@aztec/p2p 0.67.1 → 0.68.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (211) hide show
  1. package/dest/bootstrap/bootstrap.d.ts +5 -3
  2. package/dest/bootstrap/bootstrap.d.ts.map +1 -1
  3. package/dest/bootstrap/bootstrap.js +17 -15
  4. package/dest/client/factory.d.ts +19 -0
  5. package/dest/client/factory.d.ts.map +1 -0
  6. package/dest/client/factory.js +40 -0
  7. package/dest/client/index.d.ts +1 -15
  8. package/dest/client/index.d.ts.map +1 -1
  9. package/dest/client/index.js +2 -37
  10. package/dest/client/p2p_client.d.ts +6 -6
  11. package/dest/client/p2p_client.d.ts.map +1 -1
  12. package/dest/client/p2p_client.js +12 -11
  13. package/dest/config.d.ts +1 -1
  14. package/dest/config.d.ts.map +1 -1
  15. package/dest/config.js +3 -3
  16. package/dest/errors/reqresp.error.d.ts +12 -1
  17. package/dest/errors/reqresp.error.d.ts.map +1 -1
  18. package/dest/errors/reqresp.error.js +15 -2
  19. package/dest/index.d.ts +2 -2
  20. package/dest/index.d.ts.map +1 -1
  21. package/dest/index.js +3 -3
  22. package/dest/mem_pools/attestation_pool/attestation_pool.d.ts +9 -0
  23. package/dest/mem_pools/attestation_pool/attestation_pool.d.ts.map +1 -1
  24. package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts +3 -0
  25. package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts.map +1 -0
  26. package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.js +171 -0
  27. package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts +29 -0
  28. package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts.map +1 -0
  29. package/dest/mem_pools/attestation_pool/kv_attestation_pool.js +114 -0
  30. package/dest/mem_pools/interface.d.ts +4 -3
  31. package/dest/mem_pools/interface.d.ts.map +1 -1
  32. package/dest/mocks/index.d.ts +7 -6
  33. package/dest/mocks/index.d.ts.map +1 -1
  34. package/dest/mocks/index.js +8 -8
  35. package/dest/msg_validators/attestation_validator/attestation_validator.d.ts +8 -0
  36. package/dest/msg_validators/attestation_validator/attestation_validator.d.ts.map +1 -0
  37. package/dest/msg_validators/attestation_validator/attestation_validator.js +19 -0
  38. package/dest/msg_validators/attestation_validator/index.d.ts +2 -0
  39. package/dest/msg_validators/attestation_validator/index.d.ts.map +1 -0
  40. package/dest/msg_validators/attestation_validator/index.js +2 -0
  41. package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts +8 -0
  42. package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts.map +1 -0
  43. package/dest/msg_validators/block_proposal_validator/block_proposal_validator.js +21 -0
  44. package/dest/msg_validators/block_proposal_validator/index.d.ts +2 -0
  45. package/dest/msg_validators/block_proposal_validator/index.d.ts.map +1 -0
  46. package/dest/msg_validators/block_proposal_validator/index.js +2 -0
  47. package/dest/msg_validators/epoch_proof_quote_validator/epoch_proof_quote_validator.d.ts +8 -0
  48. package/dest/msg_validators/epoch_proof_quote_validator/epoch_proof_quote_validator.d.ts.map +1 -0
  49. package/dest/msg_validators/epoch_proof_quote_validator/epoch_proof_quote_validator.js +16 -0
  50. package/dest/msg_validators/epoch_proof_quote_validator/index.d.ts +2 -0
  51. package/dest/msg_validators/epoch_proof_quote_validator/index.d.ts.map +1 -0
  52. package/dest/msg_validators/epoch_proof_quote_validator/index.js +2 -0
  53. package/dest/msg_validators/index.d.ts +4 -0
  54. package/dest/msg_validators/index.d.ts.map +1 -0
  55. package/dest/msg_validators/index.js +4 -0
  56. package/dest/{tx_validator → msg_validators/tx_validator}/aggregate_tx_validator.d.ts +1 -1
  57. package/dest/msg_validators/tx_validator/aggregate_tx_validator.d.ts.map +1 -0
  58. package/dest/msg_validators/tx_validator/aggregate_tx_validator.js +34 -0
  59. package/dest/msg_validators/tx_validator/data_validator.d.ts.map +1 -0
  60. package/dest/{tx_validator → msg_validators/tx_validator}/data_validator.js +1 -1
  61. package/dest/{tx_validator → msg_validators/tx_validator}/double_spend_validator.d.ts +3 -2
  62. package/dest/msg_validators/tx_validator/double_spend_validator.d.ts.map +1 -0
  63. package/dest/msg_validators/tx_validator/double_spend_validator.js +56 -0
  64. package/dest/msg_validators/tx_validator/index.d.ts.map +1 -0
  65. package/dest/{tx_validator → msg_validators/tx_validator}/index.js +1 -1
  66. package/dest/msg_validators/tx_validator/metadata_validator.d.ts.map +1 -0
  67. package/dest/{tx_validator → msg_validators/tx_validator}/metadata_validator.js +1 -1
  68. package/dest/msg_validators/tx_validator/tx_proof_validator.d.ts.map +1 -0
  69. package/dest/msg_validators/tx_validator/tx_proof_validator.js +29 -0
  70. package/dest/services/data_store.d.ts.map +1 -0
  71. package/dest/services/data_store.js +188 -0
  72. package/dest/{service → services/discv5}/discV5_service.d.ts +3 -9
  73. package/dest/services/discv5/discV5_service.d.ts.map +1 -0
  74. package/dest/services/discv5/discV5_service.js +139 -0
  75. package/dest/services/dummy_service.d.ts.map +1 -0
  76. package/dest/{service → services}/dummy_service.js +1 -1
  77. package/dest/{service → services}/encoding.d.ts +5 -0
  78. package/dest/services/encoding.d.ts.map +1 -0
  79. package/dest/services/encoding.js +65 -0
  80. package/dest/services/index.d.ts +3 -0
  81. package/dest/services/index.d.ts.map +1 -0
  82. package/dest/services/index.js +3 -0
  83. package/dest/services/libp2p/libp2p_service.d.ts +222 -0
  84. package/dest/services/libp2p/libp2p_service.d.ts.map +1 -0
  85. package/dest/services/libp2p/libp2p_service.js +697 -0
  86. package/dest/services/peer-scoring/peer_scoring.d.ts +25 -0
  87. package/dest/services/peer-scoring/peer_scoring.d.ts.map +1 -0
  88. package/dest/services/peer-scoring/peer_scoring.js +75 -0
  89. package/dest/services/peer_manager.d.ts +60 -0
  90. package/dest/services/peer_manager.d.ts.map +1 -0
  91. package/dest/services/peer_manager.js +358 -0
  92. package/dest/services/reqresp/config.d.ts.map +1 -0
  93. package/dest/{service → services}/reqresp/config.js +1 -1
  94. package/dest/services/reqresp/handlers.d.ts.map +1 -0
  95. package/dest/{service → services}/reqresp/handlers.js +1 -1
  96. package/dest/services/reqresp/index.d.ts.map +1 -0
  97. package/dest/{service → services}/reqresp/index.js +1 -1
  98. package/dest/services/reqresp/interface.d.ts.map +1 -0
  99. package/dest/{service → services}/reqresp/interface.js +1 -1
  100. package/dest/services/reqresp/rate_limiter/index.d.ts.map +1 -0
  101. package/dest/{service → services}/reqresp/rate_limiter/index.js +1 -1
  102. package/dest/{service → services}/reqresp/rate_limiter/rate_limiter.d.ts +0 -5
  103. package/dest/services/reqresp/rate_limiter/rate_limiter.d.ts.map +1 -0
  104. package/dest/{service → services}/reqresp/rate_limiter/rate_limiter.js +7 -2
  105. package/dest/services/reqresp/rate_limiter/rate_limits.d.ts.map +1 -0
  106. package/dest/{service → services}/reqresp/rate_limiter/rate_limits.js +1 -1
  107. package/dest/{service → services}/reqresp/reqresp.d.ts +16 -0
  108. package/dest/services/reqresp/reqresp.d.ts.map +1 -0
  109. package/dest/services/reqresp/reqresp.js +279 -0
  110. package/dest/services/service.d.ts.map +1 -0
  111. package/dest/{service → services}/service.js +1 -1
  112. package/dest/services/types.d.ts +38 -0
  113. package/dest/services/types.d.ts.map +1 -0
  114. package/dest/services/types.js +43 -0
  115. package/package.json +14 -11
  116. package/src/bootstrap/bootstrap.ts +25 -20
  117. package/src/client/factory.ts +97 -0
  118. package/src/client/index.ts +1 -73
  119. package/src/client/p2p_client.ts +28 -15
  120. package/src/config.ts +2 -2
  121. package/src/errors/reqresp.error.ts +15 -1
  122. package/src/index.ts +2 -2
  123. package/src/mem_pools/attestation_pool/attestation_pool.ts +10 -0
  124. package/src/mem_pools/attestation_pool/attestation_pool_test_suite.ts +237 -0
  125. package/src/mem_pools/attestation_pool/kv_attestation_pool.ts +153 -0
  126. package/src/mem_pools/interface.ts +5 -3
  127. package/src/mocks/index.ts +16 -10
  128. package/src/msg_validators/attestation_validator/attestation_validator.ts +26 -0
  129. package/src/msg_validators/attestation_validator/index.ts +1 -0
  130. package/src/msg_validators/block_proposal_validator/block_proposal_validator.ts +29 -0
  131. package/src/msg_validators/block_proposal_validator/index.ts +1 -0
  132. package/src/msg_validators/epoch_proof_quote_validator/epoch_proof_quote_validator.ts +22 -0
  133. package/src/msg_validators/epoch_proof_quote_validator/index.ts +1 -0
  134. package/src/msg_validators/index.ts +3 -0
  135. package/src/{tx_validator → msg_validators/tx_validator}/aggregate_tx_validator.ts +5 -3
  136. package/src/{tx_validator → msg_validators/tx_validator}/double_spend_validator.ts +6 -8
  137. package/src/{service → services/discv5}/discV5_service.ts +19 -23
  138. package/src/{service → services}/encoding.ts +21 -3
  139. package/src/services/index.ts +2 -0
  140. package/src/{service → services/libp2p}/libp2p_service.ts +350 -90
