UNPKG

@pulumi/azure-native

Version:

[![Slack](http://www.pulumi.com/images/docs/badges/slack.svg)](https://slack.pulumi.com) [![NPM version](https://badge.fury.io/js/%40pulumi%2Fazure-native.svg)](https://npmjs.com/package/@pulumi/azure-native) [![Python version](https://badge.fury.io/py/pu

651 lines • 36.6 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.State = exports.StandardSupportedClouds = exports.StandardSupportedCloud = exports.SourceType = exports.Source = exports.SeverityEnum = exports.Severity = exports.ServerVulnerabilityAssessmentsSettingKind = exports.ServerVulnerabilityAssessmentsAzureSettingSelectedProvider = exports.SecuritySolutionStatus = exports.SecurityIssue = exports.SecurityContactRole = exports.ScanningMode = exports.RuleState = exports.RecommendationType = exports.RecommendationSupportedClouds = exports.RecommendationConfigStatus = exports.Protocol = exports.PropertyType = exports.PricingTier = exports.OrganizationMembershipType = exports.Operator = exports.OfferingType = exports.MinimalSeverity = exports.MinimalRiskLevel = exports.IsEnabled = exports.ImplementationEffort = exports.GovernanceRuleType = exports.GovernanceRuleSourceResourceType = exports.GovernanceRuleOwnerSourceType = exports.ExportData = exports.ExemptionCategory = exports.EventSource = exports.EnvironmentType = exports.Enforce = exports.Effect = exports.DevOpsProvisioningState = exports.DataSource = exports.CloudName = exports.Categories = exports.AutoProvision = exports.AutoDiscovery = exports.AuthenticationType = exports.AttestationComplianceState = exports.AssessmentType = exports.AssessmentStatusCode = exports.ApplicationSourceResourceType = exports.AdditionalWorkspaceType = exports.AdditionalWorkspaceDataType = exports.ActionType = void 0; exports.UserImpact = exports.UnmaskedIpLoggingStatus = exports.Type = exports.Threats = exports.Techniques = exports.Tactics = exports.SupportedCloudEnum = exports.SubPlan = exports.StatusReason = exports.Status = void 0; exports.ActionType = { LogicApp: "LogicApp", EventHub: "EventHub", Workspace: "Workspace", }; exports.AdditionalWorkspaceDataType = { Alerts: "Alerts", RawEvents: "RawEvents", }; exports.AdditionalWorkspaceType = { Sentinel: "Sentinel", }; exports.ApplicationSourceResourceType = { /** * The source of the application is assessments */ Assessments: "Assessments", }; exports.AssessmentStatusCode = { /** * The resource is healthy */ Healthy: "Healthy", /** * The resource has a security issue that needs to be addressed */ Unhealthy: "Unhealthy", /** * Assessment for this resource did not happen */ NotApplicable: "NotApplicable", }; exports.AssessmentType = { /** * Microsoft Defender for Cloud managed assessments */ BuiltIn: "BuiltIn", /** * User defined policies that are automatically ingested from Azure Policy to Microsoft Defender for Cloud */ CustomPolicy: "CustomPolicy", /** * User assessments pushed directly by the user or other third party to Microsoft Defender for Cloud */ CustomerManaged: "CustomerManaged", }; exports.AttestationComplianceState = { Unknown: "unknown", Compliant: "compliant", NonCompliant: "nonCompliant", }; exports.AuthenticationType = { AccessToken: "AccessToken", }; exports.AutoDiscovery = { Disabled: "Disabled", Enabled: "Enabled", NotApplicable: "NotApplicable", }; exports.AutoProvision = { /** * Install missing Azure Arc agents on machines automatically */ On: "On", /** * Do not install Azure Arc agent on the machines automatically */ Off: "Off", }; exports.Categories = { Compute: "Compute", Networking: "Networking", Data: "Data", IdentityAndAccess: "IdentityAndAccess", IoT: "IoT", }; exports.CloudName = { Azure: "Azure", AWS: "AWS", GCP: "GCP", Github: "Github", AzureDevOps: "AzureDevOps", GitLab: "GitLab", DockerHub: "DockerHub", JFrog: "JFrog", }; exports.DataSource = { /** * Devices twin data */ TwinData: "TwinData", }; exports.DevOpsProvisioningState = { Succeeded: "Succeeded", Failed: "Failed", Canceled: "Canceled", Pending: "Pending", PendingDeletion: "PendingDeletion", DeletionSuccess: "DeletionSuccess", DeletionFailure: "DeletionFailure", }; exports.Effect = { Audit: "Audit", Exempt: "Exempt", Attest: "Attest", }; exports.Enforce = { /** * Allows the descendants of this scope to override the pricing configuration set on this scope (allows setting inherited="False") */ False: "False", /** * Prevents overrides and forces the current scope's pricing configuration to all descendants */ True: "True", }; exports.EnvironmentType = { AwsAccount: "AwsAccount", GcpProject: "GcpProject", GithubScope: "GithubScope", AzureDevOpsScope: "AzureDevOpsScope", GitlabScope: "GitlabScope", DockerHubOrganization: "DockerHubOrganization", JFrogArtifactory: "JFrogArtifactory", }; exports.EventSource = { Assessments: "Assessments", AssessmentsSnapshot: "AssessmentsSnapshot", SubAssessments: "SubAssessments", SubAssessmentsSnapshot: "SubAssessmentsSnapshot", Alerts: "Alerts", SecureScores: "SecureScores", SecureScoresSnapshot: "SecureScoresSnapshot", SecureScoreControls: "SecureScoreControls", SecureScoreControlsSnapshot: "SecureScoreControlsSnapshot", RegulatoryComplianceAssessment: "RegulatoryComplianceAssessment", RegulatoryComplianceAssessmentSnapshot: "RegulatoryComplianceAssessmentSnapshot", AttackPaths: "AttackPaths", AttackPathsSnapshot: "AttackPathsSnapshot", }; exports.ExemptionCategory = { Waiver: "waiver", Mitigated: "mitigated", }; exports.ExportData = { /** * Agent raw events */ RawEvents: "RawEvents", }; exports.GovernanceRuleOwnerSourceType = { /** * The rule source type defined using resource tag */ ByTag: "ByTag", /** * The rule source type defined manually */ Manually: "Manually", }; exports.GovernanceRuleSourceResourceType = { /** * The source of the governance rule is assessments */ Assessments: "Assessments", }; exports.GovernanceRuleType = { /** * The source of the rule type definition is integrated */ Integrated: "Integrated", /** * The source of the rule type definition is ServiceNow */ ServiceNow: "ServiceNow", }; exports.ImplementationEffort = { Low: "Low", Moderate: "Moderate", High: "High", }; exports.IsEnabled = { /** * Indicates the extension is enabled */ True: "True", /** * Indicates the extension is disabled */ False: "False", }; exports.MinimalRiskLevel = { /** * Get notifications on new attack paths with Critical risk level */ Critical: "Critical", /** * Get notifications on new attack paths with High or Critical risk level */ High: "High", /** * Get notifications on new attach paths with Medium, High or Critical risk level */ Medium: "Medium", /** * Get notifications on new attach paths with Low, Medium, High or Critical risk level */ Low: "Low", }; exports.MinimalSeverity = { /** * Get notifications on new alerts with High severity */ High: "High", /** * Get notifications on new alerts with Medium or High severity */ Medium: "Medium", /** * Get notifications on new alerts with Low, Medium or High severity */ Low: "Low", }; exports.OfferingType = { CspmMonitorAws: "CspmMonitorAws", DefenderForContainersAws: "DefenderForContainersAws", DefenderForServersAws: "DefenderForServersAws", DefenderForDatabasesAws: "DefenderForDatabasesAws", CspmMonitorGcp: "CspmMonitorGcp", CspmMonitorGithub: "CspmMonitorGithub", CspmMonitorAzureDevOps: "CspmMonitorAzureDevOps", DefenderForServersGcp: "DefenderForServersGcp", DefenderForContainersGcp: "DefenderForContainersGcp", DefenderForDatabasesGcp: "DefenderForDatabasesGcp", DefenderCspmAws: "DefenderCspmAws", DefenderCspmGcp: "DefenderCspmGcp", CspmMonitorGitLab: "CspmMonitorGitLab", CspmMonitorDockerHub: "CspmMonitorDockerHub", DefenderForContainersDockerHub: "DefenderForContainersDockerHub", DefenderCspmDockerHub: "DefenderCspmDockerHub", CspmMonitorJFrog: "CspmMonitorJFrog", DefenderForContainersJFrog: "DefenderForContainersJFrog", DefenderCspmJFrog: "DefenderCspmJFrog", }; exports.Operator = { /** * Applies for decimal and non-decimal operands */ Equals: "Equals", /** * Applies only for decimal operands */ GreaterThan: "GreaterThan", /** * Applies only for decimal operands */ GreaterThanOrEqualTo: "GreaterThanOrEqualTo", /** * Applies only for decimal operands */ LesserThan: "LesserThan", /** * Applies only for decimal operands */ LesserThanOrEqualTo: "LesserThanOrEqualTo", /** * Applies for decimal and non-decimal operands */ NotEquals: "NotEquals", /** * Applies only for non-decimal operands */ Contains: "Contains", /** * Applies only for non-decimal operands */ StartsWith: "StartsWith", /** * Applies only for non-decimal operands */ EndsWith: "EndsWith", }; exports.OrganizationMembershipType = { Member: "Member", Organization: "Organization", }; exports.PricingTier = { /** * Get free Microsoft Defender for Cloud experience with basic security features */ Free: "Free", /** * Get the standard Microsoft Defender for Cloud experience with advanced security features */ Standard: "Standard", }; exports.PropertyType = { String: "String", Integer: "Integer", Number: "Number", Boolean: "Boolean", }; exports.Protocol = { TCP: "TCP", UDP: "UDP", All: "*", }; exports.RecommendationConfigStatus = { Disabled: "Disabled", Enabled: "Enabled", }; exports.RecommendationSupportedClouds = { Azure: "Azure", AWS: "AWS", GCP: "GCP", }; exports.RecommendationType = { /** * Authentication schema used for pull an edge module from an ACR repository does not use Service Principal Authentication. */ IoT_ACRAuthentication: "IoT_ACRAuthentication", /** * IoT agent message size capacity is currently underutilized, causing an increase in the number of sent messages. Adjust message intervals for better utilization. */ IoT_AgentSendsUnutilizedMessages: "IoT_AgentSendsUnutilizedMessages", /** * Identified security related system configuration issues. */ IoT_Baseline: "IoT_Baseline", /** * You can optimize Edge Hub memory usage by turning off protocol heads for any protocols not used by Edge modules in your solution. */ IoT_EdgeHubMemOptimize: "IoT_EdgeHubMemOptimize", /** * Logging is disabled for this edge module. */ IoT_EdgeLoggingOptions: "IoT_EdgeLoggingOptions", /** * A minority within a device security group has inconsistent Edge Module settings with the rest of their group. */ IoT_InconsistentModuleSettings: "IoT_InconsistentModuleSettings", /** * Install the Azure Security of Things Agent. */ IoT_InstallAgent: "IoT_InstallAgent", /** * IP Filter Configuration should have rules defined for allowed traffic and should deny all other traffic by default. */ IoT_IPFilter_DenyAll: "IoT_IPFilter_DenyAll", /** * An Allow IP Filter rules source IP range is too large. Overly permissive rules might expose your IoT hub to malicious intenders. */ IoT_IPFilter_PermissiveRule: "IoT_IPFilter_PermissiveRule", /** * A listening endpoint was found on the device. */ IoT_OpenPorts: "IoT_OpenPorts", /** * An Allowed firewall policy was found (INPUT/OUTPUT). The policy should Deny all traffic by default and define rules to allow necessary communication to/from the device. */ IoT_PermissiveFirewallPolicy: "IoT_PermissiveFirewallPolicy", /** * A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports. */ IoT_PermissiveInputFirewallRules: "IoT_PermissiveInputFirewallRules", /** * A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports. */ IoT_PermissiveOutputFirewallRules: "IoT_PermissiveOutputFirewallRules", /** * Edge module is configured to run in privileged mode, with extensive Linux capabilities or with host-level network access (send/receive data to host machine). */ IoT_PrivilegedDockerOptions: "IoT_PrivilegedDockerOptions", /** * Same authentication credentials to the IoT Hub used by multiple devices. This could indicate an illegitimate device impersonating a legitimate device. It also exposes the risk of device impersonation by an attacker. */ IoT_SharedCredentials: "IoT_SharedCredentials", /** * Insecure TLS configurations detected. Immediate upgrade recommended. */ IoT_VulnerableTLSCipherSuite: "IoT_VulnerableTLSCipherSuite", }; exports.RuleState = { Enabled: "Enabled", Disabled: "Disabled", Expired: "Expired", }; exports.ScanningMode = { Default: "Default", }; exports.SecurityContactRole = { /** * If enabled, send notification on new alerts to the account admins */ AccountAdmin: "AccountAdmin", /** * If enabled, send notification on new alerts to the service admins */ ServiceAdmin: "ServiceAdmin", /** * If enabled, send notification on new alerts to the subscription owners */ Owner: "Owner", /** * If enabled, send notification on new alerts to the subscription contributors */ Contributor: "Contributor", }; exports.SecurityIssue = { Vulnerability: "Vulnerability", ExcessivePermissions: "ExcessivePermissions", AnonymousAccess: "AnonymousAccess", NetworkExposure: "NetworkExposure", TrafficEncryption: "TrafficEncryption", BestPractices: "BestPractices", }; exports.SecuritySolutionStatus = { Enabled: "Enabled", Disabled: "Disabled", }; exports.ServerVulnerabilityAssessmentsAzureSettingSelectedProvider = { /** * Microsoft Defender for Endpoints threat and vulnerability management. */ MdeTvm: "MdeTvm", }; exports.ServerVulnerabilityAssessmentsSettingKind = { AzureServersSetting: "AzureServersSetting", }; exports.Severity = { Low: "Low", Medium: "Medium", High: "High", }; exports.SeverityEnum = { High: "High", Medium: "Medium", Low: "Low", }; exports.Source = { /** * Resource is in Azure */ Azure: "Azure", /** * Resource in an on premise machine connected to Azure cloud */ OnPremise: "OnPremise", /** * SQL Resource in an on premise machine connected to Azure cloud */ OnPremiseSql: "OnPremiseSql", }; exports.SourceType = { Alert: "Alert", AttackPath: "AttackPath", }; exports.StandardSupportedCloud = { Azure: "Azure", AWS: "AWS", GCP: "GCP", }; exports.StandardSupportedClouds = { AWS: "AWS", GCP: "GCP", }; exports.State = { /** * Send notification on new alerts to the subscription's admins */ On: "On", /** * Don't send notification on new alerts to the subscription's admins */ Off: "Off", }; exports.Status = { Revoked: "Revoked", Initiated: "Initiated", }; exports.StatusReason = { Expired: "Expired", UserRequested: "UserRequested", NewerRequestInitiated: "NewerRequestInitiated", }; exports.SubPlan = { P1: "P1", P2: "P2", }; exports.SupportedCloudEnum = { AWS: "AWS", GCP: "GCP", }; exports.Tactics = { Reconnaissance: "Reconnaissance", Resource_Development: "Resource Development", Initial_Access: "Initial Access", Execution: "Execution", Persistence: "Persistence", Privilege_Escalation: "Privilege Escalation", Defense_Evasion: "Defense Evasion", Credential_Access: "Credential Access", Discovery: "Discovery", Lateral_Movement: "Lateral Movement", Collection: "Collection", Command_and_Control: "Command and Control", Exfiltration: "Exfiltration", Impact: "Impact", }; exports.Techniques = { Abuse_Elevation_Control_Mechanism: "Abuse Elevation Control Mechanism", Access_Token_Manipulation: "Access Token Manipulation", Account_Discovery: "Account Discovery", Account_Manipulation: "Account Manipulation", Active_Scanning: "Active Scanning", Application_Layer_Protocol: "Application Layer Protocol", Audio_Capture: "Audio Capture", Boot_or_Logon_Autostart_Execution: "Boot or Logon Autostart Execution", Boot_or_Logon_Initialization_Scripts: "Boot or Logon Initialization Scripts", Brute_Force: "Brute Force", Cloud_Infrastructure_Discovery: "Cloud