@pulumi/azure-native
Version:
[](https://slack.pulumi.com) [](https://npmjs.com/package/@pulumi/azure-native) [;
exports.State = exports.StandardSupportedClouds = exports.StandardSupportedCloud = exports.SourceType = exports.Source = exports.SeverityEnum = exports.Severity = exports.ServerVulnerabilityAssessmentsSettingKind = exports.ServerVulnerabilityAssessmentsAzureSettingSelectedProvider = exports.SecuritySolutionStatus = exports.SecurityIssue = exports.SecurityContactRole = exports.ScanningMode = exports.RuleState = exports.RecommendationType = exports.RecommendationSupportedClouds = exports.RecommendationConfigStatus = exports.Protocol = exports.PropertyType = exports.PricingTier = exports.OrganizationMembershipType = exports.Operator = exports.OfferingType = exports.MinimalSeverity = exports.MinimalRiskLevel = exports.IsEnabled = exports.ImplementationEffort = exports.GovernanceRuleType = exports.GovernanceRuleSourceResourceType = exports.GovernanceRuleOwnerSourceType = exports.ExportData = exports.ExemptionCategory = exports.EventSource = exports.EnvironmentType = exports.Enforce = exports.Effect = exports.DevOpsProvisioningState = exports.DataSource = exports.CloudName = exports.Categories = exports.AutoProvision = exports.AutoDiscovery = exports.AuthenticationType = exports.AttestationComplianceState = exports.AssessmentType = exports.AssessmentStatusCode = exports.ApplicationSourceResourceType = exports.AdditionalWorkspaceType = exports.AdditionalWorkspaceDataType = exports.ActionType = void 0;
exports.UserImpact = exports.UnmaskedIpLoggingStatus = exports.Type = exports.Threats = exports.Techniques = exports.Tactics = exports.SupportedCloudEnum = exports.SubPlan = exports.StatusReason = exports.Status = void 0;
exports.ActionType = {
LogicApp: "LogicApp",
EventHub: "EventHub",
Workspace: "Workspace",
};
exports.AdditionalWorkspaceDataType = {
Alerts: "Alerts",
RawEvents: "RawEvents",
};
exports.AdditionalWorkspaceType = {
Sentinel: "Sentinel",
};
exports.ApplicationSourceResourceType = {
/**
* The source of the application is assessments
*/
Assessments: "Assessments",
};
exports.AssessmentStatusCode = {
/**
* The resource is healthy
*/
Healthy: "Healthy",
/**
* The resource has a security issue that needs to be addressed
*/
Unhealthy: "Unhealthy",
/**
* Assessment for this resource did not happen
*/
NotApplicable: "NotApplicable",
};
exports.AssessmentType = {
/**
* Microsoft Defender for Cloud managed assessments
*/
BuiltIn: "BuiltIn",
/**
* User defined policies that are automatically ingested from Azure Policy to Microsoft Defender for Cloud
*/
CustomPolicy: "CustomPolicy",
/**
* User assessments pushed directly by the user or other third party to Microsoft Defender for Cloud
*/
CustomerManaged: "CustomerManaged",
};
exports.AttestationComplianceState = {
Unknown: "unknown",
Compliant: "compliant",
NonCompliant: "nonCompliant",
};
exports.AuthenticationType = {
AccessToken: "AccessToken",
};
exports.AutoDiscovery = {
Disabled: "Disabled",
Enabled: "Enabled",
NotApplicable: "NotApplicable",
};
exports.AutoProvision = {
/**
* Install missing Azure Arc agents on machines automatically
*/
On: "On",
/**
* Do not install Azure Arc agent on the machines automatically
*/
Off: "Off",
};
exports.Categories = {
Compute: "Compute",
Networking: "Networking",
Data: "Data",
IdentityAndAccess: "IdentityAndAccess",
IoT: "IoT",
};
exports.CloudName = {
Azure: "Azure",
AWS: "AWS",
GCP: "GCP",
Github: "Github",
AzureDevOps: "AzureDevOps",
GitLab: "GitLab",
DockerHub: "DockerHub",
JFrog: "JFrog",
};
exports.DataSource = {
/**
* Devices twin data
*/
TwinData: "TwinData",
};
exports.DevOpsProvisioningState = {
Succeeded: "Succeeded",
Failed: "Failed",
Canceled: "Canceled",
Pending: "Pending",
PendingDeletion: "PendingDeletion",
DeletionSuccess: "DeletionSuccess",
DeletionFailure: "DeletionFailure",
};
exports.Effect = {
Audit: "Audit",
Exempt: "Exempt",
Attest: "Attest",
};
exports.Enforce = {
/**
* Allows the descendants of this scope to override the pricing configuration set on this scope (allows setting inherited="False")
*/
False: "False",
/**
* Prevents overrides and forces the current scope's pricing configuration to all descendants
*/
True: "True",
};
exports.EnvironmentType = {
AwsAccount: "AwsAccount",
GcpProject: "GcpProject",
GithubScope: "GithubScope",
AzureDevOpsScope: "AzureDevOpsScope",
GitlabScope: "GitlabScope",
DockerHubOrganization: "DockerHubOrganization",
JFrogArtifactory: "JFrogArtifactory",
};
exports.EventSource = {
Assessments: "Assessments",
AssessmentsSnapshot: "AssessmentsSnapshot",