  141. package/src/{service → services/peer-scoring}/peer_scoring.ts +27 -23
  142. package/src/services/peer_manager.ts +422 -0
  143. package/src/{service → services}/reqresp/rate_limiter/rate_limiter.ts +2 -1
  144. package/src/{service → services}/reqresp/reqresp.ts +86 -20
  145. package/src/services/types.ts +44 -0
  146. package/dest/service/data_store.d.ts.map +0 -1
  147. package/dest/service/data_store.js +0 -188
  148. package/dest/service/discV5_service.d.ts.map +0 -1
  149. package/dest/service/discV5_service.js +0 -144
  150. package/dest/service/dummy_service.d.ts.map +0 -1
  151. package/dest/service/encoding.d.ts.map +0 -1
  152. package/dest/service/encoding.js +0 -49
  153. package/dest/service/index.d.ts +0 -3
  154. package/dest/service/index.d.ts.map +0 -1
  155. package/dest/service/index.js +0 -3
  156. package/dest/service/libp2p_service.d.ts +0 -136
  157. package/dest/service/libp2p_service.d.ts.map +0 -1
  158. package/dest/service/libp2p_service.js +0 -500
  159. package/dest/service/peer_manager.d.ts +0 -33
  160. package/dest/service/peer_manager.d.ts.map +0 -1
  161. package/dest/service/peer_manager.js +0 -214
  162. package/dest/service/peer_scoring.d.ts +0 -35
  163. package/dest/service/peer_scoring.d.ts.map +0 -1
  164. package/dest/service/peer_scoring.js +0 -72
  165. package/dest/service/reqresp/config.d.ts.map +0 -1
  166. package/dest/service/reqresp/handlers.d.ts.map +0 -1
  167. package/dest/service/reqresp/index.d.ts.map +0 -1
  168. package/dest/service/reqresp/interface.d.ts.map +0 -1
  169. package/dest/service/reqresp/rate_limiter/index.d.ts.map +0 -1
  170. package/dest/service/reqresp/rate_limiter/rate_limiter.d.ts.map +0 -1
  171. package/dest/service/reqresp/rate_limiter/rate_limits.d.ts.map +0 -1
  172. package/dest/service/reqresp/reqresp.d.ts.map +0 -1
  173. package/dest/service/reqresp/reqresp.js +0 -230
  174. package/dest/service/service.d.ts.map +0 -1
  175. package/dest/tx_validator/aggregate_tx_validator.d.ts.map +0 -1
  176. package/dest/tx_validator/aggregate_tx_validator.js +0 -32
  177. package/dest/tx_validator/data_validator.d.ts.map +0 -1
  178. package/dest/tx_validator/double_spend_validator.d.ts.map +0 -1
  179. package/dest/tx_validator/double_spend_validator.js +0 -56
  180. package/dest/tx_validator/index.d.ts.map +0 -1
  181. package/dest/tx_validator/metadata_validator.d.ts.map +0 -1
  182. package/dest/tx_validator/tx_proof_validator.d.ts.map +0 -1
  183. package/dest/tx_validator/tx_proof_validator.js +0 -29
  184. package/src/service/index.ts +0 -2
  185. package/src/service/peer_manager.ts +0 -266
  186. /package/dest/{tx_validator → msg_validators/tx_validator}/data_validator.d.ts +0 -0
  187. /package/dest/{tx_validator → msg_validators/tx_validator}/index.d.ts +0 -0
  188. /package/dest/{tx_validator → msg_validators/tx_validator}/metadata_validator.d.ts +0 -0
  189. /package/dest/{tx_validator → msg_validators/tx_validator}/tx_proof_validator.d.ts +0 -0
  190. /package/dest/{service → services}/data_store.d.ts +0 -0
  191. /package/dest/{service → services}/dummy_service.d.ts +0 -0
  192. /package/dest/{service → services}/reqresp/config.d.ts +0 -0
  193. /package/dest/{service → services}/reqresp/handlers.d.ts +0 -0
  194. /package/dest/{service → services}/reqresp/index.d.ts +0 -0
  195. /package/dest/{service → services}/reqresp/interface.d.ts +0 -0
  196. /package/dest/{service → services}/reqresp/rate_limiter/index.d.ts +0 -0
  197. /package/dest/{service → services}/reqresp/rate_limiter/rate_limits.d.ts +0 -0
  198. /package/dest/{service → services}/service.d.ts +0 -0
  199. /package/src/{tx_validator → msg_validators/tx_validator}/data_validator.ts +0 -0
  200. /package/src/{tx_validator → msg_validators/tx_validator}/index.ts +0 -0
  201. /package/src/{tx_validator → msg_validators/tx_validator}/metadata_validator.ts +0 -0
  202. /package/src/{tx_validator → msg_validators/tx_validator}/tx_proof_validator.ts +0 -0
  203. /package/src/{service → services}/data_store.ts +0 -0
  204. /package/src/{service → services}/dummy_service.ts +0 -0
  205. /package/src/{service → services}/reqresp/config.ts +0 -0
  206. /package/src/{service → services}/reqresp/handlers.ts +0 -0
  207. /package/src/{service → services}/reqresp/index.ts +0 -0
  208. /package/src/{service → services}/reqresp/interface.ts +0 -0
  209. /package/src/{service → services}/reqresp/rate_limiter/index.ts +0 -0
  210. /package/src/{service → services}/reqresp/rate_limiter/rate_limits.ts +0 -0
  211. /package/src/{service → services}/service.ts +0 -0
@@ -0,0 +1,697 @@
1
+ import { __esDecorate, __runInitializers } from "tslib";
2
+ import { BlockAttestation, BlockProposal, EpochProofQuote, MerkleTreeId, PeerErrorSeverity, TopicTypeMap, Tx, TxHash, getTopicTypeForClientType, metricsTopicStrToLabels, } from '@aztec/circuit-types';
3
+ import { P2PClientType } from '@aztec/circuit-types';
4
+ import { Fr } from '@aztec/circuits.js';
5
+ import { createLogger } from '@aztec/foundation/log';
6
+ import { SerialQueue } from '@aztec/foundation/queue';
7
+ import { RunningPromise } from '@aztec/foundation/running-promise';
8
+ import { Attributes, OtelMetricsAdapter, WithTracer, trackSpan } from '@aztec/telemetry-client';
9
+ import { gossipsub, } from '@chainsafe/libp2p-gossipsub';
10
+ import { createPeerScoreParams, createTopicScoreParams } from '@chainsafe/libp2p-gossipsub/score';
11
+ import { noise } from '@chainsafe/libp2p-noise';
12
+ import { yamux } from '@chainsafe/libp2p-yamux';
13
+ import { identify } from '@libp2p/identify';
14
+ import { TopicValidatorResult } from '@libp2p/interface';
15
+ import '@libp2p/kad-dht';
16
+ import { mplex } from '@libp2p/mplex';
17
+ import { tcp } from '@libp2p/tcp';
18
+ import { createLibp2p } from 'libp2p';
19
+ import { EpochProofQuoteValidator } from '../../msg_validators/epoch_proof_quote_validator/index.js';
20
+ import { AttestationValidator, BlockProposalValidator } from '../../msg_validators/index.js';
21
+ import { DataTxValidator, DoubleSpendTxValidator, MetadataTxValidator, TxProofValidator, } from '../../msg_validators/tx_validator/index.js';
22
+ import { convertToMultiaddr } from '../../util.js';
23
+ import { AztecDatastore } from '../data_store.js';
24
+ import { SnappyTransform, fastMsgIdFn, getMsgIdFn, msgIdToStrFn } from '../encoding.js';
25
+ import { PeerManager } from '../peer_manager.js';
26
+ import { pingHandler, statusHandler } from '../reqresp/handlers.js';
27
+ import { DEFAULT_SUB_PROTOCOL_HANDLERS, DEFAULT_SUB_PROTOCOL_VALIDATORS, PING_PROTOCOL, STATUS_PROTOCOL, TX_REQ_PROTOCOL, } from '../reqresp/interface.js';
28
+ import { ReqResp } from '../reqresp/reqresp.js';
29
+ import { GossipSubEvent } from '../types.js';
30
+ /**
31
+ * Lib P2P implementation of the P2PService interface.
32
+ */
33
+ let LibP2PService = (() => {
34
+ var _a;
35
+ let _classSuper = WithTracer;
36
+ let _instanceExtraInitializers = [];
37
+ let _processAttestationFromPeer_decorators;
38
+ let _processBlockFromPeer_decorators;
39
+ let _broadcastAttestation_decorators;
40
+ let _validateRequestedTx_decorators;
41
+ let _validatePropagatedTx_decorators;
42
+ let _validateAttestation_decorators;
43
+ let _validateBlockProposal_decorators;
44
+ let _validateEpochProofQuote_decorators;
45
+ return _a = class LibP2PService extends _classSuper {
46
+ constructor(clientType, config, node, peerDiscoveryService, mempools, l2BlockSource, epochCache, proofVerifier, worldStateSynchronizer, telemetry, requestResponseHandlers = DEFAULT_SUB_PROTOCOL_HANDLERS, logger = createLogger('p2p:libp2p_service')) {
47
+ super(telemetry, 'LibP2PService');
48
+ this.clientType = (__runInitializers(this, _instanceExtraInitializers), clientType);
49
+ this.config = config;
50
+ this.node = node;
51
+ this.peerDiscoveryService = peerDiscoveryService;
52
+ this.mempools = mempools;
53
+ this.l2BlockSource = l2BlockSource;
54
+ this.epochCache = epochCache;
55
+ this.proofVerifier = proofVerifier;
56
+ this.worldStateSynchronizer = worldStateSynchronizer;
57
+ this.telemetry = telemetry;
58
+ this.requestResponseHandlers = requestResponseHandlers;
59
+ this.logger = logger;
60
+ this.jobQueue = new SerialQueue();
61
+ this.peerManager = new PeerManager(node, peerDiscoveryService, config, telemetry, logger);
62
+ this.node.services.pubsub.score.params.appSpecificScore = (peerId) => {
63
+ return this.peerManager.getPeerScore(peerId);
64
+ };
65
+ this.node.services.pubsub.score.params.appSpecificWeight = 10;
66
+ this.reqresp = new ReqResp(config, node, this.peerManager);
67
+ this.attestationValidator = new AttestationValidator(epochCache);
68
+ this.blockProposalValidator = new BlockProposalValidator(epochCache);
69
+ this.epochProofQuoteValidator = new EpochProofQuoteValidator(epochCache);
70
+ this.blockReceivedCallback = (block) => {
71
+ this.logger.verbose(`[WARNING] handler not yet registered: Block received callback not set. Received block ${block.p2pMessageIdentifier()} from peer.`);
72
+ return Promise.resolve(undefined);
73
+ };
74
+ }
75
+ /**
76
+ * Starts the LibP2P service.
77
+ * @returns An empty promise.