Infrastructure Discovery", Cloud_Service_Dashboard: "Cloud Service Dashboard", Cloud_Service_Discovery: "Cloud Service Discovery", Command_and_Scripting_Interpreter: "Command and Scripting Interpreter", Compromise_Client_Software_Binary: "Compromise Client Software Binary", Compromise_Infrastructure: "Compromise Infrastructure", Container_and_Resource_Discovery: "Container and Resource Discovery", Create_Account: "Create Account", Create_or_Modify_System_Process: "Create or Modify System Process", Credentials_from_Password_Stores: "Credentials from Password Stores", Data_Destruction: "Data Destruction", Data_Encrypted_for_Impact: "Data Encrypted for Impact", Data_from_Cloud_Storage_Object: "Data from Cloud Storage Object", Data_from_Configuration_Repository: "Data from Configuration Repository", Data_from_Information_Repositories: "Data from Information Repositories", Data_from_Local_System: "Data from Local System", Data_Manipulation: "Data Manipulation", Data_Staged: "Data Staged", Defacement: "Defacement", Deobfuscate_Decode_Files_or_Information: "Deobfuscate/Decode Files or Information", Disk_Wipe: "Disk Wipe", Domain_Trust_Discovery: "Domain Trust Discovery", Drive_by_Compromise: "Drive-by Compromise", Dynamic_Resolution: "Dynamic Resolution", Endpoint_Denial_of_Service: "Endpoint Denial of Service", Event_Triggered_Execution: "Event Triggered Execution", Exfiltration_Over_Alternative_Protocol: "Exfiltration Over Alternative Protocol", Exploit_Public_Facing_Application: "Exploit Public-Facing Application", Exploitation_for_Client_Execution: "Exploitation for Client Execution", Exploitation_for_Credential_Access: "Exploitation for Credential Access", Exploitation_for_Defense_Evasion: "Exploitation for Defense Evasion", Exploitation_for_Privilege_Escalation: "Exploitation for Privilege Escalation", Exploitation_of_Remote_Services: "Exploitation of Remote Services", External_Remote_Services: "External Remote Services", Fallback_Channels: "Fallback Channels", File_and_Directory_Discovery: "File and Directory Discovery", Gather_Victim_Network_Information: "Gather Victim Network Information", Hide_Artifacts: "Hide Artifacts", Hijack_Execution_Flow: "Hijack Execution Flow", Impair_Defenses: "Impair Defenses", Implant_Container_Image: "Implant Container Image", Indicator_Removal_on_Host: "Indicator Removal on Host", Indirect_Command_Execution: "Indirect Command Execution", Ingress_Tool_Transfer: "Ingress Tool Transfer", Input_Capture: "Input Capture", Inter_Process_Communication: "Inter-Process Communication", Lateral_Tool_Transfer: "Lateral Tool Transfer", Man_in_the_Middle: "Man-in-the-Middle", Masquerading: "Masquerading", Modify_Authentication_Process: "Modify Authentication Process", Modify_Registry: "Modify Registry", Network_Denial_of_Service: "Network Denial of Service", Network_Service_Scanning: "Network Service Scanning", Network_Sniffing: "Network Sniffing", Non_Application_Layer_Protocol: "Non-Application Layer Protocol", Non_Standard_Port: "Non-Standard Port", Obtain_Capabilities: "Obtain Capabilities", Obfuscated_Files_or_Information: "Obfuscated Files or Information", Office_Application_Startup: "Office Application Startup", OS_Credential_Dumping: "OS Credential Dumping", Permission_Groups_Discovery: "Permission Groups Discovery", Phishing: "Phishing", Pre_OS_Boot: "Pre-OS Boot", Process_Discovery: "Process Discovery", Process_Injection: "Process Injection", Protocol_Tunneling: "Protocol Tunneling", Proxy: "Proxy", Query_Registry: "Query Registry", Remote_Access_Software: "Remote Access Software", Remote_Service_Session_Hijacking: "Remote Service Session Hijacking", Remote_Services: "Remote Services", Remote_System_Discovery: "Remote System Discovery", Resource_Hijacking: "Resource Hijacking", Scheduled_Task_Job: "Scheduled Task/Job", Screen_Capture: "Screen Capture", Search_Victim_Owned_Websites: "Search Victim-Owned Websites", Server_Software_Component: "Server Software Component", Service_Stop: "Service Stop", Signed_Binary_Proxy_Execution: "Signed Binary Proxy Execution", Software_Deployment_Tools: "Software Deployment Tools", SQL_Stored_Procedures: "SQL Stored Procedures", Steal_or_Forge_Kerberos_Tickets: "Steal or Forge Kerberos Tickets", Subvert_Trust_Controls: "Subvert Trust Controls", Supply_Chain_Compromise: "Supply Chain Compromise", System_Information_Discovery: "System Information Discovery", Taint_Shared_Content: "Taint Shared Content", Traffic_Signaling: "Traffic Signaling", Transfer_Data_to_Cloud_Account: "Transfer Data to Cloud Account", Trusted_Relationship: "Trusted Relationship", Unsecured_Credentials: "Unsecured Credentials", User_Execution: "User Execution", Valid_Accounts: "Valid Accounts", Windows_Management_Instrumentation: "Windows Management Instrumentation", File_and_Directory_Permissions_Modification: "File and Directory Permissions Modification", }; exports.Threats = { AccountBreach: "accountBreach", DataExfiltration: "dataExfiltration", DataSpillage: "dataSpillage", MaliciousInsider: "maliciousInsider", ElevationOfPrivilege: "elevationOfPrivilege", ThreatResistance: "threatResistance", MissingCoverage: "missingCoverage", DenialOfService: "denialOfService", }; exports.Type = { Qualys: "Qualys", TVM: "TVM", }; exports.UnmaskedIpLoggingStatus = { /** * Unmasked IP logging is disabled */ Disabled: "Disabled", /** * Unmasked IP logging is enabled */ Enabled: "Enabled", }; exports.UserImpact = { Low: "Low", Moderate: "Moderate", High: "High", }; //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../types/enums/security/index.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;;AAGpE,QAAA,UAAU,GAAG;IACtB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,2BAA2B,GAAG;IACvC,MAAM,EAAE,QAAQ;IAChB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,6BAA6B,GAAG;IACzC;;OAEG;IACH,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,oBAAoB,GAAG;IAChC;;OAEG;IACH,OAAO,EAAE,SAAS;IAClB;;OAEG;IACH,SAAS,EAAE,WAAW;IACtB;;OAEG;IACH,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,cAAc,GAAG;IAC1B;;OAEG;IACH,OAAO,EAAE,SAAS;IAClB;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAOE,QAAA,0BAA0B,GAAG;IACtC,OAAO,EAAE,SAAS;IAClB,SAAS,EAAE,WAAW;IACtB,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,QAAQ,EAAE,UAAU;IACpB,OAAO,EAAE,SAAS;IAClB,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB;;OAEG;IACH,EAAE,EAAE,IAAI;IACR;;OAEG;IACH,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,OAAO,EAAE,SAAS;IAClB,UAAU,EAAE,YAAY;IACxB,IAAI,EAAE,MAAM;IACZ,iBAAiB,EAAE,mBAAmB;IACtC,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB,KAAK,EAAE,OAAO;IACd,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;IACV,MAAM,EAAE,QAAQ;IAChB,WAAW,EAAE,aAAa;IAC1B,MAAM,EAAE,QAAQ;IAChB,SAAS,EAAE,WAAW;IACtB,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB;;OAEG;IACH,QAAQ,EAAE,UAAU;CACd,CAAC;AAIE,QAAA,uBAAuB,GAAG;IACnC,SAAS,EAAE,WAAW;IACtB,MAAM,EAAE,QAAQ;IAChB,QAAQ,EAAE,UAAU;IACpB,OAAO,EAAE,SAAS;IAClB,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAeE,QAAA,MAAM,GAAG;IAClB,KAAK,EAAE,OAAO;IACd,MAAM,EAAE,QAAQ;IAChB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,OAAO,GAAG;IACnB;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,eAAe,GAAG;IAC3B,UAAU,EAAE,YAAY;IACxB,UAAU,EAAE,YAAY;IACxB,WAAW,EAAE,aAAa;IAC1B,gBAAgB,EAAE,kBAAkB;IACpC,WAAW,EAAE,aAAa;IAC1B,qBAAqB,EAAE,uBAAuB;IAC9C,gBAAgB,EAAE,kBAAkB;CAC9B,CAAC;AAOE,QAAA,WAAW,GAAG;IACvB,WAAW,EAAE,aAAa;IAC1B,mBAAmB,EAAE,qBAAqB;IAC1C,cAAc,EAAE,gBAAgB;IAChC,sBAAsB,EAAE,wBAAwB;IAChD,MAAM,EAAE,QAAQ;IAChB,YAAY,EAAE,cAAc;IAC5B,oBAAoB,EAAE,sBAAsB;IAC5C,mBAAmB,EAAE,qBAAqB;IAC1C,2BAA2B,EAAE,6BAA6B;IAC1D,8BAA8B,EAAE,gCAAgC;IAChE,sCAAsC,EAAE,wCAAwC;IAChF,WAAW