SubAssessments: "SubAssessments",
SubAssessmentsSnapshot: "SubAssessmentsSnapshot",
Alerts: "Alerts",
SecureScores: "SecureScores",
SecureScoresSnapshot: "SecureScoresSnapshot",
SecureScoreControls: "SecureScoreControls",
SecureScoreControlsSnapshot: "SecureScoreControlsSnapshot",
RegulatoryComplianceAssessment: "RegulatoryComplianceAssessment",
RegulatoryComplianceAssessmentSnapshot: "RegulatoryComplianceAssessmentSnapshot",
AttackPaths: "AttackPaths",
AttackPathsSnapshot: "AttackPathsSnapshot",
};
exports.ExemptionCategory = {
Waiver: "waiver",
Mitigated: "mitigated",
};
exports.ExportData = {
/**
* Agent raw events
*/
RawEvents: "RawEvents",
};
exports.GovernanceRuleOwnerSourceType = {
/**
* The rule source type defined using resource tag
*/
ByTag: "ByTag",
/**
* The rule source type defined manually
*/
Manually: "Manually",
};
exports.GovernanceRuleSourceResourceType = {
/**
* The source of the governance rule is assessments
*/
Assessments: "Assessments",
};
exports.GovernanceRuleType = {
/**
* The source of the rule type definition is integrated
*/
Integrated: "Integrated",
/**
* The source of the rule type definition is ServiceNow
*/
ServiceNow: "ServiceNow",
};
exports.ImplementationEffort = {
Low: "Low",
Moderate: "Moderate",
High: "High",
};
exports.IsEnabled = {
/**
* Indicates the extension is enabled
*/
True: "True",
/**
* Indicates the extension is disabled
*/
False: "False",
};
exports.MinimalRiskLevel = {
/**
* Get notifications on new attack paths with Critical risk level
*/
Critical: "Critical",
/**
* Get notifications on new attack paths with High or Critical risk level
*/
High: "High",
/**
* Get notifications on new attach paths with Medium, High or Critical risk level
*/
Medium: "Medium",
/**
* Get notifications on new attach paths with Low, Medium, High or Critical risk level
*/
Low: "Low",
};
exports.MinimalSeverity = {
/**
* Get notifications on new alerts with High severity
*/
High: "High",
/**
* Get notifications on new alerts with Medium or High severity
*/
Medium: "Medium",
/**
* Get notifications on new alerts with Low, Medium or High severity
*/
Low: "Low",
};
exports.OfferingType = {
CspmMonitorAws: "CspmMonitorAws",
DefenderForContainersAws: "DefenderForContainersAws",
DefenderForServersAws: "DefenderForServersAws",
DefenderForDatabasesAws: "DefenderForDatabasesAws",
CspmMonitorGcp: "CspmMonitorGcp",
CspmMonitorGithub: "CspmMonitorGithub",
CspmMonitorAzureDevOps: "CspmMonitorAzureDevOps",
DefenderForServersGcp: "DefenderForServersGcp",
DefenderForContainersGcp: "DefenderForContainersGcp",
DefenderForDatabasesGcp: "DefenderForDatabasesGcp",
DefenderCspmAws: "DefenderCspmAws",
DefenderCspmGcp: "DefenderCspmGcp",
CspmMonitorGitLab: "CspmMonitorGitLab",
CspmMonitorDockerHub: "CspmMonitorDockerHub",
DefenderForContainersDockerHub: "DefenderForContainersDockerHub",
DefenderCspmDockerHub: "DefenderCspmDockerHub",
CspmMonitorJFrog: "CspmMonitorJFrog",
DefenderForContainersJFrog: "DefenderForContainersJFrog",
DefenderCspmJFrog: "DefenderCspmJFrog",
};
exports.Operator = {
/**
* Applies for decimal and non-decimal operands
*/
Equals: "Equals",
/**
* Applies only for decimal operands
*/
GreaterThan: "GreaterThan",
/**
* Applies only for decimal operands
*/
GreaterThanOrEqualTo: "GreaterThanOrEqualTo",
/**
* Applies only for decimal operands
*/
LesserThan: "LesserThan",
/**
* Applies only for decimal operands
*/
LesserThanOrEqualTo: "LesserThanOrEqualTo",
/**
* Applies for decimal and non-decimal operands
*/
NotEquals: "NotEquals",
/**
* Applies only for non-decimal operands
*/
Contains: "Contains",
/**
* Applies only for non-decimal operands
*/
StartsWith: "StartsWith",
/**
* Applies only for non-decimal operands
*/
EndsWith: "EndsWith",
};
exports.OrganizationMembershipType = {
Member: "Member",
Organization: "Organization",
};
exports.PricingTier = {
/**
* Get free Microsoft Defender for Cloud experience with basic security features
*/
Free: "Free",
/**
* Get the standard Microsoft Defender for Cloud experience with advanced security features
*/
Standard: "Standard",
};
exports.PropertyType = {
String: "String",
Integer: "Integer",
Number: "Number",
Boolean: "Boolean",
};
exports.Protocol = {
TCP: "TCP",
UDP: "UDP",
All: "*",
};
exports.RecommendationConfigStatus = {
Disabled: "Disabled",
Enabled: "Enabled",
};
exports.RecommendationSupportedClouds = {
Azure: "Azure",
AWS: "AWS",
GCP: "GCP",
};
exports.RecommendationType = {
/**
* Authentication schema used for pull an edge module from an ACR repository does not use Service Principal Authentication.
