,CAAC,gBAAgB,CACrC,mBAAmB,EACnB,iBAAiB,CAClB,CAAC;aACH;YAED,WAAW,CAAC,WAAW,GAAG,WAAW,CAAC;YACtC,WAAW,CAAC,GAAG,GAAG,SAAS,CAAC,iBAAiB,CAC3C,WAAW,EACX,WAAW,EACX,SAAS,CAAC,IAAI,EACd,IAAI,CAAC,SAAS,EACd,IAAI,CAAC,SAAS,CACf,CAAC;YAEF,OAAO,WAAW,CAAC;QACrB,CAAC;KAAA;IAEM,MAAM,CAAC,sBAAsB,CAClC,WAAmB,EACnB,OAAsD;QAEtD,MAAM,IAAI,GAAG,SAAS,CAAC,eAAe,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC;QAE7D,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;QAC9C,MAAM,MAAM,GAAG,kBAAkB,CAAC,MAAM,CAAC,SAAS,CAAC,qBAAqB,CAAC,CAAC;QAC1E,MAAM;aACH,UAAU,CAAC,IAAI,CAAC,SAAS,EAAE,SAAS,CAAC,QAAQ,CAAC;aAC9C,UAAU,CAAC,IAAI,CAAC,SAAS,EAAE,SAAS,CAAC,QAAQ,CAAC;aAC9C,UAAU,CAAC,QAAQ,EAAE,SAAS,CAAC,cAAc,CAAC,CAAC;QAElD,OAAO,MAAM,CAAC,OAAO,CAAC;IACxB,CAAC;IAEM,MAAM,CAAC,eAAe,CAC3B,QAAgB,EAChB,OAAsD;QAEtD,MAAM,cAAc,GAAG,iBAAiB,CAAC,QAAQ,CAAC,CAAC;QACnD,gFAAgF;QAChF,MAAM,cAAc,GAAe,SAAS,CAAC,cAAc,CACzD,cAAc,EACd,OAAO,CAAC,IAAI,EACZ,OAAO,CAAC,eAAe,CACxB,CAAC;QACF,gFAAgF;QAChF,mEAAmE;QACnE,sEAAsE;QACtE,MAAM,SAAS,GAAe,SAAS,CAAC,SAAS,CAAC,cAAc,CAAC,CAAC;QAClE,KAAK,CAAC,GAAG,EAAE,UAAU,EAAE,iBAAiB,CAAC,SAAS,CAAC,CAAC,CAAC;QACrD,MAAM,SAAS,GAAe,SAAS,CAAC,SAAS,CAAC,cAAc,CAAC,CAAC;QAClE,KAAK,CAAC,GAAG,EAAE,WAAW,EAAE,iBAAiB,CAAC,SAAS,CAAC,CAAC,CAAC;QACtD,OAAO;YACL,cAAc;YACd,cAAc;YACd,SAAS;YACT,SAAS;SACV,CAAC;IACJ,CAAC;IAEM,MAAM,CAAC,WAAW,CACvB,WAA6B,EAC7B,SAAiC,EACjC,WAAmB;QAEnB,MAAM,IAAI,GAAG,SAAS,CAAC,eAAe,CAAC,WAAW,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACxE,MAAM,WAAW,GAAe,SAAS,CAAC,WAAW,CACnD,IAAI,CAAC,SAAS,EACd,WAAW,EACX,SAAS,CAAC,WAAW,CACtB,CAAC;QACF,0EAA0E;QAE1E,MAAM,WAAW,GAAe,SAAS,CAAC,WAAW,CACnD,IAAI,CAAC,SAAS,EACd,WAAW,EACX,SAAS,CAAC,WAAW,CACtB,CAAC;QACF,0EAA0E;QAC1E,uCACK,IAAI,KACP,WAAW;YACX,WAAW,IACX;IACJ,CAAC;IAEY,MAAM;;YACjB,IAAI;gBACF,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,SAAS,CAAC,MAAM,EAAE,CAAC;gBAC3D,QAAQ,CAAC,UAAU,EAAE,CAAC;gBACtB,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC;aAC5B;YAAC,OAAO,GAAG,EAAE;gBACZ,IACE,WAAW,CAAC,QAAQ,CAAC,IAAI,CAAC,kBAAkB,EAAE,GAAG,CAAC;oBAClD,WAAW,CAAC,QAAQ,CAAC,IAAI,CAAC,eAAe,EAAE,GAAG,CAAC,EAC/C;oBACA,eAAe;oBACf,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC;oBAC3B,OAAO;iBACR;gBACD,MAAM,GAAG,CAAC;aACX;QACH,CAAC;KAAA;IAEM,MAAM,CAAC,WAAW,CACvB,SAAqB,EACrB,WAAmB,EACnB,WAAmB;QAEnB,OAAO,SAAS,CAAC,YAAY,CAAC,SAAS,EAAE,WAAW,EAAE,WAAW,CAAC,CAAC,QAAQ,CACzE,CAAC,EACD,SAAS,CAAC,QAAQ,CACnB,CAAC;IACJ,CAAC;IAEM,MAAM,CAAC,WAAW,CACvB,SAAqB,EACrB,WAAmB,EACnB,WAAmB;QAEnB,OAAO,SAAS,CAAC,YAAY,CAAC,SAAS,EAAE,WAAW,EAAE,WAAW,CAAC,CAAC,QAAQ,CACzE,CAAC,EACD,SAAS,CAAC,QAAQ,CACnB,CAAC;IACJ,CAAC;IAED,gCAAgC;IAChC,mCAAmC;IACnC,kDAAkD;IAClD,QAAQ;IACR,mCAAmC;IACnC