78
+ */
79
+ async start() {
80
+ // Check if service is already started
81
+ if (this.node.status === 'started') {
82
+ throw new Error('P2P service already started');
83
+ }
84
+ // Get listen & announce addresses for logging
85
+ const { tcpListenAddress, tcpAnnounceAddress } = this.config;
86
+ if (!tcpAnnounceAddress) {
87
+ throw new Error('Announce address not provided.');
88
+ }
89
+ const announceTcpMultiaddr = convertToMultiaddr(tcpAnnounceAddress, 'tcp');
90
+ // Start job queue, peer discovery service and libp2p node
91
+ this.jobQueue.start();
92
+ await this.peerDiscoveryService.start();
93
+ await this.node.start();
94
+ // Subscribe to standard GossipSub topics by default
95
+ for (const topic of getTopicTypeForClientType(this.clientType)) {
96
+ this.subscribeToTopic(TopicTypeMap[topic].p2pTopic);
97
+ }
98
+ // Add p2p topic validators
99
+ // As they are stored within a kv pair, there is no need to register them conditionally
100
+ // based on the client type
101
+ const topicValidators = {
102
+ [Tx.p2pTopic]: this.validatePropagatedTxFromMessage.bind(this),
103
+ [BlockAttestation.p2pTopic]: this.validatePropagatedAttestationFromMessage.bind(this),
104
+ [BlockProposal.p2pTopic]: this.validatePropagatedBlockFromMessage.bind(this),
105
+ [EpochProofQuote.p2pTopic]: this.validatePropagatedEpochProofQuoteFromMessage.bind(this),
106
+ };
107
+ for (const [topic, validator] of Object.entries(topicValidators)) {
108
+ this.node.services.pubsub.topicValidators.set(topic, validator);
109
+ }
110
+ // add GossipSub listener
111
+ this.node.services.pubsub.addEventListener(GossipSubEvent.MESSAGE, this.handleGossipSubEvent.bind(this));
112
+ // Start running promise for peer discovery
113
+ this.discoveryRunningPromise = new RunningPromise(() => this.peerManager.heartbeat(), this.logger, this.config.peerCheckIntervalMS);
114
+ this.discoveryRunningPromise.start();
115
+ // Define the sub protocol validators - This is done within this start() method to gain a callback to the existing validateTx function
116
+ const reqrespSubProtocolValidators = {
117
+ ...DEFAULT_SUB_PROTOCOL_VALIDATORS,
118
+ [TX_REQ_PROTOCOL]: this.validateRequestedTx.bind(this),
119
+ };
120
+ await this.reqresp.start(this.requestResponseHandlers, reqrespSubProtocolValidators);
121
+ this.logger.info(`Started P2P service`, {
122
+ listen: tcpListenAddress,
123
+ announce: announceTcpMultiaddr,
124
+ peerId: this.node.peerId.toString(),
125
+ });
126
+ }
127
+ /**
128
+ * Stops the LibP2P service.
129
+ * @returns An empty promise.
130
+ */
131
+ async stop() {
132
+ // Remove gossip sub listener
133
+ this.node.services.pubsub.removeEventListener(GossipSubEvent.MESSAGE, this.handleGossipSubEvent.bind(this));
134
+ // Stop peer manager
135
+ this.logger.debug('Stopping peer manager...');
136
+ this.peerManager.stop();
137
+ this.logger.debug('Stopping job queue...');
138
+ await this.jobQueue.end();
139
+ this.logger.debug('Stopping running promise...');
140
+ await this.discoveryRunningPromise?.stop();
141
+ this.logger.debug('Stopping peer discovery service...');
142
+ await this.peerDiscoveryService.stop();
143
+ this.logger.debug('Request response service stopped...');
144
+ await this.reqresp.stop();
145
+ this.logger.debug('Stopping LibP2P...');
146
+ await this.stopLibP2P();
147
+ this.logger.info('LibP2P service stopped');
148
+ }
149
+ /**
150
+ * Creates an instance of the LibP2P service.
151
+ * @param config - The configuration to use when creating the service.
152
+ * @param txPool - The transaction pool to be accessed by the service.
153
+ * @returns The new service.
154
+ */
155
+ static async new(clientType, config, peerDiscoveryService, peerId, mempools, l2BlockSource, epochCache, proofVerifier, worldStateSynchronizer, store, telemetry) {
156
+ const { tcpListenAddress, tcpAnnounceAddress, minPeerCount, maxPeerCount } = config;
157
+ const bindAddrTcp = convertToMultiaddr(tcpListenAddress, 'tcp');
158
+ // We know tcpAnnounceAddress cannot be null here because we set it or throw when setting up the service.
159
+ const announceAddrTcp = convertToMultiaddr(tcpAnnounceAddress, 'tcp');
160
+ const datastore = new AztecDatastore(store);
161
+ const otelMetricsAdapter = new OtelMetricsAdapter(telemetry);
162
+ const node = await createLibp2p({
163
+ start: false,
164
+ peerId,
165
+ addresses: {
166
+ listen: [bindAddrTcp],
167
+ announce: [announceAddrTcp],
168
+ },
169
+ transports: [
170
+ tcp({
171
+ maxConnections: config.maxPeerCount,
172
+ // socket option: the maximum length of the queue of pending connections
173
+ // https://nodejs.org/dist/latest-v18.x/docs/api/net.html#serverlisten
174
+ // it's not safe if we increase this number
175
+ backlog: 5,
176
+ closeServerOnMaxConnections: {
177
+ closeAbove: maxPeerCount ?? Infinity,
178
+ listenBelow: maxPeerCount ?? Infinity,
179
+ },
180
+ }),
181
+ ],
182
+ datastore,
183
+ streamMuxers: [yamux(), mplex()],
184
+ connectionEncryption: [noise()],
185
+ connectionManager: {
186
+ minConnections: minPeerCount,
187
+ maxConnections: maxPeerCount,
188
+ },
189
+ services: {
190
+ identify: identify({
191
+ protocolPrefix: 'aztec',
192
+ }),
193
+ pubsub: gossipsub({
194
+ allowPublishToZeroTopicPeers: true,
195
+ D: config.gossipsubD,
196
+ Dlo: config.gossipsubDlo,
197
+ Dhi: config.gossipsubDhi,
198
+ heartbeatInterval: config.gossipsubInterval,
199
+ mcacheLength: config.gossipsubMcacheLength,
200
+ mcacheGossip: config.gossipsubMcacheGossip,
201
+ msgIdFn: getMsgIdFn,
202
+ msgIdToStrFn: msgIdToStrFn,
203
+ fastMsgIdFn: fastMsgIdFn,
204
+ dataTransform: new SnappyTransform(),
205
+ metricsRegister: otelMetricsAdapter,
206
+ metricsTopicStrToLabel: metricsTopicStrToLabels(),
207
+ asyncValidation: true,
208
+ scoreParams: createPeerScoreParams({
209
+ topics: {
210
+ [Tx.p2pTopic]: createTopicScoreParams({
211
+ topicWeight: 1,
212
+ invalidMessageDeliveriesWeight: -20,
213
+ invalidMessageDeliveriesDecay: 0.5,
214
+ }),
215
+ [BlockAttestation.p2pTopic]: createTopicScoreParams({
216
+ topicWeight: 1,
217
+ invalidMessageDeliveriesWeight: -20,
218
+ invalidMessageDeliveriesDecay: 0.5,
219
+ }),
220
+ [BlockAttestation.p2pTopic]: createTopicScoreParams({
221
+ topicWeight: 1,
222
+ invalidMessageDeliveriesWeight: -20,
223
+ invalidMessageDeliveriesDecay: 0.5,
224
+ }),
225
+ [EpochProofQuote.p2pTopic]: createTopicScoreParams({
226
+ topicWeight: 1,
227
+ invalidMessageDeliveriesWeight: -20,
228
+ invalidMessageDeliveriesDecay: 0.5,
229
+ }),
230
+ },
231
+ }),
232
+ }),
233
+ },
234
+ });
235
+ // Create request response protocol handlers
236
+ /**
237
+ * Handler for tx requests
238
+ * @param msg - the tx request message
239
+ * @returns the tx response message
240
+ */
241
+ const txHandler = (msg) => {
242
+ const txHash = TxHash.fromBuffer(msg);
243
+ const foundTx = mempools.txPool.getTxByHash(txHash);
244
+ const buf = foundTx ? foundTx.toBuffer() : Buffer.alloc(0);
245
+ return Promise.resolve(buf);
246
+ };
247
+ const requestResponseHandlers = {
248
+ [PING_PROTOCOL]: pingHandler,
249
+ [STATUS_PROTOCOL]: statusHandler,
250
+ [TX_REQ_PROTOCOL]: txHandler,
251
+ };
252
+ return new _a(clientType, config, node, peerDiscoveryService, mempools, l2BlockSource, epochCache, proofVerifier, worldStateSynchronizer, telemetry, requestResponseHandlers);
253
+ }
254
+ getPeers(includePending) {
255
+ return this.peerManager.getPeers(includePending);
256
+ }
257
+ async handleGossipSubEvent(e) {
258
+ const { msg } = e.detail;
259
+ this.logger.trace(`Received PUBSUB message.`);
260
+ await this.jobQueue.put(() => this.handleNewGossipMessage(msg));
261
+ }
262
+ /**
263
+ * Send Request via the ReqResp service
264
+ * The subprotocol defined will determine the request and response types
265
+ *
266
+ * See the subProtocolMap for the mapping of subprotocols to request/response types in `interface.ts`
267
+ *
268
+ * @param protocol The request response protocol to use
269
+ * @param request The request type to send
270
+ * @returns
271
+ */
272
+ sendRequest(protocol, request) {
273
+ return this.reqresp.sendRequest(protocol, request);
274
+ }
275
+ /**
276
+ * Get the ENR of the node
277
+ * @returns The ENR of the node
278
+ */
279
+ getEnr() {
280
+ return this.peerDiscoveryService.getEnr();
281
+ }
282
+ registerBlockReceivedCallback(callback) {
283
+ this.blockReceivedCallback = callback;
284
+ this.logger.verbose('Block received callback registered');
285
+ }
286
+ /**
287
+ * Subscribes to a topic.
288
+ * @param topic - The topic to subscribe to.
289
+ */
290
+ subscribeToTopic(topic) {
291
+ if (!this.node.services.pubsub) {
292
+ throw new Error('Pubsub service not available.');
293
+ }
294
+ void this.node.services.pubsub.subscribe(topic);
295
+ }
296
+ /**
297
+ * Publishes data to a topic.
298
+ * @param topic - The topic to publish to.
299
+ * @param data - The data to publish.
300
+ * @returns The number of recipients the data was sent to.
301
+ */
302
+ async publishToTopic(topic, data) {
303
+ if (!this.node.services.pubsub) {
304
+ throw new Error('Pubsub service not available.');
305
+ }
306
+ const result = await this.node.services.pubsub.publish(topic, data);
307
+ return result.recipients.length;
308
+ }
309
+ /**
310
+ * Handles a new gossip message that was received by the client.
311
+ * @param topic - The message's topic.
312
+ * @param data - The message data
313
+ */
314
+ async handleNewGossipMessage(message) {
315
+ if (message.topic === Tx.p2pTopic) {
316
+ const tx = Tx.fromBuffer(Buffer.from(message.data));
317
+ await this.processTxFromPeer(tx);
318
+ }
319
+ if (message.topic === BlockAttestation.p2pTopic && this.clientType === P2PClientType.Full) {
320
+ const attestation = BlockAttestation.fromBuffer(Buffer.from(message.data));
321
+ await this.processAttestationFromPeer(attestation);
322
+ }
323
+ if (message.topic == BlockProposal.p2pTopic) {
324
+ const block = BlockProposal.fromBuffer(Buffer.from(message.data));
325
+ await this.processBlockFromPeer(block);
326
+ }
327
+ if (message.topic == EpochProofQuote.p2pTopic) {
328
+ const epochProofQuote = EpochProofQuote.fromBuffer(Buffer.from(message.data));
329
+ this.processEpochProofQuoteFromPeer(epochProofQuote);
330
+ }
331
+ return;
332
+ }
333
+ /**Process Attestation From Peer
334
+ * When a proposal is received from a peer, we add it to the attestation pool, so it can be accessed by other services.
335
+ *
336
+ * @param attestation - The attestation to process.