*/
IoT_ACRAuthentication: "IoT_ACRAuthentication",
/**
* IoT agent message size capacity is currently underutilized, causing an increase in the number of sent messages. Adjust message intervals for better utilization.
*/
IoT_AgentSendsUnutilizedMessages: "IoT_AgentSendsUnutilizedMessages",
/**
* Identified security related system configuration issues.
*/
IoT_Baseline: "IoT_Baseline",
/**
* You can optimize Edge Hub memory usage by turning off protocol heads for any protocols not used by Edge modules in your solution.
*/
IoT_EdgeHubMemOptimize: "IoT_EdgeHubMemOptimize",
/**
* Logging is disabled for this edge module.
*/
IoT_EdgeLoggingOptions: "IoT_EdgeLoggingOptions",
/**
* A minority within a device security group has inconsistent Edge Module settings with the rest of their group.
*/
IoT_InconsistentModuleSettings: "IoT_InconsistentModuleSettings",
/**
* Install the Azure Security of Things Agent.
*/
IoT_InstallAgent: "IoT_InstallAgent",
/**
* IP Filter Configuration should have rules defined for allowed traffic and should deny all other traffic by default.
*/
IoT_IPFilter_DenyAll: "IoT_IPFilter_DenyAll",
/**
* An Allow IP Filter rules source IP range is too large. Overly permissive rules might expose your IoT hub to malicious intenders.
*/
IoT_IPFilter_PermissiveRule: "IoT_IPFilter_PermissiveRule",
/**
* A listening endpoint was found on the device.
*/
IoT_OpenPorts: "IoT_OpenPorts",
/**
* An Allowed firewall policy was found (INPUT/OUTPUT). The policy should Deny all traffic by default and define rules to allow necessary communication to/from the device.
*/
IoT_PermissiveFirewallPolicy: "IoT_PermissiveFirewallPolicy",
/**
* A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports.
*/
IoT_PermissiveInputFirewallRules: "IoT_PermissiveInputFirewallRules",
/**
* A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports.
*/
IoT_PermissiveOutputFirewallRules: "IoT_PermissiveOutputFirewallRules",
/**
* Edge module is configured to run in privileged mode, with extensive Linux capabilities or with host-level network access (send/receive data to host machine).
*/
IoT_PrivilegedDockerOptions: "IoT_PrivilegedDockerOptions",
/**
* Same authentication credentials to the IoT Hub used by multiple devices. This could indicate an illegitimate device impersonating a legitimate device. It also exposes the risk of device impersonation by an attacker.
*/
IoT_SharedCredentials: "IoT_SharedCredentials",
/**
* Insecure TLS configurations detected. Immediate upgrade recommended.
*/
IoT_VulnerableTLSCipherSuite: "IoT_VulnerableTLSCipherSuite",
};
exports.RuleState = {
Enabled: "Enabled",
Disabled: "Disabled",
Expired: "Expired",
};
exports.ScanningMode = {
Default: "Default",
};
exports.SecurityContactRole = {
/**
* If enabled, send notification on new alerts to the account admins
*/
AccountAdmin: "AccountAdmin",
/**
* If enabled, send notification on new alerts to the service admins
*/
ServiceAdmin: "ServiceAdmin",
/**
* If enabled, send notification on new alerts to the subscription owners
*/
Owner: "Owner",
/**
* If enabled, send notification on new alerts to the subscription contributors
*/
Contributor: "Contributor",
};
exports.SecurityIssue = {
Vulnerability: "Vulnerability",
ExcessivePermissions: "ExcessivePermissions",
AnonymousAccess: "AnonymousAccess",
NetworkExposure: "NetworkExposure",
TrafficEncryption: "TrafficEncryption",
BestPractices: "BestPractices",
};
exports.SecuritySolutionStatus = {
Enabled: "Enabled",
Disabled: "Disabled",
};
exports.ServerVulnerabilityAssessmentsAzureSettingSelectedProvider = {
/**
* Microsoft Defender for Endpoints threat and vulnerability management.
