diff --git a/MANIFEST.in b/MANIFEST.in index a444f9d..aa34b2b 100644 --- a/MANIFEST.in +++ b/MANIFEST.in @@ -3,3 +3,8 @@ include certidude/templates/*.html include certidude/templates/*.svg include certidude/templates/*.ovpn include certidude/templates/*.cnf +include certidude/templates/*.conf +include certidude/templates/*.ini +include certidude/static/js/*.js +include certidude/static/css/*.css +include certidude/static/*.html diff --git a/README.rst b/README.rst index dc8a79e..203146e 100644 --- a/README.rst +++ b/README.rst @@ -13,13 +13,14 @@ Features -------- * Standard request, sign, revoke workflow via web interface. -* Colored command-line interface, check out ``certidude list`` -* OpenVPN integration, check out ``certidude setup openvpn server`` and ``certidude setup openvpn client`` +* Colored command-line interface, check out ``certidude list``. +* OpenVPN integration, check out ``certidude setup openvpn server`` and ``certidude setup openvpn client``. +* strongSwan integration, check out ``certidude setup strongswan server`` and ``certidude setup strongswan client``. * Privilege isolation, separate signer process is spawned per private key isolating private key use from the the web interface. * Certificate numbering obfuscation, certificate serial numbers are intentionally randomized to avoid leaking information about business practices. -* Server-side events support via for example nginx-push-stream-module +* Server-side events support via for example nginx-push-stream-module. TODO @@ -27,7 +28,6 @@ TODO * Refactor mailing subsystem and server-side events to use hooks. * Notifications via e-mail. -* strongSwan setup integration. * OCSP support. * Deep mailbox integration, eg fetch CSR-s from mailbox via IMAP. * WebCrypto support, meanwhile check out `hwcrypto.js `_. @@ -42,14 +42,14 @@ To install Certidude: .. code:: bash - apt-get install python3 python3-pip python3-dev cython3 build-essential libffi-dev libssl-dev + apt-get install -y python3 python3-netifaces python3-pip python3-dev cython3 build-essential libffi-dev libssl-dev pip3 install certidude - -Create a user for ``certidude``: + +Create a system user for ``certidude``: .. code:: bash - useradd certidude + adduser --system --no-create-home --group certidude Setting up CA @@ -64,6 +64,12 @@ Certidude can set up CA relatively easily: Tweak command-line options until you meet your requirements and then insert generated section to your /etc/ssl/openssl.cnf +Spawn the signer process: + +.. code:: bash + + certidude spawn + Finally serve the certificate authority via web: .. code:: bash @@ -102,7 +108,13 @@ Install uWSGI: apt-get install uwsgi uwsgi-plugin-python3 -Configure uUWSGI application in ``/etc/uwsgi/apps-available/certidude.ini``: +To set up ``nginx`` and ``uwsgi`` is suggested: + +.. code:: bash + + certidude setup production + +Otherwise manually configure uUWSGI application in ``/etc/uwsgi/apps-available/certidude.ini``: .. code:: ini diff --git a/certidude/api.py b/certidude/api.py index fdd0926..27d9a21 100644 --- a/certidude/api.py +++ b/certidude/api.py @@ -191,6 +191,16 @@ class RequestListResource(CertificateAuthorityBase): """ Submit certificate signing request (CSR) in PEM format """ + # Parse remote IPv4/IPv6 address + remote_addr = ipaddress.ip_address(req.env["REMOTE_ADDR"]) + + # Check for CSR submission whitelist + if ca.request_whitelist: + for subnet in ca.request_whitelist: + if subnet.overlaps(remote_addr): + break + else: + raise falcon.HTTPForbidden("IP address %s not whitelisted" % remote_addr) if req.get_header("Content-Type") != "application/pkcs10": raise falcon.HTTPUnsupportedMediaType( @@ -207,20 +217,23 @@ class RequestListResource(CertificateAuthorityBase): else: cert = Certificate(cert_buf) if cert.pubkey == csr.pubkey: - resp.status = falcon.HTTP_FOUND + resp.status = falcon.HTTP_SEE_OTHER resp.location = os.path.join(os.path.dirname(req.relative_uri), "signed", csr.common_name) return # TODO: check for revoked certificates and return HTTP 410 Gone # Process automatic signing if the IP address is whitelisted and autosigning was requested - if ca.autosign_allowed(req.env["REMOTE_ADDR"]) and req.get_param("autosign"): - try: - resp.append_header("Content-Type", "application/x-x509-user-cert") - resp.body = ca.sign(req).dump() - return - except FileExistsError: # Certificate already exists, try to save the request - pass + if req.get_param("autosign").lower() in ("yes", "1", "true"): + for subnet in ca.autosign_whitelist: + if subnet.overlaps(remote_addr): + try: + resp.append_header("Content-Type", "application/x-x509-user-cert") + resp.body = ca.sign(req).dump() + return + except FileExistsError: # Certificate already exists, try to save the request + pass + break # Attempt to save the request otherwise try: @@ -237,7 +250,7 @@ class RequestListResource(CertificateAuthorityBase): # Redirect to nginx pub/sub url = url_template % dict(channel=request.fingerprint()) click.echo("Redirecting to: %s" % url) - resp.status = falcon.HTTP_FOUND + resp.status = falcon.HTTP_SEE_OTHER resp.append_header("Location", url) else: click.echo("Using dummy streaming mode, please switch to nginx in production!", err=True) diff --git a/certidude/cli.py b/certidude/cli.py index 45ec1cf..fef12d8 100755 --- a/certidude/cli.py +++ b/certidude/cli.py @@ -1,33 +1,35 @@ -#!/usr/bin/python3 +#!/usr/bin/env python3 # coding: utf-8 -import sys +import asyncore +import click +import falcon +import logging +import mimetypes +import netifaces +import os import pwd import random -import socket -import click -import os -import asyncore -import time -import os import re -import logging import signal -import netifaces -import urllib.request +import socket import subprocess -from humanize import naturaltime -from ipaddress import ip_network -from time import sleep -from datetime import datetime -from OpenSSL import crypto -from setproctitle import setproctitle +import sys +import time +from certidude.helpers import expand_paths, \ + certidude_request_certificate from certidude.signer import SignServer -from jinja2 import Environment, PackageLoader from certidude.wrappers import CertificateAuthorityConfig, \ CertificateAuthority, Certificate, subject2dn, Request +from datetime import datetime +from humanize import naturaltime +from ipaddress import ip_network +from jinja2 import Environment, PackageLoader +from time import sleep +from setproctitle import setproctitle +from OpenSSL import crypto -env = Environment(loader=PackageLoader("certidude", "templates")) +env = Environment(loader=PackageLoader("certidude", "templates"), trim_blocks=True) # Big fat warning: # m2crypto overflows around 2030 because on 32-bit systems @@ -42,17 +44,20 @@ assert hasattr(crypto.X509Req(), "get_extensions"), "You're running too old vers # http://www.mad-hacking.net/documentation/linux/security/ssl-tls/creating-ca.xml # https://kjur.github.io/jsrsasign/ # keyUsage, extendedKeyUsage - https://www.openssl.org/docs/apps/x509v3_config.html +# strongSwan key paths - https://wiki.strongswan.org/projects/1/wiki/SimpleCA config = CertificateAuthorityConfig("/etc/ssl/openssl.cnf") # Parse command-line argument defaults from environment HOSTNAME = socket.gethostname() USERNAME = os.environ.get("USER") -EMAIL = USERNAME + "@" + HOSTNAME NOW = datetime.utcnow().replace(tzinfo=None) - FIRST_NAME = None SURNAME = None +EMAIL = None + +if USERNAME: + EMAIL = USERNAME + "@" + HOSTNAME if os.getuid() >= 1000: _, _, _, _, gecos, _, _ = pwd.getpwnam(USERNAME) @@ -61,33 +66,18 @@ if os.getuid() >= 1000: else: FIRST_NAME = gecos -def first_nic_address(): - """ - Return IP address of the first network interface - """ - for interface in netifaces.interfaces(): - if interface == "lo": - continue - for iftype, addresses in netifaces.ifaddresses(interface).items(): - if iftype != 2: - continue - for address in addresses: - return address.pop("addr") - raise ValueError("Unable to determine IP address of first NIC") +DEFAULT_ROUTE, PRIMARY_INTERFACE = netifaces.gateways().get("default").get(2) +PRIMARY_ALIASES = netifaces.ifaddresses(PRIMARY_INTERFACE).get(2) +PRIMARY_ADDRESS = PRIMARY_ALIASES[0].get("addr") -def spawn_signers(kill, no_interaction): +@click.command("spawn", help="Run privilege isolated signer processes") +@click.option("-k", "--kill", default=False, is_flag=True, help="Kill previous instances") +@click.option("-n", "--no-interaction", default=True, is_flag=True, help="Don't load password protected keys") +def certidude_spawn(kill, no_interaction): """ Spawn processes for signers """ - os.umask(0o027) - uid = os.getuid() - assert uid == 0, "Not running as root" - - # Preload charmap encoding for byte_string() function of pyOpenSSL - # in order to enable chrooting - "".encode("charmap") - # Process directories run_dir = "/run/certidude" signer_dir = os.path.join(run_dir, "signer") @@ -98,6 +88,14 @@ def spawn_signers(kill, no_interaction): click.echo("Creating: %s" % signer_dir) os.makedirs(signer_dir) + os.umask(0o027) + uid = os.getuid() + assert uid == 0, "Not running as root" + + # Preload charmap encoding for byte_string() function of pyOpenSSL + # in order to enable chrooting + "".encode("charmap") + # Prepare chroot directories if not os.path.exists(os.path.join(chroot_dir, "dev")): os.makedirs(os.path.join(chroot_dir, "dev")) @@ -106,11 +104,11 @@ def spawn_signers(kill, no_interaction): os.system("mknod -m 444 %s c 1 9" % os.path.join(chroot_dir, "dev", "urandom")) for ca in config.all_authorities(): - - pidfile = "/run/certidude/signer/%s.pid" % ca.slug + socket_path = os.path.join(signer_dir, ca.slug + ".sock") + pidfile_path = os.path.join(signer_dir, ca.slug + ".pid") try: - with open(pidfile) as fh: + with open(pidfile_path) as fh: pid = int(fh.readline()) os.kill(pid, 0) click.echo("Found process with PID %d for %s" % (pid, ca.slug)) @@ -133,158 +131,19 @@ def spawn_signers(kill, no_interaction): child_pid = os.fork() if child_pid == 0: - with open(pidfile, "w") as fh: + with open(pidfile_path, "w") as fh: fh.write("%d\n" % os.getpid()) setproctitle("%s spawn %s" % (sys.argv[0], ca.slug)) logging.basicConfig( filename="/var/log/certidude-%s.log" % ca.slug, level=logging.INFO) - socket_path = os.path.join(signer_dir, ca.slug + ".sock") - click.echo("Spawned certidude signer process with PID %d at %s" % (os.getpid(), socket_path)) server = SignServer(socket_path, ca.private_key, ca.certificate.path, - ca.lifetime, ca.basic_constraints, ca.key_usage, ca.extended_key_usage) + ca.certificate_lifetime, ca.basic_constraints, ca.key_usage, + ca.extended_key_usage, ca.revocation_list_lifetime) asyncore.loop() - -def certidude_request_certificate(url, key_path, request_path, certificate_path, authority_path, common_name, org_unit, email_address=None, given_name=None, surname=None, autosign=False, wait=False, key_usage=None, extended_key_usage=None): - """ - Exchange CSR for certificate using Certidude HTTP API server - """ - - # Set up URL-s - request_params = set() - if autosign: - request_params.add("autosign=yes") - if