,EAAE,aAAa;IAC1B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B,MAAM,EAAE,QAAQ;IAChB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB;;OAEG;IACH,SAAS,EAAE,WAAW;CAChB,CAAC;AAIE,QAAA,6BAA6B,GAAG;IACzC;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,gCAAgC,GAAG;IAC5C;;OAEG;IACH,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B;;OAEG;IACH,UAAU,EAAE,YAAY;IACxB;;OAEG;IACH,UAAU,EAAE,YAAY;CAClB,CAAC;AAOE,QAAA,oBAAoB,GAAG;IAChC,GAAG,EAAE,KAAK;IACV,QAAQ,EAAE,UAAU;IACpB,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,gBAAgB,GAAG;IAC5B;;OAEG;IACH,QAAQ,EAAE,UAAU;IACpB;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,eAAe,GAAG;IAC3B;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,cAAc,EAAE,gBAAgB;IAChC,wBAAwB,EAAE,0BAA0B;IACpD,qBAAqB,EAAE,uBAAuB;IAC9C,uBAAuB,EAAE,yBAAyB;IAClD,cAAc,EAAE,gBAAgB;IAChC,iBAAiB,EAAE,mBAAmB;IACtC,sBAAsB,EAAE,wBAAwB;IAChD,qBAAqB,EAAE,uBAAuB;IAC9C,wBAAwB,EAAE,0BAA0B;IACpD,uBAAuB,EAAE,yBAAyB;IAClD,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,iBAAiB,EAAE,mBAAmB;IACtC,oBAAoB,EAAE,sBAAsB;IAC5C,8BAA8B,EAAE,gCAAgC;IAChE,qBAAqB,EAAE,uBAAuB;IAC9C,gBAAgB,EAAE,kBAAkB;IACpC,0BAA0B,EAAE,4BAA4B;IACxD,iBAAiB,EAAE,mBAAmB;CAChC,CAAC;AAOE,QAAA,QAAQ,GAAG;IACpB;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,oBAAoB,EAAE,sBAAsB;IAC5C;;OAEG;IACH,UAAU,EAAE,YAAY;IACxB;;OAEG;IACH,mBAAmB,EAAE,qBAAqB;IAC1C;;OAEG;IACH,SAAS,EAAE,WAAW;IACtB;;OAEG;IACH,QAAQ,EAAE,UAAU;IACpB;;OAEG;IACH,UAAU,EAAE,YAAY;IACxB;;OAEG;IACH,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,0BAA0B,GAAG;IACtC,MAAM,EAAE,QAAQ;IAChB,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,WAAW,GAAG;IACvB;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,MAAM,EAAE,QAAQ;IAChB,OAAO,EAAE,SAAS;IAClB,MAAM,EAAE,QAAQ;IAChB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,QAAQ,GAAG;IACpB,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,GAAG;CACF,CAAC;AAIE,QAAA,0BAA0B,GAAG;IACtC,QAAQ,EAAE,UAAU;IACpB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,6BAA6B,GAAG;IACzC,KAAK,EAAE,OAAO;IACd,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B;;OAEG;IACH,qBAAqB,EAAE,uBAAuB;IAC9C;;OAEG;IACH,gCAAgC,EAAE,kCAAkC;IACpE;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,sBAAsB,EAAE,wBAAwB;IAChD;;OAEG;IACH,sBAAsB,EAAE,wBAAwB;IAChD;;OAEG;IACH,8BAA8B,EAAE,gCAAgC;IAChE;;OAEG;IACH,gBAAgB,EAAE,kBAAkB;IACpC;;OAEG;IACH,oBAAoB,EAAE,sBAAsB;IAC5C;;OAEG;IACH,2BAA2B,EAAE,6BAA6B;IAC1D;;OAEG;IACH,aAAa,EAAE,eAAe;IAC9B;;OAEG;IACH,4BAA4B,EAAE,8BAA8B;IAC5D;;OAEG;IACH,gCAAgC,EAAE,kCAAkC;IACpE;;OAEG;IACH,iCAAiC,EAAE,mCAAmC;IACtE;;OAEG;IACH,2BAA2B,EAAE,6BAA6B;IAC1D;;OAEG;IACH,qBAAqB,EAAE,uBAAuB;IAC9C;;OAEG;IACH,4BAA4B,EAAE,8BAA8B;CACtD,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;IACpB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,mBAAmB,GAAG;IAC/B;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,aAAa,EAAE,eAAe;IAC9B,oBAAoB,EAAE,sBAAsB;IAC5C,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,iBAAiB,EAAE,mBAAmB;IACtC,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,sBAAsB,GAAG;IAClC,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,0DAA0D,GAAG;IACtE;;OAEG;IACH,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,yCAAyC,GAAG;IACrD,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,QAAQ,GAAG;IACpB,GAAG,EAAE,KAAK;IACV,MAAM,EAAE,QAAQ;IAChB,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,IAAI,EAAE,MAAM;IACZ,MAAM,EAAE,QAAQ;IAChB,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,MAAM,GAAG;IAClB;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,SAAS,EAAE,WAAW;IACtB;;OAEG;IACH,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,KAAK,EAAE,OAAO;IACd,UAAU,EAAE,YAAY;CAClB,CAAC;AAOE,QAAA,sBAAsB,GAAG;IAClC,KAAK,EAAE,OAAO;IACd,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,KAAK,GAAG;IACjB;;OAEG;IACH,EAAE,EAAE,IAAI;IACR;;OAEG;IACH,