337
+ */
338
+ async processAttestationFromPeer(attestation) {
339
+ this.logger.debug(`Received attestation ${attestation.p2pMessageIdentifier()} from external peer.`);
340
+ await this.mempools.attestationPool.addAttestations([attestation]);
341
+ }
342
+ /**Process block from peer
343
+ *
344
+ * Pass the received block to the validator client
345
+ *
346
+ * @param block - The block to process.
347
+ */
348
+ // REVIEW: callback pattern https://github.com/AztecProtocol/aztec-packages/issues/7963
349
+ async processBlockFromPeer(block) {
350
+ this.logger.verbose(`Received block ${block.p2pMessageIdentifier()} from external peer.`);
351
+ const attestation = await this.blockReceivedCallback(block);
352
+ // TODO: fix up this pattern - the abstraction is not nice
353
+ // The attestation can be undefined if no handler is registered / the validator deems the block invalid
354
+ if (attestation != undefined) {
355
+ this.logger.verbose(`Broadcasting attestation ${attestation.p2pMessageIdentifier()}`);
356
+ this.broadcastAttestation(attestation);
357
+ }
358
+ }
359
+ /**
360
+ * Broadcast an attestation to all peers.
361
+ * @param attestation - The attestation to broadcast.
362
+ */
363
+ broadcastAttestation(attestation) {
364
+ this.propagate(attestation);
365
+ }
366
+ processEpochProofQuoteFromPeer(epochProofQuote) {
367
+ this.logger.verbose(`Received epoch proof quote ${epochProofQuote.p2pMessageIdentifier()} from external peer.`);
368
+ this.mempools.epochProofQuotePool.addQuote(epochProofQuote);
369
+ }
370
+ /**
371
+ * Propagates provided message to peers.
372
+ * @param message - The message to propagate.
373
+ */
374
+ propagate(message) {
375
+ this.logger.trace(`[${message.p2pMessageIdentifier()}] queued`);
376
+ void this.jobQueue.put(async () => {
377
+ await this.sendToPeers(message);
378
+ });
379
+ }
380
+ async processTxFromPeer(tx) {
381
+ const txHash = tx.getTxHash();
382
+ const txHashString = txHash.toString();
383
+ this.logger.verbose(`Received tx ${txHashString} from external peer.`);
384
+ await this.mempools.txPool.addTxs([tx]);
385
+ }
386
+ /**
387
+ * Validate a tx that has been requested from a peer.
388
+ *
389
+ * The core component of this validator is that the tx hash MUST match the requested tx hash,
390
+ * In order to perform this check, the tx proof must be verified.
391
+ *
392
+ * Note: This function is called from within `ReqResp.sendRequest` as part of the
393
+ * TX_REQ_PROTOCOL subprotocol validation.
394
+ *
395
+ * @param requestedTxHash - The hash of the tx that was requested.
396
+ * @param responseTx - The tx that was received as a response to the request.
397
+ * @param peerId - The peer ID of the peer that sent the tx.
398
+ * @returns True if the tx is valid, false otherwise.
399
+ */
400
+ async validateRequestedTx(requestedTxHash, responseTx, peerId) {
401
+ const proofValidator = new TxProofValidator(this.proofVerifier);
402
+ const validProof = await proofValidator.validateTx(responseTx);
403
+ // If the node returns the wrong data, we penalize it
404
+ if (!requestedTxHash.equals(responseTx.getTxHash())) {
405
+ // Returning the wrong data is a low tolerance error
406
+ this.peerManager.penalizePeer(peerId, PeerErrorSeverity.MidToleranceError);
407
+ return false;
408
+ }
409
+ if (!validProof) {
410
+ // If the proof is invalid, but the txHash is correct, then this is an active attack and we severly punish
411
+ this.peerManager.penalizePeer(peerId, PeerErrorSeverity.LowToleranceError);
412
+ return false;
413
+ }
414
+ return true;
415
+ }
416
+ /**
417
+ * Validate a tx from a peer.
418
+ * @param propagationSource - The peer ID of the peer that sent the tx.
419
+ * @param msg - The tx message.
420
+ * @returns True if the tx is valid, false otherwise.
421
+ */
422
+ async validatePropagatedTxFromMessage(propagationSource, msg) {
423
+ const tx = Tx.fromBuffer(Buffer.from(msg.data));
424
+ const isValid = await this.validatePropagatedTx(tx, propagationSource);
425
+ this.logger.trace(`validatePropagatedTx: ${isValid}`, {
426
+ [Attributes.TX_HASH]: tx.getTxHash().toString(),
427
+ [Attributes.P2P_ID]: propagationSource.toString(),
428
+ });
429
+ return isValid ? TopicValidatorResult.Accept : TopicValidatorResult.Reject;
430
+ }
431
+ /**
432
+ * Validate an attestation from a peer.
433
+ * @param propagationSource - The peer ID of the peer that sent the attestation.
434
+ * @param msg - The attestation message.
435
+ * @returns True if the attestation is valid, false otherwise.
436
+ */
437
+ async validatePropagatedAttestationFromMessage(propagationSource, msg) {
438
+ const attestation = BlockAttestation.fromBuffer(Buffer.from(msg.data));
439
+ const isValid = await this.validateAttestation(propagationSource, attestation);
440
+ this.logger.trace(`validatePropagatedAttestation: ${isValid}`, {
441
+ [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toString(),
442
+ [Attributes.P2P_ID]: propagationSource.toString(),
443
+ });
444
+ return isValid ? TopicValidatorResult.Accept : TopicValidatorResult.Reject;
445
+ }
446
+ /**
447
+ * Validate a block proposal from a peer.
448
+ * @param propagationSource - The peer ID of the peer that sent the block.
449
+ * @param msg - The block proposal message.
450
+ * @returns True if the block proposal is valid, false otherwise.
451
+ */
452
+ async validatePropagatedBlockFromMessage(propagationSource, msg) {
453
+ const block = BlockProposal.fromBuffer(Buffer.from(msg.data));
454
+ const isValid = await this.validateBlockProposal(propagationSource, block);
455
+ this.logger.trace(`validatePropagatedBlock: ${isValid}`, {
456
+ [Attributes.SLOT_NUMBER]: block.payload.header.globalVariables.slotNumber.toString(),
457
+ [Attributes.P2P_ID]: propagationSource.toString(),
458
+ });
459
+ return isValid ? TopicValidatorResult.Accept : TopicValidatorResult.Reject;
460
+ }
461
+ /**
462
+ * Validate an epoch proof quote from a peer.
463
+ * @param propagationSource - The peer ID of the peer that sent the epoch proof quote.
464
+ * @param msg - The epoch proof quote message.
465
+ * @returns True if the epoch proof quote is valid, false otherwise.
466
+ */
467
+ async validatePropagatedEpochProofQuoteFromMessage(propagationSource, msg) {
468
+ const epochProofQuote = EpochProofQuote.fromBuffer(Buffer.from(msg.data));
469
+ const isValid = await this.validateEpochProofQuote(propagationSource, epochProofQuote);
470
+ this.logger.trace(`validatePropagatedEpochProofQuote: ${isValid}`, {
471
+ [Attributes.EPOCH_NUMBER]: epochProofQuote.payload.epochToProve.toString(),
472
+ [Attributes.P2P_ID]: propagationSource.toString(),
473
+ });
474
+ return isValid ? TopicValidatorResult.Accept : TopicValidatorResult.Reject;
475
+ }
476
+ async validatePropagatedTx(tx, peerId) {
477
+ const blockNumber = (await this.l2BlockSource.getBlockNumber()) + 1;
478
+ const messageValidators = this.createMessageValidators(blockNumber);
479
+ const outcome = await this.runValidations(tx, messageValidators);
480
+ if (outcome.allPassed) {
481
+ return true;
482
+ }
483
+ const { name, severity } = outcome.failure;
484
+ // Double spend validator has a special case handler
485
+ if (name === 'doubleSpendValidator') {
486
+ const isValid = await this.handleDoubleSpendFailure(tx, blockNumber, peerId);
487
+ if (isValid) {
488
+ return true;
489
+ }
490
+ }
491
+ this.peerManager.penalizePeer(peerId, severity);
492
+ return false;
493
+ }
494
+ /**
495
+ * Create message validators for the given block number.
496
+ *
497
+ * Each validator is a pair of a validator and a severity.
498
+ * If a validator fails, the peer is penalized with the severity of the validator.
499
+ *
500
+ * @param blockNumber - The block number to create validators for.
501
+ * @returns The message validators.
502
+ */
503
+ createMessageValidators(blockNumber) {
504
+ return {
505
+ dataValidator: {
506
+ validator: new DataTxValidator(),
507
+ severity: PeerErrorSeverity.HighToleranceError,
508
+ },
509
+ metadataValidator: {
510
+ validator: new MetadataTxValidator(new Fr(this.config.l1ChainId), new Fr(blockNumber)),
511
+ severity: PeerErrorSeverity.HighToleranceError,
512
+ },
513
+ proofValidator: {
514
+ validator: new TxProofValidator(this.proofVerifier),
515
+ severity: PeerErrorSeverity.MidToleranceError,
516
+ },
517
+ doubleSpendValidator: {
518
+ validator: new DoubleSpendTxValidator({
519
+ getNullifierIndices: (nullifiers) => {
520
+ const merkleTree = this.worldStateSynchronizer.getCommitted();
521
+ return merkleTree.findLeafIndices(MerkleTreeId.NULLIFIER_TREE, nullifiers);
522
+ },
523
+ }),
524
+ severity: PeerErrorSeverity.HighToleranceError,
525
+ },
526
+ };
527
+ }
528
+ /**
529
+ * Run validations on a tx.
530
+ * @param tx - The tx to validate.
531
+ * @param messageValidators - The message validators to run.
532
+ * @returns The validation outcome.
533
+ */
534
+ async runValidations(tx, messageValidators) {
535
+ const validationPromises = Object.entries(messageValidators).map(async ([name, { validator, severity }]) => {
536
+ const isValid = await validator.validateTx(tx);
537
+ return { name, isValid, severity };
538
+ });
539
+ // A promise that resolves when all validations have been run
540
+ const allValidations = Promise.all(validationPromises);
541
+ // A promise that resolves when the first validation fails
542
+ const firstFailure = Promise.race(validationPromises.map(async (promise) => {
543
+ const result = await promise;
544
+ return result.isValid ? new Promise(() => { }) : result;
545
+ }));
546
+ // Wait for the first validation to fail or all validations to pass
547
+ const result = await Promise.race([
548
+ allValidations.then(() => ({ allPassed: true })),
549
+ firstFailure.then(failure => ({ allPassed: false, failure: failure })),
550
+ ]);
551
+ // If all validations pass, allPassed will be true, if failed, then the failure will be the first validation to fail
552
+ return result;
553
+ }
554
+ /**
555
+ * Handle a double spend failure.
556
+ *
557
+ * Double spend failures are managed on their own because they are a special case.
558
+ * We must check if the double spend is recent or old, if it is past a threshold, then we heavily penalize the peer.
559
+ *
560
+ * @param tx - The tx that failed the double spend validator.
561
+ * @param blockNumber - The block number of the tx.
562
+ * @param peerId - The peer ID of the peer that sent the tx.
563
+ * @returns True if the tx is valid, false otherwise.