wait: - request_params.add("wait=forever") - - if not url.endswith("/"): - url = url + "/" - - authority_url = url + "certificate" - request_url = url + "request" - - if request_params: - request_url = request_url + "?" + "&".join(request_params) - - if os.path.exists(authority_path): - click.echo("Found CA certificate in: %s" % authority_path) - else: - if authority_url: - click.echo("Attempting to fetch CA certificate from %s" % authority_url) - try: - with urllib.request.urlopen(authority_url) as fh: - buf = fh.read() - try: - cert = crypto.load_certificate(crypto.FILETYPE_PEM, buf) - except crypto.Error: - raise ValueError("Failed to parse PEM: %s" % buf) - with open(authority_path + ".part", "wb") as oh: - oh.write(buf) - click.echo("Writing CA certificate to: %s" % authority_path) - os.rename(authority_path + ".part", authority_path) - except urllib.error.HTTPError as e: - click.echo("Failed to fetch CA certificate, server responded with: %d %s" % (e.code, e.reason), err=True) - return 1 else: - raise FileNotFoundError("CA certificate not found and no URL specified") - - try: - certificate = Certificate(open(certificate_path)) - click.echo("Found certificate: %s" % certificate_path) - except FileNotFoundError: - try: - request = Request(open(request_path)) - click.echo("Found signing request: %s" % request_path) - except FileNotFoundError: - - # Construct private key - click.echo("Generating 4096-bit RSA key...") - key = crypto.PKey() - key.generate_key(crypto.TYPE_RSA, 4096) - - # Dump private key - os.umask(0o077) - with open(key_path + ".part", "wb") as fh: - fh.write(crypto.dump_privatekey(crypto.FILETYPE_PEM, key)) - - # Construct CSR - csr = crypto.X509Req() - csr.set_pubkey(key) - request = Request(csr) - - # Set subject attributes - request.common_name = common_name - if given_name: - request.given_name = given_name - if surname: - request.surname = surname - if org_unit: - request.organizational_unit = org_unit - - # Set extensions - extensions = [] - if key_usage: - extensions.append(("keyUsage", key_usage, True)) - if extended_key_usage: - extensions.append(("extendedKeyUsage", extended_key_usage, True)) - if email_address: - extensions.append(("subjectAltName", "email:" + email_address, False)) - request.set_extensions(extensions) - - # Dump CSR - os.umask(0o022) - with open(request_path + ".part", "w") as fh: - fh.write(request.dump()) - - click.echo("Writing private key to: %s" % key_path) - os.rename(key_path + ".part", key_path) - click.echo("Writing certificate signing request to: %s" % request_path) - os.rename(request_path + ".part", request_path) - - - with open(request_path, "rb") as fh: - buf = fh.read() - submission = urllib.request.Request(request_url, buf) - submission.add_header("User-Agent", "Certidude") - submission.add_header("Content-Type", "application/pkcs10") - - click.echo("Submitting to %s, waiting for response..." % request_url) - try: - response = urllib.request.urlopen(submission) - buf = response.read() - cert = crypto.load_certificate(crypto.FILETYPE_PEM, buf) - except crypto.Error: - raise ValueError("Failed to parse PEM: %s" % buf) - except urllib.error.HTTPError as e: - if e.code == 409: - click.echo("Different signing request with same CN is already present on server, server refuses to overwrite", err=True) - return 2 - else: - click.echo("Failed to fetch certificate, server responded with: %d %s" % (e.code, e.reason), err=True) - return 3 - else: - if response.code == 202: - click.echo("Server stored the request for processing (202 Accepted), but waiting was not requested, hence quitting for now", err=True) - return 254 - - os.umask(0o022) - with open(certificate_path + ".part", "wb") as gh: - gh.write(buf) - - click.echo("Writing certificate to: %s" % certificate_path) - os.rename(certificate_path + ".part", certificate_path) - - # TODO: Validate fetched certificate against CA - # TODO: Check that recevied certificate CN and pubkey match - # TODO: Check file permissions - - -@click.command("spawn", help="Run privilege isolated signer processes") -@click.option("-k", "--kill", default=False, is_flag=True, help="Kill previous instances") -@click.option("-n", "--no-interaction", default=True, is_flag=True, help="Don't load password protected keys") -def certidude_spawn(**args): - spawn_signers(**args) + click.echo("Spawned certidude signer process with PID %d at %s" % (child_pid, socket_path)) @click.command("client", help="Setup X.509 certificates for application") @@ -313,9 +172,10 @@ def certidude_setup_client(quiet, **kwargs): @click.option("--org-unit", "-ou", help="Organizational unit") @click.option("--email-address", "-m", default=EMAIL, help="E-mail associated with the request, '%s' by default" % EMAIL) @click.option("--subnet", "-s", default="192.168.33.0/24", type=ip_network, help="OpenVPN subnet, 192.168.33.0/24 by default") -@click.option("--local", "-l", default=first_nic_address(), help="OpenVPN listening address, %s" % first_nic_address()) +@click.option("--local", "-l", default=PRIMARY_ADDRESS, help="OpenVPN listening address, %s" % PRIMARY_ADDRESS) @click.option("--port", "-p", default=1194, type=click.IntRange(1,60000), help="OpenVPN listening port, 1194 by default") @click.option('--proto', "-t", default="udp", type=click.Choice(['udp', 'tcp']), help="OpenVPN transport protocol, UDP by default") +@click.option("--route", "-r", type=ip_network, multiple=True, help="Subnets to advertise via this connection, multiple allowed") @click.option("--config", "-o", default="/etc/openvpn/site-to-client.conf", type=click.File(mode="w", atomic=True, lazy=True), @@ -326,7 +186,8 @@ def certidude_setup_client(quiet, **kwargs): @click.option("--certificate-path", "-crt", default=HOSTNAME + ".crt", help="Certificate path, %s.crt relative to --directory by default" % HOSTNAME) @click.option("--dhparam-path", "-dh", default="dhparam2048.pem", help="Diffie/Hellman parameters path, dhparam2048.pem relative to --directory by default") @click.option("--authority-path", "-ca", default="ca.crt", help="Certificate authority certificate path, ca.crt relative to --dir by default") -def certidude_setup_openvpn_server(url, config, subnet, email_address, common_name, org_unit, directory, key_path, request_path, certificate_path, authority_path, dhparam_path, local, proto, port): +@expand_paths() +def certidude_setup_openvpn_server(url, config, subnet, route, email_address, common_name, org_unit, directory, key_path, request_path, certificate_path, authority_path, dhparam_path, local, proto, port): # TODO: Intelligent way of getting last IP address in the subnet subnet_first = None subnet_last = None @@ -339,16 +200,6 @@ def certidude_setup_openvpn_server(url, config, subnet, email_address, common_na subnet_second = addr subnet_last = addr - if directory: - if not os.path.exists(directory): - click.echo("Making directory: %s" % directory) - os.makedirs(directory) - key_path = os.path.join(directory, key_path) - certificate_path = os.path.join(directory, certificate_path) - request_path = os.path.join(directory, request_path) - authority_path = os.path.join(directory, authority_path) - dhparam_path = os.path.join(directory, dhparam_path) - if not os.path.exists(certificate_path): click.echo("As OpenVPN server certificate needs specific key usage extensions please") click.echo("use following command to sign on Certidude server instead of web interface:") @@ -365,7 +216,7 @@ def certidude_setup_openvpn_server(url, config, subnet, email_address, common_na org_unit, email_address, key_usage="nonRepudiation,digitalSignature,keyEncipherment", - extended_key_usage="serverAuth", + extended_key_usage="serverAuth,ikeIntermediate", wait=True) if not os.path.exists(dhparam_path): @@ -376,7 +227,7 @@ def certidude_setup_openvpn_server(url, config, subnet, email_address, common_na return retval # TODO: Add dhparam - config.write(env.get_template("site-to-client.ovpn").render(locals())) + config.write(env.get_template("openvpn-site-to-client.ovpn").render(locals())) click.echo("Generated %s" % config.name) click.echo() @@ -402,17 +253,9 @@ def certidude_setup_openvpn_server(url, config, subnet, email_address, common_na @click.option("--request-path", "-r", default=HOSTNAME + ".csr", help="Request path, %s.csr relative to --directory by default" % HOSTNAME) @click.option("--certificate-path", "-c", default=HOSTNAME + ".crt", help="Certificate path, %s.crt relative to --directory by default" % HOSTNAME) @click.option("--authority-path", "-a", default="ca.crt", help="Certificate authority certificate path, ca.crt relative to --dir by default") +@expand_paths() def certidude_setup_openvpn_client(url, config, email_address, common_name, org_unit, directory, key_path, request_path, certificate_path, authority_path, proto, remote): - if directory: - if not os.path.exists(directory): - click.echo("Making directory: %s" % directory) - os.makedirs(directory) - key_path = os.path.join(directory, key_path) - certificate_path = os.path.join(directory, certificate_path) - request_path = os.path.join(directory, request_path) - authority_path = os.path.join(directory, authority_path) - retval = certidude_request_certificate( url, key_path, @@ -428,7 +271,7 @@ def certidude_setup_openvpn_client(url, config, email_address, common_name, org_ return retval # TODO: Add dhparam - config.write(env.get_template("client-to-site.ovpn").render(locals())) + config.write(env.get_template("openvpn-client-to-site.ovpn").render(locals())) click.echo("Generated %s" % config.name) click.echo() @@ -438,6 +281,164 @@ def certidude_setup_openvpn_client(url, config, email_address, common_name, org_ click.echo() +@click.command("server", help="Set up strongSwan server") +@click.argument("url") +@click.option("--common-name", "-cn", default=HOSTNAME, help="Common name, %s by default" % HOSTNAME) +@click.option("--org-unit", "-ou", help="Organizational unit") +@click.option("--fqdn", "-f", default=HOSTNAME, help="Fully qualified hostname, %s by default" % PRIMARY_ADDRESS) +@click.option("--email-address", "-m", default=EMAIL, help="E-mail associated with the request, %s by default" % EMAIL) +@click.option("--subnet", "-s", default="192.168.33.0/24", type=ip_network, help="IPsec virtual subnet, 192.168.33.0/24 by default") +@click.option("--local", "-l", default=PRIMARY_ADDRESS, help="IPsec gateway address, %s" % PRIMARY_ADDRESS) +@click.option("--route", "-r", type=ip_network, multiple=True, help="Subnets to advertise via this connection, multiple allowed") +@click.option("--config", "-o", + default="/etc/ipsec.conf", + type=click.File(mode="w", atomic=True, lazy=True), + help="strongSwan configuration file, /etc/ipsec.conf by default") +@click.option("--secrets", "-s", + default="/etc/ipsec.secrets", + type=click.File(mode="w", atomic=True, lazy=True), + help="strongSwan secrets file, /etc/ipsec.secrets by default") +@click.option("--directory", "-d", default="/etc/ipsec.d", help="Directory for keys, /etc/ipsec.d by default") +@click.option("--key-path", "-key", default="private/%s.pem" % HOSTNAME, help="Key