*/
MdeTvm: "MdeTvm",
};
exports.ServerVulnerabilityAssessmentsSettingKind = {
AzureServersSetting: "AzureServersSetting",
};
exports.Severity = {
Low: "Low",
Medium: "Medium",
High: "High",
};
exports.SeverityEnum = {
High: "High",
Medium: "Medium",
Low: "Low",
};
exports.Source = {
/**
* Resource is in Azure
*/
Azure: "Azure",
/**
* Resource in an on premise machine connected to Azure cloud
*/
OnPremise: "OnPremise",
/**
* SQL Resource in an on premise machine connected to Azure cloud
*/
OnPremiseSql: "OnPremiseSql",
};
exports.SourceType = {
Alert: "Alert",
AttackPath: "AttackPath",
};
exports.StandardSupportedCloud = {
Azure: "Azure",
AWS: "AWS",
GCP: "GCP",
};
exports.StandardSupportedClouds = {
AWS: "AWS",
GCP: "GCP",
};
exports.State = {
/**
* Send notification on new alerts to the subscription's admins
*/
On: "On",
/**
* Don't send notification on new alerts to the subscription's admins
*/
Off: "Off",
};
exports.Status = {
Revoked: "Revoked",
Initiated: "Initiated",
};
exports.StatusReason = {
Expired: "Expired",
UserRequested: "UserRequested",
NewerRequestInitiated: "NewerRequestInitiated",
};
exports.SubPlan = {
P1: "P1",
P2: "P2",
};
exports.SupportedCloudEnum = {
AWS: "AWS",
GCP: "GCP",
};
exports.Tactics = {
Reconnaissance: "Reconnaissance",
Resource_Development: "Resource Development",
Initial_Access: "Initial Access",
Execution: "Execution",
Persistence: "Persistence",
Privilege_Escalation: "Privilege Escalation",
Defense_Evasion: "Defense Evasion",
Credential_Access: "Credential Access",
Discovery: "Discovery",
Lateral_Movement: "Lateral Movement",
Collection: "Collection",
Command_and_Control: "Command and Control",
Exfiltration: "Exfiltration",
Impact: "Impact",
};
exports.Techniques = {
Abuse_Elevation_Control_Mechanism: "Abuse Elevation Control Mechanism",
Access_Token_Manipulation: "Access Token Manipulation",
Account_Discovery: "Account Discovery",
Account_Manipulation: "Account Manipulation",
Active_Scanning: "Active Scanning",
Application_Layer_Protocol: "Application Layer Protocol",
Audio_Capture: "Audio Capture",
Boot_or_Logon_Autostart_Execution: "Boot or Logon Autostart Execution",
Boot_or_Logon_Initialization_Scripts: "Boot or Logon Initialization Scripts",
Brute_Force: "Brute Force",
Cloud_Infrastructure_Discovery: "Cloud Infrastructure Discovery",
Cloud_Service_Dashboard: "Cloud Service Dashboard",
Cloud_Service_Discovery: "Cloud Service Discovery",
Command_and_Scripting_Interpreter: "Command and Scripting Interpreter",
Compromise_Client_Software_Binary: "Compromise Client Software Binary",
Compromise_Infrastructure: "Compromise Infrastructure",
Container_and_Resource_Discovery: "Container and Resource Discovery",
Create_Account: "Create Account",
Create_or_Modify_System_Process: "Create or Modify System Process",
Credentials_from_Password_Stores: "Credentials from Password Stores",
Data_Destruction: "Data Destruction",
Data_Encrypted_for_Impact: "Data Encrypted for Impact",
Data_from_Cloud_Storage_Object: "Data from Cloud Storage Object",
Data_from_Configuration_Repository: "Data from Configuration Repository",
Data_from_Information_Repositories: "Data from Information Repositories",
Data_from_Local_System: "Data from Local System",
Data_Manipulation: "Data Manipulation",
Data_Staged: "Data Staged",
Defacement: "Defacement",
Deobfuscate_Decode_Files_or_Information: "Deobfuscate/Decode Files or Information",
Disk_Wipe: "Disk Wipe",
Domain_Trust_Discovery: "Domain Trust Discovery",
Drive_by_Compromise: "Drive-by Compromise",