,IAAI;IAEG,aAAa;QAClB,OAAO,IAAI,CAAC,cAAc,EAAE,CAAC;IAC/B,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,cAAc,CAC1B,cAA6B,EAC7B,QAAuB,EACvB,UAAkB;QAElB,OAAO,MAAM,CAAC,cAAc,EAAE,QAAQ,EAAE,UAAU,CAAC,CAAC;IACtD,CAAC;IAED;;;OAGG;IACH,sEAAsE;IACtE,4EAA4E;IAC5E,uEAAuE;IACvE,wBAAwB;IACxB,+BAA+B;IAC/B,cAAc;IACd,iKAAiK;IACjK,6BAA6B;IAC7B,0BAA0B;IAC1B,sBAAsB;IACtB,wBAAwB;IACxB,yCAAyC;IACzC,IAAI;IAEJ;;;OAGG;IACI,MAAM,CAAC,SAAS,CAAC,cAA6B;QACnD,OAAO,SAAS,CAAC,IAAI,CACnB,cAAc,EACd,SAAS,CAAC,gBAAgB,EAC1B,SAAS,CAAC,2BAA2B,CACtC,CAAC;IACJ,CAAC;IAED,MAAM,CAAC,SAAS,CAAC,cAA6B;QAC5C,OAAO,SAAS,CAAC,IAAI,CACnB,cAAc,EACd,SAAS,CAAC,gBAAgB,EAC1B,SAAS,CAAC,2BAA2B,CACtC,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,IAAI,CACjB,GAAkB,EAClB,KAAoB,EACpB,SAAiB;QAEjB,OAAO,MAAM,CAAC,GAAG,EAAE,KAAK,EAAE,SAAS,EAAE,SAAS,CAAC,QAAQ,GAAG,CAAC,CAAC,CAAC;IAC/D,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,YAAY,CAAC,GAAe,EAAE,MAAc,EAAE,MAAc;QACxE,MAAM,MAAM,GAAG,kBAAkB,CAAC,MAAM,CACtC,GAAG,CAAC,MAAM,GAAG,SAAS,CAAC,iBAAiB,GAAG,SAAS,CAAC,iBAAiB,CACvE,CAAC;QACF,MAAM;aACH,MAAM,CAAC,MAAM,EAAE,SAAS,CAAC,iBAAiB,CAAC;aAC3C,UAAU,CAAC,GAAG,CAAC;aACf,MAAM,CAAC,MAAM,EAAE,SAAS,CAAC,iBAAiB,CAAC,CAAC;QAC/C,OAAO,UAAU,CAAC,MAAM,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;IACzC,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,gBAAgB,CAC5B,SAAqB,EACrB,WAAuB;QAEvB,OAAO,GAAG,CAAC,SAAS,EAAE,WAAW,CAAC,CAAC;IACrC,CAAC;IAED;;;;;OAKG;IACI,MAAM,CAAC,iBAAiB,CAC7B,WAAmB,EACnB,WAAmB,EACnB,QAAoB,EACpB,SAAqB,EACrB,SAAqB;QAErB,MAAM,YAAY,GAAG,SAAS,CAAC,WAAW,CACxC,SAAS,CAAC,uBAAuB,CAClC,CAAC;QAEF,MAAM,MAAM,GAAG,kBAAkB,CAAC,MAAM,CACtC,SAAS,CAAC,iBAAiB;YACzB,SAAS,CAAC,iBAAiB;YAC3B,QAAQ,CAAC,MAAM;YACf,SAAS,CAAC,MAAM;YAChB,SAAS,CAAC,MAAM,CAEnB,CAAC;QAEF,MAAM;aACH,MAAM,CAAC,WAAW,EAAE,SAAS,CAAC,iBAAiB,CAAC;aAChD,UAAU,CAAC,SAAS,CAAC;aACrB,UAAU,CAAC,QAAQ,CAAC;aACpB,UAAU,CAAC,SAAS,CAAC;aACrB,MAAM,CAAC,WAAW,EAAE,SAAS,CAAC,iBAAiB,CAAC,CAAC;QACpD,qBAAqB;QAErB,OAAO,UAAU,CAAC,MAAM,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC,QAAQ,CACnD,CAAC,EACD,SAAS,CAAC,QAAQ,CACnB,CAAC;IACJ,CAAC;IAED;;;OAGG;IACH,MAAM,CAAC,WAAW,CAAC,KAAa;QAC9B,OAAO,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IAC5C,CAAC;;AArZa,oBAAU,GAAG,CAAC,CAAC;AACf,2BAAiB,GAAG,CAAC,CAAC;AACtB,2BAAiB,GAAG,CAAC,CAAC;AACtB,+BAAqB,GAAG,CAAC,CAAC;AAExC,6CAA6C;AAEtC,iCAAuB,GAAG,kBAAkB,CAAC;AACpD,qDAAqD;AAC9C,0BAAgB,GAAG,WAAW,CAAC;AAC/B,0BAAgB,GAAG,WAAW,CAAC;AAE/B,kBAAQ,GAAG,EAAE,CAAC;AACd,qCAA2B,GAAG,CAAC,CAAC;AAChC,qCAA2B,GAAG,CAAC,CAAC;AAChC,wBAAc,GAAG,CAAC,CAAC;AACnB,+BAAqB,GAC1B,SAAS,CAAC,QAAQ,GAAG,CAAC,GAAG,SAAS,CAAC,cAAc,CAAC;AAMtC,yBAAe,GAC3B,eAAe,CAAC,KAAK,EAAE,CAAC"}