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,MAAM,GAAG;IAClB,OAAO,EAAE,SAAS;IAClB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,OAAO,EAAE,SAAS;IAClB,aAAa,EAAE,eAAe;IAC9B,qBAAqB,EAAE,uBAAuB;CACxC,CAAC;AAOE,QAAA,OAAO,GAAG;IACnB,EAAE,EAAE,IAAI;IACR,EAAE,EAAE,IAAI;CACF,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B,GAAG,EAAE,KAAK;IACV,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,OAAO,GAAG;IACnB,cAAc,EAAE,gBAAgB;IAChC,oBAAoB,EAAE,sBAAsB;IAC5C,cAAc,EAAE,gBAAgB;IAChC,SAAS,EAAE,WAAW;IACtB,WAAW,EAAE,aAAa;IAC1B,oBAAoB,EAAE,sBAAsB;IAC5C,eAAe,EAAE,iBAAiB;IAClC,iBAAiB,EAAE,mBAAmB;IACtC,SAAS,EAAE,WAAW;IACtB,gBAAgB,EAAE,kBAAkB;IACpC,UAAU,EAAE,YAAY;IACxB,mBAAmB,EAAE,qBAAqB;IAC1C,YAAY,EAAE,cAAc;IAC5B,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,iCAAiC,EAAE,mCAAmC;IACtE,yBAAyB,EAAE,2BAA2B;IACtD,iBAAiB,EAAE,mBAAmB;IACtC,oBAAoB,EAAE,sBAAsB;IAC5C,eAAe,EAAE,iBAAiB;IAClC,0BAA0B,EAAE,4BAA4B;IACxD,aAAa,EAAE,eAAe;IAC9B,iCAAiC,EAAE,mCAAmC;IACtE,oCAAoC,EAAE,sCAAsC;IAC5E,WAAW,EAAE,aAAa;IAC1B,8BAA8B,EAAE,gCAAgC;IAChE,uBAAuB,EAAE,yBAAyB;IAClD,uBAAuB,EAAE,yBAAyB;IAClD,iCAAiC,EAAE,mCAAmC;IACtE,iCAAiC,EAAE,mCAAmC;IACtE,yBAAyB,EAAE,2BAA2B;IACtD,gCAAgC,EAAE,kCAAkC;IACpE,cAAc,EAAE,gBAAgB;IAChC,+BAA+B,EAAE,iCAAiC;IAClE,gCAAgC,EAAE,kCAAkC;IACpE,gBAAgB,EAAE,kBAAkB;IACpC,yBAAyB,EAAE,2BAA2B;IACtD,8BAA8B,EAAE,gCAAgC;IAChE,kCAAkC,EAAE,oCAAoC;IACxE,kCAAkC,EAAE,oCAAoC;IACxE,sBAAsB,EAAE,wBAAwB;IAChD,iBAAiB,EAAE,mBAAmB;IACtC,WAAW,EAAE,aAAa;IAC1B,UAAU,EAAE,YAAY;IACxB,uCAAuC,EAAE,yCAAyC;IAClF,SAAS,EAAE,WAAW;IACtB,sBAAsB,EAAE,wBAAwB;IAChD,mBAAmB,EAAE,qBAAqB;IAC1C,kBAAkB,EAAE,oBAAoB;IACxC,0BAA0B,EAAE,4BAA4B;IACxD,yBAAyB,EAAE,2BAA2B;IACtD,sCAAsC,EAAE,wCAAwC;IAChF,iCAAiC,EAAE,mCAAmC;IACtE,iCAAiC,EAAE,mCAAmC;IACtE,kCAAkC,EAAE,oCAAoC;IACxE,gCAAgC,EAAE,kCAAkC;IACpE,qCAAqC,EAAE,uCAAuC;IAC9E,+BAA+B,EAAE,iCAAiC;IAClE,wBAAwB,EAAE,0BAA0B;IACpD,iBAAiB,EAAE,mBAAmB;IACtC,4BAA4B,EAAE,8BAA8B;IAC5D,iCAAiC,EAAE,mCAAmC;IACtE,cAAc,EAAE,gBAAgB;IAChC,qBAAqB,EAAE,uBAAuB;IAC9C,eAAe,EAAE,iBAAiB;IAClC,uBAAuB,EAAE,yBAAyB;IAClD,yBAAyB,EAAE,2BAA2B;IACtD,0BAA0B,EAAE,4BAA4B;IACxD,qBAAqB,EAAE,uBAAuB;IAC9C,aAAa,EAAE,eAAe;IAC9B,2BAA2B,EAAE,6BAA6B;IAC1D,qBAAqB,EAAE,uBAAuB;IAC9C,iBAAiB,EAAE,mBAAmB;IACtC,YAAY,EAAE,cAAc;IAC5B,6BAA6B,EAAE,+BAA+B;IAC9D,eAAe,EAAE,iBAAiB;IAClC,yBAAyB,EAAE,2BAA2B;IACtD,wBAAwB,EAAE,0BAA0B;IACpD,gBAAgB,EAAE,kBAAkB;IACpC,8BAA8B,EAAE,gCAAgC;IAChE,iBAAiB,EAAE,mBAAmB;IACtC,mBAAmB,EAAE,qBAAqB;IAC1C,+BAA+B,EAAE,iCAAiC;IAClE,0BAA0B,EAAE,4BAA4B;IACxD,qBAAqB,EAAE,uBAAuB;IAC9C,2BAA2B,EAAE,6BAA6B;IAC1D,QAAQ,EAAE,UAAU;IACpB,WAAW,EAAE,aAAa;IAC1B,iBAAiB,EAAE,mBAAmB;IACtC,iBAAiB,EAAE,mBAAmB;IACtC,kBAAkB,EAAE,oBAAoB;IACxC,KAAK,EAAE,OAAO;IACd,cAAc,EAAE,gBAAgB;IAChC,sBAAsB,EAAE,wBAAwB;IAChD,gCAAgC,EAAE,kCAAkC;IACpE,eAAe,EAAE,iBAAiB;IAClC,uBAAuB,EAAE,yBAAyB;IAClD,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,cAAc,EAAE,gBAAgB;IAChC,4BAA4B,EAAE,8BAA8B;IAC5D,yBAAyB,EAAE,2BAA2B;IACtD,YAAY,EAAE,cAAc;IAC5B,6BAA6B,EAAE,+BAA+B;IAC9D,yBAAyB,EAAE,2BAA2B;IACtD,qBAAqB,EAAE,uBAAuB;IAC9C,+BAA+B,EAAE,iCAAiC;IAClE,sBAAsB,EAAE,wBAAwB;IAChD,uBAAuB,EAAE,yBAAyB;IAClD,4BAA4B,EAAE,8BAA8B;IAC5D,oBAAoB,EAAE,sBAAsB;IAC5C,iBAAiB,EAAE,mBAAmB;IACtC,8BAA8B,EAAE,gCAAgC;IAChE,oBAAoB,EAAE,sBAAsB;IAC5C,qBAAqB,EAAE,uBAAuB;IAC9C,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,kCAAkC,EAAE,oCAAoC;IACxE,2CAA2C,EAAE,6CAA6C;CACpF,CAAC;AAOE,QAAA,OAAO,GAAG;IACnB,aAAa,EAAE,eAAe;IAC9B,gBAAgB,EAAE,kBAAkB;IACpC,YAAY,EAAE,cAAc;IAC5B,gBAAgB,EAAE,kBAAkB;IACpC,oBAAoB,EAAE,sBAAsB;IAC5C,gBAAgB,EAAE,kBAAkB;IACpC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAOE,QAAA,IAAI,GAAG;IAChB,MAAM,EAAE,QAAQ;IAChB,GAAG,EAAE,KAAK;CACJ,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC;;OAEG;IACH,QAAQ,EAAE,UAAU;IACpB;;OAEG;IACH,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,GAAG,EAAE,KAAK;IACV,QAAQ,EAAE,UAAU;IACpB,IAAI,EAAE,MAAM;CACN,CAAC"}