path, private/%s.pem by default" % HOSTNAME) +@click.option("--request-path", "-csr", default="reqs/%s.pem" % HOSTNAME, help="Request path, reqs/%s.pem by default" % HOSTNAME) +@click.option("--certificate-path", "-crt", default="certs/%s.pem" % HOSTNAME, help="Certificate path, certs/%s.pem by default" % HOSTNAME) +@click.option("--authority-path", "-ca", default="cacerts/ca.pem", help="Certificate authority certificate path, cacerts/ca.pem by default") +@expand_paths() +def certidude_setup_strongswan_server(url, config, secrets, subnet, route, email_address, common_name, org_unit, directory, key_path, request_path, certificate_path, authority_path, local, ip_address, fqdn): + + config.write(env.get_template("strongswan-site-to-client.conf").render(locals())) + + if not os.path.exists(certificate_path): + click.echo("As strongSwan server certificate needs specific key usage extensions please") + click.echo("use following command to sign on Certidude server instead of web interface:") + click.echo() + click.echo(" certidude sign %s" % common_name) + + retval = certidude_request_certificate( + url, + key_path, + request_path, + certificate_path, + authority_path, + common_name, + org_unit, + email_address, + key_usage="nonRepudiation,digitalSignature,keyEncipherment", + extended_key_usage="serverAuth,ikeIntermediate", + ipv4_address=None if local.is_private else local, + dns=None if local.is_private or "." not in fdqn else fdqn, + wait=True) + + if retval: + return retval + + + click.echo("Generated %s" % config.name) + click.echo() + click.echo("Inspect newly created %s and start strongSwan service:" % config.name) + click.echo() + click.echo(" apt-get install strongswan strongswan-starter strongswan-ikev2") + click.secho(" service strongswan restart", bold=True) + click.echo() + + +@click.command("client", help="Set up strongSwan client") +@click.argument("url") +@click.argument("remote") +@click.option("--common-name", "-cn", default=HOSTNAME, help="Common name, %s by default" % HOSTNAME) +@click.option("--org-unit", "-ou", help="Organizational unit") +@click.option("--email-address", "-m", default=EMAIL, help="E-mail associated with the request, '%s' by default" % EMAIL) +@click.option("--config", "-o", + default="/etc/ipsec.conf", + type=click.File(mode="w", atomic=True, lazy=True), + help="strongSwan configuration file, /etc/ipsec.conf by default") +@click.option("--secrets", "-s", + default="/etc/ipsec.secrets", + type=click.File(mode="w", atomic=True, lazy=True), + help="strongSwan secrets file, /etc/ipsec.secrets by default") +@click.option("--dpdaction", "-d", + default="restart", + type=click.Choice(["none", "clear", "hold", "restart"]), + help="Action upon dead peer detection; either none, clear, hold or restart") +@click.option("--auto", "-a", + default="start", + type=click.Choice(["ignore", "add", "route", "start"]), + help="Operation at startup; either ignore, add, route or start") +@click.option("--directory", "-d", default="/etc/ipsec.d", help="Directory for keys, /etc/ipsec.d by default") +@click.option("--key-path", "-key", default="private/%s.pem" % HOSTNAME, help="Key path, private/%s.pem by default" % HOSTNAME) +@click.option("--request-path", "-csr", default="reqs/%s.pem" % HOSTNAME, help="Request path, reqs/%s.pem by default" % HOSTNAME) +@click.option("--certificate-path", "-crt", default="certs/%s.pem" % HOSTNAME, help="Certificate path, certs/%s.pem by default" % HOSTNAME) +@click.option("--authority-path", "-ca", default="cacerts/ca.pem", help="Certificate authority certificate path, cacerts/ca.pem by default") +@expand_paths() +def certidude_setup_strongswan_client(url, config, secrets, email_address, common_name, org_unit, directory, key_path, request_path, certificate_path, authority_path, remote, auto, dpdaction): + + retval = certidude_request_certificate( + url, + key_path, + request_path, + certificate_path, + authority_path, + common_name, + org_unit, + email_address, + wait=True) + + if retval: + return retval + + # TODO: Add dhparam + config.write(env.get_template("strongswan-client-to-site.conf").render(locals())) + + click.echo("Generated %s" % config.name) + click.echo() + click.echo("Inspect newly created %s and start strongSwan service:" % config.name) + click.echo() + click.echo(" apt-get install strongswan strongswan-starter") + click.echo(" service strongswan restart") + click.echo() + + +@click.command("production", help="Set up nginx and uwsgi") +@click.option("--username", default="certidude", help="Service user account, created if necessary, 'certidude' by default") +@click.option("--hostname", default=HOSTNAME, help="nginx hostname, '%s' by default" % HOSTNAME) +@click.option("--static-path", default=os.path.join(os.path.dirname(__file__), "static"), help="Static files") +@click.option("--nginx-config", "-n", + default="/etc/nginx/nginx.conf", + type=click.File(mode="w", atomic=True, lazy=True), + help="nginx configuration, /etc/nginx/nginx.conf by default") +@click.option("--uwsgi-config", "-u", + default="/etc/uwsgi/apps-available/certidude.ini", + type=click.File(mode="w", atomic=True, lazy=True), + help="uwsgi configuration, /etc/uwsgi/ by default") +@click.option("--push-server", help="Push server URL, in case of different nginx instance") +def certidude_setup_production(username, hostname, push_server, nginx_config, uwsgi_config, static_path): + try: + pwd.getpwnam(username) + click.echo("Username '%s' already exists, excellent!" % username) + except KeyError: + cmd = "adduser", "--system", "--no-create-home", "--group", username + subprocess.check_call(cmd) + +# cmd = "gpasswd", "-a", username, "www-data" +# subprocess.check_call(cmd) + + if not static_path.endswith("/"): + static_path += "/" + + nginx_config.write(env.get_template("nginx.conf").render(locals())) + click.echo("Generated: %s" % nginx_config.name) + uwsgi_config.write(env.get_template("uwsgi.ini").render(locals())) + click.echo("Generated: %s" % uwsgi_config.name) + + if os.path.exists("/etc/uwsgi/apps-enabled/certidude.ini"): + os.unlink("/etc/uwsgi/apps-enabled/certidude.ini") + os.symlink(uwsgi_config.name, "/etc/uwsgi/apps-enabled/certidude.ini") + click.echo("Symlinked %s -> /etc/uwsgi/apps-enabled/certidude.ini" % uwsgi_config.name) + + if not push_server: + click.echo("Remember to install nginx with wandenberg/nginx-push-stream-module!") + + @click.command("authority", help="Set up Certificate Authority in a directory") @click.option("--group", "-g", default="certidude", help="Group for file permissions, certidude by default") @click.option("--parent", "-p", help="Parent CA, none by default") @@ -445,10 +446,11 @@ def certidude_setup_openvpn_client(url, config, email_address, common_name, org_ @click.option("--country", "-c", default="ee", help="Country, Estonia by default") @click.option("--state", "-s", default="Harjumaa", help="State or country, Harjumaa by default") @click.option("--locality", "-l", default="Tallinn", help="City or locality, Tallinn by default") -@click.option("--lifetime", default=20*365, help="Lifetime in days, 7300 days (20 years) by default") +@click.option("--authority-lifetime", default=20*365, help="Authority certificate lifetime in days, 7300 days (20 years) by default") +@click.option("--certificate-lifetime", default=5*365, help="Certificate lifetime in days, 1825 days (5 years) by default") +@click.option("--revocation-list-lifetime", default=1, help="Revocation list lifetime in days, 1 day by default") @click.option("--organization", "-o", default="Example LLC", help="Company or organization name") @click.option("--organizational-unit", "-ou", default="Certification Department") -@click.option("--crl-age", default=1, help="CRL expiration age, 1 day by default") @click.option("--pkcs11", default=False, is_flag=True, help="Use PKCS#11 token instead of files") @click.option("--crl-distribution-url", default=None, help="CRL distribution URL") @click.option("--ocsp-responder-url", default=None, help="OCSP responder URL") @@ -456,7 +458,7 @@ def certidude_setup_openvpn_client(url, config, email_address, common_name, org_ @click.option("--inbox", default="imap://user:pass@host:port/INBOX", help="Inbound e-mail server") @click.option("--outbox", default="smtp://localhost", help="Outbound e-mail server") @click.argument("directory") -def certidude_setup_authority(parent, country, state, locality, organization, organizational_unit, common_name, directory, crl_age, lifetime, pkcs11, group, crl_distribution_url, ocsp_responder_url, email_address, inbox, outbox): +def certidude_setup_authority(parent, country, state, locality, organization, organizational_unit, common_name, directory, certificate_lifetime, authority_lifetime, revocation_list_lifetime, pkcs11, group, crl_distribution_url, ocsp_responder_url, email_address, inbox, outbox): logging.info("Creating certificate authority in %s", directory) _, _, uid, gid, gecos, root, shell = pwd.getpwnam(group) os.setgid(gid) @@ -481,7 +483,7 @@ def certidude_setup_authority(parent, country, state, locality, organization, or crl_distribution_points = "URI:%s" % crl_distribution_url ca = crypto.X509() - #ca.set_version(3) # breaks gcr-viewer?! + ca.set_version(2) # This corresponds to X.509v3 ca.set_serial_number(1) ca.get_subject().CN = common_name ca.get_subject().C = country @@ -490,7 +492,7 @@ def certidude_setup_authority(parent, country, state, locality, organization, or ca.get_subject().O = organization ca.get_subject().OU = organizational_unit ca.gmtime_adj_notBefore(0) - ca.gmtime_adj_notAfter(lifetime * 24 * 60 * 60) + ca.gmtime_adj_notAfter(authority_lifetime * 24 * 60 * 60) ca.set_issuer(ca.get_subject()) ca.set_pubkey(key) ca.add_extensions([ @@ -522,7 +524,10 @@ def certidude_setup_authority(parent, country, state, locality, organization, or subject_alt_name.encode("ascii")) ]) - if not ocsp_responder_url: + if ocsp_responder_url: + raise NotImplementedError() + + """ ocsp_responder_url = "http://%s/api/%s/ocsp/" % (common_name, slug) authority_info_access = "OCSP;URI:%s" % ocsp_responder_url ca.add_extensions([ @@ -531,6 +536,7 @@ def certidude_setup_authority(parent, country, state, locality, organization, or False, authority_info_access.encode("ascii")) ]) + """ click.echo("Signing %s..." % subject2dn(ca.get_subject())) @@ -550,7 +556,7 @@ def certidude_setup_authority(parent, country, state, locality, organization, or os.mkdir(os.path.join(directory, subdir)) with open(ca_crl, "wb") as fh: crl = crypto.CRL() - fh.write(crl.export(ca, key, days=crl_age)) + fh.write(crl.export(ca, key, days=revocation_list_lifetime)) with open(os.path.join(directory, "serial"), "w") as fh: fh.write("1") @@ -730,12 +736,35 @@ def certidude_sign(common_name, overwrite, lifetime): else: # Sign directly using private key cert = ca.sign2(request, overwrite, True, lifetime) - os.unlink(request.path) + click.echo("Signed %s" % cert.distinguished_name) for key, value, data in cert.extensions: click.echo("Added extension %s: %s" % (key, value)) click.echo() +class StaticResource(object): + def __init__(self, root): + self.root = os.path.realpath(root) + click.echo("Serving static from: %s" % self.root) + + def __call__(self, req, resp): + + path = os.path.realpath(os.path.join(self.root, req.path[1:])) + if not path.startswith(self.root): + raise falcon.HTTPForbidden + + print("Serving:", path) + if os.path.exists(path): + content_type, content_encoding = mimetypes.guess_type(path) + if content_type: + resp.append_header("Content-Type", content_type) + if content_encoding: + resp.append_header("Content-Encoding", content_encoding) + resp.append_header("Content-Disposition", "attachment") + resp.stream = open(path, "rb") + else: + resp.status = falcon.HTTP_404 + resp.body = "File '%s' not found" % req.path @click.command("serve", help="Run built-in HTTP server") @click.option("-u", "--user", default="certidude", help="Run as user") @@ -743,7 +772,6 @@ def certidude_sign(common_name, overwrite, lifetime): @click.option("-l", "--listen", default="0.0.0.0", help="Listen address") @click.option("-s", "--enable-signature", default=False, is_flag=True, help="Allow signing operations with private key of CA") def certidude_serve(user, port, listen, enable_signature): - spawn_signers(kill=False, no_interaction=False) logging.basicConfig( filename='/var/log/certidude.log', @@ -775,6 +803,8 @@ def certidude_serve(user, port, listen, enable_signature): app.add_route("/api/{ca}/request/{cn}/", RequestDetailResource(config)) app.add_route("/api/{ca}/request/", RequestListResource(config)) app.add_route("/api/{ca}/", IndexResource(config)) + + app.add_sink(StaticResource(os.path.join(os.path.dirname(__file__), "static"))) httpd = make_server(listen, port, app, ThreadingWSGIServer) if user: _, _, uid, gid, gecos, root, shell = pwd.getpwnam(user) @@ -789,6 +819,9 @@ def certidude_serve(user, port, listen, enable_signature): click.echo("Warning: running as root, this is not reccommended!") httpd.serve_forever() +@click.group("strongswan", help="strongSwan helpers") +def certidude_setup_strongswan(): pass + @click.group("openvpn", help="OpenVPN helpers") def certidude_setup_openvpn(): pass @@ -798,11 +831,15 @@ def certidude_setup(): pass @click.group() def entry_point(): pass +certidude_setup_strongswan.add_command(certidude_setup_strongswan_server) +certidude_setup_strongswan.add_command(certidude_setup_strongswan_client) certidude_setup_openvpn.add_command(certidude_setup_openvpn_server) certidude_setup_openvpn.add_command(certidude_setup_openvpn_client) certidude_setup.add_command(certidude_setup_authority) certidude_setup.add_command(certidude_setup_openvpn) +certidude_setup.add_command(certidude_setup_strongswan) certidude_setup.add_command(certidude_setup_client) +certidude_setup.add_command(certidude_setup_production) entry_point.add_command(certidude_setup) entry_point.add_command(certidude_serve) entry_point.add_command(certidude_spawn) diff --git a/certidude/helpers.py b/certidude/helpers.py new file mode 100644 index 0000000..ac83ba3 --- /dev/null +++ b/certidude/helpers.py @@ -0,0 +1,183 @@ + +import click +import logging +import netifaces +import os +import urllib.request +from certidude.wrappers import Certificate, Request +from certidude.signer import SignServer +from OpenSSL import crypto + +def expand_paths(): + """ + Prefix '..._path' keyword arguments of target function with 'directory' keyword argument + and create the directory if necessary + + TODO: Move to separate file + """ + def wrapper(func): + def wrapped(**arguments): + d = arguments.get("directory") + for key, value in arguments.items(): + if key.endswith("_path"): + if d: + value = os.path.join(d, value) + value = os.path.realpath(value) + parent = os.path.dirname(value) + if not os.path.exists(parent): + click.echo("Making directory %s for %s" % (repr(parent), repr(key))) + os.makedirs(parent) + elif not os.path.isdir(parent): + raise Exception("Path %s is not directory!" % parent) + arguments[key] = value + return func(**arguments) + return wrapped + return wrapper + + +def certidude_request_certificate(url, key_path, request_path, certificate_path, authority_path, common_name, org_unit, email_address=None, given_name=None, surname=None, autosign=False, wait=False, key_usage=None, extended_key_usage=None, ip_address=None, dns=None): + """ + Exchange CSR for certificate using Certidude HTTP API server + """ + + # Set up URL-s + request_params = set() + if autosign: + request_params.add("autosign=yes") + if wait: + request_params.add("wait=forever") + + if not url.endswith("/"): + url = url + "/" + + authority_url = url + "certificate" + request_url = url + "request" + + if request_params: + request_url = request_url + "?" + "&".join(request_params) + + if os.path.exists(authority_path): + click.echo("Found CA certificate in: %s" % authority_path) + else: + if authority_url: + click.echo("Attempting to fetch CA certificate from %s" % authority_url) + try: + with urllib.request.urlopen(authority_url) as fh: + buf = fh.read() + try: + cert = crypto.load_certificate(crypto.FILETYPE_PEM, buf) + except crypto.Error: + raise ValueError("Failed to parse PEM: %s" % buf) + with open(authority_path + ".part", "wb") as oh: + oh.write(buf) + click.echo("Writing CA certificate to: %s" % authority_path) + os.rename(authority_path + ".part", authority_path) + except urllib.error.HTTPError as e: + click.echo("Failed to fetch CA certificate, server responded with: %d %s" % (e.code, e.reason), err=True) + return 1 + else: + raise FileNotFoundError("CA certificate not found and no URL specified") + + try: + certificate = Certificate(open(certificate_path)) + click.echo("Found certificate: %s" % certificate_path) + except FileNotFoundError: + try: + request = Request(open(request_path)) + click.echo("Found signing request: %s" % request_path) + except FileNotFoundError: + + # Construct private key + click.echo("Generating 4096-bit RSA key...") + key = crypto.PKey() + key.generate_key(crypto.TYPE_RSA, 4096) + + # Dump private key + os.umask(0o077) + with open(key_path + ".part", "wb") as fh: + fh.write(crypto.dump_privatekey(crypto.FILETYPE_PEM, key)) + + # Construct CSR + csr = crypto.X509Req() + csr.set_version(2) # Corresponds to X.509v3 + csr.set_pubkey(key) + request = Request(csr) + + # Set subject attributes + request.common_name = common_name + if given_name: + request.given_name = given_name + if surname: + request.surname = surname + if org_unit: + request.organizational_unit = org_unit + + # Collect subject alternative names + subject_alt_name = set() + if email_address: + subject_alt_name.add("email:" + email_address) + if ip_address: + subject_alt_name.add("IP:" + ip_address) + if dns: + subject_alt_name.add("DNS:" + dns) + + # Set extensions + extensions = [] + if key_usage: + extensions.append(("keyUsage", key_usage, True)) + if extended_key_usage: + extensions.append(("extendedKeyUsage", extended_key_usage, True)) + if subject_alt_name: + extensions.append(("subjectAltName", ", ".join(subject_alt_name), True)) + request.set_extensions(extensions) + + # Dump CSR + os.umask(0o022) + with open(request_path + ".part", "w") as fh: + fh.write(request.dump()) + + click.echo("Writing private key to: %s" % key_path) + os.rename(key_path + ".part", key_path) + click.echo("Writing certificate signing request to: %s" % request_path) + os.rename(request_path + ".part", request_path) + + + with open(request_path, "rb") as fh: + buf = fh.read() + submission = urllib.request.Request(request_url, buf) + submission.add_header("User-Agent", "Certidude") + submission.add_header("Content-Type", "application/pkcs10") + + click.echo("Submitting to %s, waiting for response..." % request_url) + try: + response = urllib.request.urlopen(submission) + buf = response.read() + if response.code == 202: + click.echo("No waiting was requested and server responded with 202 Accepted, run this command again once the certificate is signed") + return 1 + assert buf, "Server responded with no body, status code %d" % response.code + cert = crypto.load_certificate(crypto.FILETYPE_PEM, buf) + except crypto.Error: + raise ValueError("Failed to parse PEM: %s" % buf) + except urllib.error.HTTPError as e: + if e.code == 409: + click.echo("Different signing request with same CN is already present on server, server refuses to overwrite", err=True) + return 2 + else: + click.echo("Failed to fetch certificate, server responded with: %d %s" % (e.code, e.reason), err=True) + return 3 + else: + if response.code == 202: + click.echo("Server stored the request for processing (202 Accepted), but waiting was not requested, hence quitting for now", err=True) + return 254 + + os.umask(0o022) + with open(certificate_path + ".part", "wb") as gh: + gh.write(buf) + + click.echo("Writing certificate to: %s" % certificate_path) + os.rename(certificate_path + ".part", certificate_path) + + # TODO: Validate fetched certificate against CA + # TODO: Check that recevied certificate CN and pubkey match + # TODO: Check file permissions diff --git a/certidude/signer.py b/certidude/signer.py index 234d267..c7bd575 100644 --- a/certidude/signer.py +++ b/certidude/signer.py @@ -33,7 +33,9 @@ def raw_sign(private_key, ca_cert, request, basic_constraints, lifetime, key_usa Sign certificate signing request directly with private key assuming it's readable by the process """ + # Initialize X.509 certificate object cert = crypto.X509() + ca.set_version(2) # This corresponds to X.509v3 # Set public key cert.set_pubkey(request.get_pubkey()) @@ -130,7 +132,8 @@ class SignHandler(asynchat.async_chat): self.send(crl.export( self.server.certificate, self.server.private_key, - crypto.FILETYPE_PEM)) + crypto.FILETYPE_PEM, + self.server.revocation_list_lifetime)) elif cmd == "ocsp-request": NotImplemented # TODO: Implement OCSP @@ -168,7 +171,7 @@ class SignHandler(asynchat.async_chat): class SignServer(asyncore.dispatcher): - def __init__(self, socket_path, private_key, certificate, lifetime, basic_constraints, key_usage, extended_key_usage): + def __init__(self, socket_path, private_key, certificate, lifetime, basic_constraints, key_usage, extended_key_usage, revocation_list_lifetime): asyncore.dispatcher.