Dynamic_Resolution: "Dynamic Resolution",
Endpoint_Denial_of_Service: "Endpoint Denial of Service",
Event_Triggered_Execution: "Event Triggered Execution",
Exfiltration_Over_Alternative_Protocol: "Exfiltration Over Alternative Protocol",
Exploit_Public_Facing_Application: "Exploit Public-Facing Application",
Exploitation_for_Client_Execution: "Exploitation for Client Execution",
Exploitation_for_Credential_Access: "Exploitation for Credential Access",
Exploitation_for_Defense_Evasion: "Exploitation for Defense Evasion",
Exploitation_for_Privilege_Escalation: "Exploitation for Privilege Escalation",
Exploitation_of_Remote_Services: "Exploitation of Remote Services",
External_Remote_Services: "External Remote Services",
Fallback_Channels: "Fallback Channels",
File_and_Directory_Discovery: "File and Directory Discovery",
Gather_Victim_Network_Information: "Gather Victim Network Information",
Hide_Artifacts: "Hide Artifacts",
Hijack_Execution_Flow: "Hijack Execution Flow",
Impair_Defenses: "Impair Defenses",
Implant_Container_Image: "Implant Container Image",
Indicator_Removal_on_Host: "Indicator Removal on Host",
Indirect_Command_Execution: "Indirect Command Execution",
Ingress_Tool_Transfer: "Ingress Tool Transfer",
Input_Capture: "Input Capture",
Inter_Process_Communication: "Inter-Process Communication",
Lateral_Tool_Transfer: "Lateral Tool Transfer",
Man_in_the_Middle: "Man-in-the-Middle",
Masquerading: "Masquerading",
Modify_Authentication_Process: "Modify Authentication Process",
Modify_Registry: "Modify Registry",
Network_Denial_of_Service: "Network Denial of Service",
Network_Service_Scanning: "Network Service Scanning",
Network_Sniffing: "Network Sniffing",
Non_Application_Layer_Protocol: "Non-Application Layer Protocol",
Non_Standard_Port: "Non-Standard Port",
Obtain_Capabilities: "Obtain Capabilities",
Obfuscated_Files_or_Information: "Obfuscated Files or Information",
Office_Application_Startup: "Office Application Startup",
OS_Credential_Dumping: "OS Credential Dumping",
Permission_Groups_Discovery: "Permission Groups Discovery",
Phishing: "Phishing",
Pre_OS_Boot: "Pre-OS Boot",
Process_Discovery: "Process Discovery",
Process_Injection: "Process Injection",
Protocol_Tunneling: "Protocol Tunneling",
Proxy: "Proxy",
Query_Registry: "Query Registry",
Remote_Access_Software: "Remote Access Software",
Remote_Service_Session_Hijacking: "Remote Service Session Hijacking",
Remote_Services: "Remote Services",
Remote_System_Discovery: "Remote System Discovery",
Resource_Hijacking: "Resource Hijacking",
Scheduled_Task_Job: "Scheduled Task/Job",
Screen_Capture: "Screen Capture",
Search_Victim_Owned_Websites: "Search Victim-Owned Websites",
Server_Software_Component: "Server Software Component",
Service_Stop: "Service Stop",
Signed_Binary_Proxy_Execution: "Signed Binary Proxy Execution",
Software_Deployment_Tools: "Software Deployment Tools",
SQL_Stored_Procedures: "SQL Stored Procedures",
Steal_or_Forge_Kerberos_Tickets: "Steal or Forge Kerberos Tickets",
Subvert_Trust_Controls: "Subvert Trust Controls",
Supply_Chain_Compromise: "Supply Chain Compromise",
System_Information_Discovery: "System Information Discovery",
Taint_Shared_Content: "Taint Shared Content",
Traffic_Signaling: "Traffic Signaling",
Transfer_Data_to_Cloud_Account: "Transfer Data to Cloud Account",
Trusted_Relationship: "Trusted Relationship",
Unsecured_Credentials: "Unsecured Credentials",
User_Execution: "User Execution",
Valid_Accounts: "Valid Accounts",