564
+ */
565
+ async handleDoubleSpendFailure(tx, blockNumber, peerId) {
566
+ if (blockNumber <= this.config.severePeerPenaltyBlockLength) {
567
+ return false;
568
+ }
569
+ const snapshotValidator = new DoubleSpendTxValidator({
570
+ getNullifierIndices: (nullifiers) => {
571
+ const merkleTree = this.worldStateSynchronizer.getSnapshot(blockNumber - this.config.severePeerPenaltyBlockLength);
572
+ return merkleTree.findLeafIndices(MerkleTreeId.NULLIFIER_TREE, nullifiers);
573
+ },
574
+ });
575
+ const validSnapshot = await snapshotValidator.validateTx(tx);
576
+ if (!validSnapshot) {
577
+ this.peerManager.penalizePeer(peerId, PeerErrorSeverity.LowToleranceError);
578
+ return false;
579
+ }
580
+ return true;
581
+ }
582
+ /**
583
+ * Validate an attestation.
584
+ *
585
+ * @param attestation - The attestation to validate.
586
+ * @returns True if the attestation is valid, false otherwise.
587
+ */
588
+ async validateAttestation(peerId, attestation) {
589
+ const severity = await this.attestationValidator.validate(attestation);
590
+ if (severity) {
591
+ this.peerManager.penalizePeer(peerId, severity);
592
+ return false;
593
+ }
594
+ return true;
595
+ }
596
+ /**
597
+ * Validate a block proposal.
598
+ *
599
+ * @param block - The block proposal to validate.
600
+ * @returns True if the block proposal is valid, false otherwise.
601
+ */
602
+ async validateBlockProposal(peerId, block) {
603
+ const severity = await this.blockProposalValidator.validate(block);
604
+ if (severity) {
605
+ this.peerManager.penalizePeer(peerId, severity);
606
+ return false;
607
+ }
608
+ return true;
609
+ }
610
+ /**
611
+ * Validate an epoch proof quote.
612
+ *
613
+ * @param epochProofQuote - The epoch proof quote to validate.
614
+ * @returns True if the epoch proof quote is valid, false otherwise.
615
+ */
616
+ async validateEpochProofQuote(peerId, epochProofQuote) {
617
+ const severity = await this.epochProofQuoteValidator.validate(epochProofQuote);
618
+ if (severity) {
619
+ this.peerManager.penalizePeer(peerId, severity);
620
+ return false;
621
+ }
622
+ return true;
623
+ }
624
+ getPeerScore(peerId) {
625
+ return this.node.services.pubsub.score.score(peerId.toString());
626
+ }
627
+ async sendToPeers(message) {
628
+ const parent = message.constructor;
629
+ const identifier = message.p2pMessageIdentifier().toString();
630
+ this.logger.trace(`Sending message ${identifier}`);
631
+ const recipientsNum = await this.publishToTopic(parent.p2pTopic, message.toBuffer());
632
+ this.logger.debug(`Sent message ${identifier} to ${recipientsNum} peers`);
633
+ }
634
+ // Libp2p seems to hang sometimes if new peers are initiating connections.
635
+ async stopLibP2P() {
636
+ const TIMEOUT_MS = 5000; // 5 seconds timeout
637
+ const timeout = new Promise((resolve, reject) => {
638
+ setTimeout(() => reject(new Error('Timeout during libp2p.stop()')), TIMEOUT_MS);
639
+ });
640
+ try {
641
+ await Promise.race([this.node.stop(), timeout]);
642
+ this.logger.debug('LibP2P stopped');
643
+ }
644
+ catch (error) {
645
+ this.logger.error('Error during stop or timeout:', error);
646
+ }
647
+ }
648
+ },
649
+ (() => {
650
+ const _metadata = typeof Symbol === "function" && Symbol.metadata ? Object.create(_classSuper[Symbol.metadata] ?? null) : void 0;
651
+ _processAttestationFromPeer_decorators = [trackSpan('Libp2pService.processAttestationFromPeer', attestation => ({
652
+ [Attributes.BLOCK_NUMBER]: attestation.payload.header.globalVariables.blockNumber.toNumber(),
653
+ [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toNumber(),
654
+ [Attributes.BLOCK_ARCHIVE]: attestation.archive.toString(),
655
+ [Attributes.P2P_ID]: attestation.p2pMessageIdentifier().toString(),
656
+ }))];
657
+ _processBlockFromPeer_decorators = [trackSpan('Libp2pService.processBlockFromPeer', block => ({
658
+ [Attributes.BLOCK_NUMBER]: block.payload.header.globalVariables.blockNumber.toNumber(),
659
+ [Attributes.SLOT_NUMBER]: block.payload.header.globalVariables.slotNumber.toNumber(),
660
+ [Attributes.BLOCK_ARCHIVE]: block.archive.toString(),
661
+ [Attributes.P2P_ID]: block.p2pMessageIdentifier().toString(),
662
+ }))];
663
+ _broadcastAttestation_decorators = [trackSpan('Libp2pService.broadcastAttestation', attestation => ({
664
+ [Attributes.BLOCK_NUMBER]: attestation.payload.header.globalVariables.blockNumber.toNumber(),
665
+ [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toNumber(),
666
+ [Attributes.BLOCK_ARCHIVE]: attestation.archive.toString(),
667
+ [Attributes.P2P_ID]: attestation.p2pMessageIdentifier().toString(),
668
+ }))];
669
+ _validateRequestedTx_decorators = [trackSpan('Libp2pService.validateRequestedTx', (requestedTxHash, _responseTx) => ({
670
+ [Attributes.TX_HASH]: requestedTxHash.toString(),
671
+ }))];
672
+ _validatePropagatedTx_decorators = [trackSpan('Libp2pService.validatePropagatedTx', tx => ({
673
+ [Attributes.TX_HASH]: tx.getTxHash().toString(),
674
+ }))];
675
+ _validateAttestation_decorators = [trackSpan('Libp2pService.validateAttestation', (_peerId, attestation) => ({
676
+ [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toString(),
677
+ }))];
678
+ _validateBlockProposal_decorators = [trackSpan('Libp2pService.validateBlockProposal', (_peerId, block) => ({
679
+ [Attributes.SLOT_NUMBER]: block.payload.header.globalVariables.slotNumber.toString(),
680
+ }))];
681
+ _validateEpochProofQuote_decorators = [trackSpan('Libp2pService.validateEpochProofQuote', (_peerId, epochProofQuote) => ({
682
+ [Attributes.EPOCH_NUMBER]: epochProofQuote.payload.epochToProve.toString(),
683
+ }))];
684
+ __esDecorate(_a, null, _processAttestationFromPeer_decorators, { kind: "method", name: "processAttestationFromPeer", static: false, private: false, access: { has: obj => "processAttestationFromPeer" in obj, get: obj => obj.processAttestationFromPeer }, metadata: _metadata }, null, _instanceExtraInitializers);
685
+ __esDecorate(_a, null, _processBlockFromPeer_decorators, { kind: "method", name: "processBlockFromPeer", static: false, private: false, access: { has: obj => "processBlockFromPeer" in obj, get: obj => obj.processBlockFromPeer }, metadata: _metadata }, null, _instanceExtraInitializers);
686
+ __esDecorate(_a, null, _broadcastAttestation_decorators, { kind: "method", name: "broadcastAttestation", static: false, private: false, access: { has: obj => "broadcastAttestation" in obj, get: obj => obj.broadcastAttestation }, metadata: _metadata }, null, _instanceExtraInitializers);
687
+ __esDecorate(_a, null, _validateRequestedTx_decorators, { kind: "method", name: "validateRequestedTx", static: false, private: false, access: { has: obj => "validateRequestedTx" in obj, get: obj => obj.validateRequestedTx }, metadata: _metadata }, null, _instanceExtraInitializers);
688
+ __esDecorate(_a, null, _validatePropagatedTx_decorators, { kind: "method", name: "validatePropagatedTx", static: false, private: false, access: { has: obj => "validatePropagatedTx" in obj, get: obj => obj.validatePropagatedTx }, metadata: _metadata }, null, _instanceExtraInitializers);
689
+ __esDecorate(_a, null, _validateAttestation_decorators, { kind: "method", name: "validateAttestation", static: false, private: false, access: { has: obj => "validateAttestation" in obj, get: obj => obj.validateAttestation }, metadata: _metadata }, null, _instanceExtraInitializers);
690
+ __esDecorate(_a, null, _validateBlockProposal_decorators, { kind: "method", name: "validateBlockProposal", static: false, private: false, access: { has: obj => "validateBlockProposal" in obj, get: obj => obj.validateBlockProposal }, metadata: _metadata }, null, _instanceExtraInitializers);
691
+ __esDecorate(_a, null, _validateEpochProofQuote_decorators, { kind: "method", name: "validateEpochProofQuote", static: false, private: false, access: { has: obj => "validateEpochProofQuote" in obj, get: obj => obj.validateEpochProofQuote }, metadata: _metadata }, null, _instanceExtraInitializers);
692
+ if (_metadata) Object.defineProperty(_a, Symbol.metadata, { enumerable: true, configurable: true, writable: true, value: _metadata });