__init__(self) # Bind to sockets @@ -183,6 +186,7 @@ class SignServer(asyncore.dispatcher): self.private_key = crypto.load_privatekey(crypto.FILETYPE_PEM, open(private_key).read()) self.certificate = crypto.load_certificate(crypto.FILETYPE_PEM, open(certificate).read()) self.lifetime = lifetime + self.revocation_list_lifetime = revocation_list_lifetime self.basic_constraints = basic_constraints self.key_usage = key_usage self.extended_key_usage = extended_key_usage diff --git a/certidude/static/css/style.css b/certidude/static/css/style.css new file mode 100644 index 0000000..49e18be --- /dev/null +++ b/certidude/static/css/style.css @@ -0,0 +1,121 @@ +svg { + position: relative; + top: 0.5em; +} + +img { + max-width: 100%; + max-height: 100%; +} + +ul { + list-style: none; + margin: 1em 0; + padding: 0; +} + +button, .button { + color: #000; + float: right; + border: 1pt solid #ccc; + background-color: #eee; + border-radius: 6px; + margin: 2px; + padding: 4px 8px; + box-sizing: border-box; +} + +button:disabled, .button:disabled { + color: #888; +} + +.monospace { + font-family: 'Ubuntu Mono', courier, monospace; +} + +footer { + display: block; + color: #fff; + text-align: center; +} + +a { + text-decoration: none; + color: #44c; +} + +footer a { + color: #aaf; +} + +html,body { + margin: 0; + padding: 0 0 1em 0; +} + +body { + background: #222; + background-image: url('//fc00.deviantart.net/fs71/i/2013/078/9/6/free_hexa_pattern_cc0_by_black_light_studio-d4ig12f.png'); + background-position: center; +} + +.comment { + color: #aaf; +} + +table th, table td { + border: 1px solid #ccc; + padding: 2px; +} + +h1, h2, th { + font-family: 'Gentium'; +} + +h1 { + text-align: center; + font-size: 22pt; +} + +h2 { + font-size: 18pt; +} + +h2 svg { + position: relative; + top: 16px; +} + +p, td, footer, li, button { + font-family: 'PT Sans Narrow'; + font-size: 14pt; +} + +pre { + overflow: auto; + border: 1px solid #000; + background: #444; + color: #fff; + font-size: 12pt; + padding: 4px; + border-radius: 6px; + margin: 0 0; +} + +#container { + max-width: 60em; + margin: 1em auto; + background: #fff; + padding: 1em; + border-style: solid; + border-width: 2px; + border-color: #aaa; + border-radius: 10px; +} + +li { + margin: 4px 0; + padding: 4px 0; + clear: both; + border-top: 1px dashed #ccc; +} diff --git a/certidude/static/js/jquery-2.1.4.min.js b/certidude/static/js/jquery-2.1.4.min.js new file mode 100644 index 0000000..49990d6 --- /dev/null +++ b/certidude/static/js/jquery-2.1.4.min.js @@ -0,0 +1,4 @@ +/*! jQuery v2.1.4 | (c) 2005, 2015 jQuery Foundation, Inc. | jquery.org/license */ +!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=c.slice,e=c.concat,f=c.push,g=c.indexOf,h={},i=h.toString,j=h.hasOwnProperty,k={},l=a.document,m="2.1.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return d.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:d.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a,b){return n.each(this,a,b)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call(b,c,b)}))},slice:function(){return this.pushStack(d.apply(this,arguments))},first:function(){return this.eq(0)},last:function(){return this.eq(-1)},eq:function(a){var b=this.length,c=+a+(0>a?b:0);return this.pushStack(c>=0&&b>c?[this[c]]:[])},end:function(){return this.prevObject||this.constructor(null)},push:f,sort:c.sort,splice:c.splice},n.extend=n.fn.extend=function(){var a,b,c,d,e,f,g=arguments[0]||{},h=1,i=arguments.length,j=!1;for("boolean"==typeof g&&(j=g,g=arguments[h]||{},h++),"object"==typeof g||n.isFunction(g)||(g={}),h===i&&(g=this,h--);i>h;h++)if(null!=(a=arguments[h]))for(b in a)c=g[b],d=a[b],g!==d&&(j&&d&&(n.isPlainObject(d)||(e=n.isArray(d)))?(e?(e=!1,f=c&&n.isArray(c)?c:[]):f=c&&n.isPlainObject(c)?c:{},g[b]=n.extend(j,f,d)):void 0!==d&&(g[b]=d));return g},n.extend({expando:"jQuery"+(m+Math.random()).replace(/\D/g,""),isReady:!0,error:function(a){throw new Error(a)},noop:function(){},isFunction:function(a){return"function"===n.type(a)},isArray:Array.isArray,isWindow:function(a){return null!=a&&a===a.window},isNumeric:function(a){return!n.isArray(a)&&a-parseFloat(a)+1>=0},isPlainObject:function(a){return"object"!==n.type(a)||a.nodeType||n.isWindow(a)?!1:a.constructor&&!j.call(a.constructor.prototype,"isPrototypeOf")?!1:!0},isEmptyObject:function(a){var b;for(b in a)return!1;return!0},type:function(a){return null==a?a+"":"object"==typeof a||"function"==typeof a?h[i.call(a)]||"object":typeof a},globalEval:function(a){var b,c=eval;a=n.trim(a),a&&(1===a.indexOf("use strict")?(b=l.createElement("script"),b.text=a,l.head.appendChild(b).parentNode.removeChild(b)):c(a))},camelCase:function(a){return a.replace(p,"ms-").replace(q,r)},nodeName:function(a,b){return a.nodeName&&a.nodeName.toLowerCase()===b.toLowerCase()},each:function(a,b,c){var d,e=0,f=a.length,g=s(a);if(c){if(g){for(;f>e;e++)if(d=b.apply(a[e],c),d===!1)break}else for(e in a)if(d=b.apply(a[e],c),d===!1)break}else if(g){for(;f>e;e++)if(d=b.call(a[e],e,a[e]),d===!1)break}else for(e in a)if(d=b.call(a[e],e,a[e]),d===!1)break;return a},trim:function(a){return null==a?"":(a+"").replace(o,"")},makeArray:function(a,b){var c=b||[];return null!=a&&(s(Object(a))?n.merge(c,"string"==typeof a?[a]:a):f.call(c,a)),c},inArray:function(a,b,c){return null==b?-1:g.call(b,a,c)},merge:function(a,b){for(var c=+b.length,d=0,e=a.length;c>d;d++)a[e++]=b[d];return a.length=e,a},grep:function(a,b,c){for(var d,e=[],f=0,g=a.length,h=!c;g>f;f++)d=!b(a[f],f),d!==h&&e.push(a[f]);return e},map:function(a,b,c){var d,f=0,g=a.length,h=s(a),i=[];if(h)for(;g>f;f++)d=b(a[f],f,c),null!=d&&i.push(d);else for(f in a)d=b(a[f],f,c),null!=d&&i.push(d);return e.apply([],i)},guid:1,proxy:function(a,b){var c,e,f;return"string"==typeof b&&(c=a[b],b=a,a=c),n.isFunction(a)?(e=d.call(arguments,2),f=function(){return a.apply(b||this,e.concat(d.call(arguments)))},f.guid=a.guid=a.guid||n.guid++,f):void 0},now:Date.now,support:k}),n.each("Boolean Number String Function Array Date RegExp Object Error".split(" "),function(a,b){h["[object "+b+"]"]=b.toLowerCase()});function s(a){var b="length"in a&&a.length,c=n.type(a);return"function"===c||n.isWindow(a)?!1:1===a.nodeType&&b?!0:"array"===c||0===b||"number"==typeof b&&b>0&&b-1 in a}var t=function(a){var b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u="sizzle"+1*new Date,v=a.document,w=0,x=0,y=ha(),z=ha(),A=ha(),B=function(a,b){return a===b&&(l=!0),0},C=1<<31,D={}.hasOwnProperty,E=[],F=E.pop,G=E.push,H=E.push,I=E.slice,J=function(a,b){for(var c=0,d=a.length;d>c;c++)if(a[c]===b)return c;return-1},K="checked|selected|async|autofocus|autoplay|controls|defer|disabled|hidden|ismap|loop|multiple|open|readonly|required|scoped",L="[\\x20\\t\\r\\n\\f]",M="(?:\\\\.|[\\w-]|[^\\x00-\\xa0])+",N=M.replace("w","w#"),O="\\["+L+"*("+M+")(?:"+L+"*([*^$|!~]?=)"+L+"*(?:'((?:\\\\.|[^\\\\'])*)'|\"((?:\\\\.|[^\\\\\"])*)\"|("+N+"))|)"+L+"*\\]",P=":("+M+")(?:\\((('((?:\\\\.|[^\\\\'])*)'|\"((?:\\\\.|[^\\\\\"])*)\")|((?:\\\\.|[^\\\\()[\\]]|"+O+")*)|.*)\\)|)",Q=new RegExp(L+"+","g"),R=new RegExp("^"+L+"+|((?:^|[^\\\\])(?:\\\\.)*)"+L+"+$","g"),S=new RegExp("^"+L+"*,"+L+"*"),T=new RegExp("^"+L+"*([>+~]|"+L+")"+L+"*"),U=new RegExp("="+L+"*([^\\]'\"]*?)"+L+"*\\]","g"),V=new RegExp(P),W=new RegExp("^"+N+"$"),X={ID:new RegExp("^#("+M+")"),CLASS:new RegExp("^\\.("+M+")"),TAG:new RegExp("^("+M.replace("w","w*")+")"),ATTR:new RegExp("^"+O),PSEUDO:new RegExp("^"+P),CHILD:new RegExp("^:(only|first|last|nth|nth-last)-(child|of-type)(?:\\("+L+"*(even|odd|(([+-]|)(\\d*)n|)"+L+"*(?:([+-]|)"+L+"*(\\d+)|))"+L+"*\\)|)","i"),bool:new RegExp("^(?:"+K+")$","i"),needsContext:new RegExp("^"+L+"*[>+~]|:(even|odd|eq|gt|lt|nth|first|last)(?:\\("+L+"*((?:-\\d)?\\d*)"+L+"*\\)|)(?=[^-]|$)","i")},Y=/^(?:input|select|textarea|button)$/i,Z=/^h\d$/i,$=/^[^{]+\{\s*\[native \w/,_=/^(?:#([\w-]+)|(\w+)|\.([\w-]+))$/,aa=/[+~]/,ba=/'|\\/g,ca=new RegExp("\\\\([\\da-f]{1,6}"+L+"?|("+L+")|.)","ig"),da=function(a,b,c){var d="0x"+b-65536;return d!==d||c?b:0>d?String.fromCharCode(d+65536):String.fromCharCode(d>>10|55296,1023&d|56320)},ea=function(){m()};try{H.apply(E=I.call(v.childNodes),v.childNodes),E[v.childNodes.length].nodeType}catch(fa){H={apply:E.length?function(a,b){G.apply(a,I.call(b))}:function(a,b){var c=a.length,d=0;while(a[c++]=b[d++]);a.length=c-1}}}function ga(a,b,d,e){var f,h,j,k,l,o,r,s,w,x;if((b?b.ownerDocument||b:v)!==n&&m(b),b=b||n,d=d||[],k=b.nodeType,"string"!=typeof a||!a||1!==k&&9!==k&&11!==k)return d;if(!e&&p){if(11!==k&&(f=_.exec(a)))if(j=f[1]){if(9===k){if(h=b.getElementById(j),!h||!h.parentNode)return d;if(h.id===j)return d.push(h),d}else if(b.ownerDocument&&(h=b.ownerDocument.getElementById(j))&&t(b,h)&&h.id===j)return d.push(h),d}else{if(f[2])return H.apply(d,b.getElementsByTagName(a)),d;if((j=f[3])&&c.getElementsByClassName)return H.apply(d,b.getElementsByClassName(j)),d}if(c.qsa&&(!q||!q.test(a))){if(s=r=u,w=b,x=1!==k&&a,1===k&&"object"!==b.nodeName.toLowerCase()){o=g(a),(r=b.getAttribute("id"))?s=r.replace(ba,"\\$&"):b.setAttribute("id",s),s="[id='"+s+"'] ",l=o.length;while(l--)o[l]=s+ra(o[l]);w=aa.test(a)&&pa(b.parentNode)||b,x=o.join(",")}if(x)try{return H.apply(d,w.querySelectorAll(x)),d}catch(y){}finally{r||b.removeAttribute("id")}}}return i(a.replace(R,"$1"),b,d,e)}function ha(){var a=[];function b(c,e){return a.push(c+" ")>d.cacheLength&&delete b[a.shift()],b[c+" "]=e}return b}function ia(a){return a[u]=!0,a}function ja(a){var b=n.createElement("div");try{return!!a(b)}catch(c){return!1}finally{b.parentNode&&b.parentNode.removeChild(b),b=null}}function ka(a,b){var c=a.split("|"),e=a.length;while(e--)d.attrHandle[c[e]]=b}function la(a,b){var c=b&&a,d=c&&1===a.nodeType&&1===b.nodeType&&(~b.sourceIndex||C)-(~a.sourceIndex||C);if(d)return d;if(c)while(c=c.nextSibling)if(c===b)return-1;return a?1:-1}function ma(a){return function(b){var c=b.nodeName.toLowerCase();return"input"===c&&b.type===a}}function na(a){return function(b){var c=b.nodeName.toLowerCase();return("input"===c||"button"===c)&&b.type===a}}function oa(a){return ia(function(b){return b=+b,ia(function(c,d){var e,f=a([],c.length,b),g=f.length;while(g--)c[e=f[g]]&&(c[e]=!(d[e]=c[e]))})})}function pa(a){return a&&"undefined"!=typeof a.getElementsByTagName&&a}c=ga.support={},f=ga.isXML=function(a){var b=a&&(a.ownerDocument||a).documentElement;return b?"HTML"!==b.nodeName:!1},m=ga.setDocument=function(a){var b,e,g=a?a.ownerDocument||a:v;return g!==n&&9===g.nodeType&&g.documentElement?(n=g,o=g.documentElement,e=g.defaultView,e&&e!==e.top&&(e.addEventListener?e.addEventListener("unload",ea,!1):e.attachEvent&&e.attachEvent("onunload",ea)),p=!f(g),c.attributes=ja(function(a){return a.className="i",!a.getAttribute("className")}),c.getElementsByTagName=ja(function(a){return a.appendChild(g.createComment("")),!a.getElementsByTagName("*").length}),c.getElementsByClassName=$.test(g.getElementsByClassName),c.getById=ja(function(a){return o.appendChild(a).id=u,!g.getElementsByName||!g.getElementsByName(u).length}),c.getById?(d.find.ID=function(a,b){if("undefined"!=typeof b.getElementById&&p){var c=b.getElementById(a);return c&&c.parentNode?[c]:[]}},d.filter.ID=function(a){var b=a.replace(ca,da);return function(a){return a.getAttribute("id")===b}}):(delete d.find.ID,d.filter.ID=function(a){var b=a.replace(ca,da);return function(a){var c="undefined"!=typeof a.getAttributeNode&&a.getAttributeNode("id");return c&&c.value===b}}),d.find.TAG=c.getElementsByTagName?function(a,b){return"undefined"!=typeof b.getElementsByTagName?b.getElementsByTagName(a):c.qsa?b.querySelectorAll(a):void 0}:function(a,b){var c,d=[],e=0,f=b.getElementsByTagName(a);if("*"===a){while(c=f[e++])1===c.nodeType&&d.push(c);return d}return f},d.find.CLASS=c.getElementsByClassName&&function(a,b){return p?b.getElementsByClassName(a):void 0},r=[],q=[],(c.qsa=$.test(g.querySelectorAll))&&(ja(function(a){o.appendChild(a).innerHTML="",a.querySelectorAll("[msallowcapture^='']").length&&q.push("[*^$]="+L+"*(?:''|\"\")"),a.querySelectorAll("[selected]").length||q.push("\\["+L+"*(?:value|"+K+")"),a.querySelectorAll("[id~="+u+"-]").length||q.push("~="),a.querySelectorAll(":checked").length||q.push(":checked"),a.querySelectorAll("a#"+u+"+*").length||q.push(".