Windows_Management_Instrumentation: "Windows Management Instrumentation",
File_and_Directory_Permissions_Modification: "File and Directory Permissions Modification",
};
exports.Threats = {
AccountBreach: "accountBreach",
DataExfiltration: "dataExfiltration",
DataSpillage: "dataSpillage",
MaliciousInsider: "maliciousInsider",
ElevationOfPrivilege: "elevationOfPrivilege",
ThreatResistance: "threatResistance",
MissingCoverage: "missingCoverage",
DenialOfService: "denialOfService",
};
exports.Type = {
Qualys: "Qualys",
TVM: "TVM",
};
exports.UnmaskedIpLoggingStatus = {
/**
* Unmasked IP logging is disabled
*/
Disabled: "Disabled",
/**
* Unmasked IP logging is enabled
*/
Enabled: "Enabled",
};
exports.UserImpact = {
Low: "Low",
Moderate: "Moderate",
High: "High",
};
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../types/enums/security/index.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;;AAGpE,QAAA,UAAU,GAAG;IACtB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,2BAA2B,GAAG;IACvC,MAAM,EAAE,QAAQ;IAChB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,6BAA6B,GAAG;IACzC;;OAEG;IACH,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,oBAAoB,GAAG;IAChC;;OAEG;IACH,OAAO,EAAE,SAAS;IAClB;;OAEG;IACH,SAAS,EAAE,WAAW;IACtB;;OAEG;IACH,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,cAAc,GAAG;IAC1B;;OAEG;IACH,OAAO,EAAE,SAAS;IAClB;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAOE,QAAA,0BAA0B,GAAG;IACtC,OAAO,EAAE,SAAS;IAClB,SAAS,EAAE,WAAW;IACtB,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,QAAQ,EAAE,UAAU;IACpB,OAAO,EAAE,SAAS;IAClB,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB;;OAEG;IACH,EAAE,EAAE,IAAI;IACR;;OAEG;IACH,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,OAAO,EAAE,SAAS;IAClB,UAAU,EAAE,YAAY;IACxB,IAAI,EAAE,MAAM;IACZ,iBAAiB,EAAE,mBAAmB;IACtC,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB,KAAK,EAAE,OAAO;IACd,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;IACV,MAAM,EAAE,QAAQ;IAChB,WAAW,EAAE,aAAa;IAC1B,MAAM,EAAE,QAAQ;IAChB,SAAS,EAAE,WAAW;IACtB,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB;;OAEG;IACH,QAAQ,EAAE,UAAU;CACd,CAAC;AAIE,QAAA,uBAAuB,GAAG;IACnC,SAAS,EAAE,WAAW;IACtB,MAAM,EAAE,QAAQ;IAChB,QAAQ,EAAE,UAAU;IACpB,OAAO,EAAE,SAAS;IAClB,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAeE,QAAA,MAAM,GAAG;IAClB,KAAK,EAAE,OAAO;IACd,MAAM,EAAE,QAAQ;IAChB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,OAAO,GAAG;IACnB;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,eAAe,GAAG;IAC3B,UAAU,EAAE,YAAY;IACxB,UAAU,EAAE,YAAY;IACxB,WAAW,EAAE,aAAa;IAC1B,gBAAgB,EAAE,kBAAkB;IACpC,WAAW,EAAE,aAAa;IAC1B,qBAAqB,EAAE,uBAAuB;IAC9C,gBAAgB,EAAE,kBAAkB;CAC9B,CAAC;AAOE,QAAA,WAAW,GAAG;IACvB,WAAW,EAAE,aAAa;IAC1B,mBAAmB,EAAE,qBAAqB;IAC1C,cAAc,EAAE,gBAAgB;IAChC,sBAAsB,EAAE,wBAAwB;IAChD,MAAM,EAAE,QAAQ;IAChB,YAAY,EAAE,cAAc;IAC5B,oBAAoB,EAAE,sBAAsB;IAC5C,mBAAmB,EAAE,qBAAqB;IAC1C,2BAA2B,EAAE,6BAA6B;IAC1D,8BAA8B,EAAE,gCAAgC;IAChE,sCAAsC,EAAE,wCAAwC;IAChF,WAAW,EAAE,aAAa;IAC1B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B,MAAM,EAAE,QAAQ;IAChB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB;;OAEG;IACH,SAAS,EAAE,WAAW;CAChB,CAAC;AAIE,QAAA,6BAA6B,GAAG;IACzC;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,gCAAgC,GAAG;IAC5C;;OAEG;IACH,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B;;OAEG;IACH,UAAU,EAAE,YAAY;IACxB;;OAEG;IACH,UAAU,EAAE,YAAY;CAClB,CAAC;AAOE,QAAA,oBAAoB,GAAG;IAChC,GAAG,EAAE,KAAK;IACV,QAAQ,EAAE,UAAU;IACpB,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,gBAAgB,GAAG;IAC5B;