693
+ })(),
694
+ _a;
695
+ })();
696
+ export { LibP2PService };
697
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"libp2p_service.js","sourceRoot":"","sources":["../../../src/services/libp2p/libp2p_service.ts"],"names":[],"mappings":";AAAA,OAAO,EACL,gBAAgB,EAChB,aAAa,EAEb,eAAe,EAGf,YAAY,EACZ,iBAAiB,EAGjB,YAAY,EACZ,EAAE,EACF,MAAM,EAEN,yBAAyB,EACzB,uBAAuB,GACxB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EAAE,aAAa,EAAE,MAAM,sBAAsB,CAAC;AACrD,OAAO,EAAE,EAAE,EAAE,MAAM,oBAAoB,CAAC;AAExC,OAAO,EAAE,YAAY,EAAE,MAAM,uBAAuB,CAAC;AACrD,OAAO,EAAE,WAAW,EAAE,MAAM,yBAAyB,CAAC;AACtD,OAAO,EAAE,cAAc,EAAE,MAAM,mCAAmC,CAAC;AAEnE,OAAO,EAAE,UAAU,EAAE,kBAAkB,EAAwB,UAAU,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAGtH,OAAO,EAIL,SAAS,GACV,MAAM,6BAA6B,CAAC;AACrC,OAAO,EAAE,qBAAqB,EAAE,sBAAsB,EAAE,MAAM,mCAAmC,CAAC;AAClG,OAAO,EAAE,KAAK,EAAE,MAAM,yBAAyB,CAAC;AAChD,OAAO,EAAE,KAAK,EAAE,MAAM,yBAAyB,CAAC;AAChD,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAA6B,oBAAoB,EAAE,MAAM,mBAAmB,CAAC;AACpF,OAAO,iBAAiB,CAAC;AACzB,OAAO,EAAE,KAAK,EAAE,MAAM,eAAe,CAAC;AACtC,OAAO,EAAE,GAAG,EAAE,MAAM,aAAa,CAAC;AAClC,OAAO,EAAE,YAAY,EAAE,MAAM,QAAQ,CAAC;AAItC,OAAO,EAAE,wBAAwB,EAAE,MAAM,2DAA2D,CAAC;AACrG,OAAO,EAAE,oBAAoB,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AAC7F,OAAO,EACL,eAAe,EACf,sBAAsB,EACtB,mBAAmB,EACnB,gBAAgB,GACjB,MAAM,4CAA4C,CAAC;AACpD,OAAO,EAAqB,kBAAkB,EAAE,MAAM,eAAe,CAAC;AACtE,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAClD,OAAO,EAAE,eAAe,EAAE,WAAW,EAAE,UAAU,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AACxF,OAAO,EAAE,WAAW,EAAE,MAAM,oBAAoB,CAAC;AACjD,OAAO,EAAE,WAAW,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC;AACpE,OAAO,EACL,6BAA6B,EAC7B,+BAA+B,EAC/B,aAAa,EAGb,eAAe,EAEf,eAAe,GAChB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAAE,OAAO,EAAE,MAAM,uBAAuB,CAAC;AAEhD,OAAO,EAAE,cAAc,EAAE,MAAM,aAAa,CAAC;AAiB7C;;GAEG;IACU,aAAa;;sBAAkC,UAAU;;;;;;;;;;sBAAzD,aAAuC,SAAQ,WAAU;YAoBpE,YACU,UAAa,EACb,MAAiB,EACjB,IAAkB,EAClB,oBAA0C,EAC1C,QAAqB,EACrB,aAA4B,EAC5B,UAAsB,EACtB,aAA4C,EAC5C,sBAA8C,EAC9C,SAA0B,EAC1B,0BAAsD,6BAA6B,EACnF,SAAS,YAAY,CAAC,oBAAoB,CAAC;gBAEnD,KAAK,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;gBAb1B,eAAU,IArBT,mDAAa,EAqBd,UAAU,EAAG;gBACb,WAAM,GAAN,MAAM,CAAW;gBACjB,SAAI,GAAJ,IAAI,CAAc;gBAClB,yBAAoB,GAApB,oBAAoB,CAAsB;gBAC1C,aAAQ,GAAR,QAAQ,CAAa;gBACrB,kBAAa,GAAb,aAAa,CAAe;gBAC5B,eAAU,GAAV,UAAU,CAAY;gBACtB,kBAAa,GAAb,aAAa,CAA+B;gBAC5C,2BAAsB,GAAtB,sBAAsB,CAAwB;gBAC9C,cAAS,GAAT,SAAS,CAAiB;gBAC1B,4BAAuB,GAAvB,uBAAuB,CAA4D;gBACnF,WAAM,GAAN,MAAM,CAAqC;gBA/B7C,aAAQ,GAAgB,IAAI,WAAW,EAAE,CAAC;gBAmChD,IAAI,CAAC,WAAW,GAAG,IAAI,WAAW,CAAC,IAAI,EAAE,oBAAoB,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,CAAC,CAAC;gBAC1F,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,GAAG,CAAC,MAAc,EAAE,EAAE;oBAC3E,OAAO,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;gBAC/C,CAAC,CAAC;gBACF,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,iBAAiB,GAAG,EAAE,CAAC;gBAC9D,IAAI,CAAC,OAAO,GAAG,IAAI,OAAO,CAAC,MAAM,EAAE,IAAI,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC;gBAE3D,IAAI,CAAC,oBAAoB,GAAG,IAAI,oBAAoB,CAAC,UAAU,CAAC,CAAC;gBACjE,IAAI,CAAC,sBAAsB,GAAG,IAAI,sBAAsB,CAAC,UAAU,CAAC,CAAC;gBACrE,IAAI,CAAC,wBAAwB,GAAG,IAAI,wBAAwB,CAAC,UAAU,CAAC,CAAC;gBAEzE,IAAI,CAAC,qBAAqB,GAAG,CAAC,KAAoB,EAAyC,EAAE;oBAC3F,IAAI,CAAC,MAAM,CAAC,OAAO,CACjB,yFAAyF,KAAK,CAAC,oBAAoB,EAAE,aAAa,CACnI,CAAC;oBACF,OAAO,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;gBACpC,CAAC,CAAC;YACJ,CAAC;YAED;;;eAGG;YACI,KAAK,CAAC,KAAK;gBAChB,sCAAsC;gBACtC,IAAI,IAAI,CAAC,IAAI,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;oBACnC,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,CAAC;gBAED,8CAA8C;gBAC9C,MAAM,EAAE,gBAAgB,EAAE,kBAAkB,EAAE,GAAG,IAAI,CAAC,MAAM,CAAC;gBAC7D,IAAI,CAAC,kBAAkB,EAAE,CAAC;oBACxB,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;gBACpD,CAAC;gBACD,MAAM,oBAAoB,GAAG,kBAAkB,CAAC,kBAAkB,EAAE,KAAK,CAAC,CAAC;gBAE3E,0DAA0D;gBAC1D,IAAI,CAAC,QAAQ,CAAC,KAAK,EAAE,CAAC;gBACtB,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,EAAE,CAAC;gBACxC,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;gBAExB,oDAAoD;gBACpD,KAAK,MAAM,KAAK,IAAI,yBAAyB,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;oBAC/D,IAAI,CAAC,gBAAgB,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,CAAC;gBACtD,CAAC;gBAED,2BAA2B;gBAC3B,uFAAuF;gBACvF,2BAA2B;gBAC3B,MAAM,eAAe,GAAG;oBACtB,CAAC,EAAE,CAAC,QAAQ,CAAC,EAAE,IAAI,CAAC,+BAA+B,CAAC,IAAI,CAAC,IAAI,CAAC;oBAC9D,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,IAAI,CAAC,wCAAwC,CAAC,IAAI,CAAC,IAAI,CAAC;oBACrF,CAAC,aAAa,CAAC,QAAQ,CAAC,EAAE,IAAI,CAAC,kCAAkC,CAAC,IAAI,CAAC,IAAI,CAAC;oBAC5E,CAAC,eAAe,CAAC,QAAQ,CAAC,EAAE,IAAI,CAAC,4CAA4C,CAAC,IAAI,CAAC,IAAI,CAAC;iBACzF,CAAC;gBACF,KAAK,MAAM,CAAC,KAAK,EAAE,SAAS,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,EAAE,CAAC;oBACjE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;gBAClE,CAAC;gBAED,yBAAyB;gBACzB,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,gBAAgB,CAAC,cAAc,CAAC,OAAO,EAAE,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;gBAEzG,2CAA2C;gBAC3C,IAAI,CAAC,uBAAuB,GAAG,IAAI,cAAc,CAC/C,GAAG,EAAE,CAAC,IAAI,CAAC,WAAW,CAAC,SAAS,EAAE,EAClC,IAAI,CAAC,MAAM,EACX,IAAI,CAAC,MAAM,CAAC,mBAAmB,CAChC,CAAC;gBACF,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE,CAAC;gBAErC,sIAAsI;gBACtI,MAAM,4BAA4B,GAAG;oBACnC,GAAG,+BAA+B;oBAClC,CAAC,eAAe,CAAC,EAAE,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,IAAI,CAAC;iBACvD,CAAC;gBACF,MAAM,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC,IAAI,CAAC,uBAAuB,EAAE,4BAA4B,CAAC,CAAC;gBACrF,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,EAAE;oBACtC,MAAM,EAAE,gBAAgB;oBACxB,QAAQ,EAAE,oBAAoB;oBAC9B,MAAM,EAAE,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,QAAQ,EAAE;iBACpC,CAAC,CAAC;YACL,CAAC;YAED;;;eAGG;YACI,KAAK,CAAC,IAAI;gBACf,6BAA6B;gBAC7B,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,mBAAmB,CAAC,cAAc,CAAC,OAAO,EAAE,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;gBAE5G,oBAAoB;gBACpB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAAC,CAAC;gBAC9C,IAAI,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;gBAExB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC;gBAC3C,MAAM,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;gBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,MAAM,IAAI,CAAC,uBAAuB,EAAE,IAAI,EAAE,CAAC;gBAC3C,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,oCAAoC,CAAC,CAAC;gBACxD,MAAM,IAAI,CAAC,oBAAoB,CAAC,IAAI,EAAE,CAAC;gBACvC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,qCAAqC,CAAC,CAAC;gBACzD,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;gBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,UAAU,EAAE,CAAC;gBACxB,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC;YAC7C,CAAC;YAED;;;;;eAKG;YACI,MAAM,CAAC,KAAK,CAAC,GAAG,CACrB,UAAa,EACb,MAAiB,EACjB,oBAA0C,EAC1C,MAAc,EACd,QAAqB,EACrB,aAA4B,EAC5B,UAAsB,EACtB,aAA4C,EAC5C,sBAA8C,EAC9C,KAAmB,EACnB,SAA0B;gBAE1B,MAAM,EAAE,gBAAgB,EAAE,kBAAkB,EAAE,YAAY,EAAE,YAAY,EAAE,GAAG,MAAM,CAAC;gBACpF,MAAM,WAAW,GAAG,kBAAkB,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;gBAChE,yGAAyG;gBACzG,MAAM,eAAe,GAAG,kBAAkB,CAAC,kBAAmB,EAAE,KAAK,CAAC,CAAC;gBAEvE,MAAM,SAAS,GAAG,IAAI,cAAc,CAAC,KAAK,CAAC,CAAC;gBAE5C,MAAM,kBAAkB,GAAG,IAAI,kBAAkB,CAAC,SAAS,CAAC,CAAC;gBAE7D,MAAM,IAAI,GAAG,MAAM,YAAY,CAAC;oBAC9B,KAAK,EAAE,KAAK;oBACZ,MAAM;oBACN,SAAS,EAAE;wBACT,MAAM,EAAE,CAAC,WAAW,CAAC;wBACrB,QAAQ,EAAE,CAAC,eAAe,CAAC;qBAC5B;oBACD,UAAU,EAAE;wBACV,GAAG,CAAC;4BACF,cAAc,EAAE,MAAM,CAAC,YAAY;4BACnC,wEAAwE;4BACxE,sEAAsE;4BACtE,2CAA2C;4BAC3C,OAAO,EAAE,CAAC;4BACV,2BAA2B,EAAE;gCAC3B,UAAU,EAAE,YAAY,IAAI,QAAQ;gCACpC,WAAW,EAAE,YAAY,IAAI,QAAQ;6BACtC;yBACF,CAAC;qBACH;oBACD,SAAS;oBACT,YAAY,EAAE,CAAC,KAAK,EAAE,EAAE,KAAK,EAAE,CAAC;oBAChC,oBAAoB,EAAE,CAAC,KAAK,EAAE,CAAC;oBAC/B,iBAAiB,EAAE;wBACjB,cAAc,EAAE,YAAY;wBAC5B,cAAc,EAAE,YAAY;qBAC7B;oBACD,QAAQ,EAAE;wBACR,QAAQ,EAAE,QAAQ,CAAC;4BACjB,cAAc,EAAE,OAAO;yBACxB,CAAC;wBACF,MAAM,EAAE,SAAS,CAAC;4BAChB,4BAA4B,EAAE,IAAI;4BAClC,CAAC,EAAE,MAAM,CAAC,UAAU;4BACpB,GAAG,EAAE,MAAM,CAAC,YAAY;4BACxB,GAAG,EAAE,MAAM,CAAC,YAAY;4BACxB