#.+[+~]")}),ja(function(a){var b=g.createElement("input");b.setAttribute("type","hidden"),a.appendChild(b).setAttribute("name","D"),a.querySelectorAll("[name=d]").length&&q.push("name"+L+"*[*^$|!~]?="),a.querySelectorAll(":enabled").length||q.push(":enabled",":disabled"),a.querySelectorAll("*,:x"),q.push(",.*:")})),(c.matchesSelector=$.test(s=o.matches||o.webkitMatchesSelector||o.mozMatchesSelector||o.oMatchesSelector||o.msMatchesSelector))&&ja(function(a){c.disconnectedMatch=s.call(a,"div"),s.call(a,"[s!='']:x"),r.push("!=",P)}),q=q.length&&new RegExp(q.join("|")),r=r.length&&new RegExp(r.join("|")),b=$.test(o.compareDocumentPosition),t=b||$.test(o.contains)?function(a,b){var c=9===a.nodeType?a.documentElement:a,d=b&&b.parentNode;return a===d||!(!d||1!==d.nodeType||!(c.contains?c.contains(d):a.compareDocumentPosition&&16&a.compareDocumentPosition(d)))}:function(a,b){if(b)while(b=b.parentNode)if(b===a)return!0;return!1},B=b?function(a,b){if(a===b)return l=!0,0;var d=!a.compareDocumentPosition-!b.compareDocumentPosition;return d?d:(d=(a.ownerDocument||a)===(b.ownerDocument||b)?a.compareDocumentPosition(b):1,1&d||!c.sortDetached&&b.compareDocumentPosition(a)===d?a===g||a.ownerDocument===v&&t(v,a)?-1:b===g||b.ownerDocument===v&&t(v,b)?1:k?J(k,a)-J(k,b):0:4&d?-1:1)}:function(a,b){if(a===b)return l=!0,0;var c,d=0,e=a.parentNode,f=b.parentNode,h=[a],i=[b];if(!e||!f)return a===g?-1:b===g?1:e?-1:f?1:k?J(k,a)-J(k,b):0;if(e===f)return la(a,b);c=a;while(c=c.parentNode)h.unshift(c);c=b;while(c=c.parentNode)i.unshift(c);while(h[d]===i[d])d++;return d?la(h[d],i[d]):h[d]===v?-1:i[d]===v?1:0},g):n},ga.matches=function(a,b){return ga(a,null,null,b)},ga.matchesSelector=function(a,b){if((a.ownerDocument||a)!==n&&m(a),b=b.replace(U,"='$1']"),!(!c.matchesSelector||!p||r&&r.test(b)||q&&q.test(b)))try{var d=s.call(a,b);if(d||c.disconnectedMatch||a.document&&11!==a.document.nodeType)return d}catch(e){}return ga(b,n,null,[a]).length>0},ga.contains=function(a,b){return(a.ownerDocument||a)!==n&&m(a),t(a,b)},ga.attr=function(a,b){(a.ownerDocument||a)!==n&&m(a);var e=d.attrHandle[b.toLowerCase()],f=e&&D.call(d.attrHandle,b.toLowerCase())?e(a,b,!p):void 0;return void 0!==f?f:c.attributes||!p?a.getAttribute(b):(f=a.getAttributeNode(b))&&f.specified?f.value:null},ga.error=function(a){throw new Error("Syntax error, unrecognized expression: "+a)},ga.uniqueSort=function(a){var b,d=[],e=0,f=0;if(l=!c.detectDuplicates,k=!c.sortStable&&a.slice(0),a.sort(B),l){while(b=a[f++])b===a[f]&&(e=d.push(f));while(e--)a.splice(d[e],1)}return k=null,a},e=ga.getText=function(a){var b,c="",d=0,f=a.nodeType;if(f){if(1===f||9===f||11===f){if("string"==typeof a.textContent)return a.textContent;for(a=a.firstChild;a;a=a.nextSibling)c+=e(a)}else if(3===f||4===f)return a.nodeValue}else while(b=a[d++])c+=e(b);return c},d=ga.selectors={cacheLength:50,createPseudo:ia,match:X,attrHandle:{},find:{},relative:{">":{dir:"parentNode",first:!0}," ":{dir:"parentNode"},"+":{dir:"previousSibling",first:!0},"~":{dir:"previousSibling"}},preFilter:{ATTR:function(a){return a[1]=a[1].replace(ca,da),a[3]=(a[3]||a[4]||a[5]||"").replace(ca,da),"~="===a[2]&&(a[3]=" "+a[3]+" "),a.slice(0,4)},CHILD:function(a){return a[1]=a[1].toLowerCase(),"nth"===a[1].slice(0,3)?(a[3]||ga.error(a[0]),a[4]=+(a[4]?a[5]+(a[6]||1):2*("even"===a[3]||"odd"===a[3])),a[5]=+(a[7]+a[8]||"odd"===a[3])):a[3]&&ga.error(a[0]),a},PSEUDO:function(a){var b,c=!a[6]&&a[2];return X.CHILD.test(a[0])?null:(a[3]?a[2]=a[4]||a[5]||"":c&&V.test(c)&&(b=g(c,!0))&&(b=c.indexOf(")",c.length-b)-c.length)&&(a[0]=a[0].slice(0,b),a[2]=c.slice(0,b)),a.slice(0,3))}},filter:{TAG:function(a){var b=a.replace(ca,da).toLowerCase();return"*"===a?function(){return!0}:function(a){return a.nodeName&&a.nodeName.toLowerCase()===b}},CLASS:function(a){var b=y[a+" "];return b||(b=new RegExp("(^|"+L+")"+a+"("+L+"|$)"))&&y(a,function(a){return b.test("string"==typeof a.className&&a.className||"undefined"!=typeof a.getAttribute&&a.getAttribute("class")||"")})},ATTR:function(a,b,c){return function(d){var e=ga.attr(d,a);return null==e?"!="===b:b?(e+="","="===b?e===c:"!="===b?e!==c:"^="===b?c&&0===e.indexOf(c):"*="===b?c&&e.indexOf(c)>-1:"$="===b?c&&e.slice(-c.length)===c:"~="===b?(" "+e.replace(Q," ")+" ").indexOf(c)>-1:"|="===b?e===c||e.slice(0,c.length+1)===c+"-":!1):!0}},CHILD:function(a,b,c,d,e){var f="nth"!==a.slice(0,3),g="last"!==a.slice(-4),h="of-type"===b;return 1===d&&0===e?function(a){return!!a.parentNode}:function(b,c,i){var j,k,l,m,n,o,p=f!==g?"nextSibling":"previousSibling",q=b.parentNode,r=h&&b.nodeName.toLowerCase(),s=!i&&!h;if(q){if(f){while(p){l=b;while(l=l[p])if(h?l.nodeName.toLowerCase()===r:1===l.nodeType)return!1;o=p="only"===a&&!o&&"nextSibling"}return!0}if(o=[g?q.firstChild:q.lastChild],g&&s){k=q[u]||(q[u]={}),j=k[a]||[],n=j[0]===w&&j[1],m=j[0]===w&&j[2],l=n&&q.childNodes[n];while(l=++n&&l&&l[p]||(m=n=0)||o.pop())if(1===l.nodeType&&++m&&l===b){k[a]=[w,n,m];break}}else if(s&&(j=(b[u]||(b[u]={}))[a])&&j[0]===w)m=j[1];else while(l=++n&&l&&l[p]||(m=n=0)||o.pop())if((h?l.nodeName.toLowerCase()===r:1===l.nodeType)&&++m&&(s&&((l[u]||(l[u]={}))[a]=[w,m]),l===b))break;return m-=e,m===d||m%d===0&&m/d>=0}}},PSEUDO:function(a,b){var c,e=d.pseudos[a]||d.setFilters[a.toLowerCase()]||ga.error("unsupported pseudo: "+a);return e[u]?e(b):e.length>1?(c=[a,a,"",b],d.setFilters.hasOwnProperty(a.toLowerCase())?ia(function(a,c){var d,f=e(a,b),g=f.length;while(g--)d=J(a,f[g]),a[d]=!(c[d]=f[g])}):function(a){return e(a,0,c)}):e}},pseudos:{not:ia(function(a){var b=[],c=[],d=h(a.replace(R,"$1"));return d[u]?ia(function(a,b,c,e){var f,g=d(a,null,e,[]),h=a.length;while(h--)(f=g[h])&&(a[h]=!(b[h]=f))}):function(a,e,f){return b[0]=a,d(b,null,f,c),b[0]=null,!c.pop()}}),has:ia(function(a){return function(b){return ga(a,b).length>0}}),contains:ia(function(a){return a=a.replace(ca,da),function(b){return(b.textContent||b.innerText||e(b)).indexOf(a)>-1}}),lang:ia(function(a){return W.test(a||"")||ga.error("unsupported lang: "+a),a=a.replace(ca,da).toLowerCase(),function(b){var c;do if(c=p?b.lang:b.getAttribute("xml:lang")||b.getAttribute("lang"))return c=c.toLowerCase(),c===a||0===c.indexOf(a+"-");while((b=b.parentNode)&&1===b.nodeType);return!1}}),target:function(b){var c=a.location&&a.location.hash;return c&&c.slice(1)===b.id},root:function(a){return a===o},focus:function(a){return a===n.activeElement&&(!n.hasFocus||n.hasFocus())&&!!(a.type||a.href||~a.tabIndex)},enabled:function(a){return a.disabled===!1},disabled:function(a){return a.disabled===!0},checked:function(a){var b=a.nodeName.toLowerCase();return"input"===b&&!!a.checked||"option"===b&&!!a.selected},selected:function(a){return a.parentNode&&a.parentNode.selectedIndex,a.selected===!0},empty:function(a){for(a=a.firstChild;a;a=a.nextSibling)if(a.nodeType<6)return!1;return!0},parent:function(a){return!d.pseudos.empty(a)},header:function(a){return Z.test(a.nodeName)},input:function(a){return Y.test(a.nodeName)},button:function(a){var b=a.nodeName.toLowerCase();return"input"===b&&"button"===a.type||"button"===b},text:function(a){var b;return"input"===a.nodeName.toLowerCase()&&"text"===a.type&&(null==(b=a.getAttribute("type"))||"text"===b.toLowerCase())},first:oa(function(){return[0]}),last:oa(function(a,b){return[b-1]}),eq:oa(function(a,b,c){return[0>c?c+b:c]}),even:oa(function(a,b){for(var c=0;b>c;c+=2)a.push(c);return a}),odd:oa(function(a,b){for(var c=1;b>c;c+=2)a.push(c);return a}),lt:oa(function(a,b,c){for(var d=0>c?c+b:c;--d>=0;)a.push(d);return a}),gt:oa(function(a,b,c){for(var d=0>c?c+b:c;++db;b++)d+=a[b].value;return d}function sa(a,b,c){var d=b.dir,e=c&&"parentNode"===d,f=x++;return b.first?function(b,c,f){while(b=b[d])if(1===b.nodeType||e)return a(b,c,f)}:function(b,c,g){var h,i,j=[w,f];if(g){while(b=b[d])if((1===b.nodeType||e)&&a(b,c,g))return!0}else while(b=b[d])if(1===b.nodeType||e){if(i=b[u]||(b[u]={}),(h=i[d])&&h[0]===w&&h[1]===f)return j[2]=h[2];if(i[d]=j,j[2]=a(b,c,g))return!0}}}function ta(a){return a.length>1?function(b,c,d){var e=a.length;while(e--)if(!a[e](b,c,d))return!1;return!0}:a[0]}function ua(a,b,c){for(var d=0,e=b.length;e>d;d++)ga(a,b[d],c);return c}function va(a,b,c,d,e){for(var f,g=[],h=0,i=a.length,j=null!=b;i>h;h++)(f=a[h])&&(!c||c(f,d,e))&&(g.push(f),j&&b.push(h));return g}function wa(a,b,c,d,e,f){return d&&!d[u]&&(d=wa(d)),e&&!e[u]&&(e=wa(e,f)),ia(function(f,g,h,i){var j,k,l,m=[],n=[],o=g.length,p=f||ua(b||"*",h.nodeType?[h]:h,[]),q=!a||!f&&b?p:va(p,m,a,h,i),r=c?e||(f?a:o||d)?[]:g:q;if(c&&c(q,r,h,i),d){j=va(r,n),d(j,[],h,i),k=j.length;while(k--)(l=j[k])&&(r[n[k]]=!(q[n[k]]=l))}if(f){if(e||a){if(e){j=[],k=r.length;while(k--)(l=r[k])&&j.push(q[k]=l);e(null,r=[],j,i)}k=r.length;while(k--)(l=r[k])&&(j=e?J(f,l):m[k])>-1&&(f[j]=!(g[j]=l))}}else r=va(r===g?r.splice(o,r.length):r),e?e(null,g,r,i):H.apply(g,r)})}function xa(a){for(var b,c,e,f=a.length,g=d.relative[a[0].type],h=g||d.relative[" "],i=g?1:0,k=sa(function(a){return a===b},h,!0),l=sa(function(a){return J(b,a)>-1},h,!0),m=[function(a,c,d){var e=!g&&(d||c!==j)||((b=c).nodeType?k(a,c,d):l(a,c,d));return b=null,e}];f>i;i++)if(c=d.relative[a[i].type])m=[sa(ta(m),c)];else{if(c=d.filter[a[i].type].apply(null,a[i].matches),c[u]){for(e=++i;f>e;e++)if(d.relative[a[e].type])break;return wa(i>1&&ta(m),i>1&&ra(a.slice(0,i-1).concat({value:" "===a[i-2].type?"*":""})).replace(R,"$1"),c,e>i&&xa(a.slice(i,e)),f>e&&xa(a=a.slice(e)),f>e&&ra(a))}m.push(c)}return ta(m)}function ya(a,b){var c=b.length>0,e=a.length>0,f=function(f,g,h,i,k){var l,m,o,p=0,q="0",r=f&&[],s=[],t=j,u=f||e&&d.find.TAG("*",k),v=w+=null==t?1:Math.random()||.1,x=u.length;for(k&&(j=g!==n&&g);q!==x&&null!=(l=u[q]);q++){if(e&&l){m=0;while(o=a[m++])if(o(l,g,h)){i.push(l);break}k&&(w=v)}c&&((l=!o&&l)&&p--,f&&r.push(l))}if(p+=q,c&&q!==p){m=0;while(o=b[m++])o(r,s,g,h);if(f){if(p>0)while(q--)r[q]||s[q]||(s[q]=F.call(i));s=va(s)}H.apply(i,s),k&&!f&&s.length>0&&p+b.length>1&&ga.uniqueSort(i)}return k&&(w=v,j=t),r};return c?ia(f):f}return h=ga.compile=function(a,b){var c,d=[],e=[],f=A[a+" "];if(!f){b||(b=g(a)),c=b.length;while(c--)f=xa(b[c]),f[u]?d.push(f):e.push(f);f=A(a,ya(e,d)),f.selector=a}return f},i=ga.select=function(a,b,e,f){var i,j,k,l,m,n="function"==typeof a&&a,o=!f&&g(a=n.selector||a);if(e=e||[],1===o.length){if(j=o[0]=o[0].slice(0),j.length>2&&"ID"===(k=j[0]).type&&c.getById&&9===b.nodeType&&p&&d.relative[j[1].type]){if(b=(d.find.ID(k.matches[0].replace(ca,da),b)||[])[0],!b)return e;n&&(b=b.parentNode),a=a.slice(j.shift().value.length)}i=X.needsContext.test(a)?0:j.length;while(i--){if(k=j[i],d.relative[l=k.type])break;if((m=d.find[l])&&(f=m(k.matches[0].replace(ca,da),aa.test(j[0].type)&&pa(b.parentNode)||b))){if(j.splice(i,1),a=f.length&&ra(j),!a)return H.apply(e,f),e;break}}}return(n||h(a,o))(f,b,!p,e,aa.test(a)&&pa(b.parentNode)||b),e},c.sortStable=u.split("").sort(B).join("")===u,c.detectDuplicates=!!l,m(),c.sortDetached=ja(function(a){return 1&a.compareDocumentPosition(n.createElement("div"))}),ja(function(a){return a.innerHTML="","#"===a.firstChild.getAttribute("href")})||ka("type|href|height|width",function(a,b,c){return c?void 0:a.getAttribute(b,"type"===b.toLowerCase()?1:2)}),c.attributes&&ja(function(a){return a.innerHTML="",a.firstChild.setAttribute("value",""),""===a.firstChild.getAttribute("value")})||ka("value",function(a,b,c){return c||"input"!