;OAEG;IACH,QAAQ,EAAE,UAAU;IACpB;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,eAAe,GAAG;IAC3B;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,cAAc,EAAE,gBAAgB;IAChC,wBAAwB,EAAE,0BAA0B;IACpD,qBAAqB,EAAE,uBAAuB;IAC9C,uBAAuB,EAAE,yBAAyB;IAClD,cAAc,EAAE,gBAAgB;IAChC,iBAAiB,EAAE,mBAAmB;IACtC,sBAAsB,EAAE,wBAAwB;IAChD,qBAAqB,EAAE,uBAAuB;IAC9C,wBAAwB,EAAE,0BAA0B;IACpD,uBAAuB,EAAE,yBAAyB;IAClD,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,iBAAiB,EAAE,mBAAmB;IACtC,oBAAoB,EAAE,sBAAsB;IAC5C,8BAA8B,EAAE,gCAAgC;IAChE,qBAAqB,EAAE,uBAAuB;IAC9C,gBAAgB,EAAE,kBAAkB;IACpC,0BAA0B,EAAE,4BAA4B;IACxD,iBAAiB,EAAE,mBAAmB;CAChC,CAAC;AAOE,QAAA,QAAQ,GAAG;IACpB;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,oBAAoB,EAAE,sBAAsB;IAC5C;;OAEG;IACH,UAAU,EAAE,YAAY;IACxB;;OAEG;IACH,mBAAmB,EAAE,qBAAqB;IAC1C;;OAEG;IACH,SAAS,EAAE,WAAW;IACtB;;OAEG;IACH,QAAQ,EAAE,UAAU;IACpB;;OAEG;IACH,UAAU,EAAE,YAAY;IACxB;;OAEG;IACH,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,0BAA0B,GAAG;IACtC,MAAM,EAAE,QAAQ;IAChB,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,WAAW,GAAG;IACvB;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,MAAM,EAAE,QAAQ;IAChB,OAAO,EAAE,SAAS;IAClB,MAAM,EAAE,QAAQ;IAChB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,QAAQ,GAAG;IACpB,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,GAAG;CACF,CAAC;AAIE,QAAA,0BAA0B,GAAG;IACtC,QAAQ,EAAE,UAAU;IACpB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,6BAA6B,GAAG;IACzC,KAAK,EAAE,OAAO;IACd,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B;;OAEG;IACH,qBAAqB,EAAE,uBAAuB;IAC9C;;OAEG;IACH,gCAAgC,EAAE,kCAAkC;IACpE;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,sBAAsB,EAAE,wBAAwB;IAChD;;OAEG;IACH,sBAAsB,EAAE,wBAAwB;IAChD;;OAEG;IACH,8BAA8B,EAAE,gCAAgC;IAChE;;OAEG;IACH,gBAAgB,EAAE,kBAAkB;IACpC;;OAEG;IACH,oBAAoB,EAAE,sBAAsB;IAC5C;;OAEG;IACH,2BAA2B,EAAE,6BAA6B;IAC1D;;OAEG;IACH,aAAa,EAAE,eAAe;IAC9B;;OAEG;IACH,4BAA4B,EAAE,8BAA8B;IAC5D;;OAEG;IACH,gCAAgC,EAAE,kCAAkC;IACpE;;OAEG;IACH,iCAAiC,EAAE,mCAAmC;IACtE;;OAEG;IACH,2BAA2B,EAAE,6BAA6B;IAC1D;;OAEG;IACH,qBAAqB,EAAE,uBAAuB;IAC9C;;OAEG;IACH,4BAA4B,EAAE,8BAA8B;CACtD,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;IACpB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,mBAAmB,GAAG;IAC/B;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,aAAa,EAAE,eAAe;IAC9B,oBAAoB,EAAE,sBAAsB;IAC5C,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,iBAAiB,EAAE,mBAAmB;IACtC,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,sBAAsB,GAAG;IAClC,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,0DAA0D,GAAG;IACtE;;OAEG;IACH,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,yCAAyC,GAAG;IACrD,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,QAAQ,GAAG;IACpB,GAAG,EAAE,KAAK;IACV,MAAM,EAAE,QAAQ;IAChB,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,IAAI,EAAE,MAAM;IACZ,MAAM,EAAE,QAAQ;IAChB,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,MAAM,GAAG;IAClB;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,SAAS,EAAE,WAAW;IACtB;;OAEG;IACH,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,KAAK,EAAE,OAAO;IACd,UAAU,EAAE,YAAY;CAClB,CAAC;AAOE,QAAA,sBAAsB,GAAG;IAClC,KAAK,EAAE,OAAO;IACd,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,KAAK,GAAG;IACjB;;OAEG;IACH,EAAE,EAAE,IAAI;IACR;;OAEG;IACH,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,MAAM,GAAG;IAClB,OAAO,EAAE,SAAS;IAClB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,OAAO,EAAE,SAAS;IAClB,aAAa,EAAE,eAAe;IAC9B,qBAAqB,EAAE,uBAAuB;CACxC,CAAC;AAOE,QAAA,OAAO,GAAG;IACnB,EAAE,EAAE,IAAI;IACR,EAAE,EAAE,IAAI;CACF,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,OAAO,GAAG;IACnB,cAAc,EAAE,gBAAgB;IAChC,oBAAoB,EAAE,sBAAsB;IAC5C,cAAc,EAAE,gBAAgB;IAChC,SAAS,EAAE,WAAW;IACtB,WAAW,EAAE,aAAa;IAC1B,oBAAoB,EAAE,sBAAsB;IAC5C,eAAe,EAAE,iBAAiB;IAClC,iBAAiB,EAAE,mBAAmB;IACtC,SAAS,EAAE,WAAW;IACtB,gBAAgB,EAAE,kBAAkB;IACpC,UAAU,EAAE,YAAY;IACxB,mBAAmB,EAAE,qBAAqB;IAC1C,YAAY,EAAE,cAAc;IAC5B,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,iCAAiC,EAAE,mCAAmC;IACtE,yBAAyB,EAAE,2BAA2B;IACtD,iBAAiB,EAAE,mBAAmB;IACtC,oBAAoB,EAAE,sBAAsB;IAC5C,eAAe,EAAE,iBAAiB;IAClC,0BAA0B,EAAE,4BAA4B;IACxD,aAAa,EAAE,eAAe;IAC9B,iCAAiC,EAAE,mCAAmC;IACtE,oCAAoC,EAAE,sCAAsC;IAC5E,WAAW,EAAE,aAAa;IAC1B,8BAA8B,EAAE,gCAAgC;IAChE,uBAAuB,EAAE,yBAAyB;IAClD,uBAAuB,EAAE,yBAAyB;IAClD,iCAAiC,EAAE,mCAAmC;IACtE,iCAAiC,EAAE,mCAAmC;IACtE,yBAAyB,EAAE,2BAA2B;IACtD,gCAAgC,EAAE,kCAAkC;IACpE,cAAc,EAAE,gBAAgB;IAChC,+BAA+B,EAAE,iCAAiC;IAClE,gCAAgC,EAAE,kCAAkC;IACpE,gBAAgB,EAAE,kBAAkB;IACpC,yBAAyB,EAAE,2BAA2B;IACtD,8BAA8B,EAAE,gCAAgC;IAChE,kCAAkC,EAAE,oCAAoC;IACxE,kCAAkC,EAAE,oCAAoC;IACxE,sBAAsB,EAAE,wBAAwB;IAChD,iBAAiB,EAAE,mBAAmB;IACtC,WAAW,EAAE,aAAa;IAC1B,UAAU,EAAE,YAAY;IACxB,uCAAuC,EAAE,yCAAyC;IAClF,SAAS,EAAE,WAAW;IACtB,sBAAsB,EAAE,wBAAwB;IAChD,mBAAmB,EAAE,qBAAqB;IAC1C,kBAAkB,EAAE,oBAAoB;IACxC,0BAA0B,EAAE,4BAA4B;IACxD,yBAAyB,EAAE,2BAA2B;IACtD,sCAAsC,EAAE,wCAAwC;IAChF,iCAAiC,EAAE,mCAAmC;IACtE,iCAAiC,EAAE,mCAAmC;IACtE,kCAAkC,EAAE,oCAAoC;IACxE,gCAAgC,EAAE,kCAAkC;IACpE,qCAAqC,EAAE,uCAAuC;IAC9E,+BAA+B,EAAE,iCAAiC;IAClE,wBAAwB,EAAE,0BAA0B;IACpD,iBAAiB,EAAE,mBAAmB;IACtC,4BAA4B,EAAE,8BAA8B;IAC5D,iCAAiC,EAAE,mCAAmC;IACtE,cAAc,EAAE,gBAAgB;IAChC,qBAAqB,EAAE,uBAAuB;IAC9C,eAAe,EAAE,iBAAiB;IAClC,uBAAuB,EAAE,yBAAyB;IAClD,yBAAyB,EAAE,2BAA2B;IACtD,0BAA0B,EAAE,4BAA4B;IACxD,qBAAqB,EAAE,uBAAuB;IAC9C,aAAa,EAAE,eAAe;IAC9B,2BAA2B,EAAE,6BAA6B;IAC1D,qBAAqB,EAAE,uBAAuB;IAC9C,iBAAiB,EAAE,mBAAmB;IACtC,YAAY,EAAE,cAAc;IAC5B,6BAA6B,EAAE,+BAA+B;IAC9D,eAAe,EAAE,iBAAiB;IAClC,yBAAyB,EAAE,2BAA2B;IACtD,wBAAwB,EAAE,0BAA0B;IACpD,gBAAgB,EAAE,kBAAkB;IACpC,8BAA8B,EAAE,gCAAgC;IAChE,iBAAiB,EAAE,mBAAmB;IACtC,mBAAmB,EAAE,qBAAqB;IAC1C,+BAA+B,EAAE,iCAAiC;IAClE,0BAA0B,EAAE,4BAA4B;IACxD,qBAAqB,EAAE,uBAAuB;IAC9C,2BAA2B,EAAE,6BAA6B;IAC1D,QAAQ,EAAE,UAAU;IACpB,WAAW,EAAE,aAAa;IAC1B,iBAAiB,EAAE,mBAAmB;IACtC,iBAAiB,EAAE,mBAAmB;IACtC,kBAAkB,EAAE,oBAAoB;IACxC,KAAK,EAAE,OAAO;IACd,cAAc,EAAE,gBAAgB;IAChC,sBAAsB,EAAE,wBAAwB;IAChD,gCAAgC,EAAE,kCAAkC;IACpE,eAAe,EAAE,iBAAiB;IAClC,uBAAuB,EAAE,yBAAyB;IAClD,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,cAAc,EAAE,gBAAgB;IAChC,4BAA4B,EAAE,8BAA8B;IAC5D,yBAAyB,EAAE,2BAA2B;IACtD,YAAY,EAAE,cAAc;IAC5B,6BAA6B,EAAE,+BAA+B;IAC9D,yBAAyB,EAAE,2BAA2B;IACtD,qBAAqB,EAAE,uBAAuB;IAC9C,+BAA+B,EAAE,iCAAiC;IAClE,sBAAsB,EAAE,wBAAwB;IAChD,uBAAuB,EAAE,yBAAyB;IAClD,4BAA4B,EAAE,8BAA8B;IAC5D,oBAAoB,EAAE,sBAAsB;IAC5C,iBAAiB,EAAE,mBAAmB;IACtC,8BAA8B,EAAE,gCAAgC;IAChE,oBAAoB,EAAE,sBAAsB;IAC5C,qBAAqB,EAAE,uBAAuB;IAC9C,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,kCAAkC,EAAE,oCAAoC;IACxE,2CAA2C,EAAE,6CAA6C;CACpF,CAAC;AAOE,QAAA,OAAO,GAAG;IACnB,aAAa,EAAE,eAAe;IAC9B,gBAAgB,EAAE,kBAAkB;IACpC,YAAY,EAAE,cAAc;IAC5B,gBAAgB,EAAE,kBAAkB;IACpC,oBAAoB,EAAE,sBAAsB;IAC5C,gBAAgB,EAAE,kBAAkB;IACpC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAOE,QAAA,IAAI,GAAG;IAChB,MAAM,EAAE,QAAQ;IAChB,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC;;OAEG;IACH,QAAQ,EAAE,UAAU;IACpB;;OAEG;IACH,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,GAAG,EAAE,KAAK;IACV,QAAQ,EAAE,UAAU;IACpB,IAAI,EAAE,MAAM;CACN,CAAC"}