,iBAAiB,EAAE,MAAM,CAAC,iBAAiB;4BAC3C,YAAY,EAAE,MAAM,CAAC,qBAAqB;4BAC1C,YAAY,EAAE,MAAM,CAAC,qBAAqB;4BAC1C,OAAO,EAAE,UAAU;4BACnB,YAAY,EAAE,YAAY;4BAC1B,WAAW,EAAE,WAAW;4BACxB,aAAa,EAAE,IAAI,eAAe,EAAE;4BACpC,eAAe,EAAE,kBAAkB;4BACnC,sBAAsB,EAAE,uBAAuB,EAAE;4BACjD,eAAe,EAAE,IAAI;4BACrB,WAAW,EAAE,qBAAqB,CAAC;gCACjC,MAAM,EAAE;oCACN,CAAC,EAAE,CAAC,QAAQ,CAAC,EAAE,sBAAsB,CAAC;wCACpC,WAAW,EAAE,CAAC;wCACd,8BAA8B,EAAE,CAAC,EAAE;wCACnC,6BAA6B,EAAE,GAAG;qCACnC,CAAC;oCACF,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,sBAAsB,CAAC;wCAClD,WAAW,EAAE,CAAC;wCACd,8BAA8B,EAAE,CAAC,EAAE;wCACnC,6BAA6B,EAAE,GAAG;qCACnC,CAAC;oCACF,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,sBAAsB,CAAC;wCAClD,WAAW,EAAE,CAAC;wCACd,8BAA8B,EAAE,CAAC,EAAE;wCACnC,6BAA6B,EAAE,GAAG;qCACnC,CAAC;oCACF,CAAC,eAAe,CAAC,QAAQ,CAAC,EAAE,sBAAsB,CAAC;wCACjD,WAAW,EAAE,CAAC;wCACd,8BAA8B,EAAE,CAAC,EAAE;wCACnC,6BAA6B,EAAE,GAAG;qCACnC,CAAC;iCACH;6BACF,CAAC;yBACH,CAAmD;qBACrD;iBACF,CAAC,CAAC;gBAEH,4CAA4C;gBAC5C;;;;mBAIG;gBACH,MAAM,SAAS,GAAG,CAAC,GAAW,EAAmB,EAAE;oBACjD,MAAM,MAAM,GAAG,MAAM,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;oBACtC,MAAM,OAAO,GAAG,QAAQ,CAAC,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC;oBACpD,MAAM,GAAG,GAAG,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;oBAC3D,OAAO,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,CAAC;gBAEF,MAAM,uBAAuB,GAAG;oBAC9B,CAAC,aAAa,CAAC,EAAE,WAAW;oBAC5B,CAAC,eAAe,CAAC,EAAE,aAAa;oBAChC,CAAC,eAAe,CAAC,EAAE,SAAS;iBAC7B,CAAC;gBAEF,OAAO,IAAI,EAAa,CACtB,UAAU,EACV,MAAM,EACN,IAAI,EACJ,oBAAoB,EACpB,QAAQ,EACR,aAAa,EACb,UAAU,EACV,aAAa,EACb,sBAAsB,EACtB,SAAS,EACT,uBAAuB,CACxB,CAAC;YACJ,CAAC;YAEM,QAAQ,CAAC,cAAwB;gBACtC,OAAO,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,cAAc,CAAC,CAAC;YACnD,CAAC;YAEO,KAAK,CAAC,oBAAoB,CAAC,CAAgC;gBACjE,MAAM,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC,MAAM,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAAC,CAAC;gBAE9C,MAAM,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,GAAG,CAAC,CAAC,CAAC;YAClE,CAAC;YAED;;;;;;;;;eASG;YACH,WAAW,CACT,QAAqB,EACrB,OAA6D;gBAE7D,OAAO,IAAI,CAAC,OAAO,CAAC,WAAW,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;YACrD,CAAC;YAED;;;eAGG;YACI,MAAM;gBACX,OAAO,IAAI,CAAC,oBAAoB,CAAC,MAAM,EAAE,CAAC;YAC5C,CAAC;YAEM,6BAA6B,CAAC,QAAyE;gBAC5G,IAAI,CAAC,qBAAqB,GAAG,QAAQ,CAAC;gBACtC,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,oCAAoC,CAAC,CAAC;YAC5D,CAAC;YAED;;;eAGG;YACK,gBAAgB,CAAC,KAAa;gBACpC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC;oBAC/B,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;gBACnD,CAAC;gBACD,KAAK,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YAClD,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,cAAc,CAAC,KAAa,EAAE,IAAgB;gBAC1D,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC;oBAC/B,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;gBACnD,CAAC;gBACD,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;gBAEpE,OAAO,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC;YAClC,CAAC;YAED;;;;eAIG;YACK,KAAK,CAAC,sBAAsB,CAAC,OAAyB;gBAC5D,IAAI,OAAO,CAAC,KAAK,KAAK,EAAE,CAAC,QAAQ,EAAE,CAAC;oBAClC,MAAM,EAAE,GAAG,EAAE,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;oBACpD,MAAM,IAAI,CAAC,iBAAiB,CAAC,EAAE,CAAC,CAAC;gBACnC,CAAC;gBACD,IAAI,OAAO,CAAC,KAAK,KAAK,gBAAgB,CAAC,QAAQ,IAAI,IAAI,CAAC,UAAU,KAAK,aAAa,CAAC,IAAI,EAAE,CAAC;oBAC1F,MAAM,WAAW,GAAG,gBAAgB,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;oBAC3E,MAAM,IAAI,CAAC,0BAA0B,CAAC,WAAW,CAAC,CAAC;gBACrD,CAAC;gBACD,IAAI,OAAO,CAAC,KAAK,IAAI,aAAa,CAAC,QAAQ,EAAE,CAAC;oBAC5C,MAAM,KAAK,GAAG,aAAa,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;oBAClE,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;gBACzC,CAAC;gBACD,IAAI,OAAO,CAAC,KAAK,IAAI,eAAe,CAAC,QAAQ,EAAE,CAAC;oBAC9C,MAAM,eAAe,GAAG,eAAe,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;oBAC9E,IAAI,CAAC,8BAA8B,CAAC,eAAe,CAAC,CAAC;gBACvD,CAAC;gBAED,OAAO;YACT,CAAC;YAED;;;;eAIG;YAOK,KAAK,CAAC,0BAA0B,CAAC,WAA6B;gBACpE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,wBAAwB,WAAW,CAAC,oBAAoB,EAAE,sBAAsB,CAAC,CAAC;gBACpG,MAAM,IAAI,CAAC,QAAQ,CAAC,eAAgB,CAAC,eAAe,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC;YACtE,CAAC;YAED;;;;;eAKG;YACH,uFAAuF;YAO/E,KAAK,CAAC,oBAAoB,CAAC,KAAoB;gBACrD,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,kBAAkB,KAAK,CAAC,oBAAoB,EAAE,sBAAsB,CAAC,CAAC;gBAC1F,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,KAAK,CAAC,CAAC;gBAE5D,0DAA0D;gBAC1D,uGAAuG;gBACvG,IAAI,WAAW,IAAI,SAAS,EAAE,CAAC;oBAC7B,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,4BAA4B,WAAW,CAAC,oBAAoB,EAAE,EAAE,CAAC,CAAC;oBACtF,IAAI,CAAC,oBAAoB,CAAC,WAAW,CAAC,CAAC;gBACzC,CAAC;YACH,CAAC;YAED;;;eAGG;YAOK,oBAAoB,CAAC,WAA6B;gBACxD,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,CAAC;YAC9B,CAAC;YAEO,8BAA8B,CAAC,eAAgC;gBACrE,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,8BAA8B,eAAe,CAAC,oBAAoB,EAAE,sBAAsB,CAAC,CAAC;gBAChH,IAAI,CAAC,QAAQ,CAAC,mBAAmB,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;YAC9D,CAAC;YAED;;;eAGG;YACI,SAAS,CAAuB,OAAU;gBAC/C,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,OAAO,CAAC,oBAAoB,EAAE,UAAU,CAAC,CAAC;gBAChE,KAAK,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,KAAK,IAAI,EAAE;oBAChC,MAAM,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;gBAClC,CAAC,CAAC,CAAC;YACL,CAAC;YAEO,KAAK,CAAC,iBAAiB,CAAC,EAAM;gBACpC,MAAM,MAAM,GAAG,EAAE,CAAC,SAAS,EAAE,CAAC;gBAC9B,MAAM,YAAY,GAAG,MAAM,CAAC,QAAQ,EAAE,CAAC;gBACvC,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,eAAe,YAAY,sBAAsB,CAAC,CAAC;gBACvE,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;YAC1C,CAAC;YAED;;;;;;;;;;;;;eAaG;YAIK,KAAK,CAAC,mBAAmB,CAAC,eAAuB,EAAE,UAAc,EAAE,MAAc;gBACvF,MAAM,cAAc,GAAG,IAAI,gBAAgB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBAChE,MAAM,UAAU,GAAG,MAAM,cAAc,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC;gBAE/D,qDAAqD;gBACrD,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC,EAAE,CAAC;oBACpD,oDAAoD;oBACpD,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;oBAC3E,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,IAAI,CAAC,UAAU,EAAE,CAAC;oBAChB,0GAA0G;oBAC1G,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;oBAC3E,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,OAAO,IAAI,CAAC;YACd,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,+BAA+B,CAC3C,iBAAyB,EACzB,GAAY;gBAEZ,MAAM,EAAE,GAAG,EAAE,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;gBAChD,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,EAAE,EAAE,iBAAiB,CAAC,CAAC;gBACvE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,yBAAyB,OAAO,EAAE,EAAE;oBACpD,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,EAAE,CAAC,SAAS,EAAE,CAAC,QAAQ,EAAE;oBAC/C,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,iBAAiB,CAAC,QAAQ,EAAE;iBAClD,CAAC,CAAC;gBACH,OAAO,OAAO,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC;YAC7E,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,wCAAwC,CACpD,iBAAyB,EACzB,GAAY;gBAEZ,MAAM,WAAW,GAAG,gBAAgB,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;gBACvE,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,WAAW,CAAC,CAAC;gBAC/E,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,kCAAkC,OAAO,EAAE,EAAE;oBAC7D,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;oBAC1F,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,iBAAiB,CAAC,QAAQ,EAAE;iBAClD,CAAC,CAAC;gBACH,OAAO,OAAO,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC;YAC7E,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,kCAAkC,CAC9C,iBAAyB,EACzB,GAAY;gBAEZ,MAAM,KAAK,GAAG,aAAa,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;gBAC9D,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,iBAAiB,EAAE,KAAK,CAAC,CAAC;gBAC3E,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,4BAA4B,OAAO,EAAE,EAAE;oBACvD,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;oBACpF,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,iBAAiB,CAAC,QAAQ,EAAE;iBAClD,CAAC,CAAC;gBACH,OAAO,OAAO,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC;YAC7E,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,4CAA4C,CACxD,iBAAyB,EACzB,GAAY;gBAEZ,MAAM,eAAe,GAAG,eAAe