==a.nodeName.toLowerCase()?void 0:a.defaultValue}),ja(function(a){return null==a.getAttribute("disabled")})||ka(K,function(a,b,c){var d;return c?void 0:a[b]===!0?b.toLowerCase():(d=a.getAttributeNode(b))&&d.specified?d.value:null}),ga}(a);n.find=t,n.expr=t.selectors,n.expr[":"]=n.expr.pseudos,n.unique=t.uniqueSort,n.text=t.getText,n.isXMLDoc=t.isXML,n.contains=t.contains;var u=n.expr.match.needsContext,v=/^<(\w+)\s*\/?>(?:<\/\1>|)$/,w=/^.[^:#\[\.,]*$/;function x(a,b,c){if(n.isFunction(b))return n.grep(a,function(a,d){return!!b.call(a,d,a)!==c});if(b.nodeType)return n.grep(a,function(a){return a===b!==c});if("string"==typeof b){if(w.test(b))return n.filter(b,a,c);b=n.filter(b,a)}return n.grep(a,function(a){return g.call(b,a)>=0!==c})}n.filter=function(a,b,c){var d=b[0];return c&&(a=":not("+a+")"),1===b.length&&1===d.nodeType?n.find.matchesSelector(d,a)?[d]:[]:n.find.matches(a,n.grep(b,function(a){return 1===a.nodeType}))},n.fn.extend({find:function(a){var b,c=this.length,d=[],e=this;if("string"!=typeof a)return this.pushStack(n(a).filter(function(){for(b=0;c>b;b++)if(n.contains(e[b],this))return!0}));for(b=0;c>b;b++)n.find(a,e[b],d);return d=this.pushStack(c>1?n.unique(d):d),d.selector=this.selector?this.selector+" "+a:a,d},filter:function(a){return this.pushStack(x(this,a||[],!1))},not:function(a){return this.pushStack(x(this,a||[],!0))},is:function(a){return!!x(this,"string"==typeof a&&u.test(a)?n(a):a||[],!1).length}});var y,z=/^(?:\s*(<[\w\W]+>)[^>]*|#([\w-]*))$/,A=n.fn.init=function(a,b){var c,d;if(!a)return this;if("string"==typeof a){if(c="<"===a[0]&&">"===a[a.length-1]&&a.length>=3?[null,a,null]:z.exec(a),!c||!c[1]&&b)return!b||b.jquery?(b||y).find(a):this.constructor(b).find(a);if(c[1]){if(b=b instanceof n?b[0]:b,n.merge(this,n.parseHTML(c[1],b&&b.nodeType?b.ownerDocument||b:l,!0)),v.test(c[1])&&n.isPlainObject(b))for(c in b)n.isFunction(this[c])?this[c](b[c]):this.attr(c,b[c]);return this}return d=l.getElementById(c[2]),d&&d.parentNode&&(this.length=1,this[0]=d),this.context=l,this.selector=a,this}return a.nodeType?(this.context=this[0]=a,this.length=1,this):n.isFunction(a)?"undefined"!=typeof y.ready?y.ready(a):a(n):(void 0!==a.selector&&(this.selector=a.selector,this.context=a.context),n.makeArray(a,this))};A.prototype=n.fn,y=n(l);var B=/^(?:parents|prev(?:Until|All))/,C={children:!0,contents:!0,next:!0,prev:!0};n.extend({dir:function(a,b,c){var d=[],e=void 0!==c;while((a=a[b])&&9!==a.nodeType)if(1===a.nodeType){if(e&&n(a).is(c))break;d.push(a)}return d},sibling:function(a,b){for(var c=[];a;a=a.nextSibling)1===a.nodeType&&a!==b&&c.push(a);return c}}),n.fn.extend({has:function(a){var b=n(a,this),c=b.length;return this.filter(function(){for(var a=0;c>a;a++)if(n.contains(this,b[a]))return!0})},closest:function(a,b){for(var c,d=0,e=this.length,f=[],g=u.test(a)||"string"!=typeof a?n(a,b||this.context):0;e>d;d++)for(c=this[d];c&&c!==b;c=c.parentNode)if(c.nodeType<11&&(g?g.index(c)>-1:1===c.nodeType&&n.find.matchesSelector(c,a))){f.push(c);break}return this.pushStack(f.length>1?n.unique(f):f)},index:function(a){return a?"string"==typeof a?g.call(n(a),this[0]):g.call(this,a.jquery?a[0]:a):this[0]&&this[0].parentNode?this.first().prevAll().length:-1},add:function(a,b){return this.pushStack(n.unique(n.merge(this.get(),n(a,b))))},addBack:function(a){return this.add(null==a?this.prevObject:this.prevObject.filter(a))}});function D(a,b){while((a=a[b])&&1!==a.nodeType);return a}n.each({parent:function(a){var b=a.parentNode;return b&&11!==b.nodeType?b:null},parents:function(a){return n.dir(a,"parentNode")},parentsUntil:function(a,b,c){return n.dir(a,"parentNode",c)},next:function(a){return D(a,"nextSibling")},prev:function(a){return D(a,"previousSibling")},nextAll:function(a){return n.dir(a,"nextSibling")},prevAll:function(a){return n.dir(a,"previousSibling")},nextUntil:function(a,b,c){return n.dir(a,"nextSibling",c)},prevUntil:function(a,b,c){return n.dir(a,"previousSibling",c)},siblings:function(a){return n.sibling((a.parentNode||{}).firstChild,a)},children:function(a){return n.sibling(a.firstChild)},contents:function(a){return a.contentDocument||n.merge([],a.childNodes)}},function(a,b){n.fn[a]=function(c,d){var e=n.map(this,b,c);return"Until"!==a.slice(-5)&&(d=c),d&&"string"==typeof d&&(e=n.filter(d,e)),this.length>1&&(C[a]||n.unique(e),B.test(a)&&e.reverse()),this.pushStack(e)}});var E=/\S+/g,F={};function G(a){var b=F[a]={};return n.each(a.match(E)||[],function(a,c){b[c]=!0}),b}n.Callbacks=function(a){a="string"==typeof a?F[a]||G(a):n.extend({},a);var b,c,d,e,f,g,h=[],i=!a.once&&[],j=function(l){for(b=a.memory&&l,c=!0,g=e||0,e=0,f=h.length,d=!0;h&&f>g;g++)if(h[g].apply(l[0],l[1])===!1&&a.stopOnFalse){b=!1;break}d=!1,h&&(i?i.length&&j(i.shift()):b?h=[]:k.disable())},k={add:function(){if(h){var c=h.length;!function g(b){n.each(b,function(b,c){var d=n.type(c);"function"===d?a.unique&&k.has(c)||h.push(c):c&&c.length&&"string"!==d&&g(c)})}(arguments),d?f=h.length:b&&(e=c,j(b))}return this},remove:function(){return h&&n.each(arguments,function(a,b){var c;while((c=n.inArray(b,h,c))>-1)h.splice(c,1),d&&(f>=c&&f--,g>=c&&g--)}),this},has:function(a){return a?n.inArray(a,h)>-1:!(!h||!h.length)},empty:function(){return h=[],f=0,this},disable:function(){return h=i=b=void 0,this},disabled:function(){return!h},lock:function(){return i=void 0,b||k.disable(),this},locked:function(){return!i},fireWith:function(a,b){return!h||c&&!i||(b=b||[],b=[a,b.slice?b.slice():b],d?i.push(b):j(b)),this},fire:function(){return k.fireWith(this,arguments),this},fired:function(){return!!c}};return k},n.extend({Deferred:function(a){var b=[["resolve","done",n.Callbacks("once memory"),"resolved"],["reject","fail",n.Callbacks("once memory"),"rejected"],["notify","progress",n.Callbacks("memory")]],c="pending",d={state:function(){return c},always:function(){return e.done(arguments).fail(arguments),this},then:function(){var a=arguments;return n.Deferred(function(c){n.each(b,function(b,f){var g=n.isFunction(a[b])&&a[b];e[f[1]](function(){var a=g&&g.apply(this,arguments);a&&n.isFunction(a.promise)?a.promise().done(c.resolve).fail(c.reject).progress(c.notify):c[f[0]+"With"](this===d?c.promise():this,g?[a]:arguments)})}),a=null}).promise()},promise:function(a){return null!=a?n.extend(a,d):d}},e={};return d.pipe=d.then,n.each(b,function(a,f){var g=f[2],h=f[3];d[f[1]]=g.add,h&&g.add(function(){c=h},b[1^a][2].disable,b[2][2].lock),e[f[0]]=function(){return e[f[0]+"With"](this===e?d:this,arguments),this},e[f[0]+"With"]=g.fireWith}),d.promise(e),a&&a.call(e,e),e},when:function(a){var b=0,c=d.call(arguments),e=c.length,f=1!==e||a&&n.isFunction(a.promise)?e:0,g=1===f?a:n.Deferred(),h=function(a,b,c){return function(e){b[a]=this,c[a]=arguments.length>1?d.call(arguments):e,c===i?g.notifyWith(b,c):--f||g.resolveWith(b,c)}},i,j,k;if(e>1)for(i=new Array(e),j=new Array(e),k=new Array(e);e>b;b++)c[b]&&n.isFunction(c[b].promise)?c[b].promise().done(h(b,k,c)).fail(g.reject).progress(h(b,j,i)):--f;return f||g.resolveWith(k,c),g.promise()}});var H;n.fn.ready=function(a){return n.ready.promise().done(a),this},n.extend({isReady:!1,readyWait:1,holdReady:function(a){a?n.readyWait++:n.ready(!0)},ready:function(a){(a===!0?--n.readyWait:n.isReady)||(n.isReady=!0,a!==!0&&--n.readyWait>0||(H.resolveWith(l,[n]),n.fn.triggerHandler&&(n(l).triggerHandler("ready"),n(l).off("ready"))))}});function I(){l.removeEventListener("DOMContentLoaded",I,!1),a.removeEventListener("load",I,!1),n.ready()}n.ready.promise=function(b){return H||(H=n.Deferred(),"complete"===l.readyState?setTimeout(n.ready):(l.addEventListener("DOMContentLoaded",I,!1),a.addEventListener("load",I,!1))),H.promise(b)},n.ready.promise();var J=n.access=function(a,b,c,d,e,f,g){var h=0,i=a.length,j=null==c;if("object"===n.type(c)){e=!0;for(h in c)n.access(a,b,h,c[h],!0,f,g)}else if(void 0!==d&&(e=!0,n.isFunction(d)||(g=!0),j&&(g?(b.call(a,d),b=null):(j=b,b=function(a,b,c){return j.call(n(a),c)})),b))for(;i>h;h++)b(a[h],c,g?d:d.call(a[h],h,b(a[h],c)));return e?a:j?b.call(a):i?b(a[0],c):f};n.acceptData=function(a){return 1===a.nodeType||9===a.nodeType||!+a.nodeType};function K(){Object.defineProperty(this.cache={},0,{get:function(){return{}}}),this.expando=n.expando+K.uid++}K.uid=1,K.accepts=n.acceptData,K.prototype={key:function(a){if(!K.accepts(a))return 0;var b={},c=a[this.expando];if(!c){c=K.uid++;try{b[this.expando]={value:c},Object.defineProperties(a,b)}catch(d){b[this.expando]=c,n.extend(a,b)}}return this.cache[c]||(this.cache[c]={}),c},set:function(a,b,c){var d,e=this.key(a),f=this.cache[e];if("string"==typeof b)f[b]=c;else if(n.isEmptyObject(f))n.extend(this.cache[e],b);else for(d in b)f[d]=b[d];return f},get:function(a,b){var c=this.cache[this.key(a)];return void 0===b?c:c[b]},access:function(a,b,c){var d;return void 0===b||b&&"string"==typeof b&&void 0===c?(d=this.get(a,b),void 0!==d?d:this.get(a,n.camelCase(b))):(this.set(a,b,c),void 0!==c?c:b)},remove:function(a,b){var c,d,e,f=this.key(a),g=this.cache[f];if(void 0===b)this.cache[f]={};else{n.isArray(b)?d=b.concat(b.map(n.camelCase)):(e=n.camelCase(b),b in g?d=[b,e]:(d=e,d=d in g?[d]:d.match(E)||[])),c=d.length;while(c--)delete g[d[c]]}},hasData:function(a){return!n.isEmptyObject(this.cache[a[this.expando]]||{})},discard:function(a){a[this.expando]&&delete this.cache[a[this.expando]]}};var L=new K,M=new K,N=/^(?:\{[\w\W]*\}|\[[\w\W]*\])$/,O=/([A-Z])/g;function P(a,b,c){var d;if(void 0===c&&1===a.nodeType)if(d="data-"+b.replace(O,"-$1").toLowerCase(),c=a.getAttribute(d),"string"==typeof c){try{c="true"===c?!0:"false"===c?!1:"null"===c?null:+c+""===c?+c:N.test(c)?n.parseJSON(c):c}catch(e){}M.set(a,b,c)}else c=void 0;return c}n.extend({hasData:function(a){return M.hasData(a)||L.hasData(a)},data:function(a,b,c){ +return M.access(a,b,c)},removeData:function(a,b){M.remove(a,b)},_data:function(a,b,c){return L.access(a,b,c)},_removeData:function(a,b){L.remove(a,b)}}),n.fn.extend({data:function(a,b){var c,d,e,f=this[0],g=f&&f.attributes;if(void 0===a){if(this.length&&(e=M.get(f),1===f.nodeType&&!L.get(f,"hasDataAttrs"))){c=g.length;while(c--)g[c]&&(d=g[c].name,0===d.indexOf("data-")&&(d=n.camelCase(d.slice(5)),P(f,d,e[d])));L.set(f,"hasDataAttrs",!0)}return e}return"object"==typeof a?this.each(function(){M.set(this,a)}):J(this,function(b){var c,d=n.camelCase(a);if(f&&void 0===b){if(c=M.get(f,a),void 0!==c)return c;if(c=M.get(f,d),void 0!==c)return c;if(c=P(f,d,void 0),void 0!==c)return c}else this.each(function(){var c=M.get(this,d);M.set(this,d,b),-1!==a.indexOf("-")&&void 0!