,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;gBAC1E,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,uBAAuB,CAAC,iBAAiB,EAAE,eAAe,CAAC,CAAC;gBACvF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,sCAAsC,OAAO,EAAE,EAAE;oBACjE,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,eAAe,CAAC,OAAO,CAAC,YAAY,CAAC,QAAQ,EAAE;oBAC1E,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,iBAAiB,CAAC,QAAQ,EAAE;iBAClD,CAAC,CAAC;gBACH,OAAO,OAAO,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC;YAC7E,CAAC;YAKO,KAAK,CAAC,oBAAoB,CAAC,EAAM,EAAE,MAAc;gBACvD,MAAM,WAAW,GAAG,CAAC,MAAM,IAAI,CAAC,aAAa,CAAC,cAAc,EAAE,CAAC,GAAG,CAAC,CAAC;gBACpE,MAAM,iBAAiB,GAAG,IAAI,CAAC,uBAAuB,CAAC,WAAW,CAAC,CAAC;gBACpE,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,EAAE,EAAE,iBAAiB,CAAC,CAAC;gBAEjE,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;oBACtB,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,OAAO,CAAC,OAAO,CAAC;gBAE3C,oDAAoD;gBACpD,IAAI,IAAI,KAAK,sBAAsB,EAAE,CAAC;oBACpC,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,wBAAwB,CAAC,EAAE,EAAE,WAAW,EAAE,MAAM,CAAC,CAAC;oBAC7E,IAAI,OAAO,EAAE,CAAC;wBACZ,OAAO,IAAI,CAAC;oBACd,CAAC;gBACH,CAAC;gBAED,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;gBAChD,OAAO,KAAK,CAAC;YACf,CAAC;YAED;;;;;;;;eAQG;YACK,uBAAuB,CAAC,WAAmB;gBACjD,OAAO;oBACL,aAAa,EAAE;wBACb,SAAS,EAAE,IAAI,eAAe,EAAE;wBAChC,QAAQ,EAAE,iBAAiB,CAAC,kBAAkB;qBAC/C;oBACD,iBAAiB,EAAE;wBACjB,SAAS,EAAE,IAAI,mBAAmB,CAAC,IAAI,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,EAAE,CAAC,WAAW,CAAC,CAAC;wBACtF,QAAQ,EAAE,iBAAiB,CAAC,kBAAkB;qBAC/C;oBACD,cAAc,EAAE;wBACd,SAAS,EAAE,IAAI,gBAAgB,CAAC,IAAI,CAAC,aAAa,CAAC;wBACnD,QAAQ,EAAE,iBAAiB,CAAC,iBAAiB;qBAC9C;oBACD,oBAAoB,EAAE;wBACpB,SAAS,EAAE,IAAI,sBAAsB,CAAC;4BACpC,mBAAmB,EAAE,CAAC,UAAoB,EAAE,EAAE;gCAC5C,MAAM,UAAU,GAAG,IAAI,CAAC,sBAAsB,CAAC,YAAY,EAAE,CAAC;gCAC9D,OAAO,UAAU,CAAC,eAAe,CAAC,YAAY,CAAC,cAAc,EAAE,UAAU,CAAC,CAAC;4BAC7E,CAAC;yBACF,CAAC;wBACF,QAAQ,EAAE,iBAAiB,CAAC,kBAAkB;qBAC/C;iBACF,CAAC;YACJ,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,cAAc,CAC1B,EAAM,EACN,iBAAmD;gBAEnD,MAAM,kBAAkB,GAAG,MAAM,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,IAAI,EAAE,EAAE,SAAS,EAAE,QAAQ,EAAE,CAAC,EAAE,EAAE;oBACzG,MAAM,OAAO,GAAG,MAAM,SAAS,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;oBAC/C,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,QAAQ,EAAE,CAAC;gBACrC,CAAC,CAAC,CAAC;gBAEH,6DAA6D;gBAC7D,MAAM,cAAc,GAAG,OAAO,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;gBAEvD,0DAA0D;gBAC1D,MAAM,YAAY,GAAG,OAAO,CAAC,IAAI,CAC/B,kBAAkB,CAAC,GAAG,CAAC,KAAK,EAAC,OAAO,EAAC,EAAE;oBACrC,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC;oBAC7B,OAAO,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,OAAO,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC;gBACzD,CAAC,CAAC,CACH,CAAC;gBAEF,mEAAmE;gBACnE,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,IAAI,CAAC;oBAChC,cAAc,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,IAAa,EAAE,CAAC,CAAC;oBACzD,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,KAAc,EAAE,OAAO,EAAE,OAA2B,EAAE,CAAC,CAAC;iBACpG,CAAC,CAAC;gBAEH,oHAAoH;gBACpH,OAAO,MAAM,CAAC;YAChB,CAAC;YAED;;;;;;;;;;eAUG;YACK,KAAK,CAAC,wBAAwB,CAAC,EAAM,EAAE,WAAmB,EAAE,MAAc;gBAChF,IAAI,WAAW,IAAI,IAAI,CAAC,MAAM,CAAC,4BAA4B,EAAE,CAAC;oBAC5D,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,MAAM,iBAAiB,GAAG,IAAI,sBAAsB,CAAC;oBACnD,mBAAmB,EAAE,CAAC,UAAoB,EAAE,EAAE;wBAC5C,MAAM,UAAU,GAAG,IAAI,CAAC,sBAAsB,CAAC,WAAW,CACxD,WAAW,GAAG,IAAI,CAAC,MAAM,CAAC,4BAA4B,CACvD,CAAC;wBACF,OAAO,UAAU,CAAC,eAAe,CAAC,YAAY,CAAC,cAAc,EAAE,UAAU,CAAC,CAAC;oBAC7E,CAAC;iBACF,CAAC,CAAC;gBAEH,MAAM,aAAa,GAAG,MAAM,iBAAiB,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;gBAC7D,IAAI,CAAC,aAAa,EAAE,CAAC;oBACnB,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;oBAC3E,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,OAAO,IAAI,CAAC;YACd,CAAC;YAED;;;;;eAKG;YAII,KAAK,CAAC,mBAAmB,CAAC,MAAc,EAAE,WAA6B;gBAC5E,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;gBACvE,IAAI,QAAQ,EAAE,CAAC;oBACb,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;oBAChD,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,OAAO,IAAI,CAAC;YACd,CAAC;YAED;;;;;eAKG;YAII,KAAK,CAAC,qBAAqB,CAAC,MAAc,EAAE,KAAoB;gBACrE,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;gBACnE,IAAI,QAAQ,EAAE,CAAC;oBACb,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;oBAChD,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,OAAO,IAAI,CAAC;YACd,CAAC;YAED;;;;;eAKG;YAII,KAAK,CAAC,uBAAuB,CAAC,MAAc,EAAE,eAAgC;gBACnF,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,wBAAwB,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC;gBAC/E,IAAI,QAAQ,EAAE,CAAC;oBACb,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;oBAChD,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,OAAO,IAAI,CAAC;YACd,CAAC;YAEM,YAAY,CAAC,MAAc;gBAChC,OAAO,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAC;YAClE,CAAC;YAEO,KAAK,CAAC,WAAW,CAAuB,OAAU;gBACxD,MAAM,MAAM,GAAG,OAAO,CAAC,WAAgC,CAAC;gBAExD,MAAM,UAAU,GAAG,OAAO,CAAC,oBAAoB,EAAE,CAAC,QAAQ,EAAE,CAAC;gBAC7D,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,mBAAmB,UAAU,EAAE,CAAC,CAAC;gBAEnD,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,QAAQ,EAAE,OAAO,CAAC,QAAQ,EAAE,CAAC,CAAC;gBACrF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,gBAAgB,UAAU,OAAO,aAAa,QAAQ,CAAC,CAAC;YAC5E,CAAC;YAED,0EAA0E;YAClE,KAAK,CAAC,UAAU;gBACtB,MAAM,UAAU,GAAG,IAAI,CAAC,CAAC,oBAAoB;gBAC7C,MAAM,OAAO,GAAG,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;oBAC9C,UAAU,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC,EAAE,UAAU,CAAC,CAAC;gBAClF,CAAC,CAAC,CAAC;gBACH,IAAI,CAAC;oBACH,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC;oBAChD,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBACtC,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;gBAC5D,CAAC;YACH,CAAC;;;;sDAhZA,SAAS,CAAC,0CAA0C,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;oBACrE,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,WAAW,CAAC,QAAQ,EAAE;oBAC5F,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;oBAC1F,CAAC,UAAU,CAAC,aAAa,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,QAAQ,EAAE;oBAC1D,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,WAAW,CAAC,oBAAoB,EAAE,CAAC,QAAQ,EAAE;iBACnE,CAAC,CAAC;gDAaF,SAAS,CAAC,oCAAoC,EAAE,KAAK,CAAC,EAAE,CAAC,CAAC;oBACzD,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,WAAW,CAAC,QAAQ,EAAE;oBACtF,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;oBACpF,CAAC,UAAU,CAAC,aAAa,CAAC,EAAE,KAAK,CAAC,OAAO,CAAC,QAAQ,EAAE;oBACpD,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,KAAK,CAAC,oBAAoB,EAAE,CAAC,QAAQ,EAAE;iBAC7D,CAAC,CAAC;gDAiBF,SAAS,CAAC,oCAAoC,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;oBAC/D,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,WAAW,CAAC,QAAQ,EAAE;oBAC5F,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;oBAC1F,CAAC,UAAU,CAAC,aAAa,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,QAAQ,EAAE;oBAC1D,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,WAAW,CAAC,oBAAoB,EAAE,CAAC,QAAQ,EAAE;iBACnE,CAAC,CAAC;+CA0CF,SAAS,CAAC,mCAAmC,EAAE,CAAC,eAAe,EAAE,WAAW,EAAE,EAAE,CAAC,CAAC;oBACjF,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,eAAe,CAAC,QAAQ,EAAE;iBACjD,CAAC,CAAC;gDAiGF,SAAS,CAAC,oCAAoC,EAAE,EAAE,CAAC,EAAE,CAAC,CAAC;oBACtD,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,EAAE,CAAC,SAAS,EAAE,CAAC,QAAQ,EAAE;iBAChD,CAAC,CAAC;+CAuIF,SAAS,CAAC,mCAAmC,EAAE,CAAC,OAAO,EAAE,WAAW,EAAE,EAAE,CAAC,CAAC;oBACzE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;iBAC3F,CAAC,CAAC;iDAiBF,SAAS,CAAC,qCAAqC,EAAE,CAAC,OAAO,EAAE,KAAK,EAAE,EAAE,CAAC,CAAC;oBACrE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;iBACrF,CAAC,CAAC;mDAiBF,SAAS,CAAC,uCAAuC,EAAE,CAAC,OAAO,EAAE,eAAe,EAAE,EAAE,CAAC,CAAC;oBACjF,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,eAAe,CAAC,OAAO,CAAC,YAAY,CAAC,QAAQ,EAAE;iBAC3E,CAAC,CAAC;YArWH,+NAAc,0BAA0B,6DAGvC;YAeD,6MAAc,oBAAoB,6DAUjC;YAYD,6MAAQ,oBAAoB,6DAE3B;YA0CD,0MAAc,mBAAmB,6DAkBhC;YAiFD,6MAAc,oBAAoB,6DAqBjC;YAoHD,0MAAa,mBAAmB,6DAQ/B;YAWD,gNAAa,qBAAqB,6DAQjC;YAWD,sNAAa,uBAAuB,6DAQnC;;;;;SA9uBU,aAAa"}