==c&&M.set(this,a,b)})},null,b,arguments.length>1,null,!0)},removeData:function(a){return this.each(function(){M.remove(this,a)})}}),n.extend({queue:function(a,b,c){var d;return a?(b=(b||"fx")+"queue",d=L.get(a,b),c&&(!d||n.isArray(c)?d=L.access(a,b,n.makeArray(c)):d.push(c)),d||[]):void 0},dequeue:function(a,b){b=b||"fx";var c=n.queue(a,b),d=c.length,e=c.shift(),f=n._queueHooks(a,b),g=function(){n.dequeue(a,b)};"inprogress"===e&&(e=c.shift(),d--),e&&("fx"===b&&c.unshift("inprogress"),delete f.stop,e.call(a,g,f)),!d&&f&&f.empty.fire()},_queueHooks:function(a,b){var c=b+"queueHooks";return L.get(a,c)||L.access(a,c,{empty:n.Callbacks("once memory").add(function(){L.remove(a,[b+"queue",c])})})}}),n.fn.extend({queue:function(a,b){var c=2;return"string"!=typeof a&&(b=a,a="fx",c--),arguments.lengthx",k.noCloneChecked=!!b.cloneNode(!0).lastChild.defaultValue}();var U="undefined";k.focusinBubbles="onfocusin"in a;var V=/^key/,W=/^(?:mouse|pointer|contextmenu)|click/,X=/^(?:focusinfocus|focusoutblur)$/,Y=/^([^.]*)(?:\.(.+)|)$/;function Z(){return!0}function $(){return!1}function _(){try{return l.activeElement}catch(a){}}n.event={global:{},add:function(a,b,c,d,e){var f,g,h,i,j,k,l,m,o,p,q,r=L.get(a);if(r){c.handler&&(f=c,c=f.handler,e=f.selector),c.guid||(c.guid=n.guid++),(i=r.events)||(i=r.events={}),(g=r.handle)||(g=r.handle=function(b){return typeof n!==U&&n.event.triggered!==b.type?n.event.dispatch.apply(a,arguments):void 0}),b=(b||"").match(E)||[""],j=b.length;while(j--)h=Y.exec(b[j])||[],o=q=h[1],p=(h[2]||"").split(".").sort(),o&&(l=n.event.special[o]||{},o=(e?l.delegateType:l.bindType)||o,l=n.event.special[o]||{},k=n.extend({type:o,origType:q,data:d,handler:c,guid:c.guid,selector:e,needsContext:e&&n.expr.match.needsContext.test(e),namespace:p.join(".")},f),(m=i[o])||(m=i[o]=[],m.delegateCount=0,l.setup&&l.setup.call(a,d,p,g)!==!1||a.addEventListener&&a.addEventListener(o,g,!1)),l.add&&(l.add.call(a,k),k.handler.guid||(k.handler.guid=c.guid)),e?m.splice(m.delegateCount++,0,k):m.push(k),n.event.global[o]=!0)}},remove:function(a,b,c,d,e){var f,g,h,i,j,k,l,m,o,p,q,r=L.hasData(a)&&L.get(a);if(r&&(i=r.events)){b=(b||"").match(E)||[""],j=b.length;while(j--)if(h=Y.exec(b[j])||[],o=q=h[1],p=(h[2]||"").split(".").sort(),o){l=n.event.special[o]||{},o=(d?l.delegateType:l.bindType)||o,m=i[o]||[],h=h[2]&&new RegExp("(^|\\.)"+p.join("\\.(?:.*\\.|)")+"(\\.|$)"),g=f=m.length;while(f--)k=m[f],!e&&q!==k.origType||c&&c.guid!==k.guid||h&&!h.test(k.namespace)||d&&d!==k.selector&&("**"!==d||!k.selector)||(m.splice(f,1),k.selector&&m.delegateCount--,l.remove&&l.remove.call(a,k));g&&!m.length&&(l.teardown&&l.teardown.call(a,p,r.handle)!==!1||n.removeEvent(a,o,r.handle),delete i[o])}else for(o in i)n.event.remove(a,o+b[j],c,d,!0);n.isEmptyObject(i)&&(delete r.handle,L.remove(a,"events"))}},trigger:function(b,c,d,e){var f,g,h,i,k,m,o,p=[d||l],q=j.call(b,"type")?b.type:b,r=j.call(b,"namespace")?b.namespace.split("."):[];if(g=h=d=d||l,3!==d.nodeType&&8!==d.nodeType&&!X.test(q+n.event.triggered)&&(q.indexOf(".")>=0&&(r=q.split("."),q=r.shift(),r.sort()),k=q.indexOf(":")<0&&"on"+q,b=b[n.expando]?b:new n.Event(q,"object"==typeof b&&b),b.isTrigger=e?2:3,b.namespace=r.join("."),b.namespace_re=b.namespace?new RegExp("(^|\\.)"+r.join("\\.(?:.*\\.|)")+"(\\.|$)"):null,b.result=void 0,b.target||(b.target=d),c=null==c?[b]:n.makeArray(c,[b]),o=n.event.special[q]||{},e||!o.trigger||o.trigger.apply(d,c)!==!1)){if(!e&&!o.noBubble&&!n.isWindow(d)){for(i=o.delegateType||q,X.test(i+q)||(g=g.parentNode);g;g=g.parentNode)p.push(g),h=g;h===(d.ownerDocument||l)&&p.push(h.defaultView||h.parentWindow||a)}f=0;while((g=p[f++])&&!b.isPropagationStopped())b.type=f>1?i:o.bindType||q,m=(L.get(g,"events")||{})[b.type]&&L.get(g,"handle"),m&&m.apply(g,c),m=k&&g[k],m&&m.apply&&n.acceptData(g)&&(b.result=m.apply(g,c),b.result===!1&&b.preventDefault());return b.type=q,e||b.isDefaultPrevented()||o._default&&o._default.apply(p.pop(),c)!==!1||!n.acceptData(d)||k&&n.isFunction(d[q])&&!n.isWindow(d)&&(h=d[k],h&&(d[k]=null),n.event.triggered=q,d[q](),n.event.triggered=void 0,h&&(d[k]=h)),b.result}},dispatch:function(a){a=n.event.fix(a);var b,c,e,f,g,h=[],i=d.call(arguments),j=(L.get(this,"events")||{})[a.type]||[],k=n.event.special[a.type]||{};if(i[0]=a,a.delegateTarget=this,!k.preDispatch||k.preDispatch.call(this,a)!==!1){h=n.event.handlers.call(this,a,j),b=0;while((f=h[b++])&&!a.isPropagationStopped()){a.currentTarget=f.elem,c=0;while((g=f.handlers[c++])&&!a.isImmediatePropagationStopped())(!a.namespace_re||a.namespace_re.test(g.namespace))&&(a.handleObj=g,a.data=g.data,e=((n.event.special[g.origType]||{}).handle||g.handler).apply(f.elem,i),void 0!==e&&(a.result=e)===!1&&(a.preventDefault(),a.stopPropagation()))}return k.postDispatch&&k.postDispatch.call(this,a),a.result}},handlers:function(a,b){var c,d,e,f,g=[],h=b.delegateCount,i=a.target;if(h&&i.nodeType&&(!a.button||"click"!==a.type))for(;i!==this;i=i.parentNode||this)if(i.disabled!==!0||"click"!==a.type){for(d=[],c=0;h>c;c++)f=b[c],e=f.selector+" ",void 0===d[e]&&(d[e]=f.needsContext?n(e,this).index(i)>=0:n.find(e,this,null,[i]).length),d[e]&&d.push(f);d.length&&g.push({elem:i,handlers:d})}return h]*)\/>/gi,ba=/<([\w:]+)/,ca=/<|&#?\w+;/,da=/<(?:script|style|link)/i,ea=/checked\s*(?:[^=]|=\s*.checked.)/i,fa=/^$|\/(?:java|ecma)script/i,ga=/^true\/(.*)/,ha=/^\s*\s*$/g,ia={option:[1,""],thead:[1,"","
"],col:[2,"","
"],tr:[2,"","
"],td:[3,"","
"],_default:[0,"",""]};ia.optgroup=ia.option,ia.tbody=ia.tfoot=ia.colgroup=ia.caption=ia.thead,ia.th=ia.td;function ja(a,b){return n.nodeName(a,"table")&&n.nodeName(11!==b.nodeType?b:b.firstChild,"tr")?a.getElementsByTagName("tbody")[0]||a.appendChild(a.ownerDocument.createElement("tbody")):a}function ka(a){return a.type=(null!==a.getAttribute("type"))+"/"+a.type,a}function la(a){var b=ga.exec(a.type);return b?a.type=b[1]:a.removeAttribute("type"),a}function ma(a,b){for(var c=0,d=a.length;d>c;c++)L.set(a[c],"globalEval",!b||L.get(b[c],"globalEval"))}function na(a,b){var c,d,e,f,g,h,i,j;if(1===b.nodeType){if(L.hasData(a)&&(f=L.access(a),g=L.set(b,f),j=f.events)){delete g.handle,g.events={};for(e in j)for(c=0,d=j[e].length;d>c;c++)n.event.add(b,e,j[e][c])}M.hasData(a)&&(h=M.access(a),i=n.extend({},h),M.set(b,i))}}function oa(a,b){var c=a.getElementsByTagName?a.getElementsByTagName(b||"*"):a.querySelectorAll?a.querySelectorAll(b||"*"):[];return void 0===b||b&&n.nodeName(a,b)?n.merge([a],c):c}function pa(a,b){var c=b.nodeName.toLowerCase();"input"===c&&T.test(a.type)?b.checked=a.checked:("input"===c||"textarea"===c)&&(b.defaultValue=a.defaultValue)}n.extend({clone:function(a,b,c){var d,e,f,g,h=a.cloneNode(!0),i=n.contains(a.ownerDocument,a);if(!(k.noCloneChecked||1!==a.nodeType&&11!==a.nodeType||n.isXMLDoc(a)))for(g=oa(h),f=oa(a),d=0,e=f.length;e>d;d++)pa(f[d],g[d]);if(b)if(c)for(f=f||oa(a),g=g||oa(h),d=0,e=f.length;e>d;d++)na(f[d],g[d]);else na(a,h);return g=oa(h,"script"),g.length>0&&ma(g,!i&&oa(a,"script")),h},buildFragment:function(a,b,c,d){for(var e,f,g,h,i,j,k=b.createDocumentFragment(),l=[],m=0,o=a.length;o>m;m++)if(e=a[m],e||0===e)if("object"===n.type(e))n.merge(l,e.nodeType?[e]:e);else if(ca.test(e)){f=f||k.appendChild(b.createElement("div")),g=(ba.exec(e)||["",""])[1].toLowerCase(),h=ia[g]||ia._default,f.innerHTML=h[1]+e.replace(aa,"<$1>")+h[2],j=h[0];while(j--)f=f.lastChild;n.merge(l,f.childNodes),f=k.firstChild,f.textContent=""}else l.push(b.createTextNode(e));k.textContent="",m=0;while(e=l[m++])if((!d||-1===n.inArray(e,d))&&(i=n.contains(e.ownerDocument,e),f=oa(k.appendChild(e),"script"),i&&ma(f),c)){j=0;while(e=f[j++])fa.test(e.type||"")&&c.push(e)}return k},cleanData:function(a){for(var b,c,d,e,f=n.event.special,g=0;void 0!==(c=a[g]);g++){if(n.acceptData(c)&&(e=c[L.expando],e&&(b=L.cache[e]))){if(b.events)for(d in b.events)f[d]?n.event.remove(c,d):n.removeEvent(c,d,b.handle);L.cache[e]&&delete L.cache[e]}delete M.cache[c[M.expando]]}}}),n.fn.extend({text:function(a){return J(this,function(a){return void 0===a?n.text(this):this.empty().each(function(){(1===this.nodeType||11===this.nodeType||9===this.nodeType)&&(this.textContent=a)})},null,a,arguments.length)},append:function(){return this.domManip(arguments,function(a){if(1===this.nodeType||11===this.nodeType||9===this.nodeType){var b=ja(this,a);b.appendChild(a)}})},prepend:function(){return this.domManip(arguments,function(a){if(1===this.nodeType||11===this.nodeType||9===this.nodeType){var b=ja(this,a);b.insertBefore(a,b.firstChild)}})},before:function(){return this.domManip(arguments,function(a){this.parentNode&&this.parentNode.insertBefore(a,this)})},after:function(){return this.domManip(arguments,function(a){this.parentNode&&this.parentNode.insertBefore(a,this.nextSibling)})},remove:function(a,b){for(var c,d=a?n.filter(a,this):this,e=0;null!=(c=d[e]);e++)b||1!==c.nodeType||n.cleanData(oa(c)),c.parentNode&&(b&&n.contains(c.ownerDocument,c)&&ma(oa(c,"script")),c.parentNode.removeChild(c));return this},empty:function(){for(var a,b=0;null!=(a=this[b]);b++)1===a.nodeType&&(n.cleanData(oa(a,!1)),a.textContent="");return this},clone:function(a,b){return a=null==a?!1:a,b=null==b?a:b,this.map(function(){return n.clone(this,a,b)})},html:function(a){return J(this,function(a){var b=this[0]||{},c=0,d=this.length;if(void 0===a&&1===b.nodeType)return b.innerHTML;if("string"==typeof a&&!da.test(a)&&!ia[(ba.exec(a)||["",""])[1].toLowerCase()]){a=a.replace(aa,"<$1>");try{for(;d>c;c++)b=this[c]||{},1===b.nodeType&&(n.cleanData(oa(b,!1)),b.innerHTML=a);b=0}catch(e){}}b&&this.empty().append(a)},null,a,arguments.length)},replaceWith:function(){var a=arguments[0];return this.domManip(arguments,function(b){a=this.parentNode,n.cleanData(oa(this)),a&&a.replaceChild(b,this)}),a&&(a.length||a.nodeType)?this:this.remove()},detach:function(a){return this.remove(a,!0)},domManip:function(a,b){a=e.apply([],a);var c,d,f,g,h,i,j=0,l=this.length,m=this,o=l-1,p=a[0],q=n.isFunction(p);if(q||l>1&&"string"==typeof p&&!k.checkClone&&ea.test(p))return this.each(function(c){var d=m.eq(c);q&&(a[0]=p.call(this,c,d.html())),d.domManip(a,b)});if(l&&(c=n.buildFragment(a,this[0].ownerDocument,!1,this),d=c.firstChild,1===c.childNodes.length&&(c=d),d)){for(f=n.map(oa(c,"script"),ka),g=f.length;l>j;j++)h=c,j!==o&&(h=n.clone(h,!0,!0),g&&n.merge(f,oa(h,"script"))),b.call(this[j],h,j);if(g)for(i=f[f.length-1].ownerDocument,n.map(f,la),j=0;g>j;j++)h=f[j],fa.test(h.type||"")&&!L.access(h,"globalEval")&&n.contains(i,h)&&(h.src?n._evalUrl&&n._evalUrl(h.src):n.globalEval(h.textContent.replace(ha,"")))}return this}}),n.each({appendTo:"append",prependTo:"prepend",insertBefore:"before",insertAfter:"after",replaceAll:"replaceWith"},function(a,b){n.fn[a]=function(a){for(var c,d=[],e=n(a),g=e.length-1,h=0;g>=h;h++)c=h===g?this:this.clone(!0),n(e[h])[b](c),f.apply(d,c.get());return this.pushStack(d)}});var qa,ra={};function sa(b,c){var d,e=n(c.createElement(b)).appendTo(c.body),f=a.getDefaultComputedStyle&&(d=a.getDefaultComputedStyle(e[0]))?d.display:n.css(e[0],"display");return e.detach(),f}function ta(a){var b=l,c=ra[a];return c||(c=sa(a,b),"none"!